request_sock.h 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. /*
  2. * NET Generic infrastructure for Network protocols.
  3. *
  4. * Definitions for request_sock
  5. *
  6. * Authors: Arnaldo Carvalho de Melo <acme@conectiva.com.br>
  7. *
  8. * From code originally in include/net/tcp.h
  9. *
  10. * This program is free software; you can redistribute it and/or
  11. * modify it under the terms of the GNU General Public License
  12. * as published by the Free Software Foundation; either version
  13. * 2 of the License, or (at your option) any later version.
  14. */
  15. #ifndef _REQUEST_SOCK_H
  16. #define _REQUEST_SOCK_H
  17. #include <linux/slab.h>
  18. #include <linux/spinlock.h>
  19. #include <linux/types.h>
  20. #include <linux/bug.h>
  21. #include <linux/refcount.h>
  22. #include <net/sock.h>
  23. struct request_sock;
  24. struct sk_buff;
  25. struct dst_entry;
  26. struct proto;
  27. struct request_sock_ops {
  28. int family;
  29. unsigned int obj_size;
  30. struct kmem_cache *slab;
  31. char *slab_name;
  32. int (*rtx_syn_ack)(const struct sock *sk,
  33. struct request_sock *req);
  34. void (*send_ack)(const struct sock *sk, struct sk_buff *skb,
  35. struct request_sock *req);
  36. void (*send_reset)(const struct sock *sk,
  37. struct sk_buff *skb);
  38. void (*destructor)(struct request_sock *req);
  39. void (*syn_ack_timeout)(const struct request_sock *req);
  40. };
  41. int inet_rtx_syn_ack(const struct sock *parent, struct request_sock *req);
  42. /* struct request_sock - mini sock to represent a connection request
  43. */
  44. struct request_sock {
  45. struct sock_common __req_common;
  46. #define rsk_refcnt __req_common.skc_refcnt
  47. #define rsk_hash __req_common.skc_hash
  48. #define rsk_listener __req_common.skc_listener
  49. #define rsk_window_clamp __req_common.skc_window_clamp
  50. #define rsk_rcv_wnd __req_common.skc_rcv_wnd
  51. struct request_sock *dl_next;
  52. u16 mss;
  53. u8 num_retrans; /* number of retransmits */
  54. u8 cookie_ts:1; /* syncookie: encode tcpopts in timestamp */
  55. u8 num_timeout:7; /* number of timeouts */
  56. u32 ts_recent;
  57. struct timer_list rsk_timer;
  58. const struct request_sock_ops *rsk_ops;
  59. struct sock *sk;
  60. u32 *saved_syn;
  61. u32 secid;
  62. u32 peer_secid;
  63. };
  64. static inline struct request_sock *inet_reqsk(const struct sock *sk)
  65. {
  66. return (struct request_sock *)sk;
  67. }
  68. static inline struct sock *req_to_sk(struct request_sock *req)
  69. {
  70. return (struct sock *)req;
  71. }
  72. static inline struct request_sock *
  73. reqsk_alloc(const struct request_sock_ops *ops, struct sock *sk_listener,
  74. bool attach_listener)
  75. {
  76. struct request_sock *req;
  77. req = kmem_cache_alloc(ops->slab, GFP_ATOMIC | __GFP_NOWARN);
  78. if (!req)
  79. return NULL;
  80. req->rsk_listener = NULL;
  81. if (attach_listener) {
  82. if (unlikely(!refcount_inc_not_zero(&sk_listener->sk_refcnt))) {
  83. kmem_cache_free(ops->slab, req);
  84. return NULL;
  85. }
  86. req->rsk_listener = sk_listener;
  87. }
  88. req->rsk_ops = ops;
  89. req_to_sk(req)->sk_prot = sk_listener->sk_prot;
  90. sk_node_init(&req_to_sk(req)->sk_node);
  91. sk_tx_queue_clear(req_to_sk(req));
  92. req->saved_syn = NULL;
  93. refcount_set(&req->rsk_refcnt, 0);
  94. return req;
  95. }
  96. static inline void reqsk_free(struct request_sock *req)
  97. {
  98. /* temporary debugging */
  99. WARN_ON_ONCE(refcount_read(&req->rsk_refcnt) != 0);
  100. req->rsk_ops->destructor(req);
  101. if (req->rsk_listener)
  102. sock_put(req->rsk_listener);
  103. kfree(req->saved_syn);
  104. kmem_cache_free(req->rsk_ops->slab, req);
  105. }
  106. static inline void reqsk_put(struct request_sock *req)
  107. {
  108. if (refcount_dec_and_test(&req->rsk_refcnt))
  109. reqsk_free(req);
  110. }
  111. /*
  112. * For a TCP Fast Open listener -
  113. * lock - protects the access to all the reqsk, which is co-owned by
  114. * the listener and the child socket.
