Cover Letter Detail
Show a cover letter.
GET /api/covers/817511/?format=api
{ "id": 817511, "url": "http://patchwork.ozlabs.org/api/covers/817511/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netdev/cover/cover.1506086081.git.g.nault@alphalink.fr/", "project": { "id": 7, "url": "http://patchwork.ozlabs.org/api/projects/7/?format=api", "name": "Linux network development", "link_name": "netdev", "list_id": "netdev.vger.kernel.org", "list_email": "netdev@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<cover.1506086081.git.g.nault@alphalink.fr>", "list_archive_url": null, "date": "2017-09-22T13:39:22", "name": "[net,0/2] l2tp: fix some races in session deletion", "submitter": { "id": 22975, "url": "http://patchwork.ozlabs.org/api/people/22975/?format=api", "name": "Guillaume Nault", "email": "g.nault@alphalink.fr" }, "mbox": "http://patchwork.ozlabs.org/project/netdev/cover/cover.1506086081.git.g.nault@alphalink.fr/mbox/", "series": [ { "id": 4627, "url": "http://patchwork.ozlabs.org/api/series/4627/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netdev/list/?series=4627", "date": "2017-09-22T13:39:22", "name": "l2tp: fix some races in session deletion", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/4627/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/817511/comments/", "headers": { "Return-Path": "<netdev-owner@vger.kernel.org>", "X-Original-To": "patchwork-incoming@ozlabs.org", "Delivered-To": "patchwork-incoming@ozlabs.org", "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)", "Received": [ "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xzF2c0fPrz9s06\n\tfor <patchwork-incoming@ozlabs.org>;\n\tFri, 22 Sep 2017 23:39:36 +1000 (AEST)", "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1752353AbdIVNjc (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tFri, 22 Sep 2017 09:39:32 -0400", "from zimbra.alphalink.fr ([217.15.80.77]:52457 \"EHLO\n\tzimbra.alphalink.fr\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S1752324AbdIVNjb (ORCPT\n\t<rfc822;netdev@vger.kernel.org>); Fri, 22 Sep 2017 09:39:31 -0400", "from localhost (localhost [127.0.0.1])\n\tby mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id\n\tE4DDA2B52057; Fri, 22 Sep 2017 15:39:29 +0200 (CEST)", "from zimbra.alphalink.fr ([127.0.0.1])\n\tby localhost (mail-2-cbv2.admin.alphalink.fr [127.0.0.1])\n\t(amavisd-new, port 10032)\n\twith ESMTP id 3p1NYn5aZ3kT; Fri, 22 Sep 2017 15:39:23 +0200 (CEST)", "from localhost (localhost [127.0.0.1])\n\tby mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id\n\tE77642B52127; Fri, 22 Sep 2017 15:39:22 +0200 (CEST)", "from zimbra.alphalink.fr ([127.0.0.1])\n\tby localhost (mail-2-cbv2.admin.alphalink.fr [127.0.0.1])\n\t(amavisd-new, port 10026)\n\twith ESMTP id lqWKVTSbuQoU; Fri, 22 Sep 2017 15:39:22 +0200 (CEST)", "from c-dev-0.admin.alphalink.fr (94-84-15-217.reverse.alphalink.fr\n\t[217.15.84.94])\n\tby mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id\n\tBD7F32B5206F; Fri, 22 Sep 2017 15:39:22 +0200 (CEST)", "by c-dev-0.admin.alphalink.fr (Postfix, from userid 1000)\n\tid 80F0160179; Fri, 22 Sep 2017 15:39:22 +0200 (CEST)" ], "X-Virus-Scanned": "amavisd-new at mail-2-cbv2.admin.alphalink.fr", "Date": "Fri, 22 Sep 2017 15:39:22 +0200", "From": "Guillaume Nault <g.nault@alphalink.fr>", "To": "netdev@vger.kernel.org", "Cc": "James Chapman <jchapman@katalix.com>, Tom Parkin <tparkin@katalix.com>,\n\tSabrina Dubroca <sd@queasysnail.net>", "Subject": "[PATCH net 0/2] l2tp: fix some races in session deletion", "Message-ID": "<cover.1506086081.git.g.nault@alphalink.fr>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=us-ascii", "Content-Disposition": "inline", "X-Mutt-Fcc": "=Sent", "User-Agent": "NeoMutt/20170609 (1.8.3)", "Sender": "netdev-owner@vger.kernel.org", "Precedence": "bulk", "List-ID": "<netdev.vger.kernel.org>", "X-Mailing-List": "netdev@vger.kernel.org" }, "content": "L2TP provides several interfaces for deleting sessions. Using two of\nthem concurrently can lead to use-after-free bugs.\n\nPatch #2 uses a flag to prevent double removal of L2TP sessions.\nPatch #1 fixes a bug found in the way. Fixing this bug is also\nnecessary for patch #2 to handle all cases.\n\n\nThis issue is similar to the tunnel deletion bug being worked on by\nSabrina: https://patchwork.ozlabs.org/patch/814173/\n\nGuillaume Nault (2):\n l2tp: ensure sessions are freed after their PPPOL2TP socket\n l2tp: fix race between l2tp_session_delete() and\n l2tp_tunnel_closeall()\n\n net/l2tp/l2tp_core.c | 6 ++++++\n net/l2tp/l2tp_core.h | 1 +\n net/l2tp/l2tp_ppp.c | 8 ++++----\n 3 files changed, 11 insertions(+), 4 deletions(-)" }