lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 28 Feb 2007 13:13:02 +0100 From: Jarek Poplawski <jarkao2@...pl> To: =?ISO-8859-2?Q?Ilpo_J=E4rvinen?= <ilpo.jarvinen@...sinki.fi> Cc: David Miller <davem@...emloft.net>, netdev@...r.kernel.org Subject: Re: [PATCH 1/2] [TCP]: Add two new spurious RTO responses to FRTO On 27-02-2007 16:50, Ilpo Järvinen wrote: > New sysctl tcp_frto_response is added to select amongst these ... > Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@...sinki.fi> > @@ -762,15 +763,17 @@ __u32 tcp_init_cwnd(struct tcp_sock *tp, > } > > /* Set slow start threshold and cwnd not falling to slow start */ > -void tcp_enter_cwr(struct sock *sk) > +void tcp_enter_cwr(struct sock *sk, const int set_ssthresh) > { > struct tcp_sock *tp = tcp_sk(sk); > + const struct inet_connection_sock *icsk = inet_csk(sk); > > tp->prior_ssthresh = 0; > tp->bytes_acked = 0; > if (inet_csk(sk)->icsk_ca_state < TCP_CA_CWR) { - if (inet_csk(sk)->icsk_ca_state < TCP_CA_CWR) { + if (icsk->icsk_ca_state < TCP_CA_CWR) { Probably something for the next "BTW". Regards, Jarek P. > tp->undo_marker = 0; > - tp->snd_ssthresh = inet_csk(sk)->icsk_ca_ops->ssthresh(sk); > + if (set_ssthresh) > + tp->snd_ssthresh = icsk->icsk_ca_ops->ssthresh(sk); ... - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists