github.com/ttpreport/gvisor-ligolo@v0.0.0-20240123134145-a858404967ba/pkg/tcpip/tcpip.go (about)

     1  // Copyright 2018 The gVisor Authors.
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  // Package tcpip provides the interfaces and related types that users of the
    16  // tcpip stack will use in order to create endpoints used to send and receive
    17  // data over the network stack.
    18  //
    19  // The starting point is the creation and configuration of a stack. A stack can
    20  // be created by calling the New() function of the tcpip/stack/stack package;
    21  // configuring a stack involves creating NICs (via calls to Stack.CreateNIC()),
    22  // adding network addresses (via calls to Stack.AddProtocolAddress()), and
    23  // setting a route table (via a call to Stack.SetRouteTable()).
    24  //
    25  // Once a stack is configured, endpoints can be created by calling
    26  // Stack.NewEndpoint(). Such endpoints can be used to send/receive data, connect
    27  // to peers, listen for connections, accept connections, etc., depending on the
    28  // transport protocol selected.
    29  package tcpip
    30  
    31  import (
    32  	"bytes"
    33  	"errors"
    34  	"fmt"
    35  	"io"
    36  	"math"
    37  	"math/bits"
    38  	"reflect"
    39  	"strconv"
    40  	"strings"
    41  	"time"
    42  
    43  	"github.com/ttpreport/gvisor-ligolo/pkg/atomicbitops"
    44  	"github.com/ttpreport/gvisor-ligolo/pkg/sync"
    45  	"github.com/ttpreport/gvisor-ligolo/pkg/waiter"
    46  )
    47  
    48  // Using the header package here would cause an import cycle.
    49  const (
    50  	ipv4AddressSize    = 4
    51  	ipv4ProtocolNumber = 0x0800
    52  	ipv6AddressSize    = 16
    53  	ipv6ProtocolNumber = 0x86dd
    54  )
    55  
    56  // Errors related to Subnet
    57  var (
    58  	errSubnetLengthMismatch = errors.New("subnet length of address and mask differ")
    59  	errSubnetAddressMasked  = errors.New("subnet address has bits set outside the mask")
    60  )
    61  
    62  // ErrSaveRejection indicates a failed save due to unsupported networking state.
    63  // This type of errors is only used for save logic.
    64  type ErrSaveRejection struct {
    65  	Err error
    66  }
    67  
    68  // Error returns a sensible description of the save rejection error.
    69  func (e *ErrSaveRejection) Error() string {
    70  	return "save rejected due to unsupported networking state: " + e.Err.Error()
    71  }
    72  
    73  // MonotonicTime is a monotonic clock reading.
    74  //
    75  // +stateify savable
    76  type MonotonicTime struct {
    77  	nanoseconds int64
    78  }
    79  
    80  // String implements Stringer.
    81  func (mt MonotonicTime) String() string {
    82  	return strconv.FormatInt(mt.nanoseconds, 10)
    83  }
    84  
    85  // MonotonicTimeInfinite returns the monotonic timestamp as far away in the
    86  // future as possible.
    87  func MonotonicTimeInfinite() MonotonicTime {
    88  	return MonotonicTime{nanoseconds: math.MaxInt64}
    89  }
    90  
    91  // Before reports whether the monotonic clock reading mt is before u.
    92  func (mt MonotonicTime) Before(u MonotonicTime) bool {
    93  	return mt.nanoseconds < u.nanoseconds
    94  }
    95  
    96  // After reports whether the monotonic clock reading mt is after u.
    97  func (mt MonotonicTime) After(u MonotonicTime) bool {
    98  	return mt.nanoseconds > u.nanoseconds
    99  }
   100  
   101  // Add returns the monotonic clock reading mt+d.
   102  func (mt MonotonicTime) Add(d time.Duration) MonotonicTime {
   103  	return MonotonicTime{
   104  		nanoseconds: time.Unix(0, mt.nanoseconds).Add(d).Sub(time.Unix(0, 0)).Nanoseconds(),
   105  	}
   106  }
   107  
   108  // Sub returns the duration mt-u. If the result exceeds the maximum (or minimum)
   109  // value that can be stored in a Duration, the maximum (or minimum) duration
   110  // will be returned. To compute t-d for a duration d, use t.Add(-d).
   111  func (mt MonotonicTime) Sub(u MonotonicTime) time.Duration {
   112  	return time.Unix(0, mt.nanoseconds).Sub(time.Unix(0, u.nanoseconds))
   113  }
   114  
   115  // A Clock provides the current time and schedules work for execution.
   116  //
   117  // Times returned by a Clock should always be used for application-visible
   118  // time. Only monotonic times should be used for netstack internal timekeeping.
   119  type Clock interface {
   120  	// Now returns the current local time.
   121  	Now() time.Time
   122  
   123  	// NowMonotonic returns the current monotonic clock reading.
   124  	NowMonotonic() MonotonicTime
   125  
   126  	// AfterFunc waits for the duration to elapse and then calls f in its own
   127  	// goroutine. It returns a Timer that can be used to cancel the call using
   128  	// its Stop method.
   129  	AfterFunc(d time.Duration, f func()) Timer
   130  }
   131  
   132  // Timer represents a single event. A Timer must be created with
   133  // Clock.AfterFunc.
   134  type Timer interface {
   135  	// Stop prevents the Timer from firing. It returns true if the call stops the
   136  	// timer, false if the timer has already expired or been stopped.
   137  	//
   138  	// If Stop returns false, then the timer has already expired and the function
   139  	// f of Clock.AfterFunc(d, f) has been started in its own goroutine; Stop
   140  	// does not wait for f to complete before returning. If the caller needs to
   141  	// know whether f is completed, it must coordinate with f explicitly.
   142  	Stop() bool
   143  
   144  	// Reset changes the timer to expire after duration d.
   145  	//
   146  	// Reset should be invoked only on stopped or expired timers. If the timer is
   147  	// known to have expired, Reset can be used directly. Otherwise, the caller
   148  	// must coordinate with the function f of Clock.AfterFunc(d, f).
   149  	Reset(d time.Duration)
   150  }
   151  
   152  // Address is a byte slice cast as a string that represents the address of a
   153  // network node. Or, in the case of unix endpoints, it may represent a path.
   154  //
   155  // +stateify savable
   156  type Address struct {
   157  	addr   [16]byte
   158  	length int
   159  }
   160  
   161  // AddrFrom4 converts addr to an Address.
   162  func AddrFrom4(addr [4]byte) Address {
   163  	ret := Address{
   164  		length: 4,
   165  	}
   166  	// It's guaranteed that copy will return 4.
   167  	copy(ret.addr[:], addr[:])
   168  	return ret
   169  }
   170  
   171  // AddrFrom4Slice converts addr to an Address. It panics if len(addr) != 4.
   172  func AddrFrom4Slice(addr []byte) Address {
   173  	if len(addr) != 4 {
   174  		panic(fmt.Sprintf("bad address length for address %v", addr))
   175  	}
   176  	ret := Address{
   177  		length: 4,
   178  	}
   179  	// It's guaranteed that copy will return 4.
   180  	copy(ret.addr[:], addr)
   181  	return ret
   182  }
   183  
   184  // AddrFrom16 converts addr to an Address.
   185  func AddrFrom16(addr [16]byte) Address {
   186  	ret := Address{
   187  		length: 16,
   188  	}
   189  	// It's guaranteed that copy will return 16.
   190  	copy(ret.addr[:], addr[:])
   191  	return ret
   192  }
   193  
   194  // AddrFrom16Slice converts addr to an Address. It panics if len(addr) != 16.
   195  func AddrFrom16Slice(addr []byte) Address {
   196  	if len(addr) != 16 {
   197  		panic(fmt.Sprintf("bad address length for address %v", addr))
   198  	}
   199  	ret := Address{
   200  		length: 16,
   201  	}
   202  	// It's guaranteed that copy will return 16.
   203  	copy(ret.addr[:], addr)
   204  	return ret
   205  }
   206  
   207  // AddrFromSlice converts addr to an Address. It returns the Address zero value
   208  // if len(addr) != 4 or 16.
   209  func AddrFromSlice(addr []byte) Address {
   210  	switch len(addr) {
   211  	case ipv4AddressSize:
   212  		return AddrFrom4Slice(addr)
   213  	case ipv6AddressSize:
   214  		return AddrFrom16Slice(addr)
   215  	}
   216  	return Address{}
   217  }
   218  
   219  // As4 returns a as a 4 byte array. It panics if the address length is not 4.
   220  func (a Address) As4() [4]byte {
   221  	if a.Len() != 4 {
   222  		panic(fmt.Sprintf("bad address length for address %v", a.addr))
   223  	}
   224  	return [4]byte(a.addr[:4])
   225  }
   226  
   227  // As16 returns a as a 16 byte array. It panics if the address length is not 16.
   228  func (a Address) As16() [16]byte {
   229  	if a.Len() != 16 {
   230  		panic(fmt.Sprintf("bad address length for address %v", a.addr))
   231  	}
   232  	return [16]byte(a.addr[:16])
   233  }
   234  
   235  // AsSlice returns a as a byte slice. Callers should be careful as it can
   236  // return a window into existing memory.
   237  //
   238  // +checkescape
   239  func (a *Address) AsSlice() []byte {
   240  	return a.addr[:a.length]
   241  }
   242  
   243  // BitLen returns the length in bits of a.
   244  func (a Address) BitLen() int {
   245  	return a.Len() * 8
   246  }
   247  
   248  // Len returns the length in bytes of a.
   249  func (a Address) Len() int {
   250  	return a.length
   251  }
   252  
   253  // WithPrefix returns the address with a prefix that represents a point subnet.
   254  func (a Address) WithPrefix() AddressWithPrefix {
   255  	return AddressWithPrefix{
   256  		Address:   a,
   257  		PrefixLen: a.BitLen(),
   258  	}
   259  }
   260  
   261  // Unspecified returns true if the address is unspecified.
   262  func (a Address) Unspecified() bool {
   263  	for _, b := range a.addr {
   264  		if b != 0 {
   265  			return false
   266  		}
   267  	}
   268  	return true
   269  }
   270  
   271  // Equal returns whether a and other are equal. It exists for use by the cmp
   272  // library.
   273  func (a Address) Equal(other Address) bool {
   274  	return a == other
   275  }
   276  
   277  // MatchingPrefix returns the matching prefix length in bits.
   278  //
   279  // Panics if b and a have different lengths.
   280  func (a Address) MatchingPrefix(b Address) uint8 {
   281  	const bitsInAByte = 8
   282  
   283  	if a.Len() != b.Len() {
   284  		panic(fmt.Sprintf("addresses %s and %s do not have the same length", a, b))
   285  	}
   286  
   287  	var prefix uint8
   288  	for i := 0; i < a.length; i++ {
   289  		aByte := a.addr[i]
   290  		bByte := b.addr[i]
   291  
   292  		if aByte == bByte {
   293  			prefix += bitsInAByte
   294  			continue
   295  		}
   296  
   297  		// Count the remaining matching bits in the byte from MSbit to LSBbit.
   298  		mask := uint8(1) << (bitsInAByte - 1)
   299  		for {
   300  			if aByte&mask == bByte&mask {
   301  				prefix++
   302  				mask >>= 1
   303  				continue
   304  			}
   305  
   306  			break
   307  		}
   308  
   309  		break
   310  	}
   311  
   312  	return prefix
   313  }
   314  
   315  // AddressMask is a bitmask for an address.
   316  //
   317  // +stateify savable
   318  type AddressMask struct {
   319  	mask string
   320  }
   321  
   322  // MaskFrom returns a Mask based on str.
   323  func MaskFrom(str string) AddressMask {
   324  	return AddressMask{mask: str}
   325  }
   326  
   327  // MaskFromBytes returns a Mask based on bs.
   328  func MaskFromBytes(bs []byte) AddressMask {
   329  	return AddressMask{mask: string(bs)}
   330  }
   331  
   332  // String implements Stringer.
   333  func (m AddressMask) String() string {
   334  	return fmt.Sprintf("%x", m.mask)
   335  }
   336  
   337  // AsSlice returns a as a byte slice. Callers should be careful as it can
   338  // return a window into existing memory.
   339  func (m *AddressMask) AsSlice() []byte {
   340  	return []byte(m.mask)
   341  }
   342  
   343  // BitLen returns the length of the mask in bits.
   344  func (m AddressMask) BitLen() int {
   345  	return len(m.mask) * 8
   346  }
   347  
   348  // Len returns the length of the mask in bytes.
   349  func (m AddressMask) Len() int {
   350  	return len(m.mask)
   351  }
   352  
   353  // Prefix returns the number of bits before the first host bit.
   354  func (m AddressMask) Prefix() int {
   355  	p := 0
   356  	for _, b := range []byte(m.mask) {
   357  		p += bits.LeadingZeros8(^b)
   358  	}
   359  	return p
   360  }
   361  
   362  // Equal returns whether m and other are equal. It exists for use by the cmp
   363  // library.
   364  func (m AddressMask) Equal(other AddressMask) bool {
   365  	return m == other
   366  }
   367  
   368  // Subnet is a subnet defined by its address and mask.
   369  type Subnet struct {
   370  	address Address
   371  	mask    AddressMask
   372  }
   373  
   374  // NewSubnet creates a new Subnet, checking that the address and mask are the same length.
   375  func NewSubnet(a Address, m AddressMask) (Subnet, error) {
   376  	if a.Len() != m.Len() {
   377  		return Subnet{}, errSubnetLengthMismatch
   378  	}
   379  	for i := 0; i < a.Len(); i++ {
   380  		if a.addr[i]&^m.mask[i] != 0 {
   381  			return Subnet{}, errSubnetAddressMasked
   382  		}
   383  	}
   384  	return Subnet{a, m}, nil
   385  }
   386  
   387  // String implements Stringer.
   388  func (s Subnet) String() string {
   389  	return fmt.Sprintf("%s/%d", s.ID(), s.Prefix())
   390  }
   391  
   392  // Contains returns true iff the address is of the same length and matches the
   393  // subnet address and mask.
   394  func (s *Subnet) Contains(a Address) bool {
   395  	if a.Len() != s.address.Len() {
   396  		return false
   397  	}
   398  	for i := 0; i < a.Len(); i++ {
   399  		if a.addr[i]&s.mask.mask[i] != s.address.addr[i] {
   400  			return false
   401  		}
   402  	}
   403  	return true
   404  }
   405  
   406  // ID returns the subnet ID.
