blob: e60fcd2a4a021b2b242b2afe831e41ae99ebafae [file] [log] [blame]
David Howells7877a4a2016-04-04 14:00:40 +01001/* Service connection management
2 *
3 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public Licence
8 * as published by the Free Software Foundation; either version
9 * 2 of the Licence, or (at your option) any later version.
10 */
11
12#include <linux/slab.h>
13#include "ar-internal.h"
14
15/*
David Howells8496af52016-07-01 07:51:50 +010016 * Find a service connection under RCU conditions.
17 *
18 * We could use a hash table, but that is subject to bucket stuffing by an
19 * attacker as the client gets to pick the epoch and cid values and would know
20 * the hash function. So, instead, we use a hash table for the peer and from
21 * that an rbtree to find the service connection. Under ordinary circumstances
22 * it might be slower than a large hash table, but it is at least limited in
23 * depth.
24 */
25struct rxrpc_connection *rxrpc_find_service_conn_rcu(struct rxrpc_peer *peer,
26 struct sk_buff *skb)
27{
28 struct rxrpc_connection *conn = NULL;
29 struct rxrpc_conn_proto k;
30 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
31 struct rb_node *p;
32 unsigned int seq = 0;
33
34 k.epoch = sp->hdr.epoch;
35 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
36
37 do {
38 /* Unfortunately, rbtree walking doesn't give reliable results
39 * under just the RCU read lock, so we have to check for
40 * changes.
41 */
42 read_seqbegin_or_lock(&peer->service_conn_lock, &seq);
43
44 p = rcu_dereference_raw(peer->service_conns.rb_node);
45 while (p) {
46 conn = rb_entry(p, struct rxrpc_connection, service_node);
47
48 if (conn->proto.index_key < k.index_key)
49 p = rcu_dereference_raw(p->rb_left);
50 else if (conn->proto.index_key > k.index_key)
51 p = rcu_dereference_raw(p->rb_right);
52 else
53 goto done;
54 conn = NULL;
55 }
56 } while (need_seqretry(&peer->service_conn_lock, seq));
57
58done:
59 done_seqretry(&peer->service_conn_lock, seq);
60 _leave(" = %d", conn ? conn->debug_id : -1);
61 return conn;
62}
63
64/*
65 * Insert a service connection into a peer's tree, thereby making it a target
66 * for incoming packets.
67 */
David Howells248f2192016-09-08 11:10:12 +010068static void rxrpc_publish_service_conn(struct rxrpc_peer *peer,
69 struct rxrpc_connection *conn)
David Howells8496af52016-07-01 07:51:50 +010070{
71 struct rxrpc_connection *cursor = NULL;
72 struct rxrpc_conn_proto k = conn->proto;
73 struct rb_node **pp, *parent;
74
75 write_seqlock_bh(&peer->service_conn_lock);
76
77 pp = &peer->service_conns.rb_node;
78 parent = NULL;
79 while (*pp) {
80 parent = *pp;
81 cursor = rb_entry(parent,
82 struct rxrpc_connection, service_node);
83
84 if (cursor->proto.index_key < k.index_key)
85 pp = &(*pp)->rb_left;
86 else if (cursor->proto.index_key > k.index_key)
87 pp = &(*pp)->rb_right;
88 else
89 goto found_extant_conn;
90 }
91
92 rb_link_node_rcu(&conn->service_node, parent, pp);
93 rb_insert_color(&conn->service_node, &peer->service_conns);
94conn_published:
95 set_bit(RXRPC_CONN_IN_SERVICE_CONNS, &conn->flags);
96 write_sequnlock_bh(&peer->service_conn_lock);
97 _leave(" = %d [new]", conn->debug_id);
David Howells248f2192016-09-08 11:10:12 +010098 return;
David Howells8496af52016-07-01 07:51:50 +010099
100found_extant_conn:
101 if (atomic_read(&cursor->usage) == 0)
102 goto replace_old_connection;
103 write_sequnlock_bh(&peer->service_conn_lock);
104 /* We should not be able to get here. rxrpc_incoming_connection() is
105 * called in a non-reentrant context, so there can't be a race to
106 * insert a new connection.
107 */
108 BUG();
109
110replace_old_connection:
111 /* The old connection is from an outdated epoch. */
112 _debug("replace conn");
113 rb_replace_node_rcu(&cursor->service_node,
114 &conn->service_node,
115 &peer->service_conns);
116 clear_bit(RXRPC_CONN_IN_SERVICE_CONNS, &cursor->flags);
117 goto conn_published;
118}
119
120/*
David Howells00e90712016-09-08 11:10:12 +0100121 * Preallocate a service connection. The connection is placed on the proc and
122 * reap lists so that we don't have to get the lock from BH context.
