From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9EB9D1FDA92; Tue, 11 Nov 2025 00:51:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762822264; cv=none; b=R1dAXSC5lBU+W4yLgnKaE42bCAHsgkbaiQkEsoxe7Ns1g3eMFrqKksjD7iHzhY4P8nCjVtXKtP6dhfwgt0ZUmte2MuDbvkCRWSnsO+aPJPRDITtFEYWZZ22AWJdhzaKPBbEes1VAVB6rBYXnAY+IqooCV2HmJKxVqNDpDstt2wg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762822264; c=relaxed/simple; bh=qDo08HJc97ZOlbphHhMX2clzexLOE5GzeDYVU1daZkU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Kf+fLMoVU49xPYMGlJ2C2gjwX3dScBM8DOPMM1w/Uf1A3jWPO/MCVHnHOUP4Nza1CbcwLok5hHBKcVUZ1sCYTzAURsjyKgYBsKiFfSXjAC+3m0UHN+7vPpwSXtO7nXlvKivS9E2clIW3/gLIfDU60OPptYjp6EZKCdctCSEQYWI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=uMjZFhqk; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="uMjZFhqk" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 37374C16AAE; Tue, 11 Nov 2025 00:51:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1762822264; bh=qDo08HJc97ZOlbphHhMX2clzexLOE5GzeDYVU1daZkU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uMjZFhqkEELUdFpJsUjO06o6alGL6VTlfI6p7jR6ui/HVK/9TlMijNtWRjrTBueP3 T3qFh81x0ar2tiEGxeCxs/iElcxdTIR9qm2Nzu7wU/FRIvU1HBp4Gox8mPxDqyHZ5d /OJyaux2sTHXafVDh02nkrxwWHxrqu5jnTSD3WIc= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Geliang Tang , Mat Martineau , Paolo Abeni , "Matthieu Baerts (NGI0)" , Jakub Kicinski Subject: [PATCH 6.12 014/565] mptcp: restore window probe Date: Tue, 11 Nov 2025 09:37:50 +0900 Message-ID: <20251111004527.184527451@linuxfoundation.org> X-Mailer: git-send-email 2.51.2 In-Reply-To: <20251111004526.816196597@linuxfoundation.org> References: <20251111004526.816196597@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.12-stable review patch. If anyone has any objections, please let me know. ------------------ From: Paolo Abeni commit a824084b98d8a1dbd6e85d0842a8eb5e73467f59 upstream. Since commit 72377ab2d671 ("mptcp: more conservative check for zero probes") the MPTCP-level zero window probe check is always disabled, as the TCP-level write queue always contains at least the newly allocated skb. Refine the relevant check tacking in account that the above condition and that such skb can have zero length. Fixes: 72377ab2d671 ("mptcp: more conservative check for zero probes") Cc: stable@vger.kernel.org Reported-by: Geliang Tang Closes: https://lore.kernel.org/d0a814c364e744ca6b836ccd5b6e9146882e8d42.camel@kernel.org Reviewed-by: Mat Martineau Signed-off-by: Paolo Abeni Tested-by: Geliang Tang Signed-off-by: Matthieu Baerts (NGI0) Link: https://patch.msgid.link/20251028-net-mptcp-send-timeout-v1-3-38ffff5a9ec8@kernel.org Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/mptcp/protocol.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/net/mptcp/protocol.c +++ b/net/mptcp/protocol.c @@ -1340,7 +1340,12 @@ alloc_skb: if (copy == 0) { u64 snd_una = READ_ONCE(msk->snd_una); - if (snd_una != msk->snd_nxt || tcp_write_queue_tail(ssk)) { + /* No need for zero probe if there are any data pending + * either at the msk or ssk level; skb is the current write + * queue tail and can be empty at this point. + */ + if (snd_una != msk->snd_nxt || skb->len || + skb != tcp_send_head(ssk)) { tcp_remove_empty_skb(ssk); return 0; }