diff options
author | David S. Miller <davem@davemloft.net> | 2016-05-20 19:20:12 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2016-05-20 19:20:12 -0400 |
commit | 9a0351dfca14b44443a98c0cafe4de234d1ba469 (patch) | |
tree | 6f7e5d447ec8020d67980cd51e5ff6b798b4086f /samples/uhid | |
parent | fc64869c48494a401b1fb627c9ecc4e6c1d74b0d (diff) | |
parent | c948bb5c2cc4d63f9d76fc02baf5a8331e3cd27f (diff) | |
download | linux-9a0351dfca14b44443a98c0cafe4de234d1ba469.tar.bz2 |
Merge branch 'rds-conn-spamming'
Sowmini Varadhan says:
====================
RDS: TCP: connection spamming fixes
We have been testing the RDS-TCP code with a connection spammer
that sends incoming SYNs to the RDS listen port well after
an rds-tcp connection has been established, and found a few
race-windows that are fixed by this patch series.
Patch 1 avoids a null pointer deref when an incoming SYN
shows up when a netns is being dismantled, or when the
rds-tcp module is being unloaded.
Patch 2 addresses the case when a SYN is received after the
connection arbitration algorithm has converged: the incoming
SYN should not needlessly quiesce the transmit path, and it
should not result in needless TCP connection resets due to
re-execution of the connection arbitration logic.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'samples/uhid')
0 files changed, 0 insertions, 0 deletions