tcp: call tcp_drop() from tcp_data_queue_ofo()
authorEric Dumazet <edumazet@google.com>
Mon, 23 Jul 2018 16:28:20 +0000 (09:28 -0700)
committerGreg Kroah-Hartman <gregkh@google.com>
Fri, 27 Jul 2018 10:24:56 +0000 (12:24 +0200)
commit9933832d0573805db54f3b909bd4b1a3d1459288
tree74dbcd408f2e7cdfb3c2a9f21f92422af5a38bea
parentda0af805f1847c2ac3c35ebe8b3c18f98cfbe940
tcp: call tcp_drop() from tcp_data_queue_ofo()

[ Upstream commit 8541b21e781a22dce52a74fef0b9bed00404a1cd ]

In order to be able to give better diagnostics and detect
malicious traffic, we need to have better sk->sk_drops tracking.

Fixes: 9f5afeae5152 ("tcp: use an RB tree for ooo receive queue")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Soheil Hassas Yeganeh <soheil@google.com>
Acked-by: Yuchung Cheng <ycheng@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
net/ipv4/tcp_input.c