Skip to content

Commit e32d262

Browse files
Paolo Abenikuba-moo
authored andcommitted
mptcp: handle consistently DSS corruption
Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type. Fixes: 6771bfd ("mptcp: update mptcp ack sequence from work queue") Cc: stable@vger.kernel.org Signed-off-by: Paolo Abeni <pabeni@redhat.com> Reviewed-by: Matthieu Baerts (NGI0) <matttbe@kernel.org> Signed-off-by: Matthieu Baerts (NGI0) <matttbe@kernel.org> Link: https://patch.msgid.link/20241008-net-mptcp-fallback-fixes-v1-1-c6fb8e93e551@kernel.org Signed-off-by: Jakub Kicinski <kuba@kernel.org>
1 parent d94785b commit e32d262

File tree

4 files changed

+28
-4
lines changed

4 files changed

+28
-4
lines changed

net/mptcp/mib.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@ static const struct snmp_mib mptcp_snmp_list[] = {
3232
SNMP_MIB_ITEM("MPJoinSynTxBindErr", MPTCP_MIB_JOINSYNTXBINDERR),
3333
SNMP_MIB_ITEM("MPJoinSynTxConnectErr", MPTCP_MIB_JOINSYNTXCONNECTERR),
3434
SNMP_MIB_ITEM("DSSNotMatching", MPTCP_MIB_DSSNOMATCH),
35+
SNMP_MIB_ITEM("DSSCorruptionFallback", MPTCP_MIB_DSSCORRUPTIONFALLBACK),
36+
SNMP_MIB_ITEM("DSSCorruptionReset", MPTCP_MIB_DSSCORRUPTIONRESET),
3537
SNMP_MIB_ITEM("InfiniteMapTx", MPTCP_MIB_INFINITEMAPTX),
3638
SNMP_MIB_ITEM("InfiniteMapRx", MPTCP_MIB_INFINITEMAPRX),
3739
SNMP_MIB_ITEM("DSSNoMatchTCP", MPTCP_MIB_DSSTCPMISMATCH),

net/mptcp/mib.h

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ enum linux_mptcp_mib_field {
2727
MPTCP_MIB_JOINSYNTXBINDERR, /* Not able to bind() the address when sending a SYN + MP_JOIN */
2828
MPTCP_MIB_JOINSYNTXCONNECTERR, /* Not able to connect() when sending a SYN + MP_JOIN */
2929
MPTCP_MIB_DSSNOMATCH, /* Received a new mapping that did not match the previous one */
30+
MPTCP_MIB_DSSCORRUPTIONFALLBACK,/* DSS corruption detected, fallback */
31+
MPTCP_MIB_DSSCORRUPTIONRESET, /* DSS corruption detected, MPJ subflow reset */
3032
MPTCP_MIB_INFINITEMAPTX, /* Sent an infinite mapping */
3133
MPTCP_MIB_INFINITEMAPRX, /* Received an infinite mapping */
3234
MPTCP_MIB_DSSTCPMISMATCH, /* DSS-mapping did not map with TCP's sequence numbers */

net/mptcp/protocol.c

Lines changed: 21 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -620,6 +620,18 @@ static bool mptcp_check_data_fin(struct sock *sk)
620620
return ret;
621621
}
622622

623+
static void mptcp_dss_corruption(struct mptcp_sock *msk, struct sock *ssk)
624+
{
625+
if (READ_ONCE(msk->allow_infinite_fallback)) {
626+
MPTCP_INC_STATS(sock_net(ssk),
627+
MPTCP_MIB_DSSCORRUPTIONFALLBACK);
628+
mptcp_do_fallback(ssk);
629+
} else {
630+
MPTCP_INC_STATS(sock_net(ssk), MPTCP_MIB_DSSCORRUPTIONRESET);
631+
mptcp_subflow_reset(ssk);
632+
}
633+
}
634+
623635
static bool __mptcp_move_skbs_from_subflow(struct mptcp_sock *msk,
624636
struct sock *ssk,
625637
unsigned int *bytes)
@@ -692,10 +704,16 @@ static bool __mptcp_move_skbs_from_subflow(struct mptcp_sock *msk,
692704
moved += len;
693705
seq += len;
694706

695-
if (WARN_ON_ONCE(map_remaining < len))
696-
break;
707+
if (unlikely(map_remaining < len)) {
708+
DEBUG_NET_WARN_ON_ONCE(1);
709+
mptcp_dss_corruption(msk, ssk);
710+
}
697711
} else {
698-
WARN_ON_ONCE(!fin);
712+
if (unlikely(!fin)) {
713+
DEBUG_NET_WARN_ON_ONCE(1);
714+
mptcp_dss_corruption(msk, ssk);
715+
}
716+
699717
sk_eat_skb(ssk, skb);
700718
done = true;
701719
}

net/mptcp/subflow.c

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -975,8 +975,10 @@ static bool skb_is_fully_mapped(struct sock *ssk, struct sk_buff *skb)
975975
unsigned int skb_consumed;
976976

977977
skb_consumed = tcp_sk(ssk)->copied_seq - TCP_SKB_CB(skb)->seq;
978-
if (WARN_ON_ONCE(skb_consumed >= skb->len))
978+
if (unlikely(skb_consumed >= skb->len)) {
979+
DEBUG_NET_WARN_ON_ONCE(1);
979980
return true;
981+
}
980982

981983
return skb->len - skb_consumed <= subflow->map_data_len -
982984
mptcp_subflow_get_map_offset(subflow);

0 commit comments

Comments
 (0)