Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(8)

Side by Side Diff: runtime/bin/socket_base_linux.cc

Issue 2797993005: Re-land socket refactor with fixes for Windows. (Closed)
Patch Set: Rebased + reverted original revert Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « runtime/bin/socket_base_linux.h ('k') | runtime/bin/socket_base_macos.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2013, the Dart project authors. Please see the AUTHORS file 1 // Copyright (c) 2013, the Dart project authors. Please see the AUTHORS file
2 // for details. All rights reserved. Use of this source code is governed by a 2 // for details. All rights reserved. Use of this source code is governed by a
3 // BSD-style license that can be found in the LICENSE file. 3 // BSD-style license that can be found in the LICENSE file.
4 4
5 #if !defined(DART_IO_DISABLED) 5 #if !defined(DART_IO_DISABLED)
6 6
7 #include "platform/globals.h" 7 #include "platform/globals.h"
8 #if defined(HOST_OS_LINUX) 8 #if defined(HOST_OS_LINUX)
9 9
10 #include "bin/socket.h" 10 #include "bin/socket_base.h"
11 #include "bin/socket_linux.h"
12 11
13 #include <errno.h> // NOLINT 12 #include <errno.h> // NOLINT
14 #include <ifaddrs.h> // NOLINT 13 #include <ifaddrs.h> // NOLINT
15 #include <net/if.h> // NOLINT 14 #include <net/if.h> // NOLINT
16 #include <netinet/tcp.h> // NOLINT 15 #include <netinet/tcp.h> // NOLINT
17 #include <stdio.h> // NOLINT 16 #include <stdio.h> // NOLINT
18 #include <stdlib.h> // NOLINT 17 #include <stdlib.h> // NOLINT
19 #include <string.h> // NOLINT 18 #include <string.h> // NOLINT
20 #include <sys/stat.h> // NOLINT 19 #include <sys/stat.h> // NOLINT
21 #include <unistd.h> // NOLINT 20 #include <unistd.h> // NOLINT
22 21
23 #include "bin/fdutils.h" 22 #include "bin/fdutils.h"
24 #include "bin/file.h" 23 #include "bin/file.h"
24 #include "bin/socket_base_linux.h"
25 #include "bin/thread.h" 25 #include "bin/thread.h"
26 #include "platform/signal_blocker.h" 26 #include "platform/signal_blocker.h"
27 27
28 namespace dart { 28 namespace dart {
29 namespace bin { 29 namespace bin {
30 30
31 SocketAddress::SocketAddress(struct sockaddr* sa) { 31 SocketAddress::SocketAddress(struct sockaddr* sa) {
32 ASSERT(INET6_ADDRSTRLEN >= INET_ADDRSTRLEN); 32 ASSERT(INET6_ADDRSTRLEN >= INET_ADDRSTRLEN);
33 if (!Socket::FormatNumericAddress(*reinterpret_cast<RawAddr*>(sa), as_string_, 33 if (!SocketBase::FormatNumericAddress(*reinterpret_cast<RawAddr*>(sa),
34 INET6_ADDRSTRLEN)) { 34 as_string_, INET6_ADDRSTRLEN)) {
35 as_string_[0] = 0; 35 as_string_[0] = 0;
36 } 36 }
37 socklen_t salen = GetAddrLength(*reinterpret_cast<RawAddr*>(sa)); 37 socklen_t salen = GetAddrLength(*reinterpret_cast<RawAddr*>(sa));
38 memmove(reinterpret_cast<void*>(&addr_), sa, salen); 38 memmove(reinterpret_cast<void*>(&addr_), sa, salen);
39 } 39 }
40 40
41 41
42 bool Socket::FormatNumericAddress(const RawAddr& addr, char* address, int len) { 42 bool SocketBase::Initialize() {
43 // Nothing to do on Linux.
44 return true;
45 }
46
47
48 bool SocketBase::FormatNumericAddress(const RawAddr& addr,
49 char* address,
50 int len) {
43 socklen_t salen = SocketAddress::GetAddrLength(addr); 51 socklen_t salen = SocketAddress::GetAddrLength(addr);
44 return (NO_RETRY_EXPECTED(getnameinfo(&addr.addr, salen, address, len, NULL, 52 return (NO_RETRY_EXPECTED(getnameinfo(&addr.addr, salen, address, len, NULL,
45 0, NI_NUMERICHOST) == 0)); 53 0, NI_NUMERICHOST) == 0));
46 } 54 }
47 55
48 56
49 Socket::Socket(intptr_t fd) 57 bool SocketBase::IsBindError(intptr_t error_number) {
50 : ReferenceCounted(), fd_(fd), port_(ILLEGAL_PORT) {}
51
52
53 void Socket::SetClosedFd() {
54 fd_ = kClosedFd;
55 }
56
57
58 bool Socket::Initialize() {
59 // Nothing to do on Linux.
