On 07/09/2018 04:25 AM, [email protected] wrote: > From: Joakim Misund <[email protected]> > > Issue: > Currently TCP stack does not check for a destination specific CC before > responding to a syn with a syn/ack. > The system wide default CC is used. If the default CC does not need ECN, but > the destination specific does, > the syn/ack will not carry ECT(0) which makes it eligible to drop instead of > being marked at routers. > In an ECN-based network ECN marks are frequent (likely) and packet not > carrying ECT(0) are likely to be dropped. > This leads to slow connection establishment, and in worst case the > establishment can fail. > > Signed-off-by: Joakim Misund <[email protected]> > --- > include/net/tcp.h | 1 + > net/ipv4/tcp_input.c | 2 ++ > net/ipv4/tcp_output.c | 2 +- > 3 files changed, 4 insertions(+), 1 deletion(-) > > diff --git a/include/net/tcp.h b/include/net/tcp.h > index af3ec72d5d41..347c59ac0a72 100644 > --- a/include/net/tcp.h > +++ b/include/net/tcp.h > @@ -545,6 +545,7 @@ void tcp_send_loss_probe(struct sock *sk); > bool tcp_schedule_loss_probe(struct sock *sk, bool advancing_rto); > void tcp_skb_collapse_tstamp(struct sk_buff *skb, > const struct sk_buff *next_skb); > +void tcp_ca_dst_init(struct sock *sk, const struct dst_entry *dst); > > /* tcp_input.c */ > void tcp_rearm_rto(struct sock *sk); > diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c > index 8e5522c6833a..973e3b5b0516 100644 > --- a/net/ipv4/tcp_input.c > +++ b/net/ipv4/tcp_input.c > @@ -6401,6 +6401,8 @@ int tcp_conn_request(struct request_sock_ops *rsk_ops, > isn = af_ops->init_seq(skb); > } > > + tcp_ca_dst_init(sk, dst); At this point sk is not locked (and will not be) Multiple cpus can handle SYN packets in // so this would be racy. You need to solve this problem in another way. Thanks.

