1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/quic/quic_session.h"
6
7 #include "base/stl_util.h"
8 #include "net/quic/crypto/proof_verifier.h"
9 #include "net/quic/quic_connection.h"
10 #include "net/ssl/ssl_info.h"
11
12 using base::StringPiece;
13 using base::hash_map;
14 using base::hash_set;
15 using std::make_pair;
16 using std::vector;
17
18 namespace net {
19
20 const size_t kMaxPrematurelyClosedStreamsTracked = 20;
21 const size_t kMaxZombieStreams = 20;
22
23 #define ENDPOINT (is_server() ? "Server: " : " Client: ")
24
25 // We want to make sure we delete any closed streams in a safe manner.
26 // To avoid deleting a stream in mid-operation, we have a simple shim between
27 // us and the stream, so we can delete any streams when we return from
28 // processing.
29 //
30 // We could just override the base methods, but this makes it easier to make
31 // sure we don't miss any.
32 class VisitorShim : public QuicConnectionVisitorInterface {
33 public:
VisitorShim(QuicSession * session)34 explicit VisitorShim(QuicSession* session) : session_(session) {}
35
OnStreamFrames(const vector<QuicStreamFrame> & frames)36 virtual bool OnStreamFrames(const vector<QuicStreamFrame>& frames) OVERRIDE {
37 bool accepted = session_->OnStreamFrames(frames);
38 session_->PostProcessAfterData();
39 return accepted;
40 }
OnRstStream(const QuicRstStreamFrame & frame)41 virtual void OnRstStream(const QuicRstStreamFrame& frame) OVERRIDE {
42 session_->OnRstStream(frame);
43 session_->PostProcessAfterData();
44 }
45
OnGoAway(const QuicGoAwayFrame & frame)46 virtual void OnGoAway(const QuicGoAwayFrame& frame) OVERRIDE {
47 session_->OnGoAway(frame);
48 session_->PostProcessAfterData();
49 }
50
OnCanWrite()51 virtual bool OnCanWrite() OVERRIDE {
52 bool rc = session_->OnCanWrite();
53 session_->PostProcessAfterData();
54 return rc;
55 }
56
OnSuccessfulVersionNegotiation(const QuicVersion & version)57 virtual void OnSuccessfulVersionNegotiation(
58 const QuicVersion& version) OVERRIDE {
59 session_->OnSuccessfulVersionNegotiation(version);
60 }
61
OnConfigNegotiated()62 virtual void OnConfigNegotiated() OVERRIDE {
63 session_->OnConfigNegotiated();
64 }
65
OnConnectionClosed(QuicErrorCode error,bool from_peer)66 virtual void OnConnectionClosed(QuicErrorCode error,
67 bool from_peer) OVERRIDE {
68 session_->OnConnectionClosed(error, from_peer);
69 // The session will go away, so don't bother with cleanup.
70 }
71
HasPendingHandshake() const72 virtual bool HasPendingHandshake() const OVERRIDE {
73 return session_->HasPendingHandshake();
74 }
75
76 private:
77 QuicSession* session_;
78 };
79
QuicSession(QuicConnection * connection,const QuicConfig & config)80 QuicSession::QuicSession(QuicConnection* connection,
81 const QuicConfig& config)
82 : connection_(connection),
83 visitor_shim_(new VisitorShim(this)),
84 config_(config),
85 max_open_streams_(config_.max_streams_per_connection()),
86 next_stream_id_(is_server() ? 2 : 3),
87 largest_peer_created_stream_id_(0),
88 error_(QUIC_NO_ERROR),
89 goaway_received_(false),
90 goaway_sent_(false),
91 has_pending_handshake_(false) {
92
93 connection_->set_visitor(visitor_shim_.get());
94 connection_->SetFromConfig(config_);
95 if (connection_->connected()) {
96 connection_->SetOverallConnectionTimeout(
97 config_.max_time_before_crypto_handshake());
98 }
99 }
100
~QuicSession()101 QuicSession::~QuicSession() {
102 STLDeleteElements(&closed_streams_);
103 STLDeleteValues(&stream_map_);
104 }
105
OnStreamFrames(const vector<QuicStreamFrame> & frames)106 bool QuicSession::OnStreamFrames(const vector<QuicStreamFrame>& frames) {
107 for (size_t i = 0; i < frames.size(); ++i) {
108 // TODO(rch) deal with the error case of stream id 0
109 if (IsClosedStream(frames[i].stream_id)) {
110 // If we get additional frames for a stream where we didn't process
111 // headers, it's highly likely our compression context will end up
112 // permanently out of sync with the peer's, so we give up and close the
113 // connection.
114 if (ContainsKey(prematurely_closed_streams_, frames[i].stream_id)) {
115 connection()->SendConnectionClose(
116 QUIC_STREAM_RST_BEFORE_HEADERS_DECOMPRESSED);
117 return false;
118 }
119 continue;
120 }
121
122 ReliableQuicStream* stream = GetStream(frames[i].stream_id);
123 if (stream == NULL) return false;
124 if (!stream->WillAcceptStreamFrame(frames[i])) return false;
125
126 // TODO(alyssar) check against existing connection address: if changed, make
127 // sure we update the connection.
128 }
129
130 for (size_t i = 0; i < frames.size(); ++i) {
131 QuicStreamId stream_id = frames[i].stream_id;
132 ReliableQuicStream* stream = GetStream(stream_id);
133 if (!stream) {
134 continue;
135 }
136 stream->OnStreamFrame(frames[i]);
137
138 // If the stream is a data stream had been prematurely closed, and the
139 // headers are now decompressed, then we are finally finished
140 // with this stream.
141 if (ContainsKey(zombie_streams_, stream_id) &&
142 static_cast<QuicDataStream*>(stream)->headers_decompressed()) {
143 CloseZombieStream(stream_id);
144 }
145 }
146
147 while (!decompression_blocked_streams_.empty()) {
148 QuicHeaderId header_id = decompression_blocked_streams_.begin()->first;
149 if (header_id != decompressor_.current_header_id()) {
150 break;
151 }
152 QuicStreamId stream_id = decompression_blocked_streams_.begin()->second;
153 decompression_blocked_streams_.erase(header_id);
154 QuicDataStream* stream = GetDataStream(stream_id);
155 if (!stream) {
156 connection()->SendConnectionClose(
157 QUIC_STREAM_RST_BEFORE_HEADERS_DECOMPRESSED);
158 return false;
159 }
160 stream->OnDecompressorAvailable();
161 }
162 return true;
163 }
164
OnRstStream(const QuicRstStreamFrame & frame)165 void QuicSession::OnRstStream(const QuicRstStreamFrame& frame) {
166 if (frame.stream_id == kCryptoStreamId) {
167 connection()->SendConnectionCloseWithDetails(
168 QUIC_INVALID_STREAM_ID,
169 "Attempt to reset the crypto stream");
170 return;
171 }
172 QuicDataStream* stream = GetDataStream(frame.stream_id);
173 if (!stream) {
174 return; // Errors are handled by GetStream.
175 }
176 if (ContainsKey(zombie_streams_, stream->id())) {
177 // If this was a zombie stream then we close it out now.
178 CloseZombieStream(stream->id());
179 // However, since the headers still have not been decompressed, we want to
180 // mark it a prematurely closed so that if we ever receive frames
181 // for this stream we can close the connection.
182 DCHECK(!stream->headers_decompressed());
183 AddPrematurelyClosedStream(frame.stream_id);
184 return;
185 }
186 if (stream->stream_bytes_read() > 0 && !stream->headers_decompressed()) {
187 connection()->SendConnectionClose(
188 QUIC_STREAM_RST_BEFORE_HEADERS_DECOMPRESSED);
189 }
190 stream->OnStreamReset(frame.error_code);
191 }
192
OnGoAway(const QuicGoAwayFrame & frame)193 void QuicSession::OnGoAway(const QuicGoAwayFrame& frame) {
194 DCHECK(frame.last_good_stream_id < next_stream_id_);
195 goaway_received_ = true;
196 }
197
OnConnectionClosed(QuicErrorCode error,bool from_peer)198 void QuicSession::OnConnectionClosed(QuicErrorCode error, bool from_peer) {
199 DCHECK(!connection_->connected());
200 if (error_ == QUIC_NO_ERROR) {
201 error_ = error;
202 }
203
204 while (!stream_map_.empty()) {
205 DataStreamMap::iterator it = stream_map_.begin();
206 QuicStreamId id = it->first;
207 it->second->OnConnectionClosed(error, from_peer);
208 // The stream should call CloseStream as part of OnConnectionClosed.
209 if (stream_map_.find(id) != stream_map_.end()) {
210 LOG(DFATAL) << ENDPOINT
211 << "Stream failed to close under OnConnectionClosed";
212 CloseStream(id);
213 }
214 }
215 }
216
OnCanWrite()217 bool QuicSession::OnCanWrite() {
218 // We latch this here rather than doing a traditional loop, because streams
219 // may be modifying the list as we loop.
