• Home
  • Raw
  • Download

Lines Matching full:ack

91 		/* We analyse the number of packets that get ACK'd per RTT  in rxrpc_congestion_management()
183 /* Send some previously unsent DATA if we have some to advance the ACK in rxrpc_congestion_management()
196 * Apply a hard ACK by advancing the Tx window.
255 * or a final ACK packet.
388 * (that information is encoded in the ACK packet).
419 u8 ack = 0; in rxrpc_input_data() local
461 ack = RXRPC_ACK_NOSPACE; in rxrpc_input_data()
463 goto ack; in rxrpc_input_data()
502 ack = RXRPC_ACK_DUPLICATE; in rxrpc_input_data()
510 if (ack != RXRPC_ACK_DUPLICATE) { in rxrpc_input_data()
511 ack = RXRPC_ACK_DUPLICATE; in rxrpc_input_data()
519 ack = RXRPC_ACK_EXCEEDS_WINDOW; in rxrpc_input_data()
528 goto ack; in rxrpc_input_data()
531 if (flags & RXRPC_REQUEST_ACK && !ack) { in rxrpc_input_data()
532 ack = RXRPC_ACK_REQUESTED; in rxrpc_input_data()
555 /* Send an immediate ACK if we fill in a hole */ in rxrpc_input_data()
556 if (!ack) { in rxrpc_input_data()
557 ack = RXRPC_ACK_DELAY; in rxrpc_input_data()
576 if (!ack) { in rxrpc_input_data()
577 ack = RXRPC_ACK_DELAY; in rxrpc_input_data()
588 ack = RXRPC_ACK_OUT_OF_SEQUENCE; in rxrpc_input_data()
593 if (!ack) in rxrpc_input_data()
597 ack: in rxrpc_input_data()
598 if (atomic_add_return(nr_unacked, &call->ackr_nr_unacked) > 2 && !ack) in rxrpc_input_data()
599 ack = RXRPC_ACK_IDLE; in rxrpc_input_data()
601 if (ack) in rxrpc_input_data()
602 rxrpc_propose_ACK(call, ack, ack_serial, in rxrpc_input_data()
674 * Process the response to a ping that we sent to find out if we lost an ACK.
723 * Process the extra information that may be appended to an ACK packet
734 _proto("Rx ACK %%%u Info { rx=%u max=%u rwin=%u jm=%u }", in rxrpc_input_ackinfo()
769 * Each ACK in the array corresponds to one packet and can be either an ACK or
771 * packets that lie beyond the end of the ACK list are scheduled for resend by
773 * the time the ACK was sent.
818 * Return true if the ACK is valid - ie. it doesn't appear to have regressed
819 * with respect to the ack state conveyed by preceding ACKs.
842 * Process an ACK packet.
844 * ack.firstPacket is the sequence number of the first soft-ACK'd/NAK'd packet
845 * in the ACK array. Anything before that is hard-ACK'd and may be discarded.
847 * A hard-ACK means that a packet has been processed and may be discarded; a
848 * soft-ACK means that the packet may be discarded and retransmission
849 * requested. A phase is complete when all packets are hard-ACK'd.
856 struct rxrpc_ackpacket ack; in rxrpc_input_ack() member
867 if (skb_copy_bits(skb, offset, &buf.ack, sizeof(buf.ack)) < 0) { in rxrpc_input_ack()
871 offset += sizeof(buf.ack); in rxrpc_input_ack()
874 acked_serial = ntohl(buf.ack.serial); in rxrpc_input_ack()
875 first_soft_ack = ntohl(buf.ack.firstPacket); in rxrpc_input_ack()
876 prev_pkt = ntohl(buf.ack.previousPacket); in rxrpc_input_ack()
878 nr_acks = buf.ack.nAcks; in rxrpc_input_ack()
879 summary.ack_reason = (buf.ack.reason < RXRPC_ACK__INVALID ? in rxrpc_input_ack()
880 buf.ack.reason : RXRPC_ACK__INVALID); in rxrpc_input_ack()
886 switch (buf.ack.reason) { in rxrpc_input_ack()
904 if (buf.ack.reason == RXRPC_ACK_PING) { in rxrpc_input_ack()
905 _proto("Rx ACK %%%u PING Request", ack_serial); in rxrpc_input_ack()