From: Sowmini Varadhan
Date: Wed, 18 May 2016 10:06:22 -0700
> We have been testing the RDS-TCP code with a connection spammer
> that sends incoming SYNs to the RDS listen port well after
> an rds-tcp connection has been established, and found a few
> race-windows that are fixed by this patch s
We have been testing the RDS-TCP code with a connection spammer
that sends incoming SYNs to the RDS listen port well after
an rds-tcp connection has been established, and found a few
race-windows that are fixed by this patch series.
Patch 1 avoids a null pointer deref when an incoming SYN
shows