Skip to content

Commit 6f8a612

Browse files
Florian Westphalkuba-moo
authored andcommitted
mptcp: keep track of advertised windows right edge
Before sending 'x' new bytes also check that the new snd_una would be within the permitted receive window. For every ACK that also contains a DSS ack, check whether its tcp-level receive window would advance the current mptcp window right edge and update it if so. Signed-off-by: Florian Westphal <[email protected]> Co-developed-by: Paolo Abeni <[email protected]> Signed-off-by: Paolo Abeni <[email protected]> Signed-off-by: Jakub Kicinski <[email protected]>
1 parent 8edf086 commit 6f8a612

File tree

3 files changed

+69
-5
lines changed

3 files changed

+69
-5
lines changed

net/mptcp/options.c

Lines changed: 20 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -809,11 +809,14 @@ static u64 expand_ack(u64 old_ack, u64 cur_ack, bool use_64bit)
809809
return cur_ack;
810810
}
811811

812-
static void update_una(struct mptcp_sock *msk,
813-
struct mptcp_options_received *mp_opt)
812+
static void ack_update_msk(struct mptcp_sock *msk,
813+
const struct sock *ssk,
814+
struct mptcp_options_received *mp_opt)
814815
{
815816
u64 new_snd_una, snd_una, old_snd_una = atomic64_read(&msk->snd_una);
817+
u64 new_wnd_end, wnd_end, old_wnd_end = atomic64_read(&msk->wnd_end);
816818
u64 snd_nxt = READ_ONCE(msk->snd_nxt);
819+
struct sock *sk = (struct sock *)msk;
817820

818821
/* avoid ack expansion on update conflict, to reduce the risk of
819822
* wrongly expanding to a future ack sequence number, which is way
@@ -825,12 +828,25 @@ static void update_una(struct mptcp_sock *msk,
825828
if (after64(new_snd_una, snd_nxt))
826829
new_snd_una = old_snd_una;
827830

831+
new_wnd_end = new_snd_una + tcp_sk(ssk)->snd_wnd;
832+
833+
while (after64(new_wnd_end, old_wnd_end)) {
834+
wnd_end = old_wnd_end;
835+
old_wnd_end = atomic64_cmpxchg(&msk->wnd_end, wnd_end,
836+
new_wnd_end);
837+
if (old_wnd_end == wnd_end) {
838+
if (mptcp_send_head(sk))
839+
mptcp_schedule_work(sk);
840+
break;
841+
}
842+
}
843+
828844
while (after64(new_snd_una, old_snd_una)) {
829845
snd_una = old_snd_una;
830846
old_snd_una = atomic64_cmpxchg(&msk->snd_una, snd_una,
831847
new_snd_una);
832848
if (old_snd_una == snd_una) {
833-
mptcp_data_acked((struct sock *)msk);
849+
mptcp_data_acked(sk);
834850
break;
835851
}
836852
}
@@ -930,7 +946,7 @@ void mptcp_incoming_options(struct sock *sk, struct sk_buff *skb)
930946
* monodirectional flows will stuck
931947
*/
932948
if (mp_opt.use_ack)
933-
update_una(msk, &mp_opt);
949+
ack_update_msk(msk, sk, &mp_opt);
934950

935951
/* Zero-data-length packets are dropped by the caller and not
936952
* propagated to the MPTCP layer, so the skb extension does not

net/mptcp/protocol.c

Lines changed: 48 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,12 @@ static struct socket *__mptcp_nmpc_socket(const struct mptcp_sock *msk)
5757
return msk->subflow;
5858
}
5959

60+
/* Returns end sequence number of the receiver's advertised window */
61+
static u64 mptcp_wnd_end(const struct mptcp_sock *msk)
62+
{
63+
return atomic64_read(&msk->wnd_end);
64+
}
65+
6066
static bool mptcp_is_tcpsk(struct sock *sk)
6167
{
6268
struct socket *sock = sk->sk_socket;
@@ -174,6 +180,7 @@ static void mptcp_data_queue_ofo(struct mptcp_sock *msk, struct sk_buff *skb)
174180
if (after64(seq, max_seq)) {
175181
/* out of window */
176182
mptcp_drop(sk, skb);
183+
pr_debug("oow by %ld", (unsigned long)seq - (unsigned long)max_seq);
177184
MPTCP_INC_STATS(sock_net(sk), MPTCP_MIB_NODSSWINDOW);
178185
return;
179186
}
@@ -847,6 +854,7 @@ static void mptcp_clean_una(struct sock *sk)
847854
*/
848855
if (__mptcp_check_fallback(msk))
849856
atomic64_set(&msk->snd_una, msk->snd_nxt);
857+
850858
snd_una = atomic64_read(&msk->snd_una);
851859

852860
list_for_each_entry_safe(dfrag, dtmp, &msk->rtx_queue, list) {
@@ -944,12 +952,30 @@ struct mptcp_sendmsg_info {
944952
unsigned int flags;
945953
};
946954