   407  func (s *Subnet) ID() Address {
   408  	return s.address
   409  }
   410  
   411  // Bits returns the number of ones (network bits) and zeros (host bits) in the
   412  // subnet mask.
   413  func (s *Subnet) Bits() (ones int, zeros int) {
   414  	ones = s.mask.Prefix()
   415  	return ones, s.mask.BitLen() - ones
   416  }
   417  
   418  // Prefix returns the number of bits before the first host bit.
   419  func (s *Subnet) Prefix() int {
   420  	return s.mask.Prefix()
   421  }
   422  
   423  // Mask returns the subnet mask.
   424  func (s *Subnet) Mask() AddressMask {
   425  	return s.mask
   426  }
   427  
   428  // Broadcast returns the subnet's broadcast address.
   429  func (s *Subnet) Broadcast() Address {
   430  	addrCopy := s.address
   431  	for i := 0; i < addrCopy.Len(); i++ {
   432  		addrCopy.addr[i] |= ^s.mask.mask[i]
   433  	}
   434  	return addrCopy
   435  }
   436  
   437  // IsBroadcast returns true if the address is considered a broadcast address.
   438  func (s *Subnet) IsBroadcast(address Address) bool {
   439  	// Only IPv4 supports the notion of a broadcast address.
   440  	if address.Len() != ipv4AddressSize {
   441  		return false
   442  	}
   443  
   444  	// Normally, we would just compare address with the subnet's broadcast
   445  	// address but there is an exception where a simple comparison is not
   446  	// correct. This exception is for /31 and /32 IPv4 subnets where all
   447  	// addresses are considered valid host addresses.
   448  	//
   449  	// For /31 subnets, the case is easy. RFC 3021 Section 2.1 states that
   450  	// both addresses in a /31 subnet "MUST be interpreted as host addresses."
   451  	//
   452  	// For /32, the case is a bit more vague. RFC 3021 makes no mention of /32
   453  	// subnets. However, the same reasoning applies - if an exception is not
   454  	// made, then there do not exist any host addresses in a /32 subnet. RFC
   455  	// 4632 Section 3.1 also vaguely implies this interpretation by referring
   456  	// to addresses in /32 subnets as "host routes."
   457  	return s.Prefix() <= 30 && s.Broadcast() == address
   458  }
   459  
   460  // Equal returns true if this Subnet is equal to the given Subnet.
   461  func (s Subnet) Equal(o Subnet) bool {
   462  	// If this changes, update Route.Equal accordingly.
   463  	return s == o
   464  }
   465  
   466  // NICID is a number that uniquely identifies a NIC.
   467  type NICID int32
   468  
   469  // ShutdownFlags represents flags that can be passed to the Shutdown() method
   470  // of the Endpoint interface.
   471  type ShutdownFlags int
   472  
   473  // Values of the flags that can be passed to the Shutdown() method. They can
   474  // be OR'ed together.
   475  const (
   476  	ShutdownRead ShutdownFlags = 1 << iota
   477  	ShutdownWrite
   478  )
   479  
   480  // PacketType is used to indicate the destination of the packet.
   481  type PacketType uint8
   482  
   483  const (
   484  	// PacketHost indicates a packet addressed to the local host.
   485  	PacketHost PacketType = iota
   486  
   487  	// PacketOtherHost indicates an outgoing packet addressed to
   488  	// another host caught by a NIC in promiscuous mode.
   489  	PacketOtherHost
   490  
   491  	// PacketOutgoing for a packet originating from the local host
   492  	// that is looped back to a packet socket.
   493  	PacketOutgoing
   494  
   495  	// PacketBroadcast indicates a link layer broadcast packet.
   496  	PacketBroadcast
   497  
   498  	// PacketMulticast indicates a link layer multicast packet.
   499  	PacketMulticast
   500  )
   501  
   502  // FullAddress represents a full transport node address, as required by the
   503  // Connect() and Bind() methods.
   504  //
   505  // +stateify savable
   506  type FullAddress struct {
   507  	// NIC is the ID of the NIC this address refers to.
   508  	//
   509  	// This may not be used by all endpoint types.
   510  	NIC NICID
   511  
   512  	// Addr is the network address.
   513  	Addr Address
   514  
   515  	// Port is the transport port.
   516  	//
   517  	// This may not be used by all endpoint types.
   518  	Port uint16
   519  
   520  	// LinkAddr is the link layer address.
   521  	LinkAddr LinkAddress
   522  }
   523  
   524  // Payloader is an interface that provides data.
   525  //
   526  // This interface allows the endpoint to request the amount of data it needs
   527  // based on internal buffers without exposing them.
   528  type Payloader interface {
   529  	io.Reader
   530  
   531  	// Len returns the number of bytes of the unread portion of the
   532  	// Reader.
   533  	Len() int
   534  }
   535  
   536  var _ Payloader = (*bytes.Buffer)(nil)
   537  var _ Payloader = (*bytes.Reader)(nil)
   538  
   539  var _ io.Writer = (*SliceWriter)(nil)
   540  
   541  // SliceWriter implements io.Writer for slices.
   542  type SliceWriter []byte
   543  
   544  // Write implements io.Writer.Write.
   545  func (s *SliceWriter) Write(b []byte) (int, error) {
   546  	n := copy(*s, b)
   547  	*s = (*s)[n:]
   548  	var err error
   549  	if n != len(b) {
   550  		err = io.ErrShortWrite
   551  	}
   552  	return n, err
   553  }
   554  
   555  var _ io.Writer = (*LimitedWriter)(nil)
   556  
   557  // A LimitedWriter writes to W but limits the amount of data copied to just N
   558  // bytes. Each call to Write updates N to reflect the new amount remaining.
   559  type LimitedWriter struct {
   560  	W io.Writer
   561  	N int64
   562  }
   563  
   564  func (l *LimitedWriter) Write(p []byte) (int, error) {
   565  	pLen := int64(len(p))
   566  	if pLen > l.N {
   567  		p = p[:l.N]
   568  	}
   569  	n, err := l.W.Write(p)
   570  	n64 := int64(n)
   571  	if err == nil && n64 != pLen {
   572  		err = io.ErrShortWrite
   573  	}
   574  	l.N -= n64
   575  	return n, err
   576  }
   577  
   578  // SendableControlMessages contains socket control messages that can be written.
   579  //
   580  // +stateify savable
   581  type SendableControlMessages struct {
   582  	// HasTTL indicates whether TTL is valid/set.
   583  	HasTTL bool
   584  
   585  	// TTL is the IPv4 Time To Live of the associated packet.
   586  	TTL uint8
   587  
   588  	// HasHopLimit indicates whether HopLimit is valid/set.
   589  	HasHopLimit bool
   590  
   591  	// HopLimit is the IPv6 Hop Limit of the associated packet.
   592  	HopLimit uint8
   593  
   594  	// HasIPv6PacketInfo indicates whether IPv6PacketInfo is set.
   595  	HasIPv6PacketInfo bool
   596  
   597  	// IPv6PacketInfo holds interface and address data on an incoming packet.
   598  	IPv6PacketInfo IPv6PacketInfo
   599  }
   600  
   601  // ReceivableControlMessages contains socket control messages that can be
   602  // received.
   603  //
   604  // +stateify savable
   605  type ReceivableControlMessages struct {
   606  	// Timestamp is the time that the last packet used to create the read data
   607  	// was received.
   608  	Timestamp time.Time `state:".(int64)"`
   609  
   610  	// HasInq indicates whether Inq is valid/set.
   611  	HasInq bool
   612  
   613  	// Inq is the number of bytes ready to be received.
   614  	Inq int32
   615  
   616  	// HasTOS indicates whether TOS is valid/set.
   617  	HasTOS bool
   618  
   619  	// TOS is the IPv4 type of service of the associated packet.
   620  	TOS uint8
   621  
   622  	// HasTTL indicates whether TTL is valid/set.
   623  	HasTTL bool
   624  
   625  	// TTL is the IPv4 Time To Live of the associated packet.
   626  	TTL uint8
   627  
   628  	// HasHopLimit indicates whether HopLimit is valid/set.
   629  	HasHopLimit bool
   630  
   631  	// HopLimit is the IPv6 Hop Limit of the associated packet.
   632  	HopLimit uint8
   633  
   634  	// HasTimestamp indicates whether Timestamp is valid/set.
   635  	HasTimestamp bool
   636  
   637  	// HasTClass indicates whether TClass is valid/set.
   638  	HasTClass bool
   639  
   640  	// TClass is the IPv6 traffic class of the associated packet.
   641  	TClass uint32
   642  
   643  	// HasIPPacketInfo indicates whether PacketInfo is set.
   644  	HasIPPacketInfo bool
   645  
   646  	// PacketInfo holds interface and address data on an incoming packet.
   647  	PacketInfo IPPacketInfo
   648  
   649  	// HasIPv6PacketInfo indicates whether IPv6PacketInfo is set.
   650  	HasIPv6PacketInfo bool
   651  
   652  	// IPv6PacketInfo holds interface and address data on an incoming packet.
   653  	IPv6PacketInfo IPv6PacketInfo
   654  
   655  	// HasOriginalDestinationAddress indicates whether OriginalDstAddress is
   656  	// set.
   657  	HasOriginalDstAddress bool
   658  
   659  	// OriginalDestinationAddress holds the original destination address
   660  	// and port of the incoming packet.
   661  	OriginalDstAddress FullAddress
   662  
   663  	// SockErr is the dequeued socket error on recvmsg(MSG_ERRQUEUE).
   664  	SockErr *SockError
   665  }
   666  
   667  // PacketOwner is used to get UID and GID of the packet.
   668  type PacketOwner interface {
   669  	// KUID returns KUID of the packet.
   670  	KUID() uint32
   671  
   672  	// KGID returns KGID of the packet.
   673  	KGID() uint32
   674  }
   675  
   676  // ReadOptions contains options for Endpoint.Read.
   677  type ReadOptions struct {
   678  	// Peek indicates whether this read is a peek.
   679  	Peek bool
   680  
   681  	// NeedRemoteAddr indicates whether to return the remote address, if
   682  	// supported.
   683  	NeedRemoteAddr bool
   684  
   685  	// NeedLinkPacketInfo indicates whether to return the link-layer information,
   686  	// if supported.
   687  	NeedLinkPacketInfo bool
   688  }
   689  
   690  // ReadResult represents result for a successful Endpoint.Read.
   691  type ReadResult struct {
   692  	// Count is the number of bytes received and written to the buffer.
   693  	Count int
   694  
   695  	// Total is the number of bytes of the received packet. This can be used to
   696  	// determine whether the read is truncated.
   697  	Total int
   698  
   699  	// ControlMessages is the control messages received.
   700  	ControlMessages ReceivableControlMessages
   701  
   702  	// RemoteAddr is the remote address if ReadOptions.NeedAddr is true.
   703  	RemoteAddr FullAddress
   704  
   705  	// LinkPacketInfo is the link-layer information of the received packet if
   706  	// ReadOptions.NeedLinkPacketInfo is true.
   707  	LinkPacketInfo LinkPacketInfo
   708  }
   709  
   710  // Endpoint is the interface implemented by transport protocols (e.g., tcp, udp)
   711  // that exposes functionality like read, write, connect, etc. to users of the
   712  // networking stack.
   713  type Endpoint interface {
   714  	// Close puts the endpoint in a closed state and frees all resources
   715  	// associated with it. Close initiates the teardown process, the
   716  	// Endpoint may not be fully closed when Close returns.
   717  	Close()
   718  
   719  	// Abort initiates an expedited endpoint teardown. As compared to
   720  	// Close, Abort prioritizes closing the Endpoint quickly over cleanly.
   721  	// Abort is best effort; implementing Abort with Close is acceptable.
   722  	Abort()
   723  
   724  	// Read reads data from the endpoint and optionally writes to dst.
   725  	//
   726  	// This method does not block if there is no data pending; in this case,
   727  	// ErrWouldBlock is returned.
   728  	//
   729  	// If non-zero number of bytes are successfully read and written to dst, err
   730  	// must be nil. Otherwise, if dst failed to write anything, ErrBadBuffer
   731  	// should be returned.
   732  	Read(io.Writer, ReadOptions) (ReadResult, Error)
   733  
   734  	// Write writes data to the endpoint's peer. This method does not block if
   735  	// the data cannot be written.
   736  	//
   737  	// Unlike io.Writer.Write, Endpoint.Write transfers ownership of any bytes
   738  	// successfully written to the Endpoint. That is, if a call to
   739  	// Write(SlicePayload{data}) returns (n, err), it may retain data[:n], and
   740  	// the caller should not use data[:n] after Write returns.
   741  	//
   742  	// Note that unlike io.Writer.Write, it is not an error for Write to
   743  	// perform a partial write (if n > 0, no error may be returned). Only
   744  	// stream (TCP) Endpoints may return partial writes, and even then only
   745  	// in the case where writing additional data would block. Other Endpoints
   746  	// will either write the entire message or return an error.
   747  	Write(Payloader, WriteOptions) (int64, Error)
   748  
   749  	// Connect connects the endpoint to its peer. Specifying a NIC is
   750  	// optional.
   751  	//
   752  	// There are three classes of return values:
   753  	//	nil -- the attempt to connect succeeded.
   754  	//	ErrConnectStarted/ErrAlreadyConnecting -- the connect attempt started
   755  	//		but hasn't completed yet. In this case, the caller must call Connect
   756  	//		or GetSockOpt(ErrorOption) when the endpoint becomes writable to
   757  	//		get the actual result. The first call to Connect after the socket has
   758  	//		connected returns nil. Calling connect again results in ErrAlreadyConnected.
   759  	//	Anything else -- the attempt to connect failed.
   760  	//
   761  	// If address.Addr is empty, this means that Endpoint has to be
   762  	// disconnected if this is supported, otherwise
   763  	// ErrAddressFamilyNotSupported must be returned.
   764  	Connect(address FullAddress) Error
   765  
   766  	// Disconnect disconnects the endpoint from its peer.
   767  	Disconnect() Error
   768  
   769  	// Shutdown closes the read and/or write end of the endpoint connection
   770  	// to its peer.
   771  	Shutdown(flags ShutdownFlags) Error
   772  
   773  	// Listen puts the endpoint in "listen" mode, which allows it to accept
   774  	// new connections.
