summaryrefslogtreecommitdiffstats
path: root/net/udp
diff options
context:
space:
mode:
authorikarienator@chromium.org <ikarienator@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-07-04 07:17:27 +0000
committerikarienator@chromium.org <ikarienator@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-07-04 07:17:27 +0000
commit5c95f099bd5d799cc4ab385ddc443f650d8afb4e (patch)
treee20c45dbcfec1008770e1970dab77302111e1f34 /net/udp
parent6b0dfcdbccbc11317ede24321ee41e79240e6676 (diff)
downloadchromium_src-5c95f099bd5d799cc4ab385ddc443f650d8afb4e.zip
chromium_src-5c95f099bd5d799cc4ab385ddc443f650d8afb4e.tar.gz
chromium_src-5c95f099bd5d799cc4ab385ddc443f650d8afb4e.tar.bz2
Remove net::ServerSocket::setAllowReuseAddress and fix server socket on Windows.
SO_REUSEADDR is useful for server sockets to bind to a recently unbound port. When a socket is closed, the end point changes its state to TIME_WAIT and wait for 2 MSL (maximum segment lifetime) to ensure the remote peer acknowledges its closure. For server sockets, it is usually safe to bind to a TIME_WAIT end point immediately, which is a widely adopted behavior. On Linux SO_REUSEADDR does not enable the TCP socket to bind to an end point that is already bound by another socket. To do that one must set SO_REUSEPORT instead. However, on Windows, SO_REUSEADDR works as if both SO_REUSEDPORT and SO_REUSEADDR are set. Furthermore, A bound end point can be hijacked by another process by setting SO_REUSEADDR. Therefore a Windows-only option SO_EXCLUSIVEADDRUSE was introduced in Windows NT 4.0 SP4. If the socket that is bound to the end point has SO_EXCLUSIVEADDRUSE enabled, it is not possible for another socket to forcibly bind to the end point until the end point is unbound. Also, unlike on *nix, on Windows a TCP server socket can always bind to an end point in TIME_WAIT state without setting SO_REUSEADDR, therefore we cannot emulate a similar behavior of disabling SO_REUSEADDR here. This is considered a security issue and MSDN (http://goo.gl/M6fjQ) recommends all server applications to use SO_EXCLUSIVEADDRUSE. BUG=173533 TBR=brettw@chromium.org Review URL: https://chromiumcodereview.appspot.com/15179003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@210147 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/udp')
-rw-r--r--net/udp/udp_socket_libevent.cc40
-rw-r--r--net/udp/udp_socket_win.cc37
2 files changed, 50 insertions, 27 deletions
diff --git a/net/udp/udp_socket_libevent.cc b/net/udp/udp_socket_libevent.cc
index d2446af..073e61c 100644
--- a/net/udp/udp_socket_libevent.cc
+++ b/net/udp/udp_socket_libevent.cc
@@ -8,6 +8,7 @@
#include <fcntl.h>
#include <netdb.h>
#include <sys/socket.h>
+#include <netinet/in.h>
#include "base/callback.h"
#include "base/logging.h"
@@ -21,17 +22,14 @@
#include "net/base/net_log.h"
#include "net/base/net_util.h"
#include "net/udp/udp_net_log_parameters.h"
-#if defined(OS_POSIX)
-#include <netinet/in.h>
-#endif
namespace {
-static const int kBindRetries = 10;
-static const int kPortStart = 1024;
-static const int kPortEnd = 65535;
+const int kBindRetries = 10;
+const int kPortStart = 1024;
+const int kPortEnd = 65535;
-} // namespace net
+} // namespace
namespace net {
@@ -88,6 +86,7 @@ void UDPSocketLibevent::Close() {
PLOG(ERROR) << "close";
socket_ = kInvalidSocket;
+ addr_family_ = 0;
}
int UDPSocketLibevent::GetPeerAddress(IPEndPoint* address) const {
@@ -235,16 +234,24 @@ int UDPSocketLibevent::InternalConnect(const IPEndPoint& address) {
rv = RandomBind(address);
// else connect() does the DatagramSocket::DEFAULT_BIND
- if (rv < 0)
+ if (rv < 0) {
+ Close();
return rv;
+ }
SockaddrStorage storage;
- if (!address.ToSockAddr(storage.addr, &storage.addr_len))
- return ERR_FAILED;
+ if (!address.ToSockAddr(storage.addr, &storage.addr_len)) {
+ Close();
+ return ERR_ADDRESS_INVALID;
+ }
rv = HANDLE_EINTR(connect(socket_, storage.addr, storage.addr_len));
- if (rv < 0)
- return MapSystemError(errno);
+ if (rv < 0) {
+ // Close() may change the current errno. Map errno beforehand.
