diff options
author | Neal Cardwell <[email protected]> | 2015-02-06 16:04:40 -0500 |
---|---|---|
committer | David S. Miller <[email protected]> | 2015-02-08 01:03:12 -0800 |
commit | f2b2c582e82429270d5818fbabe653f4359d7024 (patch) | |
tree | 1e0545a57b7df4c2ee5a43c131386d453539c68d /lib/memory-notifier-error-inject.c | |
parent | a9b2c06dbef48ed31cff1764c5ce824829106f4f (diff) |
tcp: mitigate ACK loops for connections as tcp_sock
Ensure that in state ESTABLISHED, where the connection is represented
by a tcp_sock, we rate limit dupacks in response to incoming packets
(a) with TCP timestamps that fail PAWS checks, or (b) with sequence
numbers or ACK numbers that are out of the acceptable window.
We do not send a dupack in response to out-of-window packets if it has
been less than sysctl_tcp_invalid_ratelimit (default 500ms) since we
last sent a dupack in response to an out-of-window packet.
There is already a similar (although global) rate-limiting mechanism
for "challenge ACKs". When deciding whether to send a challence ACK,
we first consult the new per-connection rate limit, and then the
global rate limit.
Reported-by: Avery Fay <[email protected]>
Signed-off-by: Neal Cardwell <[email protected]>
Signed-off-by: Yuchung Cheng <[email protected]>
Signed-off-by: Eric Dumazet <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'lib/memory-notifier-error-inject.c')
0 files changed, 0 insertions, 0 deletions