renet/src/socket/raw.rs

397 lines
13 KiB
Rust
Raw Normal View History

2017-07-30 10:00:23 +08:00
use core::cmp::min;
2017-06-18 18:14:20 +08:00
use managed::Managed;
use {Error, Result};
use phy::ChecksumCapabilities;
use wire::{IpVersion, IpRepr, IpProtocol, Ipv4Repr, Ipv4Packet};
use socket::{Socket, SocketHandle};
2017-06-18 18:14:20 +08:00
use storage::{Resettable, RingBuffer};
/// A buffered raw IP packet.
#[derive(Debug)]
pub struct PacketBuffer<'a> {
size: usize,
payload: Managed<'a, [u8]>,
}
impl<'a> PacketBuffer<'a> {
/// Create a buffered packet.
pub fn new<T>(payload: T) -> PacketBuffer<'a>
where T: Into<Managed<'a, [u8]>> {
PacketBuffer {
size: 0,
payload: payload.into(),
}
}
fn as_ref<'b>(&'b self) -> &'b [u8] {
&self.payload[..self.size]
}
fn as_mut<'b>(&'b mut self) -> &'b mut [u8] {
&mut self.payload[..self.size]
}
2017-07-30 10:00:23 +08:00
fn resize<'b>(&'b mut self, size: usize) -> Result<&'b mut Self> {
if self.payload.len() >= size {
self.size = size;
Ok(self)
} else {
Err(Error::Truncated)
}
}
2017-06-18 18:14:20 +08:00
}
impl<'a> Resettable for PacketBuffer<'a> {
fn reset(&mut self) {
self.size = 0;
}
}
/// A raw IP packet ring buffer.
pub type SocketBuffer<'a, 'b: 'a> = RingBuffer<'a, PacketBuffer<'b>>;
/// A raw IP socket.
///
/// A raw socket is bound to a specific IP protocol, and owns
/// transmit and receive packet buffers.
#[derive(Debug)]
pub struct RawSocket<'a, 'b: 'a> {
handle: SocketHandle,
2017-06-18 18:14:20 +08:00
ip_version: IpVersion,
ip_protocol: IpProtocol,
rx_buffer: SocketBuffer<'a, 'b>,
tx_buffer: SocketBuffer<'a, 'b>,
}
impl<'a, 'b> RawSocket<'a, 'b> {
/// Create a raw IP socket bound to the given IP version and datagram protocol,
/// with the given buffers.
pub fn new(ip_version: IpVersion, ip_protocol: IpProtocol,
rx_buffer: SocketBuffer<'a, 'b>,
tx_buffer: SocketBuffer<'a, 'b>) -> Socket<'a, 'b> {
Socket::Raw(RawSocket {
handle: SocketHandle::EMPTY,
2017-06-18 18:14:20 +08:00
ip_version,
ip_protocol,
rx_buffer,
tx_buffer,
})
}
/// Return the socket handle.
#[inline]
pub fn handle(&self) -> SocketHandle {
self.handle
2017-06-18 18:14:20 +08:00
}
/// Set the socket handle.
pub(in super) fn set_handle(&mut self, handle: SocketHandle) {
self.handle = handle;
2017-06-18 18:14:20 +08:00
}
/// Return the IP version the socket is bound to.
#[inline]
2017-06-18 18:14:20 +08:00
pub fn ip_version(&self) -> IpVersion {
self.ip_version
}
/// Return the IP protocol the socket is bound to.
#[inline]
2017-06-18 18:14:20 +08:00
pub fn ip_protocol(&self) -> IpProtocol {
self.ip_protocol
}
/// Check whether the transmit buffer is full.
#[inline]
2017-06-18 18:14:20 +08:00
pub fn can_send(&self) -> bool {
!self.tx_buffer.is_full()
2017-06-18 18:14:20 +08:00
}
/// Check whether the receive buffer is not empty.
#[inline]
2017-06-18 18:14:20 +08:00
pub fn can_recv(&self) -> bool {
!self.rx_buffer.is_empty()
2017-06-18 18:14:20 +08:00
}
/// Enqueue a packet to send, and return a pointer to its payload.
///
/// This function returns `Err(Error::Exhausted)` if the size is greater than
/// the transmit packet buffer size.
2017-07-30 10:00:23 +08:00
///
/// If the buffer is filled in a way that does not match the socket's
/// IP version or protocol, the packet will be silently dropped.
