Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1279767pxu; Mon, 23 Nov 2020 16:54:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJx6kGvJ6rGKKn5PZ2uFC6ULPJ6ymRRuS81EQCU8Sr00ebdT1KJvrd1fZgnvBoPGDwcqOnJT X-Received: by 2002:a05:6402:559:: with SMTP id i25mr1846237edx.128.1606179280044; Mon, 23 Nov 2020 16:54:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606179280; cv=none; d=google.com; s=arc-20160816; b=cuGn+BXNcKoNSPRp4b4zepks0sOb0STxZ8rxachs6IyEvyhgmNt6uPsU8j8jm8kg16 AF41ThQRsMOiKLn2UoOf8TReOLOQ3BMuH9nRUuOUMsdzMpGnndtGCT8wW+mgT7mHqjY5 bhgeGJTHW8zz6PILFUxZdzwwdfdhJVxJyozFxG9n4Yu2X6B0zYX9jJdD9O6+yF8cmJK8 /kotr+FNUv/CR1nE9Zn2qQa/eXfp0MUjWHg4W+973HgE6P2+gIo+2VLjWdh4g1a6KGM4 vqMPY29dEni/GjULeasRvOTjN9LGDJ+lwt+qGk6owLYb9mWy5mWiWOGp0Xg8symVtuzn Tqew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=xTDgj89XOZLivonPsnVv4LxO/04qV8k9xgoXTJe7Qrw=; b=NVxA8ooAKgsIJsQkzSQIFt1CNNgtNEMFdx0Dt0OczgpV2xyc5+UI31DPZRXiiyg2B9 rTr/G7y01dP0WXks4Mv9oVxYIr7dTjoosP1AR69tR7HRGCqUJE33jp20gOfdpz/euKsq 5SFZ5CtixwOb5Q3OtijIzWEuD5ejcYiTh6rCLe6srnDPpEN9yAXiq/KY7zZ6x3BnqJvH wipA3QuLO2p6EMcN02zyXveADS3Pb6lra5+J/+cWZTzgl9XFzuM2yWrDkLI3/TeNqVJ8 d4/Tl9B2R4mMZDjwv/hjcEhZMjREtmGwd7i9PAL6M+cbaBcf0ioAVydYrUroKLEWZJgQ CFWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bwqx9Yon; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c7si7524741ejp.437.2020.11.23.16.54.17; Mon, 23 Nov 2020 16:54:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bwqx9Yon; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727085AbgKXAuG (ORCPT + 99 others); Mon, 23 Nov 2020 19:50:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:45636 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725817AbgKXAuF (ORCPT ); Mon, 23 Nov 2020 19:50:05 -0500 Content-Type: text/plain; charset="utf-8" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1606179005; bh=mWX3o2qk17+bUiTKO3iifC0P95QFgx2k/HjFARfBBtw=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=bwqx9Yon0gMS6DU3XIKkfppC0HMTNwxUJz1cyryrcQjl/906zhOkWazZ9x29BYge4 VM9lTUsYcgmMUit73vR2TSf8uDr897KmuF3GklXB5+4eE/qNFLX4U/9tpa2+pWwoPt jrXR2M7m24biCLQjnAxjqBOdpimS3IlsC0IEvTyA= MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH v8] tcp: fix race condition when creating child sockets from syncookies From: patchwork-bot+netdevbpf@kernel.org Message-Id: <160617900545.21796.10520657211346805305.git-patchwork-notify@kernel.org> Date: Tue, 24 Nov 2020 00:50:05 +0000 References: <20201120111133.GA67501@rdias-suse-pc.lan> In-Reply-To: <20201120111133.GA67501@rdias-suse-pc.lan> To: Ricardo Dias Cc: davem@davemloft.net, kuba@kernel.org, kuznet@ms2.inr.ac.ru, yoshfuji@linux-ipv6.org, edumazet@google.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to netdev/net.git (refs/heads/master): On Fri, 20 Nov 2020 11:11:33 +0000 you wrote: > When the TCP stack is in SYN flood mode, the server child socket is > created from the SYN cookie received in a TCP packet with the ACK flag > set. > > The child socket is created when the server receives the first TCP > packet with a valid SYN cookie from the client. Usually, this packet > corresponds to the final step of the TCP 3-way handshake, the ACK > packet. But is also possible to receive a valid SYN cookie from the > first TCP data packet sent by the client, and thus create a child socket > from that SYN cookie. > > [...] Here is the summary with links: - [v8] tcp: fix race condition when creating child sockets from syncookies https://git.kernel.org/netdev/net/c/01770a166165 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html