955+
static int mptcp_check_allowed_size(struct mptcp_sock *msk, u64 data_seq,
956+
int avail_size)
957+
{
958+
u64 window_end = mptcp_wnd_end(msk);
959+
960+
if (__mptcp_check_fallback(msk))
961+
return avail_size;
962+
963+
if (!before64(data_seq + avail_size, window_end)) {
964+
u64 allowed_size = window_end - data_seq;
965+
966+
return min_t(unsigned int, allowed_size, avail_size);
967+
}
968+
969+
return avail_size;
970+
}
971+
947972
static int mptcp_sendmsg_frag(struct sock *sk, struct sock *ssk,
948973
struct mptcp_data_frag *dfrag,
949974
struct mptcp_sendmsg_info *info)
950975
{
951976
u64 data_seq = dfrag->data_seq + info->sent;
952977
struct mptcp_sock *msk = mptcp_sk(sk);
978+
bool zero_window_probe = false;
953979
struct mptcp_ext *mpext = NULL;
954980
struct sk_buff *skb, *tail;
955981
bool can_collapse = false;
@@ -979,6 +1005,16 @@ static int mptcp_sendmsg_frag(struct sock *sk, struct sock *ssk,
9791005
avail_size = info->size_goal - skb->len;
9801006
}
9811007

1008+
/* Zero window and all data acked? Probe. */
1009+
avail_size = mptcp_check_allowed_size(msk, data_seq, avail_size);
1010+
if (avail_size == 0) {
1011+
if (skb || atomic64_read(&msk->snd_una) != msk->snd_nxt)
1012+
return 0;
1013+
zero_window_probe = true;
1014+
data_seq = atomic64_read(&msk->snd_una) - 1;
1015+
avail_size = 1;
1016+
}
1017+
9821018
if (WARN_ON_ONCE(info->sent > info->limit ||
9831019
info->limit > dfrag->data_len))
9841020
return 0;
@@ -996,6 +1032,7 @@ static int mptcp_sendmsg_frag(struct sock *sk, struct sock *ssk,
9961032
if (skb == tail) {
9971033
WARN_ON_ONCE(!can_collapse);
9981034
mpext->data_len += ret;
1035+
WARN_ON_ONCE(zero_window_probe);
9991036
goto out;
10001037
}
10011038

@@ -1013,6 +1050,12 @@ static int mptcp_sendmsg_frag(struct sock *sk, struct sock *ssk,
10131050
mpext->data_seq, mpext->subflow_seq, mpext->data_len,
10141051
mpext->dsn64);
10151052

1053+
if (zero_window_probe) {
1054+
mptcp_subflow_ctx(ssk)->rel_write_seq += ret;
1055+
mpext->frozen = 1;
1056+
ret = 0;
1057+
tcp_push_pending_frames(ssk);
1058+
}
10161059
out:
10171060
mptcp_subflow_ctx(ssk)->rel_write_seq += ret;
10181061
return ret;
@@ -1866,7 +1909,7 @@ static void mptcp_worker(struct work_struct *work)
18661909
info.limit = dfrag->already_sent;
18671910
while (info.sent < dfrag->already_sent) {
18681911
ret = mptcp_sendmsg_frag(sk, ssk, dfrag, &info);
1869-
if (ret < 0)
1912+
if (ret <= 0)
18701913
break;
18711914

18721915
MPTCP_INC_STATS(sock_net(sk), MPTCP_MIB_RETRANSSEGS);
@@ -2226,6 +2269,8 @@ struct sock *mptcp_sk_clone(const struct sock *sk,
22262269
msk->write_seq = subflow_req->idsn + 1;
22272270
msk->snd_nxt = msk->write_seq;
22282271
atomic64_set(&msk->snd_una, msk->write_seq);
2272+
atomic64_set(&msk->wnd_end, msk->snd_nxt + req->rsk_rcv_wnd);
2273+
22292274
if (mp_opt->mp_capable) {
22302275
msk->can_ack = true;
22312276
msk->remote_key = mp_opt->sndr_key;
@@ -2258,6 +2303,8 @@ void mptcp_rcv_space_init(struct mptcp_sock *msk, const struct sock *ssk)
22582303
TCP_INIT_CWND * tp->advmss);
22592304
if (msk->rcvq_space.space == 0)
22602305
msk->rcvq_space.space = TCP_INIT_CWND * TCP_MSS_DEFAULT;
2306+
2307+
atomic64_set(&msk->wnd_end, msk->snd_nxt + tcp_sk(ssk)->snd_wnd);
22612308
}
22622309

22632310
static struct sock *mptcp_accept(struct sock *sk, int flags, int *err,

net/mptcp/protocol.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -215,6 +215,7 @@ struct mptcp_sock {
215215
struct sock *last_snd;
216216
int snd_burst;
217217
atomic64_t snd_una;
218+
atomic64_t wnd_end;
218219
unsigned long timer_ival;
219220
u32 token;
220221
unsigned long flags;

0 commit comments

Comments
 (0)