// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/socket/udp_socket_posix.h" #include #include #include #include #include #include #include #include "base/callback.h" #include "base/debug/alias.h" #include "base/files/file_util.h" #include "base/logging.h" #include "base/message_loop/message_loop.h" #include "base/metrics/histogram_macros.h" #include "base/posix/eintr_wrapper.h" #include "base/rand_util.h" #include "base/trace_event/trace_event.h" #include "net/base/io_buffer.h" #include "net/base/ip_address.h" #include "net/base/ip_endpoint.h" #include "net/base/net_errors.h" #include "net/base/network_activity_monitor.h" #include "net/base/sockaddr_storage.h" #include "net/base/trace_constants.h" #include "net/log/net_log.h" #include "net/log/net_log_event_type.h" #include "net/log/net_log_source.h" #include "net/log/net_log_source_type.h" #include "net/socket/socket_descriptor.h" #include "net/socket/socket_options.h" #include "net/socket/udp_net_log_parameters.h" #if defined(OS_ANDROID) #include // This was added in Lollipop to dlfcn.h #define RTLD_NOLOAD 4 #include "base/android/build_info.h" #include "base/native_library.h" #include "base/strings/utf_string_conversions.h" #endif #if defined(OS_MACOSX) && !defined(OS_IOS) // This was needed to debug crbug.com/640281. // TODO(zhongyi): Remove once the bug is resolved. #include #include #endif namespace net { namespace { const int kBindRetries = 10; const int kPortStart = 1024; const int kPortEnd = 65535; const int kActivityMonitorBytesThreshold = 65535; const int kActivityMonitorMinimumSamplesForThroughputEstimate = 2; const base::TimeDelta kActivityMonitorMsThreshold = base::TimeDelta::FromMilliseconds(100); #if defined(OS_MACOSX) // Returns IPv4 address in network order. int GetIPv4AddressFromIndex(int socket, uint32_t index, uint32_t* address) { if (!index) { *address = htonl(INADDR_ANY); return OK; } ifreq ifr; ifr.ifr_addr.sa_family = AF_INET; if (!if_indextoname(index, ifr.ifr_name)) return MapSystemError(errno); int rv = ioctl(socket, SIOCGIFADDR, &ifr); if (rv == -1) return MapSystemError(errno); *address = reinterpret_cast(&ifr.ifr_addr)->sin_addr.s_addr; return OK; } #endif // OS_MACOSX #if defined(OS_MACOSX) && !defined(OS_IOS) // On OSX the file descriptor is guarded to detect the cause of // crbug.com/640281. guarded API is supported only on newer versions of OSX, // so the symbols need to be resolved dynamically. // TODO(zhongyi): Removed this code once the bug is resolved. typedef uint64_t guardid_t; typedef int (*GuardedCloseNpFunction)(int fd, const guardid_t* guard); typedef int (*ChangeFdguardNpFunction)(int fd, const guardid_t* guard, u_int flags, const guardid_t* nguard, u_int nflags, int* fdflagsp); GuardedCloseNpFunction g_guarded_close_np = nullptr; ChangeFdguardNpFunction g_change_fdguard_np = nullptr; pthread_once_t g_guarded_functions_once = PTHREAD_ONCE_INIT; void InitGuardedFunctions() { void* libsystem_handle = dlopen("/usr/lib/libSystem.dylib", RTLD_LAZY | RTLD_LOCAL | RTLD_NOLOAD); if (libsystem_handle) { g_guarded_close_np = reinterpret_cast( dlsym(libsystem_handle, "guarded_close_np")); g_change_fdguard_np = reinterpret_cast( dlsym(libsystem_handle, "change_fdguard_np")); // If for any reason only one of the functions is found, set both of them to // nullptr. if (!g_guarded_close_np || !g_change_fdguard_np) { g_guarded_close_np = nullptr; g_change_fdguard_np = nullptr; } } } int change_fdguard_np(int fd, const guardid_t* guard, u_int flags, const guardid_t* nguard, u_int