aboutgitcodebugslistschat
diff options
context:
space:
mode:
authorStefano Brivio <sbrivio@redhat.com>2025-03-19 17:57:45 +0100
committerDavid Gibson <david@gibson.dropbear.id.au>2025-04-02 14:32:10 +1100
commit37550961ea10daa05336b4f93e03e2a44e71e40e (patch)
treed9bc243a0926e29db6e5b9942c3fb4a7b4522c45
parent53f2ed715e68848451353addb795c3f09992df48 (diff)
downloadpasst-37550961ea10daa05336b4f93e03e2a44e71e40e.tar
passt-37550961ea10daa05336b4f93e03e2a44e71e40e.tar.gz
passt-37550961ea10daa05336b4f93e03e2a44e71e40e.tar.bz2
passt-37550961ea10daa05336b4f93e03e2a44e71e40e.tar.lz
passt-37550961ea10daa05336b4f93e03e2a44e71e40e.tar.xz
passt-37550961ea10daa05336b4f93e03e2a44e71e40e.tar.zst
passt-37550961ea10daa05336b4f93e03e2a44e71e40e.zip
tcp: Flush socket before checking for more data in active close state
Otherwise, if all the pending data is acknowledged: - tcp_update_seqack_from_tap() updates the current tap-side ACK sequence (conn->seq_ack_from_tap) - next, we compare the sequence we sent (conn->seq_to_tap) to the ACK sequence (conn->seq_ack_from_tap) in tcp_data_from_sock() to understand if there's more data we can send. If they match, we conclude that we haven't sent any of that data, and keep re-sending it. We need, instead, to flush the socket (drop acknowledged data) before calling tcp_update_seqack_from_tap(), so that once we update conn->seq_ack_from_tap, we can be sure that all data until there is gone from the socket. Link: https://bugs.passt.top/show_bug.cgi?id=114 Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> Fixes: 30f1e082c3c0 ("tcp: Keep updating window and checking for socket data after FIN from guest") Signed-off-by: Stefano Brivio <sbrivio@redhat.com> Reviewed-by: David Gibson <david@gibson.dropbear.id.au> (cherry picked from commit ebdd46367ce1acba235013d97e362b8677b538d5)
-rw-r--r--tcp.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/tcp.c b/tcp.c
index ac2b7d3..74141ce 100644
--- a/tcp.c
+++ b/tcp.c
@@ -2047,6 +2047,7 @@ int tcp_tap_handler(const struct ctx *c, uint8_t pif, sa_family_t af,
/* Established connections not accepting data from tap */
if (conn->events & TAP_FIN_RCVD) {
+ tcp_sock_consume(conn, ntohl(th->ack_seq));
tcp_update_seqack_from_tap(c, conn, ntohl(th->ack_seq));
tcp_tap_window_update(conn, ntohs(th->window));
tcp_data_from_sock(c, conn);