xref: /openbmc/linux/net/rxrpc/conn_event.c (revision 68d6d1ae)
18c3e34a4SDavid Howells /* connection-level event handling
28c3e34a4SDavid Howells  *
38c3e34a4SDavid Howells  * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
48c3e34a4SDavid Howells  * Written by David Howells (dhowells@redhat.com)
58c3e34a4SDavid Howells  *
68c3e34a4SDavid Howells  * This program is free software; you can redistribute it and/or
78c3e34a4SDavid Howells  * modify it under the terms of the GNU General Public License
88c3e34a4SDavid Howells  * as published by the Free Software Foundation; either version
98c3e34a4SDavid Howells  * 2 of the License, or (at your option) any later version.
108c3e34a4SDavid Howells  */
118c3e34a4SDavid Howells 
128c3e34a4SDavid Howells #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
138c3e34a4SDavid Howells 
148c3e34a4SDavid Howells #include <linux/module.h>
158c3e34a4SDavid Howells #include <linux/net.h>
168c3e34a4SDavid Howells #include <linux/skbuff.h>
178c3e34a4SDavid Howells #include <linux/errqueue.h>
188c3e34a4SDavid Howells #include <net/sock.h>
198c3e34a4SDavid Howells #include <net/af_rxrpc.h>
208c3e34a4SDavid Howells #include <net/ip.h>
218c3e34a4SDavid Howells #include "ar-internal.h"
228c3e34a4SDavid Howells 
238c3e34a4SDavid Howells /*
2418bfeba5SDavid Howells  * Retransmit terminal ACK or ABORT of the previous call.
2518bfeba5SDavid Howells  */
26f5c17aaeSDavid Howells static void rxrpc_conn_retransmit_call(struct rxrpc_connection *conn,
2718bfeba5SDavid Howells 				       struct sk_buff *skb)
2818bfeba5SDavid Howells {
2918bfeba5SDavid Howells 	struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
3018bfeba5SDavid Howells 	struct rxrpc_channel *chan;
3118bfeba5SDavid Howells 	struct msghdr msg;
3218bfeba5SDavid Howells 	struct kvec iov;
3318bfeba5SDavid Howells 	struct {
3418bfeba5SDavid Howells 		struct rxrpc_wire_header whdr;
3518bfeba5SDavid Howells 		union {
3618bfeba5SDavid Howells 			struct {
3718bfeba5SDavid Howells 				__be32 code;
3818bfeba5SDavid Howells 			} abort;
3918bfeba5SDavid Howells 			struct {
4018bfeba5SDavid Howells 				struct rxrpc_ackpacket ack;
412266ffdeSDavid Howells 				u8 padding[3];
4218bfeba5SDavid Howells 				struct rxrpc_ackinfo info;
4318bfeba5SDavid Howells 			};
4418bfeba5SDavid Howells 		};
4518bfeba5SDavid Howells 	} __attribute__((packed)) pkt;
4618bfeba5SDavid Howells 	size_t len;
4718bfeba5SDavid Howells 	u32 serial, mtu, call_id;
4818bfeba5SDavid Howells 
4918bfeba5SDavid Howells 	_enter("%d", conn->debug_id);
5018bfeba5SDavid Howells 
5118bfeba5SDavid Howells 	chan = &conn->channels[sp->hdr.cid & RXRPC_CHANNELMASK];
5218bfeba5SDavid Howells 
5318bfeba5SDavid Howells 	/* If the last call got moved on whilst we were waiting to run, just
5418bfeba5SDavid Howells 	 * ignore this packet.
5518bfeba5SDavid Howells 	 */
5618bfeba5SDavid Howells 	call_id = READ_ONCE(chan->last_call);
5718bfeba5SDavid Howells 	/* Sync with __rxrpc_disconnect_call() */
5818bfeba5SDavid Howells 	smp_rmb();
5918bfeba5SDavid Howells 	if (call_id != sp->hdr.callNumber)
6018bfeba5SDavid Howells 		return;
6118bfeba5SDavid Howells 
6218bfeba5SDavid Howells 	msg.msg_name	= &conn->params.peer->srx.transport;
6318bfeba5SDavid Howells 	msg.msg_namelen	= conn->params.peer->srx.transport_len;
6418bfeba5SDavid Howells 	msg.msg_control	= NULL;
6518bfeba5SDavid Howells 	msg.msg_controllen = 0;
6618bfeba5SDavid Howells 	msg.msg_flags	= 0;
6718bfeba5SDavid Howells 
6818bfeba5SDavid Howells 	pkt.whdr.epoch		= htonl(sp->hdr.epoch);
6918bfeba5SDavid Howells 	pkt.whdr.cid		= htonl(sp->hdr.cid);
7018bfeba5SDavid Howells 	pkt.whdr.callNumber	= htonl(sp->hdr.callNumber);
7118bfeba5SDavid Howells 	pkt.whdr.seq		= 0;
7218bfeba5SDavid Howells 	pkt.whdr.type		= chan->last_type;
7318bfeba5SDavid Howells 	pkt.whdr.flags		= conn->out_clientflag;
7418bfeba5SDavid Howells 	pkt.whdr.userStatus	= 0;
7518bfeba5SDavid Howells 	pkt.whdr.securityIndex	= conn->security_ix;
7618bfeba5SDavid Howells 	pkt.whdr._rsvd		= 0;
7768d6d1aeSDavid Howells 	pkt.whdr.serviceId	= htons(conn->service_id);
7818bfeba5SDavid Howells 
7918bfeba5SDavid Howells 	len = sizeof(pkt.whdr);
8018bfeba5SDavid Howells 	switch (chan->last_type) {
8118bfeba5SDavid Howells 	case RXRPC_PACKET_TYPE_ABORT:
8218bfeba5SDavid Howells 		pkt.abort.code	= htonl(chan->last_abort);
8318bfeba5SDavid Howells 		len += sizeof(pkt.abort);
8418bfeba5SDavid Howells 		break;
8518bfeba5SDavid Howells 
8618bfeba5SDavid Howells 	case RXRPC_PACKET_TYPE_ACK:
8718bfeba5SDavid Howells 		mtu = conn->params.peer->if_mtu;
8818bfeba5SDavid Howells 		mtu -= conn->params.peer->hdrsize;
8918bfeba5SDavid Howells 		pkt.ack.bufferSpace	= 0;
9018bfeba5SDavid Howells 		pkt.ack.maxSkew		= htons(skb->priority);
9118bfeba5SDavid Howells 		pkt.ack.firstPacket	= htonl(chan->last_seq);
9218bfeba5SDavid Howells 		pkt.ack.previousPacket	= htonl(chan->last_seq - 1);
9318bfeba5SDavid Howells 		pkt.ack.serial		= htonl(sp->hdr.serial);
9418bfeba5SDavid Howells 		pkt.ack.reason		= RXRPC_ACK_DUPLICATE;
9518bfeba5SDavid Howells 		pkt.ack.nAcks		= 0;
9618bfeba5SDavid Howells 		pkt.info.rxMTU		= htonl(rxrpc_rx_mtu);
9718bfeba5SDavid Howells 		pkt.info.maxMTU		= htonl(mtu);
9818bfeba5SDavid Howells 		pkt.info.rwind		= htonl(rxrpc_rx_window_size);
9918bfeba5SDavid Howells 		pkt.info.jumbo_max	= htonl(rxrpc_rx_jumbo_max);
10057494343SDavid Howells 		pkt.whdr.flags		|= RXRPC_SLOW_START_OK;
10118bfeba5SDavid Howells 		len += sizeof(pkt.ack) + sizeof(pkt.info);
10218bfeba5SDavid Howells 		break;
10318bfeba5SDavid Howells 	}
10418bfeba5SDavid Howells 
10518bfeba5SDavid Howells 	/* Resync with __rxrpc_disconnect_call() and check that the last call
10618bfeba5SDavid Howells 	 * didn't get advanced whilst we were filling out the packets.
