Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp2071094imm; Thu, 24 May 2018 05:23:28 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqzKiRVk/GAvJZqXLI8zWw27R8dX1B1bR8G/22zyZMXvga3ItrSTQkK0gRdpA77Sltb6rIT X-Received: by 2002:a65:4a87:: with SMTP id b7-v6mr5728879pgu.271.1527164608182; Thu, 24 May 2018 05:23:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527164608; cv=none; d=google.com; s=arc-20160816; b=gISdbtL1+ytyHOFDABnbp/GI3wJS8aRXish+MCsK+uFAvl+k8VhoJmI7aAfWrIoASw D8O6QX8BmgatXx2tPFbAcqyZNjDr6c89m1417o3wCSQ04qicbn/vf/am8qf6rvsUEVyP MF41zG+i22TWThdxtA8RvGISb6kzfAg7lZO/59vGbwSnUCSDrGh5OzESivz6srSCyD/a cbtmiz/q/rcu+5Jql6K7VB1zKE09lpC2pMSOCbi1eh2Zp7TnqU108lWgPHNb8a2QyIBP VoOJbuvrkhr20iTWCyCsWv80x6fZRu4/fi6uw0PQl1evU26QfIW5AV4+wvPilKpzp4oe T0GQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=1E92izhlUyYce+jmo38t88o3AnF9Gojg9980ow33g+c=; b=f2rIkrMxxkXMXy8gf977Ia7Hlp/cxjP+dd0W+OerwVaWvPCh6CBVw9AqZuktiQp4cv TjX3hV1C4lfOsHS+urO1MtoGWjy0O0O4eZoa1lDxms3Ixy25BvurdIUOmiEDVMjICeVh qnosO1h02GAKitgG1nC7yub/+KXfnUBA0UpHrAd796538+sbvAjfdbgi3Kp9Ie6iWgVv dHG2IGYBGoqeg9DHpZXrKClEUaEshg7AgBEj553yTlN12zsFRygeM7sLZbBwscP8CqhV oegYx0NyZKVGVLHpnmfIWnQFRxnyCeQdn2kXe+ZSowh7j6V42YR3HYcPz0grH8KBs88C hbFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FtZJw1bX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j123-v6si21564576pfg.156.2018.05.24.05.23.13; Thu, 24 May 2018 05:23:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FtZJw1bX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S970060AbeEXMWb (ORCPT + 99 others); Thu, 24 May 2018 08:22:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:52996 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966131AbeEXJlB (ORCPT ); Thu, 24 May 2018 05:41:01 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B331520895; Thu, 24 May 2018 09:40:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527154860; bh=zRvkXB6vixBIHYyWlsHZi52f42ocjFMjZ5G1tjhjzJk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FtZJw1bXRsEz0k/Z5KwfsZTtNDM94XJ/1Q8OLYzaRMAJqnn1wo8fe+DecIwIBm0U4 Ui6z/1zDxfygM6uj76cHwh5XxZ+Y42YVnCZB8suCEA2yiDGjUyje5VyGlbLcyQ4Bkp 5EJ/umnw6nq5RRAN0ZjRu2OP4zJ1cjptZRjoRezo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot , Yuchung Cheng , Neal Cardwell , Eric Dumazet , "David S. Miller" Subject: [PATCH 3.18 14/45] tcp: ignore Fast Open on repair mode Date: Thu, 24 May 2018 11:38:22 +0200 Message-Id: <20180524093122.253202366@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180524093120.599252450@linuxfoundation.org> References: <20180524093120.599252450@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Yuchung Cheng [ Upstream commit 16ae6aa1705299789f71fdea59bfb119c1fbd9c0 ] The TCP repair sequence of operation is to first set the socket in repair mode, then inject the TCP stats into the socket with repair socket options, then call connect() to re-activate the socket. The connect syscall simply returns and set state to ESTABLISHED mode. As a result Fast Open is meaningless for TCP repair. However allowing sendto() system call with MSG_FASTOPEN flag half-way during the repair operation could unexpectedly cause data to be sent, before the operation finishes changing the internal TCP stats (e.g. MSS). This in turn triggers TCP warnings on inconsistent packet accounting. The fix is to simply disallow Fast Open operation once the socket is in the repair mode. Reported-by: syzbot Signed-off-by: Yuchung Cheng Reviewed-by: Neal Cardwell Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/tcp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/ipv4/tcp.c +++ b/net/ipv4/tcp.c @@ -1105,7 +1105,7 @@ int tcp_sendmsg(struct kiocb *iocb, stru lock_sock(sk); flags = msg->msg_flags; - if (flags & MSG_FASTOPEN) { + if ((flags & MSG_FASTOPEN) && !tp->repair) { err = tcp_sendmsg_fastopen(sk, msg, &copied_syn, size); if (err == -EINPROGRESS && copied_syn > 0) goto out;