xref: /freebsd/sys/netinet/tcp_input.c (revision 30613f5610e0139db5eb53407ac7f628ccb141d5)
1df8bae1dSRodney W. Grimes /*
2e79adb8eSGarrett Wollman  * Copyright (c) 1982, 1986, 1988, 1990, 1993, 1994, 1995
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  *
5df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
6df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
7df8bae1dSRodney W. Grimes  * are met:
8df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
9df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
10df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
12df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
13df8bae1dSRodney W. Grimes  * 3. All advertising materials mentioning features or use of this software
14df8bae1dSRodney W. Grimes  *    must display the following acknowledgement:
15df8bae1dSRodney W. Grimes  *	This product includes software developed by the University of
16df8bae1dSRodney W. Grimes  *	California, Berkeley and its contributors.
17df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
18df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
19df8bae1dSRodney W. Grimes  *    without specific prior written permission.
20df8bae1dSRodney W. Grimes  *
21df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
32df8bae1dSRodney W. Grimes  *
33e79adb8eSGarrett Wollman  *	@(#)tcp_input.c	8.12 (Berkeley) 5/24/95
34c3aac50fSPeter Wemm  * $FreeBSD$
35df8bae1dSRodney W. Grimes  */
36df8bae1dSRodney W. Grimes 
37f9e354dfSJulian Elischer #include "opt_ipfw.h"		/* for ipfw_fwd		*/
38fb59c426SYoshinobu Inoue #include "opt_inet6.h"
393a2a9f79SYoshinobu Inoue #include "opt_ipsec.h"
40c488362eSRobert Watson #include "opt_mac.h"
410cc12cc5SJoerg Wunsch #include "opt_tcpdebug.h"
42e46cd3d4SDag-Erling Smørgrav #include "opt_tcp_input.h"
430cc12cc5SJoerg Wunsch 
44df8bae1dSRodney W. Grimes #include <sys/param.h>
4598163b98SPoul-Henning Kamp #include <sys/kernel.h>
46c488362eSRobert Watson #include <sys/mac.h>
47df8bae1dSRodney W. Grimes #include <sys/malloc.h>
48df8bae1dSRodney W. Grimes #include <sys/mbuf.h>
49a29f300eSGarrett Wollman #include <sys/proc.h>		/* for proc0 declaration */
50df8bae1dSRodney W. Grimes #include <sys/protosw.h>
51960ed29cSSeigo Tanimura #include <sys/signalvar.h>
52df8bae1dSRodney W. Grimes #include <sys/socket.h>
53df8bae1dSRodney W. Grimes #include <sys/socketvar.h>
54960ed29cSSeigo Tanimura #include <sys/sysctl.h>
55816a3d83SPoul-Henning Kamp #include <sys/syslog.h>
56960ed29cSSeigo Tanimura #include <sys/systm.h>
57df8bae1dSRodney W. Grimes 
58e79adb8eSGarrett Wollman #include <machine/cpu.h>	/* before tcp_seq.h, for tcp_random18() */
59e79adb8eSGarrett Wollman 
60df8bae1dSRodney W. Grimes #include <net/if.h>
61df8bae1dSRodney W. Grimes #include <net/route.h>
62df8bae1dSRodney W. Grimes 
63df8bae1dSRodney W. Grimes #include <netinet/in.h>
64960ed29cSSeigo Tanimura #include <netinet/in_pcb.h>
65df8bae1dSRodney W. Grimes #include <netinet/in_systm.h>
66960ed29cSSeigo Tanimura #include <netinet/in_var.h>
67df8bae1dSRodney W. Grimes #include <netinet/ip.h>
68686cdd19SJun-ichiro itojun Hagino #include <netinet/ip_icmp.h>	/* for ICMP_BANDLIM		*/
69686cdd19SJun-ichiro itojun Hagino #include <netinet/icmp_var.h>	/* for ICMP_BANDLIM		*/
70df8bae1dSRodney W. Grimes #include <netinet/ip_var.h>
71686cdd19SJun-ichiro itojun Hagino #include <netinet/ip6.h>
72686cdd19SJun-ichiro itojun Hagino #include <netinet/icmp6.h>
73686cdd19SJun-ichiro itojun Hagino #include <netinet6/in6_pcb.h>
74960ed29cSSeigo Tanimura #include <netinet6/ip6_var.h>
75960ed29cSSeigo Tanimura #include <netinet6/nd6.h>
76df8bae1dSRodney W. Grimes #include <netinet/tcp.h>
77df8bae1dSRodney W. Grimes #include <netinet/tcp_fsm.h>
78df8bae1dSRodney W. Grimes #include <netinet/tcp_seq.h>
79df8bae1dSRodney W. Grimes #include <netinet/tcp_timer.h>
80df8bae1dSRodney W. Grimes #include <netinet/tcp_var.h>
81fb59c426SYoshinobu Inoue #include <netinet6/tcp6_var.h>
82df8bae1dSRodney W. Grimes #include <netinet/tcpip.h>
83610ee2f9SDavid Greenman #ifdef TCPDEBUG
84df8bae1dSRodney W. Grimes #include <netinet/tcp_debug.h>
85fb59c426SYoshinobu Inoue #endif /* TCPDEBUG */
86fb59c426SYoshinobu Inoue 
87b9234fafSSam Leffler #ifdef FAST_IPSEC
88b9234fafSSam Leffler #include <netipsec/ipsec.h>
89b9234fafSSam Leffler #ifdef INET6
90b9234fafSSam Leffler #include <netipsec/ipsec6.h>
91b9234fafSSam Leffler #endif
92b9234fafSSam Leffler #endif /*FAST_IPSEC*/
93b9234fafSSam Leffler 
94fb59c426SYoshinobu Inoue #ifdef IPSEC
95fb59c426SYoshinobu Inoue #include <netinet6/ipsec.h>
963a2a9f79SYoshinobu Inoue #include <netinet6/ipsec6.h>
97fb59c426SYoshinobu Inoue #include <netkey/key.h>
98fb59c426SYoshinobu Inoue #endif /*IPSEC*/
99fb59c426SYoshinobu Inoue 
100db4f9cc7SJonathan Lemon #include <machine/in_cksum.h>
101db4f9cc7SJonathan Lemon 
102fb59c426SYoshinobu Inoue MALLOC_DEFINE(M_TSEGQ, "tseg_qent", "TCP segment queue entry");
103df8bae1dSRodney W. Grimes 
104c068736aSJeffrey Hsu static const int tcprexmtthresh = 3;
1052f96f1f4SGarrett Wollman tcp_cc	tcp_ccgen;
1060312fbe9SPoul-Henning Kamp 
1072f96f1f4SGarrett Wollman struct	tcpstat tcpstat;
108c73d99b5SRuslan Ermilov SYSCTL_STRUCT(_net_inet_tcp, TCPCTL_STATS, stats, CTLFLAG_RW,
1093d177f46SBill Fumerola     &tcpstat , tcpstat, "TCP statistics (struct tcpstat, netinet/tcp_var.h)");
1100312fbe9SPoul-Henning Kamp 
111d78a37adSPaul Traina static int log_in_vain = 0;
112816a3d83SPoul-Henning Kamp SYSCTL_INT(_net_inet_tcp, OID_AUTO, log_in_vain, CTLFLAG_RW,
1133d177f46SBill Fumerola     &log_in_vain, 0, "Log all incoming TCP connections");
114816a3d83SPoul-Henning Kamp 
11516f7f31fSGeoff Rehmet static int blackhole = 0;
11616f7f31fSGeoff Rehmet SYSCTL_INT(_net_inet_tcp, OID_AUTO, blackhole, CTLFLAG_RW,
11716f7f31fSGeoff Rehmet 	&blackhole, 0, "Do not send RST when dropping refused connections");
11816f7f31fSGeoff Rehmet 
119f498eeeeSDavid Greenman int tcp_delack_enabled = 1;
12084e33c9eSDavid Greenman SYSCTL_INT(_net_inet_tcp, OID_AUTO, delayed_ack, CTLFLAG_RW,
1213d177f46SBill Fumerola     &tcp_delack_enabled, 0,
1223d177f46SBill Fumerola     "Delay ACK to try and piggyback it onto a data packet");
123f498eeeeSDavid Greenman 
124f8613305SDag-Erling Smørgrav #ifdef TCP_DROP_SYNFIN
125f8613305SDag-Erling Smørgrav static int drop_synfin = 0;
126f8613305SDag-Erling Smørgrav SYSCTL_INT(_net_inet_tcp, OID_AUTO, drop_synfin, CTLFLAG_RW,
127f8613305SDag-Erling Smørgrav     &drop_synfin, 0, "Drop TCP packets with SYN+FIN set");
128f8613305SDag-Erling Smørgrav #endif
129f8613305SDag-Erling Smørgrav 
13015bd2b43SDavid Greenman struct inpcbhead tcb;
131fb59c426SYoshinobu Inoue #define	tcb6	tcb  /* for KAME src sync over BSD*'s */
13215bd2b43SDavid Greenman struct inpcbinfo tcbinfo;
133f76fcf6dSJeffrey Hsu struct mtx	*tcbinfo_mtx;
134df8bae1dSRodney W. Grimes 
1354d77a549SAlfred Perlstein static void	 tcp_dooptions(struct tcpopt *, u_char *, int, int);
1364d77a549SAlfred Perlstein static void	 tcp_pulloutofband(struct socket *,
1374d77a549SAlfred Perlstein 		     struct tcphdr *, struct mbuf *, int);
1384d77a549SAlfred Perlstein static int	 tcp_reass(struct tcpcb *, struct tcphdr *, int *,
1394d77a549SAlfred Perlstein 		     struct mbuf *);
1404d77a549SAlfred Perlstein static void	 tcp_xmit_timer(struct tcpcb *, int);
141c068736aSJeffrey Hsu static void	 tcp_newreno_partial_ack(struct tcpcb *, struct tcphdr *);
1420312fbe9SPoul-Henning Kamp 
143fb59c426SYoshinobu Inoue /* Neighbor Discovery, Neighbor Unreachability Detection Upper layer hint. */
144fb59c426SYoshinobu Inoue #ifdef INET6
145fb59c426SYoshinobu Inoue #define ND6_HINT(tp) \
146fb59c426SYoshinobu Inoue do { \
147fb59c426SYoshinobu Inoue 	if ((tp) && (tp)->t_inpcb && \
148fb59c426SYoshinobu Inoue 	    ((tp)->t_inpcb->inp_vflag & INP_IPV6) != 0 && \
149fb59c426SYoshinobu Inoue 	    (tp)->t_inpcb->in6p_route.ro_rt) \
150686cdd19SJun-ichiro itojun Hagino 		nd6_nud_hint((tp)->t_inpcb->in6p_route.ro_rt, NULL, 0); \
151fb59c426SYoshinobu Inoue } while (0)
152fb59c426SYoshinobu Inoue #else
153fb59c426SYoshinobu Inoue #define ND6_HINT(tp)
154fb59c426SYoshinobu Inoue #endif
155df8bae1dSRodney W. Grimes 
156df8bae1dSRodney W. Grimes /*
157262c1c1aSMatthew Dillon  * Indicate whether this ack should be delayed.  We can delay the ack if
158262c1c1aSMatthew Dillon  *	- delayed acks are enabled and
159262c1c1aSMatthew Dillon  *	- there is no delayed ack timer in progress and
160262c1c1aSMatthew Dillon  *	- our last ack wasn't a 0-sized window.  We never want to delay
161262c1c1aSMatthew Dillon  *	  the ack that opens up a 0-sized window.
162d8c85a26SJonathan Lemon  */
163d8c85a26SJonathan Lemon #define DELAY_ACK(tp) \
164262c1c1aSMatthew Dillon 	(tcp_delack_enabled && !callout_pending(tp->tt_delack) && \
165262c1c1aSMatthew Dillon 	(tp->t_flags & TF_RXWIN0SENT) == 0)
166d8c85a26SJonathan Lemon 
1670312fbe9SPoul-Henning Kamp static int
168fb59c426SYoshinobu Inoue tcp_reass(tp, th, tlenp, m)
169df8bae1dSRodney W. Grimes 	register struct tcpcb *tp;
170fb59c426SYoshinobu Inoue 	register struct tcphdr *th;
171fb59c426SYoshinobu Inoue 	int *tlenp;
172df8bae1dSRodney W. Grimes 	struct mbuf *m;
173df8bae1dSRodney W. Grimes {
174fb59c426SYoshinobu Inoue 	struct tseg_qent *q;
175fb59c426SYoshinobu Inoue 	struct tseg_qent *p = NULL;
176fb59c426SYoshinobu Inoue 	struct tseg_qent *nq;
177fb59c426SYoshinobu Inoue 	struct tseg_qent *te;
178df8bae1dSRodney W. Grimes 	struct socket *so = tp->t_inpcb->inp_socket;
179df8bae1dSRodney W. Grimes 	int flags;
180df8bae1dSRodney W. Grimes 
181df8bae1dSRodney W. Grimes 	/*
182fb59c426SYoshinobu Inoue 	 * Call with th==0 after become established to
183df8bae1dSRodney W. Grimes 	 * force pre-ESTABLISHED data up to user socket.
184df8bae1dSRodney W. Grimes 	 */
185fb59c426SYoshinobu Inoue 	if (th == 0)
186df8bae1dSRodney W. Grimes 		goto present;
187df8bae1dSRodney W. Grimes 
188fb59c426SYoshinobu Inoue 	/* Allocate a new queue entry. If we can't, just drop the pkt. XXX */
189fb59c426SYoshinobu Inoue 	MALLOC(te, struct tseg_qent *, sizeof (struct tseg_qent), M_TSEGQ,
190fb59c426SYoshinobu Inoue 	       M_NOWAIT);
191fb59c426SYoshinobu Inoue 	if (te == NULL) {
192fb59c426SYoshinobu Inoue 		tcpstat.tcps_rcvmemdrop++;
193fb59c426SYoshinobu Inoue 		m_freem(m);
194fb59c426SYoshinobu Inoue 		return (0);
195fb59c426SYoshinobu Inoue 	}
1966effc713SDoug Rabson 
197df8bae1dSRodney W. Grimes 	/*
198df8bae1dSRodney W. Grimes 	 * Find a segment which begins after this one does.
199df8bae1dSRodney W. Grimes 	 */
200fb59c426SYoshinobu Inoue 	LIST_FOREACH(q, &tp->t_segq, tqe_q) {
201fb59c426SYoshinobu Inoue 		if (SEQ_GT(q->tqe_th->th_seq, th->th_seq))
202df8bae1dSRodney W. Grimes 			break;
203fb59c426SYoshinobu Inoue 		p = q;
204fb59c426SYoshinobu Inoue 	}
205df8bae1dSRodney W. Grimes 
206df8bae1dSRodney W. Grimes 	/*
207df8bae1dSRodney W. Grimes 	 * If there is a preceding segment, it may provide some of
208df8bae1dSRodney W. Grimes 	 * our data already.  If so, drop the data from the incoming
209df8bae1dSRodney W. Grimes 	 * segment.  If it provides all of our data, drop us.
210df8bae1dSRodney W. Grimes 	 */
2116effc713SDoug Rabson 	if (p != NULL) {
212df8bae1dSRodney W. Grimes 		register int i;
213df8bae1dSRodney W. Grimes 		/* conversion to int (in i) handles seq wraparound */
214fb59c426SYoshinobu Inoue 		i = p->tqe_th->th_seq + p->tqe_len - th->th_seq;
215df8bae1dSRodney W. Grimes 		if (i > 0) {
216fb59c426SYoshinobu Inoue 			if (i >= *tlenp) {
217df8bae1dSRodney W. Grimes 				tcpstat.tcps_rcvduppack++;
218fb59c426SYoshinobu Inoue 				tcpstat.tcps_rcvdupbyte += *tlenp;
219df8bae1dSRodney W. Grimes 				m_freem(m);
220fb59c426SYoshinobu Inoue 				FREE(te, M_TSEGQ);
221a0292f23SGarrett Wollman 				/*
222a0292f23SGarrett Wollman 				 * Try to present any queued data
223a0292f23SGarrett Wollman 				 * at the left window edge to the user.
224a0292f23SGarrett Wollman 				 * This is needed after the 3-WHS
225a0292f23SGarrett Wollman 				 * completes.
226a0292f23SGarrett Wollman 				 */
227a0292f23SGarrett Wollman 				goto present;	/* ??? */
228df8bae1dSRodney W. Grimes 			}
229df8bae1dSRodney W. Grimes 			m_adj(m, i);
230fb59c426SYoshinobu Inoue 			*tlenp -= i;
231fb59c426SYoshinobu Inoue 			th->th_seq += i;
232df8bae1dSRodney W. Grimes 		}
233df8bae1dSRodney W. Grimes 	}
234df8bae1dSRodney W. Grimes 	tcpstat.tcps_rcvoopack++;
235fb59c426SYoshinobu Inoue 	tcpstat.tcps_rcvoobyte += *tlenp;
236df8bae1dSRodney W. Grimes 
237df8bae1dSRodney W. Grimes 	/*
238df8bae1dSRodney W. Grimes 	 * While we overlap succeeding segments trim them or,
239df8bae1dSRodney W. Grimes 	 * if they are completely covered, dequeue them.
240df8bae1dSRodney W. Grimes 	 */
2416effc713SDoug Rabson 	while (q) {
242fb59c426SYoshinobu Inoue 		register int i = (th->th_seq + *tlenp) - q->tqe_th->th_seq;
243df8bae1dSRodney W. Grimes 		if (i <= 0)
244df8bae1dSRodney W. Grimes 			break;
245fb59c426SYoshinobu Inoue 		if (i < q->tqe_len) {
246fb59c426SYoshinobu Inoue 			q->tqe_th->th_seq += i;
247fb59c426SYoshinobu Inoue 			q->tqe_len -= i;
248fb59c426SYoshinobu Inoue 			m_adj(q->tqe_m, i);
249df8bae1dSRodney W. Grimes 			break;
250df8bae1dSRodney W. Grimes 		}
2516effc713SDoug Rabson 
252fb59c426SYoshinobu Inoue 		nq = LIST_NEXT(q, tqe_q);
253fb59c426SYoshinobu Inoue 		LIST_REMOVE(q, tqe_q);
254fb59c426SYoshinobu Inoue 		m_freem(q->tqe_m);
255fb59c426SYoshinobu Inoue 		FREE(q, M_TSEGQ);
2566effc713SDoug Rabson 		q = nq;
257df8bae1dSRodney W. Grimes 	}
258df8bae1dSRodney W. Grimes 
259fb59c426SYoshinobu Inoue 	/* Insert the new segment queue entry into place. */
260fb59c426SYoshinobu Inoue 	te->tqe_m = m;
261fb59c426SYoshinobu Inoue 	te->tqe_th = th;
262fb59c426SYoshinobu Inoue 	te->tqe_len = *tlenp;
263fb59c426SYoshinobu Inoue 
2646effc713SDoug Rabson 	if (p == NULL) {
265fb59c426SYoshinobu Inoue 		LIST_INSERT_HEAD(&tp->t_segq, te, tqe_q);
2666effc713SDoug Rabson 	} else {
267fb59c426SYoshinobu Inoue 		LIST_INSERT_AFTER(p, te, tqe_q);
2686effc713SDoug Rabson 	}
269df8bae1dSRodney W. Grimes 
270df8bae1dSRodney W. Grimes present:
271df8bae1dSRodney W. Grimes 	/*
272df8bae1dSRodney W. Grimes 	 * Present data to user, advancing rcv_nxt through
273df8bae1dSRodney W. Grimes 	 * completed sequence space.
274df8bae1dSRodney W. Grimes 	 */
275a0292f23SGarrett Wollman 	if (!TCPS_HAVEESTABLISHED(tp->t_state))
276df8bae1dSRodney W. Grimes 		return (0);
277fb59c426SYoshinobu Inoue 	q = LIST_FIRST(&tp->t_segq);
278fb59c426SYoshinobu Inoue 	if (!q || q->tqe_th->th_seq != tp->rcv_nxt)
279df8bae1dSRodney W. Grimes 		return (0);
280df8bae1dSRodney W. Grimes 	do {
281fb59c426SYoshinobu Inoue 		tp->rcv_nxt += q->tqe_len;
282fb59c426SYoshinobu Inoue 		flags = q->tqe_th->th_flags & TH_FIN;
283fb59c426SYoshinobu Inoue 		nq = LIST_NEXT(q, tqe_q);
284fb59c426SYoshinobu Inoue 		LIST_REMOVE(q, tqe_q);
2854cc20ab1SSeigo Tanimura 		if (so->so_state & SS_CANTRCVMORE)
286fb59c426SYoshinobu Inoue 			m_freem(q->tqe_m);
2874cc20ab1SSeigo Tanimura 		else
288fb59c426SYoshinobu Inoue 			sbappend(&so->so_rcv, q->tqe_m);
289fb59c426SYoshinobu Inoue 		FREE(q, M_TSEGQ);
2906effc713SDoug Rabson 		q = nq;
291fb59c426SYoshinobu Inoue 	} while (q && q->tqe_th->th_seq == tp->rcv_nxt);
292fb59c426SYoshinobu Inoue 	ND6_HINT(tp);
293df8bae1dSRodney W. Grimes 	sorwakeup(so);
294df8bae1dSRodney W. Grimes 	return (flags);
295df8bae1dSRodney W. Grimes }
296df8bae1dSRodney W. Grimes 
297df8bae1dSRodney W. Grimes /*
298df8bae1dSRodney W. Grimes  * TCP input routine, follows pages 65-76 of the
299df8bae1dSRodney W. Grimes  * protocol specification dated September, 1981 very closely.
300df8bae1dSRodney W. Grimes  */
301fb59c426SYoshinobu Inoue #ifdef INET6
302fb59c426SYoshinobu Inoue int
303fb59c426SYoshinobu Inoue tcp6_input(mp, offp, proto)
304fb59c426SYoshinobu Inoue 	struct mbuf **mp;
305fb59c426SYoshinobu Inoue 	int *offp, proto;
306fb59c426SYoshinobu Inoue {
307fb59c426SYoshinobu Inoue 	register struct mbuf *m = *mp;
30833841545SHajimu UMEMOTO 	struct in6_ifaddr *ia6;
309fb59c426SYoshinobu Inoue 
310fb59c426SYoshinobu Inoue 	IP6_EXTHDR_CHECK(m, *offp, sizeof(struct tcphdr), IPPROTO_DONE);
311fb59c426SYoshinobu Inoue 
312fb59c426SYoshinobu Inoue 	/*
313fb59c426SYoshinobu Inoue 	 * draft-itojun-ipv6-tcp-to-anycast
314fb59c426SYoshinobu Inoue 	 * better place to put this in?
315fb59c426SYoshinobu Inoue 	 */
31633841545SHajimu UMEMOTO 	ia6 = ip6_getdstifaddr(m);
31733841545SHajimu UMEMOTO 	if (ia6 && (ia6->ia6_flags & IN6_IFF_ANYCAST)) {
318fb59c426SYoshinobu Inoue 		struct ip6_hdr *ip6;
319fb59c426SYoshinobu Inoue 
320fb59c426SYoshinobu Inoue 		ip6 = mtod(m, struct ip6_hdr *);
321fb59c426SYoshinobu Inoue 		icmp6_error(m, ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_ADDR,
322fb59c426SYoshinobu Inoue 			    (caddr_t)&ip6->ip6_dst - (caddr_t)ip6);
323fb59c426SYoshinobu Inoue 		return IPPROTO_DONE;
324fb59c426SYoshinobu Inoue 	}
325fb59c426SYoshinobu Inoue 
326f0ffb944SJulian Elischer 	tcp_input(m, *offp);
327fb59c426SYoshinobu Inoue 	return IPPROTO_DONE;
328fb59c426SYoshinobu Inoue }
329fb59c426SYoshinobu Inoue #endif
330fb59c426SYoshinobu Inoue 
331df8bae1dSRodney W. Grimes void
332f0ffb944SJulian Elischer tcp_input(m, off0)
333df8bae1dSRodney W. Grimes 	register struct mbuf *m;
334f0ffb944SJulian Elischer 	int off0;
335df8bae1dSRodney W. Grimes {
336fb59c426SYoshinobu Inoue 	register struct tcphdr *th;
337fb59c426SYoshinobu Inoue 	register struct ip *ip = NULL;
338fb59c426SYoshinobu Inoue 	register struct ipovly *ipov;
339f76fcf6dSJeffrey Hsu 	register struct inpcb *inp = NULL;
340e79adb8eSGarrett Wollman 	u_char *optp = NULL;
34126f9a767SRodney W. Grimes 	int optlen = 0;
342df8bae1dSRodney W. Grimes 	int len, tlen, off;
343fb59c426SYoshinobu Inoue 	int drop_hdrlen;
344df8bae1dSRodney W. Grimes 	register struct tcpcb *tp = 0;
345fb59c426SYoshinobu Inoue 	register int thflags;
34626f9a767SRodney W. Grimes 	struct socket *so = 0;
347df8bae1dSRodney W. Grimes 	int todrop, acked, ourfinisacked, needoutput = 0;
348a0292f23SGarrett Wollman 	u_long tiwin;
349a0292f23SGarrett Wollman 	struct tcpopt to;		/* options in this segment */
350a0292f23SGarrett Wollman 	struct rmxp_tao *taop;		/* pointer to our TAO cache entry */
351a0292f23SGarrett Wollman 	struct rmxp_tao	tao_noncached;	/* in case there's no cached entry */
352f76fcf6dSJeffrey Hsu 	int headlocked = 0;
353c068736aSJeffrey Hsu 	struct sockaddr_in *next_hop = NULL;
354c068736aSJeffrey Hsu 	int rstreason; /* For badport_bandlim accounting purposes */
355c068736aSJeffrey Hsu 
356c068736aSJeffrey Hsu 	struct ip6_hdr *ip6 = NULL;
357c068736aSJeffrey Hsu #ifdef INET6
358c068736aSJeffrey Hsu 	int isipv6;
359c068736aSJeffrey Hsu #else
360c068736aSJeffrey Hsu 	const int isipv6 = 0;
361c068736aSJeffrey Hsu #endif
362f76fcf6dSJeffrey Hsu 
363610ee2f9SDavid Greenman #ifdef TCPDEBUG
364c068736aSJeffrey Hsu 	/*
365c068736aSJeffrey Hsu 	 * The size of tcp_saveipgen must be the size of the max ip header,
366c068736aSJeffrey Hsu 	 * now IPv6.
