Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2761473ybl; Thu, 19 Dec 2019 20:48:20 -0800 (PST) X-Google-Smtp-Source: APXvYqwhTali98fuV+yxKytvq7ZeWtvIHcuLo3mukrEZnhsCAY67I3mucMSvWzOGtsYP1nfIyk5Q X-Received: by 2002:a9d:20e4:: with SMTP id x91mr12541816ota.335.1576817300286; Thu, 19 Dec 2019 20:48:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576817300; cv=none; d=google.com; s=arc-20160816; b=MqUK3+QAD20MiuRD3olXV44sh2554HTPK6IcWCWARXMdPt27v//KPqncdj+Il2wm0T gcpNyFIzr1ht1iOh3dST6WXqlhZDpvO8k7ZRH7gpTaa2UYSEaZjdkipEhywBOmHst66r OAOg2boPZ+cGx/PWoFdW9OA9ZdVbtf1Mvi7jpESPluNCcstdbl7OsdX+AsdGGnR624pP uinjVsaR/apqnakj0kopBJ6u7qT32B695WEpy3+RO1+rKLzAq0yuCxTaAnkU+RCItC81 PfhT3OpH8OaA73jsLmUBzQtErtXODaQd14TqvjKyTxsVqG8H6E8faG9h7OkYYZPyBnF0 cX0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=aN12zhf4mlcaV2E22of1kpbrgx4U0ucUVjsbOQtDUz4=; b=KG7L8nbG6NVe2aSFVTXgdZm7472FIjA4R1bSns5ABGpB/p58lWIg5556n5AvN1RePI lZPxxHkNhu6fGTRJa15OuPvXcXgtngWUs2NmZAUOB56y13ndTru10qUx7ul9JBXgCBmG xhO3n233yS8W3me+oOqQ+vDw7wadxGgcjlt2FxN9DVjr6k8oM4Bz/cg7jHZdbhR0xgY+ T4GGuYBghmBJsN8AClwKBAFLnHi23sBpNbL+tgHmlbqxQ3FaWnnI7VXY+q0TRI9S+zX5 0mH0uRu2zbwgtIexD5VdBxGknKV+WTvMf8O1xBChyiptRMluSFN8B/RGcQKFJrfbC6Fe VFtQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ET8Oh+6f; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m90si3541753otc.259.2019.12.19.20.48.09; Thu, 19 Dec 2019 20:48:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ET8Oh+6f; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727198AbfLTErY (ORCPT + 99 others); Thu, 19 Dec 2019 23:47:24 -0500 Received: from mail-pj1-f66.google.com ([209.85.216.66]:35208 "EHLO mail-pj1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727084AbfLTErX (ORCPT ); Thu, 19 Dec 2019 23:47:23 -0500 Received: by mail-pj1-f66.google.com with SMTP id s7so3576607pjc.0; Thu, 19 Dec 2019 20:47:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=aN12zhf4mlcaV2E22of1kpbrgx4U0ucUVjsbOQtDUz4=; b=ET8Oh+6fwGiwWp5+wSIhFpTodb5pMe8Q9Lu4rNBzrlmuWs/wkoIsN8eUlDqoIYfZBF Ydi9A8CEL6d4MDX3HTpwx0+raVMffPTPCAdm8b9SDzILaMsaygKkTMTDBNlpI+/Np7HR avi/LhBdaTZW8RBs38H8WKyi2K0wgnkWpUVZSBJMJvGU/Jjm6v2vMNZ8H8tsbkd99GSl s23Pv9rKa0/ZH3JSoef9xVsUBCxT1zp7POKFZXiHEx7aBkByeGJQkjgcpPSDzohzkmvk PVNtF+XPTdnGK2u7l1ldy1JbynIJMKduFYcPK4calelYcfzfdzHFQwO8dHnaWGCRXp+3 Un9g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=aN12zhf4mlcaV2E22of1kpbrgx4U0ucUVjsbOQtDUz4=; b=TGkhsxjg2R7BfekxCSjSFp4px+fUFbK/W9arGLnTuCtjFRtj4Mll2G6JjzWtPIe2yT v4hEGCNk+f0rAIbaAWNtD7jqRuBBeNVOma47wiN5/yFLFRRkitaRuwYwDtMhjXl8r41R eO/auCP60FvR+Z2WBL1oqc6wVbzoRxABMfZ5Qsz2hPUnLXsOmMk62OjbF5h5V4AKjOl2 eU6Z9MGasPCclgNo1IXiQX+4OR5TlDpNrwuW0yve2vo0BkcMlVcrTlvlK69qvY3VHpn/ NPWozj5cFD2guAZ31/8xT4Vp4ATNzT0evFOTOYVfeIzgKdQRNG69L+PlovAbxyFM+szG 9R5A== X-Gm-Message-State: APjAAAWGViT8KINQNAtJB7Rit+nS+tQlJY3yoGENxgg6MjykxavQbyD+ GwDAtDIkcDbVS7/PMvGQdzQ= X-Received: by 2002:a17:902:6906:: with SMTP id j6mr7693199plk.321.1576817242890; Thu, 19 Dec 2019 20:47:22 -0800 (PST) Received: from CV0038107N9.nsn-intra.net ([2408:84e4:400:2e74:469:cb33:67e2:581f]) by smtp.gmail.com with ESMTPSA id u26sm10089189pfn.46.2019.12.19.20.47.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 19 Dec 2019 20:47:22 -0800 (PST) From: Kevin Kou To: vyasevich@gmail.com Cc: nhorman@tuxdriver.com, marcelo.leitner@gmail.com, davem@davemloft.net, linux-sctp@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, qdkevin.kou@gmail.com Subject: [PATCH] sctp: do trace_sctp_probe after SACK validation and check Date: Fri, 20 Dec 2019 04:47:03 +0000 Message-Id: <20191220044703.88-1-qdkevin.kou@gmail.com> X-Mailer: git-send-email 2.23.0.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The function sctp_sf_eat_sack_6_2 now performs the Verification Tag validation, Chunk length validation, Bogu check, and also the detection of out-of-order SACK based on the RFC2960 Section 6.2 at the beginning, and finally performs the further processing of SACK. The trace_sctp_probe now triggered before the above necessary validation and check. This patch is to do the trace_sctp_probe after the necessary check and validation to SACK. Signed-off-by: Kevin Kou --- net/sctp/sm_statefuns.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/sctp/sm_statefuns.c b/net/sctp/sm_statefuns.c index 42558fa..b4a54df 100644 --- a/net/sctp/sm_statefuns.c +++ b/net/sctp/sm_statefuns.c @@ -3281,7 +3281,6 @@ enum sctp_disposition sctp_sf_eat_sack_6_2(struct net *net, struct sctp_sackhdr *sackh; __u32 ctsn; - trace_sctp_probe(ep, asoc, chunk); if (!sctp_vtag_verify(chunk, asoc)) return sctp_sf_pdiscard(net, ep, asoc, type, arg, commands); @@ -3319,6 +3318,8 @@ enum sctp_disposition sctp_sf_eat_sack_6_2(struct net *net, if (!TSN_lt(ctsn, asoc->next_tsn)) return sctp_sf_violation_ctsn(net, ep, asoc, type, arg, commands); + trace_sctp_probe(ep, asoc, chunk); + /* Return this SACK for further processing. */ sctp_add_cmd_sf(commands, SCTP_CMD_PROCESS_SACK, SCTP_CHUNK(chunk)); -- 1.8.3.1