1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/tools/quic/quic_dispatcher.h"
9 #include "base/debug/stack_trace.h"
10 #include "base/logging.h"
11 #include "base/stl_util.h"
12 #include "net/quic/quic_blocked_writer_interface.h"
13 #include "net/quic/quic_flags.h"
14 #include "net/quic/quic_utils.h"
15 #include "net/tools/epoll_server/epoll_server.h"
16 #include "net/tools/quic/quic_default_packet_writer.h"
17 #include "net/tools/quic/quic_epoll_connection_helper.h"
18 #include "net/tools/quic/quic_per_connection_packet_writer.h"
19 #include "net/tools/quic/quic_socket_utils.h"
20 #include "net/tools/quic/quic_time_wait_list_manager.h"
26 using base::StringPiece
;
29 class DeleteSessionsAlarm
: public EpollAlarm
{
31 explicit DeleteSessionsAlarm(QuicDispatcher
* dispatcher
)
32 : dispatcher_(dispatcher
) {
35 virtual int64
OnAlarm() OVERRIDE
{
36 EpollAlarm::OnAlarm();
37 dispatcher_
->DeleteSessions();
42 QuicDispatcher
* dispatcher_
;
45 class QuicDispatcher::QuicFramerVisitor
: public QuicFramerVisitorInterface
{
47 explicit QuicFramerVisitor(QuicDispatcher
* dispatcher
)
48 : dispatcher_(dispatcher
),
51 // QuicFramerVisitorInterface implementation
52 virtual void OnPacket() OVERRIDE
{}
53 virtual bool OnUnauthenticatedPublicHeader(
54 const QuicPacketPublicHeader
& header
) OVERRIDE
{
55 connection_id_
= header
.connection_id
;
56 return dispatcher_
->OnUnauthenticatedPublicHeader(header
);
58 virtual bool OnUnauthenticatedHeader(
59 const QuicPacketHeader
& header
) OVERRIDE
{
60 dispatcher_
->OnUnauthenticatedHeader(header
);
63 virtual void OnError(QuicFramer
* framer
) OVERRIDE
{
64 DVLOG(1) << QuicUtils::ErrorToString(framer
->error());
67 virtual bool OnProtocolVersionMismatch(
68 QuicVersion
/*received_version*/) OVERRIDE
{
69 if (dispatcher_
->time_wait_list_manager()->IsConnectionIdInTimeWait(
71 // Keep processing after protocol mismatch - this will be dealt with by
72 // the TimeWaitListManager.
75 DLOG(DFATAL
) << "Version mismatch, connection ID (" << connection_id_
76 << ") not in time wait list.";
81 // The following methods should never get called because we always return
82 // false from OnUnauthenticatedHeader(). As a result, we never process the
83 // payload of the packet.
84 virtual void OnPublicResetPacket(
85 const QuicPublicResetPacket
& /*packet*/) OVERRIDE
{
88 virtual void OnVersionNegotiationPacket(
89 const QuicVersionNegotiationPacket
& /*packet*/) OVERRIDE
{
92 virtual void OnDecryptedPacket(EncryptionLevel level
) OVERRIDE
{
95 virtual bool OnPacketHeader(const QuicPacketHeader
& /*header*/) OVERRIDE
{
99 virtual void OnRevivedPacket() OVERRIDE
{
102 virtual void OnFecProtectedPayload(StringPiece
/*payload*/) OVERRIDE
{
105 virtual bool OnStreamFrame(const QuicStreamFrame
& /*frame*/) OVERRIDE
{
109 virtual bool OnAckFrame(const QuicAckFrame
& /*frame*/) OVERRIDE
{
113 virtual bool OnCongestionFeedbackFrame(
114 const QuicCongestionFeedbackFrame
& /*frame*/) OVERRIDE
{
118 virtual bool OnStopWaitingFrame(
119 const QuicStopWaitingFrame
& /*frame*/) OVERRIDE
{
123 virtual bool OnPingFrame(const QuicPingFrame
& /*frame*/) OVERRIDE
{
127 virtual bool OnRstStreamFrame(const QuicRstStreamFrame
& /*frame*/) OVERRIDE
{
131 virtual bool OnConnectionCloseFrame(
132 const QuicConnectionCloseFrame
& /*frame*/) OVERRIDE
{
136 virtual bool OnGoAwayFrame(const QuicGoAwayFrame
& /*frame*/) OVERRIDE
{
140 virtual bool OnWindowUpdateFrame(const QuicWindowUpdateFrame
& /*frame*/)
145 virtual bool OnBlockedFrame(const QuicBlockedFrame
& frame
) OVERRIDE
{
149 virtual void OnFecData(const QuicFecData
& /*fec*/) OVERRIDE
{
152 virtual void OnPacketComplete() OVERRIDE
{
157 QuicDispatcher
* dispatcher_
;
159 // Latched in OnUnauthenticatedPublicHeader for use later.