367c068736aSJeffrey Hsu 	 */
368410bb1bfSLuigi Rizzo 	u_char tcp_saveipgen[40];
369410bb1bfSLuigi Rizzo 	struct tcphdr tcp_savetcp;
370610ee2f9SDavid Greenman 	short ostate = 0;
371610ee2f9SDavid Greenman #endif
372c068736aSJeffrey Hsu 
373c488362eSRobert Watson #ifdef MAC
374c488362eSRobert Watson 	int error;
375c488362eSRobert Watson #endif
376df8bae1dSRodney W. Grimes 
3772b25acc1SLuigi Rizzo 	/* Grab info from MT_TAG mbufs prepended to the chain. */
3782b25acc1SLuigi Rizzo 	for (;m && m->m_type == MT_TAG; m = m->m_next) {
3795d846453SSam Leffler 		if (m->_m_tag_id == PACKET_TAG_IPFORWARD)
3802b25acc1SLuigi Rizzo 			next_hop = (struct sockaddr_in *)m->m_hdr.mh_data;
3812b25acc1SLuigi Rizzo 	}
382fb59c426SYoshinobu Inoue #ifdef INET6
383fb59c426SYoshinobu Inoue 	isipv6 = (mtod(m, struct ip *)->ip_v == 6) ? 1 : 0;
384fb59c426SYoshinobu Inoue #endif
385a0292f23SGarrett Wollman 	bzero((char *)&to, sizeof(to));
386a0292f23SGarrett Wollman 
387df8bae1dSRodney W. Grimes 	tcpstat.tcps_rcvtotal++;
388fb59c426SYoshinobu Inoue 
389fb59c426SYoshinobu Inoue 	if (isipv6) {
390fb59c426SYoshinobu Inoue 		/* IP6_EXTHDR_CHECK() is already done at tcp6_input() */
391fb59c426SYoshinobu Inoue 		ip6 = mtod(m, struct ip6_hdr *);
392fb59c426SYoshinobu Inoue 		tlen = sizeof(*ip6) + ntohs(ip6->ip6_plen) - off0;
393fb59c426SYoshinobu Inoue 		if (in6_cksum(m, IPPROTO_TCP, off0, tlen)) {
394fb59c426SYoshinobu Inoue 			tcpstat.tcps_rcvbadsum++;
395fb59c426SYoshinobu Inoue 			goto drop;
396fb59c426SYoshinobu Inoue 		}
397fb59c426SYoshinobu Inoue 		th = (struct tcphdr *)((caddr_t)ip6 + off0);
39833841545SHajimu UMEMOTO 
39933841545SHajimu UMEMOTO 		/*
40033841545SHajimu UMEMOTO 		 * Be proactive about unspecified IPv6 address in source.
40133841545SHajimu UMEMOTO 		 * As we use all-zero to indicate unbounded/unconnected pcb,
40233841545SHajimu UMEMOTO 		 * unspecified IPv6 address can be used to confuse us.
40333841545SHajimu UMEMOTO 		 *
40433841545SHajimu UMEMOTO 		 * Note that packets with unspecified IPv6 destination is
40533841545SHajimu UMEMOTO 		 * already dropped in ip6_input.
40633841545SHajimu UMEMOTO 		 */
40733841545SHajimu UMEMOTO 		if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src)) {
40833841545SHajimu UMEMOTO 			/* XXX stat */
40933841545SHajimu UMEMOTO 			goto drop;
41033841545SHajimu UMEMOTO 		}
411c068736aSJeffrey Hsu 	} else {
412df8bae1dSRodney W. Grimes 		/*
413df8bae1dSRodney W. Grimes 		 * Get IP and TCP header together in first mbuf.
414df8bae1dSRodney W. Grimes 		 * Note: IP leaves IP header in first mbuf.
415df8bae1dSRodney W. Grimes 		 */
416fb59c426SYoshinobu Inoue 		if (off0 > sizeof (struct ip)) {
417df8bae1dSRodney W. Grimes 			ip_stripoptions(m, (struct mbuf *)0);
418fb59c426SYoshinobu Inoue 			off0 = sizeof(struct ip);
419fb59c426SYoshinobu Inoue 		}
420df8bae1dSRodney W. Grimes 		if (m->m_len < sizeof (struct tcpiphdr)) {
421df8bae1dSRodney W. Grimes 			if ((m = m_pullup(m, sizeof (struct tcpiphdr))) == 0) {
422df8bae1dSRodney W. Grimes 				tcpstat.tcps_rcvshort++;
423df8bae1dSRodney W. Grimes 				return;
424df8bae1dSRodney W. Grimes 			}
425df8bae1dSRodney W. Grimes 		}
426fb59c426SYoshinobu Inoue 		ip = mtod(m, struct ip *);
427fb59c426SYoshinobu Inoue 		ipov = (struct ipovly *)ip;
428db4f9cc7SJonathan Lemon 		th = (struct tcphdr *)((caddr_t)ip + off0);
429db4f9cc7SJonathan Lemon 		tlen = ip->ip_len;
430df8bae1dSRodney W. Grimes 
431db4f9cc7SJonathan Lemon 		if (m->m_pkthdr.csum_flags & CSUM_DATA_VALID) {
432db4f9cc7SJonathan Lemon 			if (m->m_pkthdr.csum_flags & CSUM_PSEUDO_HDR)
433db4f9cc7SJonathan Lemon 				th->th_sum = m->m_pkthdr.csum_data;
434db4f9cc7SJonathan Lemon 			else
435db4f9cc7SJonathan Lemon 				th->th_sum = in_pseudo(ip->ip_src.s_addr,
436c068736aSJeffrey Hsu 						ip->ip_dst.s_addr,
437c068736aSJeffrey Hsu 						htonl(m->m_pkthdr.csum_data +
438c068736aSJeffrey Hsu 							ip->ip_len +
439c068736aSJeffrey Hsu 							IPPROTO_TCP));
440db4f9cc7SJonathan Lemon 			th->th_sum ^= 0xffff;
441db4f9cc7SJonathan Lemon 		} else {
442df8bae1dSRodney W. Grimes 			/*
443df8bae1dSRodney W. Grimes 			 * Checksum extended TCP header and data.
444df8bae1dSRodney W. Grimes 			 */
445df8bae1dSRodney W. Grimes 			len = sizeof (struct ip) + tlen;
446fb59c426SYoshinobu Inoue 			bzero(ipov->ih_x1, sizeof(ipov->ih_x1));
447fb59c426SYoshinobu Inoue 			ipov->ih_len = (u_short)tlen;
448fd8e4ebcSMike Barcroft 			ipov->ih_len = htons(ipov->ih_len);
449fb59c426SYoshinobu Inoue 			th->th_sum = in_cksum(m, len);
450db4f9cc7SJonathan Lemon 		}
451fb59c426SYoshinobu Inoue 		if (th->th_sum) {
452df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvbadsum++;
453df8bae1dSRodney W. Grimes 			goto drop;
454df8bae1dSRodney W. Grimes 		}
455fb59c426SYoshinobu Inoue #ifdef INET6
456fb59c426SYoshinobu Inoue 		/* Re-initialization for later version check */
457fb59c426SYoshinobu Inoue 		ip->ip_v = IPVERSION;
458fb59c426SYoshinobu Inoue #endif
459fb59c426SYoshinobu Inoue 	}
460df8bae1dSRodney W. Grimes 
461df8bae1dSRodney W. Grimes 	/*
462df8bae1dSRodney W. Grimes 	 * Check that TCP offset makes sense,
463df8bae1dSRodney W. Grimes 	 * pull out TCP options and adjust length.		XXX
464df8bae1dSRodney W. Grimes 	 */
465fb59c426SYoshinobu Inoue 	off = th->th_off << 2;
466df8bae1dSRodney W. Grimes 	if (off < sizeof (struct tcphdr) || off > tlen) {
467df8bae1dSRodney W. Grimes 		tcpstat.tcps_rcvbadoff++;
468df8bae1dSRodney W. Grimes 		goto drop;
469df8bae1dSRodney W. Grimes 	}
470fb59c426SYoshinobu Inoue 	tlen -= off;	/* tlen is used instead of ti->ti_len */
471df8bae1dSRodney W. Grimes 	if (off > sizeof (struct tcphdr)) {
472fb59c426SYoshinobu Inoue 		if (isipv6) {
473fb59c426SYoshinobu Inoue 			IP6_EXTHDR_CHECK(m, off0, off, );
474fb59c426SYoshinobu Inoue 			ip6 = mtod(m, struct ip6_hdr *);
475fb59c426SYoshinobu Inoue 			th = (struct tcphdr *)((caddr_t)ip6 + off0);
476c068736aSJeffrey Hsu 		} else {
477df8bae1dSRodney W. Grimes 			if (m->m_len < sizeof(struct ip) + off) {
478c068736aSJeffrey Hsu 				if ((m = m_pullup(m, sizeof (struct ip) + off))
479c068736aSJeffrey Hsu 						== 0) {
480df8bae1dSRodney W. Grimes 					tcpstat.tcps_rcvshort++;
481df8bae1dSRodney W. Grimes 					return;
482df8bae1dSRodney W. Grimes 				}
483fb59c426SYoshinobu Inoue 				ip = mtod(m, struct ip *);
484fb59c426SYoshinobu Inoue 				ipov = (struct ipovly *)ip;
485fb59c426SYoshinobu Inoue 				th = (struct tcphdr *)((caddr_t)ip + off0);
486fb59c426SYoshinobu Inoue 			}
487df8bae1dSRodney W. Grimes 		}
488df8bae1dSRodney W. Grimes 		optlen = off - sizeof (struct tcphdr);
489fb59c426SYoshinobu Inoue 		optp = (u_char *)(th + 1);
490df8bae1dSRodney W. Grimes 	}
491fb59c426SYoshinobu Inoue 	thflags = th->th_flags;
492df8bae1dSRodney W. Grimes 
493e46cd3d4SDag-Erling Smørgrav #ifdef TCP_DROP_SYNFIN
494e46cd3d4SDag-Erling Smørgrav 	/*
495e46cd3d4SDag-Erling Smørgrav 	 * If the drop_synfin option is enabled, drop all packets with
496e46cd3d4SDag-Erling Smørgrav 	 * both the SYN and FIN bits set. This prevents e.g. nmap from
497e46cd3d4SDag-Erling Smørgrav 	 * identifying the TCP/IP stack.
498e46cd3d4SDag-Erling Smørgrav 	 *
499a589a70eSGarrett Wollman 	 * This is a violation of the TCP specification.
500e46cd3d4SDag-Erling Smørgrav 	 */
501fb59c426SYoshinobu Inoue 	if (drop_synfin && (thflags & (TH_SYN|TH_FIN)) == (TH_SYN|TH_FIN))
502e46cd3d4SDag-Erling Smørgrav 		goto drop;
503e46cd3d4SDag-Erling Smørgrav #endif
504e46cd3d4SDag-Erling Smørgrav 
505df8bae1dSRodney W. Grimes 	/*
506df8bae1dSRodney W. Grimes 	 * Convert TCP protocol specific fields to host format.
507df8bae1dSRodney W. Grimes 	 */
508fd8e4ebcSMike Barcroft 	th->th_seq = ntohl(th->th_seq);
509fd8e4ebcSMike Barcroft 	th->th_ack = ntohl(th->th_ack);
510fd8e4ebcSMike Barcroft 	th->th_win = ntohs(th->th_win);
511fd8e4ebcSMike Barcroft 	th->th_urp = ntohs(th->th_urp);
512df8bae1dSRodney W. Grimes 
513df8bae1dSRodney W. Grimes 	/*
514fb59c426SYoshinobu Inoue 	 * Delay droping TCP, IP headers, IPv6 ext headers, and TCP options,
515fb59c426SYoshinobu Inoue 	 * until after ip6_savecontrol() is called and before other functions
516fb59c426SYoshinobu Inoue 	 * which don't want those proto headers.
517fb59c426SYoshinobu Inoue 	 * Because ip6_savecontrol() is going to parse the mbuf to
518fb59c426SYoshinobu Inoue 	 * search for data to be passed up to user-land, it wants mbuf
519fb59c426SYoshinobu Inoue 	 * parameters to be unchanged.
52088ff5695SSUZUKI Shinsuke 	 * XXX: the call of ip6_savecontrol() has been obsoleted based on
52188ff5695SSUZUKI Shinsuke 	 * latest version of the advanced API (20020110).
522755c1f07SAndras Olah 	 */
523fb59c426SYoshinobu Inoue 	drop_hdrlen = off0 + off;
524755c1f07SAndras Olah 
525755c1f07SAndras Olah 	/*
526df8bae1dSRodney W. Grimes 	 * Locate pcb for segment.
527df8bae1dSRodney W. Grimes 	 */
528f76fcf6dSJeffrey Hsu 	INP_INFO_WLOCK(&tcbinfo);
529f76fcf6dSJeffrey Hsu 	headlocked = 1;
530df8bae1dSRodney W. Grimes findpcb:
5312b25acc1SLuigi Rizzo 	/* IPFIREWALL_FORWARD section */
532c068736aSJeffrey Hsu 	if (next_hop != NULL && isipv6 == 0) {	/* IPv6 support is not yet */
533f9e354dfSJulian Elischer 		/*
5342b25acc1SLuigi Rizzo 		 * Transparently forwarded. Pretend to be the destination.
535f9e354dfSJulian Elischer 		 * already got one like this?
536f9e354dfSJulian Elischer 		 */
537fb59c426SYoshinobu Inoue 		inp = in_pcblookup_hash(&tcbinfo, ip->ip_src, th->th_sport,
538c068736aSJeffrey Hsu 					ip->ip_dst, th->th_dport,
539c068736aSJeffrey Hsu 					0, m->m_pkthdr.rcvif);
540f9e354dfSJulian Elischer 		if (!inp) {
541c068736aSJeffrey Hsu 			/* It's new.  Try find the ambushing socket. */
542f9e354dfSJulian Elischer 			inp = in_pcblookup_hash(&tcbinfo,
543fb59c426SYoshinobu Inoue 						ip->ip_src, th->th_sport,
5442b25acc1SLuigi Rizzo 						next_hop->sin_addr,
545c068736aSJeffrey Hsu 						next_hop->sin_port ?
546c068736aSJeffrey Hsu 						    ntohs(next_hop->sin_port) :
547c068736aSJeffrey Hsu 						    th->th_dport,
548c068736aSJeffrey Hsu 						1, m->m_pkthdr.rcvif);
549f9e354dfSJulian Elischer 		}
550c068736aSJeffrey Hsu 	} else {
551fb59c426SYoshinobu Inoue 		if (isipv6)
552c068736aSJeffrey Hsu 			inp = in6_pcblookup_hash(&tcbinfo,
553c068736aSJeffrey Hsu 						 &ip6->ip6_src, th->th_sport,
554c068736aSJeffrey Hsu 						 &ip6->ip6_dst, th->th_dport,
555c068736aSJeffrey Hsu 						 1, m->m_pkthdr.rcvif);
556fb59c426SYoshinobu Inoue 		else
557c068736aSJeffrey Hsu 			inp = in_pcblookup_hash(&tcbinfo,
558c068736aSJeffrey Hsu 						ip->ip_src, th->th_sport,
559c068736aSJeffrey Hsu 						ip->ip_dst, th->th_dport,
560c068736aSJeffrey Hsu 						1, m->m_pkthdr.rcvif);
561fb59c426SYoshinobu Inoue       }
562f9e354dfSJulian Elischer 
563fb59c426SYoshinobu Inoue #ifdef IPSEC
564fb59c426SYoshinobu Inoue 	if (isipv6) {
565fb59c426SYoshinobu Inoue 		if (inp != NULL && ipsec6_in_reject_so(m, inp->inp_socket)) {
566fb59c426SYoshinobu Inoue 			ipsec6stat.in_polvio++;
567fb59c426SYoshinobu Inoue 			goto drop;
568fb59c426SYoshinobu Inoue 		}
569c068736aSJeffrey Hsu 	} else {
570fb59c426SYoshinobu Inoue 		if (inp != NULL && ipsec4_in_reject_so(m, inp->inp_socket)) {
571fb59c426SYoshinobu Inoue 			ipsecstat.in_polvio++;
572fb59c426SYoshinobu Inoue 			goto drop;
573fb59c426SYoshinobu Inoue 		}
574c068736aSJeffrey Hsu 	}
575c068736aSJeffrey Hsu #endif
576b9234fafSSam Leffler #ifdef FAST_IPSEC
577b9234fafSSam Leffler 	if (isipv6) {
578b9234fafSSam Leffler 		if (inp != NULL && ipsec6_in_reject(m, inp)) {
579b9234fafSSam Leffler 			goto drop;
580b9234fafSSam Leffler 		}
58130613f56SJeffrey Hsu 	} else if (inp != NULL && ipsec4_in_reject(m, inp)) {
582b9234fafSSam Leffler 		goto drop;
583b9234fafSSam Leffler 	}
584b9234fafSSam Leffler #endif /*FAST_IPSEC*/
585df8bae1dSRodney W. Grimes 
586df8bae1dSRodney W. Grimes 	/*
587df8bae1dSRodney W. Grimes 	 * If the state is CLOSED (i.e., TCB does not exist) then
588df8bae1dSRodney W. Grimes 	 * all data in the incoming segment is discarded.
589df8bae1dSRodney W. Grimes 	 * If the TCB exists but is in CLOSED state, it is embryonic,
590df8bae1dSRodney W. Grimes 	 * but should either do a listen or a connect soon.
591df8bae1dSRodney W. Grimes 	 */
592816a3d83SPoul-Henning Kamp 	if (inp == NULL) {
5932e4e1b4cSGeoff Rehmet 		if (log_in_vain) {
594fb59c426SYoshinobu Inoue #ifdef INET6
595ded7008aSJuli Mallett 			char dbuf[INET6_ADDRSTRLEN+2], sbuf[INET6_ADDRSTRLEN+2];
596c068736aSJeffrey Hsu #else
597fb59c426SYoshinobu Inoue 			char dbuf[4*sizeof "123"], sbuf[4*sizeof "123"];
598c068736aSJeffrey Hsu #endif
59975cfc95fSAndrey A. Chernov 
600fb59c426SYoshinobu Inoue 			if (isipv6) {
601ded7008aSJuli Mallett 				strcpy(dbuf, "[");
602ded7008aSJuli Mallett 				strcpy(sbuf, "[");
603ded7008aSJuli Mallett 				strcat(dbuf, ip6_sprintf(&ip6->ip6_dst));
604ded7008aSJuli Mallett 				strcat(sbuf, ip6_sprintf(&ip6->ip6_src));
605ded7008aSJuli Mallett 				strcat(dbuf, "]");
606ded7008aSJuli Mallett 				strcat(sbuf, "]");
607c068736aSJeffrey Hsu 			} else {
608fb59c426SYoshinobu Inoue 				strcpy(dbuf, inet_ntoa(ip->ip_dst));
609fb59c426SYoshinobu Inoue 				strcpy(sbuf, inet_ntoa(ip->ip_src));
610fb59c426SYoshinobu Inoue 			}
6112e4e1b4cSGeoff Rehmet 			switch (log_in_vain) {
6122e4e1b4cSGeoff Rehmet 			case 1:
613fb59c426SYoshinobu Inoue 				if (thflags & TH_SYN)
614592071e8SBruce Evans 					log(LOG_INFO,
615c068736aSJeffrey Hsu 					    "Connection attempt to TCP %s:%d "
616c068736aSJeffrey Hsu 					    "from %s:%d\n",
617c068736aSJeffrey Hsu 					    dbuf, ntohs(th->th_dport), sbuf,
618fb59c426SYoshinobu Inoue 					    ntohs(th->th_sport));
6192e4e1b4cSGeoff Rehmet 				break;
6202e4e1b4cSGeoff Rehmet 			case 2:
6212e4e1b4cSGeoff Rehmet 				log(LOG_INFO,
622c068736aSJeffrey Hsu 				    "Connection attempt to TCP %s:%d "
623c068736aSJeffrey Hsu 				    "from %s:%d flags:0x%x\n",
624fb59c426SYoshinobu Inoue 				    dbuf, ntohs(th->th_dport), sbuf,
625fb59c426SYoshinobu Inoue 				    ntohs(th->th_sport), thflags);
6262e4e1b4cSGeoff Rehmet 				break;
6272e4e1b4cSGeoff Rehmet 			default:
6282e4e1b4cSGeoff Rehmet 				break;
6292e4e1b4cSGeoff Rehmet 			}
63075cfc95fSAndrey A. Chernov 		}
6312e4e1b4cSGeoff Rehmet 		if (blackhole) {
6322e4e1b4cSGeoff Rehmet 			switch (blackhole) {
633828b7f40SGeoff Rehmet 			case 1:
634fb59c426SYoshinobu Inoue 				if (thflags & TH_SYN)
635828b7f40SGeoff Rehmet 					goto drop;
636828b7f40SGeoff Rehmet 				break;
637828b7f40SGeoff Rehmet 			case 2:
638828b7f40SGeoff Rehmet 				goto drop;
639828b7f40SGeoff Rehmet 			default:
640828b7f40SGeoff Rehmet 				goto drop;
6412e4e1b4cSGeoff Rehmet 			}
642828b7f40SGeoff Rehmet 		}
643a57815efSBosko Milekic 		rstreason = BANDLIM_RST_CLOSEDPORT;
644a57815efSBosko Milekic 		goto dropwithreset;
645816a3d83SPoul-Henning Kamp 	}
646f76fcf6dSJeffrey Hsu 	INP_LOCK(inp);
647df8bae1dSRodney W. Grimes 	tp = intotcpcb(inp);
64809f81a46SBosko Milekic 	if (tp == 0) {
649f76fcf6dSJeffrey Hsu 		INP_UNLOCK(inp);
650a57815efSBosko Milekic 		rstreason = BANDLIM_RST_CLOSEDPORT;
651a57815efSBosko Milekic 		goto dropwithreset;
65209f81a46SBosko Milekic 	}
653df8bae1dSRodney W. Grimes 	if (tp->t_state == TCPS_CLOSED)
654df8bae1dSRodney W. Grimes 		goto drop;
655df8bae1dSRodney W. Grimes 
656df8bae1dSRodney W. Grimes 	/* Unscale the window into a 32-bit value. */
657fb59c426SYoshinobu Inoue 	if ((thflags & TH_SYN) == 0)
658fb59c426SYoshinobu Inoue 		tiwin = th->th_win << tp->snd_scale;
659df8bae1dSRodney W. Grimes 	else
660fb59c426SYoshinobu Inoue 		tiwin = th->th_win;
661fb59c426SYoshinobu Inoue 
662df8bae1dSRodney W. Grimes 	so = inp->inp_socket;
663c488362eSRobert Watson #ifdef MAC
664fb95b5d3SRobert Watson 	error = mac_check_socket_deliver(so, m);
665c488362eSRobert Watson 	if (error)
666c488362eSRobert Watson 		goto drop;
667c488362eSRobert Watson #endif
668df8bae1dSRodney W. Grimes 	if (so->so_options & (SO_DEBUG|SO_ACCEPTCONN)) {
669be2ac88cSJonathan Lemon 		struct in_conninfo inc;
670610ee2f9SDavid Greenman #ifdef TCPDEBUG
671df8bae1dSRodney W. Grimes 		if (so->so_options & SO_DEBUG) {
672df8bae1dSRodney W. Grimes 			ostate = tp->t_state;
673fb59c426SYoshinobu Inoue 			if (isipv6)
674fb59c426SYoshinobu Inoue 				bcopy((char *)ip6, (char *)tcp_saveipgen,
675fb59c426SYoshinobu Inoue 					sizeof(*ip6));
676fb59c426SYoshinobu Inoue 			else
677c068736aSJeffrey Hsu 				bcopy((char *)ip, (char *)tcp_saveipgen,
678c068736aSJeffrey Hsu 					sizeof(*ip));
679fb59c426SYoshinobu Inoue 			tcp_savetcp = *th;
680df8bae1dSRodney W. Grimes 		}
681610ee2f9SDavid Greenman #endif
682be2ac88cSJonathan Lemon 		/* skip if this isn't a listen socket */
6834cc20ab1SSeigo Tanimura 		if ((so->so_options & SO_ACCEPTCONN) == 0)
684be2ac88cSJonathan Lemon 			goto after_listen;
685fb59c426SYoshinobu Inoue #ifdef INET6
686be2ac88cSJonathan Lemon 		inc.inc_isipv6 = isipv6;
687c068736aSJeffrey Hsu #endif
688be2ac88cSJonathan Lemon 		if (isipv6) {
689be2ac88cSJonathan Lemon 			inc.inc6_faddr = ip6->ip6_src;
690be2ac88cSJonathan Lemon 			inc.inc6_laddr = ip6->ip6_dst;
691be2ac88cSJonathan Lemon 			inc.inc6_route.ro_rt = NULL;		/* XXX */
692c068736aSJeffrey Hsu 		} else {
693be2ac88cSJonathan Lemon 			inc.inc_faddr = ip->ip_src;
694be2ac88cSJonathan Lemon 			inc.inc_laddr = ip->ip_dst;
695be2ac88cSJonathan Lemon 			inc.inc_route.ro_rt = NULL;		/* XXX */
696be2ac88cSJonathan Lemon 		}
697be2ac88cSJonathan Lemon 		inc.inc_fport = th->th_sport;
698be2ac88cSJonathan Lemon 		inc.inc_lport = th->th_dport;
699be2ac88cSJonathan Lemon 
700fb59c426SYoshinobu Inoue 	        /*
701be2ac88cSJonathan Lemon 	         * If the state is LISTEN then ignore segment if it contains
702be2ac88cSJonathan Lemon 		 * a RST.  If the segment contains an ACK then it is bad and
703be2ac88cSJonathan Lemon 		 * send a RST.  If it does not contain a SYN then it is not
704be2ac88cSJonathan Lemon 		 * interesting; drop it.
705be2ac88cSJonathan Lemon 		 *
706be2ac88cSJonathan Lemon 		 * If the state is SYN_RECEIVED (syncache) and seg contains
707be2ac88cSJonathan Lemon 		 * an ACK, but not for our SYN/ACK, send a RST.  If the seg
708be2ac88cSJonathan Lemon 		 * contains a RST, check the sequence number to see if it
709be2ac88cSJonathan Lemon 		 * is a valid reset segment.
710fb59c426SYoshinobu Inoue 		 */
711fb59c426SYoshinobu Inoue 		if ((thflags & (TH_RST|TH_ACK|TH_SYN)) != TH_SYN) {
712be2ac88cSJonathan Lemon 			if ((thflags & (TH_RST|TH_ACK|TH_SYN)) == TH_ACK) {
713be2ac88cSJonathan Lemon 				if (!syncache_expand(&inc, th, &so, m)) {
7144195b4afSPaul Traina 					/*
715be2ac88cSJonathan Lemon 					 * No syncache entry, or ACK was not
716be2ac88cSJonathan Lemon 					 * for our SYN/ACK.  Send a RST.
7174195b4afSPaul Traina 					 */
718be2ac88cSJonathan Lemon 					tcpstat.tcps_badsyn++;
719be2ac88cSJonathan Lemon 					rstreason = BANDLIM_RST_OPENPORT;
720be2ac88cSJonathan Lemon 					goto dropwithreset;
721be2ac88cSJonathan Lemon 				}
722f76fcf6dSJeffrey Hsu 				if (so == NULL) {
723be2ac88cSJonathan Lemon 					/*
724be2ac88cSJonathan Lemon 					 * Could not complete 3-way handshake,
725be2ac88cSJonathan Lemon 					 * connection is being closed down, and
726be2ac88cSJonathan Lemon 					 * syncache will free mbuf.
727be2ac88cSJonathan Lemon 					 */
728f76fcf6dSJeffrey Hsu 					INP_UNLOCK(inp);
729f76fcf6dSJeffrey Hsu 					INP_INFO_WUNLOCK(&tcbinfo);
730be2ac88cSJonathan Lemon 					return;
731f76fcf6dSJeffrey Hsu 				}
732be2ac88cSJonathan Lemon 				/*
733be2ac88cSJonathan Lemon 				 * Socket is created in state SYN_RECEIVED.
734be2ac88cSJonathan Lemon 				 * Continue processing segment.
735be2ac88cSJonathan Lemon 				 */
736f76fcf6dSJeffrey Hsu 				INP_UNLOCK(inp);
737be2ac88cSJonathan Lemon 				inp = sotoinpcb(so);
738f76fcf6dSJeffrey Hsu 				INP_LOCK(inp);
739be2ac88cSJonathan Lemon 				tp = intotcpcb(inp);
740be2ac88cSJonathan Lemon 				/*
741be2ac88cSJonathan Lemon 				 * This is what would have happened in
742e6658b12SRobert Watson 				 * tcp_output() when the SYN,ACK was sent.
