2014-01-14 00:11:01 +01:00
|
|
|
/****************************************************************************
|
2014-06-18 18:18:53 +02:00
|
|
|
* net/tcp/tcp_wrbuffer.c
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
2021-05-26 09:54:32 +02:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
2021-05-26 09:54:32 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
2021-05-26 09:54:32 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-24 16:53:28 +02:00
|
|
|
#include <nuttx/net/netconfig.h>
|
2014-01-14 00:11:01 +01:00
|
|
|
|
2016-06-11 22:14:08 +02:00
|
|
|
#if defined(CONFIG_DEBUG_FEATURES) && defined(CONFIG_NET_TCP_WRBUFFER_DEBUG)
|
2014-06-18 19:45:55 +02:00
|
|
|
/* Force debug output (from this file only) */
|
|
|
|
|
|
|
|
# undef CONFIG_DEBUG_NET
|
|
|
|
# define CONFIG_DEBUG_NET 1
|
|
|
|
#endif
|
|
|
|
|
2014-01-14 00:11:01 +01:00
|
|
|
#include <queue.h>
|
2014-06-22 19:27:57 +02:00
|
|
|
#include <string.h>
|
|
|
|
#include <assert.h>
|
2018-02-14 16:23:55 +01:00
|
|
|
#include <errno.h>
|
2014-01-14 00:11:01 +01:00
|
|
|
#include <debug.h>
|
|
|
|
|
2017-10-04 23:22:27 +02:00
|
|
|
#include <nuttx/semaphore.h>
|
2015-01-28 18:56:11 +01:00
|
|
|
#include <nuttx/net/net.h>
|
2017-05-09 15:34:59 +02:00
|
|
|
#include <nuttx/mm/iob.h>
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2018-07-07 03:49:05 +02:00
|
|
|
#include "utils/utils.h"
|
2014-06-22 19:27:57 +02:00
|
|
|
#include "tcp/tcp.h"
|
2014-01-14 00:11:01 +01:00
|
|
|
|
2018-07-07 03:49:05 +02:00
|
|
|
#if defined(CONFIG_NET_TCP) && defined(CONFIG_NET_TCP_WRITE_BUFFERS)
|
|
|
|
|
2014-01-14 00:11:01 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/* Package all globals used by this logic into a structure */
|
|
|
|
|
|
|
|
struct wrbuffer_s
|
|
|
|
{
|
|
|
|
/* The semaphore to protect the buffers */
|
|
|
|
|
|
|
|
sem_t sem;
|
|
|
|
|
|
|
|
/* This is the list of available write buffers */
|
|
|
|
|
|
|
|
sq_queue_t freebuffers;
|
|
|
|
|
|
|
|
/* These are the pre-allocated write buffers */
|
|
|
|
|
2014-06-22 19:27:57 +02:00
|
|
|
struct tcp_wrbuffer_s buffers[CONFIG_NET_TCP_NWRBCHAINS];
|
2014-01-14 00:11:01 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Data
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/* This is the state of the global write buffer resource */
|
|
|
|
|
|
|
|
static struct wrbuffer_s g_wrbuffer;
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_wrbuffer_initialize
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Initialize the list of free write buffers
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called once early initialization.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-21 23:23:39 +02:00
|
|
|
void tcp_wrbuffer_initialize(void)
|
2014-01-14 00:11:01 +01:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2014-06-22 19:27:57 +02:00
|
|
|
for (i = 0; i < CONFIG_NET_TCP_NWRBCHAINS; i++)
|
2014-01-14 00:11:01 +01:00
|
|
|
{
|
|
|
|
sq_addfirst(&g_wrbuffer.buffers[i].wb_node, &g_wrbuffer.freebuffers);
|
|
|
|
}
|
|
|
|
|
2017-10-03 20:51:15 +02:00
|
|
|
nxsem_init(&g_wrbuffer.sem, 0, CONFIG_NET_TCP_NWRBCHAINS);
|
2020-05-17 15:56:21 +02:00
|
|
|
nxsem_set_protocol(&g_wrbuffer.sem, SEM_PRIO_NONE);
|
2014-01-14 00:11:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
2022-02-17 05:58:00 +01:00
|
|
|
* Name: tcp_wrbuffer_timedalloc
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Allocate a TCP write buffer by taking a pre-allocated buffer from
|
|
|
|
* the free list. This function is called from TCP logic when a buffer
|
|
|
|
* of TCP data is about to sent
|
2022-02-17 05:58:00 +01:00
|
|
|
* This function is wrapped version of tcp_wrbuffer_alloc(),
|
|
|
|
* this wait will be terminated when the specified timeout expires.
