[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220610034204.67901-1-imagedong@tencent.com>
Date: Fri, 10 Jun 2022 11:41:55 +0800
From: menglong8.dong@...il.com
To: edumazet@...gle.com
Cc: rostedt@...dmis.org, mingo@...hat.com, davem@...emloft.net,
yoshfuji@...ux-ipv6.org, dsahern@...nel.org, kuba@...nel.org,
pabeni@...hat.com, imagedong@...cent.com, kafai@...com,
talalahmad@...gle.com, keescook@...omium.org,
dongli.zhang@...cle.com, linux-kernel@...r.kernel.org,
netdev@...r.kernel.org
Subject: [PATCH net-next v3 0/9] net: tcp: add skb drop reasons to tcp state change
From: Menglong Dong <imagedong@...cent.com>
In this series patches, skb drop reasons are add to code path of TCP
state change, which we have not done before. It is hard to pass these
reasons from the function to its caller, where skb is dropped. In order
to do this, we have to make some functions return skb drop reasons, or
pass the pointer of 'reason' to these function as an new function
argument.
=============================
We change the type of the return value of tcp_rcv_synsent_state_process()
and tcp_rcv_state_process() to 'enum skb_drop_reason' and make them
return skb drop reasons in 5th and 6th patch.
=============================
In order to get skb drop reasons during tcp connect requesting code path,
we have to pass the pointer of the 'reason' as a new function argument of
conn_request() in 'struct inet_connection_sock_af_ops'. As the return
value of conn_request() can be positive or negative or 0, it's not
flexible to make it return drop reasons. This work is done in the 7th
patch, and functions that used as conn_request() is also modified:
dccp_v4_conn_request()
dccp_v6_conn_request()
tcp_v4_conn_request()
tcp_v6_conn_request()
subflow_v4_conn_request()
subflow_v6_conn_request()
As our target is TCP, dccp and mptcp are not handled more.
=============================
In the 7th patch, skb drop reasons are add to
tcp_timewait_state_process() by adding a function argument to it. In the
origin code, all skb are dropped for tw socket. In order to make less
noise, use consume_skb() for the 'good' skb. This can be checked by the
caller of tcp_timewait_state_process() from the value of drop reason.
If the drop reason is SKB_NOT_DROPPED_YET, it means this skb should not
be dropped.
=============================
In the 8th patch, skb drop reasons are add to the route_req() in struct
tcp_request_sock_ops. Following functions are involved:
tcp_v4_route_req()
tcp_v6_route_req()
subflow_v4_route_req()
subflow_v6_route_req()
In this series patches, following new drop reasons are added:
- SOCKET_DESTROYED
- TCP_PAWSACTIVEREJECTED
- TCP_LINGER
- LISTENOVERFLOWS
- TCP_REQQFULLDROP
- TIMEWAIT
- LSM
Changes since v2:
- move drop reasons to standalone header in another series
Changes since v1:
6/9 - fix the compile errors of dccp and mptcp (kernel test robot)
7/9 - skb is not freed on TCP_TW_ACK and 'ret' is not initizalized, fix
it (Eric Dumazet)
Menglong Dong (9):
net: skb: introduce __skb_queue_purge_reason()
net: sock: introduce sk_stream_kill_queues_reason()
net: inet: add skb drop reason to inet_csk_destroy_sock()
net: tcp: make tcp_rcv_synsent_state_process() return drop reasons
net: tcp: make tcp_rcv_state_process() return drop reason
net: tcp: add skb drop reasons to tcp connect requesting
net: tcp: add skb drop reasons to tcp tw code path
net: tcp: add skb drop reasons to route_req()
net: tcp: use LINUX_MIB_TCPABORTONLINGER in tcp_rcv_state_process()
include/linux/skbuff.h | 12 +++--
include/net/dropreason.h | 35 +++++++++++++++
include/net/inet_connection_sock.h | 3 +-
include/net/sock.h | 8 +++-
include/net/tcp.h | 27 ++++++-----
net/core/stream.c | 7 +--
net/dccp/dccp.h | 3 +-
net/dccp/input.c | 3 +-
net/dccp/ipv4.c | 3 +-
net/dccp/ipv6.c | 5 ++-
net/ipv4/inet_connection_sock.c | 2 +-
net/ipv4/tcp_input.c | 72 +++++++++++++++++++-----------
net/ipv4/tcp_ipv4.c | 52 +++++++++++++++------
net/ipv4/tcp_minisocks.c | 35 +++++++++++----
net/ipv6/tcp_ipv6.c | 53 +++++++++++++++-------
net/mptcp/subflow.c | 18 +++++---
16 files changed, 241 insertions(+), 97 deletions(-)
--
2.36.1
Powered by blists - more mailing lists