blob: 684a2b02b9ff70ae056aab6a3807f624bb26c47a [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001// SPDX-License-Identifier: GPL-2.0-or-later
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/* AFS server record management
3 *
4 * Copyright (C) 2002, 2007 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00006 */
7
8#include <linux/sched.h>
9#include <linux/slab.h>
10#include "afs_fs.h"
11#include "internal.h"
David Brazdil0f672f62019-12-10 10:32:29 +000012#include "protocol_yfs.h"
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000013
14static unsigned afs_server_gc_delay = 10; /* Server record timeout in seconds */
David Brazdil0f672f62019-12-10 10:32:29 +000015static atomic_t afs_server_debug_id;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000016
Olivier Deprez157378f2022-04-04 15:47:50 +020017static struct afs_server *afs_maybe_use_server(struct afs_server *,
18 enum afs_server_trace);
19static void __afs_put_server(struct afs_net *, struct afs_server *);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000020
21/*
22 * Find a server by one of its addresses.
23 */
24struct afs_server *afs_find_server(struct afs_net *net,
25 const struct sockaddr_rxrpc *srx)
26{
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000027 const struct afs_addr_list *alist;
28 struct afs_server *server = NULL;
29 unsigned int i;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000030 int seq = 0, diff;
31
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000032 rcu_read_lock();
33
34 do {
35 if (server)
Olivier Deprez157378f2022-04-04 15:47:50 +020036 afs_unuse_server_notime(net, server, afs_server_trace_put_find_rsq);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000037 server = NULL;
38 read_seqbegin_or_lock(&net->fs_addr_lock, &seq);
39
Olivier Deprez0e641232021-09-23 10:07:05 +020040 if (srx->transport.family == AF_INET6) {
41 const struct sockaddr_in6 *a = &srx->transport.sin6, *b;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000042 hlist_for_each_entry_rcu(server, &net->fs_addresses6, addr6_link) {
43 alist = rcu_dereference(server->addresses);
44 for (i = alist->nr_ipv4; i < alist->nr_addrs; i++) {
45 b = &alist->addrs[i].transport.sin6;
46 diff = ((u16 __force)a->sin6_port -
47 (u16 __force)b->sin6_port);
48 if (diff == 0)
49 diff = memcmp(&a->sin6_addr,
50 &b->sin6_addr,
51 sizeof(struct in6_addr));
52 if (diff == 0)
53 goto found;
54 }
55 }
56 } else {
Olivier Deprez0e641232021-09-23 10:07:05 +020057 const struct sockaddr_in *a = &srx->transport.sin, *b;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000058 hlist_for_each_entry_rcu(server, &net->fs_addresses4, addr4_link) {
59 alist = rcu_dereference(server->addresses);
60 for (i = 0; i < alist->nr_ipv4; i++) {
Olivier Deprez0e641232021-09-23 10:07:05 +020061 b = &alist->addrs[i].transport.sin;
62 diff = ((u16 __force)a->sin_port -
63 (u16 __force)b->sin_port);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000064 if (diff == 0)
Olivier Deprez0e641232021-09-23 10:07:05 +020065 diff = ((u32 __force)a->sin_addr.s_addr -
66 (u32 __force)b->sin_addr.s_addr);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000067 if (diff == 0)
68 goto found;
69 }
70 }
71 }
72
73 server = NULL;
Olivier Deprez157378f2022-04-04 15:47:50 +020074 continue;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000075 found:
Olivier Deprez157378f2022-04-04 15:47:50 +020076 server = afs_maybe_use_server(server, afs_server_trace_get_by_addr);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000077
78 } while (need_seqretry(&net->fs_addr_lock, seq));
79
80 done_seqretry(&net->fs_addr_lock, seq);
81
82 rcu_read_unlock();
83 return server;
84}
85
86/*
Olivier Deprez157378f2022-04-04 15:47:50 +020087 * Look up a server by its UUID and mark it active.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000088 */
89struct afs_server *afs_find_server_by_uuid(struct afs_net *net, const uuid_t *uuid)
90{
91 struct afs_server *server = NULL;
92 struct rb_node *p;
93 int diff, seq = 0;
94
95 _enter("%pU", uuid);
96
97 do {
98 /* Unfortunately, rbtree walking doesn't give reliable results
99 * under just the RCU read lock, so we have to check for
100 * changes.
