rxrpc: Add tracepoint for working out where aborts happen
[linux-block.git] / net / rxrpc / call_event.c
CommitLineData
17926a79
DH
1/* Management of Tx window, Tx resend, ACKs and out-of-sequence reception
2 *
3 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
9b6d5398
JP
12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
17926a79
DH
14#include <linux/module.h>
15#include <linux/circ_buf.h>
16#include <linux/net.h>
17#include <linux/skbuff.h>
5a0e3ad6 18#include <linux/slab.h>
17926a79
DH
19#include <linux/udp.h>
20#include <net/sock.h>
21#include <net/af_rxrpc.h>
22#include "ar-internal.h"
23
17926a79
DH
24/*
25 * propose an ACK be sent
26 */
4e36a95e 27void __rxrpc_propose_ACK(struct rxrpc_call *call, u8 ack_reason,
563ea7d5 28 u16 skew, u32 serial, bool immediate)
17926a79
DH
29{
30 unsigned long expiry;
31 s8 prior = rxrpc_ack_priority[ack_reason];
32
33 ASSERTCMP(prior, >, 0);
34
35 _enter("{%d},%s,%%%x,%u",
0d12f8a4 36 call->debug_id, rxrpc_acks(ack_reason), serial, immediate);
17926a79
DH
37
38 if (prior < rxrpc_ack_priority[call->ackr_reason]) {
39 if (immediate)
40 goto cancel_timer;
41 return;
42 }
43
44 /* update DELAY, IDLE, REQUESTED and PING_RESPONSE ACK serial
45 * numbers */
46 if (prior == rxrpc_ack_priority[call->ackr_reason]) {
563ea7d5
DH
47 if (prior <= 4) {
48 call->ackr_skew = skew;
17926a79 49 call->ackr_serial = serial;
563ea7d5 50 }
17926a79
DH
51 if (immediate)
52 goto cancel_timer;
53 return;
54 }
55
56 call->ackr_reason = ack_reason;
57 call->ackr_serial = serial;
58
59 switch (ack_reason) {
60 case RXRPC_ACK_DELAY:
61 _debug("run delay timer");
5873c083
DH
62 expiry = rxrpc_soft_ack_delay;
63 goto run_timer;
17926a79
DH
64
65 case RXRPC_ACK_IDLE:
66 if (!immediate) {
67 _debug("run defer timer");
5873c083 68 expiry = rxrpc_idle_ack_delay;
17926a79
DH
69 goto run_timer;
70 }
71 goto cancel_timer;
72
73 case RXRPC_ACK_REQUESTED:
5873c083
DH
74 expiry = rxrpc_requested_ack_delay;
75 if (!expiry)
17926a79 76 goto cancel_timer;
0d12f8a4 77 if (!immediate || serial == 1) {
17926a79 78 _debug("run defer timer");
17926a79
DH
79 goto run_timer;
80 }
81
82 default:
83 _debug("immediate ACK");
84 goto cancel_timer;
85 }
86
87run_timer:
88 expiry += jiffies;
89 if (!timer_pending(&call->ack_timer) ||
90 time_after(call->ack_timer.expires, expiry))
91 mod_timer(&call->ack_timer, expiry);
92 return;
93
94cancel_timer:
0d12f8a4 95 _debug("cancel timer %%%u", serial);
17926a79
DH
96 try_to_del_timer_sync(&call->ack_timer);
97 read_lock_bh(&call->state_lock);
f5c17aae 98 if (call->state < RXRPC_CALL_COMPLETE &&
4c198ad1 99 !test_and_set_bit(RXRPC_CALL_EV_ACK, &call->events))
651350d1 100 rxrpc_queue_call(call);
17926a79
DH
101 read_unlock_bh(&call->state_lock);
102}
103
104/*
105 * propose an ACK be sent, locking the call structure
106 */
4e36a95e 107void rxrpc_propose_ACK(struct rxrpc_call *call, u8 ack_reason,
563ea7d5 108 u16 skew, u32 serial, bool immediate)
17926a79
DH
109{
110 s8 prior = rxrpc_ack_priority[ack_reason];
111
112 if (prior > rxrpc_ack_priority[call->ackr_reason]) {
113 spin_lock_bh(&call->lock);
563ea7d5 114 __rxrpc_propose_ACK(call, ack_reason, skew, serial, immediate);
17926a79
DH
115 spin_unlock_bh(&call->lock);
116 }
117}
118
119/*
120 * set the resend timer
121 */
122static void rxrpc_set_resend(struct rxrpc_call *call, u8 resend,
123 unsigned long resend_at)
124{
125 read_lock_bh(&call->state_lock);
f5c17aae 126 if (call->state == RXRPC_CALL_COMPLETE)
17926a79
DH
127 resend = 0;
128
129 if (resend & 1) {
130 _debug("SET RESEND");
4c198ad1 131 set_bit(RXRPC_CALL_EV_RESEND, &call->events);
17926a79
DH
132 }
133
134 if (resend & 2) {
135 _debug("MODIFY RESEND TIMER");
136 set_bit(RXRPC_CALL_RUN_RTIMER, &call->flags);
137 mod_timer(&call->resend_timer, resend_at);
138 } else {
139 _debug("KILL RESEND TIMER");
140 del_timer_sync(&call->resend_timer);
4c198ad1 141 clear_bit(RXRPC_CALL_EV_RESEND_TIMER, &call->events);
17926a79
DH
142 clear_bit(RXRPC_CALL_RUN_RTIMER, &call->flags);
143 }
144 read_unlock_bh(&call->state_lock);
145}
146
147/*
148 * resend packets
149 */
150static void rxrpc_resend(struct rxrpc_call *call)
151{
0d12f8a4 152 struct rxrpc_wire_header *whdr;
17926a79 153 struct rxrpc_skb_priv *sp;
17926a79
DH
154 struct sk_buff *txb;
155 unsigned long *p_txb, resend_at;
c03ae533
FW
156 bool stop;
157 int loop;
17926a79
DH
158 u8 resend;
159
160 _enter("{%d,%d,%d,%d},",
161 call->acks_hard, call->acks_unacked,
162 atomic_read(&call->sequence),
163 CIRC_CNT(call->acks_head, call->acks_tail, call->acks_winsz));
164
c03ae533 165 stop = false;
17926a79
DH
166 resend = 0;
167 resend_at = 0;
168
169 for (loop = call->acks_tail;
170 loop != call->acks_head || stop;
171 loop = (loop + 1) & (call->acks_winsz - 1)
