]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/rxrpc/conn_object.c
rxrpc: Add some additional call tracing
[mirror_ubuntu-bionic-kernel.git] / net / rxrpc / conn_object.c
CommitLineData
45025bce 1/* RxRPC virtual connection handler, common bits.
17926a79 2 *
45025bce 3 * Copyright (C) 2007, 2016 Red Hat, Inc. All Rights Reserved.
17926a79
DH
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
9b6d5398
JP
12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
17926a79 14#include <linux/module.h>
5a0e3ad6 15#include <linux/slab.h>
17926a79
DH
16#include <linux/net.h>
17#include <linux/skbuff.h>
17926a79
DH
18#include "ar-internal.h"
19
5873c083
DH
20/*
21 * Time till a connection expires after last use (in seconds).
22 */
dad8aff7 23unsigned int rxrpc_connection_expiry = 10 * 60;
5873c083 24
17926a79
DH
25static void rxrpc_connection_reaper(struct work_struct *work);
26
27LIST_HEAD(rxrpc_connections);
4d028b2c 28LIST_HEAD(rxrpc_connection_proc_list);
17926a79 29DEFINE_RWLOCK(rxrpc_connection_lock);
17926a79
DH
30static DECLARE_DELAYED_WORK(rxrpc_connection_reap, rxrpc_connection_reaper);
31
45025bce
DH
32static void rxrpc_destroy_connection(struct rcu_head *);
33
17926a79
DH
34/*
35 * allocate a new connection
36 */
c6d2b8d7 37struct rxrpc_connection *rxrpc_alloc_connection(gfp_t gfp)
17926a79
DH
38{
39 struct rxrpc_connection *conn;
40
41 _enter("");
42
43 conn = kzalloc(sizeof(struct rxrpc_connection), gfp);
44 if (conn) {
45025bce 45 INIT_LIST_HEAD(&conn->cache_link);
999b69f8 46 spin_lock_init(&conn->channel_lock);
45025bce 47 INIT_LIST_HEAD(&conn->waiting_calls);
17926a79 48 INIT_WORK(&conn->processor, &rxrpc_process_connection);
4d028b2c 49 INIT_LIST_HEAD(&conn->proc_link);
999b69f8 50 INIT_LIST_HEAD(&conn->link);
17926a79 51 skb_queue_head_init(&conn->rx_queue);
e0e4d82f 52 conn->security = &rxrpc_no_security;
17926a79 53 spin_lock_init(&conn->state_lock);
17926a79 54 conn->debug_id = atomic_inc_return(&rxrpc_debug_id);
17926a79 55 conn->size_align = 4;
0d12f8a4 56 conn->header_size = sizeof(struct rxrpc_wire_header);
f51b4480 57 conn->idle_timestamp = jiffies;
17926a79
DH
58 }
59
16c61add 60 _leave(" = %p{%d}", conn, conn ? conn->debug_id : 0);
17926a79
DH
61 return conn;
62}
63
17926a79 64/*
8496af50
DH
65 * Look up a connection in the cache by protocol parameters.
66 *
67 * If successful, a pointer to the connection is returned, but no ref is taken.
68 * NULL is returned if there is no match.
69 *
70 * The caller must be holding the RCU read lock.
17926a79 71 */
8496af50
DH
72struct rxrpc_connection *rxrpc_find_connection_rcu(struct rxrpc_local *local,
73 struct sk_buff *skb)
17926a79
DH
74{
75 struct rxrpc_connection *conn;
1291e9d1 76 struct rxrpc_conn_proto k;
42886ffe 77 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
1291e9d1
DH
78 struct sockaddr_rxrpc srx;
79 struct rxrpc_peer *peer;
17926a79 80
8496af50 81 _enter(",%x", sp->hdr.cid & RXRPC_CIDMASK);
17926a79 82
1291e9d1
DH
83 if (rxrpc_extract_addr_from_skb(&srx, skb) < 0)
84 goto not_found;
17926a79 85
8496af50
DH
86 k.epoch = sp->hdr.epoch;
87 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
88
1291e9d1
DH
89 /* We may have to handle mixing IPv4 and IPv6 */
90 if (srx.transport.family != local->srx.transport.family) {
91 pr_warn_ratelimited("AF_RXRPC: Protocol mismatch %u not %u\n",
92 srx.transport.family,
93 local->srx.transport.family);
94 goto not_found;
95 }
96
97 k.epoch = sp->hdr.epoch;
98 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
17926a79 99
4a3388c8 100 if (sp->hdr.flags & RXRPC_CLIENT_INITIATED) {
1291e9d1
DH
101 /* We need to look up service connections by the full protocol
102 * parameter set. We look up the peer first as an intermediate
103 * step and then the connection from the peer's tree.
104 */
105 peer = rxrpc_lookup_peer_rcu(local, &srx);
106 if (!peer)
107 goto not_found;
8496af50
DH
108 conn = rxrpc_find_service_conn_rcu(peer, skb);
109 if (!conn || atomic_read(&conn->usage) == 0)
110 goto not_found;
111 _leave(" = %p", conn);
112 return conn;
4a3388c8 113 } else {
8496af50
DH
114 /* Look up client connections by connection ID alone as their
115 * IDs are unique for this machine.
116 */
1291e9d1 117 conn = idr_find(&rxrpc_client_conn_ids,
8496af50
DH
118 sp->hdr.cid >> RXRPC_CIDSHIFT);
119 if (!conn || atomic_read(&conn->usage) == 0) {
120 _debug("no conn");
121 goto not_found;
122 }
123
124 if (conn->proto.epoch != k.epoch ||
1291e9d1
DH
125 conn->params.local != local)
126 goto not_found;
127
128 peer = conn->params.peer;
129 switch (srx.transport.family) {
130 case AF_INET:
131 if (peer->srx.transport.sin.sin_port !=
132 srx.transport.sin.sin_port ||
133 peer->srx.transport.sin.sin_addr.s_addr !=
134 srx.transport.sin.sin_addr.s_addr)
135 goto not_found;
136 break;
d1912747 137#ifdef CONFIG_AF_RXRPC_IPV6
75b54cb5
DH
138 case AF_INET6:
139 if (peer->srx.transport.sin6.sin6_port !=
140 srx.transport.sin6.sin6_port ||
141 memcmp(&peer->srx.transport.sin6.sin6_addr,
142 &srx.transport.sin6.sin6_addr,
143 sizeof(struct in6_addr)) != 0)
144 goto not_found;
145 break;
d1912747 146#endif
1291e9d1
DH
147 default:
148 BUG();
149 }
150
1291e9d1
DH
151 _leave(" = %p", conn);
152 return conn;
17926a79
DH
153 }
154
1291e9d1 155not_found:
17926a79
DH
156 _leave(" = NULL");
157 return NULL;
17926a79
DH
158}
159
999b69f8
DH
160/*
161 * Disconnect a call and clear any channel it occupies when that call
a1399f8b
DH
162 * terminates. The caller must hold the channel_lock and must release the
163 * call's ref on the connection.
999b69f8 164 */
45025bce
DH
165void __rxrpc_disconnect_call(struct rxrpc_connection *conn,
166 struct rxrpc_call *call)
999b69f8 167{
01a90a45
DH
168 struct rxrpc_channel *chan =
169 &conn->channels[call->cid & RXRPC_CHANNELMASK];
999b69f8 170
01a90a45 171 _enter("%d,%x", conn->debug_id, call->cid);
999b69f8 172
a1399f8b
DH
173 if (rcu_access_pointer(chan->call) == call) {
174 /* Save the result of the call so that we can repeat it if necessary
175 * through the channel, whilst disposing of the actual call record.
