123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133 |
- // SPDX-License-Identifier: GPL-2.0
- #include <linux/skbuff.h>
- #include "protocol.h"
- /* Syncookies do not work for JOIN requests.
- *
- * Unlike MP_CAPABLE, where the ACK cookie contains the needed MPTCP
- * options to reconstruct the initial syn state, MP_JOIN does not contain
- * the token to obtain the mptcp socket nor the server-generated nonce
- * that was used in the cookie SYN/ACK response.
- *
- * Keep a small best effort state table to store the syn/synack data,
- * indexed by skb hash.
- *
- * A MP_JOIN SYN packet handled by syn cookies is only stored if the 32bit
- * token matches a known mptcp connection that can still accept more subflows.
- *
- * There is no timeout handling -- state is only re-constructed
- * when the TCP ACK passed the cookie validation check.
- */
- struct join_entry {
- u32 token;
- u32 remote_nonce;
- u32 local_nonce;
- u8 join_id;
- u8 local_id;
- u8 backup;
- u8 valid;
- };
- #define COOKIE_JOIN_SLOTS 1024
- static struct join_entry join_entries[COOKIE_JOIN_SLOTS] __cacheline_aligned_in_smp;
- static spinlock_t join_entry_locks[COOKIE_JOIN_SLOTS] __cacheline_aligned_in_smp;
- static u32 mptcp_join_entry_hash(struct sk_buff *skb, struct net *net)
- {
- static u32 mptcp_join_hash_secret __read_mostly;
- struct tcphdr *th = tcp_hdr(skb);
- u32 seq, i;
- net_get_random_once(&mptcp_join_hash_secret,
- sizeof(mptcp_join_hash_secret));
- if (th->syn)
- seq = TCP_SKB_CB(skb)->seq;
- else
- seq = TCP_SKB_CB(skb)->seq - 1;
- i = jhash_3words(seq, net_hash_mix(net),
- (__force __u32)th->source << 16 | (__force __u32)th->dest,
- mptcp_join_hash_secret);
- return i % ARRAY_SIZE(join_entries);
- }
- static void mptcp_join_store_state(struct join_entry *entry,
- const struct mptcp_subflow_request_sock *subflow_req)
- {
- entry->token = subflow_req->token;
- entry->remote_nonce = subflow_req->remote_nonce;
- entry->local_nonce = subflow_req->local_nonce;
- entry->backup = subflow_req->backup;
- entry->join_id = subflow_req->remote_id;
- entry->local_id = subflow_req->local_id;
- entry->valid = 1;
- }
- void subflow_init_req_cookie_join_save(const struct mptcp_subflow_request_sock *subflow_req,
- struct sk_buff *skb)
- {
- struct net *net = read_pnet(&subflow_req->sk.req.ireq_net);
- u32 i = mptcp_join_entry_hash(skb, net);
- /* No use in waiting if other cpu is already using this slot --
- * would overwrite the data that got stored.
- */
- spin_lock_bh(&join_entry_locks[i]);
- mptcp_join_store_state(&join_entries[i], subflow_req);
- spin_unlock_bh(&join_entry_locks[i]);
- }
- /* Called for a cookie-ack with MP_JOIN option present.
- * Look up the saved state based on skb hash & check token matches msk
- * in same netns.
- *
- * Caller will check msk can still accept another subflow. The hmac
- * present in the cookie ACK mptcp option space will be checked later.
- */
- bool mptcp_token_join_cookie_init_state(struct mptcp_subflow_request_sock *subflow_req,
- struct sk_buff *skb)
- {
- struct net *net = read_pnet(&subflow_req->sk.req.ireq_net);
- u32 i = mptcp_join_entry_hash(skb, net);
- struct mptcp_sock *msk;
- struct join_entry *e;
- e = &join_entries[i];
- spin_lock_bh(&join_entry_locks[i]);
- if (e->valid == 0) {
- spin_unlock_bh(&join_entry_locks[i]);
- return false;
- }
- e->valid = 0;
- msk = mptcp_token_get_sock(net, e->token);
- if (!msk) {
- spin_unlock_bh(&join_entry_locks[i]);
- return false;
- }
- subflow_req->remote_nonce = e->remote_nonce;
- subflow_req->local_nonce = e->local_nonce;
- subflow_req->backup = e->backup;
- subflow_req->remote_id = e->join_id;
- subflow_req->token = e->token;
- subflow_req->msk = msk;
- spin_unlock_bh(&join_entry_locks[i]);
- return true;
- }
- void __init mptcp_join_cookie_init(void)
- {
- int i;
- for (i = 0; i < COOKIE_JOIN_SLOTS; i++)
- spin_lock_init(&join_entry_locks[i]);
- }
|