naiveproxy/net/socket/udp_socket_posix.cc

1081 lines
34 KiB
C++
Raw Permalink Normal View History

2018-01-28 21:32:06 +03:00
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/socket/udp_socket_posix.h"
#include <errno.h>
#include <fcntl.h>
#include <net/if.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/ioctl.h>
#include <sys/socket.h>
#include "base/callback.h"
#include "base/debug/alias.h"
#include "base/files/file_util.h"
#include "base/logging.h"
#include "base/message_loop/message_loop.h"
#include "base/metrics/histogram_macros.h"
#include "base/posix/eintr_wrapper.h"
#include "base/rand_util.h"
#include "base/trace_event/trace_event.h"
#include "build/build_config.h"
#include "net/base/io_buffer.h"
#include "net/base/ip_address.h"
#include "net/base/ip_endpoint.h"
#include "net/base/net_errors.h"
#include "net/base/network_activity_monitor.h"
#include "net/base/sockaddr_storage.h"
#include "net/base/trace_constants.h"
#include "net/log/net_log.h"
#include "net/log/net_log_event_type.h"
#include "net/log/net_log_source.h"
#include "net/log/net_log_source_type.h"
#include "net/socket/socket_descriptor.h"
#include "net/socket/socket_options.h"
#include "net/socket/udp_net_log_parameters.h"
#if defined(OS_ANDROID)
#include <dlfcn.h>
// This was added in Lollipop to dlfcn.h
#define RTLD_NOLOAD 4
#include "base/android/build_info.h"
#include "base/native_library.h"
#include "base/strings/utf_string_conversions.h"
#endif // defined(OS_ANDROID)
#if defined(OS_MACOSX) && !defined(OS_IOS)
// This was needed to debug crbug.com/640281.
// TODO(zhongyi): Remove once the bug is resolved.
#include <dlfcn.h>
#include <pthread.h>
#endif // defined(OS_MACOSX) && !defined(OS_IOS)
#if defined(OS_FUCHSIA)
#include <netstack/netconfig.h>
#endif // defined(OS_FUCHSIA)
namespace net {
namespace {
const int kBindRetries = 10;
const int kPortStart = 1024;
const int kPortEnd = 65535;
const int kActivityMonitorBytesThreshold = 65535;
const int kActivityMonitorMinimumSamplesForThroughputEstimate = 2;
const base::TimeDelta kActivityMonitorMsThreshold =
base::TimeDelta::FromMilliseconds(100);
#if defined(OS_MACOSX) || defined(OS_FUCHSIA)
// When enabling multicast using setsockopt(IP_MULTICAST_IF) MacOS and Fuchsia
// require passing IPv4 address instead of interface index. This function
// resolves IPv4 address by interface index. The |address| is returned in
// network order.
int GetIPv4AddressFromIndex(int socket, uint32_t index, uint32_t* address) {
if (!index) {
*address = htonl(INADDR_ANY);
return OK;
}
sockaddr_in* result = nullptr;
#if defined(OS_MACOSX)
ifreq ifr;
ifr.ifr_addr.sa_family = AF_INET;
if (!if_indextoname(index, ifr.ifr_name))
return MapSystemError(errno);
int rv = ioctl(socket, SIOCGIFADDR, &ifr);
if (rv == -1)
return MapSystemError(errno);
result = reinterpret_cast<sockaddr_in*>(&ifr.ifr_addr);
#elif defined(OS_FUCHSIA)
netc_get_if_info_t netconfig;
int size = ioctl_netc_get_if_info(socket, &netconfig);
if (size < 0)
return MapSystemError(errno);
for (size_t i = 0; i < netconfig.n_info; ++i) {
netc_if_info_t* interface = netconfig.info + i;
if (interface->index == index && interface->addr.ss_family == AF_INET) {
result = reinterpret_cast<sockaddr_in*>(&(interface->addr));
break;
}
}
#endif
if (!result)
return ERR_ADDRESS_INVALID;
*address = result->sin_addr.s_addr;
return OK;
}
#endif // OS_MACOSX || OS_FUCHSIA
#if defined(OS_MACOSX) && !defined(OS_IOS)
// On OSX the file descriptor is guarded to detect the cause of
// crbug.com/640281. guarded API is supported only on newer versions of OSX,
// so the symbols need to be resolved dynamically.
