Remove reundant global tcpip.LinkEndpointID.
PiperOrigin-RevId: 267709597
This commit is contained in:
parent
9e1cbdf565
commit
fe1f521077
|
@ -44,14 +44,12 @@ type Endpoint struct {
|
|||
}
|
||||
|
||||
// New creates a new channel endpoint.
|
||||
func New(size int, mtu uint32, linkAddr tcpip.LinkAddress) (tcpip.LinkEndpointID, *Endpoint) {
|
||||
e := &Endpoint{
|
||||
func New(size int, mtu uint32, linkAddr tcpip.LinkAddress) *Endpoint {
|
||||
return &Endpoint{
|
||||
C: make(chan PacketInfo, size),
|
||||
mtu: mtu,
|
||||
linkAddr: linkAddr,
|
||||
}
|
||||
|
||||
return stack.RegisterLinkEndpoint(e), e
|
||||
}
|
||||
|
||||
// Drain removes all outbound packets from the channel and counts them.
|
||||
|
|
|
@ -165,7 +165,7 @@ type Options struct {
|
|||
//
|
||||
// Makes fd non-blocking, but does not take ownership of fd, which must remain
|
||||
// open for the lifetime of the returned endpoint.
|
||||
func New(opts *Options) (tcpip.LinkEndpointID, error) {
|
||||
func New(opts *Options) (stack.LinkEndpoint, error) {
|
||||
caps := stack.LinkEndpointCapabilities(0)
|
||||
if opts.RXChecksumOffload {
|
||||
caps |= stack.CapabilityRXChecksumOffload
|
||||
|
@ -190,7 +190,7 @@ func New(opts *Options) (tcpip.LinkEndpointID, error) {
|
|||
}
|
||||
|
||||
if len(opts.FDs) == 0 {
|
||||
return 0, fmt.Errorf("opts.FD is empty, at least one FD must be specified")
|
||||
return nil, fmt.Errorf("opts.FD is empty, at least one FD must be specified")
|
||||
}
|
||||
|
||||
e := &endpoint{
|
||||
|
@ -207,12 +207,12 @@ func New(opts *Options) (tcpip.LinkEndpointID, error) {
|
|||
for i := 0; i < len(e.fds); i++ {
|
||||
fd := e.fds[i]
|
||||
if err := syscall.SetNonblock(fd, true); err != nil {
|
||||
return 0, fmt.Errorf("syscall.SetNonblock(%v) failed: %v", fd, err)
|
||||
return nil, fmt.Errorf("syscall.SetNonblock(%v) failed: %v", fd, err)
|
||||
}
|
||||
|
||||
isSocket, err := isSocketFD(fd)
|
||||
if err != nil {
|
||||
return 0, err
|
||||
return nil, err
|
||||
}
|
||||
if isSocket {
|
||||
if opts.GSOMaxSize != 0 {
|
||||
|
@ -222,12 +222,12 @@ func New(opts *Options) (tcpip.LinkEndpointID, error) {
|
|||
}
|
||||
inboundDispatcher, err := createInboundDispatcher(e, fd, isSocket)
|
||||
if err != nil {
|
||||
return 0, fmt.Errorf("createInboundDispatcher(...) = %v", err)
|
||||
return nil, fmt.Errorf("createInboundDispatcher(...) = %v", err)
|
||||
}
|
||||
e.inboundDispatchers = append(e.inboundDispatchers, inboundDispatcher)
|
||||
}
|
||||
|
||||
return stack.RegisterLinkEndpoint(e), nil
|
||||
return e, nil
|
||||
}
|
||||
|
||||
func createInboundDispatcher(e *endpoint, fd int, isSocket bool) (linkDispatcher, error) {
|
||||
|
@ -435,14 +435,12 @@ func (e *InjectableEndpoint) Inject(protocol tcpip.NetworkProtocolNumber, vv buf
|
|||
}
|
||||
|
||||
// NewInjectable creates a new fd-based InjectableEndpoint.
|
||||
func NewInjectable(fd int, mtu uint32, capabilities stack.LinkEndpointCapabilities) (tcpip.LinkEndpointID, *InjectableEndpoint) {
|
||||
func NewInjectable(fd int, mtu uint32, capabilities stack.LinkEndpointCapabilities) *InjectableEndpoint {
|
||||
syscall.SetNonblock(fd, true)
|
||||
|
||||
e := &InjectableEndpoint{endpoint: endpoint{
|
||||
return &InjectableEndpoint{endpoint: endpoint{
|
||||
fds: []int{fd},
|
||||
mtu: mtu,
|
||||
caps: capabilities,
|
||||
}}
|
||||
|
||||
return stack.RegisterLinkEndpoint(e), e
|
||||
}
|
||||
|
|
|
@ -68,11 +68,10 @@ func newContext(t *testing.T, opt *Options) *context {
|
|||
}
|
||||
|
||||
opt.FDs = []int{fds[1]}
|
||||
epID, err := New(opt)
|
||||
ep, err := New(opt)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to create FD endpoint: %v", err)
|
||||
}
|
||||
ep := stack.FindLinkEndpoint(epID).(*endpoint)
|
||||
|
||||
c := &context{
|
||||
t: t,
|
||||
|
|
|
@ -32,8 +32,8 @@ type endpoint struct {
|
|||
|
||||
// New creates a new loopback endpoint. This link-layer endpoint just turns
|
||||
// outbound packets into inbound packets.
|
||||
func New() tcpip.LinkEndpointID {
|
||||
return stack.RegisterLinkEndpoint(&endpoint{})
|
||||
func New() stack.LinkEndpoint {
|
||||
return &endpoint{}
|
||||
}
|
||||
|
||||
// Attach implements stack.LinkEndpoint.Attach. It just saves the stack network-
|
||||
|
|
|
@ -105,9 +105,8 @@ func (m *InjectableEndpoint) WriteRawPacket(dest tcpip.Address, packet []byte) *
|
|||
}
|
||||
|
||||
// NewInjectableEndpoint creates a new multi-endpoint injectable endpoint.
|
||||
func NewInjectableEndpoint(routes map[tcpip.Address]stack.InjectableLinkEndpoint) (tcpip.LinkEndpointID, *InjectableEndpoint) {
|
||||
e := &InjectableEndpoint{
|
||||
func NewInjectableEndpoint(routes map[tcpip.Address]stack.InjectableLinkEndpoint) *InjectableEndpoint {
|
||||
return &InjectableEndpoint{
|
||||
routes: routes,
|
||||
}
|
||||
return stack.RegisterLinkEndpoint(e), e
|
||||
}
|
||||
|
|
|
@ -87,8 +87,8 @@ func makeTestInjectableEndpoint(t *testing.T) (*InjectableEndpoint, *os.File, tc
|
|||
if err != nil {
|
||||
t.Fatal("Failed to create socket pair:", err)
|
||||
}
|
||||
_, underlyingEndpoint := fdbased.NewInjectable(pair[1], 6500, stack.CapabilityNone)
|
||||
underlyingEndpoint := fdbased.NewInjectable(pair[1], 6500, stack.CapabilityNone)
|
||||
routes := map[tcpip.Address]stack.InjectableLinkEndpoint{dstIP: underlyingEndpoint}
|
||||
_, endpoint := NewInjectableEndpoint(routes)
|
||||
endpoint := NewInjectableEndpoint(routes)
|
||||
return endpoint, os.NewFile(uintptr(pair[0]), "test route end"), dstIP
|
||||
}
|
||||
|
|
|
@ -94,7 +94,7 @@ type endpoint struct {
|
|||
|
||||
// New creates a new shared-memory-based endpoint. Buffers will be broken up
|
||||
// into buffers of "bufferSize" bytes.
|
||||
func New(mtu, bufferSize uint32, addr tcpip.LinkAddress, tx, rx QueueConfig) (tcpip.LinkEndpointID, error) {
|
||||
func New(mtu, bufferSize uint32, addr tcpip.LinkAddress, tx, rx QueueConfig) (stack.LinkEndpoint, error) {
|
||||
e := &endpoint{
|
||||
mtu: mtu,
|
||||
bufferSize: bufferSize,
|
||||
|
@ -102,15 +102,15 @@ func New(mtu, bufferSize uint32, addr tcpip.LinkAddress, tx, rx QueueConfig) (tc
|
|||
}
|
||||
|
||||
if err := e.tx.init(bufferSize, &tx); err != nil {
|
||||
return 0, err
|
||||
return nil, err
|
||||
}
|
||||
|
||||
if err := e.rx.init(bufferSize, &rx); err != nil {
|
||||
e.tx.cleanup()
|
||||
return 0, err
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return stack.RegisterLinkEndpoint(e), nil
|
||||
return e, nil
|
||||
}
|
||||
|
||||
// Close frees all resources associated with the endpoint.