///
/// **Note:** The IP header is parsed and reserialized, and may not match
/// the header actually transmitted bit for bit.
pub fn send(&mut self, size: usize) -> Result<&mut [u8]> {
let packet_buf = self.tx_buffer.enqueue_one_with(|buf| buf.resize(size))?;
net_trace!("{}:{}:{}: buffer to send {} octets",
self.handle, self.ip_version, self.ip_protocol,
2017-06-18 18:14:20 +08:00
packet_buf.size);
2017-07-30 10:00:23 +08:00
Ok(packet_buf.as_mut())
2017-06-18 18:14:20 +08:00
}
/// Enqueue a packet to send, and fill it from a slice.
///
/// See also [send](#method.send).
2017-07-30 10:00:23 +08:00
pub fn send_slice(&mut self, data: &[u8]) -> Result<()> {
self.send(data.len())?.copy_from_slice(data);
Ok(())
2017-06-18 18:14:20 +08:00
}
/// Dequeue a packet, and return a pointer to the payload.
///
/// This function returns `Err(Error::Exhausted)` if the receive buffer is empty.
2017-07-30 10:00:23 +08:00
///
/// **Note:** The IP header is parsed and reserialized, and may not match
/// the header actually received bit for bit.
pub fn recv(&mut self) -> Result<&[u8]> {
let packet_buf = self.rx_buffer.dequeue_one()?;
net_trace!("{}:{}:{}: receive {} buffered octets",
self.handle, self.ip_version, self.ip_protocol,
2017-06-18 18:14:20 +08:00
packet_buf.size);
2017-07-30 10:00:23 +08:00
Ok(&packet_buf.as_ref())
2017-06-18 18:14:20 +08:00
}
/// Dequeue a packet, and copy the payload into the given slice.
///
/// See also [recv](#method.recv).
pub fn recv_slice(&mut self, data: &mut [u8]) -> Result<usize> {
2017-06-18 18:14:20 +08:00
let buffer = self.recv()?;
2017-07-30 10:00:23 +08:00
let length = min(data.len(), buffer.len());
data[..length].copy_from_slice(&buffer[..length]);
Ok(length)
2017-06-18 18:14:20 +08:00
}
2017-09-01 05:43:22 +08:00
pub(crate) fn accepts(&self, ip_repr: &IpRepr) -> bool {
if ip_repr.version() != self.ip_version { return false }
if ip_repr.protocol() != self.ip_protocol { return false }
true
}
pub(crate) fn process(&mut self, ip_repr: &IpRepr, payload: &[u8],
checksum_caps: &ChecksumCapabilities) -> Result<()> {
2017-09-01 05:43:22 +08:00
debug_assert!(self.accepts(ip_repr));
2017-07-30 10:00:23 +08:00
let header_len = ip_repr.buffer_len();
let total_len = header_len + payload.len();
let packet_buf = self.rx_buffer.enqueue_one_with(|buf| buf.resize(total_len))?;
ip_repr.emit(&mut packet_buf.as_mut()[..header_len], &checksum_caps);
2017-07-30 10:00:23 +08:00
packet_buf.as_mut()[header_len..].copy_from_slice(payload);
net_trace!("{}:{}:{}: receiving {} octets",
self.handle, self.ip_version, self.ip_protocol,
2017-07-30 10:00:23 +08:00
packet_buf.size);
Ok(())
2017-06-18 18:14:20 +08:00
}
pub(crate) fn dispatch<F>(&mut self, emit: F, checksum_caps: &ChecksumCapabilities) ->
Result<()>
where F: FnOnce((IpRepr, &[u8])) -> Result<()> {
fn prepare<'a>(protocol: IpProtocol, buffer: &'a mut [u8],
checksum_caps: &ChecksumCapabilities) -> Result<(IpRepr, &'a [u8])> {
2017-07-30 10:00:23 +08:00
match IpVersion::of_packet(buffer.as_ref())? {
IpVersion::Ipv4 => {
let mut packet = Ipv4Packet::new_checked(buffer.as_mut())?;
if packet.protocol() != protocol { return Err(Error::Unaddressable) }
if checksum_caps.ipv4.tx() {
packet.fill_checksum();
} else {
// make sure we get a consistently zeroed checksum, since implementations might rely on it
packet.set_checksum(0);
}
2017-06-18 18:14:20 +08:00
2017-07-30 10:00:23 +08:00
let packet = Ipv4Packet::new(&*packet.into_inner());
let ipv4_repr = Ipv4Repr::parse(&packet, checksum_caps)?;
Ok((IpRepr::Ipv4(ipv4_repr), packet.payload()))
2017-07-30 10:00:23 +08:00
}
IpVersion::Unspecified => unreachable!(),
IpVersion::__Nonexhaustive => unreachable!()
}
}
2017-06-18 18:14:20 +08:00
let handle = self.handle;
let ip_protocol = self.ip_protocol;
let ip_version = self.ip_version;
self.tx_buffer.dequeue_one_with(|packet_buf| {
match prepare(ip_protocol, packet_buf.as_mut(), &checksum_caps) {
Ok((ip_repr, raw_packet)) => {
net_trace!("{}:{}:{}: sending {} octets",
handle, ip_version, ip_protocol,
ip_repr.buffer_len() + raw_packet.len());
emit((ip_repr, raw_packet))
}
Err(error) => {
net_debug!("{}:{}:{}: dropping outgoing packet ({})",
handle, ip_version, ip_protocol,
error);
// Return Ok(()) so the packet is dequeued.