// TODO(zhongyi): Removed this code once the bug is resolved.
typedef uint64_t guardid_t;
typedef int (*GuardedCloseNpFunction)(int fd, const guardid_t* guard);
typedef int (*ChangeFdguardNpFunction)(int fd,
const guardid_t* guard,
u_int flags,
const guardid_t* nguard,
u_int nflags,
int* fdflagsp);
GuardedCloseNpFunction g_guarded_close_np = nullptr;
ChangeFdguardNpFunction g_change_fdguard_np = nullptr;
pthread_once_t g_guarded_functions_once = PTHREAD_ONCE_INIT;
void InitGuardedFunctions() {
void* libsystem_handle =
dlopen("/usr/lib/libSystem.dylib", RTLD_LAZY | RTLD_LOCAL | RTLD_NOLOAD);
if (libsystem_handle) {
g_guarded_close_np = reinterpret_cast<GuardedCloseNpFunction>(
dlsym(libsystem_handle, "guarded_close_np"));
g_change_fdguard_np = reinterpret_cast<ChangeFdguardNpFunction>(
dlsym(libsystem_handle, "change_fdguard_np"));
// If for any reason only one of the functions is found, set both of them to
// nullptr.
if (!g_guarded_close_np || !g_change_fdguard_np) {
g_guarded_close_np = nullptr;
g_change_fdguard_np = nullptr;
}
}
}
int change_fdguard_np(int fd,
const guardid_t* guard,
u_int flags,
const guardid_t* nguard,
u_int nflags,
int* fdflagsp) {
CHECK_EQ(pthread_once(&g_guarded_functions_once, InitGuardedFunctions), 0);
// Older version of OSX may not support guarded API.
if (!g_change_fdguard_np)
return 0;
return g_change_fdguard_np(fd, guard, flags, nguard, nflags, fdflagsp);
}
int guarded_close_np(int fd, const guardid_t* guard) {
// Older version of OSX may not support guarded API.
if (!g_guarded_close_np)
return close(fd);
return g_guarded_close_np(fd, guard);
}
const unsigned int GUARD_CLOSE = 1u << 0;
const unsigned int GUARD_DUP = 1u << 1;
const guardid_t kSocketFdGuard = 0xD712BC0BC9A4EAD4;
#endif // defined(OS_MACOSX) && !defined(OS_IOS)
} // namespace
UDPSocketPosix::UDPSocketPosix(DatagramSocket::BindType bind_type,
const RandIntCallback& rand_int_cb,
net::NetLog* net_log,
const net::NetLogSource& source)
: socket_(kInvalidSocket),
addr_family_(0),
is_connected_(false),
socket_options_(SOCKET_OPTION_MULTICAST_LOOP),
multicast_interface_(0),
multicast_time_to_live_(1),
bind_type_(bind_type),
rand_int_cb_(rand_int_cb),
read_socket_watcher_(FROM_HERE),
write_socket_watcher_(FROM_HERE),
read_watcher_(this),
write_watcher_(this),
read_buf_len_(0),
recv_from_address_(NULL),
write_buf_len_(0),
net_log_(NetLogWithSource::Make(net_log, NetLogSourceType::UDP_SOCKET)),
bound_network_(NetworkChangeNotifier::kInvalidNetworkHandle) {
net_log_.BeginEvent(NetLogEventType::SOCKET_ALIVE,
source.ToEventParametersCallback());
if (bind_type == DatagramSocket::RANDOM_BIND)
DCHECK(!rand_int_cb.is_null());
}
UDPSocketPosix::~UDPSocketPosix() {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
Close();
net_log_.EndEvent(NetLogEventType::SOCKET_ALIVE);
}
int UDPSocketPosix::Open(AddressFamily address_family) {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK_EQ(socket_, kInvalidSocket);
addr_family_ = ConvertAddressFamily(address_family);
socket_ = CreatePlatformSocket(addr_family_, SOCK_DGRAM, 0);
if (socket_ == kInvalidSocket)
return MapSystemError(errno);
#if defined(OS_MACOSX) && !defined(OS_IOS)
PCHECK(change_fdguard_np(socket_, NULL, 0, &kSocketFdGuard,
GUARD_CLOSE | GUARD_DUP, NULL) == 0);
#endif // defined(OS_MACOSX) && !defined(OS_IOS)
if (!base::SetNonBlocking(socket_)) {
const int err = MapSystemError(errno);
Close();
return err;
}
return OK;
}
void UDPSocketPosix::ActivityMonitor::Increment(uint32_t bytes) {
if (!bytes)
return;
bool timer_running = timer_.IsRunning();
bytes_ += bytes;
increments_++;
// Allow initial updates to make sure throughput estimator has
// enough samples to generate a value. (low water mark)
// Or once the bytes threshold has be met. (high water mark)
if (increments_ < kActivityMonitorMinimumSamplesForThroughputEstimate ||
bytes_ > kActivityMonitorBytesThreshold) {
Update();
if (timer_running)
timer_.Reset();
}
if (!timer_running) {
timer_.Start(FROM_HERE, kActivityMonitorMsThreshold, this,
&UDPSocketPosix::ActivityMonitor::OnTimerFired);
}
}
void UDPSocketPosix::ActivityMonitor::Update() {
if (!bytes_)
return;
NetworkActivityMonitorIncrement(bytes_);
bytes_ = 0;
}
void UDPSocketPosix::ActivityMonitor::OnClose() {
timer_.Stop();
Update();
}
void UDPSocketPosix::ActivityMonitor::OnTimerFired() {
increments_ = 0;
if (!bytes_) {
// Can happen if the socket has been idle and have had no
// increments since the timer previously fired. Don't bother
// keeping the timer running in this case.
timer_.Stop();
return;
}
Update();
}
void UDPSocketPosix::SentActivityMonitor::NetworkActivityMonitorIncrement(
uint32_t bytes) {
NetworkActivityMonitor::GetInstance()->IncrementBytesSent(bytes);
}
void UDPSocketPosix::ReceivedActivityMonitor::NetworkActivityMonitorIncrement(
uint32_t bytes) {
NetworkActivityMonitor::GetInstance()->IncrementBytesReceived(bytes);
}
void UDPSocketPosix::Close() {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
if (socket_ == kInvalidSocket)
return;
// Zero out any pending read/write callback state.
read_buf_ = NULL;
read_buf_len_ = 0;
read_callback_.Reset();
recv_from_address_ = NULL;
write_buf_ = NULL;
write_buf_len_ = 0;
write_callback_.Reset();
send_to_address_.reset();
bool ok = read_socket_watcher_.StopWatchingFileDescriptor();
DCHECK(ok);
ok = write_socket_watcher_.StopWatchingFileDescriptor();
DCHECK(ok);
#if defined(OS_MACOSX) && !defined(OS_IOS)
PCHECK(IGNORE_EINTR(guarded_close_np(socket_, &kSocketFdGuard)) == 0);
#else
PCHECK(IGNORE_EINTR(close(socket_)) == 0);
#endif // defined(OS_MACOSX) && !defined(OS_IOS)
socket_ = kInvalidSocket;
addr_family_ = 0;
is_connected_ = false;
sent_activity_monitor_.OnClose();
received_activity_monitor_.OnClose();
}
int UDPSocketPosix::GetPeerAddress(IPEndPoint* address) const {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK(address);
if (!is_connected())
return ERR_SOCKET_NOT_CONNECTED;
if (!remote_address_.get()) {
SockaddrStorage storage;
if (getpeername(socket_, storage.addr, &storage.addr_len))
return MapSystemError(errno);
std::unique_ptr<IPEndPoint> address(new IPEndPoint());
if (!address->FromSockAddr(storage.addr, storage.addr_len))
return ERR_ADDRESS_INVALID;
remote_address_ = std::move(address);
}
*address = *remote_address_;
return OK;
}
int UDPSocketPosix::GetLocalAddress(IPEndPoint* address) const {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK(address);
if (!is_connected())
return ERR_SOCKET_NOT_CONNECTED;
if (!local_address_.get()) {
SockaddrStorage storage;
if (getsockname(socket_, storage.addr, &storage.addr_len))
return MapSystemError(errno);
std::unique_ptr<IPEndPoint> address(new IPEndPoint());
if (!address->FromSockAddr(storage.addr, storage.addr_len))
return ERR_ADDRESS_INVALID;
local_address_ = std::move(address);
net_log_.AddEvent(
NetLogEventType::UDP_LOCAL_ADDRESS,
CreateNetLogUDPConnectCallback(local_address_.get(), bound_network_));
}
*address = *local_address_;
return OK;
}
int UDPSocketPosix::Read(IOBuffer* buf,
int buf_len,
const CompletionCallback& callback) {
return RecvFrom(buf, buf_len, NULL, callback);
}
int UDPSocketPosix::RecvFrom(IOBuffer* buf,
int buf_len,
IPEndPoint* address,
const CompletionCallback& callback) {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK_NE(kInvalidSocket, socket_);
CHECK(read_callback_.is_null());
DCHECK(!recv_from_address_);
DCHECK(!callback.is_null()); // Synchronous operation not supported
DCHECK_GT(buf_len, 0);
int nread = InternalRecvFrom(buf, buf_len, address);
if (nread != ERR_IO_PENDING)
return nread;
if (!base::MessageLoopForIO::current()->WatchFileDescriptor(
socket_, true, base::MessageLoopForIO::WATCH_READ,
&read_socket_watcher_, &read_watcher_)) {
PLOG(ERROR) << "WatchFileDescriptor failed on read";
int result = MapSystemError(errno);
LogRead(result, NULL, 0, NULL);
return result;
}
read_buf_ = buf;
read_buf_len_ = buf_len;
recv_from_address_ = address;
read_callback_ = callback;
return ERR_IO_PENDING;
}
int UDPSocketPosix::Write(IOBuffer* buf,
int buf_len,
const CompletionCallback& callback) {
return SendToOrWrite(buf, buf_len, NULL, callback);
}
int UDPSocketPosix::SendTo(IOBuffer* buf,
int buf_len,
const IPEndPoint& address,
const CompletionCallback& callback) {
return SendToOrWrite(buf, buf_len, &address, callback);
}
int UDPSocketPosix::SendToOrWrite(IOBuffer* buf,
int buf_len,
const IPEndPoint* address,
const CompletionCallback& callback) {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK_NE(kInvalidSocket, socket_);
CHECK(write_callback_.is_null());
DCHECK(!callback.is_null()); // Synchronous operation not supported
DCHECK_GT(buf_len, 0);
int result = InternalSendTo(buf, buf_len, address);
if (result != ERR_IO_PENDING)
return result;
if (!base::MessageLoopForIO::current()->WatchFileDescriptor(
socket_, true, base::MessageLoopForIO::WATCH_WRITE,
&write_socket_watcher_, &write_watcher_)) {
DVLOG(1) << "WatchFileDescriptor failed on write, errno " << errno;
int result = MapSystemError(errno);
LogWrite(result, NULL, NULL);
return result;
}
write_buf_ = buf;
write_buf_len_ = buf_len;
DCHECK(!send_to_address_.get());
if (address) {
send_to_address_.reset(new IPEndPoint(*address));
}
write_callback_ = callback;
return ERR_IO_PENDING;
}
int UDPSocketPosix::Connect(const IPEndPoint& address) {
DCHECK_NE(socket_, kInvalidSocket);
net_log_.BeginEvent(NetLogEventType::UDP_CONNECT,
CreateNetLogUDPConnectCallback(&address, bound_network_));
int rv = InternalConnect(address);
net_log_.EndEventWithNetErrorCode(NetLogEventType::UDP_CONNECT, rv);
is_connected_ = (rv == OK);
return rv;
}
int UDPSocketPosix::InternalConnect(const IPEndPoint& address) {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK(!is_connected());
DCHECK(!remote_address_.get());
int rv = 0;
if (bind_type_ == DatagramSocket::RANDOM_BIND) {
// Construct IPAddress of appropriate size (IPv4 or IPv6) of 0s,
// representing INADDR_ANY or in6addr_any.
size_t addr_size = address.GetSockAddrFamily() == AF_INET
? IPAddress::kIPv4AddressSize
: IPAddress::kIPv6AddressSize;
rv = RandomBind(IPAddress::AllZeros(addr_size));
}
// else connect() does the DatagramSocket::DEFAULT_BIND
if (rv < 0) {
UMA_HISTOGRAM_SPARSE_SLOWLY("Net.UdpSocketRandomBindErrorCode", -rv);
return rv;
}
SockaddrStorage storage;
if (!address.ToSockAddr(storage.addr, &storage.addr_len))
return ERR_ADDRESS_INVALID;
rv = HANDLE_EINTR(connect(socket_, storage.addr, storage.addr_len));
if (rv < 0)
return MapSystemError(errno);
remote_address_.reset(new IPEndPoint(address));
return rv;
}
int UDPSocketPosix::Bind(const IPEndPoint& address) {
DCHECK_NE(socket_, kInvalidSocket);
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK(!is_connected());
int rv = SetMulticastOptions();
if (rv < 0)
return rv;
rv = DoBind(address);
if (rv < 0)
return rv;
is_connected_ = true;
local_address_.reset();
return rv;
}
int UDPSocketPosix::BindToNetwork(
NetworkChangeNotifier::NetworkHandle network) {
DCHECK_NE(socket_, kInvalidSocket);
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK(!is_connected());
if (network == NetworkChangeNotifier::kInvalidNetworkHandle)
return ERR_INVALID_ARGUMENT;
#if defined(OS_ANDROID)
// Android prior to Lollipop didn't have support for binding sockets to
// networks.
if (base::android::BuildInfo::GetInstance()->sdk_int() <
base::android::SDK_VERSION_LOLLIPOP) {
return ERR_NOT_IMPLEMENTED;
}
int rv;
// On Android M and newer releases use supported NDK API. On Android L use
// setNetworkForSocket from libnetd_client.so.
if (base::android::BuildInfo::GetInstance()->sdk_int() >=
base::android::SDK_VERSION_MARSHMALLOW) {
// See declaration of android_setsocknetwork() here:
// http://androidxref.com/6.0.0_r1/xref/development/ndk/platforms/android-M/include/android/multinetwork.h#65
// Function cannot be called directly as it will cause app to fail to load
// on pre-marshmallow devices.
