rxrpc, afs: Use debug_ids rather than pointers in traces
[linux-block.git] / net / rxrpc / call_object.c
CommitLineData
17926a79
DH
1/* RxRPC individual remote procedure call handling
2 *
3 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
9b6d5398
JP
12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
5a0e3ad6 14#include <linux/slab.h>
17926a79
DH
15#include <linux/module.h>
16#include <linux/circ_buf.h>
7727640c 17#include <linux/spinlock_types.h>
17926a79
DH
18#include <net/sock.h>
19#include <net/af_rxrpc.h>
20#include "ar-internal.h"
21
5b8848d1 22const char *const rxrpc_call_states[NR__RXRPC_CALL_STATES] = {
f5c17aae 23 [RXRPC_CALL_UNINITIALISED] = "Uninit ",
999b69f8 24 [RXRPC_CALL_CLIENT_AWAIT_CONN] = "ClWtConn",
1f8481d1
DH
25 [RXRPC_CALL_CLIENT_SEND_REQUEST] = "ClSndReq",
26 [RXRPC_CALL_CLIENT_AWAIT_REPLY] = "ClAwtRpl",
27 [RXRPC_CALL_CLIENT_RECV_REPLY] = "ClRcvRpl",
00e90712 28 [RXRPC_CALL_SERVER_PREALLOC] = "SvPrealc",
1f8481d1
DH
29 [RXRPC_CALL_SERVER_SECURING] = "SvSecure",
30 [RXRPC_CALL_SERVER_ACCEPTING] = "SvAccept",
31 [RXRPC_CALL_SERVER_RECV_REQUEST] = "SvRcvReq",
32 [RXRPC_CALL_SERVER_ACK_REQUEST] = "SvAckReq",
33 [RXRPC_CALL_SERVER_SEND_REPLY] = "SvSndRpl",
34 [RXRPC_CALL_SERVER_AWAIT_ACK] = "SvAwtACK",
35 [RXRPC_CALL_COMPLETE] = "Complete",
f5c17aae
DH
36};
37
38const char *const rxrpc_call_completions[NR__RXRPC_CALL_COMPLETIONS] = {
39 [RXRPC_CALL_SUCCEEDED] = "Complete",
1f8481d1
DH
40 [RXRPC_CALL_REMOTELY_ABORTED] = "RmtAbort",
41 [RXRPC_CALL_LOCALLY_ABORTED] = "LocAbort",
f5c17aae 42 [RXRPC_CALL_LOCAL_ERROR] = "LocError",
1f8481d1 43 [RXRPC_CALL_NETWORK_ERROR] = "NetError",
1f8481d1
DH
44};
45
17926a79 46struct kmem_cache *rxrpc_call_jar;
17926a79 47
e99e88a9 48static void rxrpc_call_timer_expired(struct timer_list *t)
248f219c 49{
e99e88a9 50 struct rxrpc_call *call = from_timer(call, t, timer);
248f219c
DH
51
52 _enter("%d", call->debug_id);
53
a158bdd3
DH
54 if (call->state < RXRPC_CALL_COMPLETE) {
55 trace_rxrpc_timer(call, rxrpc_timer_expired, jiffies);
56 rxrpc_queue_call(call);
57 }
248f219c 58}
17926a79 59
9faaff59
DH
60static struct lock_class_key rxrpc_call_user_mutex_lock_class_key;
61
2341e077
DH
62/*
63 * find an extant server call
64 * - called in process context with IRQs enabled
65 */
66struct rxrpc_call *rxrpc_find_call_by_user_ID(struct rxrpc_sock *rx,
67 unsigned long user_call_ID)
68{
69 struct rxrpc_call *call;
70 struct rb_node *p;
71
72 _enter("%p,%lx", rx, user_call_ID);
73
74 read_lock(&rx->call_lock);
75
76 p = rx->calls.rb_node;
77 while (p) {
78 call = rb_entry(p, struct rxrpc_call, sock_node);
79
80 if (user_call_ID < call->user_call_ID)
81 p = p->rb_left;
82 else if (user_call_ID > call->user_call_ID)
83 p = p->rb_right;
84 else
85 goto found_extant_call;
86 }
87
88 read_unlock(&rx->call_lock);
89 _leave(" = NULL");
90 return NULL;
91
92found_extant_call:
fff72429 93 rxrpc_get_call(call, rxrpc_call_got);
2341e077
DH
94 read_unlock(&rx->call_lock);
95 _leave(" = %p [%d]", call, atomic_read(&call->usage));
96 return call;
97}
98
17926a79
DH
99/*
100 * allocate a new call
101 */
a25e21f0
DH
102struct rxrpc_call *rxrpc_alloc_call(struct rxrpc_sock *rx, gfp_t gfp,
103 unsigned int debug_id)
17926a79
DH
104{
105 struct rxrpc_call *call;
106
107 call = kmem_cache_zalloc(rxrpc_call_jar, gfp);
108 if (!call)
109 return NULL;
110
248f219c
DH
111 call->rxtx_buffer = kcalloc(RXRPC_RXTX_BUFF_SIZE,
112 sizeof(struct sk_buff *),
17926a79 113 gfp);
248f219c
DH
114 if (!call->rxtx_buffer)
115 goto nomem;
17926a79 116
248f219c
DH
117 call->rxtx_annotations = kcalloc(RXRPC_RXTX_BUFF_SIZE, sizeof(u8), gfp);
118 if (!call->rxtx_annotations)
119 goto nomem_2;
120
540b1c48 121 mutex_init(&call->user_mutex);
9faaff59
DH
122
123 /* Prevent lockdep reporting a deadlock false positive between the afs
124 * filesystem and sys_sendmsg() via the mmap sem.
125 */
126 if (rx->sk.sk_kern_sock)
127 lockdep_set_class(&call->user_mutex,
128 &rxrpc_call_user_mutex_lock_class_key);
129
e99e88a9 130 timer_setup(&call->timer, rxrpc_call_timer_expired, 0);
17926a79 131 INIT_WORK(&call->processor, &rxrpc_process_call);
999b69f8 132 INIT_LIST_HEAD(&call->link);
45025bce 133 INIT_LIST_HEAD(&call->chan_wait_link);
17926a79 134 INIT_LIST_HEAD(&call->accept_link);
248f219c
DH
135 INIT_LIST_HEAD(&call->recvmsg_link);
136 INIT_LIST_HEAD(&call->sock_link);
45025bce 137 init_waitqueue_head(&call->waitq);
17926a79 138 spin_lock_init(&call->lock);
20acbd9a 139 spin_lock_init(&call->notify_lock);
17926a79
DH
140 rwlock_init(&call->state_lock);
141 atomic_set(&call->usage, 1);
a25e21f0 142 call->debug_id = debug_id;
e754eba6 143 call->tx_total_len = -1;
a158bdd3
DH
144 call->next_rx_timo = 20 * HZ;
145 call->next_req_timo = 1 * HZ;
17926a79
DH
146
147 memset(&call->sock_node, 0xed, sizeof(call->sock_node));
148
248f219c 149 /* Leave space in the ring to handle a maxed-out jumbo packet */
75e42126 150 call->rx_winsize = rxrpc_rx_window_size;
248f219c
DH
151 call->tx_winsize = 16;
152 call->rx_expect_next = 1;
57494343 153
f7aec129 154 call->cong_cwnd = 2;
57494343 155 call->cong_ssthresh = RXRPC_RXTX_BUFF_SIZE - 1;
17926a79 156 return call;
248f219c
DH
157
158nomem_2:
159 kfree(call->rxtx_buffer);
160nomem:
161 kmem_cache_free(rxrpc_call_jar, call);
162 return NULL;
17926a79
DH
163}
164
165/*
999b69f8 166 * Allocate a new client call.