10718bfeba5SDavid Howells 	 */
10818bfeba5SDavid Howells 	smp_rmb();
10918bfeba5SDavid Howells 	if (READ_ONCE(chan->last_call) != call_id)
11018bfeba5SDavid Howells 		return;
11118bfeba5SDavid Howells 
11218bfeba5SDavid Howells 	iov.iov_base	= &pkt;
11318bfeba5SDavid Howells 	iov.iov_len	= len;
11418bfeba5SDavid Howells 
11518bfeba5SDavid Howells 	serial = atomic_inc_return(&conn->serial);
11618bfeba5SDavid Howells 	pkt.whdr.serial = htonl(serial);
11718bfeba5SDavid Howells 
11818bfeba5SDavid Howells 	switch (chan->last_type) {
11918bfeba5SDavid Howells 	case RXRPC_PACKET_TYPE_ABORT:
12018bfeba5SDavid Howells 		_proto("Tx ABORT %%%u { %d } [re]", serial, conn->local_abort);
12118bfeba5SDavid Howells 		break;
12218bfeba5SDavid Howells 	case RXRPC_PACKET_TYPE_ACK:
123be832aecSDavid Howells 		trace_rxrpc_tx_ack(NULL, serial, chan->last_seq, 0,
124be832aecSDavid Howells 				   RXRPC_ACK_DUPLICATE, 0);
12518bfeba5SDavid Howells 		_proto("Tx ACK %%%u [re]", serial);
12618bfeba5SDavid Howells 		break;
12718bfeba5SDavid Howells 	}
12818bfeba5SDavid Howells 
12918bfeba5SDavid Howells 	kernel_sendmsg(conn->params.local->socket, &msg, &iov, 1, len);
13018bfeba5SDavid Howells 	_leave("");
13118bfeba5SDavid Howells 	return;
13218bfeba5SDavid Howells }
13318bfeba5SDavid Howells 
13418bfeba5SDavid Howells /*
1358c3e34a4SDavid Howells  * pass a connection-level abort onto all calls on that connection
1368c3e34a4SDavid Howells  */
137f5c17aaeSDavid Howells static void rxrpc_abort_calls(struct rxrpc_connection *conn,
138f5c17aaeSDavid Howells 			      enum rxrpc_call_completion compl,
139f5c17aaeSDavid Howells 			      u32 abort_code, int error)
1408c3e34a4SDavid Howells {
1418c3e34a4SDavid Howells 	struct rxrpc_call *call;
142248f219cSDavid Howells 	int i;
1438c3e34a4SDavid Howells 
1448c3e34a4SDavid Howells 	_enter("{%d},%x", conn->debug_id, abort_code);
1458c3e34a4SDavid Howells 
146a1399f8bSDavid Howells 	spin_lock(&conn->channel_lock);
1478c3e34a4SDavid Howells 
148a1399f8bSDavid Howells 	for (i = 0; i < RXRPC_MAXCALLS; i++) {
149a1399f8bSDavid Howells 		call = rcu_dereference_protected(
150a1399f8bSDavid Howells 			conn->channels[i].call,
151a1399f8bSDavid Howells 			lockdep_is_held(&conn->channel_lock));
152ccbd3dbeSDavid Howells 		if (call) {
1535a42976dSDavid Howells 			if (compl == RXRPC_CALL_LOCALLY_ABORTED)
1545a42976dSDavid Howells 				trace_rxrpc_abort("CON", call->cid,
1555a42976dSDavid Howells 						  call->call_id, 0,
1565a42976dSDavid Howells 						  abort_code, error);
157248f219cSDavid Howells 			if (rxrpc_set_call_completion(call, compl,
158248f219cSDavid Howells 						      abort_code, error))
159248f219cSDavid Howells 				rxrpc_notify_socket(call);
