blob: f4272a29dc445ec9745b943578f8288bf92a2e8e [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -07002#ifndef __NET_FRAG_H__
3#define __NET_FRAG_H__
4
NeilBrown0eb71a92018-06-18 12:52:50 +10005#include <linux/rhashtable-types.h>
Eric Dumazet648700f2018-03-31 12:58:49 -07006
Pavel Emelyanovac18e752008-01-22 06:02:14 -08007struct netns_frags {
Pavel Emelyanovb2fd5322008-01-22 06:09:37 -08008 /* sysctls */
Eric Dumazet3e67f102018-03-31 12:58:53 -07009 long high_thresh;
10 long low_thresh;
Pavel Emelyanovb2fd5322008-01-22 06:09:37 -080011 int timeout;
Nikolay Borisov0fbf4cb2016-02-15 12:11:31 +020012 int max_dist;
Eric Dumazet093ba722018-03-31 12:58:44 -070013 struct inet_frags *f;
Eric Dumazetc2615cf2018-03-31 12:58:57 -070014
15 struct rhashtable rhashtable ____cacheline_aligned_in_smp;
16
17 /* Keep atomic mem on separate cachelines in structs that include it */
18 atomic_long_t mem ____cacheline_aligned_in_smp;
Pavel Emelyanovac18e752008-01-22 06:02:14 -080019};
20
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020021/**
22 * fragment queue flags
23 *
24 * @INET_FRAG_FIRST_IN: first fragment has arrived
25 * @INET_FRAG_LAST_IN: final fragment has arrived
26 * @INET_FRAG_COMPLETE: frag queue has been processed and is due for destruction
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020027 */
28enum {
29 INET_FRAG_FIRST_IN = BIT(0),
30 INET_FRAG_LAST_IN = BIT(1),
31 INET_FRAG_COMPLETE = BIT(2),
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020032};
33
Eric Dumazet648700f2018-03-31 12:58:49 -070034struct frag_v4_compare_key {
35 __be32 saddr;
36 __be32 daddr;
37 u32 user;
38 u32 vif;
39 __be16 id;
40 u16 protocol;
41};
42
43struct frag_v6_compare_key {
44 struct in6_addr saddr;
45 struct in6_addr daddr;
46 u32 user;
47 __be32 id;
48 u32 iif;
49};
50
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020051/**
52 * struct inet_frag_queue - fragment queue
53 *
Eric Dumazet648700f2018-03-31 12:58:49 -070054 * @node: rhash node
55 * @key: keys identifying this frag.
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020056 * @timer: queue expiration timer
Eric Dumazet648700f2018-03-31 12:58:49 -070057 * @lock: spinlock protecting this frag
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020058 * @refcnt: reference count of the queue
59 * @fragments: received fragments head
60 * @fragments_tail: received fragments tail
61 * @stamp: timestamp of the last received fragment
62 * @len: total length of the original datagram
63 * @meat: length of received fragments so far
64 * @flags: fragment queue flags
Florian Westphald6b915e2015-05-22 16:32:51 +020065 * @max_size: maximum received fragment size
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020066 * @net: namespace that this frag belongs to
Eric Dumazet648700f2018-03-31 12:58:49 -070067 * @rcu: rcu head for freeing deferall
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020068 */
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -070069struct inet_frag_queue {
Eric Dumazet648700f2018-03-31 12:58:49 -070070 struct rhash_head node;
71 union {
72 struct frag_v4_compare_key v4;
73 struct frag_v6_compare_key v6;
74 } key;
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020075 struct timer_list timer;
Eric Dumazet648700f2018-03-31 12:58:49 -070076 spinlock_t lock;
Reshetova, Elenaedcb6912017-06-30 13:08:07 +030077 refcount_t refcnt;
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020078 struct sk_buff *fragments;
Changli Gaod6bebca2010-06-29 04:39:37 +000079 struct sk_buff *fragments_tail;
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -070080 ktime_t stamp;
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020081 int len;
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -070082 int meat;
Nikolay Aleksandrov1ab19342014-08-01 12:29:45 +020083 __u8 flags;
Patrick McHardy5f2d04f2012-08-26 19:13:55 +020084 u16 max_size;
Eric Dumazet648700f2018-03-31 12:58:49 -070085 struct netns_frags *net;
86 struct rcu_head rcu;
Jesper Dangaard Brouer19952cc2013-04-03 23:38:16 +000087};
88
Pavel Emelyanov7eb95152007-10-15 02:31:52 -070089struct inet_frags {
Alexey Dobriyan4c0ebd62017-05-23 00:20:26 +030090 unsigned int qsize;
Pavel Emelyanov321a3a92007-10-15 02:38:08 -070091
Pavel Emelyanovc6fda282007-10-17 19:46:47 -070092 void (*constructor)(struct inet_frag_queue *q,
Florian Westphal36c77782014-07-24 16:50:29 +020093 const void *arg);
Pavel Emelyanov1e4b8282007-10-15 02:39:14 -070094 void (*destructor)(struct inet_frag_queue *);
Kees Cook78802012017-10-16 17:29:20 -070095 void (*frag_expire)(struct timer_list *t);
Nikolay Aleksandrovd4ad4d22014-08-01 12:29:48 +020096 struct kmem_cache *frags_cachep;
97 const char *frags_cache_name;
Eric Dumazet648700f2018-03-31 12:58:49 -070098 struct rhashtable_params rhash_params;
Pavel Emelyanov7eb95152007-10-15 02:31:52 -070099};
100
Nikolay Aleksandrovd4ad4d22014-08-01 12:29:48 +0200101int inet_frags_init(struct inet_frags *);
Pavel Emelyanov7eb95152007-10-15 02:31:52 -0700102void inet_frags_fini(struct inet_frags *);
103
Eric Dumazet787bea72018-03-31 12:58:43 -0700104static inline int inet_frags_init_net(struct netns_frags *nf)
Eric Dumazet1d6119b2015-11-02 09:03:11 -0800105{
Eric Dumazet3e67f102018-03-31 12:58:53 -0700106 atomic_long_set(&nf->mem, 0);
Eric Dumazet648700f2018-03-31 12:58:49 -0700107 return rhashtable_init(&nf->rhashtable, &nf->f->rhash_params);
Eric Dumazet1d6119b2015-11-02 09:03:11 -0800108}
Eric Dumazet093ba722018-03-31 12:58:44 -0700109void inet_frags_exit_net(struct netns_frags *nf);
Pavel Emelyanove5a2bb82008-01-22 06:06:23 -0800110
Eric Dumazet093ba722018-03-31 12:58:44 -0700111void inet_frag_kill(struct inet_frag_queue *q);
112void inet_frag_destroy(struct inet_frag_queue *q);
Eric Dumazet648700f2018-03-31 12:58:49 -0700113struct inet_frag_queue *inet_frag_find(struct netns_frags *nf, void *key);
Pavel Emelyanov277e6502007-10-15 02:37:18 -0700114
Eric Dumazet093ba722018-03-31 12:58:44 -0700115static inline void inet_frag_put(struct inet_frag_queue *q)
Pavel Emelyanov762cc402007-10-15 02:41:56 -0700116{
Reshetova, Elenaedcb6912017-06-30 13:08:07 +0300117 if (refcount_dec_and_test(&q->refcnt))
Eric Dumazet093ba722018-03-31 12:58:44 -0700118 inet_frag_destroy(q);
Pavel Emelyanov762cc402007-10-15 02:41:56 -0700119}
120
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000121/* Memory Tracking Functions. */
122
Eric Dumazet3e67f102018-03-31 12:58:53 -0700123static inline long frag_mem_limit(const struct netns_frags *nf)
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000124{
Eric Dumazet3e67f102018-03-31 12:58:53 -0700125 return atomic_long_read(&nf->mem);
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000126}
127
Eric Dumazet3e67f102018-03-31 12:58:53 -0700128static inline void sub_frag_mem_limit(struct netns_frags *nf, long val)
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000129{
Eric Dumazet3e67f102018-03-31 12:58:53 -0700130 atomic_long_sub(val, &nf->mem);
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000131}
132
Eric Dumazet3e67f102018-03-31 12:58:53 -0700133static inline void add_frag_mem_limit(struct netns_frags *nf, long val)
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000134{
Eric Dumazet3e67f102018-03-31 12:58:53 -0700135 atomic_long_add(val, &nf->mem);
Jesper Dangaard Brouerd4336732013-01-28 23:45:12 +0000136}
137
Hannes Frederic Sowabe991972013-03-22 08:24:37 +0000138/* RFC 3168 support :
139 * We want to check ECN values of all fragments, do detect invalid combinations.
140 * In ipq->ecn, we store the OR value of each ip4_frag_ecn() fragment value.
141 */
142#define IPFRAG_ECN_NOT_ECT 0x01 /* one frag had ECN_NOT_ECT */
143#define IPFRAG_ECN_ECT_1 0x02 /* one frag had ECN_ECT_1 */
144#define IPFRAG_ECN_ECT_0 0x04 /* one frag had ECN_ECT_0 */
145#define IPFRAG_ECN_CE 0x08 /* one frag had ECN_CE */
146
147extern const u8 ip_frag_ecn_table[16];
148
Pavel Emelyanov5ab11c92007-10-15 02:24:19 -0700149#endif