diff options
author | David Howells <dhowells@redhat.com> | 2015-11-24 14:41:59 +0000 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-11-24 17:14:50 -0500 |
commit | 33c40e242ce681092ab778c238f3fff5a345ee0e (patch) | |
tree | e3f0a41be6d46db80cf3b0c7262c2248465b0da3 /net/ipv4/ipip.c | |
parent | 264640fc2c5f4f913db5c73fa3eb1ead2c45e9d7 (diff) | |
download | op-kernel-dev-33c40e242ce681092ab778c238f3fff5a345ee0e.zip op-kernel-dev-33c40e242ce681092ab778c238f3fff5a345ee0e.tar.gz |
rxrpc: Correctly handle ack at end of client call transmit phase
Normally, the transmit phase of a client call is implicitly ack'd by the
reception of the first data packet of the response being received.
However, if a security negotiation happens, the transmit phase, if it is
entirely contained in a single packet, may get an ack packet in response
and then may get aborted due to security negotiation failure.
Because the client has shifted state to RXRPC_CALL_CLIENT_AWAIT_REPLY due
to having transmitted all the data, the code that handles processing of the
received ack packet doesn't note the hard ack the data packet.
The following abort packet in the case of security negotiation failure then
incurs an assertion failure when it tries to drain the Tx queue because the
hard ack state is out of sync (hard ack means the packets have been
processed and can be discarded by the sender; a soft ack means that the
packets are received but could still be discarded and rerequested by the
receiver).
To fix this, we should record the hard ack we received for the ack packet.
The assertion failure looks like:
RxRPC: Assertion failed
1 <= 0 is false
0x1 <= 0x0 is false
------------[ cut here ]------------
kernel BUG at ../net/rxrpc/ar-ack.c:431!
...
RIP: 0010:[<ffffffffa006857b>] [<ffffffffa006857b>] rxrpc_rotate_tx_window+0xbc/0x131 [af_rxrpc]
...
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv4/ipip.c')
0 files changed, 0 insertions, 0 deletions