]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/rxrpc/conn_object.c
rxrpc: Add connection tracepoint and client conn state tracepoint
[mirror_ubuntu-bionic-kernel.git] / net / rxrpc / conn_object.c
CommitLineData
45025bce 1/* RxRPC virtual connection handler, common bits.
17926a79 2 *
45025bce 3 * Copyright (C) 2007, 2016 Red Hat, Inc. All Rights Reserved.
17926a79
DH
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
9b6d5398
JP
12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
17926a79 14#include <linux/module.h>
5a0e3ad6 15#include <linux/slab.h>
17926a79
DH
16#include <linux/net.h>
17#include <linux/skbuff.h>
17926a79
DH
18#include "ar-internal.h"
19
5873c083
DH
20/*
21 * Time till a connection expires after last use (in seconds).
22 */
dad8aff7 23unsigned int rxrpc_connection_expiry = 10 * 60;
5873c083 24
17926a79
DH
25static void rxrpc_connection_reaper(struct work_struct *work);
26
27LIST_HEAD(rxrpc_connections);
4d028b2c 28LIST_HEAD(rxrpc_connection_proc_list);
17926a79 29DEFINE_RWLOCK(rxrpc_connection_lock);
17926a79
DH
30static DECLARE_DELAYED_WORK(rxrpc_connection_reap, rxrpc_connection_reaper);
31
45025bce
DH
32static void rxrpc_destroy_connection(struct rcu_head *);
33
17926a79
DH
34/*
35 * allocate a new connection
36 */
c6d2b8d7 37struct rxrpc_connection *rxrpc_alloc_connection(gfp_t gfp)
17926a79
DH
38{
39 struct rxrpc_connection *conn;
40
41 _enter("");
42
43 conn = kzalloc(sizeof(struct rxrpc_connection), gfp);
44 if (conn) {
45025bce 45 INIT_LIST_HEAD(&conn->cache_link);
999b69f8 46 spin_lock_init(&conn->channel_lock);
45025bce 47 INIT_LIST_HEAD(&conn->waiting_calls);
17926a79 48 INIT_WORK(&conn->processor, &rxrpc_process_connection);
4d028b2c 49 INIT_LIST_HEAD(&conn->proc_link);
999b69f8 50 INIT_LIST_HEAD(&conn->link);
17926a79 51 skb_queue_head_init(&conn->rx_queue);
e0e4d82f 52 conn->security = &rxrpc_no_security;
17926a79 53 spin_lock_init(&conn->state_lock);
17926a79 54 conn->debug_id = atomic_inc_return(&rxrpc_debug_id);
17926a79 55 conn->size_align = 4;
0d12f8a4 56 conn->header_size = sizeof(struct rxrpc_wire_header);
f51b4480 57 conn->idle_timestamp = jiffies;
17926a79
DH
58 }
59
16c61add 60 _leave(" = %p{%d}", conn, conn ? conn->debug_id : 0);
17926a79
DH
61 return conn;
62}
63
17926a79 64/*
8496af50
DH
65 * Look up a connection in the cache by protocol parameters.
66 *
67 * If successful, a pointer to the connection is returned, but no ref is taken.
68 * NULL is returned if there is no match.
69 *
70 * The caller must be holding the RCU read lock.
17926a79 71 */
8496af50
DH
72struct rxrpc_connection *rxrpc_find_connection_rcu(struct rxrpc_local *local,
73 struct sk_buff *skb)
17926a79
DH
74{
75 struct rxrpc_connection *conn;
1291e9d1 76 struct rxrpc_conn_proto k;
42886ffe 77 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
1291e9d1
DH
78 struct sockaddr_rxrpc srx;
79 struct rxrpc_peer *peer;
17926a79 80
8496af50 81 _enter(",%x", sp->hdr.cid & RXRPC_CIDMASK);
17926a79 82
1291e9d1
DH
83 if (rxrpc_extract_addr_from_skb(&srx, skb) < 0)
84 goto not_found;
17926a79 85
8496af50
DH
86 k.epoch = sp->hdr.epoch;
87 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
88
1291e9d1
DH
89 /* We may have to handle mixing IPv4 and IPv6 */
90 if (srx.transport.family != local->srx.transport.family) {
91 pr_warn_ratelimited("AF_RXRPC: Protocol mismatch %u not %u\n",
92 srx.transport.family,
93 local->srx.transport.family);
94 goto not_found;
95 }
96
97 k.epoch = sp->hdr.epoch;
98 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
17926a79 99
4a3388c8 100 if (sp->hdr.flags & RXRPC_CLIENT_INITIATED) {
1291e9d1
DH
101 /* We need to look up service connections by the full protocol
102 * parameter set. We look up the peer first as an intermediate
103 * step and then the connection from the peer's tree.
