Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(546)

Side by Side Diff: net/socket/tcp_client_socket_libevent.cc

Issue 23454010: POSIX only: Move client socket functionality from TCPClientSocket into TCPSocket. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/socket/tcp_client_socket_libevent.h ('k') | net/socket/tcp_server_socket.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/socket/tcp_client_socket.h"
6
7 #include <errno.h>
8 #include <fcntl.h>
9 #include <netdb.h>
10 #include <sys/socket.h>
11 #include <netinet/tcp.h>
12 #if defined(OS_POSIX)
13 #include <netinet/in.h>
14 #endif
15
16 #include "base/logging.h"
17 #include "base/message_loop/message_loop.h"
18 #include "base/metrics/histogram.h"
19 #include "base/metrics/stats_counters.h"
20 #include "base/posix/eintr_wrapper.h"
21 #include "base/strings/string_util.h"
22 #include "net/base/connection_type_histograms.h"
23 #include "net/base/io_buffer.h"
24 #include "net/base/ip_endpoint.h"
25 #include "net/base/net_errors.h"
26 #include "net/base/net_log.h"
27 #include "net/base/net_util.h"
28 #include "net/base/network_change_notifier.h"
29 #include "net/socket/socket_descriptor.h"
30 #include "net/socket/socket_net_log_params.h"
31
32 // If we don't have a definition for TCPI_OPT_SYN_DATA, create one.
33 #ifndef TCPI_OPT_SYN_DATA
34 #define TCPI_OPT_SYN_DATA 32
35 #endif
36
37 namespace net {
38
39 namespace {
40
41 const int kTCPKeepAliveSeconds = 45;
42
43 // SetTCPNoDelay turns on/off buffering in the kernel. By default, TCP sockets
44 // will wait up to 200ms for more data to complete a packet before transmitting.
45 // After calling this function, the kernel will not wait. See TCP_NODELAY in
46 // `man 7 tcp`.
47 bool SetTCPNoDelay(int fd, bool no_delay) {
48 int on = no_delay ? 1 : 0;
49 int error = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &on,
50 sizeof(on));
51 return error == 0;
52 }
53
54 // SetTCPKeepAlive sets SO_KEEPALIVE.
55 bool SetTCPKeepAlive(int fd, bool enable, int delay) {
56 int on = enable ? 1 : 0;
57 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &on, sizeof(on))) {
58 PLOG(ERROR) << "Failed to set SO_KEEPALIVE on fd: " << fd;
59 return false;
60 }
61 #if defined(OS_LINUX) || defined(OS_ANDROID)
62 // Set seconds until first TCP keep alive.
63 if (setsockopt(fd, SOL_TCP, TCP_KEEPIDLE, &delay, sizeof(delay))) {
64 PLOG(ERROR) << "Failed to set TCP_KEEPIDLE on fd: " << fd;
65 return false;
66 }
67 // Set seconds between TCP keep alives.
68 if (setsockopt(fd, SOL_TCP, TCP_KEEPINTVL, &delay, sizeof(delay))) {
69 PLOG(ERROR) << "Failed to set TCP_KEEPINTVL on fd: " << fd;
70 return false;
71 }
72 #endif
73 return true;
74 }
75
76 // Sets socket parameters. Returns the OS error code (or 0 on
77 // success).
78 int SetupSocket(int socket) {
79 if (SetNonBlocking(socket))
80 return errno;
81
82 // This mirrors the behaviour on Windows. See the comment in
83 // tcp_client_socket_win.cc after searching for "NODELAY".
84 SetTCPNoDelay(socket, true); // If SetTCPNoDelay fails, we don't care.
85 SetTCPKeepAlive(socket, true, kTCPKeepAliveSeconds);
86
87 return 0;
88 }
89
90 // Creates a new socket and sets default parameters for it. Returns
91 // the OS error code (or 0 on success).
92 int CreateSocket(int family, int* socket) {
93 *socket = CreatePlatformSocket(family, SOCK_STREAM, IPPROTO_TCP);
94 if (*socket == kInvalidSocket)
95 return errno;
96 int error = SetupSocket(*socket);
97 if (error) {
98 if (HANDLE_EINTR(close(*socket)) < 0)
99 PLOG(ERROR) << "close";
100 *socket = kInvalidSocket;
101 return error;
102 }
103 return 0;
104 }
105
106 int MapConnectError(int os_error) {
107 switch (os_error) {
108 case EACCES:
109 return ERR_NETWORK_ACCESS_DENIED;
110 case ETIMEDOUT:
111 return ERR_CONNECTION_TIMED_OUT;
112 default: {
113 int net_error = MapSystemError(os_error);
114 if (net_error == ERR_FAILED)
115 return ERR_CONNECTION_FAILED; // More specific than ERR_FAILED.
116
117 // Give a more specific error when the user is offline.
118 if (net_error == ERR_ADDRESS_UNREACHABLE &&
119 NetworkChangeNotifier::IsOffline()) {
120 return ERR_INTERNET_DISCONNECTED;
121 }
122 return net_error;
123 }
124 }
125 }
126
127 } // namespace
128
129 //-----------------------------------------------------------------------------
130
131 TCPClientSocketLibevent::TCPClientSocketLibevent(
132 const AddressList& addresses,
133 net::NetLog* net_log,
134 const net::NetLog::Source& source)
135 : socket_(kInvalidSocket),
136 bound_socket_(kInvalidSocket),
137 addresses_(addresses),
138 current_address_index_(-1),
139 read_watcher_(this),
140 write_watcher_(this),
141 next_connect_state_(CONNECT_STATE_NONE),
142 connect_os_error_(0),
143 net_log_(BoundNetLog::Make(net_log, NetLog::SOURCE_SOCKET)),
144 previously_disconnected_(false),
145 use_tcp_fastopen_(IsTCPFastOpenEnabled()),
146 tcp_fastopen_connected_(false),
147 fast_open_status_(FAST_OPEN_STATUS_UNKNOWN) {
148 net_log_.BeginEvent(NetLog::TYPE_SOCKET_ALIVE,
149 source.ToEventParametersCallback());
150 }
151
152 TCPClientSocketLibevent::~TCPClientSocketLibevent() {
153 Disconnect();
154 net_log_.EndEvent(NetLog::TYPE_SOCKET_ALIVE);
155 if (tcp_fastopen_connected_) {
156 UMA_HISTOGRAM_ENUMERATION("Net.TcpFastOpenSocketConnection",
157 fast_open_status_, FAST_OPEN_MAX_VALUE);
158 }
159 }
160
161 int TCPClientSocketLibevent::AdoptSocket(int socket) {
162 DCHECK_EQ(socket_, kInvalidSocket);
163
164 int error = SetupSocket(socket);
165 if (error)
166 return MapSystemError(error);
167
168 socket_ = socket;
169
170 // This is to make GetPeerAddress() work. It's up to the caller ensure
171 // that |address_| contains a reasonable address for this
172 // socket. (i.e. at least match IPv4 vs IPv6!).
173 current_address_index_ = 0;
174 use_history_.set_was_ever_connected();
175
176 return OK;
177 }
178
179 int TCPClientSocketLibevent::Bind(const IPEndPoint& address) {
180 if (current_address_index_ >= 0 || bind_address_.get()) {
181 // Cannot bind the socket if we are already bound connected or
182 // connecting.
183 return ERR_UNEXPECTED;
184 }
185
186 SockaddrStorage storage;
187 if (!address.ToSockAddr(storage.addr, &storage.addr_len))
188 return ERR_INVALID_ARGUMENT;
189
190 // Create |bound_socket_| and try to bind it to |address|.
191 int error = CreateSocket(address.GetSockAddrFamily(), &bound_socket_);
192 if (error)
193 return MapSystemError(error);
194
195 if (HANDLE_EINTR(bind(bound_socket_, storage.addr, storage.addr_len))) {
196 error = errno;
197 if (HANDLE_EINTR(close(bound_socket_)) < 0)
198 PLOG(ERROR) << "close";
199 bound_socket_ = kInvalidSocket;
200 return MapSystemError(error);
201 }
202
203 bind_address_.reset(new IPEndPoint(address));
204
205 return 0;
206 }
207
208 int TCPClientSocketLibevent::Connect(const CompletionCallback& callback) {
209 DCHECK(CalledOnValidThread());
210
211 // If already connected, then just return OK.
