Description of problem: It's a problem reported by in CVE-2022-32296. In a not-yet published paper, Moshe Kol, Amit Klein, and Yossi Gilad report being able to accurately identify a client by forcing it to emit only 40 times more connections than the number of entries in the table_perturb[] table, which is indexed by hashing the connection tuple. The current 2^8 setting allows them to perform that attack with only 10k connections, which is not hard to achieve in a few seconds. Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info: https://lwn.net/ml/linux-kernel/20220427065233.2075-1-w@1wt.eu/
https://gitee.com/anolis/cloud-kernel/pulls/548
merged: https://gitee.com/anolis/cloud-kernel/pulls/548