[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "base/sync_socket.h" |
| 6 | |
| 7 | #include <errno.h> |
[email protected] | 5d27209 | 2012-04-19 10:23:03 | [diff] [blame] | 8 | #include <fcntl.h> |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 9 | #include <limits.h> |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 10 | #include <stdio.h> |
[email protected] | 1e1f1a7 | 2009-12-06 19:45:08 | [diff] [blame] | 11 | #include <sys/ioctl.h> |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 12 | #include <sys/socket.h> |
[email protected] | 5d27209 | 2012-04-19 10:23:03 | [diff] [blame] | 13 | #include <sys/types.h> |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 14 | |
[email protected] | 94f8c95 | 2011-06-25 04:54:41 | [diff] [blame] | 15 | #if defined(OS_SOLARIS) |
| 16 | #include <sys/filio.h> |
| 17 | #endif |
| 18 | |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 19 | #include "base/file_util.h" |
| 20 | #include "base/logging.h" |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 21 | #include "base/threading/thread_restrictions.h" |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 22 | |
| 23 | namespace base { |
| 24 | |
| 25 | namespace { |
| 26 | // To avoid users sending negative message lengths to Send/Receive |
| 27 | // we clamp message lengths, which are size_t, to no more than INT_MAX. |
| 28 | const size_t kMaxMessageLength = static_cast<size_t>(INT_MAX); |
| 29 | |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 30 | // Writes |length| of |buffer| into |handle|. Returns the number of bytes |
| 31 | // written or zero on error. |length| must be greater than 0. |
| 32 | size_t SendHelper(SyncSocket::Handle handle, |
| 33 | const void* buffer, |
| 34 | size_t length) { |
| 35 | DCHECK_GT(length, 0u); |
| 36 | DCHECK_LE(length, kMaxMessageLength); |
| 37 | DCHECK_NE(handle, SyncSocket::kInvalidHandle); |
| 38 | const char* charbuffer = static_cast<const char*>(buffer); |
| 39 | const int len = file_util::WriteFileDescriptor(handle, charbuffer, length); |
| 40 | return len < 0 ? 0 : static_cast<size_t>(len); |
| 41 | } |
| 42 | |
[email protected] | 1da08e7 | 2013-11-01 19:58:12 | [diff] [blame^] | 43 | bool CloseHandle(SyncSocket::Handle handle) { |
| 44 | if (handle != SyncSocket::kInvalidHandle && close(handle) < 0) { |
| 45 | DPLOG(ERROR) << "close"; |
| 46 | return false; |
| 47 | } |
| 48 | |
| 49 | return true; |
| 50 | } |
| 51 | |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 52 | } // namespace |
| 53 | |
[email protected] | 5895ee1 | 2011-12-22 19:33:27 | [diff] [blame] | 54 | const SyncSocket::Handle SyncSocket::kInvalidHandle = -1; |
| 55 | |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 56 | SyncSocket::SyncSocket() : handle_(kInvalidHandle) {} |
| 57 | |
| 58 | SyncSocket::~SyncSocket() { |
| 59 | Close(); |
| 60 | } |
| 61 | |
| 62 | // static |
| 63 | bool SyncSocket::CreatePair(SyncSocket* socket_a, SyncSocket* socket_b) { |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 64 | DCHECK_NE(socket_a, socket_b); |
| 65 | DCHECK_EQ(socket_a->handle_, kInvalidHandle); |
| 66 | DCHECK_EQ(socket_b->handle_, kInvalidHandle); |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 67 | |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 68 | #if defined(OS_MACOSX) |
| 69 | int nosigpipe = 1; |
| 70 | #endif // defined(OS_MACOSX) |
| 71 | |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 72 | Handle handles[2] = { kInvalidHandle, kInvalidHandle }; |
[email protected] | 1da08e7 | 2013-11-01 19:58:12 | [diff] [blame^] | 73 | if (socketpair(AF_UNIX, SOCK_STREAM, 0, handles) != 0) { |
| 74 | CloseHandle(handles[0]); |
| 75 | CloseHandle(handles[1]); |
| 76 | return false; |
| 77 | } |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 78 | |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 79 | #if defined(OS_MACOSX) |
| 80 | // On OSX an attempt to read or write to a closed socket may generate a |
| 81 | // SIGPIPE rather than returning -1. setsockopt will shut this off. |
| 82 | if (0 != setsockopt(handles[0], SOL_SOCKET, SO_NOSIGPIPE, |
| 83 | &nosigpipe, sizeof nosigpipe) || |
| 84 | 0 != setsockopt(handles[1], SOL_SOCKET, SO_NOSIGPIPE, |
| 85 | &nosigpipe, sizeof nosigpipe)) { |
[email protected] | 1da08e7 | 2013-11-01 19:58:12 | [diff] [blame^] | 86 | CloseHandle(handles[0]); |
| 87 | CloseHandle(handles[1]); |
| 88 | return false; |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 89 | } |
| 90 | #endif |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 91 | |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 92 | // Copy the handles out for successful return. |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 93 | socket_a->handle_ = handles[0]; |
| 94 | socket_b->handle_ = handles[1]; |
| 95 | |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 96 | return true; |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 97 | } |
| 98 | |
| 99 | bool SyncSocket::Close() { |
[email protected] | 1da08e7 | 2013-11-01 19:58:12 | [diff] [blame^] | 100 | const bool retval = CloseHandle(handle_); |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 101 | handle_ = kInvalidHandle; |
[email protected] | 1da08e7 | 2013-11-01 19:58:12 | [diff] [blame^] | 102 | return retval; |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 103 | } |
| 104 | |
| 105 | size_t SyncSocket::Send(const void* buffer, size_t length) { |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 106 | ThreadRestrictions::AssertIOAllowed(); |
| 107 | return SendHelper(handle_, buffer, length); |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 108 | } |
| 109 | |
| 110 | size_t SyncSocket::Receive(void* buffer, size_t length) { |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 111 | ThreadRestrictions::AssertIOAllowed(); |
| 112 | DCHECK_GT(length, 0u); |
[email protected] | d7a93ad | 2011-04-22 13:13:07 | [diff] [blame] | 113 | DCHECK_LE(length, kMaxMessageLength); |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 114 | DCHECK_NE(handle_, kInvalidHandle); |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 115 | char* charbuffer = static_cast<char*>(buffer); |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 116 | if (file_util::ReadFromFD(handle_, charbuffer, length)) |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 117 | return length; |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 118 | return 0; |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 119 | } |
| 120 | |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 121 | size_t SyncSocket::ReceiveWithTimeout(void* buffer, |
| 122 | size_t length, |
| 123 | TimeDelta timeout) { |
| 124 | ThreadRestrictions::AssertIOAllowed(); |
| 125 | DCHECK_GT(length, 0u); |
| 126 | DCHECK_LE(length, kMaxMessageLength); |
| 127 | DCHECK_NE(handle_, kInvalidHandle); |
[email protected] | 1da08e7 | 2013-11-01 19:58:12 | [diff] [blame^] | 128 | CHECK_LT(handle_, FD_SETSIZE); |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 129 | |
| 130 | // Only timeouts greater than zero and less than one second are allowed. |
| 131 | DCHECK_GT(timeout.InMicroseconds(), 0); |
| 132 | DCHECK_LT(timeout.InMicroseconds(), |
| 133 | base::TimeDelta::FromSeconds(1).InMicroseconds()); |
| 134 | |
| 135 | // Track the start time so we can reduce the timeout as data is read. |
| 136 | TimeTicks start_time = TimeTicks::Now(); |
| 137 | const TimeTicks finish_time = start_time + timeout; |
| 138 | |
| 139 | fd_set read_fds; |
| 140 | size_t bytes_read_total; |
| 141 | for (bytes_read_total = 0; |
| 142 | bytes_read_total < length && timeout.InMicroseconds() > 0; |
| 143 | timeout = finish_time - base::TimeTicks::Now()) { |
| 144 | FD_ZERO(&read_fds); |
| 145 | FD_SET(handle_, &read_fds); |
| 146 | |
| 147 | // Wait for data to become available. |
| 148 | struct timeval timeout_struct = |
| 149 | { 0, static_cast<suseconds_t>(timeout.InMicroseconds()) }; |
| 150 | const int select_result = |
| 151 | select(handle_ + 1, &read_fds, NULL, NULL, &timeout_struct); |
| 152 | // Handle EINTR manually since we need to update the timeout value. |
| 153 | if (select_result == -1 && errno == EINTR) |
| 154 | continue; |
| 155 | if (select_result <= 0) |
| 156 | return bytes_read_total; |
| 157 | |
| 158 | // select() only tells us that data is ready for reading, not how much. We |
| 159 | // must Peek() for the amount ready for reading to avoid blocking. |
| 160 | DCHECK(FD_ISSET(handle_, &read_fds)); |
| 161 | const size_t bytes_to_read = std::min(Peek(), length - bytes_read_total); |
| 162 | |
| 163 | // There may be zero bytes to read if the socket at the other end closed. |
| 164 | if (!bytes_to_read) |
| 165 | return bytes_read_total; |
| 166 | |
| 167 | const size_t bytes_received = |
| 168 | Receive(static_cast<char*>(buffer) + bytes_read_total, bytes_to_read); |
| 169 | bytes_read_total += bytes_received; |
| 170 | if (bytes_received != bytes_to_read) |
| 171 | return bytes_read_total; |
| 172 | } |
| 173 | |
| 174 | return bytes_read_total; |
| 175 | } |
| 176 | |
[email protected] | d8b6591 | 2009-12-04 22:53:22 | [diff] [blame] | 177 | size_t SyncSocket::Peek() { |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 178 | DCHECK_NE(handle_, kInvalidHandle); |
| 179 | int number_chars = 0; |
| 180 | if (ioctl(handle_, FIONREAD, &number_chars) == -1) { |
[email protected] | 1e1f1a7 | 2009-12-06 19:45:08 | [diff] [blame] | 181 | // If there is an error in ioctl, signal that the channel would block. |
| 182 | return 0; |
| 183 | } |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 184 | DCHECK_GE(number_chars, 0); |
| 185 | return number_chars; |
[email protected] | d8b6591 | 2009-12-04 22:53:22 | [diff] [blame] | 186 | } |
| 187 | |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 188 | CancelableSyncSocket::CancelableSyncSocket() {} |
| 189 | CancelableSyncSocket::CancelableSyncSocket(Handle handle) |
| 190 | : SyncSocket(handle) { |
| 191 | } |
| 192 | |
| 193 | bool CancelableSyncSocket::Shutdown() { |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 194 | DCHECK_NE(handle_, kInvalidHandle); |
| 195 | return HANDLE_EINTR(shutdown(handle_, SHUT_RDWR)) >= 0; |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 196 | } |
| 197 | |
[email protected] | 5d27209 | 2012-04-19 10:23:03 | [diff] [blame] | 198 | size_t CancelableSyncSocket::Send(const void* buffer, size_t length) { |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 199 | DCHECK_GT(length, 0u); |
| 200 | DCHECK_LE(length, kMaxMessageLength); |
| 201 | DCHECK_NE(handle_, kInvalidHandle); |
| 202 | |
| 203 | const long flags = fcntl(handle_, F_GETFL, NULL); |
[email protected] | 5d27209 | 2012-04-19 10:23:03 | [diff] [blame] | 204 | if (flags != -1 && (flags & O_NONBLOCK) == 0) { |
| 205 | // Set the socket to non-blocking mode for sending if its original mode |
| 206 | // is blocking. |
| 207 | fcntl(handle_, F_SETFL, flags | O_NONBLOCK); |
| 208 | } |
| 209 | |
[email protected] | 62558f1 | 2013-10-19 22:13:19 | [diff] [blame] | 210 | const size_t len = SendHelper(handle_, buffer, length); |
[email protected] | 5d27209 | 2012-04-19 10:23:03 | [diff] [blame] | 211 | |
| 212 | if (flags != -1 && (flags & O_NONBLOCK) == 0) { |
| 213 | // Restore the original flags. |
| 214 | fcntl(handle_, F_SETFL, flags); |
| 215 | } |
| 216 | |
| 217 | return len; |
| 218 | } |
| 219 | |
[email protected] | 532e9bd | 2012-01-25 12:04:17 | [diff] [blame] | 220 | // static |
| 221 | bool CancelableSyncSocket::CreatePair(CancelableSyncSocket* socket_a, |
| 222 | CancelableSyncSocket* socket_b) { |
| 223 | return SyncSocket::CreatePair(socket_a, socket_b); |
| 224 | } |
| 225 | |
[email protected] | 182c44fa | 2009-11-26 00:28:02 | [diff] [blame] | 226 | } // namespace base |