Received: by 2002:ac0:8c9a:0:0:0:0:0 with SMTP id r26csp3645894ima; Mon, 4 Feb 2019 02:44:27 -0800 (PST) X-Google-Smtp-Source: ALg8bN4mzmqSvQcsEN/4JIGufQzCUTC0ypU48q1LwJGHbk/R5uckpqe/P293f6XJ6U48JiHus6oS X-Received: by 2002:a65:41c2:: with SMTP id b2mr45369377pgq.67.1549277067714; Mon, 04 Feb 2019 02:44:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549277067; cv=none; d=google.com; s=arc-20160816; b=bpwciZviilw61PtIO6ixQ+Bjoj46llHuCPQWqG6FzYlK9sjymcvfEia0oOhKxCZFf7 14Rn4w5kWFGiqG4ZThdccxOrgugEI9ftbtb4Sm4GdVN/rZefE1L0fJEsjOLPRkCCVb6n nxtXbEVLStfkQKVXCBmq/X+D/0zHUGEciwkmt/t1jYO9mZL8hJ7tonhEe9XkdVtWTuVF LBo8gDVKjJyFzMprFHmuU25cnFh1H2kMMFaDqA5tfQsVOZs9gBgqCUnwMjuftNFj3XrP ArLcdMm77z04sOZ3+BZqvhmc/9BlDbpX10dAWylqLLT/AhLlHyABfWkwR1s7DlxpS7Se PUjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=DCGNpgOvzXZ0ddkg4ADKF80eIN/sdtGdzT6cdwoL0+A=; b=yCcdBoQ/gJip3g2zg8uRieQ2oFhTpzON84oWYuVRh2ljHZ54YPVkRqYj8P8qCwjQb3 N2FDmZ4GKLyjQs7jHtTEJR8or+T95YVGqgztBZvYwFtyAhh4E6sJvnpy37WcHOkCEwfl gkIQ2+8cNEzMM5NbEHUQth+blC/Zxsi7iW99MLyZjw0ORQJsgrKfge8aPFQIdyDJT6TO jHyjO86xUuw45GzF2cQu/TNEP6QiyrZQmVhDK+yfc+RIw7oLGUNldfI4VKgjBmdC/YRp TVv5ocAQUpC6MCfAti6g6VgeaFModB3ijmJcOXPfIbd30BGm7NmsyPKXRhQoBdSJ9UYY BXKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Et3IO5J1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o10si15431551pgg.373.2019.02.04.02.44.11; Mon, 04 Feb 2019 02:44:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Et3IO5J1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730443AbfBDKl7 (ORCPT + 99 others); Mon, 4 Feb 2019 05:41:59 -0500 Received: from mail.kernel.org ([198.145.29.99]:39884 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730420AbfBDKl6 (ORCPT ); Mon, 4 Feb 2019 05:41:58 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 39DAF217D6; Mon, 4 Feb 2019 10:41:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549276916; bh=SbD1Vd2x9aPmmYEoWXpjhJIx1pmoocUS0gfDC98yLEk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Et3IO5J1lI32OeAxjFYQGXmGBhwvYMmKG9shQyfvigeM2hCBReiqjg8dOLsY+MbSL 85qHk58lQvqz4KMRvG/QIgfSlWHpqtfUPXDdOa69PHJ+/1ueo69R83iHowNl2yua9e Njm+QUnr6wzAHvkDjiTWI0sVzTJs7iBb37wbVt/o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , "David S. Miller" , Mao Wenan Subject: [PATCH 4.4 58/65] inet: frags: get rif of inet_frag_evicting() Date: Mon, 4 Feb 2019 11:36:51 +0100 Message-Id: <20190204103620.032469364@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190204103610.583715954@linuxfoundation.org> References: <20190204103610.583715954@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric Dumazet commit 399d1404be660d355192ff4df5ccc3f4159ec1e4 upstream. This refactors ip_expire() since one indentation level is removed. Note: in the future, we should try hard to avoid the skb_clone() since this is a serious performance cost. Under DDOS, the ICMP message wont be sent because of rate limits. Fact that ip6_expire_frag_queue() does not use skb_clone() is disturbing too. Presumably IPv6 should have the same issue than the one we fixed in commit ec4fbd64751d ("inet: frag: release spinlock before calling icmp_send()") Signed-off-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Mao Wenan Signed-off-by: Greg Kroah-Hartman --- include/net/inet_frag.h | 5 --- net/ipv4/ip_fragment.c | 66 +++++++++++++++++++++++------------------------- net/ipv6/reassembly.c | 4 -- 3 files changed, 32 insertions(+), 43 deletions(-) --- a/include/net/inet_frag.h +++ b/include/net/inet_frag.h @@ -123,11 +123,6 @@ static inline void inet_frag_put(struct inet_frag_destroy(q, f); } -static inline bool inet_frag_evicting(struct inet_frag_queue *q) -{ - return !hlist_unhashed(&q->list_evictor); -} - /* Memory Tracking Functions. */ static inline int frag_mem_limit(struct netns_frags *nf) --- a/net/ipv4/ip_fragment.c +++ b/net/ipv4/ip_fragment.c @@ -194,8 +194,11 @@ static bool frag_expire_skip_icmp(u32 us */ static void ip_expire(unsigned long arg) { - struct ipq *qp; + struct sk_buff *clone, *head; + const struct iphdr *iph; struct net *net; + struct ipq *qp; + int err; qp = container_of((struct inet_frag_queue *) arg, struct ipq, q); net = container_of(qp->q.net, struct net, ipv4.frags); @@ -209,45 +212,40 @@ static void ip_expire(unsigned long arg) ipq_kill(qp); IP_INC_STATS_BH(net, IPSTATS_MIB_REASMFAILS); - if (!inet_frag_evicting(&qp->q)) { - struct sk_buff *clone, *head = qp->q.fragments; - const struct iphdr *iph; - int err; - - IP_INC_STATS_BH(net, IPSTATS_MIB_REASMTIMEOUT); + head = qp->q.fragments; - if (!(qp->q.flags & INET_FRAG_FIRST_IN) || !qp->q.fragments) - goto out; + IP_INC_STATS_BH(net, IPSTATS_MIB_REASMTIMEOUT); - head->dev = dev_get_by_index_rcu(net, qp->iif); - if (!head->dev) - goto out; + if (!(qp->q.flags & INET_FRAG_FIRST_IN) || !head) + goto out; + head->dev = dev_get_by_index_rcu(net, qp->iif); + if (!head->dev) + goto out; - /* skb has no dst, perform route lookup again */ - iph = ip_hdr(head); - err = ip_route_input_noref(head, iph->daddr, iph->saddr, + /* skb has no dst, perform route lookup again */ + iph = ip_hdr(head); + err = ip_route_input_noref(head, iph->daddr, iph->saddr, iph->tos, head->dev); - if (err) - goto out; + if (err) + goto out; + + /* Only an end host needs to send an ICMP + * "Fragment Reassembly Timeout" message, per RFC792. + */ + if (frag_expire_skip_icmp(qp->user) && + (skb_rtable(head)->rt_type != RTN_LOCAL)) + goto out; + + clone = skb_clone(head, GFP_ATOMIC); - /* Only an end host needs to send an ICMP - * "Fragment Reassembly Timeout" message, per RFC792. - */ - if (frag_expire_skip_icmp(qp->user) && - (skb_rtable(head)->rt_type != RTN_LOCAL)) - goto out; - - clone = skb_clone(head, GFP_ATOMIC); - - /* Send an ICMP "Fragment Reassembly Timeout" message. */ - if (clone) { - spin_unlock(&qp->q.lock); - icmp_send(clone, ICMP_TIME_EXCEEDED, - ICMP_EXC_FRAGTIME, 0); - consume_skb(clone); - goto out_rcu_unlock; - } + /* Send an ICMP "Fragment Reassembly Timeout" message. */ + if (clone) { + spin_unlock(&qp->q.lock); + icmp_send(clone, ICMP_TIME_EXCEEDED, + ICMP_EXC_FRAGTIME, 0); + consume_skb(clone); + goto out_rcu_unlock; } out: spin_unlock(&qp->q.lock); --- a/net/ipv6/reassembly.c +++ b/net/ipv6/reassembly.c @@ -146,10 +146,6 @@ void ip6_expire_frag_queue(struct net *n goto out_rcu_unlock; IP6_INC_STATS_BH(net, __in6_dev_get(dev), IPSTATS_MIB_REASMFAILS); - - if (inet_frag_evicting(&fq->q)) - goto out_rcu_unlock; - IP6_INC_STATS_BH(net, __in6_dev_get(dev), IPSTATS_MIB_REASMTIMEOUT); /* Don't send error if the first segment did not arrive. */