Ok(())
}
2017-06-18 18:14:20 +08:00
}
})
}
pub(crate) fn poll_at(&self) -> Option<u64> {
if self.tx_buffer.is_empty() {
None
} else {
Some(0)
2017-06-18 18:14:20 +08:00
}
}
}
2017-07-30 10:00:23 +08:00
#[cfg(test)]
mod test {
2017-07-31 15:59:01 +08:00
use wire::{Ipv4Address, IpRepr, Ipv4Repr};
2017-07-30 10:00:23 +08:00
use super::*;
fn buffer(packets: usize) -> SocketBuffer<'static, 'static> {
let mut storage = vec![];
for _ in 0..packets {
storage.push(PacketBuffer::new(vec![0; 24]))
}
SocketBuffer::new(storage)
}
fn socket(rx_buffer: SocketBuffer<'static, 'static>,
tx_buffer: SocketBuffer<'static, 'static>)
-> RawSocket<'static, 'static> {
2017-09-01 05:43:22 +08:00
match RawSocket::new(IpVersion::Ipv4, IpProtocol::Unknown(IP_PROTO),
2017-07-30 10:00:23 +08:00
rx_buffer, tx_buffer) {
Socket::Raw(socket) => socket,
_ => unreachable!()
}
}
2017-09-01 05:43:22 +08:00
const IP_PROTO: u8 = 63;
2017-07-30 10:00:23 +08:00
const HEADER_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
src_addr: Ipv4Address([10, 0, 0, 1]),
dst_addr: Ipv4Address([10, 0, 0, 2]),
2017-09-01 05:43:22 +08:00
protocol: IpProtocol::Unknown(IP_PROTO),
payload_len: 4,
ttl: 64
2017-07-30 10:00:23 +08:00
});
const PACKET_BYTES: [u8; 24] = [
0x45, 0x00, 0x00, 0x18,
0x00, 0x00, 0x40, 0x00,
0x40, 0x3f, 0x00, 0x00,
0x0a, 0x00, 0x00, 0x01,
0x0a, 0x00, 0x00, 0x02,
0xaa, 0x00, 0x00, 0xff
];
const PACKET_PAYLOAD: [u8; 4] = [
0xaa, 0x00, 0x00, 0xff
];
#[test]
fn test_send_truncated() {
let mut socket = socket(buffer(0), buffer(1));
assert_eq!(socket.send_slice(&[0; 32][..]), Err(Error::Truncated));
}
#[test]
fn test_send_dispatch() {
let mut socket = socket(buffer(0), buffer(1));
assert!(socket.can_send());
assert_eq!(socket.dispatch(|_| unreachable!(), &ChecksumCapabilities::default()),
Err(Error::Exhausted));
2017-07-30 10:00:23 +08:00
assert_eq!(socket.send_slice(&PACKET_BYTES[..]), Ok(()));
assert_eq!(socket.send_slice(b""), Err(Error::Exhausted));
assert!(!socket.can_send());
assert_eq!(socket.dispatch(|(ip_repr, ip_payload)| {
assert_eq!(ip_repr, HEADER_REPR);
assert_eq!(ip_payload, &PACKET_PAYLOAD);
2017-07-30 10:00:23 +08:00
Err(Error::Unaddressable)
}, &ChecksumCapabilities::default()), Err(Error::Unaddressable));
assert!(!socket.can_send());
2017-07-30 10:00:23 +08:00
assert_eq!(socket.dispatch(|(ip_repr, ip_payload)| {
assert_eq!(ip_repr, HEADER_REPR);
assert_eq!(ip_payload, &PACKET_PAYLOAD);
2017-07-30 10:00:23 +08:00
Ok(())
}, &ChecksumCapabilities::default()), Ok(()));
2017-07-30 10:00:23 +08:00
assert!(socket.can_send());
