tcp: Always probe SO_SNDBUF, second attempt
I fell for this already: the sending buffer might shrink later! Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
This commit is contained in:
parent
a4826ee04b
commit
eda446ba54
1 changed files with 0 additions and 3 deletions
3
tcp.c
3
tcp.c
|
@ -1556,9 +1556,6 @@ static int tcp_send_to_tap(struct ctx *c, struct tcp_tap_conn *conn, int flags,
|
||||||
!flags && conn->wnd_to_tap)
|
!flags && conn->wnd_to_tap)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
if (conn->snd_buf < SNDBUF_SMALL)
|
|
||||||
tcp_get_sndbuf(conn);
|
|
||||||
|
|
||||||
if (getsockopt(s, SOL_TCP, TCP_INFO, &info, &sl)) {
|
if (getsockopt(s, SOL_TCP, TCP_INFO, &info, &sl)) {
|
||||||
tcp_rst(c, conn);
|
tcp_rst(c, conn);
|
||||||
return -ECONNRESET;
|
return -ECONNRESET;
|
||||||
|
|
Loading…
Reference in a new issue