Thank you for your feedback! On Tue, Jul 16, 2019 at 7:26 PM Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx> wrote: > > On Tue, Jul 16, 2019 at 09:59:26AM +0200, Eric Dumazet wrote: > > > > > > On 7/16/19 2:26 AM, Petar Penkov wrote: > > > From: Petar Penkov <ppenkov@xxxxxxxxxx> > > > > > > This helper function allows BPF programs to try to generate SYN > > > cookies, given a reference to a listener socket. The function works > > > from XDP and with an skb context since bpf_skc_lookup_tcp can lookup a > > > socket in both cases. > > > > > ... > > > > > > +BPF_CALL_5(bpf_tcp_gen_syncookie, struct sock *, sk, void *, iph, u32, iph_len, > > > + struct tcphdr *, th, u32, th_len) > > > +{ > > > +#ifdef CONFIG_SYN_COOKIES > > > + u32 cookie; > > > + u16 mss; > > > + > > > + if (unlikely(th_len < sizeof(*th))) > > > > > > You probably need to check that th_len == th->doff * 4 > > +1 > that is surely necessary for safety. I'll make sure to include this check in the next version. > > Considering the limitation of 5 args the api choice is good. > struct bpf_syncookie approach doesn't look natural to me. > And I couldn't come up with any better way to represent this helper. > So let's go with > return htonl(cookie) | ((u64)mss << 32); > My only question is why htonl ? I did it to mirror bpf_tcp_check_syncookie which sees a network order cookie. That said, it is probably better for the caller to call bpf_htonl() as they see fit, rather than to do it in the helper. Will update, thanks. > > Independently of that... > Since we've been hitting this 5 args limit too much, > we need to start thinking how to extend BPF ISA to pass > args 6,7,8 on stack. > Agreed, having an additional argument would have been helpful for this function.