17926a79 167 */
9faaff59
DH
168static struct rxrpc_call *rxrpc_alloc_client_call(struct rxrpc_sock *rx,
169 struct sockaddr_rxrpc *srx,
a25e21f0
DH
170 gfp_t gfp,
171 unsigned int debug_id)
17926a79
DH
172{
173 struct rxrpc_call *call;
57494343 174 ktime_t now;
17926a79
DH
175
176 _enter("");
177
a25e21f0 178 call = rxrpc_alloc_call(rx, gfp, debug_id);
17926a79
DH
179 if (!call)
180 return ERR_PTR(-ENOMEM);
999b69f8 181 call->state = RXRPC_CALL_CLIENT_AWAIT_CONN;
999b69f8 182 call->service_id = srx->srx_service;
71f3ca40 183 call->tx_phase = true;
57494343
DH
184 now = ktime_get_real();
185 call->acks_latest_ts = now;
186 call->cong_tstamp = now;
999b69f8
DH
187
188 _leave(" = %p", call);
189 return call;
190}
191
192/*
248f219c 193 * Initiate the call ack/resend/expiry timer.
999b69f8 194 */
248f219c 195static void rxrpc_start_call_timer(struct rxrpc_call *call)
999b69f8 196{
a158bdd3
DH
197 unsigned long now = jiffies;
198 unsigned long j = now + MAX_JIFFY_OFFSET;
199
200 call->ack_at = j;
bd1fdf8c 201 call->ack_lost_at = j;
a158bdd3
DH
202 call->resend_at = j;
203 call->ping_at = j;
204 call->expect_rx_by = j;
205 call->expect_req_by = j;
206 call->expect_term_by = j;
207 call->timer.expires = now;
17926a79
DH
208}
209
210/*
540b1c48
DH
211 * Set up a call for the given parameters.
212 * - Called with the socket lock held, which it must release.
213 * - If it returns a call, the call's lock will need releasing by the caller.
17926a79 214 */
2341e077 215struct rxrpc_call *rxrpc_new_client_call(struct rxrpc_sock *rx,
19ffa01c 216 struct rxrpc_conn_parameters *cp,
999b69f8 217 struct sockaddr_rxrpc *srx,
48124178 218 struct rxrpc_call_params *p,
a25e21f0
DH
219 gfp_t gfp,
220 unsigned int debug_id)
540b1c48 221 __releases(&rx->sk.sk_lock.slock)
17926a79 222{
2341e077 223 struct rxrpc_call *call, *xcall;
2baec2c3 224 struct rxrpc_net *rxnet = rxrpc_net(sock_net(&rx->sk));
2341e077 225 struct rb_node *parent, **pp;
e34d4234 226 const void *here = __builtin_return_address(0);
999b69f8 227 int ret;
17926a79 228
48124178 229 _enter("%p,%lx", rx, p->user_call_ID);
17926a79 230
a25e21f0 231 call = rxrpc_alloc_client_call(rx, srx, gfp, debug_id);
2341e077 232 if (IS_ERR(call)) {
540b1c48 233 release_sock(&rx->sk);
2341e077
DH
234 _leave(" = %ld", PTR_ERR(call));
235 return call;
17926a79
DH
236 }
237
48124178 238 call->tx_total_len = p->tx_total_len;
a84a46d7 239 trace_rxrpc_call(call, rxrpc_call_new_client, atomic_read(&call->usage),
48124178 240 here, (const void *)p->user_call_ID);
e34d4234 241
540b1c48
DH
242 /* We need to protect a partially set up call against the user as we
243 * will be acting outside the socket lock.
