Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(174)

Side by Side Diff: net/quic/quic_connection.cc

Issue 2193073003: Move shared files in net/quic/ into net/quic/core/ (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: io_thread_unittest.cc Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/quic/quic_connection.h ('k') | net/quic/quic_connection_stats.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/quic/quic_connection.h"
6
7 #include <string.h>
8 #include <sys/types.h>
9
10 #include <algorithm>
11 #include <iterator>
12 #include <limits>
13 #include <memory>
14 #include <set>
15 #include <utility>
16
17 #include "base/format_macros.h"
18 #include "base/logging.h"
19 #include "base/macros.h"
20 #include "base/memory/ref_counted.h"
21 #include "base/metrics/histogram_macros.h"
22 #include "base/stl_util.h"
23 #include "base/strings/string_number_conversions.h"
24 #include "base/strings/stringprintf.h"
25 #include "net/base/address_family.h"
26 #include "net/base/ip_address.h"
27 #include "net/base/net_errors.h"
28 #include "net/quic/crypto/crypto_protocol.h"
29 #include "net/quic/crypto/quic_decrypter.h"
30 #include "net/quic/crypto/quic_encrypter.h"
31 #include "net/quic/proto/cached_network_parameters.pb.h"
32 #include "net/quic/quic_bandwidth.h"
33 #include "net/quic/quic_bug_tracker.h"
34 #include "net/quic/quic_config.h"
35 #include "net/quic/quic_flags.h"
36 #include "net/quic/quic_packet_generator.h"
37 #include "net/quic/quic_sent_packet_manager.h"
38 #include "net/quic/quic_utils.h"
39
40 using base::StringPiece;
41 using base::StringPrintf;
42 using std::list;
43 using std::make_pair;
44 using std::max;
45 using std::min;
46 using std::numeric_limits;
47 using std::set;
48 using std::string;
49 using std::vector;
50
51 namespace net {
52
53 class QuicDecrypter;
54 class QuicEncrypter;
55
56 namespace {
57
58 // The largest gap in packets we'll accept without closing the connection.
59 // This will likely have to be tuned.
60 const QuicPacketNumber kMaxPacketGap = 5000;
61
62 // Maximum number of acks received before sending an ack in response.
63 const QuicPacketCount kMaxPacketsReceivedBeforeAckSend = 20;
64
65 // Maximum number of retransmittable packets received before sending an ack.
66 const QuicPacketCount kDefaultRetransmittablePacketsBeforeAck = 2;
67 // Minimum number of packets received before ack decimation is enabled.
68 // This intends to avoid the beginning of slow start, when CWNDs may be
69 // rapidly increasing.
70 const QuicPacketCount kMinReceivedBeforeAckDecimation = 100;
71 // Wait for up to 10 retransmittable packets before sending an ack.
72 const QuicPacketCount kMaxRetransmittablePacketsBeforeAck = 10;
73 // One quarter RTT delay when doing ack decimation.
74 const float kAckDecimationDelay = 0.25;
75 // One eighth RTT delay when doing ack decimation.
76 const float kShortAckDecimationDelay = 0.125;
77
78 bool Near(QuicPacketNumber a, QuicPacketNumber b) {
79 QuicPacketNumber delta = (a > b) ? a - b : b - a;
80 return delta <= kMaxPacketGap;
81 }
82
83 bool IsInitializedIPEndPoint(const IPEndPoint& address) {
84 return net::GetAddressFamily(address.address()) !=
85 net::ADDRESS_FAMILY_UNSPECIFIED;
86 }
87
88 // An alarm that is scheduled to send an ack if a timeout occurs.
89 class AckAlarmDelegate : public QuicAlarm::Delegate {
90 public:
91 explicit AckAlarmDelegate(QuicConnection* connection)
92 : connection_(connection) {}
93
94 void OnAlarm() override {
95 DCHECK(connection_->ack_frame_updated());
96 QuicConnection::ScopedPacketBundler bundler(connection_,
97 QuicConnection::SEND_ACK);
98 }
99
100 private:
101 QuicConnection* connection_;
102
103 DISALLOW_COPY_AND_ASSIGN(AckAlarmDelegate);
104 };
105
106 // This alarm will be scheduled any time a data-bearing packet is sent out.
107 // When the alarm goes off, the connection checks to see if the oldest packets
108 // have been acked, and retransmit them if they have not.
109 class RetransmissionAlarmDelegate : public QuicAlarm::Delegate {
110 public:
111 explicit RetransmissionAlarmDelegate(QuicConnection* connection)
112 : connection_(connection) {}
113
114 void OnAlarm() override { connection_->OnRetransmissionTimeout(); }
115
116 private:
117 QuicConnection* connection_;
118
119 DISALLOW_COPY_AND_ASSIGN(RetransmissionAlarmDelegate);
120 };
121
122 // An alarm that is scheduled when the SentPacketManager requires a delay
123 // before sending packets and fires when the packet may be sent.
124 class SendAlarmDelegate : public QuicAlarm::Delegate {
125 public:
126 explicit SendAlarmDelegate(QuicConnection* connection)
127 : connection_(connection) {}
128
129 void OnAlarm() override { connection_->WriteAndBundleAcksIfNotBlocked(); }
130
131 private:
132 QuicConnection* connection_;
133
134 DISALLOW_COPY_AND_ASSIGN(SendAlarmDelegate);
135 };
136
137 class TimeoutAlarmDelegate : public QuicAlarm::Delegate {
138 public:
139 explicit TimeoutAlarmDelegate(QuicConnection* connection)
140 : connection_(connection) {}
141
142 void OnAlarm() override { connection_->CheckForTimeout(); }
143
144 private:
145 QuicConnection* connection_;
146
147 DISALLOW_COPY_AND_ASSIGN(TimeoutAlarmDelegate);
148 };
149
150 class PingAlarmDelegate : public QuicAlarm::Delegate {
151 public:
152 explicit PingAlarmDelegate(QuicConnection* connection)
153 : connection_(connection) {}
154
155 void OnAlarm() override { connection_->OnPingTimeout(); }
156
157 private:
158 QuicConnection* connection_;
159
160 DISALLOW_COPY_AND_ASSIGN(PingAlarmDelegate);
161 };
162
163 class MtuDiscoveryAlarmDelegate : public QuicAlarm::Delegate {
164 public:
165 explicit MtuDiscoveryAlarmDelegate(QuicConnection* connection)
166 : connection_(connection) {}
167
168 void OnAlarm() override { connection_->DiscoverMtu(); }
169
170 private:
171 QuicConnection* connection_;
172
173 DISALLOW_COPY_AND_ASSIGN(MtuDiscoveryAlarmDelegate);
174 };
175
176 // Listens for acks of MTU discovery packets and raises the maximum packet size
177 // of the connection if the probe succeeds.
178 class MtuDiscoveryAckListener : public QuicAckListenerInterface {
179 public:
180 MtuDiscoveryAckListener(QuicConnection* connection, QuicByteCount probe_size)
181 : connection_(connection), probe_size_(probe_size) {}
182
183 void OnPacketAcked(int /*acked_bytes*/,
184 QuicTime::Delta /*ack delay time*/) override {
185 // MTU discovery packets are not retransmittable, so it must be acked.
186 MaybeIncreaseMtu();
187 }
188
189 void OnPacketRetransmitted(int /*retransmitted_bytes*/) override {}
190
191 protected:
192 // MtuDiscoveryAckListener is ref counted.
193 ~MtuDiscoveryAckListener() override {}
194
195 private:
196 void MaybeIncreaseMtu() {
197 if (probe_size_ > connection_->max_packet_length()) {
198 connection_->SetMaxPacketLength(probe_size_);
199 }
200 }
201
202 QuicConnection* connection_;
203 QuicByteCount probe_size_;
204
205 DISALLOW_COPY_AND_ASSIGN(MtuDiscoveryAckListener);
206 };
207
208 } // namespace
209
210 #define ENDPOINT \
211 (perspective_ == Perspective::IS_SERVER ? "Server: " : "Client: ")
212
213 QuicConnection::QuicConnection(QuicConnectionId connection_id,
214 IPEndPoint address,
215 QuicConnectionHelperInterface* helper,
216 QuicAlarmFactory* alarm_factory,
217 QuicPacketWriter* writer,
218 bool owns_writer,
219 Perspective perspective,
220 const QuicVersionVector& supported_versions)
221 : framer_(supported_versions,
222 helper->GetClock()->ApproximateNow(),
223 perspective),
224 helper_(helper),
225 alarm_factory_(alarm_factory),
226 per_packet_options_(nullptr),
227 writer_(writer),
228 owns_writer_(owns_writer),
229 encryption_level_(ENCRYPTION_NONE),
230 has_forward_secure_encrypter_(false),
231 first_required_forward_secure_packet_(0),
232 clock_(helper->GetClock()),
233 random_generator_(helper->GetRandomGenerator()),
234 connection_id_(connection_id),
235 peer_address_(address),
236 active_peer_migration_type_(NO_CHANGE),
237 highest_packet_sent_before_peer_migration_(0),
238 last_packet_decrypted_(false),
239 last_size_(0),
240 current_packet_data_(nullptr),
241 last_decrypted_packet_level_(ENCRYPTION_NONE),
242 should_last_packet_instigate_acks_(false),
243 largest_seen_packet_with_ack_(0),
244 largest_seen_packet_with_stop_waiting_(0),
245 max_undecryptable_packets_(0),
246 pending_version_negotiation_packet_(false),
247 save_crypto_packets_as_termination_packets_(false),
248 idle_timeout_connection_close_behavior_(
249 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET),
250 close_connection_after_five_rtos_(false),
251 received_packet_manager_(&stats_),
252 ack_queued_(false),
253 num_retransmittable_packets_received_since_last_ack_sent_(0),
254 last_ack_had_missing_packets_(false),
255 num_packets_received_since_last_ack_sent_(0),
256 stop_waiting_count_(0),
257 ack_mode_(TCP_ACKING),
258 ack_decimation_delay_(kAckDecimationDelay),
259 delay_setting_retransmission_alarm_(false),
260 pending_retransmission_alarm_(false),
261 defer_send_in_response_to_packets_(false),
262 arena_(),
263 ack_alarm_(alarm_factory_->CreateAlarm(arena_.New<AckAlarmDelegate>(this),
264 &arena_)),
265 retransmission_alarm_(alarm_factory_->CreateAlarm(
266 arena_.New<RetransmissionAlarmDelegate>(this),
267 &arena_)),
268 send_alarm_(
269 alarm_factory_->CreateAlarm(arena_.New<SendAlarmDelegate>(this),
270 &arena_)),
271 resume_writes_alarm_(
272 alarm_factory_->CreateAlarm(arena_.New<SendAlarmDelegate>(this),
273 &arena_)),
274 timeout_alarm_(
275 alarm_factory_->CreateAlarm(arena_.New<TimeoutAlarmDelegate>(this),
276 &arena_)),
277 ping_alarm_(
278 alarm_factory_->CreateAlarm(arena_.New<PingAlarmDelegate>(this),
279 &arena_)),
280 mtu_discovery_alarm_(alarm_factory_->CreateAlarm(
281 arena_.New<MtuDiscoveryAlarmDelegate>(this),
282 &arena_)),
283 visitor_(nullptr),
284 debug_visitor_(nullptr),
285 packet_generator_(connection_id_,
286 &framer_,
287 random_generator_,
288 helper->GetBufferAllocator(),
289 this),
290 idle_network_timeout_(QuicTime::Delta::Infinite()),
291 handshake_timeout_(QuicTime::Delta::Infinite()),
292 time_of_last_received_packet_(clock_->ApproximateNow()),
293 time_of_last_sent_new_packet_(clock_->ApproximateNow()),
294 last_send_for_timeout_(clock_->ApproximateNow()),
295 packet_number_of_last_sent_packet_(0),
296 sent_packet_manager_(new QuicSentPacketManager(perspective,
297 kDefaultPathId,
298 clock_,
299 &stats_,
300 kCubic,
301 kNack,
302 /*delegate=*/nullptr)),
303 version_negotiation_state_(START_NEGOTIATION),
304 perspective_(perspective),
305 connected_(true),
306 can_truncate_connection_ids_(true),
307 mtu_discovery_target_(0),
308 mtu_probe_count_(0),
309 packets_between_mtu_probes_(kPacketsBetweenMtuProbesBase),
310 next_mtu_probe_at_(kPacketsBetweenMtuProbesBase),
311 largest_received_packet_size_(0),
312 goaway_sent_(false),
313 goaway_received_(false),
314 multipath_enabled_(false) {
315 DVLOG(1) << ENDPOINT
316 << "Created connection with connection_id: " << connection_id;
317 framer_.set_visitor(this);
318 framer_.set_received_entropy_calculator(&received_packet_manager_);
319 last_stop_waiting_frame_.least_unacked = 0;
320 stats_.connection_creation_time = clock_->ApproximateNow();
321 if (FLAGS_quic_enable_multipath) {
322 sent_packet_manager_.reset(new QuicMultipathSentPacketManager(
323 sent_packet_manager_.release(), this));
324 }
325 // TODO(ianswett): Supply the NetworkChangeVisitor as a constructor argument
326 // and make it required non-null, because it's always used.
327 sent_packet_manager_->SetNetworkChangeVisitor(this);
328 // Allow the packet writer to potentially reduce the packet size to a value
329 // even smaller than kDefaultMaxPacketSize.
