Thomas Gleixner | b4d0d23 | 2019-05-20 19:08:01 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
David Howells | 8756361 | 2016-04-04 14:00:34 +0100 | [diff] [blame] | 2 | /* Local endpoint object management |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 3 | * |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 4 | * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved. |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 5 | * Written by David Howells (dhowells@redhat.com) |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 6 | */ |
| 7 | |
Joe Perches | 9b6d539 | 2016-06-02 12:08:52 -0700 | [diff] [blame] | 8 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
| 9 | |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 10 | #include <linux/module.h> |
| 11 | #include <linux/net.h> |
| 12 | #include <linux/skbuff.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 13 | #include <linux/slab.h> |
David Howells | 44ba069 | 2015-04-01 16:31:26 +0100 | [diff] [blame] | 14 | #include <linux/udp.h> |
| 15 | #include <linux/ip.h> |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 16 | #include <linux/hashtable.h> |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 17 | #include <net/sock.h> |
David Howells | 5271953 | 2018-10-04 11:10:51 +0100 | [diff] [blame] | 18 | #include <net/udp.h> |
Xin Long | 5d30c62 | 2021-02-03 16:54:23 +0800 | [diff] [blame] | 19 | #include <net/udp_tunnel.h> |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 20 | #include <net/af_rxrpc.h> |
| 21 | #include "ar-internal.h" |
| 22 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 23 | static void rxrpc_local_rcu(struct rcu_head *); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 24 | |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 25 | /* |
David Howells | b6c66c4 | 2022-10-12 09:51:12 +0100 | [diff] [blame] | 26 | * Handle an ICMP/ICMP6 error turning up at the tunnel. Push it through the |
| 27 | * usual mechanism so that it gets parsed and presented through the UDP |
| 28 | * socket's error_report(). |
| 29 | */ |
| 30 | static void rxrpc_encap_err_rcv(struct sock *sk, struct sk_buff *skb, int err, |
| 31 | __be16 port, u32 info, u8 *payload) |
| 32 | { |
| 33 | if (ip_hdr(skb)->version == IPVERSION) |
| 34 | return ip_icmp_error(sk, skb, err, port, info, payload); |
David Howells | 41cf3a9 | 2022-11-10 09:39:39 +0000 | [diff] [blame] | 35 | if (IS_ENABLED(CONFIG_AF_RXRPC_IPV6)) |
| 36 | return ipv6_icmp_error(sk, skb, err, port, info, payload); |
David Howells | b6c66c4 | 2022-10-12 09:51:12 +0100 | [diff] [blame] | 37 | } |
| 38 | |
| 39 | /* |
David Howells | 8722014 | 2024-01-09 15:10:48 +0000 | [diff] [blame] | 40 | * Set or clear the Don't Fragment flag on a socket. |
| 41 | */ |
| 42 | void rxrpc_local_dont_fragment(const struct rxrpc_local *local, bool set) |
| 43 | { |
| 44 | if (set) |
| 45 | ip_sock_set_mtu_discover(local->socket->sk, IP_PMTUDISC_DO); |
| 46 | else |
| 47 | ip_sock_set_mtu_discover(local->socket->sk, IP_PMTUDISC_DONT); |
| 48 | } |
| 49 | |
| 50 | /* |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 51 | * Compare a local to an address. Return -ve, 0 or +ve to indicate less than, |
| 52 | * same or greater than. |
| 53 | * |
| 54 | * We explicitly don't compare the RxRPC service ID as we want to reject |
| 55 | * conflicting uses by differing services. Further, we don't want to share |
| 56 | * addresses with different options (IPv6), so we don't compare those bits |
| 57 | * either. |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 58 | */ |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 59 | static long rxrpc_local_cmp_key(const struct rxrpc_local *local, |
| 60 | const struct sockaddr_rxrpc *srx) |
| 61 | { |
| 62 | long diff; |
| 63 | |
| 64 | diff = ((local->srx.transport_type - srx->transport_type) ?: |
| 65 | (local->srx.transport_len - srx->transport_len) ?: |