244 */
245 mutex_lock(&call->user_mutex);
246
999b69f8 247 /* Publish the call, even though it is incompletely set up as yet */
17926a79
DH
248 write_lock(&rx->call_lock);
249
250 pp = &rx->calls.rb_node;
251 parent = NULL;
252 while (*pp) {
253 parent = *pp;
2341e077 254 xcall = rb_entry(parent, struct rxrpc_call, sock_node);
17926a79 255
48124178 256 if (p->user_call_ID < xcall->user_call_ID)
17926a79 257 pp = &(*pp)->rb_left;
48124178 258 else if (p->user_call_ID > xcall->user_call_ID)
17926a79
DH
259 pp = &(*pp)->rb_right;
260 else
357f5ef6 261 goto error_dup_user_ID;
17926a79
DH
262 }
263
248f219c 264 rcu_assign_pointer(call->socket, rx);
48124178 265 call->user_call_ID = p->user_call_ID;
357f5ef6 266 __set_bit(RXRPC_CALL_HAS_USERID, &call->flags);
fff72429 267 rxrpc_get_call(call, rxrpc_call_got_userid);
17926a79
DH
268 rb_link_node(&call->sock_node, parent, pp);
269 rb_insert_color(&call->sock_node, &rx->calls);
248f219c
DH
270 list_add(&call->sock_link, &rx->sock_calls);
271
17926a79
DH
272 write_unlock(&rx->call_lock);
273
2baec2c3
DH
274 write_lock(&rxnet->call_lock);
275 list_add_tail(&call->link, &rxnet->calls);
276 write_unlock(&rxnet->call_lock);
17926a79 277
540b1c48
DH
278 /* From this point on, the call is protected by its own lock. */
279 release_sock(&rx->sk);
280
248f219c
DH
281 /* Set up or get a connection record and set the protocol parameters,
282 * including channel number and call ID.
283 */
284 ret = rxrpc_connect_call(call, cp, srx, gfp);
999b69f8
DH
285 if (ret < 0)
286 goto error;
287
a84a46d7 288 trace_rxrpc_call(call, rxrpc_call_connected, atomic_read(&call->usage),
54fde423 289 here, NULL);
a84a46d7 290
248f219c
DH
291 rxrpc_start_call_timer(call);
292
17926a79
DH
293 _net("CALL new %d on CONN %d", call->debug_id, call->conn->debug_id);
294
295 _leave(" = %p [new]", call);
296 return call;
297
2341e077
DH
298 /* We unexpectedly found the user ID in the list after taking
299 * the call_lock. This shouldn't happen unless the user races
300 * with itself and tries to add the same user ID twice at the
301 * same time in different threads.
302 */
357f5ef6 303error_dup_user_ID:
17926a79 304 write_unlock(&rx->call_lock);
540b1c48 305 release_sock(&rx->sk);
8d94aa38 306 ret = -EEXIST;
357f5ef6
DH
307
308error:
309 __rxrpc_set_call_completion(call, RXRPC_CALL_LOCAL_ERROR,
310 RX_CALL_DEAD, ret);
a84a46d7
DH
311 trace_rxrpc_call(call, rxrpc_call_error, atomic_read(&call->usage),
312 here, ERR_PTR(ret));
357f5ef6 313 rxrpc_release_call(rx, call);
540b1c48 314 mutex_unlock(&call->user_mutex);
357f5ef6
DH
315 rxrpc_put_call(call, rxrpc_call_put);
316 _leave(" = %d", ret);
317 return ERR_PTR(ret);
17926a79
DH
318}
319
c038a58c
DH
320/*
321 * Retry a call to a new address. It is expected that the Tx queue of the call
322 * will contain data previously packaged for an old call.
323 */
324int rxrpc_retry_client_call(struct rxrpc_sock *rx,
325 struct rxrpc_call *call,
326 struct rxrpc_conn_parameters *cp,
327 struct sockaddr_rxrpc *srx,
328 gfp_t gfp)
329{
330 const void *here = __builtin_return_address(0);
331 int ret;
332
333 /* Set up or get a connection record and set the protocol parameters,
334 * including channel number and call ID.
335 */
336 ret = rxrpc_connect_call(call, cp, srx, gfp);
337 if (ret < 0)
338 goto error;
339
340 trace_rxrpc_call(call, rxrpc_call_connected, atomic_read(&call->usage),
341 here, NULL);
342
343 rxrpc_start_call_timer(call);
344
345 _net("CALL new %d on CONN %d", call->debug_id, call->conn->debug_id);
346
347 if (!test_and_set_bit(RXRPC_CALL_EV_RESEND, &call->events))
348 rxrpc_queue_call(call);
349
350 _leave(" = 0");
351 return 0;
352
353error:
354 rxrpc_set_call_completion(call, RXRPC_CALL_LOCAL_ERROR,
355 RX_CALL_DEAD, ret);
356 trace_rxrpc_call(call, rxrpc_call_error, atomic_read(&call->usage),
357 here, ERR_PTR(ret));
358 _leave(" = %d", ret);
359 return ret;
360}
361
17926a79 362/*
248f219c
DH
363 * Set up an incoming call. call->conn points to the connection.
