mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-28 08:16:09 +03:00
798 lines
31 KiB
C++
798 lines
31 KiB
C++
|
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style license that can be
|
||
|
// found in the LICENSE file.
|
||
|
|
||
|
#include "net/quic/chromium/quic_connection_logger.h"
|
||
|
|
||
|
#include <algorithm>
|
||
|
#include <limits>
|
||
|
#include <memory>
|
||
|
#include <utility>
|
||
|
#include <vector>
|
||
|
|
||
|
#include "base/bind.h"
|
||
|
#include "base/callback.h"
|
||
|
#include "base/metrics/histogram_base.h"
|
||
|
#include "base/metrics/histogram_macros.h"
|
||
|
#include "base/metrics/sparse_histogram.h"
|
||
|
#include "base/strings/string_number_conversions.h"
|
||
|
#include "base/values.h"
|
||
|
#include "net/base/ip_address.h"
|
||
|
#include "net/cert/x509_certificate.h"
|
||
|
#include "net/log/net_log.h"
|
||
|
#include "net/log/net_log_capture_mode.h"
|
||
|
#include "net/log/net_log_event_type.h"
|
||
|
#include "net/quic/chromium/quic_address_mismatch.h"
|
||
|
#include "net/quic/core/crypto/crypto_handshake_message.h"
|
||
|
#include "net/quic/core/crypto/crypto_protocol.h"
|
||
|
#include "net/quic/core/quic_packets.h"
|
||
|
#include "net/quic/core/quic_socket_address_coder.h"
|
||
|
#include "net/quic/core/quic_time.h"
|
||
|
#include "net/quic/platform/api/quic_string_piece.h"
|
||
|
|
||
|
using std::string;
|
||
|
|
||
|
namespace net {
|
||
|
|
||
|
namespace {
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicPacketCallback(
|
||
|
const IPEndPoint* self_address,
|
||
|
const IPEndPoint* peer_address,
|
||
|
size_t packet_size,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetString("self_address", self_address->ToString());
|
||
|
dict->SetString("peer_address", peer_address->ToString());
|
||
|
dict->SetInteger("size", packet_size);
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicPacketSentCallback(
|
||
|
const SerializedPacket& serialized_packet,
|
||
|
TransmissionType transmission_type,
|
||
|
QuicTime sent_time,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetInteger("transmission_type", transmission_type);
|
||
|
dict->SetString("packet_number",
|
||
|
base::Uint64ToString(serialized_packet.packet_number));
|
||
|
dict->SetInteger("size", serialized_packet.encrypted_length);
|
||
|
dict->SetString("sent_time_us",
|
||
|
base::Int64ToString(sent_time.ToDebuggingValue()));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicPacketRetransmittedCallback(
|
||
|
QuicPacketNumber old_packet_number,
|
||
|
QuicPacketNumber new_packet_number,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetString("old_packet_number", base::Uint64ToString(old_packet_number));
|
||
|
dict->SetString("new_packet_number", base::Uint64ToString(new_packet_number));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicDuplicatePacketCallback(
|
||
|
QuicPacketNumber packet_number,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetString("packet_number", base::Uint64ToString(packet_number));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicPacketHeaderCallback(
|
||
|
const QuicPacketHeader* header,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetString("connection_id", base::Uint64ToString(header->connection_id));
|
||
|
dict->SetInteger("reset_flag", header->reset_flag);
|
||
|
dict->SetInteger("version_flag", header->version_flag);
|
||
|
dict->SetString("packet_number", base::Uint64ToString(header->packet_number));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicStreamFrameCallback(
|
||
|
const QuicStreamFrame* frame,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetInteger("stream_id", frame->stream_id);
|
||
|
dict->SetBoolean("fin", frame->fin);
|
||
|
dict->SetString("offset", base::Uint64ToString(frame->offset));
|
||
|
dict->SetInteger("length", frame->data_length);
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicAckFrameCallback(
|
||
|
const QuicAckFrame* frame,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
auto dict = std::make_unique<base::DictionaryValue>();
|
||
|
dict->SetString("largest_observed",
|
||
|
base::Uint64ToString(frame->deprecated_largest_observed));
|
||
|
dict->SetString("delta_time_largest_observed_us",
|
||
|
base::Int64ToString(frame->ack_delay_time.ToMicroseconds()));
|
||
|
|
||
|
auto missing = std::make_unique<base::ListValue>();
|
||
|
if (!frame->packets.Empty()) {
|
||
|
// V34 and above express acked packets, but only print
|
||
|
// missing packets, because it's typically a shorter list.
|
||
|
for (QuicPacketNumber packet = frame->packets.Min();
|
||
|
packet < frame->deprecated_largest_observed; ++packet) {
|
||
|
if (!frame->packets.Contains(packet)) {
|
||
|
missing->AppendString(base::Uint64ToString(packet));
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
dict->Set("missing_packets", std::move(missing));
|
||
|
|
||
|
auto received = std::make_unique<base::ListValue>();
|
||
|
const PacketTimeVector& received_times = frame->received_packet_times;
|
||
|
for (PacketTimeVector::const_iterator it = received_times.begin();
|
||
|
it != received_times.end(); ++it) {
|
||
|
auto info = std::make_unique<base::DictionaryValue>();
|
||
|
info->SetInteger("packet_number", static_cast<int>(it->first));
|
||
|
info->SetString("received",
|
||
|
base::Int64ToString(it->second.ToDebuggingValue()));
|
||
|
received->Append(std::move(info));
|
||
|
}
|
||
|
dict->Set("received_packet_times", std::move(received));
|
||
|
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicRstStreamFrameCallback(
|
||
|
const QuicRstStreamFrame* frame,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetInteger("stream_id", frame->stream_id);
|
||
|
dict->SetInteger("quic_rst_stream_error", frame->error_code);
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicConnectionCloseFrameCallback(
|
||
|
const QuicConnectionCloseFrame* frame,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetInteger("quic_error", frame->error_code);
|
||
|
dict->SetString("details", frame->error_details);
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicWindowUpdateFrameCallback(
|
||
|
const QuicWindowUpdateFrame* frame,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetInteger("stream_id", frame->stream_id);
|
||
|
dict->SetString("byte_offset", base::Uint64ToString(frame->byte_offset));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicBlockedFrameCallback(
|
||
|
const QuicBlockedFrame* frame,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetInteger("stream_id", frame->stream_id);
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicGoAwayFrameCallback(
|
||
|
const QuicGoAwayFrame* frame,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetInteger("quic_error", frame->error_code);
|
||
|
dict->SetInteger("last_good_stream_id", frame->last_good_stream_id);
|
||
|
dict->SetString("reason_phrase", frame->reason_phrase);
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicStopWaitingFrameCallback(
|
||
|
const QuicStopWaitingFrame* frame,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
auto dict = std::make_unique<base::DictionaryValue>();
|
||
|
auto sent_info = std::make_unique<base::DictionaryValue>();
|
||
|
sent_info->SetString("least_unacked",
|
||
|
base::Uint64ToString(frame->least_unacked));
|
||
|
dict->Set("sent_info", std::move(sent_info));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicVersionNegotiationPacketCallback(
|
||
|
const QuicVersionNegotiationPacket* packet,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
auto dict = std::make_unique<base::DictionaryValue>();
|
||
|
auto versions = std::make_unique<base::ListValue>();
|
||
|
for (QuicTransportVersionVector::const_iterator it = packet->versions.begin();
|
||
|
it != packet->versions.end(); ++it) {
|
||
|
versions->AppendString(QuicVersionToString(*it));
|
||
|
}
|
||
|
dict->Set("versions", std::move(versions));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicPublicResetPacketCallback(
|
||
|
const IPEndPoint* server_hello_address,
|
||
|
const IPEndPoint* public_reset_address,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetString("server_hello_address", server_hello_address->ToString());
|
||
|
dict->SetString("public_reset_address", public_reset_address->ToString());
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicCryptoHandshakeMessageCallback(
|
||
|
const CryptoHandshakeMessage* message,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetString("quic_crypto_handshake_message",
|
||
|
message->DebugString(Perspective::IS_CLIENT));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicOnConnectionClosedCallback(
|
||
|
QuicErrorCode error,
|
||
|
ConnectionCloseSource source,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
||
|
dict->SetInteger("quic_error", error);
|
||
|
dict->SetBoolean("from_peer",
|
||
|
source == ConnectionCloseSource::FROM_PEER ? true : false);
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<base::Value> NetLogQuicCertificateVerifiedCallback(
|
||
|
scoped_refptr<X509Certificate> cert,
|
||
|
NetLogCaptureMode /* capture_mode */) {
|
||
|
// Only the subjects are logged so that we can investigate connection pooling.
|
||
|
// More fields could be logged in the future.
|
||
|
std::vector<std::string> dns_names;
|
||
|
cert->GetDNSNames(&dns_names);
|
||
|
auto dict = std::make_unique<base::DictionaryValue>();
|
||
|
auto subjects = std::make_unique<base::ListValue>();
|
||
|
for (auto& dns_name : dns_names) {
|
||
|
subjects->GetList().emplace_back(std::move(dns_name));
|
||
|
}
|
||
|
dict->Set("subjects", std::move(subjects));
|
||
|
return std::move(dict);
|
||
|
}
|
||
|
|
||
|
void UpdatePublicResetAddressMismatchHistogram(
|
||
|
const IPEndPoint& server_hello_address,
|
||
|
const IPEndPoint& public_reset_address) {
|
||
|
int sample = GetAddressMismatch(server_hello_address, public_reset_address);
|
||
|
// We are seemingly talking to an older server that does not support the
|
||
|
// feature, so we can't report the results in the histogram.
|
||
|
if (sample < 0) {
|
||
|
return;
|
||
|
}
|
||
|
UMA_HISTOGRAM_ENUMERATION("Net.QuicSession.PublicResetAddressMismatch2",
|
||
|
static_cast<QuicAddressMismatch>(sample),
|
||
|
QUIC_ADDRESS_MISMATCH_MAX);
|
||
|
}
|
||
|
|
||
|
// If |address| is an IPv4-mapped IPv6 address, returns ADDRESS_FAMILY_IPV4
|
||
|
// instead of ADDRESS_FAMILY_IPV6. Othewise, behaves like GetAddressFamily().
|
||
|
AddressFamily GetRealAddressFamily(const IPAddress& address) {
|
||
|
return address.IsIPv4MappedIPv6() ? ADDRESS_FAMILY_IPV4
|
||
|
: GetAddressFamily(address);
|
||
|
}
|
||
|
|
||
|
} // namespace
|
||
|
|
||
|
QuicConnectionLogger::QuicConnectionLogger(
|
||
|
QuicSpdySession* session,
|
||
|
const char* const connection_description,
|
||
|
std::unique_ptr<SocketPerformanceWatcher> socket_performance_watcher,
|
||
|
const NetLogWithSource& net_log)
|
||
|
: net_log_(net_log),
|
||
|
session_(session),
|
||
|
last_received_packet_number_(0),
|
||
|
last_received_packet_size_(0),
|
||
|
no_packet_received_after_ping_(false),
|
||
|
previous_received_packet_size_(0),
|
||
|
largest_received_packet_number_(0),
|
||
|
num_out_of_order_received_packets_(0),
|
||
|
num_out_of_order_large_received_packets_(0),
|
||
|
num_packets_received_(0),
|
||
|
num_frames_received_(0),
|
||
|
num_duplicate_frames_received_(0),
|
||
|
num_incorrect_connection_ids_(0),
|
||
|
num_undecryptable_packets_(0),
|
||
|
num_duplicate_packets_(0),
|
||
|
num_blocked_frames_received_(0),
|
||
|
num_blocked_frames_sent_(0),
|
||
|
connection_description_(connection_description),
|
||
|
socket_performance_watcher_(std::move(socket_performance_watcher)),
|
||
|
net_log_is_capturing_(net_log_.IsCapturing()) {
|
||
|
timer_.Start(FROM_HERE, base::TimeDelta::FromSeconds(1), this,
|
||
|
&QuicConnectionLogger::UpdateIsCapturing);
|
||
|
}
|
||
|
|
||
|
QuicConnectionLogger::~QuicConnectionLogger() {
|
||
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicSession.OutOfOrderPacketsReceived",
|
||
|
num_out_of_order_received_packets_);
|
||
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicSession.OutOfOrderLargePacketsReceived",
|
||
|
num_out_of_order_large_received_packets_);
|
||
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicSession.IncorrectConnectionIDsReceived",
|
||
|
num_incorrect_connection_ids_);
|
||
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicSession.UndecryptablePacketsReceived",
|
||
|
num_undecryptable_packets_);
|
||
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicSession.DuplicatePacketsReceived",
|
||
|
num_duplicate_packets_);
|
||
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicSession.BlockedFrames.Received",
|
||
|
num_blocked_frames_received_);
|
||
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicSession.BlockedFrames.Sent",
|
||
|
num_blocked_frames_sent_);
|
||
|
|
||
|
const QuicConnectionStats& stats = session_->connection()->GetStats();
|
||
|
UMA_HISTOGRAM_TIMES("Net.QuicSession.MinRTT",
|
||
|
base::TimeDelta::FromMicroseconds(stats.min_rtt_us));
|
||
|
UMA_HISTOGRAM_TIMES("Net.QuicSession.SmoothedRTT",
|
||
|
base::TimeDelta::FromMicroseconds(stats.srtt_us));
|
||
|
|
||
|
if (num_frames_received_ > 0) {
|
||
|
int duplicate_stream_frame_per_thousand =
|
||
|
num_duplicate_frames_received_ * 1000 / num_frames_received_;
|
||
|
if (num_packets_received_ < 100) {
|
||
|
UMA_HISTOGRAM_CUSTOM_COUNTS(
|
||
|
"Net.QuicSession.StreamFrameDuplicatedShortConnection",
|
||
|
duplicate_stream_frame_per_thousand, 1, 1000, 75);
|
||
|
} else {
|
||
|
UMA_HISTOGRAM_CUSTOM_COUNTS(
|
||
|
"Net.QuicSession.StreamFrameDuplicatedLongConnection",
|
||
|
duplicate_stream_frame_per_thousand, 1, 1000, 75);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
RecordAggregatePacketLossRate();
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnFrameAddedToPacket(const QuicFrame& frame) {
|
||
|
switch (frame.type) {
|
||
|
case PADDING_FRAME:
|
||
|
break;
|
||
|
case STREAM_FRAME:
|
||
|
break;
|
||
|
case ACK_FRAME: {
|
||
|
break;
|
||
|
}
|
||
|
case RST_STREAM_FRAME:
|
||
|
UMA_HISTOGRAM_SPARSE_SLOWLY("Net.QuicSession.RstStreamErrorCodeClient",
|
||
|
frame.rst_stream_frame->error_code);
|
||
|
break;
|
||
|
case CONNECTION_CLOSE_FRAME:
|
||
|
break;
|
||
|
case GOAWAY_FRAME:
|
||
|
break;
|
||
|
case WINDOW_UPDATE_FRAME:
|
||
|
break;
|
||
|
case BLOCKED_FRAME:
|
||
|
++num_blocked_frames_sent_;
|
||
|
break;
|
||
|
case STOP_WAITING_FRAME:
|
||
|
break;
|
||
|
case PING_FRAME:
|
||
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.ConnectionFlowControlBlocked",
|
||
|
session_->IsConnectionFlowControlBlocked());
|
||
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.StreamFlowControlBlocked",
|
||
|
session_->IsStreamFlowControlBlocked());
|
||
|
break;
|
||
|
case MTU_DISCOVERY_FRAME:
|
||
|
break;
|
||
|
default:
|
||
|
DCHECK(false) << "Illegal frame type: " << frame.type;
|
||
|
}
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
switch (frame.type) {
|
||
|
case PADDING_FRAME:
|
||
|
break;
|
||
|
case STREAM_FRAME:
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_STREAM_FRAME_SENT,
|
||
|
base::Bind(&NetLogQuicStreamFrameCallback, frame.stream_frame));
|
||
|
break;
|
||
|
case ACK_FRAME: {
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_ACK_FRAME_SENT,
|
||
|
base::Bind(&NetLogQuicAckFrameCallback, frame.ack_frame));
|
||
|
break;
|
||
|
}
|
||
|
case RST_STREAM_FRAME:
|
||
|
UMA_HISTOGRAM_SPARSE_SLOWLY("Net.QuicSession.RstStreamErrorCodeClient",
|
||
|
frame.rst_stream_frame->error_code);
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_RST_STREAM_FRAME_SENT,
|
||
|
base::Bind(&NetLogQuicRstStreamFrameCallback,
|
||
|
frame.rst_stream_frame));
|
||
|
break;
|
||
|
case CONNECTION_CLOSE_FRAME:
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_CONNECTION_CLOSE_FRAME_SENT,
|
||
|
base::Bind(&NetLogQuicConnectionCloseFrameCallback,
|
||
|
frame.connection_close_frame));
|
||
|
break;
|
||
|
case GOAWAY_FRAME:
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_GOAWAY_FRAME_SENT,
|
||
|
base::Bind(&NetLogQuicGoAwayFrameCallback, frame.goaway_frame));
|
||
|
break;
|
||
|
case WINDOW_UPDATE_FRAME:
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_WINDOW_UPDATE_FRAME_SENT,
|
||
|
base::Bind(&NetLogQuicWindowUpdateFrameCallback,
|
||
|
frame.window_update_frame));
|
||
|
break;
|
||
|
case BLOCKED_FRAME:
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_BLOCKED_FRAME_SENT,
|
||
|
base::Bind(&NetLogQuicBlockedFrameCallback, frame.blocked_frame));
|
||
|
break;
|
||
|
case STOP_WAITING_FRAME:
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_STOP_WAITING_FRAME_SENT,
|
||
|
base::Bind(&NetLogQuicStopWaitingFrameCallback,
|
||
|
frame.stop_waiting_frame));
|
||
|
break;
|
||
|
case PING_FRAME:
|
||
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.ConnectionFlowControlBlocked",
|
||
|
session_->IsConnectionFlowControlBlocked());
|
||
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.StreamFlowControlBlocked",
|
||
|
session_->IsStreamFlowControlBlocked());
|
||
|
// PingFrame has no contents to log, so just record that it was sent.
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_PING_FRAME_SENT);
|
||
|
break;
|
||
|
case MTU_DISCOVERY_FRAME:
|
||
|
// MtuDiscoveryFrame is PingFrame on wire, it does not have any payload.
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_MTU_DISCOVERY_FRAME_SENT);
|
||
|
break;
|
||
|
default:
|
||
|
DCHECK(false) << "Illegal frame type: " << frame.type;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnPacketSent(
|
||
|
const SerializedPacket& serialized_packet,
|
||
|
QuicPacketNumber original_packet_number,
|
||
|
TransmissionType transmission_type,
|
||
|
QuicTime sent_time) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
if (original_packet_number == 0) {
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_PACKET_SENT,
|
||
|
base::Bind(&NetLogQuicPacketSentCallback, serialized_packet,
|
||
|
transmission_type, sent_time));
|
||
|
} else {
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_PACKET_RETRANSMITTED,
|
||
|
base::Bind(&NetLogQuicPacketRetransmittedCallback,
|
||
|
original_packet_number, serialized_packet.packet_number));
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnPingSent() {
|
||
|
no_packet_received_after_ping_ = true;
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnPacketReceived(
|
||
|
const QuicSocketAddress& self_address,
|
||
|
const QuicSocketAddress& peer_address,
|
||
|
const QuicEncryptedPacket& packet) {
|
||
|
if (local_address_from_self_.GetFamily() == ADDRESS_FAMILY_UNSPECIFIED) {
|
||
|
local_address_from_self_ = self_address.impl().socket_address();
|
||
|
UMA_HISTOGRAM_ENUMERATION(
|
||
|
"Net.QuicSession.ConnectionTypeFromSelf",
|
||
|
GetRealAddressFamily(self_address.impl().socket_address().address()),
|
||
|
ADDRESS_FAMILY_LAST);
|
||
|
}
|
||
|
|
||
|
previous_received_packet_size_ = last_received_packet_size_;
|
||
|
last_received_packet_size_ = packet.length();
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_PACKET_RECEIVED,
|
||
|
base::Bind(&NetLogQuicPacketCallback,
|
||
|
&self_address.impl().socket_address(),
|
||
|
&peer_address.impl().socket_address(), packet.length()));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnUnauthenticatedHeader(
|
||
|
const QuicPacketHeader& header) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED,
|
||
|
base::Bind(&NetLogQuicPacketHeaderCallback, &header));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnIncorrectConnectionId(
|
||
|
QuicConnectionId connection_id) {
|
||
|
++num_incorrect_connection_ids_;
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnUndecryptablePacket() {
|
||
|
++num_undecryptable_packets_;
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnDuplicatePacket(QuicPacketNumber packet_number) {
|
||
|
++num_duplicate_packets_;
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_DUPLICATE_PACKET_RECEIVED,
|
||
|
base::Bind(&NetLogQuicDuplicatePacketCallback, packet_number));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnProtocolVersionMismatch(
|
||
|
QuicTransportVersion received_version) {
|
||
|
// TODO(rtenneti): Add logging.
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnPacketHeader(const QuicPacketHeader& header) {
|
||
|
++num_packets_received_;
|
||
|
if (largest_received_packet_number_ < header.packet_number) {
|
||
|
QuicPacketNumber delta =
|
||
|
header.packet_number - largest_received_packet_number_;
|
||
|
if (delta > 1) {
|
||
|
// There is a gap between the largest packet previously received and
|
||
|
// the current packet. This indicates either loss, or out-of-order
|
||
|
// delivery.
|
||
|
UMA_HISTOGRAM_COUNTS_1M(
|
||
|
"Net.QuicSession.PacketGapReceived",
|
||
|
static_cast<base::HistogramBase::Sample>(delta - 1));
|
||
|
}
|
||
|
largest_received_packet_number_ = header.packet_number;
|
||
|
}
|
||
|
if (header.packet_number < received_packets_.size()) {
|
||
|
received_packets_[static_cast<size_t>(header.packet_number)] = true;
|
||
|
}
|
||
|
if (header.packet_number < last_received_packet_number_) {
|
||
|
++num_out_of_order_received_packets_;
|
||
|
if (previous_received_packet_size_ < last_received_packet_size_)
|
||
|
++num_out_of_order_large_received_packets_;
|
||
|
UMA_HISTOGRAM_COUNTS_1M(
|
||
|
"Net.QuicSession.OutOfOrderGapReceived",
|
||
|
static_cast<base::HistogramBase::Sample>(last_received_packet_number_ -
|
||
|
header.packet_number));
|
||
|
} else if (no_packet_received_after_ping_) {
|
||
|
UMA_HISTOGRAM_COUNTS_1M(
|
||
|
"Net.QuicSession.PacketGapReceivedNearPing",
|
||
|
static_cast<base::HistogramBase::Sample>(header.packet_number -
|
||
|
last_received_packet_number_));
|
||
|
no_packet_received_after_ping_ = false;
|
||
|
}
|
||
|
last_received_packet_number_ = header.packet_number;
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_PACKET_AUTHENTICATED);
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnStreamFrame(const QuicStreamFrame& frame) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_STREAM_FRAME_RECEIVED,
|
||
|
base::Bind(&NetLogQuicStreamFrameCallback, &frame));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnAckFrame(const QuicAckFrame& frame) {
|
||
|
|
||
|
const size_t kApproximateLargestSoloAckBytes = 100;
|
||
|
if (last_received_packet_number_ < received_acks_.size() &&
|
||
|
last_received_packet_size_ < kApproximateLargestSoloAckBytes) {
|
||
|
received_acks_[static_cast<size_t>(last_received_packet_number_)] = true;
|
||
|
}
|
||
|
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_ACK_FRAME_RECEIVED,
|
||
|
base::Bind(&NetLogQuicAckFrameCallback, &frame));
|
||
|
|
||
|
// TODO(rch, rtenneti) sort out histograms for QUIC_VERSION_34 and above.
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnStopWaitingFrame(
|
||
|
const QuicStopWaitingFrame& frame) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_STOP_WAITING_FRAME_RECEIVED,
|
||
|
base::Bind(&NetLogQuicStopWaitingFrameCallback, &frame));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnRstStreamFrame(const QuicRstStreamFrame& frame) {
|
||
|
UMA_HISTOGRAM_SPARSE_SLOWLY("Net.QuicSession.RstStreamErrorCodeServer",
|
||
|
frame.error_code);
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_RST_STREAM_FRAME_RECEIVED,
|
||
|
base::Bind(&NetLogQuicRstStreamFrameCallback, &frame));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnConnectionCloseFrame(
|
||
|
const QuicConnectionCloseFrame& frame) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_CONNECTION_CLOSE_FRAME_RECEIVED,
|
||
|
base::Bind(&NetLogQuicConnectionCloseFrameCallback, &frame));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnWindowUpdateFrame(
|
||
|
const QuicWindowUpdateFrame& frame,
|
||
|
const QuicTime& receive_time) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_WINDOW_UPDATE_FRAME_RECEIVED,
|
||
|
base::Bind(&NetLogQuicWindowUpdateFrameCallback, &frame));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnBlockedFrame(const QuicBlockedFrame& frame) {
|
||
|
++num_blocked_frames_received_;
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_BLOCKED_FRAME_RECEIVED,
|
||
|
base::Bind(&NetLogQuicBlockedFrameCallback, &frame));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
|
||
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.GoAwayReceivedForConnectionMigration",
|
||
|
frame.error_code == QUIC_ERROR_MIGRATING_PORT);
|
||
|
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_GOAWAY_FRAME_RECEIVED,
|
||
|
base::Bind(&NetLogQuicGoAwayFrameCallback, &frame));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnPingFrame(const QuicPingFrame& frame) {
|
||
|
// PingFrame has no contents to log, so just record that it was received.
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_PING_FRAME_RECEIVED);
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnPublicResetPacket(
|
||
|
const QuicPublicResetPacket& packet) {
|
||
|
UpdatePublicResetAddressMismatchHistogram(
|
||
|
local_address_from_shlo_, packet.client_address.impl().socket_address());
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_PUBLIC_RESET_PACKET_RECEIVED,
|
||
|
base::Bind(&NetLogQuicPublicResetPacketCallback,
|
||
|
&local_address_from_shlo_,
|
||
|
&packet.client_address.impl().socket_address()));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnVersionNegotiationPacket(
|
||
|
const QuicVersionNegotiationPacket& packet) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_VERSION_NEGOTIATION_PACKET_RECEIVED,
|
||
|
base::Bind(&NetLogQuicVersionNegotiationPacketCallback, &packet));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnCryptoHandshakeMessageReceived(
|
||
|
const CryptoHandshakeMessage& message) {
|
||
|
if (message.tag() == kSHLO) {
|
||
|
QuicStringPiece address;
|
||
|
QuicSocketAddressCoder decoder;
|
||
|
if (message.GetStringPiece(kCADR, &address) &&
|
||
|
decoder.Decode(address.data(), address.size())) {
|
||
|
local_address_from_shlo_ =
|
||
|
IPEndPoint(decoder.ip().impl().ip_address(), decoder.port());
|
||
|
UMA_HISTOGRAM_ENUMERATION(
|
||
|
"Net.QuicSession.ConnectionTypeFromPeer",
|
||
|
GetRealAddressFamily(local_address_from_shlo_.address()),
|
||
|
ADDRESS_FAMILY_LAST);
|
||
|
}
|
||
|
}
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_CRYPTO_HANDSHAKE_MESSAGE_RECEIVED,
|
||
|
base::Bind(&NetLogQuicCryptoHandshakeMessageCallback, &message));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnCryptoHandshakeMessageSent(
|
||
|
const CryptoHandshakeMessage& message) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_CRYPTO_HANDSHAKE_MESSAGE_SENT,
|
||
|
base::Bind(&NetLogQuicCryptoHandshakeMessageCallback, &message));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnConnectionClosed(QuicErrorCode error,
|
||
|
const string& error_details,
|
||
|
ConnectionCloseSource source) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_CLOSED,
|
||
|
base::Bind(&NetLogQuicOnConnectionClosedCallback, error, source));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnSuccessfulVersionNegotiation(
|
||
|
const QuicTransportVersion& version) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
string quic_version = QuicVersionToString(version);
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_VERSION_NEGOTIATED,
|
||
|
NetLog::StringCallback("version", &quic_version));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::UpdateReceivedFrameCounts(
|
||
|
QuicStreamId stream_id,
|
||
|
int num_frames_received,
|
||
|
int num_duplicate_frames_received) {
|
||
|
if (stream_id != kCryptoStreamId) {
|
||
|
num_frames_received_ += num_frames_received;
|
||
|
num_duplicate_frames_received_ += num_duplicate_frames_received;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnCertificateVerified(
|
||
|
const CertVerifyResult& result) {
|
||
|
if (!net_log_is_capturing_)
|
||
|
return;
|
||
|
if (result.cert_status == CERT_STATUS_INVALID) {
|
||
|
net_log_.AddEvent(NetLogEventType::QUIC_SESSION_CERTIFICATE_VERIFY_FAILED);
|
||
|
return;
|
||
|
}
|
||
|
net_log_.AddEvent(
|
||
|
NetLogEventType::QUIC_SESSION_CERTIFICATE_VERIFIED,
|
||
|
base::Bind(&NetLogQuicCertificateVerifiedCallback, result.verified_cert));
|
||
|
}
|
||
|
|
||
|
base::HistogramBase* QuicConnectionLogger::Get6PacketHistogram(
|
||
|
const char* which_6) const {
|
||
|
// This histogram takes a binary encoding of the 6 consecutive packets
|
||
|
// received. As a result, there are 64 possible sample-patterns.
|
||
|
string prefix("Net.QuicSession.6PacketsPatternsReceived_");
|
||
|
return base::LinearHistogram::FactoryGet(
|
||
|
prefix + which_6 + connection_description_, 1, 64, 65,
|
||
|
base::HistogramBase::kUmaTargetedHistogramFlag);
|
||
|
}
|
||
|
|
||
|
float QuicConnectionLogger::ReceivedPacketLossRate() const {
|
||
|
if (largest_received_packet_number_ <= num_packets_received_)
|
||
|
return 0.0f;
|
||
|
float num_received = largest_received_packet_number_ - num_packets_received_;
|
||
|
return num_received / largest_received_packet_number_;
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::OnRttChanged(QuicTime::Delta rtt) const {
|
||
|
// Notify socket performance watcher of the updated RTT value.
|
||
|
if (!socket_performance_watcher_)
|
||
|
return;
|
||
|
|
||
|
int64_t microseconds = rtt.ToMicroseconds();
|
||
|
if (microseconds != 0 &&
|
||
|
socket_performance_watcher_->ShouldNotifyUpdatedRTT()) {
|
||
|
socket_performance_watcher_->OnUpdatedRTTAvailable(
|
||
|
base::TimeDelta::FromMicroseconds(rtt.ToMicroseconds()));
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::RecordAggregatePacketLossRate() const {
|
||
|
// For short connections under 22 packets in length, we'll rely on the
|
||
|
// Net.QuicSession.21CumulativePacketsReceived_* histogram to indicate packet
|
||
|
// loss rates. This way we avoid tremendously anomalous contributions to our
|
||
|
// histogram. (e.g., if we only got 5 packets, but lost 1, we'd otherwise
|
||
|
// record a 20% loss in this histogram!). We may still get some strange data
|
||
|
// (1 loss in 22 is still high :-/).
|
||
|
if (largest_received_packet_number_ <= 21)
|
||
|
return;
|
||
|
|
||
|
string prefix("Net.QuicSession.PacketLossRate_");
|
||
|
base::HistogramBase* histogram = base::Histogram::FactoryGet(
|
||
|
prefix + connection_description_, 1, 1000, 75,
|
||
|
base::HistogramBase::kUmaTargetedHistogramFlag);
|
||
|
histogram->Add(static_cast<base::HistogramBase::Sample>(
|
||
|
ReceivedPacketLossRate() * 1000));
|
||
|
}
|
||
|
|
||
|
void QuicConnectionLogger::UpdateIsCapturing() {
|
||
|
net_log_is_capturing_ = net_log_.IsCapturing();
|
||
|
}
|
||
|
|
||
|
} // namespace net
|