// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/socket/tcp_socket.h" #include #include #include #include "base/atomicops.h" #include "base/bind.h" #include "base/files/file_path.h" #include "base/files/file_util.h" #include "base/lazy_instance.h" #include "base/logging.h" #include "base/metrics/histogram_macros.h" #include "base/posix/eintr_wrapper.h" #include "base/strings/string_number_conversions.h" #include "base/strings/string_piece.h" #include "base/task_scheduler/post_task.h" #include "base/time/time.h" #include "build/build_config.h" #include "net/base/address_list.h" #include "net/base/io_buffer.h" #include "net/base/ip_endpoint.h" #include "net/base/net_errors.h" #include "net/base/network_activity_monitor.h" #include "net/base/network_change_notifier.h" #include "net/base/sockaddr_storage.h" #include "net/http/http_util.h" #include "net/log/net_log.h" #include "net/log/net_log_event_type.h" #include "net/log/net_log_source.h" #include "net/log/net_log_source_type.h" #include "net/socket/socket_net_log_params.h" #include "net/socket/socket_options.h" #include "net/socket/socket_posix.h" // If we don't have a definition for TCPI_OPT_SYN_DATA, create one. #if !defined(TCPI_OPT_SYN_DATA) #define TCPI_OPT_SYN_DATA 32 #endif // Fuchsia defines TCP_INFO, but it's not implemented. // TODO(crbug.com/758294): Enable TCP_INFO on Fuchsia once it's implemented // there (see NET-160). #if defined(TCP_INFO) && !defined(OS_FUCHSIA) #define HAVE_TCP_INFO #endif namespace net { namespace { // True if TCP FastOpen connect-with-write has failed at least once. bool g_tcp_fastopen_has_failed = false; // SetTCPKeepAlive sets SO_KEEPALIVE. bool SetTCPKeepAlive(int fd, bool enable, int delay) { // Enabling TCP keepalives is the same on all platforms. int on = enable ? 1 : 0; if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &on, sizeof(on))) { PLOG(ERROR) << "Failed to set SO_KEEPALIVE on fd: " << fd; return false; } // If we disabled TCP keep alive, our work is done here. if (!enable) return true; #if defined(OS_LINUX) || defined(OS_ANDROID) // Setting the keepalive interval varies by platform. // Set seconds until first TCP keep alive. if (setsockopt(fd, SOL_TCP, TCP_KEEPIDLE, &delay, sizeof(delay))) { PLOG(ERROR) << "Failed to set TCP_KEEPIDLE on fd: " << fd; return false; } // Set seconds between TCP keep alives. if (setsockopt(fd, SOL_TCP, TCP_KEEPINTVL, &delay, sizeof(delay))) { PLOG(ERROR) << "Failed to set TCP_KEEPINTVL on fd: " << fd; return false; } #elif defined(OS_MACOSX) || defined(OS_IOS) if (setsockopt(fd, IPPROTO_TCP, TCP_KEEPALIVE, &delay, sizeof(delay))) { PLOG(ERROR) << "Failed to set TCP_KEEPALIVE on fd: " << fd; return false; } #endif return true; } #if defined(OS_LINUX) || defined(OS_ANDROID) // Probes if TCP FastOpen is supported, on another thread. class FastOpenProbe { public: // Returns true if TCP FastOpen suport was detected. Returns false if it was // not detected, or the probe has not yet completed. bool IsTCPFastOpenSupported() const { return base::subtle::NoBarrier_Load(&tcp_fastopen_supported_) != 0; } private: friend struct base::LazyInstanceTraitsBase; FastOpenProbe() { base::PostTaskWithTraits( FROM_HERE, {base::MayBlock(), base::TaskShutdownBehavior::CONTINUE_ON_SHUTDOWN}, base::Bind(&FastOpenProbe::DetectTCPFastOpenSupport, base::Unretained(this))); } ~FastOpenProbe() {} // Checks if the kernel supports TCP FastOpen. Called only once, on startup. void DetectTCPFastOpenSupport() { // Since this method should only be called once, and is the only