172 ) {
173 p_txb = call->acks_window + loop;
174 smp_read_barrier_depends();
175 if (*p_txb & 1)
176 continue;
177
178 txb = (struct sk_buff *) *p_txb;
179 sp = rxrpc_skb(txb);
180
181 if (sp->need_resend) {
3db1cd5c 182 sp->need_resend = false;
17926a79
DH
183
184 /* each Tx packet has a new serial number */
0d12f8a4 185 sp->hdr.serial = atomic_inc_return(&call->conn->serial);
17926a79 186
0d12f8a4
DH
187 whdr = (struct rxrpc_wire_header *)txb->head;
188 whdr->serial = htonl(sp->hdr.serial);
17926a79
DH
189
190 _proto("Tx DATA %%%u { #%d }",
0d12f8a4 191 sp->hdr.serial, sp->hdr.seq);
985a5c82 192 if (rxrpc_send_data_packet(call->conn, txb) < 0) {
c03ae533 193 stop = true;
17926a79
DH
194 sp->resend_at = jiffies + 3;
195 } else {
45025bce
DH
196 if (rxrpc_is_client_call(call))
197 rxrpc_expose_client_call(call);
17926a79 198 sp->resend_at =
765dd3bb 199 jiffies + rxrpc_resend_timeout;
17926a79
DH
200 }
201 }
202
203 if (time_after_eq(jiffies + 1, sp->resend_at)) {
3db1cd5c 204 sp->need_resend = true;
17926a79
DH
205 resend |= 1;
206 } else if (resend & 2) {
207 if (time_before(sp->resend_at, resend_at))
208 resend_at = sp->resend_at;
209 } else {
210 resend_at = sp->resend_at;
211 resend |= 2;
212 }
213 }
214
215 rxrpc_set_resend(call, resend, resend_at);
216 _leave("");
217}
218
219/*
220 * handle resend timer expiry
221 */
222static void rxrpc_resend_timer(struct rxrpc_call *call)
223{
224 struct rxrpc_skb_priv *sp;
225 struct sk_buff *txb;
226 unsigned long *p_txb, resend_at;
227 int loop;
228 u8 resend;
229
230 _enter("%d,%d,%d",
231 call->acks_tail, call->acks_unacked, call->acks_head);
232
f5c17aae 233 if (call->state == RXRPC_CALL_COMPLETE)
3b5bac2b
DH
234 return;
235
17926a79
DH
236 resend = 0;
237 resend_at = 0;
238
239 for (loop = call->acks_unacked;
240 loop != call->acks_head;
241 loop = (loop + 1) & (call->acks_winsz - 1)
242 ) {
243 p_txb = call->acks_window + loop;
244 smp_read_barrier_depends();
245 txb = (struct sk_buff *) (*p_txb & ~1);
246 sp = rxrpc_skb(txb);
247
248 ASSERT(!(*p_txb & 1));
249
250 if (sp->need_resend) {
251 ;
252 } else if (time_after_eq(jiffies + 1, sp->resend_at)) {
3db1cd5c 253 sp->need_resend = true;
17926a79
DH
254 resend |= 1;
255 } else if (resend & 2) {
256 if (time_before(sp->resend_at, resend_at))
257 resend_at = sp->resend_at;
258 } else {
259 resend_at = sp->resend_at;
260 resend |= 2;
261 }
262 }
263
264 rxrpc_set_resend(call, resend, resend_at);
265 _leave("");
266}
267
268/*
269 * process soft ACKs of our transmitted packets
270 * - these indicate packets the peer has or has not received, but hasn't yet
271 * given to the consumer, and so can still be discarded and re-requested
272 */
273static int rxrpc_process_soft_ACKs(struct rxrpc_call *call,
274 struct rxrpc_ackpacket *ack,
275 struct sk_buff *skb)
276{
277 struct rxrpc_skb_priv *sp;
278 struct sk_buff *txb;
279 unsigned long *p_txb, resend_at;
280 int loop;
281 u8 sacks[RXRPC_MAXACKS], resend;
282
283 _enter("{%d,%d},{%d},",
284 call->acks_hard,
285 CIRC_CNT(call->acks_head, call->acks_tail, call->acks_winsz),
286 ack->nAcks);
287
288 if (skb_copy_bits(skb, 0, sacks, ack->nAcks) < 0)
289 goto protocol_error;
290
291 resend = 0;
292 resend_at = 0;
293 for (loop = 0; loop < ack->nAcks; loop++) {
294 p_txb = call->acks_window;
295 p_txb += (call->acks_tail + loop) & (call->acks_winsz - 1);
296 smp_read_barrier_depends();
297 txb = (struct sk_buff *) (*p_txb & ~1);
298 sp = rxrpc_skb(txb);
299
300 switch (sacks[loop]) {
301 case RXRPC_ACK_TYPE_ACK:
3db1cd5c 302 sp->need_resend = false;
17926a79
DH
303 *p_txb |= 1;
304 break;
305 case RXRPC_ACK_TYPE_NACK:
3db1cd5c 306 sp->need_resend = true;
17926a79
DH
307 *p_txb &= ~1;
308 resend = 1;
309 break;
310 default:
311 _debug("Unsupported ACK type %d", sacks[loop]);
312 goto protocol_error;
313 }
314 }
315
316 smp_mb();
317 call->acks_unacked = (call->acks_tail + loop) & (call->acks_winsz - 1);
318
319 /* anything not explicitly ACK'd is implicitly NACK'd, but may just not
320 * have been received or processed yet by the far end */
321 for (loop = call->acks_unacked;
322 loop != call->acks_head;
323 loop = (loop + 1) & (call->acks_winsz - 1)
324 ) {
325 p_txb = call->acks_window + loop;
326 smp_read_barrier_depends();
327 txb = (struct sk_buff *) (*p_txb & ~1);
328 sp = rxrpc_skb(txb);
329
330 if (*p_txb & 1) {
331 /* packet must have been discarded */
3db1cd5c 332 sp->need_resend = true;
17926a79
DH
333 *p_txb &= ~1;
334 resend |= 1;
335 } else if (sp->need_resend) {
336 ;
337 } else if (time_after_eq(jiffies + 1, sp->resend_at)) {
3db1cd5c 338 sp->need_resend = true;
17926a79
DH
339 resend |= 1;
340 } else if (resend & 2) {
341 if (time_before(sp->resend_at, resend_at))
