Add support for printing the TCP FO client-side cookie cache via the
sysctl interface. This is similar to the TCP host cache. Reviewed by: pkelsey@, kbowling@ Sponsored by: Netflix, Inc. Differential Revision: https://reviews.freebsd.org/D14554
This commit is contained in:
parent
a026a53a76
commit
c9da58534d
@ -81,6 +81,9 @@
|
||||
* (RDTUN, default TCP_FASTOPEN_CCACHE_BUCKETS_DEFAULT)
|
||||
* The number of client cookie cache buckets.
|
||||
*
|
||||
* net.inet.tcp.fastopen.ccache_list (RO)
|
||||
* Print the client cookie cache.
|
||||
*
|
||||
* net.inet.tcp.fastopen.client_enable (RW, default 0)
|
||||
* When zero, no new active (i.e., client) TFO connections can be
|
||||
* created. On the transition from enabled to disabled, the client
|
||||
@ -166,11 +169,14 @@ __FBSDID("$FreeBSD$");
|
||||
#include "opt_inet.h"
|
||||
|
||||
#include <sys/param.h>
|
||||
#include <sys/jail.h>
|
||||
#include <sys/kernel.h>
|
||||
#include <sys/hash.h>
|
||||
#include <sys/limits.h>
|
||||
#include <sys/lock.h>
|
||||
#include <sys/proc.h>
|
||||
#include <sys/rmlock.h>
|
||||
#include <sys/sbuf.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/socketvar.h>
|
||||
#include <sys/sysctl.h>
|
||||
@ -343,6 +349,12 @@ SYSCTL_PROC(_net_inet_tcp_fastopen, OID_AUTO, setpsk,
|
||||
&sysctl_net_inet_tcp_fastopen_setpsk, "",
|
||||
"Install a new pre-shared key");
|
||||
|
||||
static int sysctl_net_inet_tcp_fastopen_ccache_list(SYSCTL_HANDLER_ARGS);
|
||||
SYSCTL_PROC(_net_inet_tcp_fastopen, OID_AUTO, ccache_list,
|
||||
CTLFLAG_VNET | CTLTYPE_STRING | CTLFLAG_RD | CTLFLAG_SKIP, NULL, 0,
|
||||
sysctl_net_inet_tcp_fastopen_ccache_list, "A",
|
||||
"List of all client cookie cache entries");
|
||||
|
||||
static VNET_DEFINE(struct rmlock, tcp_fastopen_keylock);
|
||||
#define V_tcp_fastopen_keylock VNET(tcp_fastopen_keylock)
|
||||
|
||||
@ -1135,3 +1147,79 @@ tcp_fastopen_ccache_entry_drop(struct tcp_fastopen_ccache_entry *cce,
|
||||
uma_zfree(V_tcp_fastopen_ccache.zone, cce);
|
||||
}
|
||||
|
||||
static int
|
||||
sysctl_net_inet_tcp_fastopen_ccache_list(SYSCTL_HANDLER_ARGS)
|
||||
{
|
||||
struct sbuf sb;
|
||||
struct tcp_fastopen_ccache_bucket *ccb;
|
||||
struct tcp_fastopen_ccache_entry *cce;
|
||||
sbintime_t now, duration, limit;
|
||||
const int linesize = 128;
|
||||
int i, error, num_entries;
|
||||
unsigned int j;
|
||||
#ifdef INET6
|
||||
char clt_buf[INET6_ADDRSTRLEN], srv_buf[INET6_ADDRSTRLEN];
|
||||
#else
|
||||
char clt_buf[INET_ADDRSTRLEN], srv_buf[INET_ADDRSTRLEN];
|
||||
#endif
|
||||
|
||||
if (jailed_without_vnet(curthread->td_ucred) != 0)
|
||||
return (EPERM);
|
||||
|
||||
/* Only allow root to read the client cookie cache */
|
||||
if (curthread->td_ucred->cr_uid != 0)
|
||||
return (EPERM);
|
||||
|
||||
num_entries = 0;
|
||||
for (i = 0; i < V_tcp_fastopen_ccache.buckets; i++) {
|
||||
ccb = &V_tcp_fastopen_ccache.base[i];
|
||||
CCB_LOCK(ccb);
|
||||
if (ccb->ccb_num_entries > 0)
|
||||
num_entries += ccb->ccb_num_entries;
|
||||
CCB_UNLOCK(ccb);
|
||||
}
|
||||
sbuf_new(&sb, NULL, linesize * (num_entries + 1), SBUF_INCLUDENUL);
|
||||
|
||||
sbuf_printf(&sb,
|
||||
"\nLocal IP address Remote IP address Port MSS"
|
||||
" Disabled Cookie\n");
|
||||
|
||||
now = getsbinuptime();
|
||||
limit = (sbintime_t)V_tcp_fastopen_path_disable_time << 32;
|
||||
for (i = 0; i < V_tcp_fastopen_ccache.buckets; i++) {
|
||||
ccb = &V_tcp_fastopen_ccache.base[i];
|
||||
CCB_LOCK(ccb);
|
||||
TAILQ_FOREACH(cce, &ccb->ccb_entries, cce_link) {
|
||||
if (cce->disable_time != 0) {
|
||||
duration = now - cce->disable_time;
|
||||
if (limit >= duration)
|
||||
duration = limit - duration;
|
||||
else
|
||||
duration = 0;
|
||||
} else
|
||||
duration = 0;
|
||||
sbuf_printf(&sb,
|
||||
"%-20s %-20s %5u %5u ",
|
||||
inet_ntop(cce->af, &cce->cce_client_ip,
|
||||
clt_buf, sizeof(clt_buf)),
|
||||
inet_ntop(cce->af, &cce->cce_server_ip,
|
||||
srv_buf, sizeof(srv_buf)),
|
||||
ntohs(cce->server_port),
|
||||
cce->server_mss);
|
||||
if (duration > 0)
|
||||
sbuf_printf(&sb, "%7ds ", sbintime_getsec(duration));
|
||||
else
|
||||
sbuf_printf(&sb, "%8s ", "No");
|
||||
for (j = 0; j < cce->cookie_len; j++)
|
||||
sbuf_printf(&sb, "%02x", cce->cookie[j]);
|
||||
sbuf_putc(&sb, '\n');
|
||||
}
|
||||
CCB_UNLOCK(ccb);
|
||||
}
|
||||
error = sbuf_finish(&sb);
|
||||
if (error == 0)
|
||||
error = SYSCTL_OUT(req, sbuf_data(&sb), sbuf_len(&sb));
|
||||
sbuf_delete(&sb);
|
||||
return (error);
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user