{"id":817511,"url":"http://patchwork.ozlabs.org/api/covers/817511/?format=json","web_url":"http://patchwork.ozlabs.org/project/netdev/cover/cover.1506086081.git.g.nault@alphalink.fr/","project":{"id":7,"url":"http://patchwork.ozlabs.org/api/projects/7/?format=json","name":"Linux network development","link_name":"netdev","list_id":"netdev.vger.kernel.org","list_email":"netdev@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<cover.1506086081.git.g.nault@alphalink.fr>","list_archive_url":null,"date":"2017-09-22T13:39:22","name":"[net,0/2] l2tp: fix some races in session deletion","submitter":{"id":22975,"url":"http://patchwork.ozlabs.org/api/people/22975/?format=json","name":"Guillaume Nault","email":"g.nault@alphalink.fr"},"mbox":"http://patchwork.ozlabs.org/project/netdev/cover/cover.1506086081.git.g.nault@alphalink.fr/mbox/","series":[{"id":4627,"url":"http://patchwork.ozlabs.org/api/series/4627/?format=json","web_url":"http://patchwork.ozlabs.org/project/netdev/list/?series=4627","date":"2017-09-22T13:39:22","name":"l2tp: fix some races in session deletion","version":1,"mbox":"http://patchwork.ozlabs.org/series/4627/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/817511/comments/","headers":{"Return-Path":"<netdev-owner@vger.kernel.org>","X-Original-To":"patchwork-incoming@ozlabs.org","Delivered-To":"patchwork-incoming@ozlabs.org","Authentication-Results":"ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)","Received":["from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xzF2c0fPrz9s06\n\tfor <patchwork-incoming@ozlabs.org>;\n\tFri, 22 Sep 2017 23:39:36 +1000 (AEST)","(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1752353AbdIVNjc (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tFri, 22 Sep 2017 09:39:32 -0400","from zimbra.alphalink.fr ([217.15.80.77]:52457 \"EHLO\n\tzimbra.alphalink.fr\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S1752324AbdIVNjb (ORCPT\n\t<rfc822;netdev@vger.kernel.org>); Fri, 22 Sep 2017 09:39:31 -0400","from localhost (localhost [127.0.0.1])\n\tby mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id\n\tE4DDA2B52057; Fri, 22 Sep 2017 15:39:29 +0200 (CEST)","from zimbra.alphalink.fr ([127.0.0.1])\n\tby localhost (mail-2-cbv2.admin.alphalink.fr [127.0.0.1])\n\t(amavisd-new, port 10032)\n\twith ESMTP id 3p1NYn5aZ3kT; Fri, 22 Sep 2017 15:39:23 +0200 (CEST)","from localhost (localhost [127.0.0.1])\n\tby mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id\n\tE77642B52127; Fri, 22 Sep 2017 15:39:22 +0200 (CEST)","from zimbra.alphalink.fr ([127.0.0.1])\n\tby localhost (mail-2-cbv2.admin.alphalink.fr [127.0.0.1])\n\t(amavisd-new, port 10026)\n\twith ESMTP id lqWKVTSbuQoU; Fri, 22 Sep 2017 15:39:22 +0200 (CEST)","from c-dev-0.admin.alphalink.fr (94-84-15-217.reverse.alphalink.fr\n\t[217.15.84.94])\n\tby mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id\n\tBD7F32B5206F; Fri, 22 Sep 2017 15:39:22 +0200 (CEST)","by c-dev-0.admin.alphalink.fr (Postfix, from userid 1000)\n\tid 80F0160179; Fri, 22 Sep 2017 15:39:22 +0200 (CEST)"],"X-Virus-Scanned":"amavisd-new at mail-2-cbv2.admin.alphalink.fr","Date":"Fri, 22 Sep 2017 15:39:22 +0200","From":"Guillaume Nault <g.nault@alphalink.fr>","To":"netdev@vger.kernel.org","Cc":"James Chapman <jchapman@katalix.com>, Tom Parkin <tparkin@katalix.com>,\n\tSabrina Dubroca <sd@queasysnail.net>","Subject":"[PATCH net 0/2] l2tp: fix some races in session deletion","Message-ID":"<cover.1506086081.git.g.nault@alphalink.fr>","MIME-Version":"1.0","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","X-Mutt-Fcc":"=Sent","User-Agent":"NeoMutt/20170609 (1.8.3)","Sender":"netdev-owner@vger.kernel.org","Precedence":"bulk","List-ID":"<netdev.vger.kernel.org>","X-Mailing-List":"netdev@vger.kernel.org"},"content":"L2TP provides several interfaces for deleting sessions. Using two of\nthem concurrently can lead to use-after-free bugs.\n\nPatch #2 uses a flag to prevent double removal of L2TP sessions.\nPatch #1 fixes a bug found in the way. Fixing this bug is also\nnecessary for patch #2 to handle all cases.\n\n\nThis issue is similar to the tunnel deletion bug being worked on by\nSabrina: https://patchwork.ozlabs.org/patch/814173/\n\nGuillaume Nault (2):\n  l2tp: ensure sessions are freed after their PPPOL2TP socket\n  l2tp: fix race between l2tp_session_delete() and\n    l2tp_tunnel_closeall()\n\n net/l2tp/l2tp_core.c | 6 ++++++\n net/l2tp/l2tp_core.h | 1 +\n net/l2tp/l2tp_ppp.c  | 8 ++++----\n 3 files changed, 11 insertions(+), 4 deletions(-)"}