1 // Copyright 2012 The Chromium Authors
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "build/build_config.h"
6
7 #if BUILDFLAG(IS_APPLE)
8 // This must be defined before including <netinet/in.h>
9 // to use IPV6_DONTFRAG, one of the IPv6 Sockets option introduced by RFC 3542
10 #define __APPLE_USE_RFC_3542
11 #endif // BUILDFLAG(IS_APPLE)
12
13 #include "net/socket/udp_socket_posix.h"
14
15 #include <errno.h>
16 #include <fcntl.h>
17 #include <net/if.h>
18 #include <netdb.h>
19 #include <netinet/in.h>
20 #include <sys/ioctl.h>
21 #include <sys/socket.h>
22
23 #include <memory>
24
25 #include "base/debug/alias.h"
26 #include "base/feature_list.h"
27 #include "base/files/file_util.h"
28 #include "base/functional/bind.h"
29 #include "base/functional/callback.h"
30 #include "base/functional/callback_helpers.h"
31 #include "base/logging.h"
32 #include "base/posix/eintr_wrapper.h"
33 #include "base/rand_util.h"
34 #include "base/task/current_thread.h"
35 #include "base/task/thread_pool.h"
36 #include "build/chromeos_buildflags.h"
37 #include "net/base/cronet_buildflags.h"
38 #include "net/base/features.h"
39 #include "net/base/io_buffer.h"
40 #include "net/base/ip_address.h"
41 #include "net/base/ip_endpoint.h"
42 #include "net/base/net_errors.h"
43 #include "net/base/network_activity_monitor.h"
44 #include "net/base/sockaddr_storage.h"
45 #include "net/base/trace_constants.h"
46 #include "net/base/tracing.h"
47 #include "net/log/net_log.h"
48 #include "net/log/net_log_event_type.h"
49 #include "net/log/net_log_source.h"
50 #include "net/log/net_log_source_type.h"
51 #include "net/socket/socket_descriptor.h"
52 #include "net/socket/socket_options.h"
53 #include "net/socket/socket_tag.h"
54 #include "net/socket/udp_net_log_parameters.h"
55 #include "net/traffic_annotation/network_traffic_annotation.h"
56
57 #if BUILDFLAG(IS_ANDROID)
58 #include "base/native_library.h"
59 #include "net/android/network_library.h"
60 #endif // BUILDFLAG(IS_ANDROID)
61
62 #if BUILDFLAG(IS_MAC)
63 #include "base/mac/mac_util.h"
64 #endif // BUILDFLAG(IS_MAC)
65
66 namespace net {
67
68 namespace {
69
70 const int kBindRetries = 10;
71 const int kPortStart = 1024;
72 const int kPortEnd = 65535;
73 const int kActivityMonitorBytesThreshold = 65535;
74 const int kActivityMonitorMinimumSamplesForThroughputEstimate = 2;
75 const base::TimeDelta kActivityMonitorMsThreshold = base::Milliseconds(100);
76
77 #if BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
78
79 // On macOS, the file descriptor is guarded to detect the cause of
80 // https://crbug.com/640281. The guard mechanism is a private interface, so
81 // these functions, types, and constants are not defined in any public header,
82 // but with these declarations, it's possible to link against these symbols and
83 // directly call into the functions that will be available at run time.
84
85 // Declarations from 12.3 xnu-8020.101.4/bsd/sys/guarded.h (not in the SDK).
86 extern "C" {
87
88 using guardid_t = uint64_t;
89
90 const unsigned int GUARD_CLOSE = 1u << 0;
91 const unsigned int GUARD_DUP = 1u << 1;
92
93 int guarded_close_np(int fd, const guardid_t* guard);
94 int change_fdguard_np(int fd,
95 const guardid_t* guard,
96 unsigned int guardflags,
97 const guardid_t* nguard,
98 unsigned int nguardflags,
99 int* fdflagsp);
100
101 } // extern "C"
102
103 const guardid_t kSocketFdGuard = 0xD712BC0BC9A4EAD4;
104
105 #endif // BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
106
GetSocketFDHash(int fd)107 int GetSocketFDHash(int fd) {
108 return fd ^ 1595649551;
109 }
110
111 } // namespace
112
UDPSocketPosix(DatagramSocket::BindType bind_type,net::NetLog * net_log,const net::NetLogSource & source)113 UDPSocketPosix::UDPSocketPosix(DatagramSocket::BindType bind_type,
114 net::NetLog* net_log,
115 const net::NetLogSource& source)
116 : socket_(kInvalidSocket),
117 bind_type_(bind_type),
118 read_socket_watcher_(FROM_HERE),
119 write_socket_watcher_(FROM_HERE),
120 read_watcher_(this),
121 write_watcher_(this),
122 net_log_(NetLogWithSource::Make(net_log, NetLogSourceType::UDP_SOCKET)),
123 bound_network_(handles::kInvalidNetworkHandle),
124 always_update_bytes_received_(base::FeatureList::IsEnabled(
125 features::kUdpSocketPosixAlwaysUpdateBytesReceived)) {
126 net_log_.BeginEventReferencingSource(NetLogEventType::SOCKET_ALIVE, source);
127 }
128
UDPSocketPosix(DatagramSocket::BindType bind_type,NetLogWithSource source_net_log)129 UDPSocketPosix::UDPSocketPosix(DatagramSocket::BindType bind_type,
130 NetLogWithSource source_net_log)
131 : socket_(kInvalidSocket),
132 bind_type_(bind_type),
133 read_socket_watcher_(FROM_HERE),
134 write_socket_watcher_(FROM_HERE),
135 read_watcher_(this),
136 write_watcher_(this),
137 net_log_(source_net_log),
138 bound_network_(handles::kInvalidNetworkHandle),
139 always_update_bytes_received_(base::FeatureList::IsEnabled(
140 features::kUdpSocketPosixAlwaysUpdateBytesReceived)) {
141 net_log_.BeginEventReferencingSource(NetLogEventType::SOCKET_ALIVE,
142 net_log_.source());
143 }
144
~UDPSocketPosix()145 UDPSocketPosix::~UDPSocketPosix() {
