Received: by 2002:a17:90a:9103:0:0:0:0 with SMTP id k3csp11789637pjo; Thu, 2 Jan 2020 14:18:59 -0800 (PST) X-Google-Smtp-Source: APXvYqzYAFh8mxUC7RG+YH4gRA6S9NB4r0Jg+toNg/KirvixWPmgpZtg+1aJQASbheDuUEhy5LwK X-Received: by 2002:aca:1801:: with SMTP id h1mr3207132oih.16.1578003538914; Thu, 02 Jan 2020 14:18:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578003538; cv=none; d=google.com; s=arc-20160816; b=qM0QFl+etiF6xyLLtvlbMbCFfNGD+DzCzT0iko1nYlyZ+EbxD9we+5Xiw6q898amS+ 118zXnFoG/d/P2xNQ4/i+EtDXZ8F0gBI7U8Xu05hdOBzUstIEEGOoLSltFJG9tyRfvcf 70pTYqxUK+S8ziYVpmEZXLe5x4xANblHv6n+4zmvTuUH7eKQSDykIj/u4lLNHb15HDRC UvmLkwUiBL45oHFEaBDHAbWg0EBJKrpco7fnhuehk12acIHr5RSAgywjfdSkxHZxaGd3 mEnsFWvupas+ScJqa9dy0JarMFHRKhY1sfhWqkBolJTkdDKluz5YDpG00nk55iOElnkV aZFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rxa5jJLtfhoTnONxe6CpXQ3RtAqUQv6lur9OZyWV+Vc=; b=0VydEAlm76ZcfuVXWNJkYrOsS0MMLtrZfduXfUhcoHDF4PCqRCAcly0UW2Frg5IeBy 4QvWF3OASx/CbixLh3Yd6/XZ+aAvR/RXZ9cNGUSXkQkWbjIt9/iA/J5ThSZL3x5d/Vxl 5WRTALGqnRqKyxs+NSk/YUq6NEptHz5A7A8UIZ9hRaHEG7kSdRQXKDf6zNB+qBZGIn9V 8Q2IMyQRUphwhqjXHjwZQcL1rWG8vDh+beV3sZNNh9S5CPkfDl04oQNCPCsL/N2/o6pa d6fvlZUJeqZkSQ2Wq/J+Nnh4mw6enhBl80kUZrDLE2mNwVlp9GxDoMSckne5KWBxqap9 DaZg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zwQtK510; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l14si26976895oii.37.2020.01.02.14.18.47; Thu, 02 Jan 2020 14:18:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zwQtK510; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727984AbgABWSK (ORCPT + 99 others); Thu, 2 Jan 2020 17:18:10 -0500 Received: from mail.kernel.org ([198.145.29.99]:32948 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728004AbgABWSE (ORCPT ); Thu, 2 Jan 2020 17:18:04 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EFE5722B48; Thu, 2 Jan 2020 22:18:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578003483; bh=M6PJ3k+tZowRhOd3D2yK5DtX5doruQc/zWvHLm05xA4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zwQtK510mD95APAXvn6v8EmtOOq3UNoMgGAIkOQHRs8qGjSPeeD5YtNSPa2k7qHXw SZjyd5brufdHDcLwxUeJm8tlbpAxq6mcjztxEthternT7OY1V/4t2VxTTjy7u8AuBu gD4FyFIrGz73Ic6v0iBA8g2GKdSPYX6uYuW2jkF8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , Christoph Paasch , Neal Cardwell , Jason Baron , Soheil Hassas Yeganeh , Jakub Kicinski Subject: [PATCH 5.4 180/191] tcp: do not send empty skb from tcp_write_xmit() Date: Thu, 2 Jan 2020 23:07:42 +0100 Message-Id: <20200102215848.567294632@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200102215829.911231638@linuxfoundation.org> References: <20200102215829.911231638@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Dumazet [ Upstream commit 1f85e6267caca44b30c54711652b0726fadbb131 ] Backport of commit fdfc5c8594c2 ("tcp: remove empty skb from write queue in error cases") in linux-4.14 stable triggered various bugs. One of them has been fixed in commit ba2ddb43f270 ("tcp: Don't dequeue SYN/FIN-segments from write-queue"), but we still have crashes in some occasions. Root-cause is that when tcp_sendmsg() has allocated a fresh skb and could not append a fragment before being blocked in sk_stream_wait_memory(), tcp_write_xmit() might be called and decide to send this fresh and empty skb. Sending an empty packet is not only silly, it might have caused many issues we had in the past with tp->packets_out being out of sync. Fixes: c65f7f00c587 ("[TCP]: Simplify SKB data portion allocation with NETIF_F_SG.") Signed-off-by: Eric Dumazet Cc: Christoph Paasch Acked-by: Neal Cardwell Cc: Jason Baron Acked-by: Soheil Hassas Yeganeh Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/ipv4/tcp_output.c | 8 ++++++++ 1 file changed, 8 insertions(+) --- a/net/ipv4/tcp_output.c +++ b/net/ipv4/tcp_output.c @@ -2441,6 +2441,14 @@ static bool tcp_write_xmit(struct sock * if (tcp_small_queue_check(sk, skb, 0)) break; + /* Argh, we hit an empty skb(), presumably a thread + * is sleeping in sendmsg()/sk_stream_wait_memory(). + * We do not want to send a pure-ack packet and have + * a strange looking rtx queue with empty packet(s). + */ + if (TCP_SKB_CB(skb)->end_seq == TCP_SKB_CB(skb)->seq) + break; + if (unlikely(tcp_transmit_skb(sk, skb, 1, gfp))) break;