mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-03 20:27:35 +03:00
embed the packetInfo in the receivedPacket struct
This avoid allocating the packetInfo struct when receiving a packet.
This commit is contained in:
parent
3b5950a1ce
commit
edaeed0107
10 changed files with 42 additions and 36 deletions
|
@ -16,13 +16,13 @@ type closedLocalConn struct {
|
||||||
perspective protocol.Perspective
|
perspective protocol.Perspective
|
||||||
logger utils.Logger
|
logger utils.Logger
|
||||||
|
|
||||||
sendPacket func(net.Addr, *packetInfo)
|
sendPacket func(net.Addr, packetInfo)
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ packetHandler = &closedLocalConn{}
|
var _ packetHandler = &closedLocalConn{}
|
||||||
|
|
||||||
// newClosedLocalConn creates a new closedLocalConn and runs it.
|
// newClosedLocalConn creates a new closedLocalConn and runs it.
|
||||||
func newClosedLocalConn(sendPacket func(net.Addr, *packetInfo), pers protocol.Perspective, logger utils.Logger) packetHandler {
|
func newClosedLocalConn(sendPacket func(net.Addr, packetInfo), pers protocol.Perspective, logger utils.Logger) packetHandler {
|
||||||
return &closedLocalConn{
|
return &closedLocalConn{
|
||||||
sendPacket: sendPacket,
|
sendPacket: sendPacket,
|
||||||
perspective: pers,
|
perspective: pers,
|
||||||
|
|
|
@ -21,7 +21,7 @@ var _ = Describe("Closed local connection", func() {
|
||||||
It("repeats the packet containing the CONNECTION_CLOSE frame", func() {
|
It("repeats the packet containing the CONNECTION_CLOSE frame", func() {
|
||||||
written := make(chan net.Addr, 1)
|
written := make(chan net.Addr, 1)
|
||||||
conn := newClosedLocalConn(
|
conn := newClosedLocalConn(
|
||||||
func(addr net.Addr, _ *packetInfo) { written <- addr },
|
func(addr net.Addr, _ packetInfo) { written <- addr },
|
||||||
protocol.PerspectiveClient,
|
protocol.PerspectiveClient,
|
||||||
utils.DefaultLogger,
|
utils.DefaultLogger,
|
||||||
)
|
)
|
||||||
|
|
|
@ -70,7 +70,7 @@ type receivedPacket struct {
|
||||||
|
|
||||||
ecn protocol.ECN
|
ecn protocol.ECN
|
||||||
|
|
||||||
info *packetInfo
|
info packetInfo // only valid if the contained IP address is valid
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *receivedPacket) Size() protocol.ByteCount { return protocol.ByteCount(len(p.data)) }
|
func (p *receivedPacket) Size() protocol.ByteCount { return protocol.ByteCount(len(p.data)) }
|
||||||
|
|
|
@ -39,7 +39,7 @@ type rawConn interface {
|
||||||
type closePacket struct {
|
type closePacket struct {
|
||||||
payload []byte
|
payload []byte
|
||||||
addr net.Addr
|
addr net.Addr
|
||||||
info *packetInfo
|
info packetInfo
|
||||||
}
|
}
|
||||||
|
|
||||||
type unknownPacketHandler interface {
|
type unknownPacketHandler interface {
|
||||||
|
@ -177,7 +177,7 @@ func (h *packetHandlerMap) ReplaceWithClosed(ids []protocol.ConnectionID, pers p
|
||||||
var handler packetHandler
|
var handler packetHandler
|
||||||
if connClosePacket != nil {
|
if connClosePacket != nil {
|
||||||
handler = newClosedLocalConn(
|
handler = newClosedLocalConn(
|
||||||
func(addr net.Addr, info *packetInfo) {
|
func(addr net.Addr, info packetInfo) {
|
||||||
h.enqueueClosePacket(closePacket{payload: connClosePacket, addr: addr, info: info})
|
h.enqueueClosePacket(closePacket{payload: connClosePacket, addr: addr, info: info})
|
||||||
},
|
},
|
||||||
pers,
|
pers,
|