743be2ac88cSJonathan Lemon 				 */
744be2ac88cSJonathan Lemon 				tp->snd_up = tp->snd_una;
745be2ac88cSJonathan Lemon 				tp->snd_max = tp->snd_nxt = tp->iss + 1;
746be2ac88cSJonathan Lemon 				tp->last_ack_sent = tp->rcv_nxt;
747be2ac88cSJonathan Lemon /*
748be2ac88cSJonathan Lemon  * XXX possible bug - it doesn't appear that tp->snd_wnd is unscaled
749be2ac88cSJonathan Lemon  * until the _second_ ACK is received:
750be2ac88cSJonathan Lemon  *    rcv SYN (set wscale opts)	 --> send SYN/ACK, set snd_wnd = window.
751be2ac88cSJonathan Lemon  *    rcv ACK, calculate tiwin --> process SYN_RECEIVED, determine wscale,
752be2ac88cSJonathan Lemon  *        move to ESTAB, set snd_wnd to tiwin.
753be2ac88cSJonathan Lemon  */
754be2ac88cSJonathan Lemon 				tp->snd_wnd = tiwin;	/* unscaled */
755be2ac88cSJonathan Lemon 				goto after_listen;
756be2ac88cSJonathan Lemon 			}
757be2ac88cSJonathan Lemon 			if (thflags & TH_RST) {
758be2ac88cSJonathan Lemon 				syncache_chkrst(&inc, th);
759be2ac88cSJonathan Lemon 				goto drop;
760be2ac88cSJonathan Lemon 			}
761fb59c426SYoshinobu Inoue 			if (thflags & TH_ACK) {
762be2ac88cSJonathan Lemon 				syncache_badack(&inc);
763ebb0cbeaSPaul Traina 				tcpstat.tcps_badsyn++;
764a57815efSBosko Milekic 				rstreason = BANDLIM_RST_OPENPORT;
765a57815efSBosko Milekic 				goto dropwithreset;
7664195b4afSPaul Traina 			}
767ebb0cbeaSPaul Traina 			goto drop;
768ebb0cbeaSPaul Traina 		}
76933841545SHajimu UMEMOTO 
770be2ac88cSJonathan Lemon 		/*
771be2ac88cSJonathan Lemon 		 * Segment's flags are (SYN) or (SYN|FIN).
772be2ac88cSJonathan Lemon 		 */
77333841545SHajimu UMEMOTO #ifdef INET6
77433841545SHajimu UMEMOTO 		/*
77533841545SHajimu UMEMOTO 		 * If deprecated address is forbidden,
77633841545SHajimu UMEMOTO 		 * we do not accept SYN to deprecated interface
77733841545SHajimu UMEMOTO 		 * address to prevent any new inbound connection from
77833841545SHajimu UMEMOTO 		 * getting established.
77933841545SHajimu UMEMOTO 		 * When we do not accept SYN, we send a TCP RST,
78033841545SHajimu UMEMOTO 		 * with deprecated source address (instead of dropping
78133841545SHajimu UMEMOTO 		 * it).  We compromise it as it is much better for peer
78233841545SHajimu UMEMOTO 		 * to send a RST, and RST will be the final packet
78333841545SHajimu UMEMOTO 		 * for the exchange.
78433841545SHajimu UMEMOTO 		 *
78533841545SHajimu UMEMOTO 		 * If we do not forbid deprecated addresses, we accept
78633841545SHajimu UMEMOTO 		 * the SYN packet.  RFC2462 does not suggest dropping
78733841545SHajimu UMEMOTO 		 * SYN in this case.
78833841545SHajimu UMEMOTO 		 * If we decipher RFC2462 5.5.4, it says like this:
78933841545SHajimu UMEMOTO 		 * 1. use of deprecated addr with existing
79033841545SHajimu UMEMOTO 		 *    communication is okay - "SHOULD continue to be
79133841545SHajimu UMEMOTO 		 *    used"
79233841545SHajimu UMEMOTO 		 * 2. use of it with new communication:
79333841545SHajimu UMEMOTO 		 *   (2a) "SHOULD NOT be used if alternate address
79433841545SHajimu UMEMOTO 		 *        with sufficient scope is available"
79533841545SHajimu UMEMOTO 		 *   (2b) nothing mentioned otherwise.
79633841545SHajimu UMEMOTO 		 * Here we fall into (2b) case as we have no choice in
79733841545SHajimu UMEMOTO 		 * our source address selection - we must obey the peer.
79833841545SHajimu UMEMOTO 		 *
79933841545SHajimu UMEMOTO 		 * The wording in RFC2462 is confusing, and there are
80033841545SHajimu UMEMOTO 		 * multiple description text for deprecated address
80133841545SHajimu UMEMOTO 		 * handling - worse, they are not exactly the same.
80233841545SHajimu UMEMOTO 		 * I believe 5.5.4 is the best one, so we follow 5.5.4.
80333841545SHajimu UMEMOTO 		 */
80433841545SHajimu UMEMOTO 		if (isipv6 && !ip6_use_deprecated) {
80533841545SHajimu UMEMOTO 			struct in6_ifaddr *ia6;
80633841545SHajimu UMEMOTO 
80733841545SHajimu UMEMOTO 			if ((ia6 = ip6_getdstifaddr(m)) &&
80833841545SHajimu UMEMOTO 			    (ia6->ia6_flags & IN6_IFF_DEPRECATED)) {
809f76fcf6dSJeffrey Hsu 				INP_UNLOCK(inp);
81033841545SHajimu UMEMOTO 				tp = NULL;
81133841545SHajimu UMEMOTO 				rstreason = BANDLIM_RST_OPENPORT;
81233841545SHajimu UMEMOTO 				goto dropwithreset;
81333841545SHajimu UMEMOTO 			}
81433841545SHajimu UMEMOTO 		}
81533841545SHajimu UMEMOTO #endif
81665f28919SJesper Skriver 		/*
817be2ac88cSJonathan Lemon 		 * If it is from this socket, drop it, it must be forged.
818be2ac88cSJonathan Lemon 		 * Don't bother responding if the destination was a broadcast.
81965f28919SJesper Skriver 		 */
820be2ac88cSJonathan Lemon 		if (th->th_dport == th->th_sport) {
821fb59c426SYoshinobu Inoue 			if (isipv6) {
822be2ac88cSJonathan Lemon 				if (IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst,
823be2ac88cSJonathan Lemon 						       &ip6->ip6_src))
824be2ac88cSJonathan Lemon 					goto drop;
825c068736aSJeffrey Hsu 			} else {
826be2ac88cSJonathan Lemon 				if (ip->ip_dst.s_addr == ip->ip_src.s_addr)
827be2ac88cSJonathan Lemon 					goto drop;
828be2ac88cSJonathan Lemon 			}
829c068736aSJeffrey Hsu 		}
830be2ac88cSJonathan Lemon 		/*
831be2ac88cSJonathan Lemon 		 * RFC1122 4.2.3.10, p. 104: discard bcast/mcast SYN
8322ca2159fSCrist J. Clark 		 *
83393ec91baSCrist J. Clark 		 * Note that it is quite possible to receive unicast
83493ec91baSCrist J. Clark 		 * link-layer packets with a broadcast IP address. Use
83593ec91baSCrist J. Clark 		 * in_broadcast() to find them.
836be2ac88cSJonathan Lemon 		 */
837be2ac88cSJonathan Lemon 		if (m->m_flags & (M_BCAST|M_MCAST))
838be2ac88cSJonathan Lemon 			goto drop;
839be2ac88cSJonathan Lemon 		if (isipv6) {
840be2ac88cSJonathan Lemon 			if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) ||
841be2ac88cSJonathan Lemon 			    IN6_IS_ADDR_MULTICAST(&ip6->ip6_src))
842be2ac88cSJonathan Lemon 				goto drop;
843c068736aSJeffrey Hsu 		} else {
844be2ac88cSJonathan Lemon 			if (IN_MULTICAST(ntohl(ip->ip_dst.s_addr)) ||
845be2ac88cSJonathan Lemon 			    IN_MULTICAST(ntohl(ip->ip_src.s_addr)) ||
8462ca2159fSCrist J. Clark 			    ip->ip_src.s_addr == htonl(INADDR_BROADCAST) ||
8472ca2159fSCrist J. Clark 			    in_broadcast(ip->ip_dst, m->m_pkthdr.rcvif))
848be2ac88cSJonathan Lemon 				goto drop;
849c068736aSJeffrey Hsu 		}
850be2ac88cSJonathan Lemon 		/*
851be2ac88cSJonathan Lemon 		 * SYN appears to be valid; create compressed TCP state
852be2ac88cSJonathan Lemon 		 * for syncache, or perform t/tcp connection.
853be2ac88cSJonathan Lemon 		 */
854be2ac88cSJonathan Lemon 		if (so->so_qlen <= so->so_qlimit) {
855be2ac88cSJonathan Lemon 			tcp_dooptions(&to, optp, optlen, 1);
856be2ac88cSJonathan Lemon 			if (!syncache_add(&inc, &to, th, &so, m))
857be2ac88cSJonathan Lemon 				goto drop;
858f76fcf6dSJeffrey Hsu 			if (so == NULL) {
859be2ac88cSJonathan Lemon 				/*
860be2ac88cSJonathan Lemon 				 * Entry added to syncache, mbuf used to
861be2ac88cSJonathan Lemon 				 * send SYN,ACK packet.
862be2ac88cSJonathan Lemon 				 */
863f76fcf6dSJeffrey Hsu 				KASSERT(headlocked, ("headlocked"));
864f76fcf6dSJeffrey Hsu 				INP_UNLOCK(inp);
865f76fcf6dSJeffrey Hsu 				INP_INFO_WUNLOCK(&tcbinfo);
866be2ac88cSJonathan Lemon 				return;
867f76fcf6dSJeffrey Hsu 			}
868be2ac88cSJonathan Lemon 			/*
869be2ac88cSJonathan Lemon 			 * Segment passed TAO tests.
870be2ac88cSJonathan Lemon 			 */
871f76fcf6dSJeffrey Hsu 			INP_UNLOCK(inp);
872be2ac88cSJonathan Lemon 			inp = sotoinpcb(so);
873f76fcf6dSJeffrey Hsu 			INP_LOCK(inp);
874df8bae1dSRodney W. Grimes 			tp = intotcpcb(inp);
875be2ac88cSJonathan Lemon 			tp->snd_wnd = tiwin;
876be2ac88cSJonathan Lemon 			tp->t_starttime = ticks;
877be2ac88cSJonathan Lemon 			tp->t_state = TCPS_ESTABLISHED;
878df8bae1dSRodney W. Grimes 
879be2ac88cSJonathan Lemon 			/*
880be2ac88cSJonathan Lemon 			 * If there is a FIN, or if there is data and the
881be2ac88cSJonathan Lemon 			 * connection is local, then delay SYN,ACK(SYN) in
882be2ac88cSJonathan Lemon 			 * the hope of piggy-backing it on a response
883be2ac88cSJonathan Lemon 			 * segment.  Otherwise must send ACK now in case
884be2ac88cSJonathan Lemon 			 * the other side is slow starting.
885be2ac88cSJonathan Lemon 			 */
886c068736aSJeffrey Hsu 			if (DELAY_ACK(tp) &&
887c068736aSJeffrey Hsu 			    ((thflags & TH_FIN) ||
888be2ac88cSJonathan Lemon 			     (tlen != 0 &&
889c068736aSJeffrey Hsu 			      ((isipv6 && in6_localaddr(&inp->in6p_faddr)) ||
890c068736aSJeffrey Hsu 			       (!isipv6 && in_localaddr(inp->inp_faddr)))))) {
891be2ac88cSJonathan Lemon 				callout_reset(tp->tt_delack, tcp_delacktime,
892be2ac88cSJonathan Lemon 						tcp_timer_delack, tp);
893be2ac88cSJonathan Lemon 				tp->t_flags |= TF_NEEDSYN;
894be2ac88cSJonathan Lemon 			} else
895be2ac88cSJonathan Lemon 				tp->t_flags |= (TF_ACKNOW | TF_NEEDSYN);
896be2ac88cSJonathan Lemon 
897be2ac88cSJonathan Lemon 			tcpstat.tcps_connects++;
898be2ac88cSJonathan Lemon 			soisconnected(so);
899be2ac88cSJonathan Lemon 			goto trimthenstep6;
900df8bae1dSRodney W. Grimes 		}
901be2ac88cSJonathan Lemon 		goto drop;
9024cc20ab1SSeigo Tanimura 	}
903be2ac88cSJonathan Lemon after_listen:
904be2ac88cSJonathan Lemon 
905be2ac88cSJonathan Lemon /* XXX temp debugging */
906be2ac88cSJonathan Lemon 	/* should not happen - syncache should pick up these connections */
907be2ac88cSJonathan Lemon 	if (tp->t_state == TCPS_LISTEN)
908be2ac88cSJonathan Lemon 		panic("tcp_input: TCPS_LISTEN");
909df8bae1dSRodney W. Grimes 
910df8bae1dSRodney W. Grimes 	/*
911df8bae1dSRodney W. Grimes 	 * Segment received on connection.
912df8bae1dSRodney W. Grimes 	 * Reset idle time and keep-alive timer.
913df8bae1dSRodney W. Grimes 	 */
9149b8b58e0SJonathan Lemon 	tp->t_rcvtime = ticks;
9157ff19458SPaul Traina 	if (TCPS_HAVEESTABLISHED(tp->t_state))
9169b8b58e0SJonathan Lemon 		callout_reset(tp->tt_keep, tcp_keepidle, tcp_timer_keep, tp);
917df8bae1dSRodney W. Grimes 
918df8bae1dSRodney W. Grimes 	/*
919be2ac88cSJonathan Lemon 	 * Process options.
920be2ac88cSJonathan Lemon 	 * XXX this is tradtitional behavior, may need to be cleaned up.
921df8bae1dSRodney W. Grimes 	 */
922be2ac88cSJonathan Lemon 	tcp_dooptions(&to, optp, optlen, thflags & TH_SYN);
923be2ac88cSJonathan Lemon 	if (thflags & TH_SYN) {
924be2ac88cSJonathan Lemon 		if (to.to_flags & TOF_SCALE) {
925be2ac88cSJonathan Lemon 			tp->t_flags |= TF_RCVD_SCALE;
926be2ac88cSJonathan Lemon 			tp->requested_s_scale = to.to_requested_s_scale;
927be2ac88cSJonathan Lemon 		}
928be2ac88cSJonathan Lemon 		if (to.to_flags & TOF_TS) {
929be2ac88cSJonathan Lemon 			tp->t_flags |= TF_RCVD_TSTMP;
930be2ac88cSJonathan Lemon 			tp->ts_recent = to.to_tsval;
931be2ac88cSJonathan Lemon 			tp->ts_recent_age = ticks;
932be2ac88cSJonathan Lemon 		}
933be2ac88cSJonathan Lemon 		if (to.to_flags & (TOF_CC|TOF_CCNEW))
934be2ac88cSJonathan Lemon 			tp->t_flags |= TF_RCVD_CC;
935be2ac88cSJonathan Lemon 		if (to.to_flags & TOF_MSS)
936be2ac88cSJonathan Lemon 			tcp_mss(tp, to.to_mss);
937be2ac88cSJonathan Lemon 	}
938df8bae1dSRodney W. Grimes 
939df8bae1dSRodney W. Grimes 	/*
940df8bae1dSRodney W. Grimes 	 * Header prediction: check for the two common cases
941df8bae1dSRodney W. Grimes 	 * of a uni-directional data xfer.  If the packet has
942df8bae1dSRodney W. Grimes 	 * no control flags, is in-sequence, the window didn't
943df8bae1dSRodney W. Grimes 	 * change and we're not retransmitting, it's a
944df8bae1dSRodney W. Grimes 	 * candidate.  If the length is zero and the ack moved
945df8bae1dSRodney W. Grimes 	 * forward, we're the sender side of the xfer.  Just
946df8bae1dSRodney W. Grimes 	 * free the data acked & wake any higher level process
947df8bae1dSRodney W. Grimes 	 * that was blocked waiting for space.  If the length
948df8bae1dSRodney W. Grimes 	 * is non-zero and the ack didn't move, we're the
949df8bae1dSRodney W. Grimes 	 * receiver side.  If we're getting packets in-order
950df8bae1dSRodney W. Grimes 	 * (the reassembly queue is empty), add the data to
951df8bae1dSRodney W. Grimes 	 * the socket buffer and note that we need a delayed ack.
952a0292f23SGarrett Wollman 	 * Make sure that the hidden state-flags are also off.
953a0292f23SGarrett Wollman 	 * Since we check for TCPS_ESTABLISHED above, it can only
954a0292f23SGarrett Wollman 	 * be TH_NEEDSYN.
955df8bae1dSRodney W. Grimes 	 */
956df8bae1dSRodney W. Grimes 	if (tp->t_state == TCPS_ESTABLISHED &&
957fb59c426SYoshinobu Inoue 	    (thflags & (TH_SYN|TH_FIN|TH_RST|TH_URG|TH_ACK)) == TH_ACK &&
958a0292f23SGarrett Wollman 	    ((tp->t_flags & (TF_NEEDSYN|TF_NEEDFIN)) == 0) &&
959be2ac88cSJonathan Lemon 	    ((to.to_flags & TOF_TS) == 0 ||
960a0292f23SGarrett Wollman 	     TSTMP_GEQ(to.to_tsval, tp->ts_recent)) &&
961a0292f23SGarrett Wollman 	    /*
962a0292f23SGarrett Wollman 	     * Using the CC option is compulsory if once started:
963a0292f23SGarrett Wollman 	     *   the segment is OK if no T/TCP was negotiated or
964a0292f23SGarrett Wollman 	     *   if the segment has a CC option equal to CCrecv
965a0292f23SGarrett Wollman 	     */
966a0292f23SGarrett Wollman 	    ((tp->t_flags & (TF_REQ_CC|TF_RCVD_CC)) != (TF_REQ_CC|TF_RCVD_CC) ||
967be2ac88cSJonathan Lemon 	     ((to.to_flags & TOF_CC) != 0 && to.to_cc == tp->cc_recv)) &&
968fb59c426SYoshinobu Inoue 	    th->th_seq == tp->rcv_nxt &&
969df8bae1dSRodney W. Grimes 	    tiwin && tiwin == tp->snd_wnd &&
970df8bae1dSRodney W. Grimes 	    tp->snd_nxt == tp->snd_max) {
971df8bae1dSRodney W. Grimes 
972df8bae1dSRodney W. Grimes 		/*
973df8bae1dSRodney W. Grimes 		 * If last ACK falls within this segment's sequence numbers,
974df8bae1dSRodney W. Grimes 		 * record the timestamp.
975a0292f23SGarrett Wollman 		 * NOTE that the test is modified according to the latest
976a0292f23SGarrett Wollman 		 * proposal of the tcplw@cray.com list (Braden 1993/04/26).
977df8bae1dSRodney W. Grimes 		 */
978be2ac88cSJonathan Lemon 		if ((to.to_flags & TOF_TS) != 0 &&
979fb59c426SYoshinobu Inoue 		    SEQ_LEQ(th->th_seq, tp->last_ack_sent)) {
9809b8b58e0SJonathan Lemon 			tp->ts_recent_age = ticks;
981a0292f23SGarrett Wollman 			tp->ts_recent = to.to_tsval;
982df8bae1dSRodney W. Grimes 		}
983df8bae1dSRodney W. Grimes 
984fb59c426SYoshinobu Inoue 		if (tlen == 0) {
985fb59c426SYoshinobu Inoue 			if (SEQ_GT(th->th_ack, tp->snd_una) &&
986fb59c426SYoshinobu Inoue 			    SEQ_LEQ(th->th_ack, tp->snd_max) &&
987233e8c18SGarrett Wollman 			    tp->snd_cwnd >= tp->snd_wnd &&
988233e8c18SGarrett Wollman 			    tp->t_dupacks < tcprexmtthresh) {
989f76fcf6dSJeffrey Hsu 				KASSERT(headlocked, ("headlocked"));
990f76fcf6dSJeffrey Hsu 				INP_INFO_WUNLOCK(&tcbinfo);
991f76fcf6dSJeffrey Hsu 				headlocked = 0;
992df8bae1dSRodney W. Grimes 				/*
993df8bae1dSRodney W. Grimes 				 * this is a pure ack for outstanding data.
994df8bae1dSRodney W. Grimes 				 */
995df8bae1dSRodney W. Grimes 				++tcpstat.tcps_predack;
9969b8b58e0SJonathan Lemon 				/*
9979b8b58e0SJonathan Lemon 				 * "bad retransmit" recovery
9989b8b58e0SJonathan Lemon 				 */
9999b8b58e0SJonathan Lemon 				if (tp->t_rxtshift == 1 &&
10009b8b58e0SJonathan Lemon 				    ticks < tp->t_badrxtwin) {
10019b8b58e0SJonathan Lemon 					tp->snd_cwnd = tp->snd_cwnd_prev;
10029b8b58e0SJonathan Lemon 					tp->snd_ssthresh =
10039b8b58e0SJonathan Lemon 					    tp->snd_ssthresh_prev;
10049b8b58e0SJonathan Lemon 					tp->snd_nxt = tp->snd_max;
10059b8b58e0SJonathan Lemon 					tp->t_badrxtwin = 0;
10069b8b58e0SJonathan Lemon 				}
1007fa55172bSMatthew Dillon 
1008fa55172bSMatthew Dillon 				/*
1009fa55172bSMatthew Dillon 				 * Recalculate the transmit timer / rtt.
1010fa55172bSMatthew Dillon 				 *
1011fa55172bSMatthew Dillon 				 * Some boxes send broken timestamp replies
1012fa55172bSMatthew Dillon 				 * during the SYN+ACK phase, ignore
1013fa55172bSMatthew Dillon 				 * timestamps of 0 or we could calculate a
1014fa55172bSMatthew Dillon 				 * huge RTT and blow up the retransmit timer.
1015fa55172bSMatthew Dillon 				 */
1016fa55172bSMatthew Dillon 				if ((to.to_flags & TOF_TS) != 0 &&
1017fa55172bSMatthew Dillon 				    to.to_tsecr) {
1018a0292f23SGarrett Wollman 					tcp_xmit_timer(tp,
10199b8b58e0SJonathan Lemon 					    ticks - to.to_tsecr + 1);
1020fa55172bSMatthew Dillon 				} else if (tp->t_rtttime &&
1021fa55172bSMatthew Dillon 					    SEQ_GT(th->th_ack, tp->t_rtseq)) {
1022c068736aSJeffrey Hsu 					tcp_xmit_timer(tp,
1023c068736aSJeffrey Hsu 							ticks - tp->t_rtttime);
1024fa55172bSMatthew Dillon 				}
10251fcc99b5SMatthew Dillon 				tcp_xmit_bandwidth_limit(tp, th->th_ack);
1026fb59c426SYoshinobu Inoue 				acked = th->th_ack - tp->snd_una;
1027df8bae1dSRodney W. Grimes 				tcpstat.tcps_rcvackpack++;
1028df8bae1dSRodney W. Grimes 				tcpstat.tcps_rcvackbyte += acked;
1029df8bae1dSRodney W. Grimes 				sbdrop(&so->so_snd, acked);
1030fb59c426SYoshinobu Inoue 				tp->snd_una = th->th_ack;
1031b5addd85SJeffrey Hsu 				tp->t_dupacks = 0;
1032df8bae1dSRodney W. Grimes 				m_freem(m);
1033fb59c426SYoshinobu Inoue 				ND6_HINT(tp); /* some progress has been done */
1034df8bae1dSRodney W. Grimes 
1035df8bae1dSRodney W. Grimes 				/*
1036df8bae1dSRodney W. Grimes 				 * If all outstanding data are acked, stop
1037df8bae1dSRodney W. Grimes 				 * retransmit timer, otherwise restart timer
1038df8bae1dSRodney W. Grimes 				 * using current (possibly backed-off) value.
1039df8bae1dSRodney W. Grimes 				 * If process is waiting for space,
1040df8bae1dSRodney W. Grimes 				 * wakeup/selwakeup/signal.  If data
1041df8bae1dSRodney W. Grimes 				 * are ready to send, let tcp_output
1042df8bae1dSRodney W. Grimes 				 * decide between more output or persist.
1043df8bae1dSRodney W. Grimes 				 */
1044df8bae1dSRodney W. Grimes 				if (tp->snd_una == tp->snd_max)
10459b8b58e0SJonathan Lemon 					callout_stop(tp->tt_rexmt);
10469b8b58e0SJonathan Lemon 				else if (!callout_active(tp->tt_persist))
10479b8b58e0SJonathan Lemon 					callout_reset(tp->tt_rexmt,
10489b8b58e0SJonathan Lemon 						      tp->t_rxtcur,
10499b8b58e0SJonathan Lemon 						      tcp_timer_rexmt, tp);
1050df8bae1dSRodney W. Grimes 
1051df8bae1dSRodney W. Grimes 				sowwakeup(so);
1052df8bae1dSRodney W. Grimes 				if (so->so_snd.sb_cc)
1053df8bae1dSRodney W. Grimes 					(void) tcp_output(tp);
1054f76fcf6dSJeffrey Hsu 				INP_UNLOCK(inp);
1055df8bae1dSRodney W. Grimes 				return;
1056df8bae1dSRodney W. Grimes 			}
1057fb59c426SYoshinobu Inoue 		} else if (th->th_ack == tp->snd_una &&
1058fb59c426SYoshinobu Inoue 		    LIST_EMPTY(&tp->t_segq) &&
1059fb59c426SYoshinobu Inoue 		    tlen <= sbspace(&so->so_rcv)) {
1060f76fcf6dSJeffrey Hsu 			KASSERT(headlocked, ("headlocked"));
1061f76fcf6dSJeffrey Hsu 			INP_INFO_WUNLOCK(&tcbinfo);
1062f76fcf6dSJeffrey Hsu 			headlocked = 0;
1063df8bae1dSRodney W. Grimes 			/*
1064df8bae1dSRodney W. Grimes 			 * this is a pure, in-sequence data packet
1065df8bae1dSRodney W. Grimes 			 * with nothing on the reassembly queue and
1066df8bae1dSRodney W. Grimes 			 * we have enough buffer space to take it.
1067df8bae1dSRodney W. Grimes 			 */
1068df8bae1dSRodney W. Grimes 			++tcpstat.tcps_preddat;
1069fb59c426SYoshinobu Inoue 			tp->rcv_nxt += tlen;
1070df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvpack++;
1071fb59c426SYoshinobu Inoue 			tcpstat.tcps_rcvbyte += tlen;
1072fb59c426SYoshinobu Inoue 			ND6_HINT(tp);	/* some progress has been done */
1073df8bae1dSRodney W. Grimes 			/*
1074755c1f07SAndras Olah 			 * Add data to socket buffer.
1075df8bae1dSRodney W. Grimes 			 */
1076c1c36a2cSMike Silbersack 			if (so->so_state & SS_CANTRCVMORE) {
1077c1c36a2cSMike Silbersack 				m_freem(m);
1078c1c36a2cSMike Silbersack 			} else {
1079fb59c426SYoshinobu Inoue 				m_adj(m, drop_hdrlen);	/* delayed header drop */
1080df8bae1dSRodney W. Grimes 				sbappend(&so->so_rcv, m);
1081c1c36a2cSMike Silbersack 			}
1082df8bae1dSRodney W. Grimes 			sorwakeup(so);
1083d8c85a26SJonathan Lemon 			if (DELAY_ACK(tp)) {
10849b8b58e0SJonathan Lemon 	                        callout_reset(tp->tt_delack, tcp_delacktime,
10859b8b58e0SJonathan Lemon 	                            tcp_timer_delack, tp);
1086f498eeeeSDavid Greenman 			} else {
1087e612a582SDavid Greenman 				tp->t_flags |= TF_ACKNOW;
1088e612a582SDavid Greenman 				tcp_output(tp);
1089e612a582SDavid Greenman 			}
1090f76fcf6dSJeffrey Hsu 			INP_UNLOCK(inp);
1091df8bae1dSRodney W. Grimes 			return;
1092df8bae1dSRodney W. Grimes 		}
1093df8bae1dSRodney W. Grimes 	}
1094df8bae1dSRodney W. Grimes 
1095df8bae1dSRodney W. Grimes 	/*
1096df8bae1dSRodney W. Grimes 	 * Calculate amount of space in receive window,
1097df8bae1dSRodney W. Grimes 	 * and then do TCP input processing.
1098df8bae1dSRodney W. Grimes 	 * Receive window is amount of space in rcv queue,
1099df8bae1dSRodney W. Grimes 	 * but not less than advertised window.
1100df8bae1dSRodney W. Grimes 	 */
1101df8bae1dSRodney W. Grimes 	{ int win;
1102df8bae1dSRodney W. Grimes 
1103df8bae1dSRodney W. Grimes 	win = sbspace(&so->so_rcv);
1104df8bae1dSRodney W. Grimes 	if (win < 0)
1105df8bae1dSRodney W. Grimes 		win = 0;
110666e39adcSJohn Polstra 	tp->rcv_wnd = imax(win, (int)(tp->rcv_adv - tp->rcv_nxt));
1107df8bae1dSRodney W. Grimes 	}
1108df8bae1dSRodney W. Grimes 
1109df8bae1dSRodney W. Grimes 	switch (tp->t_state) {
1110df8bae1dSRodney W. Grimes 
1111df8bae1dSRodney W. Grimes 	/*
1112764d8cefSBill Fenner 	 * If the state is SYN_RECEIVED:
1113764d8cefSBill Fenner 	 *	if seg contains an ACK, but not for our SYN/ACK, send a RST.
1114764d8cefSBill Fenner 	 */
1115764d8cefSBill Fenner 	case TCPS_SYN_RECEIVED:
1116fb59c426SYoshinobu Inoue 		if ((thflags & TH_ACK) &&
1117fb59c426SYoshinobu Inoue 		    (SEQ_LEQ(th->th_ack, tp->snd_una) ||
1118a57815efSBosko Milekic 		     SEQ_GT(th->th_ack, tp->snd_max))) {
1119a57815efSBosko Milekic 				rstreason = BANDLIM_RST_OPENPORT;
1120a57815efSBosko Milekic 				goto dropwithreset;
1121a57815efSBosko Milekic 		}
1122764d8cefSBill Fenner 		break;
1123764d8cefSBill Fenner 
1124764d8cefSBill Fenner 	/*
1125df8bae1dSRodney W. Grimes 	 * If the state is SYN_SENT:
1126df8bae1dSRodney W. Grimes 	 *	if seg contains an ACK, but not for our SYN, drop the input.
1127df8bae1dSRodney W. Grimes 	 *	if seg contains a RST, then drop the connection.
1128df8bae1dSRodney W. Grimes 	 *	if seg does not contain SYN, then drop it.
1129df8bae1dSRodney W. Grimes 	 * Otherwise this is an acceptable SYN segment
1130df8bae1dSRodney W. Grimes 	 *	initialize tp->rcv_nxt and tp->irs
1131df8bae1dSRodney W. Grimes 	 *	if seg contains ack then advance tp->snd_una
1132df8bae1dSRodney W. Grimes 	 *	if SYN has been acked change to ESTABLISHED else SYN_RCVD state
1133df8bae1dSRodney W. Grimes 	 *	arrange for segment to be acked (eventually)
1134df8bae1dSRodney W. Grimes 	 *	continue processing rest of data/controls, beginning with URG
1135df8bae1dSRodney W. Grimes 	 */
1136df8bae1dSRodney W. Grimes 	case TCPS_SYN_SENT:
1137be2ac88cSJonathan Lemon 		if ((taop = tcp_gettaocache(&inp->inp_inc)) == NULL) {
1138a0292f23SGarrett Wollman 			taop = &tao_noncached;
1139a0292f23SGarrett Wollman 			bzero(taop, sizeof(*taop));
1140a0292f23SGarrett Wollman 		}
1141a0292f23SGarrett Wollman 
1142fb59c426SYoshinobu Inoue 		if ((thflags & TH_ACK) &&
1143fb59c426SYoshinobu Inoue 		    (SEQ_LEQ(th->th_ack, tp->iss) ||
1144fb59c426SYoshinobu Inoue 		     SEQ_GT(th->th_ack, tp->snd_max))) {
1145a0292f23SGarrett Wollman 			/*
1146a0292f23SGarrett Wollman 			 * If we have a cached CCsent for the remote host,
1147a0292f23SGarrett Wollman 			 * hence we haven't just crashed and restarted,
1148a0292f23SGarrett Wollman 			 * do not send a RST.  This may be a retransmission
1149a0292f23SGarrett Wollman 			 * from the other side after our earlier ACK was lost.
1150a0292f23SGarrett Wollman 			 * Our new SYN, when it arrives, will serve as the
1151a0292f23SGarrett Wollman 			 * needed ACK.
1152a0292f23SGarrett Wollman 			 */
1153a0292f23SGarrett Wollman 			if (taop->tao_ccsent != 0)
1154a0292f23SGarrett Wollman 				goto drop;
1155a57815efSBosko Milekic 			else {
1156a57815efSBosko Milekic 				rstreason = BANDLIM_UNLIMITED;
1157a0292f23SGarrett Wollman 				goto dropwithreset;
1158a0292f23SGarrett Wollman 			}
1159a57815efSBosko Milekic 		}
1160fb59c426SYoshinobu Inoue 		if (thflags & TH_RST) {
1161fb59c426SYoshinobu Inoue 			if (thflags & TH_ACK)
1162df8bae1dSRodney W. Grimes 				tp = tcp_drop(tp, ECONNREFUSED);
1163df8bae1dSRodney W. Grimes 			goto drop;
1164df8bae1dSRodney W. Grimes 		}
1165fb59c426SYoshinobu Inoue 		if ((thflags & TH_SYN) == 0)
1166df8bae1dSRodney W. Grimes 			goto drop;
1167fb59c426SYoshinobu Inoue 		tp->snd_wnd = th->th_win;	/* initial send window */
1168a0292f23SGarrett Wollman 		tp->cc_recv = to.to_cc;		/* foreign CC */
1169a0292f23SGarrett Wollman 
1170fb59c426SYoshinobu Inoue 		tp->irs = th->th_seq;
1171df8bae1dSRodney W. Grimes 		tcp_rcvseqinit(tp);
1172fb59c426SYoshinobu Inoue 		if (thflags & TH_ACK) {
1173a0292f23SGarrett Wollman 			/*
1174a0292f23SGarrett Wollman 			 * Our SYN was acked.  If segment contains CC.ECHO
1175a0292f23SGarrett Wollman 			 * option, check it to make sure this segment really
1176a0292f23SGarrett Wollman 			 * matches our SYN.  If not, just drop it as old
1177a0292f23SGarrett Wollman 			 * duplicate, but send an RST if we're still playing
1178026650e5SBill Fenner 			 * by the old rules.  If no CC.ECHO option, make sure
1179026650e5SBill Fenner 			 * we don't get fooled into using T/TCP.
1180a0292f23SGarrett Wollman 			 */
1181be2ac88cSJonathan Lemon 			if (to.to_flags & TOF_CCECHO) {
1182dfd5dee1SPeter Wemm 				if (tp->cc_send != to.to_ccecho) {
1183a0292f23SGarrett Wollman 					if (taop->tao_ccsent != 0)
1184a0292f23SGarrett Wollman 						goto drop;
1185a57815efSBosko Milekic 					else {
1186a57815efSBosko Milekic 						rstreason = BANDLIM_UNLIMITED;
1187a0292f23SGarrett Wollman 						goto dropwithreset;
1188dfd5dee1SPeter Wemm 					}
1189a57815efSBosko Milekic 				}
1190026650e5SBill Fenner 			} else
1191026650e5SBill Fenner 				tp->t_flags &= ~TF_RCVD_CC;
1192845799c1SAndras Olah 			tcpstat.tcps_connects++;
1193845799c1SAndras Olah 			soisconnected(so);
1194c488362eSRobert Watson #ifdef MAC
1195c488362eSRobert Watson 			mac_set_socket_peer_from_mbuf(m, so);
1196c488362eSRobert Watson #endif
1197845799c1SAndras Olah 			/* Do window scaling on this connection? */
1198845799c1SAndras Olah 			if ((tp->t_flags & (TF_RCVD_SCALE|TF_REQ_SCALE)) ==
1199845799c1SAndras Olah 				(TF_RCVD_SCALE|TF_REQ_SCALE)) {
1200845799c1SAndras Olah 				tp->snd_scale = tp->requested_s_scale;
1201845799c1SAndras Olah 				tp->rcv_scale = tp->request_r_scale;
1202845799c1SAndras Olah 			}
1203a0292f23SGarrett Wollman 			/* Segment is acceptable, update cache if undefined. */
1204a0292f23SGarrett Wollman 			if (taop->tao_ccsent == 0)
1205a0292f23SGarrett Wollman 				taop->tao_ccsent = to.to_ccecho;
1206a0292f23SGarrett Wollman 
1207a0292f23SGarrett Wollman 			tp->rcv_adv += tp->rcv_wnd;
1208a0292f23SGarrett Wollman 			tp->snd_una++;		/* SYN is acked */
1209a0292f23SGarrett Wollman 			/*
1210a0292f23SGarrett Wollman 			 * If there's data, delay ACK; if there's also a FIN
1211a0292f23SGarrett Wollman 			 * ACKNOW will be turned on later.
1212a0292f23SGarrett Wollman 			 */
1213d8c85a26SJonathan Lemon 			if (DELAY_ACK(tp) && tlen != 0)
12149b8b58e0SJonathan Lemon                                 callout_reset(tp->tt_delack, tcp_delacktime,
12159b8b58e0SJonathan Lemon                                     tcp_timer_delack, tp);
1216a0292f23SGarrett Wollman 			else
1217a0292f23SGarrett Wollman 				tp->t_flags |= TF_ACKNOW;
1218a0292f23SGarrett Wollman 			/*
1219a0292f23SGarrett Wollman 			 * Received <SYN,ACK> in SYN_SENT[*] state.
1220a0292f23SGarrett Wollman 			 * Transitions:
1221a0292f23SGarrett Wollman 			 *	SYN_SENT  --> ESTABLISHED
1222a0292f23SGarrett Wollman 			 *	SYN_SENT* --> FIN_WAIT_1
1223a0292f23SGarrett Wollman 			 */
12249b8b58e0SJonathan Lemon 			tp->t_starttime = ticks;
1225a0292f23SGarrett Wollman 			if (tp->t_flags & TF_NEEDFIN) {
1226a0292f23SGarrett Wollman 				tp->t_state = TCPS_FIN_WAIT_1;
1227a0292f23SGarrett Wollman 				tp->t_flags &= ~TF_NEEDFIN;
1228fb59c426SYoshinobu Inoue 				thflags &= ~TH_SYN;
12297ff19458SPaul Traina 			} else {
1230a0292f23SGarrett Wollman 				tp->t_state = TCPS_ESTABLISHED;
12319b8b58e0SJonathan Lemon 				callout_reset(tp->tt_keep, tcp_keepidle,
12329b8b58e0SJonathan Lemon 					      tcp_timer_keep, tp);
12337ff19458SPaul Traina 			}
1234a0292f23SGarrett Wollman 		} else {
1235a0292f23SGarrett Wollman 			/*
1236c068736aSJeffrey Hsu 		 	 * Received initial SYN in SYN-SENT[*] state =>
1237c068736aSJeffrey Hsu 		 	 * simultaneous open.  If segment contains CC option
1238c068736aSJeffrey Hsu 		 	 * and there is a cached CC, apply TAO test.
1239c068736aSJeffrey Hsu 		 	 * If it succeeds, connection is * half-synchronized.
1240c068736aSJeffrey Hsu 		 	 * Otherwise, do 3-way handshake:
1241a0292f23SGarrett Wollman 		 	 *        SYN-SENT -> SYN-RECEIVED
1242a0292f23SGarrett Wollman 		 	 *        SYN-SENT* -> SYN-RECEIVED*
1243a0292f23SGarrett Wollman 		 	 * If there was no CC option, clear cached CC value.
1244a0292f23SGarrett Wollman 		 	 */
1245a0292f23SGarrett Wollman 			tp->t_flags |= TF_ACKNOW;
12469b8b58e0SJonathan Lemon 			callout_stop(tp->tt_rexmt);
1247be2ac88cSJonathan Lemon 			if (to.to_flags & TOF_CC) {
1248a0292f23SGarrett Wollman 				if (taop->tao_cc != 0 &&
1249a0292f23SGarrett Wollman 				    CC_GT(to.to_cc, taop->tao_cc)) {
1250a0292f23SGarrett Wollman 					/*
1251a0292f23SGarrett Wollman 					 * update cache and make transition:
1252a0292f23SGarrett Wollman 					 *        SYN-SENT -> ESTABLISHED*
1253a0292f23SGarrett Wollman 					 *        SYN-SENT* -> FIN-WAIT-1*
1254a0292f23SGarrett Wollman 					 */
1255a0292f23SGarrett Wollman 					taop->tao_cc = to.to_cc;
12569b8b58e0SJonathan Lemon 					tp->t_starttime = ticks;
1257a0292f23SGarrett Wollman 					if (tp->t_flags & TF_NEEDFIN) {
1258a0292f23SGarrett Wollman 						tp->t_state = TCPS_FIN_WAIT_1;
1259a0292f23SGarrett Wollman 						tp->t_flags &= ~TF_NEEDFIN;
12607ff19458SPaul Traina 					} else {
1261a0292f23SGarrett Wollman 						tp->t_state = TCPS_ESTABLISHED;
12629b8b58e0SJonathan Lemon 						callout_reset(tp->tt_keep,
12639b8b58e0SJonathan Lemon 							      tcp_keepidle,
12649b8b58e0SJonathan Lemon 							      tcp_timer_keep,
12659b8b58e0SJonathan Lemon 							      tp);
12667ff19458SPaul Traina 					}
1267a0292f23SGarrett Wollman 					tp->t_flags |= TF_NEEDSYN;
1268df8bae1dSRodney W. Grimes 				} else
1269df8bae1dSRodney W. Grimes 					tp->t_state = TCPS_SYN_RECEIVED;
1270a0292f23SGarrett Wollman 			} else {
1271a0292f23SGarrett Wollman 				/* CC.NEW or no option => invalidate cache */
1272a0292f23SGarrett Wollman 				taop->tao_cc = 0;
1273a0292f23SGarrett Wollman 				tp->t_state = TCPS_SYN_RECEIVED;
1274a0292f23SGarrett Wollman 			}
1275a0292f23SGarrett Wollman 		}
1276df8bae1dSRodney W. Grimes 
1277df8bae1dSRodney W. Grimes trimthenstep6:
1278df8bae1dSRodney W. Grimes 		/*
1279fb59c426SYoshinobu Inoue 		 * Advance th->th_seq to correspond to first data byte.
1280df8bae1dSRodney W. Grimes 		 * If data, trim to stay within window,
1281df8bae1dSRodney W. Grimes 		 * dropping FIN if necessary.
1282df8bae1dSRodney W. Grimes 		 */
1283fb59c426SYoshinobu Inoue 		th->th_seq++;
1284fb59c426SYoshinobu Inoue 		if (tlen > tp->rcv_wnd) {
1285fb59c426SYoshinobu Inoue 			todrop = tlen - tp->rcv_wnd;
1286df8bae1dSRodney W. Grimes 			m_adj(m, -todrop);
1287fb59c426SYoshinobu Inoue 			tlen = tp->rcv_wnd;
1288fb59c426SYoshinobu Inoue 			thflags &= ~TH_FIN;
1289df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvpackafterwin++;
1290df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvbyteafterwin += todrop;
1291df8bae1dSRodney W. Grimes 		}
1292fb59c426SYoshinobu Inoue 		tp->snd_wl1 = th->th_seq - 1;
1293fb59c426SYoshinobu Inoue 		tp->rcv_up = th->th_seq;
1294a0292f23SGarrett Wollman 		/*
1295a0292f23SGarrett Wollman 		 * Client side of transaction: already sent SYN and data.
1296a0292f23SGarrett Wollman 		 * If the remote host used T/TCP to validate the SYN,
1297a0292f23SGarrett Wollman 		 * our data will be ACK'd; if so, enter normal data segment
1298a0292f23SGarrett Wollman 		 * processing in the middle of step 5, ack processing.
1299a0292f23SGarrett Wollman 		 * Otherwise, goto step 6.
1300a0292f23SGarrett Wollman 		 */
1301fb59c426SYoshinobu Inoue  		if (thflags & TH_ACK)
1302a0292f23SGarrett Wollman 			goto process_ACK;
1303c068736aSJeffrey Hsu 
1304df8bae1dSRodney W. Grimes 		goto step6;
1305c068736aSJeffrey Hsu 
1306a0292f23SGarrett Wollman 	/*
1307a0292f23SGarrett Wollman 	 * If the state is LAST_ACK or CLOSING or TIME_WAIT:
1308a0292f23SGarrett Wollman 	 *	if segment contains a SYN and CC [not CC.NEW] option:
1309a0292f23SGarrett Wollman 	 *              if state == TIME_WAIT and connection duration > MSL,
1310a0292f23SGarrett Wollman 	 *                  drop packet and send RST;
1311a0292f23SGarrett Wollman 	 *
1312a0292f23SGarrett Wollman 	 *		if SEG.CC > CCrecv then is new SYN, and can implicitly
1313a0292f23SGarrett Wollman 	 *		    ack the FIN (and data) in retransmission queue.
1314a0292f23SGarrett Wollman 	 *                  Complete close and delete TCPCB.  Then reprocess
1315a0292f23SGarrett Wollman 	 *                  segment, hoping to find new TCPCB in LISTEN state;
1316a0292f23SGarrett Wollman 	 *
1317a0292f23SGarrett Wollman 	 *		else must be old SYN; drop it.
1318a0292f23SGarrett Wollman 	 *      else do normal processing.
1319a0292f23SGarrett Wollman 	 */
1320a0292f23SGarrett Wollman 	case TCPS_LAST_ACK:
1321a0292f23SGarrett Wollman 	case TCPS_CLOSING:
1322a0292f23SGarrett Wollman 	case TCPS_TIME_WAIT:
1323fb59c426SYoshinobu Inoue 		if ((thflags & TH_SYN) &&
1324be2ac88cSJonathan Lemon 		    (to.to_flags & TOF_CC) && tp->cc_recv != 0) {
1325a0292f23SGarrett Wollman 			if (tp->t_state == TCPS_TIME_WAIT &&
1326a57815efSBosko Milekic 					(ticks - tp->t_starttime) > tcp_msl) {
1327a57815efSBosko Milekic 				rstreason = BANDLIM_UNLIMITED;
1328a0292f23SGarrett Wollman 				goto dropwithreset;
1329a57815efSBosko Milekic 			}
1330a0292f23SGarrett Wollman 			if (CC_GT(to.to_cc, tp->cc_recv)) {
1331a0292f23SGarrett Wollman 				tp = tcp_close(tp);
1332a0292f23SGarrett Wollman 				goto findpcb;
1333a0292f23SGarrett Wollman 			}
1334a0292f23SGarrett Wollman 			else
1335a0292f23SGarrett Wollman 				goto drop;
1336a0292f23SGarrett Wollman 		}
1337a0292f23SGarrett Wollman  		break;  /* continue normal processing */
1338df8bae1dSRodney W. Grimes 	}
1339df8bae1dSRodney W. Grimes 
1340df8bae1dSRodney W. Grimes 	/*
1341df8bae1dSRodney W. Grimes 	 * States other than LISTEN or SYN_SENT.
134280ab7c0eSGarrett Wollman 	 * First check the RST flag and sequence number since reset segments
134380ab7c0eSGarrett Wollman 	 * are exempt from the timestamp and connection count tests.  This
134480ab7c0eSGarrett Wollman 	 * fixes a bug introduced by the Stevens, vol. 2, p. 960 bugfix
134580ab7c0eSGarrett Wollman 	 * below which allowed reset segments in half the sequence space
134680ab7c0eSGarrett Wollman 	 * to fall though and be processed (which gives forged reset
134780ab7c0eSGarrett Wollman 	 * segments with a random sequence number a 50 percent chance of
134880ab7c0eSGarrett Wollman 	 * killing a connection).
134980ab7c0eSGarrett Wollman 	 * Then check timestamp, if present.
1350a0292f23SGarrett Wollman 	 * Then check the connection count, if present.
1351df8bae1dSRodney W. Grimes 	 * Then check that at least some bytes of segment are within
1352df8bae1dSRodney W. Grimes 	 * receive window.  If segment begins before rcv_nxt,
1353df8bae1dSRodney W. Grimes 	 * drop leading data (and SYN); if nothing left, just ack.
1354df8bae1dSRodney W. Grimes 	 *
135580ab7c0eSGarrett Wollman 	 *
135680ab7c0eSGarrett Wollman 	 * If the RST bit is set, check the sequence number to see
135780ab7c0eSGarrett Wollman 	 * if this is a valid reset segment.
135880ab7c0eSGarrett Wollman 	 * RFC 793 page 37:
135980ab7c0eSGarrett Wollman 	 *   In all states except SYN-SENT, all reset (RST) segments
136080ab7c0eSGarrett Wollman 	 *   are validated by checking their SEQ-fields.  A reset is
136180ab7c0eSGarrett Wollman 	 *   valid if its sequence number is in the window.
136280ab7c0eSGarrett Wollman 	 * Note: this does not take into account delayed ACKs, so
136380ab7c0eSGarrett Wollman 	 *   we should test against last_ack_sent instead of rcv_nxt.
13641a244a61SJonathan Lemon 	 *   The sequence number in the reset segment is normally an
13651a244a61SJonathan Lemon 	 *   echo of our outgoing acknowlegement numbers, but some hosts
13661a244a61SJonathan Lemon 	 *   send a reset with the sequence number at the rightmost edge
13671a244a61SJonathan Lemon 	 *   of our receive window, and we have to handle this case.
136880ab7c0eSGarrett Wollman 	 * If we have multiple segments in flight, the intial reset
136980ab7c0eSGarrett Wollman 	 * segment sequence numbers will be to the left of last_ack_sent,
137080ab7c0eSGarrett Wollman 	 * but they will eventually catch up.
137180ab7c0eSGarrett Wollman 	 * In any case, it never made sense to trim reset segments to
137280ab7c0eSGarrett Wollman 	 * fit the receive window since RFC 1122 says:
137380ab7c0eSGarrett Wollman 	 *   4.2.2.12  RST Segment: RFC-793 Section 3.4
137480ab7c0eSGarrett Wollman 	 *
137580ab7c0eSGarrett Wollman 	 *    A TCP SHOULD allow a received RST segment to include data.
137680ab7c0eSGarrett Wollman 	 *
137780ab7c0eSGarrett Wollman 	 *    DISCUSSION
137880ab7c0eSGarrett Wollman 	 *         It has been suggested that a RST segment could contain
137980ab7c0eSGarrett Wollman 	 *         ASCII text that encoded and explained the cause of the
138080ab7c0eSGarrett Wollman 	 *         RST.  No standard has yet been established for such
138180ab7c0eSGarrett Wollman 	 *         data.
138280ab7c0eSGarrett Wollman 	 *
138380ab7c0eSGarrett Wollman 	 * If the reset segment passes the sequence number test examine
138480ab7c0eSGarrett Wollman 	 * the state:
138580ab7c0eSGarrett Wollman 	 *    SYN_RECEIVED STATE:
138680ab7c0eSGarrett Wollman 	 *	If passive open, return to LISTEN state.
138780ab7c0eSGarrett Wollman 	 *	If active open, inform user that connection was refused.
1388745bab7fSDima Dorfman 	 *    ESTABLISHED, FIN_WAIT_1, FIN_WAIT_2, CLOSE_WAIT STATES:
138980ab7c0eSGarrett Wollman 	 *	Inform user that connection was reset, and close tcb.
1390e9bd3a37SJonathan M. Bresler 	 *    CLOSING, LAST_ACK STATES:
139180ab7c0eSGarrett Wollman 	 *	Close the tcb.
1392e9bd3a37SJonathan M. Bresler 	 *    TIME_WAIT STATE:
139380ab7c0eSGarrett Wollman 	 *	Drop the segment - see Stevens, vol. 2, p. 964 and
139480ab7c0eSGarrett Wollman 	 *      RFC 1337.
139580ab7c0eSGarrett Wollman 	 */
1396fb59c426SYoshinobu Inoue 	if (thflags & TH_RST) {
1397fb59c426SYoshinobu Inoue 		if (SEQ_GEQ(th->th_seq, tp->last_ack_sent) &&
1398fb59c426SYoshinobu Inoue 		    SEQ_LT(th->th_seq, tp->last_ack_sent + tp->rcv_wnd)) {
139980ab7c0eSGarrett Wollman 			switch (tp->t_state) {
140080ab7c0eSGarrett Wollman 
140180ab7c0eSGarrett Wollman 			case TCPS_SYN_RECEIVED:
140280ab7c0eSGarrett Wollman 				so->so_error = ECONNREFUSED;
140380ab7c0eSGarrett Wollman 				goto close;
140480ab7c0eSGarrett Wollman 
140580ab7c0eSGarrett Wollman 			case TCPS_ESTABLISHED:
140680ab7c0eSGarrett Wollman 			case TCPS_FIN_WAIT_1:
140780ab7c0eSGarrett Wollman 			case TCPS_FIN_WAIT_2:
140880ab7c0eSGarrett Wollman 			case TCPS_CLOSE_WAIT:
140980ab7c0eSGarrett Wollman 				so->so_error = ECONNRESET;
141080ab7c0eSGarrett Wollman 			close:
141180ab7c0eSGarrett Wollman 				tp->t_state = TCPS_CLOSED;
141280ab7c0eSGarrett Wollman 				tcpstat.tcps_drops++;
141380ab7c0eSGarrett Wollman 				tp = tcp_close(tp);
141480ab7c0eSGarrett Wollman 				break;
141580ab7c0eSGarrett Wollman 
141680ab7c0eSGarrett Wollman 			case TCPS_CLOSING:
141780ab7c0eSGarrett Wollman 			case TCPS_LAST_ACK:
141880ab7c0eSGarrett Wollman 				tp = tcp_close(tp);
141980ab7c0eSGarrett Wollman 				break;
142080ab7c0eSGarrett Wollman 
142180ab7c0eSGarrett Wollman 			case TCPS_TIME_WAIT:
142280ab7c0eSGarrett Wollman 				break;
142380ab7c0eSGarrett Wollman 			}
142480ab7c0eSGarrett Wollman 		}
142580ab7c0eSGarrett Wollman 		goto drop;
142680ab7c0eSGarrett Wollman 	}
142780ab7c0eSGarrett Wollman 
142880ab7c0eSGarrett Wollman 	/*
1429df8bae1dSRodney W. Grimes 	 * RFC 1323 PAWS: If we have a timestamp reply on this segment
1430df8bae1dSRodney W. Grimes 	 * and it's less than ts_recent, drop it.
