]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/rxrpc/conn_object.c
Merge branch 'QCA8K'
[mirror_ubuntu-bionic-kernel.git] / net / rxrpc / conn_object.c
CommitLineData
45025bce 1/* RxRPC virtual connection handler, common bits.
17926a79 2 *
45025bce 3 * Copyright (C) 2007, 2016 Red Hat, Inc. All Rights Reserved.
17926a79
DH
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
9b6d5398
JP
12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
17926a79 14#include <linux/module.h>
5a0e3ad6 15#include <linux/slab.h>
17926a79
DH
16#include <linux/net.h>
17#include <linux/skbuff.h>
17926a79
DH
18#include "ar-internal.h"
19
5873c083
DH
20/*
21 * Time till a connection expires after last use (in seconds).
22 */
dad8aff7 23unsigned int rxrpc_connection_expiry = 10 * 60;
5873c083 24
17926a79
DH
25static void rxrpc_connection_reaper(struct work_struct *work);
26
27LIST_HEAD(rxrpc_connections);
4d028b2c 28LIST_HEAD(rxrpc_connection_proc_list);
17926a79 29DEFINE_RWLOCK(rxrpc_connection_lock);
17926a79
DH
30static DECLARE_DELAYED_WORK(rxrpc_connection_reap, rxrpc_connection_reaper);
31
45025bce
DH
32static void rxrpc_destroy_connection(struct rcu_head *);
33
17926a79
DH
34/*
35 * allocate a new connection
36 */
c6d2b8d7 37struct rxrpc_connection *rxrpc_alloc_connection(gfp_t gfp)
17926a79
DH
38{
39 struct rxrpc_connection *conn;
40
41 _enter("");
42
43 conn = kzalloc(sizeof(struct rxrpc_connection), gfp);
44 if (conn) {
45025bce 45 INIT_LIST_HEAD(&conn->cache_link);
999b69f8 46 spin_lock_init(&conn->channel_lock);
45025bce 47 INIT_LIST_HEAD(&conn->waiting_calls);
17926a79 48 INIT_WORK(&conn->processor, &rxrpc_process_connection);
4d028b2c 49 INIT_LIST_HEAD(&conn->proc_link);
999b69f8 50 INIT_LIST_HEAD(&conn->link);
17926a79 51 skb_queue_head_init(&conn->rx_queue);
e0e4d82f 52 conn->security = &rxrpc_no_security;
17926a79 53 spin_lock_init(&conn->state_lock);
17926a79 54 conn->debug_id = atomic_inc_return(&rxrpc_debug_id);
17926a79 55 conn->size_align = 4;
0d12f8a4 56 conn->header_size = sizeof(struct rxrpc_wire_header);
f51b4480 57 conn->idle_timestamp = jiffies;
17926a79
DH
58 }
59
16c61add 60 _leave(" = %p{%d}", conn, conn ? conn->debug_id : 0);
17926a79
DH
61 return conn;
62}
63
17926a79 64/*
8496af50
DH
65 * Look up a connection in the cache by protocol parameters.
66 *
67 * If successful, a pointer to the connection is returned, but no ref is taken.
68 * NULL is returned if there is no match.
69 *
70 * The caller must be holding the RCU read lock.
17926a79 71 */
8496af50
DH
72struct rxrpc_connection *rxrpc_find_connection_rcu(struct rxrpc_local *local,
73 struct sk_buff *skb)
17926a79
DH
74{
75 struct rxrpc_connection *conn;
1291e9d1 76 struct rxrpc_conn_proto k;
42886ffe 77 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
1291e9d1
DH
78 struct sockaddr_rxrpc srx;
79 struct rxrpc_peer *peer;
17926a79 80
8496af50 81 _enter(",%x", sp->hdr.cid & RXRPC_CIDMASK);
17926a79 82
1291e9d1
DH
83 if (rxrpc_extract_addr_from_skb(&srx, skb) < 0)
84 goto not_found;
17926a79 85
8496af50
DH
86 k.epoch = sp->hdr.epoch;
87 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
88
1291e9d1
DH
89 /* We may have to handle mixing IPv4 and IPv6 */
90 if (srx.transport.family != local->srx.transport.family) {
91 pr_warn_ratelimited("AF_RXRPC: Protocol mismatch %u not %u\n",
92 srx.transport.family,
93 local->srx.transport.family);
94 goto not_found;
95 }
96
97 k.epoch = sp->hdr.epoch;
98 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
17926a79 99
4a3388c8 100 if (sp->hdr.flags & RXRPC_CLIENT_INITIATED) {
1291e9d1
DH
101 /* We need to look up service connections by the full protocol
102 * parameter set. We look up the peer first as an intermediate
103 * step and then the connection from the peer's tree.
104 */
105 peer = rxrpc_lookup_peer_rcu(local, &srx);
106 if (!peer)
107 goto not_found;
8496af50
DH
108 conn = rxrpc_find_service_conn_rcu(peer, skb);
109 if (!conn || atomic_read(&conn->usage) == 0)
110 goto not_found;
111 _leave(" = %p", conn);
112 return conn;
4a3388c8 113 } else {
8496af50
DH
114 /* Look up client connections by connection ID alone as their
115 * IDs are unique for this machine.
116 */
1291e9d1 117 conn = idr_find(&rxrpc_client_conn_ids,
8496af50
DH
118 sp->hdr.cid >> RXRPC_CIDSHIFT);
119 if (!conn || atomic_read(&conn->usage) == 0) {
120 _debug("no conn");
121 goto not_found;
122 }
123
124 if (conn->proto.epoch != k.epoch ||
1291e9d1
DH
125 conn->params.local != local)
126 goto not_found;
127
128 peer = conn->params.peer;
129 switch (srx.transport.family) {
130 case AF_INET:
131 if (peer->srx.transport.sin.sin_port !=
132 srx.transport.sin.sin_port ||
133 peer->srx.transport.sin.sin_addr.s_addr !=
134 srx.transport.sin.sin_addr.s_addr)
135 goto not_found;
136 break;
75b54cb5
DH
137 case AF_INET6:
138 if (peer->srx.transport.sin6.sin6_port !=
139 srx.transport.sin6.sin6_port ||
140 memcmp(&peer->srx.transport.sin6.sin6_addr,
141 &srx.transport.sin6.sin6_addr,
142 sizeof(struct in6_addr)) != 0)
143 goto not_found;
144 break;
1291e9d1
DH
145 default:
146 BUG();
147 }
148
1291e9d1
DH
149 _leave(" = %p", conn);
150 return conn;
17926a79
DH
151 }
152
1291e9d1 153not_found:
17926a79
DH
154 _leave(" = NULL");
155 return NULL;
17926a79
DH
156}
157
999b69f8
DH
158/*
159 * Disconnect a call and clear any channel it occupies when that call
a1399f8b
DH
160 * terminates. The caller must hold the channel_lock and must release the
161 * call's ref on the connection.
999b69f8 162 */
45025bce
DH
163void __rxrpc_disconnect_call(struct rxrpc_connection *conn,
164 struct rxrpc_call *call)
999b69f8 165{
01a90a45
DH
166 struct rxrpc_channel *chan =
167 &conn->channels[call->cid & RXRPC_CHANNELMASK];
999b69f8 168
01a90a45 169 _enter("%d,%x", conn->debug_id, call->cid);
999b69f8 170
a1399f8b
DH
171 if (rcu_access_pointer(chan->call) == call) {
172 /* Save the result of the call so that we can repeat it if necessary
173 * through the channel, whilst disposing of the actual call record.
