sctp: improve consistency in handling chunks with wrong size

Just skip the chunk, if no other handling is required by the
specification.
This commit is contained in:
Michael Tuexen 2021-04-28 18:09:11 +02:00
parent 420d30f5bd
commit 9de7354bb8

View File

@ -4294,6 +4294,7 @@ sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
int ret; int ret;
int abort_no_unlock = 0; int abort_no_unlock = 0;
int ecne_seen = 0; int ecne_seen = 0;
int abort_flag;
/* /*
* How big should this be, and should it be alloc'd? Lets try the * How big should this be, and should it be alloc'd? Lets try the
@ -4773,8 +4774,7 @@ process_control_chunks:
SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_HEARTBEAT_ACK\n"); SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_HEARTBEAT_ACK\n");
if ((stcb == NULL) || (chk_length != sizeof(struct sctp_heartbeat_chunk))) { if ((stcb == NULL) || (chk_length != sizeof(struct sctp_heartbeat_chunk))) {
/* Its not ours */ /* Its not ours */
*offset = length; break;
return (stcb);
} }
SCTP_STAT_INCR(sctps_recvheartbeatack); SCTP_STAT_INCR(sctps_recvheartbeatack);
if ((netp != NULL) && (*netp != NULL)) { if ((netp != NULL) && (*netp != NULL)) {
@ -4800,12 +4800,10 @@ process_control_chunks:
SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_SHUTDOWN, stcb %p\n", SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_SHUTDOWN, stcb %p\n",
(void *)stcb); (void *)stcb);
if ((stcb == NULL) || (chk_length != sizeof(struct sctp_shutdown_chunk))) { if ((stcb == NULL) || (chk_length != sizeof(struct sctp_shutdown_chunk))) {
*offset = length; break;
return (stcb);
} }
if ((netp != NULL) && (*netp != NULL)) { if ((netp != NULL) && (*netp != NULL)) {
int abort_flag = 0; abort_flag = 0;
sctp_handle_shutdown((struct sctp_shutdown_chunk *)ch, sctp_handle_shutdown((struct sctp_shutdown_chunk *)ch,
stcb, *netp, &abort_flag); stcb, *netp, &abort_flag);
if (abort_flag) { if (abort_flag) {
@ -4956,7 +4954,7 @@ process_control_chunks:
case SCTP_COOKIE_ACK: case SCTP_COOKIE_ACK:
SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_COOKIE_ACK, stcb %p\n", (void *)stcb); SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_COOKIE_ACK, stcb %p\n", (void *)stcb);
if ((stcb == NULL) || chk_length != sizeof(struct sctp_cookie_ack_chunk)) { if ((stcb == NULL) || chk_length != sizeof(struct sctp_cookie_ack_chunk)) {
return (stcb); break;
} }
if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) { if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) {
/* We are not interested anymore */ /* We are not interested anymore */
@ -4975,26 +4973,29 @@ process_control_chunks:
break; break;
case SCTP_ECN_ECHO: case SCTP_ECN_ECHO:
SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_ECN_ECHO\n"); SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_ECN_ECHO\n");
if ((stcb == NULL) || (chk_length != sizeof(struct sctp_ecne_chunk))) { if (stcb == NULL) {
/* Its not ours */ break;
*offset = length;
return (stcb);
} }
if (stcb->asoc.ecn_supported == 0) { if (stcb->asoc.ecn_supported == 0) {
goto unknown_chunk; goto unknown_chunk;
} }
if (chk_length != sizeof(struct sctp_ecne_chunk)) {
break;
}
sctp_handle_ecn_echo((struct sctp_ecne_chunk *)ch, stcb); sctp_handle_ecn_echo((struct sctp_ecne_chunk *)ch, stcb);
ecne_seen = 1; ecne_seen = 1;
break; break;
case SCTP_ECN_CWR: case SCTP_ECN_CWR:
SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_ECN_CWR\n"); SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_ECN_CWR\n");
if ((stcb == NULL) || (chk_length != sizeof(struct sctp_cwr_chunk))) { if (stcb == NULL) {
*offset = length; break;
return (stcb);
} }
if (stcb->asoc.ecn_supported == 0) { if (stcb->asoc.ecn_supported == 0) {
goto unknown_chunk; goto unknown_chunk;
} }
if (chk_length != sizeof(struct sctp_cwr_chunk)) {
break;
}
sctp_handle_ecn_cwr((struct sctp_cwr_chunk *)ch, stcb, *netp); sctp_handle_ecn_cwr((struct sctp_cwr_chunk *)ch, stcb, *netp);
break; break;
case SCTP_SHUTDOWN_COMPLETE: case SCTP_SHUTDOWN_COMPLETE:
@ -5025,15 +5026,16 @@ process_control_chunks:
break; break;
case SCTP_ASCONF_ACK: case SCTP_ASCONF_ACK:
SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_ASCONF_ACK\n"); SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_ASCONF_ACK\n");
if (chk_length < sizeof(struct sctp_asconf_ack_chunk)) { if (stcb == NULL) {
/* Its not ours */ break;
*offset = length;
return (stcb);
} }
if ((stcb != NULL) && (netp != NULL) && (*netp != NULL)) { if (stcb->asoc.asconf_supported == 0) {
if (stcb->asoc.asconf_supported == 0) { goto unknown_chunk;
goto unknown_chunk; }
} if (chk_length < sizeof(struct sctp_asconf_ack_chunk)) {
break;
}
if ((netp != NULL) && (*netp != NULL)) {
/* He's alive so give him credit */ /* He's alive so give him credit */
if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_THRESHOLD_LOGGING) { if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_THRESHOLD_LOGGING) {
sctp_misc_ints(SCTP_THRESHOLD_CLEAR, sctp_misc_ints(SCTP_THRESHOLD_CLEAR,
@ -5053,61 +5055,58 @@ process_control_chunks:
case SCTP_IFORWARD_CUM_TSN: case SCTP_IFORWARD_CUM_TSN:
SCTPDBG(SCTP_DEBUG_INPUT3, "%s\n", SCTPDBG(SCTP_DEBUG_INPUT3, "%s\n",
ch->chunk_type == SCTP_FORWARD_CUM_TSN ? "FORWARD_TSN" : "I_FORWARD_TSN"); ch->chunk_type == SCTP_FORWARD_CUM_TSN ? "FORWARD_TSN" : "I_FORWARD_TSN");
if (chk_length < sizeof(struct sctp_forward_tsn_chunk)) { if (stcb == NULL) {
/* Its not ours */ break;
*offset = length;
return (stcb);
} }
if (stcb->asoc.prsctp_supported == 0) {
if (stcb != NULL) { goto unknown_chunk;
int abort_flag = 0; }
if (chk_length < sizeof(struct sctp_forward_tsn_chunk)) {
if (stcb->asoc.prsctp_supported == 0) { break;
goto unknown_chunk; }
} if (((stcb->asoc.idata_supported == 1) && (ch->chunk_type == SCTP_FORWARD_CUM_TSN)) ||
if (((stcb->asoc.idata_supported == 1) && (ch->chunk_type == SCTP_FORWARD_CUM_TSN)) || ((stcb->asoc.idata_supported == 0) && (ch->chunk_type == SCTP_IFORWARD_CUM_TSN))) {
((stcb->asoc.idata_supported == 0) && (ch->chunk_type == SCTP_IFORWARD_CUM_TSN))) { if (ch->chunk_type == SCTP_FORWARD_CUM_TSN) {
if (ch->chunk_type == SCTP_FORWARD_CUM_TSN) { SCTP_SNPRINTF(msg, sizeof(msg), "%s", "FORWARD-TSN chunk received when I-FORWARD-TSN was negotiated");
SCTP_SNPRINTF(msg, sizeof(msg), "%s", "FORWARD-TSN chunk received when I-FORWARD-TSN was negotiated"); } else {
} else { SCTP_SNPRINTF(msg, sizeof(msg), "%s", "I-FORWARD-TSN chunk received when FORWARD-TSN was negotiated");
SCTP_SNPRINTF(msg, sizeof(msg), "%s", "I-FORWARD-TSN chunk received when FORWARD-TSN was negotiated");
}
op_err = sctp_generate_cause(SCTP_CAUSE_PROTOCOL_VIOLATION, msg);
sctp_abort_an_association(inp, stcb, op_err, SCTP_SO_NOT_LOCKED);
*offset = length;
return (NULL);
}
*fwd_tsn_seen = 1;
if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) {
/* We are not interested anymore */
(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC,
SCTP_FROM_SCTP_INPUT + SCTP_LOC_31);
*offset = length;
return (NULL);
}
/*
* For sending a SACK this looks like DATA
* chunks.
*/
stcb->asoc.last_data_chunk_from = stcb->asoc.last_control_chunk_from;
sctp_handle_forward_tsn(stcb,
(struct sctp_forward_tsn_chunk *)ch, &abort_flag, m, *offset);
if (abort_flag) {
*offset = length;
return (NULL);
} }
op_err = sctp_generate_cause(SCTP_CAUSE_PROTOCOL_VIOLATION, msg);
sctp_abort_an_association(inp, stcb, op_err, SCTP_SO_NOT_LOCKED);
*offset = length;
return (NULL);
}
*fwd_tsn_seen = 1;
if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) {
/* We are not interested anymore */
(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC,
SCTP_FROM_SCTP_INPUT + SCTP_LOC_31);
*offset = length;
return (NULL);
}
/*
* For sending a SACK this looks like DATA chunks.
*/
stcb->asoc.last_data_chunk_from = stcb->asoc.last_control_chunk_from;
abort_flag = 0;
sctp_handle_forward_tsn(stcb,
(struct sctp_forward_tsn_chunk *)ch, &abort_flag, m, *offset);
if (abort_flag) {
*offset = length;
return (NULL);
} }
break; break;
case SCTP_STREAM_RESET: case SCTP_STREAM_RESET:
SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_STREAM_RESET\n"); SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_STREAM_RESET\n");
if ((stcb == NULL) || (chk_length < sizeof(struct sctp_stream_reset_tsn_req))) { if (stcb == NULL) {
/* Its not ours */ break;
*offset = length;
return (stcb);
} }
if (stcb->asoc.reconfig_supported == 0) { if (stcb->asoc.reconfig_supported == 0) {
goto unknown_chunk; goto unknown_chunk;
} }
if (chk_length < sizeof(struct sctp_stream_reset_tsn_req)) {
break;
}
if (sctp_handle_stream_reset(stcb, m, *offset, ch)) { if (sctp_handle_stream_reset(stcb, m, *offset, ch)) {
/* stop processing */ /* stop processing */
*offset = length; *offset = length;
@ -5116,17 +5115,16 @@ process_control_chunks:
break; break;
case SCTP_PACKET_DROPPED: case SCTP_PACKET_DROPPED:
SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_PACKET_DROPPED\n"); SCTPDBG(SCTP_DEBUG_INPUT3, "SCTP_PACKET_DROPPED\n");
/* re-get it all please */ if (stcb == NULL) {
if (chk_length < sizeof(struct sctp_pktdrop_chunk)) { break;
/* Its not ours */
*offset = length;
return (stcb);
} }
if (stcb->asoc.pktdrop_supported == 0) {
if ((stcb != NULL) && (netp != NULL) && (*netp != NULL)) { goto unknown_chunk;
if (stcb->asoc.pktdrop_supported == 0) { }
goto unknown_chunk; if (chk_length < sizeof(struct sctp_pktdrop_chunk)) {
} break;
}
if ((netp != NULL) && (*netp != NULL)) {
sctp_handle_packet_dropped((struct sctp_pktdrop_chunk *)ch, sctp_handle_packet_dropped((struct sctp_pktdrop_chunk *)ch,
stcb, *netp, stcb, *netp,
min(chk_length, contiguous)); min(chk_length, contiguous));
@ -5142,7 +5140,7 @@ process_control_chunks:
auth_skipped = 1; auth_skipped = 1;
} }
/* skip this chunk (temporarily) */ /* skip this chunk (temporarily) */
goto next_chunk; break;
} }
if (stcb->asoc.auth_supported == 0) { if (stcb->asoc.auth_supported == 0) {
goto unknown_chunk; goto unknown_chunk;
@ -5156,7 +5154,7 @@ process_control_chunks:
} }
if (got_auth == 1) { if (got_auth == 1) {
/* skip this chunk... it's already auth'd */ /* skip this chunk... it's already auth'd */
goto next_chunk; break;
} }
got_auth = 1; got_auth = 1;
if (sctp_handle_auth(stcb, (struct sctp_auth_chunk *)ch, m, *offset)) { if (sctp_handle_auth(stcb, (struct sctp_auth_chunk *)ch, m, *offset)) {