tcp_timer.c revision 1.33 1 /* $NetBSD: tcp_timer.c,v 1.33 1998/04/29 03:44:12 kml Exp $ */
2
3 /*-
4 * Copyright (c) 1997, 1998 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Jason R. Thorpe and Kevin M. Lahey of the Numerical Aerospace Simulation
9 * Facility, NASA Ames Research Center.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. All advertising materials mentioning features or use of this software
20 * must display the following acknowledgement:
21 * This product includes software developed by the NetBSD
22 * Foundation, Inc. and its contributors.
23 * 4. Neither the name of The NetBSD Foundation nor the names of its
24 * contributors may be used to endorse or promote products derived
25 * from this software without specific prior written permission.
26 *
27 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
28 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
29 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
30 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
31 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
32 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
33 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
34 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
35 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
36 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
37 * POSSIBILITY OF SUCH DAMAGE.
38 */
39
40 /*
41 * Copyright (c) 1982, 1986, 1988, 1990, 1993, 1995
42 * The Regents of the University of California. All rights reserved.
43 *
44 * Redistribution and use in source and binary forms, with or without
45 * modification, are permitted provided that the following conditions
46 * are met:
47 * 1. Redistributions of source code must retain the above copyright
48 * notice, this list of conditions and the following disclaimer.
49 * 2. Redistributions in binary form must reproduce the above copyright
50 * notice, this list of conditions and the following disclaimer in the
51 * documentation and/or other materials provided with the distribution.
52 * 3. All advertising materials mentioning features or use of this software
53 * must display the following acknowledgement:
54 * This product includes software developed by the University of
55 * California, Berkeley and its contributors.
56 * 4. Neither the name of the University nor the names of its contributors
57 * may be used to endorse or promote products derived from this software
58 * without specific prior written permission.
59 *
60 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
61 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
62 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
63 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
64 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
65 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
66 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
67 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
68 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
69 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
70 * SUCH DAMAGE.
71 *
72 * @(#)tcp_timer.c 8.2 (Berkeley) 5/24/95
73 */
74
75 #include "opt_tcp_compat_42.h"
76
77 #ifndef TUBA_INCLUDE
78 #include <sys/param.h>
79 #include <sys/systm.h>
80 #include <sys/malloc.h>
81 #include <sys/mbuf.h>
82 #include <sys/socket.h>
83 #include <sys/socketvar.h>
84 #include <sys/protosw.h>
85 #include <sys/errno.h>
86
87 #include <net/if.h>
88 #include <net/route.h>
89
90 #include <netinet/in.h>
91 #include <netinet/in_systm.h>
92 #include <netinet/ip.h>
93 #include <netinet/in_pcb.h>
94 #include <netinet/ip_var.h>
95 #include <netinet/tcp.h>
96 #include <netinet/tcp_fsm.h>
97 #include <netinet/tcp_seq.h>
98 #include <netinet/tcp_timer.h>
99 #include <netinet/tcp_var.h>
100 #include <netinet/tcpip.h>
101
102 int tcp_keepidle = TCPTV_KEEP_IDLE;
103 int tcp_keepintvl = TCPTV_KEEPINTVL;
104 int tcp_keepcnt = TCPTV_KEEPCNT; /* max idle probes */
105 int tcp_maxpersistidle = TCPTV_KEEP_IDLE; /* max idle time in persist */
106 int tcp_maxidle;
107 #else /* TUBA_INCLUDE */
108
109 extern int tcp_keepcnt;
110 extern int tcp_maxpersistidle;
111 #endif /* TUBA_INCLUDE */
112
113 struct tcp_delack_head tcp_delacks;
114
115 /*
116 * Fast timeout routine for processing delayed acks
117 */
118 void
119 tcp_fasttimo()
120 {
121 register struct tcpcb *tp, *ntp;
122 int s;
123
124 s = splsoftnet();
125 for (tp = tcp_delacks.lh_first; tp != NULL; tp = ntp) {
126 /*
127 * If tcp_output() can't transmit the ACK for whatever
128 * reason, it will remain on the queue for the next
129 * time the heartbeat ticks.
130 */
131 ntp = tp->t_delack.le_next;
132 tp->t_flags |= TF_ACKNOW;
133 (void) tcp_output(tp);
134 }
135 splx(s);
136 }
137
138 /*
139 * Tcp protocol timeout routine called every 500 ms.
140 * Updates the timers in all active tcb's and
141 * causes finite state machine actions if timers expire.
142 */
143 void
144 tcp_slowtimo()
145 {
146 register struct inpcb *inp, *ninp;
147 register struct tcpcb *tp;
148 int s;
149 register long i;
150 static int syn_cache_last = 0;
151
152 s = splsoftnet();
153 tcp_maxidle = tcp_keepcnt * tcp_keepintvl;
154 /*
155 * Search through tcb's and update active timers.
156 */
157 inp = tcbtable.inpt_queue.cqh_first;
158 if (inp == (struct inpcb *)0) { /* XXX */
159 splx(s);
160 return;
161 }
162 for (; inp != (struct inpcb *)&tcbtable.inpt_queue; inp = ninp) {
163 ninp = inp->inp_queue.cqe_next;
164 tp = intotcpcb(inp);
165 if (tp == 0 || tp->t_state == TCPS_LISTEN)
166 continue;
167 for (i = 0; i < TCPT_NTIMERS; i++) {
168 if (tp->t_timer[i] && --tp->t_timer[i] == 0) {
169 (void) tcp_usrreq(tp->t_inpcb->inp_socket,
170 PRU_SLOWTIMO, (struct mbuf *)0,
171 (struct mbuf *)i, (struct mbuf *)0,
172 (struct proc *)0);
173 /* XXX NOT MP SAFE */
174 if ((ninp == (void *)&tcbtable.inpt_queue &&
175 tcbtable.inpt_queue.cqh_last != inp) ||
176 ninp->inp_queue.cqe_prev != inp)
177 goto tpgone;
178 }
179 }
180 tp->t_idle++;
181 if (tp->t_rtt)
182 tp->t_rtt++;
183 tpgone:
184 ;
185 }
186 #if NRND == 0 /* Do we need to do this when using random() ? */
187 tcp_iss_seq += TCP_ISSINCR; /* increment iss */
188 #ifdef TCP_COMPAT_42
189 if ((int)tcp_iss_seq < 0)
190 tcp_iss_seq = 0; /* XXX */
191 #endif
192 #endif
193 tcp_now++; /* for timestamps */
194 if (++syn_cache_last >= tcp_syn_cache_interval) {
195 syn_cache_timer(syn_cache_last);
196 syn_cache_last = 0;
197 }
198 splx(s);
199 }
200 #ifndef TUBA_INCLUDE
201
202 /*
203 * Cancel all timers for TCP tp.
204 */
205 void
206 tcp_canceltimers(tp)
207 struct tcpcb *tp;
208 {
209 register int i;
210
211 for (i = 0; i < TCPT_NTIMERS; i++)
212 tp->t_timer[i] = 0;
213 }
214
215 int tcp_backoff[TCP_MAXRXTSHIFT + 1] =
216 { 1, 2, 4, 8, 16, 32, 64, 64, 64, 64, 64, 64, 64 };
217
218 int tcp_totbackoff = 511; /* sum of tcp_backoff[] */
219
220 /*
221 * TCP timer processing.
222 */
223 struct tcpcb *
224 tcp_timers(tp, timer)
225 register struct tcpcb *tp;
226 int timer;
227 {
228 short rto;
229
230 switch (timer) {
231
232 /*
233 * 2 MSL timeout in shutdown went off. If we're closed but
234 * still waiting for peer to close and connection has been idle
235 * too long, or if 2MSL time is up from TIME_WAIT, delete connection
236 * control block. Otherwise, check again in a bit.
237 */
238 case TCPT_2MSL:
239 if (tp->t_state != TCPS_TIME_WAIT &&
240 tp->t_idle <= tcp_maxidle)
241 tp->t_timer[TCPT_2MSL] = tcp_keepintvl;
242 else
243 tp = tcp_close(tp);
244 break;
245
246 /*
247 * Retransmission timer went off. Message has not
248 * been acked within retransmit interval. Back off
249 * to a longer retransmit interval and retransmit one segment.
250 */
251 case TCPT_REXMT:
252 if (++tp->t_rxtshift > TCP_MAXRXTSHIFT) {
253 tp->t_rxtshift = TCP_MAXRXTSHIFT;
254 tcpstat.tcps_timeoutdrop++;
255 tp = tcp_drop(tp, tp->t_softerror ?
256 tp->t_softerror : ETIMEDOUT);
257 break;
258 }
259 tcpstat.tcps_rexmttimeo++;
260 rto = TCP_REXMTVAL(tp);
261 if (rto < tp->t_rttmin)
262 rto = tp->t_rttmin;
263 TCPT_RANGESET(tp->t_rxtcur, rto * tcp_backoff[tp->t_rxtshift],
264 tp->t_rttmin, TCPTV_REXMTMAX);
265 tp->t_timer[TCPT_REXMT] = tp->t_rxtcur;
266 /*
267 * If we are losing and we are trying path MTU discovery,
268 * try turning it off. This will avoid black holes in
269 * the network which suppress or fail to send "packet
270 * too big" ICMP messages. We should ideally do
271 * lots more sophisticated searching to find the right
272 * value here...
273 */
274 if (ip_mtudisc && tp->t_rxtshift > TCP_MAXRXTSHIFT / 6) {
275 struct inpcb *inp = tp->t_inpcb;
276 struct rtentry *rt = in_pcbrtentry(inp);
277
278 rt->rt_rmx.rmx_locks |= RTV_MTU;
279 }
280 /*
281 * If losing, let the lower level know and try for
282 * a better route. Also, if we backed off this far,
283 * our srtt estimate is probably bogus. Clobber it
284 * so we'll take the next rtt measurement as our srtt;
285 * move the current srtt into rttvar to keep the current
286 * retransmit times until then.