|
||||
|
|
|
@ -119,12 +119,12 @@ func newTestContext(t *testing.T, mtu, bufferSize uint32, addr tcpip.LinkAddress
|
|||
initQueue(t, &c.txq, &c.txCfg)
|
||||
initQueue(t, &c.rxq, &c.rxCfg)
|
||||
|
||||
id, err := New(mtu, bufferSize, addr, c.txCfg, c.rxCfg)
|
||||
ep, err := New(mtu, bufferSize, addr, c.txCfg, c.rxCfg)
|
||||
if err != nil {
|
||||
t.Fatalf("New failed: %v", err)
|
||||
}
|
||||
|
||||
c.ep = stack.FindLinkEndpoint(id).(*endpoint)
|
||||
c.ep = ep.(*endpoint)
|
||||
c.ep.Attach(c)
|
||||
|
||||
return c
|
||||
|
|
|
@ -58,10 +58,10 @@ type endpoint struct {
|
|||
|
||||
// New creates a new sniffer link-layer endpoint. It wraps around another
|
||||
// endpoint and logs packets and they traverse the endpoint.
|
||||
func New(lower tcpip.LinkEndpointID) tcpip.LinkEndpointID {
|
||||
return stack.RegisterLinkEndpoint(&endpoint{
|
||||
lower: stack.FindLinkEndpoint(lower),
|
||||
})
|
||||
func New(lower stack.LinkEndpoint) stack.LinkEndpoint {
|
||||
return &endpoint{
|
||||
lower: lower,
|
||||
}
|
||||
}
|
||||
|
||||
func zoneOffset() (int32, error) {
|
||||
|
@ -102,15 +102,15 @@ func writePCAPHeader(w io.Writer, maxLen uint32) error {
|
|||
// snapLen is the maximum amount of a packet to be saved. Packets with a length
|
||||
// less than or equal too snapLen will be saved in their entirety. Longer
|
||||
// packets will be truncated to snapLen.
|
||||
func NewWithFile(lower tcpip.LinkEndpointID, file *os.File, snapLen uint32) (tcpip.LinkEndpointID, error) {
|
||||
func NewWithFile(lower stack.LinkEndpoint, file *os.File, snapLen uint32) (stack.LinkEndpoint, error) {
|
||||
if err := writePCAPHeader(file, snapLen); err != nil {
|
||||
return 0, err
|
||||
return nil, err
|
||||
}
|
||||
return stack.RegisterLinkEndpoint(&endpoint{
|
||||
lower: stack.FindLinkEndpoint(lower),
|
||||
return &endpoint{
|
||||
lower: lower,
|
||||
file: file,
|
||||
maxPCAPLen: snapLen,
|
||||
}), nil
|
||||
}, nil
|
||||
}
|
||||
|
||||
// DeliverNetworkPacket implements the stack.NetworkDispatcher interface. It is
|
||||
|
|
|
@ -40,11 +40,10 @@ type Endpoint struct {
|
|||
// New creates a new waitable link-layer endpoint. It wraps around another
|
||||
// endpoint and allows the caller to block new write/dispatch calls and wait for
|
||||
// the inflight ones to finish before returning.
|
||||
func New(lower tcpip.LinkEndpointID) (tcpip.LinkEndpointID, *Endpoint) {
|
||||
e := &Endpoint{
|
||||
lower: stack.FindLinkEndpoint(lower),
|
||||
func New(lower stack.LinkEndpoint) *Endpoint {
|
||||
return &Endpoint{
|
||||
lower: lower,
|
||||
}
|
||||
return stack.RegisterLinkEndpoint(e), e
|
||||
}
|
||||
|
||||
// DeliverNetworkPacket implements stack.NetworkDispatcher.DeliverNetworkPacket.
|
||||
|
|
|
@ -72,7 +72,7 @@ func (e *countedEndpoint) WritePacket(r *stack.Route, _ *stack.GSO, hdr buffer.P
|
|||
|
||||
func TestWaitWrite(t *testing.T) {
|
||||
ep := &countedEndpoint{}
|
||||
_, wep := New(stack.RegisterLinkEndpoint(ep))
|
||||
wep := New(ep)
|
||||
|
||||
// Write and check that it goes through.
|
||||
wep.WritePacket(nil, nil /* gso */, buffer.Prependable{}, buffer.VectorisedView{}, 0)
|
||||
|
@ -97,7 +97,7 @@ func TestWaitWrite(t *testing.T) {
|
|||
|
||||
func TestWaitDispatch(t *testing.T) {
|
||||
ep := &countedEndpoint{}
|
||||
_, wep := New(stack.RegisterLinkEndpoint(ep))
|
||||
wep := New(ep)
|
||||
|
||||
// Check that attach happens.
|
||||
wep.Attach(ep)
|
||||
|
@ -139,7 +139,7 @@ func TestOtherMethods(t *testing.T) {
|
|||
hdrLen: hdrLen,
|
||||
linkAddr: linkAddr,
|
||||
}
|
||||
_, wep := New(stack.RegisterLinkEndpoint(ep))
|
||||
wep := New(ep)
|
||||
|
||||
if v := wep.MTU(); v != mtu {
|
||||
t.Fatalf("Unexpected mtu: got=%v, want=%v", v, mtu)
|
||||
|
|
|
@ -47,11 +47,13 @@ func newTestContext(t *testing.T) *testContext {
|
|||
s := stack.New([]string{ipv4.ProtocolName, arp.ProtocolName}, []string{icmp.ProtocolName4}, stack.Options{})
|
||||
|
||||
const defaultMTU = 65536
|
||||
id, linkEP := channel.New(256, defaultMTU, stackLinkAddr)
|
||||
ep := channel.New(256, defaultMTU, stackLinkAddr)
|
||||
wep := stack.LinkEndpoint(ep)
|
||||
|
||||
if testing.Verbose() {
|
||||
id = sniffer.New(id)
|
||||
wep = sniffer.New(ep)
|
||||
}
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, wep); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
|
||||
|
@ -73,7 +75,7 @@ func newTestContext(t *testing.T) *testContext {
|
|||
return &testContext{
|
||||
t: t,
|
||||
s: s,
|
||||
linkEP: linkEP,
|
||||
linkEP: ep,
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -36,11 +36,11 @@ func TestExcludeBroadcast(t *testing.T) {
|
|||
s := stack.New([]string{ipv4.ProtocolName}, []string{udp.ProtocolName}, stack.Options{})
|
||||
|
||||
const defaultMTU = 65536
|
||||
id, _ := channel.New(256, defaultMTU, "")
|
||||
ep := stack.LinkEndpoint(channel.New(256, defaultMTU, ""))
|
||||
if testing.Verbose() {
|
||||
id = sniffer.New(id)
|
||||
ep = sniffer.New(ep)
|
||||
}
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
|
||||
|
@ -184,15 +184,12 @@ type errorChannel struct {
|
|||
// newErrorChannel creates a new errorChannel endpoint. Each call to WritePacket
|
||||
// will return successive errors from packetCollectorErrors until the list is
|
||||
// empty and then return nil each time.
|
||||
func newErrorChannel(size int, mtu uint32, linkAddr tcpip.LinkAddress, packetCollectorErrors []*tcpip.Error) (tcpip.LinkEndpointID, *errorChannel) {
|
||||
_, e := channel.New(size, mtu, linkAddr)
|
||||
ec := errorChannel{
|
||||
Endpoint: e,
|
||||
func newErrorChannel(size int, mtu uint32, linkAddr tcpip.LinkAddress, packetCollectorErrors []*tcpip.Error) *errorChannel {
|
||||
return &errorChannel{
|
||||
Endpoint: channel.New(size, mtu, linkAddr),
|
||||
Ch: make(chan packetInfo, size),
|
||||
packetCollectorErrors: packetCollectorErrors,
|
||||
}
|
||||
|
||||
return stack.RegisterLinkEndpoint(e), &ec
|
||||
}
|
||||
|
||||
// packetInfo holds all the information about an outbound packet.
|
||||
|
@ -242,9 +239,8 @@ type context struct {
|
|||
func buildContext(t *testing.T, packetCollectorErrors []*tcpip.Error, mtu uint32) context {
|
||||
// Make the packet and write it.
|
||||
s := stack.New([]string{ipv4.ProtocolName}, []string{}, stack.Options{})
|
||||
_, linkEP := newErrorChannel(100 /* Enough for all tests. */, mtu, "", packetCollectorErrors)
|
||||
linkEPId := stack.RegisterLinkEndpoint(linkEP)
|
||||
s.CreateNIC(1, linkEPId)
|
||||
ep := newErrorChannel(100 /* Enough for all tests. */, mtu, "", packetCollectorErrors)
|
||||
s.CreateNIC(1, ep)
|
||||
const (
|
||||
src = "\x10\x00\x00\x01"
|
||||
dst = "\x10\x00\x00\x02"
|
||||
|
@ -266,7 +262,7 @@ func buildContext(t *testing.T, packetCollectorErrors []*tcpip.Error, mtu uint32
|
|||
}
|
||||
return context{
|
||||
Route: r,
|
||||
linkEP: linkEP,
|
||||
linkEP: ep,
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -83,8 +83,7 @@ func (*stubLinkAddressCache) AddLinkAddress(tcpip.NICID, tcpip.Address, tcpip.Li
|
|||
func TestICMPCounts(t *testing.T) {
|
||||
s := stack.New([]string{ProtocolName}, []string{icmp.ProtocolName6}, stack.Options{})
|
||||
{
|
||||
id := stack.RegisterLinkEndpoint(&stubLinkEndpoint{})
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, &stubLinkEndpoint{}); err != nil {
|
||||
t.Fatalf("CreateNIC(_) = %s", err)
|
||||
}
|
||||
if err := s.AddAddress(1, ProtocolNumber, lladdr0); err != nil {
|
||||
|
@ -211,14 +210,13 @@ func newTestContext(t *testing.T) *testContext {
|
|||
}
|
||||
|
||||
const defaultMTU = 65536
|
||||
_, linkEP0 := channel.New(256, defaultMTU, linkAddr0)
|
||||
c.linkEP0 = linkEP0
|
||||
wrappedEP0 := endpointWithResolutionCapability{LinkEndpoint: linkEP0}
|
||||
id0 := stack.RegisterLinkEndpoint(wrappedEP0)
|
||||
c.linkEP0 = channel.New(256, defaultMTU, linkAddr0)
|
||||
|
||||
wrappedEP0 := stack.LinkEndpoint(endpointWithResolutionCapability{LinkEndpoint: c.linkEP0})
|
||||
if testing.Verbose() {
|
||||
id0 = sniffer.New(id0)
|
||||
wrappedEP0 = sniffer.New(wrappedEP0)
|
||||
}
|
||||
if err := c.s0.CreateNIC(1, id0); err != nil {
|
||||
if err := c.s0.CreateNIC(1, wrappedEP0); err != nil {
|
||||
t.Fatalf("CreateNIC s0: %v", err)
|
||||
}
|
||||
if err := c.s0.AddAddress(1, ProtocolNumber, lladdr0); err != nil {
|
||||
|
@ -228,11 +226,9 @@ func newTestContext(t *testing.T) *testContext {
|
|||
t.Fatalf("AddAddress sn lladdr0: %v", err)
|
||||
}
|
||||
|
||||
_, linkEP1 := channel.New(256, defaultMTU, linkAddr1)
|
||||
c.linkEP1 = linkEP1
|
||||
wrappedEP1 := endpointWithResolutionCapability{LinkEndpoint: linkEP1}
|
||||
id1 := stack.RegisterLinkEndpoint(wrappedEP1)
|
||||
if err := c.s1.CreateNIC(1, id1); err != nil {
|
||||
c.linkEP1 = channel.New(256, defaultMTU, linkAddr1)
|
||||
wrappedEP1 := stack.LinkEndpoint(endpointWithResolutionCapability{LinkEndpoint: c.linkEP1})
|
||||
if err := c.s1.CreateNIC(1, wrappedEP1); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
if err := c.s1.AddAddress(1, ProtocolNumber, lladdr1); err != nil {
|
||||
|
|
|
@ -32,15 +32,14 @@ func setupStackAndEndpoint(t *testing.T, llladdr, rlladdr tcpip.Address) (*stack
|
|||
t.Helper()
|
||||
|
||||
s := stack.New([]string{ProtocolName}, []string{icmp.ProtocolName6}, stack.Options{})
|
||||
{
|
||||
id := stack.RegisterLinkEndpoint(&stubLinkEndpoint{})
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
t.Fatalf("CreateNIC(_) = %s", err)
|
||||
}
|
||||
if err := s.AddAddress(1, ProtocolNumber, llladdr); err != nil {
|
||||
t.Fatalf("AddAddress(_, %d, %s) = %s", ProtocolNumber, llladdr, err)
|
||||
}
|
||||
|
||||
if err := s.CreateNIC(1, &stubLinkEndpoint{}); err != nil {
|
||||
t.Fatalf("CreateNIC(_) = %s", err)
|
||||
}
|
||||
if err := s.AddAddress(1, ProtocolNumber, llladdr); err != nil {
|
||||
t.Fatalf("AddAddress(_, %d, %s) = %s", ProtocolNumber, llladdr, err)
|
||||
}
|
||||
|
||||
{
|
||||
subnet, err := tcpip.NewSubnet(rlladdr, tcpip.AddressMask(strings.Repeat("\xff", len(rlladdr))))
|
||||
if err != nil {
|
||||
|
|
|
@ -15,8 +15,6 @@
|
|||
package stack
|
||||
|
||||
import (
|
||||
"sync"
|
||||
|
||||
"gvisor.dev/gvisor/pkg/sleep"
|
||||
"gvisor.dev/gvisor/pkg/tcpip"
|
||||
"gvisor.dev/gvisor/pkg/tcpip/buffer"
|
||||
|
@ -379,10 +377,6 @@ var (
|
|||
networkProtocols = make(map[string]NetworkProtocolFactory)
|
||||
|
||||
unassociatedFactory UnassociatedEndpointFactory
|
||||
|
||||
linkEPMu sync.RWMutex
|
||||
nextLinkEndpointID tcpip.LinkEndpointID = 1
|
||||
linkEndpoints = make(map[tcpip.LinkEndpointID]LinkEndpoint)
|
||||
)
|
||||
|
||||
// RegisterTransportProtocolFactory registers a new transport protocol factory
|
||||
|
@ -406,28 +400,6 @@ func RegisterUnassociatedFactory(f UnassociatedEndpointFactory) {
|
|||
unassociatedFactory = f
|
||||
}
|
||||
|
||||
// RegisterLinkEndpoint register a link-layer protocol endpoint and returns an
|
||||
// ID that can be used to refer to it.
|
||||
func RegisterLinkEndpoint(linkEP LinkEndpoint) tcpip.LinkEndpointID {
|
||||
linkEPMu.Lock()
|
||||
defer linkEPMu.Unlock()
|
||||
|
||||
v := nextLinkEndpointID
|
||||
nextLinkEndpointID++
|
||||
|
||||
linkEndpoints[v] = linkEP
|
||||
|
||||
return v
|
||||
}
|
||||
|
||||
// FindLinkEndpoint finds the link endpoint associated with the given ID.
|
||||
func FindLinkEndpoint(id tcpip.LinkEndpointID) LinkEndpoint {
|
||||
linkEPMu.RLock()
|
||||
defer linkEPMu.RUnlock()
|
||||
|
||||
return linkEndpoints[id]
|
||||
}
|
||||
|
||||
// GSOType is the type of GSO segments.
|
||||
//
|
||||
// +stateify savable
|
||||
|
|
|
@ -620,12 +620,7 @@ func (s *Stack) NewRawEndpoint(transport tcpip.TransportProtocolNumber, network
|
|||
|
||||
// createNIC creates a NIC with the provided id and link-layer endpoint, and
|
||||
// optionally enable it.
|
||||
func (s *Stack) createNIC(id tcpip.NICID, name string, linkEP tcpip.LinkEndpointID, enabled, loopback bool) *tcpip.Error {
|
||||
ep := FindLinkEndpoint(linkEP)
|
||||
if ep == nil {
|
||||
return tcpip.ErrBadLinkEndpoint
|
||||
}
|
||||
|
||||
func (s *Stack) createNIC(id tcpip.NICID, name string, ep LinkEndpoint, enabled, loopback bool) *tcpip.Error {
|
||||
s.mu.Lock()
|
||||
defer s.mu.Unlock()
|
||||
|
||||
|
@ -645,33 +640,33 @@ func (s *Stack) createNIC(id tcpip.NICID, name string, linkEP tcpip.LinkEndpoint
|
|||
}
|
||||
|
||||
// CreateNIC creates a NIC with the provided id and link-layer endpoint.
|
||||
func (s *Stack) CreateNIC(id tcpip.NICID, linkEP tcpip.LinkEndpointID) *tcpip.Error {
|
||||
return s.createNIC(id, "", linkEP, true, false)
|
||||
func (s *Stack) CreateNIC(id tcpip.NICID, ep LinkEndpoint) *tcpip.Error {
|
||||
return s.createNIC(id, "", ep, true, false)
|
||||
}
|
||||
|
||||
// CreateNamedNIC creates a NIC with the provided id and link-layer endpoint,
|
||||
// and a human-readable name.