160 QuicConnectionId connection_id_
;
163 QuicPacketWriter
* QuicDispatcher::DefaultPacketWriterFactory::Create(
164 QuicPacketWriter
* writer
,
165 QuicConnection
* connection
) {
166 return new QuicPerConnectionPacketWriter(writer
, connection
);
169 QuicDispatcher::PacketWriterFactoryAdapter::PacketWriterFactoryAdapter(
170 QuicDispatcher
* dispatcher
)
171 : dispatcher_(dispatcher
) {}
173 QuicDispatcher::PacketWriterFactoryAdapter::~PacketWriterFactoryAdapter() {}
175 QuicPacketWriter
* QuicDispatcher::PacketWriterFactoryAdapter::Create(
176 QuicConnection
* connection
) const {
177 return dispatcher_
->packet_writer_factory_
->Create(
178 dispatcher_
->writer_
.get(),
182 QuicDispatcher::QuicDispatcher(const QuicConfig
& config
,
183 const QuicCryptoServerConfig
& crypto_config
,
184 const QuicVersionVector
& supported_versions
,
185 PacketWriterFactory
* packet_writer_factory
,
186 EpollServer
* epoll_server
)
188 crypto_config_(crypto_config
),
189 delete_sessions_alarm_(new DeleteSessionsAlarm(this)),
190 epoll_server_(epoll_server
),
191 helper_(new QuicEpollConnectionHelper(epoll_server_
)),
192 packet_writer_factory_(packet_writer_factory
),
193 connection_writer_factory_(this),
194 supported_versions_(supported_versions
),
195 current_packet_(NULL
),
196 framer_(supported_versions
, /*unused*/ QuicTime::Zero(), true),
197 framer_visitor_(new QuicFramerVisitor(this)) {
198 framer_
.set_visitor(framer_visitor_
.get());
201 QuicDispatcher::~QuicDispatcher() {
202 STLDeleteValues(&session_map_
);
203 STLDeleteElements(&closed_session_list_
);
206 void QuicDispatcher::Initialize(int fd
) {
207 DCHECK(writer_
== NULL
);
208 writer_
.reset(CreateWriter(fd
));
209 time_wait_list_manager_
.reset(CreateQuicTimeWaitListManager());
212 void QuicDispatcher::ProcessPacket(const IPEndPoint
& server_address
,
213 const IPEndPoint
& client_address
,
214 const QuicEncryptedPacket
& packet
) {
215 current_server_address_
= server_address
;
216 current_client_address_
= client_address
;
217 current_packet_
= &packet
;
218 // ProcessPacket will cause the packet to be dispatched in
219 // OnUnauthenticatedPublicHeader, or sent to the time wait list manager
220 // in OnAuthenticatedHeader.
221 framer_
.ProcessPacket(packet
);
222 // TODO(rjshade): Return a status describing if/why a packet was dropped,
223 // and log somehow. Maybe expose as a varz.
226 bool QuicDispatcher::OnUnauthenticatedPublicHeader(
227 const QuicPacketPublicHeader
& header
) {
228 QuicSession
* session
= NULL
;
230 QuicConnectionId connection_id
= header
.connection_id
;
231 SessionMap::iterator it
= session_map_
.find(connection_id
);
232 if (it
== session_map_
.end()) {
233 if (header
.reset_flag
) {
236 if (time_wait_list_manager_
->IsConnectionIdInTimeWait(connection_id
)) {
237 return HandlePacketForTimeWait(header
);
240 // Ensure the packet has a version negotiation bit set before creating a new
241 // session for it. All initial packets for a new connection are required to
242 // have the flag set. Otherwise it may be a stray packet.
243 if (header
.version_flag
) {
244 session
= CreateQuicSession(connection_id
, current_server_address_
,
245 current_client_address_
);
248 if (session
== NULL
) {
249 DVLOG(1) << "Failed to create session for " << connection_id
;
250 // Add this connection_id fo the time-wait state, to safely reject future
253 if (header
.version_flag
&&
254 !framer_
.IsSupportedVersion(header
.versions
.front())) {
255 // TODO(ianswett): Produce a no-version version negotiation packet.
259 // Use the version in the packet if possible, otherwise assume the latest.
260 QuicVersion version
= header
.version_flag
? header
.versions
.front() :
261 supported_versions_
.front();
262 time_wait_list_manager_
->AddConnectionIdToTimeWait(
263 connection_id
, version
, NULL
);
264 DCHECK(time_wait_list_manager_
->IsConnectionIdInTimeWait(connection_id
));
265 return HandlePacketForTimeWait(header
);
267 DVLOG(1) << "Created new session for " << connection_id
;
268 session_map_
.insert(make_pair(connection_id
, session
));
270 session
= it
->second
;
273 session
->connection()->ProcessUdpPacket(
274 current_server_address_
, current_client_address_
, *current_packet_
);
276 // Do not parse the packet further. The session will process it completely.
280 void QuicDispatcher::OnUnauthenticatedHeader(const QuicPacketHeader
& header
) {
281 DCHECK(time_wait_list_manager_
->IsConnectionIdInTimeWait(
282 header
.public_header
.connection_id
));
283 time_wait_list_manager_
->ProcessPacket(current_server_address_
,
284 current_client_address_
,
285 header
.public_header
.connection_id
,
286 header
.packet_sequence_number
,
290 void QuicDispatcher::CleanUpSession(SessionMap::iterator it
) {
291 QuicConnection
* connection
= it
->second
->connection();
292 QuicEncryptedPacket
* connection_close_packet
=
293 connection
->ReleaseConnectionClosePacket();
294 write_blocked_list_
.erase(connection
);
295 time_wait_list_manager_
->AddConnectionIdToTimeWait(it
->first
,
296 connection
->version(),
297 connection_close_packet
);
298 session_map_
.erase(it
);
301 void QuicDispatcher::DeleteSessions() {
302 STLDeleteElements(&closed_session_list_
);
305 void QuicDispatcher::OnCanWrite() {
306 // We got an EPOLLOUT: the socket should not be blocked.
307 writer_
->SetWritable();
309 // Give all the blocked writers one chance to write, until we're blocked again
310 // or there's no work left.
311 while (!write_blocked_list_
.empty() && !writer_
->IsWriteBlocked()) {
312 QuicBlockedWriterInterface
* blocked_writer
=
313 write_blocked_list_
.begin()->first
;
314 write_blocked_list_
.erase(write_blocked_list_
.begin());
315 blocked_writer
->OnCanWrite();
319 bool QuicDispatcher::HasPendingWrites() const {
320 return !write_blocked_list_
.empty();
323 void QuicDispatcher::Shutdown() {
324 while (!session_map_
.empty()) {
325 QuicSession
* session
= session_map_
.begin()->second
;
326 session
->connection()->SendConnectionClose(QUIC_PEER_GOING_AWAY
);
327 // Validate that the session removes itself from the session map on close.
328 DCHECK(session_map_
.empty() || session_map_
.begin()->second
!= session
);
333 void QuicDispatcher::OnConnectionClosed(QuicConnectionId connection_id
,
334 QuicErrorCode error
) {
335 SessionMap::iterator it
= session_map_
.find(connection_id
);
336 if (it
== session_map_
.end()) {
337 LOG(DFATAL
) << "ConnectionId " << connection_id
338 << " does not exist in the session map. "
339 << "Error: " << QuicUtils::ErrorToString(error
);
340 LOG(DFATAL
) << base::debug::StackTrace().ToString();
344 DLOG_IF(INFO
, error
!= QUIC_NO_ERROR
) << "Closing connection ("
346 << ") due to error: "
347 << QuicUtils::ErrorToString(error
);
349 if (closed_session_list_
.empty()) {
350 epoll_server_
->RegisterAlarmApproximateDelta(
351 0, delete_sessions_alarm_
.get());
353 closed_session_list_
.push_back(it
->second
);
357 void QuicDispatcher::OnWriteBlocked(
358 QuicBlockedWriterInterface
* blocked_writer
) {
359 if (!writer_
->IsWriteBlocked()) {
361 "QuicDispatcher::OnWriteBlocked called when the writer is not blocked.";
362 // Return without adding the connection to the blocked list, to avoid
363 // infinite loops in OnCanWrite.
366 write_blocked_list_
.insert(make_pair(blocked_writer
, true));
369 QuicPacketWriter
* QuicDispatcher::CreateWriter(int fd
) {
370 return new QuicDefaultPacketWriter(fd
);
373 QuicSession
* QuicDispatcher::CreateQuicSession(
374 QuicConnectionId connection_id
,
375 const IPEndPoint
& server_address
,
376 const IPEndPoint
& client_address
) {
377 QuicServerSession
* session
= new QuicServerSession(
379 CreateQuicConnection(connection_id
, server_address
, client_address
),
381 session
->InitializeSession(crypto_config_
);
385 QuicConnection
* QuicDispatcher::CreateQuicConnection(
386 QuicConnectionId connection_id
,
387 const IPEndPoint
& server_address
,
388 const IPEndPoint
& client_address
) {
389 return new QuicConnection(connection_id
,
392 connection_writer_factory_
,
393 /* owns_writer= */ true,
394 /* is_server= */ true,
395 supported_versions_
);
398 QuicTimeWaitListManager
* QuicDispatcher::CreateQuicTimeWaitListManager() {
399 return new QuicTimeWaitListManager(
400 writer_
.get(), this, epoll_server(), supported_versions());
403 bool QuicDispatcher::HandlePacketForTimeWait(
404 const QuicPacketPublicHeader
& header
) {
405 if (header
.reset_flag
) {
406 // Public reset packets do not have sequence numbers, so ignore the packet.
410 // Switch the framer to the correct version, so that the sequence number can
411 // be parsed correctly.
412 framer_
.set_version(time_wait_list_manager_
->GetQuicVersionFromConnectionId(
413 header
.connection_id
));
415 // Continue parsing the packet to extract the sequence number. Then
416 // send it to the time wait manager in OnUnathenticatedHeader.