From: Mat Martineau <mathew.j.martineau@linux.intel.com>
To: Paolo Abeni <pabeni@redhat.com>
Cc: mptcp@lists.linux.dev
Subject: Re: [PATCH v2 mptcp-net] mptcp: fix bad handling of 32 bit ack wrap-around.
Date: Wed, 16 Jun 2021 17:05:37 -0700 (PDT) [thread overview]
Message-ID: <99e6884d-9611-ddec-96da-511bf665cf15@linux.intel.com> (raw)
In-Reply-To: <140f8561f1ba22d171c1acc35812b571b63c8836.1623831447.git.pabeni@redhat.com>
On Wed, 16 Jun 2021, Paolo Abeni wrote:
> When receiving 32 bits DSS ack from the peer, the MPTCP need
> to expand them to 64 bits value. The current code is buggy
> WRT detecting 32 bits ack wrap-around: when the wrap-around
> happens the current unsigned 32 bit ack value is lower than
> the previous one.
>
> Additionally check for possible reverse wrap and make the helper
> visible, so that we could re-use it for the next patch.
>
> Closes: https://github.com/multipath-tcp/mptcp_net-next/issues/204
> Fixes: cc9d25669866 ("mptcp: update per unacked sequence on pkt reception")
> Signed-off-by: Paolo Abeni <pabeni@redhat.com>
> ---
> v1 -> v2:
> - fix comment typos
> - refactor to unify the code with the next patch.
> [yep I did just the opposite of my own plan ;)]
Ok with me :)
Looks good and tests work.
Reviewed-by: Mat Martineau <mathew.j.martineau@linux.intel.com>
> ---
> net/mptcp/options.c | 29 +++++++++++++++--------------
> net/mptcp/protocol.h | 8 ++++++++
> 2 files changed, 23 insertions(+), 14 deletions(-)
>
> diff --git a/net/mptcp/options.c b/net/mptcp/options.c
> index a05270996613..b5850afea343 100644
> --- a/net/mptcp/options.c
> +++ b/net/mptcp/options.c
> @@ -942,19 +942,20 @@ static bool check_fully_established(struct mptcp_sock *msk, struct sock *ssk,
> return false;
> }
>
> -static u64 expand_ack(u64 old_ack, u64 cur_ack, bool use_64bit)
> +u64 __mptcp_expand_seq(u64 old_seq, u64 cur_seq)
> {
> - u32 old_ack32, cur_ack32;
> -
> - if (use_64bit)
> - return cur_ack;
> -
> - old_ack32 = (u32)old_ack;
> - cur_ack32 = (u32)cur_ack;
> - cur_ack = (old_ack & GENMASK_ULL(63, 32)) + cur_ack32;
> - if (unlikely(before(cur_ack32, old_ack32)))
> - return cur_ack + (1LL << 32);
> - return cur_ack;
> + u32 old_seq32, cur_seq32;
> +
> + old_seq32 = (u32)old_seq;
> + cur_seq32 = (u32)cur_seq;
> + cur_seq = (old_seq & GENMASK_ULL(63, 32)) + cur_seq32;
> + if (unlikely(cur_seq32 < old_seq32 && before(old_seq32, cur_seq32)))
> + return cur_seq + (1LL << 32);
> +
> + /* reverse wrap could happen, too */
> + if (unlikely(cur_seq32 > old_seq32 && after(old_seq32, cur_seq32)))
> + return cur_seq - (1LL << 32);
> + return cur_seq;
> }
>
> static void ack_update_msk(struct mptcp_sock *msk,
> @@ -972,7 +973,7 @@ static void ack_update_msk(struct mptcp_sock *msk,
> * more dangerous than missing an ack
> */
> old_snd_una = msk->snd_una;
> - new_snd_una = expand_ack(old_snd_una, mp_opt->data_ack, mp_opt->ack64);
> + new_snd_una = mptcp_expand_seq(old_snd_una, mp_opt->data_ack, mp_opt->ack64);
>
> /* ACK for data not even sent yet? Ignore. */
> if (after64(new_snd_una, snd_nxt))
> @@ -1009,7 +1010,7 @@ bool mptcp_update_rcv_data_fin(struct mptcp_sock *msk, u64 data_fin_seq, bool us
> return false;
>
> WRITE_ONCE(msk->rcv_data_fin_seq,
> - expand_ack(READ_ONCE(msk->ack_seq), data_fin_seq, use_64bit));
> + mptcp_expand_seq(READ_ONCE(msk->ack_seq), data_fin_seq, use_64bit));
> WRITE_ONCE(msk->rcv_data_fin, 1);
>
> return true;
> diff --git a/net/mptcp/protocol.h b/net/mptcp/protocol.h
> index f4eaa5f57e3f..41f2957bf50c 100644
> --- a/net/mptcp/protocol.h
> +++ b/net/mptcp/protocol.h
> @@ -615,6 +615,14 @@ int mptcp_setsockopt(struct sock *sk, int level, int optname,
> int mptcp_getsockopt(struct sock *sk, int level, int optname,
> char __user *optval, int __user *option);
>
> +u64 __mptcp_expand_seq(u64 old_seq, u64 cur_seq);
> +static inline u64 mptcp_expand_seq(u64 old_seq, u64 cur_seq, bool use_64bit)
> +{
> + if (use_64bit)
> + return cur_seq;
> +
> + return __mptcp_expand_seq(old_seq, cur_seq);
> +}
> void __mptcp_check_push(struct sock *sk, struct sock *ssk);
> void __mptcp_data_acked(struct sock *sk);
> void __mptcp_error_report(struct sock *sk);
> --
> 2.26.3
>
>
>
--
Mat Martineau
Intel
next prev parent reply other threads:[~2021-06-17 0:05 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-06-16 8:19 [PATCH v2 mptcp-net] mptcp: fix bad handling of 32 bit ack wrap-around Paolo Abeni
2021-06-17 0:05 ` Mat Martineau [this message]
2021-06-17 13:22 ` Matthieu Baerts
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=99e6884d-9611-ddec-96da-511bf665cf15@linux.intel.com \
--to=mathew.j.martineau@linux.intel.com \
--cc=mptcp@lists.linux.dev \
--cc=pabeni@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).