xref: /aosp_15_r20/external/cronet/net/socket/udp_socket_posix.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1 // Copyright 2012 The Chromium Authors
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "build/build_config.h"
6 
7 #if BUILDFLAG(IS_APPLE)
8 // This must be defined before including <netinet/in.h>
9 // to use IPV6_DONTFRAG, one of the IPv6 Sockets option introduced by RFC 3542
10 #define __APPLE_USE_RFC_3542
11 #endif  // BUILDFLAG(IS_APPLE)
12 
13 #include "net/socket/udp_socket_posix.h"
14 
15 #include <errno.h>
16 #include <fcntl.h>
17 #include <net/if.h>
18 #include <netdb.h>
19 #include <netinet/in.h>
20 #include <sys/ioctl.h>
21 #include <sys/socket.h>
22 
23 #include <memory>
24 
25 #include "base/debug/alias.h"
26 #include "base/feature_list.h"
27 #include "base/files/file_util.h"
28 #include "base/functional/bind.h"
29 #include "base/functional/callback.h"
30 #include "base/functional/callback_helpers.h"
31 #include "base/logging.h"
32 #include "base/posix/eintr_wrapper.h"
33 #include "base/rand_util.h"
34 #include "base/task/current_thread.h"
35 #include "base/task/thread_pool.h"
36 #include "build/chromeos_buildflags.h"
37 #include "net/base/cronet_buildflags.h"
38 #include "net/base/features.h"
39 #include "net/base/io_buffer.h"
40 #include "net/base/ip_address.h"
41 #include "net/base/ip_endpoint.h"
42 #include "net/base/net_errors.h"
43 #include "net/base/network_activity_monitor.h"
44 #include "net/base/sockaddr_storage.h"
45 #include "net/base/trace_constants.h"
46 #include "net/base/tracing.h"
47 #include "net/log/net_log.h"
48 #include "net/log/net_log_event_type.h"
49 #include "net/log/net_log_source.h"
50 #include "net/log/net_log_source_type.h"
51 #include "net/socket/socket_descriptor.h"
52 #include "net/socket/socket_options.h"
53 #include "net/socket/socket_tag.h"
54 #include "net/socket/udp_net_log_parameters.h"
55 #include "net/traffic_annotation/network_traffic_annotation.h"
56 
57 #if BUILDFLAG(IS_ANDROID)
58 #include "base/native_library.h"
59 #include "net/android/network_library.h"
60 #endif  // BUILDFLAG(IS_ANDROID)
61 
62 #if BUILDFLAG(IS_MAC)
63 #include "base/mac/mac_util.h"
64 #endif  // BUILDFLAG(IS_MAC)
65 
66 namespace net {
67 
68 namespace {
69 
70 const int kBindRetries = 10;
71 const int kPortStart = 1024;
72 const int kPortEnd = 65535;
73 const int kActivityMonitorBytesThreshold = 65535;
74 const int kActivityMonitorMinimumSamplesForThroughputEstimate = 2;
75 const base::TimeDelta kActivityMonitorMsThreshold = base::Milliseconds(100);
76 
77 #if BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
78 
79 // On macOS, the file descriptor is guarded to detect the cause of
80 // https://crbug.com/640281. The guard mechanism is a private interface, so
81 // these functions, types, and constants are not defined in any public header,
82 // but with these declarations, it's possible to link against these symbols and
83 // directly call into the functions that will be available at run time.
84 
85 // Declarations from 12.3 xnu-8020.101.4/bsd/sys/guarded.h (not in the SDK).
86 extern "C" {
87 
88 using guardid_t = uint64_t;
89 
90 const unsigned int GUARD_CLOSE = 1u << 0;
91 const unsigned int GUARD_DUP = 1u << 1;
92 
93 int guarded_close_np(int fd, const guardid_t* guard);
94 int change_fdguard_np(int fd,
95                       const guardid_t* guard,
96                       unsigned int guardflags,
97                       const guardid_t* nguard,
98                       unsigned int nguardflags,
99                       int* fdflagsp);
100 
101 }  // extern "C"
102 
103 const guardid_t kSocketFdGuard = 0xD712BC0BC9A4EAD4;
104 
105 #endif  // BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
106 
GetSocketFDHash(int fd)107 int GetSocketFDHash(int fd) {
108   return fd ^ 1595649551;
109 }
110 
111 }  // namespace
112 
UDPSocketPosix(DatagramSocket::BindType bind_type,net::NetLog * net_log,const net::NetLogSource & source)113 UDPSocketPosix::UDPSocketPosix(DatagramSocket::BindType bind_type,
114                                net::NetLog* net_log,
115                                const net::NetLogSource& source)
116     : socket_(kInvalidSocket),
117       bind_type_(bind_type),
118       read_socket_watcher_(FROM_HERE),
119       write_socket_watcher_(FROM_HERE),
120       read_watcher_(this),
121       write_watcher_(this),
122       net_log_(NetLogWithSource::Make(net_log, NetLogSourceType::UDP_SOCKET)),
123       bound_network_(handles::kInvalidNetworkHandle),
124       always_update_bytes_received_(base::FeatureList::IsEnabled(
125           features::kUdpSocketPosixAlwaysUpdateBytesReceived)) {
126   net_log_.BeginEventReferencingSource(NetLogEventType::SOCKET_ALIVE, source);
127 }
128 
UDPSocketPosix(DatagramSocket::BindType bind_type,NetLogWithSource source_net_log)129 UDPSocketPosix::UDPSocketPosix(DatagramSocket::BindType bind_type,
130                                NetLogWithSource source_net_log)
131     : socket_(kInvalidSocket),
132       bind_type_(bind_type),
133       read_socket_watcher_(FROM_HERE),
134       write_socket_watcher_(FROM_HERE),
135       read_watcher_(this),
136       write_watcher_(this),
137       net_log_(source_net_log),
138       bound_network_(handles::kInvalidNetworkHandle),
139       always_update_bytes_received_(base::FeatureList::IsEnabled(
140           features::kUdpSocketPosixAlwaysUpdateBytesReceived)) {
141   net_log_.BeginEventReferencingSource(NetLogEventType::SOCKET_ALIVE,
142                                        net_log_.source());