364 * This is called in BH context and isn't allowed to fail.
17926a79 365 */
248f219c
DH
366void rxrpc_incoming_call(struct rxrpc_sock *rx,
367 struct rxrpc_call *call,
368 struct sk_buff *skb)
17926a79 369{
248f219c 370 struct rxrpc_connection *conn = call->conn;
42886ffe 371 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
248f219c 372 u32 chan;
17926a79 373
248f219c 374 _enter(",%d", call->conn->debug_id);
e34d4234 375
248f219c
DH
376 rcu_assign_pointer(call->socket, rx);
377 call->call_id = sp->hdr.callNumber;
378 call->service_id = sp->hdr.serviceId;
379 call->cid = sp->hdr.cid;
380 call->state = RXRPC_CALL_SERVER_ACCEPTING;
381 if (sp->hdr.securityIndex > 0)
382 call->state = RXRPC_CALL_SERVER_SECURING;
57494343 383 call->cong_tstamp = skb->tstamp;
248f219c
DH
384
385 /* Set the channel for this call. We don't get channel_lock as we're
386 * only defending against the data_ready handler (which we're called
387 * from) and the RESPONSE packet parser (which is only really
388 * interested in call_counter and can cope with a disagreement with the
389 * call pointer).
a1399f8b 390 */
248f219c
DH
391 chan = sp->hdr.cid & RXRPC_CHANNELMASK;
392 conn->channels[chan].call_counter = call->call_id;
393 conn->channels[chan].call_id = call->call_id;
a1399f8b 394 rcu_assign_pointer(conn->channels[chan].call, call);
17926a79 395
85f32278
DH
396 spin_lock(&conn->params.peer->lock);
397 hlist_add_head(&call->error_link, &conn->params.peer->error_targets);
398 spin_unlock(&conn->params.peer->lock);
17926a79 399
17926a79
DH
400 _net("CALL incoming %d on CONN %d", call->debug_id, call->conn->debug_id);
401
248f219c
DH
402 rxrpc_start_call_timer(call);
403 _leave("");
17926a79
DH
404}
405
8d94aa38
DH
406/*
407 * Queue a call's work processor, getting a ref to pass to the work queue.
408 */
409bool rxrpc_queue_call(struct rxrpc_call *call)
410{
411 const void *here = __builtin_return_address(0);
412 int n = __atomic_add_unless(&call->usage, 1, 0);
8d94aa38
DH
413 if (n == 0)
414 return false;
415 if (rxrpc_queue_work(&call->processor))
2ab27215 416 trace_rxrpc_call(call, rxrpc_call_queued, n + 1, here, NULL);
8d94aa38
DH
417 else
418 rxrpc_put_call(call, rxrpc_call_put_noqueue);
419 return true;
420}
421
422/*
423 * Queue a call's work processor, passing the callers ref to the work queue.
424 */
425bool __rxrpc_queue_call(struct rxrpc_call *call)
426{
427 const void *here = __builtin_return_address(0);
428 int n = atomic_read(&call->usage);
8d94aa38
DH
429 ASSERTCMP(n, >=, 1);
430 if (rxrpc_queue_work(&call->processor))
2ab27215 431 trace_rxrpc_call(call, rxrpc_call_queued_ref, n, here, NULL);
8d94aa38
DH
432 else
433 rxrpc_put_call(call, rxrpc_call_put_noqueue);
434 return true;
435}
436
e34d4234
DH
437/*
438 * Note the re-emergence of a call.
439 */
440void rxrpc_see_call(struct rxrpc_call *call)
441{
442 const void *here = __builtin_return_address(0);
443 if (call) {
444 int n = atomic_read(&call->usage);
e34d4234 445
2ab27215 446 trace_rxrpc_call(call, rxrpc_call_seen, n, here, NULL);
e34d4234
DH
447 }
448}
449
450/*
451 * Note the addition of a ref on a call.