typedef int (*MarshmallowSetNetworkForSocket)(int64_t netId, int socketFd);
static MarshmallowSetNetworkForSocket marshmallowSetNetworkForSocket;
// This is racy, but all racers should come out with the same answer so it
// shouldn't matter.
if (!marshmallowSetNetworkForSocket) {
base::FilePath file(base::GetNativeLibraryName("android"));
void* dl = dlopen(file.value().c_str(), RTLD_NOW);
marshmallowSetNetworkForSocket =
reinterpret_cast<MarshmallowSetNetworkForSocket>(
dlsym(dl, "android_setsocknetwork"));
}
if (!marshmallowSetNetworkForSocket)
return ERR_NOT_IMPLEMENTED;
rv = marshmallowSetNetworkForSocket(network, socket_);
if (rv)
rv = errno;
} else {
// NOTE(pauljensen): This does rely on Android implementation details, but
// they won't change because Lollipop is already released.
typedef int (*LollipopSetNetworkForSocket)(unsigned netId, int socketFd);
static LollipopSetNetworkForSocket lollipopSetNetworkForSocket;
// This is racy, but all racers should come out with the same answer so it
// shouldn't matter.
if (!lollipopSetNetworkForSocket) {
// Android's netd client library should always be loaded in our address
// space as it shims socket() which was used to create |socket_|.
base::FilePath file(base::GetNativeLibraryName("netd_client"));
// Use RTLD_NOW to match Android's prior loading of the library:
// http://androidxref.com/6.0.0_r5/xref/bionic/libc/bionic/NetdClient.cpp#37
// Use RTLD_NOLOAD to assert that the library is already loaded and
// avoid doing any disk IO.
void* dl = dlopen(file.value().c_str(), RTLD_NOW | RTLD_NOLOAD);
lollipopSetNetworkForSocket =
reinterpret_cast<LollipopSetNetworkForSocket>(
dlsym(dl, "setNetworkForSocket"));
}
if (!lollipopSetNetworkForSocket)
return ERR_NOT_IMPLEMENTED;
rv = -lollipopSetNetworkForSocket(network, socket_);
}
// If |network| has since disconnected, |rv| will be ENONET. Surface this as
// ERR_NETWORK_CHANGED, rather than MapSystemError(ENONET) which gives back
// the less descriptive ERR_FAILED.
if (rv == ENONET)
return ERR_NETWORK_CHANGED;
if (rv == 0)
bound_network_ = network;
return MapSystemError(rv);
#else
NOTIMPLEMENTED();
return ERR_NOT_IMPLEMENTED;
#endif
}
int UDPSocketPosix::SetReceiveBufferSize(int32_t size) {
DCHECK_NE(socket_, kInvalidSocket);
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
return SetSocketReceiveBufferSize(socket_, size);
}
int UDPSocketPosix::SetSendBufferSize(int32_t size) {
DCHECK_NE(socket_, kInvalidSocket);
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
return SetSocketSendBufferSize(socket_, size);
}
int UDPSocketPosix::SetDoNotFragment() {
DCHECK_NE(socket_, kInvalidSocket);
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
#if !defined(IP_PMTUDISC_DO)
return ERR_NOT_IMPLEMENTED;
#else
if (addr_family_ == AF_INET6) {
int val = IPV6_PMTUDISC_DO;
if (setsockopt(socket_, IPPROTO_IPV6, IPV6_MTU_DISCOVER, &val,
sizeof(val)) != 0) {
return MapSystemError(errno);
}
int v6_only = false;
socklen_t v6_only_len = sizeof(v6_only);
if (getsockopt(socket_, IPPROTO_IPV6, IPV6_V6ONLY, &v6_only,
&v6_only_len) != 0) {
return MapSystemError(errno);
}
if (v6_only)
return OK;
}
int val = IP_PMTUDISC_DO;
int rv = setsockopt(socket_, IPPROTO_IP, IP_MTU_DISCOVER, &val, sizeof(val));
return rv == 0 ? OK : MapSystemError(errno);
#endif
}
int UDPSocketPosix::AllowAddressReuse() {
DCHECK_NE(socket_, kInvalidSocket);
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
DCHECK(!is_connected());
return SetReuseAddr(socket_, true);
}
int UDPSocketPosix::SetBroadcast(bool broadcast) {
DCHECK_NE(socket_, kInvalidSocket);
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
int value = broadcast ? 1 : 0;
int rv;
#if defined(OS_MACOSX)
// SO_REUSEPORT on OSX permits multiple processes to each receive
// UDP multicast or broadcast datagrams destined for the bound
// port.
// This is only being set on OSX because its behavior is platform dependent
// and we are playing it safe by only setting it on platforms where things
// break.
rv = setsockopt(socket_, SOL_SOCKET, SO_REUSEPORT, &value, sizeof(value));
if (rv != 0)
return MapSystemError(errno);
#endif // defined(OS_MACOSX)
rv = setsockopt(socket_, SOL_SOCKET, SO_BROADCAST, &value, sizeof(value));
return rv == 0 ? OK : MapSystemError(errno);
}
void UDPSocketPosix::ReadWatcher::OnFileCanReadWithoutBlocking(int) {
TRACE_EVENT0(kNetTracingCategory,
"UDPSocketPosix::ReadWatcher::OnFileCanReadWithoutBlocking");
if (!socket_->read_callback_.is_null())
socket_->DidCompleteRead();
}
void UDPSocketPosix::WriteWatcher::OnFileCanWriteWithoutBlocking(int) {
if (!socket_->write_callback_.is_null())
socket_->DidCompleteWrite();
}
void UDPSocketPosix::DoReadCallback(int rv) {
DCHECK_NE(rv, ERR_IO_PENDING);
DCHECK(!read_callback_.is_null());
// since Run may result in Read being called, clear read_callback_ up front.
CompletionCallback c = read_callback_;
read_callback_.Reset();
c.Run(rv);
}
void UDPSocketPosix::DoWriteCallback(int rv) {
DCHECK_NE(rv, ERR_IO_PENDING);
DCHECK(!write_callback_.is_null());
// since Run may result in Write being called, clear write_callback_ up front.
CompletionCallback c = write_callback_;
write_callback_.Reset();
c.Run(rv);
}
void UDPSocketPosix::DidCompleteRead() {
int result =
InternalRecvFrom(read_buf_.get(), read_buf_len_, recv_from_address_);
if (result != ERR_IO_PENDING) {
read_buf_ = NULL;
read_buf_len_ = 0;
recv_from_address_ = NULL;
bool ok = read_socket_watcher_.StopWatchingFileDescriptor();
DCHECK(ok);
DoReadCallback(result);
}
}
void UDPSocketPosix::LogRead(int result,
const char* bytes,
socklen_t addr_len,
const sockaddr* addr) {
if (result < 0) {
net_log_.AddEventWithNetErrorCode(NetLogEventType::UDP_RECEIVE_ERROR,
result);
return;
}
if (net_log_.IsCapturing()) {
DCHECK(addr_len > 0);
DCHECK(addr);
IPEndPoint address;
bool is_address_valid = address.FromSockAddr(addr, addr_len);
net_log_.AddEvent(NetLogEventType::UDP_BYTES_RECEIVED,
CreateNetLogUDPDataTranferCallback(
result, bytes, is_address_valid ? &address : NULL));
}
received_activity_monitor_.Increment(result);
}
void UDPSocketPosix::DidCompleteWrite() {
int result =
InternalSendTo(write_buf_.get(), write_buf_len_, send_to_address_.get());
if (result != ERR_IO_PENDING) {
write_buf_ = NULL;
write_buf_len_ = 0;
send_to_address_.reset();
write_socket_watcher_.StopWatchingFileDescriptor();
DoWriteCallback(result);
}
}
void UDPSocketPosix::LogWrite(int result,
const char* bytes,
const IPEndPoint* address) {
if (result < 0) {
net_log_.AddEventWithNetErrorCode(NetLogEventType::UDP_SEND_ERROR, result);
return;
}
if (net_log_.IsCapturing()) {
net_log_.AddEvent(
NetLogEventType::UDP_BYTES_SENT,
CreateNetLogUDPDataTranferCallback(result, bytes, address));
}
sent_activity_monitor_.Increment(result);
}
int UDPSocketPosix::InternalRecvFrom(IOBuffer* buf,
int buf_len,
IPEndPoint* address) {
int bytes_transferred;
struct iovec iov = {};
iov.iov_base = buf->data();
iov.iov_len = buf_len;
struct msghdr msg = {};
msg.msg_iov = &iov;
msg.msg_iovlen = 1;
SockaddrStorage storage;
msg.msg_name = storage.addr;
msg.msg_namelen = storage.addr_len;
bytes_transferred = HANDLE_EINTR(recvmsg(socket_, &msg, 0));
storage.addr_len = msg.msg_namelen;
int result;
if (bytes_transferred >= 0) {
if (msg.msg_flags & MSG_TRUNC) {
result = ERR_MSG_TOO_BIG;
} else {
result = bytes_transferred;
if (address && !address->FromSockAddr(storage.addr, storage.addr_len))
result = ERR_ADDRESS_INVALID;
}
} else {
result = MapSystemError(errno);
}
if (result != ERR_IO_PENDING)
LogRead(result, buf->data(), storage.addr_len, storage.addr);