342 resend_at = sp->resend_at;
343 } else {
344 resend_at = sp->resend_at;
345 resend |= 2;
346 }
347 }
348
349 rxrpc_set_resend(call, resend, resend_at);
350 _leave(" = 0");
351 return 0;
352
353protocol_error:
354 _leave(" = -EPROTO");
355 return -EPROTO;
356}
357
358/*
359 * discard hard-ACK'd packets from the Tx window
360 */
361static void rxrpc_rotate_tx_window(struct rxrpc_call *call, u32 hard)
362{
17926a79
DH
363 unsigned long _skb;
364 int tail = call->acks_tail, old_tail;
365 int win = CIRC_CNT(call->acks_head, tail, call->acks_winsz);
366
8f7e6e75 367 _enter("{%u,%u},%u", call->acks_hard, win, hard);
17926a79
DH
368
369 ASSERTCMP(hard - call->acks_hard, <=, win);
370
371 while (call->acks_hard < hard) {
372 smp_read_barrier_depends();
373 _skb = call->acks_window[tail] & ~1;
17926a79
DH
374 rxrpc_free_skb((struct sk_buff *) _skb);
375 old_tail = tail;
376 tail = (tail + 1) & (call->acks_winsz - 1);
377 call->acks_tail = tail;
378 if (call->acks_unacked == old_tail)
379 call->acks_unacked = tail;
380 call->acks_hard++;
381 }
382
45025bce 383 wake_up(&call->waitq);
17926a79
DH
384}
385
386/*
387 * clear the Tx window in the event of a failure
388 */
389static void rxrpc_clear_tx_window(struct rxrpc_call *call)
390{
391 rxrpc_rotate_tx_window(call, atomic_read(&call->sequence));
392}
393
394/*
395 * drain the out of sequence received packet queue into the packet Rx queue
396 */
397static int rxrpc_drain_rx_oos_queue(struct rxrpc_call *call)
398{
399 struct rxrpc_skb_priv *sp;
400 struct sk_buff *skb;
401 bool terminal;
402 int ret;
403
404 _enter("{%d,%d}", call->rx_data_post, call->rx_first_oos);
405
406 spin_lock_bh(&call->lock);
407
408 ret = -ECONNRESET;
409 if (test_bit(RXRPC_CALL_RELEASED, &call->flags))
410 goto socket_unavailable;
411
412 skb = skb_dequeue(&call->rx_oos_queue);
413 if (skb) {
df844fd4 414 rxrpc_see_skb(skb);
17926a79
DH
415 sp = rxrpc_skb(skb);
416
417 _debug("drain OOS packet %d [%d]",
0d12f8a4 418 sp->hdr.seq, call->rx_first_oos);
17926a79 419
0d12f8a4 420 if (sp->hdr.seq != call->rx_first_oos) {
17926a79 421 skb_queue_head(&call->rx_oos_queue, skb);
0d12f8a4 422 call->rx_first_oos = rxrpc_skb(skb)->hdr.seq;
17926a79
DH
423 _debug("requeue %p {%u}", skb, call->rx_first_oos);
424 } else {
425 skb->mark = RXRPC_SKB_MARK_DATA;
426 terminal = ((sp->hdr.flags & RXRPC_LAST_PACKET) &&
427 !(sp->hdr.flags & RXRPC_CLIENT_INITIATED));
428 ret = rxrpc_queue_rcv_skb(call, skb, true, terminal);
429 BUG_ON(ret < 0);
430 _debug("drain #%u", call->rx_data_post);
431 call->rx_data_post++;
432
433 /* find out what the next packet is */
434 skb = skb_peek(&call->rx_oos_queue);
df844fd4 435 rxrpc_see_skb(skb);
17926a79 436 if (skb)
0d12f8a4 437 call->rx_first_oos = rxrpc_skb(skb)->hdr.seq;
17926a79
DH
438 else
439 call->rx_first_oos = 0;
440 _debug("peek %p {%u}", skb, call->rx_first_oos);
441 }
442 }
443
444 ret = 0;
445socket_unavailable:
446 spin_unlock_bh(&call->lock);
447 _leave(" = %d", ret);
448 return ret;
449}
450
451/*
452 * insert an out of sequence packet into the buffer
453 */
454static void rxrpc_insert_oos_packet(struct rxrpc_call *call,
455 struct sk_buff *skb)
456{
457 struct rxrpc_skb_priv *sp, *psp;
458 struct sk_buff *p;
459 u32 seq;
460
461 sp = rxrpc_skb(skb);
0d12f8a4 462 seq = sp->hdr.seq;
17926a79
DH
463 _enter(",,{%u}", seq);
464
465 skb->destructor = rxrpc_packet_destructor;
466 ASSERTCMP(sp->call, ==, NULL);
467 sp->call = call;
e34d4234 468 rxrpc_get_call_for_skb(call, skb);
17926a79
DH
469
470 /* insert into the buffer in sequence order */
471 spin_lock_bh(&call->lock);
472
473 skb_queue_walk(&call->rx_oos_queue, p) {
474 psp = rxrpc_skb(p);
0d12f8a4
DH
475 if (psp->hdr.seq > seq) {
476 _debug("insert oos #%u before #%u", seq, psp->hdr.seq);
17926a79
DH
477 skb_insert(p, skb, &call->rx_oos_queue);
478 goto inserted;
479 }
480 }
481
482 _debug("append oos #%u", seq);
483 skb_queue_tail(&call->rx_oos_queue, skb);
484inserted:
485
486 /* we might now have a new front to the queue */
487 if (call->rx_first_oos == 0 || seq < call->rx_first_oos)
488 call->rx_first_oos = seq;
489
490 read_lock(&call->state_lock);
491 if (call->state < RXRPC_CALL_COMPLETE &&
492 call->rx_data_post == call->rx_first_oos) {
493 _debug("drain rx oos now");
4c198ad1 494 set_bit(RXRPC_CALL_EV_DRAIN_RX_OOS, &call->events);
17926a79
DH
495 }
496 read_unlock(&call->state_lock);
497
498 spin_unlock_bh(&call->lock);
499 _leave(" [stored #%u]", call->rx_first_oos);
500}
501
502/*
503 * clear the Tx window on final ACK reception
504 */
505static void rxrpc_zap_tx_window(struct rxrpc_call *call)
506{
507 struct rxrpc_skb_priv *sp;
508 struct sk_buff *skb;
509 unsigned long _skb, *acks_window;
4e36a95e 510 u8 winsz = call->acks_winsz;