1431df8bae1dSRodney W. Grimes 	 */
1432be2ac88cSJonathan Lemon 	if ((to.to_flags & TOF_TS) != 0 && tp->ts_recent &&
143380ab7c0eSGarrett Wollman 	    TSTMP_LT(to.to_tsval, tp->ts_recent)) {
1434df8bae1dSRodney W. Grimes 
1435df8bae1dSRodney W. Grimes 		/* Check to see if ts_recent is over 24 days old.  */
14369b8b58e0SJonathan Lemon 		if ((int)(ticks - tp->ts_recent_age) > TCP_PAWS_IDLE) {
1437df8bae1dSRodney W. Grimes 			/*
1438df8bae1dSRodney W. Grimes 			 * Invalidate ts_recent.  If this segment updates
1439df8bae1dSRodney W. Grimes 			 * ts_recent, the age will be reset later and ts_recent
1440df8bae1dSRodney W. Grimes 			 * will get a valid value.  If it does not, setting
1441df8bae1dSRodney W. Grimes 			 * ts_recent to zero will at least satisfy the
1442df8bae1dSRodney W. Grimes 			 * requirement that zero be placed in the timestamp
1443df8bae1dSRodney W. Grimes 			 * echo reply when ts_recent isn't valid.  The
1444df8bae1dSRodney W. Grimes 			 * age isn't reset until we get a valid ts_recent
1445df8bae1dSRodney W. Grimes 			 * because we don't want out-of-order segments to be
1446df8bae1dSRodney W. Grimes 			 * dropped when ts_recent is old.
1447df8bae1dSRodney W. Grimes 			 */
1448df8bae1dSRodney W. Grimes 			tp->ts_recent = 0;
1449df8bae1dSRodney W. Grimes 		} else {
1450df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvduppack++;
1451fb59c426SYoshinobu Inoue 			tcpstat.tcps_rcvdupbyte += tlen;
1452df8bae1dSRodney W. Grimes 			tcpstat.tcps_pawsdrop++;
1453df8bae1dSRodney W. Grimes 			goto dropafterack;
1454df8bae1dSRodney W. Grimes 		}
1455df8bae1dSRodney W. Grimes 	}
1456df8bae1dSRodney W. Grimes 
1457a0292f23SGarrett Wollman 	/*
1458a0292f23SGarrett Wollman 	 * T/TCP mechanism
1459a0292f23SGarrett Wollman 	 *   If T/TCP was negotiated and the segment doesn't have CC,
1460dc733423SDag-Erling Smørgrav 	 *   or if its CC is wrong then drop the segment.
1461a0292f23SGarrett Wollman 	 *   RST segments do not have to comply with this.
1462a0292f23SGarrett Wollman 	 */
1463a0292f23SGarrett Wollman 	if ((tp->t_flags & (TF_REQ_CC|TF_RCVD_CC)) == (TF_REQ_CC|TF_RCVD_CC) &&
1464be2ac88cSJonathan Lemon 	    ((to.to_flags & TOF_CC) == 0 || tp->cc_recv != to.to_cc))
1465a0292f23SGarrett Wollman  		goto dropafterack;
1466a0292f23SGarrett Wollman 
146780ab7c0eSGarrett Wollman 	/*
146880ab7c0eSGarrett Wollman 	 * In the SYN-RECEIVED state, validate that the packet belongs to
146980ab7c0eSGarrett Wollman 	 * this connection before trimming the data to fit the receive
147080ab7c0eSGarrett Wollman 	 * window.  Check the sequence number versus IRS since we know
147180ab7c0eSGarrett Wollman 	 * the sequence numbers haven't wrapped.  This is a partial fix
147280ab7c0eSGarrett Wollman 	 * for the "LAND" DoS attack.
147380ab7c0eSGarrett Wollman 	 */
1474a57815efSBosko Milekic 	if (tp->t_state == TCPS_SYN_RECEIVED && SEQ_LT(th->th_seq, tp->irs)) {
1475a57815efSBosko Milekic 		rstreason = BANDLIM_RST_OPENPORT;
1476a57815efSBosko Milekic 		goto dropwithreset;
1477a57815efSBosko Milekic 	}
147880ab7c0eSGarrett Wollman 
1479fb59c426SYoshinobu Inoue 	todrop = tp->rcv_nxt - th->th_seq;
1480df8bae1dSRodney W. Grimes 	if (todrop > 0) {
1481fb59c426SYoshinobu Inoue 		if (thflags & TH_SYN) {
1482fb59c426SYoshinobu Inoue 			thflags &= ~TH_SYN;
1483fb59c426SYoshinobu Inoue 			th->th_seq++;
1484fb59c426SYoshinobu Inoue 			if (th->th_urp > 1)
1485fb59c426SYoshinobu Inoue 				th->th_urp--;
1486df8bae1dSRodney W. Grimes 			else
1487fb59c426SYoshinobu Inoue 				thflags &= ~TH_URG;
1488df8bae1dSRodney W. Grimes 			todrop--;
1489df8bae1dSRodney W. Grimes 		}
1490df8bae1dSRodney W. Grimes 		/*
1491dac20301SGarrett Wollman 		 * Following if statement from Stevens, vol. 2, p. 960.
1492df8bae1dSRodney W. Grimes 		 */
1493fb59c426SYoshinobu Inoue 		if (todrop > tlen
1494fb59c426SYoshinobu Inoue 		    || (todrop == tlen && (thflags & TH_FIN) == 0)) {
1495dac20301SGarrett Wollman 			/*
1496dac20301SGarrett Wollman 			 * Any valid FIN must be to the left of the window.
1497dac20301SGarrett Wollman 			 * At this point the FIN must be a duplicate or out
1498dac20301SGarrett Wollman 			 * of sequence; drop it.
1499dac20301SGarrett Wollman 			 */
1500fb59c426SYoshinobu Inoue 			thflags &= ~TH_FIN;
1501dac20301SGarrett Wollman 
1502df8bae1dSRodney W. Grimes 			/*
1503dac20301SGarrett Wollman 			 * Send an ACK to resynchronize and drop any data.
1504dac20301SGarrett Wollman 			 * But keep on processing for RST or ACK.
1505df8bae1dSRodney W. Grimes 			 */
1506dac20301SGarrett Wollman 			tp->t_flags |= TF_ACKNOW;
1507fb59c426SYoshinobu Inoue 			todrop = tlen;
1508dac20301SGarrett Wollman 			tcpstat.tcps_rcvduppack++;
1509dac20301SGarrett Wollman 			tcpstat.tcps_rcvdupbyte += todrop;
1510df8bae1dSRodney W. Grimes 		} else {
1511df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvpartduppack++;
1512df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvpartdupbyte += todrop;
1513df8bae1dSRodney W. Grimes 		}
1514fb59c426SYoshinobu Inoue 		drop_hdrlen += todrop;	/* drop from the top afterwards */
1515fb59c426SYoshinobu Inoue 		th->th_seq += todrop;
1516fb59c426SYoshinobu Inoue 		tlen -= todrop;
1517fb59c426SYoshinobu Inoue 		if (th->th_urp > todrop)
1518fb59c426SYoshinobu Inoue 			th->th_urp -= todrop;
1519df8bae1dSRodney W. Grimes 		else {
1520fb59c426SYoshinobu Inoue 			thflags &= ~TH_URG;
1521fb59c426SYoshinobu Inoue 			th->th_urp = 0;
1522df8bae1dSRodney W. Grimes 		}
1523df8bae1dSRodney W. Grimes 	}
1524df8bae1dSRodney W. Grimes 
1525df8bae1dSRodney W. Grimes 	/*
1526df8bae1dSRodney W. Grimes 	 * If new data are received on a connection after the
1527df8bae1dSRodney W. Grimes 	 * user processes are gone, then RST the other end.
1528df8bae1dSRodney W. Grimes 	 */
1529df8bae1dSRodney W. Grimes 	if ((so->so_state & SS_NOFDREF) &&
1530fb59c426SYoshinobu Inoue 	    tp->t_state > TCPS_CLOSE_WAIT && tlen) {
1531df8bae1dSRodney W. Grimes 		tp = tcp_close(tp);
1532df8bae1dSRodney W. Grimes 		tcpstat.tcps_rcvafterclose++;
1533a57815efSBosko Milekic 		rstreason = BANDLIM_UNLIMITED;
1534df8bae1dSRodney W. Grimes 		goto dropwithreset;
1535df8bae1dSRodney W. Grimes 	}
1536df8bae1dSRodney W. Grimes 
1537df8bae1dSRodney W. Grimes 	/*
1538df8bae1dSRodney W. Grimes 	 * If segment ends after window, drop trailing data
1539df8bae1dSRodney W. Grimes 	 * (and PUSH and FIN); if nothing left, just ACK.
1540df8bae1dSRodney W. Grimes 	 */
1541fb59c426SYoshinobu Inoue 	todrop = (th->th_seq+tlen) - (tp->rcv_nxt+tp->rcv_wnd);
1542df8bae1dSRodney W. Grimes 	if (todrop > 0) {
1543df8bae1dSRodney W. Grimes 		tcpstat.tcps_rcvpackafterwin++;
1544fb59c426SYoshinobu Inoue 		if (todrop >= tlen) {
1545fb59c426SYoshinobu Inoue 			tcpstat.tcps_rcvbyteafterwin += tlen;
1546df8bae1dSRodney W. Grimes 			/*
1547df8bae1dSRodney W. Grimes 			 * If a new connection request is received
1548df8bae1dSRodney W. Grimes 			 * while in TIME_WAIT, drop the old connection
1549df8bae1dSRodney W. Grimes 			 * and start over if the sequence numbers
1550df8bae1dSRodney W. Grimes 			 * are above the previous ones.
1551df8bae1dSRodney W. Grimes 			 */
1552fb59c426SYoshinobu Inoue 			if (thflags & TH_SYN &&
1553df8bae1dSRodney W. Grimes 			    tp->t_state == TCPS_TIME_WAIT &&
1554fb59c426SYoshinobu Inoue 			    SEQ_GT(th->th_seq, tp->rcv_nxt)) {
1555df8bae1dSRodney W. Grimes 				tp = tcp_close(tp);
1556df8bae1dSRodney W. Grimes 				goto findpcb;
1557df8bae1dSRodney W. Grimes 			}
1558df8bae1dSRodney W. Grimes 			/*
1559df8bae1dSRodney W. Grimes 			 * If window is closed can only take segments at
1560df8bae1dSRodney W. Grimes 			 * window edge, and have to drop data and PUSH from
1561df8bae1dSRodney W. Grimes 			 * incoming segments.  Continue processing, but
1562df8bae1dSRodney W. Grimes 			 * remember to ack.  Otherwise, drop segment
1563df8bae1dSRodney W. Grimes 			 * and ack.
1564df8bae1dSRodney W. Grimes 			 */
1565fb59c426SYoshinobu Inoue 			if (tp->rcv_wnd == 0 && th->th_seq == tp->rcv_nxt) {
1566df8bae1dSRodney W. Grimes 				tp->t_flags |= TF_ACKNOW;
1567df8bae1dSRodney W. Grimes 				tcpstat.tcps_rcvwinprobe++;
1568df8bae1dSRodney W. Grimes 			} else
1569df8bae1dSRodney W. Grimes 				goto dropafterack;
1570df8bae1dSRodney W. Grimes 		} else
1571df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvbyteafterwin += todrop;
1572df8bae1dSRodney W. Grimes 		m_adj(m, -todrop);
1573fb59c426SYoshinobu Inoue 		tlen -= todrop;
1574fb59c426SYoshinobu Inoue 		thflags &= ~(TH_PUSH|TH_FIN);
1575df8bae1dSRodney W. Grimes 	}
1576df8bae1dSRodney W. Grimes 
1577df8bae1dSRodney W. Grimes 	/*
1578df8bae1dSRodney W. Grimes 	 * If last ACK falls within this segment's sequence numbers,
1579df8bae1dSRodney W. Grimes 	 * record its timestamp.
1580a0292f23SGarrett Wollman 	 * NOTE that the test is modified according to the latest
1581a0292f23SGarrett Wollman 	 * proposal of the tcplw@cray.com list (Braden 1993/04/26).
1582df8bae1dSRodney W. Grimes 	 */
1583be2ac88cSJonathan Lemon 	if ((to.to_flags & TOF_TS) != 0 &&
1584fb59c426SYoshinobu Inoue 	    SEQ_LEQ(th->th_seq, tp->last_ack_sent)) {
15859b8b58e0SJonathan Lemon 		tp->ts_recent_age = ticks;
1586a0292f23SGarrett Wollman 		tp->ts_recent = to.to_tsval;
1587df8bae1dSRodney W. Grimes 	}
1588df8bae1dSRodney W. Grimes 
1589df8bae1dSRodney W. Grimes 	/*
1590df8bae1dSRodney W. Grimes 	 * If a SYN is in the window, then this is an
1591df8bae1dSRodney W. Grimes 	 * error and we send an RST and drop the connection.
1592df8bae1dSRodney W. Grimes 	 */
1593fb59c426SYoshinobu Inoue 	if (thflags & TH_SYN) {
1594df8bae1dSRodney W. Grimes 		tp = tcp_drop(tp, ECONNRESET);
1595a57815efSBosko Milekic 		rstreason = BANDLIM_UNLIMITED;
1596df8bae1dSRodney W. Grimes 		goto dropwithreset;
1597df8bae1dSRodney W. Grimes 	}
1598df8bae1dSRodney W. Grimes 
1599a0292f23SGarrett Wollman 	/*
1600a0292f23SGarrett Wollman 	 * If the ACK bit is off:  if in SYN-RECEIVED state or SENDSYN
1601a0292f23SGarrett Wollman 	 * flag is on (half-synchronized state), then queue data for
1602a0292f23SGarrett Wollman 	 * later processing; else drop segment and return.
1603a0292f23SGarrett Wollman 	 */
1604fb59c426SYoshinobu Inoue 	if ((thflags & TH_ACK) == 0) {
1605a0292f23SGarrett Wollman 		if (tp->t_state == TCPS_SYN_RECEIVED ||
1606a0292f23SGarrett Wollman 		    (tp->t_flags & TF_NEEDSYN))
1607a0292f23SGarrett Wollman 			goto step6;
1608a0292f23SGarrett Wollman 		else
1609a0292f23SGarrett Wollman 			goto drop;
1610a0292f23SGarrett Wollman 	}
1611df8bae1dSRodney W. Grimes 
1612df8bae1dSRodney W. Grimes 	/*
1613df8bae1dSRodney W. Grimes 	 * Ack processing.
1614df8bae1dSRodney W. Grimes 	 */
1615df8bae1dSRodney W. Grimes 	switch (tp->t_state) {
1616df8bae1dSRodney W. Grimes 
1617df8bae1dSRodney W. Grimes 	/*
1618764d8cefSBill Fenner 	 * In SYN_RECEIVED state, the ack ACKs our SYN, so enter
1619764d8cefSBill Fenner 	 * ESTABLISHED state and continue processing.
1620764d8cefSBill Fenner 	 * The ACK was checked above.
1621df8bae1dSRodney W. Grimes 	 */
1622df8bae1dSRodney W. Grimes 	case TCPS_SYN_RECEIVED:
1623a0292f23SGarrett Wollman 
1624df8bae1dSRodney W. Grimes 		tcpstat.tcps_connects++;
1625df8bae1dSRodney W. Grimes 		soisconnected(so);
1626df8bae1dSRodney W. Grimes 		/* Do window scaling? */
1627df8bae1dSRodney W. Grimes 		if ((tp->t_flags & (TF_RCVD_SCALE|TF_REQ_SCALE)) ==
1628df8bae1dSRodney W. Grimes 			(TF_RCVD_SCALE|TF_REQ_SCALE)) {
1629df8bae1dSRodney W. Grimes 			tp->snd_scale = tp->requested_s_scale;
1630df8bae1dSRodney W. Grimes 			tp->rcv_scale = tp->request_r_scale;
1631df8bae1dSRodney W. Grimes 		}
1632a0292f23SGarrett Wollman 		/*
1633a0292f23SGarrett Wollman 		 * Upon successful completion of 3-way handshake,
1634a0292f23SGarrett Wollman 		 * update cache.CC if it was undefined, pass any queued
1635a0292f23SGarrett Wollman 		 * data to the user, and advance state appropriately.
1636a0292f23SGarrett Wollman 		 */
1637be2ac88cSJonathan Lemon 		if ((taop = tcp_gettaocache(&inp->inp_inc)) != NULL &&
1638a0292f23SGarrett Wollman 		    taop->tao_cc == 0)
1639a0292f23SGarrett Wollman 			taop->tao_cc = tp->cc_recv;
1640a0292f23SGarrett Wollman 
1641a0292f23SGarrett Wollman 		/*
1642a0292f23SGarrett Wollman 		 * Make transitions:
1643a0292f23SGarrett Wollman 		 *      SYN-RECEIVED  -> ESTABLISHED
1644a0292f23SGarrett Wollman 		 *      SYN-RECEIVED* -> FIN-WAIT-1
1645a0292f23SGarrett Wollman 		 */
16469b8b58e0SJonathan Lemon 		tp->t_starttime = ticks;
1647a0292f23SGarrett Wollman 		if (tp->t_flags & TF_NEEDFIN) {
1648a0292f23SGarrett Wollman 			tp->t_state = TCPS_FIN_WAIT_1;
1649a0292f23SGarrett Wollman 			tp->t_flags &= ~TF_NEEDFIN;
16507ff19458SPaul Traina 		} else {
1651a0292f23SGarrett Wollman 			tp->t_state = TCPS_ESTABLISHED;
16529b8b58e0SJonathan Lemon 			callout_reset(tp->tt_keep, tcp_keepidle,
16539b8b58e0SJonathan Lemon 				      tcp_timer_keep, tp);
16547ff19458SPaul Traina 		}
1655a0292f23SGarrett Wollman 		/*
1656a0292f23SGarrett Wollman 		 * If segment contains data or ACK, will call tcp_reass()
1657a0292f23SGarrett Wollman 		 * later; if not, do so now to pass queued data to user.
1658a0292f23SGarrett Wollman 		 */
1659fb59c426SYoshinobu Inoue 		if (tlen == 0 && (thflags & TH_FIN) == 0)
1660fb59c426SYoshinobu Inoue 			(void) tcp_reass(tp, (struct tcphdr *)0, 0,
1661a0292f23SGarrett Wollman 			    (struct mbuf *)0);
1662fb59c426SYoshinobu Inoue 		tp->snd_wl1 = th->th_seq - 1;
166393b0017fSPhilippe Charnier 		/* FALLTHROUGH */
1664df8bae1dSRodney W. Grimes 
1665df8bae1dSRodney W. Grimes 	/*
1666df8bae1dSRodney W. Grimes 	 * In ESTABLISHED state: drop duplicate ACKs; ACK out of range
1667df8bae1dSRodney W. Grimes 	 * ACKs.  If the ack is in the range
1668fb59c426SYoshinobu Inoue 	 *	tp->snd_una < th->th_ack <= tp->snd_max
1669fb59c426SYoshinobu Inoue 	 * then advance tp->snd_una to th->th_ack and drop
1670df8bae1dSRodney W. Grimes 	 * data from the retransmission queue.  If this ACK reflects
1671df8bae1dSRodney W. Grimes 	 * more up to date window information we update our window information.
1672df8bae1dSRodney W. Grimes 	 */
1673df8bae1dSRodney W. Grimes 	case TCPS_ESTABLISHED:
1674df8bae1dSRodney W. Grimes 	case TCPS_FIN_WAIT_1:
1675df8bae1dSRodney W. Grimes 	case TCPS_FIN_WAIT_2:
1676df8bae1dSRodney W. Grimes 	case TCPS_CLOSE_WAIT:
1677df8bae1dSRodney W. Grimes 	case TCPS_CLOSING:
1678df8bae1dSRodney W. Grimes 	case TCPS_LAST_ACK:
1679df8bae1dSRodney W. Grimes 	case TCPS_TIME_WAIT:
1680df8bae1dSRodney W. Grimes 
1681fb59c426SYoshinobu Inoue 		if (SEQ_LEQ(th->th_ack, tp->snd_una)) {
1682fb59c426SYoshinobu Inoue 			if (tlen == 0 && tiwin == tp->snd_wnd) {
1683df8bae1dSRodney W. Grimes 				tcpstat.tcps_rcvdupack++;
1684df8bae1dSRodney W. Grimes 				/*
1685df8bae1dSRodney W. Grimes 				 * If we have outstanding data (other than
1686df8bae1dSRodney W. Grimes 				 * a window probe), this is a completely
1687df8bae1dSRodney W. Grimes 				 * duplicate ack (ie, window info didn't
1688df8bae1dSRodney W. Grimes 				 * change), the ack is the biggest we've
1689df8bae1dSRodney W. Grimes 				 * seen and we've seen exactly our rexmt
1690df8bae1dSRodney W. Grimes 				 * threshhold of them, assume a packet
1691df8bae1dSRodney W. Grimes 				 * has been dropped and retransmit it.
1692df8bae1dSRodney W. Grimes 				 * Kludge snd_nxt & the congestion
1693df8bae1dSRodney W. Grimes 				 * window so we send only this one
1694df8bae1dSRodney W. Grimes 				 * packet.
1695df8bae1dSRodney W. Grimes 				 *
1696df8bae1dSRodney W. Grimes 				 * We know we're losing at the current
1697df8bae1dSRodney W. Grimes 				 * window size so do congestion avoidance
1698df8bae1dSRodney W. Grimes 				 * (set ssthresh to half the current window
1699df8bae1dSRodney W. Grimes 				 * and pull our congestion window back to
1700df8bae1dSRodney W. Grimes 				 * the new ssthresh).
1701df8bae1dSRodney W. Grimes 				 *
1702df8bae1dSRodney W. Grimes 				 * Dup acks mean that packets have left the
1703df8bae1dSRodney W. Grimes 				 * network (they're now cached at the receiver)
1704df8bae1dSRodney W. Grimes 				 * so bump cwnd by the amount in the receiver
1705df8bae1dSRodney W. Grimes 				 * to keep a constant cwnd packets in the
1706df8bae1dSRodney W. Grimes 				 * network.
1707df8bae1dSRodney W. Grimes 				 */
17089b8b58e0SJonathan Lemon 				if (!callout_active(tp->tt_rexmt) ||
1709fb59c426SYoshinobu Inoue 				    th->th_ack != tp->snd_una)
1710df8bae1dSRodney W. Grimes 					tp->t_dupacks = 0;
1711df8bae1dSRodney W. Grimes 				else if (++tp->t_dupacks == tcprexmtthresh) {
1712df8bae1dSRodney W. Grimes 					tcp_seq onxt = tp->snd_nxt;
1713df8bae1dSRodney W. Grimes 					u_int win =
1714df8bae1dSRodney W. Grimes 					    min(tp->snd_wnd, tp->snd_cwnd) / 2 /
1715df8bae1dSRodney W. Grimes 						tp->t_maxseg;
1716c068736aSJeffrey Hsu 					if (tcp_do_newreno &&
1717c068736aSJeffrey Hsu 					    SEQ_LT(th->th_ack,
171846f58482SJonathan Lemon 						   tp->snd_recover)) {
171946f58482SJonathan Lemon 						/* False retransmit, should not
172046f58482SJonathan Lemon 						 * cut window
172146f58482SJonathan Lemon 						 */
172246f58482SJonathan Lemon 						tp->snd_cwnd += tp->t_maxseg;
172346f58482SJonathan Lemon 						tp->t_dupacks = 0;
172446f58482SJonathan Lemon 						(void) tcp_output(tp);
172546f58482SJonathan Lemon 						goto drop;
172646f58482SJonathan Lemon 					}
1727df8bae1dSRodney W. Grimes 					if (win < 2)
1728df8bae1dSRodney W. Grimes 						win = 2;
1729df8bae1dSRodney W. Grimes 					tp->snd_ssthresh = win * tp->t_maxseg;
173046f58482SJonathan Lemon 					tp->snd_recover = tp->snd_max;
17319b8b58e0SJonathan Lemon 					callout_stop(tp->tt_rexmt);
17329b8b58e0SJonathan Lemon 					tp->t_rtttime = 0;
1733fb59c426SYoshinobu Inoue 					tp->snd_nxt = th->th_ack;
1734df8bae1dSRodney W. Grimes 					tp->snd_cwnd = tp->t_maxseg;
1735df8bae1dSRodney W. Grimes 					(void) tcp_output(tp);
1736df8bae1dSRodney W. Grimes 					tp->snd_cwnd = tp->snd_ssthresh +
1737df8bae1dSRodney W. Grimes 						tp->t_maxseg * tp->t_dupacks;
1738df8bae1dSRodney W. Grimes 					if (SEQ_GT(onxt, tp->snd_nxt))
1739df8bae1dSRodney W. Grimes 						tp->snd_nxt = onxt;
1740df8bae1dSRodney W. Grimes 					goto drop;
1741df8bae1dSRodney W. Grimes 				} else if (tp->t_dupacks > tcprexmtthresh) {
1742df8bae1dSRodney W. Grimes 					tp->snd_cwnd += tp->t_maxseg;
1743df8bae1dSRodney W. Grimes 					(void) tcp_output(tp);
1744df8bae1dSRodney W. Grimes 					goto drop;
1745df8bae1dSRodney W. Grimes 				}
1746df8bae1dSRodney W. Grimes 			} else
1747df8bae1dSRodney W. Grimes 				tp->t_dupacks = 0;
1748df8bae1dSRodney W. Grimes 			break;
1749df8bae1dSRodney W. Grimes 		}
1750df8bae1dSRodney W. Grimes 		/*
1751df8bae1dSRodney W. Grimes 		 * If the congestion window was inflated to account
1752df8bae1dSRodney W. Grimes 		 * for the other side's cached packets, retract it.
1753df8bae1dSRodney W. Grimes 		 */
1754c068736aSJeffrey Hsu 		if (tcp_do_newreno) {
1755c068736aSJeffrey Hsu 			int is_partialack = SEQ_LT(th->th_ack, tp->snd_recover);
1756c068736aSJeffrey Hsu 			if (tp->t_dupacks >= tcprexmtthresh) {
1757c068736aSJeffrey Hsu 				if (is_partialack) {
1758c068736aSJeffrey Hsu 					tcp_newreno_partial_ack(tp, th);
1759c068736aSJeffrey Hsu 				} else {
1760c068736aSJeffrey Hsu 					/*
1761c068736aSJeffrey Hsu 					 * Window inflation should have left us
1762c068736aSJeffrey Hsu 					 * with approximately snd_ssthresh
1763c068736aSJeffrey Hsu 					 * outstanding data.
1764c068736aSJeffrey Hsu 					 * But in case we would be inclined to
1765c068736aSJeffrey Hsu 					 * send a burst, better to do it via
1766c068736aSJeffrey Hsu 					 * the slow start mechanism.
1767c068736aSJeffrey Hsu 					 */
1768c068736aSJeffrey Hsu 					if (SEQ_GT(th->th_ack +
1769c068736aSJeffrey Hsu 							tp->snd_ssthresh,
1770c068736aSJeffrey Hsu 						   tp->snd_max))
1771c068736aSJeffrey Hsu 						tp->snd_cwnd = tp->snd_max -
1772c068736aSJeffrey Hsu 								th->th_ack +
1773c068736aSJeffrey Hsu 								tp->t_maxseg;
1774c068736aSJeffrey Hsu 					else
1775c068736aSJeffrey Hsu 						tp->snd_cwnd = tp->snd_ssthresh;
1776c068736aSJeffrey Hsu 				}
1777c068736aSJeffrey Hsu 			}
1778c068736aSJeffrey Hsu 			/*
1779c068736aSJeffrey Hsu 			 * Reset dupacks, except on partial acks in
1780c068736aSJeffrey Hsu 			 *   fast recovery.
1781c068736aSJeffrey Hsu 			 */
1782c068736aSJeffrey Hsu 			if (!(tp->t_dupacks >= tcprexmtthresh && is_partialack))
1783c068736aSJeffrey Hsu 				tp->t_dupacks = 0;
1784c068736aSJeffrey Hsu                 } else {
1785233e8c18SGarrett Wollman                         if (tp->t_dupacks >= tcprexmtthresh &&
1786df8bae1dSRodney W. Grimes                             tp->snd_cwnd > tp->snd_ssthresh)
1787df8bae1dSRodney W. Grimes 				tp->snd_cwnd = tp->snd_ssthresh;
1788df8bae1dSRodney W. Grimes 			tp->t_dupacks = 0;
178946f58482SJonathan Lemon                 }
1790fb59c426SYoshinobu Inoue 		if (SEQ_GT(th->th_ack, tp->snd_max)) {
1791df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvacktoomuch++;
1792df8bae1dSRodney W. Grimes 			goto dropafterack;
1793df8bae1dSRodney W. Grimes 		}
1794a0292f23SGarrett Wollman 		/*
1795a0292f23SGarrett Wollman 		 * If we reach this point, ACK is not a duplicate,
1796a0292f23SGarrett Wollman 		 *     i.e., it ACKs something we sent.
1797a0292f23SGarrett Wollman 		 */
1798a0292f23SGarrett Wollman 		if (tp->t_flags & TF_NEEDSYN) {
1799a0292f23SGarrett Wollman 			/*
1800a0292f23SGarrett Wollman 			 * T/TCP: Connection was half-synchronized, and our
1801a0292f23SGarrett Wollman 			 * SYN has been ACK'd (so connection is now fully
180207e43e10SAndras Olah 			 * synchronized).  Go to non-starred state,
180307e43e10SAndras Olah 			 * increment snd_una for ACK of SYN, and check if
180407e43e10SAndras Olah 			 * we can do window scaling.
1805a0292f23SGarrett Wollman 			 */
1806a0292f23SGarrett Wollman 			tp->t_flags &= ~TF_NEEDSYN;
1807a0292f23SGarrett Wollman 			tp->snd_una++;
180807e43e10SAndras Olah 			/* Do window scaling? */
180907e43e10SAndras Olah 			if ((tp->t_flags & (TF_RCVD_SCALE|TF_REQ_SCALE)) ==
181007e43e10SAndras Olah 				(TF_RCVD_SCALE|TF_REQ_SCALE)) {
181107e43e10SAndras Olah 				tp->snd_scale = tp->requested_s_scale;
181207e43e10SAndras Olah 				tp->rcv_scale = tp->request_r_scale;
181307e43e10SAndras Olah 			}
1814a0292f23SGarrett Wollman 		}
1815a0292f23SGarrett Wollman 
1816a0292f23SGarrett Wollman process_ACK:
1817fb59c426SYoshinobu Inoue 		acked = th->th_ack - tp->snd_una;
1818df8bae1dSRodney W. Grimes 		tcpstat.tcps_rcvackpack++;
1819df8bae1dSRodney W. Grimes 		tcpstat.tcps_rcvackbyte += acked;
1820df8bae1dSRodney W. Grimes 
1821df8bae1dSRodney W. Grimes 		/*
18229b8b58e0SJonathan Lemon 		 * If we just performed our first retransmit, and the ACK
18239b8b58e0SJonathan Lemon 		 * arrives within our recovery window, then it was a mistake
18249b8b58e0SJonathan Lemon 		 * to do the retransmit in the first place.  Recover our
18259b8b58e0SJonathan Lemon 		 * original cwnd and ssthresh, and proceed to transmit where
18269b8b58e0SJonathan Lemon 		 * we left off.
18279b8b58e0SJonathan Lemon 		 */
18289b8b58e0SJonathan Lemon 		if (tp->t_rxtshift == 1 && ticks < tp->t_badrxtwin) {
1829d65bf08aSMatthew Dillon 			++tcpstat.tcps_sndrexmitbad;
18309b8b58e0SJonathan Lemon 			tp->snd_cwnd = tp->snd_cwnd_prev;
18319b8b58e0SJonathan Lemon 			tp->snd_ssthresh = tp->snd_ssthresh_prev;
18329b8b58e0SJonathan Lemon 			tp->snd_nxt = tp->snd_max;
18339b8b58e0SJonathan Lemon 			tp->t_badrxtwin = 0;	/* XXX probably not required */
18349b8b58e0SJonathan Lemon 		}
18359b8b58e0SJonathan Lemon 
18369b8b58e0SJonathan Lemon 		/*
1837df8bae1dSRodney W. Grimes 		 * If we have a timestamp reply, update smoothed
1838df8bae1dSRodney W. Grimes 		 * round trip time.  If no timestamp is present but
1839df8bae1dSRodney W. Grimes 		 * transmit timer is running and timed sequence
1840df8bae1dSRodney W. Grimes 		 * number was acked, update smoothed round trip time.
1841df8bae1dSRodney W. Grimes 		 * Since we now have an rtt measurement, cancel the
1842df8bae1dSRodney W. Grimes 		 * timer backoff (cf., Phil Karn's retransmit alg.).
1843df8bae1dSRodney W. Grimes 		 * Recompute the initial retransmit timer.
1844fa55172bSMatthew Dillon 		 *
1845fa55172bSMatthew Dillon 		 * Some boxes send broken timestamp replies
1846fa55172bSMatthew Dillon 		 * during the SYN+ACK phase, ignore
1847fa55172bSMatthew Dillon 		 * timestamps of 0 or we could calculate a
1848fa55172bSMatthew Dillon 		 * huge RTT and blow up the retransmit timer.
1849df8bae1dSRodney W. Grimes 		 */
1850fa55172bSMatthew Dillon 		if ((to.to_flags & TOF_TS) != 0 &&
1851fa55172bSMatthew Dillon 		    to.to_tsecr) {
18529b8b58e0SJonathan Lemon 			tcp_xmit_timer(tp, ticks - to.to_tsecr + 1);
1853fa55172bSMatthew Dillon 		} else if (tp->t_rtttime && SEQ_GT(th->th_ack, tp->t_rtseq)) {
18549b8b58e0SJonathan Lemon 			tcp_xmit_timer(tp, ticks - tp->t_rtttime);
1855fa55172bSMatthew Dillon 		}
18561fcc99b5SMatthew Dillon 		tcp_xmit_bandwidth_limit(tp, th->th_ack);
1857df8bae1dSRodney W. Grimes 
1858df8bae1dSRodney W. Grimes 		/*
1859df8bae1dSRodney W. Grimes 		 * If all outstanding data is acked, stop retransmit
1860df8bae1dSRodney W. Grimes 		 * timer and remember to restart (more output or persist).
1861df8bae1dSRodney W. Grimes 		 * If there is more data to be acked, restart retransmit
1862df8bae1dSRodney W. Grimes 		 * timer, using current (possibly backed-off) value.
1863df8bae1dSRodney W. Grimes 		 */
1864fb59c426SYoshinobu Inoue 		if (th->th_ack == tp->snd_max) {
18659b8b58e0SJonathan Lemon 			callout_stop(tp->tt_rexmt);
1866df8bae1dSRodney W. Grimes 			needoutput = 1;
18679b8b58e0SJonathan Lemon 		} else if (!callout_active(tp->tt_persist))
18689b8b58e0SJonathan Lemon 			callout_reset(tp->tt_rexmt, tp->t_rxtcur,
18699b8b58e0SJonathan Lemon 				      tcp_timer_rexmt, tp);
1870a0292f23SGarrett Wollman 
1871a0292f23SGarrett Wollman 		/*
1872a0292f23SGarrett Wollman 		 * If no data (only SYN) was ACK'd,
1873a0292f23SGarrett Wollman 		 *    skip rest of ACK processing.
1874a0292f23SGarrett Wollman 		 */
1875a0292f23SGarrett Wollman 		if (acked == 0)
1876a0292f23SGarrett Wollman 			goto step6;
1877a0292f23SGarrett Wollman 
1878df8bae1dSRodney W. Grimes 		/*
1879df8bae1dSRodney W. Grimes 		 * When new data is acked, open the congestion window.
1880df8bae1dSRodney W. Grimes 		 * If the window gives us less than ssthresh packets
1881df8bae1dSRodney W. Grimes 		 * in flight, open exponentially (maxseg per packet).
1882df8bae1dSRodney W. Grimes 		 * Otherwise open linearly: maxseg per window
188310be5648SGarrett Wollman 		 * (maxseg^2 / cwnd per packet).
1884df8bae1dSRodney W. Grimes 		 */
1885df8bae1dSRodney W. Grimes 		{
1886df8bae1dSRodney W. Grimes 		register u_int cw = tp->snd_cwnd;
1887df8bae1dSRodney W. Grimes 		register u_int incr = tp->t_maxseg;
1888df8bae1dSRodney W. Grimes 
1889df8bae1dSRodney W. Grimes 		if (cw > tp->snd_ssthresh)
189010be5648SGarrett Wollman 			incr = incr * incr / cw;
18918735719eSJonathan Lemon 		/*
18928735719eSJonathan Lemon 		 * If t_dupacks != 0 here, it indicates that we are still
18938735719eSJonathan Lemon 		 * in NewReno fast recovery mode, so we leave the congestion
18948735719eSJonathan Lemon 		 * window alone.
18958735719eSJonathan Lemon 		 */
1896c068736aSJeffrey Hsu 		if (!tcp_do_newreno || tp->t_dupacks == 0)
1897df8bae1dSRodney W. Grimes 			tp->snd_cwnd = min(cw + incr,TCP_MAXWIN<<tp->snd_scale);
1898df8bae1dSRodney W. Grimes 		}
1899df8bae1dSRodney W. Grimes 		if (acked > so->so_snd.sb_cc) {
1900df8bae1dSRodney W. Grimes 			tp->snd_wnd -= so->so_snd.sb_cc;
1901df8bae1dSRodney W. Grimes 			sbdrop(&so->so_snd, (int)so->so_snd.sb_cc);
1902df8bae1dSRodney W. Grimes 			ourfinisacked = 1;
1903df8bae1dSRodney W. Grimes 		} else {
1904df8bae1dSRodney W. Grimes 			sbdrop(&so->so_snd, acked);
1905df8bae1dSRodney W. Grimes 			tp->snd_wnd -= acked;
1906df8bae1dSRodney W. Grimes 			ourfinisacked = 0;
1907df8bae1dSRodney W. Grimes 		}
1908df8bae1dSRodney W. Grimes 		sowwakeup(so);
1909fb59c426SYoshinobu Inoue 		tp->snd_una = th->th_ack;
1910df8bae1dSRodney W. Grimes 		if (SEQ_LT(tp->snd_nxt, tp->snd_una))
1911df8bae1dSRodney W. Grimes 			tp->snd_nxt = tp->snd_una;
1912df8bae1dSRodney W. Grimes 
1913df8bae1dSRodney W. Grimes 		switch (tp->t_state) {
1914df8bae1dSRodney W. Grimes 
1915df8bae1dSRodney W. Grimes 		/*
1916df8bae1dSRodney W. Grimes 		 * In FIN_WAIT_1 STATE in addition to the processing
1917df8bae1dSRodney W. Grimes 		 * for the ESTABLISHED state if our FIN is now acknowledged
1918df8bae1dSRodney W. Grimes 		 * then enter FIN_WAIT_2.
1919df8bae1dSRodney W. Grimes 		 */
1920df8bae1dSRodney W. Grimes 		case TCPS_FIN_WAIT_1:
1921df8bae1dSRodney W. Grimes 			if (ourfinisacked) {
1922df8bae1dSRodney W. Grimes 				/*
1923df8bae1dSRodney W. Grimes 				 * If we can't receive any more
1924df8bae1dSRodney W. Grimes 				 * data, then closing user can proceed.
1925df8bae1dSRodney W. Grimes 				 * Starting the timer is contrary to the
1926df8bae1dSRodney W. Grimes 				 * specification, but if we don't get a FIN
1927df8bae1dSRodney W. Grimes 				 * we'll hang forever.
1928df8bae1dSRodney W. Grimes 				 */
1929df8bae1dSRodney W. Grimes 				if (so->so_state & SS_CANTRCVMORE) {
193003e49181SSeigo Tanimura 					soisdisconnected(so);
19319b8b58e0SJonathan Lemon 					callout_reset(tp->tt_2msl, tcp_maxidle,
19329b8b58e0SJonathan Lemon 						      tcp_timer_2msl, tp);
19334cc20ab1SSeigo Tanimura 				}
1934df8bae1dSRodney W. Grimes 				tp->t_state = TCPS_FIN_WAIT_2;
1935df8bae1dSRodney W. Grimes 			}
1936df8bae1dSRodney W. Grimes 			break;
1937df8bae1dSRodney W. Grimes 
1938df8bae1dSRodney W. Grimes 	 	/*
1939df8bae1dSRodney W. Grimes 		 * In CLOSING STATE in addition to the processing for
1940df8bae1dSRodney W. Grimes 		 * the ESTABLISHED state if the ACK acknowledges our FIN
1941df8bae1dSRodney W. Grimes 		 * then enter the TIME-WAIT state, otherwise ignore
1942df8bae1dSRodney W. Grimes 		 * the segment.
1943df8bae1dSRodney W. Grimes 		 */
1944df8bae1dSRodney W. Grimes 		case TCPS_CLOSING:
1945df8bae1dSRodney W. Grimes 			if (ourfinisacked) {
1946df8bae1dSRodney W. Grimes 				tp->t_state = TCPS_TIME_WAIT;
1947df8bae1dSRodney W. Grimes 				tcp_canceltimers(tp);
1948a0292f23SGarrett Wollman 				/* Shorten TIME_WAIT [RFC-1644, p.28] */
1949a0292f23SGarrett Wollman 				if (tp->cc_recv != 0 &&
19509b8b58e0SJonathan Lemon 				    (ticks - tp->t_starttime) < tcp_msl)
19519b8b58e0SJonathan Lemon 					callout_reset(tp->tt_2msl,
19529b8b58e0SJonathan Lemon 						      tp->t_rxtcur *
19539b8b58e0SJonathan Lemon 						      TCPTV_TWTRUNC,
19549b8b58e0SJonathan Lemon 						      tcp_timer_2msl, tp);
1955a0292f23SGarrett Wollman 				else
19569b8b58e0SJonathan Lemon 					callout_reset(tp->tt_2msl, 2 * tcp_msl,
19579b8b58e0SJonathan Lemon 						      tcp_timer_2msl, tp);
1958df8bae1dSRodney W. Grimes 				soisdisconnected(so);
1959df8bae1dSRodney W. Grimes 			}
1960df8bae1dSRodney W. Grimes 			break;
1961df8bae1dSRodney W. Grimes 
1962df8bae1dSRodney W. Grimes 		/*
1963df8bae1dSRodney W. Grimes 		 * In LAST_ACK, we may still be waiting for data to drain
1964df8bae1dSRodney W. Grimes 		 * and/or to be acked, as well as for the ack of our FIN.
1965df8bae1dSRodney W. Grimes 		 * If our FIN is now acknowledged, delete the TCB,
1966df8bae1dSRodney W. Grimes 		 * enter the closed state and return.
1967df8bae1dSRodney W. Grimes 		 */
1968df8bae1dSRodney W. Grimes 		case TCPS_LAST_ACK:
1969df8bae1dSRodney W. Grimes 			if (ourfinisacked) {
1970df8bae1dSRodney W. Grimes 				tp = tcp_close(tp);
1971df8bae1dSRodney W. Grimes 				goto drop;
1972df8bae1dSRodney W. Grimes 			}
1973df8bae1dSRodney W. Grimes 			break;
1974df8bae1dSRodney W. Grimes 
1975df8bae1dSRodney W. Grimes 		/*
1976df8bae1dSRodney W. Grimes 		 * In TIME_WAIT state the only thing that should arrive
1977df8bae1dSRodney W. Grimes 		 * is a retransmission of the remote FIN.  Acknowledge
1978df8bae1dSRodney W. Grimes 		 * it and restart the finack timer.
1979df8bae1dSRodney W. Grimes 		 */
1980df8bae1dSRodney W. Grimes 		case TCPS_TIME_WAIT:
19819b8b58e0SJonathan Lemon 			callout_reset(tp->tt_2msl, 2 * tcp_msl,
19829b8b58e0SJonathan Lemon 				      tcp_timer_2msl, tp);
1983df8bae1dSRodney W. Grimes 			goto dropafterack;
1984df8bae1dSRodney W. Grimes 		}
1985df8bae1dSRodney W. Grimes 	}
1986df8bae1dSRodney W. Grimes 
1987df8bae1dSRodney W. Grimes step6:
1988df8bae1dSRodney W. Grimes 	/*
1989df8bae1dSRodney W. Grimes 	 * Update window information.
1990df8bae1dSRodney W. Grimes 	 * Don't look at window if no ACK: TAC's send garbage on first SYN.
1991df8bae1dSRodney W. Grimes 	 */
1992fb59c426SYoshinobu Inoue 	if ((thflags & TH_ACK) &&
1993fb59c426SYoshinobu Inoue 	    (SEQ_LT(tp->snd_wl1, th->th_seq) ||
1994fb59c426SYoshinobu Inoue 	    (tp->snd_wl1 == th->th_seq && (SEQ_LT(tp->snd_wl2, th->th_ack) ||
1995fb59c426SYoshinobu Inoue 	     (tp->snd_wl2 == th->th_ack && tiwin > tp->snd_wnd))))) {
1996df8bae1dSRodney W. Grimes 		/* keep track of pure window updates */
1997fb59c426SYoshinobu Inoue 		if (tlen == 0 &&
1998fb59c426SYoshinobu Inoue 		    tp->snd_wl2 == th->th_ack && tiwin > tp->snd_wnd)
1999df8bae1dSRodney W. Grimes 			tcpstat.tcps_rcvwinupd++;
2000df8bae1dSRodney W. Grimes 		tp->snd_wnd = tiwin;
2001fb59c426SYoshinobu Inoue 		tp->snd_wl1 = th->th_seq;
2002fb59c426SYoshinobu Inoue 		tp->snd_wl2 = th->th_ack;
2003df8bae1dSRodney W. Grimes 		if (tp->snd_wnd > tp->max_sndwnd)
2004df8bae1dSRodney W. Grimes 			tp->max_sndwnd = tp->snd_wnd;
2005df8bae1dSRodney W. Grimes 		needoutput = 1;
2006df8bae1dSRodney W. Grimes 	}
2007df8bae1dSRodney W. Grimes 
2008df8bae1dSRodney W. Grimes 	/*
2009df8bae1dSRodney W. Grimes 	 * Process segments with URG.
2010df8bae1dSRodney W. Grimes 	 */
2011fb59c426SYoshinobu Inoue 	if ((thflags & TH_URG) && th->th_urp &&
2012df8bae1dSRodney W. Grimes 	    TCPS_HAVERCVDFIN(tp->t_state) == 0) {
2013df8bae1dSRodney W. Grimes 		/*
2014df8bae1dSRodney W. Grimes 		 * This is a kludge, but if we receive and accept
2015df8bae1dSRodney W. Grimes 		 * random urgent pointers, we'll crash in
2016df8bae1dSRodney W. Grimes 		 * soreceive.  It's hard to imagine someone
2017df8bae1dSRodney W. Grimes 		 * actually wanting to send this much urgent data.
2018df8bae1dSRodney W. Grimes 		 */
2019fb59c426SYoshinobu Inoue 		if (th->th_urp + so->so_rcv.sb_cc > sb_max) {
2020fb59c426SYoshinobu Inoue 			th->th_urp = 0;			/* XXX */
2021fb59c426SYoshinobu Inoue 			thflags &= ~TH_URG;		/* XXX */
2022df8bae1dSRodney W. Grimes 			goto dodata;			/* XXX */
2023df8bae1dSRodney W. Grimes 		}
2024df8bae1dSRodney W. Grimes 		/*
2025df8bae1dSRodney W. Grimes 		 * If this segment advances the known urgent pointer,
2026df8bae1dSRodney W. Grimes 		 * then mark the data stream.  This should not happen
2027df8bae1dSRodney W. Grimes 		 * in CLOSE_WAIT, CLOSING, LAST_ACK or TIME_WAIT STATES since
2028df8bae1dSRodney W. Grimes 		 * a FIN has been received from the remote side.
2029df8bae1dSRodney W. Grimes 		 * In these states we ignore the URG.
2030df8bae1dSRodney W. Grimes 		 *
2031df8bae1dSRodney W. Grimes 		 * According to RFC961 (Assigned Protocols),
2032df8bae1dSRodney W. Grimes 		 * the urgent pointer points to the last octet
2033df8bae1dSRodney W. Grimes 		 * of urgent data.  We continue, however,
2034df8bae1dSRodney W. Grimes 		 * to consider it to indicate the first octet
2035df8bae1dSRodney W. Grimes 		 * of data past the urgent section as the original
2036df8bae1dSRodney W. Grimes 		 * spec states (in one of two places).
2037df8bae1dSRodney W. Grimes 		 */
2038fb59c426SYoshinobu Inoue 		if (SEQ_GT(th->th_seq+th->th_urp, tp->rcv_up)) {
2039fb59c426SYoshinobu Inoue 			tp->rcv_up = th->th_seq + th->th_urp;
2040df8bae1dSRodney W. Grimes 			so->so_oobmark = so->so_rcv.sb_cc +
2041df8bae1dSRodney W. Grimes 			    (tp->rcv_up - tp->rcv_nxt) - 1;
20424cc20ab1SSeigo Tanimura 			if (so->so_oobmark == 0)
2043df8bae1dSRodney W. Grimes 				so->so_state |= SS_RCVATMARK;
2044df8bae1dSRodney W. Grimes 			sohasoutofband(so);
2045df8bae1dSRodney W. Grimes 			tp->t_oobflags &= ~(TCPOOB_HAVEDATA | TCPOOB_HADDATA);
2046df8bae1dSRodney W. Grimes 		}
2047df8bae1dSRodney W. Grimes 		/*
2048df8bae1dSRodney W. Grimes 		 * Remove out of band data so doesn't get presented to user.
2049df8bae1dSRodney W. Grimes 		 * This can happen independent of advancing the URG pointer,
2050df8bae1dSRodney W. Grimes 		 * but if two URG's are pending at once, some out-of-band
2051df8bae1dSRodney W. Grimes 		 * data may creep in... ick.
2052df8bae1dSRodney W. Grimes 		 */
205330613f56SJeffrey Hsu 		if (th->th_urp <= (u_long)tlen &&
205430613f56SJeffrey Hsu 		    !(so->so_options & SO_OOBINLINE)) {
205530613f56SJeffrey Hsu 			/* hdr drop is delayed */
205630613f56SJeffrey Hsu 			tcp_pulloutofband(so, th, m, drop_hdrlen);
205730613f56SJeffrey Hsu 		}
2058c068736aSJeffrey Hsu 	} else {
2059df8bae1dSRodney W. Grimes 		/*
2060df8bae1dSRodney W. Grimes 		 * If no out of band data is expected,
2061df8bae1dSRodney W. Grimes 		 * pull receive urgent pointer along
2062df8bae1dSRodney W. Grimes 		 * with the receive window.
2063df8bae1dSRodney W. Grimes 		 */
2064df8bae1dSRodney W. Grimes 		if (SEQ_GT(tp->rcv_nxt, tp->rcv_up))
2065df8bae1dSRodney W. Grimes 			tp->rcv_up = tp->rcv_nxt;
2066c068736aSJeffrey Hsu 	}
2067df8bae1dSRodney W. Grimes dodata:							/* XXX */
2068f76fcf6dSJeffrey Hsu 	KASSERT(headlocked, ("headlocked"));
2069f76fcf6dSJeffrey Hsu 	INP_INFO_WUNLOCK(&tcbinfo);
2070f76fcf6dSJeffrey Hsu 	headlocked = 0;
2071df8bae1dSRodney W. Grimes 	/*
2072df8bae1dSRodney W. Grimes 	 * Process the segment text, merging it into the TCP sequencing queue,
2073df8bae1dSRodney W. Grimes 	 * and arranging for acknowledgment of receipt if necessary.
2074df8bae1dSRodney W. Grimes 	 * This process logically involves adjusting tp->rcv_wnd as data
2075df8bae1dSRodney W. Grimes 	 * is presented to the user (this happens in tcp_usrreq.c,
2076df8bae1dSRodney W. Grimes 	 * case PRU_RCVD).  If a FIN has already been received on this
2077df8bae1dSRodney W. Grimes 	 * connection then we just ignore the text.
2078df8bae1dSRodney W. Grimes 	 */
2079fb59c426SYoshinobu Inoue 	if ((tlen || (thflags & TH_FIN)) &&
2080df8bae1dSRodney W. Grimes 	    TCPS_HAVERCVDFIN(tp->t_state) == 0) {
2081fb59c426SYoshinobu Inoue 		m_adj(m, drop_hdrlen);	/* delayed header drop */
2082e4b64281SJesper Skriver 		/*
2083c068736aSJeffrey Hsu 		 * Insert segment which includes th into TCP reassembly queue
2084c068736aSJeffrey Hsu 		 * with control block tp.  Set thflags to whether reassembly now
2085c068736aSJeffrey Hsu 		 * includes a segment with FIN.  This handles the common case
2086c068736aSJeffrey Hsu 		 * inline (segment is the next to be received on an established
2087c068736aSJeffrey Hsu 		 * connection, and the queue is empty), avoiding linkage into
2088c068736aSJeffrey Hsu 		 * and removal from the queue and repetition of various
2089c068736aSJeffrey Hsu 		 * conversions.
2090c068736aSJeffrey Hsu 		 * Set DELACK for segments received in order, but ack
2091c068736aSJeffrey Hsu 		 * immediately when segments are out of order (so
2092c068736aSJeffrey Hsu 		 * fast retransmit can work).
2093e4b64281SJesper Skriver 		 */
2094e4b64281SJesper Skriver 		if (th->th_seq == tp->rcv_nxt &&
2095e4b64281SJesper Skriver 		    LIST_EMPTY(&tp->t_segq) &&
2096e4b64281SJesper Skriver 		    TCPS_HAVEESTABLISHED(tp->t_state)) {
2097e4b64281SJesper Skriver 			if (DELAY_ACK(tp))
2098e4b64281SJesper Skriver 				callout_reset(tp->tt_delack, tcp_delacktime,
2099e4b64281SJesper Skriver 					      tcp_timer_delack, tp);
2100e4b64281SJesper Skriver 			else
2101e4b64281SJesper Skriver 				tp->t_flags |= TF_ACKNOW;
2102e4b64281SJesper Skriver 			tp->rcv_nxt += tlen;
2103e4b64281SJesper Skriver 			thflags = th->th_flags & TH_FIN;
2104e4b64281SJesper Skriver 			tcpstat.tcps_rcvpack++;
2105e4b64281SJesper Skriver 			tcpstat.tcps_rcvbyte += tlen;
2106e4b64281SJesper Skriver 			ND6_HINT(tp);
2107c1c36a2cSMike Silbersack 			if (so->so_state & SS_CANTRCVMORE)
2108c1c36a2cSMike Silbersack 				m_freem(m);
2109c1c36a2cSMike Silbersack 			else
2110e4b64281SJesper Skriver 				sbappend(&so->so_rcv, m);
2111e4b64281SJesper Skriver 			sorwakeup(so);
2112e4b64281SJesper Skriver 		} else {
2113e4b64281SJesper Skriver 			thflags = tcp_reass(tp, th, &tlen, m);
2114e4b64281SJesper Skriver 			tp->t_flags |= TF_ACKNOW;
2115e4b64281SJesper Skriver 		}
2116e4b64281SJesper Skriver 
2117df8bae1dSRodney W. Grimes 		/*
2118df8bae1dSRodney W. Grimes 		 * Note the amount of data that peer has sent into
2119df8bae1dSRodney W. Grimes 		 * our window, in order to estimate the sender's
2120df8bae1dSRodney W. Grimes 		 * buffer size.
2121df8bae1dSRodney W. Grimes 		 */
2122df8bae1dSRodney W. Grimes 		len = so->so_rcv.sb_hiwat - (tp->rcv_adv - tp->rcv_nxt);
2123df8bae1dSRodney W. Grimes 	} else {
2124df8bae1dSRodney W. Grimes 		m_freem(m);
2125fb59c426SYoshinobu Inoue 		thflags &= ~TH_FIN;
2126df8bae1dSRodney W. Grimes 	}
2127df8bae1dSRodney W. Grimes 
2128df8bae1dSRodney W. Grimes 	/*
2129df8bae1dSRodney W. Grimes 	 * If FIN is received ACK the FIN and let the user know
2130df8bae1dSRodney W. Grimes 	 * that the connection is closing.
2131df8bae1dSRodney W. Grimes 	 */
2132fb59c426SYoshinobu Inoue 	if (thflags & TH_FIN) {
2133df8bae1dSRodney W. Grimes 		if (TCPS_HAVERCVDFIN(tp->t_state) == 0) {
2134df8bae1dSRodney W. Grimes 			socantrcvmore(so);
2135a0292f23SGarrett Wollman 			/*
2136a0292f23SGarrett Wollman 			 * If connection is half-synchronized
2137d3eede9dSAndras Olah 			 * (ie NEEDSYN flag on) then delay ACK,
2138a0292f23SGarrett Wollman 			 * so it may be piggybacked when SYN is sent.
2139a0292f23SGarrett Wollman 			 * Otherwise, since we received a FIN then no
2140a0292f23SGarrett Wollman 			 * more input can be expected, send ACK now.
2141a0292f23SGarrett Wollman 			 */
2142d8c85a26SJonathan Lemon 			if (DELAY_ACK(tp) && (tp->t_flags & TF_NEEDSYN))
21439b8b58e0SJonathan Lemon                                 callout_reset(tp->tt_delack, tcp_delacktime,
21449b8b58e0SJonathan Lemon                                     tcp_timer_delack, tp);
2145a0292f23SGarrett Wollman 			else
2146df8bae1dSRodney W. Grimes 				tp->t_flags |= TF_ACKNOW;
2147df8bae1dSRodney W. Grimes 			tp->rcv_nxt++;
2148df8bae1dSRodney W. Grimes 		}
2149df8bae1dSRodney W. Grimes 		switch (tp->t_state) {
2150df8bae1dSRodney W. Grimes 
2151df8bae1dSRodney W. Grimes 	 	/*
2152df8bae1dSRodney W. Grimes 		 * In SYN_RECEIVED and ESTABLISHED STATES
2153df8bae1dSRodney W. Grimes 		 * enter the CLOSE_WAIT state.
2154df8bae1dSRodney W. Grimes 		 */
2155df8bae1dSRodney W. Grimes 		case TCPS_SYN_RECEIVED:
21569b8b58e0SJonathan Lemon 			tp->t_starttime = ticks;
21579b8b58e0SJonathan Lemon 			/*FALLTHROUGH*/
2158df8bae1dSRodney W. Grimes 		case TCPS_ESTABLISHED:
2159df8bae1dSRodney W. Grimes 			tp->t_state = TCPS_CLOSE_WAIT;
2160df8bae1dSRodney W. Grimes 			break;
2161df8bae1dSRodney W. Grimes 
2162df8bae1dSRodney W. Grimes 	 	/*
2163df8bae1dSRodney W. Grimes 		 * If still in FIN_WAIT_1 STATE FIN has not been acked so
2164df8bae1dSRodney W. Grimes 		 * enter the CLOSING state.
2165df8bae1dSRodney W. Grimes 		 */
2166df8bae1dSRodney W. Grimes 		case TCPS_FIN_WAIT_1:
2167df8bae1dSRodney W. Grimes 			tp->t_state = TCPS_CLOSING;
2168df8bae1dSRodney W. Grimes 			break;
2169df8bae1dSRodney W. Grimes 
2170df8bae1dSRodney W. Grimes 	 	/*
2171df8bae1dSRodney W. Grimes 		 * In FIN_WAIT_2 state enter the TIME_WAIT state,
2172df8bae1dSRodney W. Grimes 		 * starting the time-wait timer, turning off the other
2173df8bae1dSRodney W. Grimes 		 * standard timers.
2174df8bae1dSRodney W. Grimes 		 */
2175df8bae1dSRodney W. Grimes 		case TCPS_FIN_WAIT_2:
2176df8bae1dSRodney W. Grimes 			tp->t_state = TCPS_TIME_WAIT;
2177df8bae1dSRodney W. Grimes 			tcp_canceltimers(tp);
2178a0292f23SGarrett Wollman 			/* Shorten TIME_WAIT [RFC-1644, p.28] */
2179a0292f23SGarrett Wollman 			if (tp->cc_recv != 0 &&
21809b8b58e0SJonathan Lemon 			    (ticks - tp->t_starttime) < tcp_msl) {
21819b8b58e0SJonathan Lemon 				callout_reset(tp->tt_2msl,
21829b8b58e0SJonathan Lemon 					      tp->t_rxtcur * TCPTV_TWTRUNC,
21839b8b58e0SJonathan Lemon 					      tcp_timer_2msl, tp);
2184a0292f23SGarrett Wollman 				/* For transaction client, force ACK now. */
2185a0292f23SGarrett Wollman 				tp->t_flags |= TF_ACKNOW;
2186a0292f23SGarrett Wollman 			}
2187a0292f23SGarrett Wollman 			else
21889b8b58e0SJonathan Lemon 				callout_reset(tp->tt_2msl, 2 * tcp_msl,
21899b8b58e0SJonathan Lemon 					      tcp_timer_2msl, tp);
2190df8bae1dSRodney W. Grimes 			soisdisconnected(so);
2191df8bae1dSRodney W. Grimes 			break;
2192df8bae1dSRodney W. Grimes 
2193df8bae1dSRodney W. Grimes 		/*
2194df8bae1dSRodney W. Grimes 		 * In TIME_WAIT state restart the 2 MSL time_wait timer.
2195df8bae1dSRodney W. Grimes 		 */
2196df8bae1dSRodney W. Grimes 		case TCPS_TIME_WAIT:
21979b8b58e0SJonathan Lemon 			callout_reset(tp->tt_2msl, 2 * tcp_msl,
21989b8b58e0SJonathan Lemon 				      tcp_timer_2msl, tp);
2199df8bae1dSRodney W. Grimes 			break;
2200df8bae1dSRodney W. Grimes 		}
2201df8bae1dSRodney W. Grimes 	}
2202610ee2f9SDavid Greenman #ifdef TCPDEBUG
22034cc20ab1SSeigo Tanimura 	if (so->so_options & SO_DEBUG)
2204fb59c426SYoshinobu Inoue 		tcp_trace(TA_INPUT, ostate, tp, (void *)tcp_saveipgen,
2205fb59c426SYoshinobu Inoue 			  &tcp_savetcp, 0);
2206610ee2f9SDavid Greenman #endif
2207df8bae1dSRodney W. Grimes 
2208df8bae1dSRodney W. Grimes 	/*
2209df8bae1dSRodney W. Grimes 	 * Return any desired output.
2210df8bae1dSRodney W. Grimes 	 */
2211df8bae1dSRodney W. Grimes 	if (needoutput || (tp->t_flags & TF_ACKNOW))
2212df8bae1dSRodney W. Grimes 		(void) tcp_output(tp);
2213f76fcf6dSJeffrey Hsu 	INP_UNLOCK(inp);
2214df8bae1dSRodney W. Grimes 	return;
2215df8bae1dSRodney W. Grimes 
2216df8bae1dSRodney W. Grimes dropafterack:
2217df8bae1dSRodney W. Grimes 	/*
2218df8bae1dSRodney W. Grimes 	 * Generate an ACK dropping incoming segment if it occupies
2219df8bae1dSRodney W. Grimes 	 * sequence space, where the ACK reflects our state.
222080ab7c0eSGarrett Wollman 	 *
222180ab7c0eSGarrett Wollman 	 * We can now skip the test for the RST flag since all
222280ab7c0eSGarrett Wollman 	 * paths to this code happen after packets containing
222380ab7c0eSGarrett Wollman 	 * RST have been dropped.
222480ab7c0eSGarrett Wollman 	 *
222580ab7c0eSGarrett Wollman 	 * In the SYN-RECEIVED state, don't send an ACK unless the
222680ab7c0eSGarrett Wollman 	 * segment we received passes the SYN-RECEIVED ACK test.
222780ab7c0eSGarrett Wollman 	 * If it fails send a RST.  This breaks the loop in the
222880ab7c0eSGarrett Wollman 	 * "LAND" DoS attack, and also prevents an ACK storm
222980ab7c0eSGarrett Wollman 	 * between two listening ports that have been sent forged
223080ab7c0eSGarrett Wollman 	 * SYN segments, each with the source address of the other.
2231df8bae1dSRodney W. Grimes 	 */
2232fb59c426SYoshinobu Inoue 	if (tp->t_state == TCPS_SYN_RECEIVED && (thflags & TH_ACK) &&
2233fb59c426SYoshinobu Inoue 	    (SEQ_GT(tp->snd_una, th->th_ack) ||
2234a57815efSBosko Milekic 	     SEQ_GT(th->th_ack, tp->snd_max)) ) {
2235a57815efSBosko Milekic 		rstreason = BANDLIM_RST_OPENPORT;
2236a57815efSBosko Milekic 		goto dropwithreset;
2237a57815efSBosko Milekic 	}
2238a0292f23SGarrett Wollman #ifdef TCPDEBUG
22394cc20ab1SSeigo Tanimura 	if (so->so_options & SO_DEBUG)
2240fb59c426SYoshinobu Inoue 		tcp_trace(TA_DROP, ostate, tp, (void *)tcp_saveipgen,
2241fb59c426SYoshinobu Inoue 			  &tcp_savetcp, 0);
2242a0292f23SGarrett Wollman #endif
2243f76fcf6dSJeffrey Hsu 	if (headlocked)
2244f76fcf6dSJeffrey Hsu 		INP_INFO_WUNLOCK(&tcbinfo);
2245df8bae1dSRodney W. Grimes 	m_freem(m);
2246df8bae1dSRodney W. Grimes 	tp->t_flags |= TF_ACKNOW;
2247df8bae1dSRodney W. Grimes 	(void) tcp_output(tp);
2248f76fcf6dSJeffrey Hsu 	INP_UNLOCK(inp);
2249df8bae1dSRodney W. Grimes 	return;
2250df8bae1dSRodney W. Grimes 
2251df8bae1dSRodney W. Grimes dropwithreset:
2252df8bae1dSRodney W. Grimes 	/*
2253df8bae1dSRodney W. Grimes 	 * Generate a RST, dropping incoming segment.
2254df8bae1dSRodney W. Grimes 	 * Make ACK acceptable to originator of segment.
2255df8bae1dSRodney W. Grimes 	 * Don't bother to respond if destination was broadcast/multicast.
2256df8bae1dSRodney W. Grimes 	 */
2257fb59c426SYoshinobu Inoue 	if ((thflags & TH_RST) || m->m_flags & (M_BCAST|M_MCAST))
2258df8bae1dSRodney W. Grimes 		goto drop;
2259fb59c426SYoshinobu Inoue 	if (isipv6) {
2260173c0f9fSWarner Losh 		if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) ||
2261173c0f9fSWarner Losh 		    IN6_IS_ADDR_MULTICAST(&ip6->ip6_src))
2262fb59c426SYoshinobu Inoue 			goto drop;
2263c068736aSJeffrey Hsu 	} else {
2264173c0f9fSWarner Losh 		if (IN_MULTICAST(ntohl(ip->ip_dst.s_addr)) ||
2265173c0f9fSWarner Losh 		    IN_MULTICAST(ntohl(ip->ip_src.s_addr)) ||
22662ca2159fSCrist J. Clark 	    	    ip->ip_src.s_addr == htonl(INADDR_BROADCAST) ||
22672ca2159fSCrist J. Clark 	    	    in_broadcast(ip->ip_dst, m->m_pkthdr.rcvif))
2268fb59c426SYoshinobu Inoue 			goto drop;
2269c068736aSJeffrey Hsu 	}
2270fb59c426SYoshinobu Inoue 	/* IPv6 anycast check is done at tcp6_input() */
2271a57815efSBosko Milekic 
2272a57815efSBosko Milekic 	/*
2273c59319bfSDag-Erling Smørgrav 	 * Perform bandwidth limiting.
2274a57815efSBosko Milekic 	 */
2275a57815efSBosko Milekic 	if (badport_bandlim(rstreason) < 0)
2276a57815efSBosko Milekic 		goto drop;
2277a57815efSBosko Milekic 
2278a0292f23SGarrett Wollman #ifdef TCPDEBUG
22794cc20ab1SSeigo Tanimura 	if (tp == 0 || (tp->t_inpcb->inp_socket->so_options & SO_DEBUG))
2280fb59c426SYoshinobu Inoue 		tcp_trace(TA_DROP, ostate, tp, (void *)tcp_saveipgen,
2281fb59c426SYoshinobu Inoue 			  &tcp_savetcp, 0);
2282a0292f23SGarrett Wollman #endif
22836fd22cafSJeffrey Hsu 
22846fd22cafSJeffrey Hsu 	if (tp)
22856fd22cafSJeffrey Hsu 		INP_UNLOCK(inp);
22866fd22cafSJeffrey Hsu 
2287fb59c426SYoshinobu Inoue 	if (thflags & TH_ACK)
2288fb59c426SYoshinobu Inoue 		/* mtod() below is safe as long as hdr dropping is delayed */
2289fb59c426SYoshinobu Inoue 		tcp_respond(tp, mtod(m, void *), th, m, (tcp_seq)0, th->th_ack,
2290fb59c426SYoshinobu Inoue 			    TH_RST);
2291df8bae1dSRodney W. Grimes 	else {
2292fb59c426SYoshinobu Inoue 		if (thflags & TH_SYN)
2293fb59c426SYoshinobu Inoue 			tlen++;
2294fb59c426SYoshinobu Inoue 		/* mtod() below is safe as long as hdr dropping is delayed */
2295fb59c426SYoshinobu Inoue 		tcp_respond(tp, mtod(m, void *), th, m, th->th_seq+tlen,
2296fb59c426SYoshinobu Inoue 			    (tcp_seq)0, TH_RST|TH_ACK);
2297df8bae1dSRodney W. Grimes 	}
2298f76fcf6dSJeffrey Hsu 	if (headlocked)
2299f76fcf6dSJeffrey Hsu 		INP_INFO_WUNLOCK(&tcbinfo);
2300df8bae1dSRodney W. Grimes 	return;
2301df8bae1dSRodney W. Grimes 
2302df8bae1dSRodney W. Grimes drop:
2303df8bae1dSRodney W. Grimes 	/*
2304df8bae1dSRodney W. Grimes 	 * Drop space held by incoming segment and return.
2305df8bae1dSRodney W. Grimes 	 */
2306610ee2f9SDavid Greenman #ifdef TCPDEBUG
23074cc20ab1SSeigo Tanimura 	if (tp == 0 || (tp->t_inpcb->inp_socket->so_options & SO_DEBUG))
2308fb59c426SYoshinobu Inoue 		tcp_trace(TA_DROP, ostate, tp, (void *)tcp_saveipgen,
2309fb59c426SYoshinobu Inoue 			  &tcp_savetcp, 0);
2310a0292f23SGarrett Wollman #endif
2311f76fcf6dSJeffrey Hsu 	if (tp)
2312f76fcf6dSJeffrey Hsu 		INP_UNLOCK(inp);
2313df8bae1dSRodney W. Grimes 	m_freem(m);
2314f76fcf6dSJeffrey Hsu 	if (headlocked)
2315f76fcf6dSJeffrey Hsu 		INP_INFO_WUNLOCK(&tcbinfo);
2316df8bae1dSRodney W. Grimes 	return;
2317df8bae1dSRodney W. Grimes }
2318df8bae1dSRodney W. Grimes 
2319be2ac88cSJonathan Lemon /*
2320be2ac88cSJonathan Lemon  * Parse TCP options and place in tcpopt.
2321be2ac88cSJonathan Lemon  */
23220312fbe9SPoul-Henning Kamp static void
2323be2ac88cSJonathan Lemon tcp_dooptions(to, cp, cnt, is_syn)
2324be2ac88cSJonathan Lemon 	struct tcpopt *to;
2325df8bae1dSRodney W. Grimes 	u_char *cp;
2326df8bae1dSRodney W. Grimes 	int cnt;
2327df8bae1dSRodney W. Grimes {
2328df8bae1dSRodney W. Grimes 	int opt, optlen;
2329df8bae1dSRodney W. Grimes 
2330be2ac88cSJonathan Lemon 	to->to_flags = 0;
2331df8bae1dSRodney W. Grimes 	for (; cnt > 0; cnt -= optlen, cp += optlen) {
2332df8bae1dSRodney W. Grimes 		opt = cp[0];
2333df8bae1dSRodney W. Grimes 		if (opt == TCPOPT_EOL)
2334df8bae1dSRodney W. Grimes 			break;
2335df8bae1dSRodney W. Grimes 		if (opt == TCPOPT_NOP)
2336df8bae1dSRodney W. Grimes 			optlen = 1;
2337df8bae1dSRodney W. Grimes 		else {
2338b474779fSJun-ichiro itojun Hagino 			if (cnt < 2)
2339b474779fSJun-ichiro itojun Hagino 				break;
2340df8bae1dSRodney W. Grimes 			optlen = cp[1];
2341b474779fSJun-ichiro itojun Hagino 			if (optlen < 2 || optlen > cnt)
2342df8bae1dSRodney W. Grimes 				break;
2343df8bae1dSRodney W. Grimes 		}
2344df8bae1dSRodney W. Grimes 		switch (opt) {
2345df8bae1dSRodney W. Grimes 		case TCPOPT_MAXSEG:
2346df8bae1dSRodney W. Grimes 			if (optlen != TCPOLEN_MAXSEG)
2347df8bae1dSRodney W. Grimes 				continue;
2348be2ac88cSJonathan Lemon 			if (!is_syn)
2349df8bae1dSRodney W. Grimes 				continue;
2350be2ac88cSJonathan Lemon 			to->to_flags |= TOF_MSS;
2351be2ac88cSJonathan Lemon 			bcopy((char *)cp + 2,
2352be2ac88cSJonathan Lemon 			    (char *)&to->to_mss, sizeof(to->to_mss));
2353fd8e4ebcSMike Barcroft 			to->to_mss = ntohs(to->to_mss);
2354df8bae1dSRodney W. Grimes 			break;
2355df8bae1dSRodney W. Grimes 		case TCPOPT_WINDOW:
2356df8bae1dSRodney W. Grimes 			if (optlen != TCPOLEN_WINDOW)
2357df8bae1dSRodney W. Grimes 				continue;
2358be2ac88cSJonathan Lemon 			if (! is_syn)
2359df8bae1dSRodney W. Grimes 				continue;
2360be2ac88cSJonathan Lemon 			to->to_flags |= TOF_SCALE;
2361be2ac88cSJonathan Lemon 			to->to_requested_s_scale = min(cp[2], TCP_MAX_WINSHIFT);
2362df8bae1dSRodney W. Grimes 			break;
2363df8bae1dSRodney W. Grimes 		case TCPOPT_TIMESTAMP:
2364df8bae1dSRodney W. Grimes 			if (optlen != TCPOLEN_TIMESTAMP)
2365df8bae1dSRodney W. Grimes 				continue;
2366be2ac88cSJonathan Lemon 			to->to_flags |= TOF_TS;
2367a0292f23SGarrett Wollman 			bcopy((char *)cp + 2,
2368a0292f23SGarrett Wollman 			    (char *)&to->to_tsval, sizeof(to->to_tsval));
2369fd8e4ebcSMike Barcroft 			to->to_tsval = ntohl(to->to_tsval);
2370a0292f23SGarrett Wollman 			bcopy((char *)cp + 6,
2371a0292f23SGarrett Wollman 			    (char *)&to->to_tsecr, sizeof(to->to_tsecr));
2372fd8e4ebcSMike Barcroft 			to->to_tsecr = ntohl(to->to_tsecr);
2373df8bae1dSRodney W. Grimes 			break;
2374a0292f23SGarrett Wollman 		case TCPOPT_CC:
2375a0292f23SGarrett Wollman 			if (optlen != TCPOLEN_CC)
2376a0292f23SGarrett Wollman 				continue;
2377be2ac88cSJonathan Lemon 			to->to_flags |= TOF_CC;
2378a0292f23SGarrett Wollman 			bcopy((char *)cp + 2,
2379a0292f23SGarrett Wollman 			    (char *)&to->to_cc, sizeof(to->to_cc));
2380fd8e4ebcSMike Barcroft 			to->to_cc = ntohl(to->to_cc);
2381a0292f23SGarrett Wollman 			break;
2382a0292f23SGarrett Wollman 		case TCPOPT_CCNEW:
2383a0292f23SGarrett Wollman 			if (optlen != TCPOLEN_CC)
2384a0292f23SGarrett Wollman 				continue;
2385be2ac88cSJonathan Lemon 			if (!is_syn)
2386a0292f23SGarrett Wollman 				continue;
2387be2ac88cSJonathan Lemon 			to->to_flags |= TOF_CCNEW;
2388a0292f23SGarrett Wollman 			bcopy((char *)cp + 2,
2389a0292f23SGarrett Wollman 			    (char *)&to->to_cc, sizeof(to->to_cc));
2390fd8e4ebcSMike Barcroft 			to->to_cc = ntohl(to->to_cc);
2391a0292f23SGarrett Wollman 			break;
2392a0292f23SGarrett Wollman 		case TCPOPT_CCECHO:
2393a0292f23SGarrett Wollman 			if (optlen != TCPOLEN_CC)
2394a0292f23SGarrett Wollman 				continue;
2395be2ac88cSJonathan Lemon 			if (!is_syn)
2396a0292f23SGarrett Wollman 				continue;
2397be2ac88cSJonathan Lemon 			to->to_flags |= TOF_CCECHO;
2398a0292f23SGarrett Wollman 			bcopy((char *)cp + 2,
2399a0292f23SGarrett Wollman 			    (char *)&to->to_ccecho, sizeof(to->to_ccecho));
2400fd8e4ebcSMike Barcroft 			to->to_ccecho = ntohl(to->to_ccecho);
2401a0292f23SGarrett Wollman 			break;
2402be2ac88cSJonathan Lemon 		default:
2403be2ac88cSJonathan Lemon 			continue;
2404df8bae1dSRodney W. Grimes 		}
2405df8bae1dSRodney W. Grimes 	}
2406df8bae1dSRodney W. Grimes }
2407df8bae1dSRodney W. Grimes 
2408df8bae1dSRodney W. Grimes /*
2409df8bae1dSRodney W. Grimes  * Pull out of band byte out of a segment so
2410df8bae1dSRodney W. Grimes  * it doesn't appear in the user's data queue.
2411df8bae1dSRodney W. Grimes  * It is still reflected in the segment length for
2412df8bae1dSRodney W. Grimes  * sequencing purposes.
2413df8bae1dSRodney W. Grimes  */
24140312fbe9SPoul-Henning Kamp static void
2415fb59c426SYoshinobu Inoue tcp_pulloutofband(so, th, m, off)
2416df8bae1dSRodney W. Grimes 	struct socket *so;
2417fb59c426SYoshinobu Inoue 	struct tcphdr *th;
2418df8bae1dSRodney W. Grimes 	register struct mbuf *m;
2419fb59c426SYoshinobu Inoue 	int off;		/* delayed to be droped hdrlen */
2420df8bae1dSRodney W. Grimes {
2421fb59c426SYoshinobu Inoue 	int cnt = off + th->th_urp - 1;
2422df8bae1dSRodney W. Grimes 
2423df8bae1dSRodney W. Grimes 	while (cnt >= 0) {
2424df8bae1dSRodney W. Grimes 		if (m->m_len > cnt) {
2425df8bae1dSRodney W. Grimes 			char *cp = mtod(m, caddr_t) + cnt;
2426df8bae1dSRodney W. Grimes 			struct tcpcb *tp = sototcpcb(so);
2427df8bae1dSRodney W. Grimes 
2428df8bae1dSRodney W. Grimes 			tp->t_iobc = *cp;
2429df8bae1dSRodney W. Grimes 			tp->t_oobflags |= TCPOOB_HAVEDATA;
2430df8bae1dSRodney W. Grimes 			bcopy(cp+1, cp, (unsigned)(m->m_len - cnt - 1));
2431df8bae1dSRodney W. Grimes 			m->m_len--;
243269a34685SYoshinobu Inoue 			if (m->m_flags & M_PKTHDR)
243369a34685SYoshinobu Inoue 				m->m_pkthdr.len--;
2434df8bae1dSRodney W. Grimes 			return;
2435df8bae1dSRodney W. Grimes 		}
2436df8bae1dSRodney W. Grimes 		cnt -= m->m_len;
2437df8bae1dSRodney W. Grimes 		m = m->m_next;
2438df8bae1dSRodney W. Grimes 		if (m == 0)
2439df8bae1dSRodney W. Grimes 			break;
2440df8bae1dSRodney W. Grimes 	}
2441df8bae1dSRodney W. Grimes 	panic("tcp_pulloutofband");
2442df8bae1dSRodney W. Grimes }
2443df8bae1dSRodney W. Grimes 
2444df8bae1dSRodney W. Grimes /*
2445df8bae1dSRodney W. Grimes  * Collect new round-trip time estimate
2446df8bae1dSRodney W. Grimes  * and update averages and current timeout.
2447df8bae1dSRodney W. Grimes  */
24480312fbe9SPoul-Henning Kamp static void
2449df8bae1dSRodney W. Grimes tcp_xmit_timer(tp, rtt)
2450df8bae1dSRodney W. Grimes 	register struct tcpcb *tp;
24519b8b58e0SJonathan Lemon 	int rtt;
2452df8bae1dSRodney W. Grimes {
2453233e8c18SGarrett Wollman 	register int delta;
2454233e8c18SGarrett Wollman 
2455233e8c18SGarrett Wollman 	tcpstat.tcps_rttupdated++;
2456233e8c18SGarrett Wollman 	tp->t_rttupdated++;
2457233e8c18SGarrett Wollman 	if (tp->t_srtt != 0) {
2458233e8c18SGarrett Wollman 		/*
2459233e8c18SGarrett Wollman 		 * srtt is stored as fixed point with 5 bits after the
2460233e8c18SGarrett Wollman 		 * binary point (i.e., scaled by 8).  The following magic
2461233e8c18SGarrett Wollman 		 * is equivalent to the smoothing algorithm in rfc793 with
2462233e8c18SGarrett Wollman 		 * an alpha of .875 (srtt = rtt/8 + srtt*7/8 in fixed
2463233e8c18SGarrett Wollman 		 * point).  Adjust rtt to origin 0.
2464233e8c18SGarrett Wollman 		 */
2465233e8c18SGarrett Wollman 		delta = ((rtt - 1) << TCP_DELTA_SHIFT)
2466233e8c18SGarrett Wollman 			- (tp->t_srtt >> (TCP_RTT_SHIFT - TCP_DELTA_SHIFT));
2467233e8c18SGarrett Wollman 
2468233e8c18SGarrett Wollman 		if ((tp->t_srtt += delta) <= 0)
2469233e8c18SGarrett Wollman 			tp->t_srtt = 1;
2470233e8c18SGarrett Wollman 
2471233e8c18SGarrett Wollman 		/*
2472233e8c18SGarrett Wollman 		 * We accumulate a smoothed rtt variance (actually, a
2473233e8c18SGarrett Wollman 		 * smoothed mean difference), then set the retransmit
2474233e8c18SGarrett Wollman 		 * timer to smoothed rtt + 4 times the smoothed variance.
