tcp: refine SYN handling in tcp_validate_incoming
authorEric Dumazet <edumazet@google.com>
Tue, 17 Jul 2012 12:29:30 +0000 (12:29 +0000)
committerBen Hutchings <ben@decadent.org.uk>
Wed, 16 Jan 2013 01:13:26 +0000 (01:13 +0000)
commitd37f92d306c41ebd908bcdef373dea512b17cafb
tree82d27d22c8a6bbe89a02bcd9468614721a3cbea6
parent481079c4df95e11d3893b92fa4000f58e1cd713b
tcp: refine SYN handling in tcp_validate_incoming

[ Upstream commit e371589917011efe6ff8c7dfb4e9e81934ac5855 ]

Followup of commit 0c24604b68fc (tcp: implement RFC 5961 4.2)

As reported by Vijay Subramanian, we should send a challenge ACK
instead of a dup ack if a SYN flag is set on a packet received out of
window.

This permits the ratelimiting to work as intended, and to increase
correct SNMP counters.

Suggested-by: Vijay Subramanian <subramanian.vijay@gmail.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Vijay Subramanian <subramanian.vijay@gmail.com>
Cc: Kiran Kumar Kella <kkiran@broadcom.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
net/ipv4/tcp_input.c