source: rtems/cpukit/libnetworking/netinet/tcp_timer.c @ 65c6425

4.115
Last change on this file since 65c6425 was 65c6425, checked in by Joel Sherrill <joel.sherrill@…>, on 05/03/12 at 17:24:46

Remove CVS Id Strings (manual edits after script)

These modifications were required by hand after running the script.
In some cases, the file names did not match patterns. In others,
the format of the file did not match any common patterns.

  • Property mode set to 100644
File size: 10.5 KB
Line 
1/*
2 * Copyright (c) 1982, 1986, 1988, 1990, 1993, 1995
3 *      The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 *    may be used to endorse or promote products derived from this software
15 *    without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 *
29 *      @(#)tcp_timer.c 8.2 (Berkeley) 5/24/95
30 */
31
32#ifdef HAVE_CONFIG_H
33#include "config.h"
34#endif
35
36#include "opt_tcpdebug.h"
37
38#ifndef TUBA_INCLUDE
39#include <sys/param.h>
40#include <sys/queue.h>
41#include <sys/systm.h>
42#include <sys/kernel.h>
43#include <sys/sysctl.h>
44#include <sys/malloc.h>
45#include <sys/mbuf.h>
46#include <sys/socket.h>
47#include <sys/socketvar.h>
48#include <sys/protosw.h>
49#include <errno.h>
50
51#include <machine/cpu.h>        /* before tcp_seq.h, for tcp_random18() */
52
53#include <net/if.h>
54#include <net/route.h>
55
56#include <netinet/in.h>
57#include <netinet/in_systm.h>
58#include <netinet/ip.h>
59#include <netinet/in_pcb.h>
60#include <netinet/ip_var.h>
61#include <netinet/tcp.h>
62#include <netinet/tcp_fsm.h>
63#include <netinet/tcp_seq.h>
64#include <netinet/tcp_timer.h>
65#include <netinet/tcp_var.h>
66#include <netinet/tcpip.h>
67#ifdef TCPDEBUG
68#include <netinet/tcp_debug.h>
69#endif
70
71int     tcp_keepinit = TCPTV_KEEP_INIT;
72SYSCTL_INT(_net_inet_tcp, TCPCTL_KEEPINIT, keepinit,
73        CTLFLAG_RW, &tcp_keepinit , 0, "");
74
75int     tcp_keepidle = TCPTV_KEEP_IDLE;
76SYSCTL_INT(_net_inet_tcp, TCPCTL_KEEPIDLE, keepidle,
77        CTLFLAG_RW, &tcp_keepidle , 0, "");
78
79static int      tcp_keepintvl = TCPTV_KEEPINTVL;
80SYSCTL_INT(_net_inet_tcp, TCPCTL_KEEPINTVL, keepintvl,
81        CTLFLAG_RW, &tcp_keepintvl , 0, "");
82
83static int      always_keepalive = 0;
84SYSCTL_INT(_net_inet_tcp, OID_AUTO, always_keepalive,
85        CTLFLAG_RW, &always_keepalive , 0, "");
86
87static int      tcp_keepcnt = TCPTV_KEEPCNT;
88        /* max idle probes */
89static int      tcp_maxpersistidle = TCPTV_KEEP_IDLE;
90        /* max idle time in persist */
91int     tcp_maxidle;
92#else /* TUBA_INCLUDE */
93
94static  int tcp_maxpersistidle;
95#endif /* TUBA_INCLUDE */
96
97/*
98 * Fast timeout routine for processing delayed acks
99 */
100void
101tcp_fasttimo(void)
102{
103        register struct inpcb *inp;
104        register struct tcpcb *tp;
105        int s;
106
107        s = splnet();
108
109        for (inp = tcb.lh_first; inp != NULL; inp = inp->inp_list.le_next) {
110                if ((tp = (struct tcpcb *)inp->inp_ppcb) &&
111                    (tp->t_flags & TF_DELACK)) {
112                        tp->t_flags &= ~TF_DELACK;
113                        tp->t_flags |= TF_ACKNOW;
114                        tcpstat.tcps_delack++;
115                        (void) tcp_output(tp);
116                }
117        }
118        splx(s);
119}
120
121/*
122 * Tcp protocol timeout routine called every 500 ms.
123 * Updates the timers in all active tcb's and
124 * causes finite state machine actions if timers expire.
125 */
126void
127tcp_slowtimo(void)
128{
129        register struct inpcb *ip, *ipnxt;
130        register struct tcpcb *tp;
131        register int i;
132        int s;
133#ifdef TCPDEBUG
134        int ostate;
135#endif
136
137        s = splnet();
138
139        tcp_maxidle = tcp_keepcnt * tcp_keepintvl;
140
141        ip = tcb.lh_first;
142        if (ip == NULL) {
143                splx(s);
144                return;
145        }
146        /*
147         * Search through tcb's and update active timers.
148         */
149        for (; ip != NULL; ip = ipnxt) {
150                ipnxt = ip->inp_list.le_next;
151                tp = intotcpcb(ip);
152                if (tp == 0 || tp->t_state == TCPS_LISTEN)
153                        continue;
154                for (i = 0; i < TCPT_NTIMERS; i++) {
155                        if (tp->t_timer[i] && --tp->t_timer[i] == 0) {
156#ifdef TCPDEBUG
157                                ostate = tp->t_state;
158#endif
159                                tp = tcp_timers(tp, i);
160                                if (tp == NULL)
161                                        goto tpgone;
162#ifdef TCPDEBUG
163                                if (tp->t_inpcb->inp_socket->so_options
164                                    & SO_DEBUG)
165                                        tcp_trace(TA_USER, ostate, tp,
166                                                  (struct tcpiphdr *)0,
167                                                  PRU_SLOWTIMO);
168#endif
169                        }
170                }
171                tp->t_idle++;
172                tp->t_duration++;
173                if (tp->t_rtt)
174                        tp->t_rtt++;
175tpgone:
176                ;
177        }
178        tcp_iss += TCP_ISSINCR/PR_SLOWHZ;               /* increment iss */
179#ifdef TCP_COMPAT_42
180        if ((int)tcp_iss < 0)
181                tcp_iss = TCP_ISSINCR;                  /* XXX */
182#endif
183        tcp_now++;                                      /* for timestamps */
184        splx(s);
185}
186#ifndef TUBA_INCLUDE
187
188/*
189 * Cancel all timers for TCP tp.
190 */
191void
192tcp_canceltimers(struct tcpcb *tp)
193{
194        register int i;
195
196        for (i = 0; i < TCPT_NTIMERS; i++)
197                tp->t_timer[i] = 0;
198}
199
200int     tcp_backoff[TCP_MAXRXTSHIFT + 1] =
201    { 1, 2, 4, 8, 16, 32, 64, 64, 64, 64, 64, 64, 64 };
202
203static int tcp_totbackoff = 511;        /* sum of tcp_backoff[] */
204
205/*
206 * TCP timer processing.
207 */
208struct tcpcb *
209tcp_timers(struct tcpcb *tp, int timer)
210{
211        register int rexmt;
212
213        switch (timer) {
214
215        /*
216         * 2 MSL timeout in shutdown went off.  If we're closed but
217         * still waiting for peer to close and connection has been idle
218         * too long, or if 2MSL time is up from TIME_WAIT, delete connection
219         * control block.  Otherwise, check again in a bit.
220         */
221        case TCPT_2MSL:
222                if (tp->t_state != TCPS_TIME_WAIT &&
223                    tp->t_idle <= tcp_maxidle)
224                        tp->t_timer[TCPT_2MSL] = tcp_keepintvl;
225                else
226                        tp = tcp_close(tp);
227                break;
228
229        /*
230         * Retransmission timer went off.  Message has not
231         * been acked within retransmit interval.  Back off
232         * to a longer retransmit interval and retransmit one segment.
233         */
234        case TCPT_REXMT:
235                if (++tp->t_rxtshift > TCP_MAXRXTSHIFT) {
236                        tp->t_rxtshift = TCP_MAXRXTSHIFT;
237                        tcpstat.tcps_timeoutdrop++;
238                        tp = tcp_drop(tp, tp->t_softerror ?
239                            tp->t_softerror : ETIMEDOUT);
240                        break;
241                }
242                tcpstat.tcps_rexmttimeo++;
243                rexmt = TCP_REXMTVAL(tp) * tcp_backoff[tp->t_rxtshift];
244                TCPT_RANGESET(tp->t_rxtcur, rexmt,
245                    tp->t_rttmin, TCPTV_REXMTMAX);
246                tp->t_timer[TCPT_REXMT] = tp->t_rxtcur;
247                /*
248                 * If losing, let the lower level know and try for
249                 * a better route.  Also, if we backed off this far,
250                 * our srtt estimate is probably bogus.  Clobber it
251                 * so we'll take the next rtt measurement as our srtt;
252                 * move the current srtt into rttvar to keep the current
253                 * retransmit times until then.
254                 */
255                if (tp->t_rxtshift > TCP_MAXRXTSHIFT / 4) {
256                        in_losing(tp->t_inpcb);
257                        tp->t_rttvar += (tp->t_srtt >> TCP_RTT_SHIFT);
258                        tp->t_srtt = 0;
259                }
260                tp->snd_nxt = tp->snd_una;
261                /*
262                 * Force a segment to be sent.
263                 */
264                tp->t_flags |= TF_ACKNOW;
265                /*
266                 * If timing a segment in this window, stop the timer.
267                 */
268                tp->t_rtt = 0;
269                /*
270                 * Close the congestion window down to one segment
271                 * (we'll open it by one segment for each ack we get).
272                 * Since we probably have a window's worth of unacked
273                 * data accumulated, this "slow start" keeps us from
274                 * dumping all that data as back-to-back packets (which
275                 * might overwhelm an intermediate gateway).
276                 *
277                 * There are two phases to the opening: Initially we
278                 * open by one mss on each ack.  This makes the window
279                 * size increase exponentially with time.  If the
280                 * window is larger than the path can handle, this
281                 * exponential growth results in dropped packet(s)
282                 * almost immediately.  To get more time between
283                 * drops but still "push" the network to take advantage
284                 * of improving conditions, we switch from exponential
285                 * to linear window opening at some threshhold size.
286                 * For a threshhold, we use half the current window
287                 * size, truncated to a multiple of the mss.
288                 *
289                 * (the minimum cwnd that will give us exponential
290                 * growth is 2 mss.  We don't allow the threshhold
291                 * to go below this.)
292                 */
293                {
294                u_int win = min(tp->snd_wnd, tp->snd_cwnd) / 2 / tp->t_maxseg;
295                if (win < 2)
296                        win = 2;
297                tp->snd_cwnd = tp->t_maxseg;
298                tp->snd_ssthresh = win * tp->t_maxseg;
299                tp->t_dupacks = 0;
300                }
301                (void) tcp_output(tp);
302                break;
303
304        /*
305         * Persistance timer into zero window.
306         * Force a byte to be output, if possible.
307         */
308        case TCPT_PERSIST:
309                tcpstat.tcps_persisttimeo++;
310                /*
311                 * Hack: if the peer is dead/unreachable, we do not
312                 * time out if the window is closed.  After a full
313                 * backoff, drop the connection if the idle time
314                 * (no responses to probes) reaches the maximum
315                 * backoff that we would use if retransmitting.
316                 */
317                if (tp->t_rxtshift == TCP_MAXRXTSHIFT) {
318                        u_long maxidle = TCP_REXMTVAL(tp);
319                        if (maxidle < tp->t_rttmin)
320                                maxidle = tp->t_rttmin;
321                        maxidle *= tcp_totbackoff;
322                        if (tp->t_idle >= tcp_maxpersistidle ||
323                            tp->t_idle >= maxidle) {
324                                tcpstat.tcps_persistdrop++;
325                                tp = tcp_drop(tp, ETIMEDOUT);
326                                break;
327                        }
328                }
329                tcp_setpersist(tp);
330                tp->t_force = 1;
331                (void) tcp_output(tp);
332                tp->t_force = 0;
333                break;
334
335        /*
336         * Keep-alive timer went off; send something
337         * or drop connection if idle for too long.
338         */
339        case TCPT_KEEP:
340                tcpstat.tcps_keeptimeo++;
341                if (tp->t_state < TCPS_ESTABLISHED)
342                        goto dropit;
343                if ((always_keepalive ||
344                    tp->t_inpcb->inp_socket->so_options & SO_KEEPALIVE) &&
345                    tp->t_state <= TCPS_CLOSING) {
346                        if (tp->t_idle >= tcp_keepidle + tcp_maxidle)
347                                goto dropit;
348                        /*
349                         * Send a packet designed to force a response
350                         * if the peer is up and reachable:
351                         * either an ACK if the connection is still alive,
352                         * or an RST if the peer has closed the connection
353                         * due to timeout or reboot.
354                         * Using sequence number tp->snd_una-1
355                         * causes the transmitted zero-length segment
356                         * to lie outside the receive window;
357                         * by the protocol spec, this requires the
358                         * correspondent TCP to respond.
359                         */
360                        tcpstat.tcps_keepprobe++;
361#ifdef TCP_COMPAT_42
362                        /*
363                         * The keepalive packet must have nonzero length
364                         * to get a 4.2 host to respond.
365                         */
366                        tcp_respond(tp, tp->t_template, (struct mbuf *)NULL,
367                            tp->rcv_nxt - 1, tp->snd_una - 1, 0);
368#else
369                        tcp_respond(tp, tp->t_template, (struct mbuf *)NULL,
370                            tp->rcv_nxt, tp->snd_una - 1, 0);
371#endif
372                        tp->t_timer[TCPT_KEEP] = tcp_keepintvl;
373                } else
374                        tp->t_timer[TCPT_KEEP] = tcp_keepidle;
375                break;
376        dropit:
377                tcpstat.tcps_keepdrops++;
378                tp = tcp_drop(tp, ETIMEDOUT);
379                break;
380        }
381        return (tp);
382}
383#endif /* TUBA_INCLUDE */
Note: See TracBrowser for help on using the repository browser.