transmission/libtransmission/tr-udp.cc

298 lines
9.1 KiB
C++
Raw Normal View History

// This file Copyright © 2010 Juliusz Chroboczek.
// It may be used under the MIT (SPDX: MIT) license.
// License text can be found in the licenses/ folder.
#include <array>
2022-08-17 16:08:36 +00:00
#include <cerrno>
2022-03-15 14:52:16 +00:00
#include <cstdint>
#include <cstring> /* memcmp(), memset() */
2011-01-09 21:48:51 +00:00
#include <event2/event.h>
2011-01-09 21:48:46 +00:00
2022-03-15 14:52:16 +00:00
#include <fmt/core.h>
#include "transmission.h"
#include "log.h"
#include "net.h"
#include "session.h"
#include "tr-assert.h"
#include "tr-utp.h"
2022-03-15 14:52:16 +00:00
#include "utils.h"
2011-01-09 21:48:06 +00:00
/* Since we use a single UDP socket in order to implement multiple
µTP sockets, try to set up huge buffers. */
static auto constexpr RecvBufferSize = 4 * 1024 * 1024;
static auto constexpr SendBufferSize = 1 * 1024 * 1024;
static auto constexpr SmallBufferSize = 32 * 1024;
static void set_socket_buffers(tr_socket_t fd, bool large)
{
int rbuf = 0;
int sbuf = 0;
socklen_t rbuf_len = sizeof(rbuf);
socklen_t sbuf_len = sizeof(sbuf);
int size = large ? RecvBufferSize : SmallBufferSize;
int rc = setsockopt(fd, SOL_SOCKET, SO_RCVBUF, reinterpret_cast<char const*>(&size), sizeof(size));
if (rc < 0)
{
tr_logAddDebug(fmt::format("Couldn't set receive buffer: {}", tr_net_strerror(sockerrno)));
}
size = large ? SendBufferSize : SmallBufferSize;
rc = setsockopt(fd, SOL_SOCKET, SO_SNDBUF, reinterpret_cast<char const*>(&size), sizeof(size));
if (rc < 0)
{
tr_logAddDebug(fmt::format("Couldn't set send buffer: {}", tr_net_strerror(sockerrno)));
}
if (large)
{
rc = getsockopt(fd, SOL_SOCKET, SO_RCVBUF, reinterpret_cast<char*>(&rbuf), &rbuf_len);
if (rc < 0)
{
rbuf = 0;
}
rc = getsockopt(fd, SOL_SOCKET, SO_SNDBUF, reinterpret_cast<char*>(&sbuf), &sbuf_len);
if (rc < 0)
{
sbuf = 0;
}
if (rbuf < RecvBufferSize)
{
tr_logAddDebug(fmt::format("Couldn't set receive buffer: requested {}, got {}", RecvBufferSize, rbuf));
#ifdef __linux__
tr_logAddDebug(fmt::format("Please add the line 'net.core.rmem_max = {}' to /etc/sysctl.conf", RecvBufferSize));
#endif
}
if (sbuf < SendBufferSize)
{
tr_logAddDebug(fmt::format("Couldn't set send buffer: requested {}, got {}", SendBufferSize, sbuf));
#ifdef __linux__
tr_logAddDebug(fmt::format("Please add the line 'net.core.wmem_max = {}' to /etc/sysctl.conf", SendBufferSize));
#endif
}
}
}
static void event_callback(evutil_socket_t s, [[maybe_unused]] short type, void* vsession)
2011-01-09 21:48:46 +00:00
{
TR_ASSERT(vsession != nullptr);
TR_ASSERT(type == EV_READ);
2022-11-11 16:09:24 +00:00
auto buf = std::array<unsigned char, 8192>{};
auto from = sockaddr_storage{};
2022-11-11 16:09:24 +00:00
auto fromlen = socklen_t{ sizeof(from) };
auto const rc = recvfrom(
s,
reinterpret_cast<char*>(std::data(buf)),
std::size(buf) - 1,
0,
reinterpret_cast<sockaddr*>(&from),
&fromlen);
/* Since most packets we receive here are µTP, make quick inline
2022-03-15 14:52:16 +00:00
checks for the other protocols. The logic is as follows:
- all DHT packets start with 'd'
- all UDP tracker packets start with a 32-bit (!) "action", which
is between 0 and 3
- the above cannot be µTP packets, since these start with a 4-bit
version number (1). */
2022-11-11 16:09:24 +00:00
auto* session = static_cast<tr_session*>(vsession);
if (rc > 0)
{
if (buf[0] == 'd')
{
2022-11-11 16:09:24 +00:00
if (session->dht_)
{
2022-11-11 16:09:24 +00:00
buf[rc] = '\0'; // libdht requires zero-terminated messages
session->dht_->handleMessage(std::data(buf), rc, reinterpret_cast<sockaddr*>(&from), fromlen);
}
}
else if (rc >= 8 && buf[0] == 0 && buf[1] == 0 && buf[2] == 0 && buf[3] <= 3)
{
if (!session->announcer_udp_->handleMessage(std::data(buf), rc))
{
tr_logAddTrace("Couldn't parse UDP tracker packet.");
}
}
else
{
2022-12-14 01:58:39 +00:00
if (session->allowsUTP() && (session->utp_context != nullptr))
{
