From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.1 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AD7F9C43381 for ; Sun, 3 Mar 2019 09:55:12 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 69F4220818 for ; Sun, 3 Mar 2019 09:55:12 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="thhrY85k" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726063AbfCCJzF (ORCPT ); Sun, 3 Mar 2019 04:55:05 -0500 Received: from mail-pl1-f177.google.com ([209.85.214.177]:40017 "EHLO mail-pl1-f177.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726046AbfCCJzF (ORCPT ); Sun, 3 Mar 2019 04:55:05 -0500 Received: by mail-pl1-f177.google.com with SMTP id bj4so1098331plb.7; Sun, 03 Mar 2019 01:55:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=zmYNz/13uV43eBSu5m2zGpYBc1e4sth0penTPgnZoZk=; b=thhrY85kI5GBf8n4NgM0aFZxmeb3yWdrFUg0URfiLOoIl9eaDarDLL7IjbF4ZjvlaU ZKVFiV/Q1VhSXPRdF/gx4YKx/PXMWAesBI8PlBfm2OyZO7pgU3FceRK4zbwoiyAabeG5 fisslxFFPNur0AoRU/jBMoJEvBcUabEgZ3wJJmnCaMHag15ga/d1Y/b7fvGSPuWTQzA2 +AlAlZyYNUpIc2LXPnwzGhpKFybsBZgDrBc+d20k6TpMv46SDeDN2YfSVimGu5KbRv+5 xaIYHIJGhWlzeKPt/c6V4p41vhclvE1agMVMziFQcNr4/7LJ6uGHtpggmeI03RKCxyt7 M42A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=zmYNz/13uV43eBSu5m2zGpYBc1e4sth0penTPgnZoZk=; b=sDQY/j7tgOorPP3458HQK/ztixmYt/1gPeLPyGVBRfHM534vp7KM4RNmtB3BaJR4gm Tm/VK41oDWFvK0e9ZfS9Vs2VxNKvFjyekfc8WPDLimFYpE++oeQRyNz+Avuqutr0XqED 9pPaSt8haDzQOL6lzdR9ntfwBiuoNVJ1xly0YRbQ4mKfOJDdHnUOXQBh4IwirrrO5X17 BbXD55hoyJWXP9azAsS1Ljvbjim9FgwkQfjFoq5EzGUeF6JbwOCr3uBc339wZ1yQxSCh cDndhySLCnlYyWJSiFGjxOJVlMU5xtX73ogTrv2JGYNiwxKyItV13sf9VKMrm7Zu3Uf7 7Omg== X-Gm-Message-State: APjAAAWTMuZqSKOf09HDeUPXWlkWXg8Xt2O/qhclUmwb0Yg68UXHiluN xEfSXDAgQE/sU2O80wDZCLYAJILY X-Google-Smtp-Source: APXvYqxpGgVPlN/AD8CupaNEZuVWrkIMrXpsFxHufXIv4ysfk7I/uBj3gLPyjfxSfZxdyOXRKePvWg== X-Received: by 2002:a17:902:290b:: with SMTP id g11mr14571934plb.269.1551606904194; Sun, 03 Mar 2019 01:55:04 -0800 (PST) Received: from localhost ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id z18sm9681868pfl.164.2019.03.03.01.55.02 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 03 Mar 2019 01:55:03 -0800 (PST) From: Xin Long To: network dev , linux-sctp@vger.kernel.org Cc: davem@davemloft.net, Marcelo Ricardo Leitner , Neil Horman Subject: [PATCH net 0/3] sctp: process the error returned from sctp_sock_migrate() Date: Sun, 3 Mar 2019 17:54:52 +0800 Message-Id: X-Mailer: git-send-email 2.1.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org This patchset is to process the errs returned by sctp_auth_init_hmacs() and sctp_bind_addr_dup() from sctp_sock_migrate(). And also fix a panic caused by new ep->auth_hmacs was not set due to net->sctp.auth_enable changed by sysctl before accepting an assoc. Xin Long (3): sctp: sctp_sock_migrate() returns error if sctp_bind_addr_dup() fails sctp: move up sctp_auth_init_hmacs() in sctp_endpoint_init() sctp: call sctp_auth_init_hmacs() in sctp_sock_migrate() net/sctp/auth.c | 6 ------ net/sctp/endpointola.c | 18 ++++++++++-------- net/sctp/socket.c | 44 ++++++++++++++++++++++++++++++++++---------- 3 files changed, 44 insertions(+), 24 deletions(-) -- 2.1.0 From mboxrd@z Thu Jan 1 00:00:00 1970 From: Xin Long Date: Sun, 03 Mar 2019 09:54:52 +0000 Subject: [PATCH net 0/3] sctp: process the error returned from sctp_sock_migrate() Message-Id: List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: network dev , linux-sctp@vger.kernel.org Cc: davem@davemloft.net, Marcelo Ricardo Leitner , Neil Horman This patchset is to process the errs returned by sctp_auth_init_hmacs() and sctp_bind_addr_dup() from sctp_sock_migrate(). And also fix a panic caused by new ep->auth_hmacs was not set due to net->sctp.auth_enable changed by sysctl before accepting an assoc. Xin Long (3): sctp: sctp_sock_migrate() returns error if sctp_bind_addr_dup() fails sctp: move up sctp_auth_init_hmacs() in sctp_endpoint_init() sctp: call sctp_auth_init_hmacs() in sctp_sock_migrate() net/sctp/auth.c | 6 ------ net/sctp/endpointola.c | 18 ++++++++++-------- net/sctp/socket.c | 44 ++++++++++++++++++++++++++++++++++---------- 3 files changed, 44 insertions(+), 24 deletions(-) -- 2.1.0