1608c3e34a4SDavid Howells 		}
161ccbd3dbeSDavid Howells 	}
1628c3e34a4SDavid Howells 
163a1399f8bSDavid Howells 	spin_unlock(&conn->channel_lock);
1648c3e34a4SDavid Howells 	_leave("");
1658c3e34a4SDavid Howells }
1668c3e34a4SDavid Howells 
1678c3e34a4SDavid Howells /*
1688c3e34a4SDavid Howells  * generate a connection-level abort
1698c3e34a4SDavid Howells  */
1708c3e34a4SDavid Howells static int rxrpc_abort_connection(struct rxrpc_connection *conn,
1713a92789aSDavid Howells 				  int error, u32 abort_code)
1728c3e34a4SDavid Howells {
1738c3e34a4SDavid Howells 	struct rxrpc_wire_header whdr;
1748c3e34a4SDavid Howells 	struct msghdr msg;
1758c3e34a4SDavid Howells 	struct kvec iov[2];
1768c3e34a4SDavid Howells 	__be32 word;
1778c3e34a4SDavid Howells 	size_t len;
1788c3e34a4SDavid Howells 	u32 serial;
1798c3e34a4SDavid Howells 	int ret;
1808c3e34a4SDavid Howells 
1818c3e34a4SDavid Howells 	_enter("%d,,%u,%u", conn->debug_id, error, abort_code);
1828c3e34a4SDavid Howells 
1838c3e34a4SDavid Howells 	/* generate a connection-level abort */
1848c3e34a4SDavid Howells 	spin_lock_bh(&conn->state_lock);
185f5c17aaeSDavid Howells 	if (conn->state >= RXRPC_CONN_REMOTELY_ABORTED) {
1868c3e34a4SDavid Howells 		spin_unlock_bh(&conn->state_lock);
1878c3e34a4SDavid Howells 		_leave(" = 0 [already dead]");
1888c3e34a4SDavid Howells 		return 0;
1898c3e34a4SDavid Howells 	}
1908c3e34a4SDavid Howells 
191f5c17aaeSDavid Howells 	conn->state = RXRPC_CONN_LOCALLY_ABORTED;
192f5c17aaeSDavid Howells 	spin_unlock_bh(&conn->state_lock);
193f5c17aaeSDavid Howells 
194f5c17aaeSDavid Howells 	rxrpc_abort_calls(conn, RXRPC_CALL_LOCALLY_ABORTED, abort_code, error);
1958c3e34a4SDavid Howells 
19685f32278SDavid Howells 	msg.msg_name	= &conn->params.peer->srx.transport;
19785f32278SDavid Howells 	msg.msg_namelen	= conn->params.peer->srx.transport_len;
1988c3e34a4SDavid Howells 	msg.msg_control	= NULL;
1998c3e34a4SDavid Howells 	msg.msg_controllen = 0;
2008c3e34a4SDavid Howells 	msg.msg_flags	= 0;
2018c3e34a4SDavid Howells 
20219ffa01cSDavid Howells 	whdr.epoch	= htonl(conn->proto.epoch);
20319ffa01cSDavid Howells 	whdr.cid	= htonl(conn->proto.cid);
2048c3e34a4SDavid Howells 	whdr.callNumber	= 0;
2058c3e34a4SDavid Howells 	whdr.seq	= 0;
2068c3e34a4SDavid Howells 	whdr.type	= RXRPC_PACKET_TYPE_ABORT;
2078c3e34a4SDavid Howells 	whdr.flags	= conn->out_clientflag;
2088c3e34a4SDavid Howells 	whdr.userStatus	= 0;
2098c3e34a4SDavid Howells 	whdr.securityIndex = conn->security_ix;
2108c3e34a4SDavid Howells 	whdr._rsvd	= 0;
21168d6d1aeSDavid Howells 	whdr.serviceId	= htons(conn->service_id);
2128c3e34a4SDavid Howells 
2138c3e34a4SDavid Howells 	word		= htonl(conn->local_abort);
