Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2189950iof; Tue, 7 Jun 2022 22:39:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwHzJBbKcyBDlB4off0Io1Bc94VELNo8NM8DYKnnueLJDQEA5umE5d/TV4hTRnoGiKkuahV X-Received: by 2002:a17:90b:3e8a:b0:1e9:d56e:347b with SMTP id rj10-20020a17090b3e8a00b001e9d56e347bmr4933177pjb.42.1654666789418; Tue, 07 Jun 2022 22:39:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654666789; cv=none; d=google.com; s=arc-20160816; b=HUSQgCmNEADIImR4Axfjm0uCiDWInTXqXbxdS5yzxbr0V9Whs6psWLvVc5k2tuntIw GGnUb7QBJWW7jJIswmkPm6Z1jwNrumE3I4VB9tNXjibmfeEjPHRJsNhscmocY8qDMrQQ rxNVb8m1NIr1wQZQh+GYq+Enu8irN0SSHhtt+IbV5bNobPkoWLSeWuRmG+Mup0pOtgqe vkWDoxX1WVr1qPRy2FFrRp8gjX6vYGosVxZV9EIvNO7DjcBlgiSw14jqRQXZPCy8lHP8 ugWgH0l/Xh0TJXysCKyWDdwb/2FRaOqG5E00RTBfNlwQp4SSYdbnMER0bDYu8imfrJ6O 4guw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=2Fp6lqBl+VToZfuH8DzxEIPfMYNjJipGkfQR6eiJwLk=; b=m+LliatdYh8ekGObUe04N5m+fn7Yvuc8DNG+7tQu0Cv5ctOuQNGXJJXvFF1Ls/5pXt PacU+fX7tiZvjV+w7+581OqAn2wy1YM/Gn68NSpnOizjRjCEmd3OEj8r4Zy25VRGWnuW K/Bn1h4NY1LsCcSIwdkPmMxieWwiH8OUga3ia0YnWIhspn7WTZcUBO/+FeLlI6RiLYTO qgo3+m53ElsnZBPp0eFLI8QoYeeY1jHQrv4KYMJrGjohC1O8Cdkh97mj4ng6SPVmU/4l Y+6ctaiHjG5c3aHzBiXpFx0uEdtbqD+kGxmsEHuRTDOg0GohLVWBwvC7HKql3FijeW7M DZfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SLElJCGo; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id a17-20020a63bd11000000b003fc242727efsi23984539pgf.85.2022.06.07.22.39.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 22:39:49 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SLElJCGo; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8D0EA495590; Tue, 7 Jun 2022 22:06:07 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357895AbiFGUp2 (ORCPT + 99 others); Tue, 7 Jun 2022 16:45:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55168 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357979AbiFGTmi (ORCPT ); Tue, 7 Jun 2022 15:42:38 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8043BDFF7; Tue, 7 Jun 2022 11:17:46 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1F61A60A21; Tue, 7 Jun 2022 18:17:46 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 343ECC385A2; Tue, 7 Jun 2022 18:17:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1654625865; bh=s4KO1UgUY/B996K+l2DBDtuWNiu3YWMyS23OqCyZMqk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SLElJCGoKQ8e6b/TEFFwMblh7JcSIvGG3aUUbixUWFoaa2ZhqpHb1XJRn09hduY7T A/lQJWPjCFr0kbjXPfhKc4uPj+l0HcMWujYKND40xNYj7H1O+RXFFXsS3yxDkmR0th V7BJXaZK0grpd3mCsgp34F2O0cvmRisVqXM2RpVw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marc Dionne , David Howells , linux-afs@lists.infradead.org, "David S. Miller" , Sasha Levin Subject: [PATCH 5.17 173/772] rxrpc: Return an error to sendmsg if call failed Date: Tue, 7 Jun 2022 18:56:05 +0200 Message-Id: <20220607164954.139253582@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220607164948.980838585@linuxfoundation.org> References: <20220607164948.980838585@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Howells [ Upstream commit 4ba68c5192554876bd8c3afd904e3064d2915341 ] If at the end of rxrpc sendmsg() or rxrpc_kernel_send_data() the call that was being given data was aborted remotely or otherwise failed, return an error rather than returning the amount of data buffered for transmission. The call (presumably) did not complete, so there's not much point continuing with it. AF_RXRPC considers it "complete" and so will be unwilling to do anything else with it - and won't send a notification for it, deeming the return from sendmsg sufficient. Not returning an error causes afs to incorrectly handle a StoreData operation that gets interrupted by a change of address due to NAT reconfiguration. This doesn't normally affect most operations since their request parameters tend to fit into a single UDP packet and afs_make_call() returns before the server responds; StoreData is different as it involves transmission of a lot of data. This can be triggered on a client by doing something like: dd if=/dev/zero of=/afs/example.com/foo bs=1M count=512 at one prompt, and then changing the network address at another prompt, e.g.: ifconfig enp6s0 inet 192.168.6.2 && route add 192.168.6.1 dev enp6s0 Tracing packets on an Auristor fileserver looks something like: 192.168.6.1 -> 192.168.6.3 RX 107 ACK Idle Seq: 0 Call: 4 Source Port: 7000 Destination Port: 7001 192.168.6.3 -> 192.168.6.1 AFS (RX) 1482 FS Request: Unknown(64538) (64538) 192.168.6.3 -> 192.168.6.1 AFS (RX) 1482 FS Request: Unknown(64538) (64538) 192.168.6.1 -> 192.168.6.3 RX 107 ACK Idle Seq: 0 Call: 4 Source Port: 7000 Destination Port: 7001 192.168.6.2 -> 192.168.6.1 AFS (RX) 1482 FS Request: Unknown(0) (0) 192.168.6.2 -> 192.168.6.1 AFS (RX) 1482 FS Request: Unknown(0) (0) 192.168.6.1 -> 192.168.6.2 RX 107 ACK Exceeds Window Seq: 0 Call: 4 Source Port: 7000 Destination Port: 7001 192.168.6.1 -> 192.168.6.2 RX 74 ABORT Seq: 0 Call: 4 Source Port: 7000 Destination Port: 7001 192.168.6.1 -> 192.168.6.2 RX 74 ABORT Seq: 29321 Call: 4 Source Port: 7000 Destination Port: 7001 The Auristor fileserver logs code -453 (RXGEN_SS_UNMARSHAL), but the abort code received by kafs is -5 (RX_PROTOCOL_ERROR) as the rx layer sees the condition and generates an abort first and the unmarshal error is a consequence of that at the application layer. Reported-by: Marc Dionne Signed-off-by: David Howells cc: linux-afs@lists.infradead.org Link: http://lists.infradead.org/pipermail/linux-afs/2021-December/004810.html # v1 Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/rxrpc/sendmsg.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/net/rxrpc/sendmsg.c b/net/rxrpc/sendmsg.c index af8ad6c30b9f..1d38e279e2ef 100644 --- a/net/rxrpc/sendmsg.c +++ b/net/rxrpc/sendmsg.c @@ -444,6 +444,12 @@ static int rxrpc_send_data(struct rxrpc_sock *rx, success: ret = copied; + if (READ_ONCE(call->state) == RXRPC_CALL_COMPLETE) { + read_lock_bh(&call->state_lock); + if (call->error < 0) + ret = call->error; + read_unlock_bh(&call->state_lock); + } out: call->tx_pending = skb; _leave(" = %d", ret); -- 2.35.1