Message ID | EB8510AA7A943D43916A72C9B8F4181F62A08D3B@cvk038.intra.cvk.de |
---|---|
State | RFC |
Delegated to: | David Miller |
Headers | show |
Series | AW: AW: big ICMP requests get disrupted on IPSec tunnel activation | expand |
diff --git a/net/sched/sch_fq.c b/net/sched/sch_fq.c index 98dd87ce15108cfe1c011da44ba32f97763776c8..2aa41a39e81b94f3b7092dc51b91829f5929634d 100644 --- a/net/sched/sch_fq.c +++ b/net/sched/sch_fq.c @@ -380,9 +380,14 @@ static void flow_queue_add(struct fq_flow *flow, struct sk_buff *skb) { struct rb_node **p, *parent; struct sk_buff *head, *aux; + s64 delay; fq_skb_cb(skb)->time_to_send = skb->tstamp ?: ktime_get_ns(); + /* We should really add a TCA_FQ_MAX_HORIZON at some point :( */ + delay = fq_skb_cb(skb)->time_to_send - ktime_get_ns(); + WARN_ON_ONCE(delay > 60 * NSEC_PER_SEC); + head = flow->head; if (!head || fq_skb_cb(skb)->time_to_send >= fq_skb_cb(flow->tail)->time_to_send) {