if (!tr_utpPacket(std::data(buf), rc, (struct sockaddr*)&from, fromlen, session))
{
tr_logAddTrace("Unexpected UDP packet");
}
}
}
2011-01-09 21:48:46 +00:00
}
}
2011-01-09 21:48:46 +00:00
// BEP-32 explains why we need to bind to one IPv6 address
tr_session::tr_udp_core::tr_udp_core(tr_session& session, tr_port udp_port)
: udp_port_{ udp_port }
, session_{ session }
{
if (std::empty(udp_port_))
{
return;
}
if (auto sock = socket(PF_INET, SOCK_DGRAM, 0); sock != TR_BAD_SOCKET)
{
auto const [addr, is_any] = session_.publicAddress(TR_AF_INET);
auto const [ss, sslen] = addr.to_sockaddr(udp_port_);
if (bind(sock, reinterpret_cast<sockaddr const*>(&ss), sslen) != 0)
{
auto const error_code = errno;
tr_logAddWarn(fmt::format(
_("Couldn't bind IPv4 socket {address}: {error} ({error_code})"),
fmt::arg("address", addr.display_name(udp_port_)),
fmt::arg("error", tr_strerror(error_code)),
fmt::arg("error_code", error_code)));
tr_netCloseSocket(sock);
}
else
{
tr_logAddInfo("Bound UDP IPv4 address {:s}", addr.display_name(udp_port_));
session_.setSocketTOS(sock, TR_AF_INET);
set_socket_buffers(sock, session_.allowsUTP());
udp4_socket_ = sock;
udp4_event_.reset(event_new(session_.eventBase(), udp4_socket_, EV_READ | EV_PERSIST, event_callback, &session_));
event_add(udp4_event_.get(), nullptr);
}
}
if (auto sock = socket(PF_INET6, SOCK_DGRAM, 0); sock != TR_BAD_SOCKET)
{
auto const [addr, is_any] = session_.publicAddress(TR_AF_INET6);
auto const [ss, sslen] = addr.to_sockaddr(udp_port_);
if (bind(sock, reinterpret_cast<sockaddr const*>(&ss), sslen) != 0)
{
auto const error_code = errno;
tr_logAddWarn(fmt::format(
_("Couldn't bind IPv6 socket {address}: {error} ({error_code})"),
fmt::arg("address", addr.display_name()),
fmt::arg("error", tr_strerror(error_code)),
fmt::arg("error_code", error_code)));
tr_netCloseSocket(sock);
}
else
{
tr_logAddInfo("Bound UDP IPv6 address {:s}", addr.display_name(udp_port_));
session_.setSocketTOS(sock, TR_AF_INET6);
set_socket_buffers(sock, session_.allowsUTP());
udp6_socket_ = sock;
udp6_event_.reset(event_new(session_.eventBase(), udp6_socket_, EV_READ | EV_PERSIST, event_callback, &session_));
event_add(udp6_event_.get(), nullptr);
#ifdef IPV6_V6ONLY
// Since we always open an IPv4 socket on the same port,
// this shouldn't matter. But I'm superstitious.
int one = 1;
(void)setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, reinterpret_cast<char const*>(&one), sizeof(one));
#endif
}
}
}
tr_session::tr_udp_core::~tr_udp_core()
{
udp6_event_.reset();
if (udp6_socket_ != TR_BAD_SOCKET)
{
tr_netCloseSocket(udp6_socket_);
udp6_socket_ = TR_BAD_SOCKET;
2011-01-09 21:48:46 +00:00
}
udp4_event_.reset();
if (udp4_socket_ != TR_BAD_SOCKET)
{
tr_netCloseSocket(udp4_socket_);
udp4_socket_ = TR_BAD_SOCKET;
}
}
void tr_session::tr_udp_core::sendto(void const* buf, size_t buflen, struct sockaddr const* to, socklen_t const tolen) const
{
int error = 0;
std::array<char, std::max(INET_ADDRSTRLEN, INET6_ADDRSTRLEN) + 1> peer = {};
if (to->sa_family == AF_INET)
{
if (udp4_socket_ != TR_BAD_SOCKET)
{
if (::sendto(udp4_socket_, static_cast<char const*>(buf), buflen, 0, to, tolen) == -1)
{
error = -1;
}
}
else
{
error = -1;
errno = EBADF;
}
if (error == -1)
{
evutil_inet_ntop(
AF_INET,
&((reinterpret_cast<struct sockaddr_in const*>(to))->sin_addr),
std::data(peer),
std::size(peer));
}
}
else if (to->sa_family == AF_INET6)
{
if (udp6_socket_ != TR_BAD_SOCKET)
{
if (::sendto(udp6_socket_, static_cast<char const*>(buf), buflen, 0, to, tolen) == -1)
{
error = -1;
}
}
else
{
error = -1;
errno = EBADF;
}
if (error == -1)
{
evutil_inet_ntop(
AF_INET6,
&((reinterpret_cast<struct sockaddr_in6 const*>(to))->sin6_addr),
std::data(peer),
std::size(peer));
}
}
else
{
error = -1;
errno = EAFNOSUPPORT;
2011-01-09 21:48:46 +00:00
}
if (error == -1)
{
tr_logAddWarn(fmt::format(
"Couldn't send to {address}: {errno} ({error})",
fmt::arg("address", std::data(peer)),
fmt::arg("errno", errno),
fmt::arg("error", tr_strerror(errno))));
}
}