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Input Parameters:
|
2022-02-17 05:58:00 +01:00
|
|
|
* timeout - The relative time to wait until a timeout is declared.
|
2014-06-24 19:53:19 +02:00
|
|
|
*
|
2014-01-14 00:11:01 +01:00
|
|
|
* Assumptions:
|
2015-01-28 18:56:11 +01:00
|
|
|
* Called from user logic with the network locked.
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2022-02-17 05:58:00 +01:00
|
|
|
FAR struct tcp_wrbuffer_s *tcp_wrbuffer_timedalloc(unsigned int timeout)
|
2014-01-14 00:11:01 +01:00
|
|
|
{
|
2014-06-22 19:27:57 +02:00
|
|
|
FAR struct tcp_wrbuffer_s *wrb;
|
2022-02-17 05:58:00 +01:00
|
|
|
int ret;
|
2014-01-14 00:11:01 +01:00
|
|
|
|
2014-06-22 19:27:57 +02:00
|
|
|
/* We need to allocate two things: (1) A write buffer structure and (2)
|
|
|
|
* at least one I/O buffer to start the chain.
|
|
|
|
*
|
2018-07-07 01:37:26 +02:00
|
|
|
* Allocate the write buffer structure first then the IOB. In order to
|
2014-06-22 19:27:57 +02:00
|
|
|
* avoid deadlocks, we will need to free the IOB first, then the write
|
|
|
|
* buffer
|
|
|
|
*/
|
|
|
|
|
2022-02-17 05:58:00 +01:00
|
|
|
ret = net_timedwait_uninterruptible(&g_wrbuffer.sem, timeout);
|
|
|
|
if (ret != OK)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
2014-06-22 19:27:57 +02:00
|
|
|
|
|
|
|
/* Now, we are guaranteed to have a write buffer structure reserved
|
|
|
|
* for us in the free list.
|
|
|
|
*/
|
2014-01-14 00:11:01 +01:00
|
|
|
|
2014-06-22 19:27:57 +02:00
|
|
|
wrb = (FAR struct tcp_wrbuffer_s *)sq_remfirst(&g_wrbuffer.freebuffers);
|
|
|
|
DEBUGASSERT(wrb);
|
|
|
|
memset(wrb, 0, sizeof(struct tcp_wrbuffer_s));
|
|
|
|
|
|
|
|
/* Now get the first I/O buffer for the write buffer structure */
|
|
|
|
|
2022-08-08 04:21:03 +02:00
|
|
|
wrb->wb_iob = net_iobtimedalloc(true, timeout);
|
2018-07-07 03:49:05 +02:00
|
|
|
|
2019-03-11 19:48:17 +01:00
|
|
|
/* Did we get an IOB? We should always get one except under some really
|
|
|
|
* weird error conditions.
|
2018-07-07 03:49:05 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (wrb->wb_iob == NULL)
|
2014-01-14 00:11:01 +01:00
|
|
|
{
|
2016-06-11 23:50:49 +02:00
|
|
|
nerr("ERROR: Failed to allocate I/O buffer\n");
|
2014-06-22 19:27:57 +02:00
|
|
|
tcp_wrbuffer_release(wrb);
|
2014-01-14 00:11:01 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2014-06-22 19:27:57 +02:00
|
|
|
return wrb;
|
2014-01-14 00:11:01 +01:00
|
|
|
}
|
|
|
|
|
2022-02-17 05:58:00 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_wrbuffer_alloc
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Allocate a TCP write buffer by taking a pre-allocated buffer from
|
|
|
|
* the free list. This function is called from TCP logic when a buffer
|
|
|
|
* of TCP data is about to sent
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from user logic with the network locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
FAR struct tcp_wrbuffer_s *tcp_wrbuffer_alloc(void)
|
|
|
|
{
|
|
|
|
return tcp_wrbuffer_timedalloc(UINT_MAX);
|
|
|
|
}
|
|
|
|
|
2018-04-20 15:37:51 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_wrbuffer_tryalloc
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Try to allocate a TCP write buffer by taking a pre-allocated buffer from
|
|
|
|
* the free list. This function is called from TCP logic when a buffer
|
|
|
|
* of TCP data is about to be sent on a non-blocking socket. Returns
|
|
|
|
* immediately if the allocation failed.
