blob: 634d19203e7d136682f0f3caf15070046433b4be [file] [log] [blame]
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -07001#ifndef __NET_FRAG_H__
2#define __NET_FRAG_H__
3
Pavel Emelyanovac18e752008-01-22 06:02:14 -08004struct netns_frags {
Jesper Dangaard Brouer5a7a40b2017-09-01 11:26:08 +02005 /* Keep atomic mem on separate cachelines in structs that include it */
6 atomic_t mem ____cacheline_aligned_in_smp;
Pavel Emelyanovb2fd5322008-01-22 06:09:37 -08007 /* sysctls */
8 int timeout;
Pavel Emelyanove31e0bdc72008-01-22 06:10:13 -08009 int high_thresh;
10 int low_thresh;
Nikolay Borisov0fbf4cb2016-02-15 12:11:31 +020011 int max_dist;
Pavel Emelyanovac18e752008-01-22 06:02:14 -080012};
13
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020014/**
15 * fragment queue flags
16 *
17 * @INET_FRAG_FIRST_IN: first fragment has arrived
18 * @INET_FRAG_LAST_IN: final fragment has arrived
19 * @INET_FRAG_COMPLETE: frag queue has been processed and is due for destruction
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020020 */
21enum {
22 INET_FRAG_FIRST_IN = BIT(0),
23 INET_FRAG_LAST_IN = BIT(1),
24 INET_FRAG_COMPLETE = BIT(2),
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020025};
26
27/**
28 * struct inet_frag_queue - fragment queue
29 *
30 * @lock: spinlock protecting the queue
31 * @timer: queue expiration timer
32 * @list: hash bucket list
33 * @refcnt: reference count of the queue
34 * @fragments: received fragments head
35 * @fragments_tail: received fragments tail
36 * @stamp: timestamp of the last received fragment
37 * @len: total length of the original datagram
38 * @meat: length of received fragments so far
39 * @flags: fragment queue flags
Florian Westphald6b915e2015-05-22 16:32:51 +020040 * @max_size: maximum received fragment size
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020041 * @net: namespace that this frag belongs to
Florian Westphald1fe1942015-07-23 12:05:37 +020042 * @list_evictor: list of queues to forcefully evict (e.g. due to low memory)
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020043 */
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -070044struct inet_frag_queue {
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -070045 spinlock_t lock;
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020046 struct timer_list timer;
Jesper Dangaard Brouer6e34a8b2013-01-28 23:44:49 +000047 struct hlist_node list;
48 atomic_t refcnt;
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020049 struct sk_buff *fragments;
Changli Gaod6bebca2010-06-29 04:39:37 +000050 struct sk_buff *fragments_tail;
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -070051 ktime_t stamp;
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020052 int len;
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -070053 int meat;
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020054 __u8 flags;
Patrick McHardy5f2d04f2012-08-26 19:13:55 +020055 u16 max_size;
Jesper Dangaard Brouer6e34a8b2013-01-28 23:44:49 +000056 struct netns_frags *net;
Florian Westphald1fe1942015-07-23 12:05:37 +020057 struct hlist_node list_evictor;
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -070058};
59
Jesper Dangaard Brouera4c40092013-04-25 09:52:25 +000060#define INETFRAGS_HASHSZ 1024
Pavel Emelyanov7eb95152007-10-15 02:31:52 -070061
Hannes Frederic Sowa5a3da1f2013-03-15 11:32:30 +000062/* averaged:
63 * max_depth = default ipfrag_high_thresh / INETFRAGS_HASHSZ /
64 * rounded up (SKB_TRUELEN(0) + sizeof(struct ipq or
65 * struct frag_queue))
66 */
Florian Westphalb13d3cb2014-07-24 16:50:32 +020067#define INETFRAGS_MAXDEPTH 128
Hannes Frederic Sowa5a3da1f2013-03-15 11:32:30 +000068
Jesper Dangaard Brouer19952cc42013-04-03 23:38:16 +000069struct inet_frag_bucket {
70 struct hlist_head chain;
71 spinlock_t chain_lock;
72};
73
Pavel Emelyanov7eb95152007-10-15 02:31:52 -070074struct inet_frags {
Jesper Dangaard Brouer19952cc42013-04-03 23:38:16 +000075 struct inet_frag_bucket hash[INETFRAGS_HASHSZ];
Hannes Frederic Sowa7088ad72013-10-23 11:06:57 +020076
Florian Westphalb13d3cb2014-07-24 16:50:32 +020077 struct work_struct frags_work;
78 unsigned int next_bucket;
Florian Westphale3a57d12014-07-24 16:50:35 +020079 unsigned long last_rebuild_jiffies;
80 bool rebuild;
Florian Westphalb13d3cb2014-07-24 16:50:32 +020081
Hannes Frederic Sowa7088ad72013-10-23 11:06:57 +020082 /* The first call to hashfn is responsible to initialize
83 * rnd. This is best done with net_get_random_once.
Florian Westphalab1c7242014-07-24 16:50:36 +020084 *
85 * rnd_seqlock is used to let hash insertion detect
86 * when it needs to re-lookup the hash chain to use.
Hannes Frederic Sowa7088ad72013-10-23 11:06:57 +020087 */
Jesper Dangaard Brouer5f8e1e82013-01-28 23:44:37 +000088 u32 rnd;
Florian Westphalab1c7242014-07-24 16:50:36 +020089 seqlock_t rnd_seqlock;
Jesper Dangaard Brouer5f8e1e82013-01-28 23:44:37 +000090 int qsize;
Pavel Emelyanov321a3a92007-10-15 02:38:08 -070091
Florian Westphal36c77782014-07-24 16:50:29 +020092 unsigned int (*hashfn)(const struct inet_frag_queue *);
93 bool (*match)(const struct inet_frag_queue *q,
94 const void *arg);
Pavel Emelyanovc6fda282007-10-17 19:46:47 -070095 void (*constructor)(struct inet_frag_queue *q,
Florian Westphal36c77782014-07-24 16:50:29 +020096 const void *arg);
Pavel Emelyanov1e4b8282007-10-15 02:39:14 -070097 void (*destructor)(struct inet_frag_queue *);
Pavel Emelyanove521db92007-10-17 19:45:23 -070098 void (*frag_expire)(unsigned long data);
Nikolay Aleksandrovd4ad4d22014-08-01 12:29:48 +020099 struct kmem_cache *frags_cachep;
100 const char *frags_cache_name;
Pavel Emelyanov7eb95152007-10-15 02:31:52 -0700101};
102
Nikolay Aleksandrovd4ad4d22014-08-01 12:29:48 +0200103int inet_frags_init(struct inet_frags *);
Pavel Emelyanov7eb95152007-10-15 02:31:52 -0700104void inet_frags_fini(struct inet_frags *);
105
Jesper Dangaard Brouer1bcf1872017-09-01 11:26:13 +0200106static inline void inet_frags_init_net(struct netns_frags *nf)
Eric Dumazet1d6119b2015-11-02 09:03:11 -0800107{
Jesper Dangaard Brouer5a7a40b2017-09-01 11:26:08 +0200108 atomic_set(&nf->mem, 0);
Eric Dumazet1d6119b2015-11-02 09:03:11 -0800109}
Pavel Emelyanov81566e82008-01-22 06:12:39 -0800110void inet_frags_exit_net(struct netns_frags *nf, struct inet_frags *f);
Pavel Emelyanove5a2bb82008-01-22 06:06:23 -0800111
Pavel Emelyanov277e6502007-10-15 02:37:18 -0700112void inet_frag_kill(struct inet_frag_queue *q, struct inet_frags *f);
Florian Westphal3fd588e2014-07-24 16:50:34 +0200113void inet_frag_destroy(struct inet_frag_queue *q, struct inet_frags *f);
Pavel Emelyanovac18e752008-01-22 06:02:14 -0800114struct inet_frag_queue *inet_frag_find(struct netns_frags *nf,
Florian Westphalab1c7242014-07-24 16:50:36 +0200115 struct inet_frags *f, void *key, unsigned int hash);
116
Hannes Frederic Sowa5a3da1f2013-03-15 11:32:30 +0000117void inet_frag_maybe_warn_overflow(struct inet_frag_queue *q,
118 const char *prefix);
Pavel Emelyanov277e6502007-10-15 02:37:18 -0700119
Pavel Emelyanov762cc402007-10-15 02:41:56 -0700120static inline void inet_frag_put(struct inet_frag_queue *q, struct inet_frags *f)
121{
122 if (atomic_dec_and_test(&q->refcnt))
Florian Westphal3fd588e2014-07-24 16:50:34 +0200123 inet_frag_destroy(q, f);
Pavel Emelyanov762cc402007-10-15 02:41:56 -0700124}
125
Nikolay Aleksandrovcaaecdd2015-07-23 12:05:40 +0200126static inline bool inet_frag_evicting(struct inet_frag_queue *q)
127{
128 return !hlist_unhashed(&q->list_evictor);
129}
130
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000131/* Memory Tracking Functions. */
132
133static inline int frag_mem_limit(struct netns_frags *nf)
134{
Jesper Dangaard Brouer5a7a40b2017-09-01 11:26:08 +0200135 return atomic_read(&nf->mem);
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000136}
137
Florian Westphal0e60d242015-07-23 12:05:38 +0200138static inline void sub_frag_mem_limit(struct netns_frags *nf, int i)
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000139{
Jesper Dangaard Brouer5a7a40b2017-09-01 11:26:08 +0200140 atomic_sub(i, &nf->mem);
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000141}
142
Florian Westphal0e60d242015-07-23 12:05:38 +0200143static inline void add_frag_mem_limit(struct netns_frags *nf, int i)
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000144{
Jesper Dangaard Brouer5a7a40b2017-09-01 11:26:08 +0200145 atomic_add(i, &nf->mem);
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000146}
147
Jesper Dangaard Brouer5a7a40b2017-09-01 11:26:08 +0200148static inline int sum_frag_mem_limit(struct netns_frags *nf)
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000149{
Jesper Dangaard Brouer5a7a40b2017-09-01 11:26:08 +0200150 return atomic_read(&nf->mem);
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000151}
152
Hannes Frederic Sowabe991972013-03-22 08:24:37 +0000153/* RFC 3168 support :
154 * We want to check ECN values of all fragments, do detect invalid combinations.
155 * In ipq->ecn, we store the OR value of each ip4_frag_ecn() fragment value.
156 */
157#define IPFRAG_ECN_NOT_ECT 0x01 /* one frag had ECN_NOT_ECT */
158#define IPFRAG_ECN_ECT_1 0x02 /* one frag had ECN_ECT_1 */
159#define IPFRAG_ECN_ECT_0 0x04 /* one frag had ECN_ECT_0 */
160#define IPFRAG_ECN_CE 0x08 /* one frag had ECN_CE */
161
162extern const u8 ip_frag_ecn_table[16];
163
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -0700164#endif