socket.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. package torrent
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "os"
  8. "strconv"
  9. "syscall"
  10. g "github.com/anacrolix/generics"
  11. "github.com/anacrolix/log"
  12. "github.com/anacrolix/missinggo/perf"
  13. "github.com/anacrolix/missinggo/v2"
  14. )
  15. type Listener interface {
  16. // Accept waits for and returns the next connection to the listener.
  17. Accept() (net.Conn, error)
  18. // Addr returns the listener's network address.
  19. Addr() net.Addr
  20. }
  21. type socket interface {
  22. Listener
  23. Dialer
  24. Close() error
  25. }
  26. func listen(n network, addr string, f firewallCallback, logger log.Logger) (socket, error) {
  27. switch {
  28. case n.Tcp:
  29. return listenTcp(n.String(), addr)
  30. case n.Udp:
  31. return listenUtp(n.String(), addr, f, logger)
  32. default:
  33. panic(n)
  34. }
  35. }
  36. // Dialing TCP from a local port limits us to a single outgoing TCP connection to each remote
  37. // client. Instead, this should be a last resort if we need to use holepunching, and only then to
  38. // connect to other clients that actually try to holepunch TCP.
  39. const dialTcpFromListenPort = false
  40. var tcpListenConfig = net.ListenConfig{
  41. Control: func(network, address string, c syscall.RawConn) (err error) {
  42. controlErr := c.Control(func(fd uintptr) {
  43. if dialTcpFromListenPort {
  44. err = setReusePortSockOpts(fd)
  45. }
  46. })
  47. if err != nil {
  48. return
  49. }
  50. err = controlErr
  51. return
  52. },
  53. // BitTorrent connections manage their own keep-alives.
  54. KeepAlive: -1,
  55. }
  56. func listenTcp(network, address string) (s socket, err error) {
  57. l, err := tcpListenConfig.Listen(context.Background(), network, address)
  58. if err != nil {
  59. return
  60. }
  61. netDialer := net.Dialer{
  62. // We don't want fallback, as we explicitly manage the IPv4/IPv6 distinction ourselves,
  63. // although it's probably not triggered as I think the network is already constrained to
  64. // tcp4 or tcp6 at this point.
  65. FallbackDelay: -1,
  66. // BitTorrent connections manage their own keepalives.
  67. KeepAlive: tcpListenConfig.KeepAlive,
  68. Control: func(network, address string, c syscall.RawConn) (err error) {
  69. controlErr := c.Control(func(fd uintptr) {
  70. err = setSockNoLinger(fd)
  71. if err != nil {
  72. // Failing to disable linger is undesirable, but not fatal.
  73. log.Levelf(log.Debug, "error setting linger socket option on tcp socket: %v", err)
  74. err = nil
  75. }
  76. // This is no longer required I think, see
  77. // https://github.com/anacrolix/torrent/discussions/856. I added this originally to
  78. // allow dialling out from the client's listen port, but that doesn't really work. I
  79. // think Linux older than ~2013 doesn't support SO_REUSEPORT.
  80. if dialTcpFromListenPort {
  81. err = setReusePortSockOpts(fd)
  82. }
  83. })
  84. if err == nil {
  85. err = controlErr
  86. }
  87. return
  88. },
  89. }
  90. if dialTcpFromListenPort {
  91. netDialer.LocalAddr = l.Addr()
  92. }
  93. s = tcpSocket{
  94. Listener: l,
  95. NetworkDialer: NetworkDialer{
  96. Network: network,
  97. Dialer: &netDialer,
  98. },
  99. }
  100. return
  101. }
  102. type tcpSocket struct {
  103. net.Listener
  104. NetworkDialer
  105. }
  106. func listenAll(
  107. networks []network,
  108. getHost func(string) string,
  109. port int,
  110. f firewallCallback,
  111. logger log.Logger,
  112. ) ([]socket, error) {
  113. if len(networks) == 0 {
  114. return nil, nil
  115. }
  116. var nahs []networkAndHost
  117. for _, n := range networks {
  118. nahs = append(nahs, networkAndHost{n, getHost(n.String())})
  119. }
  120. for {
  121. ss, retry, err := listenAllRetry(nahs, port, f, logger)
  122. if !retry {
  123. return ss, err
  124. }
  125. }
  126. }
  127. type networkAndHost struct {
  128. Network network
  129. Host string
  130. }
  131. func isUnsupportedNetworkError(err error) bool {
  132. var sysErr *os.SyscallError
  133. //spewCfg := spew.NewDefaultConfig()
  134. //spewCfg.ContinueOnMethod = true
  135. //spewCfg.Dump(err)
  136. if !errors.As(err, &sysErr) {
  137. return false
  138. }
  139. //spewCfg.Dump(sysErr)
  140. //spewCfg.Dump(sysErr.Err.Error())
  141. // This might only be Linux specific.
  142. return sysErr.Syscall == "bind" && sysErr.Err.Error() == "cannot assign requested address"
  143. }
  144. func listenAllRetry(
  145. nahs []networkAndHost,
  146. port int,
  147. f firewallCallback,
  148. logger log.Logger,
  149. ) (ss []socket, retry bool, err error) {
  150. // Close all sockets on error or retry.
  151. defer func() {
  152. if err != nil || retry {
  153. for _, s := range ss {
  154. s.Close()
  155. }
  156. ss = nil
  157. }
  158. }()
  159. g.MakeSliceWithCap(&ss, len(nahs))
  160. portStr := strconv.FormatInt(int64(port), 10)
  161. for _, nah := range nahs {
  162. var s socket
  163. s, err = listen(nah.Network, net.JoinHostPort(nah.Host, portStr), f, logger)
  164. if err != nil {
  165. if isUnsupportedNetworkError(err) {
  166. err = nil
  167. continue
  168. }
  169. if len(ss) == 0 {
  170. // First relative to a possibly dynamic port (0).
  171. err = fmt.Errorf("first listen: %w", err)
  172. } else {
  173. err = fmt.Errorf("subsequent listen: %w", err)
  174. }
  175. retry = missinggo.IsAddrInUse(err) && port == 0
  176. return
  177. }
  178. ss = append(ss, s)
  179. portStr = strconv.FormatInt(int64(missinggo.AddrPort(ss[0].Addr())), 10)
  180. }
  181. return
  182. }
  183. // This isn't aliased from go-libutp since that assumes CGO.
  184. type firewallCallback func(net.Addr) bool
  185. func listenUtp(network, addr string, fc firewallCallback, logger log.Logger) (socket, error) {
  186. us, err := NewUtpSocket(network, addr, fc, logger)
  187. return utpSocketSocket{us, network}, err
  188. }
  189. // utpSocket wrapper, additionally wrapped for the torrent package's socket interface.
  190. type utpSocketSocket struct {
  191. utpSocket
  192. network string
  193. }
  194. func (me utpSocketSocket) DialerNetwork() string {
  195. return me.network
  196. }
  197. func (me utpSocketSocket) Dial(ctx context.Context, addr string) (conn net.Conn, err error) {
  198. defer perf.ScopeTimerErr(&err)()
  199. return me.utpSocket.DialContext(ctx, me.network, addr)
  200. }