17926a79
DH
511 int tail;
512
513 acks_window = call->acks_window;
514 call->acks_window = NULL;
515
516 while (CIRC_CNT(call->acks_head, call->acks_tail, winsz) > 0) {
517 tail = call->acks_tail;
518 smp_read_barrier_depends();
519 _skb = acks_window[tail] & ~1;
520 smp_mb();
521 call->acks_tail = (call->acks_tail + 1) & (winsz - 1);
522
523 skb = (struct sk_buff *) _skb;
524 sp = rxrpc_skb(skb);
0d12f8a4 525 _debug("+++ clear Tx %u", sp->hdr.seq);
17926a79
DH
526 rxrpc_free_skb(skb);
527 }
528
529 kfree(acks_window);
530}
531
224711df
DH
532/*
533 * process the extra information that may be appended to an ACK packet
534 */
535static void rxrpc_extract_ackinfo(struct rxrpc_call *call, struct sk_buff *skb,
95c96174 536 unsigned int latest, int nAcks)
224711df
DH
537{
538 struct rxrpc_ackinfo ackinfo;
539 struct rxrpc_peer *peer;
95c96174 540 unsigned int mtu;
224711df
DH
541
542 if (skb_copy_bits(skb, nAcks + 3, &ackinfo, sizeof(ackinfo)) < 0) {
543 _leave(" [no ackinfo]");
544 return;
545 }
546
547 _proto("Rx ACK %%%u Info { rx=%u max=%u rwin=%u jm=%u }",
548 latest,
549 ntohl(ackinfo.rxMTU), ntohl(ackinfo.maxMTU),
550 ntohl(ackinfo.rwind), ntohl(ackinfo.jumbo_max));
551
552 mtu = min(ntohl(ackinfo.rxMTU), ntohl(ackinfo.maxMTU));
553
ea82aaec 554 peer = call->peer;
224711df
DH
555 if (mtu < peer->maxdata) {
556 spin_lock_bh(&peer->lock);
557 peer->maxdata = mtu;
558 peer->mtu = mtu + peer->hdrsize;
559 spin_unlock_bh(&peer->lock);
560 _net("Net MTU %u (maxdata %u)", peer->mtu, peer->maxdata);
561 }
562}
563
17926a79
DH
564/*
565 * process packets in the reception queue
566 */
567static int rxrpc_process_rx_queue(struct rxrpc_call *call,
568 u32 *_abort_code)
569{
570 struct rxrpc_ackpacket ack;
571 struct rxrpc_skb_priv *sp;
572 struct sk_buff *skb;
573 bool post_ACK;
574 int latest;
575 u32 hard, tx;
576
577 _enter("");
578
579process_further:
580 skb = skb_dequeue(&call->rx_queue);
581 if (!skb)
582 return -EAGAIN;
583
df844fd4 584 rxrpc_see_skb(skb);
17926a79
DH
585 _net("deferred skb %p", skb);
586
587 sp = rxrpc_skb(skb);
588
589 _debug("process %s [st %d]", rxrpc_pkts[sp->hdr.type], call->state);
590
591 post_ACK = false;
592
593 switch (sp->hdr.type) {
594 /* data packets that wind up here have been received out of
595 * order, need security processing or are jumbo packets */
596 case RXRPC_PACKET_TYPE_DATA:
0d12f8a4 597 _proto("OOSQ DATA %%%u { #%u }", sp->hdr.serial, sp->hdr.seq);
17926a79
DH
598
599 /* secured packets must be verified and possibly decrypted */
e0e4d82f 600 if (call->conn->security->verify_packet(call, skb,
5a42976d
DH
601 sp->hdr.seq,
602 sp->hdr.cksum) < 0)
17926a79
DH
603 goto protocol_error;
604
605 rxrpc_insert_oos_packet(call, skb);
606 goto process_further;
607
608 /* partial ACK to process */
609 case RXRPC_PACKET_TYPE_ACK:
610 if (skb_copy_bits(skb, 0, &ack, sizeof(ack)) < 0) {
611 _debug("extraction failure");
612 goto protocol_error;
613 }
614 if (!skb_pull(skb, sizeof(ack)))
615 BUG();
616
0d12f8a4 617 latest = sp->hdr.serial;
17926a79
DH
618 hard = ntohl(ack.firstPacket);
619 tx = atomic_read(&call->sequence);
620
621 _proto("Rx ACK %%%u { m=%hu f=#%u p=#%u s=%%%u r=%s n=%u }",
622 latest,
623 ntohs(ack.maxSkew),
624 hard,
625 ntohl(ack.previousPacket),
626 ntohl(ack.serial),
08d4d217 627 rxrpc_acks(ack.reason),
17926a79
DH
628 ack.nAcks);
629
224711df
DH
630 rxrpc_extract_ackinfo(call, skb, latest, ack.nAcks);
631
17926a79
DH
632 if (ack.reason == RXRPC_ACK_PING) {
633 _proto("Rx ACK %%%u PING Request", latest);
634 rxrpc_propose_ACK(call, RXRPC_ACK_PING_RESPONSE,
563ea7d5 635 skb->priority, sp->hdr.serial, true);
17926a79
DH
636 }
637
638 /* discard any out-of-order or duplicate ACKs */
639 if (latest - call->acks_latest <= 0) {
640 _debug("discard ACK %d <= %d",
641 latest, call->acks_latest);
642 goto discard;
643 }
644 call->acks_latest = latest;
645
646 if (call->state != RXRPC_CALL_CLIENT_SEND_REQUEST &&
647 call->state != RXRPC_CALL_CLIENT_AWAIT_REPLY &&
648 call->state != RXRPC_CALL_SERVER_SEND_REPLY &&
649 call->state != RXRPC_CALL_SERVER_AWAIT_ACK)
650 goto discard;
651
652 _debug("Tx=%d H=%u S=%d", tx, call->acks_hard, call->state);
653
654 if (hard > 0) {
655 if (hard - 1 > tx) {
656 _debug("hard-ACK'd packet %d not transmitted"
657 " (%d top)",
658 hard - 1, tx);
659 goto protocol_error;
660 }
661
662 if ((call->state == RXRPC_CALL_CLIENT_AWAIT_REPLY ||
663 call->state == RXRPC_CALL_SERVER_AWAIT_ACK) &&
33c40e24
DH
664 hard > tx) {
665 call->acks_hard = tx;
17926a79 666 goto all_acked;
33c40e24 667 }
17926a79
DH
668
669 smp_rmb();
670 rxrpc_rotate_tx_window(call, hard - 1);
671 }
672
673 if (ack.nAcks > 0) {
674 if (hard - 1 + ack.nAcks > tx) {
675 _debug("soft-ACK'd packet %d+%d not"
676 " transmitted (%d top)",
677 hard - 1, ack.nAcks, tx);
678 goto protocol_error;
679 }
680
681 if (rxrpc_process_soft_ACKs(call, &ack, skb) < 0)
682 goto protocol_error;
683 }
684 goto discard;
685
686 /* complete ACK to process */
687 case RXRPC_PACKET_TYPE_ACKALL:
688 goto all_acked;
689
690 /* abort and busy are handled elsewhere */
691 case RXRPC_PACKET_TYPE_BUSY:
692 case RXRPC_PACKET_TYPE_ABORT:
693 BUG();
694
695 /* connection level events - also handled elsewhere */
696 case RXRPC_PACKET_TYPE_CHALLENGE:
697 case RXRPC_PACKET_TYPE_RESPONSE:
698 case RXRPC_PACKET_TYPE_DEBUG:
699 BUG();
700 }
701
702 /* if we've had a hard ACK that covers all the packets we've sent, then
703 * that ends that phase of the operation */
704all_acked:
705 write_lock_bh(&call->state_lock);
706 _debug("ack all %d", call->state);
707
708 switch (call->state) {
709 case RXRPC_CALL_CLIENT_AWAIT_REPLY:
710 call->state = RXRPC_CALL_CLIENT_RECV_REPLY;
711 break;
712 case RXRPC_CALL_SERVER_AWAIT_ACK:
713 _debug("srv complete");
f5c17aae 714 __rxrpc_call_completed(call);
17926a79
DH
715 post_ACK = true;
716 break;
717 case RXRPC_CALL_CLIENT_SEND_REQUEST:
718 case RXRPC_CALL_SERVER_RECV_REQUEST:
719 goto protocol_error_unlock; /* can't occur yet */
720 default:
721 write_unlock_bh(&call->state_lock);
722 goto discard; /* assume packet left over from earlier phase */
723 }
724
725 write_unlock_bh(&call->state_lock);
726
727 /* if all the packets we sent are hard-ACK'd, then we can discard
728 * whatever we've got left */
729 _debug("clear Tx %d",
730 CIRC_CNT(call->acks_head, call->acks_tail, call->acks_winsz));
731
732 del_timer_sync(&call->resend_timer);
733 clear_bit(RXRPC_CALL_RUN_RTIMER, &call->flags);
4c198ad1 734 clear_bit(RXRPC_CALL_EV_RESEND_TIMER, &call->events);
17926a79
DH
735
736 if (call->acks_window)
737 rxrpc_zap_tx_window(call);
738
739 if (post_ACK) {
740 /* post the final ACK message for userspace to pick up */
741 _debug("post ACK");
742 skb->mark = RXRPC_SKB_MARK_FINAL_ACK;
743 sp->call = call;
e34d4234 744 rxrpc_get_call_for_skb(call, skb);
17926a79
DH
745 spin_lock_bh(&call->lock);
746 if (rxrpc_queue_rcv_skb(call, skb, true, true) < 0)
747 BUG();
748 spin_unlock_bh(&call->lock);
749 goto process_further;
750 }
751
752discard:
753 rxrpc_free_skb(skb);
754 goto process_further;
755
756protocol_error_unlock:
757 write_unlock_bh(&call->state_lock);
758protocol_error:
759 rxrpc_free_skb(skb);
760 _leave(" = -EPROTO");
761 return -EPROTO;
762}
763
764/*
765 * post a message to the socket Rx queue for recvmsg() to pick up
766 */
767static int rxrpc_post_message(struct rxrpc_call *call, u32 mark, u32 error,
768 bool fatal)
769{
770 struct rxrpc_skb_priv *sp;
771 struct sk_buff *skb;
772 int ret;
773
774 _enter("{%d,%lx},%u,%u,%d",
775 call->debug_id, call->flags, mark, error, fatal);
776
777 /* remove timers and things for fatal messages */
778 if (fatal) {
779 del_timer_sync(&call->resend_timer);
780 del_timer_sync(&call->ack_timer);
781 clear_bit(RXRPC_CALL_RUN_RTIMER, &call->flags);
782 }
783
784 if (mark != RXRPC_SKB_MARK_NEW_CALL &&
785 !test_bit(RXRPC_CALL_HAS_USERID, &call->flags)) {
786 _leave("[no userid]");
787 return 0;
788 }
789
790 if (!test_bit(RXRPC_CALL_TERMINAL_MSG, &call->flags)) {
791 skb = alloc_skb(0, GFP_NOFS);
792 if (!skb)
793 return -ENOMEM;
794
795 rxrpc_new_skb(skb);
796
797 skb->mark = mark;
798
799 sp = rxrpc_skb(skb);
800 memset(sp, 0, sizeof(*sp));
801 sp->error = error;
802 sp->call = call;
e34d4234 803 rxrpc_get_call_for_skb(call, skb);
17926a79
DH
804
805 spin_lock_bh(&call->lock);
806 ret = rxrpc_queue_rcv_skb(call, skb, true, fatal);
807 spin_unlock_bh(&call->lock);
163e3cb7 808 BUG_ON(ret < 0);
17926a79
DH
809 }
810
811 return 0;
812}
813
814/*
8d94aa38
DH
815 * Handle background processing of incoming call packets and ACK / abort
816 * generation. A ref on the call is donated to us by whoever queued the work
817 * item.
17926a79
DH
818 */
819void rxrpc_process_call(struct work_struct *work)
820{
821 struct rxrpc_call *call =
822 container_of(work, struct rxrpc_call, processor);
0d12f8a4 823 struct rxrpc_wire_header whdr;
17926a79
DH
824 struct rxrpc_ackpacket ack;
825 struct rxrpc_ackinfo ackinfo;
17926a79
DH
826 struct msghdr msg;
827 struct kvec iov[5];
5b8848d1 828 enum rxrpc_call_event genbit;
17926a79 829 unsigned long bits;
224711df 830 __be32 data, pad;
17926a79 831 size_t len;
8d94aa38 832 bool requeue = false;
5b8848d1 833 int loop, nbit, ioc, ret, mtu;
0d12f8a4 834 u32 serial, abort_code = RX_PROTOCOL_ERROR;
17926a79
DH
835 u8 *acks = NULL;
836
e34d4234
DH
837 rxrpc_see_call(call);
838
17926a79
DH
839 //printk("\n--------------------\n");
840 _enter("{%d,%s,%lx} [%lu]",
841 call->debug_id, rxrpc_call_states[call->state], call->events,
842 (jiffies - call->creation_jif) / (HZ / 10));
843
8d94aa38
DH
844 if (call->state >= RXRPC_CALL_COMPLETE) {
845 rxrpc_put_call(call, rxrpc_call_put);
846 return;
847 }
848
f9dc5757
DH
849 if (!call->conn)
850 goto skip_msg_init;
851
17926a79
DH
852 /* there's a good chance we're going to have to send a message, so set
853 * one up in advance */
ea82aaec
DH
854 msg.msg_name = &call->peer->srx.transport;
855 msg.msg_namelen = call->peer->srx.transport_len;
17926a79
DH
856 msg.msg_control = NULL;
857 msg.msg_controllen = 0;
858 msg.msg_flags = 0;
859
19ffa01c 860 whdr.epoch = htonl(call->conn->proto.epoch);
0d12f8a4
DH
861 whdr.cid = htonl(call->cid);
862 whdr.callNumber = htonl(call->call_id);
863 whdr.seq = 0;
864 whdr.type = RXRPC_PACKET_TYPE_ACK;
865 whdr.flags = call->conn->out_clientflag;
866 whdr.userStatus = 0;
867 whdr.securityIndex = call->conn->security_ix;
868 whdr._rsvd = 0;
869 whdr.serviceId = htons(call->service_id);
17926a79
DH
870
871 memset(iov, 0, sizeof(iov));
0d12f8a4
DH
872 iov[0].iov_base = &whdr;
873 iov[0].iov_len = sizeof(whdr);
f9dc5757 874skip_msg_init:
17926a79
DH
875
876 /* deal with events of a final nature */
4c198ad1 877 if (test_bit(RXRPC_CALL_EV_RCVD_ERROR, &call->events)) {
f66d7490 878 enum rxrpc_skb_mark mark;
17926a79 879
4c198ad1
DH
880 clear_bit(RXRPC_CALL_EV_CONN_ABORT, &call->events);
881 clear_bit(RXRPC_CALL_EV_REJECT_BUSY, &call->events);
882 clear_bit(RXRPC_CALL_EV_ABORT, &call->events);
17926a79 883
f5c17aae 884 if (call->completion == RXRPC_CALL_NETWORK_ERROR) {
f66d7490 885 mark = RXRPC_SKB_MARK_NET_ERROR;
00b5407e 886 _debug("post net error %d", call->error);
f66d7490
DH
887 } else {
888 mark = RXRPC_SKB_MARK_LOCAL_ERROR;
00b5407e 889 _debug("post net local error %d", call->error);
f66d7490 890 }
17926a79 891
f5c17aae 892 if (rxrpc_post_message(call, mark, call->error, true) < 0)
17926a79 893 goto no_mem;
4c198ad1 894 clear_bit(RXRPC_CALL_EV_RCVD_ERROR, &call->events);
17926a79
DH
895 goto kill_ACKs;
896 }
897
4c198ad1 898 if (test_bit(RXRPC_CALL_EV_CONN_ABORT, &call->events)) {
f5c17aae 899 ASSERTCMP(call->state, ==, RXRPC_CALL_COMPLETE);
17926a79 900
4c198ad1
DH
901 clear_bit(RXRPC_CALL_EV_REJECT_BUSY, &call->events);
902 clear_bit(RXRPC_CALL_EV_ABORT, &call->events);
17926a79
DH
903
904 _debug("post conn abort");
905
906 if (rxrpc_post_message(call, RXRPC_SKB_MARK_LOCAL_ERROR,
f5c17aae 907 call->error, true) < 0)
17926a79 908 goto no_mem;
4c198ad1 909 clear_bit(RXRPC_CALL_EV_CONN_ABORT, &call->events);
17926a79
DH
910 goto kill_ACKs;
911 }
912
4c198ad1 913 if (test_bit(RXRPC_CALL_EV_REJECT_BUSY, &call->events)) {
0d12f8a4 914 whdr.type = RXRPC_PACKET_TYPE_BUSY;
4c198ad1 915 genbit = RXRPC_CALL_EV_REJECT_BUSY;
17926a79
DH
916 goto send_message;
917 }
918
4c198ad1 919 if (test_bit(RXRPC_CALL_EV_ABORT, &call->events)) {
f5c17aae 920 ASSERTCMP(call->state, ==, RXRPC_CALL_COMPLETE);
17926a79
DH
921
922 if (rxrpc_post_message(call, RXRPC_SKB_MARK_LOCAL_ERROR,
f5c17aae 923 call->error, true) < 0)
17926a79 924 goto no_mem;
0d12f8a4 925 whdr.type = RXRPC_PACKET_TYPE_ABORT;
f5c17aae 926 data = htonl(call->abort_code);
17926a79
DH
927 iov[1].iov_base = &data;
928 iov[1].iov_len = sizeof(data);
4c198ad1 929 genbit = RXRPC_CALL_EV_ABORT;
17926a79
DH
930 goto send_message;
931 }
932
4c198ad1
DH
933 if (test_bit(RXRPC_CALL_EV_ACK_FINAL, &call->events)) {
934 genbit = RXRPC_CALL_EV_ACK_FINAL;
224711df
DH
935
936 ack.bufferSpace = htons(8);
937 ack.maxSkew = 0;
938 ack.serial = 0;
939 ack.reason = RXRPC_ACK_IDLE;
940 ack.nAcks = 0;
941 call->ackr_reason = 0;
942
943 spin_lock_bh(&call->lock);
0d12f8a4
DH
944 ack.serial = htonl(call->ackr_serial);
945 ack.previousPacket = htonl(call->ackr_prev_seq);
946 ack.firstPacket = htonl(call->rx_data_eaten + 1);
224711df
DH
947 spin_unlock_bh(&call->lock);
948
949 pad = 0;
950
951 iov[1].iov_base = &ack;
952 iov[1].iov_len = sizeof(ack);
953 iov[2].iov_base = &pad;
954 iov[2].iov_len = 3;
955 iov[3].iov_base = &ackinfo;
956 iov[3].iov_len = sizeof(ackinfo);
957 goto send_ACK;
17926a79
DH
958 }
959
4c198ad1
DH
960 if (call->events & ((1 << RXRPC_CALL_EV_RCVD_BUSY) |
961 (1 << RXRPC_CALL_EV_RCVD_ABORT))
17926a79
DH
962 ) {
963 u32 mark;
964
4c198ad1 965 if (test_bit(RXRPC_CALL_EV_RCVD_ABORT, &call->events))
17926a79
DH
966 mark = RXRPC_SKB_MARK_REMOTE_ABORT;
967 else
968 mark = RXRPC_SKB_MARK_BUSY;
969
970 _debug("post abort/busy");
971 rxrpc_clear_tx_window(call);
972 if (rxrpc_post_message(call, mark, ECONNABORTED, true) < 0)
973 goto no_mem;
974
4c198ad1
DH
975 clear_bit(RXRPC_CALL_EV_RCVD_BUSY, &call->events);
976 clear_bit(RXRPC_CALL_EV_RCVD_ABORT, &call->events);
17926a79
DH
977 goto kill_ACKs;
978 }
979
