From patchwork Fri May 15 07:59:37 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ralf Lici X-Patchwork-Id: 4949 Return-Path: Delivered-To: patchwork@openvpn.net Received: by 2002:a05:7000:a719:b0:84a:48f:a1fd with SMTP id hl25csp4386186mab; Fri, 15 May 2026 01:01:09 -0700 (PDT) X-Forwarded-Encrypted: i=2; AFNElJ/rt1VyreNflHF4z5HBUiLMEIIGpvQOCbm6Ss9hXh2RfAn0Dxjmm0IkjdV/3BnL/2zTEYVTcPUVI6U=@openvpn.net X-Received: by 2002:a05:6870:521:b0:42f:7bbc:ce82 with SMTP id 586e51a60fabf-43a2dd5e861mr1821372fac.26.1778832069476; Fri, 15 May 2026 01:01:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1778832069; cv=none; d=google.com; s=arc-20240605; b=D/lQuRNp2bPK6OIpgO02LLWjHltmAKcdZaZzhSBkENfYyG1ZM+ehR8d1CHZzaTb9Om aPsDcsSBelEbDbm7PLgwd26xGSTRgK5hFBErLffDqsZjXvITPqmIm1oGWVtj+Bb5BHrq wFr7hqLFmHQzHwx2HCnHN9jS4qLgQFWG+VzezCkb9W+9WLchdJ+/jXonxoQoNqq1GDFi k5Rmx2RhdUbJJgRaC85+np7c8Bzeag7+DvsarB0krwvvcvGQkxG3Mjw6KQZ+HBT5L2AD WDHQq6Wsr16ZItMC3e9yYBFxAw7C1+Al+eopwZiOPyUAKNxUcgFDss3vRn1EosPG3uaK 5Zrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=errors-to:content-transfer-encoding:list-subscribe:list-help :list-post:list-archive:list-unsubscribe:list-id:precedence:subject :mime-version:message-id:date:to:from:dkim-signature:dkim-signature :dkim-signature:dkim-signature; bh=5U6/gyaIqbdv9PKCR7u8jikUK0ggT/O0DJ+47C3C+NQ=; fh=4NbAC/LsuMLI0S0hprUlLSLCiHwg6SCAifhH718Jh0Q=; b=Pbc1nprbO6xGOnF8IRFeKb2yoM0rg/+3E49LIpaAal3mU3njpyrevlUZKkT4/g+JyG O1dZlC376JgGc40w2q+VAJk9YG19ISJ56g00fIPCuefKoGGMCwUsmOHgwpUmoEg7rG57 8uhTktUN0izP5+rnb0IiSgiNhfk7lgfU3t7Q9H8AapUA4SkTcAqvUBtUfOpDAcmSlMYx ZYIoD4PK7XdxJYpZjqlpsii81praVrCO4rzGN8zGnhkSKDuLmcvINXzUMKWawg0jVcTd IN/Y/HVUxp19lTm4YaOg5gMb/EGXoTZISCQPn/gfstBeuII3w56jk/zqmgVe7geuOPPC zJAQ==; dara=google.com ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@lists.sourceforge.net header.s=beta header.b=I+WRx1BJ; dkim=neutral (body hash did not verify) header.i=@sourceforge.net header.s=x header.b=i9DSrVRu; dkim=neutral (body hash did not verify) header.i=@sf.net header.s=x header.b=XOm3OnSJ; dkim=neutral (body hash did not verify) header.i=@mandelbit.com header.s=MBO0001 header.b="USlR/4dQ"; spf=pass (google.com: domain of openvpn-devel-bounces@lists.sourceforge.net designates 216.105.38.7 as permitted sender) smtp.mailfrom=openvpn-devel-bounces@lists.sourceforge.net Received: from lists.sourceforge.net (lists.sourceforge.net. [216.105.38.7]) by mx.google.com with ESMTPS id 586e51a60fabf-439fc8134eesi3713498fac.351.2026.05.15.01.01.09 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 15 May 2026 01:01:09 -0700 (PDT) Received-SPF: pass (google.com: domain of openvpn-devel-bounces@lists.sourceforge.net designates 216.105.38.7 as permitted sender) client-ip=216.105.38.7; Authentication-Results: mx.google.com; dkim=pass header.i=@lists.sourceforge.net header.s=beta header.b=I+WRx1BJ; dkim=neutral (body hash did not verify) header.i=@sourceforge.net header.s=x header.b=i9DSrVRu; dkim=neutral (body hash did not verify) header.i=@sf.net header.s=x header.b=XOm3OnSJ; dkim=neutral (body hash did not verify) header.i=@mandelbit.com header.s=MBO0001 header.b="USlR/4dQ"; spf=pass (google.com: domain of openvpn-devel-bounces@lists.sourceforge.net designates 216.105.38.7 as permitted sender) smtp.mailfrom=openvpn-devel-bounces@lists.sourceforge.net DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.sourceforge.net; s=beta; h=Content-Transfer-Encoding:Content-Type: List-Subscribe:List-Help:List-Post:List-Archive:List-Unsubscribe:List-Id: Subject:MIME-Version:Message-ID:Date:To:From:Sender:Reply-To:Cc:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Owner; bh=5U6/gyaIqbdv9PKCR7u8jikUK0ggT/O0DJ+47C3C+NQ=; b=I+WRx1BJz0IpWr4ilMoL+iZ6Wt kHZ9nRA+qiYdlkEQBM8sMRYNCL00OKoTIS9bgConnf8oQi0m6IKlbvjaf6Ok9pMM/6uS5/gTpgnA6 sc9EwWZnkkcDKrITMbwyn6q0Zz8klhb7BROE1ST4igPLA8eQaG3QkH+fLeA3+hwIcOns=; Received: from [127.0.0.1] (helo=sfs-ml-1.v29.lw.sourceforge.com) by sfs-ml-1.v29.lw.sourceforge.com with esmtp (Exim 4.95) (envelope-from ) id 1wNnTi-0000HW-0I; Fri, 15 May 2026 08:00:59 +0000 Received: from [172.30.29.66] (helo=mx.sourceforge.net) by sfs-ml-1.v29.lw.sourceforge.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1wNnTM-0000GB-SW for openvpn-devel@lists.sourceforge.net; Fri, 15 May 2026 08:00:38 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:MIME-Version:Message-ID: Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=QglzCGMVmGgxlaaIVm/L7UBnfGZAxuguSjraxxniJAc=; b=i9DSrVRutZ5bY/fkvfJ7RlDxLX j7Mo5enqCNhhb8LYxq95RWTRn13UmPlX10J28MYYQQ7lYfW7Dm/4cNP//JXlB0WTUrvGXrTJYJXrs mXfZiHWmzwtXBcmLqQamhcTYlIWeqgVx6iNoSC1wC5xHX0o6RhHUomGgpPUxFSmTrtxs=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:MIME-Version:Message-ID:Date:Subject:Cc:To:From :Sender:Reply-To:Content-Type:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post: List-Owner:List-Archive; bh=QglzCGMVmGgxlaaIVm/L7UBnfGZAxuguSjraxxniJAc=; b=X Om3OnSJ3g6/ZHi4FubR+cV1qDiowJrXiJTBcEvVY6wQCUSkuu37yNDUvGPeEAPiqo1NB2ZE1qI5pJ 2KdTcYCXp0xBFTJbxqW4rS/1O9q6JqhC1dgjKLIfp7OTWDfF+5jddBTkWVPfhcxZ+rDz4qM4PnfWf Duvn9zm0/JNohnC0=; Received: from mout-b-210.mailbox.org ([195.10.208.40]) by sfi-mx-2.v28.lw.sourceforge.com with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.95) id 1wNnTB-0004D8-0j for openvpn-devel@lists.sourceforge.net; Fri, 15 May 2026 08:00:31 +0000 Received: from smtp102.mailbox.org (smtp102.mailbox.org [10.196.197.102]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-b-210.mailbox.org (Postfix) with ESMTPS id 4gH040366SzDx34; Fri, 15 May 2026 10:00:16 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mandelbit.com; s=MBO0001; t=1778832016; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=QglzCGMVmGgxlaaIVm/L7UBnfGZAxuguSjraxxniJAc=; b=USlR/4dQETeoQ19wTojjDYqkMg9/gTInCqolV/ki8qshhCLQ4KGSzIZOAXu17maz517YM8 VuG9xX5GP0DnL281k5Y18+no7KWvAdWF/FHgSMdo8378ovr9MgNRv02cBAb5r8Xmp9bAeN tdtEZtuhJ64JAgtCHMPEzoQLMjXO5EXN52XTyaW3MDX1F12z0LwNsaO0cBatMQlbhkBKJ2 A+rz/PQ3B+OTNDKFDWqtxlnPapmzDBdRCEBQi6IhTd0nfQw4pSb9oIon6VYsUAm/KN6oax KnydA+05ZQGRDJqfbJP/jSeSDIF4gYnUoFOPfJbFAsgcHXT2lu4vqpnH/Qykvg== From: Ralf Lici To: openvpn-devel@lists.sourceforge.net Date: Fri, 15 May 2026 09:59:37 +0200 Message-ID: <20260515075941.102225-1-ralf@mandelbit.com> MIME-Version: 1.0 X-Spam-Score: -0.2 (/) X-Spam-Report: Spam detection software, running on the system "sfi-spamd-2.hosts.colo.sdot.me", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: xt_TCPMSS has local logic for scanning TCP options and lowering an existing MSS option without increasing it. Move that scan-and-clamp logic into a TCP helper so other networking code can reuse it without duplicating TCP option parsing. Keep xt_TCPMSS responsible for the policy-specific behavior of adding a m [...] Content analysis details: (-0.2 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1wNnTB-0004D8-0j Subject: [Openvpn-devel] [PATCH ovpn net-next 1/3] tcp: factor out TCP MSS option clamping X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox X-GMAIL-THRID: =?utf-8?q?1865240616125487088?= X-GMAIL-MSGID: =?utf-8?q?1865240616125487088?= xt_TCPMSS has local logic for scanning TCP options and lowering an existing MSS option without increasing it. Move that scan-and-clamp logic into a TCP helper so other networking code can reuse it without duplicating TCP option parsing. Keep xt_TCPMSS responsible for the policy-specific behavior of adding a missing MSS option. The helper returns 0 when an existing MSS option was handled, whether or not it had to be lowered. It returns -ENOENT when no MSS option is present and -EINVAL when option parsing finds a malformed option block. xt_TCPMSS treats both non-zero cases like the previous local scan failing to find a clampable MSS option, so the target keeps its existing fallback behavior for adding a missing MSS option or accepting the packet unchanged. The helper expects the caller to ensure that the TCP header and options are linear and writable. Signed-off-by: Ralf Lici --- include/net/tcp.h | 2 ++ net/ipv4/tcp.c | 60 +++++++++++++++++++++++++++++++++++++++ net/netfilter/xt_TCPMSS.c | 36 ++--------------------- 3 files changed, 64 insertions(+), 34 deletions(-) diff --git a/include/net/tcp.h b/include/net/tcp.h index 3c4e6adb0dbd..e722c7d936bf 100644 --- a/include/net/tcp.h +++ b/include/net/tcp.h @@ -538,6 +538,8 @@ void tcp_parse_options(const struct net *net, const struct sk_buff *skb, struct tcp_options_received *opt_rx, int estab, struct tcp_fastopen_cookie *foc); +int tcp_clamp_mss_option(struct sk_buff *skb, struct tcphdr *th, u16 maxmss); + /* * BPF SKB-less helpers */ diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c index 21ece4c71612..ef10e530a1ad 100644 --- a/net/ipv4/tcp.c +++ b/net/ipv4/tcp.c @@ -721,6 +721,66 @@ static inline void tcp_mark_urg(struct tcp_sock *tp, int flags) tp->snd_up = tp->write_seq; } +/** + * tcp_clamp_mss_option - clamp an existing TCP MSS option + * @skb: skb containing the TCP segment + * @th: TCP header in @skb + * @maxmss: upper bound for the TCP MSS option value + * + * Parse the TCP option block and lower an existing MSS option to @maxmss. + * The MSS value is never increased. If the MSS value is changed, the TCP + * checksum in @th is updated. + * + * The caller must ensure that @th and the complete TCP option block are + * present in the linear data area and writable. + * + * Return: 0 on success or when no update is needed, -ENOENT when no MSS + * option is present, or -EINVAL when the TCP option block is malformed. + */ +int tcp_clamp_mss_option(struct sk_buff *skb, struct tcphdr *th, u16 maxmss) +{ + int length = th->doff * 4 - sizeof(*th); + u8 *ptr = (u8 *)(th + 1); + u16 oldmss; + + while (length > 0) { + int opcode = *ptr++; + int opsize; + + switch (opcode) { + case TCPOPT_EOL: + return -ENOENT; + case TCPOPT_NOP: + length--; + continue; + default: + if (length < 2) + return -EINVAL; + + opsize = *ptr++; + if (opsize < 2 || opsize > length) + return -EINVAL; + + if (opcode == TCPOPT_MSS && opsize == TCPOLEN_MSS) { + oldmss = get_unaligned_be16(ptr); + if (!oldmss || oldmss <= maxmss) + return 0; + + put_unaligned_be16(maxmss, ptr); + inet_proto_csum_replace2(&th->check, skb, + htons(oldmss), + htons(maxmss), false); + return 0; + } + + ptr += opsize - 2; + length -= opsize; + } + } + return -ENOENT; +} +EXPORT_SYMBOL_GPL(tcp_clamp_mss_option); + /* If a not yet filled skb is pushed, do not send it if * we have data packets in Qdisc or NIC queues : * Because TX completion will happen shortly, it gives a chance diff --git a/net/netfilter/xt_TCPMSS.c b/net/netfilter/xt_TCPMSS.c index 80e1634bc51f..70983b757229 100644 --- a/net/netfilter/xt_TCPMSS.c +++ b/net/netfilter/xt_TCPMSS.c @@ -30,16 +30,6 @@ MODULE_DESCRIPTION("Xtables: TCP Maximum Segment Size (MSS) adjustment"); MODULE_ALIAS("ipt_TCPMSS"); MODULE_ALIAS("ip6t_TCPMSS"); -static inline unsigned int -optlen(const u_int8_t *opt, unsigned int offset) -{ - /* Beware zero-length options: make finite progress */ - if (opt[offset] <= TCPOPT_NOP || opt[offset+1] == 0) - return 1; - else - return opt[offset+1]; -} - static u_int32_t tcpmss_reverse_mtu(struct net *net, const struct sk_buff *skb, unsigned int family) @@ -77,7 +67,6 @@ tcpmss_mangle_packet(struct sk_buff *skb, const struct xt_tcpmss_info *info = par->targinfo; struct tcphdr *tcph; int len, tcp_hdrlen; - unsigned int i; __be16 oldval; u16 newmss; u8 *opt; @@ -113,29 +102,8 @@ tcpmss_mangle_packet(struct sk_buff *skb, } else newmss = info->mss; - opt = (u_int8_t *)tcph; - for (i = sizeof(struct tcphdr); i <= tcp_hdrlen - TCPOLEN_MSS; i += optlen(opt, i)) { - if (opt[i] == TCPOPT_MSS && opt[i+1] == TCPOLEN_MSS) { - u_int16_t oldmss; - - oldmss = (opt[i+2] << 8) | opt[i+3]; - - /* Never increase MSS, even when setting it, as - * doing so results in problems for hosts that rely - * on MSS being set correctly. - */ - if (oldmss <= newmss) - return 0; - - opt[i+2] = (newmss & 0xff00) >> 8; - opt[i+3] = newmss & 0x00ff; - - inet_proto_csum_replace2(&tcph->check, skb, - htons(oldmss), htons(newmss), - false); - return 0; - } - } + if (tcp_clamp_mss_option(skb, tcph, newmss) == 0) + return 0; /* There is data after the header so the option can't be added * without moving it, and doing so may make the SYN packet