TCPSocket.cpp 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Singleton.h>
  7. #include <AK/Time.h>
  8. #include <Kernel/Debug.h>
  9. #include <Kernel/Devices/RandomDevice.h>
  10. #include <Kernel/FileSystem/FileDescription.h>
  11. #include <Kernel/Net/EthernetFrameHeader.h>
  12. #include <Kernel/Net/IPv4.h>
  13. #include <Kernel/Net/NetworkAdapter.h>
  14. #include <Kernel/Net/Routing.h>
  15. #include <Kernel/Net/TCP.h>
  16. #include <Kernel/Net/TCPSocket.h>
  17. #include <Kernel/Process.h>
  18. #include <Kernel/Random.h>
  19. namespace Kernel {
  20. void TCPSocket::for_each(Function<void(const TCPSocket&)> callback)
  21. {
  22. Locker locker(sockets_by_tuple().lock(), Lock::Mode::Shared);
  23. for (auto& it : sockets_by_tuple().resource())
  24. callback(*it.value);
  25. }
  26. void TCPSocket::set_state(State new_state)
  27. {
  28. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket({}) state moving from {} to {}", this, to_string(m_state), to_string(new_state));
  29. auto was_disconnected = protocol_is_disconnected();
  30. auto previous_role = m_role;
  31. m_state = new_state;
  32. if (new_state == State::Established && m_direction == Direction::Outgoing)
  33. m_role = Role::Connected;
  34. if (new_state == State::Closed) {
  35. Locker locker(closing_sockets().lock());
  36. closing_sockets().resource().remove(tuple());
  37. if (m_originator)
  38. release_to_originator();
  39. }
  40. if (previous_role != m_role || was_disconnected != protocol_is_disconnected())
  41. evaluate_block_conditions();
  42. }
  43. static AK::Singleton<Lockable<HashMap<IPv4SocketTuple, RefPtr<TCPSocket>>>> s_socket_closing;
  44. Lockable<HashMap<IPv4SocketTuple, RefPtr<TCPSocket>>>& TCPSocket::closing_sockets()
  45. {
  46. return *s_socket_closing;
  47. }
  48. static AK::Singleton<Lockable<HashMap<IPv4SocketTuple, TCPSocket*>>> s_socket_tuples;
  49. Lockable<HashMap<IPv4SocketTuple, TCPSocket*>>& TCPSocket::sockets_by_tuple()
  50. {
  51. return *s_socket_tuples;
  52. }
  53. RefPtr<TCPSocket> TCPSocket::from_tuple(const IPv4SocketTuple& tuple)
  54. {
  55. Locker locker(sockets_by_tuple().lock(), Lock::Mode::Shared);
  56. auto exact_match = sockets_by_tuple().resource().get(tuple);
  57. if (exact_match.has_value())
  58. return { *exact_match.value() };
  59. auto address_tuple = IPv4SocketTuple(tuple.local_address(), tuple.local_port(), IPv4Address(), 0);
  60. auto address_match = sockets_by_tuple().resource().get(address_tuple);
  61. if (address_match.has_value())
  62. return { *address_match.value() };
  63. auto wildcard_tuple = IPv4SocketTuple(IPv4Address(), tuple.local_port(), IPv4Address(), 0);
  64. auto wildcard_match = sockets_by_tuple().resource().get(wildcard_tuple);
  65. if (wildcard_match.has_value())
  66. return { *wildcard_match.value() };
  67. return {};
  68. }
  69. RefPtr<TCPSocket> TCPSocket::create_client(const IPv4Address& new_local_address, u16 new_local_port, const IPv4Address& new_peer_address, u16 new_peer_port)
  70. {
  71. auto tuple = IPv4SocketTuple(new_local_address, new_local_port, new_peer_address, new_peer_port);
  72. {
  73. Locker locker(sockets_by_tuple().lock(), Lock::Mode::Shared);
  74. if (sockets_by_tuple().resource().contains(tuple))
  75. return {};
  76. }
  77. auto result = TCPSocket::create(protocol());
  78. if (result.is_error())
  79. return {};
  80. auto client = result.release_value();
  81. client->set_setup_state(SetupState::InProgress);
  82. client->set_local_address(new_local_address);
  83. client->set_local_port(new_local_port);
  84. client->set_peer_address(new_peer_address);
  85. client->set_peer_port(new_peer_port);
  86. client->set_direction(Direction::Incoming);
  87. client->set_originator(*this);
  88. Locker locker(sockets_by_tuple().lock());
  89. m_pending_release_for_accept.set(tuple, client);
  90. sockets_by_tuple().resource().set(tuple, client);
  91. return client;
  92. }
  93. void TCPSocket::release_to_originator()
  94. {
  95. VERIFY(!!m_originator);
  96. m_originator.strong_ref()->release_for_accept(this);
  97. m_originator.clear();
  98. }
  99. void TCPSocket::release_for_accept(RefPtr<TCPSocket> socket)
  100. {
  101. VERIFY(m_pending_release_for_accept.contains(socket->tuple()));
  102. m_pending_release_for_accept.remove(socket->tuple());
  103. // FIXME: Should we observe this error somehow?
  104. [[maybe_unused]] auto rc = queue_connection_from(*socket);
  105. }
  106. TCPSocket::TCPSocket(int protocol)
  107. : IPv4Socket(SOCK_STREAM, protocol)
  108. {
  109. m_last_retransmit_time = kgettimeofday();
  110. }
  111. TCPSocket::~TCPSocket()
  112. {
  113. Locker locker(sockets_by_tuple().lock());
  114. sockets_by_tuple().resource().remove(tuple());
  115. dequeue_for_retransmit();
  116. dbgln_if(TCP_SOCKET_DEBUG, "~TCPSocket in state {}", to_string(state()));
  117. }
  118. KResultOr<NonnullRefPtr<TCPSocket>> TCPSocket::create(int protocol)
  119. {
  120. auto socket = adopt_ref_if_nonnull(new TCPSocket(protocol));
  121. if (socket)
  122. return socket.release_nonnull();
  123. return ENOMEM;
  124. }
  125. KResultOr<size_t> TCPSocket::protocol_receive(ReadonlyBytes raw_ipv4_packet, UserOrKernelBuffer& buffer, size_t buffer_size, [[maybe_unused]] int flags)
  126. {
  127. auto& ipv4_packet = *reinterpret_cast<const IPv4Packet*>(raw_ipv4_packet.data());
  128. auto& tcp_packet = *static_cast<const TCPPacket*>(ipv4_packet.payload());
  129. size_t payload_size = raw_ipv4_packet.size() - sizeof(IPv4Packet) - tcp_packet.header_size();
  130. dbgln_if(TCP_SOCKET_DEBUG, "payload_size {}, will it fit in {}?", payload_size, buffer_size);
  131. VERIFY(buffer_size >= payload_size);
  132. if (!buffer.write(tcp_packet.payload(), payload_size))
  133. return EFAULT;
  134. return payload_size;
  135. }
  136. KResultOr<size_t> TCPSocket::protocol_send(const UserOrKernelBuffer& data, size_t data_length)
  137. {
  138. RoutingDecision routing_decision = route_to(peer_address(), local_address(), bound_interface());
  139. if (routing_decision.is_zero())
  140. return EHOSTUNREACH;
  141. size_t mss = routing_decision.adapter->mtu() - sizeof(IPv4Packet) - sizeof(TCPPacket);
  142. data_length = min(data_length, mss);
  143. int err = send_tcp_packet(TCPFlags::PUSH | TCPFlags::ACK, &data, data_length, &routing_decision);
  144. if (err < 0)
  145. return KResult((ErrnoCode)-err);
  146. return data_length;
  147. }
  148. KResult TCPSocket::send_ack(bool allow_duplicate)
  149. {
  150. if (!allow_duplicate && m_last_ack_number_sent == m_ack_number)
  151. return KSuccess;
  152. return send_tcp_packet(TCPFlags::ACK);
  153. }
  154. KResult TCPSocket::send_tcp_packet(u16 flags, const UserOrKernelBuffer* payload, size_t payload_size, RoutingDecision* user_routing_decision)
  155. {
  156. const bool has_mss_option = flags == TCPFlags::SYN;
  157. const size_t options_size = has_mss_option ? sizeof(TCPOptionMSS) : 0;
  158. const size_t header_size = sizeof(TCPPacket) + options_size;
  159. const size_t buffer_size = header_size + payload_size;
  160. auto buffer = NetworkByteBuffer::create_zeroed(buffer_size);
  161. auto& tcp_packet = *(TCPPacket*)(buffer.data());
  162. VERIFY(local_port());
  163. tcp_packet.set_source_port(local_port());
  164. tcp_packet.set_destination_port(peer_port());