nflags, int* fdflagsp) { CHECK_EQ(pthread_once(&g_guarded_functions_once, InitGuardedFunctions), 0); // Older version of OSX may not support guarded API. if (!g_change_fdguard_np) return 0; return g_change_fdguard_np(fd, guard, flags, nguard, nflags, fdflagsp); } int guarded_close_np(int fd, const guardid_t* guard) { // Older version of OSX may not support guarded API. if (!g_guarded_close_np) return close(fd); return g_guarded_close_np(fd, guard); } const unsigned int GUARD_CLOSE = 1u << 0; const unsigned int GUARD_DUP = 1u << 1; const guardid_t kSocketFdGuard = 0xD712BC0BC9A4EAD4; #endif // defined(OS_MACOSX) && !defined(OS_IOS) } // namespace UDPSocketPosix::UDPSocketPosix(DatagramSocket::BindType bind_type, const RandIntCallback& rand_int_cb, net::NetLog* net_log, const net::NetLogSource& source) : socket_(kInvalidSocket), addr_family_(0), is_connected_(false), socket_options_(SOCKET_OPTION_MULTICAST_LOOP), multicast_interface_(0), multicast_time_to_live_(1), bind_type_(bind_type), rand_int_cb_(rand_int_cb), read_socket_watcher_(FROM_HERE), write_socket_watcher_(FROM_HERE), read_watcher_(this), write_watcher_(this), read_buf_len_(0), recv_from_address_(NULL), write_buf_len_(0), net_log_(NetLogWithSource::Make(net_log, NetLogSourceType::UDP_SOCKET)), bound_network_(NetworkChangeNotifier::kInvalidNetworkHandle) { net_log_.BeginEvent(NetLogEventType::SOCKET_ALIVE, source.ToEventParametersCallback()); if (bind_type == DatagramSocket::RANDOM_BIND) DCHECK(!rand_int_cb.is_null()); } UDPSocketPosix::~UDPSocketPosix() { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); Close(); net_log_.EndEvent(NetLogEventType::SOCKET_ALIVE); } int UDPSocketPosix::Open(AddressFamily address_family) { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK_EQ(socket_, kInvalidSocket); addr_family_ = ConvertAddressFamily(address_family); socket_ = CreatePlatformSocket(addr_family_, SOCK_DGRAM, 0); if (socket_ == kInvalidSocket) return MapSystemError(errno); #if defined(OS_MACOSX) && !defined(OS_IOS) PCHECK(change_fdguard_np(socket_, NULL, 0, &kSocketFdGuard, GUARD_CLOSE | GUARD_DUP, NULL) == 0); #endif // defined(OS_MACOSX) && !defined(OS_IOS) if (!base::SetNonBlocking(socket_)) { const int err = MapSystemError(errno); Close(); return err; } return OK; } void UDPSocketPosix::ActivityMonitor::Increment(uint32_t bytes) { if (!bytes) return; bool timer_running = timer_.IsRunning(); bytes_ += bytes; increments_++; // Allow initial updates to make sure throughput estimator has // enough samples to generate a value. (low water mark) // Or once the bytes threshold has be met. (high water mark) if (increments_ < kActivityMonitorMinimumSamplesForThroughputEstimate || bytes_ > kActivityMonitorBytesThreshold) { Update(); if (timer_running) timer_.Reset(); } if (!timer_running) { timer_.Start(FROM_HERE, kActivityMonitorMsThreshold, this, &UDPSocketPosix::ActivityMonitor::OnTimerFired); } } void UDPSocketPosix::ActivityMonitor::Update() { if (!bytes_) return; NetworkActivityMonitorIncrement(bytes_); bytes_ = 0; } void UDPSocketPosix::ActivityMonitor::OnClose() { timer_.Stop(); Update(); } void UDPSocketPosix::ActivityMonitor::OnTimerFired() { increments_ = 0; if (!bytes_) { // Can happen if the socket has been idle and have had no // increments since the timer previously fired. Don't bother // keeping the timer running in this case. timer_.Stop(); return; } Update(); } void UDPSocketPosix::SentActivityMonitor::NetworkActivityMonitorIncrement( uint32_t bytes) { NetworkActivityMonitor::GetInstance()->IncrementBytesSent(bytes); } void UDPSocketPosix::ReceivedActivityMonitor::NetworkActivityMonitorIncrement( uint32_t