452 */
fff72429 453void rxrpc_get_call(struct rxrpc_call *call, enum rxrpc_call_trace op)
e34d4234
DH
454{
455 const void *here = __builtin_return_address(0);
456 int n = atomic_inc_return(&call->usage);
e34d4234 457
2ab27215 458 trace_rxrpc_call(call, op, n, here, NULL);
e34d4234
DH
459}
460
461/*
248f219c 462 * Detach a call from its owning socket.
e34d4234 463 */
248f219c 464void rxrpc_release_call(struct rxrpc_sock *rx, struct rxrpc_call *call)
e34d4234 465{
a84a46d7 466 const void *here = __builtin_return_address(0);
248f219c
DH
467 struct rxrpc_connection *conn = call->conn;
468 bool put = false;
469 int i;
e34d4234 470
248f219c 471 _enter("{%d,%d}", call->debug_id, atomic_read(&call->usage));
e34d4234 472
a84a46d7
DH
473 trace_rxrpc_call(call, rxrpc_call_release, atomic_read(&call->usage),
474 here, (const void *)call->flags);
17926a79 475
a84a46d7 476 ASSERTCMP(call->state, ==, RXRPC_CALL_COMPLETE);
e34d4234 477
17926a79
DH
478 spin_lock_bh(&call->lock);
479 if (test_and_set_bit(RXRPC_CALL_RELEASED, &call->flags))
480 BUG();
481 spin_unlock_bh(&call->lock);
482
248f219c 483 del_timer_sync(&call->timer);
17926a79 484
248f219c
DH
485 /* Make sure we don't get any more notifications */
486 write_lock_bh(&rx->recvmsg_lock);
e653cfe4 487
248f219c 488 if (!list_empty(&call->recvmsg_link)) {
17926a79
DH
489 _debug("unlinking once-pending call %p { e=%lx f=%lx }",
490 call, call->events, call->flags);
248f219c
DH
491 list_del(&call->recvmsg_link);
492 put = true;
493 }
494
495 /* list_empty() must return false in rxrpc_notify_socket() */
496 call->recvmsg_link.next = NULL;
497 call->recvmsg_link.prev = NULL;
498
499 write_unlock_bh(&rx->recvmsg_lock);
500 if (put)
501 rxrpc_put_call(call, rxrpc_call_put);
502
503 write_lock(&rx->call_lock);
504
505 if (test_and_clear_bit(RXRPC_CALL_HAS_USERID, &call->flags)) {
17926a79
DH
506 rb_erase(&call->sock_node, &rx->calls);
507 memset(&call->sock_node, 0xdd, sizeof(call->sock_node));
8d94aa38 508 rxrpc_put_call(call, rxrpc_call_put_userid);
17926a79 509 }
17926a79 510
248f219c
DH
511 list_del(&call->sock_link);
512 write_unlock(&rx->call_lock);
513
514 _debug("RELEASE CALL %p (%d CONN %p)", call, call->debug_id, conn);
515
516 if (conn)
8d94aa38 517 rxrpc_disconnect_call(call);
e653cfe4 518
248f219c 519 for (i = 0; i < RXRPC_RXTX_BUFF_SIZE; i++) {
71f3ca40
DH
520 rxrpc_free_skb(call->rxtx_buffer[i],
521 (call->tx_phase ? rxrpc_skb_tx_cleaned :
522 rxrpc_skb_rx_cleaned));
248f219c 523 call->rxtx_buffer[i] = NULL;
17926a79 524 }
17926a79
DH
525
526 _leave("");
527}
528
c038a58c
DH
529/*
530 * Prepare a kernel service call for retry.
