* [PATCH net 0/2] rxrpc: Miscellaneous fixes
@ 2024-10-01 13:26 David Howells
2024-10-03 23:40 ` patchwork-bot+netdevbpf
0 siblings, 1 reply; 13+ messages in thread
From: David Howells @ 2024-10-01 13:26 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, linux-afs, linux-kernel
Here some miscellaneous fixes for AF_RXRPC:
(1) Fix a race in the I/O thread vs UDP socket setup.
(2) Fix an uninitialised variable.
David
---
The patches can be found here also:
http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes
David Howells (2):
rxrpc: Fix a race between socket set up and I/O thread creation
rxrpc: Fix uninitialised variable in rxrpc_send_data()
net/rxrpc/ar-internal.h | 2 +-
net/rxrpc/io_thread.c | 10 ++++++++--
net/rxrpc/local_object.c | 2 +-
net/rxrpc/sendmsg.c | 10 +++++-----
4 files changed, 15 insertions(+), 9 deletions(-)
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net 0/2] rxrpc: Miscellaneous fixes
2024-10-01 13:26 David Howells
@ 2024-10-03 23:40 ` patchwork-bot+netdevbpf
0 siblings, 0 replies; 13+ messages in thread
From: patchwork-bot+netdevbpf @ 2024-10-03 23:40 UTC (permalink / raw)
To: David Howells
Cc: netdev, marc.dionne, davem, edumazet, kuba, pabeni, linux-afs,
linux-kernel
Hello:
This series was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:
On Tue, 1 Oct 2024 14:26:57 +0100 you wrote:
> Here some miscellaneous fixes for AF_RXRPC:
>
> (1) Fix a race in the I/O thread vs UDP socket setup.
>
> (2) Fix an uninitialised variable.
>
> David
>
> [...]
Here is the summary with links:
- [net,1/2] rxrpc: Fix a race between socket set up and I/O thread creation
https://git.kernel.org/netdev/net/c/bc212465326e
- [net,2/2] rxrpc: Fix uninitialised variable in rxrpc_send_data()
https://git.kernel.org/netdev/net/c/7a310f8d7dfe
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 13+ messages in thread
* [PATCH net 0/2] rxrpc: Miscellaneous fixes
@ 2025-02-03 11:03 David Howells
2025-02-03 11:03 ` [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state David Howells
` (3 more replies)
0 siblings, 4 replies; 13+ messages in thread
From: David Howells @ 2025-02-03 11:03 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel
Here some miscellaneous fixes for AF_RXRPC:
(1) Fix the state of a call to not treat the challenge-response cycle as
part of an incoming call's state set. The problem is that it makes
handling received of the final packet in the receive phase difficult
as that wants to change the call state - but security negotiations may
not yet be complete.
(2) Fix the queuing of connections seeking attention from offloaded ops
such as challenge/response. The problem was that the attention link
always seemed to be busy because it was never initialised from NULL.
This further masked two further bugs, also fixed in the patch.
David
---
The patches can be found here also:
http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes
David Howells (2):
rxrpc: Fix call state set to not include the SERVER_SECURING state
rxrpc: Fix the rxrpc_connection attend queue handling
include/trace/events/rxrpc.h | 1 +
net/rxrpc/ar-internal.h | 2 +-
net/rxrpc/call_object.c | 6 ++----
net/rxrpc/conn_event.c | 21 +++++++++++----------
net/rxrpc/conn_object.c | 1 +
net/rxrpc/input.c | 4 ++--
net/rxrpc/sendmsg.c | 2 +-
7 files changed, 19 insertions(+), 18 deletions(-)
^ permalink raw reply [flat|nested] 13+ messages in thread
* [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state
2025-02-03 11:03 [PATCH net 0/2] rxrpc: Miscellaneous fixes David Howells
@ 2025-02-03 11:03 ` David Howells
2025-02-03 11:03 ` [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling David Howells
` (2 subsequent siblings)
3 siblings, 0 replies; 13+ messages in thread
From: David Howells @ 2025-02-03 11:03 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel, Simon Horman
The RXRPC_CALL_SERVER_SECURING state doesn't really belong with the other
states in the call's state set as the other states govern the call's Rx/Tx
phase transition and govern when packets can and can't be received or
transmitted. The "Securing" state doesn't actually govern the reception of
packets and would need to be split depending on whether or not we've
received the last packet yet (to mirror RECV_REQUEST/ACK_REQUEST).
The "Securing" state is more about whether or not we can start forwarding
packets to the application as recvmsg will need to decode them and the
decoding can't take place until the challenge/response exchange has
completed.
Fix this by removing the RXRPC_CALL_SERVER_SECURING state from the state
set and, instead, using a flag, RXRPC_CALL_CONN_CHALLENGING, to track
whether or not we can queue the call for reception by recvmsg() or notify
the kernel app that data is ready. In the event that we've already
received all the packets, the connection event handler will poke the app
layer in the appropriate manner.
Also there's a race whereby the app layer sees the last packet before rxrpc
has managed to end the rx phase and change the state to one amenable to
allowing a reply. Fix this by queuing the packet after calling
rxrpc_end_rx_phase().
Fixes: 17926a79320a ("[AF_RXRPC]: Provide secure RxRPC sockets for use by userspace and kernel both")
Signed-off-by: David Howells <dhowells@redhat.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Jakub Kicinski <kuba@kernel.org>
cc: "David S. Miller" <davem@davemloft.net>
cc: Eric Dumazet <edumazet@google.com>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
---
net/rxrpc/ar-internal.h | 2 +-
net/rxrpc/call_object.c | 6 ++----
net/rxrpc/conn_event.c | 4 +---
net/rxrpc/input.c | 4 ++--
net/rxrpc/sendmsg.c | 2 +-
5 files changed, 7 insertions(+), 11 deletions(-)
diff --git a/net/rxrpc/ar-internal.h b/net/rxrpc/ar-internal.h
index 718193df9d2e..f251845fe532 100644
--- a/net/rxrpc/ar-internal.h
+++ b/net/rxrpc/ar-internal.h
@@ -582,6 +582,7 @@ enum rxrpc_call_flag {
RXRPC_CALL_EXCLUSIVE, /* The call uses a once-only connection */
RXRPC_CALL_RX_IS_IDLE, /* recvmsg() is idle - send an ACK */
RXRPC_CALL_RECVMSG_READ_ALL, /* recvmsg() read all of the received data */
+ RXRPC_CALL_CONN_CHALLENGING, /* The connection is being challenged */
};
/*
@@ -602,7 +603,6 @@ enum rxrpc_call_state {
RXRPC_CALL_CLIENT_AWAIT_REPLY, /* - client awaiting reply */
RXRPC_CALL_CLIENT_RECV_REPLY, /* - client receiving reply phase */
RXRPC_CALL_SERVER_PREALLOC, /* - service preallocation */
- RXRPC_CALL_SERVER_SECURING, /* - server securing request connection */
RXRPC_CALL_SERVER_RECV_REQUEST, /* - server receiving request */
RXRPC_CALL_SERVER_ACK_REQUEST, /* - server pending ACK of request */
RXRPC_CALL_SERVER_SEND_REPLY, /* - server sending reply */
diff --git a/net/rxrpc/call_object.c b/net/rxrpc/call_object.c
index 5a543c3f6fb0..c4c8b46a68c6 100644
--- a/net/rxrpc/call_object.c
+++ b/net/rxrpc/call_object.c
@@ -22,7 +22,6 @@ const char *const rxrpc_call_states[NR__RXRPC_CALL_STATES] = {
[RXRPC_CALL_CLIENT_AWAIT_REPLY] = "ClAwtRpl",
[RXRPC_CALL_CLIENT_RECV_REPLY] = "ClRcvRpl",
[RXRPC_CALL_SERVER_PREALLOC] = "SvPrealc",
- [RXRPC_CALL_SERVER_SECURING] = "SvSecure",
[RXRPC_CALL_SERVER_RECV_REQUEST] = "SvRcvReq",
[RXRPC_CALL_SERVER_ACK_REQUEST] = "SvAckReq",
[RXRPC_CALL_SERVER_SEND_REPLY] = "SvSndRpl",
@@ -453,17 +452,16 @@ void rxrpc_incoming_call(struct rxrpc_sock *rx,
call->cong_tstamp = skb->tstamp;
__set_bit(RXRPC_CALL_EXPOSED, &call->flags);
- rxrpc_set_call_state(call, RXRPC_CALL_SERVER_SECURING);
+ rxrpc_set_call_state(call, RXRPC_CALL_SERVER_RECV_REQUEST);
spin_lock(&conn->state_lock);
switch (conn->state) {
case RXRPC_CONN_SERVICE_UNSECURED:
case RXRPC_CONN_SERVICE_CHALLENGING:
- rxrpc_set_call_state(call, RXRPC_CALL_SERVER_SECURING);
+ __set_bit(RXRPC_CALL_CONN_CHALLENGING, &call->flags);
break;
case RXRPC_CONN_SERVICE:
- rxrpc_set_call_state(call, RXRPC_CALL_SERVER_RECV_REQUEST);
break;
case RXRPC_CONN_ABORTED:
diff --git a/net/rxrpc/conn_event.c b/net/rxrpc/conn_event.c
index 713e04394ceb..d93b041c4894 100644
--- a/net/rxrpc/conn_event.c
+++ b/net/rxrpc/conn_event.c
@@ -228,10 +228,8 @@ static void rxrpc_abort_calls(struct rxrpc_connection *conn)
*/
static void rxrpc_call_is_secure(struct rxrpc_call *call)
{
- if (call && __rxrpc_call_state(call) == RXRPC_CALL_SERVER_SECURING) {
- rxrpc_set_call_state(call, RXRPC_CALL_SERVER_RECV_REQUEST);
+ if (call && __test_and_clear_bit(RXRPC_CALL_CONN_CHALLENGING, &call->flags))
rxrpc_notify_socket(call);
- }
}
/*
diff --git a/net/rxrpc/input.c b/net/rxrpc/input.c
index 4974b5accafa..2d3004031832 100644
--- a/net/rxrpc/input.c
+++ b/net/rxrpc/input.c
@@ -448,11 +448,11 @@ static void rxrpc_input_queue_data(struct rxrpc_call *call, struct sk_buff *skb,
struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
bool last = sp->hdr.flags & RXRPC_LAST_PACKET;
- skb_queue_tail(&call->recvmsg_queue, skb);
rxrpc_input_update_ack_window(call, window, wtop);
trace_rxrpc_receive(call, last ? why + 1 : why, sp->hdr.serial, sp->hdr.seq);
if (last)
rxrpc_end_rx_phase(call, sp->hdr.serial);
+ skb_queue_tail(&call->recvmsg_queue, skb);
}
/*
@@ -657,7 +657,7 @@ static bool rxrpc_input_split_jumbo(struct rxrpc_call *call, struct sk_buff *skb
rxrpc_propose_delay_ACK(call, sp->hdr.serial,
rxrpc_propose_ack_input_data);
}
- if (notify) {
+ if (notify && !test_bit(RXRPC_CALL_CONN_CHALLENGING, &call->flags)) {
trace_rxrpc_notify_socket(call->debug_id, sp->hdr.serial);
rxrpc_notify_socket(call);
}
diff --git a/net/rxrpc/sendmsg.c b/net/rxrpc/sendmsg.c
index 0e8da909d4f2..584397aba4a0 100644
--- a/net/rxrpc/sendmsg.c
+++ b/net/rxrpc/sendmsg.c
@@ -707,7 +707,7 @@ int rxrpc_do_sendmsg(struct rxrpc_sock *rx, struct msghdr *msg, size_t len)
} else {
switch (rxrpc_call_state(call)) {
case RXRPC_CALL_CLIENT_AWAIT_CONN:
- case RXRPC_CALL_SERVER_SECURING:
+ case RXRPC_CALL_SERVER_RECV_REQUEST:
if (p.command == RXRPC_CMD_SEND_ABORT)
break;
fallthrough;
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling
2025-02-03 11:03 [PATCH net 0/2] rxrpc: Miscellaneous fixes David Howells
2025-02-03 11:03 ` [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state David Howells
@ 2025-02-03 11:03 ` David Howells
2025-02-04 11:12 ` Paolo Abeni
2025-02-04 14:09 ` David Howells
2025-02-04 10:39 ` [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state David Howells
2025-02-04 14:40 ` [PATCH net 0/2] rxrpc: Miscellaneous fixes patchwork-bot+netdevbpf
3 siblings, 2 replies; 13+ messages in thread
From: David Howells @ 2025-02-03 11:03 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel, Simon Horman
The rxrpc_connection attend queue is never used because conn::attend_link
is never initialised and so is always NULL'd out and thus always appears to
be busy. This requires the following fix:
(1) Fix this the attend queue problem by initialising conn::attend_link.
And, consequently, two further fixes for things masked by the above bug:
(2) Fix rxrpc_input_conn_event() to handle being invoked with a NULL
sk_buff pointer - something that can now happen with the above change.
(3) Fix the RXRPC_SKB_MARK_SERVICE_CONN_SECURED message to carry a pointer
to the connection and a ref on it.
Signed-off-by: David Howells <dhowells@redhat.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Jakub Kicinski <kuba@kernel.org>
cc: "David S. Miller" <davem@davemloft.net>
cc: Eric Dumazet <edumazet@google.com>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
---
include/trace/events/rxrpc.h | 1 +
net/rxrpc/conn_event.c | 17 ++++++++++-------
net/rxrpc/conn_object.c | 1 +
3 files changed, 12 insertions(+), 7 deletions(-)
diff --git a/include/trace/events/rxrpc.h b/include/trace/events/rxrpc.h
index 2f119d18a061..cad50d91077e 100644
--- a/include/trace/events/rxrpc.h
+++ b/include/trace/events/rxrpc.h
@@ -219,6 +219,7 @@
EM(rxrpc_conn_get_conn_input, "GET inp-conn") \
EM(rxrpc_conn_get_idle, "GET idle ") \
EM(rxrpc_conn_get_poke_abort, "GET pk-abort") \
+ EM(rxrpc_conn_get_poke_secured, "GET secured ") \
EM(rxrpc_conn_get_poke_timer, "GET poke ") \
EM(rxrpc_conn_get_service_conn, "GET svc-conn") \
EM(rxrpc_conn_new_client, "NEW client ") \
diff --git a/net/rxrpc/conn_event.c b/net/rxrpc/conn_event.c
index d93b041c4894..4d9c5e21ba78 100644
--- a/net/rxrpc/conn_event.c
+++ b/net/rxrpc/conn_event.c
@@ -270,6 +270,7 @@ static int rxrpc_process_event(struct rxrpc_connection *conn,
* we've already received the packet, put it on the
* front of the queue.
*/
+ sp->conn = rxrpc_get_connection(conn, rxrpc_conn_get_poke_secured);
skb->mark = RXRPC_SKB_MARK_SERVICE_CONN_SECURED;
rxrpc_get_skb(skb, rxrpc_skb_get_conn_secured);
skb_queue_head(&conn->local->rx_queue, skb);
@@ -435,14 +436,16 @@ void rxrpc_input_conn_event(struct rxrpc_connection *conn, struct sk_buff *skb)
if (test_and_clear_bit(RXRPC_CONN_EV_ABORT_CALLS, &conn->events))
rxrpc_abort_calls(conn);
- switch (skb->mark) {
- case RXRPC_SKB_MARK_SERVICE_CONN_SECURED:
- if (conn->state != RXRPC_CONN_SERVICE)
- break;
+ if (skb) {
+ switch (skb->mark) {
+ case RXRPC_SKB_MARK_SERVICE_CONN_SECURED:
+ if (conn->state != RXRPC_CONN_SERVICE)
+ break;
- for (loop = 0; loop < RXRPC_MAXCALLS; loop++)
- rxrpc_call_is_secure(conn->channels[loop].call);
- break;
+ for (loop = 0; loop < RXRPC_MAXCALLS; loop++)
+ rxrpc_call_is_secure(conn->channels[loop].call);
+ break;
+ }
}
/* Process delayed ACKs whose time has come. */
diff --git a/net/rxrpc/conn_object.c b/net/rxrpc/conn_object.c
index 7eba4d7d9a38..2f1fd1e2e7e4 100644
--- a/net/rxrpc/conn_object.c
+++ b/net/rxrpc/conn_object.c
@@ -67,6 +67,7 @@ struct rxrpc_connection *rxrpc_alloc_connection(struct rxrpc_net *rxnet,
INIT_WORK(&conn->destructor, rxrpc_clean_up_connection);
INIT_LIST_HEAD(&conn->proc_link);
INIT_LIST_HEAD(&conn->link);
+ INIT_LIST_HEAD(&conn->attend_link);
mutex_init(&conn->security_lock);
mutex_init(&conn->tx_data_alloc_lock);
skb_queue_head_init(&conn->rx_queue);
^ permalink raw reply related [flat|nested] 13+ messages in thread
* Re: [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state
2025-02-03 11:03 [PATCH net 0/2] rxrpc: Miscellaneous fixes David Howells
2025-02-03 11:03 ` [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state David Howells
2025-02-03 11:03 ` [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling David Howells
@ 2025-02-04 10:39 ` David Howells
2025-02-04 14:40 ` [PATCH net 0/2] rxrpc: Miscellaneous fixes patchwork-bot+netdevbpf
3 siblings, 0 replies; 13+ messages in thread
From: David Howells @ 2025-02-04 10:39 UTC (permalink / raw)
Cc: dhowells, netdev, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel, Simon Horman
Patch 1 is broken and I've removed it from the system. Patch 2 appears to be
okay.
David
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling
2025-02-03 11:03 ` [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling David Howells
@ 2025-02-04 11:12 ` Paolo Abeni
2025-02-04 14:09 ` David Howells
1 sibling, 0 replies; 13+ messages in thread
From: Paolo Abeni @ 2025-02-04 11:12 UTC (permalink / raw)
To: David Howells, netdev
Cc: Marc Dionne, Jakub Kicinski, David S. Miller, Eric Dumazet,
linux-afs, linux-kernel, Simon Horman
On 2/3/25 12:03 PM, David Howells wrote:
> The rxrpc_connection attend queue is never used because conn::attend_link
> is never initialised and so is always NULL'd out and thus always appears to
> be busy. This requires the following fix:
>
> (1) Fix this the attend queue problem by initialising conn::attend_link.
>
> And, consequently, two further fixes for things masked by the above bug:
>
> (2) Fix rxrpc_input_conn_event() to handle being invoked with a NULL
> sk_buff pointer - something that can now happen with the above change.
>
> (3) Fix the RXRPC_SKB_MARK_SERVICE_CONN_SECURED message to carry a pointer
> to the connection and a ref on it.
>
> Signed-off-by: David Howells <dhowells@redhat.com>
> cc: Marc Dionne <marc.dionne@auristor.com>
> cc: Jakub Kicinski <kuba@kernel.org>
> cc: "David S. Miller" <davem@davemloft.net>
> cc: Eric Dumazet <edumazet@google.com>
> cc: Paolo Abeni <pabeni@redhat.com>
> cc: Simon Horman <horms@kernel.org>
> cc: linux-afs@lists.infradead.org
> cc: netdev@vger.kernel.org
A couple of minor nits: I think this deserves a 'Fixes' tag, and
possibly split into separate patches to address the reported problems
individually.
Thanks,
Paolo
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling
2025-02-03 11:03 ` [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling David Howells
2025-02-04 11:12 ` Paolo Abeni
@ 2025-02-04 14:09 ` David Howells
2025-02-04 14:34 ` Paolo Abeni
2025-02-04 15:46 ` David Howells
1 sibling, 2 replies; 13+ messages in thread
From: David Howells @ 2025-02-04 14:09 UTC (permalink / raw)
To: Paolo Abeni
Cc: dhowells, netdev, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, linux-afs, linux-kernel, Simon Horman
Paolo Abeni <pabeni@redhat.com> wrote:
> A couple of minor nits: I think this deserves a 'Fixes' tag,
Fixes: f2cce89a074e ("rxrpc: Implement a mechanism to send an event notification to a connection")
> and possibly split into separate patches to address the reported problems
> individually.
I can do that if you really want.
David
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling
2025-02-04 14:09 ` David Howells
@ 2025-02-04 14:34 ` Paolo Abeni
2025-02-04 15:46 ` David Howells
1 sibling, 0 replies; 13+ messages in thread
From: Paolo Abeni @ 2025-02-04 14:34 UTC (permalink / raw)
To: David Howells
Cc: netdev, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, linux-afs, linux-kernel, Simon Horman
On 2/4/25 3:09 PM, David Howells wrote:
> Paolo Abeni <pabeni@redhat.com> wrote:
>
>> A couple of minor nits: I think this deserves a 'Fixes' tag,
>
> Fixes: f2cce89a074e ("rxrpc: Implement a mechanism to send an event notification to a connection")
>
>> and possibly split into separate patches to address the reported problems
>> individually.
>
> I can do that if you really want.
I guess we are all better off without the need for a repost. I'm
applying it as-is.
/P
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net 0/2] rxrpc: Miscellaneous fixes
2025-02-03 11:03 [PATCH net 0/2] rxrpc: Miscellaneous fixes David Howells
` (2 preceding siblings ...)
2025-02-04 10:39 ` [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state David Howells
@ 2025-02-04 14:40 ` patchwork-bot+netdevbpf
3 siblings, 0 replies; 13+ messages in thread
From: patchwork-bot+netdevbpf @ 2025-02-04 14:40 UTC (permalink / raw)
To: David Howells
Cc: netdev, marc.dionne, kuba, davem, edumazet, pabeni, linux-afs,
linux-kernel
Hello:
This series was applied to netdev/net.git (main)
by Paolo Abeni <pabeni@redhat.com>:
On Mon, 3 Feb 2025 11:03:02 +0000 you wrote:
> Here some miscellaneous fixes for AF_RXRPC:
>
> (1) Fix the state of a call to not treat the challenge-response cycle as
> part of an incoming call's state set. The problem is that it makes
> handling received of the final packet in the receive phase difficult
> as that wants to change the call state - but security negotiations may
> not yet be complete.
>
> [...]
Here is the summary with links:
- [net,1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state
(no matching commit)
- [net,2/2] rxrpc: Fix the rxrpc_connection attend queue handling
https://git.kernel.org/netdev/net/c/4241a702e0d0
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling
2025-02-04 14:09 ` David Howells
2025-02-04 14:34 ` Paolo Abeni
@ 2025-02-04 15:46 ` David Howells
1 sibling, 0 replies; 13+ messages in thread
From: David Howells @ 2025-02-04 15:46 UTC (permalink / raw)
To: Paolo Abeni
Cc: dhowells, netdev, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, linux-afs, linux-kernel, Simon Horman
Paolo Abeni <pabeni@redhat.com> wrote:
> I guess we are all better off without the need for a repost. I'm
> applying it as-is.
Thanks :-)
I think that patch 1 (that I dropped) is probably correct, but that it brings
a further bug to the fore, so I'll track that down before resubmitting.
David
^ permalink raw reply [flat|nested] 13+ messages in thread
* [PATCH net 0/2] rxrpc: Miscellaneous fixes
@ 2025-07-07 10:24 David Howells
2025-07-08 20:20 ` patchwork-bot+netdevbpf
0 siblings, 1 reply; 13+ messages in thread
From: David Howells @ 2025-07-07 10:24 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel
Here are some miscellaneous fixes for rxrpc:
(1) Fix a warning about over-large frame size in rxrpc_send_response().
(2) Fix assertion failure due to preallocation collision.
David
The patches can be found here also:
http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes
David Howells (2):
rxrpc: Fix over large frame size warning
rxrpc: Fix bug due to prealloc collision
net/rxrpc/ar-internal.h | 15 +++++++++------
net/rxrpc/call_accept.c | 2 ++
net/rxrpc/output.c | 5 ++++-
3 files changed, 15 insertions(+), 7 deletions(-)
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net 0/2] rxrpc: Miscellaneous fixes
2025-07-07 10:24 David Howells
@ 2025-07-08 20:20 ` patchwork-bot+netdevbpf
0 siblings, 0 replies; 13+ messages in thread
From: patchwork-bot+netdevbpf @ 2025-07-08 20:20 UTC (permalink / raw)
To: David Howells
Cc: netdev, marc.dionne, kuba, davem, edumazet, pabeni, linux-afs,
linux-kernel
Hello:
This series was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:
On Mon, 7 Jul 2025 11:24:32 +0100 you wrote:
> Here are some miscellaneous fixes for rxrpc:
>
> (1) Fix a warning about over-large frame size in rxrpc_send_response().
>
> (2) Fix assertion failure due to preallocation collision.
>
> David
>
> [...]
Here is the summary with links:
- [net,1/2] rxrpc: Fix over large frame size warning
https://git.kernel.org/netdev/net/c/31ec70afaaad
- [net,2/2] rxrpc: Fix bug due to prealloc collision
(no matching commit)
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 13+ messages in thread
end of thread, other threads:[~2025-07-08 20:19 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-02-03 11:03 [PATCH net 0/2] rxrpc: Miscellaneous fixes David Howells
2025-02-03 11:03 ` [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state David Howells
2025-02-03 11:03 ` [PATCH net 2/2] rxrpc: Fix the rxrpc_connection attend queue handling David Howells
2025-02-04 11:12 ` Paolo Abeni
2025-02-04 14:09 ` David Howells
2025-02-04 14:34 ` Paolo Abeni
2025-02-04 15:46 ` David Howells
2025-02-04 10:39 ` [PATCH net 1/2] rxrpc: Fix call state set to not include the SERVER_SECURING state David Howells
2025-02-04 14:40 ` [PATCH net 0/2] rxrpc: Miscellaneous fixes patchwork-bot+netdevbpf
-- strict thread matches above, loose matches on Subject: below --
2025-07-07 10:24 David Howells
2025-07-08 20:20 ` patchwork-bot+netdevbpf
2024-10-01 13:26 David Howells
2024-10-03 23:40 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).