146 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
147 Close();
148 net_log_.EndEvent(NetLogEventType::SOCKET_ALIVE);
149 }
150
Open(AddressFamily address_family)151 int UDPSocketPosix::Open(AddressFamily address_family) {
152 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
153 DCHECK_EQ(socket_, kInvalidSocket);
154
155 auto owned_socket_count = TryAcquireGlobalUDPSocketCount();
156 if (owned_socket_count.empty())
157 return ERR_INSUFFICIENT_RESOURCES;
158
159 owned_socket_count_ = std::move(owned_socket_count);
160 addr_family_ = ConvertAddressFamily(address_family);
161 socket_ = CreatePlatformSocket(addr_family_, SOCK_DGRAM, 0);
162 if (socket_ == kInvalidSocket) {
163 owned_socket_count_.Reset();
164 return MapSystemError(errno);
165 }
166
167 return ConfigureOpenedSocket();
168 }
169
AdoptOpenedSocket(AddressFamily address_family,int socket)170 int UDPSocketPosix::AdoptOpenedSocket(AddressFamily address_family,
171 int socket) {
172 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
173 DCHECK_EQ(socket_, kInvalidSocket);
174 auto owned_socket_count = TryAcquireGlobalUDPSocketCount();
175 if (owned_socket_count.empty()) {
176 return ERR_INSUFFICIENT_RESOURCES;
177 }
178
179 owned_socket_count_ = std::move(owned_socket_count);
180 socket_ = socket;
181 addr_family_ = ConvertAddressFamily(address_family);
182 return ConfigureOpenedSocket();
183 }
184
ConfigureOpenedSocket()185 int UDPSocketPosix::ConfigureOpenedSocket() {
186 #if BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
187 PCHECK(change_fdguard_np(socket_, nullptr, 0, &kSocketFdGuard,
188 GUARD_CLOSE | GUARD_DUP, nullptr) == 0);
189 #endif // BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
190 socket_hash_ = GetSocketFDHash(socket_);
191 if (!base::SetNonBlocking(socket_)) {
192 const int err = MapSystemError(errno);
193 Close();
194 return err;
195 }
196 if (tag_ != SocketTag())
197 tag_.Apply(socket_);
198
199 return OK;
200 }
201
Increment(uint32_t bytes)202 void UDPSocketPosix::ReceivedActivityMonitor::Increment(uint32_t bytes) {
203 if (!bytes)
204 return;
205 bool timer_running = timer_.IsRunning();
206 bytes_ += bytes;
207 increments_++;
208 // Allow initial updates to make sure throughput estimator has
209 // enough samples to generate a value. (low water mark)
210 // Or once the bytes threshold has be met. (high water mark)
211 if (increments_ < kActivityMonitorMinimumSamplesForThroughputEstimate ||
212 bytes_ > kActivityMonitorBytesThreshold) {
213 Update();
214 if (timer_running)
215 timer_.Reset();
216 }
217 if (!timer_running) {
218 timer_.Start(FROM_HERE, kActivityMonitorMsThreshold, this,
219 &UDPSocketPosix::ReceivedActivityMonitor::OnTimerFired);
220 }
221 }
222
Update()223 void UDPSocketPosix::ReceivedActivityMonitor::Update() {
224 if (!bytes_)
225 return;
226 activity_monitor::IncrementBytesReceived(bytes_);
227 bytes_ = 0;
228 }
229
OnClose()230 void UDPSocketPosix::ReceivedActivityMonitor::OnClose() {
231 timer_.Stop();
232 Update();
233 }
234
OnTimerFired()235 void UDPSocketPosix::ReceivedActivityMonitor::OnTimerFired() {
236 increments_ = 0;
237 if (!bytes_) {
238 // Can happen if the socket has been idle and have had no
239 // increments since the timer previously fired. Don't bother
240 // keeping the timer running in this case.
241 timer_.Stop();
242 return;
243 }
244 Update();
245 }
246
Close()247 void UDPSocketPosix::Close() {
248 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
249
250 owned_socket_count_.Reset();
251
252 if (socket_ == kInvalidSocket)
253 return;
254
255 // Zero out any pending read/write callback state.
256 read_buf_.reset();
257 read_buf_len_ = 0;
258 read_callback_.Reset();
259 recv_from_address_ = nullptr;
260 write_buf_.reset();
261 write_buf_len_ = 0;
262 write_callback_.Reset();
263 send_to_address_.reset();
264
265 bool ok = read_socket_watcher_.StopWatchingFileDescriptor();
266 DCHECK(ok);
267 ok = write_socket_watcher_.StopWatchingFileDescriptor();
268 DCHECK(ok);
269
270 // Verify that |socket_| hasn't been corrupted. Needed to debug
271 // crbug.com/906005.
272 CHECK_EQ(socket_hash_, GetSocketFDHash(socket_));
273 TRACE_EVENT("base", perfetto::StaticString{"CloseSocketUDP"});
274
275 #if BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
276 // Attempt to clear errors on the socket so that they are not returned by
277 // close(). This seems to be effective at clearing some, but not all,
278 // EPROTOTYPE errors. See https://crbug.com/1151048.
279 int value = 0;
280 socklen_t value_len = sizeof(value);
281 HANDLE_EINTR(getsockopt(socket_, SOL_SOCKET, SO_ERROR, &value, &value_len));
282
283 if (IGNORE_EINTR(guarded_close_np(socket_, &kSocketFdGuard)) != 0) {
284 // There is a bug in the Mac OS kernel that it can return an ENOTCONN or
285 // EPROTOTYPE error. In this case we don't know whether the file descriptor
286 // is still allocated or not. We cannot safely close the file descriptor
287 // because it may have been reused by another thread in the meantime. We may
288 // leak file handles here and cause a crash indirectly later. See
289 // https://crbug.com/1151048.
290 PCHECK(errno == ENOTCONN || errno == EPROTOTYPE);
291 }
292 #else
293 PCHECK(IGNORE_EINTR(close(socket_)) == 0);
294 #endif // BUILDFLAG(IS_APPLE) && !BUILDFLAG(CRONET_BUILD)
295
296 socket_ = kInvalidSocket;
297 addr_family_ = 0;
298 is_connected_ = false;
299 tag_ = SocketTag();
300
301 received_activity_monitor_.OnClose();
302 }
303
GetPeerAddress(IPEndPoint * address) const304 int UDPSocketPosix::GetPeerAddress(IPEndPoint* address) const {
305 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
306 DCHECK(address);
307 if (!is_connected())
308 return ERR_SOCKET_NOT_CONNECTED;
309
310 if (!remote_address_.get()) {
311 SockaddrStorage storage;
312 if (getpeername(socket_, storage.addr, &storage.addr_len))
313 return MapSystemError(errno);
314 auto endpoint = std::make_unique<IPEndPoint>();
315 if (!endpoint->FromSockAddr(storage.addr, storage.addr_len))
316 return ERR_ADDRESS_INVALID;
317 remote_address_ = std::move(endpoint);
318 }
319
320 *address = *remote_address_;
321 return OK;
322 }
323
GetLocalAddress(IPEndPoint * address) const324 int UDPSocketPosix::GetLocalAddress(IPEndPoint* address) const {
325 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
326 DCHECK(address);
327 if (!is_connected())
328 return ERR_SOCKET_NOT_CONNECTED;
329
330 if (!local_address_.get()) {
331 SockaddrStorage storage;
332 if (getsockname(socket_, storage.addr, &storage.addr_len))
333 return MapSystemError(errno);
334 auto endpoint = std::make_unique<IPEndPoint>();
335 if (!endpoint->FromSockAddr(storage.addr, storage.addr_len))
336 return ERR_ADDRESS_INVALID;
337 local_address_ = std::move(endpoint);
338 net_log_.AddEvent(NetLogEventType::UDP_LOCAL_ADDRESS, [&] {
339 return CreateNetLogUDPConnectParams(*local_address_, bound_network_);
340 });
341 }
342
343 *address = *local_address_;
344 return OK;
345 }
346
Read(IOBuffer * buf,int buf_len,CompletionOnceCallback callback)347 int UDPSocketPosix::Read(IOBuffer* buf,
348 int buf_len,
349 CompletionOnceCallback callback) {
350 return RecvFrom(buf, buf_len, nullptr, std::move(callback));
351 }
352
RecvFrom(IOBuffer * buf,int buf_len,IPEndPoint * address,CompletionOnceCallback callback)353 int UDPSocketPosix::RecvFrom(IOBuffer* buf,
354 int buf_len,
355 IPEndPoint* address,
356 CompletionOnceCallback callback) {
357 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
358 DCHECK_NE(kInvalidSocket, socket_);
359 CHECK(read_callback_.is_null());
360 DCHECK(!recv_from_address_);
361 DCHECK(!callback.is_null()); // Synchronous operation not supported
362 DCHECK_GT(buf_len, 0);
363
364 int nread = InternalRecvFrom(buf, buf_len, address);
365 if (nread != ERR_IO_PENDING)
366 return nread;
367
368 if (!base::CurrentIOThread::Get()->WatchFileDescriptor(
369 socket_, true, base::MessagePumpForIO::WATCH_READ,
370 &read_socket_watcher_, &read_watcher_)) {
371 PLOG(ERROR) << "WatchFileDescriptor failed on read";
372 int result = MapSystemError(errno);
373 LogRead(result, nullptr, 0, nullptr);
374 return result;
375 }
376
377 read_buf_ = buf;
378 read_buf_len_ = buf_len;
379 recv_from_address_ = address;
380 read_callback_ = std::move(callback);
381 return ERR_IO_PENDING;
382 }
383
Write(IOBuffer * buf,int buf_len,CompletionOnceCallback callback,const NetworkTrafficAnnotationTag & traffic_annotation)384 int UDPSocketPosix::Write(
385 IOBuffer* buf,
386 int buf_len,
387 CompletionOnceCallback callback,
388 const NetworkTrafficAnnotationTag& traffic_annotation) {
389 return SendToOrWrite(buf, buf_len, nullptr, std::move(callback));
390 }
391
SendTo(IOBuffer * buf,int buf_len,const IPEndPoint & address,CompletionOnceCallback callback)392 int UDPSocketPosix::SendTo(IOBuffer* buf,
393 int buf_len,
394 const IPEndPoint& address,
395 CompletionOnceCallback callback) {
396 return SendToOrWrite(buf, buf_len, &address, std::move(callback));
397 }
398
SendToOrWrite(IOBuffer * buf,int buf_len,const IPEndPoint * address,CompletionOnceCallback callback)399 int UDPSocketPosix::SendToOrWrite(IOBuffer* buf,
400 int buf_len,
401 const IPEndPoint* address,
402 CompletionOnceCallback callback) {
403 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
404 DCHECK_NE(kInvalidSocket, socket_);
405 CHECK(write_callback_.is_null());
406 DCHECK(!callback.is_null()); // Synchronous operation not supported
407 DCHECK_GT(buf_len, 0);
408
409 if (int result = InternalSendTo(buf, buf_len, address);
410 result != ERR_IO_PENDING) {
411 return result;
412 }
413
414 if (!base::CurrentIOThread::Get()->WatchFileDescriptor(
415 socket_, true, base::MessagePumpForIO::WATCH_WRITE,
416 &write_socket_watcher_, &write_watcher_)) {
417 DVPLOG(1) << "WatchFileDescriptor failed on write";
418 int result = MapSystemError(errno);
419 LogWrite(result, nullptr, nullptr);
420 return result;
421 }
422
423 write_buf_ = buf;
424 write_buf_len_ = buf_len;
425 DCHECK(!send_to_address_.get());
426 if (address) {
427 send_to_address_ = std::make_unique<IPEndPoint>(*address);
428 }
429 write_callback_ = std::move(callback);
430 return ERR_IO_PENDING;
431 }
432
Connect(const IPEndPoint & address)433 int UDPSocketPosix::Connect(const IPEndPoint& address) {
434 DCHECK_NE(socket_, kInvalidSocket);
435 net_log_.BeginEvent(NetLogEventType::UDP_CONNECT, [&] {
436 return CreateNetLogUDPConnectParams(address, bound_network_);
437 });
438 int rv = SetMulticastOptions();
439 if (rv != OK)
440 return rv;
441 rv = InternalConnect(address);
442 net_log_.EndEventWithNetErrorCode(NetLogEventType::UDP_CONNECT, rv);
443 is_connected_ = (rv == OK);
444 if (rv != OK)
445 tag_ = SocketTag();
446 return rv;
447 }
448
InternalConnect(const IPEndPoint & address)449 int UDPSocketPosix::InternalConnect(const IPEndPoint& address) {
450 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
451 DCHECK(!is_connected());
452 DCHECK(!remote_address_.get());
453
454 int rv = 0;
455 if (bind_type_ == DatagramSocket::RANDOM_BIND) {
456 // Construct IPAddress of appropriate size (IPv4 or IPv6) of 0s,
457 // representing INADDR_ANY or in6addr_any.