   775  	Listen(backlog int) Error
   776  
   777  	// Accept returns a new endpoint if a peer has established a connection
   778  	// to an endpoint previously set to listen mode. This method does not
   779  	// block if no new connections are available.
   780  	//
   781  	// The returned Queue is the wait queue for the newly created endpoint.
   782  	//
   783  	// If peerAddr is not nil then it is populated with the peer address of the
   784  	// returned endpoint.
   785  	Accept(peerAddr *FullAddress) (Endpoint, *waiter.Queue, Error)
   786  
   787  	// Bind binds the endpoint to a specific local address and port.
   788  	// Specifying a NIC is optional.
   789  	Bind(address FullAddress) Error
   790  
   791  	// GetLocalAddress returns the address to which the endpoint is bound.
   792  	GetLocalAddress() (FullAddress, Error)
   793  
   794  	// GetRemoteAddress returns the address to which the endpoint is
   795  	// connected.
   796  	GetRemoteAddress() (FullAddress, Error)
   797  
   798  	// Readiness returns the current readiness of the endpoint. For example,
   799  	// if waiter.EventIn is set, the endpoint is immediately readable.
   800  	Readiness(mask waiter.EventMask) waiter.EventMask
   801  
   802  	// SetSockOpt sets a socket option.
   803  	SetSockOpt(opt SettableSocketOption) Error
   804  
   805  	// SetSockOptInt sets a socket option, for simple cases where a value
   806  	// has the int type.
   807  	SetSockOptInt(opt SockOptInt, v int) Error
   808  
   809  	// GetSockOpt gets a socket option.
   810  	GetSockOpt(opt GettableSocketOption) Error
   811  
   812  	// GetSockOptInt gets a socket option for simple cases where a return
   813  	// value has the int type.
   814  	GetSockOptInt(SockOptInt) (int, Error)
   815  
   816  	// State returns a socket's lifecycle state. The returned value is
   817  	// protocol-specific and is primarily used for diagnostics.
   818  	State() uint32
   819  
   820  	// ModerateRecvBuf should be called everytime data is copied to the user
   821  	// space. This allows for dynamic tuning of recv buffer space for a
   822  	// given socket.
   823  	//
   824  	// NOTE: This method is a no-op for sockets other than TCP.
   825  	ModerateRecvBuf(copied int)
   826  
   827  	// Info returns a copy to the transport endpoint info.
   828  	Info() EndpointInfo
   829  
   830  	// Stats returns a reference to the endpoint stats.
   831  	Stats() EndpointStats
   832  
   833  	// SetOwner sets the task owner to the endpoint owner.
   834  	SetOwner(owner PacketOwner)
   835  
   836  	// LastError clears and returns the last error reported by the endpoint.
   837  	LastError() Error
   838  
   839  	// SocketOptions returns the structure which contains all the socket
   840  	// level options.
   841  	SocketOptions() *SocketOptions
   842  }
   843  
   844  // EndpointWithPreflight is the interface implemented by endpoints that need
   845  // to expose the `Preflight` method for preparing the endpoint prior to
   846  // calling `Write`.
   847  type EndpointWithPreflight interface {
   848  	// Prepares the endpoint for writes using the provided WriteOptions,
   849  	// returning an error if the options were incompatible with the endpoint's
   850  	// current state.
   851  	Preflight(WriteOptions) Error
   852  }
   853  
   854  // LinkPacketInfo holds Link layer information for a received packet.
   855  //
   856  // +stateify savable
   857  type LinkPacketInfo struct {
   858  	// Protocol is the NetworkProtocolNumber for the packet.
   859  	Protocol NetworkProtocolNumber
   860  
   861  	// PktType is used to indicate the destination of the packet.
   862  	PktType PacketType
   863  }
   864  
   865  // EndpointInfo is the interface implemented by each endpoint info struct.
   866  type EndpointInfo interface {
   867  	// IsEndpointInfo is an empty method to implement the tcpip.EndpointInfo
   868  	// marker interface.
   869  	IsEndpointInfo()
   870  }
   871  
   872  // EndpointStats is the interface implemented by each endpoint stats struct.
   873  type EndpointStats interface {
   874  	// IsEndpointStats is an empty method to implement the tcpip.EndpointStats
   875  	// marker interface.
   876  	IsEndpointStats()
   877  }
   878  
   879  // WriteOptions contains options for Endpoint.Write.
   880  type WriteOptions struct {
   881  	// If To is not nil, write to the given address instead of the endpoint's
   882  	// peer.
   883  	To *FullAddress
   884  
   885  	// More has the same semantics as Linux's MSG_MORE.
   886  	More bool
   887  
   888  	// EndOfRecord has the same semantics as Linux's MSG_EOR.
   889  	EndOfRecord bool
   890  
   891  	// Atomic means that all data fetched from Payloader must be written to the
   892  	// endpoint. If Atomic is false, then data fetched from the Payloader may be
   893  	// discarded if available endpoint buffer space is unsufficient.
   894  	Atomic bool
   895  
   896  	// ControlMessages contains optional overrides used when writing a packet.
   897  	ControlMessages SendableControlMessages
   898  }
   899  
   900  // SockOptInt represents socket options which values have the int type.
   901  type SockOptInt int
   902  
   903  const (
   904  	// KeepaliveCountOption is used by SetSockOptInt/GetSockOptInt to
   905  	// specify the number of un-ACKed TCP keepalives that will be sent
   906  	// before the connection is closed.
   907  	KeepaliveCountOption SockOptInt = iota
   908  
   909  	// IPv4TOSOption is used by SetSockOptInt/GetSockOptInt to specify TOS
   910  	// for all subsequent outgoing IPv4 packets from the endpoint.
   911  	IPv4TOSOption
   912  
   913  	// IPv6TrafficClassOption is used by SetSockOptInt/GetSockOptInt to
   914  	// specify TOS for all subsequent outgoing IPv6 packets from the
   915  	// endpoint.
   916  	IPv6TrafficClassOption
   917  
   918  	// MaxSegOption is used by SetSockOptInt/GetSockOptInt to set/get the
   919  	// current Maximum Segment Size(MSS) value as specified using the
   920  	// TCP_MAXSEG option.
   921  	MaxSegOption
   922  
   923  	// MTUDiscoverOption is used to set/get the path MTU discovery setting.
   924  	//
   925  	// NOTE: Setting this option to any other value than PMTUDiscoveryDont
   926  	// is not supported and will fail as such, and getting this option will
   927  	// always return PMTUDiscoveryDont.
   928  	MTUDiscoverOption
   929  
   930  	// MulticastTTLOption is used by SetSockOptInt/GetSockOptInt to control
   931  	// the default TTL value for multicast messages. The default is 1.
   932  	MulticastTTLOption
   933  
   934  	// ReceiveQueueSizeOption is used in GetSockOptInt to specify that the
   935  	// number of unread bytes in the input buffer should be returned.
   936  	ReceiveQueueSizeOption
   937  
   938  	// SendQueueSizeOption is used in GetSockOptInt to specify that the
   939  	// number of unread bytes in the output buffer should be returned.
   940  	SendQueueSizeOption
   941  
   942  	// IPv4TTLOption is used by SetSockOptInt/GetSockOptInt to control the default
   943  	// TTL value for unicast messages.
   944  	//
   945  	// The default is configured by DefaultTTLOption. A UseDefaultIPv4TTL value
   946  	// configures the endpoint to use the default.
   947  	IPv4TTLOption
   948  
   949  	// IPv6HopLimitOption is used by SetSockOptInt/GetSockOptInt to control the
   950  	// default hop limit value for unicast messages.
   951  	//
   952  	// The default is configured by DefaultTTLOption. A UseDefaultIPv6HopLimit
   953  	// value configures the endpoint to use the default.
   954  	IPv6HopLimitOption
   955  
   956  	// TCPSynCountOption is used by SetSockOptInt/GetSockOptInt to specify
   957  	// the number of SYN retransmits that TCP should send before aborting
   958  	// the attempt to connect. It cannot exceed 255.
   959  	//
   960  	// NOTE: This option is currently only stubbed out and is no-op.
   961  	TCPSynCountOption
   962  
   963  	// TCPWindowClampOption is used by SetSockOptInt/GetSockOptInt to bound
   964  	// the size of the advertised window to this value.
   965  	//
   966  	// NOTE: This option is currently only stubed out and is a no-op
   967  	TCPWindowClampOption
   968  
   969  	// IPv6Checksum is used to request the stack to populate and validate the IPv6
   970  	// checksum for transport level headers.
   971  	IPv6Checksum
   972  )
   973  
   974  const (
   975  	// UseDefaultIPv4TTL is the IPv4TTLOption value that configures an endpoint to
   976  	// use the default ttl currently configured by the IPv4 protocol (see
   977  	// DefaultTTLOption).
   978  	UseDefaultIPv4TTL = 0
   979  
   980  	// UseDefaultIPv6HopLimit is the IPv6HopLimitOption value that configures an
   981  	// endpoint to use the default hop limit currently configured by the IPv6
   982  	// protocol (see DefaultTTLOption).
   983  	UseDefaultIPv6HopLimit = -1
   984  )
   985  
   986  const (
   987  	// PMTUDiscoveryWant is a setting of the MTUDiscoverOption to use
   988  	// per-route settings.
   989  	PMTUDiscoveryWant int = iota
   990  
   991  	// PMTUDiscoveryDont is a setting of the MTUDiscoverOption to disable
   992  	// path MTU discovery.
   993  	PMTUDiscoveryDont
   994  
   995  	// PMTUDiscoveryDo is a setting of the MTUDiscoverOption to always do
   996  	// path MTU discovery.
   997  	PMTUDiscoveryDo
   998  
   999  	// PMTUDiscoveryProbe is a setting of the MTUDiscoverOption to set DF
  1000  	// but ignore path MTU.
  1001  	PMTUDiscoveryProbe
  1002  )
  1003  
  1004  // GettableNetworkProtocolOption is a marker interface for network protocol
  1005  // options that may be queried.
  1006  type GettableNetworkProtocolOption interface {
  1007  	isGettableNetworkProtocolOption()
  1008  }
  1009  
  1010  // SettableNetworkProtocolOption is a marker interface for network protocol
  1011  // options that may be set.
  1012  type SettableNetworkProtocolOption interface {
  1013  	isSettableNetworkProtocolOption()
  1014  }
  1015  
  1016  // DefaultTTLOption is used by stack.(*Stack).NetworkProtocolOption to specify
  1017  // a default TTL.
  1018  type DefaultTTLOption uint8
  1019  
  1020  func (*DefaultTTLOption) isGettableNetworkProtocolOption() {}
  1021  
  1022  func (*DefaultTTLOption) isSettableNetworkProtocolOption() {}
  1023  
  1024  // GettableTransportProtocolOption is a marker interface for transport protocol
  1025  // options that may be queried.
  1026  type GettableTransportProtocolOption interface {
  1027  	isGettableTransportProtocolOption()
  1028  }
  1029  
  1030  // SettableTransportProtocolOption is a marker interface for transport protocol
  1031  // options that may be set.
  1032  type SettableTransportProtocolOption interface {
  1033  	isSettableTransportProtocolOption()
  1034  }
  1035  
  1036  // TCPSACKEnabled the SACK option for TCP.
  1037  //
  1038  // See: https://tools.ietf.org/html/rfc2018.
  1039  type TCPSACKEnabled bool
  1040  
  1041  func (*TCPSACKEnabled) isGettableTransportProtocolOption() {}
  1042  
  1043  func (*TCPSACKEnabled) isSettableTransportProtocolOption() {}
  1044  
  1045  // TCPRecovery is the loss deteoction algorithm used by TCP.
  1046  type TCPRecovery int32
  1047  
  1048  func (*TCPRecovery) isGettableTransportProtocolOption() {}
  1049  
  1050  func (*TCPRecovery) isSettableTransportProtocolOption() {}
  1051  
  1052  // TCPAlwaysUseSynCookies indicates unconditional usage of syncookies.
  1053  type TCPAlwaysUseSynCookies bool
  1054  
  1055  func (*TCPAlwaysUseSynCookies) isGettableTransportProtocolOption() {}
  1056  
  1057  func (*TCPAlwaysUseSynCookies) isSettableTransportProtocolOption() {}
  1058  
  1059  const (
  1060  	// TCPRACKLossDetection indicates RACK is used for loss detection and
  1061  	// recovery.
  1062  	TCPRACKLossDetection TCPRecovery = 1 << iota
  1063  
  1064  	// TCPRACKStaticReoWnd indicates the reordering window should not be
  1065  	// adjusted when DSACK is received.
  1066  	TCPRACKStaticReoWnd
  1067  
  1068  	// TCPRACKNoDupTh indicates RACK should not consider the classic three
  1069  	// duplicate acknowledgements rule to mark the segments as lost. This
  1070  	// is used when reordering is not detected.
  1071  	TCPRACKNoDupTh
  1072  )
  1073  
  1074  // TCPDelayEnabled enables/disables Nagle's algorithm in TCP.
  1075  type TCPDelayEnabled bool
  1076  
  1077  func (*TCPDelayEnabled) isGettableTransportProtocolOption() {}
  1078  
  1079  func (*TCPDelayEnabled) isSettableTransportProtocolOption() {}
  1080  
  1081  // TCPSendBufferSizeRangeOption is the send buffer size range for TCP.
  1082  type TCPSendBufferSizeRangeOption struct {
  1083  	Min     int
  1084  	Default int
  1085  	Max     int
  1086  }
  1087  
  1088  func (*TCPSendBufferSizeRangeOption) isGettableTransportProtocolOption() {}
  1089  
  1090  func (*TCPSendBufferSizeRangeOption) isSettableTransportProtocolOption() {}
  1091  
  1092  // TCPReceiveBufferSizeRangeOption is the receive buffer size range for TCP.
  1093  type TCPReceiveBufferSizeRangeOption struct {
  1094  	Min     int
  1095  	Default int
  1096  	Max     int
  1097  }
  1098  
  1099  func (*TCPReceiveBufferSizeRangeOption) isGettableTransportProtocolOption() {}
  1100  
  1101  func (*TCPReceiveBufferSizeRangeOption) isSettableTransportProtocolOption() {}
  1102  
  1103  // TCPAvailableCongestionControlOption is the supported congestion control
  1104  // algorithms for TCP
  1105  type TCPAvailableCongestionControlOption string
  1106  
  1107  func (*TCPAvailableCongestionControlOption) isGettableTransportProtocolOption() {}
  1108  
  1109  func (*TCPAvailableCongestionControlOption) isSettableTransportProtocolOption() {}
  1110  
  1111  // TCPModerateReceiveBufferOption enables/disables receive buffer moderation
  1112  // for TCP.
  1113  type TCPModerateReceiveBufferOption bool
  1114  
  1115  func (*TCPModerateReceiveBufferOption) isGettableTransportProtocolOption() {}
  1116  
  1117  func (*TCPModerateReceiveBufferOption) isSettableTransportProtocolOption() {}
  1118  
  1119  // GettableSocketOption is a marker interface for socket options that may be
  1120  // queried.
  1121  type GettableSocketOption interface {
  1122  	isGettableSocketOption()
  1123  }
  1124  
  1125  // SettableSocketOption is a marker interface for socket options that may be
  1126  // configured.
  1127  type SettableSocketOption interface {
  1128  	isSettableSocketOption()
  1129  }
  1130  
  1131  // ICMPv6Filter specifes a filter for ICMPv6 types.
  1132  //
  1133  // +stateify savable
  1134  type ICMPv6Filter struct {
  1135  	// DenyType indicates if an ICMP type should be blocked.
  1136  	//
  1137  	// The ICMPv6 type field is 8 bits so there are up to 256 different ICMPv6
  1138  	// types.
  1139  	DenyType [8]uint32
  1140  }
  1141  
  1142  // ShouldDeny returns true iff the ICMPv6 Type should be denied.
  1143  func (f *ICMPv6Filter) ShouldDeny(icmpType uint8) bool {
  1144  	const bitsInUint32 = 32
  1145  	i := icmpType / bitsInUint32
  1146  	b := icmpType % bitsInUint32
  1147  	return f.DenyType[i]&(1<<b) != 0
  1148  }
  1149  
  1150  func (*ICMPv6Filter) isGettableSocketOption() {}
  1151  
  1152  func (*ICMPv6Filter) isSettableSocketOption() {}
  1153  
  1154  // EndpointState represents the state of an endpoint.
  1155  type EndpointState uint8
  1156  
  1157  // CongestionControlState indicates the current congestion control state for
  1158  // TCP sender.
  1159  type CongestionControlState int
  1160  
  1161  const (
  1162  	// Open indicates that the sender is receiving acks in order and
  1163  	// no loss or dupACK's etc have been detected.
  1164  	Open CongestionControlState = iota
  1165  	// RTORecovery indicates that an RTO has occurred and the sender
  1166  	// has entered an RTO based recovery phase.
  1167  	RTORecovery
  1168  	// FastRecovery indicates that the sender has entered FastRecovery
  1169  	// based on receiving nDupAck's. This state is entered only when
  1170  	// SACK is not in use.
  1171  	FastRecovery
  1172  	// SACKRecovery indicates that the sender has entered SACK based
  1173  	// recovery.
  1174  	SACKRecovery
  1175  	// Disorder indicates the sender either received some SACK blocks
  1176  	// or dupACK's.
  1177  	Disorder
  1178  )
  1179  
  1180  // TCPInfoOption is used by GetSockOpt to expose TCP statistics.
  1181  //
  1182  // TODO(b/64800844): Add and populate stat fields.
  1183  type TCPInfoOption struct {
  1184  	// RTT is the smoothed round trip time.
  1185  	RTT time.Duration
  1186  
  1187  	// RTTVar is the round trip time variation.
  1188  	RTTVar time.Duration
  1189  
  1190  	// RTO is the retransmission timeout for the endpoint.
  1191  	RTO time.Duration
  1192  
  1193  	// State is the current endpoint protocol state.
  1194  	State EndpointState
  1195  
  1196  	// CcState is the congestion control state.
  1197  	CcState CongestionControlState
  1198  
  1199  	// SndCwnd is the congestion window, in packets.
  1200  	SndCwnd uint32
  1201  
  1202  	// SndSsthresh is the threshold between slow start and congestion
  1203  	// avoidance.
  1204  	SndSsthresh uint32
  1205  
  1206  	// ReorderSeen indicates if reordering is seen in the endpoint.
  1207  	ReorderSeen bool
  1208  }
  1209  
  1210  func (*TCPInfoOption) isGettableSocketOption() {}
  1211  
  1212  // KeepaliveIdleOption is used by SetSockOpt/GetSockOpt to specify the time a
  1213  // connection must remain idle before the first TCP keepalive packet is sent.
  1214  // Once this time is reached, KeepaliveIntervalOption is used instead.
  1215  type KeepaliveIdleOption time.Duration
  1216  
  1217  func (*KeepaliveIdleOption) isGettableSocketOption() {}
  1218  
  1219  func (*KeepaliveIdleOption) isSettableSocketOption() {}
  1220  
  1221  // KeepaliveIntervalOption is used by SetSockOpt/GetSockOpt to specify the
  1222  // interval between sending TCP keepalive packets.
  1223  type KeepaliveIntervalOption time.Duration
  1224  
  1225  func (*KeepaliveIntervalOption) isGettableSocketOption() {}
  1226  
  1227  func (*KeepaliveIntervalOption) isSettableSocketOption() {}
  1228  
  1229  // TCPUserTimeoutOption is used by SetSockOpt/GetSockOpt to specify a user
  1230  // specified timeout for a given TCP connection.
  1231  // See: RFC5482 for details.
  1232  type TCPUserTimeoutOption time.Duration
  1233  
  1234  func (*TCPUserTimeoutOption) isGettableSocketOption() {}
  1235  
  1236  func (*TCPUserTimeoutOption) isSettableSocketOption() {}
  1237  
  1238  // CongestionControlOption is used by SetSockOpt/GetSockOpt to set/get
  1239  // the current congestion control algorithm.
  1240  type CongestionControlOption string
  1241  
  1242  func (*CongestionControlOption) isGettableSocketOption() {}
  1243  
  1244  func (*CongestionControlOption) isSettableSocketOption() {}
  1245  
  1246  func (*CongestionControlOption) isGettableTransportProtocolOption() {}
  1247  
  1248  func (*CongestionControlOption) isSettableTransportProtocolOption() {}
  1249  
  1250  // TCPLingerTimeoutOption is used by SetSockOpt/GetSockOpt to set/get the
  1251  // maximum duration for which a socket lingers in the TCP_FIN_WAIT_2 state
  1252  // before being marked closed.
  1253  type TCPLingerTimeoutOption time.Duration
  1254  
  1255  func (*TCPLingerTimeoutOption) isGettableSocketOption() {}
  1256  
  1257  func (*TCPLingerTimeoutOption) isSettableSocketOption() {}
  1258  
  1259  func (*TCPLingerTimeoutOption) isGettableTransportProtocolOption() {}
  1260  
  1261  func (*TCPLingerTimeoutOption) isSettableTransportProtocolOption() {}
  1262  
  1263  // TCPTimeWaitTimeoutOption is used by SetSockOpt/GetSockOpt to set/get the
  1264  // maximum duration for which a socket lingers in the TIME_WAIT state
  1265  // before being marked closed.
  1266  type TCPTimeWaitTimeoutOption time.Duration
  1267  
  1268  func (*TCPTimeWaitTimeoutOption) isGettableSocketOption() {}
  1269  
  1270  func (*TCPTimeWaitTimeoutOption) isSettableSocketOption() {}
  1271  
  1272  func (*TCPTimeWaitTimeoutOption) isGettableTransportProtocolOption() {}
  1273  
  1274  func (*TCPTimeWaitTimeoutOption) isSettableTransportProtocolOption() {}
  1275  
  1276  // TCPDeferAcceptOption is used by SetSockOpt/GetSockOpt to allow a
  1277  // accept to return a completed connection only when there is data to be
  1278  // read. This usually means the listening socket will drop the final ACK
  1279  // for a handshake till the specified timeout until a segment with data arrives.
  1280  type TCPDeferAcceptOption time.Duration
  1281  
  1282  func (*TCPDeferAcceptOption) isGettableSocketOption() {}
  1283  
  1284  func (*TCPDeferAcceptOption) isSettableSocketOption() {}
  1285  
  1286  // TCPMinRTOOption is use by SetSockOpt/GetSockOpt to allow overriding
  1287  // default MinRTO used by the Stack.
  1288  type TCPMinRTOOption time.Duration
  1289  
  1290  func (*TCPMinRTOOption) isGettableSocketOption() {}
  1291  
  1292  func (*TCPMinRTOOption) isSettableSocketOption() {}
  1293  
  1294  func (*TCPMinRTOOption) isGettableTransportProtocolOption() {}
  1295  
  1296  func (*TCPMinRTOOption) isSettableTransportProtocolOption() {}
  1297  
  1298  // TCPMaxRTOOption is use by SetSockOpt/GetSockOpt to allow overriding
  1299  // default MaxRTO used by the Stack.
  1300  type TCPMaxRTOOption time.Duration
  1301  
  1302  func (*TCPMaxRTOOption) isGettableSocketOption() {}
  1303  
  1304  func (*TCPMaxRTOOption) isSettableSocketOption() {}
  1305  
  1306  func (*TCPMaxRTOOption) isGettableTransportProtocolOption() {}
  1307  
  1308  func (*TCPMaxRTOOption) isSettableTransportProtocolOption() {}
  1309  
  1310  // TCPMaxRetriesOption is used by SetSockOpt/GetSockOpt to set/get the
  1311  // maximum number of retransmits after which we time out the connection.
  1312  type TCPMaxRetriesOption uint64
  1313  
  1314  func (*TCPMaxRetriesOption) isGettableSocketOption() {}
  1315  
  1316  func (*TCPMaxRetriesOption) isSettableSocketOption() {}
  1317  
  1318  func (*TCPMaxRetriesOption) isGettableTransportProtocolOption() {}
  1319  
  1320  func (*TCPMaxRetriesOption) isSettableTransportProtocolOption() {}
  1321  
  1322  // TCPSynRetriesOption is used by SetSockOpt/GetSockOpt to specify stack-wide
  1323  // default for number of times SYN is retransmitted before aborting a connect.
  1324  type TCPSynRetriesOption uint8
  1325  
  1326  func (*TCPSynRetriesOption) isGettableSocketOption() {}
  1327  
  1328  func (*TCPSynRetriesOption) isSettableSocketOption() {}
  1329  
  1330  func (*TCPSynRetriesOption) isGettableTransportProtocolOption() {}
  1331  
  1332  func (*TCPSynRetriesOption) isSettableTransportProtocolOption() {}
  1333  
  1334  // MulticastInterfaceOption is used by SetSockOpt/GetSockOpt to specify a
  1335  // default interface for multicast.
  1336  type MulticastInterfaceOption struct {
  1337  	NIC           NICID
  1338  	InterfaceAddr Address
  1339  }
  1340  
  1341  func (*MulticastInterfaceOption) isGettableSocketOption() {}
  1342  
  1343  func (*MulticastInterfaceOption) isSettableSocketOption() {}
  1344  
  1345  // MembershipOption is used to identify a multicast membership on an interface.
  1346  type MembershipOption struct {
  1347  	NIC           NICID
  1348  	InterfaceAddr Address
  1349  	MulticastAddr Address
  1350  }
  1351  
  1352  // AddMembershipOption identifies a multicast group to join on some interface.
  1353  type AddMembershipOption MembershipOption
  1354  
  1355  func (*AddMembershipOption) isSettableSocketOption() {}
  1356  
  1357  // RemoveMembershipOption identifies a multicast group to leave on some
  1358  // interface.
  1359  type RemoveMembershipOption MembershipOption
  1360  
  1361  func (*RemoveMembershipOption) isSettableSocketOption() {}
  1362  
  1363  // SocketDetachFilterOption is used by SetSockOpt to detach a previously attached
  1364  // classic BPF filter on a given endpoint.
  1365  type SocketDetachFilterOption int
  1366  
  1367  func (*SocketDetachFilterOption) isSettableSocketOption() {}
  1368  
  1369  // OriginalDestinationOption is used to get the original destination address
  1370  // and port of a redirected packet.
  1371  type OriginalDestinationOption FullAddress
  1372  
  1373  func (*OriginalDestinationOption) isGettableSocketOption() {}
  1374  
  1375  // TCPTimeWaitReuseOption is used stack.(*Stack).TransportProtocolOption to
  1376  // specify if the stack can reuse the port bound by an endpoint in TIME-WAIT for
  1377  // new connections when it is safe from protocol viewpoint.
  1378  type TCPTimeWaitReuseOption uint8
  1379  
  1380  func (*TCPTimeWaitReuseOption) isGettableSocketOption() {}
  1381  
  1382  func (*TCPTimeWaitReuseOption) isSettableSocketOption() {}
  1383  
  1384  func (*TCPTimeWaitReuseOption) isGettableTransportProtocolOption() {}
  1385  
  1386  func (*TCPTimeWaitReuseOption) isSettableTransportProtocolOption() {}
  1387  
  1388  const (
  1389  	// TCPTimeWaitReuseDisabled indicates reuse of port bound by endponts in TIME-WAIT cannot
  1390  	// be reused for new connections.
  1391  	TCPTimeWaitReuseDisabled TCPTimeWaitReuseOption = iota
  1392  
  1393  	// TCPTimeWaitReuseGlobal indicates reuse of port bound by endponts in TIME-WAIT can
  1394  	// be reused for new connections irrespective of the src/dest addresses.
  1395  	TCPTimeWaitReuseGlobal
  1396  
  1397  	// TCPTimeWaitReuseLoopbackOnly indicates reuse of port bound by endpoint in TIME-WAIT can
  1398  	// only be reused if the connection was a connection over loopback. i.e src/dest adddresses
  1399  	// are loopback addresses.
  1400  	TCPTimeWaitReuseLoopbackOnly
  1401  )
  1402  
  1403  // LingerOption is used by SetSockOpt/GetSockOpt to set/get the
  1404  // duration for which a socket lingers before returning from Close.
  1405  //
  1406  // +marshal
  1407  // +stateify savable
  1408  type LingerOption struct {
  1409  	Enabled bool
  1410  	Timeout time.Duration
  1411  }
  1412  
  1413  // IPPacketInfo is the message structure for IP_PKTINFO.
  1414  //
  1415  // +stateify savable
  1416  type IPPacketInfo struct {
  1417  	// NIC is the ID of the NIC to be used.
