Searched hist:"264 ea103a7473f51aced838e68ed384ea2c759f5" (Results 1 – 1 of 1) sorted by relevance
/linux/include/net/ |
H A D | tcp.h | diff 264ea103a7473f51aced838e68ed384ea2c759f5 Thu May 14 23:26:56 CEST 2015 Eric Dumazet <edumazet@google.com> tcp: syncookies: extend validity range
Now we allow storing more request socks per listener, we might hit syncookie mode less often and hit following bug in our stack :
When we send a burst of syncookies, then exit this mode, tcp_synq_no_recent_overflow() can return false if the ACK packets coming from clients are coming three seconds after the end of syncookie episode.
This is a way too strong requirement and conflicts with rest of syncookie code which allows ACK to be aged up to 2 minutes.
Perfectly valid ACK packets are dropped just because clients might be in a crowded wifi environment or on another planet.
So let's fix this, and also change tcp_synq_overflow() to not dirty a cache line for every syncookie we send, as we are under attack.
Signed-off-by: Eric Dumazet <edumazet@google.com> Acked-by: Florian Westphal <fw@strlen.de> Acked-by: Yuchung Cheng <ycheng@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|