]>
Commit | Line | Data |
---|---|---|
1c79356b | 1 | /* |
cb323159 | 2 | * Copyright (c) 2000-2019 Apple Inc. All rights reserved. |
5d5c5d0d | 3 | * |
2d21ac55 | 4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ |
39037602 | 5 | * |
2d21ac55 A |
6 | * This file contains Original Code and/or Modifications of Original Code |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
39037602 | 14 | * |
2d21ac55 A |
15 | * Please obtain a copy of the License at |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
39037602 | 17 | * |
2d21ac55 A |
18 | * The Original Code and all software distributed under the License are |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
8f6c56a5 A |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
2d21ac55 A |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
39037602 | 25 | * |
2d21ac55 | 26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ |
1c79356b A |
27 | */ |
28 | /* | |
29 | * Copyright (c) 1982, 1986, 1993, 1994, 1995 | |
30 | * The Regents of the University of California. All rights reserved. | |
31 | * | |
32 | * Redistribution and use in source and binary forms, with or without | |
33 | * modification, are permitted provided that the following conditions | |
34 | * are met: | |
35 | * 1. Redistributions of source code must retain the above copyright | |
36 | * notice, this list of conditions and the following disclaimer. | |
37 | * 2. Redistributions in binary form must reproduce the above copyright | |
38 | * notice, this list of conditions and the following disclaimer in the | |
39 | * documentation and/or other materials provided with the distribution. | |
40 | * 3. All advertising materials mentioning features or use of this software | |
41 | * must display the following acknowledgement: | |
42 | * This product includes software developed by the University of | |
43 | * California, Berkeley and its contributors. | |
44 | * 4. Neither the name of the University nor the names of its contributors | |
45 | * may be used to endorse or promote products derived from this software | |
46 | * without specific prior written permission. | |
47 | * | |
48 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
49 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
50 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
51 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
52 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
53 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
54 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
55 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
56 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
57 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
58 | * SUCH DAMAGE. | |
59 | * | |
60 | * @(#)tcp_var.h 8.4 (Berkeley) 5/24/95 | |
9bccf70c | 61 | * $FreeBSD: src/sys/netinet/tcp_var.h,v 1.56.2.8 2001/08/22 00:59:13 silby Exp $ |
1c79356b A |
62 | */ |
63 | ||
64 | #ifndef _NETINET_TCP_VAR_H_ | |
65 | #define _NETINET_TCP_VAR_H_ | |
3e170ce0 | 66 | #include <sys/types.h> |
9bccf70c | 67 | #include <sys/appleapiopts.h> |
91447636 A |
68 | #include <sys/queue.h> |
69 | #include <netinet/in_pcb.h> | |
3e170ce0 | 70 | #include <netinet/tcp.h> |
9bccf70c | 71 | #include <netinet/tcp_timer.h> |
91447636 | 72 | |
2d21ac55 | 73 | #if defined(__LP64__) |
0a7de745 A |
74 | #define _TCPCB_PTR(x) u_int32_t |
75 | #define _TCPCB_LIST_HEAD(name, type) \ | |
76 | struct name { \ | |
77 | u_int32_t lh_first; \ | |
39037602 | 78 | } |
2d21ac55 | 79 | #else |
0a7de745 A |
80 | #define _TCPCB_PTR(x) x |
81 | #define _TCPCB_LIST_HEAD(name, type) LIST_HEAD(name, type) | |
2d21ac55 A |
82 | #endif |
83 | ||
fe8ab488 | 84 | #ifdef KERNEL_PRIVATE |
6d2010ae | 85 | |
0a7de745 | 86 | #define TCP_RETRANSHZ 1000 /* granularity of TCP timestamps, 1ms */ |
6d2010ae | 87 | /* Minimum time quantum within which the timers are coalesced */ |
0a7de745 | 88 | #define TCP_TIMER_10MS_QUANTUM (TCP_RETRANSHZ/100) /* every 10ms */ |
fe8ab488 A |
89 | #define TCP_TIMER_100MS_QUANTUM (TCP_RETRANSHZ/10) /* every 100ms */ |
90 | #define TCP_TIMER_500MS_QUANTUM (TCP_RETRANSHZ/2) /* every 500ms */ | |
6d2010ae A |
91 | |
92 | #define TCP_RETRANSHZ_TO_USEC 1000 | |
9bccf70c | 93 | |
0a7de745 | 94 | #define N_TIME_WAIT_SLOTS 128 /* must be power of 2 */ |
1c79356b | 95 | |
39037602 | 96 | /* Always allow at least 16 packets worth of recv window when adjusting |
6d2010ae A |
97 | * recv window using inter-packet arrival jitter. |
98 | */ | |
39037602 | 99 | #define MIN_IAJ_WIN 16 |
6d2010ae | 100 | |
39037602 | 101 | /* A variation in delay of this many milliseconds is tolerable. This limit has to |
6d2010ae A |
102 | * be low but greater than zero. We also use standard deviation on jitter to adjust |
103 | * this limit for different link and connection types. | |
104 | */ | |
105 | #define ALLOWED_IAJ 5 | |
106 | ||
107 | /* Ignore the first few packets on a connection until the ACK clock gets going | |
108 | */ | |
109 | #define IAJ_IGNORE_PKTCNT 40 | |
110 | ||
111 | /* Let the accumulated IAJ value increase by this threshold at most. This limit | |
112 | * will control how many ALLOWED_IAJ measurements a receiver will have to see | |
113 | * before opening the receive window | |
114 | */ | |
115 | #define ACC_IAJ_HIGH_THRESH 100 | |
116 | ||
39037602 | 117 | /* When accumulated IAJ reaches this value, the receiver starts to react by |
6d2010ae A |
118 | * closing the window |
119 | */ | |
120 | #define ACC_IAJ_REACT_LIMIT 200 | |
121 | ||
39037602 | 122 | /* If the number of small packets (smaller than IAJ packet size) seen on a |
6d2010ae A |
123 | * connection is more than this threshold, reset the size and learn it again. |
124 | * This is needed because the sender might send smaller segments after PMTU | |
125 | * discovery and the receiver has to learn the new size. | |
126 | */ | |
127 | #define RESET_IAJ_SIZE_THRESH 20 | |
128 | ||
39236c6e A |
129 | /* |
130 | * Adaptive timeout is a read/write timeout specified by the application to | |
39037602 A |
131 | * get a socket event when the transport layer detects a stall in data |
132 | * transfer. The value specified is the number of probes that can be sent | |
39236c6e A |
133 | * to the peer before generating an event. Since it is not specified as |
134 | * a time value, the timeout will adjust based on the RTT seen on the link. | |
39037602 A |
135 | * The timeout will start only when there is an indication that the read/write |
136 | * operation is not making progress. | |
39236c6e A |
137 | * |
138 | * If a write operation stalls, the probe will be retransmission of data. | |
139 | * If a read operation stalls, the probe will be a keep-alive packet. | |
140 | * | |
141 | * The maximum value of adaptive timeout is set to 10 which will allow | |
142 | * transmission of enough number of probes to the peer. | |
143 | */ | |
0a7de745 | 144 | #define TCP_ADAPTIVE_TIMEOUT_MAX 10 |
3e170ce0 | 145 | |
0a7de745 | 146 | #define TCP_CONNECTIVITY_PROBES_MAX 5 |
39236c6e | 147 | |
1c79356b | 148 | /* |
9bccf70c | 149 | * Kernel variables for tcp. |
1c79356b | 150 | */ |
9bccf70c A |
151 | |
152 | /* TCP segment queue entry */ | |
153 | struct tseg_qent { | |
154 | LIST_ENTRY(tseg_qent) tqe_q; | |
0a7de745 A |
155 | int tqe_len; /* TCP segment data length */ |
156 | struct tcphdr *tqe_th; /* a pointer to tcp header */ | |
157 | struct mbuf *tqe_m; /* mbuf contains packet */ | |
1c79356b | 158 | }; |
9bccf70c | 159 | LIST_HEAD(tsegqe_head, tseg_qent); |
9bccf70c | 160 | |
8ad349bb | 161 | struct sackblk { |
0a7de745 A |
162 | tcp_seq start; /* start seq no. of sack block */ |
163 | tcp_seq end; /* end seq no. */ | |
8ad349bb A |
164 | }; |
165 | ||
166 | struct sackhole { | |
0a7de745 A |
167 | tcp_seq start; /* start seq no. of hole */ |
168 | tcp_seq end; /* end seq no. */ | |
169 | tcp_seq rxmit; /* next seq. no in hole to be retransmitted */ | |
170 | u_int32_t rxmit_start; /* timestamp of first retransmission */ | |
171 | TAILQ_ENTRY(sackhole) scblink; /* scoreboard linkage */ | |
8ad349bb A |
172 | }; |
173 | ||
174 | struct sackhint { | |
0a7de745 A |
175 | struct sackhole *nexthole; |
176 | int sack_bytes_rexmit; | |
8ad349bb A |
177 | }; |
178 | ||
3e170ce0 A |
179 | struct tcp_rxt_seg { |
180 | tcp_seq rx_start; | |
181 | tcp_seq rx_end; | |
182 | u_int16_t rx_count; | |
183 | u_int16_t rx_flags; | |
0a7de745 A |
184 | #define TCP_RXT_SPURIOUS 0x1 /* received DSACK notification */ |
185 | #define TCP_RXT_DSACK_FOR_TLP 0x2 | |
3e170ce0 A |
186 | SLIST_ENTRY(tcp_rxt_seg) rx_link; |
187 | }; | |
188 | ||
39037602 | 189 | struct tcp_notify_ack_marker { |
0a7de745 | 190 | tcp_seq notify_snd_una; /* Notify when snd_una crosses this seq */ |
39037602 A |
191 | tcp_notify_ack_id_t notify_id; |
192 | SLIST_ENTRY(tcp_notify_ack_marker) notify_next; | |
193 | }; | |
194 | ||
9bccf70c | 195 | struct tcptemp { |
0a7de745 A |
196 | u_char tt_ipgen[40]; /* the size must be of max ip header, now IPv6 */ |
197 | struct tcphdr tt_t; | |
9bccf70c A |
198 | }; |
199 | ||
316670eb | 200 | struct bwmeas { |
0a7de745 A |
201 | tcp_seq bw_start; /* start of bw measurement */ |
202 | uint32_t bw_ts; /* timestamp when bw measurement started */ | |
203 | uint32_t bw_size; /* burst size in bytes for this bw measurement */ | |
5ba3f43e A |
204 | uint32_t bw_minsizepkts; /* Min burst size as segments */ |
205 | uint32_t bw_maxsizepkts; /* Max burst size as segments */ | |
0a7de745 A |
206 | uint32_t bw_minsize; /* Min size in bytes */ |
207 | uint32_t bw_maxsize; /* Max size in bytes */ | |
208 | uint32_t bw_sndbw; /* Measured send bandwidth */ | |
209 | uint32_t bw_sndbw_max; /* Max measured bandwidth */ | |
210 | uint32_t bw_rcvbw_max; /* Max receive bandwidth measured */ | |
316670eb A |
211 | }; |
212 | ||
39236c6e A |
213 | /* MPTCP Data sequence map entry */ |
214 | struct mpt_dsn_map { | |
0a7de745 A |
215 | uint64_t mpt_dsn; /* data seq num recvd */ |
216 | uint32_t mpt_sseq; /* relative subflow # */ | |
217 | uint16_t mpt_len; /* length of mapping */ | |
218 | uint16_t mpt_csum; /* checksum value if on */ | |
219 | uint8_t mpt_dfin; /* It's a DATA_FIN */ | |
39236c6e | 220 | }; |
0a7de745 | 221 | #define tcp6cb tcpcb /* for KAME src sync over BSD*'s */ |
1c79356b | 222 | |
fe8ab488 A |
223 | struct tcp_ccstate { |
224 | union { | |
225 | struct tcp_cubic_state { | |
226 | u_int32_t tc_last_max; /* cwnd at last loss */ | |
227 | u_int32_t tc_epoch_start; /* TS of last loss */ | |
228 | u_int32_t tc_origin_point; /* window at the start of an epoch */ | |
229 | u_int32_t tc_tcp_win; /* computed tcp win */ | |
230 | u_int32_t tc_tcp_bytes_acked; /* bytes acked */ | |
231 | u_int32_t tc_target_win; /* cubic target win */ | |
232 | u_int32_t tc_avg_lastmax; /* Average of last max */ | |
233 | u_int32_t tc_mean_deviation; /* Mean absolute deviation */ | |
234 | float tc_epoch_period; /* K parameter */ | |
235 | } _cubic_state_; | |
236 | #define cub_last_max __u__._cubic_state_.tc_last_max | |
237 | #define cub_epoch_start __u__._cubic_state_.tc_epoch_start | |
238 | #define cub_origin_point __u__._cubic_state_.tc_origin_point | |
239 | #define cub_tcp_win __u__._cubic_state_.tc_tcp_win | |
240 | #define cub_tcp_bytes_acked __u__._cubic_state_.tc_tcp_bytes_acked | |
241 | #define cub_epoch_period __u__._cubic_state_.tc_epoch_period | |
242 | #define cub_target_win __u__._cubic_state_.tc_target_win | |
243 | #define cub_avg_lastmax __u__._cubic_state_.tc_avg_lastmax | |
244 | #define cub_mean_dev __u__._cubic_state_.tc_mean_deviation | |
245 | } __u__; | |
246 | }; | |
247 | ||
1c79356b A |
248 | /* |
249 | * Tcp control block, one per tcp; fields: | |
250 | * Organized for 16 byte cacheline efficiency. | |
251 | */ | |
252 | struct tcpcb { | |
0a7de745 A |
253 | struct tsegqe_head t_segq; |
