Files
linux/include/net
Eric Dumazet 6bed3166d0 ipv4: tcp: get rid of ugly unicast_sock
[ Upstream commit bdbbb8527b ]

In commit be9f4a44e7 ("ipv4: tcp: remove per net tcp_sock")
I tried to address contention on a socket lock, but the solution
I chose was horrible :

commit 3a7c384ffd ("ipv4: tcp: unicast_sock should not land outside
of TCP stack") addressed a selinux regression.

commit 0980e56e50 ("ipv4: tcp: set unicast_sock uc_ttl to -1")
took care of another regression.

commit b5ec8eeac4 ("ipv4: fix ip_send_skb()") fixed another regression.

commit 811230cd85 ("tcp: ipv4: initialize unicast_sock sk_pacing_rate")
was another shot in the dark.

Really, just use a proper socket per cpu, and remove the skb_orphan()
call, to re-enable flow control.

This solves a serious problem with FQ packet scheduler when used in
hostile environments, as we do not want to allocate a flow structure
for every RST packet sent in response to a spoofed packet.

Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2015-02-26 17:48:48 -08:00
..
2013-02-27 22:51:08 -05:00
2013-04-12 16:54:45 +02:00
2012-08-09 16:18:06 -07:00
2012-07-19 10:43:03 -07:00
2012-10-08 17:42:36 -04:00
2013-03-26 12:27:18 -04:00
2013-01-27 22:46:33 -05:00
2013-02-21 18:15:58 -05:00
2014-08-14 09:24:15 +08:00
2014-05-30 21:52:14 -07:00
2013-03-26 12:27:18 -04:00
2015-02-26 17:48:48 -08:00
2014-08-14 09:24:15 +08:00
2012-05-17 18:45:20 -04:00
2012-05-19 01:08:16 -04:00
2012-11-03 14:59:04 -04:00
2014-08-14 09:24:15 +08:00
2012-08-06 13:40:47 -07:00
2012-05-16 15:17:08 -04:00