  115. * qlen - pending TFO requests (still in TCP_SYN_RECV).
  116. * max_qlen - max TFO reqs allowed before TFO is disabled.
  117. *
  118. * XXX (TFO) - ideally these fields can be made as part of "listen_sock"
  119. * structure above. But there is some implementation difficulty due to
  120. * listen_sock being part of request_sock_queue hence will be freed when
  121. * a listener is stopped. But TFO related fields may continue to be
  122. * accessed even after a listener is closed, until its sk_refcnt drops
  123. * to 0 implying no more outstanding TFO reqs. One solution is to keep
  124. * listen_opt around until sk_refcnt drops to 0. But there is some other
  125. * complexity that needs to be resolved. E.g., a listener can be disabled
  126. * temporarily through shutdown()->tcp_disconnect(), and re-enabled later.
  127. */
  128. struct fastopen_queue {
  129. struct request_sock *rskq_rst_head; /* Keep track of past TFO */
  130. struct request_sock *rskq_rst_tail; /* requests that caused RST.
  131. * This is part of the defense
  132. * against spoofing attack.
  133. */
  134. spinlock_t lock;
  135. int qlen; /* # of pending (TCP_SYN_RECV) reqs */
  136. int max_qlen; /* != 0 iff TFO is currently enabled */
  137. struct tcp_fastopen_context __rcu *ctx; /* cipher context for cookie */
  138. };
  139. /** struct request_sock_queue - queue of request_socks
  140. *
  141. * @rskq_accept_head - FIFO head of established children
  142. * @rskq_accept_tail - FIFO tail of established children
  143. * @rskq_defer_accept - User waits for some data after accept()
  144. *
  145. */
  146. struct request_sock_queue {
  147. spinlock_t rskq_lock;
  148. u8 rskq_defer_accept;
  149. u32 synflood_warned;
  150. atomic_t qlen;
  151. atomic_t young;
  152. struct request_sock *rskq_accept_head;
  153. struct request_sock *rskq_accept_tail;
  154. struct fastopen_queue fastopenq; /* Check max_qlen != 0 to determine
  155. * if TFO is enabled.
  156. */
  157. };
  158. void reqsk_queue_alloc(struct request_sock_queue *queue);
  159. void reqsk_fastopen_remove(struct sock *sk, struct request_sock *req,
  160. bool reset);
  161. static inline bool reqsk_queue_empty(const struct request_sock_queue *queue)
  162. {
  163. return READ_ONCE(queue->rskq_accept_head) == NULL;
  164. }
  165. static inline struct request_sock *reqsk_queue_remove(struct request_sock_queue *queue,
  166. struct sock *parent)
  167. {
  168. struct request_sock *req;
  169. spin_lock_bh(&queue->rskq_lock);
  170. req = queue->rskq_accept_head;
  171. if (req) {
  172. sk_acceptq_removed(parent);
  173. WRITE_ONCE(queue->rskq_accept_head, req->dl_next);
  174. if (queue->rskq_accept_head == NULL)
  175. queue->rskq_accept_tail = NULL;
  176. }
  177. spin_unlock_bh(&queue->rskq_lock);
  178. return req;
  179. }
  180. static inline void reqsk_queue_removed(struct request_sock_queue *queue,
  181. const struct request_sock *req)
  182. {
  183. if (req->num_timeout == 0)
  184. atomic_dec(&queue->young);
  185. atomic_dec(&queue->qlen);
  186. }
  187. static inline void reqsk_queue_added(struct request_sock_queue *queue)
  188. {
  189. atomic_inc(&queue->young);
  190. atomic_inc(&queue->qlen);
  191. }
  192. static inline int reqsk_queue_len(const struct request_sock_queue *queue)
  193. {
  194. return atomic_read(&queue->qlen);
  195. }
  196. static inline int reqsk_queue_len_young(const struct request_sock_queue *queue)
  197. {
  198. return atomic_read(&queue->young);
  199. }
  200. #endif /* _REQUEST_SOCK_H */