diff options
author | 2016-05-20 19:20:12 -0400 | |
---|---|---|
committer | 2016-05-20 19:20:12 -0400 | |
commit | 9a0351dfca14b44443a98c0cafe4de234d1ba469 (patch) | |
tree | 6f7e5d447ec8020d67980cd51e5ff6b798b4086f /tools/perf/scripts/python/export-to-postgresql.py | |
parent | net: sock: move ->sk_shutdown out of bitfields. (diff) | |
parent | RDS: TCP: Avoid rds connection churn from rogue SYNs (diff) | |
download | wireguard-linux-9a0351dfca14b44443a98c0cafe4de234d1ba469.tar.xz wireguard-linux-9a0351dfca14b44443a98c0cafe4de234d1ba469.zip |
Merge branch 'rds-conn-spamming'
Sowmini Varadhan says:
====================
RDS: TCP: connection spamming fixes
We have been testing the RDS-TCP code with a connection spammer
that sends incoming SYNs to the RDS listen port well after
an rds-tcp connection has been established, and found a few
race-windows that are fixed by this patch series.
Patch 1 avoids a null pointer deref when an incoming SYN
shows up when a netns is being dismantled, or when the
rds-tcp module is being unloaded.
Patch 2 addresses the case when a SYN is received after the
connection arbitration algorithm has converged: the incoming
SYN should not needlessly quiesce the transmit path, and it
should not result in needless TCP connection resets due to
re-execution of the connection arbitration logic.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions