Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/socket/tcp_server_socket_libevent.h" | 5 #include "net/socket/tcp_socket_libevent.h" |
| 6 | 6 |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 #include <fcntl.h> | 8 #include <fcntl.h> |
| 9 #include <netdb.h> | 9 #include <netdb.h> |
| 10 #include <sys/socket.h> | 10 #include <sys/socket.h> |
| 11 | 11 |
| 12 #include "build/build_config.h" | 12 #include "build/build_config.h" |
| 13 | 13 |
| 14 #if defined(OS_POSIX) | 14 #if defined(OS_POSIX) |
| 15 #include <netinet/in.h> | 15 #include <netinet/in.h> |
| 16 #endif | 16 #endif |
| 17 | 17 |
| 18 #include "base/logging.h" | |
| 18 #include "base/posix/eintr_wrapper.h" | 19 #include "base/posix/eintr_wrapper.h" |
| 19 #include "net/base/ip_endpoint.h" | 20 #include "net/base/ip_endpoint.h" |
| 20 #include "net/base/net_errors.h" | 21 #include "net/base/net_errors.h" |
| 21 #include "net/base/net_util.h" | 22 #include "net/base/net_util.h" |
| 22 #include "net/socket/socket_net_log_params.h" | 23 #include "net/socket/socket_net_log_params.h" |
| 23 #include "net/socket/tcp_client_socket.h" | |
| 24 | 24 |
| 25 namespace net { | 25 namespace net { |
| 26 | 26 |
| 27 namespace { | 27 namespace { |
| 28 | 28 |
| 29 const int kInvalidSocket = -1; | 29 const int kInvalidSocket = -1; |
| 30 | 30 |
| 31 } // namespace | 31 } // namespace |
| 32 | 32 |
| 33 TCPServerSocketLibevent::TCPServerSocketLibevent( | 33 TCPSocketLibevent::TCPSocketLibevent(NetLog* net_log, |
| 34 net::NetLog* net_log, | 34 const NetLog::Source& source) |
| 35 const net::NetLog::Source& source) | |
| 36 : socket_(kInvalidSocket), | 35 : socket_(kInvalidSocket), |
| 37 accept_socket_(NULL), | 36 accept_socket_(NULL), |
| 37 accept_address_(NULL), | |
| 38 net_log_(BoundNetLog::Make(net_log, NetLog::SOURCE_SOCKET)) { | 38 net_log_(BoundNetLog::Make(net_log, NetLog::SOURCE_SOCKET)) { |
| 39 net_log_.BeginEvent(NetLog::TYPE_SOCKET_ALIVE, | 39 net_log_.BeginEvent(NetLog::TYPE_SOCKET_ALIVE, |
| 40 source.ToEventParametersCallback()); | 40 source.ToEventParametersCallback()); |
| 41 } | 41 } |
| 42 | 42 |
| 43 TCPServerSocketLibevent::~TCPServerSocketLibevent() { | 43 TCPSocketLibevent::~TCPSocketLibevent() { |
| 44 if (socket_ != kInvalidSocket) | 44 if (socket_ != kInvalidSocket) |
| 45 Close(); | 45 Close(); |
| 46 net_log_.EndEvent(NetLog::TYPE_SOCKET_ALIVE); | 46 net_log_.EndEvent(NetLog::TYPE_SOCKET_ALIVE); |
| 47 } | 47 } |
| 48 | 48 |
| 49 int TCPServerSocketLibevent::Listen(const IPEndPoint& address, int backlog) { | 49 int TCPSocketLibevent::Create(AddressFamily family) { |
| 50 DCHECK(CalledOnValidThread()); | 50 DCHECK(CalledOnValidThread()); |
| 51 DCHECK_GT(backlog, 0); | |
| 52 DCHECK_EQ(socket_, kInvalidSocket); | 51 DCHECK_EQ(socket_, kInvalidSocket); |
| 53 | 52 |
| 54 socket_ = socket(address.GetSockAddrFamily(), SOCK_STREAM, IPPROTO_TCP); | 53 int address_family = AF_UNSPEC; |
| 54 switch (family) { | |
| 55 case ADDRESS_FAMILY_IPV4: | |
| 56 address_family = AF_INET; | |
| 57 break; | |
| 58 case ADDRESS_FAMILY_IPV6: | |
| 59 address_family = AF_INET6; | |
| 60 break; | |
| 61 default: | |
|
akalin
2013/08/29 22:08:33
suggest removing the default case so that in case
yzshen1
2013/08/29 23:04:18
Done.
| |
| 62 NOTREACHED(); | |
| 63 } | |
| 64 socket_ = socket(address_family, SOCK_STREAM, IPPROTO_TCP); | |
| 55 if (socket_ < 0) { | 65 if (socket_ < 0) { |
| 56 PLOG(ERROR) << "socket() returned an error"; | 66 PLOG(ERROR) << "socket() returned an error"; |
| 57 return MapSystemError(errno); | 67 return MapSystemError(errno); |
| 58 } | 68 } |
| 59 | 69 |
| 60 if (SetNonBlocking(socket_)) { | 70 if (SetNonBlocking(socket_)) { |
| 61 int result = MapSystemError(errno); | 71 int result = MapSystemError(errno); |
| 62 Close(); | 72 Close(); |
| 63 return result; | 73 return result; |
| 64 } | 74 } |
| 65 | 75 |
| 66 int result = SetSocketOptions(); | 76 return OK; |
| 67 if (result != OK) { | 77 } |
| 68 Close(); | |
| 69 return result; | |
| 70 } | |
| 71 | 78 |
| 72 SockaddrStorage storage; | 79 int TCPSocketLibevent::Adopt(int socket) { |
| 73 if (!address.ToSockAddr(storage.addr, &storage.addr_len)) { | 80 DCHECK(CalledOnValidThread()); |
| 74 Close(); | 81 DCHECK_EQ(socket_, kInvalidSocket); |
| 75 return ERR_ADDRESS_INVALID; | |
| 76 } | |
| 77 | 82 |
| 78 result = bind(socket_, storage.addr, storage.addr_len); | 83 socket_ = socket; |
| 79 if (result < 0) { | |
| 80 PLOG(ERROR) << "bind() returned an error"; | |
| 81 result = MapSystemError(errno); | |
| 82 Close(); | |
| 83 return result; | |
| 84 } | |
| 85 | 84 |
| 86 result = listen(socket_, backlog); | 85 if (SetNonBlocking(socket_)) { |
| 87 if (result < 0) { | 86 int result = MapSystemError(errno); |
| 88 PLOG(ERROR) << "listen() returned an error"; | |
| 89 result = MapSystemError(errno); | |
| 90 Close(); | 87 Close(); |
| 91 return result; | 88 return result; |
| 92 } | 89 } |
| 93 | 90 |
| 94 return OK; | 91 return OK; |
| 95 } | 92 } |
| 96 | 93 |
| 97 int TCPServerSocketLibevent::GetLocalAddress(IPEndPoint* address) const { | 94 int TCPSocketLibevent::Release() { |
| 95 DCHECK(CalledOnValidThread()); | |
| 96 DCHECK(accept_callback_.is_null()); | |
| 97 | |
| 98 int result = socket_; | |
| 99 socket_ = kInvalidSocket; | |
| 100 return result; | |
| 101 } | |
| 102 | |
| 103 int TCPSocketLibevent::Bind(const IPEndPoint& address) { | |
| 104 DCHECK(CalledOnValidThread()); | |
| 105 DCHECK_NE(socket_, kInvalidSocket); | |
| 106 | |
| 107 SockaddrStorage storage; | |
| 108 if (!address.ToSockAddr(storage.addr, &storage.addr_len)) | |
| 109 return ERR_ADDRESS_INVALID; | |
| 110 | |
| 111 int result = bind(socket_, storage.addr, storage.addr_len); | |
| 112 if (result < 0) { | |
| 113 PLOG(ERROR) << "bind() returned an error"; | |
| 114 return MapSystemError(errno); | |
| 115 } | |
| 116 | |
| 117 return OK; | |
| 118 } | |
| 119 | |
| 120 int TCPSocketLibevent::GetLocalAddress(IPEndPoint* address) const { | |
| 98 DCHECK(CalledOnValidThread()); | 121 DCHECK(CalledOnValidThread()); |
| 99 DCHECK(address); | 122 DCHECK(address); |
| 100 | 123 |
| 101 SockaddrStorage storage; | 124 SockaddrStorage storage; |
| 102 if (getsockname(socket_, storage.addr, &storage.addr_len) < 0) | 125 if (getsockname(socket_, storage.addr, &storage.addr_len) < 0) |
| 103 return MapSystemError(errno); | 126 return MapSystemError(errno); |
| 104 if (!address->FromSockAddr(storage.addr, storage.addr_len)) | 127 if (!address->FromSockAddr(storage.addr, storage.addr_len)) |
| 105 return ERR_FAILED; | 128 return ERR_FAILED; |
| 106 | 129 |
| 107 return OK; | 130 return OK; |
| 108 } | 131 } |
| 109 | 132 |
| 110 int TCPServerSocketLibevent::Accept( | 133 int TCPSocketLibevent::Listen(int backlog) { |
| 111 scoped_ptr<StreamSocket>* socket, const CompletionCallback& callback) { | 134 DCHECK(CalledOnValidThread()); |
| 135 DCHECK_GT(backlog, 0); | |
| 136 DCHECK_NE(socket_, kInvalidSocket); | |
| 137 | |
| 138 int result = listen(socket_, backlog); | |
| 139 if (result < 0) { | |
| 140 PLOG(ERROR) << "listen() returned an error"; | |
| 141 return MapSystemError(errno); | |
| 142 } | |
| 143 | |
| 144 return OK; | |
| 145 } | |
| 146 | |
| 147 int TCPSocketLibevent::Accept(scoped_ptr<TCPSocketLibevent>* socket, | |
| 148 IPEndPoint* address, | |
| 149 const CompletionCallback& callback) { | |
| 112 DCHECK(CalledOnValidThread()); | 150 DCHECK(CalledOnValidThread()); |
| 113 DCHECK(socket); | 151 DCHECK(socket); |
| 114 DCHECK(!callback.is_null()); | 152 DCHECK(!callback.is_null()); |
| 115 DCHECK(accept_callback_.is_null()); | 153 DCHECK(accept_callback_.is_null()); |
| 116 | 154 |
| 117 net_log_.BeginEvent(NetLog::TYPE_TCP_ACCEPT); | 155 net_log_.BeginEvent(NetLog::TYPE_TCP_ACCEPT); |
| 118 | 156 |
| 119 int result = AcceptInternal(socket); | 157 int result = AcceptInternal(socket, address); |
| 120 | 158 |
| 121 if (result == ERR_IO_PENDING) { | 159 if (result == ERR_IO_PENDING) { |
| 122 if (!base::MessageLoopForIO::current()->WatchFileDescriptor( | 160 if (!base::MessageLoopForIO::current()->WatchFileDescriptor( |
| 123 socket_, true, base::MessageLoopForIO::WATCH_READ, | 161 socket_, true, base::MessageLoopForIO::WATCH_READ, |
| 124 &accept_socket_watcher_, this)) { | 162 &accept_socket_watcher_, this)) { |
| 125 PLOG(ERROR) << "WatchFileDescriptor failed on read"; | 163 PLOG(ERROR) << "WatchFileDescriptor failed on read"; |
| 126 return MapSystemError(errno); | 164 return MapSystemError(errno); |
| 127 } | 165 } |
| 128 | 166 |
| 129 accept_socket_ = socket; | 167 accept_socket_ = socket; |
| 168 accept_address_ = address; | |
| 130 accept_callback_ = callback; | 169 accept_callback_ = callback; |
| 131 } | 170 } |
| 132 | 171 |
| 133 return result; | 172 return result; |
| 134 } | 173 } |
| 135 | 174 |
| 136 int TCPServerSocketLibevent::SetSocketOptions() { | 175 int TCPSocketLibevent::SetDefaultOptionsForServer() { |
| 176 return SetAddressReuse(true); | |
| 177 } | |
| 178 | |
| 179 int TCPSocketLibevent::SetAddressReuse(bool allow) { | |
| 137 // SO_REUSEADDR is useful for server sockets to bind to a recently unbound | 180 // SO_REUSEADDR is useful for server sockets to bind to a recently unbound |
| 138 // port. When a socket is closed, the end point changes its state to TIME_WAIT | 181 // port. When a socket is closed, the end point changes its state to TIME_WAIT |
| 139 // and wait for 2 MSL (maximum segment lifetime) to ensure the remote peer | 182 // and wait for 2 MSL (maximum segment lifetime) to ensure the remote peer |
| 140 // acknowledges its closure. For server sockets, it is usually safe to | 183 // acknowledges its closure. For server sockets, it is usually safe to |
| 141 // bind to a TIME_WAIT end point immediately, which is a widely adopted | 184 // bind to a TIME_WAIT end point immediately, which is a widely adopted |
| 142 // behavior. | 185 // behavior. |
| 143 // | 186 // |
| 144 // Note that on *nix, SO_REUSEADDR does not enable the TCP socket to bind to | 187 // Note that on *nix, SO_REUSEADDR does not enable the TCP socket to bind to |
| 145 // an end point that is already bound by another socket. To do that one must | 188 // an end point that is already bound by another socket. To do that one must |
| 146 // set SO_REUSEPORT instead. This option is not provided on Linux prior | 189 // set SO_REUSEPORT instead. This option is not provided on Linux prior |
| 147 // to 3.9. | 190 // to 3.9. |
| 148 // | 191 // |
| 149 // SO_REUSEPORT is provided in MacOS X and iOS. | 192 // SO_REUSEPORT is provided in MacOS X and iOS. |
| 150 int true_value = 1; | 193 int boolean_value = allow ? 1 : 0; |
| 151 int rv = setsockopt(socket_, SOL_SOCKET, SO_REUSEADDR, &true_value, | 194 int rv = setsockopt(socket_, SOL_SOCKET, SO_REUSEADDR, &boolean_value, |
| 152 sizeof(true_value)); | 195 sizeof(boolean_value)); |
| 153 if (rv < 0) | 196 if (rv < 0) |
| 154 return MapSystemError(errno); | 197 return MapSystemError(errno); |
| 155 return OK; | 198 return OK; |
| 156 } | 199 } |
| 157 | 200 |
| 158 int TCPServerSocketLibevent::AcceptInternal( | 201 void TCPSocketLibevent::Close() { |
| 159 scoped_ptr<StreamSocket>* socket) { | 202 if (socket_ != kInvalidSocket) { |
| 203 bool ok = accept_socket_watcher_.StopWatchingFileDescriptor(); | |
| 204 DCHECK(ok); | |
| 205 if (HANDLE_EINTR(close(socket_)) < 0) | |
| 206 PLOG(ERROR) << "close"; | |
| 207 socket_ = kInvalidSocket; | |
| 208 } | |
| 209 } | |
| 210 | |
| 211 int TCPSocketLibevent::AcceptInternal(scoped_ptr<TCPSocketLibevent>* socket, | |
| 212 IPEndPoint* address) { | |
| 160 SockaddrStorage storage; | 213 SockaddrStorage storage; |
| 161 int new_socket = HANDLE_EINTR(accept(socket_, | 214 int new_socket = HANDLE_EINTR(accept(socket_, |
| 162 storage.addr, | 215 storage.addr, |
| 163 &storage.addr_len)); | 216 &storage.addr_len)); |
| 164 if (new_socket < 0) { | 217 if (new_socket < 0) { |
| 165 int net_error = MapSystemError(errno); | 218 int net_error = MapSystemError(errno); |
| 166 if (net_error != ERR_IO_PENDING) | 219 if (net_error != ERR_IO_PENDING) |
| 167 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_TCP_ACCEPT, net_error); | 220 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_TCP_ACCEPT, net_error); |
| 168 return net_error; | 221 return net_error; |
| 169 } | 222 } |
| 170 | 223 |
| 171 IPEndPoint address; | 224 IPEndPoint ip_end_point; |
| 172 if (!address.FromSockAddr(storage.addr, storage.addr_len)) { | 225 if (!ip_end_point.FromSockAddr(storage.addr, storage.addr_len)) { |
| 173 NOTREACHED(); | 226 NOTREACHED(); |
| 174 if (HANDLE_EINTR(close(new_socket)) < 0) | 227 if (HANDLE_EINTR(close(new_socket)) < 0) |
| 175 PLOG(ERROR) << "close"; | 228 PLOG(ERROR) << "close"; |