143 }
144 
~UDPSocketPosix()145 UDPSocketPosix::~UDPSocketPosix() {
146   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
147   Close();
148   net_log_.EndEvent(NetLogEventType::SOCKET_ALIVE);
149 }
150 
Open(AddressFamily address_family)151 int UDPSocketPosix::Open(AddressFamily address_family) {
152   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
153   DCHECK_EQ(socket_, kInvalidSocket);
154 
155   auto owned_socket_count = TryAcquireGlobalUDPSocketCount();
156   if (owned_socket_count.empty())
157     return ERR_INSUFFICIENT_RESOURCES;
158 
159   owned_socket_count_ = std::move(owned_socket_count);
160   addr_family_ = ConvertAddressFamily(address_family);
161   socket_ = CreatePlatformSocket(addr_family_, SOCK_DGRAM, 0);
162   if (socket_ == kInvalidSocket) {
163     owned_socket_count_.Reset();
164     return MapSystemError(errno);
165   }
166 
167   return ConfigureOpenedSocket();
168 }
169 
AdoptOpenedSocket(AddressFamily address_family,int socket)170 int UDPSocketPosix::AdoptOpenedSocket(AddressFamily address_family,
171                                       int socket) {
172   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
173   DCHECK_EQ(socket_, kInvalidSocket);
174   auto owned_socket_count = TryAcquireGlobalUDPSocketCount();
175   if (owned_socket_count.empty()) {
176     return ERR_INSUFFICIENT_RESOURCES;
177   }
178 
179   owned_socket_count_ = std::move(owned_socket_count);
180   socket_ = socket;
181   addr_family_ = ConvertAddressFamily(address_family);
182   return ConfigureOpenedSocket();
183 }
184 
ConfigureOpenedSocket()185 int UDPSocketPosix::ConfigureOpenedSocket() {
186 #if BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
187   PCHECK(change_fdguard_np(socket_, nullptr, 0, &kSocketFdGuard,
188                            GUARD_CLOSE | GUARD_DUP, nullptr) == 0);
189 #endif  // BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
190   socket_hash_ = GetSocketFDHash(socket_);
191   if (!base::SetNonBlocking(socket_)) {
192     const int err = MapSystemError(errno);
193     Close();
194     return err;
195   }
196   if (tag_ != SocketTag())
197     tag_.Apply(socket_);
198 
199   return OK;
200 }
201 
Increment(uint32_t bytes)202 void UDPSocketPosix::ReceivedActivityMonitor::Increment(uint32_t bytes) {
203   if (!bytes)
204     return;
205   bool timer_running = timer_.IsRunning();
206   bytes_ += bytes;
207   increments_++;
208   // Allow initial updates to make sure throughput estimator has
209   // enough samples to generate a value. (low water mark)
210   // Or once the bytes threshold has be met. (high water mark)
211   if (increments_ < kActivityMonitorMinimumSamplesForThroughputEstimate ||
212       bytes_ > kActivityMonitorBytesThreshold) {
213     Update();
214     if (timer_running)
215       timer_.Reset();
216   }
217   if (!timer_running) {
218     timer_.Start(FROM_HERE, kActivityMonitorMsThreshold, this,
219                  &UDPSocketPosix::ReceivedActivityMonitor::OnTimerFired);
220   }
221 }
222 
Update()223 void UDPSocketPosix::ReceivedActivityMonitor::Update() {
224   if (!bytes_)
225     return;
226   activity_monitor::IncrementBytesReceived(bytes_);
227   bytes_ = 0;
228 }
229 
OnClose()230 void UDPSocketPosix::ReceivedActivityMonitor::OnClose() {
231   timer_.Stop();
232   Update();
233 }
234 
OnTimerFired()235 void UDPSocketPosix::ReceivedActivityMonitor::OnTimerFired() {
236   increments_ = 0;
237   if (!bytes_) {
238     // Can happen if the socket has been idle and have had no
239     // increments since the timer previously fired.  Don't bother
240     // keeping the timer running in this case.
241     timer_.Stop();
242     return;
243   }
244   Update();
245 }
246 
Close()247 void UDPSocketPosix::Close() {
248   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
249 
250   owned_socket_count_.Reset();
251 
252   if (socket_ == kInvalidSocket)
253     return;
254 
255   // Zero out any pending read/write callback state.
256   read_buf_.reset();
257   read_buf_len_ = 0;
258   read_callback_.Reset();
259   recv_from_address_ = nullptr;
260   write_buf_.reset();
261   write_buf_len_ = 0;
262   write_callback_.Reset();
263   send_to_address_.reset();
264 
265   bool ok = read_socket_watcher_.StopWatchingFileDescriptor();
266   DCHECK(ok);
267   ok = write_socket_watcher_.StopWatchingFileDescriptor();
268   DCHECK(ok);
269 
270   // Verify that |socket_| hasn't been corrupted. Needed to debug
271   // crbug.com/906005.
272   CHECK_EQ(socket_hash_, GetSocketFDHash(socket_));
273   TRACE_EVENT("base", perfetto::StaticString{"CloseSocketUDP"});
274 
275 #if BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
276   // Attempt to clear errors on the socket so that they are not returned by
277   // close(). This seems to be effective at clearing some, but not all,
278   // EPROTOTYPE errors. See https://crbug.com/1151048.
279   int value = 0;
280   socklen_t value_len = sizeof(value);
281   HANDLE_EINTR(getsockopt(socket_, SOL_SOCKET, SO_ERROR, &value, &value_len));
282 
283   if (IGNORE_EINTR(guarded_close_np(socket_, &kSocketFdGuard)) != 0) {
284     // There is a bug in the Mac OS kernel that it can return an ENOTCONN or
285     // EPROTOTYPE error. In this case we don't know whether the file descriptor
286     // is still allocated or not. We cannot safely close the file descriptor
287     // because it may have been reused by another thread in the meantime. We may
288     // leak file handles here and cause a crash indirectly later. See
289     // https://crbug.com/1151048.
290     PCHECK(errno == ENOTCONN || errno == EPROTOTYPE);
291   }
292 #else
293   PCHECK(IGNORE_EINTR(close(socket_)) == 0);
294 #endif  // BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
295 
296   socket_ = kInvalidSocket;
297   addr_family_ = 0;
298   is_connected_ = false;
299   tag_ = SocketTag();
300 
301   received_activity_monitor_.OnClose();
302 }
303 
GetPeerAddress(IPEndPoint * address) const304 int UDPSocketPosix::GetPeerAddress(IPEndPoint* address) const {
305   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
306   DCHECK(address);
307   if (!is_connected())
308     return ERR_SOCKET_NOT_CONNECTED;
309 
310   if (!remote_address_.get()) {
311     SockaddrStorage storage;
312     if (getpeername(socket_, storage.addr, &storage.addr_len))
313       return MapSystemError(errno);
314     auto endpoint = std::make_unique<IPEndPoint>();
315     if (!endpoint->FromSockAddr(storage.addr, storage.addr_len))
316       return ERR_ADDRESS_INVALID;
317     remote_address_ = std::move(endpoint);
318   }
319 
320   *address = *remote_address_;
321   return OK;
322 }
323 
GetLocalAddress(IPEndPoint * address) const324 int UDPSocketPosix::GetLocalAddress(IPEndPoint* address) const {
325   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
326   DCHECK(address);
327   if (!is_connected())
328     return ERR_SOCKET_NOT_CONNECTED;
329 
330   if (!local_address_.get()) {
331     SockaddrStorage storage;
332     if (getsockname(socket_, storage.addr, &storage.addr_len))
333       return MapSystemError(errno);
334     auto endpoint = std::make_unique<IPEndPoint>();
335     if (!endpoint->FromSockAddr(storage.addr, storage.addr_len))
336       return ERR_ADDRESS_INVALID;
337     local_address_ = std::move(endpoint);
338     net_log_.AddEvent(NetLogEventType::UDP_LOCAL_ADDRESS, [&] {
339       return CreateNetLogUDPConnectParams(*local_address_, bound_network_);
340     });
341   }
342 
343   *address = *local_address_;
344   return OK;
345 }
346 
Read(IOBuffer * buf,int buf_len,CompletionOnceCallback callback)347 int UDPSocketPosix::Read(IOBuffer* buf,
348                          int buf_len,
349                          CompletionOnceCallback callback) {
350   return RecvFrom(buf, buf_len, nullptr, std::move(callback));
351 }
352 
RecvFrom(IOBuffer * buf,int buf_len,IPEndPoint * address,CompletionOnceCallback callback)353 int UDPSocketPosix::RecvFrom(IOBuffer* buf,
354                              int buf_len,
355                              IPEndPoint* address,
356                              CompletionOnceCallback callback) {
357   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
358   DCHECK_NE(kInvalidSocket, socket_);
359   CHECK(read_callback_.is_null());
360   DCHECK(!recv_from_address_);
361   DCHECK(!callback.is_null());  // Synchronous operation not supported
362   DCHECK_GT(buf_len, 0);
363 
364   int nread = InternalRecvFrom(buf, buf_len, address);
365   if (nread != ERR_IO_PENDING)
366     return nread;
367 
368   if (!base::CurrentIOThread::Get()->WatchFileDescriptor(
369           socket_, true, base::MessagePumpForIO::WATCH_READ,
370           &read_socket_watcher_, &read_watcher_)) {
371     PLOG(ERROR) << "WatchFileDescriptor failed on read";
372     int result = MapSystemError(errno);
373     LogRead(result, nullptr, 0, nullptr);
374     return result;
375   }
376 
377   read_buf_ = buf;
378   read_buf_len_ = buf_len;
379   recv_from_address_ = address;
380   read_callback_ = std::move(callback);
381   return ERR_IO_PENDING;
382 }
383 
Write(IOBuffer * buf,int buf_len,CompletionOnceCallback callback,const NetworkTrafficAnnotationTag & traffic_annotation)384 int UDPSocketPosix::Write(
385     IOBuffer* buf,
386     int buf_len,
387     CompletionOnceCallback callback,
388     const NetworkTrafficAnnotationTag& traffic_annotation) {
389   return SendToOrWrite(buf, buf_len, nullptr, std::move(callback));
390 }
391 
SendTo(IOBuffer * buf,int buf_len,const IPEndPoint & address,CompletionOnceCallback callback)392 int UDPSocketPosix::SendTo(IOBuffer* buf,
393                            int buf_len,
394                            const IPEndPoint& address,
395                            CompletionOnceCallback callback) {
396   return SendToOrWrite(buf, buf_len, &address, std::move(callback));
397 }
398 
SendToOrWrite(IOBuffer * buf,int buf_len,const IPEndPoint * address,CompletionOnceCallback callback)399 int UDPSocketPosix::SendToOrWrite(IOBuffer* buf,
400                                   int buf_len,
401                                   const IPEndPoint* address,
402                                   CompletionOnceCallback callback) {
403   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
404   DCHECK_NE(kInvalidSocket, socket_);
405   CHECK(write_callback_.is_null());
406   DCHECK(!callback.is_null());  // Synchronous operation not supported
407   DCHECK_GT(buf_len, 0);
408 
409   if (int result = InternalSendTo(buf, buf_len, address);
410       result != ERR_IO_PENDING) {
411     return result;
412   }
413 
414   if (!base::CurrentIOThread::Get()->WatchFileDescriptor(
415           socket_, true, base::MessagePumpForIO::WATCH_WRITE,
416           &write_socket_watcher_, &write_watcher_)) {
417     DVPLOG(1) << "WatchFileDescriptor failed on write";
418     int result = MapSystemError(errno);
419     LogWrite(result, nullptr, nullptr);
420     return result;
421   }
422 
423   write_buf_ = buf;
424   write_buf_len_ = buf_len;
425   DCHECK(!send_to_address_.get());
426   if (address) {
427     send_to_address_ = std::make_unique<IPEndPoint>(*address);
428   }
429   write_callback_ = std::move(callback);
430   return ERR_IO_PENDING;
431 }
432 
Connect(const IPEndPoint & address)433 int UDPSocketPosix::Connect(const IPEndPoint& address) {
434   DCHECK_NE(socket_, kInvalidSocket);
435   net_log_.BeginEvent(NetLogEventType::UDP_CONNECT, [&] {
436     return CreateNetLogUDPConnectParams(address, bound_network_);
437   });
438   int rv = SetMulticastOptions();
439   if (rv != OK)
440     return rv;
441   rv = InternalConnect(address);
442   net_log_.EndEventWithNetErrorCode(NetLogEventType::UDP_CONNECT, rv);
443   is_connected_ = (rv == OK);
444   if (rv != OK)
445     tag_ = SocketTag();
446   return rv;
447 }
448 
InternalConnect(const IPEndPoint & address)449 int UDPSocketPosix::InternalConnect(const IPEndPoint& address) {
450   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
451   DCHECK(!is_connected());
452   DCHECK(!remote_address_.get());
453 
454   int rv = 0;
455   if (bind_type_ == DatagramSocket::RANDOM_BIND) {
456     // Construct IPAddress of appropriate size (IPv4 or IPv6) of 0s,
457     // representing INADDR_ANY or in6addr_any.
458     size_t addr_size = address.GetSockAddrFamily() == AF_INET
459                            ? IPAddress::kIPv4AddressSize
460                            : IPAddress::kIPv6AddressSize;
461     rv = RandomBind(IPAddress::AllZeros(addr_size));
462   }
463   // else connect() does the DatagramSocket::DEFAULT_BIND
464 
465   if (rv < 0) {
466     return rv;
467   }
468 
469   SockaddrStorage storage;
470   if (!address.ToSockAddr(storage.addr, &storage.addr_len))
471     return ERR_ADDRESS_INVALID;
472 
473   rv = HANDLE_EINTR(connect(socket_, storage.addr, storage.addr_len));
474   if (rv < 0)
475     return MapSystemError(errno);
476 
477   remote_address_ = std::make_unique<IPEndPoint>(address);
478   return rv;
479 }
480 
Bind(const IPEndPoint & address)481 int UDPSocketPosix::Bind(const IPEndPoint& address) {
482   DCHECK_NE(socket_, kInvalidSocket);
483   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
484   DCHECK(!is_connected());
485 
486   int rv = SetMulticastOptions();
487   if (rv < 0)
488     return rv;
489 
490   rv = DoBind(address);
491   if (rv < 0)
492     return rv;
493 
494   is_connected_ = true;
495   local_address_.reset();
496   return rv;
497 }
498 
BindToNetwork(handles::NetworkHandle network)499 int UDPSocketPosix::BindToNetwork(handles::NetworkHandle network) {
500   DCHECK_NE(socket_, kInvalidSocket);
501   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
502   DCHECK(!is_connected());
503 #if BUILDFLAG(IS_ANDROID)
504   int rv = net::android::BindToNetwork(socket_, network);
505   if (rv == OK)
506     bound_network_ = network;
507   return rv;
508 #else
509   NOTIMPLEMENTED();
510   return ERR_NOT_IMPLEMENTED;
511 #endif
512 }
513 
SetReceiveBufferSize(int32_t size)514 int UDPSocketPosix::SetReceiveBufferSize(int32_t size) {
515   DCHECK_NE(socket_, kInvalidSocket);
516   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
517   return SetSocketReceiveBufferSize(socket_, size);
518 }
519 
SetSendBufferSize(int32_t size)520 int UDPSocketPosix::SetSendBufferSize(int32_t size) {
521   DCHECK_NE(socket_, kInvalidSocket);
522   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
523   return SetSocketSendBufferSize(socket_, size);
524 }
525 
SetDoNotFragment()526 int UDPSocketPosix::SetDoNotFragment() {
527   DCHECK_NE(socket_, kInvalidSocket);
528   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
529 
530 #if !defined(IP_PMTUDISC_DO) && !BUILDFLAG(IS_MAC)
531   return ERR_NOT_IMPLEMENTED;
532 
533 // setsockopt(IP_DONTFRAG) is supported on macOS from Big Sur
534 #elif BUILDFLAG(IS_MAC)
535   if (base::mac::MacOSMajorVersion() < 11) {
536     return ERR_NOT_IMPLEMENTED;
537   }
538   int val = 1;
539   if (addr_family_ == AF_INET6) {
540     int rv =
541         setsockopt(socket_, IPPROTO_IPV6, IPV6_DONTFRAG, &val, sizeof(val));
542     // IP_DONTFRAG is not supported on v4mapped addresses.
543     return rv == 0 ? OK : MapSystemError(errno);
544   }
545   int rv = setsockopt(socket_, IPPROTO_IP, IP_DONTFRAG, &val, sizeof(val));
546   return rv == 0 ? OK : MapSystemError(errno);
547 
548 #else
549   if (addr_family_ == AF_INET6) {
550     int val = IPV6_PMTUDISC_DO;
551     if (setsockopt(socket_, IPPROTO_IPV6, IPV6_MTU_DISCOVER, &val,
552                    sizeof(val)) != 0) {
553       return MapSystemError(errno);
554     }
555 
556     int v6_only = false;
557     socklen_t v6_only_len = sizeof(v6_only);
558     if (getsockopt(socket_, IPPROTO_IPV6, IPV6_V6ONLY, &v6_only,
559                    &v6_only_len) != 0) {
560       return MapSystemError(errno);
561     }
562 
563     if (v6_only)
564       return OK;
565   }
566 
567   int val = IP_PMTUDISC_DO;
568   int rv = setsockopt(socket_, IPPROTO_IP, IP_MTU_DISCOVER, &val, sizeof(val));
569   return rv == 0 ? OK : MapSystemError(errno);
570 #endif
571 }
572 
SetRecvTos()573 int UDPSocketPosix::SetRecvTos() {
574   DCHECK_NE(socket_, kInvalidSocket);
575   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
576 
577   unsigned int ecn = 1;
578   if (addr_family_ == AF_INET6) {
579     if (setsockopt(socket_, IPPROTO_IPV6, IPV6_RECVTCLASS, &ecn, sizeof(ecn)) !=
580         0) {
581       return MapSystemError(errno);
582     }
583 
584     int v6_only = false;
585     socklen_t v6_only_len = sizeof(v6_only);
586     if (getsockopt(socket_, IPPROTO_IPV6, IPV6_V6ONLY, &v6_only,
587                    &v6_only_len) != 0) {
588       return MapSystemError(errno);
589     }
590     if (v6_only) {
591       return OK;
592     }
593   }
594 
595   int rv = setsockopt(socket_, IPPROTO_IP, IP_RECVTOS, &ecn, sizeof(ecn));
596   return rv == 0 ? OK : MapSystemError(errno);
597 }
598 
SetMsgConfirm(bool confirm)599 void UDPSocketPosix::SetMsgConfirm(bool confirm) {
600 #if !BUILDFLAG(IS_APPLE)
601   if (confirm) {
602     sendto_flags_ |= MSG_CONFIRM;
603   } else {
604     sendto_flags_ &= ~MSG_CONFIRM;
605   }
606 #endif  // !BUILDFLAG(IS_APPLE)
607 }
608 
AllowAddressReuse()609 int UDPSocketPosix::AllowAddressReuse() {
610   DCHECK_NE(socket_, kInvalidSocket);
611   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
612   DCHECK(!is_connected());
613   return SetReuseAddr(socket_, true);
614 }
615 
SetBroadcast(bool broadcast)616 int UDPSocketPosix::SetBroadcast(bool broadcast) {
617   DCHECK_NE(socket_, kInvalidSocket);
618   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
619   int value = broadcast ? 1 : 0;
620   int rv;
621 #if BUILDFLAG(IS_APPLE)
622   // SO_REUSEPORT on OSX permits multiple processes to each receive
623   // UDP multicast or broadcast datagrams destined for the bound
624   // port.
