Hello: This series was applied to netdev/net-next.git (main) by Jakub Kicinski <kuba@xxxxxxxxxx>: On Mon, 09 Sep 2024 22:09:20 +0200 you wrote: > The SYN + MPTCP_CAPABLE packets could be explicitly dropped by firewalls > somewhere in the network, e.g. if they decide to drop packets based on > the TCP options, instead of stripping them off. > > The idea of this series is to fallback to TCP after 3 SYN+MPC drop > (patch 2). If the connection succeeds after the fallback, it very likely > means a blackhole has been detected. In this case (patch 3), MPTCP can > be disabled for a certain period of time, 1h by default. If after this > period, MPTCP is still blocked, the period is doubled. This technique is > inspired by the one used by TCP FastOpen. > > [...] Here is the summary with links: - [net-next,1/3] mptcp: export mptcp_subflow_early_fallback() https://git.kernel.org/netdev/net-next/c/65b02260a0e0 - [net-next,2/3] mptcp: fallback to TCP after SYN+MPC drops https://git.kernel.org/netdev/net-next/c/6982826fe5e5 - [net-next,3/3] mptcp: disable active MPTCP in case of blackhole https://git.kernel.org/netdev/net-next/c/27069e7cb3d1 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html