330 SetMaxPacketLength(perspective_ == Perspective::IS_SERVER
331 ? kDefaultServerMaxPacketSize
332 : kDefaultMaxPacketSize);
333 received_packet_manager_.SetVersion(version());
334 }
335
336 QuicConnection::~QuicConnection() {
337 if (owns_writer_) {
338 delete writer_;
339 }
340 STLDeleteElements(&undecryptable_packets_);
341 ClearQueuedPackets();
342 }
343
344 void QuicConnection::ClearQueuedPackets() {
345 for (QueuedPacketList::iterator it = queued_packets_.begin();
346 it != queued_packets_.end(); ++it) {
347 // Delete the buffer before calling ClearSerializedPacket, which sets
348 // encrypted_buffer to nullptr.
349 delete[] it->encrypted_buffer;
350 QuicUtils::ClearSerializedPacket(&(*it));
351 }
352 queued_packets_.clear();
353 }
354
355 void QuicConnection::SetFromConfig(const QuicConfig& config) {
356 if (config.negotiated()) {
357 // Handshake complete, set handshake timeout to Infinite.
358 SetNetworkTimeouts(QuicTime::Delta::Infinite(),
359 config.IdleConnectionStateLifetime());
360 if (config.SilentClose()) {
361 idle_timeout_connection_close_behavior_ =
362 ConnectionCloseBehavior::SILENT_CLOSE;
363 }
364 if (FLAGS_quic_enable_multipath && config.MultipathEnabled()) {
365 multipath_enabled_ = true;
366 }
367 } else {
368 SetNetworkTimeouts(config.max_time_before_crypto_handshake(),
369 config.max_idle_time_before_crypto_handshake());
370 }
371
372 sent_packet_manager_->SetFromConfig(config);
373 if (config.HasReceivedBytesForConnectionId() &&
374 can_truncate_connection_ids_) {
375 packet_generator_.SetConnectionIdLength(
376 config.ReceivedBytesForConnectionId());
377 }
378 max_undecryptable_packets_ = config.max_undecryptable_packets();
379
380 if (config.HasClientSentConnectionOption(kMTUH, perspective_)) {
381 SetMtuDiscoveryTarget(kMtuDiscoveryTargetPacketSizeHigh);
382 }
383 if (config.HasClientSentConnectionOption(kMTUL, perspective_)) {
384 SetMtuDiscoveryTarget(kMtuDiscoveryTargetPacketSizeLow);
385 }
386 if (debug_visitor_ != nullptr) {
387 debug_visitor_->OnSetFromConfig(config);
388 }
389 if (config.HasClientSentConnectionOption(kACKD, perspective_)) {
390 ack_mode_ = ACK_DECIMATION;
391 }
392 if (config.HasClientSentConnectionOption(kAKD2, perspective_)) {
393 ack_mode_ = ACK_DECIMATION_WITH_REORDERING;
394 }
395 if (config.HasClientSentConnectionOption(kAKD3, perspective_)) {
396 ack_mode_ = ACK_DECIMATION;
397 ack_decimation_delay_ = kShortAckDecimationDelay;
398 }
399 if (config.HasClientSentConnectionOption(kAKD4, perspective_)) {
400 ack_mode_ = ACK_DECIMATION_WITH_REORDERING;
401 ack_decimation_delay_ = kShortAckDecimationDelay;
402 }
403 if (config.HasClientSentConnectionOption(k5RTO, perspective_)) {
404 close_connection_after_five_rtos_ = true;
405 }
406 }
407
408 void QuicConnection::OnSendConnectionState(
409 const CachedNetworkParameters& cached_network_params) {
410 if (debug_visitor_ != nullptr) {
411 debug_visitor_->OnSendConnectionState(cached_network_params);
412 }
413 }
414
415 void QuicConnection::OnReceiveConnectionState(
416 const CachedNetworkParameters& cached_network_params) {
417 if (debug_visitor_ != nullptr) {
418 debug_visitor_->OnReceiveConnectionState(cached_network_params);
419 }
420 }
421
422 void QuicConnection::ResumeConnectionState(
423 const CachedNetworkParameters& cached_network_params,
424 bool max_bandwidth_resumption) {
425 sent_packet_manager_->ResumeConnectionState(cached_network_params,
426 max_bandwidth_resumption);
427 }
428
429 void QuicConnection::SetMaxPacingRate(QuicBandwidth max_pacing_rate) {
430 sent_packet_manager_->SetMaxPacingRate(max_pacing_rate);
431 }
432
433 void QuicConnection::SetNumOpenStreams(size_t num_streams) {
434 sent_packet_manager_->SetNumOpenStreams(num_streams);
435 }
436
437 bool QuicConnection::SelectMutualVersion(
438 const QuicVersionVector& available_versions) {
439 // Try to find the highest mutual version by iterating over supported
440 // versions, starting with the highest, and breaking out of the loop once we
441 // find a matching version in the provided available_versions vector.
442 const QuicVersionVector& supported_versions = framer_.supported_versions();
443 for (size_t i = 0; i < supported_versions.size(); ++i) {
444 const QuicVersion& version = supported_versions[i];
445 if (ContainsValue(available_versions, version)) {
446 framer_.set_version(version);
447 return true;
448 }
449 }
450
451 return false;
452 }
453
454 void QuicConnection::OnError(QuicFramer* framer) {
455 // Packets that we can not or have not decrypted are dropped.
456 // TODO(rch): add stats to measure this.
457 if (!connected_ || last_packet_decrypted_ == false) {
458 return;
459 }
460 CloseConnection(framer->error(), framer->detailed_error(),
461 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
462 }
463
464 void QuicConnection::OnPacket() {
465 last_packet_decrypted_ = false;
466 }
467
468 void QuicConnection::OnPublicResetPacket(const QuicPublicResetPacket& packet) {
469 // Check that any public reset packet with a different connection ID that was
470 // routed to this QuicConnection has been redirected before control reaches
471 // here. (Check for a bug regression.)
472 DCHECK_EQ(connection_id_, packet.public_header.connection_id);
473 if (debug_visitor_ != nullptr) {
474 debug_visitor_->OnPublicResetPacket(packet);
475 }
476 const string error_details = "Received public reset.";
477 DVLOG(1) << ENDPOINT << error_details;
478 TearDownLocalConnectionState(QUIC_PUBLIC_RESET, error_details,
479 ConnectionCloseSource::FROM_PEER);
480 }
481
482 bool QuicConnection::OnProtocolVersionMismatch(QuicVersion received_version) {
483 DVLOG(1) << ENDPOINT << "Received packet with mismatched version "
484 << received_version;
485 // TODO(satyamshekhar): Implement no server state in this mode.
486 if (perspective_ == Perspective::IS_CLIENT) {
487 const string error_details = "Protocol version mismatch.";
488 QUIC_BUG << ENDPOINT << error_details;
489 TearDownLocalConnectionState(QUIC_INTERNAL_ERROR, error_details,
490 ConnectionCloseSource::FROM_SELF);
491 return false;
492 }
493 DCHECK_NE(version(), received_version);
494
495 if (debug_visitor_ != nullptr) {
496 debug_visitor_->OnProtocolVersionMismatch(received_version);
497 }
498
499 switch (version_negotiation_state_) {
500 case START_NEGOTIATION:
501 if (!framer_.IsSupportedVersion(received_version)) {
502 SendVersionNegotiationPacket();
503 version_negotiation_state_ = NEGOTIATION_IN_PROGRESS;
504 return false;
505 }
506 break;
507
508 case NEGOTIATION_IN_PROGRESS:
509 if (!framer_.IsSupportedVersion(received_version)) {
510 SendVersionNegotiationPacket();
511 return false;
512 }
513 break;
514
515 case NEGOTIATED_VERSION:
516 // Might be old packets that were sent by the client before the version
517 // was negotiated. Drop these.
518 return false;
519
520 default:
521 DCHECK(false);
522 }
523
524 version_negotiation_state_ = NEGOTIATED_VERSION;
525 received_packet_manager_.SetVersion(received_version);
526 visitor_->OnSuccessfulVersionNegotiation(received_version);
527 if (debug_visitor_ != nullptr) {
528 debug_visitor_->OnSuccessfulVersionNegotiation(received_version);
529 }
530 DVLOG(1) << ENDPOINT << "version negotiated " << received_version;
531
532 // Store the new version.
533 framer_.set_version(received_version);
534
535 // TODO(satyamshekhar): Store the packet number of this packet and close the
536 // connection if we ever received a packet with incorrect version and whose
537 // packet number is greater.
538 return true;
539 }
540
541 // Handles version negotiation for client connection.
542 void QuicConnection::OnVersionNegotiationPacket(
543 const QuicVersionNegotiationPacket& packet) {
544 // Check that any public reset packet with a different connection ID that was
545 // routed to this QuicConnection has been redirected before control reaches
546 // here. (Check for a bug regression.)
547 DCHECK_EQ(connection_id_, packet.connection_id);
548 if (perspective_ == Perspective::IS_SERVER) {
549 const string error_details = "Server receieved version negotiation packet.";
550 QUIC_BUG << error_details;
551 TearDownLocalConnectionState(QUIC_INTERNAL_ERROR, error_details,
552 ConnectionCloseSource::FROM_SELF);
553 return;
554 }
555 if (debug_visitor_ != nullptr) {
556 debug_visitor_->OnVersionNegotiationPacket(packet);
557 }
558
559 if (version_negotiation_state_ != START_NEGOTIATION) {
560 // Possibly a duplicate version negotiation packet.
561 return;
562 }
563
564 if (ContainsValue(packet.versions, version())) {
565 const string error_details =
566 "Server already supports client's version and should have accepted the "
567 "connection.";
568 DLOG(WARNING) << error_details;
569 TearDownLocalConnectionState(QUIC_INVALID_VERSION_NEGOTIATION_PACKET,
570 error_details,
571 ConnectionCloseSource::FROM_SELF);
572 return;
573 }
574
575 if (!SelectMutualVersion(packet.versions)) {
576 CloseConnection(QUIC_INVALID_VERSION, "No common version found.",
577 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
578 return;
579 }
580
581 DVLOG(1) << ENDPOINT
582 << "Negotiated version: " << QuicVersionToString(version());
583 received_packet_manager_.SetVersion(version());
584 server_supported_versions_ = packet.versions;
585 version_negotiation_state_ = NEGOTIATION_IN_PROGRESS;
586 RetransmitUnackedPackets(ALL_UNACKED_RETRANSMISSION);
587 }
588
589 bool QuicConnection::OnUnauthenticatedPublicHeader(
590 const QuicPacketPublicHeader& header) {
591 if (header.connection_id == connection_id_) {
592 return true;
593 }
594
595 ++stats_.packets_dropped;
596 DVLOG(1) << ENDPOINT << "Ignoring packet from unexpected ConnectionId: "
597 << header.connection_id << " instead of " << connection_id_;
598 if (debug_visitor_ != nullptr) {
599 debug_visitor_->OnIncorrectConnectionId(header.connection_id);
600 }
601 // If this is a server, the dispatcher routes each packet to the
602 // QuicConnection responsible for the packet's connection ID. So if control
603 // arrives here and this is a server, the dispatcher must be malfunctioning.
604 DCHECK_NE(Perspective::IS_SERVER, perspective_);
605 return false;
606 }
607
608 bool QuicConnection::OnUnauthenticatedHeader(const QuicPacketHeader& header) {
609 if (debug_visitor_ != nullptr) {
610 debug_visitor_->OnUnauthenticatedHeader(header);
611 }
612
613 // Check that any public reset packet with a different connection ID that was
614 // routed to this QuicConnection has been redirected before control reaches
615 // here.
616 DCHECK_EQ(connection_id_, header.public_header.connection_id);
617
618 // Multipath is not enabled, but a packet with multipath flag on is received.
619 if (!multipath_enabled_ && header.public_header.multipath_flag) {
620 const string error_details =
621 "Received a packet with multipath flag but multipath is not enabled.";
622 QUIC_BUG << error_details;
623 CloseConnection(QUIC_BAD_MULTIPATH_FLAG, error_details,
624 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
625 return false;
626 }
627 if (!packet_generator_.IsPendingPacketEmpty()) {
628 // Incoming packets may change a queued ACK frame.
629 const string error_details =
630 "Pending frames must be serialized before incoming packets are "
631 "processed.";
632 QUIC_BUG << error_details;
633 CloseConnection(QUIC_INTERNAL_ERROR, error_details,
634 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
635 return false;
636 }
637
638 // If this packet has already been seen, or the sender has told us that it
639 // will not be retransmitted, then stop processing the packet.
640 if (!received_packet_manager_.IsAwaitingPacket(header.packet_number)) {
641 DVLOG(1) << ENDPOINT << "Packet " << header.packet_number
642 << " no longer being waited for. Discarding.";
643 if (debug_visitor_ != nullptr) {
644 debug_visitor_->OnDuplicatePacket(header.packet_number);
645 }
646 ++stats_.packets_dropped;
647 return false;
648 }
649
650 return true;
651 }
652
653 void QuicConnection::OnDecryptedPacket(EncryptionLevel level) {
654 last_decrypted_packet_level_ = level;
655 last_packet_decrypted_ = true;
656
657 // If this packet was foward-secure encrypted and the forward-secure encrypter
658 // is not being used, start using it.
659 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE &&
660 has_forward_secure_encrypter_ && level == ENCRYPTION_FORWARD_SECURE) {
661 SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
662 }
663
664 // Once the server receives a forward secure packet, the handshake is
665 // confirmed.
666 if (FLAGS_quic_no_shlo_listener && level == ENCRYPTION_FORWARD_SECURE &&
667 perspective_ == Perspective::IS_SERVER) {
668 sent_packet_manager_->SetHandshakeConfirmed();
669 }
670 }
671
672 bool QuicConnection::OnPacketHeader(const QuicPacketHeader& header) {
673 if (debug_visitor_ != nullptr) {
674 debug_visitor_->OnPacketHeader(header);
675 }
676
677 // Will be decremented below if we fall through to return true.
678 ++stats_.packets_dropped;
679
680 if (!ProcessValidatedPacket(header)) {
681 return false;
682 }
683
684 // Only migrate connection to a new peer address if a change is not underway.
685 PeerAddressChangeType peer_migration_type =
686 QuicUtils::DetermineAddressChangeType(peer_address_,
687 last_packet_source_address_);
688 // Do not migrate connection if the changed address packet is a reordered
689 // packet.
690 if (active_peer_migration_type_ == NO_CHANGE &&
691 peer_migration_type != NO_CHANGE &&
692 (!FLAGS_quic_do_not_migrate_on_old_packet ||
693 header.packet_number > received_packet_manager_.GetLargestObserved())) {
694 StartPeerMigration(header.path_id, peer_migration_type);
695 }
696
697 --stats_.packets_dropped;
698 DVLOG(1) << ENDPOINT << "Received packet header: " << header;
699 last_header_ = header;
700 DCHECK(connected_);
701 return true;
702 }
703
704 bool QuicConnection::OnStreamFrame(const QuicStreamFrame& frame) {
705 DCHECK(connected_);
706 if (debug_visitor_ != nullptr) {
707 debug_visitor_->OnStreamFrame(frame);
708 }
709 if (frame.stream_id != kCryptoStreamId &&
710 last_decrypted_packet_level_ == ENCRYPTION_NONE) {
711 if (MaybeConsiderAsMemoryCorruption(frame)) {
712 CloseConnection(QUIC_MAYBE_CORRUPTED_MEMORY,
713 "Received crypto frame on non crypto stream.",
714 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
715 return false;
716 }
717
718 QUIC_BUG << ENDPOINT
719 << "Received an unencrypted data frame: closing connection"
720 << " packet_number:" << last_header_.packet_number
721 << " stream_id:" << frame.stream_id
722 << " received_packets:" << received_packet_manager_.ack_frame();
723 CloseConnection(QUIC_UNENCRYPTED_STREAM_DATA,
724 "Unencrypted stream data seen.",
725 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
726 return false;
727 }
728 visitor_->OnStreamFrame(frame);
729 visitor_->PostProcessAfterData();
730 stats_.stream_bytes_received += frame.data_length;
731 should_last_packet_instigate_acks_ = true;
732 return connected_;
733 }
734
735 bool QuicConnection::OnAckFrame(const QuicAckFrame& incoming_ack) {
736 DCHECK(connected_);
737 if (debug_visitor_ != nullptr) {
738 debug_visitor_->OnAckFrame(incoming_ack);
739 }
740 DVLOG(1) << ENDPOINT << "OnAckFrame: " << incoming_ack;
741
742 if (last_header_.packet_number <= largest_seen_packet_with_ack_) {
743 DVLOG(1) << ENDPOINT << "Received an old ack frame: ignoring";
744 return true;
745 }
746
747 const char* error = ValidateAckFrame(incoming_ack);
748 if (error != nullptr) {
749 CloseConnection(QUIC_INVALID_ACK_DATA, error,
750 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
751 return false;
752 }
753
754 if (send_alarm_->IsSet()) {
755 send_alarm_->Cancel();
756 }
757 ProcessAckFrame(incoming_ack);
758 if (incoming_ack.is_truncated) {
759 should_last_packet_instigate_acks_ = true;
760 }
761 // If the incoming ack's packets set expresses missing packets: peer is still
762 // waiting for a packet lower than a packet that we are no longer planning to
763 // send.
764 // If the incoming ack's packets set expresses received packets: peer is still
765 // acking packets which we never care about.
766 // Send an ack to raise the high water mark.
767 if (!incoming_ack.packets.Empty() &&
768 GetLeastUnacked(incoming_ack.path_id) > incoming_ack.packets.Min()) {
769 ++stop_waiting_count_;
770 } else {
771 stop_waiting_count_ = 0;
772 }
773
774 return connected_;
775 }
776
777 void QuicConnection::ProcessAckFrame(const QuicAckFrame& incoming_ack) {
778 largest_seen_packet_with_ack_ = last_header_.packet_number;
779 sent_packet_manager_->OnIncomingAck(incoming_ack,
780 time_of_last_received_packet_);
781 if (version() <= QUIC_VERSION_33) {
782 sent_entropy_manager_.ClearEntropyBefore(
783 sent_packet_manager_->GetLeastPacketAwaitedByPeer(
784 incoming_ack.path_id) -
785 1);
786 }
787 // Always reset the retransmission alarm when an ack comes in, since we now
788 // have a better estimate of the current rtt than when it was set.
789 SetRetransmissionAlarm();
790 }
791
792 void QuicConnection::ProcessStopWaitingFrame(
793 const QuicStopWaitingFrame& stop_waiting) {
794 largest_seen_packet_with_stop_waiting_ = last_header_.packet_number;
795 received_packet_manager_.UpdatePacketInformationSentByPeer(stop_waiting);
796 }
797
798 bool QuicConnection::OnStopWaitingFrame(const QuicStopWaitingFrame& frame) {
799 DCHECK(connected_);
800
801 if (last_header_.packet_number <= largest_seen_packet_with_stop_waiting_) {
802 DVLOG(1) << ENDPOINT << "Received an old stop waiting frame: ignoring";
803 return true;
804 }
805
806 const char* error = ValidateStopWaitingFrame(frame);
807 if (error != nullptr) {
808 CloseConnection(QUIC_INVALID_STOP_WAITING_DATA, error,
809 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
810 return false;
811 }
812
813 if (debug_visitor_ != nullptr) {
814 debug_visitor_->OnStopWaitingFrame(frame);
815 }
816
817 last_stop_waiting_frame_ = frame;
818 return connected_;
819 }
820
821 bool QuicConnection::OnPaddingFrame(const QuicPaddingFrame& frame) {
822 DCHECK(connected_);
823 if (debug_visitor_ != nullptr) {
824 debug_visitor_->OnPaddingFrame(frame);
825 }
826 return true;
827 }
828
829 bool QuicConnection::OnPingFrame(const QuicPingFrame& frame) {
830 DCHECK(connected_);
831 if (debug_visitor_ != nullptr) {
832 debug_visitor_->OnPingFrame(frame);
833 }
834 should_last_packet_instigate_acks_ = true;
835 return true;
836 }
837
838 const char* QuicConnection::ValidateAckFrame(const QuicAckFrame& incoming_ack) {
839 if (incoming_ack.largest_observed > packet_generator_.packet_number()) {
840 DLOG(WARNING) << ENDPOINT << "Peer's observed unsent packet:"
841 << incoming_ack.largest_observed << " vs "
842 << packet_generator_.packet_number();
843 // We got an error for data we have not sent. Error out.
844 return "Largest observed too high.";
845 }
846
847 if (incoming_ack.largest_observed <
848 sent_packet_manager_->GetLargestObserved(incoming_ack.path_id)) {
849 VLOG(1) << ENDPOINT << "Peer's largest_observed packet decreased:"
850 << incoming_ack.largest_observed << " vs "
851 << sent_packet_manager_->GetLargestObserved(incoming_ack.path_id)
852 << " packet_number:" << last_header_.packet_number
853 << " largest seen with ack:" << largest_seen_packet_with_ack_
854 << " connection_id: " << connection_id_;
855 // A new ack has a diminished largest_observed value. Error out.
856 // If this was an old packet, we wouldn't even have checked.
857 return "Largest observed too low.";
858 }
859
860 if (version() <= QUIC_VERSION_33) {
861 if (!incoming_ack.packets.Empty() &&
862 incoming_ack.packets.Max() > incoming_ack.largest_observed) {
863 LOG(WARNING) << ENDPOINT
864 << "Peer sent missing packet: " << incoming_ack.packets.Max()
865 << " which is greater than largest observed: "
866 << incoming_ack.largest_observed;
867 return "Missing packet higher than largest observed.";
868 }
869
870 if (!incoming_ack.packets.Empty() &&
871 incoming_ack.packets.Min() <
872 sent_packet_manager_->GetLeastPacketAwaitedByPeer(
873 incoming_ack.path_id)) {
874 LOG(WARNING) << ENDPOINT
875 << "Peer sent missing packet: " << incoming_ack.packets.Min()
876 << " which is smaller than least_packet_awaited_by_peer_: "
877 << sent_packet_manager_->GetLeastPacketAwaitedByPeer(
878 incoming_ack.path_id);
879 return "Missing packet smaller than least awaited.";
880 }
881 if (!sent_entropy_manager_.IsValidEntropy(incoming_ack.largest_observed,
882 incoming_ack.packets,
883 incoming_ack.entropy_hash)) {
884 DLOG(WARNING) << ENDPOINT << "Peer sent invalid entropy."
885 << " largest_observed:" << incoming_ack.largest_observed
886 << " last_received:" << last_header_.packet_number;
887 return "Invalid entropy.";
888 }
889 } else {
890 if (!incoming_ack.packets.Empty() &&
891 incoming_ack.packets.Max() != incoming_ack.largest_observed) {
892 QUIC_BUG << ENDPOINT
893 << "Peer last received packet: " << incoming_ack.packets.Max()
894 << " which is not equal to largest observed: "
895 << incoming_ack.largest_observed;
896 return "Last received packet not equal to largest observed.";
897 }
898 }
899
900 return nullptr;
901 }
902
903 const char* QuicConnection::ValidateStopWaitingFrame(
904 const QuicStopWaitingFrame& stop_waiting) {
905 if (stop_waiting.least_unacked <
906 received_packet_manager_.peer_least_packet_awaiting_ack()) {
907 DLOG(ERROR) << ENDPOINT << "Peer's sent low least_unacked: "
908 << stop_waiting.least_unacked << " vs "
909 << received_packet_manager_.peer_least_packet_awaiting_ack();
910 // We never process old ack frames, so this number should only increase.
911 return "Least unacked too small.";
912 }
913
914 if (stop_waiting.least_unacked > last_header_.packet_number) {
915 DLOG(ERROR) << ENDPOINT
916 << "Peer sent least_unacked:" << stop_waiting.least_unacked
917 << " greater than the enclosing packet number:"
918 << last_header_.packet_number;
919 return "Least unacked too large.";
920 }
921
922 return nullptr;
923 }
924
925 bool QuicConnection::OnRstStreamFrame(const QuicRstStreamFrame& frame) {
926 DCHECK(connected_);
927 if (debug_visitor_ != nullptr) {
928 debug_visitor_->OnRstStreamFrame(frame);
929 }
930 DVLOG(1) << ENDPOINT
931 << "RST_STREAM_FRAME received for stream: " << frame.stream_id
932 << " with error: "
933 << QuicUtils::StreamErrorToString(frame.error_code);
934 visitor_->OnRstStream(frame);
935 visitor_->PostProcessAfterData();
936 should_last_packet_instigate_acks_ = true;
937 return connected_;
938 }
939
940 bool QuicConnection::OnConnectionCloseFrame(
941 const QuicConnectionCloseFrame& frame) {
942 DCHECK(connected_);
943 if (debug_visitor_ != nullptr) {
944 debug_visitor_->OnConnectionCloseFrame(frame);
945 }
946 DVLOG(1) << ENDPOINT
947 << "Received ConnectionClose for connection: " << connection_id()
948 << ", with error: " << QuicUtils::ErrorToString(frame.error_code)
949 << " (" << frame.error_details << ")";
950 TearDownLocalConnectionState(frame.error_code, frame.error_details,
951 ConnectionCloseSource::FROM_PEER);
952 return connected_;
953 }
954
955 bool QuicConnection::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
956 DCHECK(connected_);
957 if (debug_visitor_ != nullptr) {
958 debug_visitor_->OnGoAwayFrame(frame);
959 }
960 DVLOG(1) << ENDPOINT << "GOAWAY_FRAME received with last good stream: "
961 << frame.last_good_stream_id
962 << " and error: " << QuicUtils::ErrorToString(frame.error_code)
963 << " and reason: " << frame.reason_phrase;
964
965 goaway_received_ = true;
966 visitor_->OnGoAway(frame);
967 visitor_->PostProcessAfterData();
968 should_last_packet_instigate_acks_ = true;
969 return connected_;
970 }
971
972 bool QuicConnection::OnWindowUpdateFrame(const QuicWindowUpdateFrame& frame) {
973 DCHECK(connected_);
974 if (debug_visitor_ != nullptr) {
975 debug_visitor_->OnWindowUpdateFrame(frame);
976 }
977 DVLOG(1) << ENDPOINT
978 << "WINDOW_UPDATE_FRAME received for stream: " << frame.stream_id
979 << " with byte offset: " << frame.byte_offset;
980 visitor_->OnWindowUpdateFrame(frame);
981 visitor_->PostProcessAfterData();
982 should_last_packet_instigate_acks_ = true;
983 return connected_;
984 }
985
986 bool QuicConnection::OnBlockedFrame(const QuicBlockedFrame& frame) {
987 DCHECK(connected_);
988 if (debug_visitor_ != nullptr) {
989 debug_visitor_->OnBlockedFrame(frame);
990 }
991 DVLOG(1) << ENDPOINT
992 << "BLOCKED_FRAME received for stream: " << frame.stream_id;
993 visitor_->OnBlockedFrame(frame);
994 visitor_->PostProcessAfterData();
995 should_last_packet_instigate_acks_ = true;
996 return connected_;
997 }
998
999 bool QuicConnection::OnPathCloseFrame(const QuicPathCloseFrame& frame) {
1000 DCHECK(connected_);
1001 if (debug_visitor_ != nullptr) {
1002 debug_visitor_->OnPathCloseFrame(frame);
1003 }
1004 DVLOG(1) << ENDPOINT
1005 << "PATH_CLOSE_FRAME received for path: " << frame.path_id;
1006 OnPathClosed(frame.path_id);
1007 return connected_;
1008 }
1009
1010 void QuicConnection::OnPacketComplete() {
1011 // Don't do anything if this packet closed the connection.
1012 if (!connected_) {
1013 ClearLastFrames();
1014 return;
1015 }
1016
1017 DVLOG(1) << ENDPOINT << "Got packet " << last_header_.packet_number << " for "
1018 << last_header_.public_header.connection_id;
1019
1020 // An ack will be sent if a missing retransmittable packet was received;
1021 const bool was_missing =
1022 should_last_packet_instigate_acks_ &&
1023 received_packet_manager_.IsMissing(last_header_.packet_number);
1024
1025 // Record received to populate ack info correctly before processing stream
1026 // frames, since the processing may result in a response packet with a bundled
1027 // ack.
1028 received_packet_manager_.RecordPacketReceived(last_size_, last_header_,
1029 time_of_last_received_packet_);
1030
1031 // Process stop waiting frames here, instead of inline, because the packet
1032 // needs to be considered 'received' before the entropy can be updated.
1033 if (last_stop_waiting_frame_.least_unacked > 0) {
1034 ProcessStopWaitingFrame(last_stop_waiting_frame_);
1035 if (!connected_) {
1036 return;
1037 }
1038 }
1039
1040 MaybeQueueAck(was_missing);
1041
1042 ClearLastFrames();
1043 MaybeCloseIfTooManyOutstandingPackets();
1044 }
1045
1046 void QuicConnection::MaybeQueueAck(bool was_missing) {
1047 ++num_packets_received_since_last_ack_sent_;
1048 // Always send an ack every 20 packets in order to allow the peer to discard
1049 // information from the SentPacketManager and provide an RTT measurement.
1050 if (num_packets_received_since_last_ack_sent_ >=
1051 kMaxPacketsReceivedBeforeAckSend) {
1052 ack_queued_ = true;
1053 }
1054
1055 // Determine whether the newly received packet was missing before recording
1056 // the received packet.
1057 // Ack decimation with reordering relies on the timer to send an ack, but if
1058 // missing packets we reported in the previous ack, send an ack immediately.
1059 if (was_missing && (ack_mode_ != ACK_DECIMATION_WITH_REORDERING ||
1060 last_ack_had_missing_packets_)) {
1061 ack_queued_ = true;
1062 }
1063
1064 if (should_last_packet_instigate_acks_ && !ack_queued_) {
1065 ++num_retransmittable_packets_received_since_last_ack_sent_;
1066 if (ack_mode_ != TCP_ACKING &&
1067 last_header_.packet_number > kMinReceivedBeforeAckDecimation) {
1068 // Ack up to 10 packets at once.
1069 if (num_retransmittable_packets_received_since_last_ack_sent_ >=
1070 kMaxRetransmittablePacketsBeforeAck) {
1071 ack_queued_ = true;
1072 } else if (!ack_alarm_->IsSet()) {
1073 // Wait the minimum of a quarter min_rtt and the delayed ack time.
1074 QuicTime::Delta ack_delay = std::min(
1075 DelayedAckTime(), sent_packet_manager_->GetRttStats()->min_rtt() *
1076 ack_decimation_delay_);
1077 ack_alarm_->Set(clock_->ApproximateNow() + ack_delay);
1078 }
1079 } else {
1080 // Ack with a timer or every 2 packets by default.
1081 if (num_retransmittable_packets_received_since_last_ack_sent_ >=
1082 kDefaultRetransmittablePacketsBeforeAck) {
1083 ack_queued_ = true;
1084 } else if (!ack_alarm_->IsSet()) {
1085 ack_alarm_->Set(clock_->ApproximateNow() + DelayedAckTime());
1086 }
1087 }
1088
1089 // If there are new missing packets to report, send an ack immediately.
1090 if (received_packet_manager_.HasNewMissingPackets()) {
1091 if (ack_mode_ == ACK_DECIMATION_WITH_REORDERING) {
1092 // Wait the minimum of an eighth min_rtt and the existing ack time.
1093 QuicTime ack_time =
1094 clock_->ApproximateNow() +
1095 0.125 * sent_packet_manager_->GetRttStats()->min_rtt();
1096 if (!ack_alarm_->IsSet() || ack_alarm_->deadline() > ack_time) {
1097 ack_alarm_->Update(ack_time, QuicTime::Delta::Zero());
1098 }
1099 } else {
1100 ack_queued_ = true;
1101 }
1102 }
1103 }
1104
1105 if (ack_queued_) {
1106 ack_alarm_->Cancel();
1107 }
1108 }
1109
1110 void QuicConnection::ClearLastFrames() {
1111 should_last_packet_instigate_acks_ = false;
1112 last_stop_waiting_frame_.least_unacked = 0;
1113 }
1114
1115 void QuicConnection::MaybeCloseIfTooManyOutstandingPackets() {
1116 if (version() > QUIC_VERSION_33) {
1117 return;
1118 }
1119 // This occurs if we don't discard old packets we've sent fast enough.
1120 // It's possible largest observed is less than least unacked.
1121 if (sent_packet_manager_->GetLargestObserved(last_header_.path_id) >
1122 (sent_packet_manager_->GetLeastUnacked(last_header_.path_id) +
1123 kMaxTrackedPackets)) {
1124 CloseConnection(
1125 QUIC_TOO_MANY_OUTSTANDING_SENT_PACKETS,
1126 StringPrintf("More than %" PRIu64 " outstanding.", kMaxTrackedPackets),
1127 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1128 }
1129 // This occurs if there are received packet gaps and the peer does not raise
1130 // the least unacked fast enough.
1131 if (received_packet_manager_.NumTrackedPackets() > kMaxTrackedPackets) {
1132 CloseConnection(
1133 QUIC_TOO_MANY_OUTSTANDING_RECEIVED_PACKETS,
1134 StringPrintf("More than %" PRIu64 " outstanding.", kMaxTrackedPackets),
1135 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1136 }
1137 }
1138
1139 const QuicFrame QuicConnection::GetUpdatedAckFrame() {
1140 return received_packet_manager_.GetUpdatedAckFrame(clock_->ApproximateNow());
1141 }
1142
1143 void QuicConnection::PopulateStopWaitingFrame(
1144 QuicStopWaitingFrame* stop_waiting) {
1145 stop_waiting->least_unacked = GetLeastUnacked(stop_waiting->path_id);
1146 if (version() <= QUIC_VERSION_33) {
1147 stop_waiting->entropy_hash = sent_entropy_manager_.GetCumulativeEntropy(
1148 stop_waiting->least_unacked - 1);
1149 }
1150 }
1151
1152 QuicPacketNumber QuicConnection::GetLeastUnacked(QuicPathId path_id) const {
1153 return sent_packet_manager_->GetLeastUnacked(path_id);
1154 }
1155
1156 void QuicConnection::MaybeSendInResponseToPacket() {
1157 if (!connected_) {
1158 return;
1159 }
1160 // Now that we have received an ack, we might be able to send packets which
1161 // are queued locally, or drain streams which are blocked.
1162 if (defer_send_in_response_to_packets_) {
1163 send_alarm_->Update(clock_->ApproximateNow(), QuicTime::Delta::Zero());
1164 } else {
1165 WriteAndBundleAcksIfNotBlocked();
1166 }
1167 }
1168
1169 void QuicConnection::SendVersionNegotiationPacket() {
1170 // TODO(alyssar): implement zero server state negotiation.
1171 pending_version_negotiation_packet_ = true;
1172 if (writer_->IsWriteBlocked()) {
1173 visitor_->OnWriteBlocked();
1174 return;
1175 }
1176 DVLOG(1) << ENDPOINT << "Sending version negotiation packet: {"
1177 << QuicVersionVectorToString(framer_.supported_versions()) << "}";
1178 std::unique_ptr<QuicEncryptedPacket> version_packet(
1179 packet_generator_.SerializeVersionNegotiationPacket(
1180 framer_.supported_versions()));
1181 WriteResult result = writer_->WritePacket(
1182 version_packet->data(), version_packet->length(),
1183 self_address().address(), peer_address(), per_packet_options_);
1184
1185 if (result.status == WRITE_STATUS_ERROR) {
1186 OnWriteError(result.error_code);
1187 return;
1188 }
1189 if (result.status == WRITE_STATUS_BLOCKED) {
1190 visitor_->OnWriteBlocked();
1191 if (writer_->IsWriteBlockedDataBuffered()) {
1192 pending_version_negotiation_packet_ = false;
1193 }
1194 return;
1195 }
1196
1197 pending_version_negotiation_packet_ = false;
1198 }
1199
1200 QuicConsumedData QuicConnection::SendStreamData(
1201 QuicStreamId id,
1202 QuicIOVector iov,
1203 QuicStreamOffset offset,
1204 bool fin,
1205 QuicAckListenerInterface* listener) {
1206 if (!fin && iov.total_length == 0) {
1207 QUIC_BUG << "Attempt to send empty stream frame";
1208 return QuicConsumedData(0, false);
1209 }
1210
1211 // Opportunistically bundle an ack with every outgoing packet.
1212 // Particularly, we want to bundle with handshake packets since we don't know
1213 // which decrypter will be used on an ack packet following a handshake
1214 // packet (a handshake packet from client to server could result in a REJ or a
1215 // SHLO from the server, leading to two different decrypters at the server.)
1216 ScopedRetransmissionScheduler alarm_delayer(this);
1217 ScopedPacketBundler ack_bundler(this, SEND_ACK_IF_PENDING);
1218 // The optimized path may be used for data only packets which fit into a
1219 // standard buffer and don't need padding.
1220 if (id != kCryptoStreamId && !packet_generator_.HasQueuedFrames() &&
1221 iov.total_length > kMaxPacketSize) {
1222 // Use the fast path to send full data packets.
1223 return packet_generator_.ConsumeDataFastPath(id, iov, offset, fin,
1224 listener);
1225 }
1226 return packet_generator_.ConsumeData(id, iov, offset, fin, listener);
1227 }
1228
1229 void QuicConnection::SendRstStream(QuicStreamId id,
1230 QuicRstStreamErrorCode error,
1231 QuicStreamOffset bytes_written) {
1232 // Opportunistically bundle an ack with this outgoing packet.
1233 ScopedPacketBundler ack_bundler(this, SEND_ACK_IF_PENDING);
1234 packet_generator_.AddControlFrame(QuicFrame(new QuicRstStreamFrame(
1235 id, AdjustErrorForVersion(error, version()), bytes_written)));
1236
1237 if (error == QUIC_STREAM_NO_ERROR) {
1238 // All data for streams which are reset with QUIC_STREAM_NO_ERROR must
1239 // be received by the peer.
1240 return;
1241 }
1242
1243 sent_packet_manager_->CancelRetransmissionsForStream(id);
1244 // Remove all queued packets which only contain data for the reset stream.
1245 QueuedPacketList::iterator packet_iterator = queued_packets_.begin();
1246 while (packet_iterator != queued_packets_.end()) {
1247 QuicFrames* retransmittable_frames =
1248 &packet_iterator->retransmittable_frames;
1249 if (retransmittable_frames->empty()) {
1250 ++packet_iterator;
1251 continue;
1252 }
1253 QuicUtils::RemoveFramesForStream(retransmittable_frames, id);
1254 if (!retransmittable_frames->empty()) {
1255 ++packet_iterator;
1256 continue;
1257 }
1258 delete[] packet_iterator->encrypted_buffer;
1259 QuicUtils::ClearSerializedPacket(&(*packet_iterator));
1260 packet_iterator = queued_packets_.erase(packet_iterator);
1261 }
1262 }
1263
1264 void QuicConnection::SendWindowUpdate(QuicStreamId id,
1265 QuicStreamOffset byte_offset) {
1266 // Opportunistically bundle an ack with this outgoing packet.
1267 ScopedPacketBundler ack_bundler(this, SEND_ACK_IF_PENDING);
1268 packet_generator_.AddControlFrame(
1269 QuicFrame(new QuicWindowUpdateFrame(id, byte_offset)));
1270 }
1271
1272 void QuicConnection::SendBlocked(QuicStreamId id) {
1273 // Opportunistically bundle an ack with this outgoing packet.
1274 ScopedPacketBundler ack_bundler(this, SEND_ACK_IF_PENDING);
1275 packet_generator_.AddControlFrame(QuicFrame(new QuicBlockedFrame(id)));
1276 }
1277
1278 void QuicConnection::SendPathClose(QuicPathId path_id) {
1279 // Opportunistically bundle an ack with this outgoing packet.
1280 ScopedPacketBundler ack_bundler(this, SEND_ACK_IF_PENDING);
1281 packet_generator_.AddControlFrame(QuicFrame(new QuicPathCloseFrame(path_id)));
1282 OnPathClosed(path_id);
1283 }
1284
1285 const QuicConnectionStats& QuicConnection::GetStats() {
1286 const RttStats* rtt_stats = sent_packet_manager_->GetRttStats();
1287
1288 // Update rtt and estimated bandwidth.
1289 QuicTime::Delta min_rtt = rtt_stats->min_rtt();
1290 if (min_rtt.IsZero()) {
1291 // If min RTT has not been set, use initial RTT instead.
1292 min_rtt = QuicTime::Delta::FromMicroseconds(rtt_stats->initial_rtt_us());
1293 }
1294 stats_.min_rtt_us = min_rtt.ToMicroseconds();
1295
1296 QuicTime::Delta srtt = rtt_stats->smoothed_rtt();
1297 if (srtt.IsZero()) {
1298 // If SRTT has not been set, use initial RTT instead.
1299 srtt = QuicTime::Delta::FromMicroseconds(rtt_stats->initial_rtt_us());
1300 }
1301 stats_.srtt_us = srtt.ToMicroseconds();
1302
1303 stats_.estimated_bandwidth = sent_packet_manager_->BandwidthEstimate();
1304 stats_.max_packet_size = packet_generator_.GetCurrentMaxPacketLength();
1305 stats_.max_received_packet_size = largest_received_packet_size_;
1306 return stats_;
1307 }
1308
1309 void QuicConnection::ProcessUdpPacket(const IPEndPoint& self_address,
1310 const IPEndPoint& peer_address,
1311 const QuicReceivedPacket& packet) {
1312 if (!connected_) {
1313 return;
1314 }
1315 if (debug_visitor_ != nullptr) {
1316 debug_visitor_->OnPacketReceived(self_address, peer_address, packet);
1317 }
1318 last_size_ = packet.length();
1319 current_packet_data_ = packet.data();
1320
1321 last_packet_destination_address_ = self_address;
1322 last_packet_source_address_ = peer_address;
1323 if (!IsInitializedIPEndPoint(self_address_)) {
1324 self_address_ = last_packet_destination_address_;
1325 }
1326 if (!IsInitializedIPEndPoint(peer_address_)) {
1327 peer_address_ = last_packet_source_address_;
1328 }
1329
1330 stats_.bytes_received += packet.length();
1331 ++stats_.packets_received;
1332
1333 time_of_last_received_packet_ = packet.receipt_time();
1334 DVLOG(1) << ENDPOINT << "time of last received packet: "
1335 << time_of_last_received_packet_.ToDebuggingValue();
1336
1337 ScopedRetransmissionScheduler alarm_delayer(this);
1338 if (!framer_.ProcessPacket(packet)) {
1339 // If we are unable to decrypt this packet, it might be
1340 // because the CHLO or SHLO packet was lost.
1341 if (framer_.error() == QUIC_DECRYPTION_FAILURE) {
1342 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE &&
1343 undecryptable_packets_.size() < max_undecryptable_packets_) {
1344 QueueUndecryptablePacket(packet);
1345 } else if (debug_visitor_ != nullptr) {
1346 debug_visitor_->OnUndecryptablePacket();
1347 }
1348 }
1349 DVLOG(1) << ENDPOINT << "Unable to process packet. Last packet processed: "
1350 << last_header_.packet_number;
1351 current_packet_data_ = nullptr;
1352 return;
1353 }
1354
1355 ++stats_.packets_processed;
1356 if (active_peer_migration_type_ != NO_CHANGE &&
1357 sent_packet_manager_->GetLargestObserved(last_header_.path_id) >
1358 highest_packet_sent_before_peer_migration_) {
1359 OnPeerMigrationValidated(last_header_.path_id);
1360 }
1361 MaybeProcessUndecryptablePackets();
1362 MaybeSendInResponseToPacket();
1363 SetPingAlarm();
1364 current_packet_data_ = nullptr;
1365 }
1366
1367 void QuicConnection::OnCanWrite() {
1368 DCHECK(!writer_->IsWriteBlocked());
1369
1370 WriteQueuedPackets();
1371 WritePendingRetransmissions();
1372
1373 // Sending queued packets may have caused the socket to become write blocked,
1374 // or the congestion manager to prohibit sending. If we've sent everything
1375 // we had queued and we're still not blocked, let the visitor know it can
1376 // write more.
1377 if (!CanWrite(HAS_RETRANSMITTABLE_DATA)) {
1378 return;
1379 }
1380
1381 {
1382 ScopedPacketBundler bundler(this, SEND_ACK_IF_QUEUED);
1383 visitor_->OnCanWrite();
1384 visitor_->PostProcessAfterData();
1385 }
1386
1387 // After the visitor writes, it may have caused the socket to become write
1388 // blocked or the congestion manager to prohibit sending, so check again.
1389 if (visitor_->WillingAndAbleToWrite() && !resume_writes_alarm_->IsSet() &&
1390 CanWrite(HAS_RETRANSMITTABLE_DATA)) {
1391 // We're not write blocked, but some stream didn't write out all of its
1392 // bytes. Register for 'immediate' resumption so we'll keep writing after
1393 // other connections and events have had a chance to use the thread.
1394 resume_writes_alarm_->Set(clock_->ApproximateNow());
1395 }
1396 }
1397
1398 void QuicConnection::WriteIfNotBlocked() {
1399 if (!writer_->IsWriteBlocked()) {
1400 OnCanWrite();
1401 }
1402 }
1403
1404 void QuicConnection::WriteAndBundleAcksIfNotBlocked() {
1405 if (!writer_->IsWriteBlocked()) {
1406 ScopedPacketBundler bundler(this, SEND_ACK_IF_QUEUED);
1407 OnCanWrite();
1408 }
1409 }
1410
1411 bool QuicConnection::ProcessValidatedPacket(const QuicPacketHeader& header) {
1412 if (header.fec_flag) {
1413 // Drop any FEC packet.
1414 return false;
1415 }
1416
1417 if (perspective_ == Perspective::IS_SERVER &&
1418 IsInitializedIPEndPoint(self_address_) &&
1419 IsInitializedIPEndPoint(last_packet_destination_address_) &&
1420 (!(self_address_ == last_packet_destination_address_))) {
1421 CloseConnection(QUIC_ERROR_MIGRATING_ADDRESS,
1422 "Self address migration is not supported at the server.",
1423 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1424 return false;
1425 }
1426
1427 if (!Near(header.packet_number, last_header_.packet_number)) {
1428 DVLOG(1) << ENDPOINT << "Packet " << header.packet_number
1429 << " out of bounds. Discarding";
1430 CloseConnection(QUIC_INVALID_PACKET_HEADER, "packet number out of bounds.",
1431 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1432 return false;
1433 }
1434
1435 if (version_negotiation_state_ != NEGOTIATED_VERSION) {
1436 if (perspective_ == Perspective::IS_SERVER) {
1437 if (!header.public_header.version_flag) {
1438 // Packets should have the version flag till version negotiation is
1439 // done.
1440 string error_details =
1441 StringPrintf("%s Packet %" PRIu64
1442 " without version flag before version negotiated.",
1443 ENDPOINT, header.packet_number);
1444 DLOG(WARNING) << error_details;
1445 CloseConnection(QUIC_INVALID_VERSION, error_details,
1446 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1447 return false;
1448 } else {
1449 DCHECK_EQ(1u, header.public_header.versions.size());
1450 DCHECK_EQ(header.public_header.versions[0], version());
1451 version_negotiation_state_ = NEGOTIATED_VERSION;
1452 received_packet_manager_.SetVersion(version());
1453 visitor_->OnSuccessfulVersionNegotiation(version());
1454 if (debug_visitor_ != nullptr) {
1455 debug_visitor_->OnSuccessfulVersionNegotiation(version());
1456 }
1457 }
1458 } else {
1459 DCHECK(!header.public_header.version_flag);
1460 // If the client gets a packet without the version flag from the server
1461 // it should stop sending version since the version negotiation is done.
1462 packet_generator_.StopSendingVersion();
1463 version_negotiation_state_ = NEGOTIATED_VERSION;
1464 received_packet_manager_.SetVersion(version());
1465 visitor_->OnSuccessfulVersionNegotiation(version());
1466 if (debug_visitor_ != nullptr) {
1467 debug_visitor_->OnSuccessfulVersionNegotiation(version());
1468 }
1469 }
1470 }
1471
1472 DCHECK_EQ(NEGOTIATED_VERSION, version_negotiation_state_);
1473
1474 if (last_size_ > largest_received_packet_size_) {
1475 largest_received_packet_size_ = last_size_;
1476 }
1477
1478 if (perspective_ == Perspective::IS_SERVER &&
1479 encryption_level_ == ENCRYPTION_NONE &&
1480 last_size_ > packet_generator_.GetCurrentMaxPacketLength()) {
1481 SetMaxPacketLength(last_size_);
1482 }
1483 return true;
1484 }
1485
1486 void QuicConnection::WriteQueuedPackets() {
1487 DCHECK(!writer_->IsWriteBlocked());
1488
1489 if (pending_version_negotiation_packet_) {
1490 SendVersionNegotiationPacket();
1491 }
1492
1493 QueuedPacketList::iterator packet_iterator = queued_packets_.begin();
1494 while (packet_iterator != queued_packets_.end() &&
1495 WritePacket(&(*packet_iterator))) {
1496 delete[] packet_iterator->encrypted_buffer;
1497 QuicUtils::ClearSerializedPacket(&(*packet_iterator));
1498 packet_iterator = queued_packets_.erase(packet_iterator);
1499 }
1500 }
1501
1502 void QuicConnection::WritePendingRetransmissions() {
1503 // Keep writing as long as there's a pending retransmission which can be
1504 // written.
1505 while (sent_packet_manager_->HasPendingRetransmissions()) {
1506 const PendingRetransmission pending =
1507 sent_packet_manager_->NextPendingRetransmission();
1508 if (!CanWrite(HAS_RETRANSMITTABLE_DATA)) {
1509 break;
1510 }
1511
1512 // Re-packetize the frames with a new packet number for retransmission.
1513 // Retransmitted packets use the same packet number length as the
1514 // original.
1515 // Flush the packet generator before making a new packet.
1516 // TODO(ianswett): Implement ReserializeAllFrames as a separate path that
1517 // does not require the creator to be flushed.
1518 packet_generator_.FlushAllQueuedFrames();
1519 char buffer[kMaxPacketSize];
1520 packet_generator_.ReserializeAllFrames(pending, buffer, kMaxPacketSize);
1521 }
1522 }
1523
1524 void QuicConnection::RetransmitUnackedPackets(
1525 TransmissionType retransmission_type) {
1526 sent_packet_manager_->RetransmitUnackedPackets(retransmission_type);
1527
1528 WriteIfNotBlocked();
1529 }
1530
1531 void QuicConnection::NeuterUnencryptedPackets() {
1532 sent_packet_manager_->NeuterUnencryptedPackets();
1533 // This may have changed the retransmission timer, so re-arm it.
1534 SetRetransmissionAlarm();
1535 }
1536
1537 bool QuicConnection::ShouldGeneratePacket(
1538 HasRetransmittableData retransmittable,
1539 IsHandshake handshake) {
1540 // We should serialize handshake packets immediately to ensure that they
1541 // end up sent at the right encryption level.
1542 if (handshake == IS_HANDSHAKE) {
1543 return true;
1544 }
1545
1546 return CanWrite(retransmittable);
1547 }
1548
1549 bool QuicConnection::CanWrite(HasRetransmittableData retransmittable) {
1550 if (!connected_) {
1551 return false;
1552 }
1553
1554 if (writer_->IsWriteBlocked()) {
1555 visitor_->OnWriteBlocked();
1556 return false;
1557 }
1558
1559 // Allow acks to be sent immediately.
1560 // TODO(ianswett): Remove retransmittable from
1561 // SendAlgorithmInterface::TimeUntilSend.
1562 if (retransmittable == NO_RETRANSMITTABLE_DATA) {
1563 return true;
1564 }
1565 // If the send alarm is set, wait for it to fire.
1566 if (send_alarm_->IsSet()) {
1567 return false;
1568 }
1569
1570 // TODO(fayang): If delay is not infinite, the next packet will be created and
1571 // sent on path_id.
1572 QuicPathId path_id = kInvalidPathId;
1573 QuicTime now = clock_->Now();
1574 QuicTime::Delta delay =
1575 sent_packet_manager_->TimeUntilSend(now, retransmittable, &path_id);
1576 if (delay.IsInfinite()) {
1577 DCHECK_EQ(kInvalidPathId, path_id);
1578 send_alarm_->Cancel();
1579 return false;
1580 }
1581
1582 DCHECK_NE(kInvalidPathId, path_id);
1583 // If the scheduler requires a delay, then we can not send this packet now.
1584 if (!delay.IsZero()) {
1585 send_alarm_->Update(now + delay, QuicTime::Delta::FromMilliseconds(1));
1586 DVLOG(1) << ENDPOINT << "Delaying sending " << delay.ToMilliseconds()
1587 << "ms";
1588 return false;
1589 }
1590 return true;
1591 }
1592
1593 bool QuicConnection::WritePacket(SerializedPacket* packet) {
1594 if (packet->packet_number <
1595 sent_packet_manager_->GetLargestSentPacket(packet->path_id)) {
1596 QUIC_BUG << "Attempt to write packet:" << packet->packet_number << " after:"
1597 << sent_packet_manager_->GetLargestSentPacket(packet->path_id);
1598 CloseConnection(QUIC_INTERNAL_ERROR, "Packet written out of order.",
1599 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1600 return true;
1601 }
1602 if (ShouldDiscardPacket(*packet)) {
1603 ++stats_.packets_discarded;
1604 return true;
1605 }
1606 // Termination packets are encrypted and saved, so don't exit early.