625   // This is only being set on OSX because its behavior is platform dependent
626   // and we are playing it safe by only setting it on platforms where things
627   // break.
628   rv = setsockopt(socket_, SOL_SOCKET, SO_REUSEPORT, &value, sizeof(value));
629   if (rv != 0)
630     return MapSystemError(errno);
631 #endif  // BUILDFLAG(IS_APPLE)
632   rv = setsockopt(socket_, SOL_SOCKET, SO_BROADCAST, &value, sizeof(value));
633 
634   return rv == 0 ? OK : MapSystemError(errno);
635 }
636 
AllowAddressSharingForMulticast()637 int UDPSocketPosix::AllowAddressSharingForMulticast() {
638   DCHECK_NE(socket_, kInvalidSocket);
639   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
640   DCHECK(!is_connected());
641 
642   int rv = AllowAddressReuse();
643   if (rv != OK)
644     return rv;
645 
646 #ifdef SO_REUSEPORT
647   // Attempt to set SO_REUSEPORT if available. On some platforms, this is
648   // necessary to allow the address to be fully shared between separate sockets.
649   // On platforms where the option does not exist, SO_REUSEADDR should be
650   // sufficient to share multicast packets if such sharing is at all possible.
651   int value = 1;
652   rv = setsockopt(socket_, SOL_SOCKET, SO_REUSEPORT, &value, sizeof(value));
653   // Ignore errors that the option does not exist.
654   if (rv != 0 && errno != ENOPROTOOPT)
655     return MapSystemError(errno);
656 #endif  // SO_REUSEPORT
657 
658   return OK;
659 }
660 
OnFileCanReadWithoutBlocking(int)661 void UDPSocketPosix::ReadWatcher::OnFileCanReadWithoutBlocking(int) {
662   TRACE_EVENT(NetTracingCategory(),
663               "UDPSocketPosix::ReadWatcher::OnFileCanReadWithoutBlocking");
664   if (!socket_->read_callback_.is_null())
665     socket_->DidCompleteRead();
666 }
667 
OnFileCanWriteWithoutBlocking(int)668 void UDPSocketPosix::WriteWatcher::OnFileCanWriteWithoutBlocking(int) {
669   if (!socket_->write_callback_.is_null())
670     socket_->DidCompleteWrite();
671 }
672 
DoReadCallback(int rv)673 void UDPSocketPosix::DoReadCallback(int rv) {
674   DCHECK_NE(rv, ERR_IO_PENDING);
675   DCHECK(!read_callback_.is_null());
676 
677   // Since Run() may result in Read() being called,
678   // clear |read_callback_| up front.
679   std::move(read_callback_).Run(rv);
680 }
681 
DoWriteCallback(int rv)682 void UDPSocketPosix::DoWriteCallback(int rv) {
683   DCHECK_NE(rv, ERR_IO_PENDING);
684   DCHECK(!write_callback_.is_null());
685 
686   // Since Run() may result in Write() being called,
687   // clear |write_callback_| up front.
688   std::move(write_callback_).Run(rv);
689 }
690 
DidCompleteRead()691 void UDPSocketPosix::DidCompleteRead() {
692   int result =
693       InternalRecvFrom(read_buf_.get(), read_buf_len_, recv_from_address_);
694   if (result != ERR_IO_PENDING) {
695     read_buf_.reset();
696     read_buf_len_ = 0;
697     recv_from_address_ = nullptr;
698     bool ok = read_socket_watcher_.StopWatchingFileDescriptor();
699     DCHECK(ok);
700     DoReadCallback(result);
701   }
702 }
703 
LogRead(int result,const char * bytes,socklen_t addr_len,const sockaddr * addr)704 void UDPSocketPosix::LogRead(int result,
705                              const char* bytes,
706                              socklen_t addr_len,
707                              const sockaddr* addr) {
708   if (result < 0) {
709     net_log_.AddEventWithNetErrorCode(NetLogEventType::UDP_RECEIVE_ERROR,
710                                       result);
711     return;
712   }
713 
714   if (net_log_.IsCapturing()) {
715     DCHECK(addr_len > 0);
716     DCHECK(addr);
717 
718     IPEndPoint address;
719     bool is_address_valid = address.FromSockAddr(addr, addr_len);
720     NetLogUDPDataTransfer(net_log_, NetLogEventType::UDP_BYTES_RECEIVED, result,
721                           bytes, is_address_valid ? &address : nullptr);
722   }
723 
724   if (always_update_bytes_received_)
725     activity_monitor::IncrementBytesReceived(result);
726   else
727     received_activity_monitor_.Increment(result);
728 }
729 
DidCompleteWrite()730 void UDPSocketPosix::DidCompleteWrite() {
731   int result =
732       InternalSendTo(write_buf_.get(), write_buf_len_, send_to_address_.get());
733 
734   if (result != ERR_IO_PENDING) {
735     write_buf_.reset();
736     write_buf_len_ = 0;
737     send_to_address_.reset();
738     write_socket_watcher_.StopWatchingFileDescriptor();
739     DoWriteCallback(result);
740   }
741 }
742 
LogWrite(int result,const char * bytes,const IPEndPoint * address)743 void UDPSocketPosix::LogWrite(int result,
744                               const char* bytes,
745                               const IPEndPoint* address) {
746   if (result < 0) {
747     net_log_.AddEventWithNetErrorCode(NetLogEventType::UDP_SEND_ERROR, result);
748     return;
749   }
750 
751   if (net_log_.IsCapturing()) {
752     NetLogUDPDataTransfer(net_log_, NetLogEventType::UDP_BYTES_SENT, result,
753                           bytes, address);
754   }
755 }
756 
757 // TODO(crbug.com/1491628): Because InternalRecvFromConnectedSocket() uses
758 // recvfrom() instead of recvmsg(), it cannot report received ECN marks for
759 // QUIC ACK-ECN frames. It might be time to deprecate
760 // experimental_recv_optimization_enabled_ if that experiment has run its
761 // course.