2148c3e34a4SDavid Howells 
2158c3e34a4SDavid Howells 	iov[0].iov_base	= &whdr;
2168c3e34a4SDavid Howells 	iov[0].iov_len	= sizeof(whdr);
2178c3e34a4SDavid Howells 	iov[1].iov_base	= &word;
2188c3e34a4SDavid Howells 	iov[1].iov_len	= sizeof(word);
2198c3e34a4SDavid Howells 
2208c3e34a4SDavid Howells 	len = iov[0].iov_len + iov[1].iov_len;
2218c3e34a4SDavid Howells 
2228c3e34a4SDavid Howells 	serial = atomic_inc_return(&conn->serial);
2238c3e34a4SDavid Howells 	whdr.serial = htonl(serial);
2248c3e34a4SDavid Howells 	_proto("Tx CONN ABORT %%%u { %d }", serial, conn->local_abort);
2258c3e34a4SDavid Howells 
22685f32278SDavid Howells 	ret = kernel_sendmsg(conn->params.local->socket, &msg, iov, 2, len);
2278c3e34a4SDavid Howells 	if (ret < 0) {
2288c3e34a4SDavid Howells 		_debug("sendmsg failed: %d", ret);
2298c3e34a4SDavid Howells 		return -EAGAIN;
2308c3e34a4SDavid Howells 	}
2318c3e34a4SDavid Howells 
2328c3e34a4SDavid Howells 	_leave(" = 0");
2338c3e34a4SDavid Howells 	return 0;
2348c3e34a4SDavid Howells }
2358c3e34a4SDavid Howells 
2368c3e34a4SDavid Howells /*
2378c3e34a4SDavid Howells  * mark a call as being on a now-secured channel
238248f219cSDavid Howells  * - must be called with BH's disabled.
2398c3e34a4SDavid Howells  */
2408c3e34a4SDavid Howells static void rxrpc_call_is_secure(struct rxrpc_call *call)
2418c3e34a4SDavid Howells {
2428c3e34a4SDavid Howells 	_enter("%p", call);
2438c3e34a4SDavid Howells 	if (call) {
244248f219cSDavid Howells 		write_lock_bh(&call->state_lock);
245248f219cSDavid Howells 		if (call->state == RXRPC_CALL_SERVER_SECURING) {
246248f219cSDavid Howells 			call->state = RXRPC_CALL_SERVER_ACCEPTING;
247248f219cSDavid Howells 			rxrpc_notify_socket(call);
248248f219cSDavid Howells 		}
249248f219cSDavid Howells 		write_unlock_bh(&call->state_lock);
2508c3e34a4SDavid Howells 	}
2518c3e34a4SDavid Howells }
2528c3e34a4SDavid Howells 
2538c3e34a4SDavid Howells /*
2548c3e34a4SDavid Howells  * connection-level Rx packet processor
2558c3e34a4SDavid Howells  */
2568c3e34a4SDavid Howells static int rxrpc_process_event(struct rxrpc_connection *conn,
2578c3e34a4SDavid Howells 			       struct sk_buff *skb,
2588c3e34a4SDavid Howells 			       u32 *_abort_code)
2598c3e34a4SDavid Howells {
2608c3e34a4SDavid Howells 	struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
2618c3e34a4SDavid Howells 	__be32 wtmp;
2628c3e34a4SDavid Howells 	u32 abort_code;
2638c3e34a4SDavid Howells 	int loop, ret;
2648c3e34a4SDavid Howells 
2658c3e34a4SDavid Howells 	if (conn->state >= RXRPC_CONN_REMOTELY_ABORTED) {
266248f219cSDavid Howells 		_leave(" = -ECONNABORTED [%u]", conn->state);
2678c3e34a4SDavid Howells 		return -ECONNABORTED;
2688c3e34a4SDavid Howells 	}
2698c3e34a4SDavid Howells 
2708c3e34a4SDavid Howells 	_enter("{%d},{%u,%%%u},", conn->debug_id, sp->hdr.type, sp->hdr.serial);
2718c3e34a4SDavid Howells 
2728c3e34a4SDavid Howells 	switch (sp->hdr.type) {
27318bfeba5SDavid Howells 	case RXRPC_PACKET_TYPE_DATA:
27418bfeba5SDavid Howells 	case RXRPC_PACKET_TYPE_ACK:
275f5c17aaeSDavid Howells 		rxrpc_conn_retransmit_call(conn, skb);
27618bfeba5SDavid Howells 		return 0;
27718bfeba5SDavid Howells 
2784d4a6ac7SDavid Howells 	case RXRPC_PACKET_TYPE_BUSY:
2794d4a6ac7SDavid Howells 		/* Just ignore BUSY packets for now. */
2804d4a6ac7SDavid Howells 		return 0;
2814d4a6ac7SDavid Howells 
2828c3e34a4SDavid Howells 	case RXRPC_PACKET_TYPE_ABORT:
283775e5b71SDavid Howells 		if (skb_copy_bits(skb, sizeof(struct rxrpc_wire_header),
284fb46f6eeSDavid Howells 				  &wtmp, sizeof(wtmp)) < 0) {
285fb46f6eeSDavid Howells 			trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
286fb46f6eeSDavid Howells 					      tracepoint_string("bad_abort"));
2878c3e34a4SDavid Howells 			return -EPROTO;
288fb46f6eeSDavid Howells 		}
2898c3e34a4SDavid Howells 		abort_code = ntohl(wtmp);
2908c3e34a4SDavid Howells 		_proto("Rx ABORT %%%u { ac=%d }", sp->hdr.serial, abort_code);
2918c3e34a4SDavid Howells 
2928c3e34a4SDavid Howells 		conn->state = RXRPC_CONN_REMOTELY_ABORTED;
293248f219cSDavid Howells 		rxrpc_abort_calls(conn, RXRPC_CALL_REMOTELY_ABORTED,
2943a92789aSDavid Howells 				  abort_code, -ECONNABORTED);
2958c3e34a4SDavid Howells 		return -ECONNABORTED;
2968c3e34a4SDavid Howells 
2978c3e34a4SDavid Howells 	case RXRPC_PACKET_TYPE_CHALLENGE:
2988c3e34a4SDavid Howells 		return conn->security->respond_to_challenge(conn, skb,
2998c3e34a4SDavid Howells 							    _abort_code);
3008c3e34a4SDavid Howells 
3018c3e34a4SDavid Howells 	case RXRPC_PACKET_TYPE_RESPONSE:
3028c3e34a4SDavid Howells 		ret = conn->security->verify_response(conn, skb, _abort_code);
3038c3e34a4SDavid Howells 		if (ret < 0)
3048c3e34a4SDavid Howells 			return ret;
3058c3e34a4SDavid Howells 
3068c3e34a4SDavid Howells 		ret = conn->security->init_connection_security(conn);
3078c3e34a4SDavid Howells 		if (ret < 0)
3088c3e34a4SDavid Howells 			return ret;
3098c3e34a4SDavid Howells 
310a263629dSHerbert Xu 		ret = conn->security->prime_packet_security(conn);
311a263629dSHerbert Xu 		if (ret < 0)
312a263629dSHerbert Xu 			return ret;
313a263629dSHerbert Xu 
314a1399f8bSDavid Howells 		spin_lock(&conn->channel_lock);
3158c3e34a4SDavid Howells 		spin_lock(&conn->state_lock);
3168c3e34a4SDavid Howells 
317bba304dbSDavid Howells 		if (conn->state == RXRPC_CONN_SERVICE_CHALLENGING) {
318bba304dbSDavid Howells 			conn->state = RXRPC_CONN_SERVICE;
319248f219cSDavid Howells 			spin_unlock(&conn->state_lock);
3208c3e34a4SDavid Howells 			for (loop = 0; loop < RXRPC_MAXCALLS; loop++)
321dee46364SDavid Howells 				rxrpc_call_is_secure(
322dee46364SDavid Howells 					rcu_dereference_protected(
323a1399f8bSDavid Howells 						conn->channels[loop].call,
324a1399f8bSDavid Howells 						lockdep_is_held(&conn->channel_lock)));
325248f219cSDavid Howells 		} else {
326248f219cSDavid Howells 			spin_unlock(&conn->state_lock);
3278c3e34a4SDavid Howells 		}
3288c3e34a4SDavid Howells 
329a1399f8bSDavid Howells 		spin_unlock(&conn->channel_lock);
3308c3e34a4SDavid Howells 		return 0;
3318c3e34a4SDavid Howells 
3328c3e34a4SDavid Howells 	default:
333fb46f6eeSDavid Howells 		trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
334fb46f6eeSDavid Howells 				      tracepoint_string("bad_conn_pkt"));
3358c3e34a4SDavid Howells 		return -EPROTO;
3368c3e34a4SDavid Howells 	}
3378c3e34a4SDavid Howells }
3388c3e34a4SDavid Howells 
3398c3e34a4SDavid Howells /*
3408c3e34a4SDavid Howells  * set up security and issue a challenge
3418c3e34a4SDavid Howells  */
3428c3e34a4SDavid Howells static void rxrpc_secure_connection(struct rxrpc_connection *conn)
3438c3e34a4SDavid Howells {
3448c3e34a4SDavid Howells 	u32 abort_code;
3458c3e34a4SDavid Howells 	int ret;
3468c3e34a4SDavid Howells 
3478c3e34a4SDavid Howells 	_enter("{%d}", conn->debug_id);
3488c3e34a4SDavid Howells 
3498c3e34a4SDavid Howells 	ASSERT(conn->security_ix != 0);
3508c3e34a4SDavid Howells 
35119ffa01cSDavid Howells 	if (!conn->params.key) {
3528c3e34a4SDavid Howells 		_debug("set up security");
3538c3e34a4SDavid Howells 		ret = rxrpc_init_server_conn_security(conn);
3548c3e34a4SDavid Howells 		switch (ret) {
3558c3e34a4SDavid Howells 		case 0:
3568c3e34a4SDavid Howells 			break;
3578c3e34a4SDavid Howells 		case -ENOENT:
3588c3e34a4SDavid Howells 			abort_code = RX_CALL_DEAD;
3598c3e34a4SDavid Howells 			goto abort;
3608c3e34a4SDavid Howells 		default:
3618c3e34a4SDavid Howells 			abort_code = RXKADNOAUTH;
3628c3e34a4SDavid Howells 			goto abort;
3638c3e34a4SDavid Howells 		}
3648c3e34a4SDavid Howells 	}
3658c3e34a4SDavid Howells 
3668c3e34a4SDavid Howells 	if (conn->security->issue_challenge(conn) < 0) {
3678c3e34a4SDavid Howells 		abort_code = RX_CALL_DEAD;
3688c3e34a4SDavid Howells 		ret = -ENOMEM;
3698c3e34a4SDavid Howells 		goto abort;
3708c3e34a4SDavid Howells 	}
3718c3e34a4SDavid Howells 
3728c3e34a4SDavid Howells 	_leave("");
3738c3e34a4SDavid Howells 	return;
3748c3e34a4SDavid Howells 
3758c3e34a4SDavid Howells abort:
3768c3e34a4SDavid Howells 	_debug("abort %d, %d", ret, abort_code);