101 */
102 if (server)
Olivier Deprez157378f2022-04-04 15:47:50 +0200103 afs_unuse_server(net, server, afs_server_trace_put_uuid_rsq);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000104 server = NULL;
105
106 read_seqbegin_or_lock(&net->fs_lock, &seq);
107
108 p = net->fs_servers.rb_node;
109 while (p) {
110 server = rb_entry(p, struct afs_server, uuid_rb);
111
112 diff = memcmp(uuid, &server->uuid, sizeof(*uuid));
113 if (diff < 0) {
114 p = p->rb_left;
115 } else if (diff > 0) {
116 p = p->rb_right;
117 } else {
Olivier Deprez157378f2022-04-04 15:47:50 +0200118 afs_use_server(server, afs_server_trace_get_by_uuid);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000119 break;
120 }
121
122 server = NULL;
123 }
124 } while (need_seqretry(&net->fs_lock, seq));
125
126 done_seqretry(&net->fs_lock, seq);
127
128 _leave(" = %p", server);
129 return server;
130}
131
132/*
Olivier Deprez157378f2022-04-04 15:47:50 +0200133 * Install a server record in the namespace tree. If there's a clash, we stick
134 * it into a list anchored on whichever afs_server struct is actually in the
135 * tree.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000136 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200137static struct afs_server *afs_install_server(struct afs_cell *cell,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000138 struct afs_server *candidate)
139{
140 const struct afs_addr_list *alist;
Olivier Deprez157378f2022-04-04 15:47:50 +0200141 struct afs_server *server, *next;
142 struct afs_net *net = cell->net;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000143 struct rb_node **pp, *p;
Olivier Deprez157378f2022-04-04 15:47:50 +0200144 int diff;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000145
146 _enter("%p", candidate);
147
148 write_seqlock(&net->fs_lock);
149
150 /* Firstly install the server in the UUID lookup tree */
151 pp = &net->fs_servers.rb_node;
152 p = NULL;
153 while (*pp) {
154 p = *pp;
155 _debug("- consider %p", p);
156 server = rb_entry(p, struct afs_server, uuid_rb);
157 diff = memcmp(&candidate->uuid, &server->uuid, sizeof(uuid_t));
Olivier Deprez157378f2022-04-04 15:47:50 +0200158 if (diff < 0) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000159 pp = &(*pp)->rb_left;
Olivier Deprez157378f2022-04-04 15:47:50 +0200160 } else if (diff > 0) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000161 pp = &(*pp)->rb_right;
Olivier Deprez157378f2022-04-04 15:47:50 +0200162 } else {
163 if (server->cell == cell)
164 goto exists;
165
166 /* We have the same UUID representing servers in
167 * different cells. Append the new server to the list.
168 */
169 for (;;) {
170 next = rcu_dereference_protected(
171 server->uuid_next,
172 lockdep_is_held(&net->fs_lock.lock));
173 if (!next)
174 break;
175 server = next;
176 }
177 rcu_assign_pointer(server->uuid_next, candidate);
178 candidate->uuid_prev = server;
179 server = candidate;
180 goto added_dup;
181 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000182 }
183
184 server = candidate;
185 rb_link_node(&server->uuid_rb, p, pp);
186 rb_insert_color(&server->uuid_rb, &net->fs_servers);
187 hlist_add_head_rcu(&server->proc_link, &net->fs_proc);
188
Olivier Deprez157378f2022-04-04 15:47:50 +0200189added_dup:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000190 write_seqlock(&net->fs_addr_lock);
191 alist = rcu_dereference_protected(server->addresses,
192 lockdep_is_held(&net->fs_addr_lock.lock));
193
194 /* Secondly, if the server has any IPv4 and/or IPv6 addresses, install
195 * it in the IPv4 and/or IPv6 reverse-map lists.
196 *
197 * TODO: For speed we want to use something other than a flat list
198 * here; even sorting the list in terms of lowest address would help a
199 * bit, but anything we might want to do gets messy and memory
200 * intensive.
