diff options
Diffstat (limited to 'net/ipv4/tcp_timer.c')
| -rw-r--r-- | net/ipv4/tcp_timer.c | 45 | 
1 files changed, 23 insertions, 22 deletions
| diff --git a/net/ipv4/tcp_timer.c b/net/ipv4/tcp_timer.c index 14672543cf0b..c0feeeef962a 100644 --- a/net/ipv4/tcp_timer.c +++ b/net/ipv4/tcp_timer.c @@ -63,7 +63,7 @@ static int tcp_out_of_resources(struct sock *sk, bool do_reset)  	/* If peer does not open window for long time, or did not transmit  	 * anything for long time, penalize it. */ -	if ((s32)(tcp_time_stamp - tp->lsndtime) > 2*TCP_RTO_MAX || !do_reset) +	if ((s32)(tcp_jiffies32 - tp->lsndtime) > 2*TCP_RTO_MAX || !do_reset)  		shift++;  	/* If some dubious ICMP arrived, penalize even more. */ @@ -73,7 +73,7 @@ static int tcp_out_of_resources(struct sock *sk, bool do_reset)  	if (tcp_check_oom(sk, shift)) {  		/* Catch exceptional cases, when connection requires reset.  		 *      1. Last segment was sent recently. */ -		if ((s32)(tcp_time_stamp - tp->lsndtime) <= TCP_TIMEWAIT_LEN || +		if ((s32)(tcp_jiffies32 - tp->lsndtime) <= TCP_TIMEWAIT_LEN ||  		    /*  2. Window is closed. */  		    (!tp->snd_wnd && !tp->packets_out))  			do_reset = true; @@ -115,7 +115,7 @@ static void tcp_mtu_probing(struct inet_connection_sock *icsk, struct sock *sk)  	if (net->ipv4.sysctl_tcp_mtu_probing) {  		if (!icsk->icsk_mtup.enabled) {  			icsk->icsk_mtup.enabled = 1; -			icsk->icsk_mtup.probe_timestamp = tcp_time_stamp; +			icsk->icsk_mtup.probe_timestamp = tcp_jiffies32;  			tcp_sync_mss(sk, icsk->icsk_pmtu_cookie);  		} else {  			struct net *net = sock_net(sk); @@ -139,22 +139,18 @@ static void tcp_mtu_probing(struct inet_connection_sock *icsk, struct sock *sk)   *  @timeout:  A custom timeout value.   *             If set to 0 the default timeout is calculated and used.   *             Using TCP_RTO_MIN and the number of unsuccessful retransmits. - *  @syn_set:  true if the SYN Bit was set.   *   * The default "timeout" value this function can calculate and use   * is equivalent to the timeout of a TCP Connection   * after "boundary" unsuccessful, exponentially backed-off - * retransmissions with an initial RTO of TCP_RTO_MIN or TCP_TIMEOUT_INIT if - * syn_set flag is set. - * + * retransmissions with an initial RTO of TCP_RTO_MIN.   */  static bool retransmits_timed_out(struct sock *sk,  				  unsigned int boundary, -				  unsigned int timeout, -				  bool syn_set) +				  unsigned int timeout)  { +	const unsigned int rto_base = TCP_RTO_MIN;  	unsigned int linear_backoff_thresh, start_ts; -	unsigned int rto_base = syn_set ? TCP_TIMEOUT_INIT : TCP_RTO_MIN;  	if (!inet_csk(sk)->icsk_retransmits)  		return false; @@ -172,7 +168,7 @@ static bool retransmits_timed_out(struct sock *sk,  			timeout = ((2 << linear_backoff_thresh) - 1) * rto_base +  				(boundary - linear_backoff_thresh) * TCP_RTO_MAX;  	} -	return (tcp_time_stamp - start_ts) >= timeout; +	return (tcp_time_stamp(tcp_sk(sk)) - start_ts) >= jiffies_to_msecs(timeout);  }  /* A write timeout has occurred. Process the after effects. */ @@ -181,8 +177,8 @@ static int tcp_write_timeout(struct sock *sk)  	struct inet_connection_sock *icsk = inet_csk(sk);  	struct tcp_sock *tp = tcp_sk(sk);  	struct net *net = sock_net(sk); +	bool expired, do_reset;  	int retry_until; -	bool do_reset, syn_set = false;  	if ((1 << sk->sk_state) & (TCPF_SYN_SENT | TCPF_SYN_RECV)) {  		if (icsk->icsk_retransmits) { @@ -196,9 +192,9 @@ static int tcp_write_timeout(struct sock *sk)  			sk_rethink_txhash(sk);  		}  		retry_until = icsk->icsk_syn_retries ? : net->ipv4.sysctl_tcp_syn_retries; -		syn_set = true; +		expired = icsk->icsk_retransmits >= retry_until;  	} else { -		if (retransmits_timed_out(sk, net->ipv4.sysctl_tcp_retries1, 0, 0)) { +		if (retransmits_timed_out(sk, net->ipv4.sysctl_tcp_retries1, 0)) {  			/* Some middle-boxes may black-hole Fast Open _after_  			 * the handshake. Therefore we conservatively disable  			 * Fast Open on this path on recurring timeouts after @@ -224,15 +220,15 @@ static int tcp_write_timeout(struct sock *sk)  			retry_until = tcp_orphan_retries(sk, alive);  			do_reset = alive || -				!retransmits_timed_out(sk, retry_until, 0, 0); +				!retransmits_timed_out(sk, retry_until, 0);  			if (tcp_out_of_resources(sk, do_reset))  				return 1;  		} +		expired = retransmits_timed_out(sk, retry_until, +						icsk->icsk_user_timeout);  	} - -	if (retransmits_timed_out(sk, retry_until, -				  syn_set ? 0 : icsk->icsk_user_timeout, syn_set)) { +	if (expired) {  		/* Has it gone just too far? */  		tcp_write_err(sk);  		return 1; @@ -339,9 +335,10 @@ static void tcp_probe_timer(struct sock *sk)  	 */  	start_ts = tcp_skb_timestamp(tcp_send_head(sk));  	if (!start_ts) -		skb_mstamp_get(&tcp_send_head(sk)->skb_mstamp); +		tcp_send_head(sk)->skb_mstamp = tp->tcp_mstamp;  	else if (icsk->icsk_user_timeout && -		 (s32)(tcp_time_stamp - start_ts) > icsk->icsk_user_timeout) +		 (s32)(tcp_time_stamp(tp) - start_ts) > +		 jiffies_to_msecs(icsk->icsk_user_timeout))  		goto abort;  	max_probes = sock_net(sk)->ipv4.sysctl_tcp_retries2; @@ -451,7 +448,7 @@ void tcp_retransmit_timer(struct sock *sk)  					    tp->snd_una, tp->snd_nxt);  		}  #endif -		if (tcp_time_stamp - tp->rcv_tstamp > TCP_RTO_MAX) { +		if (tcp_jiffies32 - tp->rcv_tstamp > TCP_RTO_MAX) {  			tcp_write_err(sk);  			goto out;  		} @@ -539,7 +536,7 @@ out_reset_timer:  		icsk->icsk_rto = min(icsk->icsk_rto << 1, TCP_RTO_MAX);  	}  	inet_csk_reset_xmit_timer(sk, ICSK_TIME_RETRANS, icsk->icsk_rto, TCP_RTO_MAX); -	if (retransmits_timed_out(sk, net->ipv4.sysctl_tcp_retries1 + 1, 0, 0)) +	if (retransmits_timed_out(sk, net->ipv4.sysctl_tcp_retries1 + 1, 0))  		__sk_dst_reset(sk);  out:; @@ -561,6 +558,7 @@ void tcp_write_timer_handler(struct sock *sk)  		goto out;  	} +	tcp_mstamp_refresh(tcp_sk(sk));  	event = icsk->icsk_pending;  	switch (event) { @@ -710,4 +708,7 @@ void tcp_init_xmit_timers(struct sock *sk)  {  	inet_csk_init_xmit_timers(sk, &tcp_write_timer, &tcp_delack_timer,  				  &tcp_keepalive_timer); +	hrtimer_init(&tcp_sk(sk)->pacing_timer, CLOCK_MONOTONIC, +		     HRTIMER_MODE_ABS_PINNED); +	tcp_sk(sk)->pacing_timer.function = tcp_pace_kick;  } |