Commit | Line | Data |
---|---|---|
4a3388c8 DH |
1 | /* Client connection-specific management code. |
2 | * | |
3 | * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved. | |
4 | * Written by David Howells (dhowells@redhat.com) | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or | |
7 | * modify it under the terms of the GNU General Public Licence | |
8 | * as published by the Free Software Foundation; either version | |
9 | * 2 of the Licence, or (at your option) any later version. | |
45025bce DH |
10 | * |
11 | * | |
12 | * Client connections need to be cached for a little while after they've made a | |
13 | * call so as to handle retransmitted DATA packets in case the server didn't | |
14 | * receive the final ACK or terminating ABORT we sent it. | |
15 | * | |
16 | * Client connections can be in one of a number of cache states: | |
17 | * | |
18 | * (1) INACTIVE - The connection is not held in any list and may not have been | |
19 | * exposed to the world. If it has been previously exposed, it was | |
20 | * discarded from the idle list after expiring. | |
21 | * | |
22 | * (2) WAITING - The connection is waiting for the number of client conns to | |
23 | * drop below the maximum capacity. Calls may be in progress upon it from | |
24 | * when it was active and got culled. | |
25 | * | |
26 | * The connection is on the rxrpc_waiting_client_conns list which is kept | |
27 | * in to-be-granted order. Culled conns with waiters go to the back of | |
28 | * the queue just like new conns. | |
29 | * | |
30 | * (3) ACTIVE - The connection has at least one call in progress upon it, it | |
31 | * may freely grant available channels to new calls and calls may be | |
32 | * waiting on it for channels to become available. | |
33 | * | |
2baec2c3 | 34 | * The connection is on the rxnet->active_client_conns list which is kept |
45025bce DH |
35 | * in activation order for culling purposes. |
36 | * | |
37 | * rxrpc_nr_active_client_conns is held incremented also. | |
38 | * | |
4e255721 DH |
39 | * (4) UPGRADE - As for ACTIVE, but only one call may be in progress and is |
40 | * being used to probe for service upgrade. | |
41 | * | |
42 | * (5) CULLED - The connection got summarily culled to try and free up | |
45025bce DH |
43 | * capacity. Calls currently in progress on the connection are allowed to |
44 | * continue, but new calls will have to wait. There can be no waiters in | |
45 | * this state - the conn would have to go to the WAITING state instead. | |
46 | * | |
4e255721 | 47 | * (6) IDLE - The connection has no calls in progress upon it and must have |
45025bce DH |
48 | * been exposed to the world (ie. the EXPOSED flag must be set). When it |
49 | * expires, the EXPOSED flag is cleared and the connection transitions to | |
50 | * the INACTIVE state. | |
51 | * | |
2baec2c3 | 52 | * The connection is on the rxnet->idle_client_conns list which is kept in |
45025bce DH |
53 | * order of how soon they'll expire. |
54 | * | |
55 | * There are flags of relevance to the cache: | |
56 | * | |
57 | * (1) EXPOSED - The connection ID got exposed to the world. If this flag is | |
58 | * set, an extra ref is added to the connection preventing it from being | |
59 | * reaped when it has no calls outstanding. This flag is cleared and the | |
60 | * ref dropped when a conn is discarded from the idle list. | |
61 | * | |
62 | * This allows us to move terminal call state retransmission to the | |
63 | * connection and to discard the call immediately we think it is done | |
64 | * with. It also give us a chance to reuse the connection. | |
65 | * | |
66 | * (2) DONT_REUSE - The connection should be discarded as soon as possible and | |
67 | * should not be reused. This is set when an exclusive connection is used | |
68 | * or a call ID counter overflows. | |
69 | * | |
70 | * The caching state may only be changed if the cache lock is held. | |
71 | * | |
72 | * There are two idle client connection expiry durations. If the total number | |
73 | * of connections is below the reap threshold, we use the normal duration; if | |
74 | * it's above, we use the fast duration. | |
4a3388c8 DH |
75 | */ |
76 | ||
77 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | |
78 | ||
79 | #include <linux/slab.h> | |
80 | #include <linux/idr.h> | |
81 | #include <linux/timer.h> | |
174cd4b1 IM |
82 | #include <linux/sched/signal.h> |
83 | ||
4a3388c8 DH |
84 | #include "ar-internal.h" |
85 | ||
45025bce DH |
86 | __read_mostly unsigned int rxrpc_max_client_connections = 1000; |
87 | __read_mostly unsigned int rxrpc_reap_client_connections = 900; | |
a158bdd3 DH |
88 | __read_mostly unsigned long rxrpc_conn_idle_client_expiry = 2 * 60 * HZ; |
89 | __read_mostly unsigned long rxrpc_conn_idle_client_fast_expiry = 2 * HZ; | |
45025bce | 90 | |
4a3388c8 DH |
91 | /* |
92 | * We use machine-unique IDs for our client connections. | |
93 | */ | |
94 | DEFINE_IDR(rxrpc_client_conn_ids); | |
95 | static DEFINE_SPINLOCK(rxrpc_conn_id_lock); | |
96 | ||
2baec2c3 | 97 | static void rxrpc_cull_active_client_conns(struct rxrpc_net *); |
45025bce | 98 | |
4a3388c8 DH |
99 | /* |
100 | * Get a connection ID and epoch for a client connection from the global pool. | |
101 | * The connection struct pointer is then recorded in the idr radix tree. The | |
090f85de DH |
102 | * epoch doesn't change until the client is rebooted (or, at least, unless the |
103 | * module is unloaded). | |
4a3388c8 | 104 | */ |
c6d2b8d7 DH |
105 | static int rxrpc_get_client_connection_id(struct rxrpc_connection *conn, |
106 | gfp_t gfp) | |
4a3388c8 | 107 | { |
2baec2c3 | 108 | struct rxrpc_net *rxnet = conn->params.local->rxnet; |
4a3388c8 DH |
109 | int id; |
110 | ||
111 | _enter(""); | |
112 | ||
113 | idr_preload(gfp); | |
4a3388c8 DH |
114 | spin_lock(&rxrpc_conn_id_lock); |
115 | ||
090f85de DH |
116 | id = idr_alloc_cyclic(&rxrpc_client_conn_ids, conn, |
117 | 1, 0x40000000, GFP_NOWAIT); | |
118 | if (id < 0) | |
119 | goto error; | |
