From nobody Sat Oct 11 06:27:59 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2584B2BB1D; Sun, 21 Sep 2025 17:24:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1758475452; cv=none; b=FzGl3TorjYih/tjzGoeyTdPOMVAJGyM0ULpsp65LbTNMdm2oSJ/FuQvp/4yoS5yvkS61QfD5tA2Sf1wQIpSoriihKsR9TSLPYJT6q1rPmnUx3G+iYtgIHFroKRkhKu2zx5Q9gv7RcYP9SCZpmsKer+Gsgd+/M0GPyuXc1MARg4U= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1758475452; c=relaxed/simple; bh=gNx5DZZX+jFgpFBBnDg5FeR/YOGqax8X55J94VNHDMw=; h=Subject:To:Cc:From:Date:In-Reply-To:Message-ID:MIME-Version: Content-Type; b=WLXvJP55Ri6i05Z6qrZHtVF47pll3yeFclwGdogaJK7RPZJ4MIsC7I8Nfr1DNnd+QreXMecmBFqy4lHoK4fnPOYBUKe2ThOIgo8Ba/ZdK2QbvJLQw5UDS085F4GMcL6aeVPLu4eqQkwoDW4H39n4iYqNe3+EikiC9gt2VzXy1pE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=DhuseRo4; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="DhuseRo4" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 55DABC4CEE7; Sun, 21 Sep 2025 17:24:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1758475451; bh=gNx5DZZX+jFgpFBBnDg5FeR/YOGqax8X55J94VNHDMw=; h=Subject:To:Cc:From:Date:In-Reply-To:From; b=DhuseRo4DSmHzIECwerwR4u62l9VO8xVJJvVGLyI2cfMs3UYXctcL5XHup6zS9tFR pp9wk9+G9eNwsOteuWyuynYNMwQe4CDa91GGGpSNLAEr4ha0NStU+0W3x4u4fBPGEt cfDPcLT1oaecFPFk/LNMzmpl+aYaBGUmpU7UDA+M= Subject: Patch "mptcp: pm: nl: announce deny-join-id0 flag" has been added to the 6.1-stable tree To: gregkh@linuxfoundation.org,kuba@kernel.org,marek@cloudflare.com,martineau@kernel.org,matttbe@kernel.org,mptcp@lists.linux.dev,sashal@kernel.org Cc: From: Date: Sun, 21 Sep 2025 19:24:09 +0200 In-Reply-To: <20250919225118.3781035-5-matttbe@kernel.org> Message-ID: <2025092109-buccaneer-panda-12fa@gregkh> Precedence: bulk X-Mailing-List: mptcp@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-stable: commit X-Patchwork-Hint: ignore Content-Type: text/plain; charset="utf-8" This is a note to let you know that I've just added the patch titled mptcp: pm: nl: announce deny-join-id0 flag to the 6.1-stable tree which can be found at: http://www.kernel.org/git/?p=3Dlinux/kernel/git/stable/stable-queue.git= ;a=3Dsummary The filename of the patch is: mptcp-pm-nl-announce-deny-join-id0-flag.patch and it can be found in the queue-6.1 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let know about it. From stable+bounces-180715-greg=3Dkroah.com@vger.kernel.org Sat Sep 20 00:5= 1:43 2025 From: "Matthieu Baerts (NGI0)" Date: Sat, 20 Sep 2025 00:51:20 +0200 Subject: mptcp: pm: nl: announce deny-join-id0 flag To: mptcp@lists.linux.dev, stable@vger.kernel.org, gregkh@linuxfoundation.o= rg Cc: "Matthieu Baerts (NGI0)" , sashal@kernel.org, Marek= Majkowski , Mat Martineau , Ja= kub Kicinski Message-ID: <20250919225118.3781035-5-matttbe@kernel.org> From: "Matthieu Baerts (NGI0)" commit 2293c57484ae64c9a3c847c8807db8c26a3a4d41 upstream. During the connection establishment, a peer can tell the other one that it cannot establish new subflows to the initial IP address and port by setting the 'C' flag [1]. Doing so makes sense when the sender is behind a strict NAT, operating behind a legacy Layer 4 load balancer, or using anycast IP address for example. When this 'C' flag is set, the path-managers must then not try to establish new subflows to the other peer's initial IP address and port. The in-kernel PM has access to this info, but the userspace PM didn't. The RFC8684 [1] is strict about that: (...) therefore the receiver MUST NOT try to open any additional subflows toward this address and port. So it is important to tell the userspace about that as it is responsible for the respect of this flag. When a new connection is created and established, the Netlink events now contain the existing but not currently used 'flags' attribute. When MPTCP_PM_EV_FLAG_DENY_JOIN_ID0 is set, it means no other subflows to the initial IP address and port -- info that are also part of the event -- can be established. Link: https://datatracker.ietf.org/doc/html/rfc8684#section-3.1-20.6 [1] Fixes: 702c2f646d42 ("mptcp: netlink: allow userspace-driven subflow establ= ishment") Reported-by: Marek Majkowski Closes: https://github.com/multipath-tcp/mptcp_net-next/issues/532 Reviewed-by: Mat Martineau Signed-off-by: Matthieu Baerts (NGI0) Link: https://patch.msgid.link/20250912-net-mptcp-pm-uspace-deny_join_id0-v= 1-2-40171884ade8@kernel.org Signed-off-by: Jakub Kicinski [ Conflicts in mptcp_pm.yaml, and mptcp_pm.h, because these files have been added later by commit bc8aeb2045e2 ("Documentation: netlink: add a YAML spec for mptcp"), and commit 9d1ed17f93ce ("uapi: mptcp: use header file generated from YAML spec"), which are not in this version. Applying the same modifications, but only in mptcp.h. Conflict in pm_netlink.c, because of a difference in the context, introduced by commit b9f4554356f6 ("mptcp: annotate lockless access for token"), which is not in this version. ] Signed-off-by: Matthieu Baerts (NGI0) Signed-off-by: Greg Kroah-Hartman --- include/uapi/linux/mptcp.h | 6 ++++-- net/mptcp/pm_netlink.c | 7 +++++++ 2 files changed, 11 insertions(+), 2 deletions(-) --- a/include/uapi/linux/mptcp.h +++ b/include/uapi/linux/mptcp.h @@ -81,6 +81,8 @@ enum { =20 #define MPTCP_PM_ADDR_ATTR_MAX (__MPTCP_PM_ADDR_ATTR_MAX - 1) =20 +#define MPTCP_PM_EV_FLAG_DENY_JOIN_ID0 _BITUL(0) + #define MPTCP_PM_ADDR_FLAG_SIGNAL (1 << 0) #define MPTCP_PM_ADDR_FLAG_SUBFLOW (1 << 1) #define MPTCP_PM_ADDR_FLAG_BACKUP (1 << 2) @@ -127,13 +129,13 @@ struct mptcp_info { =20 /* * MPTCP_EVENT_CREATED: token, family, saddr4 | saddr6, daddr4 | daddr6, - * sport, dport + * sport, dport, server-side, [flags] * A new MPTCP connection has been created. It is the good time to allocate * memory and send ADD_ADDR if needed. Depending on the traffic-patterns * it can take a long time until the MPTCP_EVENT_ESTABLISHED is sent. * * MPTCP_EVENT_ESTABLISHED: token, family, saddr4 | saddr6, daddr4 | daddr= 6, - * sport, dport + * sport, dport, server-side, [flags] * A MPTCP connection is established (can start new subflows). * * MPTCP_EVENT_CLOSED: token --- a/net/mptcp/pm_netlink.c +++ b/net/mptcp/pm_netlink.c @@ -2242,6 +2242,7 @@ static int mptcp_event_created(struct sk const struct sock *ssk) { int err =3D nla_put_u32(skb, MPTCP_ATTR_TOKEN, msk->token); + u16 flags =3D 0; =20 if (err) return err; @@ -2249,6 +2250,12 @@ static int mptcp_event_created(struct sk if (nla_put_u8(skb, MPTCP_ATTR_SERVER_SIDE, READ_ONCE(msk->pm.server_side= ))) return -EMSGSIZE; =20 + if (READ_ONCE(msk->pm.remote_deny_join_id0)) + flags |=3D MPTCP_PM_EV_FLAG_DENY_JOIN_ID0; + + if (flags && nla_put_u16(skb, MPTCP_ATTR_FLAGS, flags)) + return -EMSGSIZE; + return mptcp_event_add_subflow(skb, ssk); } =20 Patches currently in stable-queue which might be from matttbe@kernel.org are queue-6.1/mptcp-pm-nl-announce-deny-join-id0-flag.patch queue-6.1/selftests-mptcp-avoid-spurious-errors-on-tcp-disconnect.patch queue-6.1/mptcp-set-remote_deny_join_id0-on-syn-recv.patch queue-6.1/selftests-mptcp-userspace-pm-validate-deny-join-id0-flag.patch