174 */
18bfeba5 175 chan->last_service_id = call->service_id;
f5c17aae
DH
176 if (call->abort_code) {
177 chan->last_abort = call->abort_code;
18bfeba5
DH
178 chan->last_type = RXRPC_PACKET_TYPE_ABORT;
179 } else {
248f219c 180 chan->last_seq = call->rx_hard_ack;
18bfeba5
DH
181 chan->last_type = RXRPC_PACKET_TYPE_ACK;
182 }
183 /* Sync with rxrpc_conn_retransmit(). */
a1399f8b
DH
184 smp_wmb();
185 chan->last_call = chan->call_id;
186 chan->call_id = chan->call_counter;
e653cfe4 187
a1399f8b 188 rcu_assign_pointer(chan->call, NULL);
999b69f8 189 }
e653cfe4 190
a1399f8b
DH
191 _leave("");
192}
193
194/*
195 * Disconnect a call and clear any channel it occupies when that call
196 * terminates.
197 */
198void rxrpc_disconnect_call(struct rxrpc_call *call)
199{
200 struct rxrpc_connection *conn = call->conn;
201
248f219c
DH
202 spin_lock_bh(&conn->params.peer->lock);
203 hlist_del_init(&call->error_link);
204 spin_unlock_bh(&conn->params.peer->lock);
205
45025bce
DH
206 if (rxrpc_is_client_call(call))
207 return rxrpc_disconnect_client_call(call);
208
a1399f8b 209 spin_lock(&conn->channel_lock);
45025bce 210 __rxrpc_disconnect_call(conn, call);
e653cfe4
DH
211 spin_unlock(&conn->channel_lock);
212
213 call->conn = NULL;
f51b4480 214 conn->idle_timestamp = jiffies;
e653cfe4 215 rxrpc_put_connection(conn);
999b69f8
DH
216}
217
45025bce
DH
218/*
219 * Kill off a connection.
220 */
221void rxrpc_kill_connection(struct rxrpc_connection *conn)
222{
223 ASSERT(!rcu_access_pointer(conn->channels[0].call) &&
224 !rcu_access_pointer(conn->channels[1].call) &&
225 !rcu_access_pointer(conn->channels[2].call) &&
226 !rcu_access_pointer(conn->channels[3].call));
227 ASSERT(list_empty(&conn->cache_link));
228
229 write_lock(&rxrpc_connection_lock);
230 list_del_init(&conn->proc_link);
231 write_unlock(&rxrpc_connection_lock);
232
233 /* Drain the Rx queue. Note that even though we've unpublished, an
234 * incoming packet could still be being added to our Rx queue, so we
235 * will need to drain it again in the RCU cleanup handler.
236 */
237 rxrpc_purge_queue(&conn->rx_queue);
238
239 /* Leave final destruction to RCU. The connection processor work item
240 * must carry a ref on the connection to prevent us getting here whilst
241 * it is queued or running.
242 */
243 call_rcu(&conn->rcu, rxrpc_destroy_connection);
244}
245
17926a79
DH
246/*
247 * release a virtual connection
248 */
f51b4480 249void __rxrpc_put_connection(struct rxrpc_connection *conn)
17926a79 250{
f51b4480 251 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
17926a79
DH
252}
253
254/*
255 * destroy a virtual connection
256 */
dee46364 257static void rxrpc_destroy_connection(struct rcu_head *rcu)
17926a79 258{
dee46364
DH
259 struct rxrpc_connection *conn =
260 container_of(rcu, struct rxrpc_connection, rcu);
261
262 _enter("{%d,u=%d}", conn->debug_id, atomic_read(&conn->usage));
17926a79
DH
263
264 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
265
266 _net("DESTROY CONN %d", conn->debug_id);
267
17926a79
DH
268 rxrpc_purge_queue(&conn->rx_queue);
269
e0e4d82f 270 conn->security->clear(conn);
19ffa01c 271 key_put(conn->params.key);
e0e4d82f 272 key_put(conn->server_key);
aa390bbe
DH
273 rxrpc_put_peer(conn->params.peer);
274 rxrpc_put_local(conn->params.local);
e0e4d82f 275
17926a79
DH
276 kfree(conn);
277 _leave("");
278}
279
280/*