4a3388c8 DH |
120 | |
121 | spin_unlock(&rxrpc_conn_id_lock); | |
4a3388c8 DH |
122 | idr_preload_end(); |
123 | ||
2baec2c3 | 124 | conn->proto.epoch = rxnet->epoch; |
4a3388c8 DH |
125 | conn->proto.cid = id << RXRPC_CIDSHIFT; |
126 | set_bit(RXRPC_CONN_HAS_IDR, &conn->flags); | |
090f85de | 127 | _leave(" [CID %x]", conn->proto.cid); |
4a3388c8 DH |
128 | return 0; |
129 | ||
130 | error: | |
131 | spin_unlock(&rxrpc_conn_id_lock); | |
4a3388c8 DH |
132 | idr_preload_end(); |
133 | _leave(" = %d", id); | |
134 | return id; | |
135 | } | |
136 | ||
137 | /* | |
138 | * Release a connection ID for a client connection from the global pool. | |
139 | */ | |
001c1122 | 140 | static void rxrpc_put_client_connection_id(struct rxrpc_connection *conn) |
4a3388c8 DH |
141 | { |
142 | if (test_bit(RXRPC_CONN_HAS_IDR, &conn->flags)) { | |
143 | spin_lock(&rxrpc_conn_id_lock); | |
144 | idr_remove(&rxrpc_client_conn_ids, | |
145 | conn->proto.cid >> RXRPC_CIDSHIFT); | |
146 | spin_unlock(&rxrpc_conn_id_lock); | |
147 | } | |
148 | } | |
eb9b9d22 DH |
149 | |
150 | /* | |
151 | * Destroy the client connection ID tree. | |
152 | */ | |
153 | void rxrpc_destroy_client_conn_ids(void) | |
154 | { | |
155 | struct rxrpc_connection *conn; | |
156 | int id; | |
157 | ||
158 | if (!idr_is_empty(&rxrpc_client_conn_ids)) { | |
159 | idr_for_each_entry(&rxrpc_client_conn_ids, conn, id) { | |
160 | pr_err("AF_RXRPC: Leaked client conn %p {%d}\n", | |
161 | conn, atomic_read(&conn->usage)); | |
162 | } | |
163 | BUG(); | |
164 | } | |
165 | ||
166 | idr_destroy(&rxrpc_client_conn_ids); | |
167 | } | |
c6d2b8d7 DH |
168 | |
169 | /* | |
45025bce | 170 | * Allocate a client connection. |
c6d2b8d7 DH |
171 | */ |
172 | static struct rxrpc_connection * | |
173 | rxrpc_alloc_client_connection(struct rxrpc_conn_parameters *cp, gfp_t gfp) | |
174 | { | |
175 | struct rxrpc_connection *conn; | |
2baec2c3 | 176 | struct rxrpc_net *rxnet = cp->local->rxnet; |
c6d2b8d7 DH |
177 | int ret; |
178 | ||
179 | _enter(""); | |
180 | ||
181 | conn = rxrpc_alloc_connection(gfp); | |
182 | if (!conn) { | |
183 | _leave(" = -ENOMEM"); | |
184 | return ERR_PTR(-ENOMEM); | |
185 | } | |
186 | ||
45025bce | 187 | atomic_set(&conn->usage, 1); |
8732db67 | 188 | if (cp->exclusive) |
45025bce | 189 | __set_bit(RXRPC_CONN_DONT_REUSE, &conn->flags); |
4e255721 DH |
190 | if (cp->upgrade) |
191 | __set_bit(RXRPC_CONN_PROBING_FOR_UPGRADE, &conn->flags); | |
45025bce | 192 | |
c6d2b8d7 | 193 | conn->params = *cp; |
c6d2b8d7 DH |
194 | conn->out_clientflag = RXRPC_CLIENT_INITIATED; |
195 | conn->state = RXRPC_CONN_CLIENT; | |
68d6d1ae | 196 | conn->service_id = cp->service_id; |
c6d2b8d7 | 197 | |
c6d2b8d7 DH |
198 | ret = rxrpc_get_client_connection_id(conn, gfp); |
199 | if (ret < 0) | |
200 | goto error_0; | |
201 | ||
202 | ret = rxrpc_init_client_conn_security(conn); | |
203 | if (ret < 0) | |
204 | goto error_1; | |
205 | ||
206 | ret = conn->security->prime_packet_security(conn); | |
207 | if (ret < 0) | |
208 | goto error_2; | |
209 | ||
31f5f9a1 | 210 | atomic_inc(&rxnet->nr_conns); |
2baec2c3 DH |
211 | write_lock(&rxnet->conn_lock); |
212 | list_add_tail(&conn->proc_link, &rxnet->conn_proc_list); | |
213 | write_unlock(&rxnet->conn_lock); | |
c6d2b8d7 DH |
214 | |
215 | /* We steal the caller's peer ref. */ | |
216 | cp->peer = NULL; | |
217 | rxrpc_get_local(conn->params.local); | |
218 | key_get(conn->params.key); | |
219 | ||
363deeab DH |
220 | trace_rxrpc_conn(conn, rxrpc_conn_new_client, atomic_read(&conn->usage), |
221 | __builtin_return_address(0)); | |
222 | trace_rxrpc_client(conn, -1, rxrpc_client_alloc); | |
c6d2b8d7 DH |
223 | _leave(" = %p", conn); |
224 | return conn; | |
225 | ||
226 | error_2: | |
227 | conn->security->clear(conn); | |
228 | error_1: | |
229 | rxrpc_put_client_connection_id(conn); | |
230 | error_0: | |
231 | kfree(conn); | |
232 | _leave(" = %d", ret); | |
233 | return ERR_PTR(ret); | |
234 | } | |
235 | ||
236 | /* | |
45025bce | 237 | * Determine if a connection may be reused. |
c6d2b8d7 | 238 | */ |
45025bce DH |
239 | static bool rxrpc_may_reuse_conn(struct rxrpc_connection *conn) |
240 | { | |
2baec2c3 | 241 | struct rxrpc_net *rxnet = conn->params.local->rxnet; |
45025bce DH |
242 | int id_cursor, id, distance, limit; |
243 | ||
244 | if (test_bit(RXRPC_CONN_DONT_REUSE, &conn->flags)) | |
245 | goto dont_reuse; | |
246 | ||
2baec2c3 | 247 | if (conn->proto.epoch != rxnet->epoch) |
45025bce DH |
248 | goto mark_dont_reuse; |
249 | ||
250 | /* The IDR tree gets very expensive on memory if the connection IDs are | |
251 | * widely scattered throughout the number space, so we shall want to | |
252 | * kill off connections that, say, have an ID more than about four | |
253 | * times the maximum number of client conns away from the current | |
254 | * allocation point to try and keep the IDs concentrated. | |
255 | */ | |
44430612 | 256 | id_cursor = idr_get_cursor(&rxrpc_client_conn_ids); |
45025bce DH |
257 | id = conn->proto.cid >> RXRPC_CIDSHIFT; |
258 | distance = id - id_cursor; | |
259 | if (distance < 0) | |
260 | distance = -distance; | |
44430612 | 261 | limit = max(rxrpc_max_client_connections * 4, 1024U); |
45025bce DH |
262 | if (distance > limit) |
263 | goto mark_dont_reuse; | |
264 | ||
265 | return true; | |
266 | ||
267 | mark_dont_reuse: | |
268 | set_bit(RXRPC_CONN_DONT_REUSE, &conn->flags); | |
269 | dont_reuse: | |
270 | return false; | |
271 | } | |
272 | ||
273 | /* | |
274 | * Create or find a client connection to use for a call. | |
275 | * | |
276 | * If we return with a connection, the call will be on its waiting list. It's | |
277 | * left to the caller to assign a channel and wake up the call. | |
278 | */ | |
5e33a23b DH |
279 | static int rxrpc_get_client_conn(struct rxrpc_sock *rx, |
280 | struct rxrpc_call *call, | |
45025bce DH |
281 | struct rxrpc_conn_parameters *cp, |
282 | struct sockaddr_rxrpc *srx, | |
283 | gfp_t gfp) | |
c6d2b8d7 DH |
284 | { |