201 */
202 if (alist->nr_ipv4 > 0)
203 hlist_add_head_rcu(&server->addr4_link, &net->fs_addresses4);
204 if (alist->nr_addrs > alist->nr_ipv4)
205 hlist_add_head_rcu(&server->addr6_link, &net->fs_addresses6);
206
207 write_sequnlock(&net->fs_addr_lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000208
209exists:
David Brazdil0f672f62019-12-10 10:32:29 +0000210 afs_get_server(server, afs_server_trace_get_install);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000211 write_sequnlock(&net->fs_lock);
212 return server;
213}
214
215/*
Olivier Deprez157378f2022-04-04 15:47:50 +0200216 * Allocate a new server record and mark it active.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000217 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200218static struct afs_server *afs_alloc_server(struct afs_cell *cell,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000219 const uuid_t *uuid,
220 struct afs_addr_list *alist)
221{
222 struct afs_server *server;
Olivier Deprez157378f2022-04-04 15:47:50 +0200223 struct afs_net *net = cell->net;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000224
225 _enter("");
226
227 server = kzalloc(sizeof(struct afs_server), GFP_KERNEL);
228 if (!server)
229 goto enomem;
230
Olivier Deprez157378f2022-04-04 15:47:50 +0200231 atomic_set(&server->ref, 1);
232 atomic_set(&server->active, 1);
David Brazdil0f672f62019-12-10 10:32:29 +0000233 server->debug_id = atomic_inc_return(&afs_server_debug_id);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000234 RCU_INIT_POINTER(server->addresses, alist);
235 server->addr_version = alist->version;
236 server->uuid = *uuid;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000237 rwlock_init(&server->fs_lock);
David Brazdil0f672f62019-12-10 10:32:29 +0000238 init_waitqueue_head(&server->probe_wq);
Olivier Deprez157378f2022-04-04 15:47:50 +0200239 INIT_LIST_HEAD(&server->probe_link);
David Brazdil0f672f62019-12-10 10:32:29 +0000240 spin_lock_init(&server->probe_lock);
Olivier Deprez157378f2022-04-04 15:47:50 +0200241 server->cell = cell;
242 server->rtt = UINT_MAX;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000243
244 afs_inc_servers_outstanding(net);
Olivier Deprez157378f2022-04-04 15:47:50 +0200245 trace_afs_server(server, 1, 1, afs_server_trace_alloc);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000246 _leave(" = %p", server);
247 return server;
248
249enomem:
250 _leave(" = NULL [nomem]");
251 return NULL;
252}
253
254/*
255 * Look up an address record for a server
256 */
257static struct afs_addr_list *afs_vl_lookup_addrs(struct afs_cell *cell,
258 struct key *key, const uuid_t *uuid)
259{
David Brazdil0f672f62019-12-10 10:32:29 +0000260 struct afs_vl_cursor vc;
261 struct afs_addr_list *alist = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000262 int ret;
263
David Brazdil0f672f62019-12-10 10:32:29 +0000264 ret = -ERESTARTSYS;
265 if (afs_begin_vlserver_operation(&vc, cell, key)) {
266 while (afs_select_vlserver(&vc)) {
267 if (test_bit(AFS_VLSERVER_FL_IS_YFS, &vc.server->flags))
268 alist = afs_yfsvl_get_endpoints(&vc, uuid);
269 else
270 alist = afs_vl_get_addrs_u(&vc, uuid);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000271 }
David Brazdil0f672f62019-12-10 10:32:29 +0000272
273 ret = afs_end_vlserver_operation(&vc);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000274 }
275
David Brazdil0f672f62019-12-10 10:32:29 +0000276 return ret < 0 ? ERR_PTR(ret) : alist;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000277}
278
279/*
280 * Get or create a fileserver record.
281 */
282struct afs_server *afs_lookup_server(struct afs_cell *cell, struct key *key,
Olivier Deprez157378f2022-04-04 15:47:50 +0200283 const uuid_t *uuid, u32 addr_version)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000284{
285 struct afs_addr_list *alist;
286 struct afs_server *server, *candidate;
287
288 _enter("%p,%pU", cell->net, uuid);
289
290 server = afs_find_server_by_uuid(cell->net, uuid);
Olivier Deprez157378f2022-04-04 15:47:50 +0200291 if (server) {
292 if (server->addr_version != addr_version)
293 set_bit(AFS_SERVER_FL_NEEDS_UPDATE, &server->flags);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000294 return server;
Olivier Deprez157378f2022-04-04 15:47:50 +0200295 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000296
297 alist = afs_vl_lookup_addrs(cell, key, uuid);
298 if (IS_ERR(alist))
299 return ERR_CAST(alist);
300
Olivier Deprez157378f2022-04-04 15:47:50 +0200301 candidate = afs_alloc_server(cell, uuid, alist);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000302 if (!candidate) {
303 afs_put_addrlist(alist);
304 return ERR_PTR(-ENOMEM);
305 }
306
Olivier Deprez157378f2022-04-04 15:47:50 +0200307 server = afs_install_server(cell, candidate);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000308 if (server != candidate) {
309 afs_put_addrlist(alist);
310 kfree(candidate);
Olivier Deprez157378f2022-04-04 15:47:50 +0200311 } else {
312 /* Immediately dispatch an asynchronous probe to each interface
313 * on the fileserver. This will make sure the repeat-probing
314 * service is started.
315 */
316 afs_fs_probe_fileserver(cell->net, server, key, true);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000317 }
318
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000319 return server;
320}
321
322/*
323 * Set the server timer to fire after a given delay, assuming it's not already
324 * set for an earlier time.
325 */
326static void afs_set_server_timer(struct afs_net *net, time64_t delay)
327{
328 if (net->live) {
329 afs_inc_servers_outstanding(net);
330 if (timer_reduce(&net->fs_timer, jiffies + delay * HZ))
331 afs_dec_servers_outstanding(net);
332 }
333}
334
335/*
336 * Server management timer. We have an increment on fs_outstanding that we
337 * need to pass along to the work item.
338 */
339void afs_servers_timer(struct timer_list *timer)
340{
341 struct afs_net *net = container_of(timer, struct afs_net, fs_timer);
342
343 _enter("");
344 if (!queue_work(afs_wq, &net->fs_manager))
345 afs_dec_servers_outstanding(net);
346}
347
348/*
David Brazdil0f672f62019-12-10 10:32:29 +0000349 * Get a reference on a server object.
350 */
351struct afs_server *afs_get_server(struct afs_server *server,
352 enum afs_server_trace reason)
353{
Olivier Deprez157378f2022-04-04 15:47:50 +0200354 unsigned int u = atomic_inc_return(&server->ref);
David Brazdil0f672f62019-12-10 10:32:29 +0000355
Olivier Deprez157378f2022-04-04 15:47:50 +0200356 trace_afs_server(server, u, atomic_read(&server->active), reason);
357 return server;
358}
359
360/*
361 * Try to get a reference on a server object.
362 */
363static struct afs_server *afs_maybe_use_server(struct afs_server *server,
364 enum afs_server_trace reason)
365{
366 unsigned int r = atomic_fetch_add_unless(&server->ref, 1, 0);
367 unsigned int a;
368
369 if (r == 0)
370 return NULL;
371
372 a = atomic_inc_return(&server->active);
373 trace_afs_server(server, r, a, reason);
374 return server;
375}
376
377/*
378 * Get an active count on a server object.
379 */
380struct afs_server *afs_use_server(struct afs_server *server, enum afs_server_trace reason)
381{
382 unsigned int r = atomic_inc_return(&server->ref);
383 unsigned int a = atomic_inc_return(&server->active);
384
385 trace_afs_server(server, r, a, reason);
David Brazdil0f672f62019-12-10 10:32:29 +0000386 return server;
387}
388
389/*
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000390 * Release a reference on a server record.
391 */
David Brazdil0f672f62019-12-10 10:32:29 +0000392void afs_put_server(struct afs_net *net, struct afs_server *server,
393 enum afs_server_trace reason)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000394{
395 unsigned int usage;
396
397 if (!server)
398 return;
399
Olivier Deprez157378f2022-04-04 15:47:50 +0200400 usage = atomic_dec_return(&server->ref);
401 trace_afs_server(server, usage, atomic_read(&server->active), reason);
402 if (unlikely(usage == 0))
403 __afs_put_server(net, server);
404}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000405
Olivier Deprez157378f2022-04-04 15:47:50 +0200406/*
407 * Drop an active count on a server object without updating the last-unused
408 * time.
409 */
410void afs_unuse_server_notime(struct afs_net *net, struct afs_server *server,
411 enum afs_server_trace reason)
412{
413 if (server) {
414 unsigned int active = atomic_dec_return(&server->active);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000415
Olivier Deprez157378f2022-04-04 15:47:50 +0200416 if (active == 0)
417 afs_set_server_timer(net, afs_server_gc_delay);
418 afs_put_server(net, server, reason);
419 }
420}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000421
Olivier Deprez157378f2022-04-04 15:47:50 +0200422/*
423 * Drop an active count on a server object.
424 */
425void afs_unuse_server(struct afs_net *net, struct afs_server *server,
426 enum afs_server_trace reason)
427{
428 if (server) {
429 server->unuse_time = ktime_get_real_seconds();
430 afs_unuse_server_notime(net, server, reason);
431 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000432}
433
434static void afs_server_rcu(struct rcu_head *rcu)
435{
436 struct afs_server *server = container_of(rcu, struct afs_server, rcu);
437
Olivier Deprez157378f2022-04-04 15:47:50 +0200438 trace_afs_server(server, atomic_read(&server->ref),
439 atomic_read(&server->active), afs_server_trace_free);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000440 afs_put_addrlist(rcu_access_pointer(server->addresses));
441 kfree(server);
442}
443
Olivier Deprez157378f2022-04-04 15:47:50 +0200444static void __afs_put_server(struct afs_net *net, struct afs_server *server)
445{
446 call_rcu(&server->rcu, afs_server_rcu);
447 afs_dec_servers_outstanding(net);
448}
449
450static void afs_give_up_callbacks(struct afs_net *net, struct afs_server *server)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000451{
452 struct afs_addr_list *alist = rcu_access_pointer(server->addresses);
453 struct afs_addr_cursor ac = {
454 .alist = alist,
David Brazdil0f672f62019-12-10 10:32:29 +0000455 .index = alist->preferred,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000456 .error = 0,
457 };
David Brazdil0f672f62019-12-10 10:32:29 +0000458
Olivier Deprez157378f2022-04-04 15:47:50 +0200459 afs_fs_give_up_all_callbacks(net, server, &ac, NULL);
460}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000461
Olivier Deprez157378f2022-04-04 15:47:50 +0200462/*
463 * destroy a dead server
464 */
465static void afs_destroy_server(struct afs_net *net, struct afs_server *server)
466{
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000467 if (test_bit(AFS_SERVER_FL_MAY_HAVE_CB, &server->flags))
Olivier Deprez157378f2022-04-04 15:47:50 +0200468 afs_give_up_callbacks(net, server);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000469
Olivier Deprez157378f2022-04-04 15:47:50 +0200470 afs_put_server(net, server, afs_server_trace_destroy);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000471}
472
473/*
474 * Garbage collect any expired servers.
475 */
476static void afs_gc_servers(struct afs_net *net, struct afs_server *gc_list)
477{
Olivier Deprez157378f2022-04-04 15:47:50 +0200478 struct afs_server *server, *next, *prev;
479 int active;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000480
481 while ((server = gc_list)) {
482 gc_list = server->gc_next;
483
484 write_seqlock(&net->fs_lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000485
Olivier Deprez157378f2022-04-04 15:47:50 +0200486 active = atomic_read(&server->active);
487 if (active == 0) {
488 trace_afs_server(server, atomic_read(&server->ref),
489 active, afs_server_trace_gc);
490 next = rcu_dereference_protected(
491 server->uuid_next, lockdep_is_held(&net->fs_lock.lock));
492 prev = server->uuid_prev;
493 if (!prev) {
494 /* The one at the front is in the tree */
495 if (!next) {
496 rb_erase(&server->uuid_rb, &net->fs_servers);
497 } else {
498 rb_replace_node_rcu(&server->uuid_rb,
499 &next->uuid_rb,
500 &net->fs_servers);
501 next->uuid_prev = NULL;
502 }
503 } else {
504 /* This server is not at the front */
505 rcu_assign_pointer(prev->uuid_next, next);
506 if (next)
507 next->uuid_prev = prev;
508 }
509
510 list_del(&server->probe_link);
511 hlist_del_rcu(&server->proc_link);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000512 if (!hlist_unhashed(&server->addr4_link))
513 hlist_del_rcu(&server->addr4_link);
514 if (!hlist_unhashed(&server->addr6_link))
515 hlist_del_rcu(&server->addr6_link);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000516 }
Olivier Deprez157378f2022-04-04 15:47:50 +0200517 write_sequnlock(&net->fs_lock);
518
519 if (active == 0)
520 afs_destroy_server(net, server);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000521 }
522}
523
524/*
525 * Manage the records of servers known to be within a network namespace. This
526 * includes garbage collecting unused servers.
527 *
528 * Note also that we were given an increment on net->servers_outstanding by
529 * whoever queued us that we need to deal with before returning.
530 */
531void afs_manage_servers(struct work_struct *work)
532{
533 struct afs_net *net = container_of(work, struct afs_net, fs_manager);
534 struct afs_server *gc_list = NULL;
535 struct rb_node *cursor;
536 time64_t now = ktime_get_real_seconds(), next_manage = TIME64_MAX;
537 bool purging = !net->live;
538
539 _enter("");
540
541 /* Trawl the server list looking for servers that have expired from
542 * lack of use.
543 */
544 read_seqlock_excl(&net->fs_lock);
545
546 for (cursor = rb_first(&net->fs_servers); cursor; cursor = rb_next(cursor)) {
547 struct afs_server *server =
548 rb_entry(cursor, struct afs_server, uuid_rb);
Olivier Deprez157378f2022-04-04 15:47:50 +0200549 int active = atomic_read(&server->active);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000550
Olivier Deprez157378f2022-04-04 15:47:50 +0200551 _debug("manage %pU %u", &server->uuid, active);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000552
Olivier Deprez157378f2022-04-04 15:47:50 +0200553 if (purging) {
554 trace_afs_server(server, atomic_read(&server->ref),
555 active, afs_server_trace_purging);
556 if (active != 0)
557 pr_notice("Can't purge s=%08x\n", server->debug_id);
558 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000559
Olivier Deprez157378f2022-04-04 15:47:50 +0200560 if (active == 0) {
561 time64_t expire_at = server->unuse_time;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000562
563 if (!test_bit(AFS_SERVER_FL_VL_FAIL, &server->flags) &&
564 !test_bit(AFS_SERVER_FL_NOT_FOUND, &server->flags))
565 expire_at += afs_server_gc_delay;
566 if (purging || expire_at <= now) {
567 server->gc_next = gc_list;
568 gc_list = server;
569 } else if (expire_at < next_manage) {
570 next_manage = expire_at;
571 }
572 }
573 }
574
575 read_sequnlock_excl(&net->fs_lock);
576
577 /* Update the timer on the way out. We have to pass an increment on
578 * servers_outstanding in the namespace that we are in to the timer or
579 * the work scheduler.
580 */
581 if (!purging && next_manage < TIME64_MAX) {
582 now = ktime_get_real_seconds();
583
584 if (next_manage - now <= 0) {
585 if (queue_work(afs_wq, &net->fs_manager))
586 afs_inc_servers_outstanding(net);
587 } else {
588 afs_set_server_timer(net, next_manage - now);
589 }
590 }
591
592 afs_gc_servers(net, gc_list);
593
594 afs_dec_servers_outstanding(net);
595 _leave(" [%d]", atomic_read(&net->servers_outstanding));
596}
597
598static void afs_queue_server_manager(struct afs_net *net)
599{
600 afs_inc_servers_outstanding(net);
601 if (!queue_work(afs_wq, &net->fs_manager))
602 afs_dec_servers_outstanding(net);
603}
604
605/*
606 * Purge list of servers.
607 */
608void afs_purge_servers(struct afs_net *net)
609{
610 _enter("");
611
612 if (del_timer_sync(&net->fs_timer))
Olivier Deprez157378f2022-04-04 15:47:50 +0200613 afs_dec_servers_outstanding(net);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000614
615 afs_queue_server_manager(net);
616
617 _debug("wait");
Olivier Deprez157378f2022-04-04 15:47:50 +0200618 atomic_dec(&net->servers_outstanding);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000619 wait_var_event(&net->servers_outstanding,
620 !atomic_read(&net->servers_outstanding));
621 _leave("");
622}
623
624/*
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000625 * Get an update for a server's address list.
626 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200627static noinline bool afs_update_server_record(struct afs_operation *op,
628 struct afs_server *server)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000629{
630 struct afs_addr_list *alist, *discard;
631
632 _enter("");
633
Olivier Deprez157378f2022-04-04 15:47:50 +0200634 trace_afs_server(server, atomic_read(&server->ref), atomic_read(&server->active),
635 afs_server_trace_update);
David Brazdil0f672f62019-12-10 10:32:29 +0000636
Olivier Deprez157378f2022-04-04 15:47:50 +0200637 alist = afs_vl_lookup_addrs(op->volume->cell, op->key, &server->uuid);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000638 if (IS_ERR(alist)) {
David Brazdil0f672f62019-12-10 10:32:29 +0000639 if ((PTR_ERR(alist) == -ERESTARTSYS ||
640 PTR_ERR(alist) == -EINTR) &&
Olivier Deprez157378f2022-04-04 15:47:50 +0200641 (op->flags & AFS_OPERATION_UNINTR) &&
David Brazdil0f672f62019-12-10 10:32:29 +0000642 server->addresses) {
643 _leave(" = t [intr]");
644 return true;
645 }
Olivier Deprez157378f2022-04-04 15:47:50 +0200646 op->error = PTR_ERR(alist);
647 _leave(" = f [%d]", op->error);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000648 return false;
649 }
650
651 discard = alist;
652 if (server->addr_version != alist->version) {
653 write_lock(&server->fs_lock);
654 discard = rcu_dereference_protected(server->addresses,
655 lockdep_is_held(&server->fs_lock));
656 rcu_assign_pointer(server->addresses, alist);
657 server->addr_version = alist->version;
658 write_unlock(&server->fs_lock);
659 }
660
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000661 afs_put_addrlist(discard);
662 _leave(" = t");
663 return true;
664}
665
666/*
667 * See if a server's address list needs updating.
668 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200669bool afs_check_server_record(struct afs_operation *op, struct afs_server *server)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000670{
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000671 bool success;
672 int ret, retries = 0;
673
674 _enter("");
675
676 ASSERT(server);
677
678retry:
Olivier Deprez157378f2022-04-04 15:47:50 +0200679 if (test_bit(AFS_SERVER_FL_UPDATING, &server->flags))
680 goto wait;
681 if (test_bit(AFS_SERVER_FL_NEEDS_UPDATE, &server->flags))
682 goto update;
683 _leave(" = t [good]");
684 return true;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000685
Olivier Deprez157378f2022-04-04 15:47:50 +0200686update:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000687 if (!test_and_set_bit_lock(AFS_SERVER_FL_UPDATING, &server->flags)) {
Olivier Deprez157378f2022-04-04 15:47:50 +0200688 clear_bit(AFS_SERVER_FL_NEEDS_UPDATE, &server->flags);
689 success = afs_update_server_record(op, server);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000690 clear_bit_unlock(AFS_SERVER_FL_UPDATING, &server->flags);
691 wake_up_bit(&server->flags, AFS_SERVER_FL_UPDATING);
692 _leave(" = %d", success);
693 return success;
694 }
695
Olivier Deprez157378f2022-04-04 15:47:50 +0200696wait:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000697 ret = wait_on_bit(&server->flags, AFS_SERVER_FL_UPDATING,
Olivier Deprez157378f2022-04-04 15:47:50 +0200698 (op->flags & AFS_OPERATION_UNINTR) ?
699 TASK_UNINTERRUPTIBLE : TASK_INTERRUPTIBLE);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000700 if (ret == -ERESTARTSYS) {
Olivier Deprez157378f2022-04-04 15:47:50 +0200701 op->error = ret;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000702 _leave(" = f [intr]");
703 return false;
704 }
705
706 retries++;
707 if (retries == 4) {
708 _leave(" = f [stale]");
709 ret = -ESTALE;
710 return false;
711 }
712 goto retry;
713}