aboutsummaryrefslogtreecommitdiffstats
path: root/net/ipv4/tcp_input.c
diff options
context:
space:
mode:
authorEric Dumazet <eric.dumazet@gmail.com>2011-12-02 18:41:42 -0500
committerDavid S. Miller <davem@davemloft.net>2011-12-04 01:25:19 -0500
commitfdf5af0daf8019cec2396cdef8fb042d80fe71fa (patch)
tree2423b611659756f2b6553b8d1aa2c117b248c884 /net/ipv4/tcp_input.c
parent78a8a36fe0b2cee5a0a7360107815cbcad5b4003 (diff)
tcp: drop SYN+FIN messages
Denys Fedoryshchenko reported that SYN+FIN attacks were bringing his linux machines to their limits. Dont call conn_request() if the TCP flags includes SYN flag Reported-by: Denys Fedoryshchenko <denys@visp.net.lb> Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv4/tcp_input.c')
-rw-r--r--net/ipv4/tcp_input.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c
index 78dd38cd5496..0cbb44076cfa 100644
--- a/net/ipv4/tcp_input.c
+++ b/net/ipv4/tcp_input.c
@@ -5811,6 +5811,8 @@ int tcp_rcv_state_process(struct sock *sk, struct sk_buff *skb,
5811 goto discard; 5811 goto discard;
5812 5812
5813 if (th->syn) { 5813 if (th->syn) {
5814 if (th->fin)
5815 goto discard;
5814 if (icsk->icsk_af_ops->conn_request(sk, skb) < 0) 5816 if (icsk->icsk_af_ops->conn_request(sk, skb) < 0)
5815 return 1; 5817 return 1;
5816 5818