From 8c2fae53742ffaf1871be8c56947b9ac306af564 Mon Sep 17 00:00:00 2001 From: jayanth Date: Fri, 21 Jul 2000 23:26:37 +0000 Subject: When a connection is being dropped due to a listen queue overflow, delete the cloned route that is associated with the connection. This does not exhaust the routing table memory when the system is under a SYN flood attack. The route entry is not deleted if there is any prior information cached in it. Reviewed by: Peter Wemm,asmodai --- sys/net/route.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'sys/net/route.h') diff --git a/sys/net/route.h b/sys/net/route.h index c9c5c3f..c5642a4 100644 --- a/sys/net/route.h +++ b/sys/net/route.h @@ -139,7 +139,7 @@ struct ortentry { #define RTF_DYNAMIC 0x10 /* created dynamically (by redirect) */ #define RTF_MODIFIED 0x20 /* modified dynamically (by redirect) */ #define RTF_DONE 0x40 /* message confirmed */ -/* 0x80 unused */ +#define RTF_DELCLONE 0x80 /* delete cloned route */ #define RTF_CLONING 0x100 /* generate new routes on use */ #define RTF_XRESOLVE 0x200 /* external daemon resolves name */ #define RTF_LLINFO 0x400 /* generated by link layer (e.g. ARP) */ -- cgit v1.1