TCPSocket.cpp 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Singleton.h>
  7. #include <AK/Time.h>
  8. #include <Kernel/Debug.h>
  9. #include <Kernel/Devices/RandomDevice.h>
  10. #include <Kernel/FileSystem/FileDescription.h>
  11. #include <Kernel/Net/EthernetFrameHeader.h>
  12. #include <Kernel/Net/IPv4.h>
  13. #include <Kernel/Net/NetworkAdapter.h>
  14. #include <Kernel/Net/NetworkingManagement.h>
  15. #include <Kernel/Net/Routing.h>
  16. #include <Kernel/Net/TCP.h>
  17. #include <Kernel/Net/TCPSocket.h>
  18. #include <Kernel/Process.h>
  19. #include <Kernel/Random.h>
  20. namespace Kernel {
  21. void TCPSocket::for_each(Function<void(const TCPSocket&)> callback)
  22. {
  23. Locker locker(sockets_by_tuple().lock(), Mutex::Mode::Shared);
  24. for (auto& it : sockets_by_tuple().resource())
  25. callback(*it.value);
  26. }
  27. void TCPSocket::set_state(State new_state)
  28. {
  29. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket({}) state moving from {} to {}", this, to_string(m_state), to_string(new_state));
  30. auto was_disconnected = protocol_is_disconnected();
  31. auto previous_role = m_role;
  32. m_state = new_state;
  33. if (new_state == State::Established && m_direction == Direction::Outgoing)
  34. m_role = Role::Connected;
  35. if (new_state == State::Closed) {
  36. Locker locker(closing_sockets().lock());
  37. closing_sockets().resource().remove(tuple());
  38. if (m_originator)
  39. release_to_originator();
  40. }
  41. if (previous_role != m_role || was_disconnected != protocol_is_disconnected())
  42. evaluate_block_conditions();
  43. }
  44. static AK::Singleton<Lockable<HashMap<IPv4SocketTuple, RefPtr<TCPSocket>>>> s_socket_closing;
  45. Lockable<HashMap<IPv4SocketTuple, RefPtr<TCPSocket>>>& TCPSocket::closing_sockets()
  46. {
  47. return *s_socket_closing;
  48. }
  49. static AK::Singleton<Lockable<HashMap<IPv4SocketTuple, TCPSocket*>>> s_socket_tuples;
  50. Lockable<HashMap<IPv4SocketTuple, TCPSocket*>>& TCPSocket::sockets_by_tuple()
  51. {
  52. return *s_socket_tuples;
  53. }
  54. RefPtr<TCPSocket> TCPSocket::from_tuple(const IPv4SocketTuple& tuple)
  55. {
  56. Locker locker(sockets_by_tuple().lock(), Mutex::Mode::Shared);
  57. auto exact_match = sockets_by_tuple().resource().get(tuple);
  58. if (exact_match.has_value())
  59. return { *exact_match.value() };
  60. auto address_tuple = IPv4SocketTuple(tuple.local_address(), tuple.local_port(), IPv4Address(), 0);
  61. auto address_match = sockets_by_tuple().resource().get(address_tuple);
  62. if (address_match.has_value())
  63. return { *address_match.value() };
  64. auto wildcard_tuple = IPv4SocketTuple(IPv4Address(), tuple.local_port(), IPv4Address(), 0);
  65. auto wildcard_match = sockets_by_tuple().resource().get(wildcard_tuple);
  66. if (wildcard_match.has_value())
  67. return { *wildcard_match.value() };
  68. return {};
  69. }
  70. RefPtr<TCPSocket> TCPSocket::create_client(const IPv4Address& new_local_address, u16 new_local_port, const IPv4Address& new_peer_address, u16 new_peer_port)
  71. {
  72. auto tuple = IPv4SocketTuple(new_local_address, new_local_port, new_peer_address, new_peer_port);
  73. {
  74. Locker locker(sockets_by_tuple().lock(), Mutex::Mode::Shared);
  75. if (sockets_by_tuple().resource().contains(tuple))
  76. return {};
  77. }
  78. auto result = TCPSocket::create(protocol());
  79. if (result.is_error())
  80. return {};
  81. auto client = result.release_value();
  82. client->set_setup_state(SetupState::InProgress);
  83. client->set_local_address(new_local_address);
  84. client->set_local_port(new_local_port);
  85. client->set_peer_address(new_peer_address);
  86. client->set_peer_port(new_peer_port);
  87. client->set_direction(Direction::Incoming);
  88. client->set_originator(*this);
  89. Locker locker(sockets_by_tuple().lock());
  90. m_pending_release_for_accept.set(tuple, client);
  91. sockets_by_tuple().resource().set(tuple, client);
  92. return client;
  93. }
  94. void TCPSocket::release_to_originator()
  95. {
  96. VERIFY(!!m_originator);
  97. m_originator.strong_ref()->release_for_accept(this);
  98. m_originator.clear();
  99. }
  100. void TCPSocket::release_for_accept(RefPtr<TCPSocket> socket)
  101. {
  102. VERIFY(m_pending_release_for_accept.contains(socket->tuple()));
  103. m_pending_release_for_accept.remove(socket->tuple());
  104. // FIXME: Should we observe this error somehow?