458 size_t addr_size = address.GetSockAddrFamily() == AF_INET
459 ? IPAddress::kIPv4AddressSize
460 : IPAddress::kIPv6AddressSize;
461 rv = RandomBind(IPAddress::AllZeros(addr_size));
462 }
463 // else connect() does the DatagramSocket::DEFAULT_BIND
464
465 if (rv < 0) {
466 return rv;
467 }
468
469 SockaddrStorage storage;
470 if (!address.ToSockAddr(storage.addr, &storage.addr_len))
471 return ERR_ADDRESS_INVALID;
472
473 rv = HANDLE_EINTR(connect(socket_, storage.addr, storage.addr_len));
474 if (rv < 0)
475 return MapSystemError(errno);
476
477 remote_address_ = std::make_unique<IPEndPoint>(address);
478 return rv;
479 }
480
Bind(const IPEndPoint & address)481 int UDPSocketPosix::Bind(const IPEndPoint& address) {
482 DCHECK_NE(socket_, kInvalidSocket);
483 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
484 DCHECK(!is_connected());
485
486 int rv = SetMulticastOptions();
487 if (rv < 0)
488 return rv;
489
490 rv = DoBind(address);
491 if (rv < 0)
492 return rv;
493
494 is_connected_ = true;
495 local_address_.reset();
496 return rv;
497 }
498
BindToNetwork(handles::NetworkHandle network)499 int UDPSocketPosix::BindToNetwork(handles::NetworkHandle network) {
500 DCHECK_NE(socket_, kInvalidSocket);
501 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
502 DCHECK(!is_connected());
503 #if BUILDFLAG(IS_ANDROID)
504 int rv = net::android::BindToNetwork(socket_, network);
505 if (rv == OK)
506 bound_network_ = network;
507 return rv;
508 #else
509 NOTIMPLEMENTED();
510 return ERR_NOT_IMPLEMENTED;
511 #endif
512 }
513
SetReceiveBufferSize(int32_t size)514 int UDPSocketPosix::SetReceiveBufferSize(int32_t size) {
515 DCHECK_NE(socket_, kInvalidSocket);
516 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
517 return SetSocketReceiveBufferSize(socket_, size);
518 }
519
SetSendBufferSize(int32_t size)520 int UDPSocketPosix::SetSendBufferSize(int32_t size) {
521 DCHECK_NE(socket_, kInvalidSocket);
522 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
523 return SetSocketSendBufferSize(socket_, size);
524 }
525
SetDoNotFragment()526 int UDPSocketPosix::SetDoNotFragment() {
527 DCHECK_NE(socket_, kInvalidSocket);
528 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
529
530 #if !defined(IP_PMTUDISC_DO) && !BUILDFLAG(IS_MAC)
531 return ERR_NOT_IMPLEMENTED;
532
533 // setsockopt(IP_DONTFRAG) is supported on macOS from Big Sur
534 #elif BUILDFLAG(IS_MAC)
535 if (base::mac::MacOSMajorVersion() < 11) {
536 return ERR_NOT_IMPLEMENTED;
537 }
538 int val = 1;
539 if (addr_family_ == AF_INET6) {
540 int rv =
541 setsockopt(socket_, IPPROTO_IPV6, IPV6_DONTFRAG, &val, sizeof(val));
542 // IP_DONTFRAG is not supported on v4mapped addresses.
543 return rv == 0 ? OK : MapSystemError(errno);
544 }
545 int rv = setsockopt(socket_, IPPROTO_IP, IP_DONTFRAG, &val, sizeof(val));
546 return rv == 0 ? OK : MapSystemError(errno);
547
548 #else
549 if (addr_family_ == AF_INET6) {
550 int val = IPV6_PMTUDISC_DO;
551 if (setsockopt(socket_, IPPROTO_IPV6, IPV6_MTU_DISCOVER, &val,
552 sizeof(val)) != 0) {
553 return MapSystemError(errno);
554 }
555
556 int v6_only = false;
557 socklen_t v6_only_len = sizeof(v6_only);
558 if (getsockopt(socket_, IPPROTO_IPV6, IPV6_V6ONLY, &v6_only,
559 &v6_only_len) != 0) {
560 return MapSystemError(errno);
561 }
562
563 if (v6_only)
564 return OK;
565 }
566
567 int val = IP_PMTUDISC_DO;
568 int rv = setsockopt(socket_, IPPROTO_IP, IP_MTU_DISCOVER, &val, sizeof(val));
569 return rv == 0 ? OK : MapSystemError(errno);
570 #endif
571 }
572
SetRecvTos()573 int UDPSocketPosix::SetRecvTos() {
574 DCHECK_NE(socket_, kInvalidSocket);
575 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
576
577 unsigned int ecn = 1;
578 if (addr_family_ == AF_INET6) {
579 if (setsockopt(socket_, IPPROTO_IPV6, IPV6_RECVTCLASS, &ecn, sizeof(ecn)) !=
580 0) {
581 return MapSystemError(errno);
582 }
583
584 int v6_only = false;
585 socklen_t v6_only_len = sizeof(v6_only);
586 if (getsockopt(socket_, IPPROTO_IPV6, IPV6_V6ONLY, &v6_only,
587 &v6_only_len) != 0) {
588 return MapSystemError(errno);
589 }
590 if (v6_only) {
591 return OK;
592 }
593 }
594
595 int rv = setsockopt(socket_, IPPROTO_IP, IP_RECVTOS, &ecn, sizeof(ecn));
596 return rv == 0 ? OK : MapSystemError(errno);
597 }
598
SetMsgConfirm(bool confirm)599 void UDPSocketPosix::SetMsgConfirm(bool confirm) {
600 #if !BUILDFLAG(IS_APPLE)
601 if (confirm) {
602 sendto_flags_ |= MSG_CONFIRM;
603 } else {
604 sendto_flags_ &= ~MSG_CONFIRM;
605 }
606 #endif // !BUILDFLAG(IS_APPLE)
607 }
608
AllowAddressReuse()609 int UDPSocketPosix::AllowAddressReuse() {
610 DCHECK_NE(socket_, kInvalidSocket);
611 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
612 DCHECK(!is_connected());
613 return SetReuseAddr(socket_, true);
614 }
615
SetBroadcast(bool broadcast)616 int UDPSocketPosix::SetBroadcast(bool broadcast) {
617 DCHECK_NE(socket_, kInvalidSocket);
618 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
619 int value = broadcast ? 1 : 0;
620 int rv;
621 #if BUILDFLAG(IS_APPLE)
622 // SO_REUSEPORT on OSX permits multiple processes to each receive
623 // UDP multicast or broadcast datagrams destined for the bound
624 // port.
625 // This is only being set on OSX because its behavior is platform dependent
626 // and we are playing it safe by only setting it on platforms where things
627 // break.
628 rv = setsockopt(socket_, SOL_SOCKET, SO_REUSEPORT, &value, sizeof(value));
629 if (rv != 0)
630 return MapSystemError(errno);
631 #endif // BUILDFLAG(IS_APPLE)
632 rv = setsockopt(socket_, SOL_SOCKET, SO_BROADCAST, &value, sizeof(value));
633
634 return rv == 0 ? OK : MapSystemError(errno);
635 }
636
AllowAddressSharingForMulticast()637 int UDPSocketPosix::AllowAddressSharingForMulticast() {
638 DCHECK_NE(socket_, kInvalidSocket);
639 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
640 DCHECK(!is_connected());
641
642 int rv = AllowAddressReuse();
643 if (rv != OK)
644 return rv;
645
646 #ifdef SO_REUSEPORT
647 // Attempt to set SO_REUSEPORT if available. On some platforms, this is
648 // necessary to allow the address to be fully shared between separate sockets.
649 // On platforms where the option does not exist, SO_REUSEADDR should be
650 // sufficient to share multicast packets if such sharing is at all possible.
651 int value = 1;
652 rv = setsockopt(socket_, SOL_SOCKET, SO_REUSEPORT, &value, sizeof(value));
653 // Ignore errors that the option does not exist.
654 if (rv != 0 && errno != ENOPROTOOPT)
655 return MapSystemError(errno);
656 #endif // SO_REUSEPORT
657
658 return OK;
659 }
660
OnFileCanReadWithoutBlocking(int)661 void UDPSocketPosix::ReadWatcher::OnFileCanReadWithoutBlocking(int) {
662 TRACE_EVENT(NetTracingCategory(),
663 "UDPSocketPosix::ReadWatcher::OnFileCanReadWithoutBlocking");
664 if (!socket_->read_callback_.is_null())
665 socket_->DidCompleteRead();
666 }
667
OnFileCanWriteWithoutBlocking(int)668 void UDPSocketPosix::WriteWatcher::OnFileCanWriteWithoutBlocking(int) {
669 if (!socket_->write_callback_.is_null())
670 socket_->DidCompleteWrite();
671 }
672
DoReadCallback(int rv)673 void UDPSocketPosix::DoReadCallback(int rv) {
674 DCHECK_NE(rv, ERR_IO_PENDING);
675 DCHECK(!read_callback_.is_null());
676
677 // Since Run() may result in Read() being called,
678 // clear |read_callback_| up front.
679 std::move(read_callback_).Run(rv);
680 }
681
DoWriteCallback(int rv)682 void UDPSocketPosix::DoWriteCallback(int rv) {
683 DCHECK_NE(rv, ERR_IO_PENDING);
684 DCHECK(!write_callback_.is_null());
685
686 // Since Run() may result in Write() being called,
687 // clear |write_callback_| up front.
688 std::move(write_callback_).Run(rv);
689 }
690
DidCompleteRead()691 void UDPSocketPosix::DidCompleteRead() {
692 int result =
693 InternalRecvFrom(read_buf_.get(), read_buf_len_, recv_from_address_);
694 if (result != ERR_IO_PENDING) {
695 read_buf_.reset();
696 read_buf_len_ = 0;
697 recv_from_address_ = nullptr;
698 bool ok = read_socket_watcher_.StopWatchingFileDescriptor();
699 DCHECK(ok);
700 DoReadCallback(result);
701 }
702 }
703
LogRead(int result,const char * bytes,socklen_t addr_len,const sockaddr * addr)704 void UDPSocketPosix::LogRead(int result,
705 const char* bytes,
706 socklen_t addr_len,
707 const sockaddr* addr) {
708 if (result < 0) {
709 net_log_.AddEventWithNetErrorCode(NetLogEventType::UDP_RECEIVE_ERROR,
710 result);
711 return;
712 }
713
714 if (net_log_.IsCapturing()) {
715 DCHECK(addr_len > 0);
716 DCHECK(addr);
717
718 IPEndPoint address;
719 bool is_address_valid = address.FromSockAddr(addr, addr_len);
720 NetLogUDPDataTransfer(net_log_, NetLogEventType::UDP_BYTES_RECEIVED, result,
721 bytes, is_address_valid ? &address : nullptr);
722 }
723
724 if (always_update_bytes_received_)
725 activity_monitor::IncrementBytesReceived(result);
726 else
727 received_activity_monitor_.Increment(result);
728 }
729
DidCompleteWrite()730 void UDPSocketPosix::DidCompleteWrite() {
731 int result =
732 InternalSendTo(write_buf_.get(), write_buf_len_, send_to_address_.get());
733
734 if (result != ERR_IO_PENDING) {
735 write_buf_.reset();
736 write_buf_len_ = 0;
737 send_to_address_.reset();
738 write_socket_watcher_.StopWatchingFileDescriptor();
739 DoWriteCallback(result);
740 }
741 }
742
LogWrite(int result,const char * bytes,const IPEndPoint * address)743 void UDPSocketPosix::LogWrite(int result,
744 const char* bytes,
745 const IPEndPoint* address) {
746 if (result < 0) {
747 net_log_.AddEventWithNetErrorCode(NetLogEventType::UDP_SEND_ERROR, result);
748 return;
749 }
750
751 if (net_log_.IsCapturing()) {
752 NetLogUDPDataTransfer(net_log_, NetLogEventType::UDP_BYTES_SENT, result,
753 bytes, address);
754 }
755 }
756
757 // TODO(crbug.com/1491628): Because InternalRecvFromConnectedSocket() uses
758 // recvfrom() instead of recvmsg(), it cannot report received ECN marks for
759 // QUIC ACK-ECN frames. It might be time to deprecate
760 // experimental_recv_optimization_enabled_ if that experiment has run its
761 // course.
InternalRecvFrom(IOBuffer * buf,int buf_len,IPEndPoint * address)762 int UDPSocketPosix::InternalRecvFrom(IOBuffer* buf,
763 int buf_len,
764 IPEndPoint* address) {
765 // If the socket is connected and the remote address is known
766 // use the more efficient method that uses read() instead of recvmsg().
767 if (experimental_recv_optimization_enabled_ && is_connected_ &&
768 remote_address_) {
769 return InternalRecvFromConnectedSocket(buf, buf_len, address);
770 }
771 return InternalRecvFromNonConnectedSocket(buf, buf_len, address);
772 }
773
InternalRecvFromConnectedSocket(IOBuffer * buf,int buf_len,IPEndPoint * address)774 int UDPSocketPosix::InternalRecvFromConnectedSocket(IOBuffer* buf,
775 int buf_len,
776 IPEndPoint* address) {
777 DCHECK(is_connected_);
778 DCHECK(remote_address_);
779 int result;
780 int bytes_transferred = HANDLE_EINTR(read(socket_, buf->data(), buf_len));
781 if (bytes_transferred < 0) {
782 result = MapSystemError(errno);
783 if (result == ERR_IO_PENDING) {
784 return result;
785 }
786 } else if (bytes_transferred == buf_len) {
787 // NB: recv(..., MSG_TRUNC) would be a more reliable way to do this on
788 // Linux, but isn't supported by POSIX.
789 result = ERR_MSG_TOO_BIG;
790 } else {
791 result = bytes_transferred;
792 if (address) {
793 *address = *remote_address_.get();
794 }
795 }
796
797 SockaddrStorage sock_addr;
798 bool success =
799 remote_address_->ToSockAddr(sock_addr.addr, &sock_addr.addr_len);
800 DCHECK(success);
801 LogRead(result, buf->data(), sock_addr.addr_len, sock_addr.addr);
802 return result;
803 }
804
InternalRecvFromNonConnectedSocket(IOBuffer * buf,int buf_len,IPEndPoint * address)805 int UDPSocketPosix::InternalRecvFromNonConnectedSocket(IOBuffer* buf,
806 int buf_len,
807 IPEndPoint* address) {
808 SockaddrStorage storage;
809 struct iovec iov = {
810 .iov_base = buf->data(),
811 .iov_len = static_cast<size_t>(buf_len),
812 };
813 // control_buffer needs to be big enough to accommodate the maximum
814 // conceivable number of CMSGs. Other (proprietary) Google QUIC code uses
815 // 512 Bytes, re-used here.
816 char control_buffer[512];
817 struct msghdr msg = {
818 .msg_name = storage.addr,
819 .msg_namelen = storage.addr_len,
820 .msg_iov = &iov,
821 .msg_iovlen = 1,
822 .msg_control = control_buffer,
823 .msg_controllen = ABSL_ARRAYSIZE(control_buffer),
824 };
825 int result;
826 int bytes_transferred = HANDLE_EINTR(recvmsg(socket_, &msg, 0));
827 if (bytes_transferred < 0) {
828 result = MapSystemError(errno);
829 if (result == ERR_IO_PENDING) {
830 return result;
831 }
832 } else {
833 storage.addr_len = msg.msg_namelen;
834 if (msg.msg_flags & MSG_TRUNC) {
835 // NB: recvfrom(..., MSG_TRUNC, ...) would be a simpler way to do this on
836 // Linux, but isn't supported by POSIX.
837 result = ERR_MSG_TOO_BIG;
838 } else if (address &&
839 !address->FromSockAddr(storage.addr, storage.addr_len)) {
840 result = ERR_ADDRESS_INVALID;
841 } else {
842 result = bytes_transferred;
843 }
844 last_tos_ = 0;
845 if (bytes_transferred > 0 && msg.msg_controllen > 0) {
846 for (struct cmsghdr* cmsg = CMSG_FIRSTHDR(&msg); cmsg != nullptr;
847 cmsg = CMSG_NXTHDR(&msg, cmsg)) {
848 #if BUILDFLAG(IS_APPLE)
849 if ((cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_RECVTOS) ||
850 (cmsg->cmsg_level == IPPROTO_IPV6 &&
851 cmsg->cmsg_type == IPV6_TCLASS)) {
852 #else
853 if ((cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_TOS) ||
854 (cmsg->cmsg_level == IPPROTO_IPV6 &&
855 cmsg->cmsg_type == IPV6_TCLASS)) {
856 #endif // BUILDFLAG(IS_APPLE)
857 last_tos_ = *(reinterpret_cast<uint8_t*>(CMSG_DATA(cmsg)));
858 }
859 }
860 }
861 }
862
863 LogRead(result, buf->data(), storage.addr_len, storage.addr);
864 return result;
865 }
866
867 int UDPSocketPosix::InternalSendTo(IOBuffer* buf,
868 int buf_len,
869 const IPEndPoint* address) {
870 SockaddrStorage storage;
871 struct sockaddr* addr = storage.addr;
872 if (!address) {
873 addr = nullptr;
874 storage.addr_len = 0;
875 } else {
876 if (!address->ToSockAddr(storage.addr, &storage.addr_len)) {
877 int result = ERR_ADDRESS_INVALID;
878 LogWrite(result, nullptr, nullptr);
879 return result;
880 }
881 }
882
883 int result = HANDLE_EINTR(sendto(socket_, buf->data(), buf_len, sendto_flags_,
884 addr, storage.addr_len));
885 if (result < 0)
886 result = MapSystemError(errno);
887 if (result != ERR_IO_PENDING)
888 LogWrite(result, buf->data(), address);
889 return result;
890 }
891
892 int UDPSocketPosix::SetMulticastOptions() {
893 if (!(socket_options_ & SOCKET_OPTION_MULTICAST_LOOP)) {
894 int rv;
895 if (addr_family_ == AF_INET) {
896 u_char loop = 0;
897 rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_LOOP,
898 &loop, sizeof(loop));
899 } else {
900 u_int loop = 0;
901 rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_LOOP,
902 &loop, sizeof(loop));
903 }
904 if (rv < 0)
905 return MapSystemError(errno);
906 }
907 if (multicast_time_to_live_ != IP_DEFAULT_MULTICAST_TTL) {
908 int rv;
909 if (addr_family_ == AF_INET) {
910 u_char ttl = multicast_time_to_live_;
911 rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_TTL,
912 &ttl, sizeof(ttl));
913 } else {
914 // Signed integer. -1 to use route default.