4c198ad1 980 if (test_and_clear_bit(RXRPC_CALL_EV_RCVD_ACKALL, &call->events)) {
17926a79
DH
981 _debug("do implicit ackall");
982 rxrpc_clear_tx_window(call);
983 }
984
4c198ad1 985 if (test_bit(RXRPC_CALL_EV_LIFE_TIMER, &call->events)) {
5a42976d 986 rxrpc_abort_call("EXP", call, 0, RX_CALL_TIMEOUT, ETIME);
17926a79
DH
987
988 _debug("post timeout");
989 if (rxrpc_post_message(call, RXRPC_SKB_MARK_LOCAL_ERROR,
990 ETIME, true) < 0)
991 goto no_mem;
992
4c198ad1 993 clear_bit(RXRPC_CALL_EV_LIFE_TIMER, &call->events);
17926a79
DH
994 goto kill_ACKs;
995 }
996
997 /* deal with assorted inbound messages */
998 if (!skb_queue_empty(&call->rx_queue)) {
f5c17aae
DH
999 ret = rxrpc_process_rx_queue(call, &abort_code);
1000 switch (ret) {
17926a79
DH
1001 case 0:
1002 case -EAGAIN:
1003 break;
1004 case -ENOMEM:
1005 goto no_mem;
1006 case -EKEYEXPIRED:
1007 case -EKEYREJECTED:
1008 case -EPROTO:
5a42976d 1009 rxrpc_abort_call("PRO", call, 0, abort_code, -ret);
17926a79
DH
1010 goto kill_ACKs;
1011 }
1012 }
1013
1014 /* handle resending */
4c198ad1 1015 if (test_and_clear_bit(RXRPC_CALL_EV_RESEND_TIMER, &call->events))
17926a79 1016 rxrpc_resend_timer(call);
4c198ad1 1017 if (test_and_clear_bit(RXRPC_CALL_EV_RESEND, &call->events))
17926a79
DH
1018 rxrpc_resend(call);
1019
1020 /* consider sending an ordinary ACK */
4c198ad1 1021 if (test_bit(RXRPC_CALL_EV_ACK, &call->events)) {
17926a79
DH
1022 _debug("send ACK: window: %d - %d { %lx }",
1023 call->rx_data_eaten, call->ackr_win_top,
1024 call->ackr_window[0]);
1025
1026 if (call->state > RXRPC_CALL_SERVER_ACK_REQUEST &&
1027 call->ackr_reason != RXRPC_ACK_PING_RESPONSE) {
1028 /* ACK by sending reply DATA packet in this state */
4c198ad1 1029 clear_bit(RXRPC_CALL_EV_ACK, &call->events);
17926a79
DH
1030 goto maybe_reschedule;
1031 }
1032
4c198ad1 1033 genbit = RXRPC_CALL_EV_ACK;
17926a79
DH
1034
1035 acks = kzalloc(call->ackr_win_top - call->rx_data_eaten,
1036 GFP_NOFS);
1037 if (!acks)
1038 goto no_mem;
1039
1040 //hdr.flags = RXRPC_SLOW_START_OK;
1041 ack.bufferSpace = htons(8);
1042 ack.maxSkew = 0;
17926a79 1043
17926a79 1044 spin_lock_bh(&call->lock);
0d12f8a4
DH
1045 ack.reason = call->ackr_reason;
1046 ack.serial = htonl(call->ackr_serial);
1047 ack.previousPacket = htonl(call->ackr_prev_seq);
17926a79
DH
1048 ack.firstPacket = htonl(call->rx_data_eaten + 1);
1049
1050 ack.nAcks = 0;
1051 for (loop = 0; loop < RXRPC_ACKR_WINDOW_ASZ; loop++) {
1052 nbit = loop * BITS_PER_LONG;
1053 for (bits = call->ackr_window[loop]; bits; bits >>= 1
1054 ) {
1055 _debug("- l=%d n=%d b=%lx", loop, nbit, bits);
1056 if (bits & 1) {
1057 acks[nbit] = RXRPC_ACK_TYPE_ACK;
1058 ack.nAcks = nbit + 1;
1059 }
1060 nbit++;
1061 }
1062 }
1063 call->ackr_reason = 0;
1064 spin_unlock_bh(&call->lock);
1065
1066 pad = 0;
1067
1068 iov[1].iov_base = &ack;
1069 iov[1].iov_len = sizeof(ack);
1070 iov[2].iov_base = acks;
1071 iov[2].iov_len = ack.nAcks;
1072 iov[3].iov_base = &pad;
1073 iov[3].iov_len = 3;
1074 iov[4].iov_base = &ackinfo;
1075 iov[4].iov_len = sizeof(ackinfo);
1076
1077 switch (ack.reason) {
1078 case RXRPC_ACK_REQUESTED:
1079 case RXRPC_ACK_DUPLICATE:
1080 case RXRPC_ACK_OUT_OF_SEQUENCE:
1081 case RXRPC_ACK_EXCEEDS_WINDOW:
1082 case RXRPC_ACK_NOSPACE:
1083 case RXRPC_ACK_PING:
1084 case RXRPC_ACK_PING_RESPONSE:
1085 goto send_ACK_with_skew;
1086 case RXRPC_ACK_DELAY:
1087 case RXRPC_ACK_IDLE:
1088 goto send_ACK;
1089 }
1090 }
1091
1092 /* handle completion of security negotiations on an incoming
1093 * connection */
4c198ad1 1094 if (test_and_clear_bit(RXRPC_CALL_EV_SECURED, &call->events)) {
17926a79
DH
1095 _debug("secured");
1096 spin_lock_bh(&call->lock);
1097
1098 if (call->state == RXRPC_CALL_SERVER_SECURING) {
8d94aa38 1099 struct rxrpc_sock *rx;
17926a79 1100 _debug("securing");
8d94aa38
DH
1101 rcu_read_lock();
1102 rx = rcu_dereference(call->socket);
1103 if (rx) {
1104 write_lock(&rx->call_lock);
1105 if (!test_bit(RXRPC_CALL_RELEASED, &call->flags)) {
1106 _debug("not released");
1107 call->state = RXRPC_CALL_SERVER_ACCEPTING;
1108 list_move_tail(&call->accept_link,
1109 &rx->acceptq);
1110 }
1111 write_unlock(&rx->call_lock);
17926a79 1112 }
8d94aa38 1113 rcu_read_unlock();
17926a79
DH
1114 read_lock(&call->state_lock);
1115 if (call->state < RXRPC_CALL_COMPLETE)
4c198ad1 1116 set_bit(RXRPC_CALL_EV_POST_ACCEPT, &call->events);
17926a79
DH
1117 read_unlock(&call->state_lock);
1118 }
1119
1120 spin_unlock_bh(&call->lock);
4c198ad1 1121 if (!test_bit(RXRPC_CALL_EV_POST_ACCEPT, &call->events))
17926a79
DH
1122 goto maybe_reschedule;
1123 }
1124
1125 /* post a notification of an acceptable connection to the app */
4c198ad1 1126 if (test_bit(RXRPC_CALL_EV_POST_ACCEPT, &call->events)) {
17926a79
DH
1127 _debug("post accept");
