lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 10 Jun 2021 15:59:39 -0700
From:   Mat Martineau <mathew.j.martineau@...ux.intel.com>
To:     netdev@...r.kernel.org
Cc:     Mat Martineau <mathew.j.martineau@...ux.intel.com>,
        davem@...emloft.net, kuba@...nel.org, matthieu.baerts@...sares.net,
        mptcp@...ts.linux.dev
Subject: [PATCH net 0/5] mptcp: More v5.13 fixes

Here's another batch of MPTCP fixes for v5.13.

Patch 1 cleans up memory accounting between the MPTCP-level socket and
the subflows to more reliably transfer forward allocated memory under
pressure.

Patch 2 wakes up socket readers more reliably.

Patch 3 changes a WARN_ONCE to a pr_debug.

Patch 4 changes the selftests to only use syncookies in test cases where
they do not cause spurious failures.

Patch 5 modifies socket error reporting to avoid a possible soft lockup.


Paolo Abeni (5):
  mptcp: try harder to borrow memory from subflow under pressure
  mptcp: wake-up readers only for in sequence data
  mptcp: do not warn on bad input from the network
  selftests: mptcp: enable syncookie only in absence of reorders
  mptcp: fix soft lookup in subflow_error_report()

 net/mptcp/protocol.c                          |  52 +++++----
 net/mptcp/protocol.h                          |   1 -
 net/mptcp/subflow.c                           | 108 +++++++++---------
 .../selftests/net/mptcp/mptcp_connect.sh      |  11 +-
 4 files changed, 88 insertions(+), 84 deletions(-)


base-commit: 22488e45501eca74653b502b194eb0eb25d2ad00
-- 
2.32.0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