summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPaul Gortmaker <paul.gortmaker@windriver.com>2018-08-02 12:15:42 -0400
committerPaul Gortmaker <paul.gortmaker@windriver.com>2018-08-02 12:15:42 -0400
commit9d26cf00ade8878c2c72e287a615539c2a67d1d5 (patch)
treefa4e93963d8e33c946597efb435cc1c8f68af5e4
parent5102e6b2de8e4f3b88c544a8fa2c46441dff1d8d (diff)
downloadlongterm-queue-4.12-9d26cf00ade8878c2c72e287a615539c2a67d1d5.tar.gz
tcp: another ctxt refresh
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
-rw-r--r--queue/tcp-detect-malicious-patterns-in-tcp_collapse_ofo_qu.patch15
1 files changed, 8 insertions, 7 deletions
diff --git a/queue/tcp-detect-malicious-patterns-in-tcp_collapse_ofo_qu.patch b/queue/tcp-detect-malicious-patterns-in-tcp_collapse_ofo_qu.patch
index e612f61..5e32b5a 100644
--- a/queue/tcp-detect-malicious-patterns-in-tcp_collapse_ofo_qu.patch
+++ b/queue/tcp-detect-malicious-patterns-in-tcp_collapse_ofo_qu.patch
@@ -1,4 +1,4 @@
-From 3d4bf93ac12003f9b8e1e2de37fe27983deebdcf Mon Sep 17 00:00:00 2001
+From db3b494623964045f4827a34ca60457b8cacffce Mon Sep 17 00:00:00 2001
From: Eric Dumazet <edumazet@google.com>
Date: Mon, 23 Jul 2018 09:28:19 -0700
Subject: [PATCH] tcp: detect malicious patterns in tcp_collapse_ofo_queue()
@@ -22,28 +22,29 @@ that are proven to be malicious.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Soheil Hassas Yeganeh <soheil@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c
-index 53289911362a..78068b902e7b 100644
+index 1c4956c97de5..a9a33c789b01 100644
--- a/net/ipv4/tcp_input.c
+++ b/net/ipv4/tcp_input.c
-@@ -4902,6 +4902,7 @@ tcp_collapse(struct sock *sk, struct sk_buff_head *list, struct rb_root *root,
+@@ -4848,6 +4848,7 @@ tcp_collapse(struct sock *sk, struct sk_buff_head *list, struct rb_root *root,
static void tcp_collapse_ofo_queue(struct sock *sk)
{
struct tcp_sock *tp = tcp_sk(sk);
+ u32 range_truesize, sum_tiny = 0;
struct sk_buff *skb, *head;
+ struct rb_node *p;
u32 start, end;
-
-@@ -4913,6 +4914,7 @@ static void tcp_collapse_ofo_queue(struct sock *sk)
+@@ -4866,6 +4867,7 @@ static void tcp_collapse_ofo_queue(struct sock *sk)
}
start = TCP_SKB_CB(skb)->seq;
end = TCP_SKB_CB(skb)->end_seq;
+ range_truesize = skb->truesize;
for (head = skb;;) {
- skb = skb_rb_next(skb);
-@@ -4923,11 +4925,20 @@ static void tcp_collapse_ofo_queue(struct sock *sk)
+ skb = tcp_skb_next(skb, NULL);
+@@ -4876,11 +4878,20 @@ static void tcp_collapse_ofo_queue(struct sock *sk)
if (!skb ||
after(TCP_SKB_CB(skb)->seq, end) ||
before(TCP_SKB_CB(skb)->end_seq, start)) {