531 */
532int rxrpc_prepare_call_for_retry(struct rxrpc_sock *rx, struct rxrpc_call *call)
533{
534 const void *here = __builtin_return_address(0);
535 int i;
536 u8 last = 0;
537
538 _enter("{%d,%d}", call->debug_id, atomic_read(&call->usage));
539
540 trace_rxrpc_call(call, rxrpc_call_release, atomic_read(&call->usage),
541 here, (const void *)call->flags);
542
543 ASSERTCMP(call->state, ==, RXRPC_CALL_COMPLETE);
544 ASSERTCMP(call->completion, !=, RXRPC_CALL_REMOTELY_ABORTED);
545 ASSERTCMP(call->completion, !=, RXRPC_CALL_LOCALLY_ABORTED);
546 ASSERT(list_empty(&call->recvmsg_link));
547
548 del_timer_sync(&call->timer);
549
550 _debug("RELEASE CALL %p (%d CONN %p)", call, call->debug_id, call->conn);
551
552 if (call->conn)
553 rxrpc_disconnect_call(call);
554
555 if (rxrpc_is_service_call(call) ||
556 !call->tx_phase ||
557 call->tx_hard_ack != 0 ||
558 call->rx_hard_ack != 0 ||
559 call->rx_top != 0)
560 return -EINVAL;
561
562 call->state = RXRPC_CALL_UNINITIALISED;
563 call->completion = RXRPC_CALL_SUCCEEDED;
564 call->call_id = 0;
565 call->cid = 0;
566 call->cong_cwnd = 0;
567 call->cong_extra = 0;
568 call->cong_ssthresh = 0;
569 call->cong_mode = 0;
570 call->cong_dup_acks = 0;
571 call->cong_cumul_acks = 0;
572 call->acks_lowest_nak = 0;
573
574 for (i = 0; i < RXRPC_RXTX_BUFF_SIZE; i++) {
575 last |= call->rxtx_annotations[i];
576 call->rxtx_annotations[i] &= RXRPC_TX_ANNO_LAST;
577 call->rxtx_annotations[i] |= RXRPC_TX_ANNO_RETRANS;
578 }
579
580 _leave(" = 0");
581 return 0;
582}
583
17926a79
DH
584/*
585 * release all the calls associated with a socket
586 */
587void rxrpc_release_calls_on_socket(struct rxrpc_sock *rx)
588{
589 struct rxrpc_call *call;
17926a79
DH
590
591 _enter("%p", rx);
592
0360da6d
DH
593 while (!list_empty(&rx->to_be_accepted)) {
594 call = list_entry(rx->to_be_accepted.next,
595 struct rxrpc_call, accept_link);
596 list_del(&call->accept_link);
3a92789a 597 rxrpc_abort_call("SKR", call, 0, RX_CALL_DEAD, -ECONNRESET);
0360da6d
DH
598 rxrpc_put_call(call, rxrpc_call_put);
599 }
600
248f219c
DH
601 while (!list_empty(&rx->sock_calls)) {
602 call = list_entry(rx->sock_calls.next,
603 struct rxrpc_call, sock_link);
604 rxrpc_get_call(call, rxrpc_call_got);
3a92789a 605 rxrpc_abort_call("SKT", call, 0, RX_CALL_DEAD, -ECONNRESET);
26cb02aa 606 rxrpc_send_abort_packet(call);
8d94aa38 607 rxrpc_release_call(rx, call);
248f219c 608 rxrpc_put_call(call, rxrpc_call_put);
f36b5e44
DH
609 }
610
17926a79
DH
611 _leave("");
612}
613
614/*
615 * release a call
616 */
fff72429 617void rxrpc_put_call(struct rxrpc_call *call, enum rxrpc_call_trace op)
17926a79 618{
2baec2c3 619 struct rxrpc_net *rxnet;
e34d4234 620 const void *here = __builtin_return_address(0);
2ab27215 621 int n;
17926a79 622
e34d4234 623 ASSERT(call != NULL);
17926a79 624
e34d4234 625 n = atomic_dec_return(&call->usage);
2ab27215 626 trace_rxrpc_call(call, op, n, here, NULL);
e34d4234
DH
627 ASSERTCMP(n, >=, 0);
628 if (n == 0) {
629 _debug("call %d dead", call->debug_id);
248f219c 630 ASSERTCMP(call->state, ==, RXRPC_CALL_COMPLETE);
17926a79 631
2baec2c3
DH
632 if (!list_empty(&call->link)) {
633 rxnet = rxrpc_net(sock_net(&call->socket->sk));
634 write_lock(&rxnet->call_lock);
635 list_del_init(&call->link);
636 write_unlock(&rxnet->call_lock);
637 }
e34d4234 638
8d94aa38 639 rxrpc_cleanup_call(call);
17926a79 640 }
17926a79
DH
641}
642
dee46364
DH
643/*
644 * Final call destruction under RCU.
