xref: /netbsd-src/sys/netinet/tcp_sack.c (revision aaf4ece63a859a04e37cf3a7229b5fab0157cc06)
1 /* $NetBSD: tcp_sack.c,v 1.14 2005/12/11 12:24:58 christos Exp $ */
2 
3 /*
4  * Copyright (c) 2005 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Kentaro A. Kurahone.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. All advertising materials mentioning features or use of this software
19  *    must display the following acknowledgement:
20  *	This product includes software developed by the NetBSD
21  *	Foundation, Inc. and its contributors.
22  * 4. Neither the name of The NetBSD Foundation nor the names of its
23  *    contributors may be used to endorse or promote products derived
24  *    from this software without specific prior written permission.
25  *
26  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36  * POSSIBILITY OF SUCH DAMAGE.
37  */
38 
39 /*
40  * Copyright (c) 1982, 1986, 1988, 1990, 1993, 1994, 1995
41  *	The Regents of the University of California.  All rights reserved.
42  *
43  * Redistribution and use in source and binary forms, with or without
44  * modification, are permitted provided that the following conditions
45  * are met:
46  * 1. Redistributions of source code must retain the above copyright
47  *    notice, this list of conditions and the following disclaimer.
48  * 2. Redistributions in binary form must reproduce the above copyright
49  *    notice, this list of conditions and the following disclaimer in the
50  *    documentation and/or other materials provided with the distribution.
51  * 4. Neither the name of the University nor the names of its contributors
52  *    may be used to endorse or promote products derived from this software
53  *    without specific prior written permission.
54  *
55  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
56  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
57  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
58  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
59  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
60  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
61  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
62  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
63  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
64  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
65  * SUCH DAMAGE.
66  *
67  *	@(#)tcp_sack.c	8.12 (Berkeley) 5/24/95
68  * $FreeBSD: src/sys/netinet/tcp_sack.c,v 1.3.2.2 2004/12/25 23:02:57 rwatson Exp $
69  */
70 
71 /*
72  *	@@(#)COPYRIGHT	1.1 (NRL) 17 January 1995
73  *
74  * NRL grants permission for redistribution and use in source and binary
75  * forms, with or without modification, of the software and documentation
76  * created at NRL provided that the following conditions are met:
77  *
78  * 1. Redistributions of source code must retain the above copyright
79  *    notice, this list of conditions and the following disclaimer.
80  * 2. Redistributions in binary form must reproduce the above copyright
81  *    notice, this list of conditions and the following disclaimer in the
82  *    documentation and/or other materials provided with the distribution.
83  * 3. All advertising materials mentioning features or use of this software
84  *    must display the following acknowledgements:
85  *	This product includes software developed by the University of
86  *	California, Berkeley and its contributors.
87  *	This product includes software developed at the Information
88  *	Technology Division, US Naval Research Laboratory.
89  * 4. Neither the name of the NRL nor the names of its contributors
90  *    may be used to endorse or promote products derived from this software
91  *    without specific prior written permission.
92  *
93  * THE SOFTWARE PROVIDED BY NRL IS PROVIDED BY NRL AND CONTRIBUTORS ``AS
94  * IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
95  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
96  * PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL NRL OR
97  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
98  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
99  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
100  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
101  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
102  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
103  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
104  *
105  * The views and conclusions contained in the software and documentation
106  * are those of the authors and should not be interpreted as representing
107  * official policies, either expressed or implied, of the US Naval
108  * Research Laboratory (NRL).
109  */
110 
111 #include <sys/cdefs.h>
112 __KERNEL_RCSID(0, "$NetBSD: tcp_sack.c,v 1.14 2005/12/11 12:24:58 christos Exp $");
113 
114 #include "opt_inet.h"
115 #include "opt_ipsec.h"
116 #include "opt_inet_csum.h"
117 #include "opt_tcp_debug.h"
118 
119 #include <sys/param.h>
120 #include <sys/systm.h>
121 #include <sys/malloc.h>
122 #include <sys/mbuf.h>
123 #include <sys/protosw.h>
124 #include <sys/socket.h>
125 #include <sys/socketvar.h>
126 #include <sys/errno.h>
127 #include <sys/syslog.h>
128 #include <sys/pool.h>
129 #include <sys/domain.h>
130 #include <sys/kernel.h>
131 
132 #include <net/if.h>
133 #include <net/route.h>
134 #include <net/if_types.h>
135 
136 #include <netinet/in.h>
137 #include <netinet/in_systm.h>
138 #include <netinet/ip.h>
139 #include <netinet/in_pcb.h>
140 #include <netinet/in_var.h>
141 #include <netinet/ip_var.h>
142 
143 #ifdef INET6
144 #ifndef INET
145 #include <netinet/in.h>
146 #endif
147 #include <netinet/ip6.h>
148 #include <netinet6/ip6_var.h>
149 #include <netinet6/in6_pcb.h>
150 #include <netinet6/ip6_var.h>
151 #include <netinet6/in6_var.h>
152 #include <netinet/icmp6.h>
153 #include <netinet6/nd6.h>
154 #endif
155 
156 #ifndef INET6
157 /* always need ip6.h for IP6_EXTHDR_GET */
158 #include <netinet/ip6.h>
159 #endif
160 
161 #include <netinet/tcp.h>
162 #include <netinet/tcp_fsm.h>
163 #include <netinet/tcp_seq.h>
164 #include <netinet/tcp_timer.h>
165 #include <netinet/tcp_var.h>
166 #include <netinet/tcpip.h>
167 #include <netinet/tcp_debug.h>
168 
169 #include <machine/stdarg.h>
170 
171 /* SACK block pool. */
172 POOL_INIT(sackhole_pool, sizeof(struct sackhole), 0, 0, 0, "sackholepl", NULL);
173 
174 void
175 tcp_new_dsack(struct tcpcb *tp, tcp_seq seq, u_int32_t len)
176 {
177 	if (TCP_SACK_ENABLED(tp)) {
178 		tp->rcv_dsack_block.left = seq;
179 		tp->rcv_dsack_block.right = seq + len;
180 		tp->rcv_sack_flags |= TCPSACK_HAVED;
181 	}
182 }
183 
184 void
185 tcp_sack_option(struct tcpcb *tp, struct tcphdr *th, u_char *cp, int optlen)
186 {
187 	struct sackblk
188 	    t_sack_block[(MAX_TCPOPTLEN - 2) / (sizeof(u_int32_t) * 2)];
189 	struct sackblk *sack = NULL;
190 	struct sackhole *cur = NULL;
191 	struct sackhole *tmp = NULL;
192 	u_int32_t *lp = (u_int32_t *) (cp + 2);
193 	int i, j, num_sack_blks;
194 	tcp_seq left, right, acked;
195 
196 	/*
197 	 * If we aren't processing SACK responses, this is not an ACK
198 	 * or the peer sends us a sack option with invalid length, don't
199 	 * update the scoreboard.
200 	 */
201 	if (!TCP_SACK_ENABLED(tp) || ((th->th_flags & TH_ACK) == 0) ||
202 			(optlen % 8 != 2 || optlen < 10)) {
203 		return;
204 	}
205 
206 	/*
207 	 * If we don't want any SACK holes to be allocated, just return.
208 	 */
209 	if (tcp_sack_globalmaxholes == 0 || tcp_sack_tp_maxholes == 0) {
210 		return;
211 	}
212 
213 	/* If the ACK is outside [snd_una, snd_max], ignore the SACK options. */
214 	if (SEQ_LT(th->th_ack, tp->snd_una) || SEQ_GT(th->th_ack, tp->snd_max))
215 		return;
216 
217 	/*
218 	 * Extract SACK blocks.
219 	 *
220 	 * Note that t_sack_block is sorted so that we only need to do
221 	 * one pass over the sequence number space. (SACK "fast-path")
222 	 */
223 	num_sack_blks = optlen / 8;
224 	acked = (SEQ_GT(th->th_ack, tp->snd_una)) ? th->th_ack : tp->snd_una;
225 	for (i = 0; i < num_sack_blks; i++, lp += 2) {
226 		memcpy(&left, lp, sizeof(*lp));
227 		memcpy(&right, lp + 1, sizeof(*lp));
228 		left = ntohl(left);
229 		right = ntohl(right);
230 
231 		if (SEQ_LEQ(right, acked) || SEQ_GT(right, tp->snd_max) ||
232 		    SEQ_GEQ(left, right)) {
233 			/* SACK entry that's old, or invalid. */
234 			i--;
235 			num_sack_blks--;
236 			continue;
237 		}
238 
239 		/* Insertion sort. */
240 		for (j = i; (j > 0) && SEQ_LT(left, t_sack_block[j - 1].left);
241 		    j--) {
242 			t_sack_block[j].left = t_sack_block[j - 1].left;
243 			t_sack_block[j].right = t_sack_block[j - 1].right;
244 		}
245 		t_sack_block[j].left = left;
246 		t_sack_block[j].right = right;
247 	}
248 
249 	/* Update the scoreboard. */
250 	cur = TAILQ_FIRST(&tp->snd_holes);
251 	for (i = 0; i < num_sack_blks; i++) {
252 		sack = &t_sack_block[i];
253 		/*
254 		 * FACK TCP.  Update snd_fack so we can enter Fast
255 		 * Recovery early.