bytes) { NetworkActivityMonitor::GetInstance()->IncrementBytesReceived(bytes); } void UDPSocketPosix::Close() { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); if (socket_ == kInvalidSocket) return; // Zero out any pending read/write callback state. read_buf_ = NULL; read_buf_len_ = 0; read_callback_.Reset(); recv_from_address_ = NULL; write_buf_ = NULL; write_buf_len_ = 0; write_callback_.Reset(); send_to_address_.reset(); bool ok = read_socket_watcher_.StopWatchingFileDescriptor(); DCHECK(ok); ok = write_socket_watcher_.StopWatchingFileDescriptor(); DCHECK(ok); #if defined(OS_MACOSX) && !defined(OS_IOS) PCHECK(IGNORE_EINTR(guarded_close_np(socket_, &kSocketFdGuard)) == 0); #else PCHECK(IGNORE_EINTR(close(socket_)) == 0); #endif // defined(OS_MACOSX) && !defined(OS_IOS) socket_ = kInvalidSocket; addr_family_ = 0; is_connected_ = false; sent_activity_monitor_.OnClose(); received_activity_monitor_.OnClose(); } int UDPSocketPosix::GetPeerAddress(IPEndPoint* address) const { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK(address); if (!is_connected()) return ERR_SOCKET_NOT_CONNECTED; if (!remote_address_.get()) { SockaddrStorage storage; if (getpeername(socket_, storage.addr, &storage.addr_len)) return MapSystemError(errno); std::unique_ptr address(new IPEndPoint()); if (!address->FromSockAddr(storage.addr, storage.addr_len)) return ERR_ADDRESS_INVALID; remote_address_ = std::move(address); } *address = *remote_address_; return OK; } int UDPSocketPosix::GetLocalAddress(IPEndPoint* address) const { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK(address); if (!is_connected()) return ERR_SOCKET_NOT_CONNECTED; if (!local_address_.get()) { SockaddrStorage storage; if (getsockname(socket_, storage.addr, &storage.addr_len)) return MapSystemError(errno); std::unique_ptr address(new IPEndPoint()); if (!address->FromSockAddr(storage.addr, storage.addr_len)) return ERR_ADDRESS_INVALID; local_address_ = std::move(address); net_log_.AddEvent( NetLogEventType::UDP_LOCAL_ADDRESS, CreateNetLogUDPConnectCallback(local_address_.get(), bound_network_)); } *address = *local_address_; return OK; } int UDPSocketPosix::Read(IOBuffer* buf, int buf_len, const CompletionCallback& callback) { return RecvFrom(buf, buf_len, NULL, callback); } int UDPSocketPosix::RecvFrom(IOBuffer* buf, int buf_len, IPEndPoint* address, const CompletionCallback& callback) { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK_NE(kInvalidSocket, socket_); CHECK(read_callback_.is_null()); DCHECK(!recv_from_address_); DCHECK(!callback.is_null()); // Synchronous operation not supported DCHECK_GT(buf_len, 0); int nread = InternalRecvFrom(buf, buf_len, address); if (nread != ERR_IO_PENDING) return nread; if (!base::MessageLoopForIO::current()->WatchFileDescriptor( socket_, true, base::MessageLoopForIO::WATCH_READ, &read_socket_watcher_, &read_watcher_)) { PLOG(ERROR) << "WatchFileDescriptor failed on read"; int result = MapSystemError(errno); LogRead(result, NULL, 0, NULL); return result; } read_buf_ = buf; read_buf_len_ = buf_len; recv_from_address_ = address; read_callback_ = callback; return ERR_IO_PENDING; } int UDPSocketPosix::Write(IOBuffer* buf, int buf_len, const CompletionCallback& callback) { return SendToOrWrite(buf, buf_len, NULL, callback); } int UDPSocketPosix::SendTo(IOBuffer* buf, int buf_len, const IPEndPoint& address, const CompletionCallback& callback) { return SendToOrWrite(buf, buf_len, &address, callback); } int UDPSocketPosix::SendToOrWrite(IOBuffer* buf, int buf_len, const IPEndPoint* address, const