diff options
| author | Neal Cardwell <[email protected]> | 2015-02-06 16:04:39 -0500 |
|---|---|---|
| committer | David S. Miller <[email protected]> | 2015-02-08 01:03:12 -0800 |
| commit | a9b2c06dbef48ed31cff1764c5ce824829106f4f (patch) | |
| tree | 7e1dc6d03d3f2ba41a3a867fad3bf59c49665599 /tools/perf/util/scripting-engines/trace-event-python.c | |
| parent | 032ee4236954eb214651cb9bfc1b38ffa8fd7a01 (diff) | |
tcp: mitigate ACK loops for connections as tcp_request_sock
In the SYN_RECV state, where the TCP connection is represented by
tcp_request_sock, we now rate-limit SYNACKs in response to a client's
retransmitted SYNs: we do not send a SYNACK in response to client SYN
if it has been less than sysctl_tcp_invalid_ratelimit (default 500ms)
since we last sent a SYNACK in response to a client's retransmitted
SYN.
This allows the vast majority of legitimate client connections to
proceed unimpeded, even for the most aggressive platforms, iOS and
MacOS, which actually retransmit SYNs 1-second intervals for several
times in a row. They use SYN RTO timeouts following the progression:
1,1,1,1,1,2,4,8,16,32.
Reported-by: Avery Fay <[email protected]>
Signed-off-by: Neal Cardwell <[email protected]>
Signed-off-by: Yuchung Cheng <[email protected]>
Signed-off-by: Eric Dumazet <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions