[rds-devel] [PATCH net 0/2] RDS: TCP: connection spamming fixes
David Miller
davem at davemloft.net
Fri May 20 16:20:32 PDT 2016
From: Sowmini Varadhan <sowmini.varadhan at oracle.com>
Date: Wed, 18 May 2016 10:06:22 -0700
> We have been testing the RDS-TCP code with a connection spammer
> that sends incoming SYNs to the RDS listen port well after
> an rds-tcp connection has been established, and found a few
> race-windows that are fixed by this patch series.
>
> Patch 1 avoids a null pointer deref when an incoming SYN
> shows up when a netns is being dismantled, or when the
> rds-tcp module is being unloaded.
>
> Patch 2 addresses the case when a SYN is received after the
> connection arbitration algorithm has converged: the incoming
> SYN should not needlessly quiesce the transmit path, and it
> should not result in needless TCP connection resets due to
> re-execution of the connection arbitration logic.
Series applied, thanks.
More information about the rds-devel
mailing list