From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH net 0/4] l2tp: pppol2tp_connect() fixes Date: Thu, 14 Jun 2018 17:10:32 -0700 (PDT) Message-ID: <20180614.171032.1730500975104561705.davem@davemloft.net> References: Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, jchapman@katalix.com To: g.nault@alphalink.fr Return-path: Received: from shards.monkeyblade.net ([184.105.139.130]:51086 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965096AbeFOAKc (ORCPT ); Thu, 14 Jun 2018 20:10:32 -0400 In-Reply-To: Sender: netdev-owner@vger.kernel.org List-ID: From: Guillaume Nault Date: Wed, 13 Jun 2018 15:09:16 +0200 > This series fixes a few remaining issues with pppol2tp_connect(). > > It doesn't try to prevent invalid configurations that have no effect on > kernel's reliability. That would be work for a future patch set. > > Patch 2 is the most important as it avoids an invalid pointer > dereference crashing the kernel. It depends on patch 1 for correctly > identifying L2TP session types. > > Patches 3 and 4 avoid creating stale tunnels and sessions. Series applied, thank you.