  1418  	NIC NICID
  1419  
  1420  	// LocalAddr is the local address.
  1421  	LocalAddr Address
  1422  
  1423  	// DestinationAddr is the destination address found in the IP header.
  1424  	DestinationAddr Address
  1425  }
  1426  
  1427  // IPv6PacketInfo is the message structure for IPV6_PKTINFO.
  1428  //
  1429  // +stateify savable
  1430  type IPv6PacketInfo struct {
  1431  	Addr Address
  1432  	NIC  NICID
  1433  }
  1434  
  1435  // SendBufferSizeOption is used by stack.(Stack*).Option/SetOption to
  1436  // get/set the default, min and max send buffer sizes.
  1437  type SendBufferSizeOption struct {
  1438  	// Min is the minimum size for send buffer.
  1439  	Min int
  1440  
  1441  	// Default is the default size for send buffer.
  1442  	Default int
  1443  
  1444  	// Max is the maximum size for send buffer.
  1445  	Max int
  1446  }
  1447  
  1448  // ReceiveBufferSizeOption is used by stack.(Stack*).Option/SetOption to
  1449  // get/set the default, min and max receive buffer sizes.
  1450  type ReceiveBufferSizeOption struct {
  1451  	// Min is the minimum size for send buffer.
  1452  	Min int
  1453  
  1454  	// Default is the default size for send buffer.
  1455  	Default int
  1456  
  1457  	// Max is the maximum size for send buffer.
  1458  	Max int
  1459  }
  1460  
  1461  // GetSendBufferLimits is used to get the send buffer size limits.
  1462  type GetSendBufferLimits func(StackHandler) SendBufferSizeOption
  1463  
  1464  // GetStackSendBufferLimits is used to get default, min and max send buffer size.
  1465  func GetStackSendBufferLimits(so StackHandler) SendBufferSizeOption {
  1466  	var ss SendBufferSizeOption
  1467  	if err := so.Option(&ss); err != nil {
  1468  		panic(fmt.Sprintf("s.Option(%#v) = %s", ss, err))
  1469  	}
  1470  	return ss
  1471  }
  1472  
  1473  // GetReceiveBufferLimits is used to get the send buffer size limits.
  1474  type GetReceiveBufferLimits func(StackHandler) ReceiveBufferSizeOption
  1475  
  1476  // GetStackReceiveBufferLimits is used to get default, min and max send buffer size.
  1477  func GetStackReceiveBufferLimits(so StackHandler) ReceiveBufferSizeOption {
  1478  	var ss ReceiveBufferSizeOption
  1479  	if err := so.Option(&ss); err != nil {
  1480  		panic(fmt.Sprintf("s.Option(%#v) = %s", ss, err))
  1481  	}
  1482  	return ss
  1483  }
  1484  
  1485  // Route is a row in the routing table. It specifies through which NIC (and
  1486  // gateway) sets of packets should be routed. A row is considered viable if the
  1487  // masked target address matches the destination address in the row.
  1488  type Route struct {
  1489  	// Destination must contain the target address for this row to be viable.
  1490  	Destination Subnet
  1491  
  1492  	// Gateway is the gateway to be used if this row is viable.
  1493  	Gateway Address
  1494  
  1495  	// NIC is the id of the nic to be used if this row is viable.
  1496  	NIC NICID
  1497  }
  1498  
  1499  // String implements the fmt.Stringer interface.
  1500  func (r Route) String() string {
  1501  	var out strings.Builder
  1502  	_, _ = fmt.Fprintf(&out, "%s", r.Destination)
  1503  	if r.Gateway.length > 0 {
  1504  		_, _ = fmt.Fprintf(&out, " via %s", r.Gateway)
  1505  	}
  1506  	_, _ = fmt.Fprintf(&out, " nic %d", r.NIC)
  1507  	return out.String()
  1508  }
  1509  
  1510  // Equal returns true if the given Route is equal to this Route.
  1511  func (r Route) Equal(to Route) bool {
  1512  	// NOTE: This relies on the fact that r.Destination == to.Destination
  1513  	return r.Destination.Equal(to.Destination) && r.Gateway == to.Gateway && r.NIC == to.NIC
  1514  }
  1515  
  1516  // TransportProtocolNumber is the number of a transport protocol.
  1517  type TransportProtocolNumber uint32
  1518  
  1519  // NetworkProtocolNumber is the EtherType of a network protocol in an Ethernet
  1520  // frame.
  1521  //
  1522  // See: https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml
  1523  type NetworkProtocolNumber uint32
  1524  
  1525  // A StatCounter keeps track of a statistic.
  1526  //
  1527  // +stateify savable
  1528  type StatCounter struct {
  1529  	count atomicbitops.Uint64
  1530  }
  1531  
  1532  // Increment adds one to the counter.
  1533  func (s *StatCounter) Increment() {
  1534  	s.IncrementBy(1)
  1535  }
  1536  
  1537  // Decrement minuses one to the counter.
  1538  func (s *StatCounter) Decrement() {
  1539  	s.IncrementBy(^uint64(0))
  1540  }
  1541  
  1542  // Value returns the current value of the counter.
  1543  func (s *StatCounter) Value() uint64 {
  1544  	return s.count.Load()
  1545  }
  1546  
  1547  // IncrementBy increments the counter by v.
  1548  func (s *StatCounter) IncrementBy(v uint64) {
  1549  	s.count.Add(v)
  1550  }
  1551  
  1552  func (s *StatCounter) String() string {
  1553  	return strconv.FormatUint(s.Value(), 10)
  1554  }
  1555  
  1556  // A MultiCounterStat keeps track of two counters at once.
  1557  type MultiCounterStat struct {
  1558  	a *StatCounter
  1559  	b *StatCounter
  1560  }
  1561  
  1562  // Init sets both internal counters to point to a and b.
  1563  func (m *MultiCounterStat) Init(a, b *StatCounter) {
  1564  	m.a = a
  1565  	m.b = b
  1566  }
  1567  
  1568  // Increment adds one to the counters.
  1569  func (m *MultiCounterStat) Increment() {
  1570  	m.a.Increment()
  1571  	m.b.Increment()
  1572  }
  1573  
  1574  // IncrementBy increments the counters by v.
  1575  func (m *MultiCounterStat) IncrementBy(v uint64) {
  1576  	m.a.IncrementBy(v)
  1577  	m.b.IncrementBy(v)
  1578  }
  1579  
  1580  // ICMPv4PacketStats enumerates counts for all ICMPv4 packet types.
  1581  type ICMPv4PacketStats struct {
  1582  	// LINT.IfChange(ICMPv4PacketStats)
  1583  
  1584  	// EchoRequest is the number of ICMPv4 echo packets counted.
  1585  	EchoRequest *StatCounter
  1586  
  1587  	// EchoReply is the number of ICMPv4 echo reply packets counted.
  1588  	EchoReply *StatCounter
  1589  
  1590  	// DstUnreachable is the number of ICMPv4 destination unreachable packets
  1591  	// counted.
  1592  	DstUnreachable *StatCounter
  1593  
  1594  	// SrcQuench is the number of ICMPv4 source quench packets counted.
  1595  	SrcQuench *StatCounter
  1596  
  1597  	// Redirect is the number of ICMPv4 redirect packets counted.
  1598  	Redirect *StatCounter
  1599  
  1600  	// TimeExceeded is the number of ICMPv4 time exceeded packets counted.
  1601  	TimeExceeded *StatCounter
  1602  
  1603  	// ParamProblem is the number of ICMPv4 parameter problem packets counted.
  1604  	ParamProblem *StatCounter
  1605  
  1606  	// Timestamp is the number of ICMPv4 timestamp packets counted.
  1607  	Timestamp *StatCounter
  1608  
  1609  	// TimestampReply is the number of ICMPv4 timestamp reply packets counted.
  1610  	TimestampReply *StatCounter
  1611  
  1612  	// InfoRequest is the number of ICMPv4 information request packets counted.
  1613  	InfoRequest *StatCounter
  1614  
  1615  	// InfoReply is the number of ICMPv4 information reply packets counted.
  1616  	InfoReply *StatCounter
  1617  
  1618  	// LINT.ThenChange(network/ipv4/stats.go:multiCounterICMPv4PacketStats)
  1619  }
  1620  
  1621  // ICMPv4SentPacketStats collects outbound ICMPv4-specific stats.
  1622  type ICMPv4SentPacketStats struct {
  1623  	// LINT.IfChange(ICMPv4SentPacketStats)
  1624  
  1625  	ICMPv4PacketStats
  1626  
  1627  	// Dropped is the number of ICMPv4 packets dropped due to link layer errors.
  1628  	Dropped *StatCounter
  1629  
  1630  	// RateLimited is the number of ICMPv4 packets dropped due to rate limit being
  1631  	// exceeded.
  1632  	RateLimited *StatCounter
  1633  
  1634  	// LINT.ThenChange(network/ipv4/stats.go:multiCounterICMPv4SentPacketStats)
  1635  }
  1636  
  1637  // ICMPv4ReceivedPacketStats collects inbound ICMPv4-specific stats.
  1638  type ICMPv4ReceivedPacketStats struct {
  1639  	// LINT.IfChange(ICMPv4ReceivedPacketStats)
  1640  
  1641  	ICMPv4PacketStats
  1642  
  1643  	// Invalid is the number of invalid ICMPv4 packets received.
  1644  	Invalid *StatCounter
  1645  
  1646  	// LINT.ThenChange(network/ipv4/stats.go:multiCounterICMPv4ReceivedPacketStats)
  1647  }
  1648  
  1649  // ICMPv4Stats collects ICMPv4-specific stats.
  1650  type ICMPv4Stats struct {
  1651  	// LINT.IfChange(ICMPv4Stats)
  1652  
  1653  	// PacketsSent contains statistics about sent packets.
  1654  	PacketsSent ICMPv4SentPacketStats
  1655  
  1656  	// PacketsReceived contains statistics about received packets.
  1657  	PacketsReceived ICMPv4ReceivedPacketStats
  1658  
  1659  	// LINT.ThenChange(network/ipv4/stats.go:multiCounterICMPv4Stats)
  1660  }
  1661  
  1662  // ICMPv6PacketStats enumerates counts for all ICMPv6 packet types.
  1663  type ICMPv6PacketStats struct {
  1664  	// LINT.IfChange(ICMPv6PacketStats)
  1665  
  1666  	// EchoRequest is the number of ICMPv6 echo request packets counted.
  1667  	EchoRequest *StatCounter
  1668  
  1669  	// EchoReply is the number of ICMPv6 echo reply packets counted.
  1670  	EchoReply *StatCounter
  1671  
  1672  	// DstUnreachable is the number of ICMPv6 destination unreachable packets
  1673  	// counted.
  1674  	DstUnreachable *StatCounter
  1675  
  1676  	// PacketTooBig is the number of ICMPv6 packet too big packets counted.
  1677  	PacketTooBig *StatCounter
  1678  
  1679  	// TimeExceeded is the number of ICMPv6 time exceeded packets counted.
  1680  	TimeExceeded *StatCounter
  1681  
  1682  	// ParamProblem is the number of ICMPv6 parameter problem packets counted.
  1683  	ParamProblem *StatCounter
  1684  
  1685  	// RouterSolicit is the number of ICMPv6 router solicit packets counted.
  1686  	RouterSolicit *StatCounter
  1687  
  1688  	// RouterAdvert is the number of ICMPv6 router advert packets counted.
  1689  	RouterAdvert *StatCounter
  1690  
  1691  	// NeighborSolicit is the number of ICMPv6 neighbor solicit packets counted.
  1692  	NeighborSolicit *StatCounter
  1693  
  1694  	// NeighborAdvert is the number of ICMPv6 neighbor advert packets counted.
  1695  	NeighborAdvert *StatCounter
  1696  
  1697  	// RedirectMsg is the number of ICMPv6 redirect message packets counted.
  1698  	RedirectMsg *StatCounter
  1699  
  1700  	// MulticastListenerQuery is the number of Multicast Listener Query messages
  1701  	// counted.
  1702  	MulticastListenerQuery *StatCounter
  1703  
  1704  	// MulticastListenerReport is the number of Multicast Listener Report messages
  1705  	// counted.
  1706  	MulticastListenerReport *StatCounter
  1707  
  1708  	// MulticastListenerReportV2 is the number of Multicast Listener Report
  1709  	// messages counted.
  1710  	MulticastListenerReportV2 *StatCounter
  1711  
  1712  	// MulticastListenerDone is the number of Multicast Listener Done messages
  1713  	// counted.
  1714  	MulticastListenerDone *StatCounter
  1715  
  1716  	// LINT.ThenChange(network/ipv6/stats.go:multiCounterICMPv6PacketStats)
  1717  }
  1718  
  1719  // ICMPv6SentPacketStats collects outbound ICMPv6-specific stats.
  1720  type ICMPv6SentPacketStats struct {
  1721  	// LINT.IfChange(ICMPv6SentPacketStats)
  1722  
  1723  	ICMPv6PacketStats
  1724  
  1725  	// Dropped is the number of ICMPv6 packets dropped due to link layer errors.
  1726  	Dropped *StatCounter
  1727  
  1728  	// RateLimited is the number of ICMPv6 packets dropped due to rate limit being
  1729  	// exceeded.
  1730  	RateLimited *StatCounter
  1731  
  1732  	// LINT.ThenChange(network/ipv6/stats.go:multiCounterICMPv6SentPacketStats)
  1733  }
  1734  
  1735  // ICMPv6ReceivedPacketStats collects inbound ICMPv6-specific stats.
  1736  type ICMPv6ReceivedPacketStats struct {
  1737  	// LINT.IfChange(ICMPv6ReceivedPacketStats)
  1738  
  1739  	ICMPv6PacketStats
  1740  
  1741  	// Unrecognized is the number of ICMPv6 packets received that the transport
  1742  	// layer does not know how to parse.
  1743  	Unrecognized *StatCounter
  1744  
  1745  	// Invalid is the number of invalid ICMPv6 packets received.
  1746  	Invalid *StatCounter
  1747  
  1748  	// RouterOnlyPacketsDroppedByHost is the number of ICMPv6 packets dropped due
  1749  	// to being router-specific packets.
  1750  	RouterOnlyPacketsDroppedByHost *StatCounter
  1751  
  1752  	// LINT.ThenChange(network/ipv6/stats.go:multiCounterICMPv6ReceivedPacketStats)
  1753  }
  1754  
  1755  // ICMPv6Stats collects ICMPv6-specific stats.