2475233e8c18SGarrett Wollman 		 * rttvar is stored as fixed point with 4 bits after the
2476233e8c18SGarrett Wollman 		 * binary point (scaled by 16).  The following is
2477233e8c18SGarrett Wollman 		 * equivalent to rfc793 smoothing with an alpha of .75
2478233e8c18SGarrett Wollman 		 * (rttvar = rttvar*3/4 + |delta| / 4).  This replaces
2479233e8c18SGarrett Wollman 		 * rfc793's wired-in beta.
2480233e8c18SGarrett Wollman 		 */
2481233e8c18SGarrett Wollman 		if (delta < 0)
2482233e8c18SGarrett Wollman 			delta = -delta;
2483233e8c18SGarrett Wollman 		delta -= tp->t_rttvar >> (TCP_RTTVAR_SHIFT - TCP_DELTA_SHIFT);
2484233e8c18SGarrett Wollman 		if ((tp->t_rttvar += delta) <= 0)
2485233e8c18SGarrett Wollman 			tp->t_rttvar = 1;
24861fcc99b5SMatthew Dillon 		if (tp->t_rttbest > tp->t_srtt + tp->t_rttvar)
24871fcc99b5SMatthew Dillon 		    tp->t_rttbest = tp->t_srtt + tp->t_rttvar;
2488233e8c18SGarrett Wollman 	} else {
2489233e8c18SGarrett Wollman 		/*
2490233e8c18SGarrett Wollman 		 * No rtt measurement yet - use the unsmoothed rtt.
2491233e8c18SGarrett Wollman 		 * Set the variance to half the rtt (so our first
2492233e8c18SGarrett Wollman 		 * retransmit happens at 3*rtt).
2493233e8c18SGarrett Wollman 		 */
2494233e8c18SGarrett Wollman 		tp->t_srtt = rtt << TCP_RTT_SHIFT;
2495233e8c18SGarrett Wollman 		tp->t_rttvar = rtt << (TCP_RTTVAR_SHIFT - 1);
24961fcc99b5SMatthew Dillon 		tp->t_rttbest = tp->t_srtt + tp->t_rttvar;
2497233e8c18SGarrett Wollman 	}
24989b8b58e0SJonathan Lemon 	tp->t_rtttime = 0;
2499df8bae1dSRodney W. Grimes 	tp->t_rxtshift = 0;
2500df8bae1dSRodney W. Grimes 
2501df8bae1dSRodney W. Grimes 	/*
2502df8bae1dSRodney W. Grimes 	 * the retransmit should happen at rtt + 4 * rttvar.
2503df8bae1dSRodney W. Grimes 	 * Because of the way we do the smoothing, srtt and rttvar
2504df8bae1dSRodney W. Grimes 	 * will each average +1/2 tick of bias.  When we compute
2505df8bae1dSRodney W. Grimes 	 * the retransmit timer, we want 1/2 tick of rounding and
2506df8bae1dSRodney W. Grimes 	 * 1 extra tick because of +-1/2 tick uncertainty in the
2507df8bae1dSRodney W. Grimes 	 * firing of the timer.  The bias will give us exactly the
2508df8bae1dSRodney W. Grimes 	 * 1.5 tick we need.  But, because the bias is
2509df8bae1dSRodney W. Grimes 	 * statistical, we have to test that we don't drop below
2510df8bae1dSRodney W. Grimes 	 * the minimum feasible timer (which is 2 ticks).
2511df8bae1dSRodney W. Grimes 	 */
2512233e8c18SGarrett Wollman 	TCPT_RANGESET(tp->t_rxtcur, TCP_REXMTVAL(tp),
25139e2874b0SGarrett Wollman 		      max(tp->t_rttmin, rtt + 2), TCPTV_REXMTMAX);
2514df8bae1dSRodney W. Grimes 
2515df8bae1dSRodney W. Grimes 	/*
2516df8bae1dSRodney W. Grimes 	 * We received an ack for a packet that wasn't retransmitted;
2517df8bae1dSRodney W. Grimes 	 * it is probably safe to discard any error indications we've
2518df8bae1dSRodney W. Grimes 	 * received recently.  This isn't quite right, but close enough
2519df8bae1dSRodney W. Grimes 	 * for now (a route might have failed after we sent a segment,
2520df8bae1dSRodney W. Grimes 	 * and the return path might not be symmetrical).
2521df8bae1dSRodney W. Grimes 	 */
2522df8bae1dSRodney W. Grimes 	tp->t_softerror = 0;
2523df8bae1dSRodney W. Grimes }
2524df8bae1dSRodney W. Grimes 
2525df8bae1dSRodney W. Grimes /*
2526df8bae1dSRodney W. Grimes  * Determine a reasonable value for maxseg size.
2527df8bae1dSRodney W. Grimes  * If the route is known, check route for mtu.
2528df8bae1dSRodney W. Grimes  * If none, use an mss that can be handled on the outgoing
2529df8bae1dSRodney W. Grimes  * interface without forcing IP to fragment; if bigger than
2530df8bae1dSRodney W. Grimes  * an mbuf cluster (MCLBYTES), round down to nearest multiple of MCLBYTES
2531df8bae1dSRodney W. Grimes  * to utilize large mbufs.  If no route is found, route has no mtu,
2532df8bae1dSRodney W. Grimes  * or the destination isn't local, use a default, hopefully conservative
2533df8bae1dSRodney W. Grimes  * size (usually 512 or the default IP max size, but no more than the mtu
2534df8bae1dSRodney W. Grimes  * of the interface), as we can't discover anything about intervening
2535df8bae1dSRodney W. Grimes  * gateways or networks.  We also initialize the congestion/slow start
2536df8bae1dSRodney W. Grimes  * window to be a single segment if the destination isn't local.
2537df8bae1dSRodney W. Grimes  * While looking at the routing entry, we also initialize other path-dependent
2538df8bae1dSRodney W. Grimes  * parameters from pre-set or cached values in the routing entry.
2539a0292f23SGarrett Wollman  *
2540a0292f23SGarrett Wollman  * Also take into account the space needed for options that we
2541a0292f23SGarrett Wollman  * send regularly.  Make maxseg shorter by that amount to assure
2542a0292f23SGarrett Wollman  * that we can send maxseg amount of data even when the options
2543a0292f23SGarrett Wollman  * are present.  Store the upper limit of the length of options plus
2544a0292f23SGarrett Wollman  * data in maxopd.
2545a0292f23SGarrett Wollman  *
2546a0292f23SGarrett Wollman  * NOTE that this routine is only called when we process an incoming
2547a0292f23SGarrett Wollman  * segment, for outgoing segments only tcp_mssopt is called.
2548a0292f23SGarrett Wollman  *
2549a0292f23SGarrett Wollman  * In case of T/TCP, we call this routine during implicit connection
2550a0292f23SGarrett Wollman  * setup as well (offer = -1), to initialize maxseg from the cached
2551a0292f23SGarrett Wollman  * MSS of our peer.
2552df8bae1dSRodney W. Grimes  */
2553a0292f23SGarrett Wollman void
2554df8bae1dSRodney W. Grimes tcp_mss(tp, offer)
2555a0292f23SGarrett Wollman 	struct tcpcb *tp;
2556a0292f23SGarrett Wollman 	int offer;
2557df8bae1dSRodney W. Grimes {
2558df8bae1dSRodney W. Grimes 	register struct rtentry *rt;
2559df8bae1dSRodney W. Grimes 	struct ifnet *ifp;
2560df8bae1dSRodney W. Grimes 	register int rtt, mss;
2561df8bae1dSRodney W. Grimes 	u_long bufsize;
2562c068736aSJeffrey Hsu 	struct inpcb *inp = tp->t_inpcb;
2563df8bae1dSRodney W. Grimes 	struct socket *so;
2564a0292f23SGarrett Wollman 	struct rmxp_tao *taop;
2565a0292f23SGarrett Wollman 	int origoffer = offer;
2566fb59c426SYoshinobu Inoue #ifdef INET6
2567c068736aSJeffrey Hsu 	int isipv6 = ((inp->inp_vflag & INP_IPV6) != 0) ? 1 : 0;
2568c068736aSJeffrey Hsu 	size_t min_protoh = isipv6 ?
2569c068736aSJeffrey Hsu 			    sizeof (struct ip6_hdr) + sizeof (struct tcphdr) :
2570c068736aSJeffrey Hsu 			    sizeof (struct tcpiphdr);
2571c068736aSJeffrey Hsu #else
2572c068736aSJeffrey Hsu 	const int isipv6 = 0;
2573c068736aSJeffrey Hsu 	const size_t min_protoh = sizeof (struct tcpiphdr);
2574fb59c426SYoshinobu Inoue #endif
2575df8bae1dSRodney W. Grimes 
2576fb59c426SYoshinobu Inoue 	if (isipv6)
2577be2ac88cSJonathan Lemon 		rt = tcp_rtlookup6(&inp->inp_inc);
2578fb59c426SYoshinobu Inoue 	else
2579be2ac88cSJonathan Lemon 		rt = tcp_rtlookup(&inp->inp_inc);
2580fb59c426SYoshinobu Inoue 	if (rt == NULL) {
2581fb59c426SYoshinobu Inoue 		tp->t_maxopd = tp->t_maxseg =
2582c068736aSJeffrey Hsu 				isipv6 ? tcp_v6mssdflt : tcp_mssdflt;
2583a0292f23SGarrett Wollman 		return;
2584df8bae1dSRodney W. Grimes 	}
2585df8bae1dSRodney W. Grimes 	ifp = rt->rt_ifp;
2586df8bae1dSRodney W. Grimes 	so = inp->inp_socket;
2587df8bae1dSRodney W. Grimes 
2588a0292f23SGarrett Wollman 	taop = rmx_taop(rt->rt_rmx);
2589a0292f23SGarrett Wollman 	/*
2590a0292f23SGarrett Wollman 	 * Offer == -1 means that we didn't receive SYN yet,
2591a0292f23SGarrett Wollman 	 * use cached value in that case;
2592a0292f23SGarrett Wollman 	 */
2593a0292f23SGarrett Wollman 	if (offer == -1)
2594a0292f23SGarrett Wollman 		offer = taop->tao_mssopt;
2595a0292f23SGarrett Wollman 	/*
2596a0292f23SGarrett Wollman 	 * Offer == 0 means that there was no MSS on the SYN segment,
2597a0292f23SGarrett Wollman 	 * in this case we use tcp_mssdflt.
2598a0292f23SGarrett Wollman 	 */
2599a0292f23SGarrett Wollman 	if (offer == 0)
2600c068736aSJeffrey Hsu 		offer = isipv6 ? tcp_v6mssdflt : tcp_mssdflt;
2601a0292f23SGarrett Wollman 	else
2602a0292f23SGarrett Wollman 		/*
2603a0292f23SGarrett Wollman 		 * Sanity check: make sure that maxopd will be large
2604a0292f23SGarrett Wollman 		 * enough to allow some data on segments even is the
2605a0292f23SGarrett Wollman 		 * all the option space is used (40bytes).  Otherwise
2606a0292f23SGarrett Wollman 		 * funny things may happen in tcp_output.
2607a0292f23SGarrett Wollman 		 */
2608a0292f23SGarrett Wollman 		offer = max(offer, 64);
2609a0292f23SGarrett Wollman 	taop->tao_mssopt = offer;
2610a0292f23SGarrett Wollman 
2611df8bae1dSRodney W. Grimes 	/*
2612df8bae1dSRodney W. Grimes 	 * While we're here, check if there's an initial rtt
2613df8bae1dSRodney W. Grimes 	 * or rttvar.  Convert from the route-table units
2614df8bae1dSRodney W. Grimes 	 * to scaled multiples of the slow timeout timer.
2615df8bae1dSRodney W. Grimes 	 */
2616df8bae1dSRodney W. Grimes 	if (tp->t_srtt == 0 && (rtt = rt->rt_rmx.rmx_rtt)) {
2617df8bae1dSRodney W. Grimes 		/*
2618a0292f23SGarrett Wollman 		 * XXX the lock bit for RTT indicates that the value
2619df8bae1dSRodney W. Grimes 		 * is also a minimum value; this is subject to time.
2620df8bae1dSRodney W. Grimes 		 */
2621df8bae1dSRodney W. Grimes 		if (rt->rt_rmx.rmx_locks & RTV_RTT)
26229b8b58e0SJonathan Lemon 			tp->t_rttmin = rtt / (RTM_RTTUNIT / hz);
26239b8b58e0SJonathan Lemon 		tp->t_srtt = rtt / (RTM_RTTUNIT / (hz * TCP_RTT_SCALE));
26241fcc99b5SMatthew Dillon 		tp->t_rttbest = tp->t_srtt + TCP_RTT_SCALE;
2625dd224982SGarrett Wollman 		tcpstat.tcps_usedrtt++;
2626dd224982SGarrett Wollman 		if (rt->rt_rmx.rmx_rttvar) {
2627df8bae1dSRodney W. Grimes 			tp->t_rttvar = rt->rt_rmx.rmx_rttvar /
26289b8b58e0SJonathan Lemon 			    (RTM_RTTUNIT / (hz * TCP_RTTVAR_SCALE));
2629dd224982SGarrett Wollman 			tcpstat.tcps_usedrttvar++;
2630dd224982SGarrett Wollman 		} else {
2631df8bae1dSRodney W. Grimes 			/* default variation is +- 1 rtt */
2632df8bae1dSRodney W. Grimes 			tp->t_rttvar =
2633df8bae1dSRodney W. Grimes 			    tp->t_srtt * TCP_RTTVAR_SCALE / TCP_RTT_SCALE;
2634dd224982SGarrett Wollman 		}
2635df8bae1dSRodney W. Grimes 		TCPT_RANGESET(tp->t_rxtcur,
2636df8bae1dSRodney W. Grimes 			      ((tp->t_srtt >> 2) + tp->t_rttvar) >> 1,
2637df8bae1dSRodney W. Grimes 			      tp->t_rttmin, TCPTV_REXMTMAX);
2638df8bae1dSRodney W. Grimes 	}
2639df8bae1dSRodney W. Grimes 	/*
2640df8bae1dSRodney W. Grimes 	 * if there's an mtu associated with the route, use it
2641fb59c426SYoshinobu Inoue 	 * else, use the link mtu.
2642df8bae1dSRodney W. Grimes 	 */
2643df8bae1dSRodney W. Grimes 	if (rt->rt_rmx.rmx_mtu)
2644fb59c426SYoshinobu Inoue 		mss = rt->rt_rmx.rmx_mtu - min_protoh;
2645c068736aSJeffrey Hsu 	else {
2646fb59c426SYoshinobu Inoue 		if (isipv6) {
2647c068736aSJeffrey Hsu 			mss = nd_ifinfo[rt->rt_ifp->if_index].linkmtu -
2648c068736aSJeffrey Hsu 				min_protoh;
2649fb59c426SYoshinobu Inoue 			if (!in6_localaddr(&inp->in6p_faddr))
2650fb59c426SYoshinobu Inoue 				mss = min(mss, tcp_v6mssdflt);
2651c068736aSJeffrey Hsu 		} else {
2652c068736aSJeffrey Hsu 			mss = ifp->if_mtu - min_protoh;
2653a0292f23SGarrett Wollman 			if (!in_localaddr(inp->inp_faddr))
2654a0292f23SGarrett Wollman 				mss = min(mss, tcp_mssdflt);
2655a0292f23SGarrett Wollman 		}
2656c068736aSJeffrey Hsu 	}
2657a0292f23SGarrett Wollman 	mss = min(mss, offer);
2658a0292f23SGarrett Wollman 	/*
2659a0292f23SGarrett Wollman 	 * maxopd stores the maximum length of data AND options
2660a0292f23SGarrett Wollman 	 * in a segment; maxseg is the amount of data in a normal
2661a0292f23SGarrett Wollman 	 * segment.  We need to store this value (maxopd) apart
2662a0292f23SGarrett Wollman 	 * from maxseg, because now every segment carries options
2663a0292f23SGarrett Wollman 	 * and thus we normally have somewhat less data in segments.
2664a0292f23SGarrett Wollman 	 */
2665a0292f23SGarrett Wollman 	tp->t_maxopd = mss;
2666a0292f23SGarrett Wollman 
2667a0292f23SGarrett Wollman 	/*
2668a0292f23SGarrett Wollman 	 * In case of T/TCP, origoffer==-1 indicates, that no segments
2669a0292f23SGarrett Wollman 	 * were received yet.  In this case we just guess, otherwise
2670a0292f23SGarrett Wollman 	 * we do the same as before T/TCP.
2671a0292f23SGarrett Wollman 	 */
2672a0292f23SGarrett Wollman  	if ((tp->t_flags & (TF_REQ_TSTMP|TF_NOOPT)) == TF_REQ_TSTMP &&
2673a0292f23SGarrett Wollman 	    (origoffer == -1 ||
2674a0292f23SGarrett Wollman 	     (tp->t_flags & TF_RCVD_TSTMP) == TF_RCVD_TSTMP))
2675a0292f23SGarrett Wollman 		mss -= TCPOLEN_TSTAMP_APPA;
2676a0292f23SGarrett Wollman  	if ((tp->t_flags & (TF_REQ_CC|TF_NOOPT)) == TF_REQ_CC &&
2677a0292f23SGarrett Wollman 	    (origoffer == -1 ||
2678a0292f23SGarrett Wollman 	     (tp->t_flags & TF_RCVD_CC) == TF_RCVD_CC))
2679a0292f23SGarrett Wollman 		mss -= TCPOLEN_CC_APPA;
2680a0292f23SGarrett Wollman 
2681df8bae1dSRodney W. Grimes #if	(MCLBYTES & (MCLBYTES - 1)) == 0
2682df8bae1dSRodney W. Grimes 		if (mss > MCLBYTES)
2683df8bae1dSRodney W. Grimes 			mss &= ~(MCLBYTES-1);
2684df8bae1dSRodney W. Grimes #else
2685df8bae1dSRodney W. Grimes 		if (mss > MCLBYTES)
2686df8bae1dSRodney W. Grimes 			mss = mss / MCLBYTES * MCLBYTES;
2687df8bae1dSRodney W. Grimes #endif
2688df8bae1dSRodney W. Grimes 	/*
2689df8bae1dSRodney W. Grimes 	 * If there's a pipesize, change the socket buffer
2690df8bae1dSRodney W. Grimes 	 * to that size.  Make the socket buffers an integral
2691df8bae1dSRodney W. Grimes 	 * number of mss units; if the mss is larger than
2692df8bae1dSRodney W. Grimes 	 * the socket buffer, decrease the mss.
2693df8bae1dSRodney W. Grimes 	 */
2694df8bae1dSRodney W. Grimes #ifdef RTV_SPIPE
2695df8bae1dSRodney W. Grimes 	if ((bufsize = rt->rt_rmx.rmx_sendpipe) == 0)
2696df8bae1dSRodney W. Grimes #endif
2697df8bae1dSRodney W. Grimes 		bufsize = so->so_snd.sb_hiwat;
2698df8bae1dSRodney W. Grimes 	if (bufsize < mss)
2699df8bae1dSRodney W. Grimes 		mss = bufsize;
2700df8bae1dSRodney W. Grimes 	else {
2701df8bae1dSRodney W. Grimes 		bufsize = roundup(bufsize, mss);
2702df8bae1dSRodney W. Grimes 		if (bufsize > sb_max)
2703df8bae1dSRodney W. Grimes 			bufsize = sb_max;
270488c39af3SRuslan Ermilov 		if (bufsize > so->so_snd.sb_hiwat)
2705ecf72308SBrian Feldman 			(void)sbreserve(&so->so_snd, bufsize, so, NULL);
2706df8bae1dSRodney W. Grimes 	}
2707df8bae1dSRodney W. Grimes 	tp->t_maxseg = mss;
2708df8bae1dSRodney W. Grimes 
2709df8bae1dSRodney W. Grimes #ifdef RTV_RPIPE
2710df8bae1dSRodney W. Grimes 	if ((bufsize = rt->rt_rmx.rmx_recvpipe) == 0)
2711df8bae1dSRodney W. Grimes #endif
2712df8bae1dSRodney W. Grimes 		bufsize = so->so_rcv.sb_hiwat;
2713df8bae1dSRodney W. Grimes 	if (bufsize > mss) {
2714df8bae1dSRodney W. Grimes 		bufsize = roundup(bufsize, mss);
2715df8bae1dSRodney W. Grimes 		if (bufsize > sb_max)
2716df8bae1dSRodney W. Grimes 			bufsize = sb_max;
271788c39af3SRuslan Ermilov 		if (bufsize > so->so_rcv.sb_hiwat)
2718ecf72308SBrian Feldman 			(void)sbreserve(&so->so_rcv, bufsize, so, NULL);
2719df8bae1dSRodney W. Grimes 	}
27209b8b58e0SJonathan Lemon 
2721a0292f23SGarrett Wollman 	/*
27229b8b58e0SJonathan Lemon 	 * Set the slow-start flight size depending on whether this
27239b8b58e0SJonathan Lemon 	 * is a local network or not.
2724a0292f23SGarrett Wollman 	 */
2725c068736aSJeffrey Hsu 	if ((isipv6 && in6_localaddr(&inp->in6p_faddr)) ||
2726c068736aSJeffrey Hsu 	    (!isipv6 && in_localaddr(inp->inp_faddr)))
27279b8b58e0SJonathan Lemon 		tp->snd_cwnd = mss * ss_fltsz_local;
27289b8b58e0SJonathan Lemon 	else
27299b8b58e0SJonathan Lemon 		tp->snd_cwnd = mss * ss_fltsz;
2730df8bae1dSRodney W. Grimes 
2731df8bae1dSRodney W. Grimes 	if (rt->rt_rmx.rmx_ssthresh) {
2732df8bae1dSRodney W. Grimes 		/*
2733df8bae1dSRodney W. Grimes 		 * There's some sort of gateway or interface
2734df8bae1dSRodney W. Grimes 		 * buffer limit on the path.  Use this to set
2735df8bae1dSRodney W. Grimes 		 * the slow start threshhold, but set the
2736df8bae1dSRodney W. Grimes 		 * threshold to no less than 2*mss.
2737df8bae1dSRodney W. Grimes 		 */
2738df8bae1dSRodney W. Grimes 		tp->snd_ssthresh = max(2 * mss, rt->rt_rmx.rmx_ssthresh);
2739dd224982SGarrett Wollman 		tcpstat.tcps_usedssthresh++;
2740df8bae1dSRodney W. Grimes 	}
2741a0292f23SGarrett Wollman }
2742a0292f23SGarrett Wollman 
2743a0292f23SGarrett Wollman /*
2744a0292f23SGarrett Wollman  * Determine the MSS option to send on an outgoing SYN.
2745a0292f23SGarrett Wollman  */
2746a0292f23SGarrett Wollman int
2747a0292f23SGarrett Wollman tcp_mssopt(tp)
2748a0292f23SGarrett Wollman 	struct tcpcb *tp;
2749a0292f23SGarrett Wollman {
2750a0292f23SGarrett Wollman 	struct rtentry *rt;
2751fb59c426SYoshinobu Inoue #ifdef INET6
2752c068736aSJeffrey Hsu 	int isipv6 = ((tp->t_inpcb->inp_vflag & INP_IPV6) != 0) ? 1 : 0;
2753c068736aSJeffrey Hsu 	size_t min_protoh = isipv6 ?
2754c068736aSJeffrey Hsu 			    sizeof (struct ip6_hdr) + sizeof (struct tcphdr) :
2755c068736aSJeffrey Hsu 			    sizeof (struct tcpiphdr);
2756c068736aSJeffrey Hsu #else
2757c068736aSJeffrey Hsu 	const int isipv6 = 0;
2758c068736aSJeffrey Hsu 	const size_t min_protoh = sizeof (struct tcpiphdr);
2759fb59c426SYoshinobu Inoue #endif
2760a0292f23SGarrett Wollman 
2761fb59c426SYoshinobu Inoue 	if (isipv6)
2762be2ac88cSJonathan Lemon 		rt = tcp_rtlookup6(&tp->t_inpcb->inp_inc);
2763fb59c426SYoshinobu Inoue 	else
2764be2ac88cSJonathan Lemon 		rt = tcp_rtlookup(&tp->t_inpcb->inp_inc);
2765a0292f23SGarrett Wollman 	if (rt == NULL)
2766c068736aSJeffrey Hsu 		return (isipv6 ? tcp_v6mssdflt : tcp_mssdflt);
2767a0292f23SGarrett Wollman 
2768c068736aSJeffrey Hsu 	return (rt->rt_ifp->if_mtu - min_protoh);
2769df8bae1dSRodney W. Grimes }
277046f58482SJonathan Lemon 
277146f58482SJonathan Lemon 
277246f58482SJonathan Lemon /*
2773c068736aSJeffrey Hsu  * On a partial ack arrives, force the retransmission of the
2774c068736aSJeffrey Hsu  * next unacknowledged segment.  Do not clear tp->t_dupacks.
2775c068736aSJeffrey Hsu  * By setting snd_nxt to ti_ack, this forces retransmission timer to
2776c068736aSJeffrey Hsu  * be started again.
277746f58482SJonathan Lemon  */
2778c068736aSJeffrey Hsu static void
2779c068736aSJeffrey Hsu tcp_newreno_partial_ack(tp, th)
278046f58482SJonathan Lemon 	struct tcpcb *tp;
278146f58482SJonathan Lemon 	struct tcphdr *th;
278246f58482SJonathan Lemon {
278346f58482SJonathan Lemon 	tcp_seq onxt = tp->snd_nxt;
278446f58482SJonathan Lemon 	u_long  ocwnd = tp->snd_cwnd;
278546f58482SJonathan Lemon 
278646f58482SJonathan Lemon 	callout_stop(tp->tt_rexmt);
278746f58482SJonathan Lemon 	tp->t_rtttime = 0;
278846f58482SJonathan Lemon 	tp->snd_nxt = th->th_ack;
27896b2a5f92SJayanth Vijayaraghavan 	/*
2790c068736aSJeffrey Hsu 	 * Set snd_cwnd to one segment beyond acknowledged offset.
2791c068736aSJeffrey Hsu 	 * (tp->snd_una has not yet been updated when this function is called.)
27926b2a5f92SJayanth Vijayaraghavan 	 */
27936b2a5f92SJayanth Vijayaraghavan 	tp->snd_cwnd = tp->t_maxseg + (th->th_ack - tp->snd_una);
2794a84db8f4SMatthew Dillon 	tp->t_flags |= TF_ACKNOW;
27956b2a5f92SJayanth Vijayaraghavan 	(void) tcp_output(tp);
279646f58482SJonathan Lemon 	tp->snd_cwnd = ocwnd;
279746f58482SJonathan Lemon 	if (SEQ_GT(onxt, tp->snd_nxt))
279846f58482SJonathan Lemon 		tp->snd_nxt = onxt;
279946f58482SJonathan Lemon 	/*
280046f58482SJonathan Lemon 	 * Partial window deflation.  Relies on fact that tp->snd_una
280146f58482SJonathan Lemon 	 * not updated yet.
280246f58482SJonathan Lemon 	 */
280346f58482SJonathan Lemon 	tp->snd_cwnd -= (th->th_ack - tp->snd_una - tp->t_maxseg);
280446f58482SJonathan Lemon }
2805