2005-01-07 01:45:51 +00:00
|
|
|
/*-
|
1995-09-21 17:29:13 +00:00
|
|
|
* Copyright (c) 1982, 1986, 1993, 1994, 1995
|
1994-05-24 10:09:53 +00:00
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1995-09-21 17:29:13 +00:00
|
|
|
* @(#)tcp_var.h 8.4 (Berkeley) 5/24/95
|
1999-08-28 01:08:13 +00:00
|
|
|
* $FreeBSD$
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
|
1994-08-21 05:27:42 +00:00
|
|
|
#ifndef _NETINET_TCP_VAR_H_
|
|
|
|
#define _NETINET_TCP_VAR_H_
|
2001-11-22 04:50:44 +00:00
|
|
|
|
2002-06-10 20:05:46 +00:00
|
|
|
#include <netinet/tcp.h>
|
2001-11-22 04:50:44 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Kernel variables for tcp.
|
|
|
|
*/
|
2001-11-22 04:50:44 +00:00
|
|
|
extern int tcp_do_rfc1323;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2000-01-09 19:17:30 +00:00
|
|
|
/* TCP segment queue entry */
|
|
|
|
struct tseg_qent {
|
2000-05-26 02:09:24 +00:00
|
|
|
LIST_ENTRY(tseg_qent) tqe_q;
|
2000-01-09 19:17:30 +00:00
|
|
|
int tqe_len; /* TCP segment data length */
|
|
|
|
struct tcphdr *tqe_th; /* a pointer to tcp header */
|
|
|
|
struct mbuf *tqe_m; /* mbuf contains packet */
|
|
|
|
};
|
2000-05-26 02:09:24 +00:00
|
|
|
LIST_HEAD(tsegqe_head, tseg_qent);
|
2004-02-24 15:27:41 +00:00
|
|
|
extern int tcp_reass_qsize;
|
2004-02-25 11:53:19 +00:00
|
|
|
extern struct uma_zone *tcp_reass_zone;
|
2000-01-09 19:17:30 +00:00
|
|
|
|
2004-06-23 21:04:37 +00:00
|
|
|
struct sackblk {
|
|
|
|
tcp_seq start; /* start seq no. of sack block */
|
2004-06-25 02:29:58 +00:00
|
|
|
tcp_seq end; /* end seq no. */
|
2004-06-23 21:04:37 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct sackhole {
|
|
|
|
tcp_seq start; /* start seq no. of hole */
|
|
|
|
tcp_seq end; /* end seq no. */
|
|
|
|
tcp_seq rxmit; /* next seq. no in hole to be retransmitted */
|
2005-04-21 20:11:01 +00:00
|
|
|
TAILQ_ENTRY(sackhole) scblink; /* scoreboard linkage */
|
2004-06-23 21:04:37 +00:00
|
|
|
};
|
2004-06-25 02:29:58 +00:00
|
|
|
|
2005-05-11 21:37:42 +00:00
|
|
|
struct sackhint {
|
|
|
|
struct sackhole *nexthole;
|
|
|
|
int sack_bytes_rexmit;
|
|
|
|
};
|
|
|
|
|
2000-01-09 19:17:30 +00:00
|
|
|
struct tcptemp {
|
|
|
|
u_char tt_ipgen[40]; /* the size must be of max ip header, now IPv6 */
|
|
|
|
struct tcphdr tt_t;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define tcp6cb tcpcb /* for KAME src sync over BSD*'s */
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Tcp control block, one per tcp; fields:
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
* Organized for 16 byte cacheline efficiency.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
struct tcpcb {
|
2004-02-24 15:27:41 +00:00
|
|
|
struct tsegqe_head t_segq; /* segment reassembly queue */
|
|
|
|
int t_segqlen; /* segment reassembly queue length */
|
1995-10-04 20:49:03 +00:00
|
|
|
int t_dupacks; /* consecutive dup acks recd */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
|
2007-04-11 09:45:16 +00:00
|
|
|
struct tcp_timer *t_timers; /* retransmit timer */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
|
|
|
|
struct inpcb *t_inpcb; /* back pointer to internet pcb */
|
|
|
|
int t_state; /* state of this connection */
|
1995-10-04 20:49:03 +00:00
|
|
|
u_int t_flags;
|
2003-07-15 21:49:53 +00:00
|
|
|
#define TF_ACKNOW 0x000001 /* ack peer immediately */
|
|
|
|
#define TF_DELACK 0x000002 /* ack, but try to delay it */
|
|
|
|
#define TF_NODELAY 0x000004 /* don't delay packets to coalesce */
|
|
|
|
#define TF_NOOPT 0x000008 /* don't use tcp options */
|
|
|
|
#define TF_SENTFIN 0x000010 /* have sent FIN */
|
|
|
|
#define TF_REQ_SCALE 0x000020 /* have/will request window scaling */
|
|
|
|
#define TF_RCVD_SCALE 0x000040 /* other side has requested scaling */
|
|
|
|
#define TF_REQ_TSTMP 0x000080 /* have/will request timestamps */
|
|
|
|
#define TF_RCVD_TSTMP 0x000100 /* a timestamp was received in SYN */
|
|
|
|
#define TF_SACK_PERMIT 0x000200 /* other side said I could SACK */
|
|
|
|
#define TF_NEEDSYN 0x000400 /* send SYN (implicit state) */
|
|
|
|
#define TF_NEEDFIN 0x000800 /* send FIN (implicit state) */
|
|
|
|
#define TF_NOPUSH 0x001000 /* don't push */
|
|
|
|
#define TF_MORETOCOME 0x010000 /* More data to be appended to sock */
|
|
|
|
#define TF_LQ_OVERFLOW 0x020000 /* listen queue overflow */
|
|
|
|
#define TF_LASTIDLE 0x040000 /* connection was previously idle */
|
|
|
|
#define TF_RXWIN0SENT 0x080000 /* sent a receiver win 0 in response */
|
|
|
|
#define TF_FASTRECOVERY 0x100000 /* in NewReno Fast Recovery */
|
|
|
|
#define TF_WASFRECOVERY 0x200000 /* was in NewReno Fast Recovery */
|
Initial import of RFC 2385 (TCP-MD5) digest support.
This is the first of two commits; bringing in the kernel support first.
This can be enabled by compiling a kernel with options TCP_SIGNATURE
and FAST_IPSEC.
For the uninitiated, this is a TCP option which provides for a means of
authenticating TCP sessions which came into being before IPSEC. It is
still relevant today, however, as it is used by many commercial router
vendors, particularly with BGP, and as such has become a requirement for
interconnect at many major Internet points of presence.
Several parts of the TCP and IP headers, including the segment payload,
are digested with MD5, including a shared secret. The PF_KEY interface
is used to manage the secrets using security associations in the SADB.
There is a limitation here in that as there is no way to map a TCP flow
per-port back to an SPI without polluting tcpcb or using the SPD; the
code to do the latter is unstable at this time. Therefore this code only
supports per-host keying granularity.
Whilst FAST_IPSEC is mutually exclusive with KAME IPSEC (and thus IPv6),
TCP_SIGNATURE applies only to IPv4. For the vast majority of prospective
users of this feature, this will not pose any problem.
This implementation is output-only; that is, the option is honoured when
responding to a host initiating a TCP session, but no effort is made
[yet] to authenticate inbound traffic. This is, however, sufficient to
interwork with Cisco equipment.
Tested with a Cisco 2501 running IOS 12.0(27), and Quagga 0.96.4 with
local patches. Patches for tcpdump to validate TCP-MD5 sessions are also
available from me upon request.
Sponsored by: sentex.net
2004-02-11 04:26:04 +00:00
|
|
|
#define TF_SIGNATURE 0x400000 /* require MD5 digests (RFC2385) */
|
2005-05-21 00:38:29 +00:00
|
|
|
#define TF_FORCEDATA 0x800000 /* force out a byte */
|
2006-09-06 21:51:59 +00:00
|
|
|
#define TF_TSO 0x1000000 /* TSO enabled on this connection */
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
tcp_seq snd_una; /* send unacknowledged */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
tcp_seq snd_max; /* highest sequence number sent;
|
|
|
|
* used to recognize retransmits
|
|
|
|
*/
|
1994-05-24 10:09:53 +00:00
|
|
|
tcp_seq snd_nxt; /* send next */
|
|
|
|
tcp_seq snd_up; /* send urgent pointer */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
tcp_seq snd_wl1; /* window update seg seq number */
|
|
|
|
tcp_seq snd_wl2; /* window update seg ack number */
|
|
|
|
tcp_seq iss; /* initial send sequence number */
|
|
|
|
tcp_seq irs; /* initial receive sequence number */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
|
|
|
|
tcp_seq rcv_nxt; /* receive next */
|
1994-05-24 10:09:53 +00:00
|
|
|
tcp_seq rcv_adv; /* advertised window */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
u_long rcv_wnd; /* receive window */
|
|
|
|
tcp_seq rcv_up; /* receive urgent pointer */
|
|
|
|
|
|
|
|
u_long snd_wnd; /* send window */
|
1994-05-24 10:09:53 +00:00
|
|
|
u_long snd_cwnd; /* congestion-controlled window */
|
2002-08-17 18:26:02 +00:00
|
|
|
u_long snd_bwnd; /* bandwidth-controlled window */
|
1996-01-30 23:02:38 +00:00
|
|
|
u_long snd_ssthresh; /* snd_cwnd size threshold for
|
1994-05-24 10:09:53 +00:00
|
|
|
* for slow start exponential to
|
|
|
|
* linear switch
|
|
|
|
*/
|
2002-08-17 18:26:02 +00:00
|
|
|
u_long snd_bandwidth; /* calculated bandwidth or 0 */
|
2003-01-13 11:01:20 +00:00
|
|
|
tcp_seq snd_recover; /* for use in NewReno Fast Recovery */
|
2000-05-06 03:31:09 +00:00
|
|
|
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
u_int t_maxopd; /* mss plus options */
|
|
|
|
|
1999-08-30 21:17:07 +00:00
|
|
|
u_long t_rcvtime; /* inactivity time */
|
|
|
|
u_long t_starttime; /* time connection was established */
|
|
|
|
int t_rtttime; /* round trip time */
|
1994-05-24 10:09:53 +00:00
|
|
|
tcp_seq t_rtseq; /* sequence number being timed */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
|
2002-08-17 18:26:02 +00:00
|
|
|
int t_bw_rtttime; /* used for bandwidth calculation */
|
|
|
|
tcp_seq t_bw_rtseq; /* used for bandwidth calculation */
|
|
|
|
|
1999-08-30 21:17:07 +00:00
|
|
|
int t_rxtcur; /* current retransmit value (ticks) */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
u_int t_maxseg; /* maximum segment size */
|
1995-10-04 20:49:03 +00:00
|
|
|
int t_srtt; /* smoothed round-trip time */
|
|
|
|
int t_rttvar; /* variance in round-trip time */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
|
|
|
|
int t_rxtshift; /* log(2) of rexmt exp. backoff */
|
1995-10-04 20:49:03 +00:00
|
|
|
u_int t_rttmin; /* minimum rtt allowed */
|
2002-08-17 18:26:02 +00:00
|
|
|
u_int t_rttbest; /* best rtt we've seen */
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
u_long t_rttupdated; /* number of times rtt sampled */
|
1994-05-24 10:09:53 +00:00
|
|
|
u_long max_sndwnd; /* largest window peer has offered */
|
|
|
|
|
Improved connection establishment performance by doing local port lookups via
a hashed port list. In the new scheme, in_pcblookup() goes away and is
replaced by a new routine, in_pcblookup_local() for doing the local port
check. Note that this implementation is space inefficient in that the PCB
struct is now too large to fit into 128 bytes. I might deal with this in the
future by using the new zone allocator, but I wanted these changes to be
extensively tested in their current form first.
Also:
1) Fixed off-by-one errors in the port lookup loops in in_pcbbind().
2) Got rid of some unneeded rehashing. Adding a new routine, in_pcbinshash()
to do the initialial hash insertion.
3) Renamed in_pcblookuphash() to in_pcblookup_hash() for easier readability.
4) Added a new routine, in_pcbremlists() to remove the PCB from the various
hash lists.
5) Added/deleted comments where appropriate.
6) Removed unnecessary splnet() locking. In general, the PCB functions should
be called at splnet()...there are unfortunately a few exceptions, however.
7) Reorganized a few structs for better cache line behavior.
8) Killed my TCP_ACK_HACK kludge. It may come back in a different form in
the future, however.
These changes have been tested on wcarchive for more than a month. In tests
done here, connection establishment overhead is reduced by more than 50
times, thus getting rid of one of the major networking scalability problems.
Still to do: make tcp_fastimo/tcp_slowtimo scale well for systems with a
large number of connections. tcp_fastimo is easy; tcp_slowtimo is difficult.
WARNING: Anything that knows about inpcb and tcpcb structs will have to be
recompiled; at the very least, this includes netstat(1).
1998-01-27 09:15:13 +00:00
|
|
|
int t_softerror; /* possible error not yet reported */
|
1994-05-24 10:09:53 +00:00
|
|
|
/* out-of-band data */
|
|
|
|
char t_oobflags; /* have some */
|
|
|
|
char t_iobc; /* input character */
|
|
|
|
#define TCPOOB_HAVEDATA 0x01
|
|
|
|
#define TCPOOB_HADDATA 0x02
|
|
|
|
/* RFC 1323 variables */
|
|
|
|
u_char snd_scale; /* window scaling for send window */
|
|
|
|
u_char rcv_scale; /* window scaling for recv window */
|
|
|
|
u_char request_r_scale; /* pending window scaling */
|
2006-02-28 23:05:59 +00:00
|
|
|
u_char requested_s_scale; /* unused, to be reused later */
|
2006-09-13 13:08:27 +00:00
|
|
|
u_int32_t ts_recent; /* timestamp echo data */
|
1994-05-24 10:09:53 +00:00
|
|
|
u_long ts_recent_age; /* when last updated */
|
2006-09-13 13:08:27 +00:00
|
|
|
u_int32_t ts_offset; /* our timestamp offset */
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
tcp_seq last_ack_sent;
|
1999-08-30 21:17:07 +00:00
|
|
|
/* experimental */
|
|
|
|
u_long snd_cwnd_prev; /* cwnd prior to retransmit */
|
|
|
|
u_long snd_ssthresh_prev; /* ssthresh prior to retransmit */
|
2003-07-15 21:49:53 +00:00
|
|
|
tcp_seq snd_recover_prev; /* snd_recover prior to retransmit */
|
1999-08-30 21:17:07 +00:00
|
|
|
u_long t_badrxtwin; /* window for retransmit recovery */
|
2003-04-01 21:16:46 +00:00
|
|
|
u_char snd_limited; /* segments limited transmitted */
|
2004-06-25 02:29:58 +00:00
|
|
|
/* SACK related state */
|
2004-06-23 21:04:37 +00:00
|
|
|
int sack_enable; /* enable SACK for this connection */
|
|
|
|
int snd_numholes; /* number of holes seen by sender */
|
2005-06-04 08:03:28 +00:00
|
|
|
TAILQ_HEAD(sackhole_head, sackhole) snd_holes;
|
|
|
|
/* SACK scoreboard (sorted) */
|
2005-05-25 17:55:27 +00:00
|
|
|
tcp_seq snd_fack; /* last seq number(+1) sack'd by rcv'r*/
|
2004-06-23 21:04:37 +00:00
|
|
|
int rcv_numsacks; /* # distinct sack blks present */
|
|
|
|
struct sackblk sackblks[MAX_SACK_BLKS]; /* seq nos. of sack blocks */
|
2004-10-05 18:36:24 +00:00
|
|
|
tcp_seq sack_newdata; /* New data xmitted in this recovery
|
|
|
|
episode starts at this seq number */
|
2005-05-11 21:37:42 +00:00
|
|
|
struct sackhint sackhint; /* SACK scoreboard hint */
|
2006-02-16 19:38:07 +00:00
|
|
|
int t_rttlow; /* smallest observerved RTT */
|
2007-02-01 18:32:13 +00:00
|
|
|
u_int32_t rfbuf_ts; /* recv buffer autoscaling timestamp */
|
|
|
|
int rfbuf_cnt; /* recv buffer autoscaling byte count */
|
1994-05-24 10:09:53 +00:00
|
|
|
};
|
|
|
|
|
2003-07-15 21:49:53 +00:00
|
|
|
#define IN_FASTRECOVERY(tp) (tp->t_flags & TF_FASTRECOVERY)
|
|
|
|
#define ENTER_FASTRECOVERY(tp) tp->t_flags |= TF_FASTRECOVERY
|
|
|
|
#define EXIT_FASTRECOVERY(tp) tp->t_flags &= ~TF_FASTRECOVERY
|
|
|
|
|
Initial import of RFC 2385 (TCP-MD5) digest support.
This is the first of two commits; bringing in the kernel support first.
This can be enabled by compiling a kernel with options TCP_SIGNATURE
and FAST_IPSEC.
For the uninitiated, this is a TCP option which provides for a means of
authenticating TCP sessions which came into being before IPSEC. It is
still relevant today, however, as it is used by many commercial router
vendors, particularly with BGP, and as such has become a requirement for
interconnect at many major Internet points of presence.
Several parts of the TCP and IP headers, including the segment payload,
are digested with MD5, including a shared secret. The PF_KEY interface
is used to manage the secrets using security associations in the SADB.
There is a limitation here in that as there is no way to map a TCP flow
per-port back to an SPI without polluting tcpcb or using the SPD; the
code to do the latter is unstable at this time. Therefore this code only
supports per-host keying granularity.
Whilst FAST_IPSEC is mutually exclusive with KAME IPSEC (and thus IPv6),
TCP_SIGNATURE applies only to IPv4. For the vast majority of prospective
users of this feature, this will not pose any problem.
This implementation is output-only; that is, the option is honoured when
responding to a host initiating a TCP session, but no effort is made
[yet] to authenticate inbound traffic. This is, however, sufficient to
interwork with Cisco equipment.
Tested with a Cisco 2501 running IOS 12.0(27), and Quagga 0.96.4 with
local patches. Patches for tcpdump to validate TCP-MD5 sessions are also
available from me upon request.
Sponsored by: sentex.net
2004-02-11 04:26:04 +00:00
|
|
|
#ifdef TCP_SIGNATURE
|
|
|
|
/*
|
|
|
|
* Defines which are needed by the xform_tcp module and tcp_[in|out]put
|
|
|
|
* for SADB verification and lookup.
|
|
|
|
*/
|
|
|
|
#define TCP_SIGLEN 16 /* length of computed digest in bytes */
|
|
|
|
#define TCP_KEYLEN_MIN 1 /* minimum length of TCP-MD5 key */
|
|
|
|
#define TCP_KEYLEN_MAX 80 /* maximum length of TCP-MD5 key */
|
|
|
|
/*
|
|
|
|
* Only a single SA per host may be specified at this time. An SPI is
|
|
|
|
* needed in order for the KEY_ALLOCSA() lookup to work.
|
|
|
|
*/
|
|
|
|
#define TCP_SIG_SPI 0x1000
|
|
|
|
#endif /* TCP_SIGNATURE */
|
|
|
|
|
1995-02-08 20:18:48 +00:00
|
|
|
/*
|
|
|
|
* Structure to hold TCP options that are only used during segment
|
|
|
|
* processing (in tcp_input), but not held in the tcpcb.
|
|
|
|
* It's basically used to reduce the number of parameters
|
2007-03-15 15:59:28 +00:00
|
|
|
* to tcp_dooptions and tcp_addoptions.
|
|
|
|
* The binary order of the to_flags is relevant for packing of the
|
|
|
|
* options in tcp_addoptions.
|
1995-02-08 20:18:48 +00:00
|
|
|
*/
|
|
|
|
struct tcpopt {
|
2001-11-22 04:50:44 +00:00
|
|
|
u_long to_flags; /* which options are present */
|
2007-03-15 15:59:28 +00:00
|
|
|
#define TOF_MSS 0x0001 /* maximum segment size */
|
|
|
|
#define TOF_SCALE 0x0002 /* window scaling */
|
|
|
|
#define TOF_SACKPERM 0x0004 /* SACK permitted */
|
|
|
|
#define TOF_TS 0x0010 /* timestamp */
|
Initial import of RFC 2385 (TCP-MD5) digest support.
This is the first of two commits; bringing in the kernel support first.
This can be enabled by compiling a kernel with options TCP_SIGNATURE
and FAST_IPSEC.
For the uninitiated, this is a TCP option which provides for a means of
authenticating TCP sessions which came into being before IPSEC. It is
still relevant today, however, as it is used by many commercial router
vendors, particularly with BGP, and as such has become a requirement for
interconnect at many major Internet points of presence.
Several parts of the TCP and IP headers, including the segment payload,
are digested with MD5, including a shared secret. The PF_KEY interface
is used to manage the secrets using security associations in the SADB.
There is a limitation here in that as there is no way to map a TCP flow
per-port back to an SPI without polluting tcpcb or using the SPD; the
code to do the latter is unstable at this time. Therefore this code only
supports per-host keying granularity.
Whilst FAST_IPSEC is mutually exclusive with KAME IPSEC (and thus IPv6),
TCP_SIGNATURE applies only to IPv4. For the vast majority of prospective
users of this feature, this will not pose any problem.
This implementation is output-only; that is, the option is honoured when
responding to a host initiating a TCP session, but no effort is made
[yet] to authenticate inbound traffic. This is, however, sufficient to
interwork with Cisco equipment.
Tested with a Cisco 2501 running IOS 12.0(27), and Quagga 0.96.4 with
local patches. Patches for tcpdump to validate TCP-MD5 sessions are also
available from me upon request.
Sponsored by: sentex.net
2004-02-11 04:26:04 +00:00
|
|
|
#define TOF_SIGNATURE 0x0040 /* signature option present */
|
2004-04-20 19:04:24 +00:00
|
|
|
#define TOF_SIGLEN 0x0080 /* signature length valid (RFC2385) */
|
2004-06-23 21:04:37 +00:00
|
|
|
#define TOF_SACK 0x0100 /* Peer sent SACK option */
|
2007-03-15 15:59:28 +00:00
|
|
|
#define TOF_MAXOPT 0x0200
|
|
|
|
u_int32_t to_tsval; /* our new timestamp */
|
|
|
|
u_int32_t to_tsecr; /* reflected timestamp */
|
|
|
|
u_int16_t to_mss; /* maximum segment size */
|
|
|
|
u_int8_t to_wscale; /* window scaling */
|
2005-06-27 22:27:42 +00:00
|
|
|
u_int8_t to_nsacks; /* number of SACK blocks */
|
|
|
|
u_char *to_sacks; /* pointer to the first SACK blocks */
|
2007-03-15 15:59:28 +00:00
|
|
|
u_char *to_signature; /* pointer to the MD5 signature */
|
2001-11-22 04:50:44 +00:00
|
|
|
};
|
|
|
|
|
2006-06-26 15:35:25 +00:00
|
|
|
/*
|
|
|
|
* Flags for tcp_dooptions.
|
|
|
|
*/
|
|
|
|
#define TO_SYN 0x01 /* parse SYN-only options */
|
|
|
|
|
2003-11-20 20:07:39 +00:00
|
|
|
struct hc_metrics_lite { /* must stay in sync with hc_metrics */
|
|
|
|
u_long rmx_mtu; /* MTU for this path */
|
|
|
|
u_long rmx_ssthresh; /* outbound gateway buffer limit */
|
|
|
|
u_long rmx_rtt; /* estimated round trip time */
|
|
|
|
u_long rmx_rttvar; /* estimated rtt variance */
|
|
|
|
u_long rmx_bandwidth; /* estimated bandwidth */
|
|
|
|
u_long rmx_cwnd; /* congestion window */
|
|
|
|
u_long rmx_sendpipe; /* outbound delay-bandwidth product */
|
|
|
|
u_long rmx_recvpipe; /* inbound delay-bandwidth product */
|
|
|
|
};
|
|
|
|
|
2006-06-18 12:26:11 +00:00
|
|
|
#ifndef _NETINET_IN_PCB_H_
|
|
|
|
struct in_conninfo;
|
|
|
|
#endif /* _NETINET_IN_PCB_H_ */
|
|
|
|
|
2003-02-19 22:32:43 +00:00
|
|
|
struct tcptw {
|
|
|
|
struct inpcb *tw_inpcb; /* XXX back pointer to internet pcb */
|
|
|
|
tcp_seq snd_nxt;
|
|
|
|
tcp_seq rcv_nxt;
|
2003-11-01 07:30:08 +00:00
|
|
|
tcp_seq iss;
|
2003-11-02 07:47:03 +00:00
|
|
|
tcp_seq irs;
|
2003-02-19 22:32:43 +00:00
|
|
|
u_short last_win; /* cached window value */
|
|
|
|
u_short tw_so_options; /* copy of so_options */
|
|
|
|
struct ucred *tw_cred; /* user credentials */
|
2004-08-16 18:32:07 +00:00
|
|
|
u_long t_recent;
|
2003-02-19 22:32:43 +00:00
|
|
|
u_long t_starttime;
|
2003-03-08 22:06:20 +00:00
|
|
|
int tw_time;
|
2006-09-07 13:06:00 +00:00
|
|
|
TAILQ_ENTRY(tcptw) tw_2msl;
|
2003-02-19 22:32:43 +00:00
|
|
|
};
|
2004-08-16 18:32:07 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#define intotcpcb(ip) ((struct tcpcb *)(ip)->inp_ppcb)
|
2003-02-19 22:32:43 +00:00
|
|
|
#define intotw(ip) ((struct tcptw *)(ip)->inp_ppcb)
|
1994-05-24 10:09:53 +00:00
|
|
|
#define sototcpcb(so) (intotcpcb(sotoinpcb(so)))
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The smoothed round-trip time and estimated variance
|
|
|
|
* are stored as fixed point numbers scaled by the values below.
|
|
|
|
* For convenience, these scales are also used in smoothing the average
|
|
|
|
* (smoothed = (1/scale)sample + ((scale-1)/scale)smoothed).
|
|
|
|
* With these scales, srtt has 3 bits to the right of the binary point,
|
|
|
|
* and thus an "ALPHA" of 0.875. rttvar has 2 bits to the right of the
|
|
|
|
* binary point, and is smoothed with an ALPHA of 0.75.
|
|
|
|
*/
|
1996-03-22 18:09:21 +00:00
|
|
|
#define TCP_RTT_SCALE 32 /* multiplier for srtt; 3 bits frac. */
|
|
|
|
#define TCP_RTT_SHIFT 5 /* shift for srtt; 3 bits frac. */
|
|
|
|
#define TCP_RTTVAR_SCALE 16 /* multiplier for rttvar; 2 bits */
|
|
|
|
#define TCP_RTTVAR_SHIFT 4 /* shift for rttvar; 2 bits */
|
|
|
|
#define TCP_DELTA_SHIFT 2 /* see tcp_input.c */
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The initial retransmission should happen at rtt + 4 * rttvar.
|
|
|
|
* Because of the way we do the smoothing, srtt and rttvar
|
|
|
|
* will each average +1/2 tick of bias. When we compute
|
|
|
|
* the retransmit timer, we want 1/2 tick of rounding and
|
|
|
|
* 1 extra tick because of +-1/2 tick uncertainty in the
|
|
|
|
* firing of the timer. The bias will give us exactly the
|
|
|
|
* 1.5 tick we need. But, because the bias is
|
|
|
|
* statistical, we have to test that we don't drop below
|
|
|
|
* the minimum feasible timer (which is 2 ticks).
|
1996-03-22 18:09:21 +00:00
|
|
|
* This version of the macro adapted from a paper by Lawrence
|
|
|
|
* Brakmo and Larry Peterson which outlines a problem caused
|
|
|
|
* by insufficient precision in the original implementation,
|
|
|
|
* which results in inappropriately large RTO values for very
|
|
|
|
* fast networks.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
1996-03-22 18:09:21 +00:00
|
|
|
#define TCP_REXMTVAL(tp) \
|
1998-04-24 09:25:39 +00:00
|
|
|
max((tp)->t_rttmin, (((tp)->t_srtt >> (TCP_RTT_SHIFT - TCP_DELTA_SHIFT)) \
|
1996-06-05 16:57:38 +00:00
|
|
|
+ (tp)->t_rttvar) >> TCP_DELTA_SHIFT)
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* TCP statistics.
