mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-11 21:38:32 +08:00
mptcp: do not warn on bad input from the network
warn_bad_map() produces a kernel WARN on bad input coming
from the network. Use pr_debug() to avoid spamming the system
log.
Additionally, when the right bound check fails, warn_bad_map() reports
the wrong ssn value, let's fix it.
Fixes: 648ef4b886
("mptcp: Implement MPTCP receive path")
Closes: https://github.com/multipath-tcp/mptcp_net-next/issues/107
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Mat Martineau <mathew.j.martineau@linux.intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
99d1055ce2
commit
61e710227e
@ -784,9 +784,9 @@ static u64 expand_seq(u64 old_seq, u16 old_data_len, u64 seq)
|
||||
return seq | ((old_seq + old_data_len + 1) & GENMASK_ULL(63, 32));
|
||||
}
|
||||
|
||||
static void warn_bad_map(struct mptcp_subflow_context *subflow, u32 ssn)
|
||||
static void dbg_bad_map(struct mptcp_subflow_context *subflow, u32 ssn)
|
||||
{
|
||||
WARN_ONCE(1, "Bad mapping: ssn=%d map_seq=%d map_data_len=%d",
|
||||
pr_debug("Bad mapping: ssn=%d map_seq=%d map_data_len=%d",
|
||||
ssn, subflow->map_subflow_seq, subflow->map_data_len);
|
||||
}
|
||||
|
||||
@ -812,13 +812,13 @@ static bool validate_mapping(struct sock *ssk, struct sk_buff *skb)
|
||||
/* Mapping covers data later in the subflow stream,
|
||||
* currently unsupported.
|
||||
*/
|
||||
warn_bad_map(subflow, ssn);
|
||||
dbg_bad_map(subflow, ssn);
|
||||
return false;
|
||||
}
|
||||
if (unlikely(!before(ssn, subflow->map_subflow_seq +
|
||||
subflow->map_data_len))) {
|
||||
/* Mapping does covers past subflow data, invalid */
|
||||
warn_bad_map(subflow, ssn + skb->len);
|
||||
dbg_bad_map(subflow, ssn);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
|
Loading…
Reference in New Issue
Block a user