256 		 */
257 		if (SEQ_GEQ(sack->right, tp->snd_fack))
258 			tp->snd_fack = sack->right;
259 
260 		if (TAILQ_EMPTY(&tp->snd_holes)) {
261 			/* First hole. */
262 			if (tcp_sack_globalholes >= tcp_sack_globalmaxholes) {
263 				return;
264 			}
265 			cur = (struct sackhole *)
266 			    pool_get(&sackhole_pool, PR_NOWAIT);
267 			if (cur == NULL) {
268 				/* ENOBUFS, bail out*/
269 				return;
270 			}
271 			cur->start = th->th_ack;
272 			cur->end = sack->left;
273 			cur->rxmit = cur->start;
274 			tp->rcv_lastsack = sack->right;
275 			tp->snd_numholes++;
276 			tcp_sack_globalholes++;
277 			TAILQ_INSERT_HEAD(&tp->snd_holes, cur, sackhole_q);
278 			continue; /* With next sack block */
279 		}
280 
281 		/* Go through the list of holes. */
282 		while (cur) {
283 			if (SEQ_LEQ(sack->right, cur->start))
284 				/* SACKs data before the current hole */
285 				break; /* No use going through more holes */
286 
287 			if (SEQ_GEQ(sack->left, cur->end)) {
288 				/* SACKs data beyond the current hole */
289 				cur = TAILQ_NEXT(cur, sackhole_q);
290 				continue;
291 			}
292 
293 			if (SEQ_LEQ(sack->left, cur->start)) {
294 				/* Data acks at least the beginning of hole */
295 				if (SEQ_GEQ(sack->right, cur->end)) {
296 					/* Acks entire hole, so delete hole */
297 					tmp = cur;
298 					cur = TAILQ_NEXT(cur, sackhole_q);
299 					tp->snd_numholes--;
300 					tcp_sack_globalholes--;
301 					TAILQ_REMOVE(&tp->snd_holes, tmp,
302 					    sackhole_q);
303 					pool_put(&sackhole_pool, tmp);
304 					break;
305 				}
306 
307 				/* Otherwise, move start of hole forward */
308 				cur->start = sack->right;
309 				cur->rxmit = SEQ_MAX(cur->rxmit, cur->start);
310 				break;
311 			}
312 
313 			if (SEQ_GEQ(sack->right, cur->end)) {
314 				/* Move end of hole backward. */
315 				cur->end = sack->left;
316 				cur->rxmit = SEQ_MIN(cur->rxmit, cur->end);
317 				cur = TAILQ_NEXT(cur, sackhole_q);
318 				break;
319 			}
320 
321 			if (SEQ_LT(cur->start, sack->left) &&
322 			    SEQ_GT(cur->end, sack->right)) {
323 				/*
324 				 * ACKs some data in middle of a hole; need to
325 				 * split current hole
326 				 */
327 				if (tcp_sack_globalholes >=
328 						tcp_sack_globalmaxholes ||
329 						tp->snd_numholes >=
330 						tcp_sack_tp_maxholes) {
331 					return;
332 				}
333 				tmp = (struct sackhole *)
334 				    pool_get(&sackhole_pool, PR_NOWAIT);
335 				if (tmp == NULL) {
336 					/* ENOBUFS, bail out. */
337 					return;
338 				}
339 				tmp->start = sack->right;
340 				tmp->end = cur->end;
341 				tmp->rxmit = SEQ_MAX(cur->rxmit, tmp->start);
342 				cur->end = sack->left;
343 				cur->rxmit = SEQ_MIN(cur->rxmit, cur->end);
344 				tp->snd_numholes++;
345 				tcp_sack_globalholes++;
346 				TAILQ_INSERT_AFTER(&tp->snd_holes, cur, tmp,
347 						sackhole_q);
348 				cur = tmp;
349 				break;
350 			}
351 		}
352 
353 		/* At this point, we have reached the tail of the list. */
354 		if (SEQ_LT(tp->rcv_lastsack, sack->left)) {
355 			/*
356 			 * Need to append new hole at end.
