]> git.ipfire.org Git - people/ms/linux.git/blame - net/rxrpc/conn_object.c
rxrpc, afs: Fix selection of abort codes
[people/ms/linux.git] / net / rxrpc / conn_object.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
45025bce 2/* RxRPC virtual connection handler, common bits.
17926a79 3 *
45025bce 4 * Copyright (C) 2007, 2016 Red Hat, Inc. All Rights Reserved.
17926a79 5 * Written by David Howells (dhowells@redhat.com)
17926a79
DH
6 */
7
9b6d5398
JP
8#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
9
17926a79 10#include <linux/module.h>
5a0e3ad6 11#include <linux/slab.h>
17926a79
DH
12#include <linux/net.h>
13#include <linux/skbuff.h>
17926a79
DH
14#include "ar-internal.h"
15
5873c083
DH
16/*
17 * Time till a connection expires after last use (in seconds).
18 */
f859ab61
DH
19unsigned int __read_mostly rxrpc_connection_expiry = 10 * 60;
20unsigned int __read_mostly rxrpc_closed_conn_expiry = 10;
5873c083 21
45025bce
DH
22static void rxrpc_destroy_connection(struct rcu_head *);
23
3136ef49
DH
24static void rxrpc_connection_timer(struct timer_list *timer)
25{
26 struct rxrpc_connection *conn =
27 container_of(timer, struct rxrpc_connection, timer);
28
29 rxrpc_queue_conn(conn);
30}
31
17926a79
DH
32/*
33 * allocate a new connection
34 */
c6d2b8d7 35struct rxrpc_connection *rxrpc_alloc_connection(gfp_t gfp)
17926a79
DH
36{
37 struct rxrpc_connection *conn;
38
39 _enter("");
40
41 conn = kzalloc(sizeof(struct rxrpc_connection), gfp);
42 if (conn) {
45025bce 43 INIT_LIST_HEAD(&conn->cache_link);
3136ef49 44 timer_setup(&conn->timer, &rxrpc_connection_timer, 0);
17926a79 45 INIT_WORK(&conn->processor, &rxrpc_process_connection);
4d028b2c 46 INIT_LIST_HEAD(&conn->proc_link);
999b69f8 47 INIT_LIST_HEAD(&conn->link);
17926a79 48 skb_queue_head_init(&conn->rx_queue);
e0e4d82f 49 conn->security = &rxrpc_no_security;
17926a79 50 spin_lock_init(&conn->state_lock);
17926a79 51 conn->debug_id = atomic_inc_return(&rxrpc_debug_id);
f51b4480 52 conn->idle_timestamp = jiffies;
17926a79
DH
53 }
54
16c61add 55 _leave(" = %p{%d}", conn, conn ? conn->debug_id : 0);
17926a79
DH
56 return conn;
57}
58
17926a79 59/*
8496af50
DH
60 * Look up a connection in the cache by protocol parameters.
61 *
62 * If successful, a pointer to the connection is returned, but no ref is taken.
63 * NULL is returned if there is no match.
64 *
0099dc58
DH
65 * When searching for a service call, if we find a peer but no connection, we
66 * return that through *_peer in case we need to create a new service call.
67 *
8496af50 68 * The caller must be holding the RCU read lock.
17926a79 69 */
8496af50 70struct rxrpc_connection *rxrpc_find_connection_rcu(struct rxrpc_local *local,
0099dc58
DH
71 struct sk_buff *skb,
72 struct rxrpc_peer **_peer)
17926a79
DH
73{
74 struct rxrpc_connection *conn;
1291e9d1 75 struct rxrpc_conn_proto k;
42886ffe 76 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
1291e9d1
DH
77 struct sockaddr_rxrpc srx;
78 struct rxrpc_peer *peer;
17926a79 79
8496af50 80 _enter(",%x", sp->hdr.cid & RXRPC_CIDMASK);
17926a79 81
5a790b73 82 if (rxrpc_extract_addr_from_skb(&srx, skb) < 0)
1291e9d1 83 goto not_found;
17926a79 84
46894a13
DH
85 if (srx.transport.family != local->srx.transport.family &&
86 (srx.transport.family == AF_INET &&
87 local->srx.transport.family != AF_INET6)) {
1291e9d1
DH
88 pr_warn_ratelimited("AF_RXRPC: Protocol mismatch %u not %u\n",
89 srx.transport.family,
90 local->srx.transport.family);
91 goto not_found;
92 }
93
94 k.epoch = sp->hdr.epoch;
95 k.cid = sp->hdr.cid & RXRPC_CIDMASK;
17926a79 96
dc71db34 97 if (rxrpc_to_server(sp)) {
1291e9d1
DH
98 /* We need to look up service connections by the full protocol
99 * parameter set. We look up the peer first as an intermediate
100 * step and then the connection from the peer's tree.
101 */
102 peer = rxrpc_lookup_peer_rcu(local, &srx);
103 if (!peer)
104 goto not_found;
0099dc58 105 *_peer = peer;
8496af50 106 conn = rxrpc_find_service_conn_rcu(peer, skb);
a0575429 107 if (!conn || refcount_read(&conn->ref) == 0)
8496af50
DH
108 goto not_found;
109 _leave(" = %p", conn);
110 return conn;
4a3388c8 111 } else {
8496af50
DH
112 /* Look up client connections by connection ID alone as their
113 * IDs are unique for this machine.
114 */
1291e9d1 115 conn = idr_find(&rxrpc_client_conn_ids,
8496af50 116 sp->hdr.cid >> RXRPC_CIDSHIFT);
a0575429 117 if (!conn || refcount_read(&conn->ref) == 0) {
8496af50
DH
118 _debug("no conn");
119 goto not_found;
120 }
121
122 if (conn->proto.epoch != k.epoch ||
1291e9d1
DH
123 conn->params.local != local)
124 goto not_found;
125
126 peer = conn->params.peer;
127 switch (srx.transport.family) {
128 case AF_INET:
129 if (peer->srx.transport.sin.sin_port !=
130 srx.transport.sin.sin_port ||
131 peer->srx.transport.sin.sin_addr.s_addr !=
132 srx.transport.sin.sin_addr.s_addr)
133 goto not_found;
134 break;
d1912747 135#ifdef CONFIG_AF_RXRPC_IPV6
75b54cb5
DH
136 case AF_INET6:
137 if (peer->srx.transport.sin6.sin6_port !=
138 srx.transport.sin6.sin6_port ||
139 memcmp(&peer->srx.transport.sin6.sin6_addr,
140 &srx.transport.sin6.sin6_addr,
141 sizeof(struct in6_addr)) != 0)
142 goto not_found;
143 break;
d1912747 144#endif
1291e9d1
DH
145 default:
146 BUG();
147 }
148
1291e9d1
DH
149 _leave(" = %p", conn);
150 return conn;
17926a79
DH
151 }
152
1291e9d1 153not_found:
17926a79
DH
154 _leave(" = NULL");
155 return NULL;
17926a79
DH
156}
157
999b69f8
DH
158/*
159 * Disconnect a call and clear any channel it occupies when that call
a1399f8b
DH
160 * terminates. The caller must hold the channel_lock and must release the
161 * call's ref on the connection.
999b69f8 162 */
45025bce
DH
163void __rxrpc_disconnect_call(struct rxrpc_connection *conn,
164 struct rxrpc_call *call)
999b69f8 165{
01a90a45
DH
166 struct rxrpc_channel *chan =
167 &conn->channels[call->cid & RXRPC_CHANNELMASK];
999b69f8 168
01a90a45 169 _enter("%d,%x", conn->debug_id, call->cid);
999b69f8 170
a1399f8b
DH
171 if (rcu_access_pointer(chan->call) == call) {
172 /* Save the result of the call so that we can repeat it if necessary
173 * through the channel, whilst disposing of the actual call record.
174 */
b1d9f7fd 175 trace_rxrpc_disconnect_call(call);
17e9e23b
DH
176 switch (call->completion) {
177 case RXRPC_CALL_SUCCEEDED:
248f219c 178 chan->last_seq = call->rx_hard_ack;
18bfeba5 179 chan->last_type = RXRPC_PACKET_TYPE_ACK;
17e9e23b
DH
180 break;
181 case RXRPC_CALL_LOCALLY_ABORTED:
182 chan->last_abort = call->abort_code;
183 chan->last_type = RXRPC_PACKET_TYPE_ABORT;
184 break;
185 default:
de696c47 186 chan->last_abort = RX_CALL_DEAD;
17e9e23b
DH
187 chan->last_type = RXRPC_PACKET_TYPE_ABORT;
188 break;
18bfeba5 189 }
17e9e23b 190
18bfeba5 191 /* Sync with rxrpc_conn_retransmit(). */
a1399f8b
DH
192 smp_wmb();
193 chan->last_call = chan->call_id;
194 chan->call_id = chan->call_counter;
e653cfe4 195
a1399f8b 196 rcu_assign_pointer(chan->call, NULL);
999b69f8 197 }
e653cfe4 198
a1399f8b
DH
199 _leave("");
200}
201
202/*
203 * Disconnect a call and clear any channel it occupies when that call
204 * terminates.
205 */
206void rxrpc_disconnect_call(struct rxrpc_call *call)
207{
208 struct rxrpc_connection *conn = call->conn;
209
f7aec129
DH
210 call->peer->cong_cwnd = call->cong_cwnd;
211
65550098
DH
212 if (!hlist_unhashed(&call->error_link)) {
213 spin_lock_bh(&call->peer->lock);
214 hlist_del_rcu(&call->error_link);
215 spin_unlock_bh(&call->peer->lock);
216 }
248f219c 217
45025bce 218 if (rxrpc_is_client_call(call))
245500d8 219 return rxrpc_disconnect_client_call(conn->bundle, call);
45025bce 220
245500d8 221 spin_lock(&conn->bundle->channel_lock);
45025bce 222 __rxrpc_disconnect_call(conn, call);
245500d8 223 spin_unlock(&conn->bundle->channel_lock);
e653cfe4 224
b39a934e 225 set_bit(RXRPC_CALL_DISCONNECTED, &call->flags);
f51b4480 226 conn->idle_timestamp = jiffies;
999b69f8
DH
227}
228
45025bce
DH
229/*
230 * Kill off a connection.
231 */
232void rxrpc_kill_connection(struct rxrpc_connection *conn)
233{
2baec2c3
DH
234 struct rxrpc_net *rxnet = conn->params.local->rxnet;
235
45025bce
DH
236 ASSERT(!rcu_access_pointer(conn->channels[0].call) &&
237 !rcu_access_pointer(conn->channels[1].call) &&
238 !rcu_access_pointer(conn->channels[2].call) &&
239 !rcu_access_pointer(conn->channels[3].call));
240 ASSERT(list_empty(&conn->cache_link));
241
2baec2c3 242 write_lock(&rxnet->conn_lock);
45025bce 243 list_del_init(&conn->proc_link);
2baec2c3 244 write_unlock(&rxnet->conn_lock);
45025bce
DH
245
246 /* Drain the Rx queue. Note that even though we've unpublished, an
247 * incoming packet could still be being added to our Rx queue, so we
248 * will need to drain it again in the RCU cleanup handler.
249 */
250 rxrpc_purge_queue(&conn->rx_queue);
251
252 /* Leave final destruction to RCU. The connection processor work item
253 * must carry a ref on the connection to prevent us getting here whilst
254 * it is queued or running.
255 */
256 call_rcu(&conn->rcu, rxrpc_destroy_connection);
257}
258
17926a79 259/*
363deeab
DH
260 * Queue a connection's work processor, getting a ref to pass to the work
261 * queue.
17926a79 262 */
363deeab 263bool rxrpc_queue_conn(struct rxrpc_connection *conn)
17926a79 264{
363deeab 265 const void *here = __builtin_return_address(0);
a0575429
DH
266 int r;
267
268 if (!__refcount_inc_not_zero(&conn->ref, &r))
363deeab
DH
269 return false;
270 if (rxrpc_queue_work(&conn->processor))
a0575429 271 trace_rxrpc_conn(conn->debug_id, rxrpc_conn_queued, r + 1, here);
363deeab
DH
272 else
273 rxrpc_put_connection(conn);
274 return true;
275}
276
277/*
278 * Note the re-emergence of a connection.
279 */
280void rxrpc_see_connection(struct rxrpc_connection *conn)
281{
282 const void *here = __builtin_return_address(0);
283 if (conn) {
a0575429 284 int n = refcount_read(&conn->ref);
363deeab 285
4c1295dc 286 trace_rxrpc_conn(conn->debug_id, rxrpc_conn_seen, n, here);
363deeab
DH
287 }
288}
289
290/*
291 * Get a ref on a connection.
292 */
245500d8 293struct rxrpc_connection *rxrpc_get_connection(struct rxrpc_connection *conn)
363deeab
DH
294{
295 const void *here = __builtin_return_address(0);
a0575429 296 int r;
363deeab 297
a0575429
DH
298 __refcount_inc(&conn->ref, &r);
299 trace_rxrpc_conn(conn->debug_id, rxrpc_conn_got, r, here);
245500d8 300 return conn;
363deeab
DH
301}
302
303/*
304 * Try to get a ref on a connection.
305 */
306struct rxrpc_connection *
307rxrpc_get_connection_maybe(struct rxrpc_connection *conn)
308{
309 const void *here = __builtin_return_address(0);
a0575429 310 int r;
363deeab
DH
311
312 if (conn) {
a0575429
DH
313 if (__refcount_inc_not_zero(&conn->ref, &r))
314 trace_rxrpc_conn(conn->debug_id, rxrpc_conn_got, r + 1, here);
363deeab
DH
315 else
316 conn = NULL;
317 }
318 return conn;
319}
320
3d18cbb7
DH
321/*
322 * Set the service connection reap timer.
323 */
324static void rxrpc_set_service_reap_timer(struct rxrpc_net *rxnet,
325 unsigned long reap_at)
326{
327 if (rxnet->live)
328 timer_reduce(&rxnet->service_conn_reap_timer, reap_at);
329}
330
363deeab
DH
331/*
332 * Release a service connection
333 */
334void rxrpc_put_service_conn(struct rxrpc_connection *conn)
335{
336 const void *here = __builtin_return_address(0);
4c1295dc 337 unsigned int debug_id = conn->debug_id;
a0575429 338 int r;
363deeab 339
a0575429
DH
340 __refcount_dec(&conn->ref, &r);
341 trace_rxrpc_conn(debug_id, rxrpc_conn_put_service, r - 1, here);
342 if (r - 1 == 1)
3d18cbb7
DH
343 rxrpc_set_service_reap_timer(conn->params.local->rxnet,
344 jiffies + rxrpc_connection_expiry);
17926a79
DH
345}
346
347/*
348 * destroy a virtual connection
349 */
dee46364 350static void rxrpc_destroy_connection(struct rcu_head *rcu)
17926a79 351{
dee46364
DH
352 struct rxrpc_connection *conn =
353 container_of(rcu, struct rxrpc_connection, rcu);
354
a0575429 355 _enter("{%d,u=%d}", conn->debug_id, refcount_read(&conn->ref));
17926a79 356
a0575429 357 ASSERTCMP(refcount_read(&conn->ref), ==, 0);
17926a79
DH
358
359 _net("DESTROY CONN %d", conn->debug_id);
360
3136ef49 361 del_timer_sync(&conn->timer);
17926a79
DH
362 rxrpc_purge_queue(&conn->rx_queue);
363
e0e4d82f 364 conn->security->clear(conn);
19ffa01c 365 key_put(conn->params.key);
245500d8 366 rxrpc_put_bundle(conn->bundle);
aa390bbe 367 rxrpc_put_peer(conn->params.peer);
31f5f9a1
DH
368
369 if (atomic_dec_and_test(&conn->params.local->rxnet->nr_conns))
5bb053be 370 wake_up_var(&conn->params.local->rxnet->nr_conns);
aa390bbe 371 rxrpc_put_local(conn->params.local);
e0e4d82f 372
17926a79
DH
373 kfree(conn);
374 _leave("");
375}
376
377/*
45025bce 378 * reap dead service connections
17926a79 379 */
2baec2c3 380void rxrpc_service_connection_reaper(struct work_struct *work)
17926a79
DH
381{
382 struct rxrpc_connection *conn, *_p;
2baec2c3 383 struct rxrpc_net *rxnet =
3d18cbb7 384 container_of(work, struct rxrpc_net, service_conn_reaper);
f859ab61 385 unsigned long expire_at, earliest, idle_timestamp, now;
17926a79
DH
386
387 LIST_HEAD(graveyard);
388
389 _enter("");
390
f51b4480 391 now = jiffies;
f859ab61 392 earliest = now + MAX_JIFFY_OFFSET;
17926a79 393
2baec2c3
DH
394 write_lock(&rxnet->conn_lock);
395 list_for_each_entry_safe(conn, _p, &rxnet->service_conns, link) {
a0575429
DH
396 ASSERTCMP(refcount_read(&conn->ref), >, 0);
397 if (likely(refcount_read(&conn->ref) > 1))
17926a79 398 continue;
00e90712
DH
399 if (conn->state == RXRPC_CONN_SERVICE_PREALLOC)
400 continue;
17926a79 401
d12040b6 402 if (rxnet->live && !conn->params.local->dead) {
f859ab61
DH
403 idle_timestamp = READ_ONCE(conn->idle_timestamp);
404 expire_at = idle_timestamp + rxrpc_connection_expiry * HZ;
405 if (conn->params.local->service_closed)
406 expire_at = idle_timestamp + rxrpc_closed_conn_expiry * HZ;
407
408 _debug("reap CONN %d { u=%d,t=%ld }",
a0575429 409 conn->debug_id, refcount_read(&conn->ref),
f859ab61
DH
410 (long)expire_at - (long)now);
411
412 if (time_before(now, expire_at)) {
413 if (time_before(expire_at, earliest))
414 earliest = expire_at;
415 continue;
416 }
17926a79 417 }
001c1122
DH
418
419 /* The usage count sits at 1 whilst the object is unused on the
420 * list; we reduce that to 0 to make the object unavailable.
421 */
a0575429 422 if (!refcount_dec_if_one(&conn->ref))
001c1122 423 continue;
4c1295dc 424 trace_rxrpc_conn(conn->debug_id, rxrpc_conn_reap_service, 0, NULL);
001c1122
DH
425
426 if (rxrpc_conn_is_client(conn))
45025bce 427 BUG();
001c1122
DH
428 else
429 rxrpc_unpublish_service_conn(conn);
430
431 list_move_tail(&conn->link, &graveyard);
17926a79 432 }
2baec2c3 433 write_unlock(&rxnet->conn_lock);
17926a79 434
f859ab61
DH
435 if (earliest != now + MAX_JIFFY_OFFSET) {
436 _debug("reschedule reaper %ld", (long)earliest - (long)now);
f51b4480 437 ASSERT(time_after(earliest, now));
3d7682af 438 rxrpc_set_service_reap_timer(rxnet, earliest);
17926a79
DH
439 }
440
17926a79
DH
441 while (!list_empty(&graveyard)) {
442 conn = list_entry(graveyard.next, struct rxrpc_connection,
443 link);
444 list_del_init(&conn->link);
445
a0575429 446 ASSERTCMP(refcount_read(&conn->ref), ==, 0);
45025bce 447 rxrpc_kill_connection(conn);
17926a79
DH
448 }
449
450 _leave("");
451}
452
453/*
45025bce
DH
454 * preemptively destroy all the service connection records rather than
455 * waiting for them to time out
17926a79 456 */
2baec2c3 457void rxrpc_destroy_all_connections(struct rxrpc_net *rxnet)
17926a79 458{
dee46364
DH
459 struct rxrpc_connection *conn, *_p;
460 bool leak = false;
461
17926a79
DH
462 _enter("");
463
31f5f9a1 464 atomic_dec(&rxnet->nr_conns);
2baec2c3 465 rxrpc_destroy_all_client_connections(rxnet);
45025bce 466
3d18cbb7
DH
467 del_timer_sync(&rxnet->service_conn_reap_timer);
468 rxrpc_queue_work(&rxnet->service_conn_reaper);
dee46364
DH
469 flush_workqueue(rxrpc_workqueue);
470
2baec2c3
DH
471 write_lock(&rxnet->conn_lock);
472 list_for_each_entry_safe(conn, _p, &rxnet->service_conns, link) {
dee46364 473 pr_err("AF_RXRPC: Leaked conn %p {%d}\n",
a0575429 474 conn, refcount_read(&conn->ref));
dee46364
DH
475 leak = true;
476 }
2baec2c3 477 write_unlock(&rxnet->conn_lock);
dee46364
DH
478 BUG_ON(leak);
479
2baec2c3 480 ASSERT(list_empty(&rxnet->conn_proc_list));
17926a79 481
31f5f9a1
DH
482 /* We need to wait for the connections to be destroyed by RCU as they
483 * pin things that we still need to get rid of.
484 */
5bb053be 485 wait_var_event(&rxnet->nr_conns, !atomic_read(&rxnet->nr_conns));
17926a79
DH
486 _leave("");
487}