104 */
105 peer = rxrpc_lookup_peer_rcu(local, &srx);
106 if (!peer)
107 goto not_found;
8496af50
DH
108 conn = rxrpc_find_service_conn_rcu(peer, skb);
109 if (!conn || atomic_read(&conn->usage) == 0)
110 goto not_found;
111 _leave(" = %p", conn);
112 return conn;
4a3388c8 113 } else {
8496af50
DH
114 /* Look up client connections by connection ID alone as their
115 * IDs are unique for this machine.
116 */
1291e9d1 117 conn = idr_find(&rxrpc_client_conn_ids,
8496af50
DH
118 sp->hdr.cid >> RXRPC_CIDSHIFT);
119 if (!conn || atomic_read(&conn->usage) == 0) {
120 _debug("no conn");
121 goto not_found;
122 }
123
124 if (conn->proto.epoch != k.epoch ||
1291e9d1
DH
125 conn->params.local != local)
126 goto not_found;
127
128 peer = conn->params.peer;
129 switch (srx.transport.family) {
130 case AF_INET:
131 if (peer->srx.transport.sin.sin_port !=
132 srx.transport.sin.sin_port ||
133 peer->srx.transport.sin.sin_addr.s_addr !=
134 srx.transport.sin.sin_addr.s_addr)
135 goto not_found;
136 break;
d1912747 137#ifdef CONFIG_AF_RXRPC_IPV6
75b54cb5
DH
138 case AF_INET6:
139 if (peer->srx.transport.sin6.sin6_port !=
140 srx.transport.sin6.sin6_port ||
141 memcmp(&peer->srx.transport.sin6.sin6_addr,
142 &srx.transport.sin6.sin6_addr,
143 sizeof(struct in6_addr)) != 0)
144 goto not_found;
145 break;
d1912747 146#endif
1291e9d1
DH
147 default:
148 BUG();
149 }
150
1291e9d1
DH
151 _leave(" = %p", conn);
152 return conn;
17926a79
DH
153 }
154
1291e9d1 155not_found:
17926a79
DH
156 _leave(" = NULL");
157 return NULL;
17926a79
DH
158}
159
999b69f8
DH
160/*
161 * Disconnect a call and clear any channel it occupies when that call
a1399f8b
DH
162 * terminates. The caller must hold the channel_lock and must release the
163 * call's ref on the connection.
999b69f8 164 */
45025bce
DH
165void __rxrpc_disconnect_call(struct rxrpc_connection *conn,
166 struct rxrpc_call *call)
999b69f8 167{
01a90a45
DH
168 struct rxrpc_channel *chan =
169 &conn->channels[call->cid & RXRPC_CHANNELMASK];
999b69f8 170
01a90a45 171 _enter("%d,%x", conn->debug_id, call->cid);
999b69f8 172
a1399f8b
DH
173 if (rcu_access_pointer(chan->call) == call) {
174 /* Save the result of the call so that we can repeat it if necessary
175 * through the channel, whilst disposing of the actual call record.
176 */
18bfeba5 177 chan->last_service_id = call->service_id;
f5c17aae
DH
178 if (call->abort_code) {
179 chan->last_abort = call->abort_code;
18bfeba5
DH
180 chan->last_type = RXRPC_PACKET_TYPE_ABORT;
181 } else {
248f219c 182 chan->last_seq = call->rx_hard_ack;
18bfeba5
DH
183 chan->last_type = RXRPC_PACKET_TYPE_ACK;
184 }
185 /* Sync with rxrpc_conn_retransmit(). */
a1399f8b
DH
186 smp_wmb();
187 chan->last_call = chan->call_id;
188 chan->call_id = chan->call_counter;
e653cfe4 189
a1399f8b 190 rcu_assign_pointer(chan->call, NULL);
999b69f8 191 }
e653cfe4 192
a1399f8b
DH
193 _leave("");
194}
195
196/*
197 * Disconnect a call and clear any channel it occupies when that call
198 * terminates.
199 */
200void rxrpc_disconnect_call(struct rxrpc_call *call)
201{
202 struct rxrpc_connection *conn = call->conn;
203
248f219c
DH
204 spin_lock_bh(&conn->params.peer->lock);
205 hlist_del_init(&call->error_link);
206 spin_unlock_bh(&conn->params.peer->lock);
207
45025bce
DH
208 if (rxrpc_is_client_call(call))
209 return rxrpc_disconnect_client_call(call);
210
a1399f8b 211 spin_lock(&conn->channel_lock);
45025bce 212 __rxrpc_disconnect_call(conn, call);
e653cfe4
DH
213 spin_unlock(&conn->channel_lock);
214
215 call->conn = NULL;
f51b4480 216 conn->idle_timestamp = jiffies;
e653cfe4 217 rxrpc_put_connection(conn);
999b69f8
DH
218}
219
45025bce
DH
220/*
221 * Kill off a connection.
222 */
223void rxrpc_kill_connection(struct rxrpc_connection *conn)
224{
225 ASSERT(!rcu_access_pointer(conn->channels[0].call) &&
226 !rcu_access_pointer(conn->channels[1].call) &&
227 !rcu_access_pointer(conn->channels[2].call) &&
228 !rcu_access_pointer(conn->channels[3].call));
229 ASSERT(list_empty(&conn->cache_link));
230
231 write_lock(&rxrpc_connection_lock);
232 list_del_init(&conn->proc_link);
233 write_unlock(&rxrpc_connection_lock);
234
235 /* Drain the Rx queue. Note that even though we've unpublished, an
236 * incoming packet could still be being added to our Rx queue, so we
237 * will need to drain it again in the RCU cleanup handler.
238 */
239 rxrpc_purge_queue(&conn->rx_queue);
240
241 /* Leave final destruction to RCU. The connection processor work item
242 * must carry a ref on the connection to prevent us getting here whilst
243 * it is queued or running.
244 */
245 call_rcu(&conn->rcu, rxrpc_destroy_connection);
246}
247
17926a79 248/*
363deeab
DH
249 * Queue a connection's work processor, getting a ref to pass to the work
250 * queue.
17926a79 251 */
363deeab 252bool rxrpc_queue_conn(struct rxrpc_connection *conn)
17926a79 253{
363deeab
DH
254 const void *here = __builtin_return_address(0);
255 int n = __atomic_add_unless(&conn->usage, 1, 0);
256 if (n == 0)
257 return false;
258 if (rxrpc_queue_work(&conn->processor))
259 trace_rxrpc_conn(conn, rxrpc_conn_queued, n + 1, here);
260 else
261 rxrpc_put_connection(conn);
262 return true;
263}
264
265/*
266 * Note the re-emergence of a connection.
267 */
268void rxrpc_see_connection(struct rxrpc_connection *conn)
269{
270 const void *here = __builtin_return_address(0);
271 if (conn) {
272 int n = atomic_read(&conn->usage);
273
274 trace_rxrpc_conn(conn, rxrpc_conn_seen, n, here);
275 }
276}
277
278/*
279 * Get a ref on a connection.
280 */
281void rxrpc_get_connection(struct rxrpc_connection *conn)
282{
283 const void *here = __builtin_return_address(0);
284 int n = atomic_inc_return(&conn->usage);
285
286 trace_rxrpc_conn(conn, rxrpc_conn_got, n, here);
287}
288
289/*
290 * Try to get a ref on a connection.
291 */
292struct rxrpc_connection *
293rxrpc_get_connection_maybe(struct rxrpc_connection *conn)
294{
295 const void *here = __builtin_return_address(0);
296
297 if (conn) {
298 int n = __atomic_add_unless(&conn->usage, 1, 0);
299 if (n > 0)
300 trace_rxrpc_conn(conn, rxrpc_conn_got, n + 1, here);
301 else
302 conn = NULL;
303 }
304 return conn;
305}
306
307/*
308 * Release a service connection
309 */
310void rxrpc_put_service_conn(struct rxrpc_connection *conn)
311{
312 const void *here = __builtin_return_address(0);
313 int n;
314
315 n = atomic_dec_return(&conn->usage);
316 trace_rxrpc_conn(conn, rxrpc_conn_put_service, n, here);
317 ASSERTCMP(n, >=, 0);
318 if (n == 0)
319 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
17926a79
DH
320}
321
322/*
323 * destroy a virtual connection
324 */
dee46364 325static void rxrpc_destroy_connection(struct rcu_head *rcu)
17926a79 326{
dee46364
DH
327 struct rxrpc_connection *conn =
328 container_of(rcu, struct rxrpc_connection, rcu);
329
330 _enter("{%d,u=%d}", conn->debug_id, atomic_read(&conn->usage));