  105. [[maybe_unused]] auto rc = queue_connection_from(*socket);
  106. }
  107. TCPSocket::TCPSocket(int protocol)
  108. : IPv4Socket(SOCK_STREAM, protocol)
  109. {
  110. m_last_retransmit_time = kgettimeofday();
  111. }
  112. TCPSocket::~TCPSocket()
  113. {
  114. Locker locker(sockets_by_tuple().lock());
  115. sockets_by_tuple().resource().remove(tuple());
  116. dequeue_for_retransmit();
  117. dbgln_if(TCP_SOCKET_DEBUG, "~TCPSocket in state {}", to_string(state()));
  118. }
  119. KResultOr<NonnullRefPtr<TCPSocket>> TCPSocket::create(int protocol)
  120. {
  121. auto socket = adopt_ref_if_nonnull(new (nothrow) TCPSocket(protocol));
  122. if (socket)
  123. return socket.release_nonnull();
  124. return ENOMEM;
  125. }
  126. KResultOr<size_t> TCPSocket::protocol_receive(ReadonlyBytes raw_ipv4_packet, UserOrKernelBuffer& buffer, size_t buffer_size, [[maybe_unused]] int flags)
  127. {
  128. auto& ipv4_packet = *reinterpret_cast<const IPv4Packet*>(raw_ipv4_packet.data());
  129. auto& tcp_packet = *static_cast<const TCPPacket*>(ipv4_packet.payload());
  130. size_t payload_size = raw_ipv4_packet.size() - sizeof(IPv4Packet) - tcp_packet.header_size();
  131. dbgln_if(TCP_SOCKET_DEBUG, "payload_size {}, will it fit in {}?", payload_size, buffer_size);
  132. VERIFY(buffer_size >= payload_size);
  133. if (!buffer.write(tcp_packet.payload(), payload_size))
  134. return EFAULT;
  135. return payload_size;
  136. }
  137. KResultOr<size_t> TCPSocket::protocol_send(const UserOrKernelBuffer& data, size_t data_length)
  138. {
  139. RoutingDecision routing_decision = route_to(peer_address(), local_address(), bound_interface());
  140. if (routing_decision.is_zero())
  141. return EHOSTUNREACH;
  142. size_t mss = routing_decision.adapter->mtu() - sizeof(IPv4Packet) - sizeof(TCPPacket);
  143. data_length = min(data_length, mss);
  144. int err = send_tcp_packet(TCPFlags::PUSH | TCPFlags::ACK, &data, data_length, &routing_decision);
  145. if (err < 0)
  146. return KResult((ErrnoCode)-err);
  147. return data_length;
  148. }
  149. KResult TCPSocket::send_ack(bool allow_duplicate)
  150. {
  151. if (!allow_duplicate && m_last_ack_number_sent == m_ack_number)
  152. return KSuccess;
  153. return send_tcp_packet(TCPFlags::ACK);
  154. }
  155. KResult TCPSocket::send_tcp_packet(u16 flags, const UserOrKernelBuffer* payload, size_t payload_size, RoutingDecision* user_routing_decision)
  156. {
  157. RoutingDecision routing_decision = user_routing_decision ? *user_routing_decision : route_to(peer_address(), local_address(), bound_interface());
  158. if (routing_decision.is_zero())
  159. return EHOSTUNREACH;
  160. auto ipv4_payload_offset = routing_decision.adapter->ipv4_payload_offset();
  161. const bool has_mss_option = flags == TCPFlags::SYN;
  162. const size_t options_size = has_mss_option ? sizeof(TCPOptionMSS) : 0;
  163. const size_t tcp_header_size = sizeof(TCPPacket) + options_size;
  164. const size_t buffer_size = ipv4_payload_offset + tcp_header_size + payload_size;
  165. auto packet = routing_decision.adapter->acquire_packet_buffer(buffer_size);
  166. if (!packet)
  167. return ENOMEM;
  168. routing_decision.adapter->fill_in_ipv4_header(*packet, local_address(),
  169. routing_decision.next_hop, peer_address(), IPv4Protocol::TCP,
  170. buffer_size - ipv4_payload_offset, ttl());
  171. memset(packet->buffer.data() + ipv4_payload_offset, 0, sizeof(TCPPacket));
  172. auto& tcp_packet = *(TCPPacket*)(packet->buffer.data() + ipv4_payload_offset);
  173. VERIFY(local_port());
  174. tcp_packet.set_source_port(local_port());
  175. tcp_packet.set_destination_port(peer_port());
  176. tcp_packet.set_window_size(NumericLimits<u16>::max());
  177. tcp_packet.set_sequence_number(m_sequence_number);
  178. tcp_packet.set_data_offset(tcp_header_size / sizeof(u32));
  179. tcp_packet.set_flags(flags);
  180. if (flags & TCPFlags::ACK) {
  181. m_last_ack_number_sent = m_ack_number;
  182. m_last_ack_sent_time = kgettimeofday();
  183. tcp_packet.set_ack_number(m_ack_number);
  184. }
  185. if (payload && !payload->read(tcp_packet.payload(), payload_size)) {
  186. routing_decision.adapter->release_packet_buffer(*packet);
  187. return EFAULT;
  188. }
  189. if (flags & TCPFlags::SYN) {
  190. ++m_sequence_number;
  191. } else {
  192. m_sequence_number += payload_size;
  193. }
  194. if (has_mss_option) {
  195. u16 mss = routing_decision.adapter->mtu() - sizeof(IPv4Packet) - sizeof(TCPPacket);
  196. TCPOptionMSS mss_option { mss };
  197. VERIFY(packet->buffer.size() >= ipv4_payload_offset + sizeof(TCPPacket) + sizeof(mss_option));
  198. memcpy(packet->buffer.data() + ipv4_payload_offset + sizeof(TCPPacket), &mss_option, sizeof(mss_option));
  199. }
  200. tcp_packet.set_checksum(compute_tcp_checksum(local_address(), peer_address(), tcp_packet, payload_size));
  201. routing_decision.adapter->send_packet({ packet->buffer.data(), packet->buffer.size() });
  202. m_packets_out++;
  203. m_bytes_out += buffer_size;
  204. if (tcp_packet.has_syn() || payload_size > 0) {
  205. Locker locker(m_not_acked_lock);
  206. m_not_acked.append({ m_sequence_number, move(packet), ipv4_payload_offset, *routing_decision.adapter });
  207. m_not_acked_size += payload_size;
  208. enqueue_for_retransmit();
  209. } else {
  210. routing_decision.adapter->release_packet_buffer(*packet);
  211. }
  212. return KSuccess;
  213. }
  214. void TCPSocket::receive_tcp_packet(const TCPPacket& packet, u16 size)
  215. {
  216. if (packet.has_ack()) {
  217. u32 ack_number = packet.ack_number();
  218. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket: receive_tcp_packet: {}", ack_number);
  219. int removed = 0;
  220. Locker locker(m_not_acked_lock);
  221. while (!m_not_acked.is_empty()) {
  222. auto& packet = m_not_acked.first();
  223. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket: iterate: {}", packet.ack_number);
  224. if (packet.ack_number <= ack_number) {
  225. auto old_adapter = packet.adapter.strong_ref();
  226. if (old_adapter)
  227. old_adapter->release_packet_buffer(*packet.buffer);
  228. TCPPacket& tcp_packet = *(TCPPacket*)(packet.buffer->buffer.data() + packet.ipv4_payload_offset);
  229. auto payload_size = packet.buffer->buffer.data() + packet.buffer->buffer.size() - (u8*)tcp_packet.payload();
  230. m_not_acked_size -= payload_size;
  231. evaluate_block_conditions();
  232. m_not_acked.take_first();
  233. removed++;
  234. } else {
  235. break;
  236. }
  237. }
  238. if (m_not_acked.is_empty()) {
  239. m_retransmit_attempts = 0;
  240. dequeue_for_retransmit();
  241. }
  242. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket: receive_tcp_packet acknowledged {} packets", removed);
  243. }
  244. m_packets_in++;
  245. m_bytes_in += packet.header_size() + size;
  246. }
  247. bool TCPSocket::should_delay_next_ack() const
  248. {
  249. // FIXME: We don't know the MSS here so make a reasonable guess.