  1756  type ICMPv6Stats struct {
  1757  	// LINT.IfChange(ICMPv6Stats)
  1758  
  1759  	// PacketsSent contains statistics about sent packets.
  1760  	PacketsSent ICMPv6SentPacketStats
  1761  
  1762  	// PacketsReceived contains statistics about received packets.
  1763  	PacketsReceived ICMPv6ReceivedPacketStats
  1764  
  1765  	// LINT.ThenChange(network/ipv6/stats.go:multiCounterICMPv6Stats)
  1766  }
  1767  
  1768  // ICMPStats collects ICMP-specific stats (both v4 and v6).
  1769  type ICMPStats struct {
  1770  	// V4 contains the ICMPv4-specifics stats.
  1771  	V4 ICMPv4Stats
  1772  
  1773  	// V6 contains the ICMPv4-specifics stats.
  1774  	V6 ICMPv6Stats
  1775  }
  1776  
  1777  // IGMPPacketStats enumerates counts for all IGMP packet types.
  1778  type IGMPPacketStats struct {
  1779  	// LINT.IfChange(IGMPPacketStats)
  1780  
  1781  	// MembershipQuery is the number of Membership Query messages counted.
  1782  	MembershipQuery *StatCounter
  1783  
  1784  	// V1MembershipReport is the number of Version 1 Membership Report messages
  1785  	// counted.
  1786  	V1MembershipReport *StatCounter
  1787  
  1788  	// V2MembershipReport is the number of Version 2 Membership Report messages
  1789  	// counted.
  1790  	V2MembershipReport *StatCounter
  1791  
  1792  	// V3MembershipReport is the number of Version 3 Membership Report messages
  1793  	// counted.
  1794  	V3MembershipReport *StatCounter
  1795  
  1796  	// LeaveGroup is the number of Leave Group messages counted.
  1797  	LeaveGroup *StatCounter
  1798  
  1799  	// LINT.ThenChange(network/ipv4/stats.go:multiCounterIGMPPacketStats)
  1800  }
  1801  
  1802  // IGMPSentPacketStats collects outbound IGMP-specific stats.
  1803  type IGMPSentPacketStats struct {
  1804  	// LINT.IfChange(IGMPSentPacketStats)
  1805  
  1806  	IGMPPacketStats
  1807  
  1808  	// Dropped is the number of IGMP packets dropped.
  1809  	Dropped *StatCounter
  1810  
  1811  	// LINT.ThenChange(network/ipv4/stats.go:multiCounterIGMPSentPacketStats)
  1812  }
  1813  
  1814  // IGMPReceivedPacketStats collects inbound IGMP-specific stats.
  1815  type IGMPReceivedPacketStats struct {
  1816  	// LINT.IfChange(IGMPReceivedPacketStats)
  1817  
  1818  	IGMPPacketStats
  1819  
  1820  	// Invalid is the number of invalid IGMP packets received.
  1821  	Invalid *StatCounter
  1822  
  1823  	// ChecksumErrors is the number of IGMP packets dropped due to bad checksums.
  1824  	ChecksumErrors *StatCounter
  1825  
  1826  	// Unrecognized is the number of unrecognized messages counted, these are
  1827  	// silently ignored for forward-compatibilty.
  1828  	Unrecognized *StatCounter
  1829  
  1830  	// LINT.ThenChange(network/ipv4/stats.go:multiCounterIGMPReceivedPacketStats)
  1831  }
  1832  
  1833  // IGMPStats collects IGMP-specific stats.
  1834  type IGMPStats struct {
  1835  	// LINT.IfChange(IGMPStats)
  1836  
  1837  	// PacketsSent contains statistics about sent packets.
  1838  	PacketsSent IGMPSentPacketStats
  1839  
  1840  	// PacketsReceived contains statistics about received packets.
  1841  	PacketsReceived IGMPReceivedPacketStats
  1842  
  1843  	// LINT.ThenChange(network/ipv4/stats.go:multiCounterIGMPStats)
  1844  }
  1845  
  1846  // IPForwardingStats collects stats related to IP forwarding (both v4 and v6).
  1847  type IPForwardingStats struct {
  1848  	// LINT.IfChange(IPForwardingStats)
  1849  
  1850  	// Unrouteable is the number of IP packets received which were dropped
  1851  	// because a route to their destination could not be constructed.
  1852  	Unrouteable *StatCounter
  1853  
  1854  	// ExhaustedTTL is the number of IP packets received which were dropped
  1855  	// because their TTL was exhausted.
  1856  	ExhaustedTTL *StatCounter
  1857  
  1858  	// InitializingSource is the number of IP packets which were dropped
  1859  	// because they contained a source address that may only be used on the local
  1860  	// network as part of initialization work.
  1861  	InitializingSource *StatCounter
  1862  
  1863  	// LinkLocalSource is the number of IP packets which were dropped
  1864  	// because they contained a link-local source address.
  1865  	LinkLocalSource *StatCounter
  1866  
  1867  	// LinkLocalDestination is the number of IP packets which were dropped
  1868  	// because they contained a link-local destination address.
  1869  	LinkLocalDestination *StatCounter
  1870  
  1871  	// PacketTooBig is the number of IP packets which were dropped because they
  1872  	// were too big for the outgoing MTU.
  1873  	PacketTooBig *StatCounter
  1874  
  1875  	// HostUnreachable is the number of IP packets received which could not be
  1876  	// successfully forwarded due to an unresolvable next hop.
  1877  	HostUnreachable *StatCounter
  1878  
  1879  	// ExtensionHeaderProblem is the number of IP packets which were dropped
  1880  	// because of a problem encountered when processing an IPv6 extension
  1881  	// header.
  1882  	ExtensionHeaderProblem *StatCounter
  1883  
  1884  	// UnexpectedMulticastInputInterface is the number of multicast packets that
  1885  	// were received on an interface that did not match the corresponding route's
  1886  	// expected input interface.
  1887  	UnexpectedMulticastInputInterface *StatCounter
  1888  
  1889  	// UnknownOutputEndpoint is the number of packets that could not be forwarded
  1890  	// because the output endpoint could not be found.
  1891  	UnknownOutputEndpoint *StatCounter
  1892  
  1893  	// NoMulticastPendingQueueBufferSpace is the number of multicast packets that
  1894  	// were dropped due to insufficent buffer space in the pending packet queue.
  1895  	NoMulticastPendingQueueBufferSpace *StatCounter
  1896  
  1897  	// OutgoingDeviceNoBufferSpace is the number of packets that were dropped due
  1898  	// to insufficient space in the outgoing device.
  1899  	OutgoingDeviceNoBufferSpace *StatCounter
  1900  
  1901  	// Errors is the number of IP packets received which could not be
  1902  	// successfully forwarded.
  1903  	Errors *StatCounter
  1904  
  1905  	// LINT.ThenChange(network/internal/ip/stats.go:MultiCounterIPForwardingStats)
  1906  }
  1907  
  1908  // IPStats collects IP-specific stats (both v4 and v6).
  1909  type IPStats struct {
  1910  	// LINT.IfChange(IPStats)
  1911  
  1912  	// PacketsReceived is the number of IP packets received from the link layer.
  1913  	PacketsReceived *StatCounter
  1914  
  1915  	// ValidPacketsReceived is the number of valid IP packets that reached the IP
  1916  	// layer.
  1917  	ValidPacketsReceived *StatCounter
  1918  
  1919  	// DisabledPacketsReceived is the number of IP packets received from the link
  1920  	// layer when the IP layer is disabled.
  1921  	DisabledPacketsReceived *StatCounter
  1922  
  1923  	// InvalidDestinationAddressesReceived is the number of IP packets received
  1924  	// with an unknown or invalid destination address.
  1925  	InvalidDestinationAddressesReceived *StatCounter
  1926  
  1927  	// InvalidSourceAddressesReceived is the number of IP packets received with a
  1928  	// source address that should never have been received on the wire.
  1929  	InvalidSourceAddressesReceived *StatCounter
  1930  
  1931  	// PacketsDelivered is the number of incoming IP packets that are successfully
  1932  	// delivered to the transport layer.
  1933  	PacketsDelivered *StatCounter
  1934  
  1935  	// PacketsSent is the number of IP packets sent via WritePacket.
  1936  	PacketsSent *StatCounter
  1937  
  1938  	// OutgoingPacketErrors is the number of IP packets which failed to write to a
  1939  	// link-layer endpoint.
  1940  	OutgoingPacketErrors *StatCounter
  1941  
  1942  	// MalformedPacketsReceived is the number of IP Packets that were dropped due
  1943  	// to the IP packet header failing validation checks.
  1944  	MalformedPacketsReceived *StatCounter
  1945  
  1946  	// MalformedFragmentsReceived is the number of IP Fragments that were dropped
  1947  	// due to the fragment failing validation checks.
  1948  	MalformedFragmentsReceived *StatCounter
  1949  
  1950  	// IPTablesPreroutingDropped is the number of IP packets dropped in the
  1951  	// Prerouting chain.
  1952  	IPTablesPreroutingDropped *StatCounter
  1953  
  1954  	// IPTablesInputDropped is the number of IP packets dropped in the Input
  1955  	// chain.
  1956  	IPTablesInputDropped *StatCounter
  1957  
  1958  	// IPTablesForwardDropped is the number of IP packets dropped in the Forward
  1959  	// chain.
  1960  	IPTablesForwardDropped *StatCounter
  1961  
  1962  	// IPTablesOutputDropped is the number of IP packets dropped in the Output
  1963  	// chain.
  1964  	IPTablesOutputDropped *StatCounter
  1965  
  1966  	// IPTablesPostroutingDropped is the number of IP packets dropped in the
  1967  	// Postrouting chain.
  1968  	IPTablesPostroutingDropped *StatCounter
  1969  
  1970  	// TODO(https://gvisor.dev/issues/5529): Move the IPv4-only option stats out
  1971  	// of IPStats.
  1972  	// OptionTimestampReceived is the number of Timestamp options seen.
  1973  	OptionTimestampReceived *StatCounter
  1974  
  1975  	// OptionRecordRouteReceived is the number of Record Route options seen.
  1976  	OptionRecordRouteReceived *StatCounter
  1977  
  1978  	// OptionRouterAlertReceived is the number of Router Alert options seen.
  1979  	OptionRouterAlertReceived *StatCounter
  1980  
  1981  	// OptionUnknownReceived is the number of unknown IP options seen.
  1982  	OptionUnknownReceived *StatCounter
  1983  
  1984  	// Forwarding collects stats related to IP forwarding.
  1985  	Forwarding IPForwardingStats
  1986  
  1987  	// LINT.ThenChange(network/internal/ip/stats.go:MultiCounterIPStats)
  1988  }
  1989  
  1990  // ARPStats collects ARP-specific stats.
  1991  type ARPStats struct {
  1992  	// LINT.IfChange(ARPStats)
  1993  
  1994  	// PacketsReceived is the number of ARP packets received from the link layer.
  1995  	PacketsReceived *StatCounter
  1996  
  1997  	// DisabledPacketsReceived is the number of ARP packets received from the link
  1998  	// layer when the ARP layer is disabled.
  1999  	DisabledPacketsReceived *StatCounter
  2000  
  2001  	// MalformedPacketsReceived is the number of ARP packets that were dropped due
  2002  	// to being malformed.
  2003  	MalformedPacketsReceived *StatCounter
  2004  
  2005  	// RequestsReceived is the number of ARP requests received.
  2006  	RequestsReceived *StatCounter
  2007  
  2008  	// RequestsReceivedUnknownTargetAddress is the number of ARP requests that
  2009  	// were targeted to an interface different from the one it was received on.
  2010  	RequestsReceivedUnknownTargetAddress *StatCounter
  2011  
  2012  	// OutgoingRequestInterfaceHasNoLocalAddressErrors is the number of failures
  2013  	// to send an ARP request because the interface has no network address
  2014  	// assigned to it.
  2015  	OutgoingRequestInterfaceHasNoLocalAddressErrors *StatCounter
  2016  
  2017  	// OutgoingRequestBadLocalAddressErrors is the number of failures to send an
  2018  	// ARP request with a bad local address.
  2019  	OutgoingRequestBadLocalAddressErrors *StatCounter
  2020  
  2021  	// OutgoingRequestsDropped is the number of ARP requests which failed to write
  2022  	// to a link-layer endpoint.
  2023  	OutgoingRequestsDropped *StatCounter
  2024  
  2025  	// OutgoingRequestSent is the number of ARP requests successfully written to a
  2026  	// link-layer endpoint.
  2027  	OutgoingRequestsSent *StatCounter
  2028  
  2029  	// RepliesReceived is the number of ARP replies received.
  2030  	RepliesReceived *StatCounter
  2031  
  2032  	// OutgoingRepliesDropped is the number of ARP replies which failed to write
  2033  	// to a link-layer endpoint.
  2034  	OutgoingRepliesDropped *StatCounter
  2035  
  2036  	// OutgoingRepliesSent is the number of ARP replies successfully written to a
  2037  	// link-layer endpoint.
  2038  	OutgoingRepliesSent *StatCounter
  2039  
  2040  	// LINT.ThenChange(network/arp/stats.go:multiCounterARPStats)
  2041  }
  2042  
  2043  // TCPStats collects TCP-specific stats.
  2044  type TCPStats struct {
  2045  	// ActiveConnectionOpenings is the number of connections opened
  2046  	// successfully via Connect.
  2047  	ActiveConnectionOpenings *StatCounter
  2048  
  2049  	// PassiveConnectionOpenings is the number of connections opened
  2050  	// successfully via Listen.
  2051  	PassiveConnectionOpenings *StatCounter
  2052  
  2053  	// CurrentEstablished is the number of TCP connections for which the
  2054  	// current state is ESTABLISHED.
  2055  	CurrentEstablished *StatCounter
  2056  
  2057  	// CurrentConnected is the number of TCP connections that
  2058  	// are in connected state.
  2059  	CurrentConnected *StatCounter
  2060  
  2061  	// EstablishedResets is the number of times TCP connections have made
  2062  	// a direct transition to the CLOSED state from either the
  2063  	// ESTABLISHED state or the CLOSE-WAIT state.
  2064  	EstablishedResets *StatCounter
  2065  
  2066  	// EstablishedClosed is the number of times established TCP connections
  2067  	// made a transition to CLOSED state.
