[rds-devel] [PATCH net 0/2] RDS: TCP: connection spamming fixes

David Miller davem at davemloft.net
Fri May 20 16:20:32 PDT 2016


From: Sowmini Varadhan <sowmini.varadhan at oracle.com>
Date: Wed, 18 May 2016 10:06:22 -0700

> We have been testing the RDS-TCP code with a connection spammer
> that sends incoming SYNs to the RDS listen port well after 
> an rds-tcp connection has been established, and found a few 
> race-windows that are fixed by this patch series.
> 
> Patch 1 avoids a null pointer deref when an incoming SYN 
> shows up when a netns is being dismantled, or when the 
> rds-tcp module is being unloaded. 
> 
> Patch 2 addresses the case when a SYN is received after the
> connection arbitration algorithm has converged: the incoming
> SYN should not needlessly quiesce the transmit path, and it
> should not result in needless TCP connection resets due to
> re-execution of the connection arbitration logic.

Series applied, thanks.



More information about the rds-devel mailing list