| 66 | (local->srx.transport.family - srx->transport.family)); |
| 67 | if (diff != 0) |
| 68 | return diff; |
| 69 | |
| 70 | switch (srx->transport.family) { |
| 71 | case AF_INET: |
| 72 | /* If the choice of UDP port is left up to the transport, then |
| 73 | * the endpoint record doesn't match. |
| 74 | */ |
| 75 | return ((u16 __force)local->srx.transport.sin.sin_port - |
| 76 | (u16 __force)srx->transport.sin.sin_port) ?: |
| 77 | memcmp(&local->srx.transport.sin.sin_addr, |
| 78 | &srx->transport.sin.sin_addr, |
| 79 | sizeof(struct in_addr)); |
David Howells | d191274 | 2016-09-17 07:26:01 +0100 | [diff] [blame] | 80 | #ifdef CONFIG_AF_RXRPC_IPV6 |
David Howells | 75b54cb | 2016-09-13 08:49:05 +0100 | [diff] [blame] | 81 | case AF_INET6: |
| 82 | /* If the choice of UDP6 port is left up to the transport, then |
| 83 | * the endpoint record doesn't match. |
| 84 | */ |
| 85 | return ((u16 __force)local->srx.transport.sin6.sin6_port - |
| 86 | (u16 __force)srx->transport.sin6.sin6_port) ?: |
| 87 | memcmp(&local->srx.transport.sin6.sin6_addr, |
| 88 | &srx->transport.sin6.sin6_addr, |
| 89 | sizeof(struct in6_addr)); |
David Howells | d191274 | 2016-09-17 07:26:01 +0100 | [diff] [blame] | 90 | #endif |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 91 | default: |
| 92 | BUG(); |
| 93 | } |
| 94 | } |
| 95 | |
David Howells | 0d6bf31 | 2022-11-02 16:46:13 +0000 | [diff] [blame] | 96 | static void rxrpc_client_conn_reap_timeout(struct timer_list *timer) |
| 97 | { |
| 98 | struct rxrpc_local *local = |
| 99 | container_of(timer, struct rxrpc_local, client_conn_reap_timer); |
| 100 | |
David Howells | 61e4a86 | 2023-10-27 00:49:34 +0100 | [diff] [blame] | 101 | if (!local->kill_all_client_conns && |
David Howells | 0d6bf31 | 2022-11-02 16:46:13 +0000 | [diff] [blame] | 102 | test_and_set_bit(RXRPC_CLIENT_CONN_REAP_TIMER, &local->client_conn_flags)) |
| 103 | rxrpc_wake_up_io_thread(local); |
| 104 | } |
| 105 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 106 | /* |
| 107 | * Allocate a new local endpoint. |
| 108 | */ |
David Howells | 8a758d9 | 2022-10-20 23:17:06 +0100 | [diff] [blame] | 109 | static struct rxrpc_local *rxrpc_alloc_local(struct net *net, |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 110 | const struct sockaddr_rxrpc *srx) |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 111 | { |
| 112 | struct rxrpc_local *local; |
David Howells | f06cb29 | 2022-10-20 22:58:56 +0100 | [diff] [blame] | 113 | u32 tmp; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 114 | |
| 115 | local = kzalloc(sizeof(struct rxrpc_local), GFP_KERNEL); |
| 116 | if (local) { |
David Howells | a0575429 | 2022-05-21 08:45:22 +0100 | [diff] [blame] | 117 | refcount_set(&local->ref, 1); |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 118 | atomic_set(&local->active_users, 1); |
David Howells | 8a758d9 | 2022-10-20 23:17:06 +0100 | [diff] [blame] | 119 | local->net = net; |
| 120 | local->rxnet = rxrpc_net(net); |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 121 | INIT_HLIST_NODE(&local->link); |
David Howells | 8fbcc83 | 2022-12-15 16:20:13 +0000 | [diff] [blame] | 122 | init_completion(&local->io_thread_ready); |
David Howells | af09482 | 2022-10-17 08:54:57 +0100 | [diff] [blame] | 123 | #ifdef CONFIG_AF_RXRPC_INJECT_RX_DELAY |
| 124 | skb_queue_head_init(&local->rx_delay_queue); |
| 125 | #endif |
David Howells | a275da6 | 2022-10-10 08:45:20 +0100 | [diff] [blame] | 126 | skb_queue_head_init(&local->rx_queue); |
David Howells | f2cce89 | 2022-10-20 09:08:34 +0100 | [diff] [blame] | 127 | INIT_LIST_HEAD(&local->conn_attend_q); |
David Howells | 15f661d | 2022-10-10 15:51:39 +0100 | [diff] [blame] | 128 | INIT_LIST_HEAD(&local->call_attend_q); |
David Howells | 0d6bf31 | 2022-11-02 16:46:13 +0000 | [diff] [blame] | 129 | |
David Howells | 245500d | 2020-07-01 11:15:32 +0100 | [diff] [blame] | 130 | local->client_bundles = RB_ROOT; |
| 131 | spin_lock_init(&local->client_bundles_lock); |
David Howells | 0d6bf31 | 2022-11-02 16:46:13 +0000 | [diff] [blame] | 132 | local->kill_all_client_conns = false; |
David Howells | 0d6bf31 | 2022-11-02 16:46:13 +0000 | [diff] [blame] | 133 | INIT_LIST_HEAD(&local->idle_client_conns); |
| 134 | timer_setup(&local->client_conn_reap_timer, |
| 135 | rxrpc_client_conn_reap_timeout, 0); |
| 136 | |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 137 | spin_lock_init(&local->lock); |
| 138 | rwlock_init(&local->services_lock); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 139 | local->debug_id = atomic_inc_return(&rxrpc_debug_id); |
| 140 | memcpy(&local->srx, srx, sizeof(*srx)); |
David Howells | 28036f4 | 2017-06-05 14:30:49 +0100 | [diff] [blame] | 141 | local->srx.srx_service = 0; |
David Howells | f06cb29 | 2022-10-20 22:58:56 +0100 | [diff] [blame] | 142 | idr_init(&local->conn_ids); |
| 143 | get_random_bytes(&tmp, sizeof(tmp)); |
| 144 | tmp &= 0x3fffffff; |
| 145 | if (tmp == 0) |
| 146 | tmp = 1; |
| 147 | idr_set_cursor(&local->conn_ids, tmp); |
David Howells | 9d35d88 | 2022-10-19 09:45:43 +0100 | [diff] [blame] | 148 | INIT_LIST_HEAD(&local->new_client_calls); |
| 149 | spin_lock_init(&local->client_call_lock); |
David Howells | f06cb29 | 2022-10-20 22:58:56 +0100 | [diff] [blame] | 150 | |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 151 | trace_rxrpc_local(local->debug_id, rxrpc_local_new, 1, 1); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 152 | } |
| 153 | |
| 154 | _leave(" = %p", local); |
| 155 | return local; |
| 156 | } |
| 157 | |
| 158 | /* |
| 159 | * create the local socket |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 160 | * - must be called with rxrpc_local_mutex locked |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 161 | */ |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 162 | static int rxrpc_open_socket(struct rxrpc_local *local, struct net *net) |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 163 | { |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 164 | struct udp_tunnel_sock_cfg tuncfg = {NULL}; |
| 165 | struct sockaddr_rxrpc *srx = &local->srx; |
| 166 | struct udp_port_cfg udp_conf = {0}; |
David Howells | a275da6 | 2022-10-10 08:45:20 +0100 | [diff] [blame] | 167 | struct task_struct *io_thread; |
David Howells | 5271953 | 2018-10-04 11:10:51 +0100 | [diff] [blame] | 168 | struct sock *usk; |
Christoph Hellwig | fce9349 | 2020-05-28 07:12:32 +0200 | [diff] [blame] | 169 | int ret; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 170 | |
David Howells | 75b54cb | 2016-09-13 08:49:05 +0100 | [diff] [blame] | 171 | _enter("%p{%d,%d}", |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 172 | local, srx->transport_type, srx->transport.family); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 173 | |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 174 | udp_conf.family = srx->transport.family; |
David Howells | 39cb9fa | 2022-04-29 21:05:16 +0100 | [diff] [blame] | 175 | udp_conf.use_udp_checksums = true; |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 176 | if (udp_conf.family == AF_INET) { |
| 177 | udp_conf.local_ip = srx->transport.sin.sin_addr; |
| 178 | udp_conf.local_udp_port = srx->transport.sin.sin_port; |
Vadim Fedorenko | 295f830 | 2021-02-12 13:48:14 +0300 | [diff] [blame] | 179 | #if IS_ENABLED(CONFIG_AF_RXRPC_IPV6) |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 180 | } else { |
| 181 | udp_conf.local_ip6 = srx->transport.sin6.sin6_addr; |
| 182 | udp_conf.local_udp_port = srx->transport.sin6.sin6_port; |
David Howells | 39cb9fa | 2022-04-29 21:05:16 +0100 | [diff] [blame] | 183 | udp_conf.use_udp6_tx_checksums = true; |
| 184 | udp_conf.use_udp6_rx_checksums = true; |