}
#[test]
fn test_send_illegal() {
let mut socket = socket(buffer(0), buffer(1));
let mut wrong_version = PACKET_BYTES.clone();
Ipv4Packet::new(&mut wrong_version).set_version(5);
assert_eq!(socket.send_slice(&wrong_version[..]), Ok(()));
assert_eq!(socket.dispatch(|_| unreachable!(), &ChecksumCapabilities::default()),
Ok(()));
2017-07-30 10:00:23 +08:00
let mut wrong_protocol = PACKET_BYTES.clone();
Ipv4Packet::new(&mut wrong_protocol).set_protocol(IpProtocol::Tcp);
assert_eq!(socket.send_slice(&wrong_protocol[..]), Ok(()));
assert_eq!(socket.dispatch(|_| unreachable!(), &ChecksumCapabilities::default()),
Ok(()));
2017-07-30 10:00:23 +08:00
}
#[test]
fn test_recv_process() {
let mut socket = socket(buffer(1), buffer(0));
assert!(!socket.can_recv());
let mut cksumd_packet = PACKET_BYTES.clone();
Ipv4Packet::new(&mut cksumd_packet).fill_checksum();
assert_eq!(socket.recv(), Err(Error::Exhausted));
2017-09-01 05:43:22 +08:00
assert!(socket.accepts(&HEADER_REPR));
assert_eq!(socket.process(&HEADER_REPR, &PACKET_PAYLOAD, &ChecksumCapabilities::default()),
2017-07-30 10:00:23 +08:00
Ok(()));
assert!(socket.can_recv());
2017-09-01 05:43:22 +08:00
assert!(socket.accepts(&HEADER_REPR));
assert_eq!(socket.process(&HEADER_REPR, &PACKET_PAYLOAD, &ChecksumCapabilities::default()),
2017-07-30 10:00:23 +08:00
Err(Error::Exhausted));
assert_eq!(socket.recv(), Ok(&cksumd_packet[..]));
assert!(!socket.can_recv());
}
#[test]
fn test_recv_truncated_slice() {
let mut socket = socket(buffer(1), buffer(0));
2017-09-01 05:43:22 +08:00
assert!(socket.accepts(&HEADER_REPR));
assert_eq!(socket.process(&HEADER_REPR, &PACKET_PAYLOAD, &ChecksumCapabilities::default()),
2017-07-30 10:00:23 +08:00
Ok(()));
let mut slice = [0; 4];
assert_eq!(socket.recv_slice(&mut slice[..]), Ok(4));
assert_eq!(&slice, &PACKET_BYTES[..slice.len()]);
}
#[test]
fn test_recv_truncated_packet() {
let mut socket = socket(buffer(1), buffer(0));
let mut buffer = vec![0; 128];
buffer[..PACKET_BYTES.len()].copy_from_slice(&PACKET_BYTES[..]);
2017-09-01 05:43:22 +08:00
assert!(socket.accepts(&HEADER_REPR));
assert_eq!(socket.process(&HEADER_REPR, &buffer, &ChecksumCapabilities::default()),
2017-07-30 10:00:23 +08:00
Err(Error::Truncated));
}
2017-09-01 05:43:22 +08:00
#[test]
fn test_doesnt_accept_wrong_proto() {
let socket = match RawSocket::new(IpVersion::Ipv4,
IpProtocol::Unknown(IP_PROTO+1),
buffer(1), buffer(1)) {
Socket::Raw(socket) => socket,
_ => unreachable!()
};
assert!(!socket.accepts(&HEADER_REPR));
}
2017-07-30 10:00:23 +08:00
}