Commit 0e119b41 authored by David Howells's avatar David Howells Committed by David S. Miller

rxrpc: Limit the listening backlog

Limit the socket incoming call backlog queue size so that a remote client
can't pump in sufficient new calls that the server runs out of memory.  Note
that this is partially theoretical at the moment since whilst the number of
calls is limited, the number of packets trying to set up new calls is not.
This will be addressed in a later patch.

If the caller of listen() specifies a backlog INT_MAX, then they get the
current maximum; anything else greater than max_backlog or anything
negative incurs EINVAL.

The limit on the maximum queue size can be set by:

	echo N >/proc/sys/net/rxrpc/max_backlog

where 4<=N<=32.

Further, set the default backlog to 0, requiring listen() to be called
before we start actually queueing new calls.  Whilst this kind of is a
change in the UAPI, the caller can't actually *accept* new calls anyway
unless they've first called listen() to put the socket into the LISTENING
state - thus the aforementioned new calls would otherwise just sit there,
eating up kernel memory.  (Note that sockets that don't have a non-zero
service ID bound don't get incoming calls anyway.)

Given that the default backlog is now 0, make the AFS filesystem call
kernel_listen() to set the maximum backlog for itself.

Possible improvements include:

 (1) Trimming a too-large backlog to max_backlog when listen is called.

 (2) Trimming the backlog value whenever the value is used so that changes
     to max_backlog are applied to an open socket automatically.  Note that
     the AFS filesystem opens one socket and keeps it open for extended
     periods, so would miss out on changes to max_backlog.

 (3) Having a separate setting for the AFS filesystem.
Signed-off-by: default avatarDavid Howells <dhowells@redhat.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent bc6e1ea3
...@@ -85,18 +85,14 @@ int afs_open_socket(void) ...@@ -85,18 +85,14 @@ int afs_open_socket(void)
skb_queue_head_init(&afs_incoming_calls); skb_queue_head_init(&afs_incoming_calls);
ret = -ENOMEM;
afs_async_calls = create_singlethread_workqueue("kafsd"); afs_async_calls = create_singlethread_workqueue("kafsd");
if (!afs_async_calls) { if (!afs_async_calls)
_leave(" = -ENOMEM [wq]"); goto error_0;
return -ENOMEM;
}
ret = sock_create_kern(&init_net, AF_RXRPC, SOCK_DGRAM, PF_INET, &socket); ret = sock_create_kern(&init_net, AF_RXRPC, SOCK_DGRAM, PF_INET, &socket);
if (ret < 0) { if (ret < 0)
destroy_workqueue(afs_async_calls); goto error_1;
_leave(" = %d [socket]", ret);
return ret;
}
socket->sk->sk_allocation = GFP_NOFS; socket->sk->sk_allocation = GFP_NOFS;
...@@ -111,18 +107,26 @@ int afs_open_socket(void) ...@@ -111,18 +107,26 @@ int afs_open_socket(void)
sizeof(srx.transport.sin.sin_addr)); sizeof(srx.transport.sin.sin_addr));
ret = kernel_bind(socket, (struct sockaddr *) &srx, sizeof(srx)); ret = kernel_bind(socket, (struct sockaddr *) &srx, sizeof(srx));
if (ret < 0) { if (ret < 0)
sock_release(socket); goto error_2;
destroy_workqueue(afs_async_calls);
_leave(" = %d [bind]", ret); ret = kernel_listen(socket, INT_MAX);
return ret; if (ret < 0)
} goto error_2;
rxrpc_kernel_intercept_rx_messages(socket, afs_rx_interceptor); rxrpc_kernel_intercept_rx_messages(socket, afs_rx_interceptor);
afs_socket = socket; afs_socket = socket;
_leave(" = 0"); _leave(" = 0");
return 0; return 0;
error_2:
sock_release(socket);
error_1:
destroy_workqueue(afs_async_calls);
error_0:
_leave(" = %d", ret);
return ret;
} }
/* /*
......
...@@ -33,8 +33,6 @@ unsigned int rxrpc_debug; // = RXRPC_DEBUG_KPROTO; ...@@ -33,8 +33,6 @@ unsigned int rxrpc_debug; // = RXRPC_DEBUG_KPROTO;
module_param_named(debug, rxrpc_debug, uint, S_IWUSR | S_IRUGO); module_param_named(debug, rxrpc_debug, uint, S_IWUSR | S_IRUGO);
MODULE_PARM_DESC(debug, "RxRPC debugging mask"); MODULE_PARM_DESC(debug, "RxRPC debugging mask");
static int sysctl_rxrpc_max_qlen __read_mostly = 10;
static struct proto rxrpc_proto; static struct proto rxrpc_proto;
static const struct proto_ops rxrpc_rpc_ops; static const struct proto_ops rxrpc_rpc_ops;
...@@ -191,6 +189,7 @@ static int rxrpc_listen(struct socket *sock, int backlog) ...@@ -191,6 +189,7 @@ static int rxrpc_listen(struct socket *sock, int backlog)
{ {
struct sock *sk = sock->sk; struct sock *sk = sock->sk;
struct rxrpc_sock *rx = rxrpc_sk(sk); struct rxrpc_sock *rx = rxrpc_sk(sk);
unsigned int max;
int ret; int ret;
_enter("%p,%d", rx, backlog); _enter("%p,%d", rx, backlog);
...@@ -201,17 +200,21 @@ static int rxrpc_listen(struct socket *sock, int backlog) ...@@ -201,17 +200,21 @@ static int rxrpc_listen(struct socket *sock, int backlog)
case RXRPC_UNBOUND: case RXRPC_UNBOUND:
ret = -EADDRNOTAVAIL; ret = -EADDRNOTAVAIL;
break; break;
case RXRPC_CLIENT_UNBOUND:
case RXRPC_CLIENT_BOUND:
default:
ret = -EBUSY;
break;
case RXRPC_SERVER_BOUND: case RXRPC_SERVER_BOUND:
ASSERT(rx->local != NULL); ASSERT(rx->local != NULL);
max = READ_ONCE(rxrpc_max_backlog);
ret = -EINVAL;
if (backlog == INT_MAX)
backlog = max;
else if (backlog < 0 || backlog > max)
break;
sk->sk_max_ack_backlog = backlog; sk->sk_max_ack_backlog = backlog;
rx->sk.sk_state = RXRPC_SERVER_LISTENING; rx->sk.sk_state = RXRPC_SERVER_LISTENING;
ret = 0; ret = 0;
break; break;
default:
ret = -EBUSY;
break;
} }
release_sock(&rx->sk); release_sock(&rx->sk);
...@@ -591,7 +594,7 @@ static int rxrpc_create(struct net *net, struct socket *sock, int protocol, ...@@ -591,7 +594,7 @@ static int rxrpc_create(struct net *net, struct socket *sock, int protocol,
sock_init_data(sock, sk); sock_init_data(sock, sk);
sk->sk_state = RXRPC_UNBOUND; sk->sk_state = RXRPC_UNBOUND;
sk->sk_write_space = rxrpc_write_space; sk->sk_write_space = rxrpc_write_space;
sk->sk_max_ack_backlog = sysctl_rxrpc_max_qlen; sk->sk_max_ack_backlog = 0;
sk->sk_destruct = rxrpc_sock_destructor; sk->sk_destruct = rxrpc_sock_destructor;
rx = rxrpc_sk(sk); rx = rxrpc_sk(sk);
......
...@@ -641,6 +641,7 @@ extern const struct rxrpc_security rxrpc_no_security; ...@@ -641,6 +641,7 @@ extern const struct rxrpc_security rxrpc_no_security;
/* /*
* misc.c * misc.c
*/ */
extern unsigned int rxrpc_max_backlog __read_mostly;
extern unsigned int rxrpc_requested_ack_delay; extern unsigned int rxrpc_requested_ack_delay;
extern unsigned int rxrpc_soft_ack_delay; extern unsigned int rxrpc_soft_ack_delay;
extern unsigned int rxrpc_idle_ack_delay; extern unsigned int rxrpc_idle_ack_delay;
......
...@@ -14,6 +14,12 @@ ...@@ -14,6 +14,12 @@
#include <net/af_rxrpc.h> #include <net/af_rxrpc.h>
#include "ar-internal.h" #include "ar-internal.h"
/*
* The maximum listening backlog queue size that may be set on a socket by
* listen().
*/
unsigned int rxrpc_max_backlog __read_mostly = 10;
/* /*
* How long to wait before scheduling ACK generation after seeing a * How long to wait before scheduling ACK generation after seeing a
* packet with RXRPC_REQUEST_ACK set (in jiffies). * packet with RXRPC_REQUEST_ACK set (in jiffies).
......
...@@ -18,6 +18,7 @@ static struct ctl_table_header *rxrpc_sysctl_reg_table; ...@@ -18,6 +18,7 @@ static struct ctl_table_header *rxrpc_sysctl_reg_table;
static const unsigned int zero = 0; static const unsigned int zero = 0;
static const unsigned int one = 1; static const unsigned int one = 1;
static const unsigned int four = 4; static const unsigned int four = 4;
static const unsigned int thirtytwo = 32;
static const unsigned int n_65535 = 65535; static const unsigned int n_65535 = 65535;
static const unsigned int n_max_acks = RXRPC_MAXACKS; static const unsigned int n_max_acks = RXRPC_MAXACKS;
...@@ -99,6 +100,15 @@ static struct ctl_table rxrpc_sysctl_table[] = { ...@@ -99,6 +100,15 @@ static struct ctl_table rxrpc_sysctl_table[] = {
}, },
/* Non-time values */ /* Non-time values */
{
.procname = "max_backlog",
.data = &rxrpc_max_backlog,
.maxlen = sizeof(unsigned int),
.mode = 0644,
.proc_handler = proc_dointvec_minmax,
.extra1 = (void *)&four,
.extra2 = (void *)&thirtytwo,
},
{ {
.procname = "rx_window_size", .procname = "rx_window_size",
.data = &rxrpc_rx_window_size, .data = &rxrpc_rx_window_size,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment