From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9CA6D284B58; Thu, 27 Nov 2025 15:01:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764255687; cv=none; b=nRlxLX+/Zw5C4mC1pFwq3hkIN0hOhujn6lD4uMkwthkaifw5v8vIS5sLIvkHI9xVUBozsNP6aWk2xfiuOHbepThqjt3tYOEdzbwGbUrnTwfyfEU4cGw2ZMnWSQCuMf4i7Pp+8uiavphTpg0rcF6yX3q+ghPNwsPT+J5DcpfWMr4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764255687; c=relaxed/simple; bh=HsYYkA/SgvgDHh2VtNH3uqWIxuUNkFYUZSnLsKDJa6I=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=GNbaLgcSXnv+6JuQ3W5McGNtjdVSR2rXgEP7b30ggvivtRaNoFmUM0lCHjCZQyjYjM8Hc5PJPHEv+Ae7YqxjsH5L+UZn3IeYDXuEKaN6pabuV7rhR7ertjLFUzgo+WTMMvps4xtBZDqoT2h72NDz110L0mXMCJu0BltE5C7npP4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=HBfRZQ4d; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="HBfRZQ4d" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 16F4BC4CEF8; Thu, 27 Nov 2025 15:01:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1764255687; bh=HsYYkA/SgvgDHh2VtNH3uqWIxuUNkFYUZSnLsKDJa6I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HBfRZQ4djfekbcmgzavT5rUq1XcDjs2UfIZenkVhukEet9mXkdGf68deNWgUYk5NX yqDn8DAJrihTmsflSNTrQtbfD22/ATXvyjb151QSztT1Qxdq5Zx2NUNnYTXSQf8JL/ xD1om6vBp+s9HYVUW4+FgjEmwuF4hTY9JjkN/E3k= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Paolo Abeni , "Matthieu Baerts (NGI0)" , Jakub Kicinski Subject: [PATCH 6.17 062/175] mptcp: fix premature close in case of fallback Date: Thu, 27 Nov 2025 15:45:15 +0100 Message-ID: <20251127144045.231574083@linuxfoundation.org> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251127144042.945669935@linuxfoundation.org> References: <20251127144042.945669935@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.17-stable review patch. If anyone has any objections, please let me know. ------------------ From: Paolo Abeni commit 17393fa7b7086664be519e7230cb6ed7ec7d9462 upstream. I'm observing very frequent self-tests failures in case of fallback when running on a CONFIG_PREEMPT kernel. The root cause is that subflow_sched_work_if_closed() closes any subflow as soon as it is half-closed and has no incoming data pending. That works well for regular subflows - MPTCP needs bi-directional connectivity to operate on a given subflow - but for fallback socket is race prone. When TCP peer closes the connection before the MPTCP one, subflow_sched_work_if_closed() will schedule the MPTCP worker to gracefully close the subflow, and shortly after will do another schedule to inject and process a dummy incoming DATA_FIN. On CONFIG_PREEMPT kernel, the MPTCP worker can kick-in and close the fallback subflow before subflow_sched_work_if_closed() is able to create the dummy DATA_FIN, unexpectedly interrupting the transfer. Address the issue explicitly avoiding closing fallback subflows on when the peer is only half-closed. Note that, when the subflow is able to create the DATA_FIN before the worker invocation, the worker will change the msk state before trying to close the subflow and will skip the latter operation as the msk will not match anymore the precondition in __mptcp_close_subflow(). Fixes: f09b0ad55a11 ("mptcp: close subflow when receiving TCP+FIN") Cc: stable@vger.kernel.org Signed-off-by: Paolo Abeni Reviewed-by: Matthieu Baerts (NGI0) Signed-off-by: Matthieu Baerts (NGI0) Link: https://patch.msgid.link/20251118-net-mptcp-misc-fixes-6-18-rc6-v1-3-806d3781c95f@kernel.org Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/mptcp/protocol.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/mptcp/protocol.c +++ b/net/mptcp/protocol.c @@ -2531,7 +2531,8 @@ static void __mptcp_close_subflow(struct if (ssk_state != TCP_CLOSE && (ssk_state != TCP_CLOSE_WAIT || - inet_sk_state_load(sk) != TCP_ESTABLISHED)) + inet_sk_state_load(sk) != TCP_ESTABLISHED || + __mptcp_check_fallback(msk))) continue; /* 'subflow_data_ready' will re-sched once rx queue is empty */