285 | struct rxrpc_connection *conn, *candidate = NULL; | |
286 | struct rxrpc_local *local = cp->local; | |
287 | struct rb_node *p, **pp, *parent; | |
288 | long diff; | |
45025bce | 289 | int ret = -ENOMEM; |
c6d2b8d7 DH |
290 | |
291 | _enter("{%d,%lx},", call->debug_id, call->user_call_ID); | |
292 | ||
5e33a23b | 293 | cp->peer = rxrpc_lookup_peer(rx, cp->local, srx, gfp); |
c6d2b8d7 | 294 | if (!cp->peer) |
45025bce | 295 | goto error; |
c6d2b8d7 | 296 | |
f7aec129 DH |
297 | call->cong_cwnd = cp->peer->cong_cwnd; |
298 | if (call->cong_cwnd >= call->cong_ssthresh) | |
299 | call->cong_mode = RXRPC_CALL_CONGEST_AVOIDANCE; | |
300 | else | |
301 | call->cong_mode = RXRPC_CALL_SLOW_START; | |
302 | ||
45025bce DH |
303 | /* If the connection is not meant to be exclusive, search the available |
304 | * connections to see if the connection we want to use already exists. | |
305 | */ | |
c6d2b8d7 | 306 | if (!cp->exclusive) { |
c6d2b8d7 DH |
307 | _debug("search 1"); |
308 | spin_lock(&local->client_conns_lock); | |
309 | p = local->client_conns.rb_node; | |
310 | while (p) { | |
311 | conn = rb_entry(p, struct rxrpc_connection, client_node); | |
312 | ||
313 | #define cmp(X) ((long)conn->params.X - (long)cp->X) | |
314 | diff = (cmp(peer) ?: | |
315 | cmp(key) ?: | |
4e255721 DH |
316 | cmp(security_level) ?: |
317 | cmp(upgrade)); | |
45025bce DH |
318 | #undef cmp |
319 | if (diff < 0) { | |
c6d2b8d7 | 320 | p = p->rb_left; |
45025bce | 321 | } else if (diff > 0) { |
c6d2b8d7 | 322 | p = p->rb_right; |
45025bce DH |
323 | } else { |
324 | if (rxrpc_may_reuse_conn(conn) && | |
325 | rxrpc_get_connection_maybe(conn)) | |
326 | goto found_extant_conn; | |
327 | /* The connection needs replacing. It's better | |
328 | * to effect that when we have something to | |
329 | * replace it with so that we don't have to | |
330 | * rebalance the tree twice. | |
331 | */ | |
332 | break; | |
333 | } | |
c6d2b8d7 DH |
334 | } |
335 | spin_unlock(&local->client_conns_lock); | |
336 | } | |
337 | ||
45025bce DH |
338 | /* There wasn't a connection yet or we need an exclusive connection. |
339 | * We need to create a candidate and then potentially redo the search | |
340 | * in case we're racing with another thread also trying to connect on a | |
341 | * shareable connection. | |
342 | */ | |
343 | _debug("new conn"); | |
c6d2b8d7 | 344 | candidate = rxrpc_alloc_client_connection(cp, gfp); |
45025bce DH |
345 | if (IS_ERR(candidate)) { |
346 | ret = PTR_ERR(candidate); | |
347 | goto error_peer; | |
c6d2b8d7 DH |
348 | } |
349 | ||
45025bce DH |
350 | /* Add the call to the new connection's waiting list in case we're |
351 | * going to have to wait for the connection to come live. It's our | |
352 | * connection, so we want first dibs on the channel slots. We would | |
353 | * normally have to take channel_lock but we do this before anyone else | |
354 | * can see the connection. | |
355 | */ | |
69ffaebb | 356 | list_add(&call->chan_wait_link, &candidate->waiting_calls); |
45025bce | 357 | |
c6d2b8d7 | 358 | if (cp->exclusive) { |
45025bce | 359 | call->conn = candidate; |
278ac0cd | 360 | call->security_ix = candidate->security_ix; |
68d6d1ae | 361 | call->service_id = candidate->service_id; |
45025bce DH |
362 | _leave(" = 0 [exclusive %d]", candidate->debug_id); |
363 | return 0; | |
c6d2b8d7 DH |
364 | } |
365 | ||
45025bce DH |
366 | /* Publish the new connection for userspace to find. We need to redo |
367 | * the search before doing this lest we race with someone else adding a | |
368 | * conflicting instance. | |
c6d2b8d7 DH |
369 | */ |
370 | _debug("search 2"); | |
371 | spin_lock(&local->client_conns_lock); | |
372 | ||
373 | pp = &local->client_conns.rb_node; | |
374 | parent = NULL; | |
375 | while (*pp) { | |
376 | parent = *pp; | |
377 | conn = rb_entry(parent, struct rxrpc_connection, client_node); | |
378 | ||
45025bce | 379 | #define cmp(X) ((long)conn->params.X - (long)candidate->params.X) |
c6d2b8d7 DH |
380 | diff = (cmp(peer) ?: |
381 | cmp(key) ?: | |
4e255721 DH |
382 | cmp(security_level) ?: |
383 | cmp(upgrade)); | |
45025bce DH |
384 | #undef cmp |
385 | if (diff < 0) { | |
c6d2b8d7 | 386 | pp = &(*pp)->rb_left; |
45025bce | 387 | } else if (diff > 0) { |
c6d2b8d7 | 388 | pp = &(*pp)->rb_right; |
45025bce DH |
389 | } else { |
390 | if (rxrpc_may_reuse_conn(conn) && | |
391 | rxrpc_get_connection_maybe(conn)) | |
392 | goto found_extant_conn; | |
393 | /* The old connection is from an outdated epoch. */ | |
394 | _debug("replace conn"); | |
395 | clear_bit(RXRPC_CONN_IN_CLIENT_CONNS, &conn->flags); | |
396 | rb_replace_node(&conn->client_node, | |
397 | &candidate->client_node, | |
398 | &local->client_conns); | |
363deeab | 399 | trace_rxrpc_client(conn, -1, rxrpc_client_replace); |
45025bce DH |
400 | goto candidate_published; |
401 | } | |
c6d2b8d7 DH |
402 | } |
403 | ||
c6d2b8d7 | 404 | _debug("new conn"); |
001c1122 DH |
405 | rb_link_node(&candidate->client_node, parent, pp); |
406 | rb_insert_color(&candidate->client_node, &local->client_conns); | |
c6d2b8d7 | 407 | |
45025bce DH |
408 | candidate_published: |
409 | set_bit(RXRPC_CONN_IN_CLIENT_CONNS, &candidate->flags); | |
410 | call->conn = candidate; | |
278ac0cd | 411 | call->security_ix = candidate->security_ix; |
68d6d1ae | 412 | call->service_id = candidate->service_id; |
c6d2b8d7 | 413 | spin_unlock(&local->client_conns_lock); |
45025bce DH |
414 | _leave(" = 0 [new %d]", candidate->debug_id); |
415 | return 0; | |
c6d2b8d7 | 416 | |
45025bce DH |
417 | /* We come here if we found a suitable connection already in existence. |
418 | * Discard any candidate we may have allocated, and try to get a | |
419 | * channel on this one. | |
420 | */ | |
421 | found_extant_conn: | |
422 | _debug("found conn"); | |
423 | spin_unlock(&local->client_conns_lock); | |
c6d2b8d7 | 424 | |
363deeab DH |
425 | if (candidate) { |
426 | trace_rxrpc_client(candidate, -1, rxrpc_client_duplicate); | |
427 | rxrpc_put_connection(candidate); | |
