Eric Dumazet 1fa7bf6a0d tcp: fix cookie_init_timestamp() overflows
[ Upstream commit 73ed8e03388d16c12fc577e5c700b58a29045a15 ]

cookie_init_timestamp() is supposed to return a 64bit timestamp
suitable for both TSval determination and setting of skb->tstamp.

Unfortunately it uses 32bit fields and overflows after
2^32 * 10^6 nsec (~49 days) of uptime.

Generated TSval are still correct, but skb->tstamp might be set
far away in the past, potentially confusing other layers.

tcp_ns_to_ts() is changed to return a full 64bit value,
ts and ts_now variables are changed to u64 type,
and TSMASK is removed in favor of shifts operations.

While we are at it, change this sequence:
		ts >>= TSBITS;
		ts--;
		ts <<= TSBITS;
		ts |= options;
to:
		ts -= (1UL << TSBITS);

Fixes: 9a568de4818d ("tcp: switch TCP TS option (RFC 7323) to 1ms clock")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2023-11-20 11:59:01 +01:00
..
2023-05-31 13:06:57 +02:00
2023-10-25 10:38:07 +01:00
2023-03-31 21:37:06 -07:00
2023-04-13 16:43:38 -07:00
2023-01-26 10:52:18 +01:00
2022-09-20 10:21:49 -07:00
2022-12-20 03:13:45 +01:00
2022-11-16 09:43:35 +00:00
2023-11-20 11:58:56 +01:00
2023-11-20 11:58:56 +01:00
2023-08-29 17:39:15 -07:00