176 */
18bfeba5 177 chan->last_service_id = call->service_id;
f5c17aae
DH
178 if (call->abort_code) {
179 chan->last_abort = call->abort_code;
18bfeba5
DH
180 chan->last_type = RXRPC_PACKET_TYPE_ABORT;
181 } else {
248f219c 182 chan->last_seq = call->rx_hard_ack;
18bfeba5
DH
183 chan->last_type = RXRPC_PACKET_TYPE_ACK;
184 }
185 /* Sync with rxrpc_conn_retransmit(). */
a1399f8b
DH
186 smp_wmb();
187 chan->last_call = chan->call_id;
188 chan->call_id = chan->call_counter;
e653cfe4 189
a1399f8b 190 rcu_assign_pointer(chan->call, NULL);
999b69f8 191 }
e653cfe4 192
a1399f8b
DH
193 _leave("");
194}
195
196/*
197 * Disconnect a call and clear any channel it occupies when that call
198 * terminates.
199 */
200void rxrpc_disconnect_call(struct rxrpc_call *call)
201{
202 struct rxrpc_connection *conn = call->conn;
203
248f219c
DH
204 spin_lock_bh(&conn->params.peer->lock);
205 hlist_del_init(&call->error_link);
206 spin_unlock_bh(&conn->params.peer->lock);
207
45025bce
DH
208 if (rxrpc_is_client_call(call))
209 return rxrpc_disconnect_client_call(call);
210
a1399f8b 211 spin_lock(&conn->channel_lock);
45025bce 212 __rxrpc_disconnect_call(conn, call);
e653cfe4
DH
213 spin_unlock(&conn->channel_lock);
214
215 call->conn = NULL;
f51b4480 216 conn->idle_timestamp = jiffies;
e653cfe4 217 rxrpc_put_connection(conn);
999b69f8
DH
218}
219
45025bce
DH
220/*
221 * Kill off a connection.
222 */
223void rxrpc_kill_connection(struct rxrpc_connection *conn)
224{
225 ASSERT(!rcu_access_pointer(conn->channels[0].call) &&
226 !rcu_access_pointer(conn->channels[1].call) &&
227 !rcu_access_pointer(conn->channels[2].call) &&
228 !rcu_access_pointer(conn->channels[3].call));
229 ASSERT(list_empty(&conn->cache_link));
230
231 write_lock(&rxrpc_connection_lock);
232 list_del_init(&conn->proc_link);
233 write_unlock(&rxrpc_connection_lock);
234
235 /* Drain the Rx queue. Note that even though we've unpublished, an
236 * incoming packet could still be being added to our Rx queue, so we
237 * will need to drain it again in the RCU cleanup handler.
238 */
239 rxrpc_purge_queue(&conn->rx_queue);
240
241 /* Leave final destruction to RCU. The connection processor work item
242 * must carry a ref on the connection to prevent us getting here whilst
243 * it is queued or running.
244 */
245 call_rcu(&conn->rcu, rxrpc_destroy_connection);
246}
247
17926a79
DH
248/*
249 * release a virtual connection
250 */
f51b4480 251void __rxrpc_put_connection(struct rxrpc_connection *conn)
17926a79 252{
f51b4480 253 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
17926a79
DH
254}
255
256/*
257 * destroy a virtual connection
258 */
dee46364 259static void rxrpc_destroy_connection(struct rcu_head *rcu)
17926a79 260{
dee46364
DH
261 struct rxrpc_connection *conn =
262 container_of(rcu, struct rxrpc_connection, rcu);
263
264 _enter("{%d,u=%d}", conn->debug_id, atomic_read(&conn->usage));
17926a79
DH
265
266 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
267
268 _net("DESTROY CONN %d", conn->debug_id);
269
17926a79
DH
270 rxrpc_purge_queue(&conn->rx_queue);
271
e0e4d82f 272 conn->security->clear(conn);
19ffa01c 273 key_put(conn->params.key);
e0e4d82f 274 key_put(conn->server_key);
aa390bbe
DH
275 rxrpc_put_peer(conn->params.peer);
276 rxrpc_put_local(conn->params.local);
e0e4d82f 277
17926a79
DH
278 kfree(conn);
279 _leave("");
280}
281
282/*
45025bce 283 * reap dead service connections
17926a79 284 */
5eaa65b2 285static void rxrpc_connection_reaper(struct work_struct *work)
17926a79
DH
286{
287 struct rxrpc_connection *conn, *_p;
f51b4480 288 unsigned long reap_older_than, earliest, idle_timestamp, now;
17926a79
DH
289
290 LIST_HEAD(graveyard);
291
292 _enter("");
293
f51b4480
DH
294 now = jiffies;
295 reap_older_than = now - rxrpc_connection_expiry * HZ;
17926a79
DH
296 earliest = ULONG_MAX;
297
b3f57504 298 write_lock(&rxrpc_connection_lock);
17926a79 299 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
001c1122
DH
300 ASSERTCMP(atomic_read(&conn->usage), >, 0);
301 if (likely(atomic_read(&conn->usage) > 1))
17926a79 302 continue;
00e90712
DH
303 if (conn->state == RXRPC_CONN_SERVICE_PREALLOC)
304 continue;
17926a79 305
f51b4480
DH
306 idle_timestamp = READ_ONCE(conn->idle_timestamp);
307 _debug("reap CONN %d { u=%d,t=%ld }",
308 conn->debug_id, atomic_read(&conn->usage),
309 (long)reap_older_than - (long)idle_timestamp);
310
311 if (time_after(idle_timestamp, reap_older_than)) {
312 if (time_before(idle_timestamp, earliest))
313 earliest = idle_timestamp;
001c1122 314 continue;
17926a79 315 }
001c1122
DH
316
317 /* The usage count sits at 1 whilst the object is unused on the
318 * list; we reduce that to 0 to make the object unavailable.
319 */
320 if (atomic_cmpxchg(&conn->usage, 1, 0) != 1)
321 continue;
322
323 if (rxrpc_conn_is_client(conn))
45025bce 324 BUG();
001c1122
DH
325 else
326 rxrpc_unpublish_service_conn(conn);
327
328 list_move_tail(&conn->link, &graveyard);
17926a79 329 }
b3f57504 330 write_unlock(&rxrpc_connection_lock);
17926a79
DH
331
332 if (earliest != ULONG_MAX) {
333 _debug("reschedule reaper %ld", (long) earliest - now);
f51b4480 334 ASSERT(time_after(earliest, now));
651350d1 335 rxrpc_queue_delayed_work(&rxrpc_connection_reap,
f51b4480 336 earliest - now);
17926a79
DH
337 }
338
17926a79
DH
339 while (!list_empty(&graveyard)) {
340 conn = list_entry(graveyard.next, struct rxrpc_connection,
341 link);
342 list_del_init(&conn->link);
343
344 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
45025bce 345 rxrpc_kill_connection(conn);
17926a79
DH
346 }
347
348 _leave("");
349}
350
351/*
45025bce
DH
352 * preemptively destroy all the service connection records rather than
353 * waiting for them to time out
17926a79
DH
354 */
355void __exit rxrpc_destroy_all_connections(void)
356{
dee46364
DH
357 struct rxrpc_connection *conn, *_p;
358 bool leak = false;
359
17926a79
DH
360 _enter("");
361
45025bce
DH
362 rxrpc_destroy_all_client_connections();
363
5873c083 364 rxrpc_connection_expiry = 0;
17926a79 365 cancel_delayed_work(&rxrpc_connection_reap);
651350d1 366 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
dee46364
DH
367 flush_workqueue(rxrpc_workqueue);
368
369 write_lock(&rxrpc_connection_lock);
370 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
371 pr_err("AF_RXRPC: Leaked conn %p {%d}\n",
372 conn, atomic_read(&conn->usage));
373 leak = true;
374 }
375 write_unlock(&rxrpc_connection_lock);
376 BUG_ON(leak);
377
45025bce
DH
378 ASSERT(list_empty(&rxrpc_connection_proc_list));
379
dee46364
DH
380 /* Make sure the local and peer records pinned by any dying connections
381 * are released.
382 */
383 rcu_barrier();
384 rxrpc_destroy_client_conn_ids();
17926a79
DH
385
386 _leave("");
387}