diff options
author | Stefano Brivio <sbrivio@redhat.com> | 2025-08-29 22:11:27 +0200 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2025-09-11 17:03:38 +0200 |
commit | 1d502be1a809dcdc4614815f4ec0da77a1ff27ec (patch) | |
tree | db66b7d4250f4ff017cfe465f0584d78e6b44794 | |
parent | 2e3d93ba7033754301af0d50cd0bb20a38a005ac (diff) | |
download | passt-1d502be1a809dcdc4614815f4ec0da77a1ff27ec.tar passt-1d502be1a809dcdc4614815f4ec0da77a1ff27ec.tar.gz passt-1d502be1a809dcdc4614815f4ec0da77a1ff27ec.tar.bz2 passt-1d502be1a809dcdc4614815f4ec0da77a1ff27ec.tar.lz passt-1d502be1a809dcdc4614815f4ec0da77a1ff27ec.tar.xz passt-1d502be1a809dcdc4614815f4ec0da77a1ff27ec.tar.zst passt-1d502be1a809dcdc4614815f4ec0da77a1ff27ec.zip |
tcp: Factor sequence rewind for retransmissions into a new function
...as I'm going to need a third occurrence of this in the next change.
This introduces a small functional change in tcp_data_from_tap(): the
sequence was previously rewound to the highest ACK number we found in
the current packet batch, and not to the current value of
seq_ack_from_tap.
The two might differ in case tcp_sock_consume() failed, because in
that case we're ignoring that ACK altogether. But if we're ignoring
it, it looks more correct to me to start retransmitting from an
earlier sequence anyway.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
Tested-by: Paul Holzinger <pholzing@redhat.com>
-rw-r--r-- | tcp.c | 47 |
1 files changed, 32 insertions, 15 deletions
@@ -1108,6 +1108,26 @@ static void tcp_update_seqack_from_tap(const struct ctx *c, } /** + * tcp_rewind_seq() - Rewind sequence to tap and socket offset to current ACK + * @c: Execution context + * @conn: Connection pointer + * + * Return: 0 on success, -1 on failure, with connection reset + */ +static int tcp_rewind_seq(const struct ctx *c, struct tcp_tap_conn *conn) +{ + conn->seq_to_tap = conn->seq_ack_from_tap; + conn->events &= ~TAP_FIN_SENT; + + if (tcp_set_peek_offset(conn, 0)) { + tcp_rst(c, conn); + return -1; + } + + return 0; +} + +/** * tcp_prepare_flags() - Prepare header for flags-only segment (no payload) * @c: Execution context * @conn: Connection pointer @@ -1776,13 +1796,11 @@ static int tcp_data_from_tap(const struct ctx *c, struct tcp_tap_conn *conn, if (retr) { flow_trace(conn, "fast re-transmit, ACK: %u, previous sequence: %u", - max_ack_seq, conn->seq_to_tap); - conn->seq_to_tap = max_ack_seq; - conn->events &= ~TAP_FIN_SENT; - if (tcp_set_peek_offset(conn, 0)) { - tcp_rst(c, conn); + conn->seq_ack_from_tap, conn->seq_to_tap); + + if (tcp_rewind_seq(c, conn)) return -1; - } + tcp_data_from_sock(c, conn); } @@ -2311,17 +2329,16 @@ void tcp_timer_handler(const struct ctx *c, union epoll_ref ref) tcp_rst(c, conn); } else { flow_dbg(conn, "ACK timeout, retry"); - conn->retrans++; - conn->seq_to_tap = conn->seq_ack_from_tap; - conn->events &= ~TAP_FIN_SENT; + if (!conn->wnd_from_tap) conn->wnd_from_tap = 1; /* Zero-window probe */ - if (tcp_set_peek_offset(conn, 0)) { - tcp_rst(c, conn); - } else { - tcp_data_from_sock(c, conn); - tcp_timer_ctl(c, conn); - } + + conn->retrans++; + if (tcp_rewind_seq(c, conn)) + return; + + tcp_data_from_sock(c, conn); + tcp_timer_ctl(c, conn); } } else { struct itimerspec new = { { 0 }, { ACT_TIMEOUT, 0 } }; |