request_sock.h 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281
  1. /*
  2. * NET Generic infrastructure for Network protocols.
  3. *
  4. * Definitions for request_sock
  5. *
  6. * Authors: Arnaldo Carvalho de Melo <acme@conectiva.com.br>
  7. *
  8. * From code originally in include/net/tcp.h
  9. *
  10. * This program is free software; you can redistribute it and/or
  11. * modify it under the terms of the GNU General Public License
  12. * as published by the Free Software Foundation; either version
  13. * 2 of the License, or (at your option) any later version.
  14. */
  15. #ifndef _REQUEST_SOCK_H
  16. #define _REQUEST_SOCK_H
  17. #include <linux/slab.h>
  18. #include <linux/spinlock.h>
  19. #include <linux/types.h>
  20. #include <linux/bug.h>
  21. #include <net/sock.h>
  22. struct request_sock;
  23. struct sk_buff;
  24. struct dst_entry;
  25. struct proto;
  26. /* empty to "strongly type" an otherwise void parameter.
  27. */
  28. struct request_values {
  29. };
  30. struct request_sock_ops {
  31. int family;
  32. int obj_size;
  33. struct kmem_cache *slab;
  34. char *slab_name;
  35. int (*rtx_syn_ack)(struct sock *sk,
  36. struct request_sock *req,
  37. struct request_values *rvp);
  38. void (*send_ack)(struct sock *sk, struct sk_buff *skb,
  39. struct request_sock *req);
  40. void (*send_reset)(struct sock *sk,
  41. struct sk_buff *skb);
  42. void (*destructor)(struct request_sock *req);
  43. void (*syn_ack_timeout)(struct sock *sk,
  44. struct request_sock *req);
  45. };
  46. /* struct request_sock - mini sock to represent a connection request
  47. */
  48. struct request_sock {
  49. struct request_sock *dl_next; /* Must be first member! */
  50. u16 mss;
  51. u8 retrans;
  52. u8 cookie_ts; /* syncookie: encode tcpopts in timestamp */
  53. /* The following two fields can be easily recomputed I think -AK */
  54. u32 window_clamp; /* window clamp at creation time */
  55. u32 rcv_wnd; /* rcv_wnd offered first time */
  56. u32 ts_recent;
  57. unsigned long expires;
  58. const struct request_sock_ops *rsk_ops;
  59. struct sock *sk;
  60. u32 secid;
  61. u32 peer_secid;
  62. };
  63. static inline struct request_sock *reqsk_alloc(const struct request_sock_ops *ops)
  64. {
  65. struct request_sock *req = kmem_cache_alloc(ops->slab, GFP_ATOMIC);
  66. if (req != NULL)
  67. req->rsk_ops = ops;
  68. return req;
  69. }
  70. static inline void __reqsk_free(struct request_sock *req)
  71. {
  72. kmem_cache_free(req->rsk_ops->slab, req);
  73. }
  74. static inline void reqsk_free(struct request_sock *req)
  75. {
  76. req->rsk_ops->destructor(req);
  77. __reqsk_free(req);
  78. }
  79. extern int sysctl_max_syn_backlog;
  80. /** struct listen_sock - listen state
  81. *
  82. * @max_qlen_log - log_2 of maximal queued SYNs/REQUESTs
  83. */
  84. struct listen_sock {
  85. u8 max_qlen_log;
  86. u8 synflood_warned;
  87. /* 2 bytes hole, try to use */
  88. int qlen;
  89. int qlen_young;
  90. int clock_hand;
  91. u32 hash_rnd;
  92. u32 nr_table_entries;
  93. struct request_sock *syn_table[0];
  94. };
  95. /*
  96. * For a TCP Fast Open listener -
  97. * lock - protects the access to all the reqsk, which is co-owned by
  98. * the listener and the child socket.
  99. * qlen - pending TFO requests (still in TCP_SYN_RECV).
  100. * max_qlen - max TFO reqs allowed before TFO is disabled.
  101. *
  102. * XXX (TFO) - ideally these fields can be made as part of "listen_sock"
  103. * structure above. But there is some implementation difficulty due to
  104. * listen_sock being part of request_sock_queue hence will be freed when
  105. * a listener is stopped. But TFO related fields may continue to be
  106. * accessed even after a listener is closed, until its sk_refcnt drops
  107. * to 0 implying no more outstanding TFO reqs. One solution is to keep
  108. * listen_opt around until sk_refcnt drops to 0. But there is some other
  109. * complexity that needs to be resolved. E.g., a listener can be disabled
  110. * temporarily through shutdown()->tcp_disconnect(), and re-enabled later.
  111. */
  112. struct fastopen_queue {
  113. struct request_sock *rskq_rst_head; /* Keep track of past TFO */
  114. struct request_sock *rskq_rst_tail; /* requests that caused RST.
  115. * This is part of the defense
  116. * against spoofing attack.
  117. */
  118. spinlock_t lock;
  119. int qlen; /* # of pending (TCP_SYN_RECV) reqs */
  120. int max_qlen; /* != 0 iff TFO is currently enabled */
  121. };
  122. /** struct request_sock_queue - queue of request_socks
  123. *
  124. * @rskq_accept_head - FIFO head of established children
  125. * @rskq_accept_tail - FIFO tail of established children
  126. * @rskq_defer_accept - User waits for some data after accept()
  127. * @syn_wait_lock - serializer
  128. *
  129. * %syn_wait_lock is necessary only to avoid proc interface having to grab the main
  130. * lock sock while browsing the listening hash (otherwise it's deadlock prone).
  131. *
  132. * This lock is acquired in read mode only from listening_get_next() seq_file
  133. * op and it's acquired in write mode _only_ from code that is actively
  134. * changing rskq_accept_head. All readers that are holding the master sock lock
  135. * don't need to grab this lock in read mode too as rskq_accept_head. writes
  136. * are always protected from the main sock lock.
  137. */
  138. struct request_sock_queue {
  139. struct request_sock *rskq_accept_head;
  140. struct request_sock *rskq_accept_tail;
  141. rwlock_t syn_wait_lock;
  142. u8 rskq_defer_accept;
  143. /* 3 bytes hole, try to pack */
  144. struct listen_sock *listen_opt;
  145. struct fastopen_queue *fastopenq; /* This is non-NULL iff TFO has been
  146. * enabled on this listener. Check
  147. * max_qlen != 0 in fastopen_queue
  148. * to determine if TFO is enabled
  149. * right at this moment.
  150. */
  151. };
  152. extern int reqsk_queue_alloc(struct request_sock_queue *queue,
  153. unsigned int nr_table_entries);
  154. extern void __reqsk_queue_destroy(struct request_sock_queue *queue);
  155. extern void reqsk_queue_destroy(struct request_sock_queue *queue);
  156. extern void reqsk_fastopen_remove(struct sock *sk,
  157. struct request_sock *req, bool reset);
  158. static inline struct request_sock *
  159. reqsk_queue_yank_acceptq(struct request_sock_queue *queue)
  160. {
  161. struct request_sock *req = queue->rskq_accept_head;
  162. queue->rskq_accept_head = NULL;
  163. return req;
  164. }
  165. static inline int reqsk_queue_empty(struct request_sock_queue *queue)
  166. {
  167. return queue->rskq_accept_head == NULL;
  168. }
  169. static inline void reqsk_queue_unlink(struct request_sock_queue *queue,
  170. struct request_sock *req,
  171. struct request_sock **prev_req)
  172. {
  173. write_lock(&queue->syn_wait_lock);
  174. *prev_req = req->dl_next;
  175. write_unlock(&queue->syn_wait_lock);
  176. }
  177. static inline void reqsk_queue_add(struct request_sock_queue *queue,
  178. struct request_sock *req,
  179. struct sock *parent,
  180. struct sock *child)
  181. {
  182. req->sk = child;
  183. sk_acceptq_added(parent);
  184. if (queue->rskq_accept_head == NULL)
  185. queue->rskq_accept_head = req;
  186. else
  187. queue->rskq_accept_tail->dl_next = req;
  188. queue->rskq_accept_tail = req;
  189. req->dl_next = NULL;
  190. }
  191. static inline struct request_sock *reqsk_queue_remove(struct request_sock_queue *queue)
  192. {
  193. struct request_sock *req = queue->rskq_accept_head;
  194. WARN_ON(req == NULL);
  195. queue->rskq_accept_head = req->dl_next;
  196. if (queue->rskq_accept_head == NULL)
  197. queue->rskq_accept_tail = NULL;
  198. return req;
  199. }
  200. static inline int reqsk_queue_removed(struct request_sock_queue *queue,
  201. struct request_sock *req)
  202. {
  203. struct listen_sock *lopt = queue->listen_opt;
  204. if (req->retrans == 0)
  205. --lopt->qlen_young;
  206. return --lopt->qlen;
  207. }
  208. static inline int reqsk_queue_added(struct request_sock_queue *queue)
  209. {
  210. struct listen_sock *lopt = queue->listen_opt;
  211. const int prev_qlen = lopt->qlen;
  212. lopt->qlen_young++;
  213. lopt->qlen++;
  214. return prev_qlen;
  215. }
  216. static inline int reqsk_queue_len(const struct request_sock_queue *queue)
  217. {
  218. return queue->listen_opt != NULL ? queue->listen_opt->qlen : 0;
  219. }
  220. static inline int reqsk_queue_len_young(const struct request_sock_queue *queue)
  221. {
  222. return queue->listen_opt->qlen_young;
  223. }
  224. static inline int reqsk_queue_is_full(const struct request_sock_queue *queue)
  225. {
  226. return queue->listen_opt->qlen >> queue->listen_opt->max_qlen_log;
  227. }
  228. static inline void reqsk_queue_hash_req(struct request_sock_queue *queue,
  229. u32 hash, struct request_sock *req,
  230. unsigned long timeout)
  231. {
  232. struct listen_sock *lopt = queue->listen_opt;
  233. req->expires = jiffies + timeout;
  234. req->retrans = 0;
  235. req->sk = NULL;
  236. req->dl_next = lopt->syn_table[hash];
  237. write_lock(&queue->syn_wait_lock);
  238. lopt->syn_table[hash] = req;
  239. write_unlock(&queue->syn_wait_lock);
  240. }
  241. #endif /* _REQUEST_SOCK_H */