  250. const size_t mss = 1500;
  251. // RFC 1122 says we should send an ACK for every two full-sized segments.
  252. if (m_ack_number >= m_last_ack_number_sent + 2 * mss)
  253. return false;
  254. // RFC 1122 says we should not delay ACKs for more than 500 milliseconds.
  255. if (kgettimeofday() >= m_last_ack_sent_time + Time::from_milliseconds(500))
  256. return false;
  257. return true;
  258. }
  259. NetworkOrdered<u16> TCPSocket::compute_tcp_checksum(const IPv4Address& source, const IPv4Address& destination, const TCPPacket& packet, u16 payload_size)
  260. {
  261. struct [[gnu::packed]] PseudoHeader {
  262. IPv4Address source;
  263. IPv4Address destination;
  264. u8 zero;
  265. u8 protocol;
  266. NetworkOrdered<u16> payload_size;
  267. };
  268. PseudoHeader pseudo_header { source, destination, 0, (u8)IPv4Protocol::TCP, packet.header_size() + payload_size };
  269. u32 checksum = 0;
  270. auto* w = (const NetworkOrdered<u16>*)&pseudo_header;
  271. for (size_t i = 0; i < sizeof(pseudo_header) / sizeof(u16); ++i) {
  272. checksum += w[i];
  273. if (checksum > 0xffff)
  274. checksum = (checksum >> 16) + (checksum & 0xffff);
  275. }
  276. w = (const NetworkOrdered<u16>*)&packet;
  277. for (size_t i = 0; i < packet.header_size() / sizeof(u16); ++i) {
  278. checksum += w[i];
  279. if (checksum > 0xffff)
  280. checksum = (checksum >> 16) + (checksum & 0xffff);
  281. }
  282. VERIFY(packet.data_offset() * 4 == packet.header_size());
  283. w = (const NetworkOrdered<u16>*)packet.payload();
  284. for (size_t i = 0; i < payload_size / sizeof(u16); ++i) {
  285. checksum += w[i];
  286. if (checksum > 0xffff)
  287. checksum = (checksum >> 16) + (checksum & 0xffff);
  288. }
  289. if (payload_size & 1) {
  290. u16 expanded_byte = ((const u8*)packet.payload())[payload_size - 1] << 8;
  291. checksum += expanded_byte;
  292. if (checksum > 0xffff)
  293. checksum = (checksum >> 16) + (checksum & 0xffff);
  294. }
  295. return ~(checksum & 0xffff);
  296. }
  297. KResult TCPSocket::protocol_bind()
  298. {
  299. if (has_specific_local_address() && !m_adapter) {
  300. m_adapter = NetworkingManagement::the().from_ipv4_address(local_address());
  301. if (!m_adapter)
  302. return EADDRNOTAVAIL;
  303. }
  304. return KSuccess;
  305. }
  306. KResult TCPSocket::protocol_listen(bool did_allocate_port)
  307. {
  308. if (!did_allocate_port) {
  309. Locker socket_locker(sockets_by_tuple().lock());
  310. if (sockets_by_tuple().resource().contains(tuple()))
  311. return EADDRINUSE;
  312. sockets_by_tuple().resource().set(tuple(), this);
  313. }
  314. set_direction(Direction::Passive);
  315. set_state(State::Listen);
  316. set_setup_state(SetupState::Completed);
  317. return KSuccess;
  318. }
  319. KResult TCPSocket::protocol_connect(FileDescription& description, ShouldBlock should_block)
  320. {
  321. Locker locker(lock());
  322. auto routing_decision = route_to(peer_address(), local_address());
  323. if (routing_decision.is_zero())
  324. return EHOSTUNREACH;
  325. if (!has_specific_local_address())
  326. set_local_address(routing_decision.adapter->ipv4_address());
  327. if (auto result = allocate_local_port_if_needed(); result.error_or_port.is_error())
  328. return result.error_or_port.error();
  329. m_sequence_number = get_good_random<u32>();
  330. m_ack_number = 0;
  331. set_setup_state(SetupState::InProgress);
  332. int err = send_tcp_packet(TCPFlags::SYN);
  333. if (err < 0)
  334. return KResult((ErrnoCode)-err);
  335. m_state = State::SynSent;
  336. m_role = Role::Connecting;
  337. m_direction = Direction::Outgoing;
  338. evaluate_block_conditions();
  339. if (should_block == ShouldBlock::Yes) {
  340. locker.unlock();
