blob: 6a5a17efc538aefad15687383fc110570d35cc8b [file] [log] [blame]
David Howells17926a72007-04-26 15:48:28 -07001/* RxRPC virtual connection handler
2 *
3 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
Joe Perches9b6d5392016-06-02 12:08:52 -070012#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
David Howells17926a72007-04-26 15:48:28 -070014#include <linux/module.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090015#include <linux/slab.h>
David Howells17926a72007-04-26 15:48:28 -070016#include <linux/net.h>
17#include <linux/skbuff.h>
David Howells17926a72007-04-26 15:48:28 -070018#include <net/sock.h>
19#include <net/af_rxrpc.h>
20#include "ar-internal.h"
21
David Howells5873c082014-02-07 18:58:44 +000022/*
23 * Time till a connection expires after last use (in seconds).
24 */
David Howellsdad8aff2016-03-09 23:22:56 +000025unsigned int rxrpc_connection_expiry = 10 * 60;
David Howells5873c082014-02-07 18:58:44 +000026
David Howells17926a72007-04-26 15:48:28 -070027static void rxrpc_connection_reaper(struct work_struct *work);
28
29LIST_HEAD(rxrpc_connections);
30DEFINE_RWLOCK(rxrpc_connection_lock);
David Howells17926a72007-04-26 15:48:28 -070031static DECLARE_DELAYED_WORK(rxrpc_connection_reap, rxrpc_connection_reaper);
32
33/*
David Howells17926a72007-04-26 15:48:28 -070034 * allocate a new connection
35 */
David Howellsc6d2b8d2016-04-04 14:00:40 +010036struct rxrpc_connection *rxrpc_alloc_connection(gfp_t gfp)
David Howells17926a72007-04-26 15:48:28 -070037{
38 struct rxrpc_connection *conn;
39
40 _enter("");
41
42 conn = kzalloc(sizeof(struct rxrpc_connection), gfp);
43 if (conn) {
David Howells999b69f2016-06-17 15:42:35 +010044 spin_lock_init(&conn->channel_lock);
45 init_waitqueue_head(&conn->channel_wq);
David Howells17926a72007-04-26 15:48:28 -070046 INIT_WORK(&conn->processor, &rxrpc_process_connection);
David Howells999b69f2016-06-17 15:42:35 +010047 INIT_LIST_HEAD(&conn->link);
David Howells17926a72007-04-26 15:48:28 -070048 skb_queue_head_init(&conn->rx_queue);
David Howellse0e4d822016-04-07 17:23:58 +010049 conn->security = &rxrpc_no_security;
David Howells17926a72007-04-26 15:48:28 -070050 spin_lock_init(&conn->state_lock);
David Howells001c1122016-06-30 10:45:22 +010051 /* We maintain an extra ref on the connection whilst it is
52 * on the rxrpc_connections list.
53 */
54 atomic_set(&conn->usage, 2);
David Howells17926a72007-04-26 15:48:28 -070055 conn->debug_id = atomic_inc_return(&rxrpc_debug_id);
David Howells999b69f2016-06-17 15:42:35 +010056 atomic_set(&conn->avail_chans, RXRPC_MAXCALLS);
David Howells17926a72007-04-26 15:48:28 -070057 conn->size_align = 4;
David Howells0d12f8a2016-03-04 15:53:46 +000058 conn->header_size = sizeof(struct rxrpc_wire_header);
David Howells17926a72007-04-26 15:48:28 -070059 }
60
Adrian Bunk16c61ad2007-06-15 15:15:43 -070061 _leave(" = %p{%d}", conn, conn ? conn->debug_id : 0);
David Howells17926a72007-04-26 15:48:28 -070062 return conn;
63}
64
65/*
David Howells8496af52016-07-01 07:51:50 +010066 * Look up a connection in the cache by protocol parameters.
67 *
68 * If successful, a pointer to the connection is returned, but no ref is taken.
69 * NULL is returned if there is no match.
70 *
71 * The caller must be holding the RCU read lock.