InternalRecvFrom(IOBuffer * buf,int buf_len,IPEndPoint * address)762 int UDPSocketPosix::InternalRecvFrom(IOBuffer* buf,
763                                      int buf_len,
764                                      IPEndPoint* address) {
765   // If the socket is connected and the remote address is known
766   // use the more efficient method that uses read() instead of recvmsg().
767   if (experimental_recv_optimization_enabled_ && is_connected_ &&
768       remote_address_) {
769     return InternalRecvFromConnectedSocket(buf, buf_len, address);
770   }
771   return InternalRecvFromNonConnectedSocket(buf, buf_len, address);
772 }
773 
InternalRecvFromConnectedSocket(IOBuffer * buf,int buf_len,IPEndPoint * address)774 int UDPSocketPosix::InternalRecvFromConnectedSocket(IOBuffer* buf,
775                                                     int buf_len,
776                                                     IPEndPoint* address) {
777   DCHECK(is_connected_);
778   DCHECK(remote_address_);
779   int result;
780   int bytes_transferred = HANDLE_EINTR(read(socket_, buf->data(), buf_len));
781   if (bytes_transferred < 0) {
782     result = MapSystemError(errno);
783     if (result == ERR_IO_PENDING) {
784       return result;
785     }
786   } else if (bytes_transferred == buf_len) {
787     // NB: recv(..., MSG_TRUNC) would be a more reliable way to do this on
788     // Linux, but isn't supported by POSIX.
789     result = ERR_MSG_TOO_BIG;
790   } else {
791     result = bytes_transferred;
792     if (address) {
793       *address = *remote_address_.get();
794     }
795   }
796 
797   SockaddrStorage sock_addr;
798   bool success =
799         remote_address_->ToSockAddr(sock_addr.addr, &sock_addr.addr_len);
800     DCHECK(success);
801     LogRead(result, buf->data(), sock_addr.addr_len, sock_addr.addr);
802   return result;
803 }
804 
InternalRecvFromNonConnectedSocket(IOBuffer * buf,int buf_len,IPEndPoint * address)805 int UDPSocketPosix::InternalRecvFromNonConnectedSocket(IOBuffer* buf,
806                                                        int buf_len,
807                                                        IPEndPoint* address) {
808   SockaddrStorage storage;
809   struct iovec iov = {
810       .iov_base = buf->data(),
811       .iov_len = static_cast<size_t>(buf_len),
812   };
813   // control_buffer needs to be big enough to accommodate the maximum
814   // conceivable number of CMSGs. Other (proprietary) Google QUIC code uses
815   // 512 Bytes, re-used here.
816   char control_buffer[512];
817   struct msghdr msg = {
818       .msg_name = storage.addr,
819       .msg_namelen = storage.addr_len,
820       .msg_iov = &iov,
821       .msg_iovlen = 1,
822       .msg_control = control_buffer,
823       .msg_controllen = ABSL_ARRAYSIZE(control_buffer),
824   };
825   int result;
826   int bytes_transferred = HANDLE_EINTR(recvmsg(socket_, &msg, 0));
827   if (bytes_transferred < 0) {
828     result = MapSystemError(errno);
829     if (result == ERR_IO_PENDING) {
830       return result;
831     }
832   } else {
833     storage.addr_len = msg.msg_namelen;
834     if (msg.msg_flags & MSG_TRUNC) {
835       // NB: recvfrom(..., MSG_TRUNC, ...) would be a simpler way to do this on
836       // Linux, but isn't supported by POSIX.
837       result = ERR_MSG_TOO_BIG;
838     } else if (address &&
839                !address->FromSockAddr(storage.addr, storage.addr_len)) {
840       result = ERR_ADDRESS_INVALID;
841     } else {
842       result = bytes_transferred;
843     }
844     last_tos_ = 0;
845     if (bytes_transferred > 0 && msg.msg_controllen > 0) {
846       for (struct cmsghdr* cmsg = CMSG_FIRSTHDR(&msg); cmsg != nullptr;
847            cmsg = CMSG_NXTHDR(&msg, cmsg)) {
848 #if BUILDFLAG(IS_APPLE)
849         if ((cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_RECVTOS) ||
850             (cmsg->cmsg_level == IPPROTO_IPV6 &&
851              cmsg->cmsg_type == IPV6_TCLASS)) {
852 #else
853         if ((cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_TOS) ||
854             (cmsg->cmsg_level == IPPROTO_IPV6 &&
855              cmsg->cmsg_type == IPV6_TCLASS)) {
856 #endif  // BUILDFLAG(IS_APPLE)
857           last_tos_ = *(reinterpret_cast<uint8_t*>(CMSG_DATA(cmsg)));
858         }
859       }
860     }
861   }
862 
863   LogRead(result, buf->data(), storage.addr_len, storage.addr);
864   return result;
865 }
866 
867 int UDPSocketPosix::InternalSendTo(IOBuffer* buf,
868                                    int buf_len,
869                                    const IPEndPoint* address) {
870   SockaddrStorage storage;
871   struct sockaddr* addr = storage.addr;
872   if (!address) {
873     addr = nullptr;
874     storage.addr_len = 0;
875   } else {
876     if (!address->ToSockAddr(storage.addr, &storage.addr_len)) {
877       int result = ERR_ADDRESS_INVALID;
878       LogWrite(result, nullptr, nullptr);
879       return result;
880     }
881   }
882 
883   int result = HANDLE_EINTR(sendto(socket_, buf->data(), buf_len, sendto_flags_,
884                                    addr, storage.addr_len));
885   if (result < 0)
886     result = MapSystemError(errno);
887   if (result != ERR_IO_PENDING)
888     LogWrite(result, buf->data(), address);
889   return result;
890 }
891 
892 int UDPSocketPosix::SetMulticastOptions() {
893   if (!(socket_options_ & SOCKET_OPTION_MULTICAST_LOOP)) {
894     int rv;
895     if (addr_family_ == AF_INET) {
896       u_char loop = 0;
897       rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_LOOP,
898                       &loop, sizeof(loop));
899     } else {
900       u_int loop = 0;
901       rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_LOOP,
902                       &loop, sizeof(loop));
903     }
904     if (rv < 0)
905       return MapSystemError(errno);
906   }
907   if (multicast_time_to_live_ != IP_DEFAULT_MULTICAST_TTL) {
908     int rv;
909     if (addr_family_ == AF_INET) {
910       u_char ttl = multicast_time_to_live_;
911       rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_TTL,
912                       &ttl, sizeof(ttl));
913     } else {
914       // Signed integer. -1 to use route default.
915       int ttl = multicast_time_to_live_;
916       rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
917                       &ttl, sizeof(ttl));
918     }
919     if (rv < 0)
920       return MapSystemError(errno);
921   }
922   if (multicast_interface_ != 0) {
923     switch (addr_family_) {
924       case AF_INET: {
925         ip_mreqn mreq = {};
926         mreq.imr_ifindex = multicast_interface_;
927         mreq.imr_address.s_addr = htonl(INADDR_ANY);
928         int rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_IF,
929                             reinterpret_cast<const char*>(&mreq), sizeof(mreq));
930         if (rv)
931           return MapSystemError(errno);
932         break;
933       }
934       case AF_INET6: {
935         uint32_t interface_index = multicast_interface_;
936         int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_IF,
937                             reinterpret_cast<const char*>(&interface_index),
938                             sizeof(interface_index));
939         if (rv)
940           return MapSystemError(errno);
941         break;
942       }
943       default:
944         NOTREACHED() << "Invalid address family";
945         return ERR_ADDRESS_INVALID;
946     }
947   }
948   return OK;
949 }
950 
951 int UDPSocketPosix::DoBind(const IPEndPoint& address) {
952   SockaddrStorage storage;
953   if (!address.ToSockAddr(storage.addr, &storage.addr_len))
954     return ERR_ADDRESS_INVALID;
955   int rv = bind(socket_, storage.addr, storage.addr_len);
956   if (rv == 0)
957     return OK;
958   int last_error = errno;
959 #if BUILDFLAG(IS_CHROMEOS_ASH)
960   if (last_error == EINVAL)
961     return ERR_ADDRESS_IN_USE;
962 #elif BUILDFLAG(IS_APPLE)
963   if (last_error == EADDRNOTAVAIL)
964     return ERR_ADDRESS_IN_USE;
965 #endif
966   return MapSystemError(last_error);
967 }
968 
969 int UDPSocketPosix::RandomBind(const IPAddress& address) {
970   DCHECK_EQ(bind_type_, DatagramSocket::RANDOM_BIND);
971 
972   for (int i = 0; i < kBindRetries; ++i) {
973     int rv = DoBind(IPEndPoint(address, base::RandInt(kPortStart, kPortEnd)));
974     if (rv != ERR_ADDRESS_IN_USE)
975       return rv;
976   }
977 
978   return DoBind(IPEndPoint(address, 0));
979 }
980 
981 int UDPSocketPosix::JoinGroup(const IPAddress& group_address) const {
982   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
983   if (!is_connected())
984     return ERR_SOCKET_NOT_CONNECTED;
985 
986   switch (group_address.size()) {
987     case IPAddress::kIPv4AddressSize: {
988       if (addr_family_ != AF_INET)
989         return ERR_ADDRESS_INVALID;
990       ip_mreqn mreq = {};
991       mreq.imr_ifindex = multicast_interface_;
992       mreq.imr_address.s_addr = htonl(INADDR_ANY);
993       memcpy(&mreq.imr_multiaddr, group_address.bytes().data(),
994              IPAddress::kIPv4AddressSize);
995       int rv = setsockopt(socket_, IPPROTO_IP, IP_ADD_MEMBERSHIP,
996                           &mreq, sizeof(mreq));
997       if (rv < 0)
998         return MapSystemError(errno);
999       return OK;
1000     }
1001     case IPAddress::kIPv6AddressSize: {
1002       if (addr_family_ != AF_INET6)
1003         return ERR_ADDRESS_INVALID;
1004       ipv6_mreq mreq;
1005       mreq.ipv6mr_interface = multicast_interface_;
1006       memcpy(&mreq.ipv6mr_multiaddr, group_address.bytes().data(),
1007              IPAddress::kIPv6AddressSize);
1008       int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_JOIN_GROUP,
1009                           &mreq, sizeof(mreq));
1010       if (rv < 0)
1011         return MapSystemError(errno);
1012       return OK;
1013     }
1014     default:
1015       NOTREACHED() << "Invalid address family";
1016       return ERR_ADDRESS_INVALID;
1017   }
1018 }
1019 
1020 int UDPSocketPosix::LeaveGroup(const IPAddress& group_address) const {
1021   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1022 
1023   if (!is_connected())
1024     return ERR_SOCKET_NOT_CONNECTED;
1025 
1026   switch (group_address.size()) {
1027     case IPAddress::kIPv4AddressSize: {
1028       if (addr_family_ != AF_INET)
1029         return ERR_ADDRESS_INVALID;
1030       ip_mreqn mreq = {};
1031       mreq.imr_ifindex = multicast_interface_;
1032       mreq.imr_address.s_addr = INADDR_ANY;
1033       memcpy(&mreq.imr_multiaddr, group_address.bytes().data(),
1034              IPAddress::kIPv4AddressSize);
1035       int rv = setsockopt(socket_, IPPROTO_IP, IP_DROP_MEMBERSHIP,
1036                           &mreq, sizeof(mreq));
1037       if (rv < 0)
1038         return MapSystemError(errno);
1039       return OK;
1040     }
1041     case IPAddress::kIPv6AddressSize: {
1042       if (addr_family_ != AF_INET6)
1043         return ERR_ADDRESS_INVALID;
1044       ipv6_mreq mreq;
1045 #if BUILDFLAG(IS_FUCHSIA)
1046       mreq.ipv6mr_interface = multicast_interface_;
1047 #else   // BUILDFLAG(IS_FUCHSIA)
1048       mreq.ipv6mr_interface = 0;  // 0 indicates default multicast interface.
1049 #endif  // !BUILDFLAG(IS_FUCHSIA)
1050       memcpy(&mreq.ipv6mr_multiaddr, group_address.bytes().data(),
1051              IPAddress::kIPv6AddressSize);
1052       int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_LEAVE_GROUP,
1053                           &mreq, sizeof(mreq));
1054       if (rv < 0)
1055         return MapSystemError(errno);
1056       return OK;
1057     }
1058     default:
1059       NOTREACHED() << "Invalid address family";
1060       return ERR_ADDRESS_INVALID;
1061   }
1062 }
1063 
1064 int UDPSocketPosix::SetMulticastInterface(uint32_t interface_index) {
1065   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1066   if (is_connected())
1067     return ERR_SOCKET_IS_CONNECTED;
1068   multicast_interface_ = interface_index;
1069   return OK;
1070 }
1071 
1072 int UDPSocketPosix::SetMulticastTimeToLive(int time_to_live) {
1073   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1074   if (is_connected())
1075     return ERR_SOCKET_IS_CONNECTED;
1076 
1077   if (time_to_live < 0 || time_to_live > 255)
1078     return ERR_INVALID_ARGUMENT;
1079   multicast_time_to_live_ = time_to_live;
1080   return OK;
1081 }
1082 
1083 int UDPSocketPosix::SetMulticastLoopbackMode(bool loopback) {
1084   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1085   if (is_connected())
1086     return ERR_SOCKET_IS_CONNECTED;
1087 
1088   if (loopback)
1089     socket_options_ |= SOCKET_OPTION_MULTICAST_LOOP;
1090   else
1091     socket_options_ &= ~SOCKET_OPTION_MULTICAST_LOOP;
1092   return OK;
1093 }
1094 
1095 int UDPSocketPosix::SetDiffServCodePoint(DiffServCodePoint dscp) {
1096   return SetTos(dscp, ECN_NO_CHANGE);
1097 }
1098 
1099 int UDPSocketPosix::SetTos(DiffServCodePoint dscp, EcnCodePoint ecn) {
1100   if (dscp == DSCP_NO_CHANGE && ecn == ECN_NO_CHANGE) {
1101     return OK;
1102   }
1103   int dscp_and_ecn = (dscp << 2) | ecn;
1104   socklen_t size = sizeof(dscp_and_ecn);
1105   if (dscp == DSCP_NO_CHANGE || ecn == ECN_NO_CHANGE) {
1106     int rv;
1107     if (addr_family_ == AF_INET) {
1108       rv = getsockopt(socket_, IPPROTO_IP, IP_TOS, &dscp_and_ecn, &size);
1109     } else {
1110       rv = getsockopt(socket_, IPPROTO_IPV6, IPV6_TCLASS, &dscp_and_ecn, &size);
1111     }
1112     if (rv < 0) {
1113       return MapSystemError(errno);
1114     }
1115     if (dscp == DSCP_NO_CHANGE) {
1116       dscp_and_ecn &= ~ECN_LAST;
1117       dscp_and_ecn |= ecn;
1118     } else {
1119       dscp_and_ecn &= ECN_LAST;
1120       dscp_and_ecn |= (dscp << 2);
1121     }
1122   }
1123   // Set the IPv4 option in all cases to support dual-stack sockets.
1124   int rv = setsockopt(socket_, IPPROTO_IP, IP_TOS, &dscp_and_ecn,
1125                       sizeof(dscp_and_ecn));
1126   if (addr_family_ == AF_INET6) {
1127     // In the IPv6 case, the previous socksetopt may fail because of a lack of
1128     // dual-stack support. Therefore ignore the previous return value.
1129     rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_TCLASS,
1130                     &dscp_and_ecn, sizeof(dscp_and_ecn));
1131   }
1132   if (rv < 0)
1133     return MapSystemError(errno);
1134   return OK;
1135 }
1136 
1137 int UDPSocketPosix::SetIPv6Only(bool ipv6_only) {
1138   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1139   if (is_connected()) {
1140     return ERR_SOCKET_IS_CONNECTED;
1141   }
1142   return net::SetIPv6Only(socket_, ipv6_only);
1143 }
1144 
1145 void UDPSocketPosix::DetachFromThread() {
1146   DETACH_FROM_THREAD(thread_checker_);
1147 }
1148 
1149 void UDPSocketPosix::ApplySocketTag(const SocketTag& tag) {
1150   DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1151   if (socket_ != kInvalidSocket && tag != tag_) {
1152     tag.Apply(socket_);
1153   }
1154   tag_ = tag;
1155 }
1156 
1157 int UDPSocketPosix::SetIOSNetworkServiceType(int ios_network_service_type) {
1158   if (ios_network_service_type == 0) {
1159     return OK;
1160   }
1161 #if BUILDFLAG(IS_IOS)
1162   if (setsockopt(socket_, SOL_SOCKET, SO_NET_SERVICE_TYPE,
1163                  &ios_network_service_type, sizeof(ios_network_service_type))) {
1164     return MapSystemError(errno);
1165   }
1166 #endif  // BUILDFLAG(IS_IOS)
1167   return OK;
1168 }
1169 
1170 }  // namespace net
1171