Re: [PATCH net v3] net: Update window_clamp if SOCK_RCVBUF is set
From: Eric Dumazet
Date: Mon Nov 09 2020 - 11:59:56 EST
On Mon, Nov 9, 2020 at 5:54 PM Mao Wenan <wenan.mao@xxxxxxxxxxxxxxxxx> wrote:
>
> When net.ipv4.tcp_syncookies=1 and syn flood is happened,
> cookie_v4_check or cookie_v6_check tries to redo what
> tcp_v4_send_synack or tcp_v6_send_synack did,
> rsk_window_clamp will be changed if SOCK_RCVBUF is set,
> which will make rcv_wscale is different, the client
> still operates with initial window scale and can overshot
> granted window, the client use the initial scale but local
> server use new scale to advertise window value, and session
> work abnormally.
>
> Fixes: e88c64f0a425 ("tcp: allow effective reduction of TCP's
> rcv-buffer via setsockopt")
Please put this tag in a single line (no line wrap)
And do not add an empty line after it.
The Fixes: tag is part of the official tags, all grouped together.
>
> Signed-off-by: Mao Wenan <wenan.mao@xxxxxxxxxxxxxxxxx>
> ---
> v3: add local variable full_space, add fixes tag.
> v2: fix for ipv6.
> net/ipv4/syncookies.c | 7 ++++++-
> net/ipv6/syncookies.c | 8 +++++++-
> 2 files changed, 13 insertions(+), 2 deletions(-)
>
> diff --git a/net/ipv4/syncookies.c b/net/ipv4/syncookies.c
> index 6ac473b..eea4698 100644
> --- a/net/ipv4/syncookies.c
> +++ b/net/ipv4/syncookies.c
> @@ -327,6 +327,7 @@ struct sock *cookie_v4_check(struct sock *sk, struct sk_buff *skb)
> struct inet_request_sock *ireq;
> struct tcp_request_sock *treq;
> struct tcp_sock *tp = tcp_sk(sk);
> + int full_space = tcp_full_space(sk);
Please delay the actual call to tcp_full_space() until we need it.
If a packet does not validate the cookie, no need to init @full_space.
> const struct tcphdr *th = tcp_hdr(skb);
> __u32 cookie = ntohl(th->ack_seq) - 1;
> struct sock *ret = sk;
> @@ -427,8 +428,12 @@ struct sock *cookie_v4_check(struct sock *sk, struct sk_buff *skb)
>
> /* Try to redo what tcp_v4_send_synack did. */
> req->rsk_window_clamp = tp->window_clamp ? :dst_metric(&rt->dst, RTAX_WINDOW);
> + /* limit the window selection if the user enforce a smaller rx buffer */
eg:
full_space = tcp_full_space(sk);
> + if (sk->sk_userlocks & SOCK_RCVBUF_LOCK &&
> + (req->rsk_window_clamp > full_space || req->rsk_window_clamp == 0))
> + req->rsk_window_clamp = full_space;
>
> - tcp_select_initial_window(sk, tcp_full_space(sk), req->mss,
> + tcp_select_initial_window(sk, full_space, req->mss,
> &req->rsk_rcv_wnd, &req->rsk_window_clamp,
> ireq->wscale_ok, &rcv_wscale,
> dst_metric(&rt->dst, RTAX_INITRWND));
> diff --git a/net/ipv6/syncookies.c b/net/ipv6/syncookies.c
> index e796a64..5b09bb6 100644
> --- a/net/ipv6/syncookies.c
> +++ b/net/ipv6/syncookies.c
> @@ -132,6 +132,7 @@ struct sock *cookie_v6_check(struct sock *sk, struct sk_buff *skb)
> struct tcp_request_sock *treq;
> struct ipv6_pinfo *np = inet6_sk(sk);
> struct tcp_sock *tp = tcp_sk(sk);
> + int full_space = tcp_full_space(sk);
Same remark here.
> const struct tcphdr *th = tcp_hdr(skb);
> __u32 cookie = ntohl(th->ack_seq) - 1;
> struct sock *ret = sk;
> @@ -241,7 +242,12 @@ struct sock *cookie_v6_check(struct sock *sk, struct sk_buff *skb)
> }
>
> req->rsk_window_clamp = tp->window_clamp ? :dst_metric(dst, RTAX_WINDOW);
> - tcp_select_initial_window(sk, tcp_full_space(sk), req->mss,
> + /* limit the window selection if the user enforce a smaller rx buffer */
> + if (sk->sk_userlocks & SOCK_RCVBUF_LOCK &&
> + (req->rsk_window_clamp > full_space || req->rsk_window_clamp == 0))
> + req->rsk_window_clamp = full_space;
> +
> + tcp_select_initial_window(sk, full_space, req->mss,
> &req->rsk_rcv_wnd, &req->rsk_window_clamp,
> ireq->wscale_ok, &rcv_wscale,
> dst_metric(dst, RTAX_INITRWND));
> --
> 1.8.3.1
>
Thanks !