1607 const bool is_termination_packet = IsTerminationPacket(*packet);
1608 if (writer_->IsWriteBlocked() && !is_termination_packet) {
1609 return false;
1610 }
1611
1612 QuicPacketNumber packet_number = packet->packet_number;
1613 DCHECK_LE(packet_number_of_last_sent_packet_, packet_number);
1614 packet_number_of_last_sent_packet_ = packet_number;
1615
1616 QuicPacketLength encrypted_length = packet->encrypted_length;
1617 // Termination packets are eventually owned by TimeWaitListManager.
1618 // Others are deleted at the end of this call.
1619 if (is_termination_packet) {
1620 if (termination_packets_.get() == nullptr) {
1621 termination_packets_.reset(
1622 new std::vector<std::unique_ptr<QuicEncryptedPacket>>);
1623 }
1624 // Copy the buffer so it's owned in the future.
1625 char* buffer_copy = QuicUtils::CopyBuffer(*packet);
1626 termination_packets_->push_back(std::unique_ptr<QuicEncryptedPacket>(
1627 new QuicEncryptedPacket(buffer_copy, encrypted_length, true)));
1628 // This assures we won't try to write *forced* packets when blocked.
1629 // Return true to stop processing.
1630 if (writer_->IsWriteBlocked()) {
1631 visitor_->OnWriteBlocked();
1632 return true;
1633 }
1634 }
1635
1636 DCHECK_LE(encrypted_length, kMaxPacketSize);
1637 DCHECK_LE(encrypted_length, packet_generator_.GetCurrentMaxPacketLength());
1638 DVLOG(1) << ENDPOINT << "Sending packet " << packet_number << " : "
1639 << (IsRetransmittable(*packet) == HAS_RETRANSMITTABLE_DATA
1640 ? "data bearing "
1641 : " ack only ")
1642 << ", encryption level: "
1643 << QuicUtils::EncryptionLevelToString(packet->encryption_level)
1644 << ", encrypted length:" << encrypted_length;
1645 DVLOG(2) << ENDPOINT << "packet(" << packet_number << "): " << std::endl
1646 << QuicUtils::HexDump(
1647 StringPiece(packet->encrypted_buffer, encrypted_length));
1648
1649 // Measure the RTT from before the write begins to avoid underestimating the
1650 // min_rtt_, especially in cases where the thread blocks or gets swapped out
1651 // during the WritePacket below.
1652 QuicTime packet_send_time = clock_->Now();
1653 WriteResult result = writer_->WritePacket(
1654 packet->encrypted_buffer, encrypted_length, self_address().address(),
1655 peer_address(), per_packet_options_);
1656 if (result.error_code == ERR_IO_PENDING) {
1657 DCHECK_EQ(WRITE_STATUS_BLOCKED, result.status);
1658 }
1659
1660 if (result.status == WRITE_STATUS_BLOCKED) {
1661 visitor_->OnWriteBlocked();
1662 // If the socket buffers the the data, then the packet should not
1663 // be queued and sent again, which would result in an unnecessary
1664 // duplicate packet being sent. The helper must call OnCanWrite
1665 // when the write completes, and OnWriteError if an error occurs.
1666 if (!writer_->IsWriteBlockedDataBuffered()) {
1667 return false;
1668 }
1669 }
1670 if (result.status != WRITE_STATUS_ERROR && debug_visitor_ != nullptr) {
1671 // Pass the write result to the visitor.
1672 debug_visitor_->OnPacketSent(*packet, packet->original_path_id,
1673 packet->original_packet_number,
1674 packet->transmission_type, packet_send_time);
1675 }
1676 if (packet->transmission_type == NOT_RETRANSMISSION) {
1677 time_of_last_sent_new_packet_ = packet_send_time;
1678 if (IsRetransmittable(*packet) == HAS_RETRANSMITTABLE_DATA &&
1679 last_send_for_timeout_ <= time_of_last_received_packet_) {
1680 last_send_for_timeout_ = packet_send_time;
1681 }
1682 }
1683 SetPingAlarm();
1684 MaybeSetMtuAlarm();
1685 DVLOG(1) << ENDPOINT << "time we began writing last sent packet: "
1686 << packet_send_time.ToDebuggingValue();
1687
1688 if (!FLAGS_quic_simple_packet_number_length) {
1689 // TODO(ianswett): Change the packet number length and other packet creator
1690 // options by a more explicit API than setting a struct value directly,
1691 // perhaps via the NetworkChangeVisitor.
1692 packet_generator_.UpdateSequenceNumberLength(
1693 sent_packet_manager_->GetLeastPacketAwaitedByPeer(packet->path_id),
1694 sent_packet_manager_->EstimateMaxPacketsInFlight(max_packet_length()));
1695 }
1696
1697 bool reset_retransmission_alarm = sent_packet_manager_->OnPacketSent(
1698 packet, packet->original_path_id, packet->original_packet_number,
1699 packet_send_time, packet->transmission_type, IsRetransmittable(*packet));
1700
1701 if (reset_retransmission_alarm || !retransmission_alarm_->IsSet()) {
1702 SetRetransmissionAlarm();
1703 }
1704
1705 if (FLAGS_quic_simple_packet_number_length) {
1706 // The packet number length must be updated after OnPacketSent, because it
1707 // may change the packet number length in packet.
1708 packet_generator_.UpdateSequenceNumberLength(
1709 sent_packet_manager_->GetLeastPacketAwaitedByPeer(packet->path_id),
1710 sent_packet_manager_->EstimateMaxPacketsInFlight(max_packet_length()));
1711 }
1712
1713 stats_.bytes_sent += result.bytes_written;
1714 ++stats_.packets_sent;
1715 if (packet->transmission_type != NOT_RETRANSMISSION) {
1716 stats_.bytes_retransmitted += result.bytes_written;
1717 ++stats_.packets_retransmitted;
1718 }
1719
1720 if (result.status == WRITE_STATUS_ERROR) {
1721 OnWriteError(result.error_code);
1722 DLOG(ERROR) << ENDPOINT << "failed writing " << encrypted_length
1723 << " bytes "
1724 << " from host " << (self_address().address().empty()
1725 ? " empty address "
1726 : self_address().ToStringWithoutPort())
1727 << " to address " << peer_address().ToString();
1728 return false;
1729 }
1730
1731 return true;
1732 }
1733
1734 bool QuicConnection::ShouldDiscardPacket(const SerializedPacket& packet) {
1735 if (!connected_) {
1736 DVLOG(1) << ENDPOINT << "Not sending packet as connection is disconnected.";
1737 return true;
1738 }
1739
1740 QuicPacketNumber packet_number = packet.packet_number;
1741 if (encryption_level_ == ENCRYPTION_FORWARD_SECURE &&
1742 packet.encryption_level == ENCRYPTION_NONE) {
1743 // Drop packets that are NULL encrypted since the peer won't accept them
1744 // anymore.
1745 DVLOG(1) << ENDPOINT << "Dropping NULL encrypted packet: " << packet_number
1746 << " since the connection is forward secure.";
1747 return true;
1748 }
1749
1750 return false;
1751 }
1752
1753 void QuicConnection::OnWriteError(int error_code) {
1754 const string error_details = "Write failed with error: " +
1755 base::IntToString(error_code) + " (" +
1756 ErrorToString(error_code) + ")";
1757 DVLOG(1) << ENDPOINT << error_details;
1758 // We can't send an error as the socket is presumably borked.
1759 TearDownLocalConnectionState(QUIC_PACKET_WRITE_ERROR, error_details,
1760 ConnectionCloseSource::FROM_SELF);
1761 }
1762
1763 void QuicConnection::OnSerializedPacket(SerializedPacket* serialized_packet) {
1764 DCHECK_NE(kInvalidPathId, serialized_packet->path_id);
1765 if (serialized_packet->encrypted_buffer == nullptr) {
1766 // We failed to serialize the packet, so close the connection.
1767 // TearDownLocalConnectionState does not send close packet, so no infinite
1768 // loop here.
1769 // TODO(ianswett): This is actually an internal error, not an
1770 // encryption failure.
1771 TearDownLocalConnectionState(
1772 QUIC_ENCRYPTION_FAILURE,
1773 "Serialized packet does not have an encrypted buffer.",
1774 ConnectionCloseSource::FROM_SELF);
1775 return;
1776 }
1777 SendOrQueuePacket(serialized_packet);
1778 }
1779
1780 void QuicConnection::OnUnrecoverableError(QuicErrorCode error,
1781 const string& error_details,
1782 ConnectionCloseSource source) {
1783 // The packet creator or generator encountered an unrecoverable error: tear
1784 // down local connection state immediately.
1785 TearDownLocalConnectionState(error, error_details, source);
1786 }
1787
1788 void QuicConnection::OnCongestionChange() {
1789 visitor_->OnCongestionWindowChange(clock_->ApproximateNow());
1790
1791 // Uses the connection's smoothed RTT. If zero, uses initial_rtt.
1792 QuicTime::Delta rtt = sent_packet_manager_->GetRttStats()->smoothed_rtt();
1793 if (rtt.IsZero()) {
1794 rtt = QuicTime::Delta::FromMicroseconds(
1795 sent_packet_manager_->GetRttStats()->initial_rtt_us());
1796 }
1797
1798 if (debug_visitor_)
1799 debug_visitor_->OnRttChanged(rtt);
1800 }
1801
1802 void QuicConnection::OnPathDegrading() {
1803 visitor_->OnPathDegrading();
1804 }
1805
1806 void QuicConnection::OnPathMtuIncreased(QuicPacketLength packet_size) {
1807 DCHECK(FLAGS_quic_no_mtu_discovery_ack_listener);
1808 if (packet_size > max_packet_length()) {
1809 SetMaxPacketLength(packet_size);
1810 }
1811 }
1812
1813 void QuicConnection::OnHandshakeComplete() {
1814 sent_packet_manager_->SetHandshakeConfirmed();
1815 // The client should immediately ack the SHLO to confirm the handshake is
1816 // complete with the server.
1817 if (perspective_ == Perspective::IS_CLIENT && !ack_queued_ &&
1818 ack_frame_updated()) {
1819 ack_alarm_->Update(clock_->ApproximateNow(), QuicTime::Delta::Zero());
1820 }
1821 }
1822
1823 void QuicConnection::SendOrQueuePacket(SerializedPacket* packet) {
1824 // The caller of this function is responsible for checking CanWrite().
1825 if (packet->encrypted_buffer == nullptr) {
1826 QUIC_BUG << "packet.encrypted_buffer == nullptr in to SendOrQueuePacket";
1827 return;
1828 }
1829 if (version() <= QUIC_VERSION_33) {
1830 sent_entropy_manager_.RecordPacketEntropyHash(packet->packet_number,
1831 packet->entropy_hash);
1832 }
1833 // If there are already queued packets, queue this one immediately to ensure
1834 // it's written in sequence number order.
1835 if (!queued_packets_.empty() || !WritePacket(packet)) {
1836 // Take ownership of the underlying encrypted packet.
1837 packet->encrypted_buffer = QuicUtils::CopyBuffer(*packet);
1838 queued_packets_.push_back(*packet);
1839 packet->retransmittable_frames.clear();
1840 }
1841
1842 QuicUtils::ClearSerializedPacket(packet);
1843 // If a forward-secure encrypter is available but is not being used and the
1844 // next packet number is the first packet which requires
1845 // forward security, start using the forward-secure encrypter.
1846 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE &&
1847 has_forward_secure_encrypter_ &&
1848 packet->packet_number >= first_required_forward_secure_packet_ - 1) {
1849 SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
1850 }
1851 }
1852
1853 void QuicConnection::OnPingTimeout() {
1854 if (!retransmission_alarm_->IsSet()) {
1855 SendPing();
1856 }
1857 }
1858
1859 void QuicConnection::SendPing() {
1860 ScopedPacketBundler bundler(this, SEND_ACK_IF_QUEUED);
1861 packet_generator_.AddControlFrame(QuicFrame(QuicPingFrame()));
1862 // Send PING frame immediately, without checking for congestion window bounds.
1863 packet_generator_.FlushAllQueuedFrames();
1864 }
1865
1866 void QuicConnection::SendAck() {
1867 ack_alarm_->Cancel();
1868 ack_queued_ = false;
1869 stop_waiting_count_ = 0;
1870 num_retransmittable_packets_received_since_last_ack_sent_ = 0;
1871 last_ack_had_missing_packets_ = received_packet_manager_.HasMissingPackets();
1872 num_packets_received_since_last_ack_sent_ = 0;
1873
1874 packet_generator_.SetShouldSendAck(true);
1875 }
1876
1877 void QuicConnection::OnRetransmissionTimeout() {
1878 DCHECK(sent_packet_manager_->HasUnackedPackets());
1879
1880 if (close_connection_after_five_rtos_ &&
1881 sent_packet_manager_->GetConsecutiveRtoCount() >= 4) {
1882 // Close on the 5th consecutive RTO, so after 4 previous RTOs have occurred.
1883 CloseConnection(QUIC_TOO_MANY_RTOS, "5 consecutive retransmission timeouts",
1884 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1885 return;
1886 }
1887
1888 sent_packet_manager_->OnRetransmissionTimeout();
1889 WriteIfNotBlocked();
1890
1891 // A write failure can result in the connection being closed, don't attempt to
1892 // write further packets, or to set alarms.
1893 if (!connected_) {
1894 return;
1895 }
1896
1897 // In the TLP case, the SentPacketManager gives the connection the opportunity
1898 // to send new data before retransmitting.
1899 if (sent_packet_manager_->MaybeRetransmitTailLossProbe()) {
1900 // Send the pending retransmission now that it's been queued.
1901 WriteIfNotBlocked();
1902 }
1903
1904 // Ensure the retransmission alarm is always set if there are unacked packets
1905 // and nothing waiting to be sent.
1906 // This happens if the loss algorithm invokes a timer based loss, but the
1907 // packet doesn't need to be retransmitted.
1908 if (!HasQueuedData() && !retransmission_alarm_->IsSet()) {
1909 SetRetransmissionAlarm();
1910 }
1911 }
1912
1913 void QuicConnection::SetEncrypter(EncryptionLevel level,
1914 QuicEncrypter* encrypter) {
1915 packet_generator_.SetEncrypter(level, encrypter);
1916 if (level == ENCRYPTION_FORWARD_SECURE) {
1917 has_forward_secure_encrypter_ = true;
1918 first_required_forward_secure_packet_ =
1919 packet_number_of_last_sent_packet_ +
1920 // 3 times the current congestion window (in slow start) should cover
1921 // about two full round trips worth of packets, which should be
1922 // sufficient.
1923 3 *
1924 sent_packet_manager_->EstimateMaxPacketsInFlight(
1925 max_packet_length());
1926 }
1927 }
1928
1929 void QuicConnection::SetDiversificationNonce(const DiversificationNonce nonce) {
1930 DCHECK_EQ(Perspective::IS_SERVER, perspective_);
1931 packet_generator_.SetDiversificationNonce(nonce);
1932 }
1933
1934 void QuicConnection::SetDefaultEncryptionLevel(EncryptionLevel level) {
1935 encryption_level_ = level;
1936 packet_generator_.set_encryption_level(level);
1937 }
1938
1939 void QuicConnection::SetDecrypter(EncryptionLevel level,
1940 QuicDecrypter* decrypter) {
1941 framer_.SetDecrypter(level, decrypter);
1942 }
1943
1944 void QuicConnection::SetAlternativeDecrypter(EncryptionLevel level,
1945 QuicDecrypter* decrypter,
1946 bool latch_once_used) {
1947 framer_.SetAlternativeDecrypter(level, decrypter, latch_once_used);
1948 }
1949
1950 const QuicDecrypter* QuicConnection::decrypter() const {
1951 return framer_.decrypter();
1952 }
1953
1954 const QuicDecrypter* QuicConnection::alternative_decrypter() const {
1955 return framer_.alternative_decrypter();
1956 }
1957
1958 void QuicConnection::QueueUndecryptablePacket(
1959 const QuicEncryptedPacket& packet) {
1960 DVLOG(1) << ENDPOINT << "Queueing undecryptable packet.";
1961 undecryptable_packets_.push_back(packet.Clone());
1962 }
1963
1964 void QuicConnection::MaybeProcessUndecryptablePackets() {
1965 if (undecryptable_packets_.empty() || encryption_level_ == ENCRYPTION_NONE) {
1966 return;
1967 }
1968
1969 while (connected_ && !undecryptable_packets_.empty()) {
1970 DVLOG(1) << ENDPOINT << "Attempting to process undecryptable packet";
1971 QuicEncryptedPacket* packet = undecryptable_packets_.front();
1972 if (!framer_.ProcessPacket(*packet) &&
1973 framer_.error() == QUIC_DECRYPTION_FAILURE) {
1974 DVLOG(1) << ENDPOINT << "Unable to process undecryptable packet...";
1975 break;
1976 }
1977 DVLOG(1) << ENDPOINT << "Processed undecryptable packet!";
1978 ++stats_.packets_processed;
1979 delete packet;
1980 undecryptable_packets_.pop_front();
1981 }
1982
1983 // Once forward secure encryption is in use, there will be no
1984 // new keys installed and hence any undecryptable packets will
1985 // never be able to be decrypted.
1986 if (encryption_level_ == ENCRYPTION_FORWARD_SECURE) {
1987 if (debug_visitor_ != nullptr) {
1988 // TODO(rtenneti): perhaps more efficient to pass the number of
1989 // undecryptable packets as the argument to OnUndecryptablePacket so that
1990 // we just need to call OnUndecryptablePacket once?
1991 for (size_t i = 0; i < undecryptable_packets_.size(); ++i) {
1992 debug_visitor_->OnUndecryptablePacket();
1993 }
1994 }
1995 STLDeleteElements(&undecryptable_packets_);
1996 }
1997 }
1998
1999 void QuicConnection::CloseConnection(
2000 QuicErrorCode error,
2001 const string& error_details,
2002 ConnectionCloseBehavior connection_close_behavior) {
2003 DCHECK(!error_details.empty());
2004 if (!connected_) {
2005 DVLOG(1) << "Connection is already closed.";
2006 return;
2007 }
2008
2009 DVLOG(1) << ENDPOINT << "Closing connection: " << connection_id()
2010 << ", with error: " << QuicUtils::ErrorToString(error) << " ("
2011 << error << "), and details: " << error_details;
2012
2013 if (connection_close_behavior ==
2014 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET) {
2015 SendConnectionClosePacket(error, error_details);
2016 }
2017
2018 TearDownLocalConnectionState(error, error_details,
2019 ConnectionCloseSource::FROM_SELF);
2020 }
2021
2022 void QuicConnection::SendConnectionClosePacket(QuicErrorCode error,
2023 const string& details) {
2024 DVLOG(1) << ENDPOINT << "Sending connection close packet.";
2025 ClearQueuedPackets();
2026 ScopedPacketBundler ack_bundler(this, SEND_ACK);
2027 QuicConnectionCloseFrame* frame = new QuicConnectionCloseFrame();
2028 frame->error_code = error;
2029 frame->error_details = details;
2030 packet_generator_.AddControlFrame(QuicFrame(frame));
2031 packet_generator_.FlushAllQueuedFrames();
2032 }
2033
2034 void QuicConnection::TearDownLocalConnectionState(
2035 QuicErrorCode error,
2036 const string& error_details,
2037 ConnectionCloseSource source) {
2038 if (!connected_) {
2039 DVLOG(1) << "Connection is already closed.";
2040 return;
2041 }
2042 connected_ = false;
2043 DCHECK(visitor_ != nullptr);
2044 // TODO(rtenneti): crbug.com/546668. A temporary fix. Added a check for null
2045 // |visitor_| to fix crash bug. Delete |visitor_| check and histogram after
2046 // fix is merged.
2047 if (visitor_ != nullptr) {
2048 visitor_->OnConnectionClosed(error, error_details, source);
2049 } else {
2050 UMA_HISTOGRAM_BOOLEAN("Net.QuicCloseConnection.NullVisitor", true);
2051 }
2052 if (debug_visitor_ != nullptr) {
2053 debug_visitor_->OnConnectionClosed(error, error_details, source);
2054 }
2055 // Cancel the alarms so they don't trigger any action now that the
2056 // connection is closed.
2057 CancelAllAlarms();
2058 }
2059
2060 void QuicConnection::CancelAllAlarms() {
2061 ack_alarm_->Cancel();
2062 ping_alarm_->Cancel();
2063 resume_writes_alarm_->Cancel();
2064 retransmission_alarm_->Cancel();
2065 send_alarm_->Cancel();
2066 timeout_alarm_->Cancel();
2067 mtu_discovery_alarm_->Cancel();
2068 }
2069
2070 void QuicConnection::SendGoAway(QuicErrorCode error,
2071 QuicStreamId last_good_stream_id,
2072 const string& reason) {
2073 if (goaway_sent_) {
2074 return;
2075 }
2076 goaway_sent_ = true;
2077
2078 DVLOG(1) << ENDPOINT << "Going away with error "
2079 << QuicUtils::ErrorToString(error) << " (" << error << ")";
2080
2081 // Opportunistically bundle an ack with this outgoing packet.
2082 ScopedPacketBundler ack_bundler(this, SEND_ACK_IF_PENDING);
2083 packet_generator_.AddControlFrame(
2084 QuicFrame(new QuicGoAwayFrame(error, last_good_stream_id, reason)));
2085 }
2086
2087 QuicByteCount QuicConnection::max_packet_length() const {
2088 return packet_generator_.GetCurrentMaxPacketLength();
2089 }
2090
2091 void QuicConnection::SetMaxPacketLength(QuicByteCount length) {
2092 return packet_generator_.SetMaxPacketLength(LimitMaxPacketSize(length));
2093 }
2094
2095 bool QuicConnection::HasQueuedData() const {
2096 return pending_version_negotiation_packet_ || !queued_packets_.empty() ||
2097 packet_generator_.HasQueuedFrames();
2098 }
2099
2100 void QuicConnection::EnableSavingCryptoPackets() {
2101 save_crypto_packets_as_termination_packets_ = true;
2102 }
2103
2104 bool QuicConnection::CanWriteStreamData() {
2105 // Don't write stream data if there are negotiation or queued data packets
2106 // to send. Otherwise, continue and bundle as many frames as possible.
2107 if (pending_version_negotiation_packet_ || !queued_packets_.empty()) {
2108 return false;
2109 }
2110
2111 IsHandshake pending_handshake =
2112 visitor_->HasPendingHandshake() ? IS_HANDSHAKE : NOT_HANDSHAKE;
2113 // Sending queued packets may have caused the socket to become write blocked,
2114 // or the congestion manager to prohibit sending. If we've sent everything
2115 // we had queued and we're still not blocked, let the visitor know it can
2116 // write more.
2117 return ShouldGeneratePacket(HAS_RETRANSMITTABLE_DATA, pending_handshake);
2118 }
2119
2120 void QuicConnection::SetNetworkTimeouts(QuicTime::Delta handshake_timeout,
2121 QuicTime::Delta idle_timeout) {
2122 QUIC_BUG_IF(idle_timeout > handshake_timeout)
2123 << "idle_timeout:" << idle_timeout.ToMilliseconds()
2124 << " handshake_timeout:" << handshake_timeout.ToMilliseconds();
2125 // Adjust the idle timeout on client and server to prevent clients from
2126 // sending requests to servers which have already closed the connection.
2127 if (perspective_ == Perspective::IS_SERVER) {
2128 idle_timeout = idle_timeout + QuicTime::Delta::FromSeconds(3);
2129 } else if (idle_timeout > QuicTime::Delta::FromSeconds(1)) {
2130 idle_timeout = idle_timeout - QuicTime::Delta::FromSeconds(1);
2131 }
2132 handshake_timeout_ = handshake_timeout;
2133 idle_network_timeout_ = idle_timeout;
2134
2135 SetTimeoutAlarm();
2136 }
2137
2138 void QuicConnection::CheckForTimeout() {
2139 QuicTime now = clock_->ApproximateNow();
2140 QuicTime time_of_last_packet =
2141 max(time_of_last_received_packet_, last_send_for_timeout_);
2142
2143 // |delta| can be < 0 as |now| is approximate time but |time_of_last_packet|
2144 // is accurate time. However, this should not change the behavior of
2145 // timeout handling.
2146 QuicTime::Delta idle_duration = now - time_of_last_packet;
2147 DVLOG(1) << ENDPOINT << "last packet "
2148 << time_of_last_packet.ToDebuggingValue()
2149 << " now:" << now.ToDebuggingValue()
2150 << " idle_duration:" << idle_duration.ToMicroseconds()
2151 << " idle_network_timeout: "
2152 << idle_network_timeout_.ToMicroseconds();
2153 if (idle_duration >= idle_network_timeout_) {
2154 const string error_details = "No recent network activity.";
2155 DVLOG(1) << ENDPOINT << error_details;
2156 CloseConnection(QUIC_NETWORK_IDLE_TIMEOUT, error_details,
2157 idle_timeout_connection_close_behavior_);
2158 return;
2159 }
2160
2161 if (!handshake_timeout_.IsInfinite()) {
2162 QuicTime::Delta connected_duration = now - stats_.connection_creation_time;
2163 DVLOG(1) << ENDPOINT
2164 << "connection time: " << connected_duration.ToMicroseconds()
2165 << " handshake timeout: " << handshake_timeout_.ToMicroseconds();
2166 if (connected_duration >= handshake_timeout_) {
2167 const string error_details = "Handshake timeout expired.";
2168 DVLOG(1) << ENDPOINT << error_details;
2169 CloseConnection(QUIC_HANDSHAKE_TIMEOUT, error_details,
2170 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2171 return;
2172 }
2173 }
2174
2175 SetTimeoutAlarm();
2176 }
2177
2178 void QuicConnection::SetTimeoutAlarm() {
2179 QuicTime time_of_last_packet =
2180 max(time_of_last_received_packet_, time_of_last_sent_new_packet_);
2181
2182 QuicTime deadline = time_of_last_packet + idle_network_timeout_;
2183 if (!handshake_timeout_.IsInfinite()) {
2184 deadline =
2185 min(deadline, stats_.connection_creation_time + handshake_timeout_);
2186 }
2187
2188 timeout_alarm_->Update(deadline, QuicTime::Delta::Zero());
2189 }
2190
2191 void QuicConnection::SetPingAlarm() {
2192 if (perspective_ == Perspective::IS_SERVER) {
2193 // Only clients send pings.