David Howells17926a72007-04-26 15:48:28 -070072 */
David Howells8496af52016-07-01 07:51:50 +010073struct rxrpc_connection *rxrpc_find_connection_rcu(struct rxrpc_local *local,
74 struct sk_buff *skb)
David Howells17926a72007-04-26 15:48:28 -070075{
76 struct rxrpc_connection *conn;
David Howells1291e9d2016-06-30 12:02:53 +010077 struct rxrpc_conn_proto k;
David Howells42886ff2016-06-16 13:31:07 +010078 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
David Howells1291e9d2016-06-30 12:02:53 +010079 struct sockaddr_rxrpc srx;
80 struct rxrpc_peer *peer;
David Howells17926a72007-04-26 15:48:28 -070081
David Howells8496af52016-07-01 07:51:50 +010082 _enter(",%x", sp->hdr.cid & RXRPC_CIDMASK);
David Howells17926a72007-04-26 15:48:28 -070083
David Howells1291e9d2016-06-30 12:02:53 +010084 if (rxrpc_extract_addr_from_skb(&srx, skb) < 0)
85 goto not_found;
David Howells17926a72007-04-26 15:48:28 -070086
David Howells8496af52016-07-01 07:51:50 +010087 k.epoch = sp->hdr.epoch;
88 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
89
David Howells1291e9d2016-06-30 12:02:53 +010090 /* We may have to handle mixing IPv4 and IPv6 */
91 if (srx.transport.family != local->srx.transport.family) {
92 pr_warn_ratelimited("AF_RXRPC: Protocol mismatch %u not %u\n",
93 srx.transport.family,
94 local->srx.transport.family);
95 goto not_found;
96 }
97
98 k.epoch = sp->hdr.epoch;
99 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
David Howells17926a72007-04-26 15:48:28 -0700100
David Howells4a3388c2016-04-04 14:00:37 +0100101 if (sp->hdr.flags & RXRPC_CLIENT_INITIATED) {
David Howells1291e9d2016-06-30 12:02:53 +0100102 /* We need to look up service connections by the full protocol
103 * parameter set. We look up the peer first as an intermediate
104 * step and then the connection from the peer's tree.
105 */
106 peer = rxrpc_lookup_peer_rcu(local, &srx);
107 if (!peer)
108 goto not_found;
David Howells8496af52016-07-01 07:51:50 +0100109 conn = rxrpc_find_service_conn_rcu(peer, skb);
110 if (!conn || atomic_read(&conn->usage) == 0)
111 goto not_found;
112 _leave(" = %p", conn);
113 return conn;
David Howells4a3388c2016-04-04 14:00:37 +0100114 } else {
David Howells8496af52016-07-01 07:51:50 +0100115 /* Look up client connections by connection ID alone as their
116 * IDs are unique for this machine.
117 */
David Howells1291e9d2016-06-30 12:02:53 +0100118 conn = idr_find(&rxrpc_client_conn_ids,
David Howells8496af52016-07-01 07:51:50 +0100119 sp->hdr.cid >> RXRPC_CIDSHIFT);
120 if (!conn || atomic_read(&conn->usage) == 0) {
121 _debug("no conn");
122 goto not_found;
123 }
124
125 if (conn->proto.epoch != k.epoch ||
David Howells1291e9d2016-06-30 12:02:53 +0100126 conn->params.local != local)
127 goto not_found;
128
129 peer = conn->params.peer;
130 switch (srx.transport.family) {
131 case AF_INET:
132 if (peer->srx.transport.sin.sin_port !=
133 srx.transport.sin.sin_port ||
134 peer->srx.transport.sin.sin_addr.s_addr !=
135 srx.transport.sin.sin_addr.s_addr)
136 goto not_found;
137 break;
138 default:
139 BUG();
140 }
141
David Howells1291e9d2016-06-30 12:02:53 +0100142 _leave(" = %p", conn);
143 return conn;
David Howells17926a72007-04-26 15:48:28 -0700144 }
145
David Howells1291e9d2016-06-30 12:02:53 +0100146not_found:
David Howells17926a72007-04-26 15:48:28 -0700147 _leave(" = NULL");
148 return NULL;
David Howells17926a72007-04-26 15:48:28 -0700149}
150
151/*
David Howells999b69f2016-06-17 15:42:35 +0100152 * Disconnect a call and clear any channel it occupies when that call
David Howellsa1399f82016-06-27 14:39:44 +0100153 * terminates. The caller must hold the channel_lock and must release the
154 * call's ref on the connection.
155 */
156void __rxrpc_disconnect_call(struct rxrpc_call *call)
157{
158 struct rxrpc_connection *conn = call->conn;
David Howells01a90a42016-08-23 15:27:24 +0100159 struct rxrpc_channel *chan =
160 &conn->channels[call->cid & RXRPC_CHANNELMASK];
David Howellsa1399f82016-06-27 14:39:44 +0100161
David Howells01a90a42016-08-23 15:27:24 +0100162 _enter("%d,%x", conn->debug_id, call->cid);
David Howellsa1399f82016-06-27 14:39:44 +0100163
164 if (rcu_access_pointer(chan->call) == call) {
165 /* Save the result of the call so that we can repeat it if necessary
166 * through the channel, whilst disposing of the actual call record.
167 */
168 chan->last_result = call->local_abort;
169 smp_wmb();
170 chan->last_call = chan->call_id;
171 chan->call_id = chan->call_counter;
172
173 rcu_assign_pointer(chan->call, NULL);
174 atomic_inc(&conn->avail_chans);
175 wake_up(&conn->channel_wq);
176 }
177
178 _leave("");
179}
180
181/*
182 * Disconnect a call and clear any channel it occupies when that call
David Howells999b69f2016-06-17 15:42:35 +0100183 * terminates.
184 */
185void rxrpc_disconnect_call(struct rxrpc_call *call)
186{
187 struct rxrpc_connection *conn = call->conn;
David Howells999b69f2016-06-17 15:42:35 +0100188
David Howellse653cfe2016-04-04 14:00:38 +0100189 spin_lock(&conn->channel_lock);
David Howellsa1399f82016-06-27 14:39:44 +0100190 __rxrpc_disconnect_call(call);
David Howellse653cfe2016-04-04 14:00:38 +0100191 spin_unlock(&conn->channel_lock);
192
193 call->conn = NULL;
194 rxrpc_put_connection(conn);
David Howells999b69f2016-06-17 15:42:35 +0100195}
196
197/*
David Howells17926a72007-04-26 15:48:28 -0700198 * release a virtual connection
199 */
200void rxrpc_put_connection(struct rxrpc_connection *conn)
201{
David Howells999b69f2016-06-17 15:42:35 +0100202 if (!conn)
203 return;
204
David Howells17926a72007-04-26 15:48:28 -0700205 _enter("%p{u=%d,d=%d}",
206 conn, atomic_read(&conn->usage), conn->debug_id);
207
David Howells001c1122016-06-30 10:45:22 +0100208 ASSERTCMP(atomic_read(&conn->usage), >, 1);
David Howells17926a72007-04-26 15:48:28 -0700209
Ksenija Stanojevic22a3f9a2015-09-17 18:12:53 +0200210 conn->put_time = ktime_get_seconds();
David Howells001c1122016-06-30 10:45:22 +0100211 if (atomic_dec_return(&conn->usage) == 1) {
David Howells17926a72007-04-26 15:48:28 -0700212 _debug("zombie");
David Howells651350d2007-04-26 15:50:17 -0700213 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
David Howells17926a72007-04-26 15:48:28 -0700214 }
215
216 _leave("");
217}
218
219/*
220 * destroy a virtual connection
221 */
David Howellsdee46362016-06-27 17:11:19 +0100222static void rxrpc_destroy_connection(struct rcu_head *rcu)
David Howells17926a72007-04-26 15:48:28 -0700223{
David Howellsdee46362016-06-27 17:11:19 +0100224 struct rxrpc_connection *conn =
225 container_of(rcu, struct rxrpc_connection, rcu);
226
227 _enter("{%d,u=%d}", conn->debug_id, atomic_read(&conn->usage));
David Howells17926a72007-04-26 15:48:28 -0700228
229 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
230
231 _net("DESTROY CONN %d", conn->debug_id);
232
David Howells17926a72007-04-26 15:48:28 -0700233 rxrpc_purge_queue(&conn->rx_queue);
234
David Howellse0e4d822016-04-07 17:23:58 +0100235 conn->security->clear(conn);
David Howells19ffa012016-04-04 14:00:36 +0100236 key_put(conn->params.key);
David Howellse0e4d822016-04-07 17:23:58 +0100237 key_put(conn->server_key);
David Howellsaa390bb2016-06-17 10:06:56 +0100238 rxrpc_put_peer(conn->params.peer);
239 rxrpc_put_local(conn->params.local);
David Howellse0e4d822016-04-07 17:23:58 +0100240
David Howells17926a72007-04-26 15:48:28 -0700241 kfree(conn);
242 _leave("");
243}
244
245/*
246 * reap dead connections
247 */
Roel Kluin5eaa65b2008-12-10 15:18:31 -0800248static void rxrpc_connection_reaper(struct work_struct *work)
David Howells17926a72007-04-26 15:48:28 -0700249{
250 struct rxrpc_connection *conn, *_p;
David Howells001c1122016-06-30 10:45:22 +0100251 unsigned long reap_older_than, earliest, put_time, now;
David Howells17926a72007-04-26 15:48:28 -0700252
253 LIST_HEAD(graveyard);
254
255 _enter("");
256
Ksenija Stanojevic22a3f9a2015-09-17 18:12:53 +0200257 now = ktime_get_seconds();
David Howells001c1122016-06-30 10:45:22 +0100258 reap_older_than = now - rxrpc_connection_expiry;
David Howells17926a72007-04-26 15:48:28 -0700259 earliest = ULONG_MAX;
260
David Howellsb3f57502016-06-21 16:10:03 +0100261 write_lock(&rxrpc_connection_lock);
David Howells17926a72007-04-26 15:48:28 -0700262 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
David Howells001c1122016-06-30 10:45:22 +0100263 ASSERTCMP(atomic_read(&conn->usage), >, 0);
264 if (likely(atomic_read(&conn->usage) > 1))
David Howells17926a72007-04-26 15:48:28 -0700265 continue;
266
David Howells001c1122016-06-30 10:45:22 +0100267 put_time = READ_ONCE(conn->put_time);
268 if (time_after(put_time, reap_older_than)) {
269 if (time_before(put_time, earliest))
270 earliest = put_time;
271 continue;
David Howells999b69f2016-06-17 15:42:35 +0100272 }
David Howells001c1122016-06-30 10:45:22 +0100273
274 /* The usage count sits at 1 whilst the object is unused on the
275 * list; we reduce that to 0 to make the object unavailable.
276 */
277 if (atomic_cmpxchg(&conn->usage, 1, 0) != 1)
278 continue;
279
280 if (rxrpc_conn_is_client(conn))
281 rxrpc_unpublish_client_conn(conn);
282 else
283 rxrpc_unpublish_service_conn(conn);
284
285 list_move_tail(&conn->link, &graveyard);
David Howells17926a72007-04-26 15:48:28 -0700286 }
David Howellsb3f57502016-06-21 16:10:03 +0100287 write_unlock(&rxrpc_connection_lock);
David Howells17926a72007-04-26 15:48:28 -0700288
289 if (earliest != ULONG_MAX) {
290 _debug("reschedule reaper %ld", (long) earliest - now);
291 ASSERTCMP(earliest, >, now);
David Howells651350d2007-04-26 15:50:17 -0700292 rxrpc_queue_delayed_work(&rxrpc_connection_reap,
293 (earliest - now) * HZ);
David Howells17926a72007-04-26 15:48:28 -0700294 }
295
David Howells17926a72007-04-26 15:48:28 -0700296 while (!list_empty(&graveyard)) {
297 conn = list_entry(graveyard.next, struct rxrpc_connection,
298 link);
299 list_del_init(&conn->link);
300
301 ASSERTCMP(atomic_read(&conn->usage), ==, 0);
David Howellsdee46362016-06-27 17:11:19 +0100302 skb_queue_purge(&conn->rx_queue);
303 call_rcu(&conn->rcu, rxrpc_destroy_connection);
David Howells17926a72007-04-26 15:48:28 -0700304 }
305
306 _leave("");
307}
308
309/*
310 * preemptively destroy all the connection records rather than waiting for them
311 * to time out
312 */
313void __exit rxrpc_destroy_all_connections(void)
314{
David Howellsdee46362016-06-27 17:11:19 +0100315 struct rxrpc_connection *conn, *_p;
316 bool leak = false;
317
David Howells17926a72007-04-26 15:48:28 -0700318 _enter("");
319
David Howells5873c082014-02-07 18:58:44 +0000320 rxrpc_connection_expiry = 0;
David Howells17926a72007-04-26 15:48:28 -0700321 cancel_delayed_work(&rxrpc_connection_reap);
David Howells651350d2007-04-26 15:50:17 -0700322 rxrpc_queue_delayed_work(&rxrpc_connection_reap, 0);
David Howellsdee46362016-06-27 17:11:19 +0100323 flush_workqueue(rxrpc_workqueue);
324
325 write_lock(&rxrpc_connection_lock);
326 list_for_each_entry_safe(conn, _p, &rxrpc_connections, link) {
327 pr_err("AF_RXRPC: Leaked conn %p {%d}\n",
328 conn, atomic_read(&conn->usage));
329 leak = true;
330 }
331 write_unlock(&rxrpc_connection_lock);
332 BUG_ON(leak);
333
334 /* Make sure the local and peer records pinned by any dying connections
335 * are released.
336 */
337 rcu_barrier();
338 rxrpc_destroy_client_conn_ids();
David Howells17926a72007-04-26 15:48:28 -0700339
340 _leave("");
341}