All of lore.kernel.org
 help / color / mirror / Atom feed
* sctp bug: sk_ack_backlog wrap-around problem
@ 2014-06-10  6:27 ` Xufeng Zhang
  0 siblings, 0 replies; 4+ messages in thread
From: Xufeng Zhang @ 2014-06-10  6:27 UTC (permalink / raw)
  To: Vlad Yasevich, Neil Horman; +Cc: linux-sctp, netdev, linux-kernel, xufeng zhang

Hi Vlad and Neil,

I found a sk_ack_backlog wrap-around problem during handling received
COOKIE_ECHO.

Consider the scenario:
For a TCP-style socket, while processing the COOKIE_ECHO chunk in
sctp_sf_do_5_1D_ce(),
after it has passed a series of sanity check, a new association would
be created in
sctp_unpack_cookie(), but afterwards, some processing maybe failed,
and sctp_association_free()
will be called to free the previously allocated association, in
sctp_association_free(),
sk_ack_backlog value is decremented for this socket, since the initial
value for sk_ack_backlog is 0,
after the decrement, it will be 65535, a wrap-around problem happens,
and if we want to establish
new associations afterward in the same socket, ABORT would be
triggered since sctp deem the
accept queue as full.

Do you have any idea to fix such kind of issue?

Thanks a lot!
Xufeng

^ permalink raw reply	[flat|nested] 4+ messages in thread

* sctp bug: sk_ack_backlog wrap-around problem
@ 2014-06-10  6:27 ` Xufeng Zhang
  0 siblings, 0 replies; 4+ messages in thread
From: Xufeng Zhang @ 2014-06-10  6:27 UTC (permalink / raw)
  To: Vlad Yasevich, Neil Horman; +Cc: linux-sctp, netdev, linux-kernel, xufeng zhang

Hi Vlad and Neil,

I found a sk_ack_backlog wrap-around problem during handling received
COOKIE_ECHO.

Consider the scenario:
For a TCP-style socket, while processing the COOKIE_ECHO chunk in
sctp_sf_do_5_1D_ce(),
after it has passed a series of sanity check, a new association would
be created in
sctp_unpack_cookie(), but afterwards, some processing maybe failed,
and sctp_association_free()
will be called to free the previously allocated association, in
sctp_association_free(),
sk_ack_backlog value is decremented for this socket, since the initial
value for sk_ack_backlog is 0,
after the decrement, it will be 65535, a wrap-around problem happens,
and if we want to establish
new associations afterward in the same socket, ABORT would be
triggered since sctp deem the
accept queue as full.

Do you have any idea to fix such kind of issue?

Thanks a lot!
Xufeng

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: sctp bug: sk_ack_backlog wrap-around problem
  2014-06-10  6:27 ` Xufeng Zhang
@ 2014-06-10 11:33   ` Neil Horman
  -1 siblings, 0 replies; 4+ messages in thread
From: Neil Horman @ 2014-06-10 11:33 UTC (permalink / raw)
  To: Xufeng Zhang
  Cc: Vlad Yasevich, linux-sctp, netdev, linux-kernel, xufeng zhang

On Tue, Jun 10, 2014 at 02:27:07PM +0800, Xufeng Zhang wrote:
> Hi Vlad and Neil,
> 
> I found a sk_ack_backlog wrap-around problem during handling received
> COOKIE_ECHO.
> 
> Consider the scenario:
> For a TCP-style socket, while processing the COOKIE_ECHO chunk in
> sctp_sf_do_5_1D_ce(),
> after it has passed a series of sanity check, a new association would
> be created in
> sctp_unpack_cookie(), but afterwards, some processing maybe failed,
> and sctp_association_free()
> will be called to free the previously allocated association, in
> sctp_association_free(),
> sk_ack_backlog value is decremented for this socket, since the initial
> value for sk_ack_backlog is 0,
> after the decrement, it will be 65535, a wrap-around problem happens,
> and if we want to establish
> new associations afterward in the same socket, ABORT would be
> triggered since sctp deem the
> accept queue as full.
> 
> Do you have any idea to fix such kind of issue?
> 

first thought would be to traverse the list of associations on the endpoint in
sctp_association_free if its a tcp style socket, and then only decrement the
backlog if we find the association being freed on the list.  By doing that we
can be confident that we've increased the backlog via sctp_endpoint_add_asoc.

Best
Neil

> Thanks a lot!
> Xufeng
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: sctp bug: sk_ack_backlog wrap-around problem
@ 2014-06-10 11:33   ` Neil Horman
  0 siblings, 0 replies; 4+ messages in thread
From: Neil Horman @ 2014-06-10 11:33 UTC (permalink / raw)
  To: Xufeng Zhang
  Cc: Vlad Yasevich, linux-sctp, netdev, linux-kernel, xufeng zhang

On Tue, Jun 10, 2014 at 02:27:07PM +0800, Xufeng Zhang wrote:
> Hi Vlad and Neil,
> 
> I found a sk_ack_backlog wrap-around problem during handling received
> COOKIE_ECHO.
> 
> Consider the scenario:
> For a TCP-style socket, while processing the COOKIE_ECHO chunk in
> sctp_sf_do_5_1D_ce(),
> after it has passed a series of sanity check, a new association would
> be created in
> sctp_unpack_cookie(), but afterwards, some processing maybe failed,
> and sctp_association_free()
> will be called to free the previously allocated association, in
> sctp_association_free(),
> sk_ack_backlog value is decremented for this socket, since the initial
> value for sk_ack_backlog is 0,
> after the decrement, it will be 65535, a wrap-around problem happens,
> and if we want to establish
> new associations afterward in the same socket, ABORT would be
> triggered since sctp deem the
> accept queue as full.
> 
> Do you have any idea to fix such kind of issue?
> 

first thought would be to traverse the list of associations on the endpoint in
sctp_association_free if its a tcp style socket, and then only decrement the
backlog if we find the association being freed on the list.  By doing that we
can be confident that we've increased the backlog via sctp_endpoint_add_asoc.

Best
Neil

> Thanks a lot!
> Xufeng
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2014-06-10 11:33 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-06-10  6:27 sctp bug: sk_ack_backlog wrap-around problem Xufeng Zhang
2014-06-10  6:27 ` Xufeng Zhang
2014-06-10 11:33 ` Neil Horman
2014-06-10 11:33   ` Neil Horman

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.