[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240718-upstream-net-next-20240716-tcp-3rd-ack-consume-sk_socket-v2-0-d653f85639f6@kernel.org>
Date: Thu, 18 Jul 2024 12:33:55 +0200
From: "Matthieu Baerts (NGI0)" <matttbe@...nel.org>
To: Eric Dumazet <edumazet@...gle.com>,
"David S. Miller" <davem@...emloft.net>, David Ahern <dsahern@...nel.org>,
Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>,
Kuniyuki Iwashima <kuniyu@...zon.com>, Jerry Chu <hkchu@...gle.com>
Cc: netdev@...r.kernel.org, mptcp@...ts.linux.dev,
linux-kernel@...r.kernel.org, "Matthieu Baerts (NGI0)" <matttbe@...nel.org>
Subject: [PATCH net v2 0/2] tcp: restrict crossed SYN specific actions to
SYN-ACK
A recent commit in TCP affects TFO and MPTCP in some cases. The first
patch fixes that.
The second one applies the same fix to another crossed SYN specific
action just before.
These two fixes simply restrict what should be done only for crossed SYN
cases to packets with SYN-ACK flags.
Signed-off-by: Matthieu Baerts (NGI0) <matttbe@...nel.org>
---
Changes in v2:
- Patch 1/2 has a simpler and generic check (Kuniyuki), and an updated
comment.
- New patch 2/2: a related fix
- Link to v1: https://lore.kernel.org/r/20240716-upstream-net-next-20240716-tcp-3rd-ack-consume-sk_socket-v1-1-4e61d0b79233@kernel.org
---
Matthieu Baerts (NGI0) (2):
tcp: process the 3rd ACK with sk_socket for TFO/MPTCP
tcp: limit wake-up for crossed SYN cases to SYN-ACK
net/ipv4/tcp_input.c | 11 ++++++++---
1 file changed, 8 insertions(+), 3 deletions(-)
---
base-commit: 120f1c857a73e52132e473dee89b340440cb692b
change-id: 20240716-upstream-net-next-20240716-tcp-3rd-ack-consume-sk_socket-0cbd159fc5b0
Best regards,
--
Matthieu Baerts (NGI0) <matttbe@...nel.org>
Powered by blists - more mailing lists