blob: ad56a0659cccd74c3a761cbcf3d2c8fa53a7d077 [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/core/quic_connection.h"
6
7#include <string.h>
8#include <sys/types.h>
9
10#include <algorithm>
11#include <iterator>
12#include <limits>
13#include <memory>
14#include <set>
vasilvv872e7a32019-03-12 16:42:44 -070015#include <string>
QUICHE teama6ef0a62019-03-07 20:34:33 -050016#include <utility>
17
QUICHE teama6ef0a62019-03-07 20:34:33 -050018#include "net/third_party/quiche/src/quic/core/crypto/crypto_protocol.h"
19#include "net/third_party/quiche/src/quic/core/crypto/quic_decrypter.h"
20#include "net/third_party/quiche/src/quic/core/crypto/quic_encrypter.h"
21#include "net/third_party/quiche/src/quic/core/proto/cached_network_parameters.pb.h"
22#include "net/third_party/quiche/src/quic/core/quic_bandwidth.h"
23#include "net/third_party/quiche/src/quic/core/quic_config.h"
QUICHE teamc65d1d12019-03-19 20:58:04 -070024#include "net/third_party/quiche/src/quic/core/quic_connection_id.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050025#include "net/third_party/quiche/src/quic/core/quic_packet_generator.h"
26#include "net/third_party/quiche/src/quic/core/quic_pending_retransmission.h"
27#include "net/third_party/quiche/src/quic/core/quic_types.h"
28#include "net/third_party/quiche/src/quic/core/quic_utils.h"
29#include "net/third_party/quiche/src/quic/platform/api/quic_bug_tracker.h"
30#include "net/third_party/quiche/src/quic/platform/api/quic_client_stats.h"
31#include "net/third_party/quiche/src/quic/platform/api/quic_error_code_wrappers.h"
32#include "net/third_party/quiche/src/quic/platform/api/quic_exported_stats.h"
33#include "net/third_party/quiche/src/quic/platform/api/quic_flag_utils.h"
34#include "net/third_party/quiche/src/quic/platform/api/quic_flags.h"
35#include "net/third_party/quiche/src/quic/platform/api/quic_logging.h"
36#include "net/third_party/quiche/src/quic/platform/api/quic_map_util.h"
37#include "net/third_party/quiche/src/quic/platform/api/quic_str_cat.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050038#include "net/third_party/quiche/src/quic/platform/api/quic_string_utils.h"
39#include "net/third_party/quiche/src/quic/platform/api/quic_text_utils.h"
40
41namespace quic {
42
43class QuicDecrypter;
44class QuicEncrypter;
45
46namespace {
47
48// Maximum number of consecutive sent nonretransmittable packets.
49const QuicPacketCount kMaxConsecutiveNonRetransmittablePackets = 19;
50
51// Maximum number of retransmittable packets received before sending an ack.
52const QuicPacketCount kDefaultRetransmittablePacketsBeforeAck = 2;
53// Minimum number of packets received before ack decimation is enabled.
54// This intends to avoid the beginning of slow start, when CWNDs may be
55// rapidly increasing.
56const QuicPacketCount kMinReceivedBeforeAckDecimation = 100;
57// Wait for up to 10 retransmittable packets before sending an ack.
58const QuicPacketCount kMaxRetransmittablePacketsBeforeAck = 10;
59// One quarter RTT delay when doing ack decimation.
60const float kAckDecimationDelay = 0.25;
61// One eighth RTT delay when doing ack decimation.
62const float kShortAckDecimationDelay = 0.125;
63
64// The minimum release time into future in ms.
65const int kMinReleaseTimeIntoFutureMs = 1;
66
67bool Near(QuicPacketNumber a, QuicPacketNumber b) {
68 QuicPacketCount delta = (a > b) ? a - b : b - a;
69 return delta <= kMaxPacketGap;
70}
71
72// An alarm that is scheduled to send an ack if a timeout occurs.
73class AckAlarmDelegate : public QuicAlarm::Delegate {
74 public:
75 explicit AckAlarmDelegate(QuicConnection* connection)
76 : connection_(connection) {}
77 AckAlarmDelegate(const AckAlarmDelegate&) = delete;
78 AckAlarmDelegate& operator=(const AckAlarmDelegate&) = delete;
79
80 void OnAlarm() override {
81 DCHECK(connection_->ack_frame_updated());
82 QuicConnection::ScopedPacketFlusher flusher(connection_,
83 QuicConnection::SEND_ACK);
84 if (connection_->packet_generator().deprecate_ack_bundling_mode()) {
QUICHE teamcd098022019-03-22 18:49:55 -070085 if (connection_->SupportsMultiplePacketNumberSpaces()) {
86 connection_->SendAllPendingAcks();
87 } else {
88 DCHECK(!connection_->GetUpdatedAckFrame().ack_frame->packets.Empty());
89 connection_->SendAck();
90 }
QUICHE teama6ef0a62019-03-07 20:34:33 -050091 }
92 }
93
94 private:
95 QuicConnection* connection_;
96};
97
98// This alarm will be scheduled any time a data-bearing packet is sent out.
99// When the alarm goes off, the connection checks to see if the oldest packets
100// have been acked, and retransmit them if they have not.
101class RetransmissionAlarmDelegate : public QuicAlarm::Delegate {
102 public:
103 explicit RetransmissionAlarmDelegate(QuicConnection* connection)
104 : connection_(connection) {}
105 RetransmissionAlarmDelegate(const RetransmissionAlarmDelegate&) = delete;
106 RetransmissionAlarmDelegate& operator=(const RetransmissionAlarmDelegate&) =
107 delete;
108
109 void OnAlarm() override { connection_->OnRetransmissionTimeout(); }
110
111 private:
112 QuicConnection* connection_;
113};
114
115// An alarm that is scheduled when the SentPacketManager requires a delay
116// before sending packets and fires when the packet may be sent.
117class SendAlarmDelegate : public QuicAlarm::Delegate {
118 public:
119 explicit SendAlarmDelegate(QuicConnection* connection)
120 : connection_(connection) {}
121 SendAlarmDelegate(const SendAlarmDelegate&) = delete;
122 SendAlarmDelegate& operator=(const SendAlarmDelegate&) = delete;
123
124 void OnAlarm() override { connection_->WriteAndBundleAcksIfNotBlocked(); }
125
126 private:
127 QuicConnection* connection_;
128};
129
130class PathDegradingAlarmDelegate : public QuicAlarm::Delegate {
131 public:
132 explicit PathDegradingAlarmDelegate(QuicConnection* connection)
133 : connection_(connection) {}
134 PathDegradingAlarmDelegate(const PathDegradingAlarmDelegate&) = delete;
135 PathDegradingAlarmDelegate& operator=(const PathDegradingAlarmDelegate&) =
136 delete;
137
138 void OnAlarm() override { connection_->OnPathDegradingTimeout(); }
139
140 private:
141 QuicConnection* connection_;
142};
143
144class TimeoutAlarmDelegate : public QuicAlarm::Delegate {
145 public:
146 explicit TimeoutAlarmDelegate(QuicConnection* connection)
147 : connection_(connection) {}
148 TimeoutAlarmDelegate(const TimeoutAlarmDelegate&) = delete;
149 TimeoutAlarmDelegate& operator=(const TimeoutAlarmDelegate&) = delete;
150
151 void OnAlarm() override { connection_->CheckForTimeout(); }
152
153 private:
154 QuicConnection* connection_;
155};
156
157class PingAlarmDelegate : public QuicAlarm::Delegate {
158 public:
159 explicit PingAlarmDelegate(QuicConnection* connection)
160 : connection_(connection) {}
161 PingAlarmDelegate(const PingAlarmDelegate&) = delete;
162 PingAlarmDelegate& operator=(const PingAlarmDelegate&) = delete;
163
164 void OnAlarm() override { connection_->OnPingTimeout(); }
165
166 private:
167 QuicConnection* connection_;
168};
169
170class MtuDiscoveryAlarmDelegate : public QuicAlarm::Delegate {
171 public:
172 explicit MtuDiscoveryAlarmDelegate(QuicConnection* connection)
173 : connection_(connection) {}
174 MtuDiscoveryAlarmDelegate(const MtuDiscoveryAlarmDelegate&) = delete;
175 MtuDiscoveryAlarmDelegate& operator=(const MtuDiscoveryAlarmDelegate&) =
176 delete;
177
178 void OnAlarm() override { connection_->DiscoverMtu(); }
179
180 private:
181 QuicConnection* connection_;
182};
183
184class RetransmittableOnWireAlarmDelegate : public QuicAlarm::Delegate {
185 public:
186 explicit RetransmittableOnWireAlarmDelegate(QuicConnection* connection)
187 : connection_(connection) {}
188 RetransmittableOnWireAlarmDelegate(
189 const RetransmittableOnWireAlarmDelegate&) = delete;
190 RetransmittableOnWireAlarmDelegate& operator=(
191 const RetransmittableOnWireAlarmDelegate&) = delete;
192
193 void OnAlarm() override { connection_->OnPingTimeout(); }
194
195 private:
196 QuicConnection* connection_;
197};
198
199class ProcessUndecryptablePacketsAlarmDelegate : public QuicAlarm::Delegate {
200 public:
201 explicit ProcessUndecryptablePacketsAlarmDelegate(QuicConnection* connection)
202 : connection_(connection) {}
203 ProcessUndecryptablePacketsAlarmDelegate(
204 const ProcessUndecryptablePacketsAlarmDelegate&) = delete;
205 ProcessUndecryptablePacketsAlarmDelegate& operator=(
206 const ProcessUndecryptablePacketsAlarmDelegate&) = delete;
207
rch2af16b12019-03-22 13:52:39 -0700208 void OnAlarm() override {
209 QuicConnection::ScopedPacketFlusher flusher(connection_,
210 QuicConnection::NO_ACK);
211 connection_->MaybeProcessUndecryptablePackets();
212 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500213
214 private:
215 QuicConnection* connection_;
216};
217
QUICHE teamc65d1d12019-03-19 20:58:04 -0700218// Whether this incoming packet is allowed to replace our connection ID.
219bool PacketCanReplaceConnectionId(const QuicPacketHeader& header,
220 Perspective perspective) {
221 return perspective == Perspective::IS_CLIENT &&
222 header.form == IETF_QUIC_LONG_HEADER_PACKET &&
223 QuicUtils::VariableLengthConnectionIdAllowedForVersion(
224 header.version.transport_version) &&
225 (header.long_packet_type == INITIAL ||
226 header.long_packet_type == RETRY);
227}
228
QUICHE teama6ef0a62019-03-07 20:34:33 -0500229} // namespace
230
231#define ENDPOINT \
232 (perspective_ == Perspective::IS_SERVER ? "Server: " : "Client: ")
233
234QuicConnection::QuicConnection(
235 QuicConnectionId connection_id,
236 QuicSocketAddress initial_peer_address,
237 QuicConnectionHelperInterface* helper,
238 QuicAlarmFactory* alarm_factory,
239 QuicPacketWriter* writer,
240 bool owns_writer,
241 Perspective perspective,
242 const ParsedQuicVersionVector& supported_versions)
243 : framer_(supported_versions,
244 helper->GetClock()->ApproximateNow(),
245 perspective,
246 connection_id.length()),
247 current_packet_content_(NO_FRAMES_RECEIVED),
248 is_current_packet_connectivity_probing_(false),
249 current_effective_peer_migration_type_(NO_CHANGE),
250 helper_(helper),
251 alarm_factory_(alarm_factory),
252 per_packet_options_(nullptr),
253 writer_(writer),
254 owns_writer_(owns_writer),
QUICHE team6987b4a2019-03-15 16:23:04 -0700255 encryption_level_(ENCRYPTION_INITIAL),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500256 clock_(helper->GetClock()),
257 random_generator_(helper->GetRandomGenerator()),
258 connection_id_(connection_id),
259 peer_address_(initial_peer_address),
260 direct_peer_address_(initial_peer_address),
261 active_effective_peer_migration_type_(NO_CHANGE),
262 last_packet_decrypted_(false),
263 last_size_(0),
264 current_packet_data_(nullptr),
QUICHE team6987b4a2019-03-15 16:23:04 -0700265 last_decrypted_packet_level_(ENCRYPTION_INITIAL),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500266 should_last_packet_instigate_acks_(false),
267 was_last_packet_missing_(false),
268 max_undecryptable_packets_(0),
269 max_tracked_packets_(kMaxTrackedPackets),
270 pending_version_negotiation_packet_(false),
271 send_ietf_version_negotiation_packet_(false),
272 save_crypto_packets_as_termination_packets_(false),
273 idle_timeout_connection_close_behavior_(
274 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET),
275 close_connection_after_five_rtos_(false),
276 received_packet_manager_(&stats_),
QUICHE teamb23daa72019-03-21 08:37:48 -0700277 uber_received_packet_manager_(&stats_),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500278 ack_queued_(false),
279 num_retransmittable_packets_received_since_last_ack_sent_(0),
280 num_packets_received_since_last_ack_sent_(0),
281 stop_waiting_count_(0),
282 ack_mode_(GetQuicReloadableFlag(quic_enable_ack_decimation)
283 ? ACK_DECIMATION
284 : TCP_ACKING),
285 ack_decimation_delay_(kAckDecimationDelay),
286 unlimited_ack_decimation_(false),
287 fast_ack_after_quiescence_(false),
288 pending_retransmission_alarm_(false),
289 defer_send_in_response_to_packets_(false),
290 ping_timeout_(QuicTime::Delta::FromSeconds(kPingTimeoutSecs)),
291 retransmittable_on_wire_timeout_(QuicTime::Delta::Infinite()),
292 arena_(),
293 ack_alarm_(alarm_factory_->CreateAlarm(arena_.New<AckAlarmDelegate>(this),
294 &arena_)),
295 retransmission_alarm_(alarm_factory_->CreateAlarm(
296 arena_.New<RetransmissionAlarmDelegate>(this),
297 &arena_)),
298 send_alarm_(
299 alarm_factory_->CreateAlarm(arena_.New<SendAlarmDelegate>(this),
300 &arena_)),
301 timeout_alarm_(
302 alarm_factory_->CreateAlarm(arena_.New<TimeoutAlarmDelegate>(this),
303 &arena_)),
304 ping_alarm_(
305 alarm_factory_->CreateAlarm(arena_.New<PingAlarmDelegate>(this),
306 &arena_)),
307 mtu_discovery_alarm_(alarm_factory_->CreateAlarm(
308 arena_.New<MtuDiscoveryAlarmDelegate>(this),
309 &arena_)),
310 path_degrading_alarm_(alarm_factory_->CreateAlarm(
311 arena_.New<PathDegradingAlarmDelegate>(this),
312 &arena_)),
313 process_undecryptable_packets_alarm_(alarm_factory_->CreateAlarm(
314 arena_.New<ProcessUndecryptablePacketsAlarmDelegate>(this),
315 &arena_)),
316 visitor_(nullptr),
317 debug_visitor_(nullptr),
318 packet_generator_(connection_id_, &framer_, random_generator_, this),
319 idle_network_timeout_(QuicTime::Delta::Infinite()),
320 handshake_timeout_(QuicTime::Delta::Infinite()),
321 time_of_first_packet_sent_after_receiving_(
322 GetQuicReloadableFlag(
323 quic_fix_time_of_first_packet_sent_after_receiving)
324 ? QuicTime::Zero()
325 : clock_->ApproximateNow()),
326 time_of_last_received_packet_(clock_->ApproximateNow()),
327 time_of_previous_received_packet_(QuicTime::Zero()),
328 sent_packet_manager_(
329 perspective,
330 clock_,
QUICHE team73957f12019-04-18 16:21:52 -0700331 random_generator_,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500332 &stats_,
333 GetQuicReloadableFlag(quic_default_to_bbr) ? kBBR : kCubicBytes,
334 kNack),
335 version_negotiation_state_(START_NEGOTIATION),
336 perspective_(perspective),
337 connected_(true),
338 can_truncate_connection_ids_(perspective == Perspective::IS_SERVER),
339 mtu_discovery_target_(0),
340 mtu_probe_count_(0),
341 packets_between_mtu_probes_(kPacketsBetweenMtuProbesBase),
342 next_mtu_probe_at_(kPacketsBetweenMtuProbesBase),
343 largest_received_packet_size_(0),
344 write_error_occurred_(false),
345 no_stop_waiting_frames_(transport_version() > QUIC_VERSION_43),
346 consecutive_num_packets_with_no_retransmittable_frames_(0),
347 max_consecutive_num_packets_with_no_retransmittable_frames_(
348 kMaxConsecutiveNonRetransmittablePackets),
349 min_received_before_ack_decimation_(kMinReceivedBeforeAckDecimation),
350 ack_frequency_before_ack_decimation_(
351 kDefaultRetransmittablePacketsBeforeAck),
352 fill_up_link_during_probing_(false),
353 probing_retransmission_pending_(false),
354 stateless_reset_token_received_(false),
355 received_stateless_reset_token_(0),
356 last_control_frame_id_(kInvalidControlFrameId),
357 is_path_degrading_(false),
358 processing_ack_frame_(false),
359 supports_release_time_(false),
360 release_time_into_future_(QuicTime::Delta::Zero()),
361 no_version_negotiation_(supported_versions.size() == 1),
362 fix_termination_packets_(
363 GetQuicReloadableFlag(quic_fix_termination_packets)),
QUICHE team692750b2019-03-17 17:57:46 -0700364 send_ack_when_on_can_write_(false),
365 validate_packet_number_post_decryption_(
QUICHE teamb23daa72019-03-21 08:37:48 -0700366 GetQuicReloadableFlag(quic_validate_packet_number_post_decryption)),
367 use_uber_received_packet_manager_(
368 received_packet_manager_.decide_when_to_send_acks() &&
QUICHE team1dfa46b2019-03-22 10:39:10 -0700369 validate_packet_number_post_decryption_ &&
QUICHE teamb23daa72019-03-21 08:37:48 -0700370 GetQuicReloadableFlag(quic_use_uber_received_packet_manager)) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500371 if (ack_mode_ == ACK_DECIMATION) {
372 QUIC_RELOADABLE_FLAG_COUNT(quic_enable_ack_decimation);
373 }
374 if (perspective_ == Perspective::IS_SERVER &&
375 supported_versions.size() == 1) {
376 QUIC_RESTART_FLAG_COUNT(quic_no_server_conn_ver_negotiation2);
377 }
378 if (packet_generator_.deprecate_ack_bundling_mode()) {
379 QUIC_RELOADABLE_FLAG_COUNT(quic_deprecate_ack_bundling_mode);
380 }
381 if (received_packet_manager_.decide_when_to_send_acks()) {
382 QUIC_RELOADABLE_FLAG_COUNT(quic_rpm_decides_when_to_send_acks);
383 }
QUICHE team692750b2019-03-17 17:57:46 -0700384 if (validate_packet_number_post_decryption_) {
385 QUIC_RELOADABLE_FLAG_COUNT(quic_validate_packet_number_post_decryption);
386 }
QUICHE teamb23daa72019-03-21 08:37:48 -0700387 if (use_uber_received_packet_manager_) {
388 QUIC_RELOADABLE_FLAG_COUNT(quic_use_uber_received_packet_manager);
389 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500390 QUIC_DLOG(INFO) << ENDPOINT
391 << "Created connection with connection_id: " << connection_id
zhongyi546cc452019-04-12 15:27:49 -0700392 << " and version: " << ParsedQuicVersionToString(version());
QUICHE teama6ef0a62019-03-07 20:34:33 -0500393
394 QUIC_BUG_IF(!QuicUtils::IsConnectionIdValidForVersion(connection_id,
395 transport_version()))
396 << "QuicConnection: attempted to use connection ID " << connection_id
397 << " which is invalid with version "
398 << QuicVersionToString(transport_version());
399
400 framer_.set_visitor(this);
401 stats_.connection_creation_time = clock_->ApproximateNow();
402 // TODO(ianswett): Supply the NetworkChangeVisitor as a constructor argument
403 // and make it required non-null, because it's always used.
404 sent_packet_manager_.SetNetworkChangeVisitor(this);
405 if (GetQuicRestartFlag(quic_offload_pacing_to_usps2)) {
406 sent_packet_manager_.SetPacingAlarmGranularity(QuicTime::Delta::Zero());
407 release_time_into_future_ =
408 QuicTime::Delta::FromMilliseconds(kMinReleaseTimeIntoFutureMs);
409 }
410 // Allow the packet writer to potentially reduce the packet size to a value
411 // even smaller than kDefaultMaxPacketSize.
412 SetMaxPacketLength(perspective_ == Perspective::IS_SERVER
413 ? kDefaultServerMaxPacketSize
414 : kDefaultMaxPacketSize);
QUICHE teamb23daa72019-03-21 08:37:48 -0700415 if (use_uber_received_packet_manager_) {
416 uber_received_packet_manager_.set_max_ack_ranges(255);
417 } else {
418 received_packet_manager_.set_max_ack_ranges(255);
419 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500420 MaybeEnableSessionDecidesWhatToWrite();
QUICHE teamcd098022019-03-22 18:49:55 -0700421 MaybeEnableMultiplePacketNumberSpacesSupport();
QUICHE teama6ef0a62019-03-07 20:34:33 -0500422 DCHECK(!GetQuicRestartFlag(quic_no_server_conn_ver_negotiation2) ||
423 perspective_ == Perspective::IS_CLIENT ||
424 supported_versions.size() == 1);
425}
426
427QuicConnection::~QuicConnection() {
428 if (owns_writer_) {
429 delete writer_;
430 }
431 ClearQueuedPackets();
432}
433
434void QuicConnection::ClearQueuedPackets() {
435 for (auto it = queued_packets_.begin(); it != queued_packets_.end(); ++it) {
436 // Delete the buffer before calling ClearSerializedPacket, which sets
437 // encrypted_buffer to nullptr.
438 delete[] it->encrypted_buffer;
439 ClearSerializedPacket(&(*it));
440 }
441 queued_packets_.clear();
442}
443
444void QuicConnection::SetFromConfig(const QuicConfig& config) {
445 if (config.negotiated()) {
446 // Handshake complete, set handshake timeout to Infinite.
447 SetNetworkTimeouts(QuicTime::Delta::Infinite(),
448 config.IdleNetworkTimeout());
449 if (config.SilentClose()) {
450 idle_timeout_connection_close_behavior_ =
451 ConnectionCloseBehavior::SILENT_CLOSE;
452 }
453 } else {
454 SetNetworkTimeouts(config.max_time_before_crypto_handshake(),
455 config.max_idle_time_before_crypto_handshake());
456 }
457
458 sent_packet_manager_.SetFromConfig(config);
459 if (config.HasReceivedBytesForConnectionId() &&
460 can_truncate_connection_ids_) {
461 packet_generator_.SetConnectionIdLength(
462 config.ReceivedBytesForConnectionId());
463 }
464 max_undecryptable_packets_ = config.max_undecryptable_packets();
465
466 if (config.HasClientSentConnectionOption(kMTUH, perspective_)) {
467 SetMtuDiscoveryTarget(kMtuDiscoveryTargetPacketSizeHigh);
468 }
469 if (config.HasClientSentConnectionOption(kMTUL, perspective_)) {
470 SetMtuDiscoveryTarget(kMtuDiscoveryTargetPacketSizeLow);
471 }
472 if (debug_visitor_ != nullptr) {
473 debug_visitor_->OnSetFromConfig(config);
474 }
475 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -0700476 if (use_uber_received_packet_manager_) {
477 uber_received_packet_manager_.SetFromConfig(config, perspective_);
478 } else {
479 received_packet_manager_.SetFromConfig(config, perspective_);
480 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500481 } else {
482 if (GetQuicReloadableFlag(quic_enable_ack_decimation) &&
483 config.HasClientSentConnectionOption(kACD0, perspective_)) {
484 ack_mode_ = TCP_ACKING;
485 }
486 if (config.HasClientSentConnectionOption(kACKD, perspective_)) {
487 ack_mode_ = ACK_DECIMATION;
488 }
489 if (config.HasClientSentConnectionOption(kAKD2, perspective_)) {
490 ack_mode_ = ACK_DECIMATION_WITH_REORDERING;
491 }
492 if (config.HasClientSentConnectionOption(kAKD3, perspective_)) {
493 ack_mode_ = ACK_DECIMATION;
494 ack_decimation_delay_ = kShortAckDecimationDelay;
495 }
496 if (config.HasClientSentConnectionOption(kAKD4, perspective_)) {
497 ack_mode_ = ACK_DECIMATION_WITH_REORDERING;
498 ack_decimation_delay_ = kShortAckDecimationDelay;
499 }
500 if (config.HasClientSentConnectionOption(kAKDU, perspective_)) {
501 unlimited_ack_decimation_ = true;
502 }
503 if (config.HasClientSentConnectionOption(kACKQ, perspective_)) {
504 fast_ack_after_quiescence_ = true;
505 }
506 }
507 if (config.HasClientSentConnectionOption(k5RTO, perspective_)) {
508 close_connection_after_five_rtos_ = true;
509 }
510 if (config.HasClientSentConnectionOption(kNSTP, perspective_)) {
511 no_stop_waiting_frames_ = true;
512 }
513 if (config.HasReceivedStatelessResetToken()) {
514 stateless_reset_token_received_ = true;
515 received_stateless_reset_token_ = config.ReceivedStatelessResetToken();
516 }
517 if (GetQuicReloadableFlag(quic_send_timestamps) &&
518 config.HasClientSentConnectionOption(kSTMP, perspective_)) {
519 QUIC_RELOADABLE_FLAG_COUNT(quic_send_timestamps);
520 framer_.set_process_timestamps(true);
QUICHE teamb23daa72019-03-21 08:37:48 -0700521 if (use_uber_received_packet_manager_) {
522 uber_received_packet_manager_.set_save_timestamps(true);
523 } else {
524 received_packet_manager_.set_save_timestamps(true);
525 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500526 }
527
528 supports_release_time_ =
529 writer_ != nullptr && writer_->SupportsReleaseTime() &&
530 !config.HasClientSentConnectionOption(kNPCO, perspective_);
531
532 if (supports_release_time_) {
533 UpdateReleaseTimeIntoFuture();
534 }
535}
536
537void QuicConnection::OnSendConnectionState(
538 const CachedNetworkParameters& cached_network_params) {
539 if (debug_visitor_ != nullptr) {
540 debug_visitor_->OnSendConnectionState(cached_network_params);
541 }
542}
543
544void QuicConnection::OnReceiveConnectionState(
545 const CachedNetworkParameters& cached_network_params) {
546 if (debug_visitor_ != nullptr) {
547 debug_visitor_->OnReceiveConnectionState(cached_network_params);
548 }
549}
550
551void QuicConnection::ResumeConnectionState(
552 const CachedNetworkParameters& cached_network_params,
553 bool max_bandwidth_resumption) {
554 sent_packet_manager_.ResumeConnectionState(cached_network_params,
555 max_bandwidth_resumption);
556}
557
558void QuicConnection::SetMaxPacingRate(QuicBandwidth max_pacing_rate) {
559 sent_packet_manager_.SetMaxPacingRate(max_pacing_rate);
560}
561
562void QuicConnection::AdjustNetworkParameters(QuicBandwidth bandwidth,
563 QuicTime::Delta rtt) {
564 sent_packet_manager_.AdjustNetworkParameters(bandwidth, rtt);
565}
566
567QuicBandwidth QuicConnection::MaxPacingRate() const {
568 return sent_packet_manager_.MaxPacingRate();
569}
570
571bool QuicConnection::SelectMutualVersion(
572 const ParsedQuicVersionVector& available_versions) {
573 // Try to find the highest mutual version by iterating over supported
574 // versions, starting with the highest, and breaking out of the loop once we
575 // find a matching version in the provided available_versions vector.
576 const ParsedQuicVersionVector& supported_versions =
577 framer_.supported_versions();
578 for (size_t i = 0; i < supported_versions.size(); ++i) {
579 const ParsedQuicVersion& version = supported_versions[i];
580 if (QuicContainsValue(available_versions, version)) {
581 framer_.set_version(version);
582 return true;
583 }
584 }
585
586 return false;
587}
588
589void QuicConnection::OnError(QuicFramer* framer) {
590 // Packets that we can not or have not decrypted are dropped.
591 // TODO(rch): add stats to measure this.
592 if (!connected_ || last_packet_decrypted_ == false) {
593 return;
594 }
595 CloseConnection(framer->error(), framer->detailed_error(),
596 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
597}
598
599void QuicConnection::OnPacket() {
600 last_packet_decrypted_ = false;
601}
602
603void QuicConnection::OnPublicResetPacket(const QuicPublicResetPacket& packet) {
604 // Check that any public reset packet with a different connection ID that was
605 // routed to this QuicConnection has been redirected before control reaches
606 // here. (Check for a bug regression.)
607 DCHECK_EQ(connection_id_, packet.connection_id);
608 DCHECK_EQ(perspective_, Perspective::IS_CLIENT);
609 if (debug_visitor_ != nullptr) {
610 debug_visitor_->OnPublicResetPacket(packet);
611 }
vasilvvc48c8712019-03-11 13:38:16 -0700612 std::string error_details = "Received public reset.";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500613 if (perspective_ == Perspective::IS_CLIENT && !packet.endpoint_id.empty()) {
614 QuicStrAppend(&error_details, " From ", packet.endpoint_id, ".");
615 }
616 QUIC_DLOG(INFO) << ENDPOINT << error_details;
617 QUIC_CODE_COUNT(quic_tear_down_local_connection_on_public_reset);
618 TearDownLocalConnectionState(QUIC_PUBLIC_RESET, error_details,
619 ConnectionCloseSource::FROM_PEER);
620}
621
622bool QuicConnection::OnProtocolVersionMismatch(
623 ParsedQuicVersion received_version,
624 PacketHeaderFormat form) {
625 QUIC_DLOG(INFO) << ENDPOINT << "Received packet with mismatched version "
626 << ParsedQuicVersionToString(received_version);
627 if (perspective_ == Perspective::IS_CLIENT) {
vasilvvc48c8712019-03-11 13:38:16 -0700628 const std::string error_details = "Protocol version mismatch.";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500629 QUIC_BUG << ENDPOINT << error_details;
630 TearDownLocalConnectionState(QUIC_INTERNAL_ERROR, error_details,
631 ConnectionCloseSource::FROM_SELF);
632 return false;
633 }
634 if (no_version_negotiation_) {
635 // Drop old packets that were sent by the client before the version was
636 // negotiated.
637 return false;
638 }
639 DCHECK_NE(version(), received_version);
640
641 if (debug_visitor_ != nullptr) {
642 debug_visitor_->OnProtocolVersionMismatch(received_version);
643 }
644
645 switch (version_negotiation_state_) {
646 case START_NEGOTIATION:
647 if (!framer_.IsSupportedVersion(received_version)) {
648 SendVersionNegotiationPacket(form != GOOGLE_QUIC_PACKET);
649 version_negotiation_state_ = NEGOTIATION_IN_PROGRESS;
650 return false;
651 }
652 break;
653
654 case NEGOTIATION_IN_PROGRESS:
655 if (!framer_.IsSupportedVersion(received_version)) {
656 SendVersionNegotiationPacket(form != GOOGLE_QUIC_PACKET);
657 return false;
658 }
659 break;
660
661 case NEGOTIATED_VERSION:
662 // Might be old packets that were sent by the client before the version
663 // was negotiated. Drop these.
664 return false;
665
666 default:
667 DCHECK(false);
668 }
669
670 // Store the new version.
671 framer_.set_version(received_version);
672 framer_.InferPacketHeaderTypeFromVersion();
673
674 version_negotiation_state_ = NEGOTIATED_VERSION;
675 visitor_->OnSuccessfulVersionNegotiation(received_version);
676 if (debug_visitor_ != nullptr) {
677 debug_visitor_->OnSuccessfulVersionNegotiation(received_version);
678 }
679 QUIC_DLOG(INFO) << ENDPOINT << "version negotiated "
680 << ParsedQuicVersionToString(received_version);
681
682 MaybeEnableSessionDecidesWhatToWrite();
683 no_stop_waiting_frames_ =
684 received_version.transport_version > QUIC_VERSION_43;
685
686 // TODO(satyamshekhar): Store the packet number of this packet and close the
687 // connection if we ever received a packet with incorrect version and whose
688 // packet number is greater.
689 return true;
690}
691
692// Handles version negotiation for client connection.
693void QuicConnection::OnVersionNegotiationPacket(
694 const QuicVersionNegotiationPacket& packet) {
695 // Check that any public reset packet with a different connection ID that was
696 // routed to this QuicConnection has been redirected before control reaches
697 // here. (Check for a bug regression.)
698 DCHECK_EQ(connection_id_, packet.connection_id);
699 if (perspective_ == Perspective::IS_SERVER) {
vasilvvc48c8712019-03-11 13:38:16 -0700700 const std::string error_details =
QUICHE teama6ef0a62019-03-07 20:34:33 -0500701 "Server receieved version negotiation packet.";
702 QUIC_BUG << error_details;
703 QUIC_CODE_COUNT(quic_tear_down_local_connection_on_version_negotiation);
704 TearDownLocalConnectionState(QUIC_INTERNAL_ERROR, error_details,
705 ConnectionCloseSource::FROM_SELF);
706 return;
707 }
708 if (debug_visitor_ != nullptr) {
709 debug_visitor_->OnVersionNegotiationPacket(packet);
710 }
711
712 if (version_negotiation_state_ != START_NEGOTIATION) {
713 // Possibly a duplicate version negotiation packet.
714 return;
715 }
716
717 if (QuicContainsValue(packet.versions, version())) {
vasilvvc48c8712019-03-11 13:38:16 -0700718 const std::string error_details =
QUICHE teama6ef0a62019-03-07 20:34:33 -0500719 "Server already supports client's version and should have accepted the "
720 "connection.";
721 QUIC_DLOG(WARNING) << error_details;
722 TearDownLocalConnectionState(QUIC_INVALID_VERSION_NEGOTIATION_PACKET,
723 error_details,
724 ConnectionCloseSource::FROM_SELF);
725 return;
726 }
727
728 server_supported_versions_ = packet.versions;
729
730 if (GetQuicReloadableFlag(quic_no_client_conn_ver_negotiation)) {
731 QUIC_RELOADABLE_FLAG_COUNT(quic_no_client_conn_ver_negotiation);
732 CloseConnection(
733 QUIC_INVALID_VERSION,
734 QuicStrCat(
735 "Client may support one of the versions in the server's list, but "
736 "it's going to close the connection anyway. Supported versions: {",
737 ParsedQuicVersionVectorToString(framer_.supported_versions()),
738 "}, peer supported versions: {",
739 ParsedQuicVersionVectorToString(packet.versions), "}"),
740 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
741 return;
742 }
743
744 if (!SelectMutualVersion(packet.versions)) {
745 CloseConnection(
746 QUIC_INVALID_VERSION,
747 QuicStrCat(
748 "No common version found. Supported versions: {",
749 ParsedQuicVersionVectorToString(framer_.supported_versions()),
750 "}, peer supported versions: {",
751 ParsedQuicVersionVectorToString(packet.versions), "}"),
752 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
753 return;
754 }
755
756 QUIC_DLOG(INFO) << ENDPOINT << "Negotiated version: "
757 << QuicVersionToString(transport_version());
758 no_stop_waiting_frames_ = transport_version() > QUIC_VERSION_43;
759 version_negotiation_state_ = NEGOTIATION_IN_PROGRESS;
760 RetransmitUnackedPackets(ALL_UNACKED_RETRANSMISSION);
761}
762
QUICHE teamc65d1d12019-03-19 20:58:04 -0700763bool QuicConnection::HasIncomingConnectionId(QuicConnectionId connection_id) {
764 for (QuicConnectionId const& incoming_connection_id :
765 incoming_connection_ids_) {
766 if (incoming_connection_id == connection_id) {
767 return true;
768 }
769 }
770 return false;
771}
772
773void QuicConnection::AddIncomingConnectionId(QuicConnectionId connection_id) {
774 if (HasIncomingConnectionId(connection_id)) {
775 return;
776 }
777 incoming_connection_ids_.push_back(connection_id);
778}
779
QUICHE teama6ef0a62019-03-07 20:34:33 -0500780bool QuicConnection::OnUnauthenticatedPublicHeader(
781 const QuicPacketHeader& header) {
QUICHE teamc65d1d12019-03-19 20:58:04 -0700782 if (header.destination_connection_id == connection_id_ ||
783 HasIncomingConnectionId(header.destination_connection_id)) {
784 return true;
785 }
786
787 if (PacketCanReplaceConnectionId(header, perspective_)) {
788 QUIC_DLOG(INFO) << ENDPOINT << "Accepting packet with new connection ID "
789 << header.destination_connection_id << " instead of "
790 << connection_id_;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500791 return true;
792 }
793
794 ++stats_.packets_dropped;
795 QUIC_DLOG(INFO) << ENDPOINT
796 << "Ignoring packet from unexpected ConnectionId: "
797 << header.destination_connection_id << " instead of "
798 << connection_id_;
799 if (debug_visitor_ != nullptr) {
800 debug_visitor_->OnIncorrectConnectionId(header.destination_connection_id);
801 }
802 // If this is a server, the dispatcher routes each packet to the
803 // QuicConnection responsible for the packet's connection ID. So if control
804 // arrives here and this is a server, the dispatcher must be malfunctioning.
805 DCHECK_NE(Perspective::IS_SERVER, perspective_);
806 return false;
807}
808
809bool QuicConnection::OnUnauthenticatedHeader(const QuicPacketHeader& header) {
810 if (debug_visitor_ != nullptr) {
811 debug_visitor_->OnUnauthenticatedHeader(header);
812 }
813
814 // Check that any public reset packet with a different connection ID that was
815 // routed to this QuicConnection has been redirected before control reaches
816 // here.
QUICHE teamc65d1d12019-03-19 20:58:04 -0700817 DCHECK(header.destination_connection_id == connection_id_ ||
818 HasIncomingConnectionId(header.destination_connection_id) ||
819 PacketCanReplaceConnectionId(header, perspective_));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500820
821 if (!packet_generator_.IsPendingPacketEmpty()) {
822 // Incoming packets may change a queued ACK frame.
vasilvvc48c8712019-03-11 13:38:16 -0700823 const std::string error_details =
QUICHE teama6ef0a62019-03-07 20:34:33 -0500824 "Pending frames must be serialized before incoming packets are "
825 "processed.";
826 QUIC_BUG << error_details << ", received header: " << header;
827 CloseConnection(QUIC_INTERNAL_ERROR, error_details,
828 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
829 return false;
830 }
831
832 // If this packet has already been seen, or the sender has told us that it
833 // will not be retransmitted, then stop processing the packet.
QUICHE teamb23daa72019-03-21 08:37:48 -0700834 if (!validate_packet_number_post_decryption_) {
835 const bool is_awaiting =
836 use_uber_received_packet_manager_
837 ? uber_received_packet_manager_.IsAwaitingPacket(
QUICHE team1dfa46b2019-03-22 10:39:10 -0700838 last_decrypted_packet_level_, header.packet_number)
QUICHE teamb23daa72019-03-21 08:37:48 -0700839 : received_packet_manager_.IsAwaitingPacket(header.packet_number);
840 if (!is_awaiting) {
841 if (framer_.IsIetfStatelessResetPacket(header)) {
842 QuicIetfStatelessResetPacket packet(
843 header, header.possible_stateless_reset_token);
844 OnAuthenticatedIetfStatelessResetPacket(packet);
845 return false;
846 }
847 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << header.packet_number
848 << " no longer being waited for. Discarding.";
849 if (debug_visitor_ != nullptr) {
850 debug_visitor_->OnDuplicatePacket(header.packet_number);
851 }
852 ++stats_.packets_dropped;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500853 return false;
854 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500855 }
856
857 if (version_negotiation_state_ != NEGOTIATED_VERSION &&
858 perspective_ == Perspective::IS_SERVER) {
859 if (!header.version_flag) {
860 // Packets should have the version flag till version negotiation is
861 // done.
vasilvvc48c8712019-03-11 13:38:16 -0700862 std::string error_details =
QUICHE teama6ef0a62019-03-07 20:34:33 -0500863 QuicStrCat(ENDPOINT, "Packet ", header.packet_number.ToUint64(),
864 " without version flag before version negotiated.");
865 QUIC_DLOG(WARNING) << error_details;
866 CloseConnection(QUIC_INVALID_VERSION, error_details,
867 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
868 return false;
869 } else {
870 DCHECK_EQ(header.version, version());
871 version_negotiation_state_ = NEGOTIATED_VERSION;
872 framer_.InferPacketHeaderTypeFromVersion();
873 visitor_->OnSuccessfulVersionNegotiation(version());
874 if (debug_visitor_ != nullptr) {
875 debug_visitor_->OnSuccessfulVersionNegotiation(version());
876 }
877 }
878 DCHECK_EQ(NEGOTIATED_VERSION, version_negotiation_state_);
879 }
880
881 return true;
882}
883
884void QuicConnection::OnDecryptedPacket(EncryptionLevel level) {
885 last_decrypted_packet_level_ = level;
886 last_packet_decrypted_ = true;
887
888 // Once the server receives a forward secure packet, the handshake is
889 // confirmed.
890 if (level == ENCRYPTION_FORWARD_SECURE &&
891 perspective_ == Perspective::IS_SERVER) {
892 sent_packet_manager_.SetHandshakeConfirmed();
893 if (sent_packet_manager_.unacked_packets().use_uber_loss_algorithm()) {
894 // This may have changed the retransmission timer, so re-arm it.
895 SetRetransmissionAlarm();
896 }
897 }
898}
899
900QuicSocketAddress QuicConnection::GetEffectivePeerAddressFromCurrentPacket()
901 const {
902 // By default, the connection is not proxied, and the effective peer address
903 // is the packet's source address, i.e. the direct peer address.
904 return last_packet_source_address_;
905}
906
907bool QuicConnection::OnPacketHeader(const QuicPacketHeader& header) {
908 if (debug_visitor_ != nullptr) {
909 debug_visitor_->OnPacketHeader(header);
910 }
911
912 // Will be decremented below if we fall through to return true.
913 ++stats_.packets_dropped;
914
915 if (!ProcessValidatedPacket(header)) {
916 return false;
917 }
918
919 // Initialize the current packet content state.
920 current_packet_content_ = NO_FRAMES_RECEIVED;
921 is_current_packet_connectivity_probing_ = false;
922 current_effective_peer_migration_type_ = NO_CHANGE;
923
924 if (perspective_ == Perspective::IS_CLIENT) {
QUICHE team1f3de242019-03-20 07:24:48 -0700925 if (!GetLargestReceivedPacket().IsInitialized() ||
926 header.packet_number > GetLargestReceivedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500927 // Update peer_address_ and effective_peer_address_ immediately for
928 // client connections.
QUICHE team1f3de242019-03-20 07:24:48 -0700929 // TODO(fayang): only change peer addresses in application data packet
930 // number space.
QUICHE teama6ef0a62019-03-07 20:34:33 -0500931 direct_peer_address_ = last_packet_source_address_;
932 effective_peer_address_ = GetEffectivePeerAddressFromCurrentPacket();
933 }
934 } else {
935 // At server, remember the address change type of effective_peer_address
936 // in current_effective_peer_migration_type_. But this variable alone
937 // doesn't necessarily starts a migration. A migration will be started
938 // later, once the current packet is confirmed to meet the following
939 // conditions:
940 // 1) current_effective_peer_migration_type_ is not NO_CHANGE.
941 // 2) The current packet is not a connectivity probing.
942 // 3) The current packet is not reordered, i.e. its packet number is the
943 // largest of this connection so far.
944 // Once the above conditions are confirmed, a new migration will start
945 // even if there is an active migration underway.
946 current_effective_peer_migration_type_ =
947 QuicUtils::DetermineAddressChangeType(
948 effective_peer_address_,
949 GetEffectivePeerAddressFromCurrentPacket());
950
951 QUIC_DLOG_IF(INFO, current_effective_peer_migration_type_ != NO_CHANGE)
952 << ENDPOINT << "Effective peer's ip:port changed from "
953 << effective_peer_address_.ToString() << " to "
954 << GetEffectivePeerAddressFromCurrentPacket().ToString()
955 << ", active_effective_peer_migration_type is "
956 << active_effective_peer_migration_type_;
957 }
958
959 --stats_.packets_dropped;
960 QUIC_DVLOG(1) << ENDPOINT << "Received packet header: " << header;
961 last_header_ = header;
962 // An ack will be sent if a missing retransmittable packet was received;
QUICHE teamb23daa72019-03-21 08:37:48 -0700963 if (!use_uber_received_packet_manager_) {
964 was_last_packet_missing_ =
965 received_packet_manager_.IsMissing(last_header_.packet_number);
966 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500967
968 // Record packet receipt to populate ack info before processing stream
969 // frames, since the processing may result in sending a bundled ack.
QUICHE teamb23daa72019-03-21 08:37:48 -0700970 if (use_uber_received_packet_manager_) {
971 uber_received_packet_manager_.RecordPacketReceived(
QUICHE team1dfa46b2019-03-22 10:39:10 -0700972 last_decrypted_packet_level_, last_header_,
973 time_of_last_received_packet_);
QUICHE teamb23daa72019-03-21 08:37:48 -0700974 } else {
975 received_packet_manager_.RecordPacketReceived(
976 last_header_, time_of_last_received_packet_);
977 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500978 DCHECK(connected_);
979 return true;
980}
981
982bool QuicConnection::OnStreamFrame(const QuicStreamFrame& frame) {
983 DCHECK(connected_);
984
985 // Since a stream frame was received, this is not a connectivity probe.
986 // A probe only contains a PING and full padding.
987 UpdatePacketContent(NOT_PADDED_PING);
988
989 if (debug_visitor_ != nullptr) {
990 debug_visitor_->OnStreamFrame(frame);
991 }
992 if (frame.stream_id != QuicUtils::GetCryptoStreamId(transport_version()) &&
QUICHE team6987b4a2019-03-15 16:23:04 -0700993 last_decrypted_packet_level_ == ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500994 if (MaybeConsiderAsMemoryCorruption(frame)) {
995 CloseConnection(QUIC_MAYBE_CORRUPTED_MEMORY,
996 "Received crypto frame on non crypto stream.",
997 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
998 return false;
999 }
1000
1001 QUIC_PEER_BUG << ENDPOINT
1002 << "Received an unencrypted data frame: closing connection"
1003 << " packet_number:" << last_header_.packet_number
QUICHE teamb23daa72019-03-21 08:37:48 -07001004 << " stream_id:" << frame.stream_id
1005 << " received_packets:" << GetUpdatedAckFrame();
QUICHE teama6ef0a62019-03-07 20:34:33 -05001006 CloseConnection(QUIC_UNENCRYPTED_STREAM_DATA,
1007 "Unencrypted stream data seen.",
1008 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1009 return false;
1010 }
1011 visitor_->OnStreamFrame(frame);
1012 stats_.stream_bytes_received += frame.data_length;
1013 should_last_packet_instigate_acks_ = true;
1014 return connected_;
1015}
1016
1017bool QuicConnection::OnCryptoFrame(const QuicCryptoFrame& frame) {
1018 DCHECK(connected_);
1019
1020 // Since a CRYPTO frame was received, this is not a connectivity probe.
1021 // A probe only contains a PING and full padding.
1022 UpdatePacketContent(NOT_PADDED_PING);
1023
1024 visitor_->OnCryptoFrame(frame);
1025 should_last_packet_instigate_acks_ = true;
1026 return connected_;
1027}
1028
1029bool QuicConnection::OnAckFrameStart(QuicPacketNumber largest_acked,
1030 QuicTime::Delta ack_delay_time) {
1031 DCHECK(connected_);
1032
1033 if (processing_ack_frame_) {
1034 CloseConnection(QUIC_INVALID_ACK_DATA,
1035 "Received a new ack while processing an ack frame.",
1036 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1037 return false;
1038 }
1039
1040 // Since an ack frame was received, this is not a connectivity probe.
1041 // A probe only contains a PING and full padding.
1042 UpdatePacketContent(NOT_PADDED_PING);
1043
1044 QUIC_DVLOG(1) << ENDPOINT
1045 << "OnAckFrameStart, largest_acked: " << largest_acked;
1046
QUICHE team76e1c622019-03-19 14:36:39 -07001047 if (GetLargestReceivedPacketWithAck().IsInitialized() &&
1048 last_header_.packet_number <= GetLargestReceivedPacketWithAck()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001049 QUIC_DLOG(INFO) << ENDPOINT << "Received an old ack frame: ignoring";
1050 return true;
1051 }
1052
QUICHE team76e1c622019-03-19 14:36:39 -07001053 if (!GetLargestSentPacket().IsInitialized() ||
1054 largest_acked > GetLargestSentPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001055 QUIC_DLOG(WARNING) << ENDPOINT
1056 << "Peer's observed unsent packet:" << largest_acked
QUICHE team76e1c622019-03-19 14:36:39 -07001057 << " vs " << GetLargestSentPacket();
QUICHE teama6ef0a62019-03-07 20:34:33 -05001058 // We got an ack for data we have not sent.
1059 CloseConnection(QUIC_INVALID_ACK_DATA, "Largest observed too high.",
1060 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1061 return false;
1062 }
1063
QUICHE team76e1c622019-03-19 14:36:39 -07001064 if (!GetLargestAckedPacket().IsInitialized() ||
1065 largest_acked > GetLargestAckedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001066 visitor_->OnForwardProgressConfirmed();
QUICHE team9929cc42019-03-13 08:17:43 -07001067 } else if (!sent_packet_manager_.tolerate_reneging() &&
QUICHE team76e1c622019-03-19 14:36:39 -07001068 largest_acked < GetLargestAckedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001069 QUIC_LOG(INFO) << ENDPOINT << "Peer's largest_observed packet decreased:"
QUICHE team76e1c622019-03-19 14:36:39 -07001070 << largest_acked << " vs " << GetLargestAckedPacket()
QUICHE teama6ef0a62019-03-07 20:34:33 -05001071 << " packet_number:" << last_header_.packet_number
QUICHE team76e1c622019-03-19 14:36:39 -07001072 << " largest seen with ack:"
1073 << GetLargestReceivedPacketWithAck()
QUICHE teama6ef0a62019-03-07 20:34:33 -05001074 << " connection_id: " << connection_id_;
1075 // A new ack has a diminished largest_observed value.
1076 // If this was an old packet, we wouldn't even have checked.
1077 CloseConnection(QUIC_INVALID_ACK_DATA, "Largest observed too low.",
1078 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1079 return false;
1080 }
1081 processing_ack_frame_ = true;
1082 sent_packet_manager_.OnAckFrameStart(largest_acked, ack_delay_time,
1083 time_of_last_received_packet_);
1084 return true;
1085}
1086
1087bool QuicConnection::OnAckRange(QuicPacketNumber start, QuicPacketNumber end) {
1088 DCHECK(connected_);
1089 QUIC_DVLOG(1) << ENDPOINT << "OnAckRange: [" << start << ", " << end << ")";
1090
QUICHE team76e1c622019-03-19 14:36:39 -07001091 if (GetLargestReceivedPacketWithAck().IsInitialized() &&
1092 last_header_.packet_number <= GetLargestReceivedPacketWithAck()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001093 QUIC_DLOG(INFO) << ENDPOINT << "Received an old ack frame: ignoring";
1094 return true;
1095 }
1096
1097 sent_packet_manager_.OnAckRange(start, end);
1098 return true;
1099}
1100
1101bool QuicConnection::OnAckTimestamp(QuicPacketNumber packet_number,
1102 QuicTime timestamp) {
1103 DCHECK(connected_);
1104 QUIC_DVLOG(1) << ENDPOINT << "OnAckTimestamp: [" << packet_number << ", "
1105 << timestamp.ToDebuggingValue() << ")";
1106
QUICHE team76e1c622019-03-19 14:36:39 -07001107 if (GetLargestReceivedPacketWithAck().IsInitialized() &&
1108 last_header_.packet_number <= GetLargestReceivedPacketWithAck()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001109 QUIC_DLOG(INFO) << ENDPOINT << "Received an old ack frame: ignoring";
1110 return true;
1111 }
1112
1113 sent_packet_manager_.OnAckTimestamp(packet_number, timestamp);
1114 return true;
1115}
1116
1117bool QuicConnection::OnAckFrameEnd(QuicPacketNumber start) {
1118 DCHECK(connected_);
1119 QUIC_DVLOG(1) << ENDPOINT << "OnAckFrameEnd, start: " << start;
1120
QUICHE team76e1c622019-03-19 14:36:39 -07001121 if (GetLargestReceivedPacketWithAck().IsInitialized() &&
1122 last_header_.packet_number <= GetLargestReceivedPacketWithAck()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001123 QUIC_DLOG(INFO) << ENDPOINT << "Received an old ack frame: ignoring";
1124 return true;
1125 }
fayang3eb82212019-04-16 12:05:46 -07001126 const AckResult ack_result = sent_packet_manager_.OnAckFrameEnd(
1127 time_of_last_received_packet_, last_decrypted_packet_level_);
1128 if (ack_result != PACKETS_NEWLY_ACKED &&
1129 ack_result != NO_PACKETS_NEWLY_ACKED) {
1130 // Error occurred (e.g., this ACK tries to ack packets in wrong packet
1131 // number space), and this would cause the connection to be closed.
1132 QUIC_DLOG(ERROR) << ENDPOINT
1133 << "Error occurred when processing an ACK frame: "
1134 << QuicUtils::AckResultToString(ack_result);
1135 return false;
1136 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001137 // Cancel the send alarm because new packets likely have been acked, which
1138 // may change the congestion window and/or pacing rate. Canceling the alarm
1139 // causes CanWrite to recalculate the next send time.
1140 if (send_alarm_->IsSet()) {
1141 send_alarm_->Cancel();
1142 }
1143 if (supports_release_time_) {
1144 // Update pace time into future because smoothed RTT is likely updated.
1145 UpdateReleaseTimeIntoFuture();
1146 }
QUICHE team76e1c622019-03-19 14:36:39 -07001147 SetLargestReceivedPacketWithAck(last_header_.packet_number);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001148 // If the incoming ack's packets set expresses missing packets: peer is still
1149 // waiting for a packet lower than a packet that we are no longer planning to
1150 // send.
1151 // If the incoming ack's packets set expresses received packets: peer is still
1152 // acking packets which we never care about.
1153 // Send an ack to raise the high water mark.
fayang3eb82212019-04-16 12:05:46 -07001154 PostProcessAfterAckFrame(GetLeastUnacked() > start,
1155 ack_result == PACKETS_NEWLY_ACKED);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001156 processing_ack_frame_ = false;
1157
1158 return connected_;
1159}
1160
1161bool QuicConnection::OnStopWaitingFrame(const QuicStopWaitingFrame& frame) {
1162 DCHECK(connected_);
1163
1164 // Since a stop waiting frame was received, this is not a connectivity probe.
1165 // A probe only contains a PING and full padding.
1166 UpdatePacketContent(NOT_PADDED_PING);
1167
1168 if (no_stop_waiting_frames_) {
1169 return true;
1170 }
1171 if (largest_seen_packet_with_stop_waiting_.IsInitialized() &&
1172 last_header_.packet_number <= largest_seen_packet_with_stop_waiting_) {
1173 QUIC_DLOG(INFO) << ENDPOINT
1174 << "Received an old stop waiting frame: ignoring";
1175 return true;
1176 }
1177
1178 const char* error = ValidateStopWaitingFrame(frame);
1179 if (error != nullptr) {
1180 CloseConnection(QUIC_INVALID_STOP_WAITING_DATA, error,
1181 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1182 return false;
1183 }
1184
1185 if (debug_visitor_ != nullptr) {
1186 debug_visitor_->OnStopWaitingFrame(frame);
1187 }
1188
1189 largest_seen_packet_with_stop_waiting_ = last_header_.packet_number;
QUICHE teamb23daa72019-03-21 08:37:48 -07001190 if (use_uber_received_packet_manager_) {
QUICHE team1dfa46b2019-03-22 10:39:10 -07001191 uber_received_packet_manager_.DontWaitForPacketsBefore(
1192 last_decrypted_packet_level_, frame.least_unacked);
QUICHE teamb23daa72019-03-21 08:37:48 -07001193 } else {
1194 received_packet_manager_.DontWaitForPacketsBefore(frame.least_unacked);
1195 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001196 return connected_;
1197}
1198
1199bool QuicConnection::OnPaddingFrame(const QuicPaddingFrame& frame) {
1200 DCHECK(connected_);
1201 UpdatePacketContent(SECOND_FRAME_IS_PADDING);
1202
1203 if (debug_visitor_ != nullptr) {
1204 debug_visitor_->OnPaddingFrame(frame);
1205 }
1206 return true;
1207}
1208
1209bool QuicConnection::OnPingFrame(const QuicPingFrame& frame) {
1210 DCHECK(connected_);
1211 UpdatePacketContent(FIRST_FRAME_IS_PING);
1212
1213 if (debug_visitor_ != nullptr) {
1214 debug_visitor_->OnPingFrame(frame);
1215 }
1216 should_last_packet_instigate_acks_ = true;
1217 return true;
1218}
1219
QUICHE teama6ef0a62019-03-07 20:34:33 -05001220const char* QuicConnection::ValidateStopWaitingFrame(
1221 const QuicStopWaitingFrame& stop_waiting) {
QUICHE teamb23daa72019-03-21 08:37:48 -07001222 const QuicPacketNumber peer_least_packet_awaiting_ack =
1223 use_uber_received_packet_manager_
1224 ? uber_received_packet_manager_.peer_least_packet_awaiting_ack()
1225 : received_packet_manager_.peer_least_packet_awaiting_ack();
1226 if (peer_least_packet_awaiting_ack.IsInitialized() &&
1227 stop_waiting.least_unacked < peer_least_packet_awaiting_ack) {
1228 QUIC_DLOG(ERROR) << ENDPOINT << "Peer's sent low least_unacked: "
1229 << stop_waiting.least_unacked << " vs "
1230 << peer_least_packet_awaiting_ack;
QUICHE teama6ef0a62019-03-07 20:34:33 -05001231 // We never process old ack frames, so this number should only increase.
1232 return "Least unacked too small.";
1233 }
1234
1235 if (stop_waiting.least_unacked > last_header_.packet_number) {
1236 QUIC_DLOG(ERROR) << ENDPOINT
1237 << "Peer sent least_unacked:" << stop_waiting.least_unacked
1238 << " greater than the enclosing packet number:"
1239 << last_header_.packet_number;
1240 return "Least unacked too large.";
1241 }
1242
1243 return nullptr;
1244}
1245
1246bool QuicConnection::OnRstStreamFrame(const QuicRstStreamFrame& frame) {
1247 DCHECK(connected_);
1248
1249 // Since a reset stream frame was received, this is not a connectivity probe.
1250 // A probe only contains a PING and full padding.
1251 UpdatePacketContent(NOT_PADDED_PING);
1252
1253 if (debug_visitor_ != nullptr) {
1254 debug_visitor_->OnRstStreamFrame(frame);
1255 }
1256 QUIC_DLOG(INFO) << ENDPOINT
1257 << "RST_STREAM_FRAME received for stream: " << frame.stream_id
1258 << " with error: "
1259 << QuicRstStreamErrorCodeToString(frame.error_code);
1260 visitor_->OnRstStream(frame);
1261 should_last_packet_instigate_acks_ = true;
1262 return connected_;
1263}
1264
QUICHE teama6ef0a62019-03-07 20:34:33 -05001265bool QuicConnection::OnStopSendingFrame(const QuicStopSendingFrame& frame) {
1266 DCHECK(connected_);
1267
1268 // Since a reset stream frame was received, this is not a connectivity probe.
1269 // A probe only contains a PING and full padding.
1270 UpdatePacketContent(NOT_PADDED_PING);
1271
1272 if (debug_visitor_ != nullptr) {
1273 debug_visitor_->OnStopSendingFrame(frame);
1274 }
1275
1276 QUIC_DLOG(INFO) << ENDPOINT << "STOP_SENDING frame received for stream: "
1277 << frame.stream_id
1278 << " with error: " << frame.application_error_code;
1279
1280 visitor_->OnStopSendingFrame(frame);
1281 return connected_;
1282}
1283
1284bool QuicConnection::OnPathChallengeFrame(const QuicPathChallengeFrame& frame) {
1285 // Save the path challenge's payload, for later use in generating the
1286 // response.
1287 received_path_challenge_payloads_.push_back(frame.data_buffer);
1288
1289 // For VERSION 99 we define a "Padded PATH CHALLENGE" to be the same thing
1290 // as a PADDED PING -- it will start a connectivity check and prevent
1291 // connection migration. Insofar as the connectivity check and connection
1292 // migration are concerned, logically the PATH CHALLENGE is the same as the
1293 // PING, so as a stopgap, tell the FSM that determines whether we have a
1294 // Padded PING or not that we received a PING.
1295 UpdatePacketContent(FIRST_FRAME_IS_PING);
1296 should_last_packet_instigate_acks_ = true;
1297 return true;
1298}
1299
1300bool QuicConnection::OnPathResponseFrame(const QuicPathResponseFrame& frame) {
1301 should_last_packet_instigate_acks_ = true;
1302 if (!transmitted_connectivity_probe_payload_ ||
1303 *transmitted_connectivity_probe_payload_ != frame.data_buffer) {
1304 // Is not for the probe we sent, ignore it.
1305 return true;
1306 }
1307 // Have received the matching PATH RESPONSE, saved payload no longer valid.
1308 transmitted_connectivity_probe_payload_ = nullptr;
1309 UpdatePacketContent(FIRST_FRAME_IS_PING);
1310 return true;
1311}
1312
1313bool QuicConnection::OnConnectionCloseFrame(
1314 const QuicConnectionCloseFrame& frame) {
1315 DCHECK(connected_);
1316
1317 // Since a connection close frame was received, this is not a connectivity
1318 // probe. A probe only contains a PING and full padding.
1319 UpdatePacketContent(NOT_PADDED_PING);
1320
1321 if (debug_visitor_ != nullptr) {
1322 debug_visitor_->OnConnectionCloseFrame(frame);
1323 }
1324 QUIC_DLOG(INFO) << ENDPOINT << "Received ConnectionClose for connection: "
fkastenholze9d71a82019-04-09 05:12:13 -07001325 << connection_id() << ", with error: "
1326 << QuicErrorCodeToString(frame.quic_error_code) << " ("
1327 << frame.error_details << ")";
1328 if (frame.close_type == GOOGLE_QUIC_CONNECTION_CLOSE &&
1329 frame.quic_error_code == QUIC_BAD_MULTIPATH_FLAG) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001330 QUIC_LOG_FIRST_N(ERROR, 10) << "Unexpected QUIC_BAD_MULTIPATH_FLAG error."
1331 << " last_received_header: " << last_header_
1332 << " encryption_level: " << encryption_level_;
1333 }
fkastenholze9d71a82019-04-09 05:12:13 -07001334 TearDownLocalConnectionState(frame.quic_error_code, frame.error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05001335 ConnectionCloseSource::FROM_PEER);
1336 return connected_;
1337}
1338
fkastenholz3c4eabf2019-04-22 07:49:59 -07001339bool QuicConnection::OnMaxStreamsFrame(const QuicMaxStreamsFrame& frame) {
1340 return visitor_->OnMaxStreamsFrame(frame);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001341}
1342
fkastenholz3c4eabf2019-04-22 07:49:59 -07001343bool QuicConnection::OnStreamsBlockedFrame(
1344 const QuicStreamsBlockedFrame& frame) {
1345 return visitor_->OnStreamsBlockedFrame(frame);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001346}
1347
1348bool QuicConnection::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
1349 DCHECK(connected_);
1350
1351 // Since a go away frame was received, this is not a connectivity probe.
1352 // A probe only contains a PING and full padding.
1353 UpdatePacketContent(NOT_PADDED_PING);
1354
1355 if (debug_visitor_ != nullptr) {
1356 debug_visitor_->OnGoAwayFrame(frame);
1357 }
1358 QUIC_DLOG(INFO) << ENDPOINT << "GOAWAY_FRAME received with last good stream: "
1359 << frame.last_good_stream_id
1360 << " and error: " << QuicErrorCodeToString(frame.error_code)
1361 << " and reason: " << frame.reason_phrase;
1362
1363 visitor_->OnGoAway(frame);
1364 should_last_packet_instigate_acks_ = true;
1365 return connected_;
1366}
1367
1368bool QuicConnection::OnWindowUpdateFrame(const QuicWindowUpdateFrame& frame) {
1369 DCHECK(connected_);
1370
1371 // Since a window update frame was received, this is not a connectivity probe.
1372 // A probe only contains a PING and full padding.
1373 UpdatePacketContent(NOT_PADDED_PING);
1374
1375 if (debug_visitor_ != nullptr) {
1376 debug_visitor_->OnWindowUpdateFrame(frame, time_of_last_received_packet_);
1377 }
1378 QUIC_DLOG(INFO) << ENDPOINT << "WINDOW_UPDATE_FRAME received for stream: "
1379 << frame.stream_id
1380 << " with byte offset: " << frame.byte_offset;
1381 visitor_->OnWindowUpdateFrame(frame);
1382 should_last_packet_instigate_acks_ = true;
1383 return connected_;
1384}
1385
1386bool QuicConnection::OnNewConnectionIdFrame(
1387 const QuicNewConnectionIdFrame& frame) {
1388 return true;
1389}
1390
1391bool QuicConnection::OnRetireConnectionIdFrame(
1392 const QuicRetireConnectionIdFrame& frame) {
1393 return true;
1394}
1395
1396bool QuicConnection::OnNewTokenFrame(const QuicNewTokenFrame& frame) {
1397 return true;
1398}
1399
1400bool QuicConnection::OnMessageFrame(const QuicMessageFrame& frame) {
1401 DCHECK(connected_);
1402
1403 // Since a message frame was received, this is not a connectivity probe.
1404 // A probe only contains a PING and full padding.
1405 UpdatePacketContent(NOT_PADDED_PING);
1406
1407 if (debug_visitor_ != nullptr) {
1408 debug_visitor_->OnMessageFrame(frame);
1409 }
1410 visitor_->OnMessageReceived(
1411 QuicStringPiece(frame.data, frame.message_length));
1412 should_last_packet_instigate_acks_ = true;
1413 return connected_;
1414}
1415
1416bool QuicConnection::OnBlockedFrame(const QuicBlockedFrame& frame) {
1417 DCHECK(connected_);
1418
1419 // Since a blocked frame was received, this is not a connectivity probe.
1420 // A probe only contains a PING and full padding.
1421 UpdatePacketContent(NOT_PADDED_PING);
1422
1423 if (debug_visitor_ != nullptr) {
1424 debug_visitor_->OnBlockedFrame(frame);
1425 }
1426 QUIC_DLOG(INFO) << ENDPOINT
1427 << "BLOCKED_FRAME received for stream: " << frame.stream_id;
1428 visitor_->OnBlockedFrame(frame);
1429 stats_.blocked_frames_received++;
1430 should_last_packet_instigate_acks_ = true;
1431 return connected_;
1432}
1433
1434void QuicConnection::OnPacketComplete() {
1435 // Don't do anything if this packet closed the connection.
1436 if (!connected_) {
1437 ClearLastFrames();
1438 return;
1439 }
1440
1441 if (IsCurrentPacketConnectivityProbing()) {
1442 ++stats_.num_connectivity_probing_received;
1443 }
1444
1445 QUIC_DVLOG(1) << ENDPOINT << "Got packet " << last_header_.packet_number
1446 << " for " << last_header_.destination_connection_id;
1447
1448 QUIC_DLOG_IF(INFO, current_packet_content_ == SECOND_FRAME_IS_PADDING)
1449 << ENDPOINT << "Received a padded PING packet. is_probing: "
1450 << IsCurrentPacketConnectivityProbing();
1451
1452 if (perspective_ == Perspective::IS_CLIENT) {
1453 QUIC_DVLOG(1) << ENDPOINT
1454 << "Received a speculative connectivity probing packet for "
1455 << last_header_.destination_connection_id
1456 << " from ip:port: " << last_packet_source_address_.ToString()
1457 << " to ip:port: "
1458 << last_packet_destination_address_.ToString();
1459 // TODO(zhongyi): change the method name.
1460 visitor_->OnConnectivityProbeReceived(last_packet_destination_address_,
1461 last_packet_source_address_);
1462 } else if (IsCurrentPacketConnectivityProbing()) {
1463 // This node is not a client (is a server) AND the received packet was
1464 // connectivity-probing, send an appropriate response.
1465 QUIC_DVLOG(1) << ENDPOINT << "Received a connectivity probing packet for "
1466 << last_header_.destination_connection_id
1467 << " from ip:port: " << last_packet_source_address_.ToString()
1468 << " to ip:port: "
1469 << last_packet_destination_address_.ToString();
1470 visitor_->OnConnectivityProbeReceived(last_packet_destination_address_,
1471 last_packet_source_address_);
1472 } else {
1473 // This node is not a client (is a server) AND the received packet was
1474 // NOT connectivity-probing. If the packet had PATH CHALLENGES, send
1475 // appropriate RESPONSE. Then deal with possible peer migration.
1476 if (transport_version() == QUIC_VERSION_99 &&
1477 !received_path_challenge_payloads_.empty()) {
1478 // If a PATH CHALLENGE was in a "Padded PING (or PATH CHALLENGE)"
1479 // then it is taken care of above. This handles the case where a PATH
1480 // CHALLENGE appeared someplace else (eg, the peer randomly added a PATH
1481 // CHALLENGE frame to some other packet.
1482 // There was at least one PATH CHALLENGE in the received packet,
1483 // Generate the required PATH RESPONSE.
1484 SendGenericPathProbePacket(nullptr, last_packet_source_address_,
1485 /* is_response= */ true);
1486 }
1487
QUICHE team1f3de242019-03-20 07:24:48 -07001488 if (last_header_.packet_number == GetLargestReceivedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001489 direct_peer_address_ = last_packet_source_address_;
1490 if (current_effective_peer_migration_type_ != NO_CHANGE) {
QUICHE team1f3de242019-03-20 07:24:48 -07001491 // TODO(fayang): When multiple packet number spaces is supported, only
1492 // start peer migration for the application data.
QUICHE teama6ef0a62019-03-07 20:34:33 -05001493 StartEffectivePeerMigration(current_effective_peer_migration_type_);
1494 }
1495 }
1496 }
1497
1498 current_effective_peer_migration_type_ = NO_CHANGE;
1499
1500 // An ack will be sent if a missing retransmittable packet was received;
1501 const bool was_missing =
1502 should_last_packet_instigate_acks_ && was_last_packet_missing_;
1503
1504 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07001505 if (use_uber_received_packet_manager_) {
dschinazi05e62b12019-04-18 15:43:41 -07001506 // Some encryption levels share a packet number space, it is therefore
1507 // possible for us to want to ack some packets even though we do not yet
1508 // have the appropriate keys to encrypt the acks. In this scenario we
1509 // do not update the ACK timeout. This can happen for example with
1510 // IETF QUIC on the server when we receive 0-RTT packets and do not yet
1511 // have 1-RTT keys (0-RTT packets are acked at the 1-RTT level).
1512 // Note that this could cause slight performance degradations in the edge
1513 // case where one packet is received, then the encrypter is installed,
1514 // then a second packet is received; as that could cause the ACK for the
1515 // second packet to be delayed instead of immediate. This is currently
1516 // considered to be small enough of an edge case to not be optimized for.
1517 if (framer_.HasEncrypterOfEncryptionLevel(QuicUtils::GetEncryptionLevel(
1518 QuicUtils::GetPacketNumberSpace(last_decrypted_packet_level_)))) {
1519 uber_received_packet_manager_.MaybeUpdateAckTimeout(
1520 should_last_packet_instigate_acks_, last_decrypted_packet_level_,
1521 last_header_.packet_number, time_of_last_received_packet_,
1522 clock_->ApproximateNow(), sent_packet_manager_.GetRttStats(),
1523 sent_packet_manager_.delayed_ack_time());
1524 } else {
1525 QUIC_DLOG(INFO) << ENDPOINT << "Not updating ACK timeout for "
1526 << QuicUtils::EncryptionLevelToString(
1527 last_decrypted_packet_level_)
1528 << " as we do not have the corresponding encrypter";
1529 }
QUICHE teamb23daa72019-03-21 08:37:48 -07001530 } else {
1531 received_packet_manager_.MaybeUpdateAckTimeout(
1532 should_last_packet_instigate_acks_, last_header_.packet_number,
1533 time_of_last_received_packet_, clock_->ApproximateNow(),
1534 sent_packet_manager_.GetRttStats(),
1535 sent_packet_manager_.delayed_ack_time());
1536 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001537 } else if (ack_frame_updated()) {
1538 // It's possible the ack frame was sent along with response data, so it
1539 // no longer needs to be sent.
1540 MaybeQueueAck(was_missing);
1541 }
1542
1543 ClearLastFrames();
1544 CloseIfTooManyOutstandingSentPackets();
1545}
1546
1547bool QuicConnection::IsValidStatelessResetToken(QuicUint128 token) const {
1548 return stateless_reset_token_received_ &&
1549 token == received_stateless_reset_token_;
1550}
1551
1552void QuicConnection::OnAuthenticatedIetfStatelessResetPacket(
1553 const QuicIetfStatelessResetPacket& packet) {
1554 // TODO(fayang): Add OnAuthenticatedIetfStatelessResetPacket to
1555 // debug_visitor_.
vasilvvc48c8712019-03-11 13:38:16 -07001556 const std::string error_details = "Received stateless reset.";
QUICHE teama6ef0a62019-03-07 20:34:33 -05001557 QUIC_CODE_COUNT(quic_tear_down_local_connection_on_stateless_reset);
1558 TearDownLocalConnectionState(QUIC_PUBLIC_RESET, error_details,
1559 ConnectionCloseSource::FROM_PEER);
1560}
1561
1562void QuicConnection::MaybeQueueAck(bool was_missing) {
1563 DCHECK(!received_packet_manager_.decide_when_to_send_acks());
1564 ++num_packets_received_since_last_ack_sent_;
1565 // Determine whether the newly received packet was missing before recording
1566 // the received packet.
1567 if (was_missing) {
1568 // Only ack immediately if an ACK frame was sent with a larger
1569 // largest acked than the newly received packet number.
1570 const QuicPacketNumber largest_sent_largest_acked =
1571 sent_packet_manager_.unacked_packets().largest_sent_largest_acked();
1572 if (largest_sent_largest_acked.IsInitialized() &&
1573 last_header_.packet_number < largest_sent_largest_acked) {
1574 if (packet_generator_.deprecate_ack_bundling_mode()) {
1575 MaybeSetAckAlarmTo(clock_->ApproximateNow());
1576 } else {
1577 ack_queued_ = true;
1578 }
1579 }
1580 }
1581
1582 if (should_last_packet_instigate_acks_ && !ack_queued_) {
1583 ++num_retransmittable_packets_received_since_last_ack_sent_;
1584 if (ack_mode_ != TCP_ACKING &&
1585 last_header_.packet_number >=
1586 received_packet_manager_.PeerFirstSendingPacketNumber() +
1587 min_received_before_ack_decimation_) {
1588 // Ack up to 10 packets at once unless ack decimation is unlimited.
1589 if (!unlimited_ack_decimation_ &&
1590 num_retransmittable_packets_received_since_last_ack_sent_ >=
1591 kMaxRetransmittablePacketsBeforeAck) {
1592 if (packet_generator_.deprecate_ack_bundling_mode()) {
1593 MaybeSetAckAlarmTo(clock_->ApproximateNow());
1594 } else {
1595 ack_queued_ = true;
1596 }
1597 } else if (ShouldSetAckAlarm()) {
1598 // Wait for the minimum of the ack decimation delay or the delayed ack
1599 // time before sending an ack.
1600 QuicTime::Delta ack_delay =
1601 std::min(sent_packet_manager_.delayed_ack_time(),
1602 sent_packet_manager_.GetRttStats()->min_rtt() *
1603 ack_decimation_delay_);
1604 const QuicTime approximate_now = clock_->ApproximateNow();
1605 if (fast_ack_after_quiescence_ &&
1606 (approximate_now - time_of_previous_received_packet_) >
1607 sent_packet_manager_.GetRttStats()->SmoothedOrInitialRtt()) {
1608 // Ack the first packet out of queiscence faster, because QUIC does
1609 // not pace the first few packets and commonly these may be handshake
1610 // or TLP packets, which we'd like to acknowledge quickly.
1611 ack_delay = QuicTime::Delta::FromMilliseconds(1);
1612 }
1613 ack_alarm_->Set(approximate_now + ack_delay);
1614 }
1615 } else {
1616 // Ack with a timer or every 2 packets by default.
1617 if (num_retransmittable_packets_received_since_last_ack_sent_ >=
1618 ack_frequency_before_ack_decimation_) {
1619 if (packet_generator_.deprecate_ack_bundling_mode()) {
1620 MaybeSetAckAlarmTo(clock_->ApproximateNow());
1621 } else {
1622 ack_queued_ = true;
1623 }
1624 } else if (ShouldSetAckAlarm()) {
1625 const QuicTime approximate_now = clock_->ApproximateNow();
1626 if (fast_ack_after_quiescence_ &&
1627 (approximate_now - time_of_previous_received_packet_) >
1628 sent_packet_manager_.GetRttStats()->SmoothedOrInitialRtt()) {
1629 // Ack the first packet out of queiscence faster, because QUIC does
1630 // not pace the first few packets and commonly these may be handshake
1631 // or TLP packets, which we'd like to acknowledge quickly.
1632 ack_alarm_->Set(approximate_now +
1633 QuicTime::Delta::FromMilliseconds(1));
1634 } else {
1635 ack_alarm_->Set(approximate_now +
1636 sent_packet_manager_.delayed_ack_time());
1637 }
1638 }
1639 }
1640
1641 // If there are new missing packets to report, send an ack immediately.
1642 if (received_packet_manager_.HasNewMissingPackets()) {
1643 if (ack_mode_ == ACK_DECIMATION_WITH_REORDERING) {
1644 // Wait the minimum of an eighth min_rtt and the existing ack time.
1645 QuicTime ack_time =
1646 clock_->ApproximateNow() +
1647 0.125 * sent_packet_manager_.GetRttStats()->min_rtt();
1648 if (ShouldSetAckAlarm() || ack_alarm_->deadline() > ack_time) {
1649 ack_alarm_->Update(ack_time, QuicTime::Delta::Zero());
1650 }
1651 } else {
1652 if (packet_generator_.deprecate_ack_bundling_mode()) {
1653 MaybeSetAckAlarmTo(clock_->ApproximateNow());
1654 } else {
1655 ack_queued_ = true;
1656 }
1657 }
1658 }
1659
1660 if (fast_ack_after_quiescence_) {
1661 time_of_previous_received_packet_ = time_of_last_received_packet_;
1662 }
1663 }
1664
1665 if (ack_queued_) {
1666 ack_alarm_->Cancel();
1667 }
1668}
1669
1670void QuicConnection::ClearLastFrames() {
1671 should_last_packet_instigate_acks_ = false;
1672}
1673
1674void QuicConnection::CloseIfTooManyOutstandingSentPackets() {
1675 // This occurs if we don't discard old packets we've seen fast enough. It's
1676 // possible largest observed is less than leaset unacked.
1677 if (sent_packet_manager_.GetLargestObserved().IsInitialized() &&
1678 sent_packet_manager_.GetLargestObserved() >
1679 sent_packet_manager_.GetLeastUnacked() + max_tracked_packets_) {
1680 CloseConnection(
1681 QUIC_TOO_MANY_OUTSTANDING_SENT_PACKETS,
1682 QuicStrCat("More than ", max_tracked_packets_,
1683 " outstanding, least_unacked: ",
1684 sent_packet_manager_.GetLeastUnacked().ToUint64()),
1685 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1686 }
1687}
1688
1689const QuicFrame QuicConnection::GetUpdatedAckFrame() {
QUICHE teamb23daa72019-03-21 08:37:48 -07001690 if (use_uber_received_packet_manager_) {
1691 return uber_received_packet_manager_.GetUpdatedAckFrame(
QUICHE team1dfa46b2019-03-22 10:39:10 -07001692 QuicUtils::GetPacketNumberSpace(encryption_level_),
QUICHE teamb23daa72019-03-21 08:37:48 -07001693 clock_->ApproximateNow());
1694 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001695 return received_packet_manager_.GetUpdatedAckFrame(clock_->ApproximateNow());
1696}
1697
1698void QuicConnection::PopulateStopWaitingFrame(
1699 QuicStopWaitingFrame* stop_waiting) {
1700 stop_waiting->least_unacked = GetLeastUnacked();
1701}
1702
1703QuicPacketNumber QuicConnection::GetLeastUnacked() const {
1704 return sent_packet_manager_.GetLeastUnacked();
1705}
1706
1707bool QuicConnection::HandleWriteBlocked() {
1708 if (!writer_->IsWriteBlocked()) {
1709 return false;
1710 }
1711
1712 visitor_->OnWriteBlocked();
1713 return true;
1714}
1715
1716void QuicConnection::MaybeSendInResponseToPacket() {
1717 if (!connected_) {
1718 return;
1719 }
1720
1721 // If the writer is blocked, don't attempt to send packets now or in the send
1722 // alarm. When the writer unblocks, OnCanWrite() will be called for this
1723 // connection to send.
1724 if (HandleWriteBlocked()) {
1725 return;
1726 }
1727
1728 // Now that we have received an ack, we might be able to send packets which
1729 // are queued locally, or drain streams which are blocked.
1730 if (defer_send_in_response_to_packets_) {
1731 send_alarm_->Update(clock_->ApproximateNow(), QuicTime::Delta::Zero());
1732 } else {
1733 WriteAndBundleAcksIfNotBlocked();
1734 }
1735}
1736
1737void QuicConnection::SendVersionNegotiationPacket(bool ietf_quic) {
1738 pending_version_negotiation_packet_ = true;
1739 send_ietf_version_negotiation_packet_ = ietf_quic;
1740
1741 if (HandleWriteBlocked()) {
1742 return;
1743 }
1744
1745 QUIC_DLOG(INFO) << ENDPOINT << "Sending version negotiation packet: {"
1746 << ParsedQuicVersionVectorToString(
1747 framer_.supported_versions())
1748 << "}, ietf_quic: " << ietf_quic;
1749 std::unique_ptr<QuicEncryptedPacket> version_packet(
1750 packet_generator_.SerializeVersionNegotiationPacket(
1751 ietf_quic, framer_.supported_versions()));
1752 WriteResult result = writer_->WritePacket(
1753 version_packet->data(), version_packet->length(), self_address().host(),
1754 peer_address(), per_packet_options_);
1755
1756 if (IsWriteError(result.status)) {
1757 OnWriteError(result.error_code);
1758 return;
1759 }
1760 if (IsWriteBlockedStatus(result.status)) {
1761 visitor_->OnWriteBlocked();
1762 if (result.status == WRITE_STATUS_BLOCKED_DATA_BUFFERED) {
1763 pending_version_negotiation_packet_ = false;
1764 }
1765 return;
1766 }
1767
1768 pending_version_negotiation_packet_ = false;
1769}
1770
1771size_t QuicConnection::SendCryptoData(EncryptionLevel level,
1772 size_t write_length,
1773 QuicStreamOffset offset) {
1774 if (write_length == 0) {
1775 QUIC_BUG << "Attempt to send empty crypto frame";
1776 return 0;
1777 }
1778
1779 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
1780 return packet_generator_.ConsumeCryptoData(level, write_length, offset);
1781}
1782
1783QuicConsumedData QuicConnection::SendStreamData(QuicStreamId id,
1784 size_t write_length,
1785 QuicStreamOffset offset,
1786 StreamSendingState state) {
1787 if (state == NO_FIN && write_length == 0) {
1788 QUIC_BUG << "Attempt to send empty stream frame";
1789 return QuicConsumedData(0, false);
1790 }
1791
1792 // Opportunistically bundle an ack with every outgoing packet.
1793 // Particularly, we want to bundle with handshake packets since we don't know
1794 // which decrypter will be used on an ack packet following a handshake
1795 // packet (a handshake packet from client to server could result in a REJ or a
1796 // SHLO from the server, leading to two different decrypters at the server.)
1797 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
1798 return packet_generator_.ConsumeData(id, write_length, offset, state);
1799}
1800
1801bool QuicConnection::SendControlFrame(const QuicFrame& frame) {
1802 if (!CanWrite(HAS_RETRANSMITTABLE_DATA) && frame.type != PING_FRAME) {
1803 QUIC_DVLOG(1) << ENDPOINT << "Failed to send control frame: " << frame;
1804 // Do not check congestion window for ping.
1805 return false;
1806 }
1807 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
1808 packet_generator_.AddControlFrame(frame);
1809 if (frame.type == PING_FRAME) {
1810 // Flush PING frame immediately.
1811 packet_generator_.FlushAllQueuedFrames();
1812 if (debug_visitor_ != nullptr) {
1813 debug_visitor_->OnPingSent();
1814 }
1815 }
1816 if (frame.type == BLOCKED_FRAME) {
1817 stats_.blocked_frames_sent++;
1818 }
1819 return true;
1820}
1821
1822void QuicConnection::OnStreamReset(QuicStreamId id,
1823 QuicRstStreamErrorCode error) {
1824 if (error == QUIC_STREAM_NO_ERROR) {
1825 // All data for streams which are reset with QUIC_STREAM_NO_ERROR must
1826 // be received by the peer.
1827 return;
1828 }
1829 // Flush stream frames of reset stream.
1830 if (packet_generator_.HasPendingStreamFramesOfStream(id)) {
1831 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
1832 packet_generator_.FlushAllQueuedFrames();
1833 }
1834
1835 sent_packet_manager_.CancelRetransmissionsForStream(id);
1836 // Remove all queued packets which only contain data for the reset stream.
1837 // TODO(fayang): consider removing this because it should be rarely executed.
1838 auto packet_iterator = queued_packets_.begin();
1839 while (packet_iterator != queued_packets_.end()) {
1840 QuicFrames* retransmittable_frames =
1841 &packet_iterator->retransmittable_frames;
1842 if (retransmittable_frames->empty()) {
1843 ++packet_iterator;
1844 continue;
1845 }
1846 // NOTE THAT RemoveFramesForStream removes only STREAM frames
1847 // for the specified stream.
1848 RemoveFramesForStream(retransmittable_frames, id);
1849 if (!retransmittable_frames->empty()) {
1850 ++packet_iterator;
1851 continue;
1852 }
1853 delete[] packet_iterator->encrypted_buffer;
1854 ClearSerializedPacket(&(*packet_iterator));
1855 packet_iterator = queued_packets_.erase(packet_iterator);
1856 }
1857 // TODO(ianswett): Consider checking for 3 RTOs when the last stream is
1858 // cancelled as well.
1859}
1860
1861const QuicConnectionStats& QuicConnection::GetStats() {
1862 const RttStats* rtt_stats = sent_packet_manager_.GetRttStats();
1863
1864 // Update rtt and estimated bandwidth.
1865 QuicTime::Delta min_rtt = rtt_stats->min_rtt();
1866 if (min_rtt.IsZero()) {
1867 // If min RTT has not been set, use initial RTT instead.
1868 min_rtt = rtt_stats->initial_rtt();
1869 }
1870 stats_.min_rtt_us = min_rtt.ToMicroseconds();
1871
1872 QuicTime::Delta srtt = rtt_stats->SmoothedOrInitialRtt();
1873 stats_.srtt_us = srtt.ToMicroseconds();
1874
1875 stats_.estimated_bandwidth = sent_packet_manager_.BandwidthEstimate();
1876 stats_.max_packet_size = packet_generator_.GetCurrentMaxPacketLength();
1877 stats_.max_received_packet_size = largest_received_packet_size_;
1878 return stats_;
1879}
1880
1881void QuicConnection::OnCoalescedPacket(const QuicEncryptedPacket& packet) {
1882 QueueCoalescedPacket(packet);
1883}
1884
1885void QuicConnection::ProcessUdpPacket(const QuicSocketAddress& self_address,
1886 const QuicSocketAddress& peer_address,
1887 const QuicReceivedPacket& packet) {
1888 if (!connected_) {
1889 return;
1890 }
dschinazid9467b52019-04-03 16:47:08 -07001891 QUIC_DVLOG(2) << ENDPOINT << "Received encrypted " << packet.length()
1892 << " bytes:" << std::endl
1893 << QuicTextUtils::HexDump(
1894 QuicStringPiece(packet.data(), packet.length()));
QUICHE teama6ef0a62019-03-07 20:34:33 -05001895 QUIC_BUG_IF(current_packet_data_ != nullptr)
1896 << "ProcessUdpPacket must not be called while processing a packet.";
1897 if (debug_visitor_ != nullptr) {
1898 debug_visitor_->OnPacketReceived(self_address, peer_address, packet);
1899 }
1900 last_size_ = packet.length();
1901 current_packet_data_ = packet.data();
1902
1903 last_packet_destination_address_ = self_address;
1904 last_packet_source_address_ = peer_address;
1905 if (!self_address_.IsInitialized()) {
1906 self_address_ = last_packet_destination_address_;
1907 }
1908
1909 if (!direct_peer_address_.IsInitialized()) {
1910 direct_peer_address_ = last_packet_source_address_;
1911 }
1912
1913 if (!effective_peer_address_.IsInitialized()) {
1914 const QuicSocketAddress effective_peer_addr =
1915 GetEffectivePeerAddressFromCurrentPacket();
1916
1917 // effective_peer_address_ must be initialized at the beginning of the
1918 // first packet processed(here). If effective_peer_addr is uninitialized,
1919 // just set effective_peer_address_ to the direct peer address.
1920 effective_peer_address_ = effective_peer_addr.IsInitialized()
1921 ? effective_peer_addr
1922 : direct_peer_address_;
1923 }
1924
1925 stats_.bytes_received += packet.length();
1926 ++stats_.packets_received;
1927
1928 // Ensure the time coming from the packet reader is within 2 minutes of now.
1929 if (std::abs((packet.receipt_time() - clock_->ApproximateNow()).ToSeconds()) >
1930 2 * 60) {
1931 QUIC_BUG << "Packet receipt time:"
1932 << packet.receipt_time().ToDebuggingValue()
1933 << " too far from current time:"
1934 << clock_->ApproximateNow().ToDebuggingValue();
1935 }
1936 time_of_last_received_packet_ = packet.receipt_time();
1937 QUIC_DVLOG(1) << ENDPOINT << "time of last received packet: "
1938 << time_of_last_received_packet_.ToDebuggingValue();
1939
1940 ScopedPacketFlusher flusher(this, NO_ACK);
1941 if (!framer_.ProcessPacket(packet)) {
1942 // If we are unable to decrypt this packet, it might be
1943 // because the CHLO or SHLO packet was lost.
1944 if (framer_.error() == QUIC_DECRYPTION_FAILURE) {
1945 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE &&
1946 undecryptable_packets_.size() < max_undecryptable_packets_) {
1947 QueueUndecryptablePacket(packet);
1948 } else if (debug_visitor_ != nullptr) {
1949 debug_visitor_->OnUndecryptablePacket();
1950 }
1951 }
1952 QUIC_DVLOG(1) << ENDPOINT
1953 << "Unable to process packet. Last packet processed: "
1954 << last_header_.packet_number;
1955 current_packet_data_ = nullptr;
1956 is_current_packet_connectivity_probing_ = false;
1957
1958 MaybeProcessCoalescedPackets();
1959 return;
1960 }
1961
1962 ++stats_.packets_processed;
1963
1964 QUIC_DLOG_IF(INFO, active_effective_peer_migration_type_ != NO_CHANGE)
1965 << "sent_packet_manager_.GetLargestObserved() = "
1966 << sent_packet_manager_.GetLargestObserved()
1967 << ", highest_packet_sent_before_effective_peer_migration_ = "
1968 << highest_packet_sent_before_effective_peer_migration_;
1969 if (active_effective_peer_migration_type_ != NO_CHANGE &&
1970 sent_packet_manager_.GetLargestObserved().IsInitialized() &&
1971 (!highest_packet_sent_before_effective_peer_migration_.IsInitialized() ||
1972 sent_packet_manager_.GetLargestObserved() >
1973 highest_packet_sent_before_effective_peer_migration_)) {
1974 if (perspective_ == Perspective::IS_SERVER) {
1975 OnEffectivePeerMigrationValidated();
1976 }
1977 }
1978
1979 MaybeProcessCoalescedPackets();
1980 MaybeProcessUndecryptablePackets();
1981 MaybeSendInResponseToPacket();
1982 SetPingAlarm();
1983 current_packet_data_ = nullptr;
1984 is_current_packet_connectivity_probing_ = false;
1985}
1986
1987void QuicConnection::OnBlockedWriterCanWrite() {
1988 writer_->SetWritable();
1989 OnCanWrite();
1990}
1991
1992void QuicConnection::OnCanWrite() {
1993 DCHECK(!writer_->IsWriteBlocked());
1994
1995 // Add a flusher to ensure the connection is marked app-limited.
1996 ScopedPacketFlusher flusher(this, NO_ACK);
1997
1998 WriteQueuedPackets();
1999 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07002000 const QuicTime ack_timeout =
2001 use_uber_received_packet_manager_
QUICHE teamcd098022019-03-22 18:49:55 -07002002 ? uber_received_packet_manager_.GetEarliestAckTimeout()
QUICHE teamb23daa72019-03-21 08:37:48 -07002003 : received_packet_manager_.ack_timeout();
QUICHE teama6ef0a62019-03-07 20:34:33 -05002004 if (ack_timeout.IsInitialized() &&
2005 ack_timeout <= clock_->ApproximateNow()) {
2006 // Send an ACK now because either 1) we were write blocked when we last
2007 // tried to send an ACK, or 2) both ack alarm and send alarm were set to
2008 // go off together.
QUICHE teamcd098022019-03-22 18:49:55 -07002009 if (SupportsMultiplePacketNumberSpaces()) {
2010 SendAllPendingAcks();
2011 } else {
2012 SendAck();
2013 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002014 }
2015 } else if (send_ack_when_on_can_write_) {
2016 // Send an ACK now because either 1) we were write blocked when we last
2017 // tried to send an ACK, or 2) both ack alarm and send alarm were set to go
2018 // off together.
2019 DCHECK(packet_generator_.deprecate_ack_bundling_mode());
2020 SendAck();
2021 }
2022 if (!session_decides_what_to_write()) {
2023 WritePendingRetransmissions();
2024 }
2025
2026 WriteNewData();
2027}
2028
2029void QuicConnection::WriteNewData() {
2030 // Sending queued packets may have caused the socket to become write blocked,
2031 // or the congestion manager to prohibit sending. If we've sent everything
2032 // we had queued and we're still not blocked, let the visitor know it can
2033 // write more.
2034 if (!CanWrite(HAS_RETRANSMITTABLE_DATA)) {
2035 return;
2036 }
2037
2038 {
2039 ScopedPacketFlusher flusher(this, SEND_ACK_IF_QUEUED);
2040 visitor_->OnCanWrite();
2041 }
2042
2043 // After the visitor writes, it may have caused the socket to become write
2044 // blocked or the congestion manager to prohibit sending, so check again.
2045 if (visitor_->WillingAndAbleToWrite() && !send_alarm_->IsSet() &&
2046 CanWrite(HAS_RETRANSMITTABLE_DATA)) {
2047 // We're not write blocked, but some stream didn't write out all of its
2048 // bytes. Register for 'immediate' resumption so we'll keep writing after
2049 // other connections and events have had a chance to use the thread.
2050 send_alarm_->Set(clock_->ApproximateNow());
2051 }
2052}
2053
2054void QuicConnection::WriteIfNotBlocked() {
2055 if (!HandleWriteBlocked()) {
2056 OnCanWrite();
2057 }
2058}
2059
2060void QuicConnection::WriteAndBundleAcksIfNotBlocked() {
2061 if (!HandleWriteBlocked()) {
2062 ScopedPacketFlusher flusher(this, SEND_ACK_IF_QUEUED);
2063 WriteIfNotBlocked();
2064 }
2065}
2066
2067bool QuicConnection::ProcessValidatedPacket(const QuicPacketHeader& header) {
2068 if (perspective_ == Perspective::IS_SERVER && self_address_.IsInitialized() &&
2069 last_packet_destination_address_.IsInitialized() &&
2070 self_address_ != last_packet_destination_address_) {
2071 // Allow change between pure IPv4 and equivalent mapped IPv4 address.
2072 if (self_address_.port() != last_packet_destination_address_.port() ||
2073 self_address_.host().Normalized() !=
2074 last_packet_destination_address_.host().Normalized()) {
2075 if (!visitor_->AllowSelfAddressChange()) {
2076 CloseConnection(
2077 QUIC_ERROR_MIGRATING_ADDRESS,
2078 "Self address migration is not supported at the server.",
2079 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2080 return false;
2081 }
2082 }
2083 self_address_ = last_packet_destination_address_;
2084 }
2085
QUICHE teamc65d1d12019-03-19 20:58:04 -07002086 if (PacketCanReplaceConnectionId(header, perspective_) &&
2087 connection_id_ != header.source_connection_id) {
2088 QUIC_DLOG(INFO) << ENDPOINT << "Replacing connection ID " << connection_id_
2089 << " with " << header.source_connection_id;
2090 connection_id_ = header.source_connection_id;
2091 packet_generator_.SetConnectionId(connection_id_);
2092 }
2093
QUICHE teamd791e2c2019-03-15 10:28:21 -07002094 if (!ValidateReceivedPacketNumber(header.packet_number)) {
2095 return false;
QUICHE teama6ef0a62019-03-07 20:34:33 -05002096 }
2097
2098 if (version_negotiation_state_ != NEGOTIATED_VERSION) {
2099 if (perspective_ == Perspective::IS_CLIENT) {
2100 DCHECK(!header.version_flag || header.form != GOOGLE_QUIC_PACKET);
2101 if (framer_.transport_version() <= QUIC_VERSION_43) {
2102 // If the client gets a packet without the version flag from the server
2103 // it should stop sending version since the version negotiation is done.
2104 // IETF QUIC stops sending version once encryption level switches to
2105 // forward secure.
2106 packet_generator_.StopSendingVersion();
2107 }
2108 version_negotiation_state_ = NEGOTIATED_VERSION;
2109 visitor_->OnSuccessfulVersionNegotiation(version());
2110 if (debug_visitor_ != nullptr) {
2111 debug_visitor_->OnSuccessfulVersionNegotiation(version());
2112 }
2113 }
2114 }
2115
2116 if (last_size_ > largest_received_packet_size_) {
2117 largest_received_packet_size_ = last_size_;
2118 }
2119
2120 if (perspective_ == Perspective::IS_SERVER &&
QUICHE team6987b4a2019-03-15 16:23:04 -07002121 encryption_level_ == ENCRYPTION_INITIAL &&
QUICHE teama6ef0a62019-03-07 20:34:33 -05002122 last_size_ > packet_generator_.GetCurrentMaxPacketLength()) {
2123 SetMaxPacketLength(last_size_);
2124 }
2125 return true;
2126}
2127
QUICHE teamd791e2c2019-03-15 10:28:21 -07002128bool QuicConnection::ValidateReceivedPacketNumber(
2129 QuicPacketNumber packet_number) {
QUICHE teamb23daa72019-03-21 08:37:48 -07002130 if (validate_packet_number_post_decryption_) {
2131 const bool is_awaiting =
2132 use_uber_received_packet_manager_
QUICHE team1dfa46b2019-03-22 10:39:10 -07002133 ? uber_received_packet_manager_.IsAwaitingPacket(
2134 last_decrypted_packet_level_, packet_number)
QUICHE teamb23daa72019-03-21 08:37:48 -07002135 : received_packet_manager_.IsAwaitingPacket(packet_number);
2136 if (!is_awaiting) {
dschinazid9467b52019-04-03 16:47:08 -07002137 if (use_uber_received_packet_manager_) {
2138 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << packet_number
2139 << " no longer being waited for at level "
2140 << static_cast<int>(last_decrypted_packet_level_)
2141 << ". Discarding.";
2142 } else {
2143 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << packet_number
2144 << " no longer being waited for. Discarding.";
2145 }
QUICHE teamb23daa72019-03-21 08:37:48 -07002146 if (debug_visitor_ != nullptr) {
2147 debug_visitor_->OnDuplicatePacket(packet_number);
2148 }
2149 return false;
QUICHE team692750b2019-03-17 17:57:46 -07002150 }
QUICHE team692750b2019-03-17 17:57:46 -07002151 }
2152
QUICHE teamcd098022019-03-22 18:49:55 -07002153 if (use_uber_received_packet_manager_) {
2154 // When using uber_received_packet_manager, accept any packet numbers.
2155 return true;
2156 }
2157
QUICHE teamd791e2c2019-03-15 10:28:21 -07002158 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
2159 QUIC_RESTART_FLAG_COUNT_N(quic_enable_accept_random_ipn, 2, 2);
2160 // Configured to accept any packet number in range 1...0x7fffffff as initial
2161 // packet number.
2162 bool out_of_bound = false;
rchd5d13c22019-03-18 14:31:09 -07002163 std::string error_detail = "Packet number out of bounds.";
QUICHE teamd791e2c2019-03-15 10:28:21 -07002164 if (last_header_.packet_number.IsInitialized()) {
2165 out_of_bound = !Near(packet_number, last_header_.packet_number);
2166 } else if ((packet_number > MaxRandomInitialPacketNumber())) {
2167 out_of_bound = true;
2168 error_detail = "Initial packet number out of bounds.";
2169 }
2170 if (out_of_bound) {
2171 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << packet_number
2172 << " out of bounds. Discarding";
2173 CloseConnection(QUIC_INVALID_PACKET_HEADER, error_detail,
2174 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2175 return false;
2176 }
2177 return true;
2178 }
QUICHE teamcd098022019-03-22 18:49:55 -07002179
2180 if (packet_number > received_packet_manager_.PeerFirstSendingPacketNumber() &&
QUICHE teamd791e2c2019-03-15 10:28:21 -07002181 packet_number <= MaxRandomInitialPacketNumber()) {
2182 QUIC_CODE_COUNT_N(had_possibly_random_ipn, 2, 2);
2183 }
2184 const bool out_of_bound =
2185 last_header_.packet_number.IsInitialized()
2186 ? !Near(packet_number, last_header_.packet_number)
QUICHE teamcd098022019-03-22 18:49:55 -07002187 : packet_number >=
2188 (received_packet_manager_.PeerFirstSendingPacketNumber() +
2189 kMaxPacketGap);
QUICHE teamd791e2c2019-03-15 10:28:21 -07002190 if (!out_of_bound) {
2191 return true;
2192 }
2193 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << packet_number
2194 << " out of bounds. Discarding";
2195 QuicStringPiece packet_data = GetCurrentPacket();
2196 const size_t kMaxPacketLengthInErrorDetails = 64;
2197 CloseConnection(
2198 QUIC_INVALID_PACKET_HEADER,
2199 QuicStrCat(
2200 "Packet number out of bounds. ",
2201 last_header_.packet_number.IsInitialized()
2202 ? QuicStrCat("last_pkn=", last_header_.packet_number.ToUint64())
2203 : "first received packet",
2204 ", current_pkn=", packet_number.ToUint64(),
2205 ", current_pkt_len=", packet_data.length(), ", current_hdr=",
2206 QuicTextUtils::HexEncode(
2207 packet_data.length() > kMaxPacketLengthInErrorDetails
2208 ? QuicStringPiece(packet_data.data(),
2209 kMaxPacketLengthInErrorDetails)
2210 : packet_data)),
2211 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2212 return false;
2213}
2214
QUICHE teama6ef0a62019-03-07 20:34:33 -05002215void QuicConnection::WriteQueuedPackets() {
2216 DCHECK(!writer_->IsWriteBlocked());
2217
2218 if (pending_version_negotiation_packet_) {
2219 SendVersionNegotiationPacket(send_ietf_version_negotiation_packet_);
2220 }
2221
2222 QUIC_CLIENT_HISTOGRAM_COUNTS("QuicSession.NumQueuedPacketsBeforeWrite",
2223 queued_packets_.size(), 1, 1000, 50, "");
2224 while (!queued_packets_.empty()) {
2225 // WritePacket() can potentially clear all queued packets, so we need to
2226 // save the first queued packet to a local variable before calling it.
2227 SerializedPacket packet(std::move(queued_packets_.front()));
2228 queued_packets_.pop_front();
2229
2230 const bool write_result = WritePacket(&packet);
2231
2232 if (connected_ && !write_result) {
2233 // Write failed but connection is open, re-insert |packet| into the
2234 // front of the queue, it will be retried later.
2235 queued_packets_.emplace_front(std::move(packet));
2236 break;
2237 }
2238
2239 delete[] packet.encrypted_buffer;
2240 ClearSerializedPacket(&packet);
2241 if (!connected_) {
2242 DCHECK(queued_packets_.empty()) << "Queued packets should have been "
2243 "cleared while closing connection";
2244 break;
2245 }
2246
2247 // Continue to send the next packet in queue.
2248 }
2249}
2250
2251void QuicConnection::WritePendingRetransmissions() {
2252 DCHECK(!session_decides_what_to_write());
2253 // Keep writing as long as there's a pending retransmission which can be
2254 // written.
2255 while (sent_packet_manager_.HasPendingRetransmissions() &&
2256 CanWrite(HAS_RETRANSMITTABLE_DATA)) {
2257 const QuicPendingRetransmission pending =
2258 sent_packet_manager_.NextPendingRetransmission();
2259
2260 // Re-packetize the frames with a new packet number for retransmission.
2261 // Retransmitted packets use the same packet number length as the
2262 // original.
2263 // Flush the packet generator before making a new packet.
2264 // TODO(ianswett): Implement ReserializeAllFrames as a separate path that
2265 // does not require the creator to be flushed.
2266 // TODO(fayang): FlushAllQueuedFrames should only be called once, and should
2267 // be moved outside of the loop. Also, CanWrite is not checked after the
2268 // generator is flushed.
2269 {
2270 ScopedPacketFlusher flusher(this, NO_ACK);
2271 packet_generator_.FlushAllQueuedFrames();
2272 }
2273 DCHECK(!packet_generator_.HasQueuedFrames());
dschinazi66dea072019-04-09 11:41:06 -07002274 char buffer[kMaxOutgoingPacketSize];
2275 packet_generator_.ReserializeAllFrames(pending, buffer,
2276 kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002277 }
2278}
2279
2280void QuicConnection::SendProbingRetransmissions() {
2281 while (sent_packet_manager_.GetSendAlgorithm()->ShouldSendProbingPacket() &&
2282 CanWrite(HAS_RETRANSMITTABLE_DATA)) {
2283 const bool can_retransmit =
2284 sent_packet_manager_.MaybeRetransmitOldestPacket(
2285 PROBING_RETRANSMISSION);
2286 if (!can_retransmit) {
2287 QUIC_DVLOG(1)
2288 << "Cannot send probing retransmissions: nothing to retransmit.";
2289 break;
2290 }
2291
2292 if (!session_decides_what_to_write()) {
2293 DCHECK(sent_packet_manager_.HasPendingRetransmissions());
2294 WritePendingRetransmissions();
2295 }
2296 }
2297}
2298
2299void QuicConnection::RetransmitUnackedPackets(
2300 TransmissionType retransmission_type) {
2301 sent_packet_manager_.RetransmitUnackedPackets(retransmission_type);
2302
2303 WriteIfNotBlocked();
2304}
2305
2306void QuicConnection::NeuterUnencryptedPackets() {
2307 sent_packet_manager_.NeuterUnencryptedPackets();
2308 // This may have changed the retransmission timer, so re-arm it.
2309 SetRetransmissionAlarm();
2310}
2311
2312bool QuicConnection::ShouldGeneratePacket(
2313 HasRetransmittableData retransmittable,
2314 IsHandshake handshake) {
2315 // We should serialize handshake packets immediately to ensure that they
2316 // end up sent at the right encryption level.
2317 if (handshake == IS_HANDSHAKE) {
2318 return true;
2319 }
2320
2321 return CanWrite(retransmittable);
2322}
2323
2324const QuicFrames QuicConnection::MaybeBundleAckOpportunistically() {
2325 DCHECK(packet_generator_.deprecate_ack_bundling_mode());
2326 QuicFrames frames;
2327 bool has_pending_ack = false;
2328 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07002329 if (use_uber_received_packet_manager_) {
2330 has_pending_ack =
QUICHE team1dfa46b2019-03-22 10:39:10 -07002331 uber_received_packet_manager_
2332 .GetAckTimeout(QuicUtils::GetPacketNumberSpace(encryption_level_))
2333 .IsInitialized();
QUICHE teamb23daa72019-03-21 08:37:48 -07002334 } else {
2335 has_pending_ack = received_packet_manager_.ack_timeout().IsInitialized();
2336 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002337 } else {
2338 has_pending_ack = ack_alarm_->IsSet();
2339 }
2340 if (!has_pending_ack && stop_waiting_count_ <= 1) {
2341 // No need to send an ACK.
2342 return frames;
2343 }
2344 ResetAckStates();
2345
2346 QUIC_DVLOG(1) << ENDPOINT << "Bundle an ACK opportunistically";
2347 frames.push_back(GetUpdatedAckFrame());
2348 if (!no_stop_waiting_frames_) {
2349 QuicStopWaitingFrame stop_waiting;
2350 PopulateStopWaitingFrame(&stop_waiting);
2351 frames.push_back(QuicFrame(stop_waiting));
2352 }
2353 return frames;
2354}
2355
2356bool QuicConnection::CanWrite(HasRetransmittableData retransmittable) {
2357 if (!connected_) {
2358 return false;
2359 }
2360
2361 if (session_decides_what_to_write() &&
2362 sent_packet_manager_.pending_timer_transmission_count() > 0) {
2363 // Force sending the retransmissions for HANDSHAKE, TLP, RTO, PROBING cases.
2364 return true;
2365 }
2366
2367 if (HandleWriteBlocked()) {
2368 return false;
2369 }
2370
2371 // Allow acks to be sent immediately.
2372 if (retransmittable == NO_RETRANSMITTABLE_DATA) {
2373 return true;
2374 }
2375 // If the send alarm is set, wait for it to fire.
2376 if (send_alarm_->IsSet()) {
2377 return false;
2378 }
2379
2380 QuicTime now = clock_->Now();
2381 QuicTime::Delta delay = sent_packet_manager_.TimeUntilSend(now);
2382 if (delay.IsInfinite()) {
2383 send_alarm_->Cancel();
2384 return false;
2385 }
2386
2387 // Scheduler requires a delay.
2388 if (!delay.IsZero()) {
2389 if (delay <= release_time_into_future_) {
2390 // Required delay is within pace time into future, send now.
2391 return true;
2392 }
2393 // Cannot send packet now because delay is too far in the future.
2394 send_alarm_->Update(now + delay, QuicTime::Delta::FromMilliseconds(1));
2395 QUIC_DVLOG(1) << ENDPOINT << "Delaying sending " << delay.ToMilliseconds()
2396 << "ms";
2397 return false;
2398 }
2399 return true;
2400}
2401
2402bool QuicConnection::WritePacket(SerializedPacket* packet) {
2403 if (ShouldDiscardPacket(*packet)) {
2404 ++stats_.packets_discarded;
2405 return true;
2406 }
2407 if (sent_packet_manager_.GetLargestSentPacket().IsInitialized() &&
2408 packet->packet_number < sent_packet_manager_.GetLargestSentPacket()) {
2409 QUIC_BUG << "Attempt to write packet:" << packet->packet_number
2410 << " after:" << sent_packet_manager_.GetLargestSentPacket();
2411 QUIC_CLIENT_HISTOGRAM_COUNTS("QuicSession.NumQueuedPacketsAtOutOfOrder",
2412 queued_packets_.size(), 1, 1000, 50, "");
2413 CloseConnection(QUIC_INTERNAL_ERROR, "Packet written out of order.",
2414 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2415 return true;
2416 }
2417 // Termination packets are encrypted and saved, so don't exit early.
2418 const bool is_termination_packet = IsTerminationPacket(*packet);
2419 if (HandleWriteBlocked() && !is_termination_packet) {
2420 return false;
2421 }
2422
2423 QuicPacketNumber packet_number = packet->packet_number;
2424
2425 QuicPacketLength encrypted_length = packet->encrypted_length;
2426 // Termination packets are eventually owned by TimeWaitListManager.
2427 // Others are deleted at the end of this call.
2428 if (is_termination_packet) {
2429 if (termination_packets_ == nullptr) {
2430 termination_packets_.reset(
2431 new std::vector<std::unique_ptr<QuicEncryptedPacket>>);
2432 }
2433 // Copy the buffer so it's owned in the future.
2434 char* buffer_copy = CopyBuffer(*packet);
2435 termination_packets_->emplace_back(
2436 new QuicEncryptedPacket(buffer_copy, encrypted_length, true));
2437 // This assures we won't try to write *forced* packets when blocked.
2438 // Return true to stop processing.
2439 if (HandleWriteBlocked()) {
2440 return true;
2441 }
2442 }
2443
dschinazi66dea072019-04-09 11:41:06 -07002444 DCHECK_LE(encrypted_length, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002445 DCHECK_LE(encrypted_length, packet_generator_.GetCurrentMaxPacketLength());
2446 QUIC_DVLOG(1) << ENDPOINT << "Sending packet " << packet_number << " : "
2447 << (IsRetransmittable(*packet) == HAS_RETRANSMITTABLE_DATA
2448 ? "data bearing "
2449 : " ack only ")
2450 << ", encryption level: "
2451 << QuicUtils::EncryptionLevelToString(packet->encryption_level)
2452 << ", encrypted length:" << encrypted_length;
2453 QUIC_DVLOG(2) << ENDPOINT << "packet(" << packet_number << "): " << std::endl
2454 << QuicTextUtils::HexDump(QuicStringPiece(
2455 packet->encrypted_buffer, encrypted_length));
2456
2457 // Measure the RTT from before the write begins to avoid underestimating the
2458 // min_rtt_, especially in cases where the thread blocks or gets swapped out
2459 // during the WritePacket below.
2460 QuicTime packet_send_time = clock_->Now();
2461 if (supports_release_time_ && per_packet_options_ != nullptr) {
2462 QuicTime next_release_time = sent_packet_manager_.GetNextReleaseTime();
2463 QuicTime::Delta release_time_delay = QuicTime::Delta::Zero();
2464 QuicTime now = packet_send_time;
2465 if (next_release_time > now) {
2466 release_time_delay = next_release_time - now;
2467 // Set packet_send_time to the future to make the RTT estimation accurate.
2468 packet_send_time = next_release_time;
2469 }
2470 per_packet_options_->release_time_delay = release_time_delay;
2471 }
2472 WriteResult result = writer_->WritePacket(
2473 packet->encrypted_buffer, encrypted_length, self_address().host(),
2474 peer_address(), per_packet_options_);
2475
2476 QUIC_HISTOGRAM_ENUM(
2477 "QuicConnection.WritePacketStatus", result.status,
2478 WRITE_STATUS_NUM_VALUES,
2479 "Status code returned by writer_->WritePacket() in QuicConnection.");
2480
2481 if (IsWriteBlockedStatus(result.status)) {
2482 // Ensure the writer is still write blocked, otherwise QUIC may continue
2483 // trying to write when it will not be able to.
2484 DCHECK(writer_->IsWriteBlocked());
2485 visitor_->OnWriteBlocked();
2486 // If the socket buffers the data, then the packet should not
2487 // be queued and sent again, which would result in an unnecessary
2488 // duplicate packet being sent. The helper must call OnCanWrite
2489 // when the write completes, and OnWriteError if an error occurs.
2490 if (result.status != WRITE_STATUS_BLOCKED_DATA_BUFFERED) {
2491 return false;
2492 }
2493 }
2494
2495 // In some cases, an MTU probe can cause EMSGSIZE. This indicates that the
2496 // MTU discovery is permanently unsuccessful.
2497 if (IsMsgTooBig(result) && packet->retransmittable_frames.empty() &&
2498 packet->encrypted_length > long_term_mtu_) {
2499 mtu_discovery_target_ = 0;
2500 mtu_discovery_alarm_->Cancel();
2501 // The write failed, but the writer is not blocked, so return true.
2502 return true;
2503 }
2504
2505 if (IsWriteError(result.status)) {
2506 OnWriteError(result.error_code);
2507 QUIC_LOG_FIRST_N(ERROR, 10)
2508 << ENDPOINT << "failed writing " << encrypted_length
2509 << " bytes from host " << self_address().host().ToString()
2510 << " to address " << peer_address().ToString() << " with error code "
2511 << result.error_code;
2512 return false;
2513 }
2514
2515 if (debug_visitor_ != nullptr) {
2516 // Pass the write result to the visitor.
2517 debug_visitor_->OnPacketSent(*packet, packet->original_packet_number,
2518 packet->transmission_type, packet_send_time);
2519 }
2520 if (IsRetransmittable(*packet) == HAS_RETRANSMITTABLE_DATA) {
2521 if (!is_path_degrading_ && !path_degrading_alarm_->IsSet()) {
2522 // This is the first retransmittable packet on the working path.
2523 // Start the path degrading alarm to detect new path degrading.
2524 SetPathDegradingAlarm();
2525 }
2526
2527 if (GetQuicReloadableFlag(
2528 quic_fix_time_of_first_packet_sent_after_receiving)) {
2529 // Update |time_of_first_packet_sent_after_receiving_| if this is the
2530 // first packet sent after the last packet was received. If it were
2531 // updated on every sent packet, then sending into a black hole might
2532 // never timeout.
2533 if (time_of_first_packet_sent_after_receiving_ <
2534 time_of_last_received_packet_) {
2535 QUIC_RELOADABLE_FLAG_COUNT(
2536 quic_fix_time_of_first_packet_sent_after_receiving);
2537 time_of_first_packet_sent_after_receiving_ = packet_send_time;
2538 }
2539 } else {
2540 // Only adjust the last sent time (for the purpose of tracking the idle
2541 // timeout) if this is the first retransmittable packet sent after a
2542 // packet is received. If it were updated on every sent packet, then
2543 // sending into a black hole might never timeout.
2544 if (time_of_first_packet_sent_after_receiving_ <=
2545 time_of_last_received_packet_) {
2546 time_of_first_packet_sent_after_receiving_ = packet_send_time;
2547 }
2548 }
2549 }
2550
2551 MaybeSetMtuAlarm(packet_number);
2552 QUIC_DVLOG(1) << ENDPOINT << "time we began writing last sent packet: "
2553 << packet_send_time.ToDebuggingValue();
2554
2555 bool reset_retransmission_alarm = sent_packet_manager_.OnPacketSent(
2556 packet, packet->original_packet_number, packet_send_time,
2557 packet->transmission_type, IsRetransmittable(*packet));
2558
2559 if (reset_retransmission_alarm || !retransmission_alarm_->IsSet()) {
2560 SetRetransmissionAlarm();
2561 }
2562 SetPingAlarm();
2563
2564 // The packet number length must be updated after OnPacketSent, because it
2565 // may change the packet number length in packet.
2566 packet_generator_.UpdatePacketNumberLength(
2567 sent_packet_manager_.GetLeastUnacked(),
2568 sent_packet_manager_.EstimateMaxPacketsInFlight(max_packet_length()));
2569
2570 stats_.bytes_sent += result.bytes_written;
2571 ++stats_.packets_sent;
2572 if (packet->transmission_type != NOT_RETRANSMISSION) {
2573 stats_.bytes_retransmitted += result.bytes_written;
2574 ++stats_.packets_retransmitted;
2575 }
2576
2577 return true;
2578}
2579
2580void QuicConnection::FlushPackets() {
2581 if (!connected_) {
2582 return;
2583 }
2584
2585 if (!writer_->IsBatchMode()) {
2586 return;
2587 }
2588
2589 if (HandleWriteBlocked()) {
2590 QUIC_DLOG(INFO) << ENDPOINT << "FlushPackets called while blocked.";
2591 return;
2592 }
2593
2594 WriteResult result = writer_->Flush();
2595
2596 if (HandleWriteBlocked()) {
2597 DCHECK_EQ(WRITE_STATUS_BLOCKED, result.status)
2598 << "Unexpected flush result:" << result;
2599 QUIC_DLOG(INFO) << ENDPOINT << "Write blocked in FlushPackets.";
2600 return;
2601 }
2602
2603 if (IsWriteError(result.status)) {
2604 OnWriteError(result.error_code);
2605 }
2606}
2607
2608bool QuicConnection::IsMsgTooBig(const WriteResult& result) {
2609 return (result.status == WRITE_STATUS_MSG_TOO_BIG) ||
2610 (IsWriteError(result.status) && result.error_code == QUIC_EMSGSIZE);
2611}
2612
2613bool QuicConnection::ShouldDiscardPacket(const SerializedPacket& packet) {
2614 if (!connected_) {
2615 QUIC_DLOG(INFO) << ENDPOINT
2616 << "Not sending packet as connection is disconnected.";
2617 return true;
2618 }
2619
2620 QuicPacketNumber packet_number = packet.packet_number;
2621 if (encryption_level_ == ENCRYPTION_FORWARD_SECURE &&
QUICHE team6987b4a2019-03-15 16:23:04 -07002622 packet.encryption_level == ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05002623 // Drop packets that are NULL encrypted since the peer won't accept them
2624 // anymore.
2625 QUIC_DLOG(INFO) << ENDPOINT
2626 << "Dropping NULL encrypted packet: " << packet_number
2627 << " since the connection is forward secure.";
2628 return true;
2629 }
2630
2631 return false;
2632}
2633
2634void QuicConnection::OnWriteError(int error_code) {
2635 if (write_error_occurred_) {
2636 // A write error already occurred. The connection is being closed.
2637 return;
2638 }
2639 write_error_occurred_ = true;
2640
vasilvvc48c8712019-03-11 13:38:16 -07002641 const std::string error_details = QuicStrCat(
QUICHE teama6ef0a62019-03-07 20:34:33 -05002642 "Write failed with error: ", error_code, " (", strerror(error_code), ")");
2643 QUIC_LOG_FIRST_N(ERROR, 2) << ENDPOINT << error_details;
2644 switch (error_code) {
2645 case QUIC_EMSGSIZE:
2646 CloseConnection(
2647 QUIC_PACKET_WRITE_ERROR, error_details,
2648 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET_WITH_NO_ACK);
2649 break;
2650 default:
2651 // We can't send an error as the socket is presumably borked.
2652 if (transport_version() > QUIC_VERSION_43) {
2653 QUIC_CODE_COUNT(quic_tear_down_local_connection_on_write_error_ietf);
2654 } else {
2655 QUIC_CODE_COUNT(
2656 quic_tear_down_local_connection_on_write_error_non_ietf);
2657 }
2658 TearDownLocalConnectionState(QUIC_PACKET_WRITE_ERROR, error_details,
2659 ConnectionCloseSource::FROM_SELF);
2660 }
2661}
2662
2663char* QuicConnection::GetPacketBuffer() {
2664 return writer_->GetNextWriteLocation(self_address().host(), peer_address());
2665}
2666
2667void QuicConnection::OnSerializedPacket(SerializedPacket* serialized_packet) {
2668 if (serialized_packet->encrypted_buffer == nullptr) {
2669 // We failed to serialize the packet, so close the connection.
2670 // TearDownLocalConnectionState does not send close packet, so no infinite
2671 // loop here.
2672 // TODO(ianswett): This is actually an internal error, not an
2673 // encryption failure.
2674 if (transport_version() > QUIC_VERSION_43) {
2675 QUIC_CODE_COUNT(
2676 quic_tear_down_local_connection_on_serialized_packet_ietf);
2677 } else {
2678 QUIC_CODE_COUNT(
2679 quic_tear_down_local_connection_on_serialized_packet_non_ietf);
2680 }
2681 TearDownLocalConnectionState(
2682 QUIC_ENCRYPTION_FAILURE,
2683 "Serialized packet does not have an encrypted buffer.",
2684 ConnectionCloseSource::FROM_SELF);
2685 return;
2686 }
2687
2688 if (serialized_packet->retransmittable_frames.empty() &&
2689 !serialized_packet->original_packet_number.IsInitialized()) {
2690 // Increment consecutive_num_packets_with_no_retransmittable_frames_ if
2691 // this packet is a new transmission with no retransmittable frames.
2692 ++consecutive_num_packets_with_no_retransmittable_frames_;
2693 } else {
2694 consecutive_num_packets_with_no_retransmittable_frames_ = 0;
2695 }
2696 SendOrQueuePacket(serialized_packet);
2697}
2698
2699void QuicConnection::OnUnrecoverableError(QuicErrorCode error,
vasilvvc48c8712019-03-11 13:38:16 -07002700 const std::string& error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05002701 ConnectionCloseSource source) {
2702 // The packet creator or generator encountered an unrecoverable error: tear
2703 // down local connection state immediately.
2704 if (transport_version() > QUIC_VERSION_43) {
2705 QUIC_CODE_COUNT(
2706 quic_tear_down_local_connection_on_unrecoverable_error_ietf);
2707 } else {
2708 QUIC_CODE_COUNT(
2709 quic_tear_down_local_connection_on_unrecoverable_error_non_ietf);
2710 }
2711 TearDownLocalConnectionState(error, error_details, source);
2712}
2713
2714void QuicConnection::OnCongestionChange() {
2715 visitor_->OnCongestionWindowChange(clock_->ApproximateNow());
2716
2717 // Uses the connection's smoothed RTT. If zero, uses initial_rtt.
2718 QuicTime::Delta rtt = sent_packet_manager_.GetRttStats()->smoothed_rtt();
2719 if (rtt.IsZero()) {
2720 rtt = sent_packet_manager_.GetRttStats()->initial_rtt();
2721 }
2722
2723 if (debug_visitor_ != nullptr) {
2724 debug_visitor_->OnRttChanged(rtt);
2725 }
2726}
2727
2728void QuicConnection::OnPathMtuIncreased(QuicPacketLength packet_size) {
2729 if (packet_size > max_packet_length()) {
2730 SetMaxPacketLength(packet_size);
2731 }
2732}
2733
2734void QuicConnection::OnHandshakeComplete() {
2735 sent_packet_manager_.SetHandshakeConfirmed();
2736 if (sent_packet_manager_.unacked_packets().use_uber_loss_algorithm()) {
2737 // This may have changed the retransmission timer, so re-arm it.
2738 SetRetransmissionAlarm();
2739 }
2740 // The client should immediately ack the SHLO to confirm the handshake is
2741 // complete with the server.
2742 if (perspective_ == Perspective::IS_CLIENT && !ack_queued_ &&
2743 ack_frame_updated()) {
2744 ack_alarm_->Update(clock_->ApproximateNow(), QuicTime::Delta::Zero());
2745 }
2746}
2747
2748void QuicConnection::SendOrQueuePacket(SerializedPacket* packet) {
2749 // The caller of this function is responsible for checking CanWrite().
2750 if (packet->encrypted_buffer == nullptr) {
2751 QUIC_BUG << "packet.encrypted_buffer == nullptr in to SendOrQueuePacket";
2752 return;
2753 }
2754 // If there are already queued packets, queue this one immediately to ensure
2755 // it's written in sequence number order.
2756 if (!queued_packets_.empty() || !WritePacket(packet)) {
2757 // Take ownership of the underlying encrypted packet.
2758 packet->encrypted_buffer = CopyBuffer(*packet);
2759 queued_packets_.push_back(*packet);
2760 packet->retransmittable_frames.clear();
2761 }
2762
2763 ClearSerializedPacket(packet);
2764}
2765
2766void QuicConnection::OnPingTimeout() {
2767 if (!retransmission_alarm_->IsSet()) {
zhongyifbb25772019-04-10 16:54:08 -07002768 bool enable_half_rtt_tail_loss_probe =
2769 sent_packet_manager_.enable_half_rtt_tail_loss_probe();
2770 if (enable_half_rtt_tail_loss_probe &&
2771 GetQuicReloadableFlag(quic_ignore_tlpr_if_sending_ping)) {
2772 sent_packet_manager_.set_enable_half_rtt_tail_loss_probe(false);
2773 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002774 visitor_->SendPing();
zhongyifbb25772019-04-10 16:54:08 -07002775 if (enable_half_rtt_tail_loss_probe &&
2776 GetQuicReloadableFlag(quic_ignore_tlpr_if_sending_ping)) {
2777 sent_packet_manager_.set_enable_half_rtt_tail_loss_probe(true);
2778 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002779 }
2780}
2781
2782void QuicConnection::SendAck() {
QUICHE teamcd098022019-03-22 18:49:55 -07002783 DCHECK(!SupportsMultiplePacketNumberSpaces());
QUICHE teama6ef0a62019-03-07 20:34:33 -05002784 if (!received_packet_manager_.decide_when_to_send_acks()) {
2785 // When received_packet_manager decides when to send ack, delaying
2786 // ResetAckStates until ACK is successfully flushed.
2787 ResetAckStates();
2788 }
2789
2790 if (packet_generator_.deprecate_ack_bundling_mode()) {
2791 QUIC_DVLOG(1) << ENDPOINT << "Sending an ACK proactively";
2792 QuicFrames frames;
2793 frames.push_back(GetUpdatedAckFrame());
2794 if (!no_stop_waiting_frames_) {
2795 QuicStopWaitingFrame stop_waiting;
2796 PopulateStopWaitingFrame(&stop_waiting);
2797 frames.push_back(QuicFrame(stop_waiting));
2798 }
2799 if (received_packet_manager_.decide_when_to_send_acks()) {
2800 if (!packet_generator_.FlushAckFrame(frames)) {
2801 return;
2802 }
2803 ResetAckStates();
2804 } else {
2805 send_ack_when_on_can_write_ = !packet_generator_.FlushAckFrame(frames);
2806 }
2807 } else {
2808 packet_generator_.SetShouldSendAck(!no_stop_waiting_frames_);
2809 }
2810 if (consecutive_num_packets_with_no_retransmittable_frames_ <
2811 max_consecutive_num_packets_with_no_retransmittable_frames_) {
2812 return;
2813 }
2814 consecutive_num_packets_with_no_retransmittable_frames_ = 0;
2815 if (packet_generator_.HasRetransmittableFrames() ||
2816 visitor_->WillingAndAbleToWrite()) {
2817 // There are pending retransmittable frames.
2818 return;
2819 }
2820
2821 visitor_->OnAckNeedsRetransmittableFrame();
2822}
2823
2824void QuicConnection::OnPathDegradingTimeout() {
2825 is_path_degrading_ = true;
2826 visitor_->OnPathDegrading();
2827}
2828
2829void QuicConnection::OnRetransmissionTimeout() {
2830 DCHECK(!sent_packet_manager_.unacked_packets().empty());
2831 if (close_connection_after_five_rtos_ &&
2832 sent_packet_manager_.GetConsecutiveRtoCount() >= 4) {
2833 // Close on the 5th consecutive RTO, so after 4 previous RTOs have occurred.
2834 CloseConnection(QUIC_TOO_MANY_RTOS, "5 consecutive retransmission timeouts",
2835 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2836 return;
2837 }
2838
2839 sent_packet_manager_.OnRetransmissionTimeout();
2840 WriteIfNotBlocked();
2841
2842 // A write failure can result in the connection being closed, don't attempt to
2843 // write further packets, or to set alarms.
2844 if (!connected_) {
2845 return;
2846 }
2847
2848 // In the TLP case, the SentPacketManager gives the connection the opportunity
2849 // to send new data before retransmitting.
2850 if (sent_packet_manager_.MaybeRetransmitTailLossProbe()) {
2851 // Send the pending retransmission now that it's been queued.
2852 WriteIfNotBlocked();
2853 }
2854
2855 // Ensure the retransmission alarm is always set if there are unacked packets
2856 // and nothing waiting to be sent.
2857 // This happens if the loss algorithm invokes a timer based loss, but the
2858 // packet doesn't need to be retransmitted.
2859 if (!HasQueuedData() && !retransmission_alarm_->IsSet()) {
2860 SetRetransmissionAlarm();
2861 }
2862}
2863
2864void QuicConnection::SetEncrypter(EncryptionLevel level,
2865 std::unique_ptr<QuicEncrypter> encrypter) {
2866 packet_generator_.SetEncrypter(level, std::move(encrypter));
2867}
2868
2869void QuicConnection::SetDiversificationNonce(
2870 const DiversificationNonce& nonce) {
2871 DCHECK_EQ(Perspective::IS_SERVER, perspective_);
2872 packet_generator_.SetDiversificationNonce(nonce);
2873}
2874
2875void QuicConnection::SetDefaultEncryptionLevel(EncryptionLevel level) {
2876 if (level != encryption_level_ && packet_generator_.HasQueuedFrames()) {
2877 // Flush all queued frames when encryption level changes.
2878 ScopedPacketFlusher flusher(this, NO_ACK);
2879 packet_generator_.FlushAllQueuedFrames();
2880 }
2881 encryption_level_ = level;
2882 packet_generator_.set_encryption_level(level);
2883}
2884
2885void QuicConnection::SetDecrypter(EncryptionLevel level,
2886 std::unique_ptr<QuicDecrypter> decrypter) {
2887 framer_.SetDecrypter(level, std::move(decrypter));
2888
2889 if (!undecryptable_packets_.empty() &&
2890 !process_undecryptable_packets_alarm_->IsSet()) {
2891 process_undecryptable_packets_alarm_->Set(clock_->ApproximateNow());
2892 }
2893}
2894
2895void QuicConnection::SetAlternativeDecrypter(
2896 EncryptionLevel level,
2897 std::unique_ptr<QuicDecrypter> decrypter,
2898 bool latch_once_used) {
2899 framer_.SetAlternativeDecrypter(level, std::move(decrypter), latch_once_used);
2900
2901 if (!undecryptable_packets_.empty() &&
2902 !process_undecryptable_packets_alarm_->IsSet()) {
2903 process_undecryptable_packets_alarm_->Set(clock_->ApproximateNow());
2904 }
2905}
2906
zhongyi546cc452019-04-12 15:27:49 -07002907void QuicConnection::InstallDecrypter(
2908 EncryptionLevel level,
2909 std::unique_ptr<QuicDecrypter> decrypter) {
2910 framer_.InstallDecrypter(level, std::move(decrypter));
2911 if (!undecryptable_packets_.empty() &&
2912 !process_undecryptable_packets_alarm_->IsSet()) {
2913 process_undecryptable_packets_alarm_->Set(clock_->ApproximateNow());
2914 }
2915}
2916
2917void QuicConnection::RemoveDecrypter(EncryptionLevel level) {
2918 framer_.RemoveDecrypter(level);
2919}
2920
QUICHE teama6ef0a62019-03-07 20:34:33 -05002921const QuicDecrypter* QuicConnection::decrypter() const {
2922 return framer_.decrypter();
2923}
2924
2925const QuicDecrypter* QuicConnection::alternative_decrypter() const {
2926 return framer_.alternative_decrypter();
2927}
2928
2929void QuicConnection::QueueUndecryptablePacket(
2930 const QuicEncryptedPacket& packet) {
2931 QUIC_DVLOG(1) << ENDPOINT << "Queueing undecryptable packet.";
2932 undecryptable_packets_.push_back(packet.Clone());
2933}
2934
2935void QuicConnection::MaybeProcessUndecryptablePackets() {
2936 process_undecryptable_packets_alarm_->Cancel();
2937
QUICHE team6987b4a2019-03-15 16:23:04 -07002938 if (undecryptable_packets_.empty() ||
2939 encryption_level_ == ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05002940 return;
2941 }
2942
2943 while (connected_ && !undecryptable_packets_.empty()) {
2944 // Making sure there is no pending frames when processing next undecrypted
2945 // packet because the queued ack frame may change.
2946 packet_generator_.FlushAllQueuedFrames();
2947 if (!connected_) {
2948 return;
2949 }
2950 QUIC_DVLOG(1) << ENDPOINT << "Attempting to process undecryptable packet";
2951 QuicEncryptedPacket* packet = undecryptable_packets_.front().get();
2952 if (!framer_.ProcessPacket(*packet) &&
2953 framer_.error() == QUIC_DECRYPTION_FAILURE) {
2954 QUIC_DVLOG(1) << ENDPOINT << "Unable to process undecryptable packet...";
2955 break;
2956 }
2957 QUIC_DVLOG(1) << ENDPOINT << "Processed undecryptable packet!";
2958 ++stats_.packets_processed;
2959 undecryptable_packets_.pop_front();
2960 }
2961
2962 // Once forward secure encryption is in use, there will be no
2963 // new keys installed and hence any undecryptable packets will
2964 // never be able to be decrypted.
2965 if (encryption_level_ == ENCRYPTION_FORWARD_SECURE) {
2966 if (debug_visitor_ != nullptr) {
2967 // TODO(rtenneti): perhaps more efficient to pass the number of
2968 // undecryptable packets as the argument to OnUndecryptablePacket so that
2969 // we just need to call OnUndecryptablePacket once?
2970 for (size_t i = 0; i < undecryptable_packets_.size(); ++i) {
2971 debug_visitor_->OnUndecryptablePacket();
2972 }
2973 }
2974 undecryptable_packets_.clear();
2975 }
2976}
2977
2978void QuicConnection::QueueCoalescedPacket(const QuicEncryptedPacket& packet) {
2979 QUIC_DVLOG(1) << ENDPOINT << "Queueing coalesced packet.";
2980 coalesced_packets_.push_back(packet.Clone());
2981}
2982
2983void QuicConnection::MaybeProcessCoalescedPackets() {
2984 bool processed = false;
2985 for (const auto& packet : coalesced_packets_) {
2986 if (!connected_) {
2987 return;
2988 }
2989
2990 // }
2991 // while (connected_ && !coalesced_packets_.empty()) {
2992 QUIC_DVLOG(1) << ENDPOINT << "Processing coalesced packet";
2993 // QuicEncryptedPacket* packet = coalesced_packets_.front().get();
2994 if (framer_.ProcessPacket(*packet)) {
2995 processed = true;
2996 } else {
2997 // If we are unable to decrypt this packet, it might be
2998 // because the CHLO or SHLO packet was lost.
2999 if (framer_.error() == QUIC_DECRYPTION_FAILURE) {
3000 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE &&
3001 undecryptable_packets_.size() < max_undecryptable_packets_) {
3002 QueueUndecryptablePacket(*packet);
3003 } else if (debug_visitor_ != nullptr) {
3004 debug_visitor_->OnUndecryptablePacket();
3005 }
3006 }
3007 }
3008 // coalesced_packets_.pop_front();
3009 }
3010 coalesced_packets_.clear();
3011 if (processed) {
3012 MaybeProcessUndecryptablePackets();
3013 }
3014}
3015
3016void QuicConnection::CloseConnection(
3017 QuicErrorCode error,
vasilvvc48c8712019-03-11 13:38:16 -07003018 const std::string& error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05003019 ConnectionCloseBehavior connection_close_behavior) {
3020 DCHECK(!error_details.empty());
3021 if (!connected_) {
3022 QUIC_DLOG(INFO) << "Connection is already closed.";
3023 return;
3024 }
3025
3026 QUIC_DLOG(INFO) << ENDPOINT << "Closing connection: " << connection_id()
3027 << ", with error: " << QuicErrorCodeToString(error) << " ("
3028 << error << "), and details: " << error_details;
3029
3030 if (connection_close_behavior ==
3031 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET) {
3032 SendConnectionClosePacket(error, error_details, SEND_ACK);
3033 } else if (connection_close_behavior ==
3034 ConnectionCloseBehavior::
3035 SEND_CONNECTION_CLOSE_PACKET_WITH_NO_ACK) {
3036 SendConnectionClosePacket(error, error_details, NO_ACK);
3037 }
3038
3039 ConnectionCloseSource source = ConnectionCloseSource::FROM_SELF;
3040 if (perspective_ == Perspective::IS_CLIENT &&
3041 error == QUIC_CRYPTO_HANDSHAKE_STATELESS_REJECT) {
3042 // Regard stateless rejected connection as closed by server.
3043 source = ConnectionCloseSource::FROM_PEER;
3044 }
3045 TearDownLocalConnectionState(error, error_details, source);
3046}
3047
3048void QuicConnection::SendConnectionClosePacket(QuicErrorCode error,
vasilvvc48c8712019-03-11 13:38:16 -07003049 const std::string& details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05003050 AckBundling ack_mode) {
3051 QUIC_DLOG(INFO) << ENDPOINT << "Sending connection close packet.";
3052 if (fix_termination_packets_) {
3053 QUIC_RELOADABLE_FLAG_COUNT(quic_fix_termination_packets);
3054 SetDefaultEncryptionLevel(GetConnectionCloseEncryptionLevel());
3055 }
3056 ClearQueuedPackets();
3057 ScopedPacketFlusher flusher(this, ack_mode);
QUICHE teamcd098022019-03-22 18:49:55 -07003058 // When multiple packet number spaces is supported, an ACK frame will be
3059 // bundled when connection is not write blocked.
3060 if (!SupportsMultiplePacketNumberSpaces() &&
3061 packet_generator_.deprecate_ack_bundling_mode() && ack_mode == SEND_ACK &&
QUICHE teama6ef0a62019-03-07 20:34:33 -05003062 !GetUpdatedAckFrame().ack_frame->packets.Empty()) {
3063 SendAck();
3064 }
fkastenholze9d71a82019-04-09 05:12:13 -07003065 QuicConnectionCloseFrame* frame =
3066 new QuicConnectionCloseFrame(error, details);
fkastenholz04bd4f32019-04-16 12:24:38 -07003067 // If version99/IETF QUIC set the close type. Default close type is Google
3068 // QUIC.
fkastenholz72f509b2019-04-10 09:17:49 -07003069 if (transport_version() == QUIC_VERSION_99) {
3070 frame->close_type = IETF_QUIC_TRANSPORT_CONNECTION_CLOSE;
3071 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003072 packet_generator_.AddControlFrame(QuicFrame(frame));
3073 packet_generator_.FlushAllQueuedFrames();
3074}
3075
3076void QuicConnection::TearDownLocalConnectionState(
3077 QuicErrorCode error,
vasilvvc48c8712019-03-11 13:38:16 -07003078 const std::string& error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05003079 ConnectionCloseSource source) {
3080 if (!connected_) {
3081 QUIC_DLOG(INFO) << "Connection is already closed.";
3082 return;
3083 }
3084
3085 // If we are using a batch writer, flush packets queued in it, if any.
3086 FlushPackets();
3087 connected_ = false;
3088 DCHECK(visitor_ != nullptr);
3089 visitor_->OnConnectionClosed(error, error_details, source);
3090 if (debug_visitor_ != nullptr) {
3091 debug_visitor_->OnConnectionClosed(error, error_details, source);
3092 }
3093 // Cancel the alarms so they don't trigger any action now that the
3094 // connection is closed.
3095 CancelAllAlarms();
3096}
3097
3098void QuicConnection::CancelAllAlarms() {
3099 QUIC_DVLOG(1) << "Cancelling all QuicConnection alarms.";
3100
3101 ack_alarm_->Cancel();
3102 ping_alarm_->Cancel();
3103 retransmission_alarm_->Cancel();
3104 send_alarm_->Cancel();
3105 timeout_alarm_->Cancel();
3106 mtu_discovery_alarm_->Cancel();
3107 path_degrading_alarm_->Cancel();
3108}
3109
3110QuicByteCount QuicConnection::max_packet_length() const {
3111 return packet_generator_.GetCurrentMaxPacketLength();
3112}
3113
3114void QuicConnection::SetMaxPacketLength(QuicByteCount length) {
3115 long_term_mtu_ = length;
3116 packet_generator_.SetMaxPacketLength(GetLimitedMaxPacketSize(length));
3117}
3118
3119bool QuicConnection::HasQueuedData() const {
3120 return pending_version_negotiation_packet_ || !queued_packets_.empty() ||
3121 packet_generator_.HasQueuedFrames();
3122}
3123
3124void QuicConnection::EnableSavingCryptoPackets() {
3125 save_crypto_packets_as_termination_packets_ = true;
3126}
3127
3128bool QuicConnection::CanWriteStreamData() {
3129 // Don't write stream data if there are negotiation or queued data packets
3130 // to send. Otherwise, continue and bundle as many frames as possible.
3131 if (pending_version_negotiation_packet_ || !queued_packets_.empty()) {
3132 return false;
3133 }
3134
3135 IsHandshake pending_handshake =
3136 visitor_->HasPendingHandshake() ? IS_HANDSHAKE : NOT_HANDSHAKE;
3137 // Sending queued packets may have caused the socket to become write blocked,
3138 // or the congestion manager to prohibit sending. If we've sent everything
3139 // we had queued and we're still not blocked, let the visitor know it can
3140 // write more.
3141 return ShouldGeneratePacket(HAS_RETRANSMITTABLE_DATA, pending_handshake);
3142}
3143
3144void QuicConnection::SetNetworkTimeouts(QuicTime::Delta handshake_timeout,
3145 QuicTime::Delta idle_timeout) {
3146 QUIC_BUG_IF(idle_timeout > handshake_timeout)
3147 << "idle_timeout:" << idle_timeout.ToMilliseconds()
3148 << " handshake_timeout:" << handshake_timeout.ToMilliseconds();
3149 // Adjust the idle timeout on client and server to prevent clients from
3150 // sending requests to servers which have already closed the connection.
3151 if (perspective_ == Perspective::IS_SERVER) {
3152 idle_timeout = idle_timeout + QuicTime::Delta::FromSeconds(3);
3153 } else if (idle_timeout > QuicTime::Delta::FromSeconds(1)) {
3154 idle_timeout = idle_timeout - QuicTime::Delta::FromSeconds(1);
3155 }
3156 handshake_timeout_ = handshake_timeout;
3157 idle_network_timeout_ = idle_timeout;
3158
3159 SetTimeoutAlarm();
3160}
3161
3162void QuicConnection::CheckForTimeout() {
3163 QuicTime now = clock_->ApproximateNow();
3164 QuicTime time_of_last_packet =
3165 std::max(time_of_last_received_packet_,
3166 time_of_first_packet_sent_after_receiving_);
3167
3168 // |delta| can be < 0 as |now| is approximate time but |time_of_last_packet|
3169 // is accurate time. However, this should not change the behavior of
3170 // timeout handling.
3171 QuicTime::Delta idle_duration = now - time_of_last_packet;
3172 QUIC_DVLOG(1) << ENDPOINT << "last packet "
3173 << time_of_last_packet.ToDebuggingValue()
3174 << " now:" << now.ToDebuggingValue()
3175 << " idle_duration:" << idle_duration.ToMicroseconds()
3176 << " idle_network_timeout: "
3177 << idle_network_timeout_.ToMicroseconds();
3178 if (idle_duration >= idle_network_timeout_) {
vasilvvc48c8712019-03-11 13:38:16 -07003179 const std::string error_details = "No recent network activity.";
QUICHE teama6ef0a62019-03-07 20:34:33 -05003180 QUIC_DVLOG(1) << ENDPOINT << error_details;
3181 if ((sent_packet_manager_.GetConsecutiveTlpCount() > 0 ||
3182 sent_packet_manager_.GetConsecutiveRtoCount() > 0 ||
3183 visitor_->ShouldKeepConnectionAlive())) {
3184 CloseConnection(QUIC_NETWORK_IDLE_TIMEOUT, error_details,
3185 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
3186 } else {
3187 CloseConnection(QUIC_NETWORK_IDLE_TIMEOUT, error_details,
3188 idle_timeout_connection_close_behavior_);
3189 }
3190 return;
3191 }
3192
3193 if (!handshake_timeout_.IsInfinite()) {
3194 QuicTime::Delta connected_duration = now - stats_.connection_creation_time;
3195 QUIC_DVLOG(1) << ENDPOINT
3196 << "connection time: " << connected_duration.ToMicroseconds()
3197 << " handshake timeout: "
3198 << handshake_timeout_.ToMicroseconds();
3199 if (connected_duration >= handshake_timeout_) {
vasilvvc48c8712019-03-11 13:38:16 -07003200 const std::string error_details = "Handshake timeout expired.";
QUICHE teama6ef0a62019-03-07 20:34:33 -05003201 QUIC_DVLOG(1) << ENDPOINT << error_details;
3202 CloseConnection(QUIC_HANDSHAKE_TIMEOUT, error_details,
3203 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
3204 return;
3205 }
3206 }
3207
3208 SetTimeoutAlarm();
3209}
3210
3211void QuicConnection::SetTimeoutAlarm() {
3212 QuicTime time_of_last_packet =
3213 std::max(time_of_last_received_packet_,
3214 time_of_first_packet_sent_after_receiving_);
3215
3216 QuicTime deadline = time_of_last_packet + idle_network_timeout_;
3217 if (!handshake_timeout_.IsInfinite()) {
3218 deadline = std::min(deadline,
3219 stats_.connection_creation_time + handshake_timeout_);
3220 }
3221
3222 timeout_alarm_->Update(deadline, QuicTime::Delta::Zero());
3223}
3224
3225void QuicConnection::SetPingAlarm() {
3226 if (perspective_ == Perspective::IS_SERVER) {
3227 // Only clients send pings.
3228 return;
3229 }
3230 if (!visitor_->ShouldKeepConnectionAlive()) {
3231 ping_alarm_->Cancel();
3232 // Don't send a ping unless there are open streams.
3233 return;
3234 }
3235 if (retransmittable_on_wire_timeout_.IsInfinite() ||
3236 sent_packet_manager_.HasInFlightPackets()) {
3237 // Extend the ping alarm.
3238 ping_alarm_->Update(clock_->ApproximateNow() + ping_timeout_,
3239 QuicTime::Delta::FromSeconds(1));
3240 return;
3241 }
3242 DCHECK_LT(retransmittable_on_wire_timeout_, ping_timeout_);
3243 // If it's already set to an earlier time, then don't update it.
3244 if (ping_alarm_->IsSet() &&
3245 ping_alarm_->deadline() <
3246 clock_->ApproximateNow() + retransmittable_on_wire_timeout_) {
3247 return;
3248 }
3249 // Use a shorter timeout if there are open streams, but nothing on the wire.
3250 ping_alarm_->Update(
3251 clock_->ApproximateNow() + retransmittable_on_wire_timeout_,
3252 QuicTime::Delta::FromMilliseconds(1));
3253}
3254
3255void QuicConnection::SetRetransmissionAlarm() {
3256 if (packet_generator_.PacketFlusherAttached()) {
3257 pending_retransmission_alarm_ = true;
3258 return;
3259 }
3260 QuicTime retransmission_time = sent_packet_manager_.GetRetransmissionTime();
3261 retransmission_alarm_->Update(retransmission_time,
3262 QuicTime::Delta::FromMilliseconds(1));
3263}
3264
3265void QuicConnection::SetPathDegradingAlarm() {
3266 if (perspective_ == Perspective::IS_SERVER) {
3267 return;
3268 }
3269 const QuicTime::Delta delay = sent_packet_manager_.GetPathDegradingDelay();
3270 path_degrading_alarm_->Update(clock_->ApproximateNow() + delay,
3271 QuicTime::Delta::FromMilliseconds(1));
3272}
3273
3274void QuicConnection::MaybeSetMtuAlarm(QuicPacketNumber sent_packet_number) {
3275 // Do not set the alarm if the target size is less than the current size.
3276 // This covers the case when |mtu_discovery_target_| is at its default value,
3277 // zero.
3278 if (mtu_discovery_target_ <= max_packet_length()) {
3279 return;
3280 }
3281
3282 if (mtu_probe_count_ >= kMtuDiscoveryAttempts) {
3283 return;
3284 }
3285
3286 if (mtu_discovery_alarm_->IsSet()) {
3287 return;
3288 }
3289
3290 if (sent_packet_number >= next_mtu_probe_at_) {
3291 // Use an alarm to send the MTU probe to ensure that no ScopedPacketFlushers
3292 // are active.
3293 mtu_discovery_alarm_->Set(clock_->ApproximateNow());
3294 }
3295}
3296
3297void QuicConnection::MaybeSetAckAlarmTo(QuicTime time) {
3298 DCHECK(packet_generator_.deprecate_ack_bundling_mode());
3299 if (!ack_alarm_->IsSet() || ack_alarm_->deadline() > time) {
3300 ack_alarm_->Update(time, QuicTime::Delta::Zero());
3301 }
3302}
3303
3304QuicConnection::ScopedPacketFlusher::ScopedPacketFlusher(
3305 QuicConnection* connection,
3306 AckBundling ack_mode)
3307 : connection_(connection),
3308 flush_and_set_pending_retransmission_alarm_on_delete_(false) {
3309 if (connection_ == nullptr) {
3310 return;
3311 }
3312
3313 if (!connection_->packet_generator_.PacketFlusherAttached()) {
3314 flush_and_set_pending_retransmission_alarm_on_delete_ = true;
3315 connection->packet_generator_.AttachPacketFlusher();
3316 }
3317 if (connection_->packet_generator_.deprecate_ack_bundling_mode()) {
3318 return;
3319 }
3320
3321 // If caller wants us to include an ack, check the delayed-ack timer to see if
3322 // there's ack info to be sent.
3323 if (ShouldSendAck(ack_mode)) {
3324 if (!connection_->GetUpdatedAckFrame().ack_frame->packets.Empty()) {
3325 QUIC_DVLOG(1) << "Bundling ack with outgoing packet.";
3326 connection_->SendAck();
3327 }
3328 }
3329}
3330
3331bool QuicConnection::ScopedPacketFlusher::ShouldSendAck(
3332 AckBundling ack_mode) const {
3333 DCHECK(!connection_->packet_generator_.deprecate_ack_bundling_mode());
3334 // If the ack alarm is set, make sure the ack has been updated.
3335 DCHECK(!connection_->ack_alarm_->IsSet() || connection_->ack_frame_updated())
3336 << "ack_mode:" << ack_mode;
3337 switch (ack_mode) {
3338 case SEND_ACK:
3339 return true;
3340 case SEND_ACK_IF_QUEUED:
3341 return connection_->ack_queued();
3342 case SEND_ACK_IF_PENDING:
3343 return connection_->ack_alarm_->IsSet() ||
3344 connection_->stop_waiting_count_ > 1;
3345 case NO_ACK:
3346 return false;
3347 default:
3348 QUIC_BUG << "Unsupported ack_mode.";
3349 return true;
3350 }
3351}
3352
3353QuicConnection::ScopedPacketFlusher::~ScopedPacketFlusher() {
3354 if (connection_ == nullptr) {
3355 return;
3356 }
3357
3358 if (flush_and_set_pending_retransmission_alarm_on_delete_) {
3359 if (connection_->packet_generator_.deprecate_ack_bundling_mode()) {
3360 if (connection_->received_packet_manager_.decide_when_to_send_acks()) {
3361 const QuicTime ack_timeout =
QUICHE teamb23daa72019-03-21 08:37:48 -07003362 connection_->use_uber_received_packet_manager_
QUICHE teamcd098022019-03-22 18:49:55 -07003363 ? connection_->uber_received_packet_manager_
3364 .GetEarliestAckTimeout()
QUICHE teamb23daa72019-03-21 08:37:48 -07003365 : connection_->received_packet_manager_.ack_timeout();
QUICHE teama6ef0a62019-03-07 20:34:33 -05003366 if (ack_timeout.IsInitialized()) {
3367 if (ack_timeout <= connection_->clock_->ApproximateNow() &&
3368 !connection_->CanWrite(NO_RETRANSMITTABLE_DATA)) {
3369 // Cancel ACK alarm if connection is write blocked, and ACK will be
3370 // sent when connection gets unblocked.
3371 connection_->ack_alarm_->Cancel();
3372 } else {
3373 connection_->MaybeSetAckAlarmTo(ack_timeout);
3374 }
3375 }
3376 }
3377 if (connection_->ack_alarm_->IsSet() &&
3378 connection_->ack_alarm_->deadline() <=
3379 connection_->clock_->ApproximateNow()) {
3380 // An ACK needs to be sent right now. This ACK did not get bundled
3381 // because either there was no data to write or packets were marked as
3382 // received after frames were queued in the generator.
3383 if (connection_->send_alarm_->IsSet() &&
3384 connection_->send_alarm_->deadline() <=
3385 connection_->clock_->ApproximateNow()) {
3386 // If send alarm will go off soon, let send alarm send the ACK.
3387 connection_->ack_alarm_->Cancel();
3388 if (!connection_->received_packet_manager_
3389 .decide_when_to_send_acks()) {
3390 connection_->send_ack_when_on_can_write_ = true;
3391 }
QUICHE teamcd098022019-03-22 18:49:55 -07003392 } else if (connection_->SupportsMultiplePacketNumberSpaces()) {
3393 connection_->SendAllPendingAcks();
QUICHE teama6ef0a62019-03-07 20:34:33 -05003394 } else {
3395 connection_->SendAck();
3396 }
3397 }
3398 }
3399 connection_->packet_generator_.Flush();
3400 connection_->FlushPackets();
3401 if (connection_->session_decides_what_to_write()) {
3402 // Reset transmission type.
3403 connection_->SetTransmissionType(NOT_RETRANSMISSION);
3404 }
3405
3406 // Once all transmissions are done, check if there is any outstanding data
3407 // to send and notify the congestion controller if not.
3408 //
3409 // Note that this means that the application limited check will happen as
3410 // soon as the last flusher gets destroyed, which is typically after a
3411 // single stream write is finished. This means that if all the data from a
3412 // single write goes through the connection, the application-limited signal
3413 // will fire even if the caller does a write operation immediately after.
3414 // There are two important approaches to remedy this situation:
3415 // (1) Instantiate ScopedPacketFlusher before performing multiple subsequent
3416 // writes, thus deferring this check until all writes are done.
3417 // (2) Write data in chunks sufficiently large so that they cause the
3418 // connection to be limited by the congestion control. Typically, this
3419 // would mean writing chunks larger than the product of the current
3420 // pacing rate and the pacer granularity. So, for instance, if the
3421 // pacing rate of the connection is 1 Gbps, and the pacer granularity is
3422 // 1 ms, the caller should send at least 125k bytes in order to not
3423 // be marked as application-limited.
3424 connection_->CheckIfApplicationLimited();
3425
3426 if (connection_->pending_retransmission_alarm_) {
3427 connection_->SetRetransmissionAlarm();
3428 connection_->pending_retransmission_alarm_ = false;
3429 }
3430 }
3431 DCHECK_EQ(flush_and_set_pending_retransmission_alarm_on_delete_,
3432 !connection_->packet_generator_.PacketFlusherAttached());
3433}
3434
3435HasRetransmittableData QuicConnection::IsRetransmittable(
3436 const SerializedPacket& packet) {
3437 // Retransmitted packets retransmittable frames are owned by the unacked
3438 // packet map, but are not present in the serialized packet.
3439 if (packet.transmission_type != NOT_RETRANSMISSION ||
3440 !packet.retransmittable_frames.empty()) {
3441 return HAS_RETRANSMITTABLE_DATA;
3442 } else {
3443 return NO_RETRANSMITTABLE_DATA;
3444 }
3445}
3446
3447bool QuicConnection::IsTerminationPacket(const SerializedPacket& packet) {
3448 if (packet.retransmittable_frames.empty()) {
3449 return false;
3450 }
3451 for (const QuicFrame& frame : packet.retransmittable_frames) {
3452 if (frame.type == CONNECTION_CLOSE_FRAME) {
3453 return true;
3454 }
3455 if (save_crypto_packets_as_termination_packets_ &&
3456 QuicUtils::IsHandshakeFrame(frame, transport_version())) {
3457 return true;
3458 }
3459 }
3460 return false;
3461}
3462
3463void QuicConnection::SetMtuDiscoveryTarget(QuicByteCount target) {
3464 mtu_discovery_target_ = GetLimitedMaxPacketSize(target);
3465}
3466
3467QuicByteCount QuicConnection::GetLimitedMaxPacketSize(
3468 QuicByteCount suggested_max_packet_size) {
3469 if (!peer_address_.IsInitialized()) {
3470 QUIC_BUG << "Attempted to use a connection without a valid peer address";
3471 return suggested_max_packet_size;
3472 }
3473
3474 const QuicByteCount writer_limit = writer_->GetMaxPacketSize(peer_address());
3475
3476 QuicByteCount max_packet_size = suggested_max_packet_size;
3477 if (max_packet_size > writer_limit) {
3478 max_packet_size = writer_limit;
3479 }
dschinazi66dea072019-04-09 11:41:06 -07003480 if (max_packet_size > kMaxOutgoingPacketSize) {
3481 max_packet_size = kMaxOutgoingPacketSize;
QUICHE teama6ef0a62019-03-07 20:34:33 -05003482 }
3483 return max_packet_size;
3484}
3485
3486void QuicConnection::SendMtuDiscoveryPacket(QuicByteCount target_mtu) {
3487 // Currently, this limit is ensured by the caller.
3488 DCHECK_EQ(target_mtu, GetLimitedMaxPacketSize(target_mtu));
3489
3490 // Send the probe.
3491 packet_generator_.GenerateMtuDiscoveryPacket(target_mtu);
3492}
3493
3494// TODO(zhongyi): change this method to generate a connectivity probing packet
3495// and let the caller to call writer to write the packet and handle write
3496// status.
3497bool QuicConnection::SendConnectivityProbingPacket(
3498 QuicPacketWriter* probing_writer,
3499 const QuicSocketAddress& peer_address) {
3500 return SendGenericPathProbePacket(probing_writer, peer_address,
3501 /* is_response= */ false);
3502}
3503
3504void QuicConnection::SendConnectivityProbingResponsePacket(
3505 const QuicSocketAddress& peer_address) {
3506 SendGenericPathProbePacket(nullptr, peer_address,
3507 /* is_response= */ true);
3508}
3509
3510bool QuicConnection::SendGenericPathProbePacket(
3511 QuicPacketWriter* probing_writer,
3512 const QuicSocketAddress& peer_address,
3513 bool is_response) {
3514 DCHECK(peer_address.IsInitialized());
3515 if (!connected_) {
3516 QUIC_BUG << "Not sending connectivity probing packet as connection is "
3517 << "disconnected.";
3518 return false;
3519 }
3520 if (perspective_ == Perspective::IS_SERVER && probing_writer == nullptr) {
3521 // Server can use default packet writer to write packet.
3522 probing_writer = writer_;
3523 }
3524 DCHECK(probing_writer);
3525
3526 if (probing_writer->IsWriteBlocked()) {
3527 QUIC_DLOG(INFO)
3528 << ENDPOINT
3529 << "Writer blocked when sending connectivity probing packet.";
3530 if (probing_writer == writer_) {
3531 // Visitor should not be write blocked if the probing writer is not the
3532 // default packet writer.
3533 visitor_->OnWriteBlocked();
3534 }
3535 return true;
3536 }
3537
3538 QUIC_DLOG(INFO) << ENDPOINT
3539 << "Sending path probe packet for connection_id = "
3540 << connection_id_;
3541
3542 OwningSerializedPacketPointer probing_packet;
3543 if (transport_version() != QUIC_VERSION_99) {
3544 // Non-IETF QUIC, generate a padded ping regardless of whether this is a
3545 // request or a response.
3546 probing_packet = packet_generator_.SerializeConnectivityProbingPacket();
3547 } else {
3548 if (is_response) {
3549 // Respond using IETF QUIC PATH_RESPONSE frame
3550 if (IsCurrentPacketConnectivityProbing()) {
3551 // Pad the response if the request was a google connectivity probe
3552 // (padded).
3553 probing_packet =
3554 packet_generator_.SerializePathResponseConnectivityProbingPacket(
3555 received_path_challenge_payloads_, /* is_padded = */ true);
3556 received_path_challenge_payloads_.clear();
3557 } else {
3558 // Do not pad the response if the path challenge was not a google
3559 // connectivity probe.
3560 probing_packet =
3561 packet_generator_.SerializePathResponseConnectivityProbingPacket(
3562 received_path_challenge_payloads_,
3563 /* is_padded = */ false);
3564 received_path_challenge_payloads_.clear();
3565 }
3566 } else {
3567 // Request using IETF QUIC PATH_CHALLENGE frame
3568 transmitted_connectivity_probe_payload_ =
3569 QuicMakeUnique<QuicPathFrameBuffer>();
3570 probing_packet =
3571 packet_generator_.SerializePathChallengeConnectivityProbingPacket(
3572 transmitted_connectivity_probe_payload_.get());
3573 if (!probing_packet) {
3574 transmitted_connectivity_probe_payload_ = nullptr;
3575 }
3576 }
3577 }
3578
3579 DCHECK_EQ(IsRetransmittable(*probing_packet), NO_RETRANSMITTABLE_DATA);
3580
3581 const QuicTime packet_send_time = clock_->Now();
3582 WriteResult result = probing_writer->WritePacket(
3583 probing_packet->encrypted_buffer, probing_packet->encrypted_length,
3584 self_address().host(), peer_address, per_packet_options_);
3585
3586 // If using a batch writer and the probing packet is buffered, flush it.
3587 if (probing_writer->IsBatchMode() && result.status == WRITE_STATUS_OK &&
3588 result.bytes_written == 0) {
3589 result = probing_writer->Flush();
3590 }
3591
3592 if (IsWriteError(result.status)) {
3593 // Write error for any connectivity probe should not affect the connection
3594 // as it is sent on a different path.
3595 QUIC_DLOG(INFO) << ENDPOINT << "Write probing packet failed with error = "
3596 << result.error_code;
3597 return false;
3598 }
3599
3600 if (debug_visitor_ != nullptr) {
3601 debug_visitor_->OnPacketSent(
3602 *probing_packet, probing_packet->original_packet_number,
3603 probing_packet->transmission_type, packet_send_time);
3604 }
3605
3606 // Call OnPacketSent regardless of the write result.
3607 sent_packet_manager_.OnPacketSent(
3608 probing_packet.get(), probing_packet->original_packet_number,
3609 packet_send_time, probing_packet->transmission_type,
3610 NO_RETRANSMITTABLE_DATA);
3611
3612 if (IsWriteBlockedStatus(result.status)) {
3613 if (probing_writer == writer_) {
3614 // Visitor should not be write blocked if the probing writer is not the
3615 // default packet writer.
3616 visitor_->OnWriteBlocked();
3617 }
3618 if (result.status == WRITE_STATUS_BLOCKED_DATA_BUFFERED) {
3619 QUIC_DLOG(INFO) << ENDPOINT << "Write probing packet blocked";
3620 }
3621 }
3622
3623 return true;
3624}
3625
3626void QuicConnection::DiscoverMtu() {
3627 DCHECK(!mtu_discovery_alarm_->IsSet());
3628
3629 // Check if the MTU has been already increased.
3630 if (mtu_discovery_target_ <= max_packet_length()) {
3631 return;
3632 }
3633
3634 // Calculate the packet number of the next probe *before* sending the current
3635 // one. Otherwise, when SendMtuDiscoveryPacket() is called,
3636 // MaybeSetMtuAlarm() will not realize that the probe has been just sent, and
3637 // will reschedule this probe again.
3638 packets_between_mtu_probes_ *= 2;
3639 next_mtu_probe_at_ = sent_packet_manager_.GetLargestSentPacket() +
3640 packets_between_mtu_probes_ + 1;
3641 ++mtu_probe_count_;
3642
3643 QUIC_DVLOG(2) << "Sending a path MTU discovery packet #" << mtu_probe_count_;
3644 SendMtuDiscoveryPacket(mtu_discovery_target_);
3645
3646 DCHECK(!mtu_discovery_alarm_->IsSet());
3647}
3648
3649void QuicConnection::OnEffectivePeerMigrationValidated() {
3650 if (active_effective_peer_migration_type_ == NO_CHANGE) {
3651 QUIC_BUG << "No migration underway.";
3652 return;
3653 }
3654 highest_packet_sent_before_effective_peer_migration_.Clear();
3655 active_effective_peer_migration_type_ = NO_CHANGE;
3656}
3657
3658void QuicConnection::StartEffectivePeerMigration(AddressChangeType type) {
3659 // TODO(fayang): Currently, all peer address change type are allowed. Need to
3660 // add a method ShouldAllowPeerAddressChange(PeerAddressChangeType type) to
3661 // determine whether |type| is allowed.
3662 if (type == NO_CHANGE) {
3663 QUIC_BUG << "EffectivePeerMigration started without address change.";
3664 return;
3665 }
3666 QUIC_DLOG(INFO) << ENDPOINT << "Effective peer's ip:port changed from "
3667 << effective_peer_address_.ToString() << " to "
3668 << GetEffectivePeerAddressFromCurrentPacket().ToString()
3669 << ", address change type is " << type
3670 << ", migrating connection.";
3671
3672 highest_packet_sent_before_effective_peer_migration_ =
3673 sent_packet_manager_.GetLargestSentPacket();
3674 effective_peer_address_ = GetEffectivePeerAddressFromCurrentPacket();
3675 active_effective_peer_migration_type_ = type;
3676
3677 // TODO(wub): Move these calls to OnEffectivePeerMigrationValidated.
3678 OnConnectionMigration(type);
3679}
3680
3681void QuicConnection::OnConnectionMigration(AddressChangeType addr_change_type) {
3682 visitor_->OnConnectionMigration(addr_change_type);
3683 sent_packet_manager_.OnConnectionMigration(addr_change_type);
3684}
3685
3686bool QuicConnection::IsCurrentPacketConnectivityProbing() const {
3687 return is_current_packet_connectivity_probing_;
3688}
3689
3690bool QuicConnection::ack_frame_updated() const {
QUICHE teamb23daa72019-03-21 08:37:48 -07003691 if (use_uber_received_packet_manager_) {
QUICHE team1dfa46b2019-03-22 10:39:10 -07003692 return uber_received_packet_manager_.IsAckFrameUpdated();
QUICHE teamb23daa72019-03-21 08:37:48 -07003693 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003694 return received_packet_manager_.ack_frame_updated();
3695}
3696
3697QuicStringPiece QuicConnection::GetCurrentPacket() {
3698 if (current_packet_data_ == nullptr) {
3699 return QuicStringPiece();
3700 }
3701 return QuicStringPiece(current_packet_data_, last_size_);
3702}
3703
3704bool QuicConnection::MaybeConsiderAsMemoryCorruption(
3705 const QuicStreamFrame& frame) {
3706 if (frame.stream_id == QuicUtils::GetCryptoStreamId(transport_version()) ||
QUICHE team6987b4a2019-03-15 16:23:04 -07003707 last_decrypted_packet_level_ != ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05003708 return false;
3709 }
3710
3711 if (perspective_ == Perspective::IS_SERVER &&
3712 frame.data_length >= sizeof(kCHLO) &&
3713 strncmp(frame.data_buffer, reinterpret_cast<const char*>(&kCHLO),
3714 sizeof(kCHLO)) == 0) {
3715 return true;
3716 }
3717
3718 if (perspective_ == Perspective::IS_CLIENT &&
3719 frame.data_length >= sizeof(kREJ) &&
3720 strncmp(frame.data_buffer, reinterpret_cast<const char*>(&kREJ),
3721 sizeof(kREJ)) == 0) {
3722 return true;
3723 }
3724
3725 return false;
3726}
3727
3728void QuicConnection::MaybeSendProbingRetransmissions() {
3729 DCHECK(fill_up_link_during_probing_);
3730
3731 // Don't send probing retransmissions until the handshake has completed.
3732 if (!sent_packet_manager_.handshake_confirmed() ||
3733 sent_packet_manager().HasUnackedCryptoPackets()) {
3734 return;
3735 }
3736
3737 if (probing_retransmission_pending_) {
3738 QUIC_BUG << "MaybeSendProbingRetransmissions is called while another call "
3739 "to it is already in progress";
3740 return;
3741 }
3742
3743 probing_retransmission_pending_ = true;
3744 SendProbingRetransmissions();
3745 probing_retransmission_pending_ = false;
3746}
3747
3748void QuicConnection::CheckIfApplicationLimited() {
3749 if (session_decides_what_to_write() && probing_retransmission_pending_) {
3750 return;
3751 }
3752
3753 bool application_limited =
3754 queued_packets_.empty() &&
3755 !sent_packet_manager_.HasPendingRetransmissions() &&
3756 !visitor_->WillingAndAbleToWrite();
3757
3758 if (!application_limited) {
3759 return;
3760 }
3761
3762 if (fill_up_link_during_probing_) {
3763 MaybeSendProbingRetransmissions();
3764 if (!CanWrite(HAS_RETRANSMITTABLE_DATA)) {
3765 return;
3766 }
3767 }
3768
3769 sent_packet_manager_.OnApplicationLimited();
3770}
3771
3772void QuicConnection::UpdatePacketContent(PacketContent type) {
3773 if (current_packet_content_ == NOT_PADDED_PING) {
3774 // We have already learned the current packet is not a connectivity
3775 // probing packet. Peer migration should have already been started earlier
3776 // if needed.
3777 return;
3778 }
3779
3780 if (type == NO_FRAMES_RECEIVED) {
3781 return;
3782 }
3783
3784 if (type == FIRST_FRAME_IS_PING) {
3785 if (current_packet_content_ == NO_FRAMES_RECEIVED) {
3786 current_packet_content_ = FIRST_FRAME_IS_PING;
3787 return;
3788 }
3789 }
3790
3791 // In Google QUIC we look for a packet with just a PING and PADDING.
3792 // For IETF QUIC, the packet must consist of just a PATH_CHALLENGE frame,
3793 // followed by PADDING. If the condition is met, mark things as
3794 // connectivity-probing, causing later processing to generate the correct
3795 // response.
3796 if (type == SECOND_FRAME_IS_PADDING &&
3797 current_packet_content_ == FIRST_FRAME_IS_PING) {
3798 current_packet_content_ = SECOND_FRAME_IS_PADDING;
3799 if (perspective_ == Perspective::IS_SERVER) {
3800 is_current_packet_connectivity_probing_ =
3801 current_effective_peer_migration_type_ != NO_CHANGE;
3802 } else {
3803 is_current_packet_connectivity_probing_ =
3804 (last_packet_source_address_ != peer_address_) ||
3805 (last_packet_destination_address_ != self_address_);
3806 }
3807 return;
3808 }
3809
3810 current_packet_content_ = NOT_PADDED_PING;
QUICHE team1f3de242019-03-20 07:24:48 -07003811 if (GetLargestReceivedPacket().IsInitialized() &&
3812 last_header_.packet_number == GetLargestReceivedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05003813 direct_peer_address_ = last_packet_source_address_;
3814 if (current_effective_peer_migration_type_ != NO_CHANGE) {
3815 // Start effective peer migration immediately when the current packet is
3816 // confirmed not a connectivity probing packet.
QUICHE team1f3de242019-03-20 07:24:48 -07003817 // TODO(fayang): When multiple packet number spaces is supported, only
3818 // start peer migration for the application data.
QUICHE teama6ef0a62019-03-07 20:34:33 -05003819 StartEffectivePeerMigration(current_effective_peer_migration_type_);
3820 }
3821 }
3822 current_effective_peer_migration_type_ = NO_CHANGE;
3823}
3824
3825void QuicConnection::MaybeEnableSessionDecidesWhatToWrite() {
3826 // Only enable session decides what to write code path for version 42+,
3827 // because it needs the receiver to allow receiving overlapping stream data.
3828 const bool enable_session_decides_what_to_write =
3829 transport_version() > QUIC_VERSION_39;
3830 sent_packet_manager_.SetSessionDecideWhatToWrite(
3831 enable_session_decides_what_to_write);
3832 packet_generator_.SetCanSetTransmissionType(
3833 enable_session_decides_what_to_write);
3834}
3835
3836void QuicConnection::PostProcessAfterAckFrame(bool send_stop_waiting,
3837 bool acked_new_packet) {
3838 if (no_stop_waiting_frames_) {
QUICHE teamb23daa72019-03-21 08:37:48 -07003839 if (use_uber_received_packet_manager_) {
3840 uber_received_packet_manager_.DontWaitForPacketsBefore(
QUICHE team1dfa46b2019-03-22 10:39:10 -07003841 last_decrypted_packet_level_,
QUICHE teamb23daa72019-03-21 08:37:48 -07003842 sent_packet_manager_.largest_packet_peer_knows_is_acked());
3843 } else {
3844 received_packet_manager_.DontWaitForPacketsBefore(
3845 sent_packet_manager_.largest_packet_peer_knows_is_acked());
3846 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003847 }
3848 // Always reset the retransmission alarm when an ack comes in, since we now
3849 // have a better estimate of the current rtt than when it was set.
3850 SetRetransmissionAlarm();
3851 MaybeSetPathDegradingAlarm(acked_new_packet);
3852
3853 // TODO(ianswett): Only increment stop_waiting_count_ if StopWaiting frames
3854 // are sent.
3855 if (send_stop_waiting) {
3856 ++stop_waiting_count_;
3857 } else {
3858 stop_waiting_count_ = 0;
3859 }
3860}
3861
3862void QuicConnection::MaybeSetPathDegradingAlarm(bool acked_new_packet) {
3863 if (!sent_packet_manager_.HasInFlightPackets()) {
3864 // There are no retransmittable packets on the wire, so it's impossible to
3865 // say if the connection has degraded.
3866 path_degrading_alarm_->Cancel();
3867 } else if (acked_new_packet) {
3868 // A previously-unacked packet has been acked, which means forward progress
3869 // has been made. Unset |is_path_degrading| if the path was considered as
3870 // degrading previously. Set/update the path degrading alarm.
3871 is_path_degrading_ = false;
3872 SetPathDegradingAlarm();
3873 }
3874}
3875
3876void QuicConnection::SetSessionNotifier(
3877 SessionNotifierInterface* session_notifier) {
3878 sent_packet_manager_.SetSessionNotifier(session_notifier);
3879}
3880
3881void QuicConnection::SetDataProducer(
3882 QuicStreamFrameDataProducer* data_producer) {
3883 framer_.set_data_producer(data_producer);
3884}
3885
3886void QuicConnection::SetTransmissionType(TransmissionType type) {
3887 packet_generator_.SetTransmissionType(type);
3888}
3889
3890bool QuicConnection::session_decides_what_to_write() const {
3891 return sent_packet_manager_.session_decides_what_to_write();
3892}
3893
3894void QuicConnection::UpdateReleaseTimeIntoFuture() {
3895 DCHECK(supports_release_time_);
3896
3897 release_time_into_future_ = std::max(
3898 QuicTime::Delta::FromMilliseconds(kMinReleaseTimeIntoFutureMs),
3899 std::min(
3900 QuicTime::Delta::FromMilliseconds(
3901 GetQuicFlag(FLAGS_quic_max_pace_time_into_future_ms)),
3902 sent_packet_manager_.GetRttStats()->SmoothedOrInitialRtt() *
3903 GetQuicFlag(FLAGS_quic_pace_time_into_future_srtt_fraction)));
3904}
3905
3906void QuicConnection::ResetAckStates() {
3907 ack_alarm_->Cancel();
3908 ack_queued_ = false;
3909 stop_waiting_count_ = 0;
3910 num_retransmittable_packets_received_since_last_ack_sent_ = 0;
3911 num_packets_received_since_last_ack_sent_ = 0;
3912 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07003913 if (use_uber_received_packet_manager_) {
QUICHE team1dfa46b2019-03-22 10:39:10 -07003914 uber_received_packet_manager_.ResetAckStates(encryption_level_);
QUICHE teamb23daa72019-03-21 08:37:48 -07003915 } else {
3916 received_packet_manager_.ResetAckStates();
3917 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003918 }
3919}
3920
3921MessageStatus QuicConnection::SendMessage(QuicMessageId message_id,
3922 QuicMemSliceSpan message) {
3923 if (transport_version() <= QUIC_VERSION_44) {
3924 QUIC_BUG << "MESSAGE frame is not supported for version "
3925 << transport_version();
3926 return MESSAGE_STATUS_UNSUPPORTED;
3927 }
ianswettb239f862019-04-05 09:15:06 -07003928 if (message.total_length() > GetCurrentLargestMessagePayload()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05003929 return MESSAGE_STATUS_TOO_LARGE;
3930 }
3931 if (!CanWrite(HAS_RETRANSMITTABLE_DATA)) {
3932 return MESSAGE_STATUS_BLOCKED;
3933 }
3934 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
3935 return packet_generator_.AddMessageFrame(message_id, message);
3936}
3937
ianswettb239f862019-04-05 09:15:06 -07003938QuicPacketLength QuicConnection::GetCurrentLargestMessagePayload() const {
3939 return packet_generator_.GetCurrentLargestMessagePayload();
3940}
3941
3942QuicPacketLength QuicConnection::GetGuaranteedLargestMessagePayload() const {
3943 return packet_generator_.GetGuaranteedLargestMessagePayload();
QUICHE teama6ef0a62019-03-07 20:34:33 -05003944}
3945
zhongyi546cc452019-04-12 15:27:49 -07003946uint32_t QuicConnection::cipher_id() const {
3947 if (version().KnowsWhichDecrypterToUse()) {
3948 return framer_.GetDecrypter(last_decrypted_packet_level_)->cipher_id();
3949 }
3950 return framer_.decrypter()->cipher_id();
3951}
3952
QUICHE teama6ef0a62019-03-07 20:34:33 -05003953bool QuicConnection::ShouldSetAckAlarm() const {
3954 DCHECK(ack_frame_updated());
3955 if (ack_alarm_->IsSet()) {
3956 // ACK alarm has been set.
3957 return false;
3958 }
3959 if (GetQuicReloadableFlag(quic_fix_spurious_ack_alarm) &&
3960 packet_generator_.should_send_ack()) {
3961 // If the generator is already configured to send an ACK, then there is no
3962 // need to schedule the ACK alarm. The updated ACK information will be sent
3963 // when the generator flushes.
3964 QUIC_RELOADABLE_FLAG_COUNT(quic_fix_spurious_ack_alarm);
3965 return false;
3966 }
3967 return true;
3968}
3969
3970EncryptionLevel QuicConnection::GetConnectionCloseEncryptionLevel() const {
3971 DCHECK(fix_termination_packets_);
3972 if (perspective_ == Perspective::IS_CLIENT) {
3973 return encryption_level_;
3974 }
3975 if (sent_packet_manager_.handshake_confirmed()) {
3976 // A forward secure packet has been received.
3977 QUIC_BUG_IF(encryption_level_ != ENCRYPTION_FORWARD_SECURE);
3978 return ENCRYPTION_FORWARD_SECURE;
3979 }
3980 if (framer_.HasEncrypterOfEncryptionLevel(ENCRYPTION_ZERO_RTT)) {
3981 if (encryption_level_ != ENCRYPTION_ZERO_RTT) {
3982 if (transport_version() > QUIC_VERSION_43) {
3983 QUIC_CODE_COUNT(quic_wrong_encryption_level_connection_close_ietf);
3984 } else {
3985 QUIC_CODE_COUNT(quic_wrong_encryption_level_connection_close);
3986 }
3987 }
3988 return ENCRYPTION_ZERO_RTT;
3989 }
QUICHE team6987b4a2019-03-15 16:23:04 -07003990 return ENCRYPTION_INITIAL;
QUICHE teama6ef0a62019-03-07 20:34:33 -05003991}
3992
QUICHE teamcd098022019-03-22 18:49:55 -07003993void QuicConnection::SendAllPendingAcks() {
3994 DCHECK(SupportsMultiplePacketNumberSpaces());
3995 QUIC_DVLOG(1) << ENDPOINT << "Trying to send all pending ACKs";
3996 // Latches current encryption level.
3997 const EncryptionLevel current_encryption_level = encryption_level_;
3998 for (int8_t i = INITIAL_DATA; i <= APPLICATION_DATA; ++i) {
3999 const QuicTime ack_timeout = uber_received_packet_manager_.GetAckTimeout(
4000 static_cast<PacketNumberSpace>(i));
4001 if (!ack_timeout.IsInitialized() ||
4002 ack_timeout > clock_->ApproximateNow()) {
4003 continue;
4004 }
dschinazi05e62b12019-04-18 15:43:41 -07004005 if (!framer_.HasEncrypterOfEncryptionLevel(
4006 QuicUtils::GetEncryptionLevel(static_cast<PacketNumberSpace>(i)))) {
4007 QUIC_BUG << ENDPOINT << "Cannot send ACKs for packet number space "
4008 << static_cast<uint32_t>(i)
4009 << " without corresponding encrypter";
4010 continue;
4011 }
QUICHE teamcd098022019-03-22 18:49:55 -07004012 QUIC_DVLOG(1) << ENDPOINT << "Sending ACK of packet number space: "
4013 << static_cast<uint32_t>(i);
4014 // Switch to the appropriate encryption level.
4015 SetDefaultEncryptionLevel(
4016 QuicUtils::GetEncryptionLevel(static_cast<PacketNumberSpace>(i)));
4017 QuicFrames frames;
4018 frames.push_back(uber_received_packet_manager_.GetUpdatedAckFrame(
4019 static_cast<PacketNumberSpace>(i), clock_->ApproximateNow()));
4020 const bool flushed = packet_generator_.FlushAckFrame(frames);
4021 if (!flushed) {
4022 // Connection is write blocked.
QUICHE teamdb061532019-03-23 18:23:05 -07004023 QUIC_BUG_IF(!writer_->IsWriteBlocked())
4024 << "Writer not blocked, but ACK not flushed for packet space:" << i;
QUICHE teamcd098022019-03-22 18:49:55 -07004025 break;
4026 }
4027 ResetAckStates();
4028 }
4029 // Restores encryption level.
4030 SetDefaultEncryptionLevel(current_encryption_level);
4031
4032 const QuicTime timeout =
4033 uber_received_packet_manager_.GetEarliestAckTimeout();
4034 if (timeout.IsInitialized()) {
4035 // If there are ACKs pending, re-arm ack alarm.
4036 ack_alarm_->Set(timeout);
4037 }
4038 // Only try to bundle retransmittable data with ACK frame if default
4039 // encryption level is forward secure.
4040 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE ||
4041 consecutive_num_packets_with_no_retransmittable_frames_ <
4042 max_consecutive_num_packets_with_no_retransmittable_frames_) {
4043 return;
4044 }
4045 consecutive_num_packets_with_no_retransmittable_frames_ = 0;
4046 if (packet_generator_.HasRetransmittableFrames() ||
4047 visitor_->WillingAndAbleToWrite()) {
4048 // There are pending retransmittable frames.
4049 return;
4050 }
4051
4052 visitor_->OnAckNeedsRetransmittableFrame();
4053}
4054
4055void QuicConnection::MaybeEnableMultiplePacketNumberSpacesSupport() {
4056 const bool enable_multiple_packet_number_spaces =
4057 version().handshake_protocol == PROTOCOL_TLS1_3 &&
4058 use_uber_received_packet_manager_ &&
4059 sent_packet_manager_.use_uber_loss_algorithm() &&
4060 GetQuicRestartFlag(quic_enable_accept_random_ipn);
4061 if (!enable_multiple_packet_number_spaces) {
4062 return;
4063 }
4064 QUIC_DVLOG(1) << ENDPOINT << "connection " << connection_id()
4065 << " supports multiple packet number spaces";
4066 framer_.EnableMultiplePacketNumberSpacesSupport();
4067 sent_packet_manager_.EnableMultiplePacketNumberSpacesSupport();
4068 uber_received_packet_manager_.EnableMultiplePacketNumberSpacesSupport();
4069}
4070
4071bool QuicConnection::SupportsMultiplePacketNumberSpaces() const {
4072 return sent_packet_manager_.supports_multiple_packet_number_spaces();
4073}
4074
QUICHE team76e1c622019-03-19 14:36:39 -07004075void QuicConnection::SetLargestReceivedPacketWithAck(
4076 QuicPacketNumber new_value) {
QUICHE teamcd098022019-03-22 18:49:55 -07004077 if (SupportsMultiplePacketNumberSpaces()) {
4078 largest_seen_packets_with_ack_[QuicUtils::GetPacketNumberSpace(
4079 last_decrypted_packet_level_)] = new_value;
4080 } else {
4081 largest_seen_packet_with_ack_ = new_value;
4082 }
QUICHE team76e1c622019-03-19 14:36:39 -07004083}
4084
4085QuicPacketNumber QuicConnection::GetLargestReceivedPacketWithAck() const {
QUICHE teamcd098022019-03-22 18:49:55 -07004086 if (SupportsMultiplePacketNumberSpaces()) {
4087 return largest_seen_packets_with_ack_[QuicUtils::GetPacketNumberSpace(
4088 last_decrypted_packet_level_)];
4089 }
QUICHE team76e1c622019-03-19 14:36:39 -07004090 return largest_seen_packet_with_ack_;
4091}
4092
4093QuicPacketNumber QuicConnection::GetLargestSentPacket() const {
QUICHE teamcd098022019-03-22 18:49:55 -07004094 if (SupportsMultiplePacketNumberSpaces()) {
4095 return sent_packet_manager_.GetLargestSentPacket(
4096 last_decrypted_packet_level_);
4097 }
QUICHE team76e1c622019-03-19 14:36:39 -07004098 return sent_packet_manager_.GetLargestSentPacket();
4099}
4100
4101QuicPacketNumber QuicConnection::GetLargestAckedPacket() const {
QUICHE teamcd098022019-03-22 18:49:55 -07004102 if (SupportsMultiplePacketNumberSpaces()) {
4103 return sent_packet_manager_.GetLargestAckedPacket(
4104 last_decrypted_packet_level_);
4105 }
QUICHE team76e1c622019-03-19 14:36:39 -07004106 return sent_packet_manager_.GetLargestObserved();
4107}
4108
QUICHE team1f3de242019-03-20 07:24:48 -07004109QuicPacketNumber QuicConnection::GetLargestReceivedPacket() const {
QUICHE teamb23daa72019-03-21 08:37:48 -07004110 if (use_uber_received_packet_manager_) {
QUICHE team1dfa46b2019-03-22 10:39:10 -07004111 return uber_received_packet_manager_.GetLargestObserved(
4112 last_decrypted_packet_level_);
QUICHE teamb23daa72019-03-21 08:37:48 -07004113 }
QUICHE team1f3de242019-03-20 07:24:48 -07004114 return received_packet_manager_.GetLargestObserved();
4115}
4116
QUICHE teama6ef0a62019-03-07 20:34:33 -05004117size_t QuicConnection::min_received_before_ack_decimation() const {
4118 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07004119 if (use_uber_received_packet_manager_) {
4120 return uber_received_packet_manager_.min_received_before_ack_decimation();
4121 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004122 return received_packet_manager_.min_received_before_ack_decimation();
4123 }
4124 return min_received_before_ack_decimation_;
4125}
4126
4127void QuicConnection::set_min_received_before_ack_decimation(size_t new_value) {
4128 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07004129 if (use_uber_received_packet_manager_) {
4130 uber_received_packet_manager_.set_min_received_before_ack_decimation(
4131 new_value);
4132 } else {
4133 received_packet_manager_.set_min_received_before_ack_decimation(
4134 new_value);
4135 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004136 } else {
4137 min_received_before_ack_decimation_ = new_value;
4138 }
4139}
4140
4141size_t QuicConnection::ack_frequency_before_ack_decimation() const {
4142 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07004143 if (use_uber_received_packet_manager_) {
4144 return uber_received_packet_manager_
4145 .ack_frequency_before_ack_decimation();
4146 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004147 return received_packet_manager_.ack_frequency_before_ack_decimation();
4148 }
4149 return ack_frequency_before_ack_decimation_;
4150}
4151
4152void QuicConnection::set_ack_frequency_before_ack_decimation(size_t new_value) {
4153 DCHECK_GT(new_value, 0u);
4154 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07004155 if (use_uber_received_packet_manager_) {
4156 uber_received_packet_manager_.set_ack_frequency_before_ack_decimation(
4157 new_value);
4158 } else {
4159 received_packet_manager_.set_ack_frequency_before_ack_decimation(
4160 new_value);
4161 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004162 } else {
4163 ack_frequency_before_ack_decimation_ = new_value;
4164 }
4165}
4166
4167#undef ENDPOINT // undef for jumbo builds
4168} // namespace quic