212 if (socket_ != kInvalidSocket)
213 return OK;
214
215 base::StatsCounter connects("tcp.connect");
216 connects.Increment();
217
218 DCHECK(!waiting_connect());
219
220 net_log_.BeginEvent(NetLog::TYPE_TCP_CONNECT,
221 addresses_.CreateNetLogCallback());
222
223 // We will try to connect to each address in addresses_. Start with the
224 // first one in the list.
225 next_connect_state_ = CONNECT_STATE_CONNECT;
226 current_address_index_ = 0;
227
228 int rv = DoConnectLoop(OK);
229 if (rv == ERR_IO_PENDING) {
230 // Synchronous operation not supported.
231 DCHECK(!callback.is_null());
232 write_callback_ = callback;
233 } else {
234 LogConnectCompletion(rv);
235 }
236
237 return rv;
238 }
239
240 int TCPClientSocketLibevent::DoConnectLoop(int result) {
241 DCHECK_NE(next_connect_state_, CONNECT_STATE_NONE);
242
243 int rv = result;
244 do {
245 ConnectState state = next_connect_state_;
246 next_connect_state_ = CONNECT_STATE_NONE;
247 switch (state) {
248 case CONNECT_STATE_CONNECT:
249 DCHECK_EQ(OK, rv);
250 rv = DoConnect();
251 break;
252 case CONNECT_STATE_CONNECT_COMPLETE:
253 rv = DoConnectComplete(rv);
254 break;
255 default:
256 LOG(DFATAL) << "bad state";
257 rv = ERR_UNEXPECTED;
258 break;
259 }
260 } while (rv != ERR_IO_PENDING && next_connect_state_ != CONNECT_STATE_NONE);
261
262 return rv;
263 }
264
265 int TCPClientSocketLibevent::DoConnect() {
266 DCHECK_GE(current_address_index_, 0);
267 DCHECK_LT(current_address_index_, static_cast<int>(addresses_.size()));
268 DCHECK_EQ(0, connect_os_error_);
269
270 const IPEndPoint& endpoint = addresses_[current_address_index_];
271
272 if (previously_disconnected_) {
273 use_history_.Reset();
274 previously_disconnected_ = false;
275 }
276
277 net_log_.BeginEvent(NetLog::TYPE_TCP_CONNECT_ATTEMPT,
278 CreateNetLogIPEndPointCallback(&endpoint));
279
280 next_connect_state_ = CONNECT_STATE_CONNECT_COMPLETE;
281
282 if (bound_socket_ != kInvalidSocket) {
283 DCHECK(bind_address_.get());
284 socket_ = bound_socket_;
285 bound_socket_ = kInvalidSocket;
286 } else {
287 // Create a non-blocking socket.
288 connect_os_error_ = CreateSocket(endpoint.GetSockAddrFamily(), &socket_);
289 if (connect_os_error_)
290 return MapSystemError(connect_os_error_);
291
292 if (bind_address_.get()) {
293 SockaddrStorage storage;
294 if (!bind_address_->ToSockAddr(storage.addr, &storage.addr_len))
295 return ERR_INVALID_ARGUMENT;
296 if (HANDLE_EINTR(bind(socket_, storage.addr, storage.addr_len)))
297 return MapSystemError(errno);
298 }
299 }
300
301 // Connect the socket.
302 if (!use_tcp_fastopen_) {
303 SockaddrStorage storage;
304 if (!endpoint.ToSockAddr(storage.addr, &storage.addr_len))
305 return ERR_INVALID_ARGUMENT;
306
307 if (!HANDLE_EINTR(connect(socket_, storage.addr, storage.addr_len))) {
308 // Connected without waiting!
309 return OK;
310 }
311 } else {
312 // With TCP FastOpen, we pretend that the socket is connected.
313 DCHECK(!tcp_fastopen_connected_);
314 return OK;
315 }
316
317 // Check if the connect() failed synchronously.
318 connect_os_error_ = errno;
319 if (connect_os_error_ != EINPROGRESS)
320 return MapConnectError(connect_os_error_);
321
322 // Otherwise the connect() is going to complete asynchronously, so watch
323 // for its completion.
324 if (!base::MessageLoopForIO::current()->WatchFileDescriptor(
325 socket_, true, base::MessageLoopForIO::WATCH_WRITE,
326 &write_socket_watcher_, &write_watcher_)) {
327 connect_os_error_ = errno;
328 DVLOG(1) << "WatchFileDescriptor failed: " << connect_os_error_;
329 return MapSystemError(connect_os_error_);
330 }
331
332 return ERR_IO_PENDING;
333 }
334
335 int TCPClientSocketLibevent::DoConnectComplete(int result) {
336 // Log the end of this attempt (and any OS error it threw).
337 int os_error = connect_os_error_;
338 connect_os_error_ = 0;
339 if (result != OK) {
340 net_log_.EndEvent(NetLog::TYPE_TCP_CONNECT_ATTEMPT,
341 NetLog::IntegerCallback("os_error", os_error));
342 } else {
343 net_log_.EndEvent(NetLog::TYPE_TCP_CONNECT_ATTEMPT);
344 }
345
346 if (result == OK) {
347 write_socket_watcher_.StopWatchingFileDescriptor();
348 use_history_.set_was_ever_connected();
349 return OK; // Done!
350 }
351
352 // Close whatever partially connected socket we currently have.
353 DoDisconnect();
354
355 // Try to fall back to the next address in the list.
356 if (current_address_index_ + 1 < static_cast<int>(addresses_.size())) {
357 next_connect_state_ = CONNECT_STATE_CONNECT;
358 ++current_address_index_;
359 return OK;
360 }
361
362 // Otherwise there is nothing to fall back to, so give up.
363 return result;
364 }
365
366 void TCPClientSocketLibevent::Disconnect() {
367 DCHECK(CalledOnValidThread());
368
369 DoDisconnect();
370 current_address_index_ = -1;
371 bind_address_.reset();
372 }
373
374 void TCPClientSocketLibevent::DoDisconnect() {
375 if (socket_ == kInvalidSocket)
376 return;
377
378 bool ok = read_socket_watcher_.StopWatchingFileDescriptor();
379 DCHECK(ok);
380 ok = write_socket_watcher_.StopWatchingFileDescriptor();
381 DCHECK(ok);
382 if (HANDLE_EINTR(close(socket_)) < 0)
383 PLOG(ERROR) << "close";
384 socket_ = kInvalidSocket;
385 previously_disconnected_ = true;
386 }
387
388 bool TCPClientSocketLibevent::IsConnected() const {
389 DCHECK(CalledOnValidThread());
390
391 if (socket_ == kInvalidSocket || waiting_connect())
392 return false;
393
394 if (use_tcp_fastopen_ && !tcp_fastopen_connected_) {
395 // With TCP FastOpen, we pretend that the socket is connected.
396 // This allows GetPeerAddress() to return current_ai_ as the peer
397 // address. Since we don't fail over to the next address if
398 // sendto() fails, current_ai_ is the only possible peer address.
399 CHECK_LT(current_address_index_, static_cast<int>(addresses_.size()));
400 return true;
401 }
402
403 // Check if connection is alive.
404 char c;
405 int rv = HANDLE_EINTR(recv(socket_, &c, 1, MSG_PEEK));
406 if (rv == 0)
407 return false;
408 if (rv == -1 && errno != EAGAIN && errno != EWOULDBLOCK)
409 return false;
410
411 return true;
412 }
413
414 bool TCPClientSocketLibevent::IsConnectedAndIdle() const {
415 DCHECK(CalledOnValidThread());
416
417 if (socket_ == kInvalidSocket || waiting_connect())
418 return false;
419
420 // TODO(wtc): should we also handle the TCP FastOpen case here,
421 // as we do in IsConnected()?
422
423 // Check if connection is alive and we haven't received any data
424 // unexpectedly.
425 char c;
426 int rv = HANDLE_EINTR(recv(socket_, &c, 1, MSG_PEEK));
427 if (rv >= 0)
428 return false;
429 if (errno != EAGAIN && errno != EWOULDBLOCK)
430 return false;
431
432 return true;
433 }
434
435 int TCPClientSocketLibevent::Read(IOBuffer* buf,
436 int buf_len,
437 const CompletionCallback& callback) {
438 DCHECK(CalledOnValidThread());
439 DCHECK_NE(kInvalidSocket, socket_);
440 DCHECK(!waiting_connect());
441 DCHECK(read_callback_.is_null());
442 // Synchronous operation not supported
443 DCHECK(!callback.is_null());
444 DCHECK_GT(buf_len, 0);
445
446 int nread = HANDLE_EINTR(read(socket_, buf->data(), buf_len));
447 if (nread >= 0) {
448 base::StatsCounter read_bytes("tcp.read_bytes");
449 read_bytes.Add(nread);
450 if (nread > 0)
451 use_history_.set_was_used_to_convey_data();
452 net_log_.AddByteTransferEvent(NetLog::TYPE_SOCKET_BYTES_RECEIVED, nread,
453 buf->data());
454 RecordFastOpenStatus();
455 return nread;
456 }
457 if (errno != EAGAIN && errno != EWOULDBLOCK) {
458 int net_error = MapSystemError(errno);
459 net_log_.AddEvent(NetLog::TYPE_SOCKET_READ_ERROR,
460 CreateNetLogSocketErrorCallback(net_error, errno));
461 return net_error;
462 }
463
464 if (!base::MessageLoopForIO::current()->WatchFileDescriptor(
465 socket_, true, base::MessageLoopForIO::WATCH_READ,
466 &read_socket_watcher_, &read_watcher_)) {
467 DVLOG(1) << "WatchFileDescriptor failed on read, errno " << errno;
468 return MapSystemError(errno);
469 }
470
471 read_buf_ = buf;
472 read_buf_len_ = buf_len;
473 read_callback_ = callback;
474 return ERR_IO_PENDING;
475 }
476
477 int TCPClientSocketLibevent::Write(IOBuffer* buf,
478 int buf_len,
479 const CompletionCallback& callback) {
480 DCHECK(CalledOnValidThread());
481 DCHECK_NE(kInvalidSocket, socket_);
482 DCHECK(!waiting_connect());
483 DCHECK(write_callback_.is_null());
484 // Synchronous operation not supported
485 DCHECK(!callback.is_null());
486 DCHECK_GT(buf_len, 0);
487
488 int nwrite = InternalWrite(buf, buf_len);
489 if (nwrite >= 0) {
490 base::StatsCounter write_bytes("tcp.write_bytes");
491 write_bytes.Add(nwrite);
492 if (nwrite > 0)
493 use_history_.set_was_used_to_convey_data();
494 net_log_.AddByteTransferEvent(NetLog::TYPE_SOCKET_BYTES_SENT, nwrite,
495 buf->data());
496 return nwrite;
497 }
498 if (errno != EAGAIN && errno != EWOULDBLOCK) {
499 int net_error = MapSystemError(errno);
500 net_log_.AddEvent(NetLog::TYPE_SOCKET_WRITE_ERROR,
501 CreateNetLogSocketErrorCallback(net_error, errno));
502 return net_error;
503 }
504
505 if (!base::MessageLoopForIO::current()->WatchFileDescriptor(
506 socket_, true, base::MessageLoopForIO::WATCH_WRITE,
507 &write_socket_watcher_, &write_watcher_)) {
508 DVLOG(1) << "WatchFileDescriptor failed on write, errno " << errno;
509 return MapSystemError(errno);
510 }
511
512 write_buf_ = buf;
513 write_buf_len_ = buf_len;
514 write_callback_ = callback;
515 return ERR_IO_PENDING;
516 }
517
518 int TCPClientSocketLibevent::InternalWrite(IOBuffer* buf, int buf_len) {
519 int nwrite;
520 if (use_tcp_fastopen_ && !tcp_fastopen_connected_) {
521 SockaddrStorage storage;
522 if (!addresses_[current_address_index_].ToSockAddr(storage.addr,
523 &storage.addr_len)) {
524 errno = EINVAL;
525 return -1;
526 }
527
528 int flags = 0x20000000; // Magic flag to enable TCP_FASTOPEN.
529 #if defined(OS_LINUX)
530 // sendto() will fail with EPIPE when the system doesn't support TCP Fast
531 // Open. Theoretically that shouldn't happen since the caller should check
532 // for system support on startup, but users may dynamically disable TCP Fast
533 // Open via sysctl.
534 flags |= MSG_NOSIGNAL;
535 #endif // defined(OS_LINUX)
536 nwrite = HANDLE_EINTR(sendto(socket_,
537 buf->data(),
538 buf_len,
539 flags,
540 storage.addr,
541 storage.addr_len));
542 tcp_fastopen_connected_ = true;
543
544 if (nwrite < 0) {
545 DCHECK_NE(EPIPE, errno);
546
547 // If errno == EINPROGRESS, that means the kernel didn't have a cookie
548 // and would block. The kernel is internally doing a connect() though.
549 // Remap EINPROGRESS to EAGAIN so we treat this the same as our other
550 // asynchronous cases. Note that the user buffer has not been copied to
551 // kernel space.
552 if (errno == EINPROGRESS) {
553 errno = EAGAIN;
554 fast_open_status_ = FAST_OPEN_SLOW_CONNECT_RETURN;
555 } else {
556 fast_open_status_ = FAST_OPEN_ERROR;
557 }
558 } else {
559 fast_open_status_ = FAST_OPEN_FAST_CONNECT_RETURN;
560 }
561 } else {
562 nwrite = HANDLE_EINTR(write(socket_, buf->data(), buf_len));
563 }
564 return nwrite;
565 }
566
567 bool TCPClientSocketLibevent::SetReceiveBufferSize(int32 size) {
568 DCHECK(CalledOnValidThread());
569 int rv = setsockopt(socket_, SOL_SOCKET, SO_RCVBUF,
570 reinterpret_cast<const char*>(&size),
571 sizeof(size));
572 DCHECK(!rv) << "Could not set socket receive buffer size: " << errno;
573 return rv == 0;
574 }
575
576 bool TCPClientSocketLibevent::SetSendBufferSize(int32 size) {
577 DCHECK(CalledOnValidThread());
578 int rv = setsockopt(socket_, SOL_SOCKET, SO_SNDBUF,
579 reinterpret_cast<const char*>(&size),
580 sizeof(size));
581 DCHECK(!rv) << "Could not set socket send buffer size: " << errno;
582 return rv == 0;
583 }
584
585 bool TCPClientSocketLibevent::SetKeepAlive(bool enable, int delay) {
586 int socket = socket_ != kInvalidSocket ? socket_ : bound_socket_;
587 return SetTCPKeepAlive(socket, enable, delay);
588 }
589
590 bool TCPClientSocketLibevent::SetNoDelay(bool no_delay) {
591 int socket = socket_ != kInvalidSocket ? socket_ : bound_socket_;
592 return SetTCPNoDelay(socket, no_delay);
593 }
594
595 void TCPClientSocketLibevent::ReadWatcher::OnFileCanReadWithoutBlocking(int) {
596 socket_->RecordFastOpenStatus();
597 if (!socket_->read_callback_.is_null())
598 socket_->DidCompleteRead();
599 }
600
601 void TCPClientSocketLibevent::WriteWatcher::OnFileCanWriteWithoutBlocking(int) {
602 if (socket_->waiting_connect()) {
603 socket_->DidCompleteConnect();
604 } else if (!socket_->write_callback_.is_null()) {
605 socket_->DidCompleteWrite();
606 }
607 }
608
609 void TCPClientSocketLibevent::LogConnectCompletion(int net_error) {
610 if (net_error == OK)
611 UpdateConnectionTypeHistograms(CONNECTION_ANY);
612
613 if (net_error != OK) {
614 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_TCP_CONNECT, net_error);
615 return;
616 }
617
618 SockaddrStorage storage;
619 int rv = getsockname(socket_, storage.addr, &storage.addr_len);
620 if (rv != 0) {
621 PLOG(ERROR) << "getsockname() [rv: " << rv << "] error: ";
622 NOTREACHED();
623 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_TCP_CONNECT, rv);
624 return;
625 }
626
627 net_log_.EndEvent(NetLog::TYPE_TCP_CONNECT,
628 CreateNetLogSourceAddressCallback(storage.addr,
629 storage.addr_len));
630 }
631
632 void TCPClientSocketLibevent::DoReadCallback(int rv) {
633 DCHECK_NE(rv, ERR_IO_PENDING);
634 DCHECK(!read_callback_.is_null());
635
636 // since Run may result in Read being called, clear read_callback_ up front.
637 CompletionCallback c = read_callback_;
638 read_callback_.Reset();
639 c.Run(rv);
640 }
641
642 void TCPClientSocketLibevent::DoWriteCallback(int rv) {
643 DCHECK_NE(rv, ERR_IO_PENDING);
644 DCHECK(!write_callback_.is_null());
645
646 // since Run may result in Write being called, clear write_callback_ up front.
647 CompletionCallback c = write_callback_;
648 write_callback_.Reset();
649 c.Run(rv);
650 }
651
652 void TCPClientSocketLibevent::DidCompleteConnect() {
653 DCHECK_EQ(next_connect_state_, CONNECT_STATE_CONNECT_COMPLETE);
654
655 // Get the error that connect() completed with.
656 int os_error = 0;
657 socklen_t len = sizeof(os_error);
658 if (getsockopt(socket_, SOL_SOCKET, SO_ERROR, &os_error, &len) < 0)
659 os_error = errno;
660
661 // TODO(eroman): Is this check really necessary?
662 if (os_error == EINPROGRESS || os_error == EALREADY) {
663 NOTREACHED(); // This indicates a bug in libevent or our code.
664 return;
665 }
666
667 connect_os_error_ = os_error;
668 int rv = DoConnectLoop(MapConnectError(os_error));
669 if (rv != ERR_IO_PENDING) {
670 LogConnectCompletion(rv);
671 DoWriteCallback(rv);
672 }
673 }
674
675 void TCPClientSocketLibevent::DidCompleteRead() {
676 int bytes_transferred;
677 bytes_transferred = HANDLE_EINTR(read(socket_, read_buf_->data(),
678 read_buf_len_));
679
680 int result;
681 if (bytes_transferred >= 0) {
682 result = bytes_transferred;
683 base::StatsCounter read_bytes("tcp.read_bytes");
684 read_bytes.Add(bytes_transferred);
685 if (bytes_transferred > 0)
686 use_history_.set_was_used_to_convey_data();
687 net_log_.AddByteTransferEvent(NetLog::TYPE_SOCKET_BYTES_RECEIVED, result,
688 read_buf_->data());
689 } else {
690 result = MapSystemError(errno);
691 if (result != ERR_IO_PENDING) {
692 net_log_.AddEvent(NetLog::TYPE_SOCKET_READ_ERROR,
693 CreateNetLogSocketErrorCallback(result, errno));
694 }
695 }
696
697 if (result != ERR_IO_PENDING) {
698 read_buf_ = NULL;
699 read_buf_len_ = 0;
700 bool ok = read_socket_watcher_.StopWatchingFileDescriptor();
701 DCHECK(ok);
702 DoReadCallback(result);
703 }
704 }
705
706 void TCPClientSocketLibevent::DidCompleteWrite() {
707 int bytes_transferred;
708 bytes_transferred = HANDLE_EINTR(write(socket_, write_buf_->data(),
709 write_buf_len_));
710
711 int result;
712 if (bytes_transferred >= 0) {
713 result = bytes_transferred;
714 base::StatsCounter write_bytes("tcp.write_bytes");
715 write_bytes.Add(bytes_transferred);
716 if (bytes_transferred > 0)
717 use_history_.set_was_used_to_convey_data();
718 net_log_.AddByteTransferEvent(NetLog::TYPE_SOCKET_BYTES_SENT, result,
719 write_buf_->data());
720 } else {
721 result = MapSystemError(errno);
722 if (result != ERR_IO_PENDING) {
723 net_log_.AddEvent(NetLog::TYPE_SOCKET_WRITE_ERROR,
724 CreateNetLogSocketErrorCallback(result, errno));
725 }
726 }
727
728 if (result != ERR_IO_PENDING) {
729 write_buf_ = NULL;
730 write_buf_len_ = 0;
731 write_socket_watcher_.StopWatchingFileDescriptor();
732 DoWriteCallback(result);
733 }
734 }
735
736 int TCPClientSocketLibevent::GetPeerAddress(IPEndPoint* address) const {
737 DCHECK(CalledOnValidThread());
738 DCHECK(address);
739 if (!IsConnected())
740 return ERR_SOCKET_NOT_CONNECTED;
741 *address = addresses_[current_address_index_];
742 return OK;
743 }
744
745 int TCPClientSocketLibevent::GetLocalAddress(IPEndPoint* address) const {
746 DCHECK(CalledOnValidThread());
747 DCHECK(address);
748 if (socket_ == kInvalidSocket) {
749 if (bind_address_.get()) {
750 *address = *bind_address_;
751 return OK;
752 }
753 return ERR_SOCKET_NOT_CONNECTED;
754 }
755
756 SockaddrStorage storage;
757 if (getsockname(socket_, storage.addr, &storage.addr_len))
758 return MapSystemError(errno);
759 if (!address->FromSockAddr(storage.addr, storage.addr_len))
760 return ERR_FAILED;
761
762 return OK;
763 }
764
765 void TCPClientSocketLibevent::RecordFastOpenStatus() {
766 if (use_tcp_fastopen_ &&
767 (fast_open_status_ == FAST_OPEN_FAST_CONNECT_RETURN ||
768 fast_open_status_ == FAST_OPEN_SLOW_CONNECT_RETURN)) {
769 DCHECK_NE(FAST_OPEN_STATUS_UNKNOWN, fast_open_status_);
770 bool getsockopt_success(false);
771 bool server_acked_data(false);
772 #if defined(TCP_INFO)
773 // Probe to see the if the socket used TCP Fast Open.
774 tcp_info info;
775 socklen_t info_len = sizeof(tcp_info);
776 getsockopt_success =
777 getsockopt(socket_, IPPROTO_TCP, TCP_INFO, &info, &info_len) == 0 &&
778 info_len == sizeof(tcp_info);
779 server_acked_data = getsockopt_success &&
780 (info.tcpi_options & TCPI_OPT_SYN_DATA);
781 #endif
782 if (getsockopt_success) {
783 if (fast_open_status_ == FAST_OPEN_FAST_CONNECT_RETURN) {
784 fast_open_status_ = (server_acked_data ? FAST_OPEN_SYN_DATA_ACK :
785 FAST_OPEN_SYN_DATA_NACK);
786 } else {
787 fast_open_status_ = (server_acked_data ? FAST_OPEN_NO_SYN_DATA_ACK :
788 FAST_OPEN_NO_SYN_DATA_NACK);
789 }
790 } else {
791 fast_open_status_ = (fast_open_status_ == FAST_OPEN_FAST_CONNECT_RETURN ?
792 FAST_OPEN_SYN_DATA_FAILED :
793 FAST_OPEN_NO_SYN_DATA_FAILED);
794 }
795 }
796 }
797
798 const BoundNetLog& TCPClientSocketLibevent::NetLog() const {
799 return net_log_;
800 }
801
802 void TCPClientSocketLibevent::SetSubresourceSpeculation() {
803 use_history_.set_subresource_speculation();
804 }
805
806 void TCPClientSocketLibevent::SetOmniboxSpeculation() {
807 use_history_.set_omnibox_speculation();
808 }
809
810 bool TCPClientSocketLibevent::WasEverUsed() const {
811 return use_history_.was_used_to_convey_data();
812 }
813
814 bool TCPClientSocketLibevent::UsingTCPFastOpen() const {
815 return use_tcp_fastopen_;
816 }
817
818 bool TCPClientSocketLibevent::WasNpnNegotiated() const {
819 return false;
820 }
821
822 NextProto TCPClientSocketLibevent::GetNegotiatedProtocol() const {
823 return kProtoUnknown;
824 }
825
826 bool TCPClientSocketLibevent::GetSSLInfo(SSLInfo* ssl_info) {
827 return false;
828 }
829
830 } // namespace net
OLDNEW
« no previous file with comments | « net/socket/tcp_client_socket_libevent.h ('k') | net/socket/tcp_server_socket.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698