|
||||
func (s *Stack) CreateNamedNIC(id tcpip.NICID, name string, linkEP tcpip.LinkEndpointID) *tcpip.Error {
|
||||
return s.createNIC(id, name, linkEP, true, false)
|
||||
func (s *Stack) CreateNamedNIC(id tcpip.NICID, name string, ep LinkEndpoint) *tcpip.Error {
|
||||
return s.createNIC(id, name, ep, true, false)
|
||||
}
|
||||
|
||||
// CreateNamedLoopbackNIC creates a NIC with the provided id and link-layer
|
||||
// endpoint, and a human-readable name.
|
||||
func (s *Stack) CreateNamedLoopbackNIC(id tcpip.NICID, name string, linkEP tcpip.LinkEndpointID) *tcpip.Error {
|
||||
return s.createNIC(id, name, linkEP, true, true)
|
||||
func (s *Stack) CreateNamedLoopbackNIC(id tcpip.NICID, name string, ep LinkEndpoint) *tcpip.Error {
|
||||
return s.createNIC(id, name, ep, true, true)
|
||||
}
|
||||
|
||||
// CreateDisabledNIC creates a NIC with the provided id and link-layer endpoint,
|
||||
// but leave it disable. Stack.EnableNIC must be called before the link-layer
|
||||
// endpoint starts delivering packets to it.
|
||||
func (s *Stack) CreateDisabledNIC(id tcpip.NICID, linkEP tcpip.LinkEndpointID) *tcpip.Error {
|
||||
return s.createNIC(id, "", linkEP, false, false)
|
||||
func (s *Stack) CreateDisabledNIC(id tcpip.NICID, ep LinkEndpoint) *tcpip.Error {
|
||||
return s.createNIC(id, "", ep, false, false)
|
||||
}
|
||||
|
||||
// CreateDisabledNamedNIC is a combination of CreateNamedNIC and
|
||||
// CreateDisabledNIC.
|
||||
func (s *Stack) CreateDisabledNamedNIC(id tcpip.NICID, name string, linkEP tcpip.LinkEndpointID) *tcpip.Error {
|
||||
return s.createNIC(id, name, linkEP, false, false)
|
||||
func (s *Stack) CreateDisabledNamedNIC(id tcpip.NICID, name string, ep LinkEndpoint) *tcpip.Error {
|
||||
return s.createNIC(id, name, ep, false, false)
|
||||
}
|
||||
|
||||
// EnableNIC enables the given NIC so that the link-layer endpoint can start
|
||||
|
|
|
@ -60,11 +60,11 @@ type fakeNetworkEndpoint struct {
|
|||
prefixLen int
|
||||
proto *fakeNetworkProtocol
|
||||
dispatcher stack.TransportDispatcher
|
||||
linkEP stack.LinkEndpoint
|
||||
ep stack.LinkEndpoint
|
||||
}
|
||||
|
||||
func (f *fakeNetworkEndpoint) MTU() uint32 {
|
||||
return f.linkEP.MTU() - uint32(f.MaxHeaderLength())
|
||||
return f.ep.MTU() - uint32(f.MaxHeaderLength())
|
||||
}
|
||||
|
||||
func (f *fakeNetworkEndpoint) NICID() tcpip.NICID {
|
||||
|
@ -108,7 +108,7 @@ func (f *fakeNetworkEndpoint) HandlePacket(r *stack.Route, vv buffer.VectorisedV
|
|||
}
|
||||
|
||||
func (f *fakeNetworkEndpoint) MaxHeaderLength() uint16 {
|
||||
return f.linkEP.MaxHeaderLength() + fakeNetHeaderLen
|
||||
return f.ep.MaxHeaderLength() + fakeNetHeaderLen
|
||||
}
|
||||
|
||||
func (f *fakeNetworkEndpoint) PseudoHeaderChecksum(protocol tcpip.TransportProtocolNumber, dstAddr tcpip.Address) uint16 {
|
||||
|
@ -116,7 +116,7 @@ func (f *fakeNetworkEndpoint) PseudoHeaderChecksum(protocol tcpip.TransportProto
|
|||
}
|
||||
|
||||
func (f *fakeNetworkEndpoint) Capabilities() stack.LinkEndpointCapabilities {
|
||||
return f.linkEP.Capabilities()
|
||||
return f.ep.Capabilities()
|
||||
}
|
||||
|
||||
func (f *fakeNetworkEndpoint) WritePacket(r *stack.Route, gso *stack.GSO, hdr buffer.Prependable, payload buffer.VectorisedView, protocol tcpip.TransportProtocolNumber, _ uint8, loop stack.PacketLooping) *tcpip.Error {
|
||||
|
@ -141,7 +141,7 @@ func (f *fakeNetworkEndpoint) WritePacket(r *stack.Route, gso *stack.GSO, hdr bu
|
|||
return nil
|
||||
}
|
||||
|
||||
return f.linkEP.WritePacket(r, gso, hdr, payload, fakeNetNumber)
|
||||
return f.ep.WritePacket(r, gso, hdr, payload, fakeNetNumber)
|
||||
}
|
||||
|
||||
func (*fakeNetworkEndpoint) WriteHeaderIncludedPacket(r *stack.Route, payload buffer.VectorisedView, loop stack.PacketLooping) *tcpip.Error {
|
||||
|
@ -189,14 +189,14 @@ func (*fakeNetworkProtocol) ParseAddresses(v buffer.View) (src, dst tcpip.Addres
|
|||
return tcpip.Address(v[1:2]), tcpip.Address(v[0:1])
|
||||
}
|
||||
|
||||
func (f *fakeNetworkProtocol) NewEndpoint(nicid tcpip.NICID, addrWithPrefix tcpip.AddressWithPrefix, linkAddrCache stack.LinkAddressCache, dispatcher stack.TransportDispatcher, linkEP stack.LinkEndpoint) (stack.NetworkEndpoint, *tcpip.Error) {
|
||||
func (f *fakeNetworkProtocol) NewEndpoint(nicid tcpip.NICID, addrWithPrefix tcpip.AddressWithPrefix, linkAddrCache stack.LinkAddressCache, dispatcher stack.TransportDispatcher, ep stack.LinkEndpoint) (stack.NetworkEndpoint, *tcpip.Error) {
|
||||
return &fakeNetworkEndpoint{
|
||||
nicid: nicid,
|
||||
id: stack.NetworkEndpointID{LocalAddress: addrWithPrefix.Address},
|
||||
prefixLen: addrWithPrefix.PrefixLen,
|
||||
proto: f,
|
||||
dispatcher: dispatcher,
|
||||
linkEP: linkEP,
|
||||
ep: ep,
|
||||
}, nil
|
||||
}
|
||||
|
||||
|
@ -225,9 +225,9 @@ func (f *fakeNetworkProtocol) Option(option interface{}) *tcpip.Error {
|
|||
func TestNetworkReceive(t *testing.T) {
|
||||
// Create a stack with the fake network protocol, one nic, and two
|
||||
// addresses attached to it: 1 & 2.
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -245,7 +245,7 @@ func TestNetworkReceive(t *testing.T) {
|
|||
|
||||
// Make sure packet with wrong address is not delivered.
|
||||
buf[0] = 3
|
||||
linkEP.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
ep.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
if fakeNet.packetCount[1] != 0 {
|
||||
t.Errorf("packetCount[1] = %d, want %d", fakeNet.packetCount[1], 0)
|
||||
}
|
||||
|
@ -255,7 +255,7 @@ func TestNetworkReceive(t *testing.T) {
|
|||
|
||||
// Make sure packet is delivered to first endpoint.
|
||||
buf[0] = 1
|
||||
linkEP.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
ep.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
if fakeNet.packetCount[1] != 1 {
|
||||
t.Errorf("packetCount[1] = %d, want %d", fakeNet.packetCount[1], 1)
|
||||
}
|
||||
|
@ -265,7 +265,7 @@ func TestNetworkReceive(t *testing.T) {
|
|||
|
||||
// Make sure packet is delivered to second endpoint.
|
||||
buf[0] = 2
|
||||
linkEP.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
ep.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
if fakeNet.packetCount[1] != 1 {
|
||||
t.Errorf("packetCount[1] = %d, want %d", fakeNet.packetCount[1], 1)
|
||||
}
|
||||
|
@ -274,7 +274,7 @@ func TestNetworkReceive(t *testing.T) {
|
|||
}
|
||||
|
||||
// Make sure packet is not delivered if protocol number is wrong.
|
||||
linkEP.Inject(fakeNetNumber-1, buf.ToVectorisedView())
|
||||
ep.Inject(fakeNetNumber-1, buf.ToVectorisedView())
|
||||
if fakeNet.packetCount[1] != 1 {
|
||||
t.Errorf("packetCount[1] = %d, want %d", fakeNet.packetCount[1], 1)
|
||||
}
|
||||
|
@ -284,7 +284,7 @@ func TestNetworkReceive(t *testing.T) {
|
|||
|
||||
// Make sure packet that is too small is dropped.
|
||||
buf.CapLength(2)
|
||||
linkEP.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
ep.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
if fakeNet.packetCount[1] != 1 {
|
||||
t.Errorf("packetCount[1] = %d, want %d", fakeNet.packetCount[1], 1)
|
||||
}
|
||||
|
@ -307,59 +307,59 @@ func send(r stack.Route, payload buffer.View) *tcpip.Error {
|
|||
return r.WritePacket(nil /* gso */, hdr, payload.ToVectorisedView(), fakeTransNumber, 123)
|
||||
}
|
||||
|
||||
func testSendTo(t *testing.T, s *stack.Stack, addr tcpip.Address, linkEP *channel.Endpoint, payload buffer.View) {
|
||||
func testSendTo(t *testing.T, s *stack.Stack, addr tcpip.Address, ep *channel.Endpoint, payload buffer.View) {
|
||||
t.Helper()
|
||||
linkEP.Drain()
|
||||
ep.Drain()
|
||||
if err := sendTo(s, addr, payload); err != nil {
|
||||
t.Error("sendTo failed:", err)
|
||||
}
|
||||
if got, want := linkEP.Drain(), 1; got != want {
|
||||
if got, want := ep.Drain(), 1; got != want {
|
||||
t.Errorf("sendTo packet count: got = %d, want %d", got, want)
|
||||
}
|
||||
}
|
||||
|
||||
func testSend(t *testing.T, r stack.Route, linkEP *channel.Endpoint, payload buffer.View) {
|
||||
func testSend(t *testing.T, r stack.Route, ep *channel.Endpoint, payload buffer.View) {
|
||||
t.Helper()
|
||||
linkEP.Drain()
|
||||
ep.Drain()
|
||||
if err := send(r, payload); err != nil {
|
||||
t.Error("send failed:", err)
|
||||
}
|
||||
if got, want := linkEP.Drain(), 1; got != want {
|
||||
if got, want := ep.Drain(), 1; got != want {
|
||||
t.Errorf("send packet count: got = %d, want %d", got, want)
|
||||
}
|
||||
}
|
||||
|
||||
func testFailingSend(t *testing.T, r stack.Route, linkEP *channel.Endpoint, payload buffer.View, wantErr *tcpip.Error) {
|
||||
func testFailingSend(t *testing.T, r stack.Route, ep *channel.Endpoint, payload buffer.View, wantErr *tcpip.Error) {
|
||||
t.Helper()
|
||||
if gotErr := send(r, payload); gotErr != wantErr {
|
||||
t.Errorf("send failed: got = %s, want = %s ", gotErr, wantErr)
|
||||
}
|
||||
}
|
||||
|
||||
func testFailingSendTo(t *testing.T, s *stack.Stack, addr tcpip.Address, linkEP *channel.Endpoint, payload buffer.View, wantErr *tcpip.Error) {
|
||||
func testFailingSendTo(t *testing.T, s *stack.Stack, addr tcpip.Address, ep *channel.Endpoint, payload buffer.View, wantErr *tcpip.Error) {
|
||||
t.Helper()
|
||||
if gotErr := sendTo(s, addr, payload); gotErr != wantErr {
|
||||
t.Errorf("sendto failed: got = %s, want = %s ", gotErr, wantErr)
|
||||
}
|
||||
}
|
||||
|
||||
func testRecv(t *testing.T, fakeNet *fakeNetworkProtocol, localAddrByte byte, linkEP *channel.Endpoint, buf buffer.View) {
|
||||
func testRecv(t *testing.T, fakeNet *fakeNetworkProtocol, localAddrByte byte, ep *channel.Endpoint, buf buffer.View) {
|
||||
t.Helper()
|
||||
// testRecvInternal injects one packet, and we expect to receive it.
|
||||
want := fakeNet.PacketCount(localAddrByte) + 1
|
||||
testRecvInternal(t, fakeNet, localAddrByte, linkEP, buf, want)
|
||||
testRecvInternal(t, fakeNet, localAddrByte, ep, buf, want)
|
||||
}
|
||||
|
||||
func testFailingRecv(t *testing.T, fakeNet *fakeNetworkProtocol, localAddrByte byte, linkEP *channel.Endpoint, buf buffer.View) {
|
||||
func testFailingRecv(t *testing.T, fakeNet *fakeNetworkProtocol, localAddrByte byte, ep *channel.Endpoint, buf buffer.View) {
|
||||
t.Helper()
|
||||
// testRecvInternal injects one packet, and we do NOT expect to receive it.
|
||||
want := fakeNet.PacketCount(localAddrByte)
|
||||
testRecvInternal(t, fakeNet, localAddrByte, linkEP, buf, want)
|
||||
testRecvInternal(t, fakeNet, localAddrByte, ep, buf, want)
|
||||
}
|
||||
|
||||
func testRecvInternal(t *testing.T, fakeNet *fakeNetworkProtocol, localAddrByte byte, linkEP *channel.Endpoint, buf buffer.View, want int) {
|
||||
func testRecvInternal(t *testing.T, fakeNet *fakeNetworkProtocol, localAddrByte byte, ep *channel.Endpoint, buf buffer.View, want int) {
|
||||
t.Helper()
|
||||
linkEP.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
ep.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
if got := fakeNet.PacketCount(localAddrByte); got != want {
|
||||
t.Errorf("receive packet count: got = %d, want %d", got, want)
|
||||
}
|
||||
|
@ -369,9 +369,9 @@ func TestNetworkSend(t *testing.T) {
|
|||
// Create a stack with the fake network protocol, one nic, and one
|
||||
// address: 1. The route table sends all packets through the only
|
||||
// existing nic.
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("NewNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -388,7 +388,7 @@ func TestNetworkSend(t *testing.T) {
|
|||
}
|
||||
|
||||
// Make sure that the link-layer endpoint received the outbound packet.
|
||||
testSendTo(t, s, "\x03", linkEP, nil)
|
||||
testSendTo(t, s, "\x03", ep, nil)
|
||||
}
|
||||
|
||||
func TestNetworkSendMultiRoute(t *testing.T) {
|
||||
|
@ -397,8 +397,8 @@ func TestNetworkSendMultiRoute(t *testing.T) {
|
|||
// even addresses.
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id1, linkEP1 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id1); err != nil {
|
||||
ep1 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep1); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -410,8 +410,8 @@ func TestNetworkSendMultiRoute(t *testing.T) {
|
|||
t.Fatal("AddAddress failed:", err)
|
||||
}
|
||||
|
||||
id2, linkEP2 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(2, id2); err != nil {
|
||||
ep2 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(2, ep2); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -442,10 +442,10 @@ func TestNetworkSendMultiRoute(t *testing.T) {
|
|||
}
|
||||
|
||||
// Send a packet to an odd destination.
|
||||
testSendTo(t, s, "\x05", linkEP1, nil)
|
||||
testSendTo(t, s, "\x05", ep1, nil)
|
||||
|
||||
// Send a packet to an even destination.
|
||||
testSendTo(t, s, "\x06", linkEP2, nil)
|
||||
testSendTo(t, s, "\x06", ep2, nil)
|
||||
}
|
||||
|
||||
func testRoute(t *testing.T, s *stack.Stack, nic tcpip.NICID, srcAddr, dstAddr, expectedSrcAddr tcpip.Address) {
|
||||
|
@ -478,8 +478,8 @@ func TestRoutes(t *testing.T) {
|
|||
// even addresses.
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id1, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id1); err != nil {
|
||||
ep1 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep1); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -491,8 +491,8 @@ func TestRoutes(t *testing.T) {
|
|||
t.Fatal("AddAddress failed:", err)
|
||||
}
|
||||
|
||||
id2, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(2, id2); err != nil {
|
||||
ep2 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(2, ep2); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -556,8 +556,8 @@ func TestAddressRemoval(t *testing.T) {
|
|||
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -578,15 +578,15 @@ func TestAddressRemoval(t *testing.T) {
|
|||
|
||||
// Send and receive packets, and verify they are received.
|
||||
buf[0] = localAddrByte
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testSendTo(t, s, remoteAddr, ep, nil)
|
||||
|
||||
// Remove the address, then check that send/receive doesn't work anymore.
|
||||
if err := s.RemoveAddress(1, localAddr); err != nil {
|
||||
t.Fatal("RemoveAddress failed:", err)
|
||||
}
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingSendTo(t, s, remoteAddr, linkEP, nil, tcpip.ErrNoRoute)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testFailingSendTo(t, s, remoteAddr, ep, nil, tcpip.ErrNoRoute)
|
||||
|
||||
// Check that removing the same address fails.
|
||||
if err := s.RemoveAddress(1, localAddr); err != tcpip.ErrBadLocalAddress {
|
||||
|
@ -601,9 +601,9 @@ func TestAddressRemovalWithRouteHeld(t *testing.T) {
|
|||
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
fakeNet := s.NetworkProtocolInstance(fakeNetNumber).(*fakeNetworkProtocol)
|
||||
buf := buffer.NewView(30)
|
||||
|
@ -626,17 +626,17 @@ func TestAddressRemovalWithRouteHeld(t *testing.T) {
|
|||
|
||||
// Send and receive packets, and verify they are received.
|
||||
buf[0] = localAddrByte
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testSend(t, r, linkEP, nil)
|
||||
testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testSend(t, r, ep, nil)
|
||||
testSendTo(t, s, remoteAddr, ep, nil)
|
||||
|
||||
// Remove the address, then check that send/receive doesn't work anymore.
|
||||
if err := s.RemoveAddress(1, localAddr); err != nil {
|
||||
t.Fatal("RemoveAddress failed:", err)
|
||||
}
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingSend(t, r, linkEP, nil, tcpip.ErrInvalidEndpointState)
|
||||
testFailingSendTo(t, s, remoteAddr, linkEP, nil, tcpip.ErrNoRoute)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testFailingSend(t, r, ep, nil, tcpip.ErrInvalidEndpointState)
|
||||
testFailingSendTo(t, s, remoteAddr, ep, nil, tcpip.ErrNoRoute)
|
||||
|
||||
// Check that removing the same address fails.
|
||||
if err := s.RemoveAddress(1, localAddr); err != tcpip.ErrBadLocalAddress {
|
||||
|
@ -690,8 +690,8 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
t.Run(fmt.Sprintf("promiscuous=%t spoofing=%t", promiscuous, spoofing), func(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -724,15 +724,15 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
//-----------------------
|
||||
verifyAddress(t, s, nicid, noAddr)
|
||||
if promiscuous {
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
} else {
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
}
|
||||
if spoofing {
|
||||
// FIXME(b/139841518):Spoofing doesn't work if there is no primary address.
|
||||
// testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
// testSendTo(t, s, remoteAddr, ep, nil)
|
||||
} else {
|
||||
testFailingSendTo(t, s, remoteAddr, linkEP, nil, tcpip.ErrNoRoute)
|
||||
testFailingSendTo(t, s, remoteAddr, ep, nil, tcpip.ErrNoRoute)
|
||||
}
|
||||
|
||||
// 2. Add Address, everything should work.
|
||||
|
@ -741,8 +741,8 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
t.Fatal("AddAddress failed:", err)
|
||||
}
|
||||
verifyAddress(t, s, nicid, localAddr)
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testSendTo(t, s, remoteAddr, ep, nil)
|
||||
|
||||
// 3. Remove the address, send should only work for spoofing, receive
|
||||
// for promiscuous mode.
|
||||
|
@ -752,15 +752,15 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
}
|
||||
verifyAddress(t, s, nicid, noAddr)
|
||||
if promiscuous {
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
} else {
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
}
|
||||
if spoofing {
|
||||
// FIXME(b/139841518):Spoofing doesn't work if there is no primary address.
|
||||
// testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
// testSendTo(t, s, remoteAddr, ep, nil)
|
||||
} else {
|
||||
testFailingSendTo(t, s, remoteAddr, linkEP, nil, tcpip.ErrNoRoute)
|
||||
testFailingSendTo(t, s, remoteAddr, ep, nil, tcpip.ErrNoRoute)
|
||||
}
|
||||
|
||||
// 4. Add Address back, everything should work again.
|
||||
|
@ -769,8 +769,8 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
t.Fatal("AddAddress failed:", err)
|
||||
}
|
||||
verifyAddress(t, s, nicid, localAddr)
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testSendTo(t, s, remoteAddr, ep, nil)
|
||||
|
||||
// 5. Take a reference to the endpoint by getting a route. Verify that
|
||||
// we can still send/receive, including sending using the route.
|
||||
|
@ -779,9 +779,9 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
if err != nil {
|
||||
t.Fatal("FindRoute failed:", err)
|
||||
}
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
testSend(t, r, linkEP, nil)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testSendTo(t, s, remoteAddr, ep, nil)
|
||||
testSend(t, r, ep, nil)
|
||||
|
||||
// 6. Remove the address. Send should only work for spoofing, receive
|
||||
// for promiscuous mode.
|
||||
|
@ -791,16 +791,16 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
}
|
||||
verifyAddress(t, s, nicid, noAddr)
|
||||
if promiscuous {
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
} else {
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
}
|
||||
if spoofing {
|
||||
testSend(t, r, linkEP, nil)
|
||||
testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
testSend(t, r, ep, nil)
|
||||
testSendTo(t, s, remoteAddr, ep, nil)
|
||||
} else {
|
||||
testFailingSend(t, r, linkEP, nil, tcpip.ErrInvalidEndpointState)
|
||||
testFailingSendTo(t, s, remoteAddr, linkEP, nil, tcpip.ErrNoRoute)
|
||||
testFailingSend(t, r, ep, nil, tcpip.ErrInvalidEndpointState)
|
||||
testFailingSendTo(t, s, remoteAddr, ep, nil, tcpip.ErrNoRoute)
|
||||
}
|
||||
|
||||
// 7. Add Address back, everything should work again.
|
||||
|
@ -809,16 +809,16 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
t.Fatal("AddAddress failed:", err)
|
||||
}
|
||||
verifyAddress(t, s, nicid, localAddr)
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
testSend(t, r, linkEP, nil)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testSendTo(t, s, remoteAddr, ep, nil)
|
||||
testSend(t, r, ep, nil)
|
||||
|
||||
// 8. Remove the route, sendTo/recv should still work.
|
||||
//-----------------------
|
||||
r.Release()
|
||||
verifyAddress(t, s, nicid, localAddr)
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
testSendTo(t, s, remoteAddr, ep, nil)
|
||||
|
||||
// 9. Remove the address. Send should only work for spoofing, receive
|
||||
// for promiscuous mode.
|
||||
|
@ -828,15 +828,15 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
}
|
||||
verifyAddress(t, s, nicid, noAddr)
|
||||
if promiscuous {
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
} else {
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
}
|
||||
if spoofing {
|
||||
// FIXME(b/139841518):Spoofing doesn't work if there is no primary address.
|
||||
// testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
// testSendTo(t, s, remoteAddr, ep, nil)
|
||||
} else {
|
||||
testFailingSendTo(t, s, remoteAddr, linkEP, nil, tcpip.ErrNoRoute)
|
||||
testFailingSendTo(t, s, remoteAddr, ep, nil, tcpip.ErrNoRoute)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
@ -846,8 +846,8 @@ func TestEndpointExpiration(t *testing.T) {
|
|||
func TestPromiscuousMode(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -867,13 +867,13 @@ func TestPromiscuousMode(t *testing.T) {
|
|||
// have a matching endpoint.
|
||||
const localAddrByte byte = 0x01
|
||||
buf[0] = localAddrByte
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
|
||||
// Set promiscuous mode, then check that packet is delivered.
|
||||
if err := s.SetPromiscuousMode(1, true); err != nil {
|
||||
t.Fatal("SetPromiscuousMode failed:", err)
|
||||
}
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
|
||||
// Check that we can't get a route as there is no local address.
|
||||
_, err := s.FindRoute(0, "", "\x02", fakeNetNumber, false /* multicastLoop */)
|
||||
|
@ -886,7 +886,7 @@ func TestPromiscuousMode(t *testing.T) {
|
|||
if err := s.SetPromiscuousMode(1, false); err != nil {
|
||||
t.Fatal("SetPromiscuousMode failed:", err)
|
||||
}
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
}
|
||||
|
||||
func TestSpoofingWithAddress(t *testing.T) {
|
||||
|
@ -896,8 +896,8 @@ func TestSpoofingWithAddress(t *testing.T) {
|
|||
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -936,8 +936,8 @@ func TestSpoofingWithAddress(t *testing.T) {
|
|||
t.Errorf("Route has wrong remote address: got %v, wanted %v", r.RemoteAddress, dstAddr)
|
||||
}
|
||||
// Sending a packet works.
|
||||
testSendTo(t, s, dstAddr, linkEP, nil)
|
||||
testSend(t, r, linkEP, nil)
|
||||
testSendTo(t, s, dstAddr, ep, nil)
|
||||
testSend(t, r, ep, nil)
|
||||
|
||||
// FindRoute should also work with a local address that exists on the NIC.
|
||||
r, err = s.FindRoute(0, localAddr, dstAddr, fakeNetNumber, false /* multicastLoop */)
|
||||
|
@ -951,7 +951,7 @@ func TestSpoofingWithAddress(t *testing.T) {
|
|||
t.Errorf("Route has wrong remote address: got %v, wanted %v", r.RemoteAddress, dstAddr)
|
||||
}
|
||||
// Sending a packet using the route works.