2194 return;
2195 }
2196 if (!visitor_->HasOpenDynamicStreams()) {
2197 ping_alarm_->Cancel();
2198 // Don't send a ping unless there are open streams.
2199 return;
2200 }
2201 QuicTime::Delta ping_timeout = QuicTime::Delta::FromSeconds(kPingTimeoutSecs);
2202 ping_alarm_->Update(clock_->ApproximateNow() + ping_timeout,
2203 QuicTime::Delta::FromSeconds(1));
2204 }
2205
2206 void QuicConnection::SetRetransmissionAlarm() {
2207 if (delay_setting_retransmission_alarm_) {
2208 pending_retransmission_alarm_ = true;
2209 return;
2210 }
2211 QuicTime retransmission_time = sent_packet_manager_->GetRetransmissionTime();
2212 retransmission_alarm_->Update(retransmission_time,
2213 QuicTime::Delta::FromMilliseconds(1));
2214 }
2215
2216 void QuicConnection::MaybeSetMtuAlarm() {
2217 // Do not set the alarm if the target size is less than the current size.
2218 // This covers the case when |mtu_discovery_target_| is at its default value,
2219 // zero.
2220 if (mtu_discovery_target_ <= max_packet_length()) {
2221 return;
2222 }
2223
2224 if (mtu_probe_count_ >= kMtuDiscoveryAttempts) {
2225 return;
2226 }
2227
2228 if (mtu_discovery_alarm_->IsSet()) {
2229 return;
2230 }
2231
2232 if (packet_number_of_last_sent_packet_ >= next_mtu_probe_at_) {
2233 // Use an alarm to send the MTU probe to ensure that no ScopedPacketBundlers
2234 // are active.
2235 mtu_discovery_alarm_->Set(clock_->ApproximateNow());
2236 }
2237 }
2238
2239 QuicConnection::ScopedPacketBundler::ScopedPacketBundler(
2240 QuicConnection* connection,
2241 AckBundling ack_mode)
2242 : connection_(connection),
2243 already_in_batch_mode_(connection != nullptr &&
2244 connection->packet_generator_.InBatchMode()) {
2245 if (connection_ == nullptr) {
2246 return;
2247 }
2248 // Move generator into batch mode. If caller wants us to include an ack,
2249 // check the delayed-ack timer to see if there's ack info to be sent.
2250 if (!already_in_batch_mode_) {
2251 DVLOG(2) << "Entering Batch Mode.";
2252 connection_->packet_generator_.StartBatchOperations();
2253 }
2254 if (ShouldSendAck(ack_mode)) {
2255 DVLOG(1) << "Bundling ack with outgoing packet.";
2256 DCHECK(ack_mode == SEND_ACK || connection_->ack_frame_updated() ||
2257 connection_->stop_waiting_count_ > 1);
2258 connection_->SendAck();
2259 }
2260 }
2261
2262 bool QuicConnection::ScopedPacketBundler::ShouldSendAck(
2263 AckBundling ack_mode) const {
2264 switch (ack_mode) {
2265 case SEND_ACK:
2266 return true;
2267 case SEND_ACK_IF_QUEUED:
2268 return connection_->ack_queued();
2269 case SEND_ACK_IF_PENDING:
2270 return connection_->ack_alarm_->IsSet() ||
2271 connection_->stop_waiting_count_ > 1;
2272 default:
2273 QUIC_BUG << "Unsupported ack_mode.";
2274 return true;
2275 }
2276 }
2277
2278 QuicConnection::ScopedPacketBundler::~ScopedPacketBundler() {
2279 if (connection_ == nullptr) {
2280 return;
2281 }
2282 // If we changed the generator's batch state, restore original batch state.
2283 if (!already_in_batch_mode_) {
2284 DVLOG(2) << "Leaving Batch Mode.";
2285 connection_->packet_generator_.FinishBatchOperations();
2286 }
2287 DCHECK_EQ(already_in_batch_mode_,
2288 connection_->packet_generator_.InBatchMode());
2289 }
2290
2291 QuicConnection::ScopedRetransmissionScheduler::ScopedRetransmissionScheduler(
2292 QuicConnection* connection)
2293 : connection_(connection),
2294 already_delayed_(connection_->delay_setting_retransmission_alarm_) {
2295 connection_->delay_setting_retransmission_alarm_ = true;
2296 }
2297
2298 QuicConnection::ScopedRetransmissionScheduler::
2299 ~ScopedRetransmissionScheduler() {
2300 if (already_delayed_) {
2301 return;
2302 }
2303 connection_->delay_setting_retransmission_alarm_ = false;
2304 if (connection_->pending_retransmission_alarm_) {
2305 connection_->SetRetransmissionAlarm();
2306 connection_->pending_retransmission_alarm_ = false;
2307 }
2308 }
2309
2310 HasRetransmittableData QuicConnection::IsRetransmittable(
2311 const SerializedPacket& packet) {
2312 // Retransmitted packets retransmittable frames are owned by the unacked
2313 // packet map, but are not present in the serialized packet.
2314 if (packet.transmission_type != NOT_RETRANSMISSION ||
2315 !packet.retransmittable_frames.empty()) {
2316 return HAS_RETRANSMITTABLE_DATA;
2317 } else {
2318 return NO_RETRANSMITTABLE_DATA;
2319 }
2320 }
2321
2322 bool QuicConnection::IsTerminationPacket(const SerializedPacket& packet) {
2323 if (packet.retransmittable_frames.empty()) {
2324 return false;
2325 }
2326 for (const QuicFrame& frame : packet.retransmittable_frames) {
2327 if (frame.type == CONNECTION_CLOSE_FRAME) {
2328 return true;
2329 }
2330 if (save_crypto_packets_as_termination_packets_ &&
2331 frame.type == STREAM_FRAME &&
2332 frame.stream_frame->stream_id == kCryptoStreamId) {
2333 return true;
2334 }
2335 }
2336 return false;
2337 }
2338
2339 void QuicConnection::SetMtuDiscoveryTarget(QuicByteCount target) {
2340 mtu_discovery_target_ = LimitMaxPacketSize(target);
2341 }
2342
2343 QuicByteCount QuicConnection::LimitMaxPacketSize(
2344 QuicByteCount suggested_max_packet_size) {
2345 if (peer_address_.address().empty()) {
2346 QUIC_BUG << "Attempted to use a connection without a valid peer address";
2347 return suggested_max_packet_size;
2348 }
2349
2350 const QuicByteCount writer_limit = writer_->GetMaxPacketSize(peer_address());
2351
2352 QuicByteCount max_packet_size = suggested_max_packet_size;
2353 if (max_packet_size > writer_limit) {
2354 max_packet_size = writer_limit;
2355 }
2356 if (max_packet_size > kMaxPacketSize) {
2357 max_packet_size = kMaxPacketSize;
2358 }
2359 return max_packet_size;
2360 }
2361
2362 void QuicConnection::SendMtuDiscoveryPacket(QuicByteCount target_mtu) {
2363 // Currently, this limit is ensured by the caller.
2364 DCHECK_EQ(target_mtu, LimitMaxPacketSize(target_mtu));
2365
2366 // Create a listener for the new probe. The ownership of the listener is
2367 // transferred to the AckNotifierManager. The notifier will get destroyed
2368 // before the connection (because it's stored in one of the connection's
2369 // subfields), hence |this| pointer is guaranteed to stay valid at all times.
2370 scoped_refptr<MtuDiscoveryAckListener> last_mtu_discovery_ack_listener(
2371 new MtuDiscoveryAckListener(this, target_mtu));
2372
2373 // Send the probe.
2374 packet_generator_.GenerateMtuDiscoveryPacket(
2375 target_mtu, FLAGS_quic_no_mtu_discovery_ack_listener
2376 ? nullptr
2377 : last_mtu_discovery_ack_listener.get());
2378 }
2379
2380 void QuicConnection::DiscoverMtu() {
2381 DCHECK(!mtu_discovery_alarm_->IsSet());
2382
2383 // Check if the MTU has been already increased.
2384 if (mtu_discovery_target_ <= max_packet_length()) {
2385 return;
2386 }
2387
2388 // Calculate the packet number of the next probe *before* sending the current
2389 // one. Otherwise, when SendMtuDiscoveryPacket() is called,
2390 // MaybeSetMtuAlarm() will not realize that the probe has been just sent, and
2391 // will reschedule this probe again.
2392 packets_between_mtu_probes_ *= 2;
2393 next_mtu_probe_at_ =
2394 packet_number_of_last_sent_packet_ + packets_between_mtu_probes_ + 1;
2395 ++mtu_probe_count_;
2396
2397 DVLOG(2) << "Sending a path MTU discovery packet #" << mtu_probe_count_;
2398 SendMtuDiscoveryPacket(mtu_discovery_target_);
2399
2400 DCHECK(!mtu_discovery_alarm_->IsSet());
2401 }
2402
2403 void QuicConnection::OnPeerMigrationValidated(QuicPathId path_id) {
2404 if (active_peer_migration_type_ == NO_CHANGE) {
2405 QUIC_BUG << "No migration underway.";
2406 return;
2407 }
2408 highest_packet_sent_before_peer_migration_ = 0;
2409 active_peer_migration_type_ = NO_CHANGE;
2410 }
2411
2412 // TODO(jri): Modify method to start migration whenever a new IP address is seen
2413 // from a packet with sequence number > the one that triggered the previous
2414 // migration. This should happen even if a migration is underway, since the
2415 // most recent migration is the one that we should pay attention to.
2416 void QuicConnection::StartPeerMigration(
2417 QuicPathId path_id,
2418 PeerAddressChangeType peer_migration_type) {
2419 // TODO(fayang): Currently, all peer address change type are allowed. Need to
2420 // add a method ShouldAllowPeerAddressChange(PeerAddressChangeType type) to
2421 // determine whether |type| is allowed.
2422 if (active_peer_migration_type_ != NO_CHANGE ||
2423 peer_migration_type == NO_CHANGE) {
2424 QUIC_BUG << "Migration underway or no new migration started.";
2425 return;
2426 }
2427 DVLOG(1) << ENDPOINT << "Peer's ip:port changed from "
2428 << peer_address_.ToString() << " to "
2429 << last_packet_source_address_.ToString()
2430 << ", migrating connection.";
2431
2432 highest_packet_sent_before_peer_migration_ =
2433 packet_number_of_last_sent_packet_;
2434 peer_address_ = last_packet_source_address_;
2435 active_peer_migration_type_ = peer_migration_type;
2436
2437 // TODO(jri): Move these calls to OnPeerMigrationValidated. Rename
2438 // OnConnectionMigration methods to OnPeerMigration.
2439 visitor_->OnConnectionMigration(peer_migration_type);
2440 sent_packet_manager_->OnConnectionMigration(path_id, peer_migration_type);
2441 }
2442
2443 void QuicConnection::OnPathClosed(QuicPathId path_id) {
2444 // Stop receiving packets on this path.
2445 framer_.OnPathClosed(path_id);
2446 }
2447
2448 bool QuicConnection::ack_frame_updated() const {
2449 return received_packet_manager_.ack_frame_updated();
2450 }
2451
2452 StringPiece QuicConnection::GetCurrentPacket() {
2453 if (current_packet_data_ == nullptr) {
2454 return StringPiece();
2455 }
2456 return StringPiece(current_packet_data_, last_size_);
2457 }
2458
2459 bool QuicConnection::MaybeConsiderAsMemoryCorruption(
2460 const QuicStreamFrame& frame) {
2461 if (frame.stream_id == kCryptoStreamId ||
2462 last_decrypted_packet_level_ != ENCRYPTION_NONE) {
2463 return false;
2464 }
2465
2466 if (perspective_ == Perspective::IS_SERVER &&
2467 frame.data_length >= sizeof(kCHLO) &&
2468 strncmp(frame.data_buffer, reinterpret_cast<const char*>(&kCHLO),
2469 sizeof(kCHLO)) == 0) {
2470 return true;
2471 }
2472
2473 if (perspective_ == Perspective::IS_CLIENT &&
2474 frame.data_length >= sizeof(kREJ) &&
2475 strncmp(frame.data_buffer, reinterpret_cast<const char*>(&kREJ),
2476 sizeof(kREJ)) == 0) {
2477 return true;
2478 }
2479
2480 return false;
2481 }
2482
2483 // Uses a 25ms delayed ack timer. Also helps with better signaling
2484 // in low-bandwidth (< ~384 kbps), where an ack is sent per packet.
2485 // Ensures that the Delayed Ack timer is always set to a value lesser
2486 // than the retransmission timer's minimum value (MinRTO). We want the
2487 // delayed ack to get back to the QUIC peer before the sender's
2488 // retransmission timer triggers. Since we do not know the
2489 // reverse-path one-way delay, we assume equal delays for forward and
2490 // reverse paths, and ensure that the timer is set to less than half
2491 // of the MinRTO.
2492 // There may be a value in making this delay adaptive with the help of
2493 // the sender and a signaling mechanism -- if the sender uses a
2494 // different MinRTO, we may get spurious retransmissions. May not have
2495 // any benefits, but if the delayed ack becomes a significant source
2496 // of (likely, tail) latency, then consider such a mechanism.
2497 const QuicTime::Delta QuicConnection::DelayedAckTime() {
2498 return QuicTime::Delta::FromMilliseconds(
2499 min(kMaxDelayedAckTimeMs, kMinRetransmissionTimeMs / 2));
2500 }
2501
2502 } // namespace net
OLDNEW
« no previous file with comments | « net/quic/quic_connection.h ('k') | net/quic/quic_connection_stats.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698