60 return true;
61 }
62
63
64 static intptr_t Create(const RawAddr& addr) {
65 intptr_t fd;
66 fd = NO_RETRY_EXPECTED(
67 socket(addr.ss.ss_family, SOCK_STREAM | SOCK_NONBLOCK | SOCK_CLOEXEC, 0));
68 if (fd < 0) {
69 return -1;
70 }
71 return fd;
72 }
73
74
75 static intptr_t Connect(intptr_t fd, const RawAddr& addr) {
76 intptr_t result = TEMP_FAILURE_RETRY(
77 connect(fd, &addr.addr, SocketAddress::GetAddrLength(addr)));
78 if ((result == 0) || (errno == EINPROGRESS)) {
79 return fd;
80 }
81 FDUtils::FDUtils::SaveErrorAndClose(fd);
82 return -1;
83 }
84
85
86 intptr_t Socket::CreateConnect(const RawAddr& addr) {
87 intptr_t fd = Create(addr);
88 if (fd < 0) {
89 return fd;
90 }
91 return Connect(fd, addr);
92 }
93
94
95 intptr_t Socket::CreateBindConnect(const RawAddr& addr,
96 const RawAddr& source_addr) {
97 intptr_t fd = Create(addr);
98 if (fd < 0) {
99 return fd;
100 }
101
102 intptr_t result = TEMP_FAILURE_RETRY(
103 bind(fd, &source_addr.addr, SocketAddress::GetAddrLength(source_addr)));
104 if ((result != 0) && (errno != EINPROGRESS)) {
105 FDUtils::SaveErrorAndClose(fd);
106 return -1;
107 }
108
109 return Connect(fd, addr);
110 }
111
112
113 bool Socket::IsBindError(intptr_t error_number) {
114 return error_number == EADDRINUSE || error_number == EADDRNOTAVAIL || 58 return error_number == EADDRINUSE || error_number == EADDRNOTAVAIL ||
115 error_number == EINVAL; 59 error_number == EINVAL;
116 } 60 }
117 61
118 62
119 intptr_t Socket::Available(intptr_t fd) { 63 intptr_t SocketBase::Available(intptr_t fd) {
120 return FDUtils::AvailableBytes(fd); 64 return FDUtils::AvailableBytes(fd);
121 } 65 }
122 66
123 67
124 intptr_t Socket::Read(intptr_t fd, void* buffer, intptr_t num_bytes) { 68 intptr_t SocketBase::Read(intptr_t fd, void* buffer, intptr_t num_bytes) {
125 ASSERT(fd >= 0); 69 ASSERT(fd >= 0);
126 ssize_t read_bytes = TEMP_FAILURE_RETRY(read(fd, buffer, num_bytes)); 70 ssize_t read_bytes = TEMP_FAILURE_RETRY(read(fd, buffer, num_bytes));
127 ASSERT(EAGAIN == EWOULDBLOCK); 71 ASSERT(EAGAIN == EWOULDBLOCK);
128 if ((read_bytes == -1) && (errno == EWOULDBLOCK)) { 72 if ((read_bytes == -1) && (errno == EWOULDBLOCK)) {
129 // If the read would block we need to retry and therefore return 0 73 // If the read would block we need to retry and therefore return 0
130 // as the number of bytes written. 74 // as the number of bytes written.
131 read_bytes = 0; 75 read_bytes = 0;
132 } 76 }
133 return read_bytes; 77 return read_bytes;
134 } 78 }
135 79
136 80
137 intptr_t Socket::RecvFrom(intptr_t fd, 81 intptr_t SocketBase::RecvFrom(intptr_t fd,
138 void* buffer, 82 void* buffer,
139 intptr_t num_bytes, 83 intptr_t num_bytes,
140 RawAddr* addr) { 84 RawAddr* addr) {
141 ASSERT(fd >= 0); 85 ASSERT(fd >= 0);
142 socklen_t addr_len = sizeof(addr->ss); 86 socklen_t addr_len = sizeof(addr->ss);
143 ssize_t read_bytes = TEMP_FAILURE_RETRY( 87 ssize_t read_bytes = TEMP_FAILURE_RETRY(
144 recvfrom(fd, buffer, num_bytes, 0, &addr->addr, &addr_len)); 88 recvfrom(fd, buffer, num_bytes, 0, &addr->addr, &addr_len));
145 if ((read_bytes == -1) && (errno == EWOULDBLOCK)) { 89 if ((read_bytes == -1) && (errno == EWOULDBLOCK)) {
146 // If the read would block we need to retry and therefore return 0 90 // If the read would block we need to retry and therefore return 0
147 // as the number of bytes written. 91 // as the number of bytes written.
148 read_bytes = 0; 92 read_bytes = 0;
149 } 93 }
150 return read_bytes; 94 return read_bytes;
151 } 95 }
152 96
153 97
154 intptr_t Socket::Write(intptr_t fd, const void* buffer, intptr_t num_bytes) { 98 intptr_t SocketBase::Write(intptr_t fd,
99 const void* buffer,
100 intptr_t num_bytes) {
155 ASSERT(fd >= 0); 101 ASSERT(fd >= 0);
156 ssize_t written_bytes = TEMP_FAILURE_RETRY(write(fd, buffer, num_bytes)); 102 ssize_t written_bytes = TEMP_FAILURE_RETRY(write(fd, buffer, num_bytes));
157 ASSERT(EAGAIN == EWOULDBLOCK); 103 ASSERT(EAGAIN == EWOULDBLOCK);
158 if ((written_bytes == -1) && (errno == EWOULDBLOCK)) { 104 if ((written_bytes == -1) && (errno == EWOULDBLOCK)) {
159 // If the would block we need to retry and therefore return 0 as 105 // If the would block we need to retry and therefore return 0 as
160 // the number of bytes written. 106 // the number of bytes written.
161 written_bytes = 0; 107 written_bytes = 0;
162 } 108 }
163 return written_bytes; 109 return written_bytes;
164 } 110 }
165 111
166 112
167 intptr_t Socket::SendTo(intptr_t fd, 113 intptr_t SocketBase::SendTo(intptr_t fd,
168 const void* buffer, 114 const void* buffer,
169 intptr_t num_bytes, 115 intptr_t num_bytes,
170 const RawAddr& addr) { 116 const RawAddr& addr) {
171 ASSERT(fd >= 0); 117 ASSERT(fd >= 0);
172 ssize_t written_bytes = 118 ssize_t written_bytes =
173 TEMP_FAILURE_RETRY(sendto(fd, buffer, num_bytes, 0, &addr.addr, 119 TEMP_FAILURE_RETRY(sendto(fd, buffer, num_bytes, 0, &addr.addr,
174 SocketAddress::GetAddrLength(addr))); 120 SocketAddress::GetAddrLength(addr)));
175 ASSERT(EAGAIN == EWOULDBLOCK); 121 ASSERT(EAGAIN == EWOULDBLOCK);
176 if ((written_bytes == -1) && (errno == EWOULDBLOCK)) { 122 if ((written_bytes == -1) && (errno == EWOULDBLOCK)) {
177 // If the would block we need to retry and therefore return 0 as 123 // If the would block we need to retry and therefore return 0 as
178 // the number of bytes written. 124 // the number of bytes written.
179 written_bytes = 0; 125 written_bytes = 0;
180 } 126 }
181 return written_bytes; 127 return written_bytes;
182 } 128 }
183 129
184 130
185 intptr_t Socket::GetPort(intptr_t fd) { 131 intptr_t SocketBase::GetPort(intptr_t fd) {
186 ASSERT(fd >= 0); 132 ASSERT(fd >= 0);
187 RawAddr raw; 133 RawAddr raw;
188 socklen_t size = sizeof(raw); 134 socklen_t size = sizeof(raw);
189 if (NO_RETRY_EXPECTED(getsockname(fd, &raw.addr, &size))) { 135 if (NO_RETRY_EXPECTED(getsockname(fd, &raw.addr, &size))) {
190 return 0; 136 return 0;
191 } 137 }
192 return SocketAddress::GetAddrPort(raw); 138 return SocketAddress::GetAddrPort(raw);
193 } 139 }
194 140
195 141
196 SocketAddress* Socket::GetRemotePeer(intptr_t fd, intptr_t* port) { 142 SocketAddress* SocketBase::GetRemotePeer(intptr_t fd, intptr_t* port) {
197 ASSERT(fd >= 0); 143 ASSERT(fd >= 0);
198 RawAddr raw; 144 RawAddr raw;
199 socklen_t size = sizeof(raw); 145 socklen_t size = sizeof(raw);
200 if (NO_RETRY_EXPECTED(getpeername(fd, &raw.addr, &size))) { 146 if (NO_RETRY_EXPECTED(getpeername(fd, &raw.addr, &size))) {
201 return NULL; 147 return NULL;
202 } 148 }
203 *port = SocketAddress::GetAddrPort(raw); 149 *port = SocketAddress::GetAddrPort(raw);
204 return new SocketAddress(&raw.addr); 150 return new SocketAddress(&raw.addr);
205 } 151 }
206 152
207 153
208 void Socket::GetError(intptr_t fd, OSError* os_error) { 154 void SocketBase::GetError(intptr_t fd, OSError* os_error) {
209 int len = sizeof(errno); 155 int len = sizeof(errno);
210 int err = 0; 156 int err = 0;
211 VOID_NO_RETRY_EXPECTED(getsockopt(fd, SOL_SOCKET, SO_ERROR, &err, 157 VOID_NO_RETRY_EXPECTED(getsockopt(fd, SOL_SOCKET, SO_ERROR, &err,
212 reinterpret_cast<socklen_t*>(&len))); 158 reinterpret_cast<socklen_t*>(&len)));
213 errno = err; 159 errno = err;
214 os_error->SetCodeAndMessage(OSError::kSystem, errno); 160 os_error->SetCodeAndMessage(OSError::kSystem, errno);
215 } 161 }
216 162
217 163
218 int Socket::GetType(intptr_t fd) { 164 int SocketBase::GetType(intptr_t fd) {
219 struct stat64 buf; 165 struct stat64 buf;
220 int result = TEMP_FAILURE_RETRY(fstat64(fd, &buf)); 166 int result = TEMP_FAILURE_RETRY(fstat64(fd, &buf));
221 if (result == -1) { 167 if (result == -1) {
222 return -1; 168 return -1;
223 } 169 }
224 if (S_ISCHR(buf.st_mode)) { 170 if (S_ISCHR(buf.st_mode)) {
225 return File::kTerminal; 171 return File::kTerminal;
226 } 172 }
227 if (S_ISFIFO(buf.st_mode)) { 173 if (S_ISFIFO(buf.st_mode)) {
228 return File::kPipe; 174 return File::kPipe;
229 } 175 }
230 if (S_ISREG(buf.st_mode)) { 176 if (S_ISREG(buf.st_mode)) {
231 return File::kFile; 177 return File::kFile;
232 } 178 }
233 return File::kOther; 179 return File::kOther;
234 } 180 }
235 181
236 182
237 intptr_t Socket::GetStdioHandle(intptr_t num) { 183 intptr_t SocketBase::GetStdioHandle(intptr_t num) {
238 return num; 184 return num;
239 } 185 }
240 186
241 187
242 AddressList<SocketAddress>* Socket::LookupAddress(const char* host, 188 AddressList<SocketAddress>* SocketBase::LookupAddress(const char* host,
243 int type, 189 int type,
244 OSError** os_error) { 190 OSError** os_error) {
245 // Perform a name lookup for a host name. 191 // Perform a name lookup for a host name.
246 struct addrinfo hints; 192 struct addrinfo hints;
247 memset(&hints, 0, sizeof(hints)); 193 memset(&hints, 0, sizeof(hints));
248 hints.ai_family = SocketAddress::FromType(type); 194 hints.ai_family = SocketAddress::FromType(type);
249 hints.ai_socktype = SOCK_STREAM; 195 hints.ai_socktype = SOCK_STREAM;
250 hints.ai_flags = AI_ADDRCONFIG; 196 hints.ai_flags = AI_ADDRCONFIG;
251 hints.ai_protocol = IPPROTO_TCP; 197 hints.ai_protocol = IPPROTO_TCP;
252 struct addrinfo* info = NULL; 198 struct addrinfo* info = NULL;
253 int status = NO_RETRY_EXPECTED(getaddrinfo(host, 0, &hints, &info)); 199 int status = NO_RETRY_EXPECTED(getaddrinfo(host, 0, &hints, &info));
254 if (status != 0) { 200 if (status != 0) {
(...skipping 20 matching lines...) Expand all
275 if ((c->ai_family == AF_INET) || (c->ai_family == AF_INET6)) { 221 if ((c->ai_family == AF_INET) || (c->ai_family == AF_INET6)) {
276 addresses->SetAt(i, new SocketAddress(c->ai_addr)); 222 addresses->SetAt(i, new SocketAddress(c->ai_addr));
277 i++; 223 i++;
278 } 224 }
279 } 225 }
280 freeaddrinfo(info); 226 freeaddrinfo(info);
281 return addresses; 227 return addresses;
282 } 228 }
283 229
284 230
285 bool Socket::ReverseLookup(const RawAddr& addr, 231 bool SocketBase::ReverseLookup(const RawAddr& addr,
286 char* host, 232 char* host,
287 intptr_t host_len, 233 intptr_t host_len,
288 OSError** os_error) { 234 OSError** os_error) {
289 ASSERT(host_len >= NI_MAXHOST); 235 ASSERT(host_len >= NI_MAXHOST);
290 int status = NO_RETRY_EXPECTED( 236 int status = NO_RETRY_EXPECTED(
291 getnameinfo(&addr.addr, SocketAddress::GetAddrLength(addr), host, 237 getnameinfo(&addr.addr, SocketAddress::GetAddrLength(addr), host,
292 host_len, NULL, 0, NI_NAMEREQD)); 238 host_len, NULL, 0, NI_NAMEREQD));
293 if (status != 0) { 239 if (status != 0) {
294 ASSERT(*os_error == NULL); 240 ASSERT(*os_error == NULL);
295 *os_error = 241 *os_error =
296 new OSError(status, gai_strerror(status), OSError::kGetAddressInfo); 242 new OSError(status, gai_strerror(status), OSError::kGetAddressInfo);
297 return false; 243 return false;
298 } 244 }
299 return true; 245 return true;
300 } 246 }
301 247
302 248
303 bool Socket::ParseAddress(int type, const char* address, RawAddr* addr) { 249 bool SocketBase::ParseAddress(int type, const char* address, RawAddr* addr) {
304 int result; 250 int result;
305 if (type == SocketAddress::TYPE_IPV4) { 251 if (type == SocketAddress::TYPE_IPV4) {
306 result = NO_RETRY_EXPECTED(inet_pton(AF_INET, address, &addr->in.sin_addr)); 252 result = NO_RETRY_EXPECTED(inet_pton(AF_INET, address, &addr->in.sin_addr));
307 } else { 253 } else {
308 ASSERT(type == SocketAddress::TYPE_IPV6); 254 ASSERT(type == SocketAddress::TYPE_IPV6);
309 result = 255 result =
310 NO_RETRY_EXPECTED(inet_pton(AF_INET6, address, &addr->in6.sin6_addr)); 256 NO_RETRY_EXPECTED(inet_pton(AF_INET6, address, &addr->in6.sin6_addr));
311 } 257 }
312 return (result == 1); 258 return (result == 1);
313 } 259 }
314 260
315 261
316 intptr_t Socket::CreateBindDatagram(const RawAddr& addr, bool reuseAddress) {
317 intptr_t fd;
318
319 fd = NO_RETRY_EXPECTED(socket(addr.addr.sa_family,
320 SOCK_DGRAM | SOCK_CLOEXEC | SOCK_NONBLOCK,
321 IPPROTO_UDP));
322 if (fd < 0) {
323 return -1;
324 }
325
326 if (reuseAddress) {
327 int optval = 1;
328 VOID_NO_RETRY_EXPECTED(
329 setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval)));
330 }
331
332 if (NO_RETRY_EXPECTED(
333 bind(fd, &addr.addr, SocketAddress::GetAddrLength(addr))) < 0) {
334 FDUtils::SaveErrorAndClose(fd);
335 return -1;
336 }
337 return fd;
338 }
339
340
341 static bool ShouldIncludeIfaAddrs(struct ifaddrs* ifa, int lookup_family) { 262 static bool ShouldIncludeIfaAddrs(struct ifaddrs* ifa, int lookup_family) {
342 if (ifa->ifa_addr == NULL) { 263 if (ifa->ifa_addr == NULL) {
343 // OpenVPN's virtual device tun0. 264 // OpenVPN's virtual device tun0.
344 return false; 265 return false;
345 } 266 }
346 int family = ifa->ifa_addr->sa_family; 267 int family = ifa->ifa_addr->sa_family;
347 return ((lookup_family == family) || 268 return ((lookup_family == family) ||
348 (((lookup_family == AF_UNSPEC) && 269 (((lookup_family == AF_UNSPEC) &&
349 ((family == AF_INET) || (family == AF_INET6))))); 270 ((family == AF_INET) || (family == AF_INET6)))));
350 } 271 }
351 272
352 273
353 bool Socket::ListInterfacesSupported() { 274 bool SocketBase::ListInterfacesSupported() {
354 return true; 275 return true;
355 } 276 }
356 277
357 278
358 AddressList<InterfaceSocketAddress>* Socket::ListInterfaces( 279 AddressList<InterfaceSocketAddress>* SocketBase::ListInterfaces(
359 int type, 280 int type,
360 OSError** os_error) { 281 OSError** os_error) {
361 struct ifaddrs* ifaddr; 282 struct ifaddrs* ifaddr;
362 283
363 int status = NO_RETRY_EXPECTED(getifaddrs(&ifaddr)); 284 int status = NO_RETRY_EXPECTED(getifaddrs(&ifaddr));
364 if (status != 0) { 285 if (status != 0) {
365 ASSERT(*os_error == NULL); 286 ASSERT(*os_error == NULL);
366 *os_error = 287 *os_error =
367 new OSError(status, gai_strerror(status), OSError::kGetAddressInfo); 288 new OSError(status, gai_strerror(status), OSError::kGetAddressInfo);
368 return NULL; 289 return NULL;
(...skipping 18 matching lines...) Expand all
387 i, new InterfaceSocketAddress(ifa->ifa_addr, ifa_name, 308 i, new InterfaceSocketAddress(ifa->ifa_addr, ifa_name,
388 if_nametoindex(ifa->ifa_name))); 309 if_nametoindex(ifa->ifa_name)));
389 i++; 310 i++;
390 } 311 }
391 } 312 }
392 freeifaddrs(ifaddr); 313 freeifaddrs(ifaddr);
393 return addresses; 314 return addresses;
394 } 315 }
395 316
396 317
397 intptr_t ServerSocket::CreateBindListen(const RawAddr& addr, 318 void SocketBase::Close(intptr_t fd) {
398 intptr_t backlog,
399 bool v6_only) {
400 intptr_t fd;
401
402 fd = NO_RETRY_EXPECTED(
403 socket(addr.ss.ss_family, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0));
404 if (fd < 0) {
405 return -1;
406 }
407
408 int optval = 1;
409 VOID_NO_RETRY_EXPECTED(
410 setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval)));
411
412 if (addr.ss.ss_family == AF_INET6) {
413 optval = v6_only ? 1 : 0;
414 VOID_NO_RETRY_EXPECTED(
415 setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &optval, sizeof(optval)));
416 }
417
418 if (NO_RETRY_EXPECTED(
419 bind(fd, &addr.addr, SocketAddress::GetAddrLength(addr))) < 0) {
420 FDUtils::SaveErrorAndClose(fd);
421 return -1;
422 }
423
424 // Test for invalid socket port 65535 (some browsers disallow it).
425 if ((SocketAddress::GetAddrPort(addr) == 0) &&
426 (Socket::GetPort(fd) == 65535)) {
427 // Don't close the socket until we have created a new socket, ensuring
428 // that we do not get the bad port number again.
429 intptr_t new_fd = CreateBindListen(addr, backlog, v6_only);
430 FDUtils::SaveErrorAndClose(fd);
431 return new_fd;
432 }
433
434 if (NO_RETRY_EXPECTED(listen(fd, backlog > 0 ? backlog : SOMAXCONN)) != 0) {
435 FDUtils::SaveErrorAndClose(fd);
436 return -1;
437 }
438
439 return fd;
440 }
441
442
443 bool ServerSocket::StartAccept(intptr_t fd) {
444 USE(fd);
445 return true;
446 }
447
448
449 static bool IsTemporaryAcceptError(int error) {
450 // On Linux a number of protocol errors should be treated as EAGAIN.
451 // These are the ones for TCP/IP.
452 return (error == EAGAIN) || (error == ENETDOWN) || (error == EPROTO) ||
453 (error == ENOPROTOOPT) || (error == EHOSTDOWN) || (error == ENONET) ||
454 (error == EHOSTUNREACH) || (error == EOPNOTSUPP) ||
455 (error == ENETUNREACH);
456 }
457
458
459 intptr_t ServerSocket::Accept(intptr_t fd) {
460 intptr_t socket;
461 struct sockaddr clientaddr;
462 socklen_t addrlen = sizeof(clientaddr);
463 socket = TEMP_FAILURE_RETRY(accept(fd, &clientaddr, &addrlen));
464 if (socket == -1) {
465 if (IsTemporaryAcceptError(errno)) {
466 // We need to signal to the caller that this is actually not an
467 // error. We got woken up from the poll on the listening socket,
468 // but there is no connection ready to be accepted.
469 ASSERT(kTemporaryFailure != -1);
470 socket = kTemporaryFailure;
471 }
472 } else {
473 if (!FDUtils::SetCloseOnExec(socket)) {
474 FDUtils::SaveErrorAndClose(socket);
475 return -1;
476 }
477 if (!FDUtils::SetNonBlocking(socket)) {
478 FDUtils::SaveErrorAndClose(socket);
479 return -1;
480 }
481 }
482 return socket;
483 }
484
485
486 void Socket::Close(intptr_t fd) {
487 ASSERT(fd >= 0); 319 ASSERT(fd >= 0);
488 VOID_TEMP_FAILURE_RETRY(close(fd)); 320 VOID_TEMP_FAILURE_RETRY(close(fd));
489 } 321 }
490 322
491 323
492 bool Socket::GetNoDelay(intptr_t fd, bool* enabled) { 324 bool SocketBase::GetNoDelay(intptr_t fd, bool* enabled) {
493 int on; 325 int on;
494 socklen_t len = sizeof(on); 326 socklen_t len = sizeof(on);
495 int err = NO_RETRY_EXPECTED(getsockopt(fd, IPPROTO_TCP, TCP_NODELAY, 327 int err = NO_RETRY_EXPECTED(getsockopt(fd, IPPROTO_TCP, TCP_NODELAY,
496 reinterpret_cast<void*>(&on), &len)); 328 reinterpret_cast<void*>(&on), &len));
497 if (err == 0) { 329 if (err == 0) {
498 *enabled = (on == 1); 330 *enabled = (on == 1);
499 } 331 }
500 return (err == 0); 332 return (err == 0);
501 } 333 }
502 334
503 335
504 bool Socket::SetNoDelay(intptr_t fd, bool enabled) { 336 bool SocketBase::SetNoDelay(intptr_t fd, bool enabled) {
505 int on = enabled ? 1 : 0; 337 int on = enabled ? 1 : 0;
506 return NO_RETRY_EXPECTED(setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, 338 return NO_RETRY_EXPECTED(setsockopt(fd, IPPROTO_TCP, TCP_NODELAY,
507 reinterpret_cast<char*>(&on), 339 reinterpret_cast<char*>(&on),
508 sizeof(on))) == 0; 340 sizeof(on))) == 0;
509 } 341 }
510 342
511 343
512 bool Socket::GetMulticastLoop(intptr_t fd, intptr_t protocol, bool* enabled) { 344 bool SocketBase::GetMulticastLoop(intptr_t fd,
345 intptr_t protocol,
346 bool* enabled) {
513 uint8_t on; 347 uint8_t on;
514 socklen_t len = sizeof(on); 348 socklen_t len = sizeof(on);
515 int level = protocol == SocketAddress::TYPE_IPV4 ? IPPROTO_IP : IPPROTO_IPV6; 349 int level = protocol == SocketAddress::TYPE_IPV4 ? IPPROTO_IP : IPPROTO_IPV6;
516 int optname = protocol == SocketAddress::TYPE_IPV4 ? IP_MULTICAST_LOOP 350 int optname = protocol == SocketAddress::TYPE_IPV4 ? IP_MULTICAST_LOOP
517 : IPV6_MULTICAST_LOOP; 351 : IPV6_MULTICAST_LOOP;
518 if (NO_RETRY_EXPECTED(getsockopt(fd, level, optname, 352 if (NO_RETRY_EXPECTED(getsockopt(fd, level, optname,
519 reinterpret_cast<char*>(&on), &len)) == 0) { 353 reinterpret_cast<char*>(&on), &len)) == 0) {
520 *enabled = (on == 1); 354 *enabled = (on == 1);
521 return true; 355 return true;
522 } 356 }
523 return false; 357 return false;
524 } 358 }
525 359
526 360
527 bool Socket::SetMulticastLoop(intptr_t fd, intptr_t protocol, bool enabled) { 361 bool SocketBase::SetMulticastLoop(intptr_t fd,
362 intptr_t protocol,
363 bool enabled) {
528 int on = enabled ? 1 : 0; 364 int on = enabled ? 1 : 0;
529 int level = protocol == SocketAddress::TYPE_IPV4 ? IPPROTO_IP : IPPROTO_IPV6; 365 int level = protocol == SocketAddress::TYPE_IPV4 ? IPPROTO_IP : IPPROTO_IPV6;
530 int optname = protocol == SocketAddress::TYPE_IPV4 ? IP_MULTICAST_LOOP 366 int optname = protocol == SocketAddress::TYPE_IPV4 ? IP_MULTICAST_LOOP
531 : IPV6_MULTICAST_LOOP; 367 : IPV6_MULTICAST_LOOP;
532 return NO_RETRY_EXPECTED(setsockopt( 368 return NO_RETRY_EXPECTED(setsockopt(
533 fd, level, optname, reinterpret_cast<char*>(&on), sizeof(on))) == 369 fd, level, optname, reinterpret_cast<char*>(&on), sizeof(on))) ==
534 0; 370 0;
535 } 371 }
536 372
537 373
538 bool Socket::GetMulticastHops(intptr_t fd, intptr_t protocol, int* value) { 374 bool SocketBase::GetMulticastHops(intptr_t fd, intptr_t protocol, int* value) {
539 uint8_t v; 375 uint8_t v;
540 socklen_t len = sizeof(v); 376 socklen_t len = sizeof(v);
541 int level = protocol == SocketAddress::TYPE_IPV4 ? IPPROTO_IP : IPPROTO_IPV6; 377 int level = protocol == SocketAddress::TYPE_IPV4 ? IPPROTO_IP : IPPROTO_IPV6;
542 int optname = protocol == SocketAddress::TYPE_IPV4 ? IP_MULTICAST_TTL 378 int optname = protocol == SocketAddress::TYPE_IPV4 ? IP_MULTICAST_TTL
543 : IPV6_MULTICAST_HOPS; 379 : IPV6_MULTICAST_HOPS;
544 if (NO_RETRY_EXPECTED(getsockopt(fd, level, optname, 380 if (NO_RETRY_EXPECTED(getsockopt(fd, level, optname,
545 reinterpret_cast<char*>(&v), &len)) == 0) { 381 reinterpret_cast<char*>(&v), &len)) == 0) {
546 *value = v; 382 *value = v;
547 return true; 383 return true;
548 } 384 }
549 return false; 385 return false;
550 } 386 }
551 387
552 388
553 bool Socket::SetMulticastHops(intptr_t fd, intptr_t protocol, int value) { 389 bool SocketBase::SetMulticastHops(intptr_t fd, intptr_t protocol, int value) {
554 int v = value; 390 int v = value;
555 int level = protocol == SocketAddress::TYPE_IPV4 ? IPPROTO_IP : IPPROTO_IPV6; 391 int level = protocol == SocketAddress::TYPE_IPV4 ? IPPROTO_IP : IPPROTO_IPV6;
556 int optname = protocol == SocketAddress::TYPE_IPV4 ? IP_MULTICAST_TTL 392 int optname = protocol == SocketAddress::TYPE_IPV4 ? IP_MULTICAST_TTL
557 : IPV6_MULTICAST_HOPS; 393 : IPV6_MULTICAST_HOPS;
558 return NO_RETRY_EXPECTED(setsockopt( 394 return NO_RETRY_EXPECTED(setsockopt(
559 fd, level, optname, reinterpret_cast<char*>(&v), sizeof(v))) == 0; 395 fd, level, optname, reinterpret_cast<char*>(&v), sizeof(v))) == 0;
