2 * Copyright (c) 2016 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
16 #include <vnet/tcp/tcp.h>
17 #include <vnet/session/session.h>
18 #include <vnet/fib/fib.h>
24 tcp_connection_bind (u32 session_index, ip46_address_t * ip,
25 u16 port_host_byte_order, u8 is_ip4)
27 tcp_main_t *tm = &tcp_main;
28 tcp_connection_t *listener;
30 pool_get (tm->listener_pool, listener);
31 memset (listener, 0, sizeof (*listener));
33 listener->c_c_index = listener - tm->listener_pool;
34 listener->c_lcl_port = clib_host_to_net_u16 (port_host_byte_order);
38 listener->c_lcl_ip4.as_u32 = ip->ip4.as_u32;
39 listener->c_is_ip4 = 1;
40 listener->c_proto = SESSION_TYPE_IP4_TCP;
44 clib_memcpy (&listener->c_lcl_ip6, &ip->ip6, sizeof (ip6_address_t));
45 listener->c_proto = SESSION_TYPE_IP6_TCP;
48 listener->c_s_index = session_index;
49 listener->state = TCP_STATE_LISTEN;
51 tcp_connection_timers_init (listener);
53 TCP_EVT_DBG (TCP_EVT_BIND, listener);
55 return listener->c_c_index;
59 tcp_session_bind_ip4 (u32 session_index, ip46_address_t * ip,
60 u16 port_host_byte_order)
62 return tcp_connection_bind (session_index, ip, port_host_byte_order, 1);
66 tcp_session_bind_ip6 (u32 session_index, ip46_address_t * ip,
67 u16 port_host_byte_order)
69 return tcp_connection_bind (session_index, ip, port_host_byte_order, 0);
73 tcp_connection_unbind (u32 listener_index)
75 tcp_main_t *tm = vnet_get_tcp_main ();
76 TCP_EVT_DBG (TCP_EVT_UNBIND,
77 pool_elt_at_index (tm->listener_pool, listener_index));
78 pool_put_index (tm->listener_pool, listener_index);
82 tcp_session_unbind (u32 listener_index)
84 tcp_connection_unbind (listener_index);
88 transport_connection_t *
89 tcp_session_get_listener (u32 listener_index)
91 tcp_main_t *tm = vnet_get_tcp_main ();
93 tc = pool_elt_at_index (tm->listener_pool, listener_index);
94 return &tc->connection;
98 * Cleans up connection state.
103 tcp_connection_cleanup (tcp_connection_t * tc)
105 tcp_main_t *tm = &tcp_main;
107 transport_endpoint_t *tep;
109 /* Cleanup local endpoint if this was an active connect */
110 tepi = transport_endpoint_lookup (&tm->local_endpoints_table, &tc->c_lcl_ip,
114 if (tepi != TRANSPORT_ENDPOINT_INVALID_INDEX)
116 tep = pool_elt_at_index (tm->local_endpoints, tepi);
117 transport_endpoint_table_del (&tm->local_endpoints_table, tep);
118 pool_put (tm->local_endpoints, tep);
121 /* Make sure all timers are cleared */
122 tcp_connection_timers_reset (tc);
124 /* Check if half-open */
125 if (tc->state == TCP_STATE_SYN_SENT)
126 pool_put (tm->half_open_connections, tc);
128 pool_put (tm->connections[tc->c_thread_index], tc);
132 * Connection removal.
134 * This should be called only once connection enters CLOSED state. Note
135 * that it notifies the session of the removal event, so if the goal is to
136 * just remove the connection, call tcp_connection_cleanup instead.
139 tcp_connection_del (tcp_connection_t * tc)
141 TCP_EVT_DBG (TCP_EVT_DELETE, tc);
142 stream_session_delete_notify (&tc->connection);
143 tcp_connection_cleanup (tc);
146 /** Notify session that connection has been reset.
148 * Switch state to closed and wait for session to call cleanup.
151 tcp_connection_reset (tcp_connection_t * tc)
155 case TCP_STATE_SYN_RCVD:
156 /* Cleanup everything. App wasn't notified yet */
157 stream_session_delete_notify (&tc->connection);
158 tcp_connection_cleanup (tc);
160 case TCP_STATE_SYN_SENT:
161 case TCP_STATE_ESTABLISHED:
162 case TCP_STATE_CLOSE_WAIT:
163 case TCP_STATE_FIN_WAIT_1:
164 case TCP_STATE_FIN_WAIT_2:
165 case TCP_STATE_CLOSING:
166 tc->state = TCP_STATE_CLOSED;
168 /* Make sure all timers are cleared */
169 tcp_connection_timers_reset (tc);
171 stream_session_reset_notify (&tc->connection);
173 case TCP_STATE_CLOSED:
180 * Begin connection closing procedure.