123 */
David Howells2baec2c2017-05-24 17:02:32 +0100124struct rxrpc_connection *rxrpc_prealloc_service_connection(struct rxrpc_net *rxnet,
125 gfp_t gfp)
David Howells00e90712016-09-08 11:10:12 +0100126{
127 struct rxrpc_connection *conn = rxrpc_alloc_connection(gfp);
128
129 if (conn) {
130 /* We maintain an extra ref on the connection whilst it is on
131 * the rxrpc_connections list.
132 */
133 conn->state = RXRPC_CONN_SERVICE_PREALLOC;
134 atomic_set(&conn->usage, 2);
135
David Howells2baec2c2017-05-24 17:02:32 +0100136 write_lock(&rxnet->conn_lock);
137 list_add_tail(&conn->link, &rxnet->service_conns);
138 list_add_tail(&conn->proc_link, &rxnet->conn_proc_list);
139 write_unlock(&rxnet->conn_lock);
David Howells363deea2016-09-17 10:49:14 +0100140
141 trace_rxrpc_conn(conn, rxrpc_conn_new_service,
142 atomic_read(&conn->usage),
143 __builtin_return_address(0));
David Howells00e90712016-09-08 11:10:12 +0100144 }
145
146 return conn;
147}
148
149/*
David Howells248f2192016-09-08 11:10:12 +0100150 * Set up an incoming connection. This is called in BH context with the RCU
151 * read lock held.
David Howells7877a4a2016-04-04 14:00:40 +0100152 */
David Howells47229742017-06-05 14:30:49 +0100153void rxrpc_new_incoming_connection(struct rxrpc_sock *rx,
154 struct rxrpc_connection *conn,
David Howells248f2192016-09-08 11:10:12 +0100155 struct sk_buff *skb)
David Howells7877a4a2016-04-04 14:00:40 +0100156{
David Howells7877a4a2016-04-04 14:00:40 +0100157 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
David Howells7877a4a2016-04-04 14:00:40 +0100158
159 _enter("");
160
David Howells8496af52016-07-01 07:51:50 +0100161 conn->proto.epoch = sp->hdr.epoch;
162 conn->proto.cid = sp->hdr.cid & RXRPC_CIDMASK;
David Howells8496af52016-07-01 07:51:50 +0100163 conn->params.service_id = sp->hdr.serviceId;
David Howells68d6d1a2017-06-05 14:30:49 +0100164 conn->service_id = sp->hdr.serviceId;
David Howells8496af52016-07-01 07:51:50 +0100165 conn->security_ix = sp->hdr.securityIndex;
166 conn->out_clientflag = 0;
David Howells248f2192016-09-08 11:10:12 +0100167 if (conn->security_ix)
David Howells8496af52016-07-01 07:51:50 +0100168 conn->state = RXRPC_CONN_SERVICE_UNSECURED;
David Howells248f2192016-09-08 11:10:12 +0100169 else
170 conn->state = RXRPC_CONN_SERVICE;
David Howells7877a4a2016-04-04 14:00:40 +0100171
David Howells47229742017-06-05 14:30:49 +0100172 /* See if we should upgrade the service. This can only happen on the
173 * first packet on a new connection. Once done, it applies to all
174 * subsequent calls on that connection.
175 */
176 if (sp->hdr.userStatus == RXRPC_USERSTATUS_SERVICE_UPGRADE &&
177 conn->service_id == rx->service_upgrade.from)
178 conn->service_id = rx->service_upgrade.to;
179
David Howells8496af52016-07-01 07:51:50 +0100180 /* Make the connection a target for incoming packets. */
David Howells248f2192016-09-08 11:10:12 +0100181 rxrpc_publish_service_conn(conn->params.peer, conn);
David Howells8496af52016-07-01 07:51:50 +0100182
David Howells248f2192016-09-08 11:10:12 +0100183 _net("CONNECTION new %d {%x}", conn->debug_id, conn->proto.cid);
David Howells7877a4a2016-04-04 14:00:40 +0100184}
David Howells001c1122016-06-30 10:45:22 +0100185
186/*
187 * Remove the service connection from the peer's tree, thereby removing it as a
188 * target for incoming packets.
189 */
190void rxrpc_unpublish_service_conn(struct rxrpc_connection *conn)
191{
192 struct rxrpc_peer *peer = conn->params.peer;
193
David Howells8496af52016-07-01 07:51:50 +0100194 write_seqlock_bh(&peer->service_conn_lock);
David Howells001c1122016-06-30 10:45:22 +0100195 if (test_and_clear_bit(RXRPC_CONN_IN_SERVICE_CONNS, &conn->flags))
196 rb_erase(&conn->service_node, &peer->service_conns);
David Howells8496af52016-07-01 07:51:50 +0100197 write_sequnlock_bh(&peer->service_conn_lock);
David Howells001c1122016-06-30 10:45:22 +0100198}