return result;
}
int UDPSocketPosix::InternalSendTo(IOBuffer* buf,
int buf_len,
const IPEndPoint* address) {
SockaddrStorage storage;
struct sockaddr* addr = storage.addr;
if (!address) {
addr = NULL;
storage.addr_len = 0;
} else {
if (!address->ToSockAddr(storage.addr, &storage.addr_len)) {
int result = ERR_ADDRESS_INVALID;
LogWrite(result, NULL, NULL);
return result;
}
}
int result = HANDLE_EINTR(sendto(socket_,
buf->data(),
buf_len,
0,
addr,
storage.addr_len));
if (result < 0)
result = MapSystemError(errno);
if (result != ERR_IO_PENDING)
LogWrite(result, buf->data(), address);
return result;
}
int UDPSocketPosix::SetMulticastOptions() {
if (!(socket_options_ & SOCKET_OPTION_MULTICAST_LOOP)) {
int rv;
if (addr_family_ == AF_INET) {
u_char loop = 0;
rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_LOOP,
&loop, sizeof(loop));
} else {
u_int loop = 0;
rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_LOOP,
&loop, sizeof(loop));
}
if (rv < 0)
return MapSystemError(errno);
}
if (multicast_time_to_live_ != IP_DEFAULT_MULTICAST_TTL) {
int rv;
if (addr_family_ == AF_INET) {
u_char ttl = multicast_time_to_live_;
rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_TTL,
&ttl, sizeof(ttl));
} else {
// Signed integer. -1 to use route default.
int ttl = multicast_time_to_live_;
rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
&ttl, sizeof(ttl));
}
if (rv < 0)
return MapSystemError(errno);
}
if (multicast_interface_ != 0) {
switch (addr_family_) {
case AF_INET: {
#if defined(OS_MACOSX) || defined(OS_FUCHSIA)
ip_mreq mreq;
int error = GetIPv4AddressFromIndex(socket_, multicast_interface_,
&mreq.imr_interface.s_addr);
if (error != OK)
return error;
#else // defined(OS_MACOSX) || defined(OS_FUCHSIA)
ip_mreqn mreq;
mreq.imr_ifindex = multicast_interface_;
mreq.imr_address.s_addr = htonl(INADDR_ANY);
#endif // !defined(OS_MACOSX) && !defined(OS_FUCHSIA)
int rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_IF,
reinterpret_cast<const char*>(&mreq), sizeof(mreq));
if (rv)
return MapSystemError(errno);
break;
}
case AF_INET6: {
uint32_t interface_index = multicast_interface_;
int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_IF,
reinterpret_cast<const char*>(&interface_index),
sizeof(interface_index));
if (rv)
return MapSystemError(errno);
break;
}
default:
NOTREACHED() << "Invalid address family";
return ERR_ADDRESS_INVALID;
}
}
return OK;
}
int UDPSocketPosix::DoBind(const IPEndPoint& address) {
SockaddrStorage storage;
if (!address.ToSockAddr(storage.addr, &storage.addr_len))
return ERR_ADDRESS_INVALID;
int rv = bind(socket_, storage.addr, storage.addr_len);
if (rv == 0)
return OK;
int last_error = errno;
#if defined(OS_CHROMEOS)
if (last_error == EINVAL)
return ERR_ADDRESS_IN_USE;
#elif defined(OS_MACOSX)
if (last_error == EADDRNOTAVAIL)
return ERR_ADDRESS_IN_USE;
#endif
return MapSystemError(last_error);
}
int UDPSocketPosix::RandomBind(const IPAddress& address) {
DCHECK(bind_type_ == DatagramSocket::RANDOM_BIND && !rand_int_cb_.is_null());
for (int i = 0; i < kBindRetries; ++i) {
int rv = DoBind(IPEndPoint(address,
rand_int_cb_.Run(kPortStart, kPortEnd)));
if (rv != ERR_ADDRESS_IN_USE)
return rv;
}
return DoBind(IPEndPoint(address, 0));
}
int UDPSocketPosix::JoinGroup(const IPAddress& group_address) const {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
if (!is_connected())
return ERR_SOCKET_NOT_CONNECTED;
switch (group_address.size()) {
case IPAddress::kIPv4AddressSize: {
if (addr_family_ != AF_INET)
return ERR_ADDRESS_INVALID;
#if defined(OS_MACOSX) || defined(OS_FUCHSIA)
ip_mreq mreq;
int error = GetIPv4AddressFromIndex(socket_, multicast_interface_,
&mreq.imr_interface.s_addr);