thing that // modifies |tcp_fastopen_supported_|, no need for this read to be atomic. DCHECK_EQ(tcp_fastopen_supported_, 0); const base::FilePath::CharType kTCPFastOpenProcFilePath[] = "/proc/sys/net/ipv4/tcp_fastopen"; std::string system_supports_tcp_fastopen; if (!base::ReadFileToString(base::FilePath(kTCPFastOpenProcFilePath), &system_supports_tcp_fastopen)) { return; } // The read value from /proc will be set in its least significant bit if // TCP FastOpen is enabled. int read_int = 0; base::StringToInt( HttpUtil::TrimLWS(base::StringPiece(system_supports_tcp_fastopen)), &read_int); if ((read_int & 0x1) != 1) return; base::subtle::NoBarrier_Store(&tcp_fastopen_supported_, 1); } base::subtle::Atomic32 tcp_fastopen_supported_ = 0; DISALLOW_COPY_AND_ASSIGN(FastOpenProbe); }; base::LazyInstance::Leaky g_fast_open_probe = LAZY_INSTANCE_INITIALIZER; #endif // defined(OS_LINUX) || defined(OS_ANDROID) #if defined(HAVE_TCP_INFO) bool GetTcpInfo(SocketDescriptor fd, tcp_info* info) { socklen_t info_len = sizeof(tcp_info); return getsockopt(fd, IPPROTO_TCP, TCP_INFO, info, &info_len) == 0 && info_len == sizeof(tcp_info); } #endif // defined(TCP_INFO) } // namespace //----------------------------------------------------------------------------- bool IsTCPFastOpenSupported() { #if defined(OS_LINUX) || defined(OS_ANDROID) return g_fast_open_probe.Get().IsTCPFastOpenSupported(); #else return false; #endif } TCPSocketPosix::TCPSocketPosix( std::unique_ptr socket_performance_watcher, NetLog* net_log, const NetLogSource& source) : socket_performance_watcher_(std::move(socket_performance_watcher)), use_tcp_fastopen_(false), tcp_fastopen_write_attempted_(false), tcp_fastopen_connected_(false), tcp_fastopen_status_(TCP_FASTOPEN_STATUS_UNKNOWN), logging_multiple_connect_attempts_(false), net_log_(NetLogWithSource::Make(net_log, NetLogSourceType::SOCKET)) { net_log_.BeginEvent(NetLogEventType::SOCKET_ALIVE, source.ToEventParametersCallback()); } TCPSocketPosix::~TCPSocketPosix() { net_log_.EndEvent(NetLogEventType::SOCKET_ALIVE); Close(); } int TCPSocketPosix::Open(AddressFamily family) { DCHECK(!socket_); socket_.reset(new SocketPosix); int rv = socket_->Open(ConvertAddressFamily(family)); if (rv != OK) socket_.reset(); return rv; } int TCPSocketPosix::AdoptConnectedSocket(SocketDescriptor socket, const IPEndPoint& peer_address) { DCHECK(!socket_); SockaddrStorage storage; if (!peer_address.ToSockAddr(storage.addr, &storage.addr_len) && // For backward compatibility, allows the empty address. !(peer_address == IPEndPoint())) { return ERR_ADDRESS_INVALID; } socket_.reset(new SocketPosix); int rv = socket_->AdoptConnectedSocket(socket, storage); if (rv != OK) socket_.reset(); return rv; } int TCPSocketPosix::AdoptUnconnectedSocket(SocketDescriptor socket) { DCHECK(!socket_); socket_.reset(new SocketPosix); int rv = socket_->AdoptUnconnectedSocket(socket); if (rv != OK) socket_.reset(); return rv; } int TCPSocketPosix::Bind(const IPEndPoint& address) { DCHECK(socket_); SockaddrStorage storage; if (!address.ToSockAddr(storage.addr, &storage.addr_len)) return ERR_ADDRESS_INVALID; return socket_->Bind(storage); } int TCPSocketPosix::Listen(int backlog) { DCHECK(socket_); return socket_->Listen(backlog); } int TCPSocketPosix::Accept(std::unique_ptr* tcp_socket, IPEndPoint* address, const CompletionCallback& callback) { DCHECK(tcp_socket); DCHECK(!callback.is_null()); DCHECK(socket_); DCHECK(!accept_socket_); net_log_.BeginEvent(NetLogEventType::TCP_ACCEPT); int rv = socket_->Accept( &accept_socket_, base::Bind(&TCPSocketPosix::AcceptCompleted, base::Unretained(this), tcp_socket, address, callback)); if (rv != ERR_IO_PENDING) rv = HandleAcceptCompleted(tcp_socket, address, rv); return rv; } int TCPSocketPosix::Connect(const IPEndPoint& address, const CompletionCallback& callback) { DCHECK(socket_); if (!logging_multiple_connect_attempts_) LogConnectBegin(AddressList(address)); net_log_.BeginEvent(NetLogEventType::TCP_CONNECT_ATTEMPT, CreateNetLogIPEndPointCallback(&address)); SockaddrStorage storage; if (!address.ToSockAddr(storage.addr, &storage.addr_len)) return ERR_ADDRESS_INVALID; if (use_tcp_fastopen_) { // With TCP FastOpen, we pretend that the socket is connected. DCHECK(!tcp_fastopen_write_attempted_); socket_->SetPeerAddress(storage); return OK; } int rv = socket_->Connect(storage, base::Bind(&TCPSocketPosix::ConnectCompleted, base::Unretained(this), callback)); if (rv != ERR_IO_PENDING) rv = HandleConnectCompleted(rv); return rv; } bool TCPSocketPosix::IsConnected() const { if (!socket_) return false; if (use_tcp_fastopen_ && !tcp_fastopen_write_attempted_ && socket_->HasPeerAddress()) { // With TCP FastOpen, we pretend that the socket is connected. // This allows GetPeerAddress() to return peer_address_. return true; } return socket_->IsConnected(); } bool TCPSocketPosix::IsConnectedAndIdle() const { // TODO(wtc): should we also handle the TCP FastOpen case here, // as we do in IsConnected()? return socket_ && socket_->IsConnectedAndIdle(); } int TCPSocketPosix::Read(IOBuffer* buf, int buf_len, const CompletionCallback& callback) { DCHECK(socket_); DCHECK(!callback.is_null()); int rv = socket_->Read( buf, buf_len, base::Bind(&TCPSocketPosix::ReadCompleted, // Grab a reference to |buf| so that ReadCompleted() can still // use it when Read() completes, as otherwise, this transfers // ownership of buf to socket. base::Unretained(this), base::WrapRefCounted(buf), callback)); if (rv != ERR_IO_PENDING) rv = HandleReadCompleted(buf, rv); return rv; } int TCPSocketPosix::ReadIfReady(IOBuffer* buf, int buf_len, const CompletionCallback& callback) { DCHECK(socket_); DCHECK(!callback.is_null()); int rv = socket_->ReadIfReady(buf, buf_len, base::Bind(&TCPSocketPosix::ReadIfReadyCompleted, base::Unretained(this), callback)); if (rv != ERR_IO_PENDING) rv = HandleReadCompleted(buf, rv); return rv; } int TCPSocketPosix::Write(IOBuffer* buf, int buf_len, const CompletionCallback& callback) { DCHECK(socket_); DCHECK(!callback.is_null()); CompletionCallback write_callback = base::Bind(&TCPSocketPosix::WriteCompleted, // Grab a reference to |buf| so that WriteCompleted() can still // use it when Write() completes, as otherwise, this transfers // ownership of buf to socket. base::Unretained(this), base::WrapRefCounted(buf), callback); int rv; if (use_tcp_fastopen_ && !tcp_fastopen_write_attempted_) { rv = TcpFastOpenWrite(buf, buf_len, write_callback); } else { rv = socket_->Write(buf, buf_len, write_callback); } if (rv != ERR_IO_PENDING) rv = HandleWriteCompleted(buf, rv); return rv; } int TCPSocketPosix::GetLocalAddress(IPEndPoint* address) const { DCHECK(address); if (!socket_) return ERR_SOCKET_NOT_CONNECTED; SockaddrStorage storage; int rv = socket_->GetLocalAddress(&storage); if (rv != OK) return rv; if (!address->FromSockAddr(storage.addr, storage.addr_len)) return ERR_ADDRESS_INVALID; return OK; } int TCPSocketPosix::GetPeerAddress(IPEndPoint* address) const { DCHECK(address); if (!IsConnected()) return ERR_SOCKET_NOT_CONNECTED; SockaddrStorage storage; int rv = socket_->GetPeerAddress(&storage); if (rv != OK) return rv; if (!address->FromSockAddr(storage.addr, storage.addr_len)) return ERR_ADDRESS_INVALID; return OK; } int TCPSocketPosix::SetDefaultOptionsForServer() { DCHECK(socket_); return AllowAddressReuse(); } void TCPSocketPosix::SetDefaultOptionsForClient() { DCHECK(socket_); // This mirrors the behaviour on Windows. See the comment in // tcp_socket_win.cc after searching for "NODELAY". // If SetTCPNoDelay fails, we don't care. SetTCPNoDelay(socket_->socket_fd(), true); #if !defined(OS_ANDROID) && !defined(OS_IOS) && !defined(OS_FUCHSIA) // TCP keep alive wakes up the radio, which is expensive on mobile. // It's also not implemented on Fuchsia. Do not enable it there. // TODO(crbug.com/758706): Consider enabling keep-alive on Fuchsia. // // It's useful to prevent TCP middleboxes from timing out // connection mappings. Packets for timed out connection mappings at // middleboxes will either lead to: // a) Middleboxes sending TCP RSTs. It's up to higher layers to check for this // and retry. The HTTP network transaction code does this. // b) Middleboxes just drop the unrecognized TCP packet. This leads to the TCP // stack retransmitting packets per TCP stack retransmission timeouts, which // are very high (on the order of seconds). Given the number of // retransmissions required before killing the connection, this can lead to // tens of seconds or even minutes of delay, depending on OS. const int kTCPKeepAliveSeconds = 45; SetTCPKeepAlive(socket_->socket_fd(), true, kTCPKeepAliveSeconds); #endif } int TCPSocketPosix::AllowAddressReuse() { DCHECK(socket_); return SetReuseAddr(socket_->socket_fd(), true); } int TCPSocketPosix::SetReceiveBufferSize(int32_t size) { DCHECK(socket_); return SetSocketReceiveBufferSize(socket_->socket_fd(), size); } int TCPSocketPosix::SetSendBufferSize(int32_t size) { DCHECK(socket_); return SetSocketSendBufferSize(socket_->socket_fd(), size); } bool TCPSocketPosix::SetKeepAlive(bool enable, int delay) { DCHECK(socket_); return SetTCPKeepAlive(socket_->socket_fd(), enable, delay); } bool TCPSocketPosix::SetNoDelay(bool no_delay) { DCHECK(socket_); return SetTCPNoDelay(socket_->socket_fd(), no_delay) == OK; } void TCPSocketPosix::Close() { socket_.reset(); // Record and reset TCP FastOpen state. if (tcp_fastopen_write_attempted_ || tcp_fastopen_status_ == TCP_FASTOPEN_PREVIOUSLY_FAILED) { UMA_HISTOGRAM_ENUMERATION("Net.TcpFastOpenSocketConnection", tcp_fastopen_status_, TCP_FASTOPEN_MAX_VALUE); } use_tcp_fastopen_ = false; tcp_fastopen_connected_ = false; tcp_fastopen_write_attempted_ = false; tcp_fastopen_status_ = TCP_FASTOPEN_STATUS_UNKNOWN; } void TCPSocketPosix::EnableTCPFastOpenIfSupported() { if (!IsTCPFastOpenSupported()) return; // Do not enable TCP FastOpen if it had previously failed. // This check conservatively avoids middleboxes that may blackhole // TCP FastOpen SYN+Data packets; on such a failure, subsequent sockets // should not use TCP FastOpen. if (!g_tcp_fastopen_has_failed) use_tcp_fastopen_ = true; else tcp_fastopen_status_ = TCP_FASTOPEN_PREVIOUSLY_FAILED; } bool TCPSocketPosix::IsValid() const { return socket_ != NULL && socket_->socket_fd() != kInvalidSocket; } void TCPSocketPosix::DetachFromThread() { socket_->DetachFromThread(); } void TCPSocketPosix::StartLoggingMultipleConnectAttempts( const AddressList& addresses) { if (!logging_multiple_connect_attempts_) { logging_multiple_connect_attempts_ = true; LogConnectBegin(addresses); } else { NOTREACHED(); } } void TCPSocketPosix::EndLoggingMultipleConnectAttempts(int net_error) { if (logging_multiple_connect_attempts_) { LogConnectEnd(net_error); logging_multiple_connect_attempts_ = false; } else { NOTREACHED(); } } SocketDescriptor TCPSocketPosix::ReleaseSocketDescriptorForTesting() { SocketDescriptor socket_descriptor = socket_->ReleaseConnectedSocket(); socket_.reset(); return socket_descriptor; } void TCPSocketPosix::AcceptCompleted( std::unique_ptr* tcp_socket, IPEndPoint* address, const CompletionCallback& callback, int rv) { DCHECK_NE(ERR_IO_PENDING, rv); callback.Run(HandleAcceptCompleted(tcp_socket, address, rv)); } int TCPSocketPosix::HandleAcceptCompleted( std::unique_ptr* tcp_socket, IPEndPoint* address, int rv) { if (rv == OK) rv = BuildTcpSocketPosix(tcp_socket, address); if (rv == OK) { net_log_.EndEvent(NetLogEventType::TCP_ACCEPT, CreateNetLogIPEndPointCallback(address)); } else { net_log_.EndEventWithNetErrorCode(NetLogEventType::TCP_ACCEPT, rv); } return rv; } int TCPSocketPosix::BuildTcpSocketPosix( std::unique_ptr* tcp_socket, IPEndPoint* address) { DCHECK(accept_socket_); SockaddrStorage storage; if (accept_socket_->GetPeerAddress(&storage) != OK || !address->FromSockAddr(storage.addr, storage.addr_len)) { accept_socket_.reset(); return ERR_ADDRESS_INVALID; } tcp_socket->reset( new TCPSocketPosix(nullptr, net_log_.net_log(), net_log_.source())); (*tcp_socket)->socket_ = std::move(accept_socket_); return OK; } void TCPSocketPosix::ConnectCompleted(const CompletionCallback& callback, int rv) { DCHECK_NE(ERR_IO_PENDING, rv); callback.Run(HandleConnectCompleted(rv)); } int TCPSocketPosix::HandleConnectCompleted(int rv) { // Log the end of this attempt (and any OS error it threw). if (rv != OK) { net_log_.EndEvent(NetLogEventType::TCP_CONNECT_ATTEMPT, NetLog::IntCallback("os_error", errno)); } else { net_log_.EndEvent(NetLogEventType::TCP_CONNECT_ATTEMPT); NotifySocketPerformanceWatcher(); } // Give a more specific error when the user is offline. if (rv == ERR_ADDRESS_UNREACHABLE && NetworkChangeNotifier::IsOffline()) rv = ERR_INTERNET_DISCONNECTED; if (!logging_multiple_connect_attempts_) LogConnectEnd(rv); return rv; } void TCPSocketPosix::LogConnectBegin(const AddressList& addresses) const { net_log_.BeginEvent(NetLogEventType::TCP_CONNECT, addresses.CreateNetLogCallback()); } void TCPSocketPosix::LogConnectEnd(int net_error) const { if (net_error != OK) { net_log_.EndEventWithNetErrorCode(NetLogEventType::TCP_CONNECT, net_error); return; } SockaddrStorage storage; int rv = socket_->GetLocalAddress(&storage); if (rv != OK) { PLOG(ERROR) << "GetLocalAddress() [rv: " << rv << "] error: "; NOTREACHED(); net_log_.EndEventWithNetErrorCode(NetLogEventType::TCP_CONNECT, rv); return; } net_log_.EndEvent( NetLogEventType::TCP_CONNECT, CreateNetLogSourceAddressCallback(storage.addr, storage.addr_len)); } void TCPSocketPosix::ReadCompleted(const scoped_refptr& buf, const CompletionCallback& callback, int rv) { DCHECK_NE(ERR_IO_PENDING, rv); callback.Run(HandleReadCompleted(buf.get(), rv)); } void TCPSocketPosix::ReadIfReadyCompleted(const CompletionCallback& callback, int rv) { DCHECK_NE(ERR_IO_PENDING, rv); DCHECK_GE(OK, rv); HandleReadCompletedHelper(rv); callback.Run(rv); } int TCPSocketPosix::HandleReadCompleted(IOBuffer* buf, int rv) { HandleReadCompletedHelper(rv); if (rv < 0) return rv; // Notify the watcher only if at least 1 byte was read. if (rv > 0) NotifySocketPerformanceWatcher(); net_log_.AddByteTransferEvent(NetLogEventType::SOCKET_BYTES_RECEIVED, rv, buf->data()); NetworkActivityMonitor::GetInstance()->IncrementBytesReceived(rv); return rv; } void TCPSocketPosix::HandleReadCompletedHelper(int rv) { if (tcp_fastopen_write_attempted_ && !tcp_fastopen_connected_) { // A TCP FastOpen connect-with-write was attempted. This read was a // subsequent read, which either succeeded or failed. If the read // succeeded, the socket is considered connected via TCP FastOpen. // If the read failed, TCP FastOpen is (conservatively) turned off for all // subsequent connections. TCP FastOpen status is recorded in both cases. // TODO (jri): This currently results in conservative behavior, where TCP // FastOpen is turned off on _any_ error. Implement optimizations, // such as turning off TCP FastOpen on more specific errors, and // re-attempting TCP FastOpen after a certain amount of time has passed. if (rv >= 0) tcp_fastopen_connected_ = true; else g_tcp_fastopen_has_failed = true; UpdateTCPFastOpenStatusAfterRead(); } if (rv < 0) { net_log_.AddEvent(NetLogEventType::SOCKET_READ_ERROR, CreateNetLogSocketErrorCallback(rv, errno)); } } void TCPSocketPosix::WriteCompleted(const scoped_refptr& buf, const CompletionCallback& callback, int rv) { DCHECK_NE(ERR_IO_PENDING, rv); callback.Run(HandleWriteCompleted(buf.get(), rv)); } int TCPSocketPosix::HandleWriteCompleted(IOBuffer* buf, int rv) { if (rv < 0) { if (tcp_fastopen_write_attempted_ && !tcp_fastopen_connected_) { // TCP FastOpen connect-with-write was attempted, and the write failed // for unknown reasons. Record status and (conservatively) turn off // TCP FastOpen for all subsequent connections. // TODO (jri): This currently results in conservative behavior, where TCP // FastOpen is turned off on _any_ error. Implement optimizations, // such as turning off TCP FastOpen on more specific errors, and // re-attempting TCP FastOpen after a certain amount of time has passed. tcp_fastopen_status_ = TCP_FASTOPEN_ERROR; g_tcp_fastopen_has_failed = true; } net_log_.AddEvent(NetLogEventType::SOCKET_WRITE_ERROR, CreateNetLogSocketErrorCallback(rv, errno)); return rv; } // Notify the watcher only if at least 1 byte was written. if (rv > 0) NotifySocketPerformanceWatcher(); net_log_.AddByteTransferEvent(NetLogEventType::SOCKET_BYTES_SENT, rv, buf->data()); NetworkActivityMonitor::GetInstance()->IncrementBytesSent(rv); return rv; } int TCPSocketPosix::TcpFastOpenWrite(IOBuffer* buf, int buf_len, const CompletionCallback& callback) { SockaddrStorage storage; int rv = socket_->GetPeerAddress(&storage); if (rv != OK) return rv; int flags = 0x20000000; // Magic flag to enable TCP_FASTOPEN. #if defined(OS_LINUX) || defined(OS_ANDROID) // sendto() will fail with EPIPE when the system doesn't implement TCP // FastOpen, and with EOPNOTSUPP when the system implements TCP FastOpen // but it is disabled. Theoretically these shouldn't happen // since the caller should check for system support on startup, but // users may dynamically disable TCP FastOpen via sysctl. flags |= MSG_NOSIGNAL; #endif // defined(OS_LINUX) || defined(OS_ANDROID) rv = HANDLE_EINTR(sendto(socket_->socket_fd(), buf->data(), buf_len, flags, storage.addr, storage.addr_len)); tcp_fastopen_write_attempted_ = true; if (rv >= 0) { tcp_fastopen_status_ = TCP_FASTOPEN_FAST_CONNECT_RETURN; return rv; } DCHECK_NE(EPIPE, errno); // If errno == EINPROGRESS, that means the kernel didn't have a cookie // and would block. The kernel is internally doing a connect() though. // Remap EINPROGRESS to EAGAIN so we treat this the same as our other // asynchronous cases. Note that the user buffer has not been copied to // kernel space. if (errno == EINPROGRESS) { rv = ERR_IO_PENDING; } else { rv = MapSystemError(errno); } if (rv != ERR_IO_PENDING) { // TCP FastOpen connect-with-write was attempted, and the write failed // since TCP FastOpen was not implemented or disabled in the OS. // Record status and turn off TCP FastOpen for all subsequent connections. // TODO (jri): This is almost certainly too conservative, since it blanket // turns off TCP FastOpen on any write error. Two things need to be done // here: (i) record a histogram of write errors; in particular, record // occurrences of EOPNOTSUPP and EPIPE, and (ii) afterwards, consider // turning off TCP FastOpen on more specific errors. tcp_fastopen_status_ = TCP_FASTOPEN_ERROR; g_tcp_fastopen_has_failed = true; return rv; } tcp_fastopen_status_ = TCP_FASTOPEN_SLOW_CONNECT_RETURN; return socket_->WaitForWrite(buf, buf_len, callback); } void TCPSocketPosix::NotifySocketPerformanceWatcher() { #if defined(HAVE_TCP_INFO) // Check if |socket_performance_watcher_| is interested in receiving a RTT // update notification. if (!socket_performance_watcher_ || !socket_performance_watcher_->ShouldNotifyUpdatedRTT()) { return; } tcp_info info; if (!GetTcpInfo(socket_->socket_fd(), &info)) return; // Only notify the |socket_performance_watcher_| if the RTT in |tcp_info| // struct was populated. A value of 0 may be valid in certain cases // (on very fast networks), but it is discarded. This means that // some of the RTT values may be missed, but the values that are kept are // guaranteed to be correct. if (info.tcpi_rtt == 0 && info.tcpi_rttvar == 0) return; socket_performance_watcher_->OnUpdatedRTTAvailable( base::TimeDelta::FromMicroseconds(info.tcpi_rtt)); #endif // defined(TCP_INFO) } void TCPSocketPosix::UpdateTCPFastOpenStatusAfterRead() { DCHECK(tcp_fastopen_status_ == TCP_FASTOPEN_FAST_CONNECT_RETURN || tcp_fastopen_status_ == TCP_FASTOPEN_SLOW_CONNECT_RETURN); if (tcp_fastopen_write_attempted_ && !tcp_fastopen_connected_) { // TCP FastOpen connect-with-write was attempted, and failed. tcp_fastopen_status_ = (tcp_fastopen_status_ == TCP_FASTOPEN_FAST_CONNECT_RETURN ? TCP_FASTOPEN_FAST_CONNECT_READ_FAILED : TCP_FASTOPEN_SLOW_CONNECT_READ_FAILED); return; } bool getsockopt_success = false; bool server_acked_data = false; #if defined(HAVE_TCP_INFO) // Probe to see the if the socket used TCP FastOpen. tcp_info info; getsockopt_success = GetTcpInfo(socket_->socket_fd(), &info); server_acked_data = getsockopt_success && (info.tcpi_options & TCPI_OPT_SYN_DATA); #endif // defined(TCP_INFO) if (getsockopt_success) { if (tcp_fastopen_status_ == TCP_FASTOPEN_FAST_CONNECT_RETURN) { tcp_fastopen_status_ = (server_acked_data ? TCP_FASTOPEN_SYN_DATA_ACK : TCP_FASTOPEN_SYN_DATA_NACK); } else { tcp_fastopen_status_ = (server_acked_data ? TCP_FASTOPEN_NO_SYN_DATA_ACK : TCP_FASTOPEN_NO_SYN_DATA_NACK); } } else { tcp_fastopen_status_ = (tcp_fastopen_status_ == TCP_FASTOPEN_FAST_CONNECT_RETURN ? TCP_FASTOPEN_SYN_DATA_GETSOCKOPT_FAILED : TCP_FASTOPEN_NO_SYN_DATA_GETSOCKOPT_FAILED); } } bool TCPSocketPosix::GetEstimatedRoundTripTime(base::TimeDelta* out_rtt) const { DCHECK(out_rtt); if (!socket_) return false; #if defined(HAVE_TCP_INFO) tcp_info info; if (GetTcpInfo(socket_->socket_fd(), &info)) { // tcpi_rtt is zero when the kernel doesn't have an RTT estimate, // and possibly in other cases such as connections to localhost. if (info.tcpi_rtt > 0) { *out_rtt = base::TimeDelta::FromMicroseconds(info.tcpi_rtt); return true; } } #endif // defined(TCP_INFO) return false; } } // namespace net