254 | int t_dupacks; /* consecutive dup acks recd */ | |
255 | int t_state; /* state of this connection */ | |
256 | uint32_t t_timer[TCPT_NTIMERS]; /* tcp timers */ | |
257 | struct tcptimerentry tentry; /* entry in timer list */ | |
258 | ||
259 | struct inpcb *t_inpcb; /* back pointer to internet pcb */ | |
260 | uint32_t t_flags; | |
261 | #define TF_ACKNOW 0x00001 /* ack peer immediately */ | |
262 | #define TF_DELACK 0x00002 /* ack, but try to delay it */ | |
263 | #define TF_NODELAY 0x00004 /* don't delay packets to coalesce */ | |
264 | #define TF_NOOPT 0x00008 /* don't use tcp options */ | |
265 | #define TF_SENTFIN 0x00010 /* have sent FIN */ | |
266 | #define TF_REQ_SCALE 0x00020 /* have/will request window scaling */ | |
267 | #define TF_RCVD_SCALE 0x00040 /* other side has requested scaling */ | |
268 | #define TF_REQ_TSTMP 0x00080 /* have/will request timestamps */ | |
269 | #define TF_RCVD_TSTMP 0x00100 /* a timestamp was received in SYN */ | |
270 | #define TF_SACK_PERMIT 0x00200 /* other side said I could SACK */ | |
271 | #define TF_NEEDSYN 0x00400 /* send SYN (implicit state) */ | |
272 | #define TF_NEEDFIN 0x00800 /* send FIN (implicit state) */ | |
273 | #define TF_NOPUSH 0x01000 /* don't push */ | |
274 | #define TF_REQ_CC 0x02000 /* have/will request CC */ | |
275 | #define TF_RCVD_CC 0x04000 /* a CC was received in SYN */ | |
276 | #define TF_SENDCCNEW 0x08000 /* Unused */ | |
277 | #define TF_MORETOCOME 0x10000 /* More data to be appended to sock */ | |
278 | #define TF_LOCAL 0x20000 /* connection to a host on local link */ | |
279 | #define TF_RXWIN0SENT 0x40000 /* sent a receiver win 0 in response */ | |
280 | #define TF_SLOWLINK 0x80000 /* route is a on a modem speed link */ | |
281 | #define TF_LASTIDLE 0x100000 /* connection was previously idle */ | |
282 | #define TF_FASTRECOVERY 0x200000 /* in NewReno Fast Recovery */ | |
283 | #define TF_WASFRECOVERY 0x400000 /* was in NewReno Fast Recovery */ | |
284 | #define TF_SIGNATURE 0x800000 /* require MD5 digests (RFC2385) */ | |
285 | #define TF_MAXSEGSNT 0x1000000 /* last segment sent was a full segment */ | |
286 | #define TF_STREAMING_ON 0x2000000 /* Receiver detected streaming */ | |
287 | #define TF_PMTUD 0x4000000 /* Perform Path MTU Discovery for this connection */ | |
288 | #define TF_CLOSING 0x8000000 /* pending tcp close */ | |
289 | #define TF_TSO 0x10000000 /* TCP Segment Offloading is enable on this connection */ | |
290 | #define TF_BLACKHOLE 0x20000000 /* Path MTU Discovery Black Hole detection */ | |
291 | #define TF_TIMER_ONLIST 0x40000000 /* pcb is on tcp_timer_list */ | |
292 | #define TF_STRETCHACK 0x80000000 /* receiver is going to delay acks */ | |
293 | ||
294 | tcp_seq snd_una; /* send unacknowledged */ | |
295 | tcp_seq snd_max; /* highest sequence number sent; | |
296 | * used to recognize retransmits | |
297 | */ | |
298 | tcp_seq snd_nxt; /* send next */ | |
299 | tcp_seq snd_up; /* send urgent pointer */ | |
300 | ||
301 | tcp_seq snd_wl1; /* window update seg seq number */ | |
302 | tcp_seq snd_wl2; /* window update seg ack number */ | |
303 | tcp_seq iss; /* initial send sequence number */ | |
304 | tcp_seq irs; /* initial receive sequence number */ | |
305 | ||
306 | tcp_seq rcv_nxt; /* receive next */ | |
307 | tcp_seq rcv_adv; /* advertised window */ | |
308 | u_int32_t rcv_wnd; /* receive window */ | |
309 | tcp_seq rcv_up; /* receive urgent pointer */ | |
310 | ||
311 | u_int32_t snd_wnd; /* send window */ | |
312 | u_int32_t snd_cwnd; /* congestion-controlled window */ | |
313 | u_int32_t snd_ssthresh; /* snd_cwnd size threshold for | |
314 | * for slow start exponential to | |
315 | * linear switch | |
316 | */ | |
317 | tcp_seq snd_recover; /* for use in NewReno Fast Recovery */ | |
318 | ||
319 | u_int32_t t_maxopd; /* mss plus options */ | |
320 | u_int32_t t_rcvtime; /* time at which a packet was received */ | |
321 | u_int32_t t_sndtime; /* time at which we last sent new data */ | |
322 | u_int32_t t_starttime; /* time connection was established */ | |
323 | int t_rtttime; /* tcp clock when rtt calculation was started */ | |
324 | tcp_seq t_rtseq; /* sequence number being timed */ | |
325 | ||
326 | u_int32_t rfbuf_ts; /* recv buffer autoscaling timestamp */ | |
327 | u_int32_t rfbuf_cnt; /* recv buffer autoscaling byte count */ | |
328 | ||
329 | int t_rxtcur; /* current retransmit value (ticks) */ | |
330 | u_int t_maxseg; /* maximum segment size */ | |
331 | int t_srtt; /* smoothed round-trip time */ | |
332 | int t_rttvar; /* variance in round-trip time */ | |
333 | ||
334 | u_int64_t t_accsleep_ms; /* accumulated sleep time since last boot */ | |
335 | u_int16_t t_reassqlen; /* length of reassembly queue */ | |
336 | u_int16_t t_rxtshift; /* log(2) of rexmt exp. backoff */ | |
337 | u_int32_t t_rttmin; /* minimum rtt allowed */ | |
338 | u_int32_t t_rttbest; /* best rtt we've seen */ | |
339 | u_int32_t t_rttcur; /* most recent value of rtt */ | |
340 | u_int32_t t_rttupdated; /* number of times rtt sampled */ | |
341 | u_int32_t t_rxt_conndroptime; /* retxmt conn gets dropped after this time, when set */ | |
342 | u_int32_t t_rxtstart; /* time at which retransmission started */ | |
343 | u_int32_t max_sndwnd; /* largest window peer has offered */ | |
344 | ||
345 | int t_softerror; /* possible error not yet reported */ | |
1c79356b | 346 | /* out-of-band data */ |
0a7de745 A |
347 | char t_oobflags; /* have some */ |
348 | char t_iobc; /* input character */ | |
349 | #define TCPOOB_HAVEDATA 0x01 | |
350 | #define TCPOOB_HADDATA 0x02 | |
1c79356b | 351 | /* RFC 1323 variables */ |
0a7de745 A |
352 | u_int8_t snd_scale; /* window scaling for send window */ |
353 | u_int8_t rcv_scale; /* window scaling for recv window */ | |
354 | u_int8_t request_r_scale; /* pending window scaling */ | |
355 | u_int8_t requested_s_scale; | |
356 | u_int8_t tcp_cc_index; /* index of congestion control algorithm */ | |
357 | u_int8_t t_adaptive_rtimo; /* Read timeout used as a multiple of RTT */ | |
358 | u_int8_t t_adaptive_wtimo; /* Write timeout used as a multiple of RTT */ | |
359 | u_int8_t t_stretchack_delayed; /* stretch ack delayed */ | |
fe8ab488 A |
360 | |
361 | /* State for limiting early retransmits when SACK is not enabled */ | |
0a7de745 A |
362 | u_int16_t t_early_rexmt_count; /* count of early rexmts */ |
363 | u_int32_t t_early_rexmt_win; /* window for limiting early rexmts */ | |
fe8ab488 | 364 | |
0a7de745 | 365 | u_int32_t ts_recent; /* timestamp echo data */ |
1c79356b | 366 | |
0a7de745 A |
367 | u_int32_t ts_recent_age; /* when last updated */ |
368 | tcp_seq last_ack_sent; | |
2d21ac55 | 369 | /* RFC 3465 variables */ |
0a7de745 | 370 | u_int32_t t_bytes_acked; /* ABC "bytes_acked" parameter */ |
55e303ae | 371 | |
0a7de745 A |
372 | int t_lastchain; /* amount of packets chained last time around */ |
373 | u_int16_t t_unacksegs; /* received but unacked segments for delaying acks */ | |
374 | u_int8_t t_rexmtthresh; /* duplicate ack threshold for entering fast recovery */ | |
375 | u_int8_t t_rtimo_probes; /* number of adaptive rtimo probes sent */ | |
376 | u_int32_t t_persist_timeout; /* ZWP persistence limit as set by PERSIST_TIMEOUT */ | |
377 | u_int32_t t_persist_stop; /* persistence limit deadline if triggered by ZWP */ | |
378 | u_int32_t t_notsent_lowat; /* Low water for not sent data */ | |
91447636 | 379 | |
6d2010ae | 380 | /* Receiver state for stretch-ack algorithm */ |
0a7de745 A |
381 | u_int32_t rcv_unackwin; /* to measure win for stretching acks */ |
382 | u_int32_t rcv_by_unackwin; /* bytes seen during the last ack-stretching win */ | |
cb323159 | 383 | u_int32_t rcv_by_unackhalfwin; |
0a7de745 A |
384 | u_int32_t rcv_nostrack_ts; /* timestamp when stretch ack was disabled automatically */ |
385 | u_int32_t rcv_nostrack_pkts; /* pkts received since strech ack was disabled */ | |
386 | u_int16_t rcv_waitforss; /* wait for packets during slow-start */ | |
4bd07ac2 A |
387 | |
388 | /* ECN stats */ | |
0a7de745 A |
389 | u_int16_t ecn_flags; |
390 | #define TE_SETUPSENT 0x0001 /* Indicate we have sent ECN-SETUP SYN or SYN-ACK */ | |
391 | #define TE_SETUPRECEIVED 0x0002 /* Indicate we have received ECN-SETUP SYN or SYN-ACK */ | |
392 | #define TE_SENDIPECT 0x0004 /* Indicate we haven't sent or received non-ECN-setup SYN or SYN-ACK */ | |
393 | #define TE_SENDCWR 0x0008 /* Indicate that the next non-retransmit should have the TCP CWR flag set */ | |
394 | #define TE_SENDECE 0x0010 /* Indicate that the next packet should have the TCP ECE flag set */ | |
395 | #define TE_INRECOVERY 0x0020 /* connection entered recovery after receiving ECE */ | |
396 | #define TE_RECV_ECN_CE 0x0040 /* Received IPTOS_ECN_CE marking atleast once */ | |
397 | #define TE_RECV_ECN_ECE 0x0080 /* Received ECE marking atleast once */ | |
398 | #define TE_LOST_SYN 0x0100 /* Lost SYN with ECN setup */ | |
399 | #define TE_LOST_SYNACK 0x0200 /* Lost SYN-ACK with ECN setup */ | |
400 | #define TE_ECN_MODE_ENABLE 0x0400 /* Option ECN mode set to enable */ | |
401 | #define TE_ECN_MODE_DISABLE 0x0800 /* Option ECN mode set to disable */ | |
402 | #define TE_ENABLE_ECN 0x1000 /* Enable negotiation of ECN */ | |
403 | #define TE_ECN_ON (TE_SETUPSENT | TE_SETUPRECEIVED) /* Indicate ECN was successfully negotiated on a connection) */ | |
404 | #define TE_CEHEURI_SET 0x2000 /* We did our CE-probing at the beginning */ | |
405 | #define TE_CLIENT_SETUP 0x4000 /* setup from client side */ | |
406 | #define TE_RCVD_SYN_RST 0x8000 /* Received RST to the first ECN enabled SYN */ | |
407 | ||
408 | u_int32_t t_ecn_recv_ce; /* Received CE from the network */ | |
409 | u_int32_t t_ecn_recv_cwr; /* Packets received with CWR */ | |
316670eb | 410 | |
39236c6e | 411 | /* state for bad retransmit recovery */ |
0a7de745 A |
412 | u_int32_t snd_cwnd_prev; /* cwnd prior to retransmit */ |
413 | u_int32_t snd_ssthresh_prev; /* ssthresh prior to retransmit */ | |
414 | tcp_seq snd_recover_prev; /* snd_recover prior to retransmit */ | |
415 | int t_srtt_prev; /* srtt prior to retransmit */ | |
416 | int t_rttvar_prev; /* rttvar prior to retransmit */ | |
417 | u_int32_t t_badrexmt_time; /* bad rexmt detection time */ | |
39037602 | 418 | |
fe8ab488 | 419 | /* Packet reordering metric */ |
0a7de745 | 420 | u_int16_t t_reorderwin; /* Reordering late time offset */ |
6d2010ae | 421 | |
8ad349bb | 422 | /* SACK related state */ |
0a7de745 A |
423 | int16_t snd_numholes; /* number of holes seen by sender */ |
424 | tcp_seq sack_newdata; /* New data xmitted in this recovery | |
425 | * episode starts at this seq number */ | |
8ad349bb | 426 | TAILQ_HEAD(sackhole_head, sackhole) snd_holes; |
0a7de745 A |
427 | /* SACK scoreboard (sorted) */ |
428 | tcp_seq snd_fack; /* last seq number(+1) sack'd by rcv'r*/ | |
429 | int rcv_numsacks; /* # distinct sack blks present */ | |
8ad349bb | 430 | struct sackblk sackblks[MAX_SACK_BLKS]; /* seq nos. of sack blocks */ |
0a7de745 A |
431 | struct sackhint sackhint; /* SACK scoreboard hint */ |
432 | ||
433 | struct mbuf *t_pktlist_head; /* First packet in transmit chain */ | |
434 | struct mbuf *t_pktlist_tail; /* Last packet in transmit chain */ | |
435 | u_int32_t t_pktlist_sentlen; /* total bytes in transmit chain */ | |
436 | ||
437 | u_int32_t t_keepidle; /* keepalive idle timer (override global if > 0) */ | |
438 | u_int32_t t_keepinit; /* connection timeout, i.e. idle time | |
439 | * in SYN_SENT or SYN_RECV state */ | |
440 | u_int32_t t_keepintvl; /* interval between keepalives */ | |
441 | u_int32_t t_keepcnt; /* number of keepalives before close */ | |
442 | ||
443 | u_int32_t tso_max_segment_size; /* TSO maximum segment unit for NIC */ | |
444 | u_int16_t t_pmtud_lastseg_size; /* size of the last sent segment */ | |