45025bce 281 * reap dead service connections
17926a79 282 */
5eaa65b2 283static void rxrpc_connection_reaper(struct work_struct *work)
17926a79
DH
284{
285 struct rxrpc_connection *conn, *_p;
f51b4480 286 unsigned long reap_older_than, earliest, idle_timestamp, now;
17926a79
DH
287
288 LIST_HEAD(graveyard);
289
290 _enter("");
291
f51b4480
DH
292 now = jiffies;
293 reap_older_than = now - rxrpc_connection_expiry * HZ;
17926a79
DH
294 earliest = ULONG_MAX;
295
b3f57504 296 write_lock(&rxrpc_connection_lock);
17926a79 297 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
001c1122
DH
298 ASSERTCMP(atomic_read(&conn->usage), >, 0);
299 if (likely(atomic_read(&conn->usage) > 1))
17926a79 300 continue;
00e90712
DH
301 if (conn->state == RXRPC_CONN_SERVICE_PREALLOC)
302 continue;
17926a79 303
f51b4480
DH
304 idle_timestamp = READ_ONCE(conn->idle_timestamp);
305 _debug("reap CONN %d { u=%d,t=%ld }",
306 conn->debug_id, atomic_read(&conn->usage),
307 (long)reap_older_than - (long)idle_timestamp);
308
309 if (time_after(idle_timestamp, reap_older_than)) {
310 if (time_before(idle_timestamp, earliest))
311 earliest = idle_timestamp;
001c1122 312 continue;
17926a79 313 }
001c1122
DH
314
315 /* The usage count sits at 1 whilst the object is unused on the
316 * list; we reduce that to 0 to make the object unavailable.
317 */
318 if (atomic_cmpxchg(&conn->usage, 1, 0) != 1)
319 continue;
320
321 if (rxrpc_conn_is_client(conn))
45025bce 322 BUG();
001c1122
DH
323 else
324 rxrpc_unpublish_service_conn(conn);
325
326 list_move_tail(&conn->link, &graveyard);
17926a79 327 }
b3f57504 328 write_unlock(&rxrpc_connection_lock);
17926a79
DH
329
330 if (earliest != ULONG_MAX) {
331 _debug("reschedule reaper %ld", (long) earliest - now);
f51b4480 332 ASSERT(time_after(earliest, now));
651350d1 333 rxrpc_queue_delayed_work(&rxrpc_connection_reap,
f51b4480 334 earliest - now);
17926a79
DH
335 }
336
17926a79
DH
337 while (!list_empty(&graveyard)) {
338 conn = list_entry(graveyard.next, struct rxrpc_connection,
339 link);
340 list_del_init(&conn->link);
341
342 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
45025bce 343 rxrpc_kill_connection(conn);
17926a79
DH
344 }
345
346 _leave("");
347}
348
349/*
45025bce
DH
350 * preemptively destroy all the service connection records rather than
351 * waiting for them to time out
17926a79
DH
352 */
353void __exit rxrpc_destroy_all_connections(void)
354{
dee46364
DH
355 struct rxrpc_connection *conn, *_p;
356 bool leak = false;
357
17926a79
DH
358 _enter("");
359
45025bce
DH
360 rxrpc_destroy_all_client_connections();
361
5873c083 362 rxrpc_connection_expiry = 0;
17926a79 363 cancel_delayed_work(&rxrpc_connection_reap);
651350d1 364 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
dee46364
DH
365 flush_workqueue(rxrpc_workqueue);
366
367 write_lock(&rxrpc_connection_lock);
368 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
369 pr_err("AF_RXRPC: Leaked conn %p {%d}\n",
370 conn, atomic_read(&conn->usage));
371 leak = true;
372 }
373 write_unlock(&rxrpc_connection_lock);
374 BUG_ON(leak);
375
45025bce
DH
376 ASSERT(list_empty(&rxrpc_connection_proc_list));
377
dee46364
DH
378 /* Make sure the local and peer records pinned by any dying connections
379 * are released.
380 */
381 rcu_barrier();
382 rxrpc_destroy_client_conn_ids();
17926a79
DH
383
384 _leave("");
385}