|
|
|
|
*
|
|
|
|
* Input parameters:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from user logic with the network locked. Will return if no buffer
|
|
|
|
* is available.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
FAR struct tcp_wrbuffer_s *tcp_wrbuffer_tryalloc(void)
|
|
|
|
{
|
2022-02-17 05:58:00 +01:00
|
|
|
return tcp_wrbuffer_timedalloc(0);
|
2018-04-20 15:37:51 +02:00
|
|
|
}
|
|
|
|
|
2014-01-14 00:11:01 +01:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_wrbuffer_release
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Release a TCP write buffer by returning the buffer to the free list.
|
2014-04-12 20:13:01 +02:00
|
|
|
* This function is called from user logic after it is consumed the
|
|
|
|
* buffered data.
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-09-02 18:27:03 +02:00
|
|
|
* This function must be called with the network locked.
|
2014-01-14 00:11:01 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-22 19:27:57 +02:00
|
|
|
void tcp_wrbuffer_release(FAR struct tcp_wrbuffer_s *wrb)
|
2014-01-14 00:11:01 +01:00
|
|
|
{
|
2018-09-25 15:02:04 +02:00
|
|
|
DEBUGASSERT(wrb != NULL);
|
2014-06-22 19:27:57 +02:00
|
|
|
|
|
|
|
/* To avoid deadlocks, we must following this ordering: Release the I/O
|
|
|
|
* buffer chain first, then the write buffer structure.
|
|
|
|
*/
|
|
|
|
|
2018-09-25 15:02:04 +02:00
|
|
|
if (wrb->wb_iob != NULL)
|
|
|
|
{
|
2022-08-08 04:21:03 +02:00
|
|
|
iob_free_chain(wrb->wb_iob);
|
2018-09-25 15:02:04 +02:00
|
|
|
}
|
2014-06-22 19:27:57 +02:00
|
|
|
|
2022-01-25 18:49:04 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_FAST_RETRANSMIT
|
net/tcp: implement the fast retransmit
RFC2001: TCP Slow Start, Congestion Avoidance, Fast Retransmit,
and Fast Recovery Algorithms
...
3. Fast Retransmit
Modifications to the congestion avoidance algorithm were proposed in
1990 [3]. Before describing the change, realize that TCP may
generate an immediate acknowledgment (a duplicate ACK) when an out-
of-order segment is received (Section 4.2.2.21 of [1], with a note
that one reason for doing so was for the experimental fast-
retransmit algorithm). This duplicate ACK should not be delayed.
The purpose of this duplicate ACK is to let the other end know that a
segment was received out of order, and to tell it what sequence
number is expected.
Since TCP does not know whether a duplicate ACK is caused by a lost
segment or just a reordering of segments, it waits for a small number
of duplicate ACKs to be received. It is assumed that if there is
just a reordering of the segments, there will be only one or two
duplicate ACKs before the reordered segment is processed, which will
then generate a new ACK. If three or more duplicate ACKs are
received in a row, it is a strong indication that a segment has been
lost. TCP then performs a retransmission of what appears to be the
missing segment, without waiting for a retransmission timer to
expire.