Vadim Fedorenko | 295f830 | 2021-02-12 13:48:14 +0300 | [diff] [blame] | 185 | #endif |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 186 | } |
| 187 | ret = udp_sock_create(net, &udp_conf, &local->socket); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 188 | if (ret < 0) { |
| 189 | _leave(" = %d [socket]", ret); |
| 190 | return ret; |
| 191 | } |
| 192 | |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 193 | tuncfg.encap_type = UDP_ENCAP_RXRPC; |
David Howells | 446b3e1 | 2022-10-10 10:55:24 +0100 | [diff] [blame] | 194 | tuncfg.encap_rcv = rxrpc_encap_rcv; |
David Howells | ac56a0b | 2022-08-26 15:39:28 +0100 | [diff] [blame] | 195 | tuncfg.encap_err_rcv = rxrpc_encap_err_rcv; |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 196 | tuncfg.sk_user_data = local; |
| 197 | setup_udp_tunnel_sock(net, local->socket, &tuncfg); |
| 198 | |
David Howells | 2cfa227 | 2018-10-05 14:05:35 +0100 | [diff] [blame] | 199 | /* set the socket up */ |
David Howells | 5271953 | 2018-10-04 11:10:51 +0100 | [diff] [blame] | 200 | usk = local->socket->sk; |
David Howells | 5271953 | 2018-10-04 11:10:51 +0100 | [diff] [blame] | 201 | usk->sk_error_report = rxrpc_error_report; |
David Howells | 2cfa227 | 2018-10-05 14:05:35 +0100 | [diff] [blame] | 202 | |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 203 | switch (srx->transport.family) { |
David Howells | 37a675e | 2018-09-27 15:13:09 +0100 | [diff] [blame] | 204 | case AF_INET6: |
| 205 | /* we want to receive ICMPv6 errors */ |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 206 | ip6_sock_set_recverr(usk); |
David Howells | 37a675e | 2018-09-27 15:13:09 +0100 | [diff] [blame] | 207 | |
David Howells | 37a675e | 2018-09-27 15:13:09 +0100 | [diff] [blame] | 208 | /* Fall through and set IPv4 options too otherwise we don't get |
| 209 | * errors from IPv4 packets sent through the IPv6 socket. |
| 210 | */ |
Gustavo A. R. Silva | df561f66 | 2020-08-23 17:36:59 -0500 | [diff] [blame] | 211 | fallthrough; |
David Howells | f2aeed3 | 2018-05-10 23:26:00 +0100 | [diff] [blame] | 212 | case AF_INET: |
| 213 | /* we want to receive ICMP errors */ |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 214 | ip_sock_set_recverr(usk); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 215 | |
David Howells | f2aeed3 | 2018-05-10 23:26:00 +0100 | [diff] [blame] | 216 | /* we want to set the don't fragment bit */ |
David Howells | 8722014 | 2024-01-09 15:10:48 +0000 | [diff] [blame] | 217 | rxrpc_local_dont_fragment(local, true); |
David Howells | b604dd9 | 2018-09-27 15:13:08 +0100 | [diff] [blame] | 218 | |
| 219 | /* We want receive timestamps. */ |
Xin Long | 1a9b86c | 2021-02-07 16:23:14 +0800 | [diff] [blame] | 220 | sock_enable_timestamps(usk); |
David Howells | f2aeed3 | 2018-05-10 23:26:00 +0100 | [diff] [blame] | 221 | break; |
| 222 | |
| 223 | default: |
| 224 | BUG(); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 225 | } |
| 226 | |
David Howells | a275da6 | 2022-10-10 08:45:20 +0100 | [diff] [blame] | 227 | io_thread = kthread_run(rxrpc_io_thread, local, |
| 228 | "krxrpcio/%u", ntohs(udp_conf.local_udp_port)); |
| 229 | if (IS_ERR(io_thread)) { |
| 230 | ret = PTR_ERR(io_thread); |
| 231 | goto error_sock; |
| 232 | } |
| 233 | |
David Howells | 8fbcc83 | 2022-12-15 16:20:13 +0000 | [diff] [blame] | 234 | wait_for_completion(&local->io_thread_ready); |
David Howells | a275da6 | 2022-10-10 08:45:20 +0100 | [diff] [blame] | 235 | local->io_thread = io_thread; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 236 | _leave(" = 0"); |
| 237 | return 0; |
David Howells | a275da6 | 2022-10-10 08:45:20 +0100 | [diff] [blame] | 238 | |
| 239 | error_sock: |
| 240 | kernel_sock_shutdown(local->socket, SHUT_RDWR); |
| 241 | local->socket->sk->sk_user_data = NULL; |
| 242 | sock_release(local->socket); |
| 243 | local->socket = NULL; |
| 244 | return ret; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 245 | } |
| 246 | |
| 247 | /* |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 248 | * Look up or create a new local endpoint using the specified local address. |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 249 | */ |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 250 | struct rxrpc_local *rxrpc_lookup_local(struct net *net, |
| 251 | const struct sockaddr_rxrpc *srx) |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 252 | { |
| 253 | struct rxrpc_local *local; |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 254 | struct rxrpc_net *rxnet = rxrpc_net(net); |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 255 | struct hlist_node *cursor; |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 256 | long diff; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 257 | int ret; |
| 258 | |
David Howells | 75b54cb | 2016-09-13 08:49:05 +0100 | [diff] [blame] | 259 | _enter("{%d,%d,%pISp}", |
| 260 | srx->transport_type, srx->transport.family, &srx->transport); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 261 | |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 262 | mutex_lock(&rxnet->local_mutex); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 263 | |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 264 | hlist_for_each(cursor, &rxnet->local_endpoints) { |
| 265 | local = hlist_entry(cursor, struct rxrpc_local, link); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 266 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 267 | diff = rxrpc_local_cmp_key(local, srx); |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 268 | if (diff != 0) |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 269 | continue; |
| 270 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 271 | /* Services aren't allowed to share transport sockets, so |
| 272 | * reject that here. It is possible that the object is dying - |
| 273 | * but it may also still have the local transport address that |
| 274 | * we want bound. |
| 275 | */ |
| 276 | if (srx->srx_service) { |
| 277 | local = NULL; |
| 278 | goto addr_in_use; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 279 | } |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 280 | |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 281 | /* Found a match. We want to replace a dying object. |
| 282 | * Attempting to bind the transport socket may still fail if |
| 283 | * we're attempting to use a local address that the dying |
| 284 | * object is still using. |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 285 | */ |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 286 | if (!rxrpc_use_local(local, rxrpc_local_use_lookup)) |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 287 | break; |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 288 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 289 | goto found; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 290 | } |
| 291 | |
David Howells | 8a758d9 | 2022-10-20 23:17:06 +0100 | [diff] [blame] | 292 | local = rxrpc_alloc_local(net, srx); |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 293 | if (!local) |
| 294 | goto nomem; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 295 | |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 296 | ret = rxrpc_open_socket(local, net); |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 297 | if (ret < 0) |
| 298 | goto sock_error; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 299 | |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 300 | if (cursor) { |
| 301 | hlist_replace_rcu(cursor, &local->link); |
| 302 | cursor->pprev = NULL; |
| 303 | } else { |
| 304 | hlist_add_head_rcu(&local->link, &rxnet->local_endpoints); |
