Message ID | 20240208-upstream-net-20240202-locking-cleanup-misc-v1-0-f75cc5b97e5a@kernel.org |
---|---|
Headers |
Return-Path: <linux-kernel+bounces-58505-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:50ea:b0:106:860b:bbdd with SMTP id r10csp350256dyd; Thu, 8 Feb 2024 10:04:46 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXJh/gHcbrinjy5a3uZDQ9YufRMHsXySGNf8azTNzkDjkHIYRSkQIBmNhLFMr3Cxiz0mQmR7xY6t8uHct3Dmfl/LUp3Vw== X-Google-Smtp-Source: AGHT+IGi5tU1ZWFCv8+ihvDlzJDU7bCDn0nHN/alid/AxDC0WwTEFUzyfiw9jV3tQN5kK5PKH/G2 X-Received: by 2002:a2e:bc19:0:b0:2d0:ccc4:4f91 with SMTP id b25-20020a2ebc19000000b002d0ccc44f91mr77156ljf.44.1707415485907; Thu, 08 Feb 2024 10:04:45 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707415485; cv=pass; d=google.com; s=arc-20160816; b=HsHdU0vpWpuioaPWC5rsw3kqW3TeGJh3w9q9vaHkTDmt2eI/rnJ8CteX3xlbLjsnK0 922oZrNYjQeJlRs7eAAi/N3m94Yz+DGN51Jj/b3kygqhEmBqXJz8o5FDhWRIVTqRMTKa FAFYqAytz2XFQ3GGgyXBkOIDv3zc+wxRj4dXY6dnczTuCs9u6O6iuHyEG2iPMcssichs VRScBNEMccX950WUHAdQRaxahLqI5A6lTcBEVjzYDfWW18KivFxKMZFH0UVcYLHtAB11 2UUi1+qc3gJ7UGk13G5WsTgiZ8eBdzL2m0hm1pd2wVtbEWg5a3ANbyJeVXZotgh5bUII cQ5A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:from :dkim-signature; bh=I48itjcbrVne7Gv5U1AR/xyJ4vPWsHxqn03MZaVeojo=; fh=u477WHHyLHos8G5ETGO2SosW7N6fGYyf8MdHpJa5ssg=; b=Up79QcshHWM2qTtKez/Cy+nE9IxMxLdzF9IiG1wzvL8HYj8CJVGPGo6dS86Ny0HoCN lz1+vIEFKa2KecQm1A8mk9rm5dim20sY6HrF3QM46qnZIcIv+NCbtSnYgw43XH8SWn5u wNvNf1Uc6PZ3IIxn5f+K2F7VUuD69iMltGtHrc1jTYpCErZQzs8p95NR8fcfDc0aKtMw kQ2VcOkHQXtlzUnn1ZazUP4obZe2+iMRvv6KCUfvOJ3VpkMPCZcR+om3UlCF4CrqiWDH gxJhb5VeEdBIs5Pnyiu0RGWbDAyzzLE7XR59uobPa1NUv6yuCFKOeYIBXLcZq6bha9Js oV7g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KHHlQcq5; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-58505-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-58505-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org X-Forwarded-Encrypted: i=2; AJvYcCVTB0tLGMVkkDS+6YKul4FoEogo0jPLWCsVLZSx/Sm7miYN64MpkH0bdjSAOiF/6OuFOZFoBcPf3T6sqIodIPCPw6V5Vw== Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id g9-20020a1709063b0900b00a3ba261c64asi252621ejf.900.2024.02.08.10.04.45 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 08 Feb 2024 10:04:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-58505-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KHHlQcq5; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-58505-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-58505-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 5E7381F259EF for <ouuuleilei@gmail.com>; Thu, 8 Feb 2024 18:04:45 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2037285C7F; Thu, 8 Feb 2024 18:04:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="KHHlQcq5" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 640D67EF0C; Thu, 8 Feb 2024 18:04:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707415462; cv=none; b=E/AQbA/ZA4EqAiW3Sc9WA/U0ibv1gH+L78oQnMsEPF7iqqsXFbtf2K4wzRwqZoiDovmklSlII51IGM6KOq7+SNHIpT0WRLs+Lg+/YpCoU6MVGSo4mrXdLj48yK5iRTxiSzVAUHWhVoXcj4E7ATtUwLvHj1JaT/ER6hpvZe1C6tU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707415462; c=relaxed/simple; bh=gg5lRi0FckXjDkUVqSo3pBy+xDC24jMwih4308TMI/o=; h=From:Subject:Date:Message-Id:MIME-Version:Content-Type:To:Cc; b=HoYjkEVJ3miEXV4qly/mfNMLG/+rXMbVg5SkfpwSPEOmtOD0n/hmwjRoYVva7Ml1244sUdfe+yLn4cxTTJi3vglHoIj9CAHxcDhYQS78KwmF7xPOPEldiA7ZPrQhCzlungxrVWdOVNf65MIHlyZTwqyCMBUar9RaUDwEmsrYYVQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=KHHlQcq5; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5CF7DC433F1; Thu, 8 Feb 2024 18:04:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1707415461; bh=gg5lRi0FckXjDkUVqSo3pBy+xDC24jMwih4308TMI/o=; h=From:Subject:Date:To:Cc:From; b=KHHlQcq5ZRssevtCuJ1jlYCWk7seL1eQX+J123YgSdNo/gIlpycdN3GTjZJSXUKCL cRu3DB9FYwI4NsZsjTQkQ4S2ny1l7wtUkJeBGdVhHBNeHqmwnMvNqr8C8OejjwEzb9 mdlZCaL6AO9BE6yWCFp7vayYzHKlX6M35ltxGvGBMtnLYrSqRb4dslgzpan1mrSVWV igUNxRLi6s2WtM5mmxk7Fk8746M/uadJ9CRPlZ+k4lSt/iSp+oyLh8kK5UwP0xyy5X AYocyg1c8fYrcRKJ9s71j48HhPYNvtPOwfDU3e5zTCBKNW+Q0V8Ok3D5XdM6w/NpL2 T60n12mfK5nLg== From: "Matthieu Baerts (NGI0)" <matttbe@kernel.org> Subject: [PATCH net 0/7] mptcp: locking cleanup & misc. fixes Date: Thu, 08 Feb 2024 19:03:48 +0100 Message-Id: <20240208-upstream-net-20240202-locking-cleanup-misc-v1-0-f75cc5b97e5a@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-B4-Tracking: v=1; b=H4sIAIQXxWUC/z2NSwrCQBBErxJ6bUMcjb+riIthUomNSWeYTkQIu buNCzcFr+BVrWQoAqNbtVLBW0wmddjvKkrPqD1YWmcKdTjWHrxkmwviyIqZ/+0wpZdoz2lA1CX zKJa46QJwvraXQ3MiH8wFnXx+Z3dynR7b9gVntgzggQAAAA== To: mptcp@lists.linux.dev, Mat Martineau <martineau@kernel.org>, Geliang Tang <geliang@kernel.org>, "David S. Miller" <davem@davemloft.net>, Eric Dumazet <edumazet@google.com>, Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>, Kishen Maloor <kishen.maloor@intel.com>, Florian Westphal <fw@strlen.de>, Peter Krystad <peter.krystad@linux.intel.com>, Dmytro Shytyi <dmytro@shytyi.net>, Benjamin Hesmans <benjamin.hesmans@tessares.net> Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Christoph Paasch <cpaasch@apple.com>, "Matthieu Baerts (NGI0)" <matttbe@kernel.org>, stable@vger.kernel.org, syzbot+c53d4d3ddb327e80bc51@syzkaller.appspotmail.com, Geliang Tang <geliang@kernel.org> X-Mailer: b4 0.12.4 X-Developer-Signature: v=1; a=openpgp-sha256; l=2167; i=matttbe@kernel.org; h=from:subject:message-id; bh=gg5lRi0FckXjDkUVqSo3pBy+xDC24jMwih4308TMI/o=; b=owEBbQKS/ZANAwAIAfa3gk9CaaBzAcsmYgBlxRehYosQjMTFqZJREP9PUCIdS9tEwvEMEsEbU iOtu15J4KKJAjMEAAEIAB0WIQToy4X3aHcFem4n93r2t4JPQmmgcwUCZcUXoQAKCRD2t4JPQmmg c2JpEACuYOjFpW4L3CHGYvKnQbqwEOVjCxx9bX305RgAFWX2TMhBDnG82+An3yuQ7ld8wOWc7W3 A2sgba96KbnIOQWl1tjlzUS8NohRywHqHjbHPo/LyT1B3ReJeMZ0mihFy29zJOvLDzD9HCh0kl7 KvZnL2Fz1FjS8akZejt8eJi99v0munrTr0WUGk6sm9vvDqiJwprR6VK46V3wY5SgOEA6VEHznXt DxsGk6lAEsNBK0OOr4nPOmbV9buQq5IqSVZLr09fUUUNVALJnCwJ6fbO0mPgE7zUEPkhAFWnCix 3LscvV1g2V1sfyyUBCiPK3KKeYzTG8I5Ze7VILHCgd9haA3UBfdOl2gwVz6qk+08psm7U0Ijoe3 kTz9fjY62clQAxEZ4LAu5uXg95tncUn6H+x8hwN86c+SuXqtUggEPuTKFIruUiwxmUP92CIVtBX We1bAUj4yBROFo9PNWi03ui4orDCJ45U4hTzO4qPit+3TEkAdNqd0IjbEncGuyJJcsv0WMRJNmV KuqUoUbkek0WzQb7/nlVflpyOH0Yr3z//YfO2h6kAA4jLBvAdL9zFkoY2Y/s0N6f5vXvEJDZx7Z l98N15iQVxSovB1Nj9BtWVqCPHTKPjPl8RCtQPYyPwDNZ5ZLvogXQ3lI7bqEvDx2w9BgbImDQn1 z3LMCeWXVy9qDyQ== X-Developer-Key: i=matttbe@kernel.org; a=openpgp; fpr=E8CB85F76877057A6E27F77AF6B7824F4269A073 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1790354900566074331 X-GMAIL-MSGID: 1790354900566074331 |
Series |
mptcp: locking cleanup & misc. fixes
|
|
Message
Matthieu Baerts (NGI0)
Feb. 8, 2024, 6:03 p.m. UTC
Patches 1-4 are fixes for issues found by Paolo while working on adding
TCP_NOTSENT_LOWAT support. The latter will need to track more states
under the msk data lock. Since the locking msk locking schema is already
quite complex, do a long awaited clean-up step by moving several
confusing lockless initialization under the relevant locks. Note that it
is unlikely a real race could happen even prior to such patches as the
MPTCP-level state machine implicitly ensures proper serialization of the
write accesses, even lacking explicit lock. But still, simplification is
welcome and this will help for the maintenance. This can be backported
up to v5.6.
Patch 5 is a fix for the userspace PM, not to add new local address
entries if the address is already in the list. This behaviour can be
seen since v5.19.
Patch 6 fixes an issue when Fastopen is used. The issue can happen since
v6.2. A previous fix has already been applied, but not taking care of
all cases according to syzbot.
Patch 7 updates Geliang's email address in the MAINTAINERS file.
Signed-off-by: Matthieu Baerts (NGI0) <matttbe@kernel.org>
---
Geliang Tang (2):
mptcp: check addrs list in userspace_pm_get_local_id
MAINTAINERS: update Geliang's email address
Paolo Abeni (5):
mptcp: drop the push_pending field
mptcp: fix rcv space initialization
mptcp: fix more tx path fields initialization
mptcp: corner case locking for rx path fields initialization
mptcp: really cope with fastopen race
.mailmap | 9 +++---
MAINTAINERS | 2 +-
net/mptcp/fastopen.c | 6 ++--
net/mptcp/options.c | 9 +++---
net/mptcp/pm_userspace.c | 13 ++++++++-
net/mptcp/protocol.c | 31 +++++++++++----------
net/mptcp/protocol.h | 16 ++++++-----
net/mptcp/subflow.c | 71 ++++++++++++++++++++++++++++++------------------
8 files changed, 95 insertions(+), 62 deletions(-)
---
base-commit: 335bac1daae3fd9070d0f9f34d7d7ba708729256
change-id: 20240202-upstream-net-20240202-locking-cleanup-misc-5f2ee79d8356
Best regards,
Comments
Hello: This series was applied to netdev/net.git (main) by David S. Miller <davem@davemloft.net>: On Thu, 08 Feb 2024 19:03:48 +0100 you wrote: > Patches 1-4 are fixes for issues found by Paolo while working on adding > TCP_NOTSENT_LOWAT support. The latter will need to track more states > under the msk data lock. Since the locking msk locking schema is already > quite complex, do a long awaited clean-up step by moving several > confusing lockless initialization under the relevant locks. Note that it > is unlikely a real race could happen even prior to such patches as the > MPTCP-level state machine implicitly ensures proper serialization of the > write accesses, even lacking explicit lock. But still, simplification is > welcome and this will help for the maintenance. This can be backported > up to v5.6. > > [...] Here is the summary with links: - [net,1/7] mptcp: drop the push_pending field https://git.kernel.org/netdev/net/c/bdd70eb68913 - [net,2/7] mptcp: fix rcv space initialization https://git.kernel.org/netdev/net/c/013e3179dbd2 - [net,3/7] mptcp: fix more tx path fields initialization https://git.kernel.org/netdev/net/c/3f83d8a77eee - [net,4/7] mptcp: corner case locking for rx path fields initialization https://git.kernel.org/netdev/net/c/e4a0fa47e816 - [net,5/7] mptcp: check addrs list in userspace_pm_get_local_id https://git.kernel.org/netdev/net/c/f012d796a6de - [net,6/7] mptcp: really cope with fastopen race https://git.kernel.org/netdev/net/c/337cebbd850f - [net,7/7] MAINTAINERS: update Geliang's email address https://git.kernel.org/netdev/net/c/68990d006d42 You are awesome, thank you!