Skip to main content

quiche/
path.rs

1// Copyright (C) 2022, Cloudflare, Inc.
2// All rights reserved.
3//
4// Redistribution and use in source and binary forms, with or without
5// modification, are permitted provided that the following conditions are
6// met:
7//
8//     * Redistributions of source code must retain the above copyright notice,
9//       this list of conditions and the following disclaimer.
10//
11//     * Redistributions in binary form must reproduce the above copyright
12//       notice, this list of conditions and the following disclaimer in the
13//       documentation and/or other materials provided with the distribution.
14//
15// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
16// IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
17// THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18// PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
19// CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
20// EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
21// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
22// PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
23// LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
24// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
25// SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
27use std::collections::BTreeMap;
28use std::collections::VecDeque;
29
30use std::net::SocketAddr;
31
32use std::time::Duration;
33use std::time::Instant;
34
35use smallvec::SmallVec;
36
37use slab::Slab;
38
39use crate::Config;
40use crate::Error;
41use crate::Result;
42use crate::StartupExit;
43
44use crate::pmtud;
45use crate::recovery;
46use crate::recovery::Bandwidth;
47use crate::recovery::HandshakeStatus;
48use crate::recovery::OnLossDetectionTimeoutOutcome;
49use crate::recovery::RecoveryOps;
50
51/// The different states of the path validation.
52#[derive(Debug, Copy, Clone, PartialEq, Eq, PartialOrd, Ord)]
53pub enum PathState {
54    /// The path failed its validation.
55    Failed,
56
57    /// The path exists, but no path validation has been performed.
58    Unknown,
59
60    /// The path is under validation.
61    Validating,
62
63    /// The remote address has been validated, but not the path MTU.
64    ValidatingMTU,
65
66    /// The path has been validated.
67    Validated,
68}
69
70impl PathState {
71    #[cfg(feature = "ffi")]
72    pub fn to_c(self) -> libc::ssize_t {
73        match self {
74            PathState::Failed => -1,
75            PathState::Unknown => 0,
76            PathState::Validating => 1,
77            PathState::ValidatingMTU => 2,
78            PathState::Validated => 3,
79        }
80    }
81}
82
83/// A path-specific event.
84#[derive(Clone, Debug, PartialEq, Eq)]
85pub enum PathEvent {
86    /// A new network path (local address, peer address) has been seen on a
87    /// received packet. Note that this event is only triggered for servers, as
88    /// the client is responsible from initiating new paths. The application may
89    /// then probe this new path, if desired.
90    New(SocketAddr, SocketAddr),
91
92    /// The related network path between local `SocketAddr` and peer
93    /// `SocketAddr` has been validated.
94    Validated(SocketAddr, SocketAddr),
95
96    /// The related network path between local `SocketAddr` and peer
97    /// `SocketAddr` failed to be validated. This network path will not be used
98    /// anymore, unless the application requests probing this path again.
99    FailedValidation(SocketAddr, SocketAddr),
100
101    /// The related network path between local `SocketAddr` and peer
102    /// `SocketAddr` has been closed and is now unusable on this connection.
103    Closed(SocketAddr, SocketAddr),
104
105    /// The stack observes that the Source Connection ID with the given sequence
106    /// number, initially used by the peer over the first pair of `SocketAddr`s,
107    /// is now reused over the second pair of `SocketAddr`s.
108    ReusedSourceConnectionId(
109        u64,
110        (SocketAddr, SocketAddr),
111        (SocketAddr, SocketAddr),
112    ),
113
114    /// The connection observed that the peer migrated over the network path
115    /// denoted by the pair of `SocketAddr`, i.e., non-probing packets have been
116    /// received on this network path. This is a server side only event.
117    ///
118    /// Note that this event is only raised if the path has been validated.
119    PeerMigrated(SocketAddr, SocketAddr),
120}
121
122/// A network path on which QUIC packets can be sent.
123#[derive(Debug)]
124pub struct Path {
125    /// The local address.
126    local_addr: SocketAddr,
127
128    /// The remote address.
129    peer_addr: SocketAddr,
130
131    /// Source CID sequence number used over that path.
132    pub active_scid_seq: Option<u64>,
133
134    /// Destination CID sequence number used over that path.
135    pub active_dcid_seq: Option<u64>,
136
137    /// The current validation state of the path.
138    state: PathState,
139
140    /// Is this path used to send non-probing packets.
141    active: bool,
142
143    /// Loss recovery and congestion control state.
144    pub recovery: recovery::Recovery,
145
146    /// Path MTU discovery state. None if PMTUD is disabled on the path.
147    pub pmtud: Option<pmtud::Pmtud>,
148
149    /// Pending challenge data with the size of the packet containing them and
150    /// when they were sent.
151    in_flight_challenges: VecDeque<([u8; 8], usize, Instant)>,
152
153    /// The maximum challenge size that got acknowledged.
154    max_challenge_size: usize,
155
156    /// Number of consecutive (spaced by at least 1 RTT) probing packets lost.
157    probing_lost: usize,
158
159    /// Last instant when a probing packet got lost.
160    last_probe_lost_time: Option<Instant>,
161
162    /// Received challenge data.
163    received_challenges: VecDeque<[u8; 8]>,
164
165    /// Max length of received challenges queue.
166    received_challenges_max_len: usize,
167
168    /// Number of packets sent on this path.
169    pub sent_count: usize,
170
171    /// Number of packets received on this path.
172    pub recv_count: usize,
173
174    /// Total number of packets sent with data retransmitted from this path.
175    pub retrans_count: usize,
176
177    /// Total number of times PTO (probe timeout) fired.
178    ///
179    /// Loss usually happens in a burst so the number of packets lost will
180    /// depend on the volume of inflight packets at the time of loss (which
181    /// can be arbitrary). PTO count measures the number of loss events and
182    /// provides a normalized loss metric.
183    pub total_pto_count: usize,
184
185    /// Number of DATAGRAM frames sent on this path.
186    pub dgram_sent_count: usize,
187
188    /// Number of DATAGRAM frames marked lost on this path.
189    pub dgram_lost_count: usize,
190
191    /// Number of DATAGRAM frames received on this path.
192    pub dgram_recv_count: usize,
193
194    /// Total number of sent bytes over this path.
195    pub sent_bytes: u64,
196
197    /// Total number of bytes received over this path.
198    pub recv_bytes: u64,
199
200    /// Total number of bytes retransmitted from this path.
201    /// This counts only STREAM and CRYPTO data.
202    pub stream_retrans_bytes: u64,
203
204    /// Total number of bytes the server can send before the peer's address
205    /// is verified.
206    pub max_send_bytes: usize,
207
208    /// Whether the peer's address has been verified.
209    pub verified_peer_address: bool,
210
211    /// Whether the peer has verified our address.
212    pub peer_verified_local_address: bool,
213
214    /// Does it requires sending PATH_CHALLENGE?
215    challenge_requested: bool,
216
217    /// Whether the failure of this path was notified.
218    failure_notified: bool,
219
220    /// Whether the connection tries to migrate to this path, but it still needs
221    /// to be validated.
222    migrating: bool,
223
224    /// Whether or not we should force eliciting of an ACK (e.g. via PING frame)
225    pub needs_ack_eliciting: bool,
226}
227
228impl Path {
229    /// Create a new Path instance with the provided addresses, the remaining of
230    /// the fields being set to their default value.
231    pub fn new(
232        local_addr: SocketAddr, peer_addr: SocketAddr,
233        recovery_config: &recovery::RecoveryConfig,
234        path_challenge_recv_max_queue_len: usize, is_initial: bool,
235        config: Option<&Config>,
236    ) -> Self {
237        let (state, active_scid_seq, active_dcid_seq) = if is_initial {
238            (PathState::Validated, Some(0), Some(0))
239        } else {
240            (PathState::Unknown, None, None)
241        };
242
243        let pmtud = config.and_then(|c| {
244            if c.pmtud {
245                let maximum_supported_mtu: usize = std::cmp::min(
246                    // if the max_udp_payload_size doesn't fit into a usize, then
247                    // max_send_udp_payload_size must be smaller so use that
248                    c.local_transport_params
249                        .max_udp_payload_size
250                        .try_into()
251                        .unwrap_or(c.max_send_udp_payload_size),
252                    c.max_send_udp_payload_size,
253                );
254                Some(pmtud::Pmtud::new(maximum_supported_mtu, c.pmtud_max_probes))
255            } else {
256                None
257            }
258        });
259
260        Self {
261            local_addr,
262            peer_addr,
263            active_scid_seq,
264            active_dcid_seq,
265            state,
266            active: false,
267            recovery: recovery::Recovery::new_with_config(recovery_config),
268            pmtud,
269            in_flight_challenges: VecDeque::new(),
270            max_challenge_size: 0,
271            probing_lost: 0,
272            last_probe_lost_time: None,
273            received_challenges: VecDeque::with_capacity(
274                path_challenge_recv_max_queue_len,
275            ),
276            received_challenges_max_len: path_challenge_recv_max_queue_len,
277            sent_count: 0,
278            recv_count: 0,
279            retrans_count: 0,
280            total_pto_count: 0,
281            dgram_sent_count: 0,
282            dgram_lost_count: 0,
283            dgram_recv_count: 0,
284            sent_bytes: 0,
285            recv_bytes: 0,
286            stream_retrans_bytes: 0,
287            max_send_bytes: 0,
288            verified_peer_address: false,
289            peer_verified_local_address: false,
290            challenge_requested: false,
291            failure_notified: false,
292            migrating: false,
293            needs_ack_eliciting: false,
294        }
295    }
296
297    /// Returns the local address on which this path operates.
298    #[inline]
299    pub fn local_addr(&self) -> SocketAddr {
300        self.local_addr
301    }
302
303    /// Returns the peer address on which this path operates.
304    #[inline]
305    pub fn peer_addr(&self) -> SocketAddr {
306        self.peer_addr
307    }
308
309    /// Returns whether the path is working (i.e., not failed).
310    #[inline]
311    fn working(&self) -> bool {
312        self.state > PathState::Failed
313    }
314
315    /// Returns whether the path is active.
316    #[inline]
317    pub fn active(&self) -> bool {
318        self.active && self.working() && self.active_dcid_seq.is_some()
319    }
320
321    /// Returns whether the path can be used to send non-probing packets.
322    #[inline]
323    pub fn usable(&self) -> bool {
324        self.active() ||
325            (self.state == PathState::Validated &&
326                self.active_dcid_seq.is_some())
327    }
328
329    /// Returns whether the path is unused.
330    #[inline]
331    fn unused(&self) -> bool {
332        // FIXME: we should check that there is nothing in the sent queue.
333        !self.active() && self.active_dcid_seq.is_none()
334    }
335
336    /// Returns whether the path requires sending a probing packet.
337    #[inline]
338    pub fn probing_required(&self) -> bool {
339        !self.received_challenges.is_empty() || self.validation_requested()
340    }
341
342    /// Promotes the path to the provided state only if the new state is greater
343    /// than the current one.
344    fn promote_to(&mut self, state: PathState) {
345        if self.state < state {
346            self.state = state;
347        }
348    }
349
350    /// Returns whether the path is validated.
351    #[inline]
352    pub fn validated(&self) -> bool {
353        self.state == PathState::Validated
354    }
355
356    /// Returns whether this path failed its validation.
357    #[inline]
358    fn validation_failed(&self) -> bool {
359        self.state == PathState::Failed
360    }
361
362    // Returns whether this path is under path validation process.
363    #[inline]
364    pub fn under_validation(&self) -> bool {
365        matches!(self.state, PathState::Validating | PathState::ValidatingMTU)
366    }
367
368    /// Requests path validation.
369    #[inline]
370    pub fn request_validation(&mut self) {
371        self.challenge_requested = true;
372    }
373
374    /// Returns whether a validation is requested.
375    #[inline]
376    pub fn validation_requested(&self) -> bool {
377        self.challenge_requested
378    }
379
380    pub fn should_send_pmtu_probe(
381        &mut self, hs_confirmed: bool, hs_done: bool, out_len: usize,
382        is_closing: bool, frames_empty: bool,
383    ) -> bool {
384        let Some(pmtud) = self.pmtud.as_mut() else {
385            return false;
386        };
387
388        (hs_confirmed && hs_done) &&
389            self.recovery.cwnd_available() > pmtud.get_probe_size() &&
390            out_len >= pmtud.get_probe_size() &&
391            pmtud.should_probe() &&
392            !is_closing &&
393            frames_empty
394    }
395
396    pub fn on_challenge_sent(&mut self) {
397        self.promote_to(PathState::Validating);
398        self.challenge_requested = false;
399    }
400
401    /// Handles the sending of PATH_CHALLENGE.
402    pub fn add_challenge_sent(
403        &mut self, data: [u8; 8], pkt_size: usize, sent_time: Instant,
404    ) {
405        self.on_challenge_sent();
406        self.in_flight_challenges
407            .push_back((data, pkt_size, sent_time));
408    }
409
410    pub fn on_challenge_received(&mut self, data: [u8; 8]) {
411        // Discard challenges that would cause us to queue more than we want.
412        if self.received_challenges.len() == self.received_challenges_max_len {
413            return;
414        }
415
416        self.received_challenges.push_back(data);
417        self.peer_verified_local_address = true;
418    }
419
420    pub fn has_pending_challenge(&self, data: [u8; 8]) -> bool {
421        self.in_flight_challenges.iter().any(|(d, ..)| *d == data)
422    }
423
424    /// Returns whether the path is now validated.
425    pub fn on_response_received(&mut self, data: [u8; 8]) -> bool {
426        self.verified_peer_address = true;
427        self.probing_lost = 0;
428
429        let mut challenge_size = 0;
430        self.in_flight_challenges.retain(|(d, s, _)| {
431            if *d == data {
432                challenge_size = *s;
433                false
434            } else {
435                true
436            }
437        });
438
439        // The 4-tuple is reachable, but we didn't check Path MTU yet.
440        self.promote_to(PathState::ValidatingMTU);
441
442        self.max_challenge_size =
443            std::cmp::max(self.max_challenge_size, challenge_size);
444
445        if self.state == PathState::ValidatingMTU {
446            if self.max_challenge_size >= crate::MIN_CLIENT_INITIAL_LEN {
447                // Path MTU is sufficient for QUIC traffic.
448                self.promote_to(PathState::Validated);
449                return true;
450            }
451
452            // If the MTU was not validated, probe again.
453            self.request_validation();
454        }
455
456        false
457    }
458
459    fn on_failed_validation(&mut self) {
460        self.state = PathState::Failed;
461        self.active = false;
462    }
463
464    #[inline]
465    pub fn pop_received_challenge(&mut self) -> Option<[u8; 8]> {
466        self.received_challenges.pop_front()
467    }
468
469    pub fn on_loss_detection_timeout(
470        &mut self, handshake_status: HandshakeStatus, now: Instant,
471        is_server: bool, trace_id: &str,
472    ) -> OnLossDetectionTimeoutOutcome {
473        let outcome = self.recovery.on_loss_detection_timeout(
474            handshake_status,
475            now,
476            trace_id,
477        );
478
479        let mut lost_probe_time = None;
480        self.in_flight_challenges.retain(|(_, _, sent_time)| {
481            if *sent_time <= now {
482                if lost_probe_time.is_none() {
483                    lost_probe_time = Some(*sent_time);
484                }
485                false
486            } else {
487                true
488            }
489        });
490
491        // If we lost probing packets, check if the path failed
492        // validation.
493        if let Some(lost_probe_time) = lost_probe_time {
494            self.last_probe_lost_time = match self.last_probe_lost_time {
495                Some(last) => {
496                    // Count a loss if at least 1-RTT happened.
497                    if lost_probe_time - last >= self.recovery.rtt() {
498                        self.probing_lost += 1;
499                        Some(lost_probe_time)
500                    } else {
501                        Some(last)
502                    }
503                },
504                None => {
505                    self.probing_lost += 1;
506                    Some(lost_probe_time)
507                },
508            };
509            // As a server, if requesting a challenge is not
510            // possible due to the amplification attack, declare the
511            // validation as failed.
512            if self.probing_lost >= crate::MAX_PROBING_TIMEOUTS ||
513                (is_server && self.max_send_bytes < crate::MIN_PROBING_SIZE)
514            {
515                self.on_failed_validation();
516            } else {
517                self.request_validation();
518            }
519        }
520
521        // Track PTO timeout event
522        self.total_pto_count += 1;
523
524        outcome
525    }
526
527    /// Returns true if the path's recovery module hasn't processed any non-ACK
528    /// packets, and it is still OK to fully reinitialize the recovery module to
529    /// pickup changes to congestion control config.
530    pub fn can_reinit_recovery(&self) -> bool {
531        // The recovery module can be reinitialized until the connection attempts
532        // to send a packet with inflight data. The congestion
533        // controller doesn't track anything interesting until inflight
534        // data is sent. Handshake ACKs may be sent prior to arrival of
535        // the full ClientHello, but the send of ACK only packets
536        // shouldn't prevent the reinit of the recovery module.
537        self.recovery.bytes_in_flight() == 0 &&
538            self.recovery.bytes_in_flight_duration() == Duration::ZERO
539    }
540
541    pub fn reinit_recovery(
542        &mut self, recovery_config: &recovery::RecoveryConfig,
543    ) {
544        self.recovery = recovery::Recovery::new_with_config(recovery_config)
545    }
546
547    pub fn stats(&self) -> PathStats {
548        let pmtu = match self.pmtud.as_ref().map(|p| p.get_current_mtu()) {
549            Some(v) => v,
550
551            None => self.recovery.max_datagram_size(),
552        };
553
554        PathStats {
555            local_addr: self.local_addr,
556            peer_addr: self.peer_addr,
557            validation_state: self.state,
558            active: self.active,
559            recv: self.recv_count,
560            sent: self.sent_count,
561            lost: self.recovery.lost_count(),
562            retrans: self.retrans_count,
563            total_pto_count: self.total_pto_count,
564            dgram_recv: self.dgram_recv_count,
565            dgram_sent: self.dgram_sent_count,
566            dgram_lost: self.dgram_lost_count,
567            rtt: self.recovery.rtt(),
568            min_rtt: self.recovery.min_rtt(),
569            max_rtt: self.recovery.max_rtt(),
570            rttvar: self.recovery.rttvar(),
571            cwnd: self.recovery.cwnd(),
572            sent_bytes: self.sent_bytes,
573            recv_bytes: self.recv_bytes,
574            lost_bytes: self.recovery.bytes_lost(),
575            stream_retrans_bytes: self.stream_retrans_bytes,
576            pmtu,
577            delivery_rate: self.recovery.delivery_rate().to_bytes_per_second(),
578            max_bandwidth: self
579                .recovery
580                .max_bandwidth()
581                .map(Bandwidth::to_bytes_per_second),
582            startup_exit: self.recovery.startup_exit(),
583        }
584    }
585
586    pub fn bytes_in_flight_duration(&self) -> Duration {
587        self.recovery.bytes_in_flight_duration()
588    }
589}
590
591/// An iterator over SocketAddr.
592#[derive(Default)]
593pub struct SocketAddrIter {
594    pub(crate) sockaddrs: SmallVec<[SocketAddr; 8]>,
595    pub(crate) index: usize,
596}
597
598impl Iterator for SocketAddrIter {
599    type Item = SocketAddr;
600
601    #[inline]
602    fn next(&mut self) -> Option<Self::Item> {
603        let v = self.sockaddrs.get(self.index)?;
604        self.index += 1;
605        Some(*v)
606    }
607}
608
609impl ExactSizeIterator for SocketAddrIter {
610    #[inline]
611    fn len(&self) -> usize {
612        self.sockaddrs.len() - self.index
613    }
614}
615
616/// All path-related information.
617pub struct PathMap {
618    /// The paths of the connection. Each of them has an internal identifier
619    /// that is used by `addrs_to_paths` and `ConnectionEntry`.
620    paths: Slab<Path>,
621
622    /// The maximum number of concurrent paths allowed.
623    max_concurrent_paths: usize,
624
625    /// The mapping from the (local `SocketAddr`, peer `SocketAddr`) to the
626    /// `Path` structure identifier.
627    addrs_to_paths: BTreeMap<(SocketAddr, SocketAddr), usize>,
628
629    /// Path-specific events to be notified to the application.
630    events: VecDeque<PathEvent>,
631
632    /// Whether this manager serves a connection as a server.
633    is_server: bool,
634}
635
636impl PathMap {
637    /// Creates a new `PathMap` with the initial provided `path` and a
638    /// capacity limit.
639    pub fn new(
640        mut initial_path: Path, max_concurrent_paths: usize, is_server: bool,
641    ) -> Self {
642        let mut paths = Slab::with_capacity(1); // most connections only have one path
643        let mut addrs_to_paths = BTreeMap::new();
644
645        let local_addr = initial_path.local_addr;
646        let peer_addr = initial_path.peer_addr;
647
648        // As it is the first path, it is active by default.
649        initial_path.active = true;
650
651        let active_path_id = paths.insert(initial_path);
652        addrs_to_paths.insert((local_addr, peer_addr), active_path_id);
653
654        Self {
655            paths,
656            max_concurrent_paths,
657            addrs_to_paths,
658            events: VecDeque::new(),
659            is_server,
660        }
661    }
662
663    /// Gets an immutable reference to the path identified by `path_id`. If the
664    /// provided `path_id` does not identify any current `Path`, returns an
665    /// [`InvalidState`].
666    ///
667    /// [`InvalidState`]: enum.Error.html#variant.InvalidState
668    #[inline]
669    pub fn get(&self, path_id: usize) -> Result<&Path> {
670        self.paths.get(path_id).ok_or(Error::InvalidState)
671    }
672
673    /// Gets a mutable reference to the path identified by `path_id`. If the
674    /// provided `path_id` does not identify any current `Path`, returns an
675    /// [`InvalidState`].
676    ///
677    /// [`InvalidState`]: enum.Error.html#variant.InvalidState
678    #[inline]
679    pub fn get_mut(&mut self, path_id: usize) -> Result<&mut Path> {
680        self.paths.get_mut(path_id).ok_or(Error::InvalidState)
681    }
682
683    #[inline]
684    /// Gets an immutable reference to the active path with the value of the
685    /// lowest identifier. If there is no active path, returns `None`.
686    pub fn get_active_with_pid(&self) -> Option<(usize, &Path)> {
687        self.paths.iter().find(|(_, p)| p.active())
688    }
689
690    /// Gets an immutable reference to the active path with the lowest
691    /// identifier. If there is no active path, returns an [`InvalidState`].
692    ///
693    /// [`InvalidState`]: enum.Error.html#variant.InvalidState
694    #[inline]
695    pub fn get_active(&self) -> Result<&Path> {
696        self.get_active_with_pid()
697            .map(|(_, p)| p)
698            .ok_or(Error::InvalidState)
699    }
700
701    /// Gets the lowest active path identifier. If there is no active path,
702    /// returns an [`InvalidState`].
703    ///
704    /// [`InvalidState`]: enum.Error.html#variant.InvalidState
705    #[inline]
706    pub fn get_active_path_id(&self) -> Result<usize> {
707        self.get_active_with_pid()
708            .map(|(pid, _)| pid)
709            .ok_or(Error::InvalidState)
710    }
711
712    /// Gets an mutable reference to the active path with the lowest identifier.
713    /// If there is no active path, returns an [`InvalidState`].
714    ///
715    /// [`InvalidState`]: enum.Error.html#variant.InvalidState
716    #[inline]
717    pub fn get_active_mut(&mut self) -> Result<&mut Path> {
718        self.paths
719            .iter_mut()
720            .map(|(_, p)| p)
721            .find(|p| p.active())
722            .ok_or(Error::InvalidState)
723    }
724
725    /// Returns an iterator over all existing paths.
726    #[inline]
727    pub fn iter(&self) -> slab::Iter<'_, Path> {
728        self.paths.iter()
729    }
730
731    /// Returns a mutable iterator over all existing paths.
732    #[inline]
733    pub fn iter_mut(&mut self) -> slab::IterMut<'_, Path> {
734        self.paths.iter_mut()
735    }
736
737    /// Returns the number of existing paths.
738    #[inline]
739    pub fn len(&self) -> usize {
740        self.paths.len()
741    }
742
743    /// Returns the `Path` identifier related to the provided `addrs`.
744    #[inline]
745    pub fn path_id_from_addrs(
746        &self, addrs: &(SocketAddr, SocketAddr),
747    ) -> Option<usize> {
748        self.addrs_to_paths.get(addrs).copied()
749    }
750
751    /// Checks if creating a new path will not exceed the current `self.paths`
752    /// capacity. If yes, this method tries to remove one unused path. If it
753    /// fails to do so, returns [`Done`].
754    ///
755    /// [`Done`]: enum.Error.html#variant.Done
756    fn make_room_for_new_path(&mut self) -> Result<()> {
757        if self.paths.len() < self.max_concurrent_paths {
758            return Ok(());
759        }
760
761        let (pid_to_remove, _) = self
762            .paths
763            .iter()
764            .find(|(_, p)| p.unused())
765            .ok_or(Error::Done)?;
766
767        let path = self.paths.remove(pid_to_remove);
768        self.addrs_to_paths
769            .remove(&(path.local_addr, path.peer_addr));
770
771        self.notify_event(PathEvent::Closed(path.local_addr, path.peer_addr));
772
773        Ok(())
774    }
775
776    /// Records the provided `Path` and returns its assigned identifier.
777    ///
778    /// On success, this method takes care of creating a notification to the
779    /// serving application, if it serves a server-side connection.
780    ///
781    /// If there are already `max_concurrent_paths` currently recorded, this
782    /// method tries to remove an unused `Path` first. If it fails to do so,
783    /// it returns [`Done`].
784    ///
785    /// [`Done`]: enum.Error.html#variant.Done
786    pub fn insert_path(&mut self, path: Path, is_server: bool) -> Result<usize> {
787        self.make_room_for_new_path()?;
788
789        let local_addr = path.local_addr;
790        let peer_addr = path.peer_addr;
791
792        let pid = self.paths.insert(path);
793        self.addrs_to_paths.insert((local_addr, peer_addr), pid);
794
795        // Notifies the application if we are in server mode.
796        if is_server {
797            self.notify_event(PathEvent::New(local_addr, peer_addr));
798        }
799
800        Ok(pid)
801    }
802
803    /// Notifies a path event to the application served by the connection.
804    pub fn notify_event(&mut self, ev: PathEvent) {
805        self.events.push_back(ev);
806    }
807
808    /// Gets the first path event to be notified to the application.
809    pub fn pop_event(&mut self) -> Option<PathEvent> {
810        self.events.pop_front()
811    }
812
813    /// Notifies all failed validations to the application.
814    pub fn notify_failed_validations(&mut self) {
815        let validation_failed = self
816            .paths
817            .iter_mut()
818            .filter(|(_, p)| p.validation_failed() && !p.failure_notified);
819
820        for (_, p) in validation_failed {
821            self.events.push_back(PathEvent::FailedValidation(
822                p.local_addr,
823                p.peer_addr,
824            ));
825
826            p.failure_notified = true;
827        }
828    }
829
830    /// Finds a path candidate to be active and returns its identifier.
831    pub fn find_candidate_path(&self) -> Option<usize> {
832        // TODO: also consider unvalidated paths if there are no more validated.
833        self.paths
834            .iter()
835            .find(|(_, p)| p.usable())
836            .map(|(pid, _)| pid)
837    }
838
839    /// Handles incoming PATH_RESPONSE data.
840    pub fn on_response_received(&mut self, data: [u8; 8]) -> Result<()> {
841        let active_pid = self.get_active_path_id()?;
842
843        let challenge_pending =
844            self.iter_mut().find(|(_, p)| p.has_pending_challenge(data));
845
846        if let Some((pid, p)) = challenge_pending {
847            if p.on_response_received(data) {
848                let local_addr = p.local_addr;
849                let peer_addr = p.peer_addr;
850                let was_migrating = p.migrating;
851
852                p.migrating = false;
853
854                // Notifies the application.
855                self.notify_event(PathEvent::Validated(local_addr, peer_addr));
856
857                // If this path was the candidate for migration, notifies the
858                // application.
859                if pid == active_pid && was_migrating {
860                    self.notify_event(PathEvent::PeerMigrated(
861                        local_addr, peer_addr,
862                    ));
863                }
864            }
865        }
866        Ok(())
867    }
868
869    /// Sets the path with identifier 'path_id' to be active.
870    ///
871    /// There can be exactly one active path on which non-probing packets can be
872    /// sent. If another path is marked as active, it will be superseded by the
873    /// one having `path_id` as identifier.
874    ///
875    /// A server should always ensure that the active path is validated. If it
876    /// is already the case, it notifies the application that the connection
877    /// migrated. Otherwise, it triggers a path validation and defers the
878    /// notification once it is actually validated.
879    pub fn set_active_path(&mut self, path_id: usize) -> Result<()> {
880        let is_server = self.is_server;
881
882        if let Ok(old_active_path) = self.get_active_mut() {
883            old_active_path.active = false;
884        }
885
886        let new_active_path = self.get_mut(path_id)?;
887        new_active_path.active = true;
888
889        if is_server {
890            if new_active_path.validated() {
891                let local_addr = new_active_path.local_addr();
892                let peer_addr = new_active_path.peer_addr();
893
894                self.notify_event(PathEvent::PeerMigrated(local_addr, peer_addr));
895            } else {
896                new_active_path.migrating = true;
897
898                // Requests path validation if needed.
899                if !new_active_path.under_validation() {
900                    new_active_path.request_validation();
901                }
902            }
903        }
904
905        Ok(())
906    }
907
908    /// Configures path MTU discovery on all existing paths.
909    pub fn set_discover_pmtu_on_existing_paths(
910        &mut self, discover: bool, max_send_udp_payload_size: usize,
911        pmtud_max_probes: u8,
912    ) {
913        for (_, path) in self.paths.iter_mut() {
914            path.pmtud = if discover {
915                Some(pmtud::Pmtud::new(
916                    max_send_udp_payload_size,
917                    pmtud_max_probes,
918                ))
919            } else {
920                None
921            };
922        }
923    }
924}
925
926/// Statistics about the path of a connection.
927///
928/// A connection’s path statistics can be collected using the [`path_stats()`]
929/// method.
930///
931/// [`path_stats()`]: struct.Connection.html#method.path_stats
932#[derive(Clone)]
933pub struct PathStats {
934    /// The local address of the path.
935    pub local_addr: SocketAddr,
936
937    /// The peer address of the path.
938    pub peer_addr: SocketAddr,
939
940    /// The path validation state.
941    pub validation_state: PathState,
942
943    /// Whether the path is marked as active.
944    pub active: bool,
945
946    /// The number of QUIC packets received.
947    pub recv: usize,
948
949    /// The number of QUIC packets sent.
950    pub sent: usize,
951
952    /// The number of QUIC packets that were lost.
953    pub lost: usize,
954
955    /// The number of sent QUIC packets with retransmitted data.
956    pub retrans: usize,
957
958    /// The number of times PTO (probe timeout) fired.
959    ///
960    /// Loss usually happens in a burst so the number of packets lost will
961    /// depend on the volume of inflight packets at the time of loss (which
962    /// can be arbitrary). PTO count measures the number of loss events and
963    /// provides a normalized loss metric.
964    pub total_pto_count: usize,
965
966    /// The number of DATAGRAM frames received.
967    pub dgram_recv: usize,
968
969    /// The number of DATAGRAM frames sent.
970    pub dgram_sent: usize,
971
972    /// The number of DATAGRAM frames lost.
973    pub dgram_lost: usize,
974
975    /// The estimated round-trip time of the connection.
976    pub rtt: Duration,
977
978    /// The minimum round-trip time observed.
979    pub min_rtt: Option<Duration>,
980
981    /// The maximum round-trip time observed.
982    pub max_rtt: Option<Duration>,
983
984    /// The estimated round-trip time variation in samples using a mean
985    /// variation.
986    pub rttvar: Duration,
987
988    /// The size of the connection's congestion window in bytes.
989    pub cwnd: usize,
990
991    /// The number of sent bytes.
992    pub sent_bytes: u64,
993
994    /// The number of received bytes.
995    pub recv_bytes: u64,
996
997    /// The number of bytes lost.
998    pub lost_bytes: u64,
999
1000    /// The number of stream bytes retransmitted.
1001    pub stream_retrans_bytes: u64,
1002
1003    /// The current PMTU for the connection.
1004    pub pmtu: usize,
1005
1006    /// The most recent data delivery rate estimate in bytes/s.
1007    ///
1008    /// Note that this value could be inaccurate if the application does not
1009    /// respect pacing hints (see [`SendInfo.at`] and [Pacing] for more
1010    /// details).
1011    ///
1012    /// [`SendInfo.at`]: struct.SendInfo.html#structfield.at
1013    /// [Pacing]: index.html#pacing
1014    pub delivery_rate: u64,
1015
1016    /// The maximum bandwidth estimate for the connection in bytes/s.
1017    ///
1018    /// Note: not all congestion control algorithms provide this metric;
1019    /// it is currently only implemented for bbr2_gcongestion.
1020    pub max_bandwidth: Option<u64>,
1021
1022    /// Statistics from when a CCA first exited the startup phase.
1023    pub startup_exit: Option<StartupExit>,
1024}
1025
1026impl std::fmt::Debug for PathStats {
1027    #[inline]
1028    fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result {
1029        write!(
1030            f,
1031            "local_addr={:?} peer_addr={:?} ",
1032            self.local_addr, self.peer_addr,
1033        )?;
1034        write!(
1035            f,
1036            "validation_state={:?} active={} ",
1037            self.validation_state, self.active,
1038        )?;
1039        write!(
1040            f,
1041            "recv={} sent={} lost={} retrans={} rtt={:?} min_rtt={:?} rttvar={:?} cwnd={}",
1042            self.recv, self.sent, self.lost, self.retrans, self.rtt, self.min_rtt, self.rttvar, self.cwnd,
1043        )?;
1044
1045        write!(
1046            f,
1047            " sent_bytes={} recv_bytes={} lost_bytes={}",
1048            self.sent_bytes, self.recv_bytes, self.lost_bytes,
1049        )?;
1050
1051        write!(
1052            f,
1053            " stream_retrans_bytes={} pmtu={} delivery_rate={}",
1054            self.stream_retrans_bytes, self.pmtu, self.delivery_rate,
1055        )
1056    }
1057}
1058
1059#[cfg(test)]
1060mod tests {
1061    use crate::rand;
1062    use crate::MIN_CLIENT_INITIAL_LEN;
1063
1064    use crate::recovery::RecoveryConfig;
1065    use crate::Config;
1066
1067    use super::*;
1068
1069    #[test]
1070    fn path_validation_limited_mtu() {
1071        let client_addr = "127.0.0.1:1234".parse().unwrap();
1072        let client_addr_2 = "127.0.0.1:5678".parse().unwrap();
1073        let server_addr = "127.0.0.1:4321".parse().unwrap();
1074
1075        let config = Config::new(crate::PROTOCOL_VERSION).unwrap();
1076        let recovery_config = RecoveryConfig::from_config(&config);
1077
1078        let path = Path::new(
1079            client_addr,
1080            server_addr,
1081            &recovery_config,
1082            config.path_challenge_recv_max_queue_len,
1083            true,
1084            None,
1085        );
1086        let mut path_mgr = PathMap::new(path, 2, false);
1087
1088        let probed_path = Path::new(
1089            client_addr_2,
1090            server_addr,
1091            &recovery_config,
1092            config.path_challenge_recv_max_queue_len,
1093            false,
1094            None,
1095        );
1096        path_mgr.insert_path(probed_path, false).unwrap();
1097
1098        let pid = path_mgr
1099            .path_id_from_addrs(&(client_addr_2, server_addr))
1100            .unwrap();
1101        path_mgr.get_mut(pid).unwrap().request_validation();
1102        assert!(path_mgr.get_mut(pid).unwrap().validation_requested());
1103        assert!(path_mgr.get_mut(pid).unwrap().probing_required());
1104
1105        // Fake sending of PathChallenge in a packet of MIN_CLIENT_INITIAL_LEN - 1
1106        // bytes.
1107        let data = rand::rand_u64().to_be_bytes();
1108        path_mgr.get_mut(pid).unwrap().add_challenge_sent(
1109            data,
1110            MIN_CLIENT_INITIAL_LEN - 1,
1111            Instant::now(),
1112        );
1113
1114        assert!(!path_mgr.get_mut(pid).unwrap().validation_requested());
1115        assert!(!path_mgr.get_mut(pid).unwrap().probing_required());
1116        assert!(path_mgr.get_mut(pid).unwrap().under_validation());
1117        assert!(!path_mgr.get_mut(pid).unwrap().validated());
1118        assert_eq!(path_mgr.get_mut(pid).unwrap().state, PathState::Validating);
1119        assert_eq!(path_mgr.pop_event(), None);
1120
1121        // Receives the response. The path is reachable, but the MTU is not
1122        // validated yet.
1123        path_mgr.on_response_received(data).unwrap();
1124
1125        assert!(path_mgr.get_mut(pid).unwrap().validation_requested());
1126        assert!(path_mgr.get_mut(pid).unwrap().probing_required());
1127        assert!(path_mgr.get_mut(pid).unwrap().under_validation());
1128        assert!(!path_mgr.get_mut(pid).unwrap().validated());
1129        assert_eq!(
1130            path_mgr.get_mut(pid).unwrap().state,
1131            PathState::ValidatingMTU
1132        );
1133        assert_eq!(path_mgr.pop_event(), None);
1134
1135        // Fake sending of PathChallenge in a packet of MIN_CLIENT_INITIAL_LEN
1136        // bytes.
1137        let data = rand::rand_u64().to_be_bytes();
1138        path_mgr.get_mut(pid).unwrap().add_challenge_sent(
1139            data,
1140            MIN_CLIENT_INITIAL_LEN,
1141            Instant::now(),
1142        );
1143
1144        path_mgr.on_response_received(data).unwrap();
1145
1146        assert!(!path_mgr.get_mut(pid).unwrap().validation_requested());
1147        assert!(!path_mgr.get_mut(pid).unwrap().probing_required());
1148        assert!(!path_mgr.get_mut(pid).unwrap().under_validation());
1149        assert!(path_mgr.get_mut(pid).unwrap().validated());
1150        assert_eq!(path_mgr.get_mut(pid).unwrap().state, PathState::Validated);
1151        assert_eq!(
1152            path_mgr.pop_event(),
1153            Some(PathEvent::Validated(client_addr_2, server_addr))
1154        );
1155    }
1156
1157    #[test]
1158    fn multiple_probes() {
1159        let client_addr = "127.0.0.1:1234".parse().unwrap();
1160        let server_addr = "127.0.0.1:4321".parse().unwrap();
1161
1162        let config = Config::new(crate::PROTOCOL_VERSION).unwrap();
1163        let recovery_config = RecoveryConfig::from_config(&config);
1164
1165        let path = Path::new(
1166            client_addr,
1167            server_addr,
1168            &recovery_config,
1169            config.path_challenge_recv_max_queue_len,
1170            true,
1171            None,
1172        );
1173        let mut client_path_mgr = PathMap::new(path, 2, false);
1174        let mut server_path = Path::new(
1175            server_addr,
1176            client_addr,
1177            &recovery_config,
1178            config.path_challenge_recv_max_queue_len,
1179            false,
1180            None,
1181        );
1182
1183        let client_pid = client_path_mgr
1184            .path_id_from_addrs(&(client_addr, server_addr))
1185            .unwrap();
1186
1187        // First probe.
1188        let data = rand::rand_u64().to_be_bytes();
1189
1190        client_path_mgr
1191            .get_mut(client_pid)
1192            .unwrap()
1193            .add_challenge_sent(data, MIN_CLIENT_INITIAL_LEN, Instant::now());
1194
1195        // Second probe.
1196        let data_2 = rand::rand_u64().to_be_bytes();
1197
1198        client_path_mgr
1199            .get_mut(client_pid)
1200            .unwrap()
1201            .add_challenge_sent(data_2, MIN_CLIENT_INITIAL_LEN, Instant::now());
1202        assert_eq!(
1203            client_path_mgr
1204                .get(client_pid)
1205                .unwrap()
1206                .in_flight_challenges
1207                .len(),
1208            2
1209        );
1210
1211        // If we receive multiple challenges, we can store them.
1212        server_path.on_challenge_received(data);
1213        assert_eq!(server_path.received_challenges.len(), 1);
1214        server_path.on_challenge_received(data_2);
1215        assert_eq!(server_path.received_challenges.len(), 2);
1216
1217        // Response for first probe.
1218        client_path_mgr.on_response_received(data).unwrap();
1219        assert_eq!(
1220            client_path_mgr
1221                .get(client_pid)
1222                .unwrap()
1223                .in_flight_challenges
1224                .len(),
1225            1
1226        );
1227
1228        // Response for second probe.
1229        client_path_mgr.on_response_received(data_2).unwrap();
1230        assert_eq!(
1231            client_path_mgr
1232                .get(client_pid)
1233                .unwrap()
1234                .in_flight_challenges
1235                .len(),
1236            0
1237        );
1238    }
1239
1240    #[test]
1241    fn too_many_probes() {
1242        let client_addr = "127.0.0.1:1234".parse().unwrap();
1243        let server_addr = "127.0.0.1:4321".parse().unwrap();
1244
1245        // Default to DEFAULT_MAX_PATH_CHALLENGE_RX_QUEUE_LEN
1246        let config = Config::new(crate::PROTOCOL_VERSION).unwrap();
1247        let recovery_config = RecoveryConfig::from_config(&config);
1248
1249        let path = Path::new(
1250            client_addr,
1251            server_addr,
1252            &recovery_config,
1253            config.path_challenge_recv_max_queue_len,
1254            true,
1255            None,
1256        );
1257        let mut client_path_mgr = PathMap::new(path, 2, false);
1258        let mut server_path = Path::new(
1259            server_addr,
1260            client_addr,
1261            &recovery_config,
1262            config.path_challenge_recv_max_queue_len,
1263            false,
1264            None,
1265        );
1266
1267        let client_pid = client_path_mgr
1268            .path_id_from_addrs(&(client_addr, server_addr))
1269            .unwrap();
1270
1271        // First probe.
1272        let data = rand::rand_u64().to_be_bytes();
1273
1274        client_path_mgr
1275            .get_mut(client_pid)
1276            .unwrap()
1277            .add_challenge_sent(data, MIN_CLIENT_INITIAL_LEN, Instant::now());
1278
1279        // Second probe.
1280        let data_2 = rand::rand_u64().to_be_bytes();
1281
1282        client_path_mgr
1283            .get_mut(client_pid)
1284            .unwrap()
1285            .add_challenge_sent(data_2, MIN_CLIENT_INITIAL_LEN, Instant::now());
1286        assert_eq!(
1287            client_path_mgr
1288                .get(client_pid)
1289                .unwrap()
1290                .in_flight_challenges
1291                .len(),
1292            2
1293        );
1294
1295        // Third probe.
1296        let data_3 = rand::rand_u64().to_be_bytes();
1297
1298        client_path_mgr
1299            .get_mut(client_pid)
1300            .unwrap()
1301            .add_challenge_sent(data_3, MIN_CLIENT_INITIAL_LEN, Instant::now());
1302        assert_eq!(
1303            client_path_mgr
1304                .get(client_pid)
1305                .unwrap()
1306                .in_flight_challenges
1307                .len(),
1308            3
1309        );
1310
1311        // Fourth probe.
1312        let data_4 = rand::rand_u64().to_be_bytes();
1313
1314        client_path_mgr
1315            .get_mut(client_pid)
1316            .unwrap()
1317            .add_challenge_sent(data_4, MIN_CLIENT_INITIAL_LEN, Instant::now());
1318        assert_eq!(
1319            client_path_mgr
1320                .get(client_pid)
1321                .unwrap()
1322                .in_flight_challenges
1323                .len(),
1324            4
1325        );
1326
1327        // If we receive multiple challenges, we can store them up to our queue
1328        // size.
1329        server_path.on_challenge_received(data);
1330        assert_eq!(server_path.received_challenges.len(), 1);
1331        server_path.on_challenge_received(data_2);
1332        assert_eq!(server_path.received_challenges.len(), 2);
1333        server_path.on_challenge_received(data_3);
1334        assert_eq!(server_path.received_challenges.len(), 3);
1335        server_path.on_challenge_received(data_4);
1336        assert_eq!(server_path.received_challenges.len(), 3);
1337
1338        // Response for first probe.
1339        client_path_mgr.on_response_received(data).unwrap();
1340        assert_eq!(
1341            client_path_mgr
1342                .get(client_pid)
1343                .unwrap()
1344                .in_flight_challenges
1345                .len(),
1346            3
1347        );
1348
1349        // Response for second probe.
1350        client_path_mgr.on_response_received(data_2).unwrap();
1351        assert_eq!(
1352            client_path_mgr
1353                .get(client_pid)
1354                .unwrap()
1355                .in_flight_challenges
1356                .len(),
1357            2
1358        );
1359
1360        // Response for third probe.
1361        client_path_mgr.on_response_received(data_3).unwrap();
1362        assert_eq!(
1363            client_path_mgr
1364                .get(client_pid)
1365                .unwrap()
1366                .in_flight_challenges
1367                .len(),
1368            1
1369        );
1370
1371        // There will never be a response for fourth probe...
1372    }
1373}