summaryrefslogtreecommitdiffstats
path: root/kernel/bpf/btf.c
diff options
context:
space:
mode:
authorDavid S. Miller <davem@davemloft.net>2018-07-23 12:01:36 -0700
committerDavid S. Miller <davem@davemloft.net>2018-07-23 12:01:48 -0700
commit1a4f14bab1868b443f0dd3c55b689a478f82e72e (patch)
tree67c0e66dbb4895d1c03116df3a63896c67431680 /kernel/bpf/btf.c
parent3dd1c9a1270736029ffca670e9bd0265f4120600 (diff)
parent58152ecbbcc6a0ce7fddd5bf5f6ee535834ece0c (diff)
downloadlinux-1a4f14bab1868b443f0dd3c55b689a478f82e72e.tar.bz2
Merge branch 'tcp-robust-ooo'
Eric Dumazet says: ==================== Juha-Matti Tilli reported that malicious peers could inject tiny packets in out_of_order_queue, forcing very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet. With tcp_rmem[2] default of 6MB, the ooo queue could contain ~7000 nodes. This patch series makes sure we cut cpu cycles enough to render the attack not critical. We might in the future go further, like disconnecting or black-holing proven malicious flows. ==================== Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'kernel/bpf/btf.c')
0 files changed, 0 insertions, 0 deletions