|
||||
testSend(t, r, linkEP, nil)
|
||||
testSend(t, r, ep, nil)
|
||||
}
|
||||
|
||||
func TestSpoofingNoAddress(t *testing.T) {
|
||||
|
@ -960,8 +960,8 @@ func TestSpoofingNoAddress(t *testing.T) {
|
|||
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -980,7 +980,7 @@ func TestSpoofingNoAddress(t *testing.T) {
|
|||
t.Errorf("FindRoute succeeded with route %+v when it should have failed", r)
|
||||
}
|
||||
// Sending a packet fails.
|
||||
testFailingSendTo(t, s, dstAddr, linkEP, nil, tcpip.ErrNoRoute)
|
||||
testFailingSendTo(t, s, dstAddr, ep, nil, tcpip.ErrNoRoute)
|
||||
|
||||
// With address spoofing enabled, FindRoute permits any address to be used
|
||||
// as the source.
|
||||
|
@ -999,14 +999,14 @@ func TestSpoofingNoAddress(t *testing.T) {
|
|||
}
|
||||
// Sending a packet works.
|
||||
// FIXME(b/139841518):Spoofing doesn't work if there is no primary address.
|
||||
// testSendTo(t, s, remoteAddr, linkEP, nil)
|
||||
// testSendTo(t, s, remoteAddr, ep, nil)
|
||||
}
|
||||
|
||||
func TestBroadcastNeedsNoRoute(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
s.SetRouteTable([]tcpip.Route{})
|
||||
|
@ -1076,8 +1076,8 @@ func TestMulticastOrIPv6LinkLocalNeedsNoRoute(t *testing.T) {
|
|||
t.Run(tc.name, func(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1132,8 +1132,8 @@ func TestMulticastOrIPv6LinkLocalNeedsNoRoute(t *testing.T) {
|
|||
func TestAddressRangeAcceptsMatchingPacket(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1159,7 +1159,7 @@ func TestAddressRangeAcceptsMatchingPacket(t *testing.T) {
|
|||
t.Fatal("AddAddressRange failed:", err)
|
||||
}
|
||||
|
||||
testRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
}
|
||||
|
||||
func testNicForAddressRange(t *testing.T, nicID tcpip.NICID, s *stack.Stack, subnet tcpip.Subnet, rangeExists bool) {
|
||||
|
@ -1198,8 +1198,8 @@ func TestCheckLocalAddressForSubnet(t *testing.T) {
|
|||
const nicID tcpip.NICID = 1
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicID, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicID, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1236,8 +1236,8 @@ func TestCheckLocalAddressForSubnet(t *testing.T) {
|
|||
func TestAddressRangeRejectsNonmatchingPacket(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1262,7 +1262,7 @@ func TestAddressRangeRejectsNonmatchingPacket(t *testing.T) {
|
|||
if err := s.AddAddressRange(1, fakeNetNumber, subnet); err != nil {
|
||||
t.Fatal("AddAddressRange failed:", err)
|
||||
}
|
||||
testFailingRecv(t, fakeNet, localAddrByte, linkEP, buf)
|
||||
testFailingRecv(t, fakeNet, localAddrByte, ep, buf)
|
||||
}
|
||||
|
||||
func TestNetworkOptions(t *testing.T) {
|
||||
|
@ -1320,8 +1320,8 @@ func stackContainsAddressRange(s *stack.Stack, id tcpip.NICID, addrRange tcpip.S
|
|||
|
||||
func TestAddresRangeAddRemove(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1361,8 +1361,8 @@ func TestGetMainNICAddressAddPrimaryNonPrimary(t *testing.T) {
|
|||
for never := 0; never < 3; never++ {
|
||||
t.Run(fmt.Sprintf("never=%d", never), func(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
// Insert <canBe> primary and <never> never-primary addresses.
|
||||
|
@ -1426,8 +1426,8 @@ func TestGetMainNICAddressAddPrimaryNonPrimary(t *testing.T) {
|
|||
|
||||
func TestGetMainNICAddressAddRemove(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1501,8 +1501,8 @@ func verifyAddresses(t *testing.T, expectedAddresses, gotAddresses []tcpip.Proto
|
|||
func TestAddAddress(t *testing.T) {
|
||||
const nicid = 1
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1526,8 +1526,8 @@ func TestAddAddress(t *testing.T) {
|
|||
func TestAddProtocolAddress(t *testing.T) {
|
||||
const nicid = 1
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1558,8 +1558,8 @@ func TestAddProtocolAddress(t *testing.T) {
|
|||
func TestAddAddressWithOptions(t *testing.T) {
|
||||
const nicid = 1
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1587,8 +1587,8 @@ func TestAddAddressWithOptions(t *testing.T) {
|
|||
func TestAddProtocolAddressWithOptions(t *testing.T) {
|
||||
const nicid = 1
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, id); err != nil {
|
||||
ep := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(nicid, ep); err != nil {
|
||||
t.Fatal("CreateNIC failed:", err)
|
||||
}
|
||||
|
||||
|
@ -1621,8 +1621,8 @@ func TestAddProtocolAddressWithOptions(t *testing.T) {
|
|||
|
||||
func TestNICStats(t *testing.T) {
|
||||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
id1, linkEP1 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id1); err != nil {
|
||||
ep1 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep1); err != nil {
|
||||
t.Fatal("CreateNIC failed: ", err)
|
||||
}
|
||||
if err := s.AddAddress(1, fakeNetNumber, "\x01"); err != nil {
|
||||
|
@ -1639,7 +1639,7 @@ func TestNICStats(t *testing.T) {
|
|||
|
||||
// Send a packet to address 1.
|
||||
buf := buffer.NewView(30)
|
||||
linkEP1.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
ep1.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
if got, want := s.NICInfo()[1].Stats.Rx.Packets.Value(), uint64(1); got != want {
|
||||
t.Errorf("got Rx.Packets.Value() = %d, want = %d", got, want)
|
||||
}
|
||||
|
@ -1653,9 +1653,9 @@ func TestNICStats(t *testing.T) {
|
|||
if err := sendTo(s, "\x01", payload); err != nil {
|
||||
t.Fatal("sendTo failed: ", err)
|
||||
}
|
||||
want := uint64(linkEP1.Drain())
|
||||
want := uint64(ep1.Drain())
|
||||
if got := s.NICInfo()[1].Stats.Tx.Packets.Value(); got != want {
|
||||
t.Errorf("got Tx.Packets.Value() = %d, linkEP1.Drain() = %d", got, want)
|
||||
t.Errorf("got Tx.Packets.Value() = %d, ep1.Drain() = %d", got, want)
|
||||
}
|
||||
|
||||
if got, want := s.NICInfo()[1].Stats.Tx.Bytes.Value(), uint64(len(payload)); got != want {
|
||||
|
@ -1669,16 +1669,16 @@ func TestNICForwarding(t *testing.T) {
|
|||
s := stack.New([]string{"fakeNet"}, nil, stack.Options{})
|
||||
s.SetForwarding(true)
|
||||
|
||||
id1, linkEP1 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, id1); err != nil {
|
||||
ep1 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(1, ep1); err != nil {
|
||||
t.Fatal("CreateNIC #1 failed:", err)
|
||||
}
|
||||
if err := s.AddAddress(1, fakeNetNumber, "\x01"); err != nil {
|
||||
t.Fatal("AddAddress #1 failed:", err)
|
||||
}
|
||||
|
||||
id2, linkEP2 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(2, id2); err != nil {
|
||||
ep2 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(2, ep2); err != nil {
|
||||
t.Fatal("CreateNIC #2 failed:", err)
|
||||
}
|
||||
if err := s.AddAddress(2, fakeNetNumber, "\x02"); err != nil {
|
||||
|
@ -1697,10 +1697,10 @@ func TestNICForwarding(t *testing.T) {
|
|||
// Send a packet to address 3.
|
||||
buf := buffer.NewView(30)
|
||||
buf[0] = 3
|
||||
linkEP1.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
ep1.Inject(fakeNetNumber, buf.ToVectorisedView())
|
||||
|
||||
select {
|
||||
case <-linkEP2.C:
|
||||
case <-ep2.C:
|
||||
default:
|
||||
t.Fatal("Packet not forwarded")
|
||||
}
|
||||
|
|
|
@ -278,9 +278,9 @@ func (f *fakeTransportProtocol) Option(option interface{}) *tcpip.Error {
|
|||
}
|
||||
|
||||
func TestTransportReceive(t *testing.T) {
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
linkEP := channel.New(10, defaultMTU, "")
|
||||
s := stack.New([]string{"fakeNet"}, []string{"fakeTrans"}, stack.Options{})
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, linkEP); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
|
||||
|
@ -340,9 +340,9 @@ func TestTransportReceive(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestTransportControlReceive(t *testing.T) {
|
||||
id, linkEP := channel.New(10, defaultMTU, "")
|
||||
linkEP := channel.New(10, defaultMTU, "")
|
||||
s := stack.New([]string{"fakeNet"}, []string{"fakeTrans"}, stack.Options{})
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, linkEP); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
|
||||
|
@ -408,9 +408,9 @@ func TestTransportControlReceive(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestTransportSend(t *testing.T) {
|
||||
id, _ := channel.New(10, defaultMTU, "")
|
||||
linkEP := channel.New(10, defaultMTU, "")
|
||||
s := stack.New([]string{"fakeNet"}, []string{"fakeTrans"}, stack.Options{})
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, linkEP); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
|
||||
|
@ -497,16 +497,16 @@ func TestTransportForwarding(t *testing.T) {
|
|||
s.SetForwarding(true)
|
||||
|
||||
// TODO(b/123449044): Change this to a channel NIC.
|
||||
id1 := loopback.New()
|
||||
if err := s.CreateNIC(1, id1); err != nil {
|
||||
ep1 := loopback.New()
|
||||
if err := s.CreateNIC(1, ep1); err != nil {
|
||||
t.Fatalf("CreateNIC #1 failed: %v", err)
|
||||
}
|
||||
if err := s.AddAddress(1, fakeNetNumber, "\x01"); err != nil {
|
||||
t.Fatalf("AddAddress #1 failed: %v", err)
|
||||
}
|
||||
|
||||
id2, linkEP2 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(2, id2); err != nil {
|
||||
ep2 := channel.New(10, defaultMTU, "")
|
||||
if err := s.CreateNIC(2, ep2); err != nil {
|
||||
t.Fatalf("CreateNIC #2 failed: %v", err)
|
||||
}
|
||||
if err := s.AddAddress(2, fakeNetNumber, "\x02"); err != nil {
|
||||
|
@ -545,7 +545,7 @@ func TestTransportForwarding(t *testing.T) {
|
|||
req[0] = 1
|
||||
req[1] = 3
|
||||
req[2] = byte(fakeTransNumber)
|
||||
linkEP2.Inject(fakeNetNumber, req.ToVectorisedView())
|
||||
ep2.Inject(fakeNetNumber, req.ToVectorisedView())
|
||||
|
||||
aep, _, err := ep.Accept()
|
||||
if err != nil || aep == nil {
|
||||
|
@ -559,7 +559,7 @@ func TestTransportForwarding(t *testing.T) {
|
|||
|
||||
var p channel.PacketInfo
|
||||
select {
|
||||
case p = <-linkEP2.C:
|
||||
case p = <-ep2.C:
|
||||
default:
|
||||
t.Fatal("Response packet not forwarded")
|
||||
}
|
||||
|
|
|
@ -600,9 +600,6 @@ func (r Route) String() string {
|
|||
return out.String()
|
||||
}
|
||||
|
||||
// LinkEndpointID represents a data link layer endpoint.
|
||||
type LinkEndpointID uint64
|
||||
|
||||
// TransportProtocolNumber is the number of a transport protocol.
|
||||
type TransportProtocolNumber uint32
|
||||
|
||||
|
|
|
@ -150,11 +150,12 @@ func New(t *testing.T, mtu uint32) *Context {
|
|||
|
||||
// Some of the congestion control tests send up to 640 packets, we so
|
||||
// set the channel size to 1000.
|
||||
id, linkEP := channel.New(1000, mtu, "")
|
||||
ep := channel.New(1000, mtu, "")
|
||||
wep := stack.LinkEndpoint(ep)
|
||||
if testing.Verbose() {
|
||||
id = sniffer.New(id)
|
||||
wep = sniffer.New(ep)
|
||||
}
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, wep); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
|
||||
|
@ -180,7 +181,7 @@ func New(t *testing.T, mtu uint32) *Context {
|
|||
return &Context{
|
||||
t: t,
|
||||
s: s,
|
||||
linkEP: linkEP,
|
||||
linkEP: ep,
|
||||
WindowScale: uint8(tcp.FindWndScale(tcp.DefaultReceiveBufferSize)),
|
||||
}
|
||||
}
|
||||
|
|
|
@ -275,12 +275,13 @@ func newDualTestContext(t *testing.T, mtu uint32) *testContext {
|
|||
t.Helper()
|
||||
|
||||
s := stack.New([]string{ipv4.ProtocolName, ipv6.ProtocolName}, []string{udp.ProtocolName}, stack.Options{})
|
||||
ep := channel.New(256, mtu, "")
|
||||
wep := stack.LinkEndpoint(ep)
|
||||
|
||||
id, linkEP := channel.New(256, mtu, "")
|
||||
if testing.Verbose() {
|
||||
id = sniffer.New(id)
|
||||
wep = sniffer.New(ep)
|
||||
}
|
||||
if err := s.CreateNIC(1, id); err != nil {
|
||||
if err := s.CreateNIC(1, wep); err != nil {
|
||||
t.Fatalf("CreateNIC failed: %v", err)
|
||||
}
|
||||
|
||||
|
@ -306,7 +307,7 @@ func newDualTestContext(t *testing.T, mtu uint32) *testContext {
|
|||
return &testContext{
|
||||
t: t,
|
||||
s: s,
|
||||
linkEP: linkEP,
|
||||
linkEP: ep,
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -121,10 +121,10 @@ func (n *Network) CreateLinksAndRoutes(args *CreateLinksAndRoutesArgs, _ *struct
|
|||
nicID++
|
||||
nicids[link.Name] = nicID
|
||||
|
||||
linkEP := loopback.New()
|
||||
ep := loopback.New()
|
||||
|
||||
log.Infof("Enabling loopback interface %q with id %d on addresses %+v", link.Name, nicID, link.Addresses)
|
||||
if err := n.createNICWithAddrs(nicID, link.Name, linkEP, link.Addresses, true /* loopback */); err != nil {
|
||||
if err := n.createNICWithAddrs(nicID, link.Name, ep, link.Addresses, true /* loopback */); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
|
@ -156,7 +156,7 @@ func (n *Network) CreateLinksAndRoutes(args *CreateLinksAndRoutesArgs, _ *struct
|
|||
}
|
||||
|
||||
mac := tcpip.LinkAddress(link.LinkAddress)
|
||||
linkEP, err := fdbased.New(&fdbased.Options{
|
||||
ep, err := fdbased.New(&fdbased.Options{
|
||||
FDs: FDs,
|
||||
MTU: uint32(link.MTU),
|
||||
EthernetHeader: true,
|
||||
|
@ -170,7 +170,7 @@ func (n *Network) CreateLinksAndRoutes(args *CreateLinksAndRoutesArgs, _ *struct
|
|||
}
|
||||
|
||||
log.Infof("Enabling interface %q with id %d on addresses %+v (%v) w/ %d channels", link.Name, nicID, link.Addresses, mac, link.NumChannels)
|
||||
if err := n.createNICWithAddrs(nicID, link.Name, linkEP, link.Addresses, false /* loopback */); err != nil {
|
||||
if err := n.createNICWithAddrs(nicID, link.Name, ep, link.Addresses, false /* loopback */); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
|
@ -203,14 +203,14 @@ func (n *Network) CreateLinksAndRoutes(args *CreateLinksAndRoutesArgs, _ *struct
|
|||
|
||||
// createNICWithAddrs creates a NIC in the network stack and adds the given
|
||||
// addresses.
|
||||
func (n *Network) createNICWithAddrs(id tcpip.NICID, name string, linkEP tcpip.LinkEndpointID, addrs []net.IP, loopback bool) error {
|
||||
func (n *Network) createNICWithAddrs(id tcpip.NICID, name string, ep stack.LinkEndpoint, addrs []net.IP, loopback bool) error {
|
||||
if loopback {
|
||||
if err := n.Stack.CreateNamedLoopbackNIC(id, name, sniffer.New(linkEP)); err != nil {
|
||||
return fmt.Errorf("CreateNamedLoopbackNIC(%v, %v, %v) failed: %v", id, name, linkEP, err)
|
||||
if err := n.Stack.CreateNamedLoopbackNIC(id, name, sniffer.New(ep)); err != nil {
|
||||
return fmt.Errorf("CreateNamedLoopbackNIC(%v, %v) failed: %v", id, name, err)
|
||||
}
|
||||
} else {
|
||||
if err := n.Stack.CreateNamedNIC(id, name, sniffer.New(linkEP)); err != nil {
|
||||
return fmt.Errorf("CreateNamedNIC(%v, %v, %v) failed: %v", id, name, linkEP, err)
|
||||
if err := n.Stack.CreateNamedNIC(id, name, sniffer.New(ep)); err != nil {
|
||||
return fmt.Errorf("CreateNamedNIC(%v, %v) failed: %v", id, name, err)
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue