| // Copyright 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/socket/tcp_socket.h" |
| |
| #include <errno.h> |
| #include <netinet/tcp.h> |
| #include <sys/socket.h> |
| |
| #include "base/atomicops.h" |
| #include "base/bind.h" |
| #include "base/files/file_path.h" |
| #include "base/files/file_util.h" |
| #include "base/lazy_instance.h" |
| #include "base/logging.h" |
| #include "base/metrics/histogram_macros.h" |
| #include "base/posix/eintr_wrapper.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/strings/string_piece.h" |
| #include "base/task/post_task.h" |
| #include "base/time/time.h" |
| #include "build/build_config.h" |
| #include "net/base/address_list.h" |
| #include "net/base/io_buffer.h" |
| #include "net/base/ip_endpoint.h" |
| #include "net/base/net_errors.h" |
| #include "net/base/network_activity_monitor.h" |
| #include "net/base/network_change_notifier.h" |
| #include "net/base/sockaddr_storage.h" |
| #include "net/http/http_util.h" |
| #include "net/log/net_log.h" |
| #include "net/log/net_log_event_type.h" |
| #include "net/log/net_log_source.h" |
| #include "net/log/net_log_source_type.h" |
| #include "net/socket/socket_net_log_params.h" |
| #include "net/socket/socket_options.h" |
| #include "net/socket/socket_posix.h" |
| #include "net/socket/socket_tag.h" |
| #include "net/traffic_annotation/network_traffic_annotation.h" |
| #include "starboard/types.h" |
| |
| // If we don't have a definition for TCPI_OPT_SYN_DATA, create one. |
| #if !defined(TCPI_OPT_SYN_DATA) |
| #define TCPI_OPT_SYN_DATA 32 |
| #endif |
| |
| // Fuchsia defines TCP_INFO, but it's not implemented. |
| // TODO(crbug.com/758294): Enable TCP_INFO on Fuchsia once it's implemented |
| // there (see NET-160). |
| #if defined(TCP_INFO) && !defined(OS_FUCHSIA) |
| #define HAVE_TCP_INFO |
| #endif |
| |
| namespace net { |
| |
| namespace { |
| |
| // True if TCP FastOpen connect-with-write has failed at least once. |
| bool g_tcp_fastopen_has_failed = false; |
| |
| // SetTCPKeepAlive sets SO_KEEPALIVE. |
| bool SetTCPKeepAlive(int fd, bool enable, int delay) { |
| // Enabling TCP keepalives is the same on all platforms. |
| int on = enable ? 1 : 0; |
| if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &on, sizeof(on))) { |
| PLOG(ERROR) << "Failed to set SO_KEEPALIVE on fd: " << fd; |
| return false; |
| } |
| |
| // If we disabled TCP keep alive, our work is done here. |
| if (!enable) |
| return true; |
| |
| #if defined(OS_LINUX) || defined(OS_ANDROID) |
| // Setting the keepalive interval varies by platform. |
| |
| // Set seconds until first TCP keep alive. |
| if (setsockopt(fd, SOL_TCP, TCP_KEEPIDLE, &delay, sizeof(delay))) { |
| PLOG(ERROR) << "Failed to set TCP_KEEPIDLE on fd: " << fd; |
| return false; |
| } |
| // Set seconds between TCP keep alives. |
| if (setsockopt(fd, SOL_TCP, TCP_KEEPINTVL, &delay, sizeof(delay))) { |
| PLOG(ERROR) << "Failed to set TCP_KEEPINTVL on fd: " << fd; |
| return false; |
| } |
| #elif defined(OS_MACOSX) || defined(OS_IOS) |
| if (setsockopt(fd, IPPROTO_TCP, TCP_KEEPALIVE, &delay, sizeof(delay))) { |
| PLOG(ERROR) << "Failed to set TCP_KEEPALIVE on fd: " << fd; |
| return false; |
| } |
| #endif |
| return true; |
| } |
| |
| #if defined(OS_LINUX) || defined(OS_ANDROID) |
| // Probes if TCP FastOpen is supported, on another thread. |
| class FastOpenProbe { |
| public: |
| // Returns true if TCP FastOpen suport was detected. Returns false if it was |
| // not detected, or the probe has not yet completed. |
| bool IsTCPFastOpenSupported() const { |
| return base::subtle::NoBarrier_Load(&tcp_fastopen_supported_) != 0; |
| } |
| |
| private: |
| friend struct base::LazyInstanceTraitsBase<FastOpenProbe>; |
| |
| FastOpenProbe() { |
| base::PostTaskWithTraits( |
| FROM_HERE, |
| {base::MayBlock(), base::TaskShutdownBehavior::CONTINUE_ON_SHUTDOWN}, |
| base::Bind(&FastOpenProbe::DetectTCPFastOpenSupport, |
| base::Unretained(this))); |
| } |
| |
| ~FastOpenProbe() = default; |
| |
| // Checks if the kernel supports TCP FastOpen. Called only once, on startup. |
| void DetectTCPFastOpenSupport() { |
| // Since this method should only be called once, and is the only thing that |
| // modifies |tcp_fastopen_supported_|, no need for this read to be atomic. |
| DCHECK_EQ(tcp_fastopen_supported_, 0); |
| |
| const base::FilePath::CharType kTCPFastOpenProcFilePath[] = |
| "/proc/sys/net/ipv4/tcp_fastopen"; |
| std::string system_supports_tcp_fastopen; |
| if (!base::ReadFileToString(base::FilePath(kTCPFastOpenProcFilePath), |
| &system_supports_tcp_fastopen)) { |
| return; |
| } |
| // The read value from /proc will be set in its least significant bit if |
| // TCP FastOpen is enabled. |
| int read_int = 0; |
| base::StringToInt( |
| HttpUtil::TrimLWS(base::StringPiece(system_supports_tcp_fastopen)), |
| &read_int); |
| if ((read_int & 0x1) != 1) |
| return; |
| base::subtle::NoBarrier_Store(&tcp_fastopen_supported_, 1); |
| } |
| |
| base::subtle::Atomic32 tcp_fastopen_supported_ = 0; |
| |
| DISALLOW_COPY_AND_ASSIGN(FastOpenProbe); |
| }; |
| |
| base::LazyInstance<FastOpenProbe>::Leaky g_fast_open_probe = |
| LAZY_INSTANCE_INITIALIZER; |
| #endif // defined(OS_LINUX) || defined(OS_ANDROID) |
| |
| #if defined(HAVE_TCP_INFO) |
| // Returns a zero value if the transport RTT is unavailable. |
| base::TimeDelta GetTransportRtt(SocketDescriptor fd) { |
| tcp_info info; |
| // Reset |tcpi_rtt| to verify if getsockopt() actually updates |tcpi_rtt|. |
| info.tcpi_rtt = 0; |
| |
| socklen_t info_len = sizeof(tcp_info); |
| if (getsockopt(fd, IPPROTO_TCP, TCP_INFO, &info, &info_len) != 0) |
| return base::TimeDelta(); |
| |
| // Verify that |tcpi_rtt| in tcp_info struct was updated. Note that it's |
| // possible that |info_len| is shorter than |sizeof(tcp_info)| which implies |
| // that only a subset of values in |info| may have been updated by |
| // getsockopt(). |
| if (info_len < static_cast<socklen_t>(offsetof(tcp_info, tcpi_rtt) + |
| sizeof(info.tcpi_rtt))) { |
| return base::TimeDelta(); |
| } |
| |
| return base::TimeDelta::FromMicroseconds(info.tcpi_rtt); |
| } |
| |
| // Returns true if getsockopt() call was successful. Sets |
| // |server_acked_syn_data| to true if SYN-ACK acked data in SYN sent or |
| // received. |
| bool GetServerAckedDataInSyn(SocketDescriptor fd, bool* server_acked_syn_data) { |
| tcp_info info; |
| // Reset |tcpi_options| to verify if getsockopt() actually updates |
| // |tcpi_options|. |
| info.tcpi_options = 0; |
| |
| socklen_t info_len = sizeof(tcp_info); |
| if (getsockopt(fd, IPPROTO_TCP, TCP_INFO, &info, &info_len) != 0) { |
| *server_acked_syn_data = false; |
| return false; |
| } |
| |
| // Verify that |tcpi_options| in tcp_info struct was updated. Note that it's |
| // possible that |info_len| is shorter than |sizeof(tcp_info)| which implies |
| // that only a subset of values in |info| may have been updated by |
| // getsockopt(). |
| if (info_len < static_cast<socklen_t>(offsetof(tcp_info, tcpi_options) + |
| sizeof(info.tcpi_options))) { |
| *server_acked_syn_data = false; |
| return false; |
| } |
| |
| *server_acked_syn_data = (info.tcpi_options & TCPI_OPT_SYN_DATA); |
| return true; |
| } |
| |
| #endif // defined(TCP_INFO) |
| |
| } // namespace |
| |
| //----------------------------------------------------------------------------- |
| |
| bool IsTCPFastOpenSupported() { |
| #if defined(OS_LINUX) || defined(OS_ANDROID) |
| return g_fast_open_probe.Get().IsTCPFastOpenSupported(); |
| #else |
| return false; |
| #endif |
| } |
| |
| TCPSocketPosix::TCPSocketPosix( |
| std::unique_ptr<SocketPerformanceWatcher> socket_performance_watcher, |
| NetLog* net_log, |
| const NetLogSource& source) |
| : socket_performance_watcher_(std::move(socket_performance_watcher)), |
| use_tcp_fastopen_(false), |
| tcp_fastopen_write_attempted_(false), |
| tcp_fastopen_connected_(false), |
| tcp_fastopen_status_(TCP_FASTOPEN_STATUS_UNKNOWN), |
| logging_multiple_connect_attempts_(false), |
| net_log_(NetLogWithSource::Make(net_log, NetLogSourceType::SOCKET)) { |
| net_log_.BeginEvent(NetLogEventType::SOCKET_ALIVE, |
| source.ToEventParametersCallback()); |
| } |
| |
| TCPSocketPosix::~TCPSocketPosix() { |
| net_log_.EndEvent(NetLogEventType::SOCKET_ALIVE); |
| Close(); |
| } |
| |
| int TCPSocketPosix::Open(AddressFamily family) { |
| DCHECK(!socket_); |
| socket_.reset(new SocketPosix); |
| int rv = socket_->Open(ConvertAddressFamily(family)); |
| if (rv != OK) |
| socket_.reset(); |
| if (rv == OK && tag_ != SocketTag()) |
| tag_.Apply(socket_->socket_fd()); |
| return rv; |
| } |
| |
| int TCPSocketPosix::AdoptConnectedSocket(SocketDescriptor socket, |
| const IPEndPoint& peer_address) { |
| DCHECK(!socket_); |
| |
| SockaddrStorage storage; |
| if (!peer_address.ToSockAddr(storage.addr, &storage.addr_len) && |
| // For backward compatibility, allows the empty address. |
| !(peer_address == IPEndPoint())) { |
| return ERR_ADDRESS_INVALID; |
| } |
| |
| socket_.reset(new SocketPosix); |
| int rv = socket_->AdoptConnectedSocket(socket, storage); |
| if (rv != OK) |
| socket_.reset(); |
| if (rv == OK && tag_ != SocketTag()) |
| tag_.Apply(socket_->socket_fd()); |
| return rv; |
| } |
| |
| int TCPSocketPosix::AdoptUnconnectedSocket(SocketDescriptor socket) { |
| DCHECK(!socket_); |
| |
| socket_.reset(new SocketPosix); |
| int rv = socket_->AdoptUnconnectedSocket(socket); |
| if (rv != OK) |
| socket_.reset(); |
| if (rv == OK && tag_ != SocketTag()) |
| tag_.Apply(socket_->socket_fd()); |
| return rv; |
| } |
| |
| int TCPSocketPosix::Bind(const IPEndPoint& address) { |
| DCHECK(socket_); |
| |
| SockaddrStorage storage; |
| if (!address.ToSockAddr(storage.addr, &storage.addr_len)) |
| return ERR_ADDRESS_INVALID; |
| |
| return socket_->Bind(storage); |
| } |
| |
| int TCPSocketPosix::Listen(int backlog) { |
| DCHECK(socket_); |
| return socket_->Listen(backlog); |
| } |
| |
| int TCPSocketPosix::Accept(std::unique_ptr<TCPSocketPosix>* tcp_socket, |
| IPEndPoint* address, |
| CompletionOnceCallback callback) { |
| DCHECK(tcp_socket); |
| DCHECK(!callback.is_null()); |
| DCHECK(socket_); |
| DCHECK(!accept_socket_); |
| |
| net_log_.BeginEvent(NetLogEventType::TCP_ACCEPT); |
| |
| int rv = socket_->Accept( |
| &accept_socket_, |
| base::BindOnce(&TCPSocketPosix::AcceptCompleted, base::Unretained(this), |
| tcp_socket, address, std::move(callback))); |
| if (rv != ERR_IO_PENDING) |
| rv = HandleAcceptCompleted(tcp_socket, address, rv); |
| return rv; |
| } |
| |
| int TCPSocketPosix::Connect(const IPEndPoint& address, |
| CompletionOnceCallback callback) { |
| DCHECK(socket_); |
| |
| if (!logging_multiple_connect_attempts_) |
| LogConnectBegin(AddressList(address)); |
| |
| net_log_.BeginEvent(NetLogEventType::TCP_CONNECT_ATTEMPT, |
| CreateNetLogIPEndPointCallback(&address)); |
| |
| SockaddrStorage storage; |
| if (!address.ToSockAddr(storage.addr, &storage.addr_len)) |
| return ERR_ADDRESS_INVALID; |
| |
| if (use_tcp_fastopen_) { |
| // With TCP FastOpen, we pretend that the socket is connected. |
| DCHECK(!tcp_fastopen_write_attempted_); |
| socket_->SetPeerAddress(storage); |
| return OK; |
| } |
| |
| int rv = socket_->Connect( |
| storage, base::BindOnce(&TCPSocketPosix::ConnectCompleted, |
| base::Unretained(this), std::move(callback))); |
| if (rv != ERR_IO_PENDING) |
| rv = HandleConnectCompleted(rv); |
| return rv; |
| } |
| |
| bool TCPSocketPosix::IsConnected() const { |
| if (!socket_) |
| return false; |
| |
| if (use_tcp_fastopen_ && !tcp_fastopen_write_attempted_ && |
| socket_->HasPeerAddress()) { |
| // With TCP FastOpen, we pretend that the socket is connected. |
| // This allows GetPeerAddress() to return peer_address_. |
| return true; |
| } |
| |
| return socket_->IsConnected(); |
| } |
| |
| bool TCPSocketPosix::IsConnectedAndIdle() const { |
| // TODO(wtc): should we also handle the TCP FastOpen case here, |
| // as we do in IsConnected()? |
| return socket_ && socket_->IsConnectedAndIdle(); |
| } |
| |
| int TCPSocketPosix::Read(IOBuffer* buf, |
| int buf_len, |
| CompletionOnceCallback callback) { |
| DCHECK(socket_); |
| DCHECK(!callback.is_null()); |
| |
| int rv = socket_->Read( |
| buf, buf_len, |
| base::BindOnce( |
| &TCPSocketPosix::ReadCompleted, |
| // Grab a reference to |buf| so that ReadCompleted() can still |
| // use it when Read() completes, as otherwise, this transfers |
| // ownership of buf to socket. |
| base::Unretained(this), base::WrapRefCounted(buf), |
| std::move(callback))); |
| if (rv != ERR_IO_PENDING) |
| rv = HandleReadCompleted(buf, rv); |
| return rv; |
| } |
| |
| int TCPSocketPosix::ReadIfReady(IOBuffer* buf, |
| int buf_len, |
| CompletionOnceCallback callback) { |
| DCHECK(socket_); |
| DCHECK(!callback.is_null()); |
| |
| int rv = socket_->ReadIfReady( |
| buf, buf_len, |
| base::BindOnce(&TCPSocketPosix::ReadIfReadyCompleted, |
| base::Unretained(this), std::move(callback))); |
| if (rv != ERR_IO_PENDING) |
| rv = HandleReadCompleted(buf, rv); |
| return rv; |
| } |
| |
| int TCPSocketPosix::CancelReadIfReady() { |
| DCHECK(socket_); |
| |
| return socket_->CancelReadIfReady(); |
| } |
| |
| int TCPSocketPosix::Write( |
| IOBuffer* buf, |
| int buf_len, |
| CompletionOnceCallback callback, |
| const NetworkTrafficAnnotationTag& traffic_annotation) { |
| DCHECK(socket_); |
| DCHECK(!callback.is_null()); |
| |
| CompletionOnceCallback write_callback = base::BindOnce( |
| &TCPSocketPosix::WriteCompleted, |
| // Grab a reference to |buf| so that WriteCompleted() can still |
| // use it when Write() completes, as otherwise, this transfers |
| // ownership of buf to socket. |
| base::Unretained(this), base::WrapRefCounted(buf), std::move(callback)); |
| int rv; |
| |
| if (use_tcp_fastopen_ && !tcp_fastopen_write_attempted_) { |
| rv = TcpFastOpenWrite(buf, buf_len, std::move(write_callback)); |
| } else { |
| rv = socket_->Write(buf, buf_len, std::move(write_callback), |
| traffic_annotation); |
| } |
| |
| if (rv != ERR_IO_PENDING) |
| rv = HandleWriteCompleted(buf, rv); |
| return rv; |
| } |
| |
| int TCPSocketPosix::GetLocalAddress(IPEndPoint* address) const { |
| DCHECK(address); |
| |
| if (!socket_) |
| return ERR_SOCKET_NOT_CONNECTED; |
| |
| SockaddrStorage storage; |
| int rv = socket_->GetLocalAddress(&storage); |
| if (rv != OK) |
| return rv; |
| |
| if (!address->FromSockAddr(storage.addr, storage.addr_len)) |
| return ERR_ADDRESS_INVALID; |
| |
| return OK; |
| } |
| |
| int TCPSocketPosix::GetPeerAddress(IPEndPoint* address) const { |
| DCHECK(address); |
| |
| if (!IsConnected()) |
| return ERR_SOCKET_NOT_CONNECTED; |
| |
| SockaddrStorage storage; |
| int rv = socket_->GetPeerAddress(&storage); |
| if (rv != OK) |
| return rv; |
| |
| if (!address->FromSockAddr(storage.addr, storage.addr_len)) |
| return ERR_ADDRESS_INVALID; |
| |
| return OK; |
| } |
| |
| int TCPSocketPosix::SetDefaultOptionsForServer() { |
| DCHECK(socket_); |
| return AllowAddressReuse(); |
| } |
| |
| void TCPSocketPosix::SetDefaultOptionsForClient() { |
| DCHECK(socket_); |
| |
| // This mirrors the behaviour on Windows. See the comment in |
| // tcp_socket_win.cc after searching for "NODELAY". |
| // If SetTCPNoDelay fails, we don't care. |
| SetTCPNoDelay(socket_->socket_fd(), true); |
| |
| #if !defined(OS_ANDROID) && !defined(OS_IOS) && !defined(OS_FUCHSIA) |
| // TCP keep alive wakes up the radio, which is expensive on mobile. |
| // It's also not implemented on Fuchsia. Do not enable it there. |
| // TODO(crbug.com/758706): Consider enabling keep-alive on Fuchsia. |
| // |
| // It's useful to prevent TCP middleboxes from timing out |
| // connection mappings. Packets for timed out connection mappings at |
| // middleboxes will either lead to: |
| // a) Middleboxes sending TCP RSTs. It's up to higher layers to check for this |
| // and retry. The HTTP network transaction code does this. |
| // b) Middleboxes just drop the unrecognized TCP packet. This leads to the TCP |
| // stack retransmitting packets per TCP stack retransmission timeouts, which |
| // are very high (on the order of seconds). Given the number of |
| // retransmissions required before killing the connection, this can lead to |
| // tens of seconds or even minutes of delay, depending on OS. |
| const int kTCPKeepAliveSeconds = 45; |
| |
| SetTCPKeepAlive(socket_->socket_fd(), true, kTCPKeepAliveSeconds); |
| #endif |
| } |
| |
| int TCPSocketPosix::AllowAddressReuse() { |
| DCHECK(socket_); |
| |
| return SetReuseAddr(socket_->socket_fd(), true); |
| } |
| |
| int TCPSocketPosix::SetReceiveBufferSize(int32_t size) { |
| DCHECK(socket_); |
| |
| return SetSocketReceiveBufferSize(socket_->socket_fd(), size); |
| } |
| |
| int TCPSocketPosix::SetSendBufferSize(int32_t size) { |
| DCHECK(socket_); |
| |
| return SetSocketSendBufferSize(socket_->socket_fd(), size); |
| } |
| |
| bool TCPSocketPosix::SetKeepAlive(bool enable, int delay) { |
| DCHECK(socket_); |
| |
| return SetTCPKeepAlive(socket_->socket_fd(), enable, delay); |
| } |
| |
| bool TCPSocketPosix::SetNoDelay(bool no_delay) { |
| DCHECK(socket_); |
| |
| return SetTCPNoDelay(socket_->socket_fd(), no_delay) == OK; |
| } |
| |
| void TCPSocketPosix::Close() { |
| socket_.reset(); |
| |
| // Record and reset TCP FastOpen state. |
| if (tcp_fastopen_write_attempted_ || |
| tcp_fastopen_status_ == TCP_FASTOPEN_PREVIOUSLY_FAILED) { |
| UMA_HISTOGRAM_ENUMERATION("Net.TcpFastOpenSocketConnection", |
| tcp_fastopen_status_, TCP_FASTOPEN_MAX_VALUE); |
| } |
| use_tcp_fastopen_ = false; |
| tcp_fastopen_connected_ = false; |
| tcp_fastopen_write_attempted_ = false; |
| tcp_fastopen_status_ = TCP_FASTOPEN_STATUS_UNKNOWN; |
| tag_ = SocketTag(); |
| } |
| |
| void TCPSocketPosix::EnableTCPFastOpenIfSupported() { |
| if (!IsTCPFastOpenSupported()) |
| return; |
| |
| // Do not enable TCP FastOpen if it had previously failed. |
| // This check conservatively avoids middleboxes that may blackhole |
| // TCP FastOpen SYN+Data packets; on such a failure, subsequent sockets |
| // should not use TCP FastOpen. |
| if (!g_tcp_fastopen_has_failed) |
| use_tcp_fastopen_ = true; |
| else |
| tcp_fastopen_status_ = TCP_FASTOPEN_PREVIOUSLY_FAILED; |
| } |
| |
| bool TCPSocketPosix::IsValid() const { |
| return socket_ != NULL && socket_->socket_fd() != kInvalidSocket; |
| } |
| |
| void TCPSocketPosix::DetachFromThread() { |
| socket_->DetachFromThread(); |
| } |
| |
| void TCPSocketPosix::StartLoggingMultipleConnectAttempts( |
| const AddressList& addresses) { |
| if (!logging_multiple_connect_attempts_) { |
| logging_multiple_connect_attempts_ = true; |
| LogConnectBegin(addresses); |
| } else { |
| NOTREACHED(); |
| } |
| } |
| |
| void TCPSocketPosix::EndLoggingMultipleConnectAttempts(int net_error) { |
| if (logging_multiple_connect_attempts_) { |
| LogConnectEnd(net_error); |
| logging_multiple_connect_attempts_ = false; |
| } else { |
| NOTREACHED(); |
| } |
| } |
| |
| SocketDescriptor TCPSocketPosix::ReleaseSocketDescriptorForTesting() { |
| SocketDescriptor socket_descriptor = socket_->ReleaseConnectedSocket(); |
| socket_.reset(); |
| return socket_descriptor; |
| } |
| |
| SocketDescriptor TCPSocketPosix::SocketDescriptorForTesting() const { |
| return socket_->socket_fd(); |
| } |
| |
| void TCPSocketPosix::ApplySocketTag(const SocketTag& tag) { |
| if (IsValid() && tag != tag_) { |
| tag.Apply(socket_->socket_fd()); |
| } |
| tag_ = tag; |
| } |
| |
| void TCPSocketPosix::AcceptCompleted( |
| std::unique_ptr<TCPSocketPosix>* tcp_socket, |
| IPEndPoint* address, |
| CompletionOnceCallback callback, |
| int rv) { |
| DCHECK_NE(ERR_IO_PENDING, rv); |
| std::move(callback).Run(HandleAcceptCompleted(tcp_socket, address, rv)); |
| } |
| |
| int TCPSocketPosix::HandleAcceptCompleted( |
| std::unique_ptr<TCPSocketPosix>* tcp_socket, |
| IPEndPoint* address, |
| int rv) { |
| if (rv == OK) |
| rv = BuildTcpSocketPosix(tcp_socket, address); |
| |
| if (rv == OK) { |
| net_log_.EndEvent(NetLogEventType::TCP_ACCEPT, |
| CreateNetLogIPEndPointCallback(address)); |
| } else { |
| net_log_.EndEventWithNetErrorCode(NetLogEventType::TCP_ACCEPT, rv); |
| } |
| |
| return rv; |
| } |
| |
| int TCPSocketPosix::BuildTcpSocketPosix( |
| std::unique_ptr<TCPSocketPosix>* tcp_socket, |
| IPEndPoint* address) { |
| DCHECK(accept_socket_); |
| |
| SockaddrStorage storage; |
| if (accept_socket_->GetPeerAddress(&storage) != OK || |
| !address->FromSockAddr(storage.addr, storage.addr_len)) { |
| accept_socket_.reset(); |
| return ERR_ADDRESS_INVALID; |
| } |
| |
| tcp_socket->reset( |
| new TCPSocketPosix(nullptr, net_log_.net_log(), net_log_.source())); |
| (*tcp_socket)->socket_ = std::move(accept_socket_); |
| return OK; |
| } |
| |
| void TCPSocketPosix::ConnectCompleted(CompletionOnceCallback callback, int rv) { |
| DCHECK_NE(ERR_IO_PENDING, rv); |
| std::move(callback).Run(HandleConnectCompleted(rv)); |
| } |
| |
| int TCPSocketPosix::HandleConnectCompleted(int rv) { |
| SbSocketError socket_error = connect_socket_error_; |
| connect_socket_error_ = kSbSocketOk; |
| // Log the end of this attempt (and any OS error it threw). |
| if (rv != OK) { |
| net_log_.EndEvent(NetLogEventType::TCP_CONNECT_ATTEMPT, |
| NetLog::IntCallback("sb_socket_error", errno)); |
| tag_ = SocketTag(); |
| } else { |
| net_log_.EndEvent(NetLogEventType::TCP_CONNECT_ATTEMPT); |
| NotifySocketPerformanceWatcher(); |
| } |
| |
| // Give a more specific error when the user is offline. |
| if (rv == ERR_ADDRESS_UNREACHABLE && NetworkChangeNotifier::IsOffline()) |
| rv = ERR_INTERNET_DISCONNECTED; |
| |
| if (!logging_multiple_connect_attempts_) |
| LogConnectEnd(rv); |
| |
| return rv; |
| } |
| |
| void TCPSocketPosix::LogConnectBegin(const AddressList& addresses) const { |
| net_log_.BeginEvent(NetLogEventType::TCP_CONNECT, |
| addresses.CreateNetLogCallback()); |
| } |
| |
| void TCPSocketPosix::LogConnectEnd(int net_error) const { |
| if (net_error != OK) { |
| net_log_.EndEventWithNetErrorCode(NetLogEventType::TCP_CONNECT, net_error); |
| return; |
| } |
| |
| SockaddrStorage storage; |
| int rv = socket_->GetLocalAddress(&storage); |
| if (rv != OK) { |
| PLOG(ERROR) << "GetLocalAddress() [rv: " << rv << "] error: "; |
| NOTREACHED(); |
| net_log_.EndEventWithNetErrorCode(NetLogEventType::TCP_CONNECT, rv); |
| return; |
| } |
| |
| net_log_.EndEvent( |
| NetLogEventType::TCP_CONNECT, |
| CreateNetLogSourceAddressCallback(storage.addr, storage.addr_len)); |
| } |
| |
| void TCPSocketPosix::ReadCompleted(const scoped_refptr<IOBuffer>& buf, |
| CompletionOnceCallback callback, |
| int rv) { |
| DCHECK_NE(ERR_IO_PENDING, rv); |
| |
| std::move(callback).Run(HandleReadCompleted(buf.get(), rv)); |
| } |
| |
| void TCPSocketPosix::ReadIfReadyCompleted(CompletionOnceCallback callback, |
| int rv) { |
| DCHECK_NE(ERR_IO_PENDING, rv); |
| DCHECK_GE(OK, rv); |
| |
| HandleReadCompletedHelper(rv); |
| std::move(callback).Run(rv); |
| } |
| |
| int TCPSocketPosix::HandleReadCompleted(IOBuffer* buf, int rv) { |
| HandleReadCompletedHelper(rv); |
| |
| if (rv < 0) |
| return rv; |
| |
| // Notify the watcher only if at least 1 byte was read. |
| if (rv > 0) |
| NotifySocketPerformanceWatcher(); |
| |
| net_log_.AddByteTransferEvent(NetLogEventType::SOCKET_BYTES_RECEIVED, rv, |
| buf->data()); |
| NetworkActivityMonitor::GetInstance()->IncrementBytesReceived(rv); |
| |
| return rv; |
| } |
| |
| void TCPSocketPosix::HandleReadCompletedHelper(int rv) { |
| if (tcp_fastopen_write_attempted_ && !tcp_fastopen_connected_) { |
| // A TCP FastOpen connect-with-write was attempted. This read was a |
| // subsequent read, which either succeeded or failed. If the read |
| // succeeded, the socket is considered connected via TCP FastOpen. |
| // If the read failed, TCP FastOpen is (conservatively) turned off for all |
| // subsequent connections. TCP FastOpen status is recorded in both cases. |
| // TODO (jri): This currently results in conservative behavior, where TCP |
| // FastOpen is turned off on _any_ error. Implement optimizations, |
| // such as turning off TCP FastOpen on more specific errors, and |
| // re-attempting TCP FastOpen after a certain amount of time has passed. |
| if (rv >= 0) |
| tcp_fastopen_connected_ = true; |
| else |
| g_tcp_fastopen_has_failed = true; |
| UpdateTCPFastOpenStatusAfterRead(); |
| } |
| |
| if (rv < 0) { |
| net_log_.AddEvent(NetLogEventType::SOCKET_READ_ERROR, |
| CreateNetLogSocketErrorCallback(rv, errno)); |
| } |
| } |
| |
| void TCPSocketPosix::WriteCompleted(const scoped_refptr<IOBuffer>& buf, |
| CompletionOnceCallback callback, |
| int rv) { |
| DCHECK_NE(ERR_IO_PENDING, rv); |
| std::move(callback).Run(HandleWriteCompleted(buf.get(), rv)); |
| } |
| |
| int TCPSocketPosix::HandleWriteCompleted(IOBuffer* buf, int rv) { |
| if (rv < 0) { |
| if (tcp_fastopen_write_attempted_ && !tcp_fastopen_connected_) { |
| // TCP FastOpen connect-with-write was attempted, and the write failed |
| // for unknown reasons. Record status and (conservatively) turn off |
| // TCP FastOpen for all subsequent connections. |
| // TODO (jri): This currently results in conservative behavior, where TCP |
| // FastOpen is turned off on _any_ error. Implement optimizations, |
| // such as turning off TCP FastOpen on more specific errors, and |
| // re-attempting TCP FastOpen after a certain amount of time has passed. |
| tcp_fastopen_status_ = TCP_FASTOPEN_ERROR; |
| g_tcp_fastopen_has_failed = true; |
| } |
| net_log_.AddEvent(NetLogEventType::SOCKET_WRITE_ERROR, |
| CreateNetLogSocketErrorCallback(rv, errno)); |
| return rv; |
| } |
| |
| // Notify the watcher only if at least 1 byte was written. |
| if (rv > 0) |
| NotifySocketPerformanceWatcher(); |
| |
| net_log_.AddByteTransferEvent(NetLogEventType::SOCKET_BYTES_SENT, rv, |
| buf->data()); |
| NetworkActivityMonitor::GetInstance()->IncrementBytesSent(rv); |
| return rv; |
| } |
| |
| int TCPSocketPosix::TcpFastOpenWrite(IOBuffer* buf, |
| int buf_len, |
| CompletionOnceCallback callback) { |
| SockaddrStorage storage; |
| int rv = socket_->GetPeerAddress(&storage); |
| if (rv != OK) |
| return rv; |
| |
| int flags = 0x20000000; // Magic flag to enable TCP_FASTOPEN. |
| #if defined(OS_LINUX) || defined(OS_ANDROID) |
| // sendto() will fail with EPIPE when the system doesn't implement TCP |
| // FastOpen, and with EOPNOTSUPP when the system implements TCP FastOpen |
| // but it is disabled. Theoretically these shouldn't happen |
| // since the caller should check for system support on startup, but |
| // users may dynamically disable TCP FastOpen via sysctl. |
| flags |= MSG_NOSIGNAL; |
| #endif // defined(OS_LINUX) || defined(OS_ANDROID) |
| rv = HANDLE_EINTR(sendto(socket_->socket_fd(), |
| buf->data(), |
| buf_len, |
| flags, |
| storage.addr, |
| storage.addr_len)); |
| tcp_fastopen_write_attempted_ = true; |
| |
| if (rv >= 0) { |
| tcp_fastopen_status_ = TCP_FASTOPEN_FAST_CONNECT_RETURN; |
| return rv; |
| } |
| |
| DCHECK_NE(EPIPE, errno); |
| |
| // If errno == EINPROGRESS, that means the kernel didn't have a cookie |
| // and would block. The kernel is internally doing a connect() though. |
| // Remap EINPROGRESS to EAGAIN so we treat this the same as our other |
| // asynchronous cases. Note that the user buffer has not been copied to |
| // kernel space. |
| if (errno == EINPROGRESS) { |
| rv = ERR_IO_PENDING; |
| } else { |
| rv = MapSystemError(errno); |
| } |
| |
| if (rv != ERR_IO_PENDING) { |
| // TCP FastOpen connect-with-write was attempted, and the write failed |
| // since TCP FastOpen was not implemented or disabled in the OS. |
| // Record status and turn off TCP FastOpen for all subsequent connections. |
| // TODO (jri): This is almost certainly too conservative, since it blanket |
| // turns off TCP FastOpen on any write error. Two things need to be done |
| // here: (i) record a histogram of write errors; in particular, record |
| // occurrences of EOPNOTSUPP and EPIPE, and (ii) afterwards, consider |
| // turning off TCP FastOpen on more specific errors. |
| tcp_fastopen_status_ = TCP_FASTOPEN_ERROR; |
| g_tcp_fastopen_has_failed = true; |
| return rv; |
| } |
| |
| tcp_fastopen_status_ = TCP_FASTOPEN_SLOW_CONNECT_RETURN; |
| return socket_->WaitForWrite(buf, buf_len, std::move(callback)); |
| } |
| |
| void TCPSocketPosix::NotifySocketPerformanceWatcher() { |
| #if defined(HAVE_TCP_INFO) |
| // Check if |socket_performance_watcher_| is interested in receiving a RTT |
| // update notification. |
| if (!socket_performance_watcher_ || |
| !socket_performance_watcher_->ShouldNotifyUpdatedRTT()) { |
| return; |
| } |
| |
| base::TimeDelta rtt = GetTransportRtt(socket_->socket_fd()); |
| if (rtt.is_zero()) |
| return; |
| |
| socket_performance_watcher_->OnUpdatedRTTAvailable(rtt); |
| #endif // defined(TCP_INFO) |
| } |
| |
| void TCPSocketPosix::UpdateTCPFastOpenStatusAfterRead() { |
| DCHECK(tcp_fastopen_status_ == TCP_FASTOPEN_FAST_CONNECT_RETURN || |
| tcp_fastopen_status_ == TCP_FASTOPEN_SLOW_CONNECT_RETURN); |
| |
| if (tcp_fastopen_write_attempted_ && !tcp_fastopen_connected_) { |
| // TCP FastOpen connect-with-write was attempted, and failed. |
| tcp_fastopen_status_ = |
| (tcp_fastopen_status_ == TCP_FASTOPEN_FAST_CONNECT_RETURN ? |
| TCP_FASTOPEN_FAST_CONNECT_READ_FAILED : |
| TCP_FASTOPEN_SLOW_CONNECT_READ_FAILED); |
| return; |
| } |
| |
| bool getsockopt_success = false; |
| bool server_acked_syn_data = false; |
| #if defined(HAVE_TCP_INFO) |
| // Probe to see the if the socket used TCP FastOpen. |
| getsockopt_success = |
| GetServerAckedDataInSyn(socket_->socket_fd(), &server_acked_syn_data); |
| #endif // defined(TCP_INFO) |
| |
| if (getsockopt_success) { |
| if (tcp_fastopen_status_ == TCP_FASTOPEN_FAST_CONNECT_RETURN) { |
| tcp_fastopen_status_ = |
| (server_acked_syn_data ? TCP_FASTOPEN_SYN_DATA_ACK |
| : TCP_FASTOPEN_SYN_DATA_NACK); |
| } else { |
| tcp_fastopen_status_ = |
| (server_acked_syn_data ? TCP_FASTOPEN_NO_SYN_DATA_ACK |
| : TCP_FASTOPEN_NO_SYN_DATA_NACK); |
| } |
| } else { |
| tcp_fastopen_status_ = |
| (tcp_fastopen_status_ == TCP_FASTOPEN_FAST_CONNECT_RETURN ? |
| TCP_FASTOPEN_SYN_DATA_GETSOCKOPT_FAILED : |
| TCP_FASTOPEN_NO_SYN_DATA_GETSOCKOPT_FAILED); |
| } |
| } |
| |
| bool TCPSocketPosix::GetEstimatedRoundTripTime(base::TimeDelta* out_rtt) const { |
| DCHECK(out_rtt); |
| if (!socket_) |
| return false; |
| |
| #if defined(HAVE_TCP_INFO) |
| base::TimeDelta rtt = GetTransportRtt(socket_->socket_fd()); |
| if (rtt.is_zero()) |
| return false; |
| *out_rtt = rtt; |
| return true; |
| #endif // defined(TCP_INFO) |
| return false; |
| } |
| |
| } // namespace net |