| 305 | } |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 306 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 307 | found: |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 308 | mutex_unlock(&rxnet->local_mutex); |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 309 | _leave(" = %p", local); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 310 | return local; |
| 311 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 312 | nomem: |
| 313 | ret = -ENOMEM; |
| 314 | sock_error: |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 315 | mutex_unlock(&rxnet->local_mutex); |
Eric Dumazet | 032be5f | 2019-04-24 09:44:11 -0700 | [diff] [blame] | 316 | if (local) |
| 317 | call_rcu(&local->rcu, rxrpc_local_rcu); |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 318 | _leave(" = %d", ret); |
| 319 | return ERR_PTR(ret); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 320 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 321 | addr_in_use: |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 322 | mutex_unlock(&rxnet->local_mutex); |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 323 | _leave(" = -EADDRINUSE"); |
| 324 | return ERR_PTR(-EADDRINUSE); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 325 | } |
| 326 | |
| 327 | /* |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 328 | * Get a ref on a local endpoint. |
| 329 | */ |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 330 | struct rxrpc_local *rxrpc_get_local(struct rxrpc_local *local, |
| 331 | enum rxrpc_local_trace why) |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 332 | { |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 333 | int r, u; |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 334 | |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 335 | u = atomic_read(&local->active_users); |
David Howells | a0575429 | 2022-05-21 08:45:22 +0100 | [diff] [blame] | 336 | __refcount_inc(&local->ref, &r); |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 337 | trace_rxrpc_local(local->debug_id, why, r + 1, u); |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 338 | return local; |
| 339 | } |
| 340 | |
| 341 | /* |
| 342 | * Get a ref on a local endpoint unless its usage has already reached 0. |
| 343 | */ |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 344 | struct rxrpc_local *rxrpc_get_local_maybe(struct rxrpc_local *local, |
| 345 | enum rxrpc_local_trace why) |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 346 | { |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 347 | int r, u; |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 348 | |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 349 | if (local && __refcount_inc_not_zero(&local->ref, &r)) { |
| 350 | u = atomic_read(&local->active_users); |
| 351 | trace_rxrpc_local(local->debug_id, why, r + 1, u); |
| 352 | return local; |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 353 | } |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 354 | |
| 355 | return NULL; |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 356 | } |
| 357 | |
| 358 | /* |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 359 | * Drop a ref on a local endpoint. |
| 360 | */ |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 361 | void rxrpc_put_local(struct rxrpc_local *local, enum rxrpc_local_trace why) |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 362 | { |
David Howells | fac20b9 | 2020-01-30 21:50:35 +0000 | [diff] [blame] | 363 | unsigned int debug_id; |
David Howells | a0575429 | 2022-05-21 08:45:22 +0100 | [diff] [blame] | 364 | bool dead; |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 365 | int r, u; |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 366 | |
| 367 | if (local) { |
David Howells | fac20b9 | 2020-01-30 21:50:35 +0000 | [diff] [blame] | 368 | debug_id = local->debug_id; |
| 369 | |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 370 | u = atomic_read(&local->active_users); |