||||||
|
|
18
send_conn.go
18
send_conn.go
|
@ -21,13 +21,25 @@ type sconn struct {
|
||||||
rawConn
|
rawConn
|
||||||
|
|
||||||
remoteAddr net.Addr
|
remoteAddr net.Addr
|
||||||
info *packetInfo
|
info packetInfo
|
||||||
oob []byte
|
oob []byte
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ sendConn = &sconn{}
|
var _ sendConn = &sconn{}
|
||||||
|
|
||||||
func newSendConn(c rawConn, remote net.Addr, info *packetInfo) *sconn {
|
func newSendConn(c rawConn, remote net.Addr) *sconn {
|
||||||
|
sc := &sconn{
|
||||||
|
rawConn: c,
|
||||||
|
remoteAddr: remote,
|
||||||
|
}
|
||||||
|
if c.capabilities().GSO {
|
||||||
|
// add 32 bytes, so we can add the UDP_SEGMENT msg
|
||||||
|
sc.oob = make([]byte, 0, 32)
|
||||||
|
}
|
||||||
|
return sc
|
||||||
|
}
|
||||||
|
|
||||||
|
func newSendConnWithPacketInfo(c rawConn, remote net.Addr, info packetInfo) *sconn {
|
||||||
oob := info.OOB()
|
oob := info.OOB()
|
||||||
if c.capabilities().GSO {
|
if c.capabilities().GSO {
|
||||||
// add 32 bytes, so we can add the UDP_SEGMENT msg
|
// add 32 bytes, so we can add the UDP_SEGMENT msg
|
||||||
|
@ -57,7 +69,7 @@ func (c *sconn) RemoteAddr() net.Addr {
|
||||||
|
|
||||||
func (c *sconn) LocalAddr() net.Addr {
|
func (c *sconn) LocalAddr() net.Addr {
|
||||||
addr := c.rawConn.LocalAddr()
|
addr := c.rawConn.LocalAddr()
|
||||||
if c.info != nil {
|
if c.info.addr.IsValid() {
|
||||||
if udpAddr, ok := addr.(*net.UDPAddr); ok {
|
if udpAddr, ok := addr.(*net.UDPAddr); ok {
|
||||||
addrCopy := *udpAddr
|
addrCopy := *udpAddr
|
||||||
addrCopy.IP = c.info.addr.AsSlice()
|
addrCopy.IP = c.info.addr.AsSlice()
|
||||||
|
|
|
@ -19,7 +19,7 @@ var _ = Describe("Connection (for sending packets)", func() {
|
||||||
packetConn = NewMockPacketConn(mockCtrl)
|
packetConn = NewMockPacketConn(mockCtrl)
|
||||||
rawConn, err := wrapConn(packetConn)
|
rawConn, err := wrapConn(packetConn)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
c = newSendConn(rawConn, addr, nil)
|
c = newSendConnWithPacketInfo(rawConn, addr, packetInfo{})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("writes", func() {
|
It("writes", func() {
|
||||||
|
|
|
@ -632,7 +632,7 @@ func (s *baseServer) handleInitialImpl(p receivedPacket, hdr *wire.Header) error
|
||||||
tracer = config.Tracer(context.WithValue(context.Background(), ConnectionTracingKey, tracingID), protocol.PerspectiveServer, connID)
|
tracer = config.Tracer(context.WithValue(context.Background(), ConnectionTracingKey, tracingID), protocol.PerspectiveServer, connID)
|
||||||
}
|
}
|
||||||
conn = s.newConn(
|
conn = s.newConn(
|
||||||
newSendConn(s.conn, p.remoteAddr, p.info),
|
newSendConnWithPacketInfo(s.conn, p.remoteAddr, p.info),
|
||||||
s.connHandler,
|
s.connHandler,
|
||||||
origDestConnID,
|
origDestConnID,
|
||||||
retrySrcConnID,
|
retrySrcConnID,
|
||||||
|
@ -706,7 +706,7 @@ func (s *baseServer) handleNewConn(conn quicConn) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *baseServer) sendRetry(remoteAddr net.Addr, hdr *wire.Header, info *packetInfo) error {
|
func (s *baseServer) sendRetry(remoteAddr net.Addr, hdr *wire.Header, info packetInfo) error {
|
||||||
// Log the Initial packet now.
|
// Log the Initial packet now.
|
||||||
// If no Retry is sent, the packet will be logged by the connection.
|
// If no Retry is sent, the packet will be logged by the connection.
|
||||||
(&wire.ExtendedHeader{Header: *hdr}).Log(s.logger)
|
(&wire.ExtendedHeader{Header: *hdr}).Log(s.logger)
|
||||||
|
@ -795,13 +795,13 @@ func (s *baseServer) maybeSendInvalidToken(p receivedPacket) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *baseServer) sendConnectionRefused(remoteAddr net.Addr, hdr *wire.Header, info *packetInfo) error {
|
func (s *baseServer) sendConnectionRefused(remoteAddr net.Addr, hdr *wire.Header, info packetInfo) error {
|
||||||
sealer, _ := handshake.NewInitialAEAD(hdr.DestConnectionID, protocol.PerspectiveServer, hdr.Version)
|
sealer, _ := handshake.NewInitialAEAD(hdr.DestConnectionID, protocol.PerspectiveServer, hdr.Version)
|
||||||
return s.sendError(remoteAddr, hdr, sealer, qerr.ConnectionRefused, info)
|
return s.sendError(remoteAddr, hdr, sealer, qerr.ConnectionRefused, info)
|
||||||
}
|
}
|
||||||
|
|
||||||
// sendError sends the error as a response to the packet received with header hdr
|
// sendError sends the error as a response to the packet received with header hdr
|
||||||
func (s *baseServer) sendError(remoteAddr net.Addr, hdr *wire.Header, sealer handshake.LongHeaderSealer, errorCode qerr.TransportErrorCode, info *packetInfo) error {
|
func (s *baseServer) sendError(remoteAddr net.Addr, hdr *wire.Header, sealer handshake.LongHeaderSealer, errorCode qerr.TransportErrorCode, info packetInfo) error {
|
||||||
b := getPacketBuffer()
|
b := getPacketBuffer()
|
||||||
defer b.Release()
|
defer b.Release()
|
||||||
|
|
||||||
|
|
|
@ -173,8 +173,12 @@ func (c *oobConn) ReadPacket() (receivedPacket, error) {
|
||||||
c.readPos++
|
c.readPos++
|
||||||
|
|
||||||
data := msg.OOB[:msg.NN]
|
data := msg.OOB[:msg.NN]
|
||||||
var ecn protocol.ECN
|
p := receivedPacket{
|
||||||
var info *packetInfo
|
remoteAddr: msg.Addr,
|
||||||
|
rcvTime: time.Now(),
|
||||||
|
data: msg.Buffers[0][:msg.N],
|
||||||
|
buffer: buffer,
|
||||||
|
}
|
||||||
for len(data) > 0 {
|
for len(data) > 0 {
|
||||||
hdr, body, remainder, err := unix.ParseOneSocketControlMessage(data)
|
hdr, body, remainder, err := unix.ParseOneSocketControlMessage(data)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -183,7 +187,7 @@ func (c *oobConn) ReadPacket() (receivedPacket, error) {
|
||||||
if hdr.Level == unix.IPPROTO_IP {
|
if hdr.Level == unix.IPPROTO_IP {
|
||||||
switch hdr.Type {
|
switch hdr.Type {
|
||||||
case msgTypeIPTOS:
|
case msgTypeIPTOS:
|
||||||
ecn = protocol.ECN(body[0] & ecnMask)
|
p.ecn = protocol.ECN(body[0] & ecnMask)
|
||||||
case msgTypeIPv4PKTINFO:
|
case msgTypeIPv4PKTINFO:
|
||||||
// struct in_pktinfo {
|
// struct in_pktinfo {
|
||||||
// unsigned int ipi_ifindex; /* Interface index */
|
// unsigned int ipi_ifindex; /* Interface index */
|
||||||
|
@ -191,22 +195,21 @@ func (c *oobConn) ReadPacket() (receivedPacket, error) {
|
||||||
// struct in_addr ipi_addr; /* Header Destination
|
// struct in_addr ipi_addr; /* Header Destination
|
||||||
// address */
|
// address */
|
||||||
// };
|
// };
|
||||||
info = &packetInfo{}
|
|
||||||
var ip [4]byte
|
var ip [4]byte
|
||||||
if len(body) == 12 {
|
if len(body) == 12 {
|
||||||
copy(ip[:], body[8:12])
|
copy(ip[:], body[8:12])
|
||||||
info.ifIndex = binary.LittleEndian.Uint32(body)
|
p.info.ifIndex = binary.LittleEndian.Uint32(body)
|
||||||
} else if len(body) == 4 {
|
} else if len(body) == 4 {
|
||||||
// FreeBSD
|
// FreeBSD
|
||||||
copy(ip[:], body)
|
copy(ip[:], body)
|
||||||
}
|
}
|
||||||
info.addr = netip.AddrFrom4(ip)
|