17926a79
DH
331
332 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
333
334 _net("DESTROY CONN %d", conn->debug_id);
335
17926a79
DH
336 rxrpc_purge_queue(&conn->rx_queue);
337
e0e4d82f 338 conn->security->clear(conn);
19ffa01c 339 key_put(conn->params.key);
e0e4d82f 340 key_put(conn->server_key);
aa390bbe
DH
341 rxrpc_put_peer(conn->params.peer);
342 rxrpc_put_local(conn->params.local);
e0e4d82f 343
17926a79
DH
344 kfree(conn);
345 _leave("");
346}
347
348/*
45025bce 349 * reap dead service connections
17926a79 350 */
5eaa65b2 351static void rxrpc_connection_reaper(struct work_struct *work)
17926a79
DH
352{
353 struct rxrpc_connection *conn, *_p;
f51b4480 354 unsigned long reap_older_than, earliest, idle_timestamp, now;
17926a79
DH
355
356 LIST_HEAD(graveyard);
357
358 _enter("");
359
f51b4480
DH
360 now = jiffies;
361 reap_older_than = now - rxrpc_connection_expiry * HZ;
17926a79
DH
362 earliest = ULONG_MAX;
363
b3f57504 364 write_lock(&rxrpc_connection_lock);
17926a79 365 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
001c1122
DH
366 ASSERTCMP(atomic_read(&conn->usage), >, 0);
367 if (likely(atomic_read(&conn->usage) > 1))
17926a79 368 continue;
00e90712
DH
369 if (conn->state == RXRPC_CONN_SERVICE_PREALLOC)
370 continue;
17926a79 371
f51b4480
DH
372 idle_timestamp = READ_ONCE(conn->idle_timestamp);
373 _debug("reap CONN %d { u=%d,t=%ld }",
374 conn->debug_id, atomic_read(&conn->usage),
375 (long)reap_older_than - (long)idle_timestamp);
376
377 if (time_after(idle_timestamp, reap_older_than)) {
378 if (time_before(idle_timestamp, earliest))
379 earliest = idle_timestamp;
001c1122 380 continue;
17926a79 381 }
001c1122
DH
382
383 /* The usage count sits at 1 whilst the object is unused on the
384 * list; we reduce that to 0 to make the object unavailable.
385 */
386 if (atomic_cmpxchg(&conn->usage, 1, 0) != 1)
387 continue;
388
389 if (rxrpc_conn_is_client(conn))
45025bce 390 BUG();
001c1122
DH
391 else
392 rxrpc_unpublish_service_conn(conn);
393
394 list_move_tail(&conn->link, &graveyard);
17926a79 395 }
b3f57504 396 write_unlock(&rxrpc_connection_lock);
17926a79
DH
397
398 if (earliest != ULONG_MAX) {
399 _debug("reschedule reaper %ld", (long) earliest - now);
f51b4480 400 ASSERT(time_after(earliest, now));
651350d1 401 rxrpc_queue_delayed_work(&rxrpc_connection_reap,
f51b4480 402 earliest - now);
17926a79
DH
403 }
404
17926a79
DH
405 while (!list_empty(&graveyard)) {
406 conn = list_entry(graveyard.next, struct rxrpc_connection,
407 link);
408 list_del_init(&conn->link);
409
410 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
45025bce 411 rxrpc_kill_connection(conn);
17926a79
DH
412 }
413
414 _leave("");
415}
416
417/*
45025bce
DH
418 * preemptively destroy all the service connection records rather than
419 * waiting for them to time out
17926a79
DH
420 */
421void __exit rxrpc_destroy_all_connections(void)
422{
dee46364
DH
423 struct rxrpc_connection *conn, *_p;
424 bool leak = false;
425
17926a79
DH
426 _enter("");
427
45025bce
DH
428 rxrpc_destroy_all_client_connections();
429
5873c083 430 rxrpc_connection_expiry = 0;
17926a79 431 cancel_delayed_work(&rxrpc_connection_reap);
651350d1 432 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
dee46364
DH
433 flush_workqueue(rxrpc_workqueue);
434
435 write_lock(&rxrpc_connection_lock);
436 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
437 pr_err("AF_RXRPC: Leaked conn %p {%d}\n",
438 conn, atomic_read(&conn->usage));
439 leak = true;
440 }
441 write_unlock(&rxrpc_connection_lock);
442 BUG_ON(leak);
443
45025bce
DH
444 ASSERT(list_empty(&rxrpc_connection_proc_list));
445
dee46364
DH
446 /* Make sure the local and peer records pinned by any dying connections
447 * are released.
448 */
449 rcu_barrier();
450 rxrpc_destroy_client_conn_ids();
17926a79
DH
451
452 _leave("");
453}