Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2835422pxv; Mon, 12 Jul 2021 03:07:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxu1Kbqx3j71ilYYmx+FGdEIokbkfjGe9gZRWlHq0GNZCM707el++7SGMZa7CvA53VbEO+e X-Received: by 2002:a05:6e02:4d2:: with SMTP id f18mr19483294ils.21.1626084457757; Mon, 12 Jul 2021 03:07:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626084457; cv=none; d=google.com; s=arc-20160816; b=UdoZX+4z0HeMwNcPEfD2AAuXfl0UKC1lH/FFiI2plu3NKpxQ9RXo7YGM5eAwUj1Y3V vP1c/mgk8itwKjp6JN6/97ttDIoWA28WJ9Cdi2LWOgYd7DRJRm3erwGTDey1ugtp4HTl jIo5Djixac8xHafuB/SA5ko1GoUdBrekl9uGShBvBDaYkeaSmoFLoL++Gg87DPwEtIny J8ExyTKpT6il9Z5RZwy7l2IKbMf1F05HidPf5s24p9ajkCWzxVMmzHHCxrIX8UepCf2M Eo55nJo3ZAEJ2hklNaMidwohktG+MI7uHOXgcaGEoQgdxBwQzTigi0BjI2wuycSIEv9T tL6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=egWR1dBByFqNwGRWAmkT6dMOg83PgIk6tomNeieeNGg=; b=bGZ/L3cQ61CECIm/bhNr9Ct1uPXA659dsLNIfcMH5GSEiyoBKYE7PlfcDjzxJjIPgj 8L6n4QIua6bSMhThs6nhaJ9I8MQdnkjWdGNbEkiNShQkWBsQo0xun8QjmoEXjFoaBCSl bSh87msEoM1MTfNdyQxQmqDbhvf2QU05MBq1GZfgItQpTgEKyWRoByD21s/C5mhfLZiL f/AzT0BXLhLdPyMrRedMrZsJfoLJABJ+0nS5LOk3KjUZ6iHQFsaMH0UWsc7ycFi24n0I jDSOY5pHRVrX1YhycFS3yFAw45CxXlguj9Yh+uZzht3SgQqwcJYqJEqkJX2A9TyzA3uH nQiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=AvJEMaHa; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d10si14277763ilc.141.2021.07.12.03.07.26; Mon, 12 Jul 2021 03:07:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=AvJEMaHa; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344762AbhGLHrv (ORCPT + 99 others); Mon, 12 Jul 2021 03:47:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:46544 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240918AbhGLHNr (ORCPT ); Mon, 12 Jul 2021 03:13:47 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 94C68611ED; Mon, 12 Jul 2021 07:10:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626073852; bh=YA1aqqi/Kf4K8twhWf8nItqHqjxb6lc5h4VNdssRFZQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AvJEMaHaVYLhKmEcUsHLWFQ/lRIjky+9RY6uSd4PfDnv6Ei8VkvAx70enDqAAqr6y dNHaP7HnAfpnq6Tp3Knr1WB5OBlLRjbfiB166A7ORbKaukqJnaI8MiL1DOW+CLf2F3 l2CfFO/HuAoweK9Ov6ZD3vzMaxA2w4Xa69V7iD6w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paolo Abeni , Jianguo Wu , Mat Martineau , Jakub Kicinski , Sasha Levin Subject: [PATCH 5.12 380/700] mptcp: fix pr_debug in mptcp_token_new_connect Date: Mon, 12 Jul 2021 08:07:43 +0200 Message-Id: <20210712061016.775944416@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060924.797321836@linuxfoundation.org> References: <20210712060924.797321836@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jianguo Wu [ Upstream commit 2f1af441fd5dd5caf0807bb19ce9bbf9325ce534 ] After commit 2c5ebd001d4f ("mptcp: refactor token container"), pr_debug() is called before mptcp_crypto_key_gen_sha() in mptcp_token_new_connect(), so the output local_key, token and idsn are 0, like: MPTCP: ssk=00000000f6b3c4a2, local_key=0, token=0, idsn=0 Move pr_debug() after mptcp_crypto_key_gen_sha(). Fixes: 2c5ebd001d4f ("mptcp: refactor token container") Acked-by: Paolo Abeni Signed-off-by: Jianguo Wu Signed-off-by: Mat Martineau Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- net/mptcp/token.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/net/mptcp/token.c b/net/mptcp/token.c index feb4b9ffd462..0691a4883f3a 100644 --- a/net/mptcp/token.c +++ b/net/mptcp/token.c @@ -156,9 +156,6 @@ int mptcp_token_new_connect(struct sock *sk) int retries = TOKEN_MAX_RETRIES; struct token_bucket *bucket; - pr_debug("ssk=%p, local_key=%llu, token=%u, idsn=%llu\n", - sk, subflow->local_key, subflow->token, subflow->idsn); - again: mptcp_crypto_key_gen_sha(&subflow->local_key, &subflow->token, &subflow->idsn); @@ -172,6 +169,9 @@ again: goto again; } + pr_debug("ssk=%p, local_key=%llu, token=%u, idsn=%llu\n", + sk, subflow->local_key, subflow->token, subflow->idsn); + WRITE_ONCE(msk->token, subflow->token); __sk_nulls_add_node_rcu((struct sock *)msk, &bucket->msk_chain); bucket->chain_len++; -- 2.30.2