diff options
author | Paolo Abeni <pabeni@redhat.com> | 2021-08-14 01:15:47 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2021-08-14 13:37:25 +0300 |
commit | 0460ce229f5b19f501124adf1485176fbfc8f1c2 (patch) | |
tree | 82ab49ab3968cb490841066e18965953b1e4062c | |
parent | fc1b4e3b6274379a1ed398e19b850561ccd765db (diff) | |
download | linux-0460ce229f5b19f501124adf1485176fbfc8f1c2.tar.xz |
mptcp: backup flag from incoming MPJ ack option
the parsed incoming backup flag is not propagated
to the subflow itself, the client may end-up using it
to send data.
Closes: https://github.com/multipath-tcp/mptcp_net-next/issues/191
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Mat Martineau <mathew.j.martineau@linux.intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/mptcp/subflow.c | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/net/mptcp/subflow.c b/net/mptcp/subflow.c index 966f777d35ce..1151926d335b 100644 --- a/net/mptcp/subflow.c +++ b/net/mptcp/subflow.c @@ -435,10 +435,12 @@ static void subflow_finish_connect(struct sock *sk, const struct sk_buff *skb) goto do_reset; } + subflow->backup = mp_opt.backup; subflow->thmac = mp_opt.thmac; subflow->remote_nonce = mp_opt.nonce; - pr_debug("subflow=%p, thmac=%llu, remote_nonce=%u", subflow, - subflow->thmac, subflow->remote_nonce); + pr_debug("subflow=%p, thmac=%llu, remote_nonce=%u backup=%d", + subflow, subflow->thmac, subflow->remote_nonce, + subflow->backup); if (!subflow_thmac_valid(subflow)) { MPTCP_INC_STATS(sock_net(sk), MPTCP_MIB_JOINACKMAC); |