David Howells | a0575429 | 2022-05-21 08:45:22 +0100 | [diff] [blame] | 371 | dead = __refcount_dec_and_test(&local->ref, &r); |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 372 | trace_rxrpc_local(debug_id, why, r, u); |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 373 | |
David Howells | a0575429 | 2022-05-21 08:45:22 +0100 | [diff] [blame] | 374 | if (dead) |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 375 | call_rcu(&local->rcu, rxrpc_local_rcu); |
David Howells | 09d2bf5 | 2018-03-30 21:05:28 +0100 | [diff] [blame] | 376 | } |
| 377 | } |
| 378 | |
| 379 | /* |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 380 | * Start using a local endpoint. |
| 381 | */ |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 382 | struct rxrpc_local *rxrpc_use_local(struct rxrpc_local *local, |
| 383 | enum rxrpc_local_trace why) |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 384 | { |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 385 | local = rxrpc_get_local_maybe(local, rxrpc_local_get_for_use); |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 386 | if (!local) |
| 387 | return NULL; |
| 388 | |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 389 | if (!__rxrpc_use_local(local, why)) { |
| 390 | rxrpc_put_local(local, rxrpc_local_put_for_use); |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 391 | return NULL; |
| 392 | } |
| 393 | |
| 394 | return local; |
| 395 | } |
| 396 | |
| 397 | /* |
| 398 | * Cease using a local endpoint. Once the number of active users reaches 0, we |
David Howells | 5e6ef4f | 2020-01-23 13:13:41 +0000 | [diff] [blame] | 399 | * start the closure of the transport in the I/O thread.. |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 400 | */ |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 401 | void rxrpc_unuse_local(struct rxrpc_local *local, enum rxrpc_local_trace why) |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 402 | { |
David Howells | eaa0239 | 2022-12-15 16:20:04 +0000 | [diff] [blame] | 403 | unsigned int debug_id; |
David Howells | a2cf326 | 2022-11-16 12:02:22 +0000 | [diff] [blame] | 404 | int r, u; |
| 405 | |
| 406 | if (local) { |
David Howells | eaa0239 | 2022-12-15 16:20:04 +0000 | [diff] [blame] | 407 | debug_id = local->debug_id; |
David Howells | a2cf326 | 2022-11-16 12:02:22 +0000 | [diff] [blame] | 408 | r = refcount_read(&local->ref); |
| 409 | u = atomic_dec_return(&local->active_users); |
| 410 | trace_rxrpc_local(debug_id, why, r, u); |
| 411 | if (u == 0) |
| 412 | kthread_stop(local->io_thread); |
| 413 | } |
David Howells | 730c5fd | 2019-08-09 15:20:41 +0100 | [diff] [blame] | 414 | } |
| 415 | |
| 416 | /* |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 417 | * Destroy a local endpoint's socket and then hand the record to RCU to dispose |
| 418 | * of. |
| 419 | * |
| 420 | * Closing the socket cannot be done from bottom half context or RCU callback |
| 421 | * context because it might sleep. |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 422 | */ |
David Howells | a275da6 | 2022-10-10 08:45:20 +0100 | [diff] [blame] | 423 | void rxrpc_destroy_local(struct rxrpc_local *local) |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 424 | { |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 425 | struct socket *socket = local->socket; |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 426 | struct rxrpc_net *rxnet = local->rxnet; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 427 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 428 | _enter("%d", local->debug_id); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 429 | |
David Howells | d12040b | 2019-08-29 14:12:11 +0100 | [diff] [blame] | 430 | local->dead = true; |
| 431 | |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 432 | mutex_lock(&rxnet->local_mutex); |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 433 | hlist_del_init_rcu(&local->link); |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 434 | mutex_unlock(&rxnet->local_mutex); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 435 | |
David Howells | d12040b | 2019-08-29 14:12:11 +0100 | [diff] [blame] | 436 | rxrpc_clean_up_local_conns(local); |
| 437 | rxrpc_service_connection_reaper(&rxnet->service_conn_reaper); |
David Howells | 1e9e5c9 | 2016-09-29 22:37:15 +0100 | [diff] [blame] | 438 | ASSERT(!local->service); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 439 | |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 440 | if (socket) { |
| 441 | local->socket = NULL; |
| 442 | kernel_sock_shutdown(socket, SHUT_RDWR); |
| 443 | socket->sk->sk_user_data = NULL; |
| 444 | sock_release(socket); |
| 445 | } |
| 446 | |
| 447 | /* At this point, there should be no more packets coming in to the |
| 448 | * local endpoint. |
| 449 | */ |
David Howells | af09482 | 2022-10-17 08:54:57 +0100 | [diff] [blame] | 450 | #ifdef CONFIG_AF_RXRPC_INJECT_RX_DELAY |
| 451 | rxrpc_purge_queue(&local->rx_delay_queue); |
| 452 | #endif |
David Howells | a275da6 | 2022-10-10 08:45:20 +0100 | [diff] [blame] | 453 | rxrpc_purge_queue(&local->rx_queue); |
David Howells | 9d35d88 | 2022-10-19 09:45:43 +0100 | [diff] [blame] | 454 | rxrpc_purge_client_connections(local); |
David Howells | 49489bb | 2024-01-29 23:47:57 +0000 | [diff] [blame] | 455 | if (local->tx_alloc.va) |
| 456 | __page_frag_cache_drain(virt_to_page(local->tx_alloc.va), |
| 457 | local->tx_alloc.pagecnt_bias); |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 458 | } |
| 459 | |
| 460 | /* |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 461 | * Destroy a local endpoint after the RCU grace period expires. |
| 462 | */ |
| 463 | static void rxrpc_local_rcu(struct rcu_head *rcu) |
| 464 | { |
| 465 | struct rxrpc_local *local = container_of(rcu, struct rxrpc_local, rcu); |
| 466 | |
David Howells | 0fde882 | 2022-10-21 13:00:34 +0100 | [diff] [blame] | 467 | rxrpc_see_local(local, rxrpc_local_free); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 468 | kfree(local); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 469 | } |
| 470 | |
| 471 | /* |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 472 | * Verify the local endpoint list is empty by this point. |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 473 | */ |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 474 | void rxrpc_destroy_all_locals(struct rxrpc_net *rxnet) |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 475 | { |
David Howells | 4f95dd7 | 2016-04-04 14:00:35 +0100 | [diff] [blame] | 476 | struct rxrpc_local *local; |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 477 | |
| 478 | _enter(""); |
| 479 | |
David Howells | dee4636 | 2016-06-27 17:11:19 +0100 | [diff] [blame] | 480 | flush_workqueue(rxrpc_workqueue); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 481 | |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 482 | if (!hlist_empty(&rxnet->local_endpoints)) { |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 483 | mutex_lock(&rxnet->local_mutex); |
David Howells | 33912c2 | 2022-05-21 08:45:15 +0100 | [diff] [blame] | 484 | hlist_for_each_entry(local, &rxnet->local_endpoints, link) { |
David Howells | dee4636 | 2016-06-27 17:11:19 +0100 | [diff] [blame] | 485 | pr_err("AF_RXRPC: Leaked local %p {%d}\n", |
David Howells | a0575429 | 2022-05-21 08:45:22 +0100 | [diff] [blame] | 486 | local, refcount_read(&local->ref)); |
David Howells | dee4636 | 2016-06-27 17:11:19 +0100 | [diff] [blame] | 487 | } |
David Howells | 2baec2c | 2017-05-24 17:02:32 +0100 | [diff] [blame] | 488 | mutex_unlock(&rxnet->local_mutex); |
David Howells | dee4636 | 2016-06-27 17:11:19 +0100 | [diff] [blame] | 489 | BUG(); |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 490 | } |
David Howells | 17926a7 | 2007-04-26 15:48:28 -0700 | [diff] [blame] | 491 | } |