Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2687388ioo; Tue, 24 May 2022 03:48:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzjvPm1jOSrQRdmKuRZvTgGLSBQJevcmoaXHZwgGPtwwbG2vQKT1S5Nuzyw2stMXTTW8TkM X-Received: by 2002:a17:902:d58c:b0:162:1101:c892 with SMTP id k12-20020a170902d58c00b001621101c892mr13177093plh.172.1653389298924; Tue, 24 May 2022 03:48:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653389298; cv=none; d=google.com; s=arc-20160816; b=pR23qE1p5TlKhqB9VlClk/Ar1UhbUsCh8UI3o2HB3WOXc5NgYsS1EaFg2xA7SG6JUY dbMgLJEBQS3sGXdJEG9x8yL8ISwKqJcnwzjBzsMygifm55sJ7cgCg5voH9RE+o2Yvc1P VDpuAkdOc002/JbdmogiLcQ/ynjzGRDMuxgfdOan/zeuZJZxCw/t8IC1mDxpI1G6jjRC IhvsS6yHQLyU5x5sFLrxBR8NEJl/D5y5f+P1eYHxr6Gz6FL4uHMt23xLvm6ti3qVHG35 OC/0FlzkhhmqHh8sotYEkpTnjYDSEiwE83WDv8UFETo7BDTnVraRWj8Un5D/NDXOe1Fh PPwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:message-id:in-reply-to :subject:cc:to:from:date:dkim-signature; bh=5owlfRBiugEFuYD3Y2704RTFhq/s/r0QZI5S1gIs160=; b=qA0YkKX2JmIHJh3vnhlEi8QS6v7ESxK0WmhMvMwxIy1iCPkkmRmUG102q69jvAm3ny gSD0P5RukOH0Po6LGnQdZmsyRuGCw0D3wl8QCJNB3ZcUPuAnlJDtWfvRg9TdC8QvFNZI 9cjMIMQ8Ccw2h8YMV7qq0/2fz1PsKM11zSJkWg9ONSx6jDV3om2rjyWX4e221EdQSErW X96Ue//9/+qTITUiPetKvaR/fjSXExNsHONMZP0qiC08/IMVFS47U/cJYdbPPeYviUMG CZSGya5RDW7RB3k+q2+mqRbrw2evzaiXYXz9wcml483Rh2RhRk/rdaVwJZrNeHJ+dOU7 IjpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=G5l6QtUY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o26-20020a635a1a000000b003fa58670705si7212659pgb.523.2022.05.24.03.48.07; Tue, 24 May 2022 03:48:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=G5l6QtUY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234046AbiEXDwA (ORCPT + 99 others); Mon, 23 May 2022 23:52:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53502 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234081AbiEXDv5 (ORCPT ); Mon, 23 May 2022 23:51:57 -0400 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 008BA37AB6; Mon, 23 May 2022 20:51:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653364314; x=1684900314; h=date:from:to:cc:subject:in-reply-to:message-id: references:mime-version; bh=9X7DrN1lEuucjb6wajZyNblT7a4IsVJl41aKORMvCwQ=; b=G5l6QtUYzBBhsDg1v7n9F1gnXgdgDYN1xQHP0M/7w78h94gaHGIlb+EX 2oqi8zuKEeexspGQV2jrKf6m1i3N6bXgKj1o6z+YT00gDErcvX8Hy0kCp wL04sAujUBrv24r6+b3OCo5YzLpKcUI6g3qNs+rg1KubfXT3syjuw2eiA t0A9kTToc+r4tTQzAh9O2Vm+dZwZ/xGfuha4XdMTI+oYPUysHh9gfaX1m 5UVCAQiSK8wsdoC3MxfA2mqDNoKwMQY7iiyYAj0kK6kinnsBV+atc6GRZ WGz0LHzo5ED38LX24UzIQX15wLy//Jmlgh3vbBvDNXYJYFYI9gxPhwTPX g==; X-IronPort-AV: E=McAfee;i="6400,9594,10356"; a="273147886" X-IronPort-AV: E=Sophos;i="5.91,248,1647327600"; d="scan'208";a="273147886" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 May 2022 20:51:53 -0700 X-IronPort-AV: E=Sophos;i="5.91,248,1647327600"; d="scan'208";a="577716050" Received: from samuelal-mobl.amr.corp.intel.com ([10.212.199.128]) by fmsmga007-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 May 2022 20:51:52 -0700 Date: Mon, 23 May 2022 20:51:52 -0700 (PDT) From: Mat Martineau To: Greg Kroah-Hartman cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Paolo Abeni , Jakub Kicinski , Sasha Levin , Matthieu Baerts Subject: Re: [PATCH 5.17 114/158] mptcp: strict local address ID selection In-Reply-To: <20220523165849.851212488@linuxfoundation.org> Message-ID: References: <20220523165830.581652127@linuxfoundation.org> <20220523165849.851212488@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset=US-ASCII X-Spam-Status: No, score=-5.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 23 May 2022, Greg Kroah-Hartman wrote: > From: Paolo Abeni > > [ Upstream commit 4cf86ae84c718333928fd2d43168a1e359a28329 ] > > The address ID selection for MPJ subflows created in response > to incoming ADD_ADDR option is currently unreliable: it happens > at MPJ socket creation time, when the local address could be > unknown. > > Additionally, if the no local endpoint is available for the local > address, a new dummy endpoint is created, confusing the user-land. > > This change refactor the code to move the address ID selection inside > the rebuild_header() helper, when the local address eventually > selected by the route lookup is finally known. If the address used > is not mapped by any endpoint - and thus can't be advertised/removed > pick the id 0 instead of allocate a new endpoint. > > Signed-off-by: Paolo Abeni > Signed-off-by: Mat Martineau > Signed-off-by: Jakub Kicinski > Signed-off-by: Sasha Levin > --- > net/mptcp/pm_netlink.c | 13 -------- > net/mptcp/protocol.c | 3 ++ > net/mptcp/protocol.h | 3 +- > net/mptcp/subflow.c | 67 ++++++++++++++++++++++++++++++++++++------ > 4 files changed, 63 insertions(+), 23 deletions(-) > Greg, Sasha - Is it possible to drop this one patch? It makes one of the mptcp selftests fail (mptcp_join.sh, "single address, backup"). Looks like this patch has been included in stable because of this single hunk that helps "mptcp: Do TCP fallback on early DSS checksum failure" apply cleanly: > diff --git a/net/mptcp/protocol.h b/net/mptcp/protocol.h > index aec767ee047a..e4413b3e50c2 100644 > --- a/net/mptcp/protocol.h > +++ b/net/mptcp/protocol.h > @@ -442,7 +442,8 @@ struct mptcp_subflow_context { > rx_eof : 1, > can_ack : 1, /* only after processing the remote a key */ > disposable : 1, /* ctx can be free at ulp release time */ > - stale : 1; /* unable to snd/rcv data, do not use for xmit */ > + stale : 1, /* unable to snd/rcv data, do not use for xmit */ > + local_id_valid : 1; /* local_id is correctly initialized */ > enum mptcp_data_avail data_avail; > u32 remote_nonce; > u64 thmac; "mptcp: Do TCP fallback on early DSS checksum failure" also adds a bit to that bitfield, but there is no functional dependency between the patches. If you need to drop the "mptcp: Do TCP fallback..." patch too, I can send a backported version tomorrow that accounts for that bitfield change. Thanks! -- Mat Martineau Intel