3773a92789aSDavid Howells 	rxrpc_abort_connection(conn, ret, abort_code);
3788c3e34a4SDavid Howells 	_leave(" [aborted]");
3798c3e34a4SDavid Howells }
3808c3e34a4SDavid Howells 
3818c3e34a4SDavid Howells /*
3828c3e34a4SDavid Howells  * connection-level event processor
3838c3e34a4SDavid Howells  */
3848c3e34a4SDavid Howells void rxrpc_process_connection(struct work_struct *work)
3858c3e34a4SDavid Howells {
3868c3e34a4SDavid Howells 	struct rxrpc_connection *conn =
3878c3e34a4SDavid Howells 		container_of(work, struct rxrpc_connection, processor);
3888c3e34a4SDavid Howells 	struct sk_buff *skb;
3898c3e34a4SDavid Howells 	u32 abort_code = RX_PROTOCOL_ERROR;
3908c3e34a4SDavid Howells 	int ret;
3918c3e34a4SDavid Howells 
392363deeabSDavid Howells 	rxrpc_see_connection(conn);
3938c3e34a4SDavid Howells 
3942c4579e4SDavid Howells 	if (test_and_clear_bit(RXRPC_CONN_EV_CHALLENGE, &conn->events))
3958c3e34a4SDavid Howells 		rxrpc_secure_connection(conn);
3968c3e34a4SDavid Howells 
3978c3e34a4SDavid Howells 	/* go through the conn-level event packets, releasing the ref on this
3988c3e34a4SDavid Howells 	 * connection that each one has when we've finished with it */
3998c3e34a4SDavid Howells 	while ((skb = skb_dequeue(&conn->rx_queue))) {
40071f3ca40SDavid Howells 		rxrpc_see_skb(skb, rxrpc_skb_rx_seen);
4018c3e34a4SDavid Howells 		ret = rxrpc_process_event(conn, skb, &abort_code);
4028c3e34a4SDavid Howells 		switch (ret) {
4038c3e34a4SDavid Howells 		case -EPROTO:
4048c3e34a4SDavid Howells 		case -EKEYEXPIRED:
4058c3e34a4SDavid Howells 		case -EKEYREJECTED:
4068c3e34a4SDavid Howells 			goto protocol_error;
4078c3e34a4SDavid Howells 		case -EAGAIN:
4088c3e34a4SDavid Howells 			goto requeue_and_leave;
4098c3e34a4SDavid Howells 		case -ECONNABORTED:
4108c3e34a4SDavid Howells 		default:
41171f3ca40SDavid Howells 			rxrpc_free_skb(skb, rxrpc_skb_rx_freed);
4128c3e34a4SDavid Howells 			break;
4138c3e34a4SDavid Howells 		}
4148c3e34a4SDavid Howells 	}
4158c3e34a4SDavid Howells 
4168c3e34a4SDavid Howells out:
4178c3e34a4SDavid Howells 	rxrpc_put_connection(conn);
4188c3e34a4SDavid Howells 	_leave("");
4198c3e34a4SDavid Howells 	return;
4208c3e34a4SDavid Howells 
4218c3e34a4SDavid Howells requeue_and_leave:
4228c3e34a4SDavid Howells 	skb_queue_head(&conn->rx_queue, skb);
4238c3e34a4SDavid Howells 	goto out;
4248c3e34a4SDavid Howells 
4258c3e34a4SDavid Howells protocol_error:
4263a92789aSDavid Howells 	if (rxrpc_abort_connection(conn, ret, abort_code) < 0)
4278c3e34a4SDavid Howells 		goto requeue_and_leave;
42871f3ca40SDavid Howells 	rxrpc_free_skb(skb, rxrpc_skb_rx_freed);
4298c3e34a4SDavid Howells 	goto out;
4308c3e34a4SDavid Howells }
431