CompletionCallback& callback) { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK_NE(kInvalidSocket, socket_); CHECK(write_callback_.is_null()); DCHECK(!callback.is_null()); // Synchronous operation not supported DCHECK_GT(buf_len, 0); int result = InternalSendTo(buf, buf_len, address); if (result != ERR_IO_PENDING) return result; if (!base::MessageLoopForIO::current()->WatchFileDescriptor( socket_, true, base::MessageLoopForIO::WATCH_WRITE, &write_socket_watcher_, &write_watcher_)) { DVLOG(1) << "WatchFileDescriptor failed on write, errno " << errno; int result = MapSystemError(errno); LogWrite(result, NULL, NULL); return result; } write_buf_ = buf; write_buf_len_ = buf_len; DCHECK(!send_to_address_.get()); if (address) { send_to_address_.reset(new IPEndPoint(*address)); } write_callback_ = callback; return ERR_IO_PENDING; } int UDPSocketPosix::Connect(const IPEndPoint& address) { DCHECK_NE(socket_, kInvalidSocket); net_log_.BeginEvent(NetLogEventType::UDP_CONNECT, CreateNetLogUDPConnectCallback(&address, bound_network_)); int rv = InternalConnect(address); net_log_.EndEventWithNetErrorCode(NetLogEventType::UDP_CONNECT, rv); is_connected_ = (rv == OK); return rv; } int UDPSocketPosix::InternalConnect(const IPEndPoint& address) { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK(!is_connected()); DCHECK(!remote_address_.get()); int rv = 0; if (bind_type_ == DatagramSocket::RANDOM_BIND) { // Construct IPAddress of appropriate size (IPv4 or IPv6) of 0s, // representing INADDR_ANY or in6addr_any. size_t addr_size = address.GetSockAddrFamily() == AF_INET ? IPAddress::kIPv4AddressSize : IPAddress::kIPv6AddressSize; rv = RandomBind(IPAddress::AllZeros(addr_size)); } // else connect() does the DatagramSocket::DEFAULT_BIND if (rv < 0) { UMA_HISTOGRAM_SPARSE_SLOWLY("Net.UdpSocketRandomBindErrorCode", -rv); return rv; } SockaddrStorage storage; if (!address.ToSockAddr(storage.addr, &storage.addr_len)) return ERR_ADDRESS_INVALID; rv = HANDLE_EINTR(connect(socket_, storage.addr, storage.addr_len)); if (rv < 0) return MapSystemError(errno); remote_address_.reset(new IPEndPoint(address)); return rv; } int UDPSocketPosix::Bind(const IPEndPoint& address) { DCHECK_NE(socket_, kInvalidSocket); DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK(!is_connected()); int rv = SetMulticastOptions(); if (rv < 0) return rv; rv = DoBind(address); if (rv < 0) return rv; is_connected_ = true; local_address_.reset(); return rv; } int UDPSocketPosix::BindToNetwork( NetworkChangeNotifier::NetworkHandle network) { DCHECK_NE(socket_, kInvalidSocket); DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK(!is_connected()); if (network == NetworkChangeNotifier::kInvalidNetworkHandle) return ERR_INVALID_ARGUMENT; #if defined(OS_ANDROID) // Android prior to Lollipop didn't have support for binding sockets to // networks. if (base::android::BuildInfo::GetInstance()->sdk_int() < base::android::SDK_VERSION_LOLLIPOP) { return ERR_NOT_IMPLEMENTED; } int rv; // On Android M and newer releases use supported NDK API. On Android L use // setNetworkForSocket from libnetd_client.so. if (base::android::BuildInfo::GetInstance()->sdk_int() >= base::android::SDK_VERSION_MARSHMALLOW) { // See declaration of android_setsocknetwork() here: // http://androidxref.com/6.0.0_r1/xref/development/ndk/platforms/android-M/include/android/multinetwork.h#65 // Function cannot be called directly as it will cause app to fail to load // on pre-marshmallow devices. typedef int (*MarshmallowSetNetworkForSocket)(int64_t netId, int socketFd); static