  2068  	EstablishedClosed *StatCounter
  2069  
  2070  	// EstablishedTimedout is the number of times an established connection
  2071  	// was reset because of keep-alive time out.
  2072  	EstablishedTimedout *StatCounter
  2073  
  2074  	// ListenOverflowSynDrop is the number of times the listen queue overflowed
  2075  	// and a SYN was dropped.
  2076  	ListenOverflowSynDrop *StatCounter
  2077  
  2078  	// ListenOverflowAckDrop is the number of times the final ACK
  2079  	// in the handshake was dropped due to overflow.
  2080  	ListenOverflowAckDrop *StatCounter
  2081  
  2082  	// ListenOverflowCookieSent is the number of times a SYN cookie was sent.
  2083  	ListenOverflowSynCookieSent *StatCounter
  2084  
  2085  	// ListenOverflowSynCookieRcvd is the number of times a valid SYN
  2086  	// cookie was received.
  2087  	ListenOverflowSynCookieRcvd *StatCounter
  2088  
  2089  	// ListenOverflowInvalidSynCookieRcvd is the number of times an invalid SYN cookie
  2090  	// was received.
  2091  	ListenOverflowInvalidSynCookieRcvd *StatCounter
  2092  
  2093  	// FailedConnectionAttempts is the number of calls to Connect or Listen
  2094  	// (active and passive openings, respectively) that end in an error.
  2095  	FailedConnectionAttempts *StatCounter
  2096  
  2097  	// ValidSegmentsReceived is the number of TCP segments received that
  2098  	// the transport layer successfully parsed.
  2099  	ValidSegmentsReceived *StatCounter
  2100  
  2101  	// InvalidSegmentsReceived is the number of TCP segments received that
  2102  	// the transport layer could not parse.
  2103  	InvalidSegmentsReceived *StatCounter
  2104  
  2105  	// SegmentsSent is the number of TCP segments sent.
  2106  	SegmentsSent *StatCounter
  2107  
  2108  	// SegmentSendErrors is the number of TCP segments failed to be sent.
  2109  	SegmentSendErrors *StatCounter
  2110  
  2111  	// ResetsSent is the number of TCP resets sent.
  2112  	ResetsSent *StatCounter
  2113  
  2114  	// ResetsReceived is the number of TCP resets received.
  2115  	ResetsReceived *StatCounter
  2116  
  2117  	// Retransmits is the number of TCP segments retransmitted.
  2118  	Retransmits *StatCounter
  2119  
  2120  	// FastRecovery is the number of times Fast Recovery was used to
  2121  	// recover from packet loss.
  2122  	FastRecovery *StatCounter
  2123  
  2124  	// SACKRecovery is the number of times SACK Recovery was used to
  2125  	// recover from packet loss.
  2126  	SACKRecovery *StatCounter
  2127  
  2128  	// TLPRecovery is the number of times recovery was accomplished by the tail
  2129  	// loss probe.
  2130  	TLPRecovery *StatCounter
  2131  
  2132  	// SlowStartRetransmits is the number of segments retransmitted in slow
  2133  	// start.
  2134  	SlowStartRetransmits *StatCounter
  2135  
  2136  	// FastRetransmit is the number of segments retransmitted in fast
  2137  	// recovery.
  2138  	FastRetransmit *StatCounter
  2139  
  2140  	// Timeouts is the number of times the RTO expired.
  2141  	Timeouts *StatCounter
  2142  
  2143  	// ChecksumErrors is the number of segments dropped due to bad checksums.
  2144  	ChecksumErrors *StatCounter
  2145  
  2146  	// FailedPortReservations is the number of times TCP failed to reserve
  2147  	// a port.
  2148  	FailedPortReservations *StatCounter
  2149  
  2150  	// SegmentsAckedWithDSACK is the number of segments acknowledged with
  2151  	// DSACK.
  2152  	SegmentsAckedWithDSACK *StatCounter
  2153  
  2154  	// SpuriousRecovery is the number of times the connection entered loss
  2155  	// recovery spuriously.
  2156  	SpuriousRecovery *StatCounter
  2157  
  2158  	// SpuriousRTORecovery is the number of spurious RTOs.
  2159  	SpuriousRTORecovery *StatCounter
  2160  
  2161  	// ForwardMaxInFlightDrop is the number of connection requests that are
  2162  	// dropped due to exceeding the maximum number of in-flight connection
  2163  	// requests.
  2164  	ForwardMaxInFlightDrop *StatCounter
  2165  }
  2166  
  2167  // UDPStats collects UDP-specific stats.
  2168  type UDPStats struct {
  2169  	// PacketsReceived is the number of UDP datagrams received via
  2170  	// HandlePacket.
  2171  	PacketsReceived *StatCounter
  2172  
  2173  	// UnknownPortErrors is the number of incoming UDP datagrams dropped
  2174  	// because they did not have a known destination port.
  2175  	UnknownPortErrors *StatCounter
  2176  
  2177  	// ReceiveBufferErrors is the number of incoming UDP datagrams dropped
  2178  	// due to the receiving buffer being in an invalid state.
  2179  	ReceiveBufferErrors *StatCounter
  2180  
  2181  	// MalformedPacketsReceived is the number of incoming UDP datagrams
  2182  	// dropped due to the UDP header being in a malformed state.
  2183  	MalformedPacketsReceived *StatCounter
  2184  
  2185  	// PacketsSent is the number of UDP datagrams sent via sendUDP.
  2186  	PacketsSent *StatCounter
  2187  
  2188  	// PacketSendErrors is the number of datagrams failed to be sent.
  2189  	PacketSendErrors *StatCounter
  2190  
  2191  	// ChecksumErrors is the number of datagrams dropped due to bad checksums.
  2192  	ChecksumErrors *StatCounter
  2193  }
  2194  
  2195  // NICNeighborStats holds metrics for the neighbor table.
  2196  type NICNeighborStats struct {
  2197  	// LINT.IfChange(NICNeighborStats)
  2198  
  2199  	// UnreachableEntryLookups counts the number of lookups performed on an
  2200  	// entry in Unreachable state.
  2201  	UnreachableEntryLookups *StatCounter
  2202  
  2203  	// DroppedConfirmationForNoninitiatedNeighbor counts the number of neighbor
  2204  	// responses that were dropped because they didn't match an entry in the
  2205  	// cache.
  2206  	DroppedConfirmationForNoninitiatedNeighbor *StatCounter
  2207  
  2208  	// DroppedInvalidLinkAddressConfirmations counts the number of neighbor
  2209  	// responses that were ignored because they had an invalid source link-layer
  2210  	// address.
  2211  	DroppedInvalidLinkAddressConfirmations *StatCounter
  2212  
  2213  	// LINT.ThenChange(stack/nic_stats.go:multiCounterNICNeighborStats)
  2214  }
  2215  
  2216  // NICPacketStats holds basic packet statistics.
  2217  type NICPacketStats struct {
  2218  	// LINT.IfChange(NICPacketStats)
  2219  
  2220  	// Packets is the number of packets counted.
  2221  	Packets *StatCounter
  2222  
  2223  	// Bytes is the number of bytes counted.
  2224  	Bytes *StatCounter
  2225  
  2226  	// LINT.ThenChange(stack/nic_stats.go:multiCounterNICPacketStats)
  2227  }
  2228  
  2229  // IntegralStatCounterMap holds a map associating integral keys with
  2230  // StatCounters.
  2231  type IntegralStatCounterMap struct {
  2232  	mu sync.RWMutex
  2233  	// +checklocks:mu
  2234  	counterMap map[uint64]*StatCounter
  2235  }
  2236  
  2237  // Keys returns all keys present in the map.
  2238  func (m *IntegralStatCounterMap) Keys() []uint64 {
  2239  	m.mu.RLock()
  2240  	defer m.mu.RUnlock()
  2241  	var keys []uint64
  2242  	for k := range m.counterMap {
  2243  		keys = append(keys, k)
  2244  	}
  2245  	return keys
  2246  }
  2247  
  2248  // Get returns the counter mapped by the provided key.
  2249  func (m *IntegralStatCounterMap) Get(key uint64) (*StatCounter, bool) {
  2250  	m.mu.RLock()
  2251  	defer m.mu.RUnlock()
  2252  	counter, ok := m.counterMap[key]
  2253  	return counter, ok
  2254  }
  2255  
  2256  // Init initializes the map.
  2257  func (m *IntegralStatCounterMap) Init() {
  2258  	m.mu.Lock()
  2259  	defer m.mu.Unlock()
  2260  	m.counterMap = make(map[uint64]*StatCounter)
  2261  }
  2262  
  2263  // Increment increments the counter associated with the provided key.
  2264  func (m *IntegralStatCounterMap) Increment(key uint64) {
  2265  	m.mu.RLock()
  2266  	counter, ok := m.counterMap[key]
  2267  	m.mu.RUnlock()
  2268  
  2269  	if !ok {
  2270  		m.mu.Lock()
  2271  		counter, ok = m.counterMap[key]
  2272  		if !ok {
  2273  			counter = new(StatCounter)
  2274  			m.counterMap[key] = counter
  2275  		}
  2276  		m.mu.Unlock()
  2277  	}
  2278  	counter.Increment()
  2279  }
  2280  
  2281  // A MultiIntegralStatCounterMap keeps track of two integral counter maps at
  2282  // once.
  2283  type MultiIntegralStatCounterMap struct {
  2284  	a *IntegralStatCounterMap
  2285  	b *IntegralStatCounterMap
  2286  }
  2287  
  2288  // Init sets the internal integral counter maps to point to a and b.
  2289  func (m *MultiIntegralStatCounterMap) Init(a, b *IntegralStatCounterMap) {
  2290  	m.a = a
  2291  	m.b = b
  2292  }
  2293  
  2294  // Increment increments the counter in each map corresponding to the
  2295  // provided key.
  2296  func (m *MultiIntegralStatCounterMap) Increment(key uint64) {
  2297  	m.a.Increment(key)
  2298  	m.b.Increment(key)
  2299  }
  2300  
  2301  // NICStats holds NIC statistics.
  2302  type NICStats struct {
  2303  	// LINT.IfChange(NICStats)
  2304  
  2305  	// UnknownL3ProtocolRcvdPacketCounts records the number of packets recieved
  2306  	// for each unknown or unsupported netowrk protocol number.
  2307  	UnknownL3ProtocolRcvdPacketCounts *IntegralStatCounterMap
  2308  
  2309  	// UnknownL4ProtocolRcvdPacketCounts records the number of packets recieved
  2310  	// for each unknown or unsupported transport protocol number.
  2311  	UnknownL4ProtocolRcvdPacketCounts *IntegralStatCounterMap
  2312  
  2313  	// MalformedL4RcvdPackets is the number of packets received by a NIC that
  2314  	// could not be delivered to a transport endpoint because the L4 header could
  2315  	// not be parsed.
  2316  	MalformedL4RcvdPackets *StatCounter
  2317  
  2318  	// Tx contains statistics about transmitted packets.
  2319  	Tx NICPacketStats
  2320  
  2321  	// TxPacketsDroppedNoBufferSpace is the number of packets dropepd due to the
  2322  	// NIC not having enough buffer space to send the packet.
  2323  	//
  2324  	// Packets may be dropped with a no buffer space error when the device TX
  2325  	// queue is full.
  2326  	TxPacketsDroppedNoBufferSpace *StatCounter
  2327  
  2328  	// Rx contains statistics about received packets.
  2329  	Rx NICPacketStats
  2330  
  2331  	// DisabledRx contains statistics about received packets on disabled NICs.
  2332  	DisabledRx NICPacketStats
  2333  
  2334  	// Neighbor contains statistics about neighbor entries.
  2335  	Neighbor NICNeighborStats
  2336  
  2337  	// LINT.ThenChange(stack/nic_stats.go:multiCounterNICStats)
  2338  }
  2339  
  2340  // FillIn returns a copy of s with nil fields initialized to new StatCounters.
  2341  func (s NICStats) FillIn() NICStats {
  2342  	InitStatCounters(reflect.ValueOf(&s).Elem())
  2343  	return s
  2344  }
  2345  
  2346  // Stats holds statistics about the networking stack.
  2347  type Stats struct {
  2348  	// TODO(https://gvisor.dev/issues/5986): Make the DroppedPackets stat less
  2349  	// ambiguous.
  2350  
  2351  	// DroppedPackets is the number of packets dropped at the transport layer.
  2352  	DroppedPackets *StatCounter
  2353  
  2354  	// NICs is an aggregation of every NIC's statistics. These should not be
  2355  	// incremented using this field, but using the relevant NIC multicounters.
  2356  	NICs NICStats
  2357  
  2358  	// ICMP is an aggregation of every NetworkEndpoint's ICMP statistics (both v4
  2359  	// and v6). These should not be incremented using this field, but using the
  2360  	// relevant NetworkEndpoint ICMP multicounters.
  2361  	ICMP ICMPStats
  2362  
  2363  	// IGMP is an aggregation of every NetworkEndpoint's IGMP statistics. These
  2364  	// should not be incremented using this field, but using the relevant
  2365  	// NetworkEndpoint IGMP multicounters.
  2366  	IGMP IGMPStats
  2367  
  2368  	// IP is an aggregation of every NetworkEndpoint's IP statistics. These should
  2369  	// not be incremented using this field, but using the relevant NetworkEndpoint
  2370  	// IP multicounters.
  2371  	IP IPStats
  2372  
  2373  	// ARP is an aggregation of every NetworkEndpoint's ARP statistics. These
  2374  	// should not be incremented using this field, but using the relevant
  2375  	// NetworkEndpoint ARP multicounters.
  2376  	ARP ARPStats
  2377  
  2378  	// TCP holds TCP-specific stats.
  2379  	TCP TCPStats
  2380  
  2381  	// UDP holds UDP-specific stats.
  2382  	UDP UDPStats
  2383  }
  2384  
  2385  // ReceiveErrors collects packet receive errors within transport endpoint.
  2386  //
  2387  // +stateify savable
  2388  type ReceiveErrors struct {
  2389  	// ReceiveBufferOverflow is the number of received packets dropped
  2390  	// due to the receive buffer being full.
  2391  	ReceiveBufferOverflow StatCounter
  2392  
  2393  	// MalformedPacketsReceived is the number of incoming packets
  2394  	// dropped due to the packet header being in a malformed state.
  2395  	MalformedPacketsReceived StatCounter
  2396  
  2397  	// ClosedReceiver is the number of received packets dropped because
  2398  	// of receiving endpoint state being closed.
  2399  	ClosedReceiver StatCounter
  2400  
  2401  	// ChecksumErrors is the number of packets dropped due to bad checksums.
  2402  	ChecksumErrors StatCounter
  2403  }
  2404  
  2405  // SendErrors collects packet send errors within the transport layer for an
  2406  // endpoint.
  2407  //
  2408  // +stateify savable
  2409  type SendErrors struct {
  2410  	// SendToNetworkFailed is the number of packets failed to be written to
  2411  	// the network endpoint.
  2412  	SendToNetworkFailed StatCounter
  2413  
  2414  	// NoRoute is the number of times we failed to resolve IP route.
  2415  	NoRoute StatCounter
  2416  }
  2417  
  2418  // ReadErrors collects segment read errors from an endpoint read call.
  2419  //
  2420  // +stateify savable
  2421  type ReadErrors struct {
  2422  	// ReadClosed is the number of received packet drops because the endpoint
  2423  	// was shutdown for read.
  2424  	ReadClosed StatCounter
  2425  
  2426  	// InvalidEndpointState is the number of times we found the endpoint state
  2427  	// to be unexpected.
  2428  	InvalidEndpointState StatCounter
  2429  
  2430  	// NotConnected is the number of times we tried to read but found that the
  2431  	// endpoint was not connected.
  2432  	NotConnected StatCounter
  2433  }
  2434  
  2435  // WriteErrors collects packet write errors from an endpoint write call.
  2436  //
  2437  // +stateify savable
  2438  type WriteErrors struct {
  2439  	// WriteClosed is the number of packet drops because the endpoint
  2440  	// was shutdown for write.
  2441  	WriteClosed StatCounter
  2442  
  2443  	// InvalidEndpointState is the number of times we found the endpoint state
  2444  	// to be unexpected.
  2445  	InvalidEndpointState StatCounter
  2446  
  2447  	// InvalidArgs is the number of times invalid input arguments were
  2448  	// provided for endpoint Write call.
  2449  	InvalidArgs StatCounter
  2450  }
  2451  
  2452  // TransportEndpointStats collects statistics about the endpoint.
  2453  //
  2454  // +stateify savable
  2455  type TransportEndpointStats struct {
  2456  	// PacketsReceived is the number of successful packet receives.
  2457  	PacketsReceived StatCounter
  2458  
  2459  	// PacketsSent is the number of successful packet sends.
  2460  	PacketsSent StatCounter
  2461  
  2462  	// ReceiveErrors collects packet receive errors within transport layer.
  2463  	ReceiveErrors ReceiveErrors
  2464  
  2465  	// ReadErrors collects packet read errors from an endpoint read call.
  2466  	ReadErrors ReadErrors
  2467  
  2468  	// SendErrors collects packet send errors within the transport layer.
  2469  	SendErrors SendErrors
  2470  
  2471  	// WriteErrors collects packet write errors from an endpoint write call.
  2472  	WriteErrors WriteErrors
  2473  }
  2474  
  2475  // IsEndpointStats is an empty method to implement the tcpip.EndpointStats
  2476  // marker interface.
  2477  func (*TransportEndpointStats) IsEndpointStats() {}
  2478  
  2479  // InitStatCounters initializes v's fields with nil StatCounter fields to new
  2480  // StatCounters.
  2481  func InitStatCounters(v reflect.Value) {
  2482  	for i := 0; i < v.NumField(); i++ {
  2483  		v := v.Field(i)
  2484  		if s, ok := v.Addr().Interface().(**StatCounter); ok {
  2485  			if *s == nil {
  2486  				*s = new(StatCounter)
  2487  			}
  2488  		} else if s, ok := v.Addr().Interface().(**IntegralStatCounterMap); ok {
  2489  			if *s == nil {
  2490  				*s = new(IntegralStatCounterMap)
  2491  				(*s).Init()
  2492  			}
  2493  		} else {
  2494  			InitStatCounters(v)
  2495  		}
  2496  	}
  2497  }
  2498  
  2499  // FillIn returns a copy of s with nil fields initialized to new StatCounters.
  2500  func (s Stats) FillIn() Stats {
  2501  	InitStatCounters(reflect.ValueOf(&s).Elem())
  2502  	return s
  2503  }
  2504  
  2505  // Clone clones a copy of the TransportEndpointStats into dst by atomically
  2506  // reading each field.
  2507  func (src *TransportEndpointStats) Clone(dst *TransportEndpointStats) {
  2508  	clone(reflect.ValueOf(dst).Elem(), reflect.ValueOf(src).Elem())
  2509  }
  2510  
  2511  func clone(dst reflect.Value, src reflect.Value) {
  2512  	for i := 0; i < dst.NumField(); i++ {
  2513  		d := dst.Field(i)
  2514  		s := src.Field(i)
  2515  		if c, ok := s.Addr().Interface().(*StatCounter); ok {
  2516  			d.Addr().Interface().(*StatCounter).IncrementBy(c.Value())
  2517  		} else {
  2518  			clone(d, s)
  2519  		}
  2520  	}
  2521  }
  2522  
  2523  // String implements the fmt.Stringer interface.
  2524  func (a Address) String() string {
  2525  	switch l := a.Len(); l {
  2526  	case 4:
  2527  		return fmt.Sprintf("%d.%d.%d.%d", int(a.addr[0]), int(a.addr[1]), int(a.addr[2]), int(a.addr[3]))
  2528  	case 16:
  2529  		// Find the longest subsequence of hexadecimal zeros.
  2530  		start, end := -1, -1
  2531  		for i := 0; i < a.Len(); i += 2 {
  2532  			j := i
  2533  			for j < a.Len() && a.addr[j] == 0 && a.addr[j+1] == 0 {
  2534  				j += 2
  2535  			}
  2536  			if j > i+2 && j-i > end-start {
  2537  				start, end = i, j
  2538  			}
  2539  		}
  2540  
  2541  		var b strings.Builder
  2542  		for i := 0; i < a.Len(); i += 2 {
  2543  			if i == start {
  2544  				b.WriteString("::")
  2545  				i = end
  2546  				if end >= a.Len() {
  2547  					break
  2548  				}
  2549  			} else if i > 0 {
  2550  				b.WriteByte(':')
  2551  			}
  2552  			v := uint16(a.addr[i+0])<<8 | uint16(a.addr[i+1])
  2553  			if v == 0 {
  2554  				b.WriteByte('0')
  2555  			} else {
  2556  				const digits = "0123456789abcdef"
  2557  				for i := uint(3); i < 4; i-- {
  2558  					if v := v >> (i * 4); v != 0 {
  2559  						b.WriteByte(digits[v&0xf])
  2560  					}
  2561  				}
  2562  			}
  2563  		}
  2564  		return b.String()
  2565  	default:
  2566  		return fmt.Sprintf("%x", a.addr[:l])
  2567  	}
  2568  }
  2569  
  2570  // To4 converts the IPv4 address to a 4-byte representation.
  2571  // If the address is not an IPv4 address, To4 returns the empty Address.
  2572  func (a Address) To4() Address {
  2573  	const (
  2574  		ipv4len = 4
  2575  		ipv6len = 16
  2576  	)
  2577  	if a.Len() == ipv4len {
  2578  		return a
  2579  	}
  2580  	if a.Len() == ipv6len &&
  2581  		isZeros(a.addr[:10]) &&
  2582  		a.addr[10] == 0xff &&
  2583  		a.addr[11] == 0xff {
  2584  		return AddrFrom4Slice(a.addr[12:16])
  2585  	}
  2586  	return Address{}
  2587  }
  2588  
  2589  // isZeros reports whether addr is all zeros.
  2590  func isZeros(addr []byte) bool {
  2591  	for _, b := range addr {
  2592  		if b != 0 {
  2593  			return false
  2594  		}
  2595  	}
  2596  	return true
  2597  }
  2598  
  2599  // LinkAddress is a byte slice cast as a string that represents a link address.
  2600  // It is typically a 6-byte MAC address.
  2601  type LinkAddress string
  2602  
  2603  // String implements the fmt.Stringer interface.
  2604  func (a LinkAddress) String() string {
  2605  	switch len(a) {
  2606  	case 6:
  2607  		return fmt.Sprintf("%02x:%02x:%02x:%02x:%02x:%02x", a[0], a[1], a[2], a[3], a[4], a[5])
  2608  	default:
  2609  		return fmt.Sprintf("%x", []byte(a))
  2610  	}
  2611  }
  2612  
  2613  // ParseMACAddress parses an IEEE 802 address.
  2614  //
  2615  // It must be in the format aa:bb:cc:dd:ee:ff or aa-bb-cc-dd-ee-ff.
  2616  func ParseMACAddress(s string) (LinkAddress, error) {
  2617  	parts := strings.FieldsFunc(s, func(c rune) bool {
  2618  		return c == ':' || c == '-'
  2619  	})
  2620  	if len(parts) != 6 {
  2621  		return "", fmt.Errorf("inconsistent parts: %s", s)
  2622  	}
  2623  	addr := make([]byte, 0, len(parts))
  2624  	for _, part := range parts {
  2625  		u, err := strconv.ParseUint(part, 16, 8)
  2626  		if err != nil {
  2627  			return "", fmt.Errorf("invalid hex digits: %s", s)
  2628  		}
  2629  		addr = append(addr, byte(u))
  2630  	}
  2631  	return LinkAddress(addr), nil
  2632  }
  2633  
  2634  // AddressWithPrefix is an address with its subnet prefix length.
  2635  //
  2636  // +stateify savable
  2637  type AddressWithPrefix struct {
  2638  	// Address is a network address.
  2639  	Address Address
  2640  
  2641  	// PrefixLen is the subnet prefix length.
  2642  	PrefixLen int
  2643  }
  2644  
  2645  // String implements the fmt.Stringer interface.
  2646  func (a AddressWithPrefix) String() string {
  2647  	return fmt.Sprintf("%s/%d", a.Address, a.PrefixLen)
  2648  }
  2649  
  2650  // Subnet converts the address and prefix into a Subnet value and returns it.
  2651  func (a AddressWithPrefix) Subnet() Subnet {
  2652  	addrLen := a.Address.length
  2653  	if a.PrefixLen <= 0 {
  2654  		return Subnet{
  2655  			address: AddrFromSlice(bytes.Repeat([]byte{0}, addrLen)),
  2656  			mask:    MaskFromBytes(bytes.Repeat([]byte{0}, addrLen)),
  2657  		}
  2658  	}
  2659  	if a.PrefixLen >= addrLen*8 {
  2660  		return Subnet{
  2661  			address: a.Address,
  2662  			mask:    MaskFromBytes(bytes.Repeat([]byte{0xff}, addrLen)),
  2663  		}
  2664  	}
  2665  
  2666  	sa := make([]byte, addrLen)
  2667  	sm := make([]byte, addrLen)
  2668  	n := uint(a.PrefixLen)
  2669  	for i := 0; i < addrLen; i++ {
  2670  		if n >= 8 {
  2671  			sa[i] = a.Address.addr[i]
  2672  			sm[i] = 0xff
  2673  			n -= 8
  2674  			continue
  2675  		}
  2676  		sm[i] = ^byte(0xff >> n)
  2677  		sa[i] = a.Address.addr[i] & sm[i]
  2678  		n = 0
  2679  	}
  2680  
  2681  	// For extra caution, call NewSubnet rather than directly creating the Subnet
  2682  	// value. If that fails it indicates a serious bug in this code, so panic is
  2683  	// in order.
  2684  	s, err := NewSubnet(AddrFromSlice(sa), MaskFromBytes(sm))
  2685  	if err != nil {
  2686  		panic("invalid subnet: " + err.Error())
  2687  	}
  2688  	return s
  2689  }
  2690  
  2691  // ProtocolAddress is an address and the network protocol it is associated
  2692  // with.
  2693  type ProtocolAddress struct {
  2694  	// Protocol is the protocol of the address.
  2695  	Protocol NetworkProtocolNumber
  2696  
  2697  	// AddressWithPrefix is a network address with its subnet prefix length.
  2698  	AddressWithPrefix AddressWithPrefix
  2699  }
  2700  
  2701  var (
  2702  	// danglingEndpointsMu protects access to danglingEndpoints.
  2703  	danglingEndpointsMu sync.Mutex
  2704  
  2705  	// danglingEndpoints tracks all dangling endpoints no longer owned by the app.
  2706  	danglingEndpoints = make(map[Endpoint]struct{})
  2707  )
  2708  
  2709  // GetDanglingEndpoints returns all dangling endpoints.
  2710  func GetDanglingEndpoints() []Endpoint {
  2711  	danglingEndpointsMu.Lock()
  2712  	es := make([]Endpoint, 0, len(danglingEndpoints))
  2713  	for e := range danglingEndpoints {
  2714  		es = append(es, e)
  2715  	}
  2716  	danglingEndpointsMu.Unlock()
  2717  	return es
  2718  }
  2719  
  2720  // ReleaseDanglingEndpoints clears out all all reference counted objects held by
  2721  // dangling endpoints.
  2722  func ReleaseDanglingEndpoints() {
  2723  	// Get the dangling endpoints first to avoid locking around Release(), which
  2724  	// can cause a lock inversion with endpoint.mu and danglingEndpointsMu.
  2725  	// Calling Release on a dangling endpoint that has been deleted is a noop.
  2726  	eps := GetDanglingEndpoints()
  2727  	for _, ep := range eps {
  2728  		ep.Abort()
  2729  	}
  2730  }
  2731  
  2732  // AddDanglingEndpoint adds a dangling endpoint.
  2733  func AddDanglingEndpoint(e Endpoint) {
  2734  	danglingEndpointsMu.Lock()
  2735  	danglingEndpoints[e] = struct{}{}
  2736  	danglingEndpointsMu.Unlock()
  2737  }
  2738  
  2739  // DeleteDanglingEndpoint removes a dangling endpoint.
  2740  func DeleteDanglingEndpoint(e Endpoint) {
  2741  	danglingEndpointsMu.Lock()
  2742  	delete(danglingEndpoints, e)
  2743  	danglingEndpointsMu.Unlock()
  2744  }
  2745  
  2746  // AsyncLoading is the global barrier for asynchronous endpoint loading
  2747  // activities.
  2748  var AsyncLoading sync.WaitGroup