182 * If at the end the connection is not in CLOSED state, it is not removed.
183 * Instead, we rely on on TCP to advance through state machine to either
184 * 1) LAST_ACK (passive close) whereby when the last ACK is received
185 * tcp_connection_del is called. This notifies session of the delete and
187 * 2) TIME_WAIT (active close) whereby after 2MSL the 2MSL timer triggers
188 * and cleanup is called.
190 * N.B. Half-close connections are not supported
193 tcp_connection_close (tcp_connection_t * tc)
195 TCP_EVT_DBG (TCP_EVT_CLOSE, tc);
197 /* Send FIN if needed */
198 if (tc->state == TCP_STATE_ESTABLISHED || tc->state == TCP_STATE_SYN_RCVD
199 || tc->state == TCP_STATE_CLOSE_WAIT)
203 if (tc->state == TCP_STATE_ESTABLISHED || tc->state == TCP_STATE_SYN_RCVD)
204 tc->state = TCP_STATE_FIN_WAIT_1;
205 else if (tc->state == TCP_STATE_SYN_SENT)
206 tc->state = TCP_STATE_CLOSED;
207 else if (tc->state == TCP_STATE_CLOSE_WAIT)
208 tc->state = TCP_STATE_LAST_ACK;
210 /* If in CLOSED and WAITCLOSE timer is not set, delete connection now */
211 if (tc->timers[TCP_TIMER_WAITCLOSE] == TCP_TIMER_HANDLE_INVALID
212 && tc->state == TCP_STATE_CLOSED)
213 tcp_connection_del (tc);
217 tcp_session_close (u32 conn_index, u32 thread_index)
219 tcp_connection_t *tc;
220 tc = tcp_connection_get (conn_index, thread_index);
221 tcp_connection_close (tc);
225 tcp_session_cleanup (u32 conn_index, u32 thread_index)
227 tcp_connection_t *tc;
228 tc = tcp_connection_get (conn_index, thread_index);
230 /* Wait for the session tx events to clear */
231 tc->state = TCP_STATE_CLOSED;
232 tcp_timer_update (tc, TCP_TIMER_WAITCLOSE, TCP_CLEANUP_TIME);
236 ip_interface_get_first_ip (u32 sw_if_index, u8 is_ip4)
238 ip_lookup_main_t *lm4 = &ip4_main.lookup_main;
239 ip_lookup_main_t *lm6 = &ip6_main.lookup_main;
240 ip_interface_address_t *ia = 0;
245 foreach_ip_interface_address (lm4, ia, sw_if_index, 1 /* unnumbered */ ,
247 return ip_interface_address_get_address (lm4, ia);
254 foreach_ip_interface_address (lm6, ia, sw_if_index, 1 /* unnumbered */ ,
256 return ip_interface_address_get_address (lm6, ia);
264 #define PORT_MASK ((1 << 16)- 1)
266 * Allocate local port and add if successful add entry to local endpoint
267 * table to mark the pair as used.
270 tcp_allocate_local_port (tcp_main_t * tm, ip46_address_t * ip)
272 transport_endpoint_t *tep;
274 u16 min = 1024, max = 65535; /* XXX configurable ? */
278 time_now = tcp_time_now ();
280 /* Start at random point or max */
281 pool_get (tm->local_endpoints, tep);
282 clib_memcpy (&tep->ip, ip, sizeof (*ip));
284 /* Search for first free slot */
285 for (; tries >= 0; tries--)
289 /* Find a port in the specified range */
292 port = random_u32 (&time_now) & PORT_MASK;
293 if (PREDICT_TRUE (port >= min && port < max))
300 tei = transport_endpoint_lookup (&tm->local_endpoints_table, &tep->ip,
302 /* If not found, we're done */
303 if (tei == TRANSPORT_ENDPOINT_INVALID_INDEX)
305 transport_endpoint_table_add (&tm->local_endpoints_table, tep,
306 tep - tm->local_endpoints);
311 pool_put (tm->local_endpoints, tep);
316 * Initialize all connection timers as invalid
319 tcp_connection_timers_init (tcp_connection_t * tc)
323 /* Set all to invalid */
324 for (i = 0; i < TCP_N_TIMERS; i++)
326 tc->timers[i] = TCP_TIMER_HANDLE_INVALID;
329 tc->rto = TCP_RTO_INIT;
333 * Stop all connection timers
336 tcp_connection_timers_reset (tcp_connection_t * tc)
339 for (i = 0; i < TCP_N_TIMERS; i++)
341 tcp_timer_reset (tc, i);
345 /** Initialize tcp connection variables
347 * Should be called after having received a msg from the peer, i.e., a SYN or
348 * a SYNACK, such that connection options have already been exchanged. */
350 tcp_connection_init_vars (tcp_connection_t * tc)
352 tcp_connection_timers_init (tc);
354 scoreboard_init (&tc->sack_sb);
359 tcp_connection_open (ip46_address_t * rmt_addr, u16 rmt_port, u8 is_ip4)
361 tcp_main_t *tm = vnet_get_tcp_main ();
362 tcp_connection_t *tc;
364 u32 fei, sw_if_index;
365 ip46_address_t lcl_addr;
369 * Find the local address and allocate port
371 memset (&lcl_addr, 0, sizeof (lcl_addr));
373 /* Find a FIB path to the destination */
374 clib_memcpy (&prefix.fp_addr, rmt_addr, sizeof (*rmt_addr));
375 prefix.fp_proto = is_ip4 ? FIB_PROTOCOL_IP4 : FIB_PROTOCOL_IP6;
376 prefix.fp_len = is_ip4 ? 32 : 128;
378 fei = fib_table_lookup (0, &prefix);
380 /* Couldn't find route to destination. Bail out. */
381 if (fei == FIB_NODE_INDEX_INVALID)
384 sw_if_index = fib_entry_get_resolving_interface (fei);
386 if (sw_if_index == (u32) ~ 0)
392 ip4 = ip_interface_get_first_ip (sw_if_index, 1);
393 lcl_addr.ip4.as_u32 = ip4->as_u32;
398 ip6 = ip_interface_get_first_ip (sw_if_index, 0);
399 clib_memcpy (&lcl_addr.ip6, ip6, sizeof (*ip6));
402 /* Allocate source port */
403 lcl_port = tcp_allocate_local_port (tm, &lcl_addr);
406 clib_warning ("Failed to allocate src port");
411 * Create connection and send SYN
414 pool_get (tm->half_open_connections, tc);
415 memset (tc, 0, sizeof (*tc));
417 clib_memcpy (&tc->c_rmt_ip, rmt_addr, sizeof (ip46_address_t));
418 clib_memcpy (&tc->c_lcl_ip, &lcl_addr, sizeof (ip46_address_t));
419 tc->c_rmt_port = clib_host_to_net_u16 (rmt_port);
420 tc->c_lcl_port = clib_host_to_net_u16 (lcl_port);
421 tc->c_c_index = tc - tm->half_open_connections;
422 tc->c_is_ip4 = is_ip4;
423 tc->c_proto = is_ip4 ? SESSION_TYPE_IP4_TCP : SESSION_TYPE_IP6_TCP;
425 /* The other connection vars will be initialized after SYN ACK */
426 tcp_connection_timers_init (tc);
430 tc->state = TCP_STATE_SYN_SENT;
432 TCP_EVT_DBG (TCP_EVT_OPEN, tc);
434 return tc->c_c_index;
438 tcp_session_open_ip4 (ip46_address_t * addr, u16 port)
440 return tcp_connection_open (addr, port, 1);
444 tcp_session_open_ip6 (ip46_address_t * addr, u16 port)
446 return tcp_connection_open (addr, port, 0);
449 const char *tcp_dbg_evt_str[] = {
450 #define _(sym, str) str,
455 const char *tcp_fsm_states[] = {
456 #define _(sym, str) str,
457 foreach_tcp_fsm_state
462 format_tcp_state (u8 * s, va_list * args)
464 tcp_state_t *state = va_arg (*args, tcp_state_t *);
466 if (*state < TCP_N_STATES)
467 s = format (s, "%s", tcp_fsm_states[*state]);
469 s = format (s, "UNKNOWN (%d (0x%x))", *state, *state);
474 const char *tcp_conn_timers[] = {
475 #define _(sym, str) str,
481 format_tcp_timers (u8 * s, va_list * args)
483 tcp_connection_t *tc = va_arg (*args, tcp_connection_t *);
486 for (i = 0; i < TCP_N_TIMERS; i++)
487 if (tc->timers[i] != TCP_TIMER_HANDLE_INVALID)
491 for (i = 0; i < last; i++)
493 if (tc->timers[i] != TCP_TIMER_HANDLE_INVALID)
494 s = format (s, "%s,", tcp_conn_timers[i]);
498 s = format (s, "%s]", tcp_conn_timers[i]);
506 format_tcp_connection (u8 * s, va_list * args)
508 tcp_connection_t *tc = va_arg (*args, tcp_connection_t *);
513 s = format (s, "[#%d][%s] %U:%d->%U:%d", tc->c_thread_index, "T",
514 format_ip4_address, &tc->c_lcl_ip4,
515 clib_net_to_host_u16 (tc->c_lcl_port), format_ip4_address,
516 &tc->c_rmt_ip4, clib_net_to_host_u16 (tc->c_rmt_port));
520 s = format (s, "[#%d][%s] %U:%d->%U:%d", tc->c_thread_index, "T",
521 format_ip6_address, &tc->c_lcl_ip6,
522 clib_net_to_host_u16 (tc->c_lcl_port), format_ip6_address,
523 &tc->c_rmt_ip6, clib_net_to_host_u16 (tc->c_rmt_port));
530 format_tcp_connection_verbose (u8 * s, va_list * args)
532 tcp_connection_t *tc = va_arg (*args, tcp_connection_t *);
533 s = format (s, "%U %U %U", format_tcp_connection, tc, format_tcp_state,
534 &tc->state, format_tcp_timers, tc);
539 format_tcp_session (u8 * s, va_list * args)
541 u32 tci = va_arg (*args, u32);
542 u32 thread_index = va_arg (*args, u32);
543 tcp_connection_t *tc;
545 tc = tcp_connection_get (tci, thread_index);
547 return format (s, "%U", format_tcp_connection, tc);
549 return format (s, "empty");
553 format_tcp_listener_session (u8 * s, va_list * args)
555 u32 tci = va_arg (*args, u32);
556 tcp_connection_t *tc = tcp_listener_get (tci);
557 return format (s, "%U", format_tcp_connection, tc);
561 format_tcp_half_open_session (u8 * s, va_list * args)
563 u32 tci = va_arg (*args, u32);
564 tcp_connection_t *tc = tcp_half_open_connection_get (tci);
565 return format (s, "%U", format_tcp_connection, tc);
568 transport_connection_t *
569 tcp_session_get_transport (u32 conn_index, u32 thread_index)
571 tcp_connection_t *tc = tcp_connection_get (conn_index, thread_index);
572 return &tc->connection;
575 transport_connection_t *
576 tcp_half_open_session_get_transport (u32 conn_index)
578 tcp_connection_t *tc = tcp_half_open_connection_get (conn_index);
579 return &tc->connection;
583 * Compute maximum segment size for session layer.
585 * Since the result needs to be the actual data length, it first computes
586 * the tcp options to be used in the next burst and subtracts their
587 * length from the connection's snd_mss.
590 tcp_session_send_mss (transport_connection_t * trans_conn)
592 tcp_connection_t *tc = (tcp_connection_t *) trans_conn;
594 /* Ensure snd_mss does accurately reflect the amount of data we can push
595 * in a segment. This also makes sure that options are updated according to
596 * the current state of the connection. */
597 tcp_update_snd_mss (tc);
603 tcp_round_snd_space (tcp_connection_t * tc, u32 snd_space)
605 if (tc->snd_wnd < tc->snd_mss)
607 return tc->snd_wnd <= snd_space ? tc->snd_wnd : 0;
610 /* If we can't write at least a segment, don't try at all */
611 if (snd_space < tc->snd_mss)
614 /* round down to mss multiple */
615 return snd_space - (snd_space % tc->snd_mss);
619 * Compute tx window session is allowed to fill.
622 tcp_session_send_space (transport_connection_t * trans_conn)
625 tcp_connection_t *tc = (tcp_connection_t *) trans_conn;
627 /* If we haven't gotten dupacks or if we did and have gotten sacked bytes
628 * then we can still send */
629 if (PREDICT_TRUE (tcp_in_cong_recovery (tc) == 0
630 && (tc->rcv_dupacks == 0
631 || tc->sack_sb.last_sacked_bytes)))
633 snd_space = tcp_available_snd_space (tc);
634 return tcp_round_snd_space (tc, snd_space);
637 if (tcp_in_recovery (tc))
639 tc->snd_nxt = tc->snd_una_max;
640 snd_space = tcp_available_wnd (tc) - tc->rtx_bytes
641 - (tc->snd_una_max - tc->snd_congestion);
642 if (snd_space <= 0 || (tc->snd_una_max - tc->snd_una) >= tc->snd_wnd)
644 return tcp_round_snd_space (tc, snd_space);
647 /* If in fast recovery, send 1 SMSS if wnd allows */
648 if (tcp_in_fastrecovery (tc) && tcp_available_snd_space (tc)
649 && tcp_fastrecovery_sent_1_smss (tc))
651 tcp_fastrecovery_1_smss_on (tc);
659 tcp_session_tx_fifo_offset (transport_connection_t * trans_conn)
661 tcp_connection_t *tc = (tcp_connection_t *) trans_conn;
663 ASSERT (seq_geq (tc->snd_nxt, tc->snd_una));
665 /* This still works if fast retransmit is on */
666 return (tc->snd_nxt - tc->snd_una);
670 const static transport_proto_vft_t tcp4_proto = {
671 .bind = tcp_session_bind_ip4,
672 .unbind = tcp_session_unbind,
673 .push_header = tcp_push_header,
674 .get_connection = tcp_session_get_transport,
675 .get_listener = tcp_session_get_listener,
676 .get_half_open = tcp_half_open_session_get_transport,
677 .open = tcp_session_open_ip4,
678 .close = tcp_session_close,
679 .cleanup = tcp_session_cleanup,
680 .send_mss = tcp_session_send_mss,
681 .send_space = tcp_session_send_space,
682 .tx_fifo_offset = tcp_session_tx_fifo_offset,
683 .format_connection = format_tcp_session,
684 .format_listener = format_tcp_listener_session,
685 .format_half_open = format_tcp_half_open_session,
688 const static transport_proto_vft_t tcp6_proto = {
689 .bind = tcp_session_bind_ip6,
690 .unbind = tcp_session_unbind,
691 .push_header = tcp_push_header,
692 .get_connection = tcp_session_get_transport,
693 .get_listener = tcp_session_get_listener,
694 .get_half_open = tcp_half_open_session_get_transport,
695 .open = tcp_session_open_ip6,
696 .close = tcp_session_close,
697 .cleanup = tcp_session_cleanup,
698 .send_mss = tcp_session_send_mss,
699 .send_space = tcp_session_send_space,
700 .tx_fifo_offset = tcp_session_tx_fifo_offset,
701 .format_connection = format_tcp_session,
702 .format_listener = format_tcp_listener_session,
703 .format_half_open = format_tcp_half_open_session,
708 tcp_timer_keep_handler (u32 conn_index)
710 u32 thread_index = vlib_get_thread_index ();
711 tcp_connection_t *tc;
713 tc = tcp_connection_get (conn_index, thread_index);
714 tc->timers[TCP_TIMER_KEEP] = TCP_TIMER_HANDLE_INVALID;
716 tcp_connection_close (tc);
720 tcp_timer_establish_handler (u32 conn_index)
722 tcp_connection_t *tc;
725 tc = tcp_half_open_connection_get (conn_index);
726 tc->timers[TCP_TIMER_ESTABLISH] = TCP_TIMER_HANDLE_INVALID;
728 ASSERT (tc->state == TCP_STATE_SYN_SENT);
730 sst = tc->c_is_ip4 ? SESSION_TYPE_IP4_TCP : SESSION_TYPE_IP6_TCP;
731 stream_session_connect_notify (&tc->connection, sst, 1 /* fail */ );
733 tcp_connection_cleanup (tc);
737 tcp_timer_waitclose_handler (u32 conn_index)
739 u32 thread_index = vlib_get_thread_index ();
740 tcp_connection_t *tc;
742 tc = tcp_connection_get (conn_index, thread_index);
743 tc->timers[TCP_TIMER_WAITCLOSE] = TCP_TIMER_HANDLE_INVALID;
745 /* Session didn't come back with a close(). Send FIN either way
746 * and switch to LAST_ACK. */
747 if (tc->state == TCP_STATE_CLOSE_WAIT)
749 if (tc->flags & TCP_CONN_FINSNT)
751 clib_warning ("FIN was sent and still in CLOSE WAIT. Weird!");
755 tc->state = TCP_STATE_LAST_ACK;
757 /* Make sure we don't wait in LAST ACK forever */
758 tcp_timer_set (tc, TCP_TIMER_WAITCLOSE, TCP_2MSL_TIME);
760 /* Don't delete the connection yet */
764 tcp_connection_del (tc);
768 static timer_expiration_handler *timer_expiration_handlers[TCP_N_TIMERS] =
770 tcp_timer_retransmit_handler,
771 tcp_timer_delack_handler,
772 tcp_timer_persist_handler,
773 tcp_timer_keep_handler,
774 tcp_timer_waitclose_handler,
775 tcp_timer_retransmit_syn_handler,
776 tcp_timer_establish_handler
781 tcp_expired_timers_dispatch (u32 * expired_timers)
784 u32 connection_index, timer_id;
786 for (i = 0; i < vec_len (expired_timers); i++)
788 /* Get session index and timer id */
789 connection_index = expired_timers[i] & 0x0FFFFFFF;
790 timer_id = expired_timers[i] >> 28;
792 TCP_EVT_DBG (TCP_EVT_TIMER_POP, connection_index, timer_id);
794 /* Handle expiration */
795 (*timer_expiration_handlers[timer_id]) (connection_index);
800 tcp_initialize_timer_wheels (tcp_main_t * tm)
802 tw_timer_wheel_16t_2w_512sl_t *tw;
804 foreach_vlib_main (({
805 tw = &tm->timer_wheels[ii];
806 tw_timer_wheel_init_16t_2w_512sl (tw, tcp_expired_timers_dispatch,
807 100e-3 /* timer period 100ms */ , ~0);
808 tw->last_run_time = vlib_time_now (this_vlib_main);
814 tcp_main_enable (vlib_main_t * vm)
816 tcp_main_t *tm = vnet_get_tcp_main ();
817 ip_protocol_info_t *pi;
818 ip_main_t *im = &ip_main;
819 vlib_thread_main_t *vtm = vlib_get_thread_main ();
820 clib_error_t *error = 0;
823 if ((error = vlib_call_init_function (vm, ip_main_init)))
825 if ((error = vlib_call_init_function (vm, ip4_lookup_init)))
827 if ((error = vlib_call_init_function (vm, ip6_lookup_init)))
834 /* Register with IP */
835 pi = ip_get_protocol_info (im, IP_PROTOCOL_TCP);
837 return clib_error_return (0, "TCP protocol info AWOL");
838 pi->format_header = format_tcp_header;
839 pi->unformat_pg_edit = unformat_pg_tcp_header;
841 ip4_register_protocol (IP_PROTOCOL_TCP, tcp4_input_node.index);
843 /* Register as transport with URI */
844 session_register_transport (SESSION_TYPE_IP4_TCP, &tcp4_proto);
845 session_register_transport (SESSION_TYPE_IP6_TCP, &tcp6_proto);
848 * Initialize data structures
851 num_threads = 1 /* main thread */ + vtm->n_threads;
852 vec_validate (tm->connections, num_threads - 1);
854 /* Initialize per worker thread tx buffers (used for control messages) */
855 vec_validate (tm->tx_buffers, num_threads - 1);
857 /* Initialize timer wheels */
858 vec_validate (tm->timer_wheels, num_threads - 1);
859 tcp_initialize_timer_wheels (tm);
861 // vec_validate (tm->delack_connections, num_threads - 1);
863 /* Initialize clocks per tick for TCP timestamp. Used to compute
864 * monotonically increasing timestamps. */
865 tm->tstamp_ticks_per_clock = vm->clib_time.seconds_per_clock
866 / TCP_TSTAMP_RESOLUTION;
868 clib_bihash_init_24_8 (&tm->local_endpoints_table, "local endpoint table",
869 200000 /* $$$$ config parameter nbuckets */ ,
870 (64 << 20) /*$$$ config parameter table size */ );
876 vnet_tcp_enable_disable (vlib_main_t * vm, u8 is_en)
880 if (tcp_main.is_enabled)
883 return tcp_main_enable (vm);
887 tcp_main.is_enabled = 0;
894 tcp_init (vlib_main_t * vm)
896 tcp_main_t *tm = vnet_get_tcp_main ();
899 tm->vnet_main = vnet_get_main ();
905 VLIB_INIT_FUNCTION (tcp_init);
908 * fd.io coding-style-patch-verification: ON
911 * eval: (c-set-style "gnu")