915 int ttl = multicast_time_to_live_;
916 rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
917 &ttl, sizeof(ttl));
918 }
919 if (rv < 0)
920 return MapSystemError(errno);
921 }
922 if (multicast_interface_ != 0) {
923 switch (addr_family_) {
924 case AF_INET: {
925 ip_mreqn mreq = {};
926 mreq.imr_ifindex = multicast_interface_;
927 mreq.imr_address.s_addr = htonl(INADDR_ANY);
928 int rv = setsockopt(socket_, IPPROTO_IP, IP_MULTICAST_IF,
929 reinterpret_cast<const char*>(&mreq), sizeof(mreq));
930 if (rv)
931 return MapSystemError(errno);
932 break;
933 }
934 case AF_INET6: {
935 uint32_t interface_index = multicast_interface_;
936 int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_MULTICAST_IF,
937 reinterpret_cast<const char*>(&interface_index),
938 sizeof(interface_index));
939 if (rv)
940 return MapSystemError(errno);
941 break;
942 }
943 default:
944 NOTREACHED() << "Invalid address family";
945 return ERR_ADDRESS_INVALID;
946 }
947 }
948 return OK;
949 }
950
951 int UDPSocketPosix::DoBind(const IPEndPoint& address) {
952 SockaddrStorage storage;
953 if (!address.ToSockAddr(storage.addr, &storage.addr_len))
954 return ERR_ADDRESS_INVALID;
955 int rv = bind(socket_, storage.addr, storage.addr_len);
956 if (rv == 0)
957 return OK;
958 int last_error = errno;
959 #if BUILDFLAG(IS_CHROMEOS_ASH)
960 if (last_error == EINVAL)
961 return ERR_ADDRESS_IN_USE;
962 #elif BUILDFLAG(IS_APPLE)
963 if (last_error == EADDRNOTAVAIL)
964 return ERR_ADDRESS_IN_USE;
965 #endif
966 return MapSystemError(last_error);
967 }
968
969 int UDPSocketPosix::RandomBind(const IPAddress& address) {
970 DCHECK_EQ(bind_type_, DatagramSocket::RANDOM_BIND);
971
972 for (int i = 0; i < kBindRetries; ++i) {
973 int rv = DoBind(IPEndPoint(address, base::RandInt(kPortStart, kPortEnd)));
974 if (rv != ERR_ADDRESS_IN_USE)
975 return rv;
976 }
977
978 return DoBind(IPEndPoint(address, 0));
979 }
980
981 int UDPSocketPosix::JoinGroup(const IPAddress& group_address) const {
982 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
983 if (!is_connected())
984 return ERR_SOCKET_NOT_CONNECTED;
985
986 switch (group_address.size()) {
987 case IPAddress::kIPv4AddressSize: {
988 if (addr_family_ != AF_INET)
989 return ERR_ADDRESS_INVALID;
990 ip_mreqn mreq = {};
991 mreq.imr_ifindex = multicast_interface_;
992 mreq.imr_address.s_addr = htonl(INADDR_ANY);
993 memcpy(&mreq.imr_multiaddr, group_address.bytes().data(),
994 IPAddress::kIPv4AddressSize);
995 int rv = setsockopt(socket_, IPPROTO_IP, IP_ADD_MEMBERSHIP,
996 &mreq, sizeof(mreq));
997 if (rv < 0)
998 return MapSystemError(errno);
999 return OK;
1000 }
1001 case IPAddress::kIPv6AddressSize: {
1002 if (addr_family_ != AF_INET6)
1003 return ERR_ADDRESS_INVALID;
1004 ipv6_mreq mreq;
1005 mreq.ipv6mr_interface = multicast_interface_;
1006 memcpy(&mreq.ipv6mr_multiaddr, group_address.bytes().data(),
1007 IPAddress::kIPv6AddressSize);
1008 int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_JOIN_GROUP,
1009 &mreq, sizeof(mreq));
1010 if (rv < 0)
1011 return MapSystemError(errno);
1012 return OK;
1013 }
1014 default:
1015 NOTREACHED() << "Invalid address family";
1016 return ERR_ADDRESS_INVALID;
1017 }
1018 }
1019
1020 int UDPSocketPosix::LeaveGroup(const IPAddress& group_address) const {
1021 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1022
1023 if (!is_connected())
1024 return ERR_SOCKET_NOT_CONNECTED;
1025
1026 switch (group_address.size()) {
1027 case IPAddress::kIPv4AddressSize: {
1028 if (addr_family_ != AF_INET)
1029 return ERR_ADDRESS_INVALID;
1030 ip_mreqn mreq = {};
1031 mreq.imr_ifindex = multicast_interface_;
1032 mreq.imr_address.s_addr = INADDR_ANY;
1033 memcpy(&mreq.imr_multiaddr, group_address.bytes().data(),
1034 IPAddress::kIPv4AddressSize);
1035 int rv = setsockopt(socket_, IPPROTO_IP, IP_DROP_MEMBERSHIP,
1036 &mreq, sizeof(mreq));
1037 if (rv < 0)
1038 return MapSystemError(errno);
1039 return OK;
1040 }
1041 case IPAddress::kIPv6AddressSize: {
1042 if (addr_family_ != AF_INET6)
1043 return ERR_ADDRESS_INVALID;
1044 ipv6_mreq mreq;
1045 #if BUILDFLAG(IS_FUCHSIA)
1046 mreq.ipv6mr_interface = multicast_interface_;
1047 #else // BUILDFLAG(IS_FUCHSIA)
1048 mreq.ipv6mr_interface = 0; // 0 indicates default multicast interface.
1049 #endif // !BUILDFLAG(IS_FUCHSIA)
1050 memcpy(&mreq.ipv6mr_multiaddr, group_address.bytes().data(),
1051 IPAddress::kIPv6AddressSize);
1052 int rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_LEAVE_GROUP,
1053 &mreq, sizeof(mreq));
1054 if (rv < 0)
1055 return MapSystemError(errno);
1056 return OK;
1057 }
1058 default:
1059 NOTREACHED() << "Invalid address family";
1060 return ERR_ADDRESS_INVALID;
1061 }
1062 }
1063
1064 int UDPSocketPosix::SetMulticastInterface(uint32_t interface_index) {
1065 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1066 if (is_connected())
1067 return ERR_SOCKET_IS_CONNECTED;
1068 multicast_interface_ = interface_index;
1069 return OK;
1070 }
1071
1072 int UDPSocketPosix::SetMulticastTimeToLive(int time_to_live) {
1073 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1074 if (is_connected())
1075 return ERR_SOCKET_IS_CONNECTED;
1076
1077 if (time_to_live < 0 || time_to_live > 255)
1078 return ERR_INVALID_ARGUMENT;
1079 multicast_time_to_live_ = time_to_live;
1080 return OK;
1081 }
1082
1083 int UDPSocketPosix::SetMulticastLoopbackMode(bool loopback) {
1084 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1085 if (is_connected())
1086 return ERR_SOCKET_IS_CONNECTED;
1087
1088 if (loopback)
1089 socket_options_ |= SOCKET_OPTION_MULTICAST_LOOP;
1090 else
1091 socket_options_ &= ~SOCKET_OPTION_MULTICAST_LOOP;
1092 return OK;
1093 }
1094
1095 int UDPSocketPosix::SetDiffServCodePoint(DiffServCodePoint dscp) {
1096 return SetTos(dscp, ECN_NO_CHANGE);
1097 }
1098
1099 int UDPSocketPosix::SetTos(DiffServCodePoint dscp, EcnCodePoint ecn) {
1100 if (dscp == DSCP_NO_CHANGE && ecn == ECN_NO_CHANGE) {
1101 return OK;
1102 }
1103 int dscp_and_ecn = (dscp << 2) | ecn;
1104 socklen_t size = sizeof(dscp_and_ecn);
1105 if (dscp == DSCP_NO_CHANGE || ecn == ECN_NO_CHANGE) {
1106 int rv;
1107 if (addr_family_ == AF_INET) {
1108 rv = getsockopt(socket_, IPPROTO_IP, IP_TOS, &dscp_and_ecn, &size);
1109 } else {
1110 rv = getsockopt(socket_, IPPROTO_IPV6, IPV6_TCLASS, &dscp_and_ecn, &size);
1111 }
1112 if (rv < 0) {
1113 return MapSystemError(errno);
1114 }
1115 if (dscp == DSCP_NO_CHANGE) {
1116 dscp_and_ecn &= ~ECN_LAST;
1117 dscp_and_ecn |= ecn;
1118 } else {
1119 dscp_and_ecn &= ECN_LAST;
1120 dscp_and_ecn |= (dscp << 2);
1121 }
1122 }
1123 // Set the IPv4 option in all cases to support dual-stack sockets.
1124 int rv = setsockopt(socket_, IPPROTO_IP, IP_TOS, &dscp_and_ecn,
1125 sizeof(dscp_and_ecn));
1126 if (addr_family_ == AF_INET6) {
1127 // In the IPv6 case, the previous socksetopt may fail because of a lack of
1128 // dual-stack support. Therefore ignore the previous return value.
1129 rv = setsockopt(socket_, IPPROTO_IPV6, IPV6_TCLASS,
1130 &dscp_and_ecn, sizeof(dscp_and_ecn));
1131 }
1132 if (rv < 0)
1133 return MapSystemError(errno);
1134 return OK;
1135 }
1136
1137 int UDPSocketPosix::SetIPv6Only(bool ipv6_only) {
1138 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1139 if (is_connected()) {
1140 return ERR_SOCKET_IS_CONNECTED;
1141 }
1142 return net::SetIPv6Only(socket_, ipv6_only);
1143 }
1144
1145 void UDPSocketPosix::DetachFromThread() {
1146 DETACH_FROM_THREAD(thread_checker_);
1147 }
1148
1149 void UDPSocketPosix::ApplySocketTag(const SocketTag& tag) {
1150 DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
1151 if (socket_ != kInvalidSocket && tag != tag_) {
1152 tag.Apply(socket_);
1153 }
1154 tag_ = tag;
1155 }
1156
1157 int UDPSocketPosix::SetIOSNetworkServiceType(int ios_network_service_type) {
1158 if (ios_network_service_type == 0) {
1159 return OK;
1160 }
1161 #if BUILDFLAG(IS_IOS)
1162 if (setsockopt(socket_, SOL_SOCKET, SO_NET_SERVICE_TYPE,
1163 &ios_network_service_type, sizeof(ios_network_service_type))) {
1164 return MapSystemError(errno);
1165 }
1166 #endif // BUILDFLAG(IS_IOS)
1167 return OK;
1168 }
1169
1170 } // namespace net
1171