p.info.addr = netip.AddrFrom4(ip)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if hdr.Level == unix.IPPROTO_IPV6 {
|
if hdr.Level == unix.IPPROTO_IPV6 {
|
||||||
switch hdr.Type {
|
switch hdr.Type {
|
||||||
case unix.IPV6_TCLASS:
|
case unix.IPV6_TCLASS:
|
||||||
ecn = protocol.ECN(body[0] & ecnMask)
|
p.ecn = protocol.ECN(body[0] & ecnMask)
|
||||||
case msgTypeIPv6PKTINFO:
|
case msgTypeIPv6PKTINFO:
|
||||||
// struct in6_pktinfo {
|
// struct in6_pktinfo {
|
||||||
// struct in6_addr ipi6_addr; /* src/dst IPv6 address */
|
// struct in6_addr ipi6_addr; /* src/dst IPv6 address */
|
||||||
|
@ -215,23 +218,14 @@ func (c *oobConn) ReadPacket() (receivedPacket, error) {
|
||||||
if len(body) == 20 {
|
if len(body) == 20 {
|
||||||
var ip [16]byte
|
var ip [16]byte
|
||||||
copy(ip[:], body[:16])
|
copy(ip[:], body[:16])
|
||||||
info = &packetInfo{
|
p.info.addr = netip.AddrFrom16(ip)
|
||||||
addr: netip.AddrFrom16(ip),
|
p.info.ifIndex = binary.LittleEndian.Uint32(body[16:])
|
||||||
ifIndex: binary.LittleEndian.Uint32(body[16:]),
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
data = remainder
|
data = remainder
|
||||||
}
|
}
|
||||||
return receivedPacket{
|
return p, nil
|
||||||
remoteAddr: msg.Addr,
|
|
||||||
rcvTime: time.Now(),
|
|
||||||
data: msg.Buffers[0][:msg.N],
|
|
||||||
ecn: ecn,
|
|
||||||
info: info,
|
|
||||||
buffer: buffer,
|
|
||||||
}, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// WriteTo (re)implements the net.PacketConn method.
|
// WriteTo (re)implements the net.PacketConn method.
|
||||||
|
|
|
@ -154,7 +154,7 @@ var _ = Describe("OOB Conn Test", func() {
|
||||||
Expect(p.rcvTime).To(BeTemporally("~", time.Now(), scaleDuration(20*time.Millisecond)))
|
Expect(p.rcvTime).To(BeTemporally("~", time.Now(), scaleDuration(20*time.Millisecond)))
|
||||||
Expect(p.data).To(Equal([]byte("foobar")))
|
Expect(p.data).To(Equal([]byte("foobar")))
|
||||||
Expect(p.remoteAddr).To(Equal(sentFrom))
|
Expect(p.remoteAddr).To(Equal(sentFrom))
|
||||||
Expect(p.info).To(Not(BeNil()))
|
Expect(p.info.addr.IsValid()).To(BeTrue())
|
||||||
Expect(net.IP(p.info.addr.AsSlice())).To(Equal(ip))
|
Expect(net.IP(p.info.addr.AsSlice())).To(Equal(ip))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
|
@ -155,7 +155,7 @@ func (t *Transport) Dial(ctx context.Context, addr net.Addr, tlsConf *tls.Config
|
||||||
if t.isSingleUse {
|
if t.isSingleUse {
|
||||||
onClose = func() { t.Close() }
|
onClose = func() { t.Close() }
|
||||||
}
|
}
|
||||||
return dial(ctx, newSendConn(t.conn, addr, nil), t.connIDGenerator, t.handlerMap, tlsConf, conf, onClose, false)
|
return dial(ctx, newSendConn(t.conn, addr), t.connIDGenerator, t.handlerMap, tlsConf, conf, onClose, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
// DialEarly dials a new connection, attempting to use 0-RTT if possible.
|
// DialEarly dials a new connection, attempting to use 0-RTT if possible.
|
||||||
|
@ -171,7 +171,7 @@ func (t *Transport) DialEarly(ctx context.Context, addr net.Addr, tlsConf *tls.C
|
||||||
if t.isSingleUse {
|
if t.isSingleUse {
|
||||||
onClose = func() { t.Close() }
|
onClose = func() { t.Close() }
|
||||||
}
|
}
|
||||||
return dial(ctx, newSendConn(t.conn, addr, nil), t.connIDGenerator, t.handlerMap, tlsConf, conf, onClose, true)
|
return dial(ctx, newSendConn(t.conn, addr), t.connIDGenerator, t.handlerMap, tlsConf, conf, onClose, true)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (t *Transport) init(isServer bool) error {
|
func (t *Transport) init(isServer bool) error {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue