1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114
#![allow(unsafe_code)]
#[derive(Copy, Clone, Debug)]
pub struct U32AlignedBuffer<'a> {
ptr: *const u8,
len: i32,
phantom: core::marker::PhantomData<&'a [u8]>,
}
#[cfg(target_os = "linux")]
const ALIGN: usize = 4;
#[cfg(not(target_os = "linux"))]
const ALIGN: usize = 8;
/// Indicate that *any* suitably aligned byte sequence is valid for this type.
///
/// # Safety
///
/// This trait is unsafe to implement. If it is implemented for a type that has
/// invalid values, safe methods of `U32AlignedBuffer` can invoke undefined
/// behavior.
pub unsafe trait FromBuffer: Copy + Sized {
fn len(&self, size: usize) -> u32;
}
impl<'a> U32AlignedBuffer<'a> {
pub fn new(buf: &'a [u8]) -> Self {
let (ptr, len) = (buf.as_ptr(), buf.len());
assert!(ptr as usize % ALIGN == 0, "misaligned buffer");
// If the amount of data is too large, `read` could experience memory
// unsafety due to integer overflow. This prevents this.
assert!(len < (1 << 20), "data size limit exceeded");
Self {
ptr,
len: len as _,
phantom: core::marker::PhantomData,
}
}
pub fn read<T: FromBuffer>(&mut self) -> Option<(T, Self)> {
// Check that ALIGN is a power of 2
let _: [u8; ALIGN & (ALIGN - 1)] = [];
assert_eq!(align_of!(T) & (align_of!(T) - 1), 0);
let size = ((size_of!(T) + (ALIGN - 1)) & !(ALIGN - 1)) as i32;
assert!(size % ALIGN as i32 == 0);
assert!(size_of!(T) < 1024, "no type in the crate is this big");
assert!(align_of!(T) <= ALIGN, "type has too strict alignment needs");
// This is a debug_assert, not a full assert, because it cannot actually
// fire. Each place where `self.ptr` is set checks its alignment.
debug_assert!(self.ptr as usize % ALIGN == 0);
// Check that the length is sufficiently large. A negative length is
// obviously not sufficiently large.
if self.len < size {
return None;
}
// It is now safe to read the value of `self.ptr`. The contract of
// `FromBuffer` guarantees that any aligned sequence of bytes of length
// sizeof!(T) is a valid T. Since `FromBuffer` is a subtrait of `Copy`,
// it is safe to do the bitwise copy here.
//
// We could use `read` instead of `read_unaligned`, but the latter is
// safer in case of a bug.
let output: T = unsafe { std::ptr::read_unaligned(self.ptr as _) };
let len = output.len(self.len as _) as i32;
// Check that `output` is valid.
if len < size || len > self.len {
return None;
}
let buffer = Self {
len: len - size,
// ptr is aligned, as is size, so ptr.offset(size) will be as well.
// furthermore, size was already checked to be within bounds.
ptr: unsafe { self.ptr.offset(size as _) },
phantom: core::marker::PhantomData,
};
// Align `len` to the next suitably aligned value.
// The length check in `new` ensures that this cannot overflow.
let advance = ((len as usize + (ALIGN - 1)) & !(ALIGN - 1)) as i32;
debug_assert!(advance % ALIGN as i32 == 0);
// len going negative is safe
self.len -= advance;
// advance is guaranteed to be aligned, since we mask it with !(ALIGN - 1).
// and ALIGN is a power of 2. Therefore, if `self.ptr` is aligned
// initially, it will be after this call to `offset` is made. Since
// `self.ptr` will be aligned when `Self` is constructed, it will
// continue to be aligned by mathematical induction.
//
// Note that `self.ptr` may go up to ALIGN - 1 bytes out of bounds, but
// it will never be dereferenced in this case. This is why
// `wrapping_offset` is used instead of `offset`.
self.ptr = self.ptr.wrapping_offset(advance as _);
debug_assert!(self.ptr as usize % ALIGN == 0);
Some((output, buffer))
}
}
impl<'a> core::convert::TryFrom<U32AlignedBuffer<'a>> for std::net::IpAddr {
type Error = ();
fn try_from(s: U32AlignedBuffer<'a>) -> Result<Self, Self::Error> {
match s.len {
16 => unsafe {
// SAFETY: we just did the bounds check.
let v: [u8; 16] = core::ptr::read(s.ptr as _);
Ok(v.into())
},
4 => unsafe {
// SAFETY: we just did the bounds check.
let v: [u8; 4] = core::ptr::read(s.ptr as _);
Ok(v.into())
},
_ => Err(()),
}
}
}