request_sock.c 6.5 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
/*
 * NET		Generic infrastructure for Network protocols.
 *
 * Authors:	Arnaldo Carvalho de Melo <acme@conectiva.com.br>
 *
 * 		From code originally in include/net/tcp.h
 *
 *		This program is free software; you can redistribute it and/or
 *		modify it under the terms of the GNU General Public License
 *		as published by the Free Software Foundation; either version
 *		2 of the License, or (at your option) any later version.
 */

#include <linux/module.h>
#include <linux/random.h>
#include <linux/slab.h>
#include <linux/string.h>
18
#include <linux/tcp.h>
19
#include <linux/vmalloc.h>
20 21 22

#include <net/request_sock.h>

23 24 25 26 27 28 29
/*
 * Maximum number of SYN_RECV sockets in queue per LISTEN socket.
 * One SYN_RECV socket costs about 80bytes on a 32bit machine.
 * It would be better to replace it with a global counter for all sockets
 * but then some measure against one socket starving all other sockets
 * would be needed.
 *
30
 * The minimum value of it is 128. Experiments with real servers show that
31
 * it is absolutely not enough even at 100conn/sec. 256 cures most
32 33 34
 * of problems.
 * This value is adjusted to 128 for low memory machines,
 * and it will increase in proportion to the memory of machine.
35
 * Note : Dont forget somaxconn that may limit backlog too.
36 37
 */
int sysctl_max_syn_backlog = 256;
38
EXPORT_SYMBOL(sysctl_max_syn_backlog);
39

40
int reqsk_queue_alloc(struct request_sock_queue *queue,
41
		      unsigned int nr_table_entries)
42
{
43
	size_t lopt_size = sizeof(struct listen_sock);
44
	struct listen_sock *lopt = NULL;
45 46 47 48

	nr_table_entries = min_t(u32, nr_table_entries, sysctl_max_syn_backlog);
	nr_table_entries = max_t(u32, nr_table_entries, 8);
	nr_table_entries = roundup_pow_of_two(nr_table_entries + 1);
49

E
Eric Dumazet 已提交
50
	lopt = kzalloc(lopt_size, GFP_KERNEL);
51
	if (!lopt)
52 53
		return -ENOMEM;

54
	spin_lock_init(&queue->rskq_lock);
55
	spin_lock_init(&queue->syn_wait_lock);
56 57 58 59 60 61 62

	spin_lock_init(&queue->fastopenq.lock);
	queue->fastopenq.rskq_rst_head = NULL;
	queue->fastopenq.rskq_rst_tail = NULL;
	queue->fastopenq.qlen = 0;
	queue->fastopenq.max_qlen = 0;

63
	queue->rskq_accept_head = NULL;
64
	lopt->max_qlen_log = ilog2(nr_table_entries);
65

66
	spin_lock_bh(&queue->syn_wait_lock);
67
	queue->listen_opt = lopt;
68
	spin_unlock_bh(&queue->syn_wait_lock);
69 70 71 72

	return 0;
}

73 74
void __reqsk_queue_destroy(struct request_sock_queue *queue)
{
75
	/* This is an error recovery path only, no locking needed */
E
Eric Dumazet 已提交
76
	kfree(queue->listen_opt);
77 78 79 80 81 82 83
}

static inline struct listen_sock *reqsk_queue_yank_listen_sk(
		struct request_sock_queue *queue)
{
	struct listen_sock *lopt;

84
	spin_lock_bh(&queue->syn_wait_lock);
85 86
	lopt = queue->listen_opt;
	queue->listen_opt = NULL;
87
	spin_unlock_bh(&queue->syn_wait_lock);
88 89 90 91

	return lopt;
}

92 93 94 95
void reqsk_queue_destroy(struct request_sock_queue *queue)
{
	struct listen_sock *lopt = reqsk_queue_yank_listen_sk(queue);

96
	/* cleaning is done by req timers */
E
Eric Dumazet 已提交
97
	kfree(lopt);
98 99
}

100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140
/*
 * This function is called to set a Fast Open socket's "fastopen_rsk" field
 * to NULL when a TFO socket no longer needs to access the request_sock.
 * This happens only after 3WHS has been either completed or aborted (e.g.,
 * RST is received).
 *
 * Before TFO, a child socket is created only after 3WHS is completed,
 * hence it never needs to access the request_sock. things get a lot more
 * complex with TFO. A child socket, accepted or not, has to access its
 * request_sock for 3WHS processing, e.g., to retransmit SYN-ACK pkts,
 * until 3WHS is either completed or aborted. Afterwards the req will stay
 * until either the child socket is accepted, or in the rare case when the
 * listener is closed before the child is accepted.
 *
 * In short, a request socket is only freed after BOTH 3WHS has completed
 * (or aborted) and the child socket has been accepted (or listener closed).
 * When a child socket is accepted, its corresponding req->sk is set to
 * NULL since it's no longer needed. More importantly, "req->sk == NULL"
 * will be used by the code below to determine if a child socket has been
 * accepted or not, and the check is protected by the fastopenq->lock
 * described below.
 *
 * Note that fastopen_rsk is only accessed from the child socket's context
 * with its socket lock held. But a request_sock (req) can be accessed by
 * both its child socket through fastopen_rsk, and a listener socket through
 * icsk_accept_queue.rskq_accept_head. To protect the access a simple spin
 * lock per listener "icsk->icsk_accept_queue.fastopenq->lock" is created.
 * only in the rare case when both the listener and the child locks are held,
 * e.g., in inet_csk_listen_stop() do we not need to acquire the lock.
 * The lock also protects other fields such as fastopenq->qlen, which is
 * decremented by this function when fastopen_rsk is no longer needed.
 *
 * Note that another solution was to simply use the existing socket lock
 * from the listener. But first socket lock is difficult to use. It is not
 * a simple spin lock - one must consider sock_owned_by_user() and arrange
 * to use sk_add_backlog() stuff. But what really makes it infeasible is the
 * locking hierarchy violation. E.g., inet_csk_listen_stop() may try to
 * acquire a child's lock while holding listener's socket lock. A corner
 * case might also exist in tcp_v4_hnd_req() that will trigger this locking
 * order.
 *
141 142
 * This function also sets "treq->tfo_listener" to false.
 * treq->tfo_listener is used by the listener so it is protected by the
143 144 145 146 147
 * fastopenq->lock in this function.
 */
void reqsk_fastopen_remove(struct sock *sk, struct request_sock *req,
			   bool reset)
{
148 149 150
	struct sock *lsk = req->rsk_listener;
	struct fastopen_queue *fastopenq;

151
	fastopenq = &inet_csk(lsk)->icsk_accept_queue.fastopenq;
152 153 154 155

	tcp_sk(sk)->fastopen_rsk = NULL;
	spin_lock_bh(&fastopenq->lock);
	fastopenq->qlen--;
156
	tcp_rsk(req)->tfo_listener = false;
157 158 159 160 161 162 163 164
	if (req->sk)	/* the child socket hasn't been accepted yet */
		goto out;

	if (!reset || lsk->sk_state != TCP_LISTEN) {
		/* If the listener has been closed don't bother with the
		 * special RST handling below.
		 */
		spin_unlock_bh(&fastopenq->lock);
165
		reqsk_put(req);
166 167 168 169 170 171 172 173 174
		return;
	}
	/* Wait for 60secs before removing a req that has triggered RST.
	 * This is a simple defense against TFO spoofing attack - by
	 * counting the req against fastopen.max_qlen, and disabling
	 * TFO when the qlen exceeds max_qlen.
	 *
	 * For more details see CoNext'11 "TCP Fast Open" paper.
	 */
175
	req->rsk_timer.expires = jiffies + 60*HZ;
176 177 178 179 180 181 182 183 184 185 186
	if (fastopenq->rskq_rst_head == NULL)
		fastopenq->rskq_rst_head = req;
	else
		fastopenq->rskq_rst_tail->dl_next = req;

	req->dl_next = NULL;
	fastopenq->rskq_rst_tail = req;
	fastopenq->qlen++;
out:
	spin_unlock_bh(&fastopenq->lock);
}