if (error != OK)
return error;
#else
ip_mreqn mreq;
mreq.imr_ifindex = multicast_interface_;
mreq.imr_address.s_addr = htonl(INADDR_ANY);
#endif
memcpy(&mreq.imr_multiaddr, group_address.bytes().data(),
IPAddress::kIPv4AddressSize);
int rv = setsockopt(socket_, IPPROTO_IP, IP_ADD_MEMBERSHIP,
&mreq, sizeof(mreq));
if (rv < 0)
return MapSystemError(errno);
return OK;
}
case IPAddress::kIPv6AddressSize: {
if (addr_family_ != AF_INET6)
return ERR_ADDRESS_INVALID;
ipv6_mreq mreq;
mreq.ipv6mr_interface = multicast_interface_;
memcpy(&mreq.ipv6mr_multiaddr, group_address.bytes().data(),
IPAddress::kIPv6AddressSize);
int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_JOIN_GROUP,
&mreq, sizeof(mreq));
if (rv < 0)
return MapSystemError(errno);
return OK;
}
default:
NOTREACHED() << "Invalid address family";
return ERR_ADDRESS_INVALID;
}
}
int UDPSocketPosix::LeaveGroup(const IPAddress& group_address) const {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
if (!is_connected())
return ERR_SOCKET_NOT_CONNECTED;
switch (group_address.size()) {
case IPAddress::kIPv4AddressSize: {
if (addr_family_ != AF_INET)
return ERR_ADDRESS_INVALID;
ip_mreq mreq;
#if defined(OS_FUCHSIA)
// Fuchsia currently doesn't support INADDR_ANY in ip_mreq.imr_interface.
int error = GetIPv4AddressFromIndex(socket_, multicast_interface_,
&mreq.imr_interface.s_addr);
if (error != OK)
return error;
#else // defined(OS_FUCHSIA)
mreq.imr_interface.s_addr = INADDR_ANY;
#endif // !defined(OS_FUCHSIA)
memcpy(&mreq.imr_multiaddr, group_address.bytes().data(),
IPAddress::kIPv4AddressSize);
int rv = setsockopt(socket_, IPPROTO_IP, IP_DROP_MEMBERSHIP,
&mreq, sizeof(mreq));
if (rv < 0)
return MapSystemError(errno);
return OK;
}
case IPAddress::kIPv6AddressSize: {
if (addr_family_ != AF_INET6)
return ERR_ADDRESS_INVALID;
ipv6_mreq mreq;
#if defined(OS_FUCHSIA)
mreq.ipv6mr_interface = multicast_interface_;
#else // defined(OS_FUCHSIA)
mreq.ipv6mr_interface = 0; // 0 indicates default multicast interface.
#endif // !defined(OS_FUCHSIA)
memcpy(&mreq.ipv6mr_multiaddr, group_address.bytes().data(),
IPAddress::kIPv6AddressSize);
int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_LEAVE_GROUP,
&mreq, sizeof(mreq));
if (rv < 0)
return MapSystemError(errno);
return OK;
}
default:
NOTREACHED() << "Invalid address family";
return ERR_ADDRESS_INVALID;
}
}
int UDPSocketPosix::SetMulticastInterface(uint32_t interface_index) {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
if (is_connected())
return ERR_SOCKET_IS_CONNECTED;
multicast_interface_ = interface_index;
return OK;
}
int UDPSocketPosix::SetMulticastTimeToLive(int time_to_live) {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
if (is_connected())
return ERR_SOCKET_IS_CONNECTED;
if (time_to_live < 0 || time_to_live > 255)
return ERR_INVALID_ARGUMENT;
multicast_time_to_live_ = time_to_live;
return OK;
}
int UDPSocketPosix::SetMulticastLoopbackMode(bool loopback) {
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
if (is_connected())
return ERR_SOCKET_IS_CONNECTED;
if (loopback)
socket_options_ |= SOCKET_OPTION_MULTICAST_LOOP;
else
socket_options_ &= ~SOCKET_OPTION_MULTICAST_LOOP;
return OK;
}
int UDPSocketPosix::SetDiffServCodePoint(DiffServCodePoint dscp) {
if (dscp == DSCP_NO_CHANGE) {
return OK;
}
int rv;
int dscp_and_ecn = dscp << 2;
if (addr_family_ == AF_INET) {
rv = setsockopt(socket_, IPPROTO_IP, IP_TOS,
&dscp_and_ecn, sizeof(dscp_and_ecn));
} else {
rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_TCLASS,
&dscp_and_ecn, sizeof(dscp_and_ecn));
}
if (rv < 0)
return MapSystemError(errno);
return OK;
}
void UDPSocketPosix::DetachFromThread() {
DETACH_FROM_THREAD(thread_checker_);
}
} // namespace net