220 int remaining_writes = write_blocked_streams_.NumBlockedStreams();
221
222 while (!connection_->HasQueuedData() &&
223 remaining_writes > 0) {
224 DCHECK(write_blocked_streams_.HasWriteBlockedStreams());
225 if (!write_blocked_streams_.HasWriteBlockedStreams()) {
226 LOG(DFATAL) << "WriteBlockedStream is missing";
227 connection_->CloseConnection(QUIC_INTERNAL_ERROR, false);
228 return true; // We have no write blocked streams.
229 }
230 int index = write_blocked_streams_.GetHighestPriorityWriteBlockedList();
231 QuicStreamId stream_id = write_blocked_streams_.PopFront(index);
232 if (stream_id == kCryptoStreamId) {
233 has_pending_handshake_ = false; // We just popped it.
234 }
235 ReliableQuicStream* stream = GetStream(stream_id);
236 if (stream != NULL) {
237 // If the stream can't write all bytes, it'll re-add itself to the blocked
238 // list.
239 stream->OnCanWrite();
240 }
241 --remaining_writes;
242 }
243
244 return !write_blocked_streams_.HasWriteBlockedStreams();
245 }
246
HasPendingHandshake() const247 bool QuicSession::HasPendingHandshake() const {
248 return has_pending_handshake_;
249 }
250
WritevData(QuicStreamId id,const struct iovec * iov,int iov_count,QuicStreamOffset offset,bool fin,QuicAckNotifier::DelegateInterface * ack_notifier_delegate)251 QuicConsumedData QuicSession::WritevData(
252 QuicStreamId id,
253 const struct iovec* iov,
254 int iov_count,
255 QuicStreamOffset offset,
256 bool fin,
257 QuicAckNotifier::DelegateInterface* ack_notifier_delegate) {
258 IOVector data;
259 data.AppendIovec(iov, iov_count);
260 return connection_->SendStreamData(id, data, offset, fin,
261 ack_notifier_delegate);
262 }
263
SendRstStream(QuicStreamId id,QuicRstStreamErrorCode error)264 void QuicSession::SendRstStream(QuicStreamId id,
265 QuicRstStreamErrorCode error) {
266 connection_->SendRstStream(id, error);
267 CloseStreamInner(id, true);
268 }
269
SendGoAway(QuicErrorCode error_code,const string & reason)270 void QuicSession::SendGoAway(QuicErrorCode error_code, const string& reason) {
271 goaway_sent_ = true;
272 connection_->SendGoAway(error_code, largest_peer_created_stream_id_, reason);
273 }
274
CloseStream(QuicStreamId stream_id)275 void QuicSession::CloseStream(QuicStreamId stream_id) {
276 CloseStreamInner(stream_id, false);
277 }
278
CloseStreamInner(QuicStreamId stream_id,bool locally_reset)279 void QuicSession::CloseStreamInner(QuicStreamId stream_id,
280 bool locally_reset) {
281 DVLOG(1) << ENDPOINT << "Closing stream " << stream_id;
282
283 DataStreamMap::iterator it = stream_map_.find(stream_id);
284 if (it == stream_map_.end()) {
285 DVLOG(1) << ENDPOINT << "Stream is already closed: " << stream_id;
286 return;
287 }
288 QuicDataStream* stream = it->second;
289 if (connection_->connected() && !stream->headers_decompressed()) {
290 // If the stream is being closed locally (for example a client cancelling
291 // a request before receiving the response) then we need to make sure that
292 // we keep the stream alive long enough to process any response or
293 // RST_STREAM frames.
294 if (locally_reset && !is_server()) {
295 AddZombieStream(stream_id);
296 return;
297 }
298
299 // This stream has been closed before the headers were decompressed.
300 // This might cause problems with head of line blocking of headers.
301 // If the peer sent headers which were lost but we now close the stream
302 // we will never be able to decompress headers for other streams.
303 // To deal with this, we keep track of streams which have been closed
304 // prematurely. If we ever receive data frames for this steam, then we
305 // know there actually has been a problem and we close the connection.
306 AddPrematurelyClosedStream(stream->id());
307 }
308 closed_streams_.push_back(it->second);
309 if (ContainsKey(zombie_streams_, stream->id())) {
310 zombie_streams_.erase(stream->id());
311 }
312 stream_map_.erase(it);
313 stream->OnClose();
314 }
315
AddZombieStream(QuicStreamId stream_id)316 void QuicSession::AddZombieStream(QuicStreamId stream_id) {
317 if (zombie_streams_.size() == kMaxZombieStreams) {
318 QuicStreamId oldest_zombie_stream_id = zombie_streams_.begin()->first;
319 CloseZombieStream(oldest_zombie_stream_id);
320 // However, since the headers still have not been decompressed, we want to
321 // mark it a prematurely closed so that if we ever receive frames
322 // for this stream we can close the connection.
323 AddPrematurelyClosedStream(oldest_zombie_stream_id);
324 }
325 zombie_streams_.insert(make_pair(stream_id, true));
326 }
327
CloseZombieStream(QuicStreamId stream_id)328 void QuicSession::CloseZombieStream(QuicStreamId stream_id) {
329 DCHECK(ContainsKey(zombie_streams_, stream_id));
330 zombie_streams_.erase(stream_id);
331 QuicDataStream* stream = GetDataStream(stream_id);
332 if (!stream) {
333 return;
334 }
335 stream_map_.erase(stream_id);
336 stream->OnClose();
337 closed_streams_.push_back(stream);
338 }
339
AddPrematurelyClosedStream(QuicStreamId stream_id)340 void QuicSession::AddPrematurelyClosedStream(QuicStreamId stream_id) {
341 if (prematurely_closed_streams_.size() ==
342 kMaxPrematurelyClosedStreamsTracked) {
343 prematurely_closed_streams_.erase(prematurely_closed_streams_.begin());
344 }
345 prematurely_closed_streams_.insert(make_pair(stream_id, true));
346 }
347
IsEncryptionEstablished()348 bool QuicSession::IsEncryptionEstablished() {
349 return GetCryptoStream()->encryption_established();
350 }
351
IsCryptoHandshakeConfirmed()352 bool QuicSession::IsCryptoHandshakeConfirmed() {
353 return GetCryptoStream()->handshake_confirmed();
354 }
355
OnConfigNegotiated()356 void QuicSession::OnConfigNegotiated() {
357 connection_->SetFromConfig(config_);
358 }
359
OnCryptoHandshakeEvent(CryptoHandshakeEvent event)360 void QuicSession::OnCryptoHandshakeEvent(CryptoHandshakeEvent event) {
361 switch (event) {
362 // TODO(satyamshekhar): Move the logic of setting the encrypter/decrypter
363 // to QuicSession since it is the glue.
364 case ENCRYPTION_FIRST_ESTABLISHED:
365 break;
366
367 case ENCRYPTION_REESTABLISHED:
368 // Retransmit originally packets that were sent, since they can't be
369 // decrypted by the peer.
370 connection_->RetransmitUnackedPackets(INITIAL_ENCRYPTION_ONLY);
371 break;
372
373 case HANDSHAKE_CONFIRMED:
374 LOG_IF(DFATAL, !config_.negotiated()) << ENDPOINT
375 << "Handshake confirmed without parameter negotiation.";
376 connection_->SetOverallConnectionTimeout(QuicTime::Delta::Infinite());
377 max_open_streams_ = config_.max_streams_per_connection();
378 break;
379
380 default:
381 LOG(ERROR) << ENDPOINT << "Got unknown handshake event: " << event;
382 }
383 }
384
OnCryptoHandshakeMessageSent(const CryptoHandshakeMessage & message)385 void QuicSession::OnCryptoHandshakeMessageSent(
386 const CryptoHandshakeMessage& message) {
387 }
388
OnCryptoHandshakeMessageReceived(const CryptoHandshakeMessage & message)389 void QuicSession::OnCryptoHandshakeMessageReceived(
390 const CryptoHandshakeMessage& message) {
391 }
392
config()393 QuicConfig* QuicSession::config() {
394 return &config_;
395 }
396
ActivateStream(QuicDataStream * stream)397 void QuicSession::ActivateStream(QuicDataStream* stream) {
398 DVLOG(1) << ENDPOINT << "num_streams: " << stream_map_.size()
399 << ". activating " << stream->id();
400 DCHECK_EQ(stream_map_.count(stream->id()), 0u);
401 stream_map_[stream->id()] = stream;
402 }
403
GetNextStreamId()404 QuicStreamId QuicSession::GetNextStreamId() {
405 QuicStreamId id = next_stream_id_;
406 next_stream_id_ += 2;
407 return id;
408 }
409
GetStream(const QuicStreamId stream_id)410 ReliableQuicStream* QuicSession::GetStream(const QuicStreamId stream_id) {
411 if (stream_id == kCryptoStreamId) {
412 return GetCryptoStream();
413 }
414 return GetDataStream(stream_id);
415 }
416
GetDataStream(const QuicStreamId stream_id)417 QuicDataStream* QuicSession::GetDataStream(const QuicStreamId stream_id) {
418 if (stream_id == kCryptoStreamId) {
419 DLOG(FATAL) << "Attempt to call GetDataStream with the crypto stream id";
420 return NULL;
421 }
422
423 DataStreamMap::iterator it = stream_map_.find(stream_id);
424 if (it != stream_map_.end()) {
425 return it->second;
426 }
427
428 if (IsClosedStream(stream_id)) {
429 return NULL;
430 }
431
432 if (stream_id % 2 == next_stream_id_ % 2) {
433 // We've received a frame for a locally-created stream that is not
434 // currently active. This is an error.
435 connection()->SendConnectionClose(QUIC_PACKET_FOR_NONEXISTENT_STREAM);
436 return NULL;
437 }
438
439 return GetIncomingReliableStream(stream_id);
440 }
441
GetIncomingReliableStream(QuicStreamId stream_id)442 QuicDataStream* QuicSession::GetIncomingReliableStream(
443 QuicStreamId stream_id) {
444 if (IsClosedStream(stream_id)) {
445 return NULL;
446 }
447
448 if (goaway_sent_) {
449 // We've already sent a GoAway
450 SendRstStream(stream_id, QUIC_STREAM_PEER_GOING_AWAY);
451 return NULL;
452 }
453
454 implicitly_created_streams_.erase(stream_id);
455 if (stream_id > largest_peer_created_stream_id_) {
456 // TODO(rch) add unit test for this
457 if (stream_id - largest_peer_created_stream_id_ > kMaxStreamIdDelta) {
458 connection()->SendConnectionClose(QUIC_INVALID_STREAM_ID);
459 return NULL;
460 }
461 if (largest_peer_created_stream_id_ == 0) {
462 largest_peer_created_stream_id_= 1;
463 }
464 for (QuicStreamId id = largest_peer_created_stream_id_ + 2;
465 id < stream_id;
466 id += 2) {
467 implicitly_created_streams_.insert(id);
468 }
469 largest_peer_created_stream_id_ = stream_id;
470 }
471 QuicDataStream* stream = CreateIncomingDataStream(stream_id);
472 if (stream == NULL) {
473 return NULL;
474 }
475 ActivateStream(stream);
476 return stream;
477 }
478
IsClosedStream(QuicStreamId id)479 bool QuicSession::IsClosedStream(QuicStreamId id) {
480 DCHECK_NE(0u, id);
481 if (id == kCryptoStreamId) {
482 return false;
483 }
484 if (ContainsKey(zombie_streams_, id)) {
485 return true;
486 }
487 if (ContainsKey(stream_map_, id)) {
488 // Stream is active
489 return false;
490 }
491 if (id % 2 == next_stream_id_ % 2) {
492 // Locally created streams are strictly in-order. If the id is in the
493 // range of created streams and it's not active, it must have been closed.
494 return id < next_stream_id_;
495 }
496 // For peer created streams, we also need to consider implicitly created
497 // streams.
498 return id <= largest_peer_created_stream_id_ &&
499 implicitly_created_streams_.count(id) == 0;
500 }
501
GetNumOpenStreams() const502 size_t QuicSession::GetNumOpenStreams() const {
503 return stream_map_.size() + implicitly_created_streams_.size() -
504 zombie_streams_.size();
505 }
506
MarkWriteBlocked(QuicStreamId id,QuicPriority priority)507 void QuicSession::MarkWriteBlocked(QuicStreamId id, QuicPriority priority) {
508 if (id == kCryptoStreamId) {
509 DCHECK(!has_pending_handshake_);
510 has_pending_handshake_ = true;
511 // TODO(jar): Be sure to use the highest priority for the crypto stream,
512 // perhaps by adding a "special" priority for it that is higher than
513 // kHighestPriority.
514 priority = kHighestPriority;
515 }
516 write_blocked_streams_.PushBack(id, priority);
517 }
518
HasQueuedData() const519 bool QuicSession::HasQueuedData() const {
520 return write_blocked_streams_.NumBlockedStreams() ||
521 connection_->HasQueuedData();
522 }
523
MarkDecompressionBlocked(QuicHeaderId header_id,QuicStreamId stream_id)524 void QuicSession::MarkDecompressionBlocked(QuicHeaderId header_id,
525 QuicStreamId stream_id) {
526 decompression_blocked_streams_[header_id] = stream_id;
527 }
528
GetSSLInfo(SSLInfo * ssl_info)529 bool QuicSession::GetSSLInfo(SSLInfo* ssl_info) {
530 NOTIMPLEMENTED();
531 return false;
532 }
533
PostProcessAfterData()534 void QuicSession::PostProcessAfterData() {
535 STLDeleteElements(&closed_streams_);
536 closed_streams_.clear();
537 }
538
539 } // namespace net
540