From mboxrd@z Thu Jan 1 00:00:00 1970 From: William Allen Simpson Subject: [PATCH v1] TCPCT socket API update to draft -02 Date: Sat, 08 Jan 2011 17:07:58 -0500 Message-ID: <4D28E03E.50807@gmail.com> References: <4D28D8EF.5010008@gmail.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="------------060709020506050908080806" To: Linux Kernel Network Developers Return-path: Received: from mail-iy0-f174.google.com ([209.85.210.174]:55874 "EHLO mail-iy0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752037Ab1AHWIB (ORCPT ); Sat, 8 Jan 2011 17:08:01 -0500 Received: by iyi12 with SMTP id 12so16738047iyi.19 for ; Sat, 08 Jan 2011 14:08:01 -0800 (PST) In-Reply-To: <4D28D8EF.5010008@gmail.com> Sender: netdev-owner@vger.kernel.org List-ID: This is a multi-part message in MIME format. --------------060709020506050908080806 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Use most recently specified symbols of RFC-to-be-6013. Permit setting either cookie or s_data or both (sequentially). Allows different s_data limits for SYN and SYN_ACK. Split the data value from socket option header, saving more than 1K of stack space in the handler by copying long data values directly from user space into the kref block. Signed-off-by: William.Allen.Simpson@gmail.com --- include/linux/tcp.h | 35 ++++++++++++++++----- net/ipv4/tcp.c | 86 ++++++++++++++++++++++++++++++++++++-------------- 2 files changed, 89 insertions(+), 32 deletions(-) --------------060709020506050908080806 Content-Type: text/plain; x-mac-type="54455854"; x-mac-creator="0"; name="TCPCT+API-02v1+2.6.37.patch" Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="TCPCT+API-02v1+2.6.37.patch" diff --git a/include/linux/tcp.h b/include/linux/tcp.h index e64f4c6..ddfdd26 100644 --- a/include/linux/tcp.h +++ b/include/linux/tcp.h @@ -184,23 +184,42 @@ struct tcp_md5sig { #define TCP_COOKIE_MAX 16 /* 128-bits */ #define TCP_COOKIE_PAIR_SIZE (2*TCP_COOKIE_MAX) +/* Implementation-specific data limits */ +#define TCP_SYN_DATA_LIMIT (TCP_MSS_DEFAULT - sizeof(struct tcphdr)) +#define TCP_SYN_ACK_DATA_LIMIT (TCP_MSS_DESIRED) + /* Flags for both getsockopt and setsockopt */ -#define TCP_COOKIE_IN_ALWAYS (1 << 0) /* Discard SYN without cookie */ -#define TCP_COOKIE_OUT_NEVER (1 << 1) /* Prohibit outgoing cookies, +#define TCPCT_IN_ALWAYS (1 << 0) /* Discard SYN without cookie */ +#define TCPCT_OUT_NEVER (1 << 1) /* Prohibit outgoing cookies, * supercedes everything. */ - -/* Flags for getsockopt */ -#define TCP_S_DATA_IN (1 << 2) /* Was data received? */ -#define TCP_S_DATA_OUT (1 << 3) /* Was data sent? */ - -/* TCP_COOKIE_TRANSACTIONS data */ +#define TCPCT_IN_DATA (1 << 2) /* Was data received? */ +#define TCPCT_OUT_DATA (1 << 3) /* Was data sent? */ +/* reserved for future use: bits 4 .. 6 */ +#define TCPCT_EXTEND (1 << 7) + +/* Extended Option flags for both getsockopt and setsockopt */ +#define TCPCT_EXTEND_SIZE (0x7) /* mask */ +#define TCPCT_EXTEND_TS32 (0x1) /* default */ +#define TCPCT_EXTEND_TS64 (0x2) +#define TCPCT_EXTEND_TS128 (0x4) + +/* TCP_COOKIE_TRANSACTIONS socket option header */ struct tcp_cookie_transactions { __u16 tcpct_flags; /* see above */ - __u8 __tcpct_pad1; /* zero */ + __u8 tcpct_extended; __u8 tcpct_cookie_desired; /* bytes */ __u16 tcpct_s_data_desired; /* bytes of variable data */ __u16 tcpct_used; /* bytes in value */ - __u8 tcpct_value[TCP_MSS_DEFAULT]; +}; + +struct tcpct_full { + struct tcp_cookie_transactions soh; + __u8 tcpct_value[TCP_COOKIE_PAIR_SIZE]; +}; + +struct tcpct_half { + struct tcp_cookie_transactions soh; + __u8 tcpct_value[TCP_COOKIE_MAX]; }; #ifdef __KERNEL__ diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c index 6c11eec..28dd6a1 100644 --- a/net/ipv4/tcp.c +++ b/net/ipv4/tcp.c @@ -2143,16 +2143,13 @@ static int do_tcp_setsockopt(struct sock *sk, int level, case TCP_COOKIE_TRANSACTIONS: { struct tcp_cookie_transactions ctd; struct tcp_cookie_values *cvp = NULL; + int s_data_used = 0; if (sizeof(ctd) > optlen) return -EINVAL; if (copy_from_user(&ctd, optval, sizeof(ctd))) return -EFAULT; - if (ctd.tcpct_used > sizeof(ctd.tcpct_value) || - ctd.tcpct_s_data_desired > TCP_MSS_DESIRED) - return -EINVAL; - if (ctd.tcpct_cookie_desired == 0) { /* default to global value */ } else if ((0x1 & ctd.tcpct_cookie_desired) || @@ -2161,7 +2158,33 @@ static int do_tcp_setsockopt(struct sock *sk, int level, return -EINVAL; } - if (TCP_COOKIE_OUT_NEVER & ctd.tcpct_flags) { + if (ctd.tcpct_used > 0) { + if (ctd.tcpct_used + sizeof(ctd) > optlen) + return -EINVAL; + if (TCPCT_OUT_DATA & ctd.tcpct_flags) { + if (ctd.tcpct_used > TCP_SYN_ACK_DATA_LIMIT) + return -EINVAL; + if (ctd.tcpct_s_data_desired > 0) + return -EINVAL; + s_data_used = ctd.tcpct_used; + } else { + if (ctd.tcpct_used > TCP_COOKIE_PAIR_SIZE) + return -EINVAL; + if (ctd.tcpct_used != + ctd.tcpct_cookie_desired && + ctd.tcpct_used != + ctd.tcpct_cookie_desired * 2) + return -EINVAL; + if (ctd.tcpct_s_data_desired > + TCP_SYN_DATA_LIMIT) + return -EINVAL; + } + } else if (TCPCT_OUT_DATA & ctd.tcpct_flags) { + /* unexpected flag without s_data */ + return -EINVAL; + } + + if (TCPCT_OUT_NEVER & ctd.tcpct_flags) { /* Supercedes all other values */ lock_sock(sk); if (tp->cookie_values != NULL) { @@ -2177,12 +2200,12 @@ static int do_tcp_setsockopt(struct sock *sk, int level, /* Allocate ancillary memory before locking. */ - if (ctd.tcpct_used > 0 || + if (s_data_used > 0 || (tp->cookie_values == NULL && (sysctl_tcp_cookie_size > 0 || ctd.tcpct_cookie_desired > 0 || ctd.tcpct_s_data_desired > 0))) { - cvp = kzalloc(sizeof(*cvp) + ctd.tcpct_used, + cvp = kzalloc(sizeof(*cvp) + s_data_used, GFP_KERNEL); if (cvp == NULL) return -ENOMEM; @@ -2191,7 +2214,7 @@ static int do_tcp_setsockopt(struct sock *sk, int level, } lock_sock(sk); tp->rx_opt.cookie_in_always = - (TCP_COOKIE_IN_ALWAYS & ctd.tcpct_flags); + (TCPCT_IN_ALWAYS & ctd.tcpct_flags); tp->rx_opt.cookie_out_never = 0; /* false */ if (tp->cookie_values != NULL) { @@ -2210,11 +2233,26 @@ static int do_tcp_setsockopt(struct sock *sk, int level, if (cvp != NULL) { cvp->cookie_desired = ctd.tcpct_cookie_desired; - if (ctd.tcpct_used > 0) { - memcpy(cvp->s_data_payload, ctd.tcpct_value, - ctd.tcpct_used); - cvp->s_data_desired = ctd.tcpct_used; + if (s_data_used > 0) { + if (copy_from_user(cvp->s_data_payload, + optval + sizeof(ctd), + s_data_used)) { + kref_put(&cvp->kref, + tcp_cookie_values_release); + return -EFAULT; + } + cvp->s_data_desired = s_data_used; cvp->s_data_constant = 1; /* true */ + } else if (ctd.tcpct_used > 0) { + if (copy_from_user(cvp->cookie_pair, + optval + sizeof(ctd), + ctd.tcpct_used)) { + kref_put(&cvp->kref, + tcp_cookie_values_release); + return -EFAULT; + } + cvp->s_data_desired = ctd.tcpct_s_data_desired; + cvp->s_data_constant = 0; /* false */ } else { /* No constant payload data. */ cvp->s_data_desired = ctd.tcpct_s_data_desired; @@ -2574,7 +2612,7 @@ static int do_tcp_getsockopt(struct sock *sk, int level, return 0; case TCP_COOKIE_TRANSACTIONS: { - struct tcp_cookie_transactions ctd; + struct tcpct_full ctd; struct tcp_cookie_values *cvp = tp->cookie_values; if (get_user(len, optlen)) @@ -2583,23 +2621,23 @@ static int do_tcp_getsockopt(struct sock *sk, int level, return -EINVAL; memset(&ctd, 0, sizeof(ctd)); - ctd.tcpct_flags = (tp->rx_opt.cookie_in_always ? - TCP_COOKIE_IN_ALWAYS : 0) - | (tp->rx_opt.cookie_out_never ? - TCP_COOKIE_OUT_NEVER : 0); + ctd.soh.tcpct_flags = (tp->rx_opt.cookie_in_always ? + TCPCT_IN_ALWAYS : 0) + | (tp->rx_opt.cookie_out_never ? + TCPCT_OUT_NEVER : 0); if (cvp != NULL) { - ctd.tcpct_flags |= (cvp->s_data_in ? - TCP_S_DATA_IN : 0) - | (cvp->s_data_out ? - TCP_S_DATA_OUT : 0); + ctd.soh.tcpct_flags |= (cvp->s_data_in ? + TCPCT_IN_DATA : 0) + | (cvp->s_data_out ? + TCPCT_OUT_DATA : 0); - ctd.tcpct_cookie_desired = cvp->cookie_desired; - ctd.tcpct_s_data_desired = cvp->s_data_desired; + ctd.soh.tcpct_cookie_desired = cvp->cookie_desired; + ctd.soh.tcpct_s_data_desired = cvp->s_data_desired; memcpy(&ctd.tcpct_value[0], &cvp->cookie_pair[0], cvp->cookie_pair_size); - ctd.tcpct_used = cvp->cookie_pair_size; + ctd.soh.tcpct_used = cvp->cookie_pair_size; } if (put_user(sizeof(ctd), optlen)) -- 1.7.1 --------------060709020506050908080806--