1128 if (rxrpc_post_message(call, RXRPC_SKB_MARK_NEW_CALL,
1129 0, false) < 0)
1130 goto no_mem;
4c198ad1 1131 clear_bit(RXRPC_CALL_EV_POST_ACCEPT, &call->events);
17926a79
DH
1132 goto maybe_reschedule;
1133 }
1134
1135 /* handle incoming call acceptance */
4c198ad1 1136 if (test_and_clear_bit(RXRPC_CALL_EV_ACCEPTED, &call->events)) {
17926a79
DH
1137 _debug("accepted");
1138 ASSERTCMP(call->rx_data_post, ==, 0);
1139 call->rx_data_post = 1;
1140 read_lock_bh(&call->state_lock);
1141 if (call->state < RXRPC_CALL_COMPLETE)
4c198ad1 1142 set_bit(RXRPC_CALL_EV_DRAIN_RX_OOS, &call->events);
17926a79
DH
1143 read_unlock_bh(&call->state_lock);
1144 }
1145
1146 /* drain the out of sequence received packet queue into the packet Rx
1147 * queue */
4c198ad1 1148 if (test_and_clear_bit(RXRPC_CALL_EV_DRAIN_RX_OOS, &call->events)) {
17926a79
DH
1149 while (call->rx_data_post == call->rx_first_oos)
1150 if (rxrpc_drain_rx_oos_queue(call) < 0)
1151 break;
1152 goto maybe_reschedule;
1153 }
1154
1155 /* other events may have been raised since we started checking */
1156 goto maybe_reschedule;
1157
1158send_ACK_with_skew:
563ea7d5 1159 ack.maxSkew = htons(call->ackr_skew);
17926a79 1160send_ACK:
ea82aaec
DH
1161 mtu = call->peer->if_mtu;
1162 mtu -= call->peer->hdrsize;
224711df 1163 ackinfo.maxMTU = htonl(mtu);
817913d8 1164 ackinfo.rwind = htonl(rxrpc_rx_window_size);
224711df
DH
1165
1166 /* permit the peer to send us jumbo packets if it wants to */
817913d8
DH
1167 ackinfo.rxMTU = htonl(rxrpc_rx_mtu);
1168 ackinfo.jumbo_max = htonl(rxrpc_rx_jumbo_max);
224711df 1169
0d12f8a4
DH
1170 serial = atomic_inc_return(&call->conn->serial);
1171 whdr.serial = htonl(serial);
17926a79 1172 _proto("Tx ACK %%%u { m=%hu f=#%u p=#%u s=%%%u r=%s n=%u }",
0d12f8a4 1173 serial,
17926a79
DH
1174 ntohs(ack.maxSkew),
1175 ntohl(ack.firstPacket),
1176 ntohl(ack.previousPacket),
1177 ntohl(ack.serial),
08d4d217 1178 rxrpc_acks(ack.reason),
17926a79
DH
1179 ack.nAcks);
1180
1181 del_timer_sync(&call->ack_timer);
1182 if (ack.nAcks > 0)
1183 set_bit(RXRPC_CALL_TX_SOFT_ACK, &call->flags);
1184 goto send_message_2;
1185
1186send_message:
1187 _debug("send message");
1188
0d12f8a4
DH
1189 serial = atomic_inc_return(&call->conn->serial);
1190 whdr.serial = htonl(serial);
1191 _proto("Tx %s %%%u", rxrpc_pkts[whdr.type], serial);
17926a79
DH
1192send_message_2:
1193
1194 len = iov[0].iov_len;
1195 ioc = 1;
1196 if (iov[4].iov_len) {
1197 ioc = 5;
1198 len += iov[4].iov_len;
1199 len += iov[3].iov_len;
1200 len += iov[2].iov_len;
1201 len += iov[1].iov_len;
1202 } else if (iov[3].iov_len) {
1203 ioc = 4;
1204 len += iov[3].iov_len;
1205 len += iov[2].iov_len;
1206 len += iov[1].iov_len;
1207 } else if (iov[2].iov_len) {
1208 ioc = 3;
1209 len += iov[2].iov_len;
1210 len += iov[1].iov_len;
1211 } else if (iov[1].iov_len) {
1212 ioc = 2;
1213 len += iov[1].iov_len;
1214 }
1215
85f32278 1216 ret = kernel_sendmsg(call->conn->params.local->socket,
17926a79
DH
1217 &msg, iov, ioc, len);
1218 if (ret < 0) {
1219 _debug("sendmsg failed: %d", ret);
8d94aa38
DH
1220 if (call->state < RXRPC_CALL_COMPLETE)
1221 requeue = true;
17926a79
DH
1222 goto error;
1223 }
1224
1225 switch (genbit) {
4c198ad1 1226 case RXRPC_CALL_EV_ABORT:
17926a79 1227 clear_bit(genbit, &call->events);
4c198ad1 1228 clear_bit(RXRPC_CALL_EV_RCVD_ABORT, &call->events);
17926a79
DH
1229 goto kill_ACKs;
1230
4c198ad1 1231 case RXRPC_CALL_EV_ACK_FINAL:
f5c17aae 1232 rxrpc_call_completed(call);
17926a79
DH
1233 goto kill_ACKs;
1234
1235 default:
1236 clear_bit(genbit, &call->events);
1237 switch (call->state) {
1238 case RXRPC_CALL_CLIENT_AWAIT_REPLY:
1239 case RXRPC_CALL_CLIENT_RECV_REPLY:
1240 case RXRPC_CALL_SERVER_RECV_REQUEST:
1241 case RXRPC_CALL_SERVER_ACK_REQUEST:
1242 _debug("start ACK timer");
1243 rxrpc_propose_ACK(call, RXRPC_ACK_DELAY,
563ea7d5
DH
1244 call->ackr_skew, call->ackr_serial,
1245 false);
17926a79
DH
1246 default:
1247 break;
1248 }
1249 goto maybe_reschedule;
1250 }
1251
1252kill_ACKs:
1253 del_timer_sync(&call->ack_timer);
4c198ad1 1254 clear_bit(RXRPC_CALL_EV_ACK, &call->events);
17926a79
DH
1255
1256maybe_reschedule:
1257 if (call->events || !skb_queue_empty(&call->rx_queue)) {
8d94aa38
DH
1258 if (call->state < RXRPC_CALL_COMPLETE)
1259 requeue = true;
17926a79
DH
1260 }
1261
1262error:
17926a79
DH
1263 kfree(acks);
1264
8d94aa38 1265 if ((requeue || call->events) && !work_pending(&call->processor)) {
19ffa01c 1266 _debug("jumpstart %x", call->conn->proto.cid);
8d94aa38
DH
1267 __rxrpc_queue_call(call);
1268 } else {
1269 rxrpc_put_call(call, rxrpc_call_put);
17926a79
DH
1270 }
1271
1272 _leave("");
1273 return;
1274
1275no_mem:
1276 _debug("out of memory");
1277 goto maybe_reschedule;
1278}