| 176 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_TCP_ACCEPT, ERR_FAILED); | 229 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_TCP_ACCEPT, ERR_FAILED); |
| 177 return ERR_FAILED; | 230 return ERR_FAILED; |
| 178 } | 231 } |
| 179 scoped_ptr<TCPClientSocket> tcp_socket(new TCPClientSocket( | 232 scoped_ptr<TCPSocketLibevent> tcp_socket(new TCPSocketLibevent( |
| 180 AddressList(address), | |
| 181 net_log_.net_log(), net_log_.source())); | 233 net_log_.net_log(), net_log_.source())); |
| 182 int adopt_result = tcp_socket->AdoptSocket(new_socket); | 234 int adopt_result = tcp_socket->Adopt(new_socket); |
| 183 if (adopt_result != OK) { | 235 if (adopt_result != OK) { |
| 184 if (HANDLE_EINTR(close(new_socket)) < 0) | |
| 185 PLOG(ERROR) << "close"; | |
| 186 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_TCP_ACCEPT, adopt_result); | 236 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_TCP_ACCEPT, adopt_result); |
| 187 return adopt_result; | 237 return adopt_result; |
| 188 } | 238 } |
| 189 socket->reset(tcp_socket.release()); | 239 *socket = tcp_socket.Pass(); |
| 240 if (address) | |
|
akalin
2013/08/29 22:08:33
is this check necessary? can't you mandate that |a
yzshen1
2013/08/29 23:04:18
I was trying to follow POSIX accept(); its output
| |
| 241 *address = ip_end_point; | |
| 190 net_log_.EndEvent(NetLog::TYPE_TCP_ACCEPT, | 242 net_log_.EndEvent(NetLog::TYPE_TCP_ACCEPT, |
| 191 CreateNetLogIPEndPointCallback(&address)); | 243 CreateNetLogIPEndPointCallback(&ip_end_point)); |
| 192 return OK; | 244 return OK; |
| 193 } | 245 } |
| 194 | 246 |
| 195 void TCPServerSocketLibevent::Close() { | 247 void TCPSocketLibevent::OnFileCanReadWithoutBlocking(int fd) { |
| 196 if (socket_ != kInvalidSocket) { | |
| 197 bool ok = accept_socket_watcher_.StopWatchingFileDescriptor(); | |
| 198 DCHECK(ok); | |
| 199 if (HANDLE_EINTR(close(socket_)) < 0) | |
| 200 PLOG(ERROR) << "close"; | |
| 201 socket_ = kInvalidSocket; | |
| 202 } | |
| 203 } | |
| 204 | |
| 205 void TCPServerSocketLibevent::OnFileCanReadWithoutBlocking(int fd) { | |
| 206 DCHECK(CalledOnValidThread()); | 248 DCHECK(CalledOnValidThread()); |
| 207 | 249 |
| 208 int result = AcceptInternal(accept_socket_); | 250 int result = AcceptInternal(accept_socket_, accept_address_); |
| 209 if (result != ERR_IO_PENDING) { | 251 if (result != ERR_IO_PENDING) { |
| 210 accept_socket_ = NULL; | 252 accept_socket_ = NULL; |
| 253 accept_address_ = NULL; | |
| 211 bool ok = accept_socket_watcher_.StopWatchingFileDescriptor(); | 254 bool ok = accept_socket_watcher_.StopWatchingFileDescriptor(); |
| 212 DCHECK(ok); | 255 DCHECK(ok); |
| 213 CompletionCallback callback = accept_callback_; | 256 CompletionCallback callback = accept_callback_; |
| 214 accept_callback_.Reset(); | 257 accept_callback_.Reset(); |
| 215 callback.Run(result); | 258 callback.Run(result); |
| 216 } | 259 } |
| 217 } | 260 } |
| 218 | 261 |
| 219 void TCPServerSocketLibevent::OnFileCanWriteWithoutBlocking(int fd) { | 262 void TCPSocketLibevent::OnFileCanWriteWithoutBlocking(int fd) { |
| 220 NOTREACHED(); | 263 NOTREACHED(); |
| 221 } | 264 } |
| 222 | 265 |
| 223 } // namespace net | 266 } // namespace net |
| OLD | NEW |