blob: 896d84493a0574a425a49c943af4051ff8273c0e [file] [log] [blame]
David Howells17926a72007-04-26 15:48:28 -07001/* RxRPC virtual connection handler
2 *
3 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
Joe Perches9b6d5392016-06-02 12:08:52 -070012#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
David Howells17926a72007-04-26 15:48:28 -070014#include <linux/module.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090015#include <linux/slab.h>
David Howells17926a72007-04-26 15:48:28 -070016#include <linux/net.h>
17#include <linux/skbuff.h>
David Howells17926a72007-04-26 15:48:28 -070018#include <net/sock.h>
19#include <net/af_rxrpc.h>
20#include "ar-internal.h"
21
David Howells5873c082014-02-07 18:58:44 +000022/*
23 * Time till a connection expires after last use (in seconds).
24 */
David Howellsdad8aff2016-03-09 23:22:56 +000025unsigned int rxrpc_connection_expiry = 10 * 60;
David Howells5873c082014-02-07 18:58:44 +000026
David Howells17926a72007-04-26 15:48:28 -070027static void rxrpc_connection_reaper(struct work_struct *work);
28
29LIST_HEAD(rxrpc_connections);
30DEFINE_RWLOCK(rxrpc_connection_lock);
David Howells17926a72007-04-26 15:48:28 -070031static DECLARE_DELAYED_WORK(rxrpc_connection_reap, rxrpc_connection_reaper);
32
33/*
David Howells17926a72007-04-26 15:48:28 -070034 * allocate a new connection
35 */
David Howellsc6d2b8d2016-04-04 14:00:40 +010036struct rxrpc_connection *rxrpc_alloc_connection(gfp_t gfp)
David Howells17926a72007-04-26 15:48:28 -070037{
38 struct rxrpc_connection *conn;
39
40 _enter("");
41
42 conn = kzalloc(sizeof(struct rxrpc_connection), gfp);
43 if (conn) {
David Howells999b69f2016-06-17 15:42:35 +010044 spin_lock_init(&conn->channel_lock);
45 init_waitqueue_head(&conn->channel_wq);
David Howells17926a72007-04-26 15:48:28 -070046 INIT_WORK(&conn->processor, &rxrpc_process_connection);
David Howells999b69f2016-06-17 15:42:35 +010047 INIT_LIST_HEAD(&conn->link);
David Howells17926a72007-04-26 15:48:28 -070048 skb_queue_head_init(&conn->rx_queue);
David Howellse0e4d822016-04-07 17:23:58 +010049 conn->security = &rxrpc_no_security;
David Howells17926a72007-04-26 15:48:28 -070050 spin_lock_init(&conn->state_lock);
David Howells001c1122016-06-30 10:45:22 +010051 /* We maintain an extra ref on the connection whilst it is
52 * on the rxrpc_connections list.
53 */
54 atomic_set(&conn->usage, 2);
David Howells17926a72007-04-26 15:48:28 -070055 conn->debug_id = atomic_inc_return(&rxrpc_debug_id);
David Howells999b69f2016-06-17 15:42:35 +010056 atomic_set(&conn->avail_chans, RXRPC_MAXCALLS);
David Howells17926a72007-04-26 15:48:28 -070057 conn->size_align = 4;
David Howells0d12f8a2016-03-04 15:53:46 +000058 conn->header_size = sizeof(struct rxrpc_wire_header);
David Howells17926a72007-04-26 15:48:28 -070059 }
60
Adrian Bunk16c61ad2007-06-15 15:15:43 -070061 _leave(" = %p{%d}", conn, conn ? conn->debug_id : 0);
David Howells17926a72007-04-26 15:48:28 -070062 return conn;
63}
64
65/*
David Howells8496af52016-07-01 07:51:50 +010066 * Look up a connection in the cache by protocol parameters.
67 *
68 * If successful, a pointer to the connection is returned, but no ref is taken.
69 * NULL is returned if there is no match.
70 *
71 * The caller must be holding the RCU read lock.
David Howells17926a72007-04-26 15:48:28 -070072 */
David Howells8496af52016-07-01 07:51:50 +010073struct rxrpc_connection *rxrpc_find_connection_rcu(struct rxrpc_local *local,
74 struct sk_buff *skb)
David Howells17926a72007-04-26 15:48:28 -070075{
76 struct rxrpc_connection *conn;
David Howells1291e9d2016-06-30 12:02:53 +010077 struct rxrpc_conn_proto k;
David Howells42886ff2016-06-16 13:31:07 +010078 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
David Howells1291e9d2016-06-30 12:02:53 +010079 struct sockaddr_rxrpc srx;
80 struct rxrpc_peer *peer;
David Howells17926a72007-04-26 15:48:28 -070081
David Howells8496af52016-07-01 07:51:50 +010082 _enter(",%x", sp->hdr.cid & RXRPC_CIDMASK);
David Howells17926a72007-04-26 15:48:28 -070083
David Howells1291e9d2016-06-30 12:02:53 +010084 if (rxrpc_extract_addr_from_skb(&srx, skb) < 0)
85 goto not_found;
David Howells17926a72007-04-26 15:48:28 -070086
David Howells8496af52016-07-01 07:51:50 +010087 k.epoch = sp->hdr.epoch;
88 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
89
David Howells1291e9d2016-06-30 12:02:53 +010090 /* We may have to handle mixing IPv4 and IPv6 */
91 if (srx.transport.family != local->srx.transport.family) {
92 pr_warn_ratelimited("AF_RXRPC: Protocol mismatch %u not %u\n",
93 srx.transport.family,
94 local->srx.transport.family);
95 goto not_found;
96 }
97
98 k.epoch = sp->hdr.epoch;
99 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
David Howells17926a72007-04-26 15:48:28 -0700100
David Howells4a3388c2016-04-04 14:00:37 +0100101 if (sp->hdr.flags & RXRPC_CLIENT_INITIATED) {
David Howells1291e9d2016-06-30 12:02:53 +0100102 /* We need to look up service connections by the full protocol
103 * parameter set. We look up the peer first as an intermediate
104 * step and then the connection from the peer's tree.
105 */
106 peer = rxrpc_lookup_peer_rcu(local, &srx);
107 if (!peer)
108 goto not_found;
David Howells8496af52016-07-01 07:51:50 +0100109 conn = rxrpc_find_service_conn_rcu(peer, skb);
110 if (!conn || atomic_read(&conn->usage) == 0)
111 goto not_found;
112 _leave(" = %p", conn);
113 return conn;
David Howells4a3388c2016-04-04 14:00:37 +0100114 } else {
David Howells8496af52016-07-01 07:51:50 +0100115 /* Look up client connections by connection ID alone as their
116 * IDs are unique for this machine.
117 */
David Howells1291e9d2016-06-30 12:02:53 +0100118 conn = idr_find(&rxrpc_client_conn_ids,
David Howells8496af52016-07-01 07:51:50 +0100119 sp->hdr.cid >> RXRPC_CIDSHIFT);
120 if (!conn || atomic_read(&conn->usage) == 0) {
121 _debug("no conn");
122 goto not_found;
123 }
124
125 if (conn->proto.epoch != k.epoch ||
David Howells1291e9d2016-06-30 12:02:53 +0100126 conn->params.local != local)
127 goto not_found;
128
129 peer = conn->params.peer;
130 switch (srx.transport.family) {
131 case AF_INET:
132 if (peer->srx.transport.sin.sin_port !=
133 srx.transport.sin.sin_port ||
134 peer->srx.transport.sin.sin_addr.s_addr !=
135 srx.transport.sin.sin_addr.s_addr)
136 goto not_found;
137 break;
138 default:
139 BUG();
140 }
141
David Howells1291e9d2016-06-30 12:02:53 +0100142 _leave(" = %p", conn);
143 return conn;
David Howells17926a72007-04-26 15:48:28 -0700144 }
145
David Howells1291e9d2016-06-30 12:02:53 +0100146not_found:
David Howells17926a72007-04-26 15:48:28 -0700147 _leave(" = NULL");
148 return NULL;
David Howells17926a72007-04-26 15:48:28 -0700149}
150
151/*
David Howells999b69f2016-06-17 15:42:35 +0100152 * Disconnect a call and clear any channel it occupies when that call
David Howellsa1399f82016-06-27 14:39:44 +0100153 * terminates. The caller must hold the channel_lock and must release the
154 * call's ref on the connection.
155 */
156void __rxrpc_disconnect_call(struct rxrpc_call *call)
157{
158 struct rxrpc_connection *conn = call->conn;
159 struct rxrpc_channel *chan = &conn->channels[call->channel];
160
161 _enter("%d,%d", conn->debug_id, call->channel);
162
163 if (rcu_access_pointer(chan->call) == call) {
164 /* Save the result of the call so that we can repeat it if necessary
165 * through the channel, whilst disposing of the actual call record.