|
|
|
|
* Many of these should be kept per connection,
|
|
|
|
* but that's inconvenient at the moment.
|
|
|
|
*/
|
|
|
|
struct tcpstat {
|
|
|
|
u_long tcps_connattempt; /* connections initiated */
|
|
|
|
u_long tcps_accepts; /* connections accepted */
|
|
|
|
u_long tcps_connects; /* connections established */
|
|
|
|
u_long tcps_drops; /* connections dropped */
|
|
|
|
u_long tcps_conndrops; /* embryonic connections dropped */
|
2004-01-08 17:40:07 +00:00
|
|
|
u_long tcps_minmssdrops; /* average minmss too low drops */
|
1994-05-24 10:09:53 +00:00
|
|
|
u_long tcps_closed; /* conn. closed (includes drops) */
|
|
|
|
u_long tcps_segstimed; /* segs where we tried to get rtt */
|
|
|
|
u_long tcps_rttupdated; /* times we succeeded */
|
|
|
|
u_long tcps_delack; /* delayed acks sent */
|
|
|
|
u_long tcps_timeoutdrop; /* conn. dropped in rxmt timeout */
|
|
|
|
u_long tcps_rexmttimeo; /* retransmit timeouts */
|
|
|
|
u_long tcps_persisttimeo; /* persist timeouts */
|
|
|
|
u_long tcps_keeptimeo; /* keepalive timeouts */
|
|
|
|
u_long tcps_keepprobe; /* keepalive probes sent */
|
|
|
|
u_long tcps_keepdrops; /* connections dropped in keepalive */
|
|
|
|
|
|
|
|
u_long tcps_sndtotal; /* total packets sent */
|
|
|
|
u_long tcps_sndpack; /* data packets sent */
|
|
|
|
u_long tcps_sndbyte; /* data bytes sent */
|
|
|
|
u_long tcps_sndrexmitpack; /* data packets retransmitted */
|
|
|
|
u_long tcps_sndrexmitbyte; /* data bytes retransmitted */
|
2002-07-19 18:29:38 +00:00
|
|
|
u_long tcps_sndrexmitbad; /* unnecessary packet retransmissions */
|
1994-05-24 10:09:53 +00:00
|
|
|
u_long tcps_sndacks; /* ack-only packets sent */
|
|
|
|
u_long tcps_sndprobe; /* window probes sent */
|
|
|
|
u_long tcps_sndurg; /* packets sent with URG only */
|
|
|
|
u_long tcps_sndwinup; /* window update-only packets sent */
|
|
|
|
u_long tcps_sndctrl; /* control (SYN|FIN|RST) packets sent */
|
|
|
|
|
|
|
|
u_long tcps_rcvtotal; /* total packets received */
|
|
|
|
u_long tcps_rcvpack; /* packets received in sequence */
|
|
|
|
u_long tcps_rcvbyte; /* bytes received in sequence */
|
|
|
|
u_long tcps_rcvbadsum; /* packets received with ccksum errs */
|
|
|
|
u_long tcps_rcvbadoff; /* packets received with bad offset */
|
1999-11-05 14:41:39 +00:00
|
|
|
u_long tcps_rcvmemdrop; /* packets dropped for lack of memory */
|
1994-05-24 10:09:53 +00:00
|
|
|
u_long tcps_rcvshort; /* packets received too short */
|
|
|
|
u_long tcps_rcvduppack; /* duplicate-only packets received */
|
|
|
|
u_long tcps_rcvdupbyte; /* duplicate-only bytes received */
|
|
|
|
u_long tcps_rcvpartduppack; /* packets with some duplicate data */
|
|
|
|
u_long tcps_rcvpartdupbyte; /* dup. bytes in part-dup. packets */
|
|
|
|
u_long tcps_rcvoopack; /* out-of-order packets received */
|
|
|
|
u_long tcps_rcvoobyte; /* out-of-order bytes received */
|
|
|
|
u_long tcps_rcvpackafterwin; /* packets with data after window */
|
|
|
|
u_long tcps_rcvbyteafterwin; /* bytes rcvd after window */
|
|
|
|
u_long tcps_rcvafterclose; /* packets rcvd after "close" */
|
|
|
|
u_long tcps_rcvwinprobe; /* rcvd window probe packets */
|
|
|
|
u_long tcps_rcvdupack; /* rcvd duplicate acks */
|
|
|
|
u_long tcps_rcvacktoomuch; /* rcvd acks for unsent data */
|
|
|
|
u_long tcps_rcvackpack; /* rcvd ack packets */
|
|
|
|
u_long tcps_rcvackbyte; /* bytes acked by rcvd acks */
|
|
|
|
u_long tcps_rcvwinupd; /* rcvd window update packets */
|
|
|
|
u_long tcps_pawsdrop; /* segments dropped due to PAWS */
|
|
|
|
u_long tcps_predack; /* times hdr predict ok for acks */
|
|
|
|
u_long tcps_preddat; /* times hdr predict ok for data pkts */
|
|
|
|
u_long tcps_pcbcachemiss;
|
1995-06-19 16:45:33 +00:00
|
|
|
u_long tcps_cachedrtt; /* times cached RTT in route updated */
|
|
|
|
u_long tcps_cachedrttvar; /* times cached rttvar updated */
|
|
|
|
u_long tcps_cachedssthresh; /* times cached ssthresh updated */
|
1995-07-10 15:39:16 +00:00
|
|
|
u_long tcps_usedrtt; /* times RTT initialized from route */
|
|
|
|
u_long tcps_usedrttvar; /* times RTTVAR initialized from rt */
|
|
|
|
u_long tcps_usedssthresh; /* times ssthresh initialized from rt*/
|
1995-09-21 17:29:13 +00:00
|
|
|
u_long tcps_persistdrop; /* timeout in persist state */
|
|
|
|
u_long tcps_badsyn; /* bogus SYN, e.g. premature ACK */
|
1995-10-10 17:45:43 +00:00
|
|
|
u_long tcps_mturesent; /* resends due to MTU discovery */
|
1996-02-27 15:12:53 +00:00
|
|
|
u_long tcps_listendrop; /* listen queue overflows */
|
2004-04-26 02:56:31 +00:00
|
|
|
u_long tcps_badrst; /* ignored RSTs in the window */
|
2001-11-22 04:50:44 +00:00
|
|
|
|
|
|
|
u_long tcps_sc_added; /* entry added to syncache */
|
|
|
|
u_long tcps_sc_retransmitted; /* syncache entry was retransmitted */
|
|
|
|
u_long tcps_sc_dupsyn; /* duplicate SYN packet */
|
|
|
|
u_long tcps_sc_dropped; /* could not reply to packet */
|
|
|
|
u_long tcps_sc_completed; /* successful extraction of entry */
|
|
|
|
u_long tcps_sc_bucketoverflow; /* syncache per-bucket limit hit */
|
|
|
|
u_long tcps_sc_cacheoverflow; /* syncache cache limit hit */
|
|
|
|
u_long tcps_sc_reset; /* RST removed entry from syncache */
|
|
|
|
u_long tcps_sc_stale; /* timed out or listen socket gone */
|
|
|
|
u_long tcps_sc_aborted; /* syncache entry aborted */
|
|
|
|
u_long tcps_sc_badack; /* removed due to bad ACK */
|
|
|
|
u_long tcps_sc_unreach; /* ICMP unreachable received */
|
|
|
|
u_long tcps_sc_zonefail; /* zalloc() failed */
|
|
|
|
u_long tcps_sc_sendcookie; /* SYN cookie sent */
|
|
|
|
u_long tcps_sc_recvcookie; /* SYN cookie received */
|
2003-11-20 20:07:39 +00:00
|
|
|
|
|
|
|
u_long tcps_hc_added; /* entry added to hostcache */
|
|
|
|
u_long tcps_hc_bucketoverflow; /* hostcache per bucket limit hit */
|
2004-06-23 21:04:37 +00:00
|
|
|
|
2007-02-26 22:25:21 +00:00
|
|
|
u_long tcps_finwait2_drops; /* Drop FIN_WAIT_2 connection after time limit */
|
|
|
|
|
2004-06-23 21:04:37 +00:00
|
|
|
/* SACK related stats */
|
|
|
|
u_long tcps_sack_recovery_episode; /* SACK recovery episodes */
|
|
|
|
u_long tcps_sack_rexmits; /* SACK rexmit segments */
|
2004-08-16 18:32:07 +00:00
|
|
|
u_long tcps_sack_rexmit_bytes; /* SACK rexmit bytes */
|
2004-06-23 21:04:37 +00:00
|
|
|
u_long tcps_sack_rcv_blocks; /* SACK blocks (options) received */
|
|
|
|
u_long tcps_sack_send_blocks; /* SACK blocks (options) sent */
|
2005-03-09 23:14:10 +00:00
|
|
|
u_long tcps_sack_sboverflow; /* times scoreboard overflowed */
|
1994-05-24 10:09:53 +00:00
|
|
|
};
|
|
|
|
|
1998-05-15 20:11:40 +00:00
|
|
|
/*
|
|
|
|
* TCB structure exported to user-land via sysctl(3).
|
1998-06-27 07:30:45 +00:00
|
|
|
* Evil hack: declare only if in_pcb.h and sys/socketvar.h have been
|
|
|
|
* included. Not all of our clients do.
|
1998-05-15 20:11:40 +00:00
|
|
|
*/
|
1998-06-27 07:30:45 +00:00
|
|
|
#if defined(_NETINET_IN_PCB_H_) && defined(_SYS_SOCKETVAR_H_)
|
1998-05-15 20:11:40 +00:00
|
|
|
struct xtcpcb {
|
|
|
|
size_t xt_len;
|
|
|
|
struct inpcb xt_inp;
|
|
|
|
struct tcpcb xt_tp;
|
|
|
|
struct xsocket xt_socket;
|
|
|
|
u_quad_t xt_alignment_hack;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
1995-02-08 20:18:48 +00:00
|
|
|
/*
|
|
|
|
* Names for TCP sysctl objects
|
|
|
|
*/
|
|
|
|
#define TCPCTL_DO_RFC1323 1 /* use RFC-1323 extensions */
|
|
|
|
#define TCPCTL_MSSDFLT 3 /* MSS default */
|
1995-02-16 00:27:47 +00:00
|
|
|
#define TCPCTL_STATS 4 /* statistics (read-only) */
|
|
|
|
#define TCPCTL_RTTDFLT 5 /* default RTT estimate */
|
|
|
|
#define TCPCTL_KEEPIDLE 6 /* keepalive idle timer */
|
|
|
|
#define TCPCTL_KEEPINTVL 7 /* interval to send keepalives */
|
1996-09-13 23:54:03 +00:00
|
|
|
#define TCPCTL_SENDSPACE 8 /* send buffer space */
|
|
|
|
#define TCPCTL_RECVSPACE 9 /* receive buffer space */
|
2000-07-18 16:43:29 +00:00
|
|
|
#define TCPCTL_KEEPINIT 10 /* timeout for establishing syn */
|
1998-05-15 20:11:40 +00:00
|
|
|
#define TCPCTL_PCBLIST 11 /* list of all outstanding PCBs */
|
1999-08-30 21:17:07 +00:00
|
|
|
#define TCPCTL_DELACKTIME 12 /* time before sending delayed ACK */
|
1999-11-05 14:41:39 +00:00
|
|
|
#define TCPCTL_V6MSSDFLT 13 /* MSS default for IPv6 */
|
2004-06-23 21:04:37 +00:00
|
|
|
#define TCPCTL_SACK 14 /* Selective Acknowledgement,rfc 2018 */
|
2005-02-06 10:47:12 +00:00
|
|
|
#define TCPCTL_DROP 15 /* drop tcp connection */
|
|
|
|
#define TCPCTL_MAXID 16
|
2007-02-26 22:25:21 +00:00
|
|
|
#define TCPCTL_FINWAIT2_TIMEOUT 17
|
1995-02-08 20:18:48 +00:00
|
|
|
|
|
|
|
#define TCPCTL_NAMES { \
|
|
|
|
{ 0, 0 }, \
|
1995-02-14 02:35:19 +00:00
|
|
|
{ "rfc1323", CTLTYPE_INT }, \
|
1995-02-08 20:18:48 +00:00
|
|
|
{ "mssdflt", CTLTYPE_INT }, \
|
1995-02-16 00:27:47 +00:00
|
|
|
{ "stats", CTLTYPE_STRUCT }, \
|
|
|
|
{ "rttdflt", CTLTYPE_INT }, \
|
|
|
|
{ "keepidle", CTLTYPE_INT }, \
|
|
|
|
{ "keepintvl", CTLTYPE_INT }, \
|
|
|
|
{ "sendspace", CTLTYPE_INT }, \
|
|
|
|
{ "recvspace", CTLTYPE_INT }, \
|
1996-09-13 23:54:03 +00:00
|
|
|
{ "keepinit", CTLTYPE_INT }, \
|
1998-05-15 20:11:40 +00:00
|
|
|
{ "pcblist", CTLTYPE_STRUCT }, \
|
1999-08-30 21:17:07 +00:00
|
|
|
{ "delacktime", CTLTYPE_INT }, \
|
1999-11-05 14:41:39 +00:00
|
|
|
{ "v6mssdflt", CTLTYPE_INT }, \
|
2003-11-20 20:07:39 +00:00
|
|
|
{ "maxid", CTLTYPE_INT }, \
|
1995-02-08 20:18:48 +00:00
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
|
1999-12-29 04:46:21 +00:00
|
|
|
#ifdef _KERNEL
|
1999-02-16 10:49:55 +00:00
|
|
|
#ifdef SYSCTL_DECL
|
|
|
|
SYSCTL_DECL(_net_inet_tcp);
|
2004-10-05 18:36:24 +00:00
|
|
|
SYSCTL_DECL(_net_inet_tcp_sack);
|
1999-02-16 10:49:55 +00:00
|
|
|
#endif
|
|
|
|
|
1995-04-09 01:29:31 +00:00
|
|
|
extern struct inpcbhead tcb; /* head of queue of active tcpcb's */
|
|
|
|
extern struct inpcbinfo tcbinfo;
|
1995-02-14 02:35:19 +00:00
|
|
|
extern struct tcpstat tcpstat; /* tcp statistics */
|
1995-03-16 18:17:34 +00:00
|
|
|
extern int tcp_mssdflt; /* XXX */
|
2004-01-08 17:40:07 +00:00
|
|
|
extern int tcp_minmss;
|
1998-02-26 05:25:39 +00:00
|
|
|
extern int tcp_delack_enabled;
|
2000-05-06 03:31:09 +00:00
|
|
|
extern int tcp_do_newreno;
|
2002-06-14 03:08:05 +00:00
|
|
|
extern int path_mtu_discovery;
|
1999-08-30 21:17:07 +00:00
|
|
|
extern int ss_fltsz;
|
|
|
|
extern int ss_fltsz_local;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2004-06-23 21:04:37 +00:00
|
|
|
extern int tcp_do_sack; /* SACK enabled/disabled */
|
|
|
|
|
2007-03-15 15:59:28 +00:00
|
|
|
int tcp_addoptions(struct tcpopt *, u_char *);
|
1994-05-24 10:09:53 +00:00
|
|
|
struct tcpcb *
|
2002-03-19 21:25:46 +00:00
|
|
|
tcp_close(struct tcpcb *);
|
Update TCP for infrastructural changes to the socket/pcb refcount model,
pru_abort(), pru_detach(), and in_pcbdetach():
- Universally support and enforce the invariant that so_pcb is
never NULL, converting dozens of unnecessary NULL checks into
assertions, and eliminating dozens of unnecessary error handling
cases in protocol code.
- In some cases, eliminate unnecessary pcbinfo locking, as it is no
longer required to ensure so_pcb != NULL. For example, the receive
code no longer requires the pcbinfo lock, and the send code only
requires it if building a new connection on an otherwise unconnected
socket triggered via sendto() with an address. This should
significnatly reduce tcbinfo lock contention in the receive and send
cases.
- In order to support the invariant that so_pcb != NULL, it is now
necessary for the TCP code to not discard the tcpcb any time a
connection is dropped, but instead leave the tcpcb until the socket
is shutdown. This case is handled by setting INP_DROPPED, to
substitute for using a NULL so_pcb to indicate that the connection
has been dropped. This requires the inpcb lock, but not the pcbinfo
lock.
- Unlike all other protocols in the tree, TCP may need to retain access
to the socket after the file descriptor has been closed. Set
SS_PROTOREF in tcp_detach() in order to prevent the socket from being
freed, and add a flag, INP_SOCKREF, so that the TCP code knows whether
or not it needs to free the socket when the connection finally does
close. The typical case where this occurs is if close() is called on
a TCP socket before all sent data in the send socket buffer has been
transmitted or acknowledged. If INP_SOCKREF is found when the
connection is dropped, we release the inpcb, tcpcb, and socket instead
of flagging INP_DROPPED.
- Abort and detach protocol switch methods no longer return failures,
nor attempt to free sockets, as the socket layer does this.
- Annotate the existence of a long-standing race in the TCP timer code,
in which timers are stopped but not drained when the socket is freed,
as waiting for drain may lead to deadlocks, or have to occur in a
context where waiting is not permitted. This race has been handled
by testing to see if the tcpcb pointer in the inpcb is NULL (and vice
versa), which is not normally permitted, but may be true of a inpcb
and tcpcb have been freed. Add a counter to test how often this race
has actually occurred, and a large comment for each instance where
we compare potentially freed memory with NULL. This will have to be
fixed in the near future, but requires is to further address how to
handle the timer shutdown shutdown issue.
- Several TCP calls no longer potentially free the passed inpcb/tcpcb,
so no longer need to return a pointer to indicate whether the argument
passed in is still valid.
- Un-macroize debugging and locking setup for various protocol switch
methods for TCP, as it lead to more obscurity, and as locking becomes
more customized to the methods, offers less benefit.
- Assert copyright on tcp_usrreq.c due to significant modifications that
have been made as part of this work.
These changes significantly modify the memory management and connection
logic of our TCP implementation, and are (as such) High Risk Changes,
and likely to contain serious bugs. Please report problems to the
current@ mailing list ASAP, ideally with simple test cases, and
optionally, packet traces.
MFC after: 3 months
2006-04-01 16:36:36 +00:00
|
|
|
void tcp_discardcb(struct tcpcb *);
|
2003-02-19 22:32:43 +00:00
|
|
|
void tcp_twstart(struct tcpcb *);
|
2006-09-06 13:56:35 +00:00
|
|
|
#if 0
|
2003-11-01 07:30:08 +00:00
|
|
|
int tcp_twrecycleable(struct tcptw *tw);
|
2006-09-06 13:56:35 +00:00
|
|
|
#endif
|
Update TCP for infrastructural changes to the socket/pcb refcount model,
pru_abort(), pru_detach(), and in_pcbdetach():
- Universally support and enforce the invariant that so_pcb is
never NULL, converting dozens of unnecessary NULL checks into
assertions, and eliminating dozens of unnecessary error handling
cases in protocol code.
- In some cases, eliminate unnecessary pcbinfo locking, as it is no
longer required to ensure so_pcb != NULL. For example, the receive
code no longer requires the pcbinfo lock, and the send code only
requires it if building a new connection on an otherwise unconnected
socket triggered via sendto() with an address. This should
significnatly reduce tcbinfo lock contention in the receive and send
cases.
- In order to support the invariant that so_pcb != NULL, it is now
necessary for the TCP code to not discard the tcpcb any time a
connection is dropped, but instead leave the tcpcb until the socket
is shutdown. This case is handled by setting INP_DROPPED, to
substitute for using a NULL so_pcb to indicate that the connection
has been dropped. This requires the inpcb lock, but not the pcbinfo
lock.
- Unlike all other protocols in the tree, TCP may need to retain access
to the socket after the file descriptor has been closed. Set
SS_PROTOREF in tcp_detach() in order to prevent the socket from being
freed, and add a flag, INP_SOCKREF, so that the TCP code knows whether
or not it needs to free the socket when the connection finally does
close. The typical case where this occurs is if close() is called on
a TCP socket before all sent data in the send socket buffer has been
transmitted or acknowledged. If INP_SOCKREF is found when the
connection is dropped, we release the inpcb, tcpcb, and socket instead
of flagging INP_DROPPED.
- Abort and detach protocol switch methods no longer return failures,
nor attempt to free sockets, as the socket layer does this.
- Annotate the existence of a long-standing race in the TCP timer code,
in which timers are stopped but not drained when the socket is freed,
as waiting for drain may lead to deadlocks, or have to occur in a
context where waiting is not permitted. This race has been handled
by testing to see if the tcpcb pointer in the inpcb is NULL (and vice
versa), which is not normally permitted, but may be true of a inpcb
and tcpcb have been freed. Add a counter to test how often this race
has actually occurred, and a large comment for each instance where
we compare potentially freed memory with NULL. This will have to be
fixed in the near future, but requires is to further address how to
handle the timer shutdown shutdown issue.
- Several TCP calls no longer potentially free the passed inpcb/tcpcb,
so no longer need to return a pointer to indicate whether the argument
passed in is still valid.
- Un-macroize debugging and locking setup for various protocol switch
methods for TCP, as it lead to more obscurity, and as locking becomes
more customized to the methods, offers less benefit.
- Assert copyright on tcp_usrreq.c due to significant modifications that
have been made as part of this work.
These changes significantly modify the memory management and connection
logic of our TCP implementation, and are (as such) High Risk Changes,
and likely to contain serious bugs. Please report problems to the
current@ mailing list ASAP, ideally with simple test cases, and
optionally, packet traces.
MFC after: 3 months
2006-04-01 16:36:36 +00:00
|
|
|
void tcp_twclose(struct tcptw *_tw, int _reuse);
|
2002-03-19 21:25:46 +00:00
|
|
|
void tcp_ctlinput(int, struct sockaddr *, void *);
|
|
|
|
int tcp_ctloutput(struct socket *, struct sockopt *);
|
1994-05-24 10:09:53 +00:00
|
|
|
struct tcpcb *
|
2002-03-19 21:25:46 +00:00
|
|
|
tcp_drop(struct tcpcb *, int);
|
|
|
|
void tcp_drain(void);
|
|
|
|
void tcp_fasttimo(void);
|
|
|
|
void tcp_init(void);
|
2004-04-20 06:33:39 +00:00
|
|
|
void tcp_fini(void *);
|
2004-02-24 15:27:41 +00:00
|
|
|
void tcp_reass_init(void);
|
2002-03-19 21:25:46 +00:00
|
|
|
void tcp_input(struct mbuf *, int);
|
2006-09-06 21:51:59 +00:00
|
|
|
u_long tcp_maxmtu(struct in_conninfo *, int *);
|
|
|
|
u_long tcp_maxmtu6(struct in_conninfo *, int *);
|
2002-03-19 21:25:46 +00:00
|
|
|
void tcp_mss(struct tcpcb *, int);
|
2003-11-20 20:07:39 +00:00
|
|
|
int tcp_mssopt(struct in_conninfo *);
|
2004-08-16 18:32:07 +00:00
|
|
|
struct inpcb *
|
2002-06-14 08:35:21 +00:00
|
|
|
tcp_drop_syn_sent(struct inpcb *, int);
|
|
|
|
struct inpcb *
|
|
|
|
tcp_mtudisc(struct inpcb *, int);
|
1994-05-24 10:09:53 +00:00
|
|
|
struct tcpcb *
|
2002-03-19 21:25:46 +00:00
|
|
|
tcp_newtcpcb(struct inpcb *);
|
|
|
|
int tcp_output(struct tcpcb *);
|
|
|
|
void tcp_respond(struct tcpcb *, void *,
|
|
|
|
struct tcphdr *, struct mbuf *, tcp_seq, tcp_seq, int);
|
2004-02-28 15:12:20 +00:00
|
|
|
int tcp_twrespond(struct tcptw *, int);
|
2002-03-19 21:25:46 +00:00
|
|
|
void tcp_setpersist(struct tcpcb *);
|
2004-02-13 18:21:45 +00:00
|
|
|
#ifdef TCP_SIGNATURE
|
|
|
|
int tcp_signature_compute(struct mbuf *, int, int, int, u_char *, u_int);
|
|
|
|
#endif
|
2002-03-19 21:25:46 +00:00
|
|
|
void tcp_slowtimo(void);
|
2000-01-09 19:17:30 +00:00
|
|
|
struct tcptemp *
|
2003-02-19 22:18:06 +00:00
|
|
|
tcpip_maketemplate(struct inpcb *);
|
|
|
|
void tcpip_fillheaders(struct inpcb *, void *, void *);
|
2007-04-11 09:45:16 +00:00
|
|
|
void tcp_timer_activate(struct tcpcb *, int, u_int);
|
|
|
|
int tcp_timer_active(struct tcpcb *, int);
|
2002-03-19 21:25:46 +00:00
|
|
|
void tcp_trace(int, int, struct tcpcb *, void *, struct tcphdr *, int);
|
2002-08-17 18:26:02 +00:00
|
|
|
void tcp_xmit_bandwidth_limit(struct tcpcb *tp, tcp_seq ack_seq);
|
2001-11-22 04:50:44 +00:00
|
|
|
void syncache_init(void);
|
|
|
|
void syncache_unreach(struct in_conninfo *, struct tcphdr *);
|
2006-09-13 13:08:27 +00:00
|
|
|
int syncache_expand(struct in_conninfo *, struct tcpopt *,
|
|
|
|
struct tcphdr *, struct socket **, struct mbuf *);
|
2007-04-20 14:34:54 +00:00
|
|
|
void syncache_add(struct in_conninfo *, struct tcpopt *,
|
2006-06-17 17:32:38 +00:00
|
|
|
struct tcphdr *, struct inpcb *, struct socket **, struct mbuf *);
|
2001-11-22 04:50:44 +00:00
|
|
|
void syncache_chkrst(struct in_conninfo *, struct tcphdr *);
|
|
|
|
void syncache_badack(struct in_conninfo *);
|
2003-11-20 20:07:39 +00:00
|
|
|
/*
|
|
|
|
* All tcp_hc_* functions are IPv4 and IPv6 (via in_conninfo)
|
|
|
|
*/
|
|
|
|
void tcp_hc_init(void);
|
|
|
|
void tcp_hc_get(struct in_conninfo *, struct hc_metrics_lite *);
|
|
|
|
u_long tcp_hc_getmtu(struct in_conninfo *);
|
|
|
|
void tcp_hc_updatemtu(struct in_conninfo *, u_long);
|
|
|
|
void tcp_hc_update(struct in_conninfo *, struct hc_metrics_lite *);
|
1995-07-10 15:39:16 +00:00
|
|
|
|
1996-07-11 16:32:50 +00:00
|
|
|
extern struct pr_usrreqs tcp_usrreqs;
|
1995-07-10 15:39:16 +00:00
|
|
|
extern u_long tcp_sendspace;
|
|
|
|
extern u_long tcp_recvspace;
|
2002-03-19 21:25:46 +00:00
|
|
|
tcp_seq tcp_new_isn(struct tcpcb *);
|
1995-07-10 15:39:16 +00:00
|
|
|
|
2005-06-27 22:27:42 +00:00
|
|
|
void tcp_sack_doack(struct tcpcb *, struct tcpopt *, tcp_seq);
|
2005-02-17 23:04:56 +00:00
|
|
|
void tcp_update_sack_list(struct tcpcb *tp, tcp_seq rcv_laststart, tcp_seq rcv_lastend);
|
2004-06-23 21:04:37 +00:00
|
|
|
void tcp_clean_sackreport(struct tcpcb *tp);
|
|
|
|
void tcp_sack_adjust(struct tcpcb *tp);
|
2004-10-05 18:36:24 +00:00
|
|
|
struct sackhole *tcp_sack_output(struct tcpcb *tp, int *sack_bytes_rexmt);
|
2004-06-23 21:04:37 +00:00
|
|
|
void tcp_sack_partialack(struct tcpcb *, struct tcphdr *);
|
|
|
|
void tcp_free_sackholes(struct tcpcb *tp);
|
|
|
|
int tcp_newreno(struct tcpcb *, struct tcphdr *);
|
|
|
|
u_long tcp_seq_subtract(u_long, u_long );
|
|
|
|
|
1999-12-29 04:46:21 +00:00
|
|
|
#endif /* _KERNEL */
|
1994-08-21 05:27:42 +00:00
|
|
|
|
1995-02-14 02:35:19 +00:00
|
|
|
#endif /* _NETINET_TCP_VAR_H_ */
|