645 */
646static void rxrpc_rcu_destroy_call(struct rcu_head *rcu)
647{
648 struct rxrpc_call *call = container_of(rcu, struct rxrpc_call, rcu);
649
df5d8bf7 650 rxrpc_put_peer(call->peer);
248f219c
DH
651 kfree(call->rxtx_buffer);
652 kfree(call->rxtx_annotations);
dee46364
DH
653 kmem_cache_free(rxrpc_call_jar, call);
654}
655
17926a79
DH
656/*
657 * clean up a call
658 */
00e90712 659void rxrpc_cleanup_call(struct rxrpc_call *call)
17926a79 660{
248f219c 661 int i;
17926a79 662
248f219c 663 _net("DESTROY CALL %d", call->debug_id);
17926a79
DH
664
665 memset(&call->sock_node, 0xcd, sizeof(call->sock_node));
666
248f219c 667 del_timer_sync(&call->timer);
17926a79 668
8d94aa38 669 ASSERTCMP(call->state, ==, RXRPC_CALL_COMPLETE);
17926a79 670 ASSERT(test_bit(RXRPC_CALL_RELEASED, &call->flags));
e653cfe4 671 ASSERTCMP(call->conn, ==, NULL);
17926a79 672
248f219c
DH
673 /* Clean up the Rx/Tx buffer */
674 for (i = 0; i < RXRPC_RXTX_BUFF_SIZE; i++)
71f3ca40
DH
675 rxrpc_free_skb(call->rxtx_buffer[i],
676 (call->tx_phase ? rxrpc_skb_tx_cleaned :
677 rxrpc_skb_rx_cleaned));
17926a79 678
71f3ca40 679 rxrpc_free_skb(call->tx_pending, rxrpc_skb_tx_cleaned);
17926a79 680
dee46364 681 call_rcu(&call->rcu, rxrpc_rcu_destroy_call);
17926a79
DH
682}
683
684/*
2baec2c3
DH
685 * Make sure that all calls are gone from a network namespace. To reach this
686 * point, any open UDP sockets in that namespace must have been closed, so any
687 * outstanding calls cannot be doing I/O.
17926a79 688 */
2baec2c3 689void rxrpc_destroy_all_calls(struct rxrpc_net *rxnet)
17926a79
DH
690{
691 struct rxrpc_call *call;
692
693 _enter("");
8d94aa38 694
2baec2c3 695 if (list_empty(&rxnet->calls))
8d94aa38 696 return;
248f219c 697
2baec2c3 698 write_lock(&rxnet->call_lock);
17926a79 699
2baec2c3
DH
700 while (!list_empty(&rxnet->calls)) {
701 call = list_entry(rxnet->calls.next, struct rxrpc_call, link);
17926a79
DH
702 _debug("Zapping call %p", call);
703
e34d4234 704 rxrpc_see_call(call);
17926a79
DH
705 list_del_init(&call->link);
706
248f219c 707 pr_err("Call %p still in use (%d,%s,%lx,%lx)!\n",
8d94aa38 708 call, atomic_read(&call->usage),
8d94aa38
DH
709 rxrpc_call_states[call->state],
710 call->flags, call->events);
17926a79 711
2baec2c3 712 write_unlock(&rxnet->call_lock);
17926a79 713 cond_resched();
2baec2c3 714 write_lock(&rxnet->call_lock);
17926a79
DH
715 }
716
2baec2c3 717 write_unlock(&rxnet->call_lock);
17926a79 718}