>> >> Scenario: >> Client initiates 4 way handshake completes it, sends some user data, >> dies, reinitiates the 4 way handshake, completes sends some user data >> dies. Repeat forever. >> Server is running all through. >> > Are you forcing that connection failure? Or is it happening on its own? I'm > trying to figure out where the ICMP proto unreachable messsages are originating > from. Its sort of an odd ICMP code to hit. > Yeah I am forcing the connection failure by killing the sctp. The client is an eNB simulator (LTE base station) and has its own user space sctp stack which we are killing. >> In the attached pcap the third INIT gets an INIT ACK but the COOKIE >> ECHO doesn't get a corresponding COOKIE_ACK response from the server. >> The only thing I see here is that the initiate tag is the same between >> the second and third run. > That suggests to me that we're considering this an unexpected init, and > processing it as such in sctp_sf_do_unexpected_init, by creating a new > association and copying over the tags. Then we handle the cookie in > sctp_sf_do_5_2_4_dupcook and silently discard it for one of several reasons. > I'd suggest writing a stap script to probe the return and error value of > sctp_unpack_cookie to see how the last cookie is getting handled. Great thanks for the pointer, will try it out. > > Neil > > >> Please find the trace in the attached pcap. The post handshake >> exchange can be ignored for the most part. >> >> vagrant@magma-dev:~$ uname -a >> Linux magma-dev 4.9.0-0.bpo.1-amd64 #1 SMP Debian 4.9.2-2~bpo8+1 >> (2017-01-26) x86_64 GNU/Linux >> >> Thanks >> Amar > > -- To unsubscribe from this list: send the line "unsubscribe linux-sctp" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html