445 | u_int16_t t_pmtud_saved_maxopd; /* MSS saved before performing PMTU-D BlackHole detection */ | |
446 | u_int32_t t_pmtud_start_ts; /* Time of PMTUD blackhole detection */ | |
447 | ||
448 | struct{ | |
449 | u_int32_t rxduplicatebytes; | |
450 | u_int32_t rxoutoforderbytes; | |
451 | u_int32_t txretransmitbytes; | |
452 | u_int8_t synrxtshift; | |
cb323159 | 453 | u_int8_t rxmitsyns; |
0a7de745 A |
454 | u_int16_t unused_pad_to_8; |
455 | u_int32_t rxmitpkts; | |
6d2010ae | 456 | } t_stat; |
0a7de745 A |
457 | u_int8_t t_notify_ack_count; |
458 | u_int8_t t_ecn_recv_ce_pkt; /* Received packet with CE-bit set (independent from last_ack_sent) */ | |
459 | u_int16_t t_cached_maxopd; /* default for MSS adjustment using link status report */ | |
460 | ||
461 | uint32_t bg_ssthresh; /* Slow start threshold until delay increases */ | |
462 | uint32_t t_flagsext; /* Another field to accommodate more flags */ | |
463 | #define TF_RXTFINDROP 0x1 /* Drop conn after retransmitting FIN 3 times */ | |
464 | #define TF_RCVUNACK_WAITSS 0x2 /* set when the receiver should not stretch acks */ | |
465 | #define TF_BWMEAS_INPROGRESS 0x4 /* Indicate BW meas is happening */ | |
466 | #define TF_MEASURESNDBW 0x8 /* Measure send bw on this connection */ | |
467 | #define TF_LRO_OFFLOADED 0x10 /* Connection LRO offloaded */ | |
468 | #define TF_SACK_ENABLE 0x20 /* SACK is enabled */ | |
469 | #define TF_RECOMPUTE_RTT 0x40 /* recompute RTT after spurious retransmit */ | |
470 | #define TF_DETECT_READSTALL 0x80 /* Used to detect a stall during read operation */ | |
471 | #define TF_RECV_THROTTLE 0x100 /* Input throttling active */ | |
472 | #define TF_NOSTRETCHACK 0x200 /* ack every other packet */ | |
473 | #define TF_NOTIMEWAIT 0x800 /* Avoid going into time-wait */ | |
474 | #define TF_SENT_TLPROBE 0x1000 /* Sent data in PTO */ | |
475 | #define TF_PKTS_REORDERED 0x2000 /* Detected reordering */ | |
476 | #define TF_DELAY_RECOVERY 0x4000 /* delay fast recovery */ | |
477 | #define TF_FORCE 0x8000 /* force 1 byte out */ | |
478 | #define TF_DISABLE_STRETCHACK 0x10000 /* auto-disable stretch ack */ | |
479 | #define TF_NOBLACKHOLE_DETECTION 0x20000 /* Disable PMTU blackhole detection */ | |
480 | #define TF_DISABLE_DSACK 0x40000 /* Ignore DSACK due to n/w duplication */ | |
481 | #define TF_RESCUE_RXT 0x80000 /* SACK rescue retransmit */ | |
482 | #define TF_CWND_NONVALIDATED 0x100000 /* cwnd non validated */ | |
cb323159 | 483 | #define TF_IF_PROBING 0x200000 /* Trigger interface probe timeout */ |
0a7de745 A |
484 | #define TF_FASTOPEN 0x400000 /* TCP Fastopen is enabled */ |
485 | #define TF_REASS_INPROG 0x800000 /* Reassembly is in progress */ | |
cb323159 A |
486 | #define TF_FASTOPEN_FORCE_ENABLE 0x1000000 /* Force-enable TCP Fastopen */ |
487 | #define TF_LOGGED_CONN_SUMMARY 0x2000000 /* Connection summary was logged */ | |
fe8ab488 | 488 | |
6d2010ae A |
489 | #if TRAFFIC_MGT |
490 | /* Inter-arrival jitter related state */ | |
0a7de745 A |
491 | uint32_t iaj_rcv_ts; /* tcp clock when the first packet was received */ |
492 | uint16_t iaj_size; /* Size of packet for iaj measurement */ | |
493 | uint8_t iaj_small_pkt; /* Count of packets smaller than iaj_size */ | |
494 | uint8_t t_pipeack_ind; /* index for next pipeack sample */ | |
495 | uint16_t iaj_pktcnt; /* packet count, to avoid throttling initially */ | |
496 | uint16_t acc_iaj; /* Accumulated iaj */ | |
497 | uint32_t avg_iaj; /* Mean */ | |
498 | uint32_t std_dev_iaj; /* Standard deviation */ | |
6d2010ae | 499 | #endif /* TRAFFIC_MGT */ |
0a7de745 A |
500 | struct bwmeas *t_bwmeas; /* State for bandwidth measurement */ |
501 | uint32_t t_lropktlen; /* Bytes in a LRO frame */ | |
502 | tcp_seq t_idleat; /* rcv_nxt at idle time */ | |
503 | TAILQ_ENTRY(tcpcb) t_twentry; /* link for time wait queue */ | |
504 | struct tcp_ccstate *t_ccstate; /* congestion control related state */ | |
fe8ab488 | 505 | /* Tail loss probe related state */ |
0a7de745 A |
506 | tcp_seq t_tlphighrxt; /* snd_nxt after PTO */ |
507 | u_int32_t t_tlpstart; /* timestamp at PTO */ | |
3e170ce0 | 508 | /* DSACK data receiver state */ |
0a7de745 A |
509 | tcp_seq t_dsack_lseq; /* DSACK left sequence */ |
510 | tcp_seq t_dsack_rseq; /* DSACK right sequence */ | |
3e170ce0 A |
511 | /* DSACK data sender state */ |
512 | SLIST_HEAD(tcp_rxt_seghead, tcp_rxt_seg) t_rxt_segments; | |
0a7de745 | 513 | tcp_seq t_dsack_lastuna; /* snd_una when last recovery episode started */ |
3e170ce0 | 514 | /* state for congestion window validation (draft-ietf-tcpm-newcwv-07) */ |
0a7de745 A |
515 | #define TCP_PIPEACK_SAMPLE_COUNT 3 |
516 | u_int32_t t_pipeack_sample[TCP_PIPEACK_SAMPLE_COUNT]; /* pipeack, bytes acked within RTT */ | |
517 | tcp_seq t_pipeack_lastuna; /* una when pipeack measurement started */ | |
518 | u_int32_t t_pipeack; | |
519 | u_int32_t t_lossflightsize; | |
3e170ce0 | 520 | |
39236c6e | 521 | #if MPTCP |
0a7de745 A |
522 | u_int32_t t_mpflags; /* flags for multipath TCP */ |
523 | ||
524 | #define TMPF_PREESTABLISHED 0x00000001 /* conn in pre-established state */ | |
525 | #define TMPF_SND_KEYS 0x00000002 /* indicates that keys should be send */ | |
526 | #define TMPF_MPTCP_TRUE 0x00000004 /* negotiated MPTCP successfully */ | |
527 | #define TMPF_MPTCP_RCVD_KEY 0x00000008 /* state for 3-way handshake */ | |
528 | #define TMPF_SND_MPPRIO 0x00000010 /* send priority of subflow */ | |
529 | #define TMPF_SND_REM_ADDR 0x00000020 /* initiate address removal */ | |
530 | #define TMPF_RCVD_DACK 0x00000040 /* received a data-ack */ | |
531 | #define TMPF_JOINED_FLOW 0x00000080 /* Indicates additional flow */ | |
532 | #define TMPF_BACKUP_PATH 0x00000100 /* Indicates backup path */ | |
533 | #define TMPF_MPTCP_ACKNOW 0x00000200 /* Send Data ACK */ | |
534 | #define TMPF_SEND_DSN 0x00000400 /* Send DSN mapping */ | |
535 | #define TMPF_SEND_DFIN 0x00000800 /* Send Data FIN */ | |
536 | #define TMPF_RECV_DFIN 0x00001000 /* Recv Data FIN */ | |
537 | #define TMPF_SENT_JOIN 0x00002000 /* Sent Join */ | |
538 | #define TMPF_RECVD_JOIN 0x00004000 /* Received Join */ | |
539 | #define TMPF_RESET 0x00008000 /* Send RST */ | |
540 | #define TMPF_TCP_FALLBACK 0x00010000 /* Fallback to TCP */ | |
541 | #define TMPF_FASTCLOSERCV 0x00020000 /* Received Fastclose option */ | |
542 | #define TMPF_EMBED_DSN 0x00040000 /* tp has DSN mapping */ | |
543 | #define TMPF_MPTCP_READY 0x00080000 /* Can send DSS options on data */ | |
544 | #define TMPF_INFIN_SENT 0x00100000 /* Sent infinite mapping */ | |
545 | #define TMPF_SND_MPFAIL 0x00200000 /* Received mapping csum failure */ | |
546 | #define TMPF_SND_JACK 0x00400000 /* Send a Join-ACK */ | |
547 | #define TMPF_TFO_REQUEST 0x00800000 /* TFO Requested */ | |
548 | ||
549 | #define TMPF_MPTCP_SIGNALS (TMPF_SND_MPPRIO | TMPF_SND_REM_ADDR | TMPF_SND_MPFAIL | TMPF_SND_KEYS | TMPF_SND_JACK) | |
550 | ||
551 | tcp_seq t_mpuna; /* unacknowledged sequence */ | |
552 | struct mptcb *t_mptcb; /* pointer to MPTCP TCB */ | |
553 | struct mptsub *t_mpsub; /* pointer to the MPTCP subflow */ | |
554 | struct mpt_dsn_map t_rcv_map; /* Receive mapping list */ | |
555 | u_int8_t t_local_aid; /* Addr Id for authentication */ | |
556 | u_int8_t t_rem_aid; /* Addr ID of another subflow */ | |
557 | u_int8_t t_mprxtshift; /* join retransmission */ | |
39236c6e | 558 | #endif /* MPTCP */ |
3e170ce0 | 559 | |
0a7de745 A |
560 | #define TFO_F_OFFER_COOKIE 0x01 /* We will offer a cookie */ |
561 | #define TFO_F_COOKIE_VALID 0x02 /* The received cookie is valid */ | |
562 | #define TFO_F_COOKIE_REQ 0x04 /* Client requested a new cookie */ | |
563 | #define TFO_F_COOKIE_SENT 0x08 /* Client did send a cookie in the SYN */ | |
564 | #define TFO_F_SYN_LOSS 0x10 /* A SYN-loss triggered a fallback to regular TCP on the client-side */ | |
565 | #define TFO_F_NO_SNDPROBING 0x20 /* This network is guaranteed to support TFO in the upstream direction */ | |
566 | #define TFO_F_HEURISTIC_DONE 0x40 /* We have already marked this network as bad */ | |
567 | u_int8_t t_tfo_flags; | |
568 | #define TFO_S_SYNDATA_RCV 0x01 /* SYN+data has been received */ | |
569 | #define TFO_S_COOKIEREQ_RECV 0x02 /* TFO-cookie request received */ | |
570 | #define TFO_S_COOKIE_SENT 0x04 /* TFO-cookie announced in SYN/ACK */ | |
571 | #define TFO_S_COOKIE_INVALID 0x08 /* Received TFO-cookie is invalid */ | |
572 | #define TFO_S_COOKIE_REQ 0x10 /* TFO-cookie requested within the SYN */ | |
573 | #define TFO_S_COOKIE_RCV 0x20 /* TFO-cookie received in SYN/ACK */ | |
574 | #define TFO_S_SYN_DATA_SENT 0x40 /* SYN+data sent */ | |
575 | #define TFO_S_SYN_DATA_ACKED 0x80 /* SYN+data has been acknowledged in SYN/ACK */ | |
576 | #define TFO_S_SYN_LOSS 0x0100 /* SYN+TFO has been lost - fallback to regular TCP */ | |
577 | #define TFO_S_COOKIE_WRONG 0x0200 /* Cookie we sent in the SYN was wrong */ | |
578 | #define TFO_S_NO_COOKIE_RCV 0x0400 /* We asked for a cookie but didn't get one */ | |
579 | #define TFO_S_HEURISTICS_DISABLE 0x0800 /* TFO-heuristics disabled it for this connection */ | |
580 | #define TFO_S_SEND_BLACKHOLE 0x1000 /* TFO got blackholed in the send direction */ | |
581 | #define TFO_S_RECV_BLACKHOLE 0x2000 /* TFO got blackholed in the recv direction */ | |
582 | #define TFO_S_ONE_BYTE_PROXY 0x4000 /* TFO failed because of a proxy acknowledging just one byte */ | |
583 | u_int16_t t_tfo_stats; | |
584 | ||
585 | u_int8_t t_tfo_probes; /* TFO-probes we did send */ | |
3e170ce0 A |
586 | /* |
587 | * This here is the TFO-probing state-machine. Transitions are as follows: | |
588 | * | |
589 | * Current state: PROBE_NONE | |
590 | * Event: SYN+DATA acknowledged | |
591 | * Action: Transition to PROBE_PROBING and set keepalive-timer | |
592 | * | |
593 | * Current state: PROBE_PROBING (initial state) | |
594 | * Event: Receive data | |
595 | * Action: Transition to PROBE_NONE and cancel keepalive-timer | |
596 | * Event: Receive ACK that does not indicate a hole | |
597 | * Action: Transition to PROBE_NONE and cancel keepalive-timer | |
598 | * Event: Receive ACK that indicates a hole | |
599 | * Action: Transition to PROBE_WAIT_DATA and set a short timer | |
600 | * to wait for the final segment. | |
601 | * Event: Keepalive-timeout (did not receive any segment) | |
602 | * Action: Signal ETIMEDOUT as with regular keepalive-timers | |
603 | * | |
604 | * Current state: PROBE_WAIT_DATA | |
605 | * Event: Receive data | |
606 | * Action: Transition to PROBE_NONE and cancel keepalive-timer | |
607 | * Event: Data-timeout (did not receive the expected data) | |
608 | * Action: Signal ENODATA up to the app and close everything. | |
609 | */ | |
0a7de745 A |
610 | #define TFO_PROBE_NONE 0 /* Not probing now */ |
611 | #define TFO_PROBE_PROBING 1 /* Sending out TCP-keepalives waiting for reply */ | |
612 | #define TFO_PROBE_WAIT_DATA 2 /* Received reply, waiting for data */ | |
613 | u_int8_t t_tfo_probe_state; | |
614 | ||
615 | u_int32_t t_rcvoopack; /* out-of-order packets received */ | |
616 | u_int32_t t_pawsdrop; /* segments dropped due to PAWS */ | |
617 | u_int32_t t_sack_recovery_episode; /* SACK recovery episodes */ | |
618 | u_int32_t t_reordered_pkts; /* packets reorderd */ | |
619 | u_int32_t t_dsack_sent; /* Sent DSACK notification */ | |
620 | u_int32_t t_dsack_recvd; /* Received a valid DSACK option */ | |
621 | SLIST_HEAD(, tcp_notify_ack_marker) t_notify_ack; /* state for notifying data acknowledgements */ | |
622 | u_int32_t t_recv_throttle_ts; /* TS for start of recv throttle */ | |
623 | u_int32_t t_rxt_minimum_timeout; /* minimum retransmit timeout in ms */ | |
624 | uint32_t t_challengeack_last; /* last time challenge ACK was sent per sec */ | |
625 | uint32_t t_challengeack_count; /* # of challenge ACKs already sent per sec */ | |
cb323159 A |
626 | |
627 | u_int32_t t_log_flags; /* TCP logging flags*/ | |