357 			 */
358 			if (tcp_sack_globalholes >=
359 					tcp_sack_globalmaxholes ||
360 					tp->snd_numholes >=
361 					tcp_sack_tp_maxholes) {
362 				return;
363 			}
364 			tmp = (struct sackhole *)
365 			    pool_get(&sackhole_pool, PR_NOWAIT);
366 			if (tmp == NULL)
367 				continue; /* ENOBUFS */
368 			tmp->start = tp->rcv_lastsack;
369 			tmp->end = sack->left;
370 			tmp->rxmit = tmp->start;
371 			tp->snd_numholes++;
372 			tcp_sack_globalholes++;
373 			TAILQ_INSERT_TAIL(&tp->snd_holes, tmp, sackhole_q);
374 			cur = tmp;
375 		}
376 		if (SEQ_LT(tp->rcv_lastsack, sack->right)) {
377 			tp->rcv_lastsack = sack->right;
378 		}
379 	}
380 }
381 
382 void
383 tcp_del_sackholes(struct tcpcb *tp, struct tcphdr *th)
384 {
385 	/* Max because this could be an older ack that just arrived. */
386 	tcp_seq lastack = SEQ_GT(th->th_ack, tp->snd_una) ?
387 		th->th_ack : tp->snd_una;
388 	struct sackhole *cur = TAILQ_FIRST(&tp->snd_holes);
389 	struct sackhole *tmp;
390 
391 	while (cur) {
392 		if (SEQ_LEQ(cur->end, lastack)) {
393 			tmp = cur;
394 			cur = TAILQ_NEXT(cur, sackhole_q);
395 			tp->snd_numholes--;
396 			tcp_sack_globalholes--;
397 			TAILQ_REMOVE(&tp->snd_holes, tmp, sackhole_q);
398 			pool_put(&sackhole_pool, tmp);
399 		} else if (SEQ_LT(cur->start, lastack)) {
400 			cur->start = lastack;
401 			if (SEQ_LT(cur->rxmit, cur->start))
402 				cur->rxmit = cur->start;
403 			break;
404 		} else
405 			break;
406 
407 	}
408 }
409 
410 void
411 tcp_free_sackholes(struct tcpcb *tp)
412 {
413 	struct sackhole *sack;
414 
415 	/* Free up the SACK hole list. */
416 	while (!TAILQ_EMPTY(&tp->snd_holes)) {
417 		sack = TAILQ_FIRST(&tp->snd_holes);
418 		tcp_sack_globalholes--;
419 		TAILQ_REMOVE(&tp->snd_holes, sack, sackhole_q);
420 		pool_put(&sackhole_pool, sack);
421 	}
422 
423 	tp->snd_numholes = 0;
424 }
425 
426 /*
427  * Implements the SACK response to a new ack, checking for partial acks
428  * in fast recovery.
429  */
430 void
431 tcp_sack_newack(struct tcpcb *tp, struct tcphdr *th)
432 {
433 	if (tp->t_partialacks < 0) {
434 		/*
435 		 * Not in fast recovery.  Reset the duplicate ack
436 		 * counter.
437 		 */
438 		tp->t_dupacks = 0;
439 	} else if (SEQ_LT(th->th_ack, tp->snd_recover)) {
440 		/*
441 		 * Partial ack handling within a sack recovery episode.
442 		 * Keeping this very simple for now. When a partial ack
443 		 * is received, force snd_cwnd to a value that will allow
444 		 * the sender to transmit no more than 2 segments.
445 		 * If necessary, a fancier scheme can be adopted at a
446 		 * later point, but for now, the goal is to prevent the
447 		 * sender from bursting a large amount of data in the midst
448 		 * of sack recovery.
449 		 */
450 		int num_segs = 1;
451 		int sack_bytes_rxmt = 0;
452 
453 		tp->t_partialacks++;
454 		TCP_TIMER_DISARM(tp, TCPT_REXMT);
455 		tp->t_rtttime = 0;
456 
457 	 	/*
458 		 * send one or 2 segments based on how much new data was acked
459 		 */
460  		if (((th->th_ack - tp->snd_una) / tp->t_segsz) > 2)
461  			num_segs = 2;
462 	 	(void)tcp_sack_output(tp, &sack_bytes_rxmt);
463  		tp->snd_cwnd = sack_bytes_rxmt +
464 		    (tp->snd_nxt - tp->sack_newdata) + num_segs * tp->t_segsz;
465   		tp->t_flags |= TF_ACKNOW;
466 	  	(void) tcp_output(tp);
467 	} else {
468 		/*
469 		 * Complete ack, inflate the congestion window to
470                  * ssthresh and exit fast recovery.