287 */
288 if (tp->t_rxtshift > TCP_MAXRXTSHIFT / 4) {
289 in_losing(tp->t_inpcb);
290 tp->t_rttvar += (tp->t_srtt >> TCP_RTT_SHIFT);
291 tp->t_srtt = 0;
292 }
293 tp->snd_nxt = tp->snd_una;
294 /*
295 * If timing a segment in this window, stop the timer.
296 */
297 tp->t_rtt = 0;
298 /*
299 * Remember if we are retransmitting a SYN, because if
300 * we do, set the initial congestion window must be set
301 * to 1 segment.
302 */
303 if (tp->t_state == TCPS_SYN_SENT)
304 tp->t_flags |= TF_SYN_REXMT;
305 /*
306 * Close the congestion window down to the initial window
307 * (we'll open it by one segment for each ack we get).
308 * Since we probably have a window's worth of unacked
309 * data accumulated, this "slow start" keeps us from
310 * dumping all that data as back-to-back packets (which
311 * might overwhelm an intermediate gateway).
312 *
313 * There are two phases to the opening: Initially we
314 * open by one mss on each ack. This makes the window
315 * size increase exponentially with time. If the
316 * window is larger than the path can handle, this
317 * exponential growth results in dropped packet(s)
318 * almost immediately. To get more time between
319 * drops but still "push" the network to take advantage
320 * of improving conditions, we switch from exponential
321 * to linear window opening at some threshhold size.
322 * For a threshhold, we use half the current window
323 * size, truncated to a multiple of the mss.
324 *
325 * (the minimum cwnd that will give us exponential
326 * growth is 2 mss. We don't allow the threshhold
327 * to go below this.)
328 */
329 {
330 u_int win = min(tp->snd_wnd, tp->snd_cwnd) / 2 / tp->t_segsz;
331 if (win < 2)
332 win = 2;
333 tp->snd_cwnd = TCP_INITIAL_WINDOW(tcp_init_win, tp->t_segsz);
334 tp->snd_ssthresh = win * tp->t_segsz;
335 tp->t_dupacks = 0;
336 }
337 (void) tcp_output(tp);
338 break;
339
340 /*
341 * Persistance timer into zero window.
342 * Force a byte to be output, if possible.
343 */
344 case TCPT_PERSIST:
345 /*
346 * Hack: if the peer is dead/unreachable, we do not
347 * time out if the window is closed. After a full
348 * backoff, drop the connection if the idle time
349 * (no responses to probes) reaches the maximum
350 * backoff that we would use if retransmitting.
351 */
352 rto = TCP_REXMTVAL(tp);
353 if (rto < tp->t_rttmin)
354 rto = tp->t_rttmin;
355 if (tp->t_rxtshift == TCP_MAXRXTSHIFT &&
356 (tp->t_idle >= tcp_maxpersistidle ||
357 tp->t_idle >= rto * tcp_totbackoff)) {
358 tcpstat.tcps_persistdrops++;
359 tp = tcp_drop(tp, ETIMEDOUT);
360 break;
361 }
362 tcpstat.tcps_persisttimeo++;
363 tcp_setpersist(tp);
364 tp->t_force = 1;
365 (void) tcp_output(tp);
366 tp->t_force = 0;
367 break;
368
369 /*
370 * Keep-alive timer went off; send something
371 * or drop connection if idle for too long.
372 */
373 case TCPT_KEEP:
374 tcpstat.tcps_keeptimeo++;
375 if (TCPS_HAVEESTABLISHED(tp->t_state) == 0)
376 goto dropit;
377 if (tp->t_inpcb->inp_socket->so_options & SO_KEEPALIVE &&
378 tp->t_state <= TCPS_CLOSE_WAIT) {
379 if (tp->t_idle >= tcp_keepidle + tcp_maxidle)
380 goto dropit;
381 /*
382 * Send a packet designed to force a response
383 * if the peer is up and reachable:
384 * either an ACK if the connection is still alive,
385 * or an RST if the peer has closed the connection
386 * due to timeout or reboot.
387 * Using sequence number tp->snd_una-1
388 * causes the transmitted zero-length segment
389 * to lie outside the receive window;
390 * by the protocol spec, this requires the
391 * correspondent TCP to respond.
392 */
393 tcpstat.tcps_keepprobe++;
394 #ifdef TCP_COMPAT_42
395 /*
396 * The keepalive packet must have nonzero length
397 * to get a 4.2 host to respond.
398 */
399 (void)tcp_respond(tp, tp->t_template,
400 (struct mbuf *)NULL, tp->rcv_nxt - 1,
401 tp->snd_una - 1, 0);
402 #else
403 (void)tcp_respond(tp, tp->t_template,
404 (struct mbuf *)NULL, tp->rcv_nxt,
405 tp->snd_una - 1, 0);
406 #endif
407 tp->t_timer[TCPT_KEEP] = tcp_keepintvl;
408 } else
409 tp->t_timer[TCPT_KEEP] = tcp_keepidle;
410 break;
411 dropit:
412 tcpstat.tcps_keepdrops++;
413 tp = tcp_drop(tp, ETIMEDOUT);
414 break;
415 }
416 return (tp);
417 }
418 #endif /* TUBA_INCLUDE */
419