Author: tuexen
Date: Wed Sep 25 10:40:49 2019
New Revision: 352673
URL: https://svnweb.freebsd.org/changeset/base/352673

Log:
  MFC r352512:
  
  When the RACK stack computes the space for user data in a TCP segment,
  it wasn't taking the IP level options into account. This patch fixes this.
  In addition, it also corrects a KASSERT and adds protection code to assure
  that the IP header chain and the TCP head fit in the first fragment as
  required by RFC 7112.
  
  Reviewed by:          rrs@
  Sponsored by:         Netflix, Inc.
  Differential Revision:        https://reviews.freebsd.org/D21666

Modified:
  stable/12/sys/netinet/tcp_stacks/rack.c
Directory Properties:
  stable/12/   (props changed)

Modified: stable/12/sys/netinet/tcp_stacks/rack.c
==============================================================================
--- stable/12/sys/netinet/tcp_stacks/rack.c     Wed Sep 25 10:38:44 2019        
(r352672)
+++ stable/12/sys/netinet/tcp_stacks/rack.c     Wed Sep 25 10:40:49 2019        
(r352673)
@@ -7872,7 +7872,16 @@ send:
                hdrlen += sizeof(struct udphdr);
        }
 #endif
-       ipoptlen = 0;
+#ifdef INET6
+       if (isipv6)
+               ipoptlen = ip6_optlen(tp->t_inpcb);
+       else
+#endif
+       if (tp->t_inpcb->inp_options)
+               ipoptlen = tp->t_inpcb->inp_options->m_len -
+                   offsetof(struct ipoption, ipopt_list);
+       else
+               ipoptlen = 0;
 #if defined(IPSEC) || defined(IPSEC_SUPPORT)
        ipoptlen += ipsec_optlen;
 #endif
@@ -7945,6 +7954,18 @@ send:
                                sendalot = 1;
 
                } else {
+                       if (optlen + ipoptlen > tp->t_maxseg) {
+                               /*
+                                * Since we don't have enough space to put
+                                * the IP header chain and the TCP header in
+                                * one packet as required by RFC 7112, don't
+                                * send it.
+                                */
+                               SOCKBUF_UNLOCK(&so->so_snd);
+                               error = EMSGSIZE;
+                               sack_rxmit = 0;
+                               goto out;
+                       }
                        len = tp->t_maxseg - optlen - ipoptlen;
                        sendalot = 1;
                }
@@ -8438,15 +8459,9 @@ send:
                m->m_pkthdr.csum_flags |= CSUM_TSO;
                m->m_pkthdr.tso_segsz = tp->t_maxseg - optlen;
        }
-#if defined(IPSEC) || defined(IPSEC_SUPPORT)
-       KASSERT(len + hdrlen + ipoptlen - ipsec_optlen == m_length(m, NULL),
-           ("%s: mbuf chain shorter than expected: %d + %u + %u - %u != %u",
-           __func__, len, hdrlen, ipoptlen, ipsec_optlen, m_length(m, NULL)));
-#else
-       KASSERT(len + hdrlen + ipoptlen == m_length(m, NULL),
-           ("%s: mbuf chain shorter than expected: %d + %u + %u != %u",
-           __func__, len, hdrlen, ipoptlen, m_length(m, NULL)));
-#endif
+       KASSERT(len + hdrlen == m_length(m, NULL),
+           ("%s: mbuf chain different than expected: %d + %u != %u",
+           __func__, len, hdrlen, m_length(m, NULL)));
 
 #ifdef TCP_HHOOK
        /* Run HHOOK_TCP_ESTABLISHED_OUT helper hooks. */
_______________________________________________
svn-src-all@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"

Reply via email to