471 		 *
472 		 * Window inflation should have left us with approx.
473 		 * snd_ssthresh outstanding data.  But in case we
474 		 * would be inclined to send a burst, better to do
475 		 * it via the slow start mechanism.
476 		 */
477 		if (SEQ_SUB(tp->snd_max, th->th_ack) < tp->snd_ssthresh)
478 			tp->snd_cwnd = SEQ_SUB(tp->snd_max, th->th_ack)
479 			    + tp->t_segsz;
480 		else
481 			tp->snd_cwnd = tp->snd_ssthresh;
482 		tp->t_partialacks = -1;
483 		tp->t_dupacks = 0;
484 		if (SEQ_GT(th->th_ack, tp->snd_fack))
485 			tp->snd_fack = th->th_ack;
486 	}
487 }
488 
489 /*
490  * Returns pointer to a sackhole if there are any pending retransmissions;
491  * NULL otherwise.
492  */
493 struct sackhole *
494 tcp_sack_output(struct tcpcb *tp, int *sack_bytes_rexmt)
495 {
496 	struct sackhole *cur = NULL;
497 
498 	if(!TCP_SACK_ENABLED(tp))
499 		return (NULL);
500 
501 	*sack_bytes_rexmt = 0;
502 	TAILQ_FOREACH(cur, &tp->snd_holes, sackhole_q) {
503 		if (SEQ_LT(cur->rxmit, cur->end)) {
504 			if (SEQ_LT(cur->rxmit, tp->snd_una)) {
505 				/* old SACK hole */
506 				continue;
507 			}
508 			*sack_bytes_rexmt += (cur->rxmit - cur->start);
509 			break;
510 		}
511 		*sack_bytes_rexmt += (cur->rxmit - cur->start);
512 	}
513 
514 	return (cur);
515 }
516 
517 /*
518  * After a timeout, the SACK list may be rebuilt.  This SACK information
519  * should be used to avoid retransmitting SACKed data.  This function
520  * traverses the SACK list to see if snd_nxt should be moved forward.
521  */
522 void
523 tcp_sack_adjust(struct tcpcb *tp)
524 {
525 	struct sackhole *cur = TAILQ_FIRST(&tp->snd_holes);
526 	struct sackhole *n = NULL;
527 
528 	if (TAILQ_EMPTY(&tp->snd_holes))
529 		return; /* No holes */
530 	if (SEQ_GEQ(tp->snd_nxt, tp->rcv_lastsack))
531 		return; /* We're already beyond any SACKed blocks */
532 
533 	/*
534 	 * Two cases for which we want to advance snd_nxt:
535 	 * i) snd_nxt lies between end of one hole and beginning of another
536 	 * ii) snd_nxt lies between end of last hole and rcv_lastsack
537 	 */
538 	while ((n = TAILQ_NEXT(cur, sackhole_q)) != NULL) {
539 		if (SEQ_LT(tp->snd_nxt, cur->end))
540 			return;
541 		if (SEQ_GEQ(tp->snd_nxt, n->start))
542 			cur = n;
543 		else {
544 			tp->snd_nxt = n->start;
545 			return;
546 		}
547 	}
548 	if (SEQ_LT(tp->snd_nxt, cur->end))
549 		return;
550 	tp->snd_nxt = tp->rcv_lastsack;
551 
552 	return;
553 }
554 
555 int
556 tcp_sack_numblks(const struct tcpcb *tp)
557 {
558 	int numblks;
559 
560 	if (!TCP_SACK_ENABLED(tp)) {
561 		return 0;
562 	}
563 
564 	numblks = (((tp->rcv_sack_flags & TCPSACK_HAVED) != 0) ? 1 : 0) +
565 	    tp->t_segqlen;
566 
567 	if (numblks == 0) {
568 		return 0;
569 	}
570 
571 	if (numblks > TCP_SACK_MAX) {
572 		numblks = TCP_SACK_MAX;
573 	}
574 
575 	return numblks;
576 }
577