+ int result = MapSystemError(errno);
+ Close();
+ return result;
+ }
remote_address_.reset(new IPEndPoint(address));
return rv;
@@ -256,12 +263,17 @@ int UDPSocketLibevent::Bind(const IPEndPoint& address) {
int rv = CreateSocket(address);
if (rv < 0)
return rv;
+
rv = SetSocketOptions();
- if (rv < 0)
+ if (rv < 0) {
+ Close();
return rv;
+ }
rv = DoBind(address);
- if (rv < 0)
+ if (rv < 0) {
+ Close();
return rv;
+ }
local_address_.reset();
return rv;
}
diff --git a/net/udp/udp_socket_win.cc b/net/udp/udp_socket_win.cc
index fe97d0b..500abfd 100644
--- a/net/udp/udp_socket_win.cc
+++ b/net/udp/udp_socket_win.cc
@@ -24,11 +24,11 @@
namespace {
-static const int kBindRetries = 10;
-static const int kPortStart = 1024;
-static const int kPortEnd = 65535;
+const int kBindRetries = 10;
+const int kPortStart = 1024;
+const int kPortEnd = 65535;
-} // namespace net
+} // namespace
namespace net {
@@ -198,6 +198,7 @@ void UDPSocketWin::Close() {
UMA_HISTOGRAM_TIMES("Net.UDPSocketWinClose",
base::TimeTicks::Now() - start_time);
socket_ = INVALID_SOCKET;
+ addr_family_ = 0;
core_->Detach();
core_ = NULL;
@@ -216,7 +217,7 @@ int UDPSocketWin::GetPeerAddress(IPEndPoint* address) const {
return MapSystemError(WSAGetLastError());
scoped_ptr<IPEndPoint> address(new IPEndPoint());
if (!address->FromSockAddr(storage.addr, storage.addr_len))
- return ERR_FAILED;
+ return ERR_ADDRESS_INVALID;
remote_address_.reset(address.release());
}
@@ -237,7 +238,7 @@ int UDPSocketWin::GetLocalAddress(IPEndPoint* address) const {
return MapSystemError(WSAGetLastError());
scoped_ptr<IPEndPoint> address(new IPEndPoint());
if (!address->FromSockAddr(storage.addr, storage.addr_len))
- return ERR_FAILED;
+ return ERR_ADDRESS_INVALID;
local_address_.reset(address.release());
}
@@ -326,16 +327,22 @@ int UDPSocketWin::InternalConnect(const IPEndPoint& address) {
rv = RandomBind(address);
// else connect() does the DatagramSocket::DEFAULT_BIND
- if (rv < 0)
+ if (rv < 0) {
+ Close();
return rv;
+ }
SockaddrStorage storage;
if (!address.ToSockAddr(storage.addr, &storage.addr_len))
- return ERR_FAILED;
+ return ERR_ADDRESS_INVALID;
rv = connect(socket_, storage.addr, storage.addr_len);
- if (rv < 0)
- return MapSystemError(WSAGetLastError());
+ if (rv < 0) {
+ // Close() may change the last error. Map it beforehand.
+ int result = MapSystemError(WSAGetLastError());
+ Close();
+ return result;
+ }
remote_address_.reset(new IPEndPoint(address));
return rv;
@@ -347,11 +354,15 @@ int UDPSocketWin::Bind(const IPEndPoint& address) {
if (rv < 0)
return rv;
rv = SetSocketOptions();
- if (rv < 0)
+ if (rv < 0) {
+ Close();
return rv;
+ }
rv = DoBind(address);
- if (rv < 0)
+ if (rv < 0) {
+ Close();
return rv;
+ }
local_address_.reset();
return rv;
}
@@ -424,7 +435,7 @@ void UDPSocketWin::DidCompleteRead() {
// Convert address.
if (recv_from_address_ && result >= 0) {
if (!ReceiveAddressToIPEndpoint(recv_from_address_))
- result = ERR_FAILED;
+ result = ERR_ADDRESS_INVALID;
}
LogRead(result, core_->read_iobuffer_->data());
core_->read_iobuffer_ = NULL;