summaryrefslogtreecommitdiffstats
path: root/include/net/secure_seq.h
diff options
context:
space:
mode:
authorEric Dumazet <edumazet@google.com>2019-09-24 08:01:16 -0700
committerDavid S. Miller <davem@davemloft.net>2019-09-27 12:05:02 +0200
commitf6c0f5d209fa80eb808e08aa4206f6e264041ef6 (patch)
treea3c9c3a820ff3b8cc28671d498fad022142f74ff /include/net/secure_seq.h
parente9a5dceee56cb527a3498f1a59bd8726baa1e717 (diff)
downloadlinux-f6c0f5d209fa80eb808e08aa4206f6e264041ef6.tar.gz
linux-f6c0f5d209fa80eb808e08aa4206f6e264041ef6.tar.bz2
linux-f6c0f5d209fa80eb808e08aa4206f6e264041ef6.zip
tcp: honor SO_PRIORITY in TIME_WAIT state
ctl packets sent on behalf of TIME_WAIT sockets currently have a zero skb->priority, which can cause various problems. In this patch we : - add a tw_priority field in struct inet_timewait_sock. - populate it from sk->sk_priority when a TIME_WAIT is created. - For IPv4, change ip_send_unicast_reply() and its two callers to propagate tw_priority correctly. ip_send_unicast_reply() no longer changes sk->sk_priority. - For IPv6, make sure TIME_WAIT sockets pass their tw_priority field to tcp_v6_send_response() and tcp_v6_send_ack(). Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/net/secure_seq.h')
0 files changed, 0 insertions, 0 deletions