628 | u_int32_t t_connect_time; /* time when the connection started */ | |
55e303ae | 629 | }; |
55e303ae | 630 | |
0a7de745 A |
631 | #define IN_FASTRECOVERY(tp) (tp->t_flags & TF_FASTRECOVERY) |
632 | #define SACK_ENABLED(tp) (tp->t_flagsext & TF_SACK_ENABLE) | |
316670eb A |
633 | |
634 | /* | |
39037602 | 635 | * If the connection is in a throttled state due to advisory feedback from |
316670eb | 636 | * the interface output queue, reset that state. We do this in favor |
39037602 | 637 | * of entering recovery because the data transfer during recovery |
316670eb A |
638 | * should be just a trickle and it will help to improve performance. |
639 | * We also do not want to back off twice in the same RTT. | |
640 | */ | |
0a7de745 A |
641 | #define ENTER_FASTRECOVERY(_tp_) do { \ |
642 | (_tp_)->t_flags |= TF_FASTRECOVERY; \ | |
643 | if (INP_IS_FLOW_CONTROLLED((_tp_)->t_inpcb)) \ | |
644 | inp_reset_fc_state((_tp_)->t_inpcb); \ | |
645 | if (!SLIST_EMPTY(&tp->t_rxt_segments)) \ | |
646 | tcp_rxtseg_clean(tp); \ | |
316670eb A |
647 | } while(0) |
648 | ||
0a7de745 A |
649 | #define EXIT_FASTRECOVERY(_tp_) do { \ |
650 | (_tp_)->t_flags &= ~TF_FASTRECOVERY; \ | |
651 | (_tp_)->t_dupacks = 0; \ | |
652 | (_tp_)->t_rexmtthresh = tcprexmtthresh; \ | |
653 | (_tp_)->t_bytes_acked = 0; \ | |
654 | (_tp_)->ecn_flags &= ~TE_INRECOVERY; \ | |
655 | (_tp_)->t_timer[TCPT_PTO] = 0; \ | |
656 | (_tp_)->t_flagsext &= ~TF_RESCUE_RXT; \ | |
657 | (_tp_)->t_lossflightsize = 0; \ | |
39236c6e A |
658 | } while(0) |
659 | ||
660 | /* | |
39037602 | 661 | * When the number of duplicate acks received is less than |
39236c6e A |
662 | * the retransmit threshold, use Limited Transmit algorithm |
663 | */ | |
664 | extern int tcprexmtthresh; | |
665 | #define ALLOW_LIMITED_TRANSMIT(_tp_) \ | |
666 | ((_tp_)->t_dupacks > 0 && \ | |
fe8ab488 A |
667 | (_tp_)->t_dupacks < (_tp_)->t_rexmtthresh && \ |
668 | ((_tp_)->t_flagsext & (TF_PKTS_REORDERED|TF_DELAY_RECOVERY)) \ | |
669 | != (TF_PKTS_REORDERED|TF_DELAY_RECOVERY)) | |
39236c6e A |
670 | |
671 | /* | |
672 | * This condition is true is timestamp option is supported | |
673 | * on a connection. | |
674 | */ | |
675 | #define TSTMP_SUPPORTED(_tp_) \ | |
676 | (((_tp_)->t_flags & (TF_REQ_TSTMP|TF_RCVD_TSTMP)) == \ | |
0a7de745 | 677 | (TF_REQ_TSTMP|TF_RCVD_TSTMP)) |
39236c6e | 678 | |
3e170ce0 A |
679 | /* |
680 | * This condition is true if window scale option is supported | |
681 | * on a connection | |
682 | */ | |
0a7de745 | 683 | #define TCP_WINDOW_SCALE_ENABLED(_tp_) \ |
3e170ce0 | 684 | (((_tp_)->t_flags & (TF_RCVD_SCALE|TF_REQ_SCALE)) == \ |
0a7de745 | 685 | (TF_RCVD_SCALE|TF_REQ_SCALE)) |
3e170ce0 A |
686 | |
687 | /* Is ECN enabled end-to-end */ | |
0a7de745 | 688 | #define TCP_ECN_ENABLED(_tp_) \ |
3e170ce0 A |
689 | (((_tp_)->ecn_flags & (TE_ECN_ON)) == (TE_ECN_ON)) |
690 | ||
39236c6e A |
691 | /* |
692 | * Gives number of bytes acked by this ack | |
693 | */ | |
694 | #define BYTES_ACKED(_th_, _tp_) \ | |
695 | ((_th_)->th_ack - (_tp_)->snd_una) | |
8ad349bb | 696 | |
3e170ce0 | 697 | /* Returns true if a DSACK option should be sent */ |
0a7de745 | 698 | #define TCP_SEND_DSACK_OPT(_tp_) \ |
3e170ce0 A |
699 | ((_tp_)->t_dsack_lseq > 0 && (_tp_)->t_dsack_rseq > 0) |
700 | ||
701 | /* Check if DSACK option should be processed */ | |
0a7de745 | 702 | #define TCP_DSACK_ENABLED(tp) (tcp_dsack_enable == 1 && \ |
3e170ce0 A |
703 | !(tp->t_flagsext & TF_DISABLE_DSACK)) |
704 | ||
705 | /* | |
706 | * Returns true if a DSACK sequence is within the max send window that will | |
707 | * be accepted. In order to set a window to validate sequence numbers, the | |
708 | * max send window within which a DSACK option is processed is limited. | |
709 | * | |
710 | * We need to choose a maximum window to check if the sequence number is | |
711 | * within the window. One arbitrary choice is 256 * MSS because if the | |
712 | * window is as large as 256 segments it might be big enough to ignore the | |
713 | * DSACK option. Choosing a much larger limit means that the memory for | |
714 | * retransmit segments can be held for a longer time. | |
715 | */ | |
0a7de745 | 716 | #define TCP_DSACK_MAX_SEND_WINDOW(_tp_) ((_tp_)->t_maxseg << 8) |
3e170ce0 A |
717 | #define TCP_DSACK_SEQ_IN_WINDOW(_tp_, _seq_, _una_) \ |
718 | (SEQ_LEQ((_seq_), (_tp_)->snd_max) && \ | |
719 | SEQ_GEQ((_seq_), ((_una_) - TCP_DSACK_MAX_SEND_WINDOW(_tp_)))) | |
720 | ||
39037602 A |
721 | #define TCP_RESET_REXMT_STATE(_tp_) do { \ |
722 | (_tp_)->t_rxtshift = 0; \ | |
723 | (_tp_)->t_rxtstart = 0; \ | |
5ba3f43e | 724 | mptcp_reset_rexmit_state((_tp_)); \ |
39037602 A |
725 | } while(0); |
726 | ||
0a7de745 A |
727 | #define TCP_AUTORCVBUF_MAX(_ifp_) (((_ifp_) != NULL && (IFNET_IS_CELLULAR((_ifp_))) && ((_ifp_)->if_eflags & IFEF_3CA)) ? \ |
728 | (tcp_autorcvbuf_max << 1) : tcp_autorcvbuf_max) | |
3e170ce0 | 729 | |
cb323159 A |
730 | #define TCP_IF_STATE_CHANGED(tp, probe_if_index) \ |
731 | (probe_if_index > 0 && tp->t_inpcb->inp_last_outifp != NULL && \ | |
732 | probe_if_index == tp->t_inpcb->inp_last_outifp->if_index) | |
8ad349bb | 733 | |
91447636 A |
734 | /* |
735 | * Structure to hold TCP options that are only used during segment | |
736 | * processing (in tcp_input), but not held in the tcpcb. | |
737 | * It's basically used to reduce the number of parameters | |
738 | * to tcp_dooptions. | |
739 | */ | |
740 | struct tcpopt { | |
0a7de745 A |
741 | u_int32_t to_flags; /* which options are present */ |
742 | #define TOF_TS 0x0001 /* timestamp */ | |
743 | #define TOF_MSS 0x0010 | |
744 | #define TOF_SCALE 0x0020 | |
745 | #define TOF_SIGNATURE 0x0040 /* signature option present */ | |
746 | #define TOF_SIGLEN 0x0080 /* signature length valid (RFC2385) */ | |
747 | #define TOF_SACK 0x0100 /* Peer sent SACK option */ | |
748 | #define TOF_MPTCP 0x0200 /* MPTCP options to be dropped */ | |
749 | #define TOF_TFO 0x0400 /* TFO cookie option present */ | |
750 | #define TOF_TFOREQ 0x0800 /* TFO cookie request present */ | |
751 | u_int32_t to_tsval; | |
752 | u_int32_t to_tsecr; | |
753 | u_int16_t to_mss; | |
754 | u_int8_t to_requested_s_scale; | |
755 | u_int8_t to_nsacks; /* number of SACK blocks */ | |
756 | u_char *to_sacks; /* pointer to the first SACK blocks */ | |
757 | u_char *to_tfo; /* pointer to the TFO cookie */ | |
91447636 | 758 | }; |
55e303ae | 759 | |
91447636 A |
760 | /* |
761 | * The TAO cache entry which is stored in the protocol family specific | |
762 | * portion of the route metrics. | |
763 | */ | |
764 | struct rmxp_tao { | |
0a7de745 A |
765 | tcp_cc tao_cc; /* latest CC in valid SYN */ |
766 | tcp_cc tao_ccsent; /* latest CC sent to peer */ | |
767 | u_short tao_mssopt; /* peer's cached MSS */ | |
91447636 | 768 | #ifdef notyet |
0a7de745 A |
769 | u_short tao_flags; /* cache status flags */ |
770 | #define TAOF_DONT 0x0001 /* peer doesn't understand rfc1644 */ | |
771 | #define TAOF_OK 0x0002 /* peer does understand rfc1644 */ | |
772 | #define TAOF_UNDEF 0 /* we don't know yet */ | |
91447636 A |
773 | #endif /* notyet */ |
774 | }; | |
0a7de745 | 775 | #define rmx_taop(r) ((struct rmxp_tao *)(r).rmx_filler) |
91447636 | 776 | |
0a7de745 A |
777 | #define intotcpcb(ip) ((struct tcpcb *)(ip)->inp_ppcb) |
778 | #define sototcpcb(so) (intotcpcb(sotoinpcb(so))) | |
55e303ae | 779 | |
3e170ce0 | 780 | /* TFO-specific defines */ |
0a7de745 A |
781 | #define TFO_COOKIE_LEN_MIN 4 |
782 | #define TFO_COOKIE_LEN_DEFAULT 8 | |
783 | #define TFO_COOKIE_LEN_MAX 16 | |
3e170ce0 | 784 | |
91447636 A |
785 | /* |
786 | * The initial retransmission should happen at rtt + 4 * rttvar. | |
787 | * Because of the way we do the smoothing, srtt and rttvar | |
788 | * will each average +1/2 tick of bias. When we compute | |
789 | * the retransmit timer, we want 1/2 tick of rounding and | |
790 | * 1 extra tick because of +-1/2 tick uncertainty in the | |
791 | * firing of the timer. The bias will give us exactly the | |
792 | * 1.5 tick we need. But, because the bias is | |
793 | * statistical, we have to test that we don't drop below | |
794 | * the minimum feasible timer (which is 2 ticks). | |
795 | * This version of the macro adapted from a paper by Lawrence | |
796 | * Brakmo and Larry Peterson which outlines a problem caused | |
797 | * by insufficient precision in the original implementation, | |
798 | * which results in inappropriately large RTO values for very | |
799 | * fast networks. | |
800 | */ | |
0a7de745 | 801 | #define TCP_REXMTVAL(tp) \ |
91447636 A |
802 | max((tp)->t_rttmin, (((tp)->t_srtt >> (TCP_RTT_SHIFT - TCP_DELTA_SHIFT)) \ |
803 | + (tp)->t_rttvar) >> TCP_DELTA_SHIFT) | |
55e303ae A |
804 | |
805 | /* | |
806 | * Jaguar compatible TCP control block, for xtcpcb | |
807 | * Does not have the old fields | |
808 | */ | |
809 | struct otcpcb { | |
91447636 A |
810 | #else |
811 | struct tseg_qent; | |
2d21ac55 | 812 | _TCPCB_LIST_HEAD(tsegqe_head, tseg_qent); |
91447636 A |
813 | |
814 | struct tcpcb { | |
815 | #endif /* KERNEL_PRIVATE */ | |
b0d623f7 A |
816 | #if defined(KERNEL_PRIVATE) |
817 | u_int32_t t_segq; | |
818 | #else | |
0a7de745 | 819 | struct tsegqe_head t_segq; |
b0d623f7 | 820 | #endif /* KERNEL_PRIVATE */ |
0a7de745 A |
821 | int t_dupacks; /* consecutive dup acks recd */ |
822 | u_int32_t unused; /* unused now: was t_template */ | |
823 | ||
824 | int t_timer[TCPT_NTIMERS_EXT]; /* tcp timers */ | |
825 | ||
826 | _TCPCB_PTR(struct inpcb *) t_inpcb; /* back pointer to internet pcb */ | |
827 | int t_state; /* state of this connection */ | |
828 | u_int t_flags; | |
829 | #define TF_ACKNOW 0x00001 /* ack peer immediately */ | |
830 | #define TF_DELACK 0x00002 /* ack, but try to delay it */ | |
831 | #define TF_NODELAY 0x00004 /* don't delay packets to coalesce */ | |
832 | #define TF_NOOPT 0x00008 /* don't use tcp options */ | |
833 | #define TF_SENTFIN 0x00010 /* have sent FIN */ | |
834 | #define TF_REQ_SCALE 0x00020 /* have/will request window scaling */ | |
835 | #define TF_RCVD_SCALE 0x00040 /* other side has requested scaling */ | |
836 | #define TF_REQ_TSTMP 0x00080 /* have/will request timestamps */ | |
837 | #define TF_RCVD_TSTMP 0x00100 /* a timestamp was received in SYN */ | |
838 | #define TF_SACK_PERMIT 0x00200 /* other side said I could SACK */ | |
839 | #define TF_NEEDSYN 0x00400 /* send SYN (implicit state) */ | |
840 | #define TF_NEEDFIN 0x00800 /* send FIN (implicit state) */ | |
841 | #define TF_NOPUSH 0x01000 /* don't push */ | |
842 | #define TF_REQ_CC 0x02000 /* have/will request CC */ | |
843 | #define TF_RCVD_CC 0x04000 /* a CC was received in SYN */ | |
844 | #define TF_SENDCCNEW 0x08000 /* Not implemented */ | |
845 | #define TF_MORETOCOME 0x10000 /* More data to be appended to sock */ | |
846 | #define TF_LQ_OVERFLOW 0x20000 /* listen queue overflow */ | |
847 | #define TF_RXWIN0SENT 0x40000 /* sent a receiver win 0 in response */ | |
848 | #define TF_SLOWLINK 0x80000 /* route is a on a modem speed link */ | |
849 | ||
850 | int t_force; /* 1 if forcing out a byte */ | |
851 | ||
852 | tcp_seq snd_una; /* send unacknowledged */ | |
853 | tcp_seq snd_max; /* highest sequence number sent; | |
854 | * used to recognize retransmits | |
855 | */ | |
856 | tcp_seq snd_nxt; /* send next */ | |
857 | tcp_seq snd_up; /* send urgent pointer */ | |
858 | ||
859 | tcp_seq snd_wl1; /* window update seg seq number */ | |
860 | tcp_seq snd_wl2; /* window update seg ack number */ | |
861 | tcp_seq iss; /* initial send sequence number */ | |
862 | tcp_seq irs; /* initial receive sequence number */ | |
863 | ||
864 | tcp_seq rcv_nxt; /* receive next */ | |
865 | tcp_seq rcv_adv; /* advertised window */ | |
866 | u_int32_t rcv_wnd; /* receive window */ | |
867 | tcp_seq rcv_up; /* receive urgent pointer */ | |
868 | ||