Change-Id: Ie2cbcecab507c3d831f74390a6a85e0c5c8e0652
Signed-off-by: chao.an <anchao@xiaomi.com>
2020-10-22 09:02:52 +02:00
|
|
|
/* Reset the ack counter */
|
|
|
|
|
|
|
|
TCP_WBNACK(wrb) = 0;
|
2022-01-25 18:49:04 +01:00
|
|
|
#endif
|
net/tcp: implement the fast retransmit
RFC2001: TCP Slow Start, Congestion Avoidance, Fast Retransmit,
and Fast Recovery Algorithms
...
3. Fast Retransmit
Modifications to the congestion avoidance algorithm were proposed in
1990 [3]. Before describing the change, realize that TCP may
generate an immediate acknowledgment (a duplicate ACK) when an out-
of-order segment is received (Section 4.2.2.21 of [1], with a note
that one reason for doing so was for the experimental fast-
retransmit algorithm). This duplicate ACK should not be delayed.
The purpose of this duplicate ACK is to let the other end know that a
segment was received out of order, and to tell it what sequence
number is expected.
Since TCP does not know whether a duplicate ACK is caused by a lost
segment or just a reordering of segments, it waits for a small number
of duplicate ACKs to be received. It is assumed that if there is
just a reordering of the segments, there will be only one or two
duplicate ACKs before the reordered segment is processed, which will
then generate a new ACK. If three or more duplicate ACKs are
received in a row, it is a strong indication that a segment has been
lost. TCP then performs a retransmission of what appears to be the
missing segment, without waiting for a retransmission timer to
expire.
Change-Id: Ie2cbcecab507c3d831f74390a6a85e0c5c8e0652
Signed-off-by: chao.an <anchao@xiaomi.com>
2020-10-22 09:02:52 +02:00
|
|
|
|
2014-06-22 19:27:57 +02:00
|
|
|
/* Then free the write buffer structure */
|
|
|
|
|
|
|
|
sq_addlast(&wrb->wb_node, &g_wrbuffer.freebuffers);
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&g_wrbuffer.sem);
|
2014-01-14 00:11:01 +01:00
|
|
|
}
|
|
|
|
|
2022-03-31 05:40:08 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_wrbuffer_inqueue_size
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Get the in-queued write buffer size from connection
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - The TCP connection of interest
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from user logic with the network locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if CONFIG_NET_SEND_BUFSIZE > 0
|
|
|
|
uint32_t tcp_wrbuffer_inqueue_size(FAR struct tcp_conn_s *conn)
|
|
|
|
{
|
|
|
|
FAR struct tcp_wrbuffer_s *wrb;
|
|
|
|
FAR sq_entry_t *entry;
|
|
|
|
uint32_t total = 0;
|
|
|
|
|
|
|
|
if (conn)
|
|
|
|
{
|
|
|
|
for (entry = sq_peek(&conn->unacked_q); entry; entry = sq_next(entry))
|
|
|
|
{
|
|
|
|
wrb = (FAR struct tcp_wrbuffer_s *)entry;
|
|
|
|
total += TCP_WBPKTLEN(wrb);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (entry = sq_peek(&conn->write_q); entry; entry = sq_next(entry))
|
|
|
|
{
|
|
|
|
wrb = (FAR struct tcp_wrbuffer_s *)entry;
|
|
|
|
total += TCP_WBPKTLEN(wrb);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return total;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_SEND_BUFSIZE */
|
|
|
|
|
2016-01-22 22:52:14 +01:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_wrbuffer_test
|
2016-01-22 22:52:14 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Check if there is room in the write buffer. Does not reserve any space.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_wrbuffer_test(void)
|
|
|
|
{
|
|
|
|
int val = 0;
|
2018-02-06 16:13:16 +01:00
|
|
|
int ret;
|
|
|
|
|
2020-05-17 15:56:21 +02:00
|
|
|
ret = nxsem_get_value(&g_wrbuffer.sem, &val);
|
2018-02-06 16:13:16 +01:00
|
|
|
if (ret >= 0)
|
|
|
|
{
|
|
|
|
ret = val > 0 ? OK : -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2016-01-22 22:52:14 +01:00
|
|
|
}
|
|
|
|
|
2018-07-07 03:49:05 +02:00
|
|
|
#endif /* CONFIG_NET_TCP && CONFIG_NET_TCP_WRITE_BUFFERS */
|