  165. tcp_packet.set_window_size(NumericLimits<u16>::max());
  166. tcp_packet.set_sequence_number(m_sequence_number);
  167. tcp_packet.set_data_offset(header_size / sizeof(u32));
  168. tcp_packet.set_flags(flags);
  169. if (flags & TCPFlags::ACK) {
  170. m_last_ack_number_sent = m_ack_number;
  171. m_last_ack_sent_time = kgettimeofday();
  172. tcp_packet.set_ack_number(m_ack_number);
  173. }
  174. if (payload && !payload->read(tcp_packet.payload(), payload_size))
  175. return EFAULT;
  176. if (flags & TCPFlags::SYN) {
  177. ++m_sequence_number;
  178. } else {
  179. m_sequence_number += payload_size;
  180. }
  181. RoutingDecision routing_decision = user_routing_decision ? *user_routing_decision : route_to(peer_address(), local_address(), bound_interface());
  182. if (routing_decision.is_zero())
  183. return EHOSTUNREACH;
  184. if (has_mss_option) {
  185. u16 mss = routing_decision.adapter->mtu() - sizeof(IPv4Packet) - sizeof(TCPPacket);
  186. TCPOptionMSS mss_option { mss };
  187. VERIFY(buffer.size() >= sizeof(TCPPacket) + sizeof(mss_option));
  188. memcpy(buffer.data() + sizeof(TCPPacket), &mss_option, sizeof(mss_option));
  189. }
  190. tcp_packet.set_checksum(compute_tcp_checksum(local_address(), peer_address(), tcp_packet, payload_size));
  191. auto packet_buffer = UserOrKernelBuffer::for_kernel_buffer(buffer.data());
  192. auto result = routing_decision.adapter->send_ipv4(
  193. local_address(), routing_decision.next_hop, peer_address(), IPv4Protocol::TCP,
  194. packet_buffer, buffer_size, ttl());
  195. if (result.is_error())
  196. return result;
  197. m_packets_out++;
  198. m_bytes_out += buffer_size;
  199. if (tcp_packet.has_syn() || payload_size > 0) {
  200. Locker locker(m_not_acked_lock);
  201. m_not_acked.append({ m_sequence_number, move(buffer) });
  202. enqueue_for_retransmit();
  203. }
  204. return KSuccess;
  205. }
  206. void TCPSocket::receive_tcp_packet(const TCPPacket& packet, u16 size)
  207. {
  208. if (packet.has_ack()) {
  209. u32 ack_number = packet.ack_number();
  210. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket: receive_tcp_packet: {}", ack_number);
  211. int removed = 0;
  212. Locker locker(m_not_acked_lock);
  213. while (!m_not_acked.is_empty()) {
  214. auto& packet = m_not_acked.first();
  215. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket: iterate: {}", packet.ack_number);
  216. if (packet.ack_number <= ack_number) {
  217. m_not_acked.take_first();
  218. removed++;
  219. } else {
  220. break;
  221. }
  222. }
  223. if (m_not_acked.is_empty()) {
  224. m_retransmit_attempts = 0;
  225. dequeue_for_retransmit();
  226. }
  227. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket: receive_tcp_packet acknowledged {} packets", removed);
  228. }
  229. m_packets_in++;
  230. m_bytes_in += packet.header_size() + size;
  231. }
  232. bool TCPSocket::should_delay_next_ack() const
  233. {
  234. // FIXME: We don't know the MSS here so make a reasonable guess.
  235. const size_t mss = 1500;
  236. // RFC 1122 says we should send an ACK for every two full-sized segments.
  237. if (m_ack_number >= m_last_ack_number_sent + 2 * mss)
  238. return false;
  239. // RFC 1122 says we should not delay ACKs for more than 500 milliseconds.
  240. if (kgettimeofday() >= m_last_ack_sent_time + Time::from_milliseconds(500))
  241. return false;
  242. return true;
  243. }
  244. NetworkOrdered<u16> TCPSocket::compute_tcp_checksum(const IPv4Address& source, const IPv4Address& destination, const TCPPacket& packet, u16 payload_size)
  245. {
  246. struct [[gnu::packed]] PseudoHeader {
  247. IPv4Address source;
  248. IPv4Address destination;
  249. u8 zero;
  250. u8 protocol;
  251. NetworkOrdered<u16> payload_size;
  252. };
  253. PseudoHeader pseudo_header { source, destination, 0, (u8)IPv4Protocol::TCP, packet.header_size() + payload_size };
  254. u32 checksum = 0;
  255. auto* w = (const NetworkOrdered<u16>*)&pseudo_header;
  256. for (size_t i = 0; i < sizeof(pseudo_header) / sizeof(u16); ++i) {
  257. checksum += w[i];
  258. if (checksum > 0xffff)
  259. checksum = (checksum >> 16) + (checksum & 0xffff);
  260. }
  261. w = (const NetworkOrdered<u16>*)&packet;
  262. for (size_t i = 0; i < packet.header_size() / sizeof(u16); ++i) {
  263. checksum += w[i];
  264. if (checksum > 0xffff)
  265. checksum = (checksum >> 16) + (checksum & 0xffff);
  266. }
  267. VERIFY(packet.data_offset() * 4 == packet.header_size());
  268. w = (const NetworkOrdered<u16>*)packet.payload();
  269. for (size_t i = 0; i < payload_size / sizeof(u16); ++i) {
  270. checksum += w[i];
  271. if (checksum > 0xffff)
  272. checksum = (checksum >> 16) + (checksum & 0xffff);
  273. }
  274. if (payload_size & 1) {
  275. u16 expanded_byte = ((const u8*)packet.payload())[payload_size - 1] << 8;
  276. checksum += expanded_byte;
  277. if (checksum > 0xffff)
  278. checksum = (checksum >> 16) + (checksum & 0xffff);
  279. }
  280. return ~(checksum & 0xffff);
  281. }
  282. KResult TCPSocket::protocol_bind()
  283. {
  284. if (has_specific_local_address() && !m_adapter) {
  285. m_adapter = NetworkAdapter::from_ipv4_address(local_address());
  286. if (!m_adapter)
  287. return EADDRNOTAVAIL;
  288. }
  289. return KSuccess;
  290. }
  291. KResult TCPSocket::protocol_listen()
  292. {
  293. Locker locker(sockets_by_tuple().lock());
  294. if (sockets_by_tuple().resource().contains(tuple()))
  295. return EADDRINUSE;
  296. sockets_by_tuple().resource().set(tuple(), this);
  297. set_direction(Direction::Passive);
  298. set_state(State::Listen);
  299. set_setup_state(SetupState::Completed);
  300. return KSuccess;
  301. }
  302. KResult TCPSocket::protocol_connect(FileDescription& description, ShouldBlock should_block)
  303. {
  304. Locker locker(lock());
  305. auto routing_decision = route_to(peer_address(), local_address());
  306. if (routing_decision.is_zero())
  307. return EHOSTUNREACH;
  308. if (!has_specific_local_address())
  309. set_local_address(routing_decision.adapter->ipv4_address());
  310. if (auto result = allocate_local_port_if_needed(); result.is_error())
  311. return result.error();
  312. m_sequence_number = get_good_random<u32>();
  313. m_ack_number = 0;
  314. set_setup_state(SetupState::InProgress);
  315. int err = send_tcp_packet(TCPFlags::SYN);
  316. if (err < 0)
  317. return KResult((ErrnoCode)-err);
  318. m_state = State::SynSent;
  319. m_role = Role::Connecting;
  320. m_direction = Direction::Outgoing;
  321. evaluate_block_conditions();
  322. if (should_block == ShouldBlock::Yes) {
  323. locker.unlock();
  324. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  325. if (Thread::current()->block<Thread::ConnectBlocker>({}, description, unblock_flags).was_interrupted())
  326. return EINTR;
  327. locker.lock();
  328. VERIFY(setup_state() == SetupState::Completed);
  329. if (has_error()) { // TODO: check unblock_flags
  330. m_role = Role::None;
  331. if (error() == TCPSocket::Error::RetransmitTimeout)
  332. return ETIMEDOUT;
  333. else
  334. return ECONNREFUSED;
  335. }
  336. return KSuccess;
  337. }
  338. return EINPROGRESS;
  339. }
  340. KResultOr<u16> TCPSocket::protocol_allocate_local_port()
  341. {
  342. constexpr u16 first_ephemeral_port = 32768;
  343. constexpr u16 last_ephemeral_port = 60999;
  344. constexpr u16 ephemeral_port_range_size = last_ephemeral_port - first_ephemeral_port;
  345. u16 first_scan_port = first_ephemeral_port + get_good_random<u16>() % ephemeral_port_range_size;
  346. Locker locker(sockets_by_tuple().lock());
  347. for (u16 port = first_scan_port;;) {
  348. IPv4SocketTuple proposed_tuple(local_address(), port, peer_address(), peer_port());
  349. auto it = sockets_by_tuple().resource().find(proposed_tuple);
  350. if (it == sockets_by_tuple().resource().end()) {
  351. set_local_port(port);
  352. sockets_by_tuple().resource().set(proposed_tuple, this);
  353. return port;
  354. }
  355. ++port;
  356. if (port > last_ephemeral_port)
  357. port = first_ephemeral_port;
  358. if (port == first_scan_port)
  359. break;
  360. }
  361. return EADDRINUSE;
  362. }
  363. bool TCPSocket::protocol_is_disconnected() const
  364. {
  365. switch (m_state) {
  366. case State::Closed:
  367. case State::CloseWait:
  368. case State::LastAck:
  369. case State::FinWait1:
  370. case State::FinWait2:
  371. case State::Closing:
  372. case State::TimeWait:
  373. return true;
  374. default:
  375. return false;
  376. }
  377. }
  378. void TCPSocket::shut_down_for_writing()
  379. {
  380. if (state() == State::Established) {
  381. dbgln_if(TCP_SOCKET_DEBUG, " Sending FIN/ACK from Established and moving into FinWait1");
  382. [[maybe_unused]] auto rc = send_tcp_packet(TCPFlags::FIN | TCPFlags::ACK);
  383. set_state(State::FinWait1);
  384. } else {
  385. dbgln(" Shutting down TCPSocket for writing but not moving to FinWait1 since state is {}", to_string(state()));
  386. }
  387. }
  388. KResult TCPSocket::close()
  389. {
  390. Locker socket_locker(lock());
  391. auto result = IPv4Socket::close();
  392. if (state() == State::CloseWait) {
  393. dbgln_if(TCP_SOCKET_DEBUG, " Sending FIN from CloseWait and moving into LastAck");
  394. [[maybe_unused]] auto rc = send_tcp_packet(TCPFlags::FIN | TCPFlags::ACK);
  395. set_state(State::LastAck);
  396. }
  397. if (state() != State::Closed && state() != State::Listen) {
  398. Locker locker(closing_sockets().lock());
  399. closing_sockets().resource().set(tuple(), *this);
  400. }
  401. return result;
  402. }
  403. static AK::Singleton<Lockable<HashTable<TCPSocket*>>> s_sockets_for_retransmit;
  404. Lockable<HashTable<TCPSocket*>>& TCPSocket::sockets_for_retransmit()
  405. {
  406. return *s_sockets_for_retransmit;
  407. }
  408. void TCPSocket::enqueue_for_retransmit()
  409. {
  410. Locker locker(sockets_for_retransmit().lock());
  411. sockets_for_retransmit().resource().set(this);
  412. }
  413. void TCPSocket::dequeue_for_retransmit()
  414. {
  415. Locker locker(sockets_for_retransmit().lock());
  416. sockets_for_retransmit().resource().remove(this);
  417. }
  418. void TCPSocket::retransmit_packets()
  419. {
  420. auto now = kgettimeofday();
  421. // RFC6298 says we should have at least one second between retransmits. According to
  422. // RFC1122 we must do exponential backoff - even for SYN packets.
  423. i64 retransmit_interval = 1;
  424. for (decltype(m_retransmit_attempts) i = 0; i < m_retransmit_attempts; i++)
  425. retransmit_interval *= 2;
  426. if (m_last_retransmit_time > now - Time::from_seconds(retransmit_interval))
  427. return;
  428. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket({}) handling retransmit", this);
  429. m_last_retransmit_time = now;
  430. ++m_retransmit_attempts;
  431. if (m_retransmit_attempts > maximum_retransmits) {
  432. set_state(TCPSocket::State::Closed);
  433. set_error(TCPSocket::Error::RetransmitTimeout);
  434. set_setup_state(Socket::SetupState::Completed);
  435. return;
  436. }
  437. auto routing_decision = route_to(peer_address(), local_address(), bound_interface());
  438. if (routing_decision.is_zero())
  439. return;
  440. Locker locker(m_not_acked_lock, Lock::Mode::Shared);
  441. for (auto& packet : m_not_acked) {
  442. packet.tx_counter++;
  443. if constexpr (TCP_SOCKET_DEBUG) {
  444. auto& tcp_packet = *(const TCPPacket*)(packet.buffer.data());
  445. dbgln("Sending TCP packet from {}:{} to {}:{} with ({}{}{}{}) seq_no={}, ack_no={}, tx_counter={}",
  446. local_address(), local_port(),
  447. peer_address(), peer_port(),
  448. (tcp_packet.has_syn() ? "SYN " : ""),
  449. (tcp_packet.has_ack() ? "ACK " : ""),
  450. (tcp_packet.has_fin() ? "FIN " : ""),
  451. (tcp_packet.has_rst() ? "RST " : ""),
  452. tcp_packet.sequence_number(),
  453. tcp_packet.ack_number(),
  454. packet.tx_counter);
  455. }
  456. auto packet_buffer = UserOrKernelBuffer::for_kernel_buffer(packet.buffer.data());
  457. int err = routing_decision.adapter->send_ipv4(
  458. local_address(), routing_decision.next_hop, peer_address(),
  459. IPv4Protocol::TCP, packet_buffer, packet.buffer.size(), ttl());
  460. if (err < 0) {
  461. auto& tcp_packet = *(const TCPPacket*)(packet.buffer.data());
  462. dmesgln("Error ({}) sending TCP packet from {}:{} to {}:{} with ({}{}{}{}) seq_no={}, ack_no={}, tx_counter={}",
  463. err,
  464. local_address(),
  465. local_port(),
  466. peer_address(),
  467. peer_port(),
  468. (tcp_packet.has_syn() ? "SYN " : ""),
  469. (tcp_packet.has_ack() ? "ACK " : ""),
  470. (tcp_packet.has_fin() ? "FIN " : ""),
  471. (tcp_packet.has_rst() ? "RST " : ""),
  472. tcp_packet.sequence_number(),
  473. tcp_packet.ack_number(),
  474. packet.tx_counter);
  475. } else {
  476. m_packets_out++;
  477. m_bytes_out += packet.buffer.size();
  478. }
  479. }
  480. }
  481. }