560 } 396 }
561 397
562 398
563 bool Socket::GetBroadcast(intptr_t fd, bool* enabled) { 399 bool SocketBase::GetBroadcast(intptr_t fd, bool* enabled) {
564 int on; 400 int on;
565 socklen_t len = sizeof(on); 401 socklen_t len = sizeof(on);
566 int err = NO_RETRY_EXPECTED(getsockopt(fd, SOL_SOCKET, SO_BROADCAST, 402 int err = NO_RETRY_EXPECTED(getsockopt(fd, SOL_SOCKET, SO_BROADCAST,
567 reinterpret_cast<char*>(&on), &len)); 403 reinterpret_cast<char*>(&on), &len));
568 if (err == 0) { 404 if (err == 0) {
569 *enabled = (on == 1); 405 *enabled = (on == 1);
570 } 406 }
571 return (err == 0); 407 return (err == 0);
572 } 408 }
573 409
574 410
575 bool Socket::SetBroadcast(intptr_t fd, bool enabled) { 411 bool SocketBase::SetBroadcast(intptr_t fd, bool enabled) {
576 int on = enabled ? 1 : 0; 412 int on = enabled ? 1 : 0;
577 return NO_RETRY_EXPECTED(setsockopt(fd, SOL_SOCKET, SO_BROADCAST, 413 return NO_RETRY_EXPECTED(setsockopt(fd, SOL_SOCKET, SO_BROADCAST,
578 reinterpret_cast<char*>(&on), 414 reinterpret_cast<char*>(&on),
579 sizeof(on))) == 0; 415 sizeof(on))) == 0;
580 } 416 }
581 417
582 418
583 bool Socket::JoinMulticast(intptr_t fd, 419 bool SocketBase::JoinMulticast(intptr_t fd,
584 const RawAddr& addr, 420 const RawAddr& addr,
585 const RawAddr&, 421 const RawAddr&,
586 int interfaceIndex) { 422 int interfaceIndex) {
587 int proto = addr.addr.sa_family == AF_INET ? IPPROTO_IP : IPPROTO_IPV6; 423 int proto = addr.addr.sa_family == AF_INET ? IPPROTO_IP : IPPROTO_IPV6;
588 struct group_req mreq; 424 struct group_req mreq;
589 mreq.gr_interface = interfaceIndex; 425 mreq.gr_interface = interfaceIndex;
590 memmove(&mreq.gr_group, &addr.ss, SocketAddress::GetAddrLength(addr)); 426 memmove(&mreq.gr_group, &addr.ss, SocketAddress::GetAddrLength(addr));
591 return NO_RETRY_EXPECTED( 427 return NO_RETRY_EXPECTED(
592 setsockopt(fd, proto, MCAST_JOIN_GROUP, &mreq, sizeof(mreq))) == 0; 428 setsockopt(fd, proto, MCAST_JOIN_GROUP, &mreq, sizeof(mreq))) == 0;
593 } 429 }
594 430
595 431
596 bool Socket::LeaveMulticast(intptr_t fd, 432 bool SocketBase::LeaveMulticast(intptr_t fd,
597 const RawAddr& addr, 433 const RawAddr& addr,
598 const RawAddr&, 434 const RawAddr&,
599 int interfaceIndex) { 435 int interfaceIndex) {
600 int proto = addr.addr.sa_family == AF_INET ? IPPROTO_IP : IPPROTO_IPV6; 436 int proto = addr.addr.sa_family == AF_INET ? IPPROTO_IP : IPPROTO_IPV6;
601 struct group_req mreq; 437 struct group_req mreq;
602 mreq.gr_interface = interfaceIndex; 438 mreq.gr_interface = interfaceIndex;
603 memmove(&mreq.gr_group, &addr.ss, SocketAddress::GetAddrLength(addr)); 439 memmove(&mreq.gr_group, &addr.ss, SocketAddress::GetAddrLength(addr));
604 return NO_RETRY_EXPECTED(setsockopt(fd, proto, MCAST_LEAVE_GROUP, &mreq, 440 return NO_RETRY_EXPECTED(setsockopt(fd, proto, MCAST_LEAVE_GROUP, &mreq,
605 sizeof(mreq))) == 0; 441 sizeof(mreq))) == 0;
606 } 442 }
607 443
608 } // namespace bin 444 } // namespace bin
609 } // namespace dart 445 } // namespace dart
610 446
611 #endif // defined(HOST_OS_LINUX) 447 #endif // defined(HOST_OS_LINUX)
612 448
613 #endif // !defined(DART_IO_DISABLED) 449 #endif // !defined(DART_IO_DISABLED)
OLDNEW
« no previous file with comments | « runtime/bin/socket_base_linux.h ('k') | runtime/bin/socket_base_macos.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698