428 | candidate = NULL; | |
429 | } | |
c6d2b8d7 | 430 | |
45025bce DH |
431 | spin_lock(&conn->channel_lock); |
432 | call->conn = conn; | |
278ac0cd | 433 | call->security_ix = conn->security_ix; |
68d6d1ae | 434 | call->service_id = conn->service_id; |
69ffaebb | 435 | list_add_tail(&call->chan_wait_link, &conn->waiting_calls); |
c6d2b8d7 | 436 | spin_unlock(&conn->channel_lock); |
45025bce DH |
437 | _leave(" = 0 [extant %d]", conn->debug_id); |
438 | return 0; | |
439 | ||
440 | error_peer: | |
c6d2b8d7 DH |
441 | rxrpc_put_peer(cp->peer); |
442 | cp->peer = NULL; | |
45025bce DH |
443 | error: |
444 | _leave(" = %d", ret); | |
445 | return ret; | |
446 | } | |
c6d2b8d7 | 447 | |
45025bce DH |
448 | /* |
449 | * Activate a connection. | |
450 | */ | |
2baec2c3 DH |
451 | static void rxrpc_activate_conn(struct rxrpc_net *rxnet, |
452 | struct rxrpc_connection *conn) | |
45025bce | 453 | { |
4e255721 DH |
454 | if (test_bit(RXRPC_CONN_PROBING_FOR_UPGRADE, &conn->flags)) { |
455 | trace_rxrpc_client(conn, -1, rxrpc_client_to_upgrade); | |
456 | conn->cache_state = RXRPC_CONN_CLIENT_UPGRADE; | |
457 | } else { | |
458 | trace_rxrpc_client(conn, -1, rxrpc_client_to_active); | |
459 | conn->cache_state = RXRPC_CONN_CLIENT_ACTIVE; | |
460 | } | |
2baec2c3 DH |
461 | rxnet->nr_active_client_conns++; |
462 | list_move_tail(&conn->cache_link, &rxnet->active_client_conns); | |
45025bce DH |
463 | } |
464 | ||
465 | /* | |
466 | * Attempt to animate a connection for a new call. | |
467 | * | |
468 | * If it's not exclusive, the connection is in the endpoint tree, and we're in | |
469 | * the conn's list of those waiting to grab a channel. There is, however, a | |
470 | * limit on the number of live connections allowed at any one time, so we may | |
471 | * have to wait for capacity to become available. | |
472 | * | |
473 | * Note that a connection on the waiting queue might *also* have active | |
474 | * channels if it has been culled to make space and then re-requested by a new | |
475 | * call. | |
476 | */ | |
2baec2c3 DH |
477 | static void rxrpc_animate_client_conn(struct rxrpc_net *rxnet, |
478 | struct rxrpc_connection *conn) | |
45025bce DH |
479 | { |
480 | unsigned int nr_conns; | |
481 | ||
482 | _enter("%d,%d", conn->debug_id, conn->cache_state); | |
483 | ||
4e255721 DH |
484 | if (conn->cache_state == RXRPC_CONN_CLIENT_ACTIVE || |
485 | conn->cache_state == RXRPC_CONN_CLIENT_UPGRADE) | |
45025bce DH |
486 | goto out; |
487 | ||
2baec2c3 | 488 | spin_lock(&rxnet->client_conn_cache_lock); |
45025bce | 489 | |
2baec2c3 | 490 | nr_conns = rxnet->nr_client_conns; |
363deeab DH |
491 | if (!test_and_set_bit(RXRPC_CONN_COUNTED, &conn->flags)) { |
492 | trace_rxrpc_client(conn, -1, rxrpc_client_count); | |
2baec2c3 | 493 | rxnet->nr_client_conns = nr_conns + 1; |
363deeab | 494 | } |
45025bce DH |
495 | |
496 | switch (conn->cache_state) { | |
497 | case RXRPC_CONN_CLIENT_ACTIVE: | |
4e255721 | 498 | case RXRPC_CONN_CLIENT_UPGRADE: |
45025bce DH |
499 | case RXRPC_CONN_CLIENT_WAITING: |
500 | break; | |
501 | ||
502 | case RXRPC_CONN_CLIENT_INACTIVE: | |
503 | case RXRPC_CONN_CLIENT_CULLED: | |
504 | case RXRPC_CONN_CLIENT_IDLE: | |
505 | if (nr_conns >= rxrpc_max_client_connections) | |
506 | goto wait_for_capacity; | |
507 | goto activate_conn; | |
508 | ||
509 | default: | |
510 | BUG(); | |
001c1122 DH |
511 | } |
512 | ||
45025bce | 513 | out_unlock: |
2baec2c3 | 514 | spin_unlock(&rxnet->client_conn_cache_lock); |
45025bce DH |
515 | out: |
516 | _leave(" [%d]", conn->cache_state); | |
517 | return; | |
c6d2b8d7 | 518 | |
45025bce DH |
519 | activate_conn: |
520 | _debug("activate"); | |
2baec2c3 | 521 | rxrpc_activate_conn(rxnet, conn); |
45025bce DH |
522 | goto out_unlock; |
523 | ||
524 | wait_for_capacity: | |
525 | _debug("wait"); | |
363deeab | 526 | trace_rxrpc_client(conn, -1, rxrpc_client_to_waiting); |
45025bce | 527 | conn->cache_state = RXRPC_CONN_CLIENT_WAITING; |
2baec2c3 | 528 | list_move_tail(&conn->cache_link, &rxnet->waiting_client_conns); |
45025bce DH |
529 | goto out_unlock; |
530 | } | |
531 | ||
532 | /* | |
533 | * Deactivate a channel. | |
534 | */ | |
535 | static void rxrpc_deactivate_one_channel(struct rxrpc_connection *conn, | |
536 | unsigned int channel) | |
537 | { | |
538 | struct rxrpc_channel *chan = &conn->channels[channel]; | |
539 | ||
540 | rcu_assign_pointer(chan->call, NULL); | |
541 | conn->active_chans &= ~(1 << channel); | |
542 | } | |
543 | ||
544 | /* | |
545 | * Assign a channel to the call at the front of the queue and wake the call up. | |
546 | * We don't increment the callNumber counter until this number has been exposed | |
547 | * to the world. | |
548 | */ | |
549 | static void rxrpc_activate_one_channel(struct rxrpc_connection *conn, | |
550 | unsigned int channel) | |
551 | { | |
552 | struct rxrpc_channel *chan = &conn->channels[channel]; | |
553 | struct rxrpc_call *call = list_entry(conn->waiting_calls.next, | |
554 | struct rxrpc_call, chan_wait_link); | |
555 | u32 call_id = chan->call_counter + 1; | |
556 | ||
363deeab DH |
557 | trace_rxrpc_client(conn, channel, rxrpc_client_chan_activate); |
558 | ||
3136ef49 DH |
559 | /* Cancel the final ACK on the previous call if it hasn't been sent yet |
560 | * as the DATA packet will implicitly ACK it. | |
561 | */ | |
562 | clear_bit(RXRPC_CONN_FINAL_ACK_0 + channel, &conn->flags); | |
563 | ||
af338a9e | 564 | write_lock_bh(&call->state_lock); |
e122d845 | 565 | call->state = RXRPC_CALL_CLIENT_SEND_REQUEST; |
af338a9e DH |
566 | write_unlock_bh(&call->state_lock); |
567 | ||
e34d4234 | 568 | rxrpc_see_call(call); |
45025bce DH |
569 | list_del_init(&call->chan_wait_link); |
570 | conn->active_chans |= 1 << channel; | |
571 | call->peer = rxrpc_get_peer(conn->params.peer); | |
572 | call->cid = conn->proto.cid | channel; | |
573 | call->call_id = call_id; | |
574 | ||
89ca6948 | 575 | trace_rxrpc_connect_call(call); |
45025bce DH |
576 | _net("CONNECT call %08x:%08x as call %d on conn %d", |
577 | call->cid, call->call_id, call->debug_id, conn->debug_id); | |
578 | ||
579 | /* Paired with the read barrier in rxrpc_wait_for_channel(). This | |
580 | * orders cid and epoch in the connection wrt to call_id without the | |
581 | * need to take the channel_lock. | |
582 | * | |
583 | * We provisionally assign a callNumber at this point, but we don't | |
584 | * confirm it until the call is about to be exposed. | |
585 | * | |
586 | * TODO: Pair with a barrier in the data_ready handler when that looks | |
587 | * at the call ID through a connection channel. | |
588 | */ | |
589 | smp_wmb(); | |
590 | chan->call_id = call_id; | |
4764c0da | 591 | chan->call_debug_id = call->debug_id; |
45025bce DH |
592 | rcu_assign_pointer(chan->call, call); |
593 | wake_up(&call->waitq); | |
594 | } | |
595 | ||
2629c7fa DH |
596 | /* |
597 | * Assign channels and callNumbers to waiting calls with channel_lock | |
598 | * held by caller. | |
599 | */ | |
600 | static void rxrpc_activate_channels_locked(struct rxrpc_connection *conn) | |
601 | { | |
602 | u8 avail, mask; | |
603 | ||
604 | switch (conn->cache_state) { | |
605 | case RXRPC_CONN_CLIENT_ACTIVE: | |
606 | mask = RXRPC_ACTIVE_CHANS_MASK; | |
607 | break; | |
4e255721 DH |
608 | case RXRPC_CONN_CLIENT_UPGRADE: |
609 | mask = 0x01; | |
610 | break; | |
2629c7fa DH |
611 | default: |
612 | return; | |
613 | } | |
614 | ||
615 | while (!list_empty(&conn->waiting_calls) && | |
616 | (avail = ~conn->active_chans, | |
617 | avail &= mask, | |
618 | avail != 0)) | |
619 | rxrpc_activate_one_channel(conn, __ffs(avail)); | |
620 | } | |
621 | ||
45025bce DH |
622 | /* |
623 | * Assign channels and callNumbers to waiting calls. | |
624 | */ | |
625 | static void rxrpc_activate_channels(struct rxrpc_connection *conn) | |
626 | { | |
45025bce DH |
627 | _enter("%d", conn->debug_id); |
628 | ||
363deeab DH |
629 | trace_rxrpc_client(conn, -1, rxrpc_client_activate_chans); |
630 | ||
2629c7fa | 631 | if (conn->active_chans == RXRPC_ACTIVE_CHANS_MASK) |
45025bce DH |
632 | return; |
633 | ||
634 | spin_lock(&conn->channel_lock); | |
2629c7fa | 635 | rxrpc_activate_channels_locked(conn); |
45025bce DH |
636 | spin_unlock(&conn->channel_lock); |
637 | _leave(""); | |
638 | } | |
639 | ||
640 | /* | |
641 | * Wait for a callNumber and a channel to be granted to a call. | |
642 | */ | |
643 | static int rxrpc_wait_for_channel(struct rxrpc_call *call, gfp_t gfp) | |
644 | { | |
645 | int ret = 0; | |
646 | ||
647 | _enter("%d", call->debug_id); | |
648 | ||
649 | if (!call->call_id) { | |
650 | DECLARE_WAITQUEUE(myself, current); | |
c6d2b8d7 | 651 | |
c6d2b8d7 | 652 | if (!gfpflags_allow_blocking(gfp)) { |
45025bce DH |
653 | ret = -EAGAIN; |
654 | goto out; | |
c6d2b8d7 DH |
655 | } |
656 | ||
45025bce | 657 | add_wait_queue_exclusive(&call->waitq, &myself); |
c6d2b8d7 | 658 | for (;;) { |
b960a34b DH |
659 | if (test_bit(RXRPC_CALL_IS_INTR, &call->flags)) |
660 | set_current_state(TASK_INTERRUPTIBLE); | |
661 | else | |
662 | set_current_state(TASK_UNINTERRUPTIBLE); | |
45025bce DH |
663 | if (call->call_id) |
664 | break; | |
b960a34b DH |
665 | if (test_bit(RXRPC_CALL_IS_INTR, &call->flags) && |
666 | signal_pending(current)) { | |
45025bce | 667 | ret = -ERESTARTSYS; |
c6d2b8d7 | 668 | break; |
45025bce | 669 | } |
c6d2b8d7 DH |
670 | schedule(); |
671 | } | |
45025bce | 672 | remove_wait_queue(&call->waitq, &myself); |
c6d2b8d7 DH |
673 | __set_current_state(TASK_RUNNING); |
674 | } | |
675 | ||
45025bce DH |
676 | /* Paired with the write barrier in rxrpc_activate_one_channel(). */ |
677 | smp_rmb(); | |
678 | ||
679 | out: | |
680 | _leave(" = %d", ret); | |
681 | return ret; | |
682 | } | |
683 | ||
684 | /* | |
685 | * find a connection for a call | |
686 | * - called in process context with IRQs enabled | |
687 | */ | |
5e33a23b DH |
688 | int rxrpc_connect_call(struct rxrpc_sock *rx, |
689 | struct rxrpc_call *call, | |
45025bce DH |
690 | struct rxrpc_conn_parameters *cp, |
691 | struct sockaddr_rxrpc *srx, | |
692 | gfp_t gfp) | |
693 | { | |
2baec2c3 | 694 | struct rxrpc_net *rxnet = cp->local->rxnet; |
45025bce DH |
695 | int ret; |
696 | ||
697 | _enter("{%d,%lx},", call->debug_id, call->user_call_ID); | |
698 | ||
3d18cbb7 | 699 | rxrpc_discard_expired_client_conns(&rxnet->client_conn_reaper); |
2baec2c3 | 700 | rxrpc_cull_active_client_conns(rxnet); |
45025bce | 701 | |
5e33a23b | 702 | ret = rxrpc_get_client_conn(rx, call, cp, srx, gfp); |
45025bce | 703 | if (ret < 0) |
c038a58c | 704 | goto out; |
45025bce | 705 | |
2baec2c3 | 706 | rxrpc_animate_client_conn(rxnet, call->conn); |
45025bce DH |
707 | rxrpc_activate_channels(call->conn); |
708 | ||
709 | ret = rxrpc_wait_for_channel(call, gfp); | |
c038a58c | 710 | if (ret < 0) { |
930c9f91 | 711 | trace_rxrpc_client(call->conn, ret, rxrpc_client_chan_wait_failed); |
45025bce | 712 | rxrpc_disconnect_client_call(call); |
c038a58c DH |
713 | goto out; |
714 | } | |
715 | ||
716 | spin_lock_bh(&call->conn->params.peer->lock); | |
f3344303 DH |
717 | hlist_add_head_rcu(&call->error_link, |
718 | &call->conn->params.peer->error_targets); | |
c038a58c | 719 | spin_unlock_bh(&call->conn->params.peer->lock); |
45025bce | 720 | |
c038a58c | 721 | out: |
45025bce DH |
722 | _leave(" = %d", ret); |
723 | return ret; | |
724 | } | |
725 | ||
726 | /* | |
727 | * Note that a connection is about to be exposed to the world. Once it is | |
728 | * exposed, we maintain an extra ref on it that stops it from being summarily | |
729 | * discarded before it's (a) had a chance to deal with retransmission and (b) | |
730 | * had a chance at re-use (the per-connection security negotiation is | |
731 | * expensive). | |
732 | */ | |
363deeab DH |
733 | static void rxrpc_expose_client_conn(struct rxrpc_connection *conn, |
734 | unsigned int channel) | |
45025bce | 735 | { |
363deeab DH |
736 | if (!test_and_set_bit(RXRPC_CONN_EXPOSED, &conn->flags)) { |
737 | trace_rxrpc_client(conn, channel, rxrpc_client_exposed); | |
45025bce | 738 | rxrpc_get_connection(conn); |
363deeab | 739 | } |
45025bce DH |
740 | } |
741 | ||
742 | /* | |
743 | * Note that a call, and thus a connection, is about to be exposed to the | |
744 | * world. | |
745 | */ | |
746 | void rxrpc_expose_client_call(struct rxrpc_call *call) | |
747 | { | |
363deeab | 748 | unsigned int channel = call->cid & RXRPC_CHANNELMASK; |
45025bce | 749 | struct rxrpc_connection *conn = call->conn; |
363deeab | 750 | struct rxrpc_channel *chan = &conn->channels[channel]; |
45025bce DH |
751 | |
752 | if (!test_and_set_bit(RXRPC_CALL_EXPOSED, &call->flags)) { | |
753 | /* Mark the call ID as being used. If the callNumber counter | |
754 | * exceeds ~2 billion, we kill the connection after its | |
755 | * outstanding calls have finished so that the counter doesn't | |
756 | * wrap. | |
757 | */ | |
758 | chan->call_counter++; | |
759 | if (chan->call_counter >= INT_MAX) | |
760 | set_bit(RXRPC_CONN_DONT_REUSE, &conn->flags); | |
363deeab | 761 | rxrpc_expose_client_conn(conn, channel); |
45025bce DH |
762 | } |
763 | } | |
764 | ||
3d18cbb7 DH |
765 | /* |
766 | * Set the reap timer. | |
767 | */ | |
768 | static void rxrpc_set_client_reap_timer(struct rxrpc_net *rxnet) | |
769 | { | |
770 | unsigned long now = jiffies; | |
771 | unsigned long reap_at = now + rxrpc_conn_idle_client_expiry; | |
772 | ||
773 | if (rxnet->live) | |
774 | timer_reduce(&rxnet->client_conn_reap_timer, reap_at); | |
775 | } | |
776 | ||
45025bce DH |
777 | /* |
778 | * Disconnect a client call. | |
779 | */ | |
780 | void rxrpc_disconnect_client_call(struct rxrpc_call *call) | |
781 | { | |
45025bce | 782 | struct rxrpc_connection *conn = call->conn; |
930c9f91 | 783 | struct rxrpc_channel *chan = NULL; |
88f2a825 | 784 | struct rxrpc_net *rxnet = conn->params.local->rxnet; |
930c9f91 DH |
785 | unsigned int channel = -1; |
786 | u32 cid; | |
45025bce | 787 | |
930c9f91 DH |
788 | spin_lock(&conn->channel_lock); |
789 | ||
790 | cid = call->cid; | |
791 | if (cid) { | |
792 | channel = cid & RXRPC_CHANNELMASK; | |
793 | chan = &conn->channels[channel]; | |
794 | } | |
363deeab | 795 | trace_rxrpc_client(conn, channel, rxrpc_client_chan_disconnect); |
45025bce DH |
796 | call->conn = NULL; |
797 | ||
45025bce DH |
798 | /* Calls that have never actually been assigned a channel can simply be |
799 | * discarded. If the conn didn't get used either, it will follow | |
800 | * immediately unless someone else grabs it in the meantime. | |
801 | */ | |
802 | if (!list_empty(&call->chan_wait_link)) { | |
803 | _debug("call is waiting"); | |
804 | ASSERTCMP(call->call_id, ==, 0); | |
805 | ASSERT(!test_bit(RXRPC_CALL_EXPOSED, &call->flags)); | |
806 | list_del_init(&call->chan_wait_link); | |
807 | ||
363deeab DH |
808 | trace_rxrpc_client(conn, channel, rxrpc_client_chan_unstarted); |
809 | ||
45025bce DH |
810 | /* We must deactivate or idle the connection if it's now |
811 | * waiting for nothing. | |
812 | */ | |
2baec2c3 | 813 | spin_lock(&rxnet->client_conn_cache_lock); |
45025bce DH |
814 | if (conn->cache_state == RXRPC_CONN_CLIENT_WAITING && |
815 | list_empty(&conn->waiting_calls) && | |
816 | !conn->active_chans) | |
817 | goto idle_connection; | |
818 | goto out; | |
819 | } | |
820 | ||
930c9f91 DH |
821 | if (rcu_access_pointer(chan->call) != call) { |
822 | spin_unlock(&conn->channel_lock); | |
823 | BUG(); | |
824 | } | |
45025bce DH |
825 | |
826 | /* If a client call was exposed to the world, we save the result for | |
827 | * retransmission. | |
828 | * | |
829 | * We use a barrier here so that the call number and abort code can be | |
830 | * read without needing to take a lock. | |
831 | * | |
832 | * TODO: Make the incoming packet handler check this and handle | |
833 | * terminal retransmission without requiring access to the call. | |
834 | */ | |
835 | if (test_bit(RXRPC_CALL_EXPOSED, &call->flags)) { | |
f5c17aae | 836 | _debug("exposed %u,%u", call->call_id, call->abort_code); |
45025bce DH |
837 | __rxrpc_disconnect_call(conn, call); |
838 | } | |
839 | ||
840 | /* See if we can pass the channel directly to another call. */ | |
841 | if (conn->cache_state == RXRPC_CONN_CLIENT_ACTIVE && | |
842 | !list_empty(&conn->waiting_calls)) { | |
363deeab | 843 | trace_rxrpc_client(conn, channel, rxrpc_client_chan_pass); |
45025bce DH |
844 | rxrpc_activate_one_channel(conn, channel); |
845 | goto out_2; | |
846 | } | |
847 | ||
3136ef49 DH |
848 | /* Schedule the final ACK to be transmitted in a short while so that it |
849 | * can be skipped if we find a follow-on call. The first DATA packet | |
850 | * of the follow on call will implicitly ACK this call. | |
851 | */ | |
17e9e23b DH |
852 | if (call->completion == RXRPC_CALL_SUCCEEDED && |
853 | test_bit(RXRPC_CALL_EXPOSED, &call->flags)) { | |
3136ef49 DH |
854 | unsigned long final_ack_at = jiffies + 2; |
855 | ||
856 | WRITE_ONCE(chan->final_ack_at, final_ack_at); | |
857 | smp_wmb(); /* vs rxrpc_process_delayed_final_acks() */ | |
858 | set_bit(RXRPC_CONN_FINAL_ACK_0 + channel, &conn->flags); | |
859 | rxrpc_reduce_conn_timer(conn, final_ack_at); | |
860 | } | |
861 | ||
45025bce DH |
862 | /* Things are more complex and we need the cache lock. We might be |
863 | * able to simply idle the conn or it might now be lurking on the wait | |
864 | * list. It might even get moved back to the active list whilst we're | |
865 | * waiting for the lock. | |
866 | */ | |
2baec2c3 | 867 | spin_lock(&rxnet->client_conn_cache_lock); |
45025bce DH |
868 | |
869 | switch (conn->cache_state) { | |
4e255721 DH |
870 | case RXRPC_CONN_CLIENT_UPGRADE: |
871 | /* Deal with termination of a service upgrade probe. */ | |
872 | if (test_bit(RXRPC_CONN_EXPOSED, &conn->flags)) { | |
873 | clear_bit(RXRPC_CONN_PROBING_FOR_UPGRADE, &conn->flags); | |
874 | trace_rxrpc_client(conn, channel, rxrpc_client_to_active); | |
875 | conn->cache_state = RXRPC_CONN_CLIENT_ACTIVE; | |
876 | rxrpc_activate_channels_locked(conn); | |
877 | } | |
878 | /* fall through */ | |
45025bce DH |
879 | case RXRPC_CONN_CLIENT_ACTIVE: |
880 | if (list_empty(&conn->waiting_calls)) { | |
881 | rxrpc_deactivate_one_channel(conn, channel); | |
882 | if (!conn->active_chans) { | |
2baec2c3 | 883 | rxnet->nr_active_client_conns--; |
45025bce DH |
884 | goto idle_connection; |
885 | } | |
886 | goto out; | |
887 | } | |
888 | ||
363deeab | 889 | trace_rxrpc_client(conn, channel, rxrpc_client_chan_pass); |
45025bce DH |
890 | rxrpc_activate_one_channel(conn, channel); |
891 | goto out; | |
892 | ||
893 | case RXRPC_CONN_CLIENT_CULLED: | |
894 | rxrpc_deactivate_one_channel(conn, channel); | |
895 | ASSERT(list_empty(&conn->waiting_calls)); | |
896 | if (!conn->active_chans) | |
897 | goto idle_connection; | |
898 | goto out; | |
899 | ||
900 | case RXRPC_CONN_CLIENT_WAITING: | |
901 | rxrpc_deactivate_one_channel(conn, channel); | |
902 | goto out; | |
903 | ||
904 | default: | |
905 | BUG(); | |
906 | } | |
c6d2b8d7 | 907 | |
45025bce | 908 | out: |
2baec2c3 | 909 | spin_unlock(&rxnet->client_conn_cache_lock); |
45025bce DH |
910 | out_2: |
911 | spin_unlock(&conn->channel_lock); | |
c6d2b8d7 | 912 | rxrpc_put_connection(conn); |
45025bce DH |
913 | _leave(""); |
914 | return; | |
915 | ||
916 | idle_connection: | |
917 | /* As no channels remain active, the connection gets deactivated | |
918 | * immediately or moved to the idle list for a short while. | |
919 | */ | |
920 | if (test_bit(RXRPC_CONN_EXPOSED, &conn->flags)) { | |
363deeab | 921 | trace_rxrpc_client(conn, channel, rxrpc_client_to_idle); |
45025bce DH |
922 | conn->idle_timestamp = jiffies; |
923 | conn->cache_state = RXRPC_CONN_CLIENT_IDLE; | |
2baec2c3 DH |
924 | list_move_tail(&conn->cache_link, &rxnet->idle_client_conns); |
925 | if (rxnet->idle_client_conns.next == &conn->cache_link && | |
926 | !rxnet->kill_all_client_conns) | |
3d18cbb7 | 927 | rxrpc_set_client_reap_timer(rxnet); |
45025bce | 928 | } else { |
363deeab | 929 | trace_rxrpc_client(conn, channel, rxrpc_client_to_inactive); |
45025bce DH |
930 | conn->cache_state = RXRPC_CONN_CLIENT_INACTIVE; |
931 | list_del_init(&conn->cache_link); | |
932 | } | |
933 | goto out; | |
c6d2b8d7 | 934 | } |
001c1122 DH |
935 | |
936 | /* | |
45025bce | 937 | * Clean up a dead client connection. |
001c1122 | 938 | */ |
45025bce DH |
939 | static struct rxrpc_connection * |
940 | rxrpc_put_one_client_conn(struct rxrpc_connection *conn) | |
001c1122 | 941 | { |
66d58af7 | 942 | struct rxrpc_connection *next = NULL; |
001c1122 | 943 | struct rxrpc_local *local = conn->params.local; |
2baec2c3 | 944 | struct rxrpc_net *rxnet = local->rxnet; |
45025bce | 945 | unsigned int nr_conns; |
001c1122 | 946 | |
363deeab DH |
947 | trace_rxrpc_client(conn, -1, rxrpc_client_cleanup); |
948 | ||
45025bce DH |
949 | if (test_bit(RXRPC_CONN_IN_CLIENT_CONNS, &conn->flags)) { |
950 | spin_lock(&local->client_conns_lock); | |
951 | if (test_and_clear_bit(RXRPC_CONN_IN_CLIENT_CONNS, | |
952 | &conn->flags)) | |
953 | rb_erase(&conn->client_node, &local->client_conns); | |
954 | spin_unlock(&local->client_conns_lock); | |
955 | } | |
001c1122 DH |
956 | |
957 | rxrpc_put_client_connection_id(conn); | |
45025bce DH |
958 | |
959 | ASSERTCMP(conn->cache_state, ==, RXRPC_CONN_CLIENT_INACTIVE); | |
960 | ||
66d58af7 | 961 | if (test_bit(RXRPC_CONN_COUNTED, &conn->flags)) { |
363deeab | 962 | trace_rxrpc_client(conn, -1, rxrpc_client_uncount); |
2baec2c3 DH |
963 | spin_lock(&rxnet->client_conn_cache_lock); |
964 | nr_conns = --rxnet->nr_client_conns; | |
66d58af7 DH |
965 | |
966 | if (nr_conns < rxrpc_max_client_connections && | |
2baec2c3 DH |
967 | !list_empty(&rxnet->waiting_client_conns)) { |
968 | next = list_entry(rxnet->waiting_client_conns.next, | |
66d58af7 DH |
969 | struct rxrpc_connection, cache_link); |
970 | rxrpc_get_connection(next); | |
2baec2c3 | 971 | rxrpc_activate_conn(rxnet, next); |
66d58af7 | 972 | } |
45025bce | 973 | |
2baec2c3 | 974 | spin_unlock(&rxnet->client_conn_cache_lock); |
45025bce DH |
975 | } |
976 | ||
45025bce | 977 | rxrpc_kill_connection(conn); |
45025bce DH |
978 | if (next) |
979 | rxrpc_activate_channels(next); | |
980 | ||
981 | /* We need to get rid of the temporary ref we took upon next, but we | |
982 | * can't call rxrpc_put_connection() recursively. | |
983 | */ | |
984 | return next; | |
985 | } | |
986 | ||
987 | /* | |
988 | * Clean up a dead client connections. | |
989 | */ | |
990 | void rxrpc_put_client_conn(struct rxrpc_connection *conn) | |
991 | { | |
363deeab DH |
992 | const void *here = __builtin_return_address(0); |
993 | int n; | |
45025bce DH |
994 | |
995 | do { | |
363deeab DH |
996 | n = atomic_dec_return(&conn->usage); |
997 | trace_rxrpc_conn(conn, rxrpc_conn_put_client, n, here); | |
998 | if (n > 0) | |
999 | return; | |
1000 | ASSERTCMP(n, >=, 0); | |
1001 | ||
1002 | conn = rxrpc_put_one_client_conn(conn); | |
1003 | } while (conn); | |
45025bce DH |
1004 | } |
1005 | ||
1006 | /* | |
1007 | * Kill the longest-active client connections to make room for new ones. | |
1008 | */ | |
2baec2c3 | 1009 | static void rxrpc_cull_active_client_conns(struct rxrpc_net *rxnet) |
45025bce DH |
1010 | { |
1011 | struct rxrpc_connection *conn; | |
2baec2c3 | 1012 | unsigned int nr_conns = rxnet->nr_client_conns; |
45025bce DH |
1013 | unsigned int nr_active, limit; |
1014 | ||
1015 | _enter(""); | |
1016 | ||
1017 | ASSERTCMP(nr_conns, >=, 0); | |
1018 | if (nr_conns < rxrpc_max_client_connections) { | |
1019 | _leave(" [ok]"); | |
1020 | return; | |
1021 | } | |
1022 | limit = rxrpc_reap_client_connections; | |
1023 | ||
2baec2c3 DH |
1024 | spin_lock(&rxnet->client_conn_cache_lock); |
1025 | nr_active = rxnet->nr_active_client_conns; | |
45025bce DH |
1026 | |
1027 | while (nr_active > limit) { | |
2baec2c3 DH |
1028 | ASSERT(!list_empty(&rxnet->active_client_conns)); |
1029 | conn = list_entry(rxnet->active_client_conns.next, | |