869 | u_int32_t snd_wnd; /* send window */ | |
870 | u_int32_t snd_cwnd; /* congestion-controlled window */ | |
871 | u_int32_t snd_ssthresh; /* snd_cwnd size threshold for | |
872 | * for slow start exponential to | |
873 | * linear switch | |
874 | */ | |
875 | u_int t_maxopd; /* mss plus options */ | |
876 | ||
877 | u_int32_t t_rcvtime; /* time at which a packet was received */ | |
878 | u_int32_t t_starttime; /* time connection was established */ | |
879 | int t_rtttime; /* round trip time */ | |
880 | tcp_seq t_rtseq; /* sequence number being timed */ | |
881 | ||
882 | int t_rxtcur; /* current retransmit value (ticks) */ | |
883 | u_int t_maxseg; /* maximum segment size */ | |
884 | int t_srtt; /* smoothed round-trip time */ | |
885 | int t_rttvar; /* variance in round-trip time */ | |
886 | ||
887 | int t_rxtshift; /* log(2) of rexmt exp. backoff */ | |
888 | u_int t_rttmin; /* minimum rtt allowed */ | |
889 | u_int32_t t_rttupdated; /* number of times rtt sampled */ | |
890 | u_int32_t max_sndwnd; /* largest window peer has offered */ | |
891 | ||
892 | int t_softerror; /* possible error not yet reported */ | |
55e303ae | 893 | /* out-of-band data */ |
0a7de745 A |
894 | char t_oobflags; /* have some */ |
895 | char t_iobc; /* input character */ | |
896 | #define TCPOOB_HAVEDATA 0x01 | |
897 | #define TCPOOB_HADDATA 0x02 | |
55e303ae | 898 | /* RFC 1323 variables */ |
0a7de745 A |
899 | u_char snd_scale; /* window scaling for send window */ |
900 | u_char rcv_scale; /* window scaling for recv window */ | |
901 | u_char request_r_scale; /* pending window scaling */ | |
902 | u_char requested_s_scale; | |
903 | u_int32_t ts_recent; /* timestamp echo data */ | |
904 | ||
905 | u_int32_t ts_recent_age; /* when last updated */ | |
906 | tcp_seq last_ack_sent; | |
55e303ae | 907 | /* RFC 1644 variables */ |
0a7de745 A |
908 | tcp_cc cc_send; /* send connection count */ |
909 | tcp_cc cc_recv; /* receive connection count */ | |
910 | tcp_seq snd_recover; /* for use in fast recovery */ | |
55e303ae | 911 | /* experimental */ |
0a7de745 A |
912 | u_int32_t snd_cwnd_prev; /* cwnd prior to retransmit */ |
913 | u_int32_t snd_ssthresh_prev; /* ssthresh prior to retransmit */ | |
914 | u_int32_t t_badrxtwin; /* window for retransmit recovery */ | |
1c79356b A |
915 | }; |
916 | ||
3e170ce0 A |
917 | #define tcps_ecn_setup tcps_ecn_client_success |
918 | #define tcps_sent_cwr tcps_ecn_recv_ece | |
919 | #define tcps_sent_ece tcps_ecn_sent_ece | |
b0d623f7 | 920 | |
1c79356b A |
921 | /* |
922 | * TCP statistics. | |
923 | * Many of these should be kept per connection, | |
924 | * but that's inconvenient at the moment. | |
925 | */ | |
0a7de745 A |
926 | struct tcpstat { |
927 | u_int32_t tcps_connattempt; /* connections initiated */ | |
928 | u_int32_t tcps_accepts; /* connections accepted */ | |
929 | u_int32_t tcps_connects; /* connections established */ | |
930 | u_int32_t tcps_drops; /* connections dropped */ | |
931 | u_int32_t tcps_conndrops; /* embryonic connections dropped */ | |
932 | u_int32_t tcps_closed; /* conn. closed (includes drops) */ | |
933 | u_int32_t tcps_segstimed; /* segs where we tried to get rtt */ | |
934 | u_int32_t tcps_rttupdated; /* times we succeeded */ | |
935 | u_int32_t tcps_delack; /* delayed acks sent */ | |
936 | u_int32_t tcps_timeoutdrop; /* conn. dropped in rxmt timeout */ | |
937 | u_int32_t tcps_rexmttimeo; /* retransmit timeouts */ | |
938 | u_int32_t tcps_persisttimeo; /* persist timeouts */ | |
939 | u_int32_t tcps_keeptimeo; /* keepalive timeouts */ | |
940 | u_int32_t tcps_keepprobe; /* keepalive probes sent */ | |
941 | u_int32_t tcps_keepdrops; /* connections dropped in keepalive */ | |
942 | ||
943 | u_int32_t tcps_sndtotal; /* total packets sent */ | |
944 | u_int32_t tcps_sndpack; /* data packets sent */ | |
945 | u_int32_t tcps_sndbyte; /* data bytes sent */ | |
946 | u_int32_t tcps_sndrexmitpack; /* data packets retransmitted */ | |
947 | u_int32_t tcps_sndrexmitbyte; /* data bytes retransmitted */ | |
948 | u_int32_t tcps_sndacks; /* ack-only packets sent */ | |
949 | u_int32_t tcps_sndprobe; /* window probes sent */ | |
950 | u_int32_t tcps_sndurg; /* packets sent with URG only */ | |
951 | u_int32_t tcps_sndwinup; /* window update-only packets sent */ | |
952 | u_int32_t tcps_sndctrl; /* control (SYN|FIN|RST) packets sent */ | |
953 | ||
954 | u_int32_t tcps_rcvtotal; /* total packets received */ | |
955 | u_int32_t tcps_rcvpack; /* packets received in sequence */ | |
956 | u_int32_t tcps_rcvbyte; /* bytes received in sequence */ | |
957 | u_int32_t tcps_rcvbadsum; /* packets received with ccksum errs */ | |
958 | u_int32_t tcps_rcvbadoff; /* packets received with bad offset */ | |
959 | u_int32_t tcps_rcvmemdrop; /* packets dropped for lack of memory */ | |
960 | u_int32_t tcps_rcvshort; /* packets received too short */ | |
961 | u_int32_t tcps_rcvduppack; /* duplicate-only packets received */ | |
962 | u_int32_t tcps_rcvdupbyte; /* duplicate-only bytes received */ | |
963 | u_int32_t tcps_rcvpartduppack; /* packets with some duplicate data */ | |
964 | u_int32_t tcps_rcvpartdupbyte; /* dup. bytes in part-dup. packets */ | |
965 | u_int32_t tcps_rcvoopack; /* out-of-order packets received */ | |
966 | u_int32_t tcps_rcvoobyte; /* out-of-order bytes received */ | |
967 | u_int32_t tcps_rcvpackafterwin; /* packets with data after window */ | |
968 | u_int32_t tcps_rcvbyteafterwin; /* bytes rcvd after window */ | |
969 | u_int32_t tcps_rcvafterclose; /* packets rcvd after "close" */ | |
970 | u_int32_t tcps_rcvwinprobe; /* rcvd window probe packets */ | |
971 | u_int32_t tcps_rcvdupack; /* rcvd duplicate acks */ | |
972 | u_int32_t tcps_rcvacktoomuch; /* rcvd acks for unsent data */ | |
973 | u_int32_t tcps_rcvackpack; /* rcvd ack packets */ | |
974 | u_int32_t tcps_rcvackbyte; /* bytes acked by rcvd acks */ | |
975 | u_int32_t tcps_rcvwinupd; /* rcvd window update packets */ | |
976 | u_int32_t tcps_pawsdrop; /* segments dropped due to PAWS */ | |
977 | u_int32_t tcps_predack; /* times hdr predict ok for acks */ | |
978 | u_int32_t tcps_preddat; /* times hdr predict ok for data pkts */ | |
979 | u_int32_t tcps_pcbcachemiss; | |
980 | u_int32_t tcps_cachedrtt; /* times cached RTT in route updated */ | |
981 | u_int32_t tcps_cachedrttvar; /* times cached rttvar updated */ | |
982 | u_int32_t tcps_cachedssthresh; /* times cached ssthresh updated */ | |
983 | u_int32_t tcps_usedrtt; /* times RTT initialized from route */ | |
984 | u_int32_t tcps_usedrttvar; /* times RTTVAR initialized from rt */ | |
985 | u_int32_t tcps_usedssthresh; /* times ssthresh initialized from rt*/ | |
986 | u_int32_t tcps_persistdrop; /* timeout in persist state */ | |
987 | u_int32_t tcps_badsyn; /* bogus SYN, e.g. premature ACK */ | |
988 | u_int32_t tcps_mturesent; /* resends due to MTU discovery */ | |
989 | u_int32_t tcps_listendrop; /* listen queue overflows */ | |
990 | u_int32_t tcps_synchallenge; /* challenge ACK due to bad SYN */ | |
991 | u_int32_t tcps_rstchallenge; /* challenge ACK due to bad RST */ | |
2d21ac55 A |
992 | |
993 | /* new stats from FreeBSD 5.4 sync up */ | |
0a7de745 A |
994 | u_int32_t tcps_minmssdrops; /* average minmss too low drops */ |
995 | ||
996 | u_int32_t tcps_sndrexmitbad; /* unnecessary packet retransmissions */ | |
997 | u_int32_t tcps_badrst; /* ignored RSTs in the window */ | |
998 | ||
999 | u_int32_t tcps_sc_added; /* entry added to syncache */ | |
1000 | u_int32_t tcps_sc_retransmitted; /* syncache entry was retransmitted */ | |
1001 | u_int32_t tcps_sc_dupsyn; /* duplicate SYN packet */ | |
1002 | u_int32_t tcps_sc_dropped; /* could not reply to packet */ | |
1003 | u_int32_t tcps_sc_completed; /* successful extraction of entry */ | |
1004 | u_int32_t tcps_sc_bucketoverflow; /* syncache per-bucket limit hit */ | |
1005 | u_int32_t tcps_sc_cacheoverflow; /* syncache cache limit hit */ | |
1006 | u_int32_t tcps_sc_reset; /* RST removed entry from syncache */ | |
1007 | u_int32_t tcps_sc_stale; /* timed out or listen socket gone */ | |
1008 | u_int32_t tcps_sc_aborted; /* syncache entry aborted */ | |
1009 | u_int32_t tcps_sc_badack; /* removed due to bad ACK */ | |
1010 | u_int32_t tcps_sc_unreach; /* ICMP unreachable received */ | |
1011 | u_int32_t tcps_sc_zonefail; /* zalloc() failed */ | |
1012 | u_int32_t tcps_sc_sendcookie; /* SYN cookie sent */ | |
1013 | u_int32_t tcps_sc_recvcookie; /* SYN cookie received */ | |
1014 | ||
1015 | u_int32_t tcps_hc_added; /* entry added to hostcache */ | |
1016 | u_int32_t tcps_hc_bucketoverflow; /* hostcache per bucket limit hit */ | |
8ad349bb A |
1017 | |
1018 | /* SACK related stats */ | |
0a7de745 A |
1019 | u_int32_t tcps_sack_recovery_episode; /* SACK recovery episodes */ |
1020 | u_int32_t tcps_sack_rexmits; /* SACK rexmit segments */ | |
1021 | u_int32_t tcps_sack_rexmit_bytes; /* SACK rexmit bytes */ | |
1022 | u_int32_t tcps_sack_rcv_blocks; /* SACK blocks (options) received */ | |
1023 | u_int32_t tcps_sack_send_blocks; /* SACK blocks (options) sent */ | |
1024 | u_int32_t tcps_sack_sboverflow; /* SACK sendblock overflow */ | |
2d21ac55 | 1025 | |
0a7de745 A |
1026 | u_int32_t tcps_bg_rcvtotal; /* total background packets received */ |
1027 | u_int32_t tcps_rxtfindrop; /* drop conn after retransmitting FIN */ | |
1028 | u_int32_t tcps_fcholdpacket; /* packets withheld because of flow control */ | |
316670eb A |
1029 | |
1030 | /* LRO related stats */ | |
0a7de745 A |
1031 | u_int32_t tcps_coalesced_pack; /* number of coalesced packets */ |
1032 | u_int32_t tcps_flowtbl_full; /* times flow table was full */ | |
1033 | u_int32_t tcps_flowtbl_collision; /* collisions in flow tbl */ | |
1034 | u_int32_t tcps_lro_twopack; /* 2 packets coalesced */ | |
1035 | u_int32_t tcps_lro_multpack; /* 3 or 4 pkts coalesced */ | |
1036 | u_int32_t tcps_lro_largepack; /* 5 or more pkts coalesced */ | |
39236c6e | 1037 | |
0a7de745 A |
1038 | u_int32_t tcps_limited_txt; /* Limited transmit used */ |
1039 | u_int32_t tcps_early_rexmt; /* Early retransmit used */ | |
1040 | u_int32_t tcps_sack_ackadv; /* Cumulative ack advanced along with sack */ | |
39236c6e A |
1041 | |
1042 | /* Checksum related stats */ | |
0a7de745 A |
1043 | u_int32_t tcps_rcv_swcsum; /* tcp swcksum (inbound), packets */ |
1044 | u_int32_t tcps_rcv_swcsum_bytes; /* tcp swcksum (inbound), bytes */ | |
1045 | u_int32_t tcps_rcv6_swcsum; /* tcp6 swcksum (inbound), packets */ | |
1046 | u_int32_t tcps_rcv6_swcsum_bytes; /* tcp6 swcksum (inbound), bytes */ | |
1047 | u_int32_t tcps_snd_swcsum; /* tcp swcksum (outbound), packets */ | |
1048 | u_int32_t tcps_snd_swcsum_bytes; /* tcp swcksum (outbound), bytes */ | |
1049 | u_int32_t tcps_snd6_swcsum; /* tcp6 swcksum (outbound), packets */ | |
1050 | u_int32_t tcps_snd6_swcsum_bytes; /* tcp6 swcksum (outbound), bytes */ | |
1051 | u_int32_t tcps_msg_unopkts; /* unordered packet on TCP msg stream */ | |
1052 | u_int32_t tcps_msg_unoappendfail; /* failed to append unordered pkt */ | |
1053 | u_int32_t tcps_msg_sndwaithipri; /* send is waiting for high priority data */ | |
39236c6e A |
1054 | |
1055 | /* MPTCP Related stats */ | |
0a7de745 A |
1056 | u_int32_t tcps_invalid_mpcap; /* Invalid MPTCP capable opts */ |
1057 | u_int32_t tcps_invalid_joins; /* Invalid MPTCP joins */ | |
1058 | u_int32_t tcps_mpcap_fallback; /* TCP fallback in primary */ | |
1059 | u_int32_t tcps_join_fallback; /* No MPTCP in secondary */ | |
1060 | u_int32_t tcps_estab_fallback; /* DSS option dropped */ | |
1061 | u_int32_t tcps_invalid_opt; /* Catchall error stat */ | |
1062 | u_int32_t tcps_mp_outofwin; /* Packet lies outside the | |
1063 | * shared recv window */ | |
1064 | u_int32_t tcps_mp_reducedwin; /* Reduced subflow window */ | |
1065 | u_int32_t tcps_mp_badcsum; /* Bad DSS csum */ | |
1066 | u_int32_t tcps_mp_oodata; /* Out of order data */ | |
1067 | u_int32_t tcps_mp_switches; /* number of subflow switch */ | |
1068 | u_int32_t tcps_mp_rcvtotal; /* number of rcvd packets */ | |
1069 | u_int32_t tcps_mp_rcvbytes; /* number of bytes received */ | |
1070 | u_int32_t tcps_mp_sndpacks; /* number of data packs sent */ | |
1071 | u_int32_t tcps_mp_sndbytes; /* number of bytes sent */ | |
1072 | u_int32_t tcps_join_rxmts; /* join ack retransmits */ | |
1073 | u_int32_t tcps_tailloss_rto; /* RTO due to tail loss */ | |
1074 | u_int32_t tcps_reordered_pkts; /* packets reorderd */ | |
1075 | u_int32_t tcps_recovered_pkts; /* recovered after loss */ | |
1076 | u_int32_t tcps_pto; /* probe timeout */ | |
1077 | u_int32_t tcps_rto_after_pto; /* RTO after a probe */ | |
1078 | u_int32_t tcps_tlp_recovery; /* TLP induced fast recovery */ | |
1079 | u_int32_t tcps_tlp_recoverlastpkt; /* TLP recoverd last pkt */ | |
1080 | u_int32_t tcps_ecn_client_success; /* client-side connection negotiated ECN */ | |
1081 | u_int32_t tcps_ecn_recv_ece; /* ECE received, sent CWR */ | |
1082 | u_int32_t tcps_ecn_sent_ece; /* Sent ECE notification */ | |
1083 | u_int32_t tcps_detect_reordering; /* Detect pkt reordering */ | |
1084 | u_int32_t tcps_delay_recovery; /* Delay fast recovery */ | |
1085 | u_int32_t tcps_avoid_rxmt; /* Retransmission was avoided */ | |
1086 | u_int32_t tcps_unnecessary_rxmt; /* Retransmission was not needed */ | |
1087 | u_int32_t tcps_nostretchack; /* disabled stretch ack algorithm on a connection */ | |
1088 | u_int32_t tcps_rescue_rxmt; /* SACK rescue retransmit */ | |
1089 | u_int32_t tcps_pto_in_recovery; /* rescue retransmit in fast recovery */ | |
1090 | u_int32_t tcps_pmtudbh_reverted; /* PMTU Blackhole detection, segment size reverted */ | |
3e170ce0 A |
1091 | |
1092 | /* DSACK related statistics */ | |
0a7de745 A |
1093 | u_int32_t tcps_dsack_disable; /* DSACK disabled due to n/w duplication */ |
1094 | u_int32_t tcps_dsack_ackloss; /* ignore DSACK due to ack loss */ | |
1095 | u_int32_t tcps_dsack_badrexmt; /* DSACK based bad rexmt recovery */ | |
1096 | u_int32_t tcps_dsack_sent; /* Sent DSACK notification */ | |
1097 | u_int32_t tcps_dsack_recvd; /* Received a valid DSACK option */ | |
1098 | u_int32_t tcps_dsack_recvd_old; /* Received an out of window DSACK option */ | |
3e170ce0 A |
1099 | |
1100 | /* MPTCP Subflow selection stats */ | |
0a7de745 A |
1101 | u_int32_t tcps_mp_sel_symtomsd; /* By symptomsd */ |
1102 | u_int32_t tcps_mp_sel_rtt; /* By RTT comparison */ | |
1103 | u_int32_t tcps_mp_sel_rto; /* By RTO comparison */ | |
1104 | u_int32_t tcps_mp_sel_peer; /* By peer's output pattern */ | |
1105 | u_int32_t tcps_mp_num_probes; /* Number of probes sent */ | |
1106 | u_int32_t tcps_mp_verdowngrade; /* MPTCP version downgrade */ | |
1107 | u_int32_t tcps_drop_after_sleep; /* drop after long AP sleep */ | |
1108 | u_int32_t tcps_probe_if; /* probe packets after interface availability */ | |
1109 | u_int32_t tcps_probe_if_conflict; /* Can't send probe packets for interface */ | |
1110 | ||
1111 | u_int32_t tcps_ecn_client_setup; /* Attempted ECN setup from client side */ | |
1112 | u_int32_t tcps_ecn_server_setup; /* Attempted ECN setup from server side */ | |
1113 | u_int32_t tcps_ecn_server_success; /* server-side connection negotiated ECN */ | |
1114 | u_int32_t tcps_ecn_lost_synack; /* Lost SYN-ACK with ECN setup */ | |
1115 | u_int32_t tcps_ecn_lost_syn; /* Lost SYN with ECN setup */ | |
1116 | u_int32_t tcps_ecn_not_supported; /* Server did not support ECN setup */ | |
1117 | u_int32_t tcps_ecn_recv_ce; /* Received CE from the network */ | |
1118 | u_int32_t tcps_ecn_conn_recv_ce; /* Number of connections received CE atleast once */ | |
1119 | u_int32_t tcps_ecn_conn_recv_ece; /* Number of connections received ECE atleast once */ | |
1120 | u_int32_t tcps_ecn_conn_plnoce; /* Number of connections that received no CE and sufferred packet loss */ | |
1121 | u_int32_t tcps_ecn_conn_pl_ce; /* Number of connections that received CE and sufferred packet loss */ | |
1122 | u_int32_t tcps_ecn_conn_nopl_ce; /* Number of connections that received CE and sufferred no packet loss */ | |
1123 | u_int32_t tcps_ecn_fallback_synloss; /* Number of times we did fall back due to SYN-Loss */ | |
1124 | u_int32_t tcps_ecn_fallback_reorder; /* Number of times we fallback because we detected the PAWS-issue */ | |
1125 | u_int32_t tcps_ecn_fallback_ce; /* Number of times we fallback because we received too many CEs */ | |
3e170ce0 A |
1126 | |
1127 | /* TFO-related statistics */ | |
0a7de745 A |
1128 | u_int32_t tcps_tfo_syn_data_rcv; /* Received a SYN+data with valid cookie */ |
1129 | u_int32_t tcps_tfo_cookie_req_rcv;/* Received a TFO cookie-request */ | |
1130 | u_int32_t tcps_tfo_cookie_sent; /* Offered a TFO-cookie to the client */ | |
1131 | u_int32_t tcps_tfo_cookie_invalid;/* Received an invalid TFO-cookie */ | |
1132 | u_int32_t tcps_tfo_cookie_req; /* Cookie requested with the SYN */ | |
1133 | u_int32_t tcps_tfo_cookie_rcv; /* Cookie received in a SYN/ACK */ | |
1134 | u_int32_t tcps_tfo_syn_data_sent; /* SYN+data+cookie sent */ | |
1135 | u_int32_t tcps_tfo_syn_data_acked;/* SYN+data has been acknowledged */ | |
1136 | u_int32_t tcps_tfo_syn_loss; /* SYN+TFO has been lost and we fallback */ | |
1137 | u_int32_t tcps_tfo_blackhole; /* TFO got blackholed by a middlebox. */ | |
1138 | u_int32_t tcps_tfo_cookie_wrong; /* TFO-cookie we sent was wrong */ | |
1139 | u_int32_t tcps_tfo_no_cookie_rcv; /* We asked for a cookie but didn't get one */ | |
1140 | u_int32_t tcps_tfo_heuristics_disable; /* TFO got disabled due to heuristics */ | |
1141 | u_int32_t tcps_tfo_sndblackhole; /* TFO got blackholed in the sending direction */ | |
1142 | u_int32_t tcps_mss_to_default; /* Change MSS to default using link status report */ | |
1143 | u_int32_t tcps_mss_to_medium; /* Change MSS to medium using link status report */ | |
1144 | u_int32_t tcps_mss_to_low; /* Change MSS to low using link status report */ | |
1145 | u_int32_t tcps_ecn_fallback_droprst; /* ECN fallback caused by connection drop due to RST */ | |
1146 | u_int32_t tcps_ecn_fallback_droprxmt; /* ECN fallback due to drop after multiple retransmits */ | |
1147 | u_int32_t tcps_ecn_fallback_synrst; /* ECN fallback due to rst after syn */ | |
1148 | ||
1149 | u_int32_t tcps_mptcp_rcvmemdrop; /* MPTCP packets dropped for lack of memory */ | |
1150 | u_int32_t tcps_mptcp_rcvduppack; /* MPTCP duplicate-only packets received */ | |
1151 | u_int32_t tcps_mptcp_rcvpackafterwin; /* MPTCP packets with data after window */ | |
5ba3f43e A |
1152 | |
1153 | /* TCP timer statistics */ | |
0a7de745 A |
1154 | u_int32_t tcps_timer_drift_le_1_ms; /* Timer drift less or equal to 1 ms */ |
1155 | u_int32_t tcps_timer_drift_le_10_ms; /* Timer drift less or equal to 10 ms */ | |
1156 | u_int32_t tcps_timer_drift_le_20_ms; /* Timer drift less or equal to 20 ms */ | |
1157 | u_int32_t tcps_timer_drift_le_50_ms; /* Timer drift less or equal to 50 ms */ | |
1158 | u_int32_t tcps_timer_drift_le_100_ms; /* Timer drift less or equal to 100 ms */ | |
1159 | u_int32_t tcps_timer_drift_le_200_ms; /* Timer drift less or equal to 200 ms */ | |
1160 | u_int32_t tcps_timer_drift_le_500_ms; /* Timer drift less or equal to 500 ms */ | |
1161 | u_int32_t tcps_timer_drift_le_1000_ms; /* Timer drift less or equal to 1000 ms */ | |
1162 | u_int32_t tcps_timer_drift_gt_1000_ms; /* Timer drift greater than 1000 ms */ | |
1163 | ||
1164 | u_int32_t tcps_mptcp_handover_attempt; /* Total number of MPTCP-attempts using handover mode */ | |
1165 | u_int32_t tcps_mptcp_interactive_attempt; /* Total number of MPTCP-attempts using interactive mode */ | |
1166 | u_int32_t tcps_mptcp_aggregate_attempt; /* Total number of MPTCP-attempts using aggregate mode */ | |
1167 | u_int32_t tcps_mptcp_fp_handover_attempt; /* Same as previous three but only for first-party apps */ | |
1168 | u_int32_t tcps_mptcp_fp_interactive_attempt; | |
1169 | u_int32_t tcps_mptcp_fp_aggregate_attempt; | |
1170 | u_int32_t tcps_mptcp_heuristic_fallback; /* Total number of MPTCP-connections that fell back due to heuristics */ | |
1171 | u_int32_t tcps_mptcp_fp_heuristic_fallback; /* Same as previous but for first-party apps */ | |
1172 | u_int32_t tcps_mptcp_handover_success_wifi; /* Total number of successfull handover-mode connections that *started* on WiFi */ | |
1173 | u_int32_t tcps_mptcp_handover_success_cell; /* Total number of successfull handover-mode connections that *started* on Cell */ | |
1174 | u_int32_t tcps_mptcp_interactive_success; /* Total number of interactive-mode connections that negotiated MPTCP */ | |
1175 | u_int32_t tcps_mptcp_aggregate_success; /* Same as previous but for aggregate */ | |
1176 | u_int32_t tcps_mptcp_fp_handover_success_wifi; /* Same as previous four, but for first-party apps */ | |
1177 | u_int32_t tcps_mptcp_fp_handover_success_cell; | |
1178 | u_int32_t tcps_mptcp_fp_interactive_success; | |
1179 | u_int32_t tcps_mptcp_fp_aggregate_success; | |
1180 | u_int32_t tcps_mptcp_handover_cell_from_wifi; /* Total number of connections that use cell in handover-mode (coming from WiFi) */ | |
1181 | u_int32_t tcps_mptcp_handover_wifi_from_cell; /* Total number of connections that use WiFi in handover-mode (coming from cell) */ | |
1182 | u_int32_t tcps_mptcp_interactive_cell_from_wifi; /* Total number of connections that use cell in interactive mode (coming from WiFi) */ | |
1183 | u_int64_t tcps_mptcp_handover_cell_bytes; /* Total number of bytes sent on cell in handover-mode (on new subflows, ignoring initial one) */ | |
1184 | u_int64_t tcps_mptcp_interactive_cell_bytes; /* Same as previous but for interactive */ | |
1185 | u_int64_t tcps_mptcp_aggregate_cell_bytes; | |
1186 | u_int64_t tcps_mptcp_handover_all_bytes; /* Total number of bytes sent in handover */ | |
1187 | u_int64_t tcps_mptcp_interactive_all_bytes; | |
1188 | u_int64_t tcps_mptcp_aggregate_all_bytes; | |
1189 | u_int32_t tcps_mptcp_back_to_wifi; /* Total number of connections that succeed to move traffic away from cell (when starting on cell) */ | |
1190 | u_int32_t tcps_mptcp_wifi_proxy; /* Total number of new subflows that fell back to regular TCP on cell */ | |
1191 | u_int32_t tcps_mptcp_cell_proxy; /* Total number of new subflows that fell back to regular TCP on WiFi */ | |
cb323159 A |
1192 | |
1193 | /* TCP offload statistics */ | |
1194 | u_int32_t tcps_ka_offload_drops; /* Keep alive drops for timeout reported by firmware */ | |
1195 | ||
0a7de745 | 1196 | u_int32_t tcps_mptcp_triggered_cell; /* Total number of times an MPTCP-connection triggered cell bringup */ |
316670eb A |
1197 | }; |
1198 | ||
4bd07ac2 | 1199 | |
316670eb A |
1200 | struct tcpstat_local { |
1201 | u_int64_t badformat; | |
1202 | u_int64_t unspecv6; | |
1203 | u_int64_t synfin; | |
1204 | u_int64_t badformatipsec; | |
1205 | u_int64_t noconnnolist; | |
1206 | u_int64_t noconnlist; | |
1207 | u_int64_t listbadsyn; | |
1208 | u_int64_t icmp6unreach; | |
1209 | u_int64_t deprecate6; | |
1210 | u_int64_t ooopacket; | |
1211 | u_int64_t rstinsynrcv; | |
1212 | u_int64_t dospacket; | |
1213 | u_int64_t cleanup; | |
1214 | u_int64_t synwindow; | |
1c79356b A |
1215 | }; |
1216 | ||
2d21ac55 A |
1217 | #pragma pack(4) |
1218 | ||
1c79356b A |
1219 | /* |
1220 | * TCB structure exported to user-land via sysctl(3). | |
1221 | * Evil hack: declare only if in_pcb.h and sys/socketvar.h have been | |
1222 | * included. Not all of our clients do. | |
1223 | */ | |
b0d623f7 A |
1224 | |
1225 | struct xtcpcb { | |
0a7de745 | 1226 | u_int32_t xt_len; |
91447636 | 1227 | #ifdef KERNEL_PRIVATE |
0a7de745 | 1228 | struct inpcb_compat xt_inp; |
91447636 | 1229 | #else |
0a7de745 | 1230 | struct inpcb xt_inp; |
91447636 A |
1231 | #endif |
1232 | #ifdef KERNEL_PRIVATE | |
0a7de745 | 1233 | struct otcpcb xt_tp; |
55e303ae | 1234 | #else |
0a7de745 | 1235 | struct tcpcb xt_tp; |
55e303ae | 1236 | #endif |
0a7de745 A |
1237 | struct xsocket xt_socket; |
1238 | u_quad_t xt_alignment_hack; | |
b0d623f7 A |
1239 | }; |
1240 | ||
5ba3f43e | 1241 | #if !CONFIG_EMBEDDED |
b0d623f7 A |
1242 | |
1243 | struct xtcpcb64 { | |
0a7de745 A |
1244 | u_int32_t xt_len; |
1245 | struct xinpcb64 xt_inpcb; | |
1246 | ||
1247 | u_int64_t t_segq; | |
1248 | int t_dupacks; /* consecutive dup acks recd */ | |
1249 | ||
1250 | int t_timer[TCPT_NTIMERS_EXT]; /* tcp timers */ | |
1251 | ||
1252 | int t_state; /* state of this connection */ | |
1253 | u_int t_flags; | |
1254 | ||
1255 | int t_force; /* 1 if forcing out a byte */ | |
1256 | ||
1257 | tcp_seq snd_una; /* send unacknowledged */ | |
1258 | tcp_seq snd_max; /* highest sequence number sent; | |
1259 | * used to recognize retransmits | |
1260 | */ | |
1261 | tcp_seq snd_nxt; /* send next */ | |
1262 | tcp_seq snd_up; /* send urgent pointer */ | |
1263 | ||
1264 | tcp_seq snd_wl1; /* window update seg seq number */ | |
1265 | tcp_seq snd_wl2; /* window update seg ack number */ | |
1266 | tcp_seq iss; /* initial send sequence number */ | |
1267 | tcp_seq irs; /* initial receive sequence number */ | |
1268 | ||
1269 | tcp_seq rcv_nxt; /* receive next */ | |
1270 | tcp_seq rcv_adv; /* advertised window */ | |
1271 | u_int32_t rcv_wnd; /* receive window */ | |
1272 | tcp_seq rcv_up; /* receive urgent pointer */ | |
1273 | ||
1274 | u_int32_t snd_wnd; /* send window */ | |
1275 | u_int32_t snd_cwnd; /* congestion-controlled window */ | |
1276 | u_int32_t snd_ssthresh; /* snd_cwnd size threshold for | |
1277 | * for slow start exponential to | |
1278 | * linear switch | |
1279 | */ | |
1280 | u_int t_maxopd; /* mss plus options */ | |
1281 | ||
1282 | u_int32_t t_rcvtime; /* time at which a packet was received */ | |
1283 | u_int32_t t_starttime; /* time connection was established */ | |
1284 | int t_rtttime; /* round trip time */ | |
1285 | tcp_seq t_rtseq; /* sequence number being timed */ | |
1286 | ||
1287 | int t_rxtcur; /* current retransmit value (ticks) */ | |
1288 | u_int t_maxseg; /* maximum segment size */ | |
1289 | int t_srtt; /* smoothed round-trip time */ | |
1290 | int t_rttvar; /* variance in round-trip time */ | |
1291 | ||
1292 | int t_rxtshift; /* log(2) of rexmt exp. backoff */ | |
1293 | u_int t_rttmin; /* minimum rtt allowed */ | |
1294 | u_int32_t t_rttupdated; /* number of times rtt sampled */ | |
1295 | u_int32_t max_sndwnd; /* largest window peer has offered */ | |
1296 | ||
1297 | int t_softerror; /* possible error not yet reported */ | |
b0d623f7 | 1298 | /* out-of-band data */ |
0a7de745 A |
1299 | char t_oobflags; /* have some */ |
1300 | char t_iobc; /* input character */ | |
b0d623f7 | 1301 | /* RFC 1323 variables */ |
0a7de745 A |
1302 | u_char snd_scale; /* window scaling for send window */ |
1303 | u_char rcv_scale; /* window scaling for recv window */ | |
1304 | u_char request_r_scale; /* pending window scaling */ | |
1305 | u_char requested_s_scale; | |
1306 | u_int32_t ts_recent; /* timestamp echo data */ | |
1307 | ||
1308 | u_int32_t ts_recent_age; /* when last updated */ | |
1309 | tcp_seq last_ack_sent; | |
b0d623f7 | 1310 | /* RFC 1644 variables */ |
0a7de745 A |
1311 | tcp_cc cc_send; /* send connection count */ |
1312 | tcp_cc cc_recv; /* receive connection count */ | |
1313 | tcp_seq snd_recover; /* for use in fast recovery */ | |
b0d623f7 | 1314 | /* experimental */ |
0a7de745 A |
1315 | u_int32_t snd_cwnd_prev; /* cwnd prior to retransmit */ |
1316 | u_int32_t snd_ssthresh_prev; /* ssthresh prior to retransmit */ | |
1317 | u_int32_t t_badrxtwin; /* window for retransmit recovery */ | |
b0d623f7 | 1318 | |
0a7de745 | 1319 | u_quad_t xt_alignment_hack; |
1c79356b | 1320 | }; |
1c79356b | 1321 | |
5ba3f43e | 1322 | #endif /* !CONFIG_EMBEDDED */ |
b0d623f7 | 1323 | |
6d2010ae A |
1324 | #ifdef PRIVATE |
1325 | ||
1326 | struct xtcpcb_n { | |
0a7de745 A |
1327 | u_int32_t xt_len; |
1328 | u_int32_t xt_kind; /* XSO_TCPCB */ | |
6d2010ae A |
1329 | |
1330 | u_int64_t t_segq; | |
1331 | int t_dupacks; /* consecutive dup acks recd */ | |
39037602 | 1332 | |
6d2010ae | 1333 | int t_timer[TCPT_NTIMERS_EXT]; /* tcp timers */ |
39037602 | 1334 | |
6d2010ae A |
1335 | int t_state; /* state of this connection */ |
1336 | u_int t_flags; | |
39037602 | 1337 | |
6d2010ae | 1338 | int t_force; /* 1 if forcing out a byte */ |
39037602 | 1339 | |
6d2010ae A |
1340 | tcp_seq snd_una; /* send unacknowledged */ |
1341 | tcp_seq snd_max; /* highest sequence number sent; | |
0a7de745 A |
1342 | * used to recognize retransmits |
1343 | */ | |
6d2010ae A |
1344 | tcp_seq snd_nxt; /* send next */ |
1345 | tcp_seq snd_up; /* send urgent pointer */ | |
39037602 | 1346 | |
6d2010ae A |
1347 | tcp_seq snd_wl1; /* window update seg seq number */ |
1348 | tcp_seq snd_wl2; /* window update seg ack number */ | |
1349 | tcp_seq iss; /* initial send sequence number */ | |
1350 | tcp_seq irs; /* initial receive sequence number */ | |
39037602 | 1351 | |
6d2010ae A |
1352 | tcp_seq rcv_nxt; /* receive next */ |
1353 | tcp_seq rcv_adv; /* advertised window */ | |
1354 | u_int32_t rcv_wnd; /* receive window */ | |
1355 | tcp_seq rcv_up; /* receive urgent pointer */ | |
39037602 | 1356 | |
6d2010ae A |
1357 | u_int32_t snd_wnd; /* send window */ |
1358 | u_int32_t snd_cwnd; /* congestion-controlled window */ | |
1359 | u_int32_t snd_ssthresh; /* snd_cwnd size threshold for | |
0a7de745 A |
1360 | * for slow start exponential to |
1361 | * linear switch | |
1362 | */ | |
6d2010ae | 1363 | u_int t_maxopd; /* mss plus options */ |
39037602 | 1364 | |
6d2010ae A |
1365 | u_int32_t t_rcvtime; /* time at which a packet was received */ |
1366 | u_int32_t t_starttime; /* time connection was established */ | |
1367 | int t_rtttime; /* round trip time */ | |
1368 | tcp_seq t_rtseq; /* sequence number being timed */ | |
39037602 | 1369 | |
6d2010ae A |
1370 | int t_rxtcur; /* current retransmit value (ticks) */ |
1371 | u_int t_maxseg; /* maximum segment size */ | |
1372 | int t_srtt; /* smoothed round-trip time */ | |
1373 | int t_rttvar; /* variance in round-trip time */ | |
39037602 | 1374 | |
6d2010ae A |
1375 | int t_rxtshift; /* log(2) of rexmt exp. backoff */ |
1376 | u_int t_rttmin; /* minimum rtt allowed */ | |
1377 | u_int32_t t_rttupdated; /* number of times rtt sampled */ | |
1378 | u_int32_t max_sndwnd; /* largest window peer has offered */ | |
39037602 | 1379 | |
6d2010ae A |
1380 | int t_softerror; /* possible error not yet reported */ |
1381 | /* out-of-band data */ | |
1382 | char t_oobflags; /* have some */ | |
1383 | char t_iobc; /* input character */ | |
1384 | /* RFC 1323 variables */ | |
1385 | u_char snd_scale; /* window scaling for send window */ | |
1386 | u_char rcv_scale; /* window scaling for recv window */ | |
1387 | u_char request_r_scale; /* pending window scaling */ | |
1388 | u_char requested_s_scale; | |
1389 | u_int32_t ts_recent; /* timestamp echo data */ | |
39037602 | 1390 | |
6d2010ae A |
1391 | u_int32_t ts_recent_age; /* when last updated */ |
1392 | tcp_seq last_ack_sent; | |
1393 | /* RFC 1644 variables */ | |
1394 | tcp_cc cc_send; /* send connection count */ | |
1395 | tcp_cc cc_recv; /* receive connection count */ | |
1396 | tcp_seq snd_recover; /* for use in fast recovery */ | |
1397 | /* experimental */ | |
1398 | u_int32_t snd_cwnd_prev; /* cwnd prior to retransmit */ | |
1399 | u_int32_t snd_ssthresh_prev; /* ssthresh prior to retransmit */ | |
6d2010ae A |
1400 | }; |
1401 | ||
0a7de745 A |
1402 | /* |
1403 | * The rtt measured is in milliseconds as the timestamp granularity is | |
1404 | * a millisecond. The smoothed round-trip time and estimated variance | |
1405 | * are stored as fixed point numbers scaled by the values below. | |
1406 | * For convenience, these scales are also used in smoothing the average | |
1407 | * (smoothed = (1/scale)sample + ((scale-1)/scale)smoothed). | |
1408 | * With these scales, srtt has 5 bits to the right of the binary point, | |
1409 | * and thus an "ALPHA" of 0.875. rttvar has 4 bits to the right of the | |
1410 | * binary point, and is smoothed with an ALPHA of 0.75. | |
1411 | */ | |
1412 | #define TCP_RTT_SCALE 32 /* multiplier for srtt; 3 bits frac. */ | |
1413 | #define TCP_RTT_SHIFT 5 /* shift for srtt; 5 bits frac. */ | |
1414 | #define TCP_RTTVAR_SCALE 16 /* multiplier for rttvar; 4 bits */ | |
1415 | #define TCP_RTTVAR_SHIFT 4 /* shift for rttvar; 4 bits */ | |
1416 | #define TCP_DELTA_SHIFT 2 /* see tcp_input.c */ | |
d9a64523 A |
1417 | |
1418 | ||
1419 | /* | |
1420 | * TCP structure with information that gives insight into forward progress on an interface, | |
1421 | * exported to user-land via sysctl(3). | |
1422 | */ | |
1423 | struct xtcpprogress_indicators { | |
0a7de745 A |
1424 | u_int32_t xp_numflows; /* Total number of flows */ |
1425 | u_int32_t xp_conn_probe_fails; /* Count of connection failures */ | |
1426 | u_int32_t xp_read_probe_fails; /* Count of read probe failures */ | |
1427 | u_int32_t xp_write_probe_fails; /* Count of write failures */ | |
1428 | u_int32_t xp_recentflows; /* Total of "recent" flows */ | |
1429 | u_int32_t xp_recentflows_unacked; /* Total of "recent" flows with unacknowledged data */ | |
1430 | u_int64_t xp_recentflows_rxbytes; /* Total of "recent" flows received bytes */ | |
1431 | u_int64_t xp_recentflows_txbytes; /* Total of "recent" flows transmitted bytes */ | |
1432 | u_int64_t xp_recentflows_rxooo; /* Total of "recent" flows received out of order bytes */ | |
1433 | u_int64_t xp_recentflows_rxdup; /* Total of "recent" flows received duplicate bytes */ | |
1434 | u_int64_t xp_recentflows_retx; /* Total of "recent" flows retransmitted bytes */ | |
cb323159 A |
1435 | u_int64_t xp_reserved1; /* Expansion */ |
1436 | u_int64_t xp_reserved2; /* Expansion */ | |
1437 | u_int64_t xp_reserved3; /* Expansion */ | |
1438 | u_int64_t xp_reserved4; /* Expansion */ | |
d9a64523 A |
1439 | }; |
1440 | ||
1441 | struct tcpprogressreq { | |
cb323159 | 1442 | u_int64_t ifindex; /* Interface index for progress indicators */ |
0a7de745 | 1443 | u_int64_t recentflow_maxduration; /* In mach_absolute_time, max duration for flow to be counted as "recent" */ |
cb323159 A |
1444 | u_int64_t filter_flags; /* Optional additional filtering, values are interface properties per ntstat.h */ |
1445 | u_int64_t xp_reserved2; /* Expansion */ | |
d9a64523 A |
1446 | }; |
1447 | ||
6d2010ae A |
1448 | #endif /* PRIVATE */ |
1449 | ||
2d21ac55 A |
1450 | #pragma pack() |
1451 | ||
1c79356b A |
1452 | /* |
1453 | * Names for TCP sysctl objects | |
1454 | */ | |
0a7de745 A |
1455 | #define TCPCTL_DO_RFC1323 1 /* use RFC-1323 extensions */ |
1456 | #define TCPCTL_DO_RFC1644 2 /* use RFC-1644 extensions */ | |
1457 | #define TCPCTL_MSSDFLT 3 /* MSS default */ | |
1458 | #define TCPCTL_STATS 4 /* statistics (read-only) */ | |
1459 | #define TCPCTL_RTTDFLT 5 /* default RTT estimate */ | |
1460 | #define TCPCTL_KEEPIDLE 6 /* keepalive idle timer */ | |
1461 | #define TCPCTL_KEEPINTVL 7 /* interval to send keepalives */ | |
1462 | #define TCPCTL_SENDSPACE 8 /* send buffer space */ | |
1463 | #define TCPCTL_RECVSPACE 9 /* receive buffer space */ | |
1464 | #define TCPCTL_KEEPINIT 10 /* timeout for establishing syn */ | |
1465 | #define TCPCTL_PCBLIST 11 /* list of all outstanding PCBs */ | |
1466 | #define TCPCTL_DELACKTIME 12 /* time before sending delayed ACK */ | |
1467 | #define TCPCTL_V6MSSDFLT 13 /* MSS default for IPv6 */ | |
1468 | #define TCPCTL_MAXID 14 | |
1c79356b | 1469 | |
39236c6e A |
1470 | #ifdef BSD_KERNEL_PRIVATE |
1471 | #include <sys/bitstring.h> | |
1472 | ||
0a7de745 A |
1473 | #define TCP_PKTLIST_CLEAR(tp) { \ |
1474 | (tp)->t_pktlist_head = (tp)->t_pktlist_tail = NULL; \ | |
1475 | (tp)->t_lastchain = (tp)->t_pktlist_sentlen = 0; \ | |
2d21ac55 A |
1476 | } |
1477 | ||
1c79356b A |
1478 | #define TCPCTL_NAMES { \ |
1479 | { 0, 0 }, \ | |
1480 | { "rfc1323", CTLTYPE_INT }, \ | |
1481 | { "rfc1644", CTLTYPE_INT }, \ | |
1482 | { "mssdflt", CTLTYPE_INT }, \ | |
1483 | { "stats", CTLTYPE_STRUCT }, \ | |
1484 | { "rttdflt", CTLTYPE_INT }, \ | |
1485 | { "keepidle", CTLTYPE_INT }, \ | |
1486 | { "keepintvl", CTLTYPE_INT }, \ | |
1487 | { "sendspace", CTLTYPE_INT }, \ | |
1488 | { "recvspace", CTLTYPE_INT }, \ | |
1489 | { "keepinit", CTLTYPE_INT }, \ | |
1490 | { "pcblist", CTLTYPE_STRUCT }, \ | |
9bccf70c | 1491 | { "delacktime", CTLTYPE_INT }, \ |
1c79356b A |
1492 | { "v6mssdflt", CTLTYPE_INT }, \ |
1493 | } | |
1494 | ||
cb323159 A |
1495 | extern int tcp_TCPTV_MIN; |
1496 | ||
1c79356b A |
1497 | #ifdef SYSCTL_DECL |
1498 | SYSCTL_DECL(_net_inet_tcp); | |
91447636 | 1499 | #endif /* SYSCTL_DECL */ |
1c79356b | 1500 | |
0a7de745 A |
1501 | extern struct inpcbhead tcb; /* head of queue of active tcpcb's */ |
1502 | extern struct inpcbinfo tcbinfo; | |
1503 | extern struct tcpstat tcpstat; /* tcp statistics */ | |
1504 | extern int tcp_mssdflt; /* XXX */ | |
1505 | extern int tcp_minmss; | |
1506 | #define TCP_FASTOPEN_SERVER 0x01 | |
1507 | #define TCP_FASTOPEN_CLIENT 0x02 | |
3e170ce0 | 1508 | |
5ba3f43e A |
1509 | extern int tcp_tfo_halfcnt; |
1510 | extern int tcp_tfo_backlog; | |
1511 | extern int tcp_fastopen; | |
1512 | extern int ss_fltsz; | |
1513 | extern int ss_fltsz_local; | |
0a7de745 | 1514 | extern int tcp_do_rfc3390; /* Calculate ss_fltsz according to RFC 3390 */ |
3e170ce0 | 1515 | extern int tcp_do_rfc1323; |
39236c6e | 1516 | extern int target_qdelay; |
0a7de745 | 1517 | extern u_int32_t tcp_now; /* for RFC 1323 timestamps */ |
6d2010ae A |
1518 | extern struct timeval tcp_uptime; |
1519 | extern lck_spin_t *tcp_uptime_lock; | |
5ba3f43e | 1520 | extern int tcp_delack_enabled; |
0a7de745 | 1521 | extern int tcp_do_sack; /* SACK enabled/disabled */ |
fe8ab488 A |
1522 | extern int tcp_do_rfc3465; |
1523 | extern int tcp_do_rfc3465_lim2; | |
1524 | extern int maxseg_unacked; | |
1525 | extern int tcp_use_newreno; | |
3e170ce0 A |
1526 | extern struct zone *tcp_reass_zone; |
1527 | extern struct zone *tcp_rxt_seg_zone; | |
1528 | extern int tcp_ecn_outbound; | |
1529 | extern int tcp_ecn_inbound; | |
5ba3f43e | 1530 | extern u_int32_t tcp_do_autorcvbuf; |
39037602 | 1531 | extern u_int32_t tcp_autorcvbuf_max; |
39037602 | 1532 | extern u_int32_t tcp_autorcvbuf_inc_shift; |
813fb2f6 | 1533 | extern int tcp_recv_bg; |
b0d623f7 | 1534 | |
39236c6e A |
1535 | struct protosw; |
1536 | struct domain; | |
1537 | ||
fe8ab488 A |
1538 | struct tcp_respond_args { |
1539 | unsigned int ifscope; | |
1540 | unsigned int nocell:1, | |
0a7de745 A |
1541 | noexpensive:1, |
1542 | awdl_unrestricted:1, | |
cb323159 A |
1543 | intcoproc_allowed:1, |
1544 | keep_alive:1, | |
1545 | noconstrained:1; | |
fe8ab488 A |
1546 | }; |
1547 | ||
0a7de745 | 1548 | void tcp_canceltimers(struct tcpcb *); |
1c79356b | 1549 | struct tcpcb * |
0a7de745 A |
1550 | tcp_close(struct tcpcb *); |
1551 | void tcp_ctlinput(int, struct sockaddr *, void *, struct ifnet *); | |
1552 | int tcp_ctloutput(struct socket *, struct sockopt *); | |
1c79356b | 1553 | struct tcpcb * |
0a7de745 A |
1554 | tcp_drop(struct tcpcb *, int); |
1555 | void tcp_drain(void); | |
1556 | void tcp_getrt_rtt(struct tcpcb *tp, struct rtentry *rt); | |
1c79356b | 1557 | struct rmxp_tao * |
0a7de745 A |
1558 | tcp_gettaocache(struct inpcb *); |
1559 | void tcp_init(struct protosw *, struct domain *); | |
1560 | void tcp_input(struct mbuf *, int); | |
1561 | void tcp_mss(struct tcpcb *, int, unsigned int); | |
1562 | int tcp_mssopt(struct tcpcb *); | |
1563 | void tcp_drop_syn_sent(struct inpcb *, int); | |
1564 | void tcp_mtudisc(struct inpcb *, int); | |
1c79356b | 1565 | struct tcpcb * |
0a7de745 A |
1566 | tcp_newtcpcb(struct inpcb *); |
1567 | int tcp_output(struct tcpcb *); | |
1568 | void tcp_respond(struct tcpcb *, void *, struct tcphdr *, struct mbuf *, | |
fe8ab488 A |
1569 | tcp_seq, tcp_seq, int, struct tcp_respond_args *); |
1570 | struct rtentry * | |
0a7de745 A |
1571 | tcp_rtlookup(struct inpcb *, unsigned int); |
1572 | void tcp_setpersist(struct tcpcb *); | |
1573 | void tcp_gc(struct inpcbinfo *); | |
3e170ce0 | 1574 | void tcp_itimer(struct inpcbinfo *ipi); |
0a7de745 A |
1575 | void tcp_check_timer_state(struct tcpcb *tp); |
1576 | void tcp_run_timerlist(void *arg1, void *arg2); | |
94ff46dc | 1577 | void tcp_sched_timers(struct tcpcb *tp); |
6d2010ae | 1578 | |
fe8ab488 | 1579 | struct tcptemp *tcp_maketemplate(struct tcpcb *); |
0a7de745 | 1580 | void tcp_fillheaders(struct tcpcb *, void *, void *); |
fe8ab488 | 1581 | struct tcpcb *tcp_timers(struct tcpcb *, int); |
0a7de745 | 1582 | void tcp_trace(int, int, struct tcpcb *, void *, struct tcphdr *, int); |
8ad349bb | 1583 | |
5ba3f43e | 1584 | void tcp_fill_info(struct tcpcb *, struct tcp_info *); |
fe8ab488 A |
1585 | void tcp_sack_doack(struct tcpcb *, struct tcpopt *, struct tcphdr *, |
1586 | u_int32_t *); | |
3e170ce0 A |
1587 | extern boolean_t tcp_sack_process_dsack(struct tcpcb *, struct tcpopt *, |
1588 | struct tcphdr *); | |
fe8ab488 A |
1589 | int tcp_detect_bad_rexmt(struct tcpcb *, struct tcphdr *, struct tcpopt *, |
1590 | u_int32_t rxtime); | |
0a7de745 A |
1591 | void tcp_update_sack_list(struct tcpcb *tp, tcp_seq rcv_laststart, tcp_seq rcv_lastend); |
1592 | void tcp_clean_sackreport(struct tcpcb *tp); | |
1593 | void tcp_sack_adjust(struct tcpcb *tp); | |
8ad349bb | 1594 | struct sackhole *tcp_sack_output(struct tcpcb *tp, int *sack_bytes_rexmt); |
0a7de745 A |
1595 | void tcp_sack_partialack(struct tcpcb *, struct tcphdr *); |
1596 | void tcp_free_sackholes(struct tcpcb *tp); | |
1597 | int32_t tcp_sbspace(struct tcpcb *tp); | |
1598 | void tcp_set_tso(struct tcpcb *tp, struct ifnet *ifp); | |
4bd07ac2 | 1599 | void tcp_set_ecn(struct tcpcb *tp, struct ifnet *ifp); |
0a7de745 | 1600 | void tcp_reset_stretch_ack(struct tcpcb *tp); |
39236c6e | 1601 | extern void tcp_get_ports_used(u_int32_t, int, u_int32_t, bitstr_t *); |
316670eb | 1602 | uint32_t tcp_count_opportunistic(unsigned int ifindex, u_int32_t flags); |
39236c6e | 1603 | uint32_t tcp_find_anypcb_byaddr(struct ifaddr *ifa); |
d9a64523 | 1604 | void tcp_set_max_rwinscale(struct tcpcb *tp, struct socket *so, struct ifnet *ifp); |
316670eb A |
1605 | struct bwmeas* tcp_bwmeas_alloc(struct tcpcb *tp); |
1606 | void tcp_bwmeas_free(struct tcpcb *tp); | |
fe8ab488 | 1607 | extern int32_t timer_diff(uint32_t t1, uint32_t toff1, uint32_t t2, uint32_t toff2); |
316670eb A |
1608 | |
1609 | extern void tcp_set_background_cc(struct socket *); | |
1610 | extern void tcp_set_foreground_cc(struct socket *); | |
1611 | extern void tcp_set_recv_bg(struct socket *); | |
1612 | extern void tcp_clear_recv_bg(struct socket *); | |
fe8ab488 | 1613 | extern boolean_t tcp_sack_byte_islost(struct tcpcb *tp); |
0a7de745 | 1614 | #define IS_TCP_RECV_BG(_so) \ |
39037602 | 1615 | ((_so)->so_flags1 & SOF1_TRAFFIC_MGT_TCP_RECVBG) |
8ad349bb | 1616 | |
6d2010ae | 1617 | #if TRAFFIC_MGT |
316670eb | 1618 | #define CLEAR_IAJ_STATE(_tp_) (_tp_)->iaj_rcv_ts = 0 |
0a7de745 | 1619 | void reset_acc_iaj(struct tcpcb *tp); |
6d2010ae | 1620 | #endif /* TRAFFIC_MGT */ |
8ad349bb | 1621 | |
0a7de745 A |
1622 | int tcp_lock(struct socket *, int, void *); |
1623 | int tcp_unlock(struct socket *, int, void *); | |
1624 | void calculate_tcp_clock(void); | |
6d2010ae | 1625 | |
39236c6e | 1626 | extern void tcp_keepalive_reset(struct tcpcb *); |
fe8ab488 | 1627 | extern uint32_t get_base_rtt(struct tcpcb *tp); |
39236c6e | 1628 | |
91447636 | 1629 | #ifdef _KERN_LOCKS_H_ |
0a7de745 | 1630 | lck_mtx_t * tcp_getlock(struct socket *, int); |
91447636 | 1631 | #else |
0a7de745 | 1632 | void * tcp_getlock(struct socket *, int); |
91447636 A |
1633 | #endif |
1634 | ||
0a7de745 A |
1635 | extern struct pr_usrreqs tcp_usrreqs; |
1636 | extern u_int32_t tcp_sendspace; | |
1637 | extern u_int32_t tcp_recvspace; | |
91447636 | 1638 | tcp_seq tcp_new_isn(struct tcpcb *); |
1c79356b | 1639 | |
39236c6e A |
1640 | extern int tcp_input_checksum(int, struct mbuf *, struct tcphdr *, int, int); |
1641 | extern void tcp_getconninfo(struct socket *, struct conninfo_tcp *); | |
fe8ab488 A |
1642 | extern void add_to_time_wait(struct tcpcb *, uint32_t delay); |
1643 | extern void tcp_pmtud_revert_segment_size(struct tcpcb *tp); | |
3e170ce0 A |
1644 | extern void tcp_rxtseg_insert(struct tcpcb *, tcp_seq, tcp_seq); |
1645 | extern struct tcp_rxt_seg *tcp_rxtseg_find(struct tcpcb *, tcp_seq, tcp_seq); | |
1646 | extern void tcp_rxtseg_clean(struct tcpcb *); | |
1647 | extern boolean_t tcp_rxtseg_detect_bad_rexmt(struct tcpcb *, tcp_seq); | |
1648 | extern boolean_t tcp_rxtseg_dsack_for_tlp(struct tcpcb *); | |
1649 | extern u_int32_t tcp_rxtseg_total_size(struct tcpcb *tp); | |
1650 | extern void tcp_rexmt_save_state(struct tcpcb *tp); | |
1651 | extern void tcp_interface_send_probe(u_int16_t if_index_available); | |
1652 | extern void tcp_probe_connectivity(struct ifnet *ifp, u_int32_t enable); | |
1653 | extern void tcp_get_connectivity_status(struct tcpcb *, | |
1654 | struct tcp_conn_status *); | |
1655 | ||
cb323159 | 1656 | extern void tcp_clear_keep_alive_offload(struct socket *so); |
39037602 A |
1657 | extern void tcp_fill_keepalive_offload_frames(struct ifnet *, |
1658 | struct ifnet_keepalive_offload_frame *, u_int32_t, size_t, u_int32_t *); | |
cb323159 A |
1659 | extern int tcp_notify_kao_timeout(ifnet_t ifp, |
1660 | struct ifnet_keepalive_offload_frame *frame); | |
39037602 | 1661 | |
3e170ce0 A |
1662 | extern boolean_t tfo_enabled(const struct tcpcb *tp); |
1663 | extern void tcp_disable_tfo(struct tcpcb *tp); | |
1664 | extern void tcp_tfo_gen_cookie(struct inpcb *inp, u_char *out, size_t blk_size); | |
0a7de745 | 1665 | #define TCP_FASTOPEN_KEYLEN 16 |
5c9f4661 | 1666 | extern int tcp_freeq(struct tcpcb *tp); |
39037602 A |
1667 | extern errno_t tcp_notify_ack_id_valid(struct tcpcb *, struct socket *, u_int32_t); |
1668 | extern errno_t tcp_add_notify_ack_marker(struct tcpcb *, u_int32_t); | |
1669 | extern void tcp_notify_ack_free(struct tcpcb *); | |
1670 | extern void tcp_notify_acknowledgement(struct tcpcb *, struct socket *); | |
1671 | extern void tcp_get_notify_ack_count(struct tcpcb *, | |
1672 | struct tcp_notify_ack_complete *); | |
1673 | extern void tcp_get_notify_ack_ids(struct tcpcb *tp, | |
1674 | struct tcp_notify_ack_complete *); | |
1675 | extern void tcp_update_mss_locked(struct socket *, struct ifnet *); | |
1676 | ||
1677 | extern int get_tcp_inp_list(struct inpcb **, int, inp_gen_t); | |
1678 | extern bool tcp_notify_ack_active(struct socket *so); | |
3e170ce0 | 1679 | |
39236c6e | 1680 | #if MPTCP |
5c9f4661 | 1681 | extern int mptcp_input_preproc(struct tcpcb *tp, struct mbuf *m, |
0a7de745 | 1682 | struct tcphdr *th, int drop_hdrlen); |
5ba3f43e | 1683 | extern uint32_t mptcp_output_csum(struct mbuf *m, uint64_t dss_val, |
0a7de745 | 1684 | uint32_t sseq, uint16_t dlen); |
39236c6e | 1685 | extern int mptcp_adj_mss(struct tcpcb *, boolean_t); |
5c9f4661 | 1686 | extern void mptcp_insert_rmap(struct tcpcb *tp, struct mbuf *m, struct tcphdr *th); |
39236c6e | 1687 | #endif |
5ba3f43e A |
1688 | |
1689 | __private_extern__ void tcp_update_stats_per_flow( | |
0a7de745 | 1690 | struct ifnet_stats_per_flow *, struct ifnet *); |
5ba3f43e | 1691 | |
cb323159 | 1692 | #endif /* BSD_KERNEL_PRIVATE */ |
1c79356b A |
1693 | |
1694 | #endif /* _NETINET_TCP_VAR_H_ */ |