^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) // SPDX-License-Identifier: GPL-2.0-or-later
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * Syncookies implementation for the Linux kernel
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * Copyright (C) 1997 Andi Kleen
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) * Based on ideas by D.J.Bernstein and Eric Schenk.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) #include <linux/tcp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include <linux/slab.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) #include <linux/random.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) #include <linux/siphash.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) #include <linux/kernel.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) #include <linux/export.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) #include <net/secure_seq.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #include <net/tcp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) #include <net/route.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) static siphash_key_t syncookie_secret[2] __read_mostly;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) #define COOKIEBITS 24 /* Upper bits store count */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) #define COOKIEMASK (((__u32)1 << COOKIEBITS) - 1)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) /* TCP Timestamp: 6 lowest bits of timestamp sent in the cookie SYN-ACK
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) * stores TCP options:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) * MSB LSB
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) * | 31 ... 6 | 5 | 4 | 3 2 1 0 |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) * | Timestamp | ECN | SACK | WScale |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) * When we receive a valid cookie-ACK, we look at the echoed tsval (if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) * any) to figure out which TCP options we should use for the rebuilt
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) * connection.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) * A WScale setting of '0xf' (which is an invalid scaling value)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) * means that original syn did not include the TCP window scaling option.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) #define TS_OPT_WSCALE_MASK 0xf
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) #define TS_OPT_SACK BIT(4)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) #define TS_OPT_ECN BIT(5)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) /* There is no TS_OPT_TIMESTAMP:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) * if ACK contains timestamp option, we already know it was
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) * requested/supported by the syn/synack exchange.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) #define TSBITS 6
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) #define TSMASK (((__u32)1 << TSBITS) - 1)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) static u32 cookie_hash(__be32 saddr, __be32 daddr, __be16 sport, __be16 dport,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) u32 count, int c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) net_get_random_once(syncookie_secret, sizeof(syncookie_secret));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) return siphash_4u32((__force u32)saddr, (__force u32)daddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) (__force u32)sport << 16 | (__force u32)dport,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) count, &syncookie_secret[c]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) * when syncookies are in effect and tcp timestamps are enabled we encode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) * tcp options in the lower bits of the timestamp value that will be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) * sent in the syn-ack.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) * Since subsequent timestamps use the normal tcp_time_stamp value, we
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) * must make sure that the resulting initial timestamp is <= tcp_time_stamp.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) u64 cookie_init_timestamp(struct request_sock *req, u64 now)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) struct inet_request_sock *ireq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) u32 ts, ts_now = tcp_ns_to_ts(now);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) u32 options = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) ireq = inet_rsk(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) options = ireq->wscale_ok ? ireq->snd_wscale : TS_OPT_WSCALE_MASK;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) if (ireq->sack_ok)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) options |= TS_OPT_SACK;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) if (ireq->ecn_ok)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) options |= TS_OPT_ECN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) ts = ts_now & ~TSMASK;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) ts |= options;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) if (ts > ts_now) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) ts >>= TSBITS;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83) ts--;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84) ts <<= TSBITS;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) ts |= options;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) return (u64)ts * (NSEC_PER_SEC / TCP_TS_HZ);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91) static __u32 secure_tcp_syn_cookie(__be32 saddr, __be32 daddr, __be16 sport,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) __be16 dport, __u32 sseq, __u32 data)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95) * Compute the secure sequence number.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96) * The output should be:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97) * HASH(sec1,saddr,sport,daddr,dport,sec1) + sseq + (count * 2^24)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98) * + (HASH(sec2,saddr,sport,daddr,dport,count,sec2) % 2^24).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) * Where sseq is their sequence number and count increases every
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) * minute by 1.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) * As an extra hack, we add a small "data" value that encodes the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) * MSS into the second hash value.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) u32 count = tcp_cookie_time();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) return (cookie_hash(saddr, daddr, sport, dport, 0, 0) +
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) sseq + (count << COOKIEBITS) +
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) ((cookie_hash(saddr, daddr, sport, dport, count, 1) + data)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) & COOKIEMASK));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) * This retrieves the small "data" value from the syncookie.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) * If the syncookie is bad, the data returned will be out of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) * range. This must be checked by the caller.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) * The count value used to generate the cookie must be less than
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) * MAX_SYNCOOKIE_AGE minutes in the past.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) * The return value (__u32)-1 if this test fails.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) static __u32 check_tcp_syn_cookie(__u32 cookie, __be32 saddr, __be32 daddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) __be16 sport, __be16 dport, __u32 sseq)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) u32 diff, count = tcp_cookie_time();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) /* Strip away the layers from the cookie */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) cookie -= cookie_hash(saddr, daddr, sport, dport, 0, 0) + sseq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) /* Cookie is now reduced to (count * 2^24) ^ (hash % 2^24) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) diff = (count - (cookie >> COOKIEBITS)) & ((__u32) -1 >> COOKIEBITS);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) if (diff >= MAX_SYNCOOKIE_AGE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) return (__u32)-1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) return (cookie -
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) cookie_hash(saddr, daddr, sport, dport, count - diff, 1))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) & COOKIEMASK; /* Leaving the data behind */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) * MSS Values are chosen based on the 2011 paper
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) * 'An Analysis of TCP Maximum Segement Sizes' by S. Alcock and R. Nelson.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) * Values ..
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) * .. lower than 536 are rare (< 0.2%)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) * .. between 537 and 1299 account for less than < 1.5% of observed values
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) * .. in the 1300-1349 range account for about 15 to 20% of observed mss values
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) * .. exceeding 1460 are very rare (< 0.04%)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) * 1460 is the single most frequently announced mss value (30 to 46% depending
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) * on monitor location). Table must be sorted.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) static __u16 const msstab[] = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) 536,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) 1300,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) 1440, /* 1440, 1452: PPPoE */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) 1460,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) * Generate a syncookie. mssp points to the mss, which is returned
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) * rounded down to the value encoded in the cookie.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) u32 __cookie_v4_init_sequence(const struct iphdr *iph, const struct tcphdr *th,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) u16 *mssp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) int mssind;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) const __u16 mss = *mssp;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) for (mssind = ARRAY_SIZE(msstab) - 1; mssind ; mssind--)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) if (mss >= msstab[mssind])
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) *mssp = msstab[mssind];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) return secure_tcp_syn_cookie(iph->saddr, iph->daddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) th->source, th->dest, ntohl(th->seq),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) mssind);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) EXPORT_SYMBOL_GPL(__cookie_v4_init_sequence);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) __u32 cookie_v4_init_sequence(const struct sk_buff *skb, __u16 *mssp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) const struct iphdr *iph = ip_hdr(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) const struct tcphdr *th = tcp_hdr(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) return __cookie_v4_init_sequence(iph, th, mssp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) * Check if a ack sequence number is a valid syncookie.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) * Return the decoded mss if it is, or 0 if not.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) int __cookie_v4_check(const struct iphdr *iph, const struct tcphdr *th,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) u32 cookie)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) __u32 seq = ntohl(th->seq) - 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) __u32 mssind = check_tcp_syn_cookie(cookie, iph->saddr, iph->daddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) th->source, th->dest, seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) return mssind < ARRAY_SIZE(msstab) ? msstab[mssind] : 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) EXPORT_SYMBOL_GPL(__cookie_v4_check);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) struct sock *tcp_get_cookie_sock(struct sock *sk, struct sk_buff *skb,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) struct request_sock *req,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) struct dst_entry *dst, u32 tsoff)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) struct inet_connection_sock *icsk = inet_csk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) struct sock *child;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) bool own_req;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) child = icsk->icsk_af_ops->syn_recv_sock(sk, skb, req, dst,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) NULL, &own_req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) if (child) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) refcount_set(&req->rsk_refcnt, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) tcp_sk(child)->tsoffset = tsoff;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214) sock_rps_save_rxhash(child, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216) if (rsk_drop_req(req)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 217) reqsk_put(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 218) return child;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 219) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 220)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 221) if (inet_csk_reqsk_queue_add(sk, req, child))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 222) return child;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 223)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 224) bh_unlock_sock(child);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 225) sock_put(child);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 226) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 227) __reqsk_free(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 228)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 229) return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 230) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 231) EXPORT_SYMBOL(tcp_get_cookie_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 232)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 233) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 234) * when syncookies are in effect and tcp timestamps are enabled we stored
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 235) * additional tcp options in the timestamp.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 236) * This extracts these options from the timestamp echo.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 237) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 238) * return false if we decode a tcp option that is disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 239) * on the host.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 240) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 241) bool cookie_timestamp_decode(const struct net *net,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 242) struct tcp_options_received *tcp_opt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 243) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 244) /* echoed timestamp, lowest bits contain options */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 245) u32 options = tcp_opt->rcv_tsecr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 246)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 247) if (!tcp_opt->saw_tstamp) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 248) tcp_clear_options(tcp_opt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 249) return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 250) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 251)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 252) if (!net->ipv4.sysctl_tcp_timestamps)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 253) return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 254)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 255) tcp_opt->sack_ok = (options & TS_OPT_SACK) ? TCP_SACK_SEEN : 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 256)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 257) if (tcp_opt->sack_ok && !net->ipv4.sysctl_tcp_sack)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 258) return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 259)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 260) if ((options & TS_OPT_WSCALE_MASK) == TS_OPT_WSCALE_MASK)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 261) return true; /* no window scaling */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 262)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 263) tcp_opt->wscale_ok = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 264) tcp_opt->snd_wscale = options & TS_OPT_WSCALE_MASK;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 265)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 266) return net->ipv4.sysctl_tcp_window_scaling != 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 267) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 268) EXPORT_SYMBOL(cookie_timestamp_decode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 269)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 270) bool cookie_ecn_ok(const struct tcp_options_received *tcp_opt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 271) const struct net *net, const struct dst_entry *dst)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 272) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 273) bool ecn_ok = tcp_opt->rcv_tsecr & TS_OPT_ECN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 274)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 275) if (!ecn_ok)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 276) return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 277)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 278) if (net->ipv4.sysctl_tcp_ecn)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 279) return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 280)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 281) return dst_feature(dst, RTAX_FEATURE_ECN);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 282) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 283) EXPORT_SYMBOL(cookie_ecn_ok);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 284)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 285) struct request_sock *cookie_tcp_reqsk_alloc(const struct request_sock_ops *ops,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 286) struct sock *sk,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 287) struct sk_buff *skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 288) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 289) struct tcp_request_sock *treq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 290) struct request_sock *req;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 291)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 292) #ifdef CONFIG_MPTCP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 293) if (sk_is_mptcp(sk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 294) ops = &mptcp_subflow_request_sock_ops;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 295) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 296)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 297) req = inet_reqsk_alloc(ops, sk, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 298) if (!req)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 299) return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 300)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 301) treq = tcp_rsk(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 302) treq->syn_tos = TCP_SKB_CB(skb)->ip_dsfield;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 303) #if IS_ENABLED(CONFIG_MPTCP)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 304) treq->is_mptcp = sk_is_mptcp(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 305) if (treq->is_mptcp) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 306) int err = mptcp_subflow_init_cookie_req(req, sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 307)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 308) if (err) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 309) reqsk_free(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 310) return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 311) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 312) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 313) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 314)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 315) return req;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 316) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 317) EXPORT_SYMBOL_GPL(cookie_tcp_reqsk_alloc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 318)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 319) /* On input, sk is a listener.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 320) * Output is listener if incoming packet would not create a child
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 321) * NULL if memory could not be allocated.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 322) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 323) struct sock *cookie_v4_check(struct sock *sk, struct sk_buff *skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 324) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 325) struct ip_options *opt = &TCP_SKB_CB(skb)->header.h4.opt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 326) struct tcp_options_received tcp_opt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 327) struct inet_request_sock *ireq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 328) struct tcp_request_sock *treq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 329) struct tcp_sock *tp = tcp_sk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 330) const struct tcphdr *th = tcp_hdr(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 331) __u32 cookie = ntohl(th->ack_seq) - 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 332) struct sock *ret = sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 333) struct request_sock *req;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 334) int full_space, mss;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 335) struct rtable *rt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 336) __u8 rcv_wscale;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 337) struct flowi4 fl4;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 338) u32 tsoff = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 339)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 340) if (!sock_net(sk)->ipv4.sysctl_tcp_syncookies || !th->ack || th->rst)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 341) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 342)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 343) if (tcp_synq_no_recent_overflow(sk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 344) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 345)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 346) mss = __cookie_v4_check(ip_hdr(skb), th, cookie);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 347) if (mss == 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 348) __NET_INC_STATS(sock_net(sk), LINUX_MIB_SYNCOOKIESFAILED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 349) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 350) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 351)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 352) __NET_INC_STATS(sock_net(sk), LINUX_MIB_SYNCOOKIESRECV);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 353)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 354) /* check for timestamp cookie support */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 355) memset(&tcp_opt, 0, sizeof(tcp_opt));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 356) tcp_parse_options(sock_net(sk), skb, &tcp_opt, 0, NULL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 357)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 358) if (tcp_opt.saw_tstamp && tcp_opt.rcv_tsecr) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 359) tsoff = secure_tcp_ts_off(sock_net(sk),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 360) ip_hdr(skb)->daddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 361) ip_hdr(skb)->saddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 362) tcp_opt.rcv_tsecr -= tsoff;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 363) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 364)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 365) if (!cookie_timestamp_decode(sock_net(sk), &tcp_opt))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 366) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 367)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 368) ret = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 369) req = cookie_tcp_reqsk_alloc(&tcp_request_sock_ops, sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 370) if (!req)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 371) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 372)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 373) ireq = inet_rsk(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 374) treq = tcp_rsk(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 375) treq->rcv_isn = ntohl(th->seq) - 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 376) treq->snt_isn = cookie;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 377) treq->ts_off = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 378) treq->txhash = net_tx_rndhash();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 379) req->mss = mss;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 380) ireq->ir_num = ntohs(th->dest);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 381) ireq->ir_rmt_port = th->source;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 382) sk_rcv_saddr_set(req_to_sk(req), ip_hdr(skb)->daddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 383) sk_daddr_set(req_to_sk(req), ip_hdr(skb)->saddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 384) ireq->ir_mark = inet_request_mark(sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 385) ireq->snd_wscale = tcp_opt.snd_wscale;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 386) ireq->sack_ok = tcp_opt.sack_ok;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 387) ireq->wscale_ok = tcp_opt.wscale_ok;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 388) ireq->tstamp_ok = tcp_opt.saw_tstamp;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 389) req->ts_recent = tcp_opt.saw_tstamp ? tcp_opt.rcv_tsval : 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 390) treq->snt_synack = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 391) treq->tfo_listener = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 392)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 393) if (IS_ENABLED(CONFIG_SMC))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 394) ireq->smc_ok = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 395)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 396) ireq->ir_iif = inet_request_bound_dev_if(sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 397)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 398) /* We throwed the options of the initial SYN away, so we hope
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 399) * the ACK carries the same options again (see RFC1122 4.2.3.8)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 400) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 401) RCU_INIT_POINTER(ireq->ireq_opt, tcp_v4_save_options(sock_net(sk), skb));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 402)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 403) if (security_inet_conn_request(sk, skb, req)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 404) reqsk_free(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 405) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 406) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 407)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 408) req->num_retrans = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 409)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 410) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 411) * We need to lookup the route here to get at the correct
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 412) * window size. We should better make sure that the window size
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 413) * hasn't changed since we received the original syn, but I see
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 414) * no easy way to do this.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 415) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 416) flowi4_init_output(&fl4, ireq->ir_iif, ireq->ir_mark,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 417) RT_CONN_FLAGS(sk), RT_SCOPE_UNIVERSE, IPPROTO_TCP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 418) inet_sk_flowi_flags(sk),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 419) opt->srr ? opt->faddr : ireq->ir_rmt_addr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 420) ireq->ir_loc_addr, th->source, th->dest, sk->sk_uid);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 421) security_req_classify_flow(req, flowi4_to_flowi(&fl4));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 422) rt = ip_route_output_key(sock_net(sk), &fl4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 423) if (IS_ERR(rt)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 424) reqsk_free(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 425) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 426) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 427)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 428) /* Try to redo what tcp_v4_send_synack did. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 429) req->rsk_window_clamp = tp->window_clamp ? :dst_metric(&rt->dst, RTAX_WINDOW);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 430) /* limit the window selection if the user enforce a smaller rx buffer */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 431) full_space = tcp_full_space(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 432) if (sk->sk_userlocks & SOCK_RCVBUF_LOCK &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 433) (req->rsk_window_clamp > full_space || req->rsk_window_clamp == 0))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 434) req->rsk_window_clamp = full_space;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 435)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 436) tcp_select_initial_window(sk, full_space, req->mss,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 437) &req->rsk_rcv_wnd, &req->rsk_window_clamp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 438) ireq->wscale_ok, &rcv_wscale,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 439) dst_metric(&rt->dst, RTAX_INITRWND));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 440)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 441) ireq->rcv_wscale = rcv_wscale;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 442) ireq->ecn_ok = cookie_ecn_ok(&tcp_opt, sock_net(sk), &rt->dst);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 443)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 444) ret = tcp_get_cookie_sock(sk, skb, req, &rt->dst, tsoff);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 445) /* ip_queue_xmit() depends on our flow being setup
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 446) * Normal sockets get it right from inet_csk_route_child_sock()
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 447) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 448) if (ret)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 449) inet_sk(ret)->cork.fl.u.ip4 = fl4;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 450) out: return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 451) }