  341. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  342. if (Thread::current()->block<Thread::ConnectBlocker>({}, description, unblock_flags).was_interrupted())
  343. return EINTR;
  344. locker.lock();
  345. VERIFY(setup_state() == SetupState::Completed);
  346. if (has_error()) { // TODO: check unblock_flags
  347. m_role = Role::None;
  348. if (error() == TCPSocket::Error::RetransmitTimeout)
  349. return ETIMEDOUT;
  350. else
  351. return ECONNREFUSED;
  352. }
  353. return KSuccess;
  354. }
  355. return EINPROGRESS;
  356. }
  357. KResultOr<u16> TCPSocket::protocol_allocate_local_port()
  358. {
  359. constexpr u16 first_ephemeral_port = 32768;
  360. constexpr u16 last_ephemeral_port = 60999;
  361. constexpr u16 ephemeral_port_range_size = last_ephemeral_port - first_ephemeral_port;
  362. u16 first_scan_port = first_ephemeral_port + get_good_random<u16>() % ephemeral_port_range_size;
  363. Locker locker(sockets_by_tuple().lock());
  364. for (u16 port = first_scan_port;;) {
  365. IPv4SocketTuple proposed_tuple(local_address(), port, peer_address(), peer_port());
  366. auto it = sockets_by_tuple().resource().find(proposed_tuple);
  367. if (it == sockets_by_tuple().resource().end()) {
  368. set_local_port(port);
  369. sockets_by_tuple().resource().set(proposed_tuple, this);
  370. return port;
  371. }
  372. ++port;
  373. if (port > last_ephemeral_port)
  374. port = first_ephemeral_port;
  375. if (port == first_scan_port)
  376. break;
  377. }
  378. return EADDRINUSE;
  379. }
  380. bool TCPSocket::protocol_is_disconnected() const
  381. {
  382. switch (m_state) {
  383. case State::Closed:
  384. case State::CloseWait:
  385. case State::LastAck:
  386. case State::FinWait1:
  387. case State::FinWait2:
  388. case State::Closing:
  389. case State::TimeWait:
  390. return true;
  391. default:
  392. return false;
  393. }
  394. }
  395. void TCPSocket::shut_down_for_writing()
  396. {
  397. if (state() == State::Established) {
  398. dbgln_if(TCP_SOCKET_DEBUG, " Sending FIN/ACK from Established and moving into FinWait1");
  399. [[maybe_unused]] auto rc = send_tcp_packet(TCPFlags::FIN | TCPFlags::ACK);
  400. set_state(State::FinWait1);
  401. } else {
  402. dbgln(" Shutting down TCPSocket for writing but not moving to FinWait1 since state is {}", to_string(state()));
  403. }
  404. }
  405. KResult TCPSocket::close()
  406. {
  407. Locker socket_locker(lock());
  408. auto result = IPv4Socket::close();
  409. if (state() == State::CloseWait) {
  410. dbgln_if(TCP_SOCKET_DEBUG, " Sending FIN from CloseWait and moving into LastAck");
  411. [[maybe_unused]] auto rc = send_tcp_packet(TCPFlags::FIN | TCPFlags::ACK);
  412. set_state(State::LastAck);
  413. }
  414. if (state() != State::Closed && state() != State::Listen) {
  415. Locker locker(closing_sockets().lock());
  416. closing_sockets().resource().set(tuple(), *this);
  417. }
  418. return result;
  419. }
  420. static AK::Singleton<Lockable<HashTable<TCPSocket*>>> s_sockets_for_retransmit;
  421. Lockable<HashTable<TCPSocket*>>& TCPSocket::sockets_for_retransmit()
  422. {
  423. return *s_sockets_for_retransmit;
  424. }
  425. void TCPSocket::enqueue_for_retransmit()
  426. {
  427. Locker locker(sockets_for_retransmit().lock());
  428. sockets_for_retransmit().resource().set(this);
  429. }
  430. void TCPSocket::dequeue_for_retransmit()
  431. {
  432. Locker locker(sockets_for_retransmit().lock());
  433. sockets_for_retransmit().resource().remove(this);
  434. }
  435. void TCPSocket::retransmit_packets()
  436. {
  437. auto now = kgettimeofday();
  438. // RFC6298 says we should have at least one second between retransmits. According to
  439. // RFC1122 we must do exponential backoff - even for SYN packets.
  440. i64 retransmit_interval = 1;
  441. for (decltype(m_retransmit_attempts) i = 0; i < m_retransmit_attempts; i++)
  442. retransmit_interval *= 2;
  443. if (m_last_retransmit_time > now - Time::from_seconds(retransmit_interval))
  444. return;
  445. dbgln_if(TCP_SOCKET_DEBUG, "TCPSocket({}) handling retransmit", this);
  446. m_last_retransmit_time = now;
  447. ++m_retransmit_attempts;
  448. if (m_retransmit_attempts > maximum_retransmits) {
  449. set_state(TCPSocket::State::Closed);
  450. set_error(TCPSocket::Error::RetransmitTimeout);
  451. set_setup_state(Socket::SetupState::Completed);
  452. return;
  453. }
  454. auto routing_decision = route_to(peer_address(), local_address(), bound_interface());
  455. if (routing_decision.is_zero())
  456. return;
  457. Locker locker(m_not_acked_lock, Mutex::Mode::Shared);
  458. for (auto& packet : m_not_acked) {
  459. packet.tx_counter++;
  460. if constexpr (TCP_SOCKET_DEBUG) {
  461. auto& tcp_packet = *(const TCPPacket*)(packet.buffer->buffer.data() + packet.ipv4_payload_offset);
  462. dbgln("Sending TCP packet from {}:{} to {}:{} with ({}{}{}{}) seq_no={}, ack_no={}, tx_counter={}",
  463. local_address(), local_port(),
  464. peer_address(), peer_port(),
  465. (tcp_packet.has_syn() ? "SYN " : ""),
  466. (tcp_packet.has_ack() ? "ACK " : ""),
  467. (tcp_packet.has_fin() ? "FIN " : ""),
  468. (tcp_packet.has_rst() ? "RST " : ""),
  469. tcp_packet.sequence_number(),
  470. tcp_packet.ack_number(),
  471. packet.tx_counter);
  472. }
  473. size_t ipv4_payload_offset = routing_decision.adapter->ipv4_payload_offset();
  474. if (ipv4_payload_offset != packet.ipv4_payload_offset) {
  475. // FIXME: Add support for this. This can happen if after a route change
  476. // we ended up on another adapter which doesn't have the same layer 2 type
  477. // like the previous adapter.
  478. VERIFY_NOT_REACHED();
  479. }
  480. routing_decision.adapter->fill_in_ipv4_header(*packet.buffer,
  481. local_address(), routing_decision.next_hop, peer_address(),
  482. IPv4Protocol::TCP, packet.buffer->buffer.size() - ipv4_payload_offset, ttl());
  483. routing_decision.adapter->send_packet({ packet.buffer->buffer.data(), packet.buffer->buffer.size() });
  484. m_packets_out++;
  485. m_bytes_out += packet.buffer->buffer.size();
  486. }
  487. }
  488. bool TCPSocket::can_write(const FileDescription& file_description, size_t size) const
  489. {
  490. if (!IPv4Socket::can_write(file_description, size))
  491. return false;
  492. if (m_state == State::SynSent || m_state == State::SynReceived)
  493. return false;
  494. if (!file_description.is_blocking())
  495. return true;
  496. Locker lock(m_not_acked_lock);
  497. return m_not_acked_size + size <= m_send_window_size;
  498. }
  499. }