lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 15 Aug 2018 15:24:53 +0200 From: Greg KH <gregkh@...ux-foundation.org> To: Mao Wenan <maowenan@...wei.com> Cc: dwmw2@...radead.org, netdev@...r.kernel.org, eric.dumazet@...il.com, edumazet@...gle.com, davem@...emloft.net, ycheng@...gle.com, jdw@...zon.de Subject: Re: [PATCH stable 4.4 8/9] tcp: call tcp_drop() from tcp_data_queue_ofo() On Wed, Aug 15, 2018 at 09:21:07PM +0800, Mao Wenan wrote: > From: Eric Dumazet <edumazet@...gle.com> > > In order to be able to give better diagnostics and detect > malicious traffic, we need to have better sk->sk_drops tracking. > > Fixes: 9f5afeae5152 ("tcp: use an RB tree for ooo receive queue") > Signed-off-by: Eric Dumazet <edumazet@...gle.com> > Acked-by: Soheil Hassas Yeganeh <soheil@...gle.com> > Acked-by: Yuchung Cheng <ycheng@...gle.com> > Signed-off-by: David S. Miller <davem@...emloft.net> > Signed-off-by: Mao Wenan <maowenan@...wei.com> > --- > net/ipv4/tcp_input.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) Upstream commit id?
Powered by blists - more mailing lists