45025bce | 1030 | struct rxrpc_connection, cache_link); |
4e255721 DH |
1031 | ASSERTIFCMP(conn->cache_state != RXRPC_CONN_CLIENT_ACTIVE, |
1032 | conn->cache_state, ==, RXRPC_CONN_CLIENT_UPGRADE); | |
45025bce DH |
1033 | |
1034 | if (list_empty(&conn->waiting_calls)) { | |
363deeab | 1035 | trace_rxrpc_client(conn, -1, rxrpc_client_to_culled); |
45025bce DH |
1036 | conn->cache_state = RXRPC_CONN_CLIENT_CULLED; |
1037 | list_del_init(&conn->cache_link); | |
1038 | } else { | |
363deeab | 1039 | trace_rxrpc_client(conn, -1, rxrpc_client_to_waiting); |
45025bce DH |
1040 | conn->cache_state = RXRPC_CONN_CLIENT_WAITING; |
1041 | list_move_tail(&conn->cache_link, | |
2baec2c3 | 1042 | &rxnet->waiting_client_conns); |
45025bce DH |
1043 | } |
1044 | ||
1045 | nr_active--; | |
1046 | } | |
1047 | ||
2baec2c3 DH |
1048 | rxnet->nr_active_client_conns = nr_active; |
1049 | spin_unlock(&rxnet->client_conn_cache_lock); | |
45025bce DH |
1050 | ASSERTCMP(nr_active, >=, 0); |
1051 | _leave(" [culled]"); | |
1052 | } | |
1053 | ||
1054 | /* | |
1055 | * Discard expired client connections from the idle list. Each conn in the | |
1056 | * idle list has been exposed and holds an extra ref because of that. | |
1057 | * | |
1058 | * This may be called from conn setup or from a work item so cannot be | |
1059 | * considered non-reentrant. | |
1060 | */ | |
2baec2c3 | 1061 | void rxrpc_discard_expired_client_conns(struct work_struct *work) |
45025bce DH |
1062 | { |
1063 | struct rxrpc_connection *conn; | |
2baec2c3 | 1064 | struct rxrpc_net *rxnet = |
3d18cbb7 | 1065 | container_of(work, struct rxrpc_net, client_conn_reaper); |
45025bce DH |
1066 | unsigned long expiry, conn_expires_at, now; |
1067 | unsigned int nr_conns; | |
45025bce | 1068 | |
2baec2c3 | 1069 | _enter(""); |
45025bce | 1070 | |
2baec2c3 | 1071 | if (list_empty(&rxnet->idle_client_conns)) { |
45025bce DH |
1072 | _leave(" [empty]"); |
1073 | return; | |
1074 | } | |
1075 | ||
1076 | /* Don't double up on the discarding */ | |
2baec2c3 | 1077 | if (!spin_trylock(&rxnet->client_conn_discard_lock)) { |
45025bce DH |
1078 | _leave(" [already]"); |
1079 | return; | |
1080 | } | |
1081 | ||
1082 | /* We keep an estimate of what the number of conns ought to be after | |
1083 | * we've discarded some so that we don't overdo the discarding. | |
1084 | */ | |
2baec2c3 | 1085 | nr_conns = rxnet->nr_client_conns; |
45025bce DH |
1086 | |
1087 | next: | |
2baec2c3 | 1088 | spin_lock(&rxnet->client_conn_cache_lock); |
45025bce | 1089 | |
2baec2c3 | 1090 | if (list_empty(&rxnet->idle_client_conns)) |
45025bce DH |
1091 | goto out; |
1092 | ||
2baec2c3 | 1093 | conn = list_entry(rxnet->idle_client_conns.next, |
45025bce DH |
1094 | struct rxrpc_connection, cache_link); |
1095 | ASSERT(test_bit(RXRPC_CONN_EXPOSED, &conn->flags)); | |
1096 | ||
2baec2c3 | 1097 | if (!rxnet->kill_all_client_conns) { |
45025bce DH |
1098 | /* If the number of connections is over the reap limit, we |
1099 | * expedite discard by reducing the expiry timeout. We must, | |
1100 | * however, have at least a short grace period to be able to do | |
1101 | * final-ACK or ABORT retransmission. | |
1102 | */ | |
1103 | expiry = rxrpc_conn_idle_client_expiry; | |
1104 | if (nr_conns > rxrpc_reap_client_connections) | |
1105 | expiry = rxrpc_conn_idle_client_fast_expiry; | |
f859ab61 DH |
1106 | if (conn->params.local->service_closed) |
1107 | expiry = rxrpc_closed_conn_expiry * HZ; | |
45025bce DH |
1108 | |
1109 | conn_expires_at = conn->idle_timestamp + expiry; | |
1110 | ||
1111 | now = READ_ONCE(jiffies); | |
1112 | if (time_after(conn_expires_at, now)) | |
1113 | goto not_yet_expired; | |
1114 | } | |
1115 | ||
363deeab | 1116 | trace_rxrpc_client(conn, -1, rxrpc_client_discard); |
45025bce DH |
1117 | if (!test_and_clear_bit(RXRPC_CONN_EXPOSED, &conn->flags)) |
1118 | BUG(); | |
1119 | conn->cache_state = RXRPC_CONN_CLIENT_INACTIVE; | |
1120 | list_del_init(&conn->cache_link); | |
1121 | ||
2baec2c3 | 1122 | spin_unlock(&rxnet->client_conn_cache_lock); |
45025bce DH |
1123 | |
1124 | /* When we cleared the EXPOSED flag, we took on responsibility for the | |
1125 | * reference that that had on the usage count. We deal with that here. | |
1126 | * If someone re-sets the flag and re-gets the ref, that's fine. | |
1127 | */ | |
1128 | rxrpc_put_connection(conn); | |
45025bce DH |
1129 | nr_conns--; |
1130 | goto next; | |
1131 | ||
1132 | not_yet_expired: | |
1133 | /* The connection at the front of the queue hasn't yet expired, so | |
1134 | * schedule the work item for that point if we discarded something. | |
1135 | * | |
1136 | * We don't worry if the work item is already scheduled - it can look | |
1137 | * after rescheduling itself at a later time. We could cancel it, but | |
1138 | * then things get messier. | |
1139 | */ | |
1140 | _debug("not yet"); | |
2baec2c3 | 1141 | if (!rxnet->kill_all_client_conns) |
3d18cbb7 DH |
1142 | timer_reduce(&rxnet->client_conn_reap_timer, |
1143 | conn_expires_at); | |
45025bce DH |
1144 | |
1145 | out: | |
2baec2c3 DH |
1146 | spin_unlock(&rxnet->client_conn_cache_lock); |
1147 | spin_unlock(&rxnet->client_conn_discard_lock); | |
45025bce DH |
1148 | _leave(""); |
1149 | } | |
1150 | ||
1151 | /* | |
1152 | * Preemptively destroy all the client connection records rather than waiting | |
1153 | * for them to time out | |
1154 | */ | |
2baec2c3 | 1155 | void rxrpc_destroy_all_client_connections(struct rxrpc_net *rxnet) |
45025bce DH |
1156 | { |
1157 | _enter(""); | |
1158 | ||
2baec2c3 DH |
1159 | spin_lock(&rxnet->client_conn_cache_lock); |
1160 | rxnet->kill_all_client_conns = true; | |
1161 | spin_unlock(&rxnet->client_conn_cache_lock); | |
45025bce | 1162 | |
3d18cbb7 | 1163 | del_timer_sync(&rxnet->client_conn_reap_timer); |
45025bce | 1164 | |
3d18cbb7 | 1165 | if (!rxrpc_queue_work(&rxnet->client_conn_reaper)) |
45025bce DH |
1166 | _debug("destroy: queue failed"); |
1167 | ||
1168 | _leave(""); | |
001c1122 | 1169 | } |