MarshmallowSetNetworkForSocket marshmallowSetNetworkForSocket; // This is racy, but all racers should come out with the same answer so it // shouldn't matter. if (!marshmallowSetNetworkForSocket) { base::FilePath file(base::GetNativeLibraryName("android")); void* dl = dlopen(file.value().c_str(), RTLD_NOW); marshmallowSetNetworkForSocket = reinterpret_cast( dlsym(dl, "android_setsocknetwork")); } if (!marshmallowSetNetworkForSocket) return ERR_NOT_IMPLEMENTED; rv = marshmallowSetNetworkForSocket(network, socket_); if (rv) rv = errno; } else { // NOTE(pauljensen): This does rely on Android implementation details, but // they won't change because Lollipop is already released. typedef int (*LollipopSetNetworkForSocket)(unsigned netId, int socketFd); static LollipopSetNetworkForSocket lollipopSetNetworkForSocket; // This is racy, but all racers should come out with the same answer so it // shouldn't matter. if (!lollipopSetNetworkForSocket) { // Android's netd client library should always be loaded in our address // space as it shims socket() which was used to create |socket_|. base::FilePath file(base::GetNativeLibraryName("netd_client")); // Use RTLD_NOW to match Android's prior loading of the library: // http://androidxref.com/6.0.0_r5/xref/bionic/libc/bionic/NetdClient.cpp#37 // Use RTLD_NOLOAD to assert that the library is already loaded and // avoid doing any disk IO. void* dl = dlopen(file.value().c_str(), RTLD_NOW | RTLD_NOLOAD); lollipopSetNetworkForSocket = reinterpret_cast( dlsym(dl, "setNetworkForSocket")); } if (!lollipopSetNetworkForSocket) return ERR_NOT_IMPLEMENTED; rv = -lollipopSetNetworkForSocket(network, socket_); } // If |network| has since disconnected, |rv| will be ENONET. Surface this as // ERR_NETWORK_CHANGED, rather than MapSystemError(ENONET) which gives back // the less descriptive ERR_FAILED. if (rv == ENONET) return ERR_NETWORK_CHANGED; if (rv == 0) bound_network_ = network; return MapSystemError(rv); #else NOTIMPLEMENTED(); return ERR_NOT_IMPLEMENTED; #endif } int UDPSocketPosix::SetReceiveBufferSize(int32_t size) { DCHECK_NE(socket_, kInvalidSocket); DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); return SetSocketReceiveBufferSize(socket_, size); } int UDPSocketPosix::SetSendBufferSize(int32_t size) { DCHECK_NE(socket_, kInvalidSocket); DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); return SetSocketSendBufferSize(socket_, size); } int UDPSocketPosix::SetDoNotFragment() { DCHECK_NE(socket_, kInvalidSocket); DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); #if !defined(IP_PMTUDISC_DO) return ERR_NOT_IMPLEMENTED; #else if (addr_family_ == AF_INET6) { int val = IPV6_PMTUDISC_DO; if (setsockopt(socket_, IPPROTO_IPV6, IPV6_MTU_DISCOVER, &val, sizeof(val)) != 0) { return MapSystemError(errno); } int v6_only = false; socklen_t v6_only_len = sizeof(v6_only); if (getsockopt(socket_, IPPROTO_IPV6, IPV6_V6ONLY, &v6_only, &v6_only_len) != 0) { return MapSystemError(errno); } if (v6_only) return OK; } int val = IP_PMTUDISC_DO; int rv = setsockopt(socket_, IPPROTO_IP, IP_MTU_DISCOVER, &val, sizeof(val)); return rv == 0 ? OK : MapSystemError(errno); #endif } int UDPSocketPosix::AllowAddressReuse() { DCHECK_NE(socket_, kInvalidSocket); DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); DCHECK(!is_connected()); return SetReuseAddr(socket_, true); } int UDPSocketPosix::SetBroadcast(bool broadcast) { DCHECK_NE(socket_, kInvalidSocket); DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); int value = broadcast ? 1 : 0; int rv; #if defined(OS_MACOSX) // SO_REUSEPORT on OSX permits multiple processes to each receive // UDP multicast or broadcast datagrams destined for the bound // port. // This is only being set on OSX because its behavior is platform dependent // and we are playing it safe by only setting it on platforms where things // break. rv = setsockopt(socket_, SOL_SOCKET, SO_REUSEPORT, &value, sizeof(value)); if (rv != 0) return MapSystemError(errno); #endif // defined(OS_MACOSX) rv = setsockopt(socket_, SOL_SOCKET, SO_BROADCAST, &value, sizeof(value)); return rv == 0 ? OK : MapSystemError(errno); } void UDPSocketPosix::ReadWatcher::OnFileCanReadWithoutBlocking(int) { TRACE_EVENT0(kNetTracingCategory, "UDPSocketPosix::ReadWatcher::OnFileCanReadWithoutBlocking"); if (!socket_->read_callback_.is_null()) socket_->DidCompleteRead(); } void UDPSocketPosix::WriteWatcher::OnFileCanWriteWithoutBlocking(int) { if (!socket_->write_callback_.is_null()) socket_->DidCompleteWrite(); } void UDPSocketPosix::DoReadCallback(int rv) { DCHECK_NE(rv, ERR_IO_PENDING); DCHECK(!read_callback_.is_null()); // since Run may result in Read being called, clear read_callback_ up front. CompletionCallback c = read_callback_; read_callback_.Reset(); c.Run(rv); } void UDPSocketPosix::DoWriteCallback(int rv) { DCHECK_NE(rv, ERR_IO_PENDING); DCHECK(!write_callback_.is_null()); // since Run may result in Write being called, clear write_callback_ up front. CompletionCallback c = write_callback_; write_callback_.Reset(); c.Run(rv); } void UDPSocketPosix::DidCompleteRead() { int result = InternalRecvFrom(read_buf_.get(), read_buf_len_, recv_from_address_); if (result != ERR_IO_PENDING) { read_buf_ = NULL; read_buf_len_ = 0; recv_from_address_ = NULL; bool ok = read_socket_watcher_.StopWatchingFileDescriptor(); DCHECK(ok); DoReadCallback(result); } } void UDPSocketPosix::LogRead(int result, const char* bytes, socklen_t addr_len, const sockaddr* addr) { if (result < 0) { net_log_.AddEventWithNetErrorCode(NetLogEventType::UDP_RECEIVE_ERROR, result); return; } if (net_log_.IsCapturing()) { DCHECK(addr_len > 0); DCHECK(addr); IPEndPoint address; bool is_address_valid = address.FromSockAddr(addr, addr_len); net_log_.AddEvent(NetLogEventType::UDP_BYTES_RECEIVED, CreateNetLogUDPDataTranferCallback( result, bytes, is_address_valid ? &address : NULL)); } received_activity_monitor_.Increment(result); } void UDPSocketPosix::DidCompleteWrite() { int result = InternalSendTo(write_buf_.get(), write_buf_len_, send_to_address_.get()); if (result != ERR_IO_PENDING) { write_buf_ = NULL; write_buf_len_ = 0; send_to_address_.reset(); write_socket_watcher_.StopWatchingFileDescriptor(); DoWriteCallback(result); } } void UDPSocketPosix::LogWrite(int result, const char* bytes, const IPEndPoint* address) { if (result < 0) { net_log_.AddEventWithNetErrorCode(NetLogEventType::UDP_SEND_ERROR, result); return; } if (net_log_.IsCapturing()) { net_log_.AddEvent( NetLogEventType::UDP_BYTES_SENT, CreateNetLogUDPDataTranferCallback(result, bytes, address)); } sent_activity_monitor_.Increment(result); } int UDPSocketPosix::InternalRecvFrom(IOBuffer* buf, int buf_len, IPEndPoint* address) { int bytes_transferred; struct iovec iov = {}; iov.iov_base = buf->data(); iov.iov_len = buf_len; struct msghdr msg = {}; msg.msg_iov = &iov; msg.msg_iovlen = 1; SockaddrStorage storage; msg.msg_name = storage.addr; msg.msg_namelen = storage.addr_len; bytes_transferred = HANDLE_EINTR(recvmsg(socket_, &msg, 0)); storage.addr_len = msg.msg_namelen; int result; if (bytes_transferred >= 0) { if (msg.msg_flags & MSG_TRUNC) { result = ERR_MSG_TOO_BIG; } else { result = bytes_transferred; if (address && !address->FromSockAddr(storage.addr, storage.addr_len)) result = ERR_ADDRESS_INVALID; } } else { result = MapSystemError(errno); } if (result != ERR_IO_PENDING) LogRead(result, buf->data(), storage.addr_len, storage.addr); return result; } int UDPSocketPosix::InternalSendTo(IOBuffer* buf, int buf_len, const IPEndPoint* address) { SockaddrStorage storage; struct sockaddr* addr = storage.addr; if (!address) { addr = NULL; storage.addr_len = 0; } else { if (!address->ToSockAddr(storage.addr, &storage.addr_len)) { int result = ERR_ADDRESS_INVALID; LogWrite(result, NULL, NULL); return result; } } int result = HANDLE_EINTR(sendto(socket_, buf->data(), buf_len, 0, addr, storage.addr_len)); if (result < 0) result = MapSystemError(errno); if (result != ERR_IO_PENDING) LogWrite(result, buf->data(), address); return result; } int UDPSocketPosix::SetMulticastOptions() { if (!(socket_options_ & SOCKET_OPTION_MULTICAST_LOOP)) { int rv; if (addr_family_ == AF_INET) { u_char loop = 0; rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_LOOP, &loop, sizeof(loop)); } else { u_int loop = 0; rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, &loop, sizeof(loop)); } if (rv < 0) return MapSystemError(errno); } if (multicast_time_to_live_ != IP_DEFAULT_MULTICAST_TTL) { int rv; if (addr_family_ == AF_INET) { u_char ttl = multicast_time_to_live_; rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_TTL, &ttl, sizeof(ttl)); } else { // Signed integer. -1 to use route default. int ttl = multicast_time_to_live_; rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, &ttl, sizeof(ttl)); } if (rv < 0) return MapSystemError(errno); } if (multicast_interface_ != 0) { switch (addr_family_) { case AF_INET: { #if !defined(OS_MACOSX) ip_mreqn mreq; mreq.imr_ifindex = multicast_interface_; mreq.imr_address.s_addr = htonl(INADDR_ANY); #else ip_mreq mreq; int error = GetIPv4AddressFromIndex(socket_, multicast_interface_, &mreq.imr_interface.s_addr); if (error != OK) return error; #endif int rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_IF, reinterpret_cast(&mreq), sizeof(mreq)); if (rv) return MapSystemError(errno); break; } case AF_INET6: { uint32_t interface_index = multicast_interface_; int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_IF, reinterpret_cast(&interface_index), sizeof(interface_index)); if (rv) return MapSystemError(errno); break; } default: NOTREACHED() << "Invalid address family"; return ERR_ADDRESS_INVALID; } } return OK; } int UDPSocketPosix::DoBind(const IPEndPoint& address) { SockaddrStorage storage; if (!address.ToSockAddr(storage.addr, &storage.addr_len)) return ERR_ADDRESS_INVALID; int rv = bind(socket_, storage.addr, storage.addr_len); if (rv == 0) return OK; int last_error = errno; UMA_HISTOGRAM_SPARSE_SLOWLY("Net.UdpSocketBindErrorFromPosix", last_error); #if defined(OS_CHROMEOS) if (last_error == EINVAL) return ERR_ADDRESS_IN_USE; #elif defined(OS_MACOSX) if (last_error == EADDRNOTAVAIL) return ERR_ADDRESS_IN_USE; #endif return MapSystemError(last_error); } int UDPSocketPosix::RandomBind(const IPAddress& address) { DCHECK(bind_type_ == DatagramSocket::RANDOM_BIND && !rand_int_cb_.is_null()); for (int i = 0; i < kBindRetries; ++i) { int rv = DoBind(IPEndPoint(address, rand_int_cb_.Run(kPortStart, kPortEnd))); if (rv != ERR_ADDRESS_IN_USE) return rv; } return DoBind(IPEndPoint(address, 0)); } int UDPSocketPosix::JoinGroup(const IPAddress& group_address) const { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); if (!is_connected()) return ERR_SOCKET_NOT_CONNECTED; switch (group_address.size()) { case IPAddress::kIPv4AddressSize: { if (addr_family_ != AF_INET) return ERR_ADDRESS_INVALID; #if !defined(OS_MACOSX) ip_mreqn mreq; mreq.imr_ifindex = multicast_interface_; mreq.imr_address.s_addr = htonl(INADDR_ANY); #else ip_mreq mreq; int error = GetIPv4AddressFromIndex(socket_, multicast_interface_, &mreq.imr_interface.s_addr); if (error != OK) return error; #endif memcpy(&mreq.imr_multiaddr, group_address.bytes().data(), IPAddress::kIPv4AddressSize); int rv = setsockopt(socket_, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq)); if (rv < 0) return MapSystemError(errno); return OK; } case IPAddress::kIPv6AddressSize: { if (addr_family_ != AF_INET6) return ERR_ADDRESS_INVALID; ipv6_mreq mreq; mreq.ipv6mr_interface = multicast_interface_; memcpy(&mreq.ipv6mr_multiaddr, group_address.bytes().data(), IPAddress::kIPv6AddressSize); int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_JOIN_GROUP, &mreq, sizeof(mreq)); if (rv < 0) return MapSystemError(errno); return OK; } default: NOTREACHED() << "Invalid address family"; return ERR_ADDRESS_INVALID; } } int UDPSocketPosix::LeaveGroup(const IPAddress& group_address) const { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); if (!is_connected()) return ERR_SOCKET_NOT_CONNECTED; switch (group_address.size()) { case IPAddress::kIPv4AddressSize: { if (addr_family_ != AF_INET) return ERR_ADDRESS_INVALID; ip_mreq mreq; mreq.imr_interface.s_addr = INADDR_ANY; memcpy(&mreq.imr_multiaddr, group_address.bytes().data(), IPAddress::kIPv4AddressSize); int rv = setsockopt(socket_, IPPROTO_IP, IP_DROP_MEMBERSHIP, &mreq, sizeof(mreq)); if (rv < 0) return MapSystemError(errno); return OK; } case IPAddress::kIPv6AddressSize: { if (addr_family_ != AF_INET6) return ERR_ADDRESS_INVALID; ipv6_mreq mreq; mreq.ipv6mr_interface = 0; // 0 indicates default multicast interface. memcpy(&mreq.ipv6mr_multiaddr, group_address.bytes().data(), IPAddress::kIPv6AddressSize); int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_LEAVE_GROUP, &mreq, sizeof(mreq)); if (rv < 0) return MapSystemError(errno); return OK; } default: NOTREACHED() << "Invalid address family"; return ERR_ADDRESS_INVALID; } } int UDPSocketPosix::SetMulticastInterface(uint32_t interface_index) { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); if (is_connected()) return ERR_SOCKET_IS_CONNECTED; multicast_interface_ = interface_index; return OK; } int UDPSocketPosix::SetMulticastTimeToLive(int time_to_live) { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); if (is_connected()) return ERR_SOCKET_IS_CONNECTED; if (time_to_live < 0 || time_to_live > 255) return ERR_INVALID_ARGUMENT; multicast_time_to_live_ = time_to_live; return OK; } int UDPSocketPosix::SetMulticastLoopbackMode(bool loopback) { DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); if (is_connected()) return ERR_SOCKET_IS_CONNECTED; if (loopback) socket_options_ |= SOCKET_OPTION_MULTICAST_LOOP; else socket_options_ &= ~SOCKET_OPTION_MULTICAST_LOOP; return OK; } int UDPSocketPosix::SetDiffServCodePoint(DiffServCodePoint dscp) { if (dscp == DSCP_NO_CHANGE) { return OK; } int rv; int dscp_and_ecn = dscp << 2; if (addr_family_ == AF_INET) { rv = setsockopt(socket_, IPPROTO_IP, IP_TOS, &dscp_and_ecn, sizeof(dscp_and_ecn)); } else { rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_TCLASS, &dscp_and_ecn, sizeof(dscp_and_ecn)); } if (rv < 0) return MapSystemError(errno); return OK; } void UDPSocketPosix::DetachFromThread() { DETACH_FROM_THREAD(thread_checker_); } } // namespace net