request_sock.c 7.5 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
/*
 * NET		Generic infrastructure for Network protocols.
 *
 * Authors:	Arnaldo Carvalho de Melo <acme@conectiva.com.br>
 *
 * 		From code originally in include/net/tcp.h
 *
 *		This program is free software; you can redistribute it and/or
 *		modify it under the terms of the GNU General Public License
 *		as published by the Free Software Foundation; either version
 *		2 of the License, or (at your option) any later version.
 */

#include <linux/module.h>
#include <linux/random.h>
#include <linux/slab.h>
#include <linux/string.h>
18
#include <linux/tcp.h>
19
#include <linux/vmalloc.h>
20 21 22

#include <net/request_sock.h>

23 24 25 26 27 28 29
/*
 * Maximum number of SYN_RECV sockets in queue per LISTEN socket.
 * One SYN_RECV socket costs about 80bytes on a 32bit machine.
 * It would be better to replace it with a global counter for all sockets
 * but then some measure against one socket starving all other sockets
 * would be needed.
 *
30
 * The minimum value of it is 128. Experiments with real servers show that
31
 * it is absolutely not enough even at 100conn/sec. 256 cures most
32 33 34
 * of problems.
 * This value is adjusted to 128 for low memory machines,
 * and it will increase in proportion to the memory of machine.
35
 * Note : Dont forget somaxconn that may limit backlog too.
36 37
 */
int sysctl_max_syn_backlog = 256;
38
EXPORT_SYMBOL(sysctl_max_syn_backlog);
39

40
int reqsk_queue_alloc(struct request_sock_queue *queue,
41
		      unsigned int nr_table_entries)
42
{
43
	size_t lopt_size = sizeof(struct listen_sock);
44
	struct listen_sock *lopt = NULL;
45 46 47 48 49

	nr_table_entries = min_t(u32, nr_table_entries, sysctl_max_syn_backlog);
	nr_table_entries = max_t(u32, nr_table_entries, 8);
	nr_table_entries = roundup_pow_of_two(nr_table_entries + 1);
	lopt_size += nr_table_entries * sizeof(struct request_sock *);
50 51 52 53 54 55

	if (lopt_size <= (PAGE_SIZE << PAGE_ALLOC_COSTLY_ORDER))
		lopt = kzalloc(lopt_size, GFP_KERNEL |
					  __GFP_NOWARN |
					  __GFP_NORETRY);
	if (!lopt)
56
		lopt = vzalloc(lopt_size);
57
	if (!lopt)
58 59 60
		return -ENOMEM;

	get_random_bytes(&lopt->hash_rnd, sizeof(lopt->hash_rnd));
61
	spin_lock_init(&queue->rskq_lock);
62
	spin_lock_init(&queue->syn_wait_lock);
63 64 65 66 67 68 69

	spin_lock_init(&queue->fastopenq.lock);
	queue->fastopenq.rskq_rst_head = NULL;
	queue->fastopenq.rskq_rst_tail = NULL;
	queue->fastopenq.qlen = 0;
	queue->fastopenq.max_qlen = 0;

70
	queue->rskq_accept_head = NULL;
71
	lopt->nr_table_entries = nr_table_entries;
72
	lopt->max_qlen_log = ilog2(nr_table_entries);
73

74
	spin_lock_bh(&queue->syn_wait_lock);
75
	queue->listen_opt = lopt;
76
	spin_unlock_bh(&queue->syn_wait_lock);
77 78 79 80

	return 0;
}

81 82
void __reqsk_queue_destroy(struct request_sock_queue *queue)
{
83 84
	/* This is an error recovery path only, no locking needed */
	kvfree(queue->listen_opt);
85 86 87 88 89 90 91
}

static inline struct listen_sock *reqsk_queue_yank_listen_sk(
		struct request_sock_queue *queue)
{
	struct listen_sock *lopt;

92
	spin_lock_bh(&queue->syn_wait_lock);
93 94
	lopt = queue->listen_opt;
	queue->listen_opt = NULL;
95
	spin_unlock_bh(&queue->syn_wait_lock);
96 97 98 99

	return lopt;
}

100 101 102 103 104
void reqsk_queue_destroy(struct request_sock_queue *queue)
{
	/* make all the listen_opt local to us */
	struct listen_sock *lopt = reqsk_queue_yank_listen_sk(queue);

105
	if (listen_sock_qlen(lopt) != 0) {
106
		unsigned int i;
107 108 109 110

		for (i = 0; i < lopt->nr_table_entries; i++) {
			struct request_sock *req;

111
			spin_lock_bh(&queue->syn_wait_lock);
112 113
			while ((req = lopt->syn_table[i]) != NULL) {
				lopt->syn_table[i] = req->dl_next;
E
Eric Dumazet 已提交
114 115 116 117 118
				/* Because of following del_timer_sync(),
				 * we must release the spinlock here
				 * or risk a dead lock.
				 */
				spin_unlock_bh(&queue->syn_wait_lock);
119
				atomic_inc(&lopt->qlen_dec);
E
Eric Dumazet 已提交
120
				if (del_timer_sync(&req->rsk_timer))
121
					reqsk_put(req);
122
				reqsk_put(req);
E
Eric Dumazet 已提交
123
				spin_lock_bh(&queue->syn_wait_lock);
124
			}
125
			spin_unlock_bh(&queue->syn_wait_lock);
126 127 128
		}
	}

129 130
	if (WARN_ON(listen_sock_qlen(lopt) != 0))
		pr_err("qlen %u\n", listen_sock_qlen(lopt));
131
	kvfree(lopt);
132 133
}

134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174
/*
 * This function is called to set a Fast Open socket's "fastopen_rsk" field
 * to NULL when a TFO socket no longer needs to access the request_sock.
 * This happens only after 3WHS has been either completed or aborted (e.g.,
 * RST is received).
 *
 * Before TFO, a child socket is created only after 3WHS is completed,
 * hence it never needs to access the request_sock. things get a lot more
 * complex with TFO. A child socket, accepted or not, has to access its
 * request_sock for 3WHS processing, e.g., to retransmit SYN-ACK pkts,
 * until 3WHS is either completed or aborted. Afterwards the req will stay
 * until either the child socket is accepted, or in the rare case when the
 * listener is closed before the child is accepted.
 *
 * In short, a request socket is only freed after BOTH 3WHS has completed
 * (or aborted) and the child socket has been accepted (or listener closed).
 * When a child socket is accepted, its corresponding req->sk is set to
 * NULL since it's no longer needed. More importantly, "req->sk == NULL"
 * will be used by the code below to determine if a child socket has been
 * accepted or not, and the check is protected by the fastopenq->lock
 * described below.
 *
 * Note that fastopen_rsk is only accessed from the child socket's context
 * with its socket lock held. But a request_sock (req) can be accessed by
 * both its child socket through fastopen_rsk, and a listener socket through
 * icsk_accept_queue.rskq_accept_head. To protect the access a simple spin
 * lock per listener "icsk->icsk_accept_queue.fastopenq->lock" is created.
 * only in the rare case when both the listener and the child locks are held,
 * e.g., in inet_csk_listen_stop() do we not need to acquire the lock.
 * The lock also protects other fields such as fastopenq->qlen, which is
 * decremented by this function when fastopen_rsk is no longer needed.
 *
 * Note that another solution was to simply use the existing socket lock
 * from the listener. But first socket lock is difficult to use. It is not
 * a simple spin lock - one must consider sock_owned_by_user() and arrange
 * to use sk_add_backlog() stuff. But what really makes it infeasible is the
 * locking hierarchy violation. E.g., inet_csk_listen_stop() may try to
 * acquire a child's lock while holding listener's socket lock. A corner
 * case might also exist in tcp_v4_hnd_req() that will trigger this locking
 * order.
 *
175 176
 * This function also sets "treq->tfo_listener" to false.
 * treq->tfo_listener is used by the listener so it is protected by the
177 178 179 180 181
 * fastopenq->lock in this function.
 */
void reqsk_fastopen_remove(struct sock *sk, struct request_sock *req,
			   bool reset)
{
182 183 184
	struct sock *lsk = req->rsk_listener;
	struct fastopen_queue *fastopenq;

185
	fastopenq = &inet_csk(lsk)->icsk_accept_queue.fastopenq;
186 187 188 189

	tcp_sk(sk)->fastopen_rsk = NULL;
	spin_lock_bh(&fastopenq->lock);
	fastopenq->qlen--;
190
	tcp_rsk(req)->tfo_listener = false;
191 192 193 194 195 196 197 198
	if (req->sk)	/* the child socket hasn't been accepted yet */
		goto out;

	if (!reset || lsk->sk_state != TCP_LISTEN) {
		/* If the listener has been closed don't bother with the
		 * special RST handling below.
		 */
		spin_unlock_bh(&fastopenq->lock);
199
		reqsk_put(req);
200 201 202 203 204 205 206 207 208
		return;
	}
	/* Wait for 60secs before removing a req that has triggered RST.
	 * This is a simple defense against TFO spoofing attack - by
	 * counting the req against fastopen.max_qlen, and disabling
	 * TFO when the qlen exceeds max_qlen.
	 *
	 * For more details see CoNext'11 "TCP Fast Open" paper.
	 */
209
	req->rsk_timer.expires = jiffies + 60*HZ;
210 211 212 213 214 215 216 217 218 219 220
	if (fastopenq->rskq_rst_head == NULL)
		fastopenq->rskq_rst_head = req;
	else
		fastopenq->rskq_rst_tail->dl_next = req;

	req->dl_next = NULL;
	fastopenq->rskq_rst_tail = req;
	fastopenq->qlen++;
out:
	spin_unlock_bh(&fastopenq->lock);
}