166 */
167 chan->last_result = call->local_abort;
168 smp_wmb();
169 chan->last_call = chan->call_id;
170 chan->call_id = chan->call_counter;
171
172 rcu_assign_pointer(chan->call, NULL);
173 atomic_inc(&conn->avail_chans);
174 wake_up(&conn->channel_wq);
175 }
176
177 _leave("");
178}
179
180/*
181 * Disconnect a call and clear any channel it occupies when that call
David Howells999b69f2016-06-17 15:42:35 +0100182 * terminates.
183 */
184void rxrpc_disconnect_call(struct rxrpc_call *call)
185{
186 struct rxrpc_connection *conn = call->conn;
David Howells999b69f2016-06-17 15:42:35 +0100187
David Howellse653cfe2016-04-04 14:00:38 +0100188 spin_lock(&conn->channel_lock);
David Howellsa1399f82016-06-27 14:39:44 +0100189 __rxrpc_disconnect_call(call);
David Howellse653cfe2016-04-04 14:00:38 +0100190 spin_unlock(&conn->channel_lock);
191
192 call->conn = NULL;
193 rxrpc_put_connection(conn);
David Howells999b69f2016-06-17 15:42:35 +0100194}
195
196/*
David Howells17926a72007-04-26 15:48:28 -0700197 * release a virtual connection
198 */
199void rxrpc_put_connection(struct rxrpc_connection *conn)
200{
David Howells999b69f2016-06-17 15:42:35 +0100201 if (!conn)
202 return;
203
David Howells17926a72007-04-26 15:48:28 -0700204 _enter("%p{u=%d,d=%d}",
205 conn, atomic_read(&conn->usage), conn->debug_id);
206
David Howells001c1122016-06-30 10:45:22 +0100207 ASSERTCMP(atomic_read(&conn->usage), >, 1);
David Howells17926a72007-04-26 15:48:28 -0700208
Ksenija Stanojevic22a3f9a2015-09-17 18:12:53 +0200209 conn->put_time = ktime_get_seconds();
David Howells001c1122016-06-30 10:45:22 +0100210 if (atomic_dec_return(&conn->usage) == 1) {
David Howells17926a72007-04-26 15:48:28 -0700211 _debug("zombie");
David Howells651350d2007-04-26 15:50:17 -0700212 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
David Howells17926a72007-04-26 15:48:28 -0700213 }
214
215 _leave("");
216}
217
218/*
219 * destroy a virtual connection
220 */
David Howellsdee46362016-06-27 17:11:19 +0100221static void rxrpc_destroy_connection(struct rcu_head *rcu)
David Howells17926a72007-04-26 15:48:28 -0700222{
David Howellsdee46362016-06-27 17:11:19 +0100223 struct rxrpc_connection *conn =
224 container_of(rcu, struct rxrpc_connection, rcu);
225
226 _enter("{%d,u=%d}", conn->debug_id, atomic_read(&conn->usage));
David Howells17926a72007-04-26 15:48:28 -0700227
228 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
229
230 _net("DESTROY CONN %d", conn->debug_id);
231
David Howells17926a72007-04-26 15:48:28 -0700232 rxrpc_purge_queue(&conn->rx_queue);
233
David Howellse0e4d822016-04-07 17:23:58 +0100234 conn->security->clear(conn);
David Howells19ffa012016-04-04 14:00:36 +0100235 key_put(conn->params.key);
David Howellse0e4d822016-04-07 17:23:58 +0100236 key_put(conn->server_key);
David Howellsaa390bb2016-06-17 10:06:56 +0100237 rxrpc_put_peer(conn->params.peer);
238 rxrpc_put_local(conn->params.local);
David Howellse0e4d822016-04-07 17:23:58 +0100239
David Howells17926a72007-04-26 15:48:28 -0700240 kfree(conn);
241 _leave("");
242}
243
244/*
245 * reap dead connections
246 */
Roel Kluin5eaa65b2008-12-10 15:18:31 -0800247static void rxrpc_connection_reaper(struct work_struct *work)
David Howells17926a72007-04-26 15:48:28 -0700248{
249 struct rxrpc_connection *conn, *_p;
David Howells001c1122016-06-30 10:45:22 +0100250 unsigned long reap_older_than, earliest, put_time, now;
David Howells17926a72007-04-26 15:48:28 -0700251
252 LIST_HEAD(graveyard);
253
254 _enter("");
255
Ksenija Stanojevic22a3f9a2015-09-17 18:12:53 +0200256 now = ktime_get_seconds();
David Howells001c1122016-06-30 10:45:22 +0100257 reap_older_than = now - rxrpc_connection_expiry;
David Howells17926a72007-04-26 15:48:28 -0700258 earliest = ULONG_MAX;
259
David Howellsb3f57502016-06-21 16:10:03 +0100260 write_lock(&rxrpc_connection_lock);
David Howells17926a72007-04-26 15:48:28 -0700261 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
David Howells001c1122016-06-30 10:45:22 +0100262 ASSERTCMP(atomic_read(&conn->usage), >, 0);
263 if (likely(atomic_read(&conn->usage) > 1))
David Howells17926a72007-04-26 15:48:28 -0700264 continue;
265
David Howells001c1122016-06-30 10:45:22 +0100266 put_time = READ_ONCE(conn->put_time);
267 if (time_after(put_time, reap_older_than)) {
268 if (time_before(put_time, earliest))
269 earliest = put_time;
270 continue;
David Howells999b69f2016-06-17 15:42:35 +0100271 }
David Howells001c1122016-06-30 10:45:22 +0100272
273 /* The usage count sits at 1 whilst the object is unused on the
274 * list; we reduce that to 0 to make the object unavailable.
275 */
276 if (atomic_cmpxchg(&conn->usage, 1, 0) != 1)
277 continue;
278
279 if (rxrpc_conn_is_client(conn))
280 rxrpc_unpublish_client_conn(conn);
281 else
282 rxrpc_unpublish_service_conn(conn);
283
284 list_move_tail(&conn->link, &graveyard);
David Howells17926a72007-04-26 15:48:28 -0700285 }
David Howellsb3f57502016-06-21 16:10:03 +0100286 write_unlock(&rxrpc_connection_lock);
David Howells17926a72007-04-26 15:48:28 -0700287
288 if (earliest != ULONG_MAX) {
289 _debug("reschedule reaper %ld", (long) earliest - now);
290 ASSERTCMP(earliest, >, now);
David Howells651350d2007-04-26 15:50:17 -0700291 rxrpc_queue_delayed_work(&rxrpc_connection_reap,
292 (earliest - now) * HZ);
David Howells17926a72007-04-26 15:48:28 -0700293 }
294
David Howells17926a72007-04-26 15:48:28 -0700295 while (!list_empty(&graveyard)) {
296 conn = list_entry(graveyard.next, struct rxrpc_connection,
297 link);
298 list_del_init(&conn->link);
299
300 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
David Howellsdee46362016-06-27 17:11:19 +0100301 skb_queue_purge(&conn->rx_queue);
302 call_rcu(&conn->rcu, rxrpc_destroy_connection);
David Howells17926a72007-04-26 15:48:28 -0700303 }
304
305 _leave("");
306}
307
308/*
309 * preemptively destroy all the connection records rather than waiting for them
310 * to time out
311 */
312void __exit rxrpc_destroy_all_connections(void)
313{
David Howellsdee46362016-06-27 17:11:19 +0100314 struct rxrpc_connection *conn, *_p;
315 bool leak = false;
316
David Howells17926a72007-04-26 15:48:28 -0700317 _enter("");
318
David Howells5873c082014-02-07 18:58:44 +0000319 rxrpc_connection_expiry = 0;
David Howells17926a72007-04-26 15:48:28 -0700320 cancel_delayed_work(&rxrpc_connection_reap);
David Howells651350d2007-04-26 15:50:17 -0700321 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
David Howellsdee46362016-06-27 17:11:19 +0100322 flush_workqueue(rxrpc_workqueue);
323
324 write_lock(&rxrpc_connection_lock);
325 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
326 pr_err("AF_RXRPC: Leaked conn %p {%d}\n",
327 conn, atomic_read(&conn->usage));
328 leak = true;
329 }
330 write_unlock(&rxrpc_connection_lock);
331 BUG_ON(leak);
332
333 /* Make sure the local and peer records pinned by any dying connections
334 * are released.
335 */
336 rcu_barrier();
337 rxrpc_destroy_client_conn_ids();
David Howells17926a72007-04-26 15:48:28 -0700338
339 _leave("");
340}