Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7150377ybi; Mon, 8 Jul 2019 15:39:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqx7NTR/hHlJ7+VcfcwuU1K3z6K96nZAKrUKd8ldFMEq1UZsh/qhee7Pu5bvHQY/Pp9pDgXr X-Received: by 2002:a17:902:9897:: with SMTP id s23mr27693262plp.47.1562625572332; Mon, 08 Jul 2019 15:39:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562625572; cv=none; d=google.com; s=arc-20160816; b=sWkiujPXRgOirrc5P3jmtO5b6GKpPq8K/XCxG1zSDg9mJZlNTfGC82f/9K4ZhtnnuJ Ak92d5pbcCTlKQ8Isi/9zAoof0IBcKZURBhbbbTnZvP+EOHuNrBw/YmfxQCKsZwoo2mH Pio2wE6yEQ+YratUtDyz+ETDqKbX769g6LF9K5Ux/NIdwEG5V+BOAIH7YBlV64Y40Mb0 ArS3YAIA44vLcle6GxUeRisfz9mUb4sAJ80+Ij0RYcs06ggZQ0sUxe2vHENd7QJ4CPhJ dSCzX3dmI9LSZWiri8EpG6hhNpRXtPHaC0JlnotUossmlWEgBUsFaR/y9YbFXKBVwzfW SfTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=8qa1hFrIex2X0r32+eNhhkly0/gg3zZbbuExy+g1xvw=; b=NYkZkNt1G+fh2x2ELjHaBxxYkQQobsYz2qw2nIZhkC92l4kCx8snZVVYceL+3aeRvl tMJTffdGsGRcyI2tP6ee4VavuuNJP1TXtjemRAy0W5uDZ9W2RRj6lvE8eK7SBdKx6Emg dXTEN1dCtuIbmcen0rBLPzUaaHL8hKHYGUU4Z7+iuvgqOb4aLpXGHiOfe4o3LpvlzVcs jqa21rF59tk2WVu2tosZOVVRxiOCDwKHzFhpMtuyCNCLbrwUs/BU93r0JUIQWp+EzBry 0vbRtVMJYjmE6LQGTng6lMkV9ufq7xCqLLGGEIyGEnIKykQbpaB6MSHmePYr6dPco3Rt BnRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AeCk6c+K; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 71si19678358plf.156.2019.07.08.15.39.17; Mon, 08 Jul 2019 15:39:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AeCk6c+K; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389843AbfGHPaN (ORCPT + 99 others); Mon, 8 Jul 2019 11:30:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:59136 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389826AbfGHPaL (ORCPT ); Mon, 8 Jul 2019 11:30:11 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DA0EF21537; Mon, 8 Jul 2019 15:30:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562599811; bh=NxoBKvOcz7H8AfN5GuXdqYMej0H+7W+reYu5jy9Qvuk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AeCk6c+KWbLgN5utqA+kHsITKhao/zV0trzUGYUzkv7iaZlbof40VGXZ5uYoo8UlW LOU0xythJ/66VLY/5WFqfb5N1sQOZ5zge6NJu/XZLZMcL8xmtBuedMZku+MPYNjFpa zwRaVJoh7bXPm7nPeceHIVN94EawuaGBKca6zQU0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chuck Lever , "J. Bruce Fields" Subject: [PATCH 4.19 85/90] svcrdma: Ignore source port when computing DRC hash Date: Mon, 8 Jul 2019 17:13:52 +0200 Message-Id: <20190708150526.748418758@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190708150521.829733162@linuxfoundation.org> References: <20190708150521.829733162@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chuck Lever commit 1e091c3bbf51d34d5d96337a59ce5ab2ac3ba2cc upstream. The DRC appears to be effectively empty after an RPC/RDMA transport reconnect. The problem is that each connection uses a different source port, which defeats the DRC hash. Clients always have to disconnect before they send retransmissions to reset the connection's credit accounting, thus every retransmit on NFS/RDMA will miss the DRC. An NFS/RDMA client's IP source port is meaningless for RDMA transports. The transport layer typically sets the source port value on the connection to a random ephemeral port. The server already ignores it for the "secure port" check. See commit 16e4d93f6de7 ("NFSD: Ignore client's source port on RDMA transports"). The Linux NFS server's DRC resolves XID collisions from the same source IP address by using the checksum of the first 200 bytes of the RPC call header. Signed-off-by: Chuck Lever Cc: stable@vger.kernel.org # v4.14+ Signed-off-by: J. Bruce Fields Signed-off-by: Greg Kroah-Hartman --- net/sunrpc/xprtrdma/svc_rdma_transport.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/net/sunrpc/xprtrdma/svc_rdma_transport.c +++ b/net/sunrpc/xprtrdma/svc_rdma_transport.c @@ -270,9 +270,14 @@ static void handle_connect_req(struct rd /* Save client advertised inbound read limit for use later in accept. */ newxprt->sc_ord = param->initiator_depth; - /* Set the local and remote addresses in the transport */ sa = (struct sockaddr *)&newxprt->sc_cm_id->route.addr.dst_addr; svc_xprt_set_remote(&newxprt->sc_xprt, sa, svc_addr_len(sa)); + /* The remote port is arbitrary and not under the control of the + * client ULP. Set it to a fixed value so that the DRC continues + * to be effective after a reconnect. + */ + rpc_set_port((struct sockaddr *)&newxprt->sc_xprt.xpt_remote, 0); + sa = (struct sockaddr *)&newxprt->sc_cm_id->route.addr.src_addr; svc_xprt_set_local(&newxprt->sc_xprt, sa, svc_addr_len(sa));