]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/blame - net/rxrpc/conn_client.c
Merge tag 'kbuild-v5.2' of git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy...
[mirror_ubuntu-focal-kernel.git] / net / rxrpc / conn_client.c
CommitLineData
4a3388c8
DH
1/* Client connection-specific management code.
2 *
3 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public Licence
8 * as published by the Free Software Foundation; either version
9 * 2 of the Licence, or (at your option) any later version.
45025bce
DH
10 *
11 *
12 * Client connections need to be cached for a little while after they've made a
13 * call so as to handle retransmitted DATA packets in case the server didn't
14 * receive the final ACK or terminating ABORT we sent it.
15 *
16 * Client connections can be in one of a number of cache states:
17 *
18 * (1) INACTIVE - The connection is not held in any list and may not have been
19 * exposed to the world. If it has been previously exposed, it was
20 * discarded from the idle list after expiring.
21 *
22 * (2) WAITING - The connection is waiting for the number of client conns to
23 * drop below the maximum capacity. Calls may be in progress upon it from
24 * when it was active and got culled.
25 *
26 * The connection is on the rxrpc_waiting_client_conns list which is kept
27 * in to-be-granted order. Culled conns with waiters go to the back of
28 * the queue just like new conns.
29 *
30 * (3) ACTIVE - The connection has at least one call in progress upon it, it
31 * may freely grant available channels to new calls and calls may be
32 * waiting on it for channels to become available.
33 *
2baec2c3 34 * The connection is on the rxnet->active_client_conns list which is kept
45025bce
DH
35 * in activation order for culling purposes.
36 *
37 * rxrpc_nr_active_client_conns is held incremented also.
38 *
4e255721
DH
39 * (4) UPGRADE - As for ACTIVE, but only one call may be in progress and is
40 * being used to probe for service upgrade.
41 *
42 * (5) CULLED - The connection got summarily culled to try and free up
45025bce
DH
43 * capacity. Calls currently in progress on the connection are allowed to
44 * continue, but new calls will have to wait. There can be no waiters in
45 * this state - the conn would have to go to the WAITING state instead.
46 *
4e255721 47 * (6) IDLE - The connection has no calls in progress upon it and must have
45025bce
DH
48 * been exposed to the world (ie. the EXPOSED flag must be set). When it
49 * expires, the EXPOSED flag is cleared and the connection transitions to
50 * the INACTIVE state.
51 *
2baec2c3 52 * The connection is on the rxnet->idle_client_conns list which is kept in
45025bce
DH
53 * order of how soon they'll expire.
54 *
55 * There are flags of relevance to the cache:
56 *
57 * (1) EXPOSED - The connection ID got exposed to the world. If this flag is
58 * set, an extra ref is added to the connection preventing it from being
59 * reaped when it has no calls outstanding. This flag is cleared and the
60 * ref dropped when a conn is discarded from the idle list.
61 *
62 * This allows us to move terminal call state retransmission to the
63 * connection and to discard the call immediately we think it is done
64 * with. It also give us a chance to reuse the connection.
65 *
66 * (2) DONT_REUSE - The connection should be discarded as soon as possible and
67 * should not be reused. This is set when an exclusive connection is used
68 * or a call ID counter overflows.
69 *
70 * The caching state may only be changed if the cache lock is held.
71 *
72 * There are two idle client connection expiry durations. If the total number
73 * of connections is below the reap threshold, we use the normal duration; if
74 * it's above, we use the fast duration.
4a3388c8
DH
75 */
76
77#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
78
79#include <linux/slab.h>
80#include <linux/idr.h>
81#include <linux/timer.h>
174cd4b1
IM
82#include <linux/sched/signal.h>
83
4a3388c8
DH
84#include "ar-internal.h"
85
45025bce
DH
86__read_mostly unsigned int rxrpc_max_client_connections = 1000;
87__read_mostly unsigned int rxrpc_reap_client_connections = 900;
a158bdd3
DH
88__read_mostly unsigned long rxrpc_conn_idle_client_expiry = 2 * 60 * HZ;
89__read_mostly unsigned long rxrpc_conn_idle_client_fast_expiry = 2 * HZ;
45025bce 90
4a3388c8
DH
91/*
92 * We use machine-unique IDs for our client connections.
93 */
94DEFINE_IDR(rxrpc_client_conn_ids);
95static DEFINE_SPINLOCK(rxrpc_conn_id_lock);
96
2baec2c3 97static void rxrpc_cull_active_client_conns(struct rxrpc_net *);
45025bce 98
4a3388c8
DH
99/*
100 * Get a connection ID and epoch for a client connection from the global pool.
101 * The connection struct pointer is then recorded in the idr radix tree. The
090f85de
DH
102 * epoch doesn't change until the client is rebooted (or, at least, unless the
103 * module is unloaded).
4a3388c8 104 */
c6d2b8d7
DH
105static int rxrpc_get_client_connection_id(struct rxrpc_connection *conn,
106 gfp_t gfp)
4a3388c8 107{
2baec2c3 108 struct rxrpc_net *rxnet = conn->params.local->rxnet;
4a3388c8
DH
109 int id;
110
111 _enter("");
112
113 idr_preload(gfp);
4a3388c8
DH
114 spin_lock(&rxrpc_conn_id_lock);
115
090f85de
DH
116 id = idr_alloc_cyclic(&rxrpc_client_conn_ids, conn,
117 1, 0x40000000, GFP_NOWAIT);
118 if (id < 0)
119 goto error;
4a3388c8
DH
120
121 spin_unlock(&rxrpc_conn_id_lock);
4a3388c8
DH
122 idr_preload_end();
123
2baec2c3 124 conn->proto.epoch = rxnet->epoch;
4a3388c8
DH
125 conn->proto.cid = id << RXRPC_CIDSHIFT;
126 set_bit(RXRPC_CONN_HAS_IDR, &conn->flags);
090f85de 127 _leave(" [CID %x]", conn->proto.cid);
4a3388c8
DH
128 return 0;
129
130error:
131 spin_unlock(&rxrpc_conn_id_lock);
4a3388c8
DH
132 idr_preload_end();
133 _leave(" = %d", id);
134 return id;
135}
136
137/*
138 * Release a connection ID for a client connection from the global pool.
139 */
001c1122 140static void rxrpc_put_client_connection_id(struct rxrpc_connection *conn)
4a3388c8
DH
141{
142 if (test_bit(RXRPC_CONN_HAS_IDR, &conn->flags)) {
143 spin_lock(&rxrpc_conn_id_lock);
144 idr_remove(&rxrpc_client_conn_ids,
145 conn->proto.cid >> RXRPC_CIDSHIFT);
146 spin_unlock(&rxrpc_conn_id_lock);
147 }
148}
eb9b9d22
DH
149
150/*
151 * Destroy the client connection ID tree.
152 */
153void rxrpc_destroy_client_conn_ids(void)
154{
155 struct rxrpc_connection *conn;
156 int id;
157
158 if (!idr_is_empty(&rxrpc_client_conn_ids)) {
159 idr_for_each_entry(&rxrpc_client_conn_ids, conn, id) {
160 pr_err("AF_RXRPC: Leaked client conn %p {%d}\n",
161 conn, atomic_read(&conn->usage));
162 }
163 BUG();
164 }
165
166 idr_destroy(&rxrpc_client_conn_ids);
167}
c6d2b8d7
DH
168
169/*
45025bce 170 * Allocate a client connection.
c6d2b8d7
DH
171 */
172static struct rxrpc_connection *
173rxrpc_alloc_client_connection(struct rxrpc_conn_parameters *cp, gfp_t gfp)
174{
175 struct rxrpc_connection *conn;
2baec2c3 176 struct rxrpc_net *rxnet = cp->local->rxnet;
c6d2b8d7
DH
177 int ret;
178
179 _enter("");
180
181 conn = rxrpc_alloc_connection(gfp);
182 if (!conn) {
183 _leave(" = -ENOMEM");
184 return ERR_PTR(-ENOMEM);
185 }
186
45025bce 187 atomic_set(&conn->usage, 1);
8732db67 188 if (cp->exclusive)
45025bce 189 __set_bit(RXRPC_CONN_DONT_REUSE, &conn->flags);
4e255721
DH
190 if (cp->upgrade)
191 __set_bit(RXRPC_CONN_PROBING_FOR_UPGRADE, &conn->flags);
45025bce 192
c6d2b8d7 193 conn->params = *cp;
c6d2b8d7
DH
194 conn->out_clientflag = RXRPC_CLIENT_INITIATED;
195 conn->state = RXRPC_CONN_CLIENT;
68d6d1ae 196 conn->service_id = cp->service_id;
c6d2b8d7 197
c6d2b8d7
DH
198 ret = rxrpc_get_client_connection_id(conn, gfp);
199 if (ret < 0)
200 goto error_0;
201
202 ret = rxrpc_init_client_conn_security(conn);
203 if (ret < 0)
204 goto error_1;
205
206 ret = conn->security->prime_packet_security(conn);
207 if (ret < 0)
208 goto error_2;
209
31f5f9a1 210 atomic_inc(&rxnet->nr_conns);
2baec2c3
DH
211 write_lock(&rxnet->conn_lock);
212 list_add_tail(&conn->proc_link, &rxnet->conn_proc_list);
213 write_unlock(&rxnet->conn_lock);
c6d2b8d7
DH
214
215 /* We steal the caller's peer ref. */
216 cp->peer = NULL;
217 rxrpc_get_local(conn->params.local);
218 key_get(conn->params.key);
219
363deeab
DH
220 trace_rxrpc_conn(conn, rxrpc_conn_new_client, atomic_read(&conn->usage),
221 __builtin_return_address(0));
222 trace_rxrpc_client(conn, -1, rxrpc_client_alloc);
c6d2b8d7
DH
223 _leave(" = %p", conn);
224 return conn;
225
226error_2:
227 conn->security->clear(conn);
228error_1:
229 rxrpc_put_client_connection_id(conn);
230error_0:
231 kfree(conn);
232 _leave(" = %d", ret);
233 return ERR_PTR(ret);
234}
235
236/*
45025bce 237 * Determine if a connection may be reused.
c6d2b8d7 238 */
45025bce
DH
239static bool rxrpc_may_reuse_conn(struct rxrpc_connection *conn)
240{
2baec2c3 241 struct rxrpc_net *rxnet = conn->params.local->rxnet;
45025bce
DH
242 int id_cursor, id, distance, limit;
243
244 if (test_bit(RXRPC_CONN_DONT_REUSE, &conn->flags))
245 goto dont_reuse;
246
2baec2c3 247 if (conn->proto.epoch != rxnet->epoch)
45025bce
DH
248 goto mark_dont_reuse;
249
250 /* The IDR tree gets very expensive on memory if the connection IDs are
251 * widely scattered throughout the number space, so we shall want to
252 * kill off connections that, say, have an ID more than about four
253 * times the maximum number of client conns away from the current
254 * allocation point to try and keep the IDs concentrated.
255 */
44430612 256 id_cursor = idr_get_cursor(&rxrpc_client_conn_ids);
45025bce
DH
257 id = conn->proto.cid >> RXRPC_CIDSHIFT;
258 distance = id - id_cursor;
259 if (distance < 0)
260 distance = -distance;
44430612 261 limit = max(rxrpc_max_client_connections * 4, 1024U);
45025bce
DH
262 if (distance > limit)
263 goto mark_dont_reuse;
264
265 return true;
266
267mark_dont_reuse:
268 set_bit(RXRPC_CONN_DONT_REUSE, &conn->flags);
269dont_reuse:
270 return false;
271}
272
273/*
274 * Create or find a client connection to use for a call.
275 *
276 * If we return with a connection, the call will be on its waiting list. It's
277 * left to the caller to assign a channel and wake up the call.
278 */
5e33a23b
DH
279static int rxrpc_get_client_conn(struct rxrpc_sock *rx,
280 struct rxrpc_call *call,
45025bce
DH
281 struct rxrpc_conn_parameters *cp,
282 struct sockaddr_rxrpc *srx,
283 gfp_t gfp)
c6d2b8d7
DH
284{
285 struct rxrpc_connection *conn, *candidate = NULL;
286 struct rxrpc_local *local = cp->local;
287 struct rb_node *p, **pp, *parent;
288 long diff;
45025bce 289 int ret = -ENOMEM;
c6d2b8d7
DH
290
291 _enter("{%d,%lx},", call->debug_id, call->user_call_ID);
292
5e33a23b 293 cp->peer = rxrpc_lookup_peer(rx, cp->local, srx, gfp);
c6d2b8d7 294 if (!cp->peer)
45025bce 295 goto error;
c6d2b8d7 296
f7aec129
DH
297 call->cong_cwnd = cp->peer->cong_cwnd;
298 if (call->cong_cwnd >= call->cong_ssthresh)
299 call->cong_mode = RXRPC_CALL_CONGEST_AVOIDANCE;
300 else
301 call->cong_mode = RXRPC_CALL_SLOW_START;
302
45025bce
DH
303 /* If the connection is not meant to be exclusive, search the available
304 * connections to see if the connection we want to use already exists.
305 */
c6d2b8d7 306 if (!cp->exclusive) {
c6d2b8d7
DH
307 _debug("search 1");
308 spin_lock(&local->client_conns_lock);
309 p = local->client_conns.rb_node;
310 while (p) {
311 conn = rb_entry(p, struct rxrpc_connection, client_node);
312
313#define cmp(X) ((long)conn->params.X - (long)cp->X)
314 diff = (cmp(peer) ?:
315 cmp(key) ?:
4e255721
DH
316 cmp(security_level) ?:
317 cmp(upgrade));
45025bce
DH
318#undef cmp
319 if (diff < 0) {
c6d2b8d7 320 p = p->rb_left;
45025bce 321 } else if (diff > 0) {
c6d2b8d7 322 p = p->rb_right;
45025bce
DH
323 } else {
324 if (rxrpc_may_reuse_conn(conn) &&
325 rxrpc_get_connection_maybe(conn))
326 goto found_extant_conn;
327 /* The connection needs replacing. It's better
328 * to effect that when we have something to
329 * replace it with so that we don't have to
330 * rebalance the tree twice.
331 */
332 break;
333 }
c6d2b8d7
DH
334 }
335 spin_unlock(&local->client_conns_lock);
336 }
337
45025bce
DH
338 /* There wasn't a connection yet or we need an exclusive connection.
339 * We need to create a candidate and then potentially redo the search
340 * in case we're racing with another thread also trying to connect on a
341 * shareable connection.
342 */
343 _debug("new conn");
c6d2b8d7 344 candidate = rxrpc_alloc_client_connection(cp, gfp);
45025bce
DH
345 if (IS_ERR(candidate)) {
346 ret = PTR_ERR(candidate);
347 goto error_peer;
c6d2b8d7
DH
348 }
349
45025bce
DH
350 /* Add the call to the new connection's waiting list in case we're
351 * going to have to wait for the connection to come live. It's our
352 * connection, so we want first dibs on the channel slots. We would
353 * normally have to take channel_lock but we do this before anyone else
354 * can see the connection.
355 */
69ffaebb 356 list_add(&call->chan_wait_link, &candidate->waiting_calls);
45025bce 357
c6d2b8d7 358 if (cp->exclusive) {
45025bce 359 call->conn = candidate;
278ac0cd 360 call->security_ix = candidate->security_ix;
68d6d1ae 361 call->service_id = candidate->service_id;
45025bce
DH
362 _leave(" = 0 [exclusive %d]", candidate->debug_id);
363 return 0;
c6d2b8d7
DH
364 }
365
45025bce
DH
366 /* Publish the new connection for userspace to find. We need to redo
367 * the search before doing this lest we race with someone else adding a
368 * conflicting instance.
c6d2b8d7
DH
369 */
370 _debug("search 2");
371 spin_lock(&local->client_conns_lock);
372
373 pp = &local->client_conns.rb_node;
374 parent = NULL;
375 while (*pp) {
376 parent = *pp;
377 conn = rb_entry(parent, struct rxrpc_connection, client_node);
378
45025bce 379#define cmp(X) ((long)conn->params.X - (long)candidate->params.X)
c6d2b8d7
DH
380 diff = (cmp(peer) ?:
381 cmp(key) ?:
4e255721
DH
382 cmp(security_level) ?:
383 cmp(upgrade));
45025bce
DH
384#undef cmp
385 if (diff < 0) {
c6d2b8d7 386 pp = &(*pp)->rb_left;
45025bce 387 } else if (diff > 0) {
c6d2b8d7 388 pp = &(*pp)->rb_right;
45025bce
DH
389 } else {
390 if (rxrpc_may_reuse_conn(conn) &&
391 rxrpc_get_connection_maybe(conn))
392 goto found_extant_conn;
393 /* The old connection is from an outdated epoch. */
394 _debug("replace conn");
395 clear_bit(RXRPC_CONN_IN_CLIENT_CONNS, &conn->flags);
396 rb_replace_node(&conn->client_node,
397 &candidate->client_node,
398 &local->client_conns);
363deeab 399 trace_rxrpc_client(conn, -1, rxrpc_client_replace);
45025bce
DH
400 goto candidate_published;
401 }
c6d2b8d7
DH
402 }
403
c6d2b8d7 404 _debug("new conn");
001c1122
DH
405 rb_link_node(&candidate->client_node, parent, pp);
406 rb_insert_color(&candidate->client_node, &local->client_conns);
c6d2b8d7 407
45025bce
DH
408candidate_published:
409 set_bit(RXRPC_CONN_IN_CLIENT_CONNS, &candidate->flags);
410 call->conn = candidate;
278ac0cd 411 call->security_ix = candidate->security_ix;
68d6d1ae 412 call->service_id = candidate->service_id;
c6d2b8d7 413 spin_unlock(&local->client_conns_lock);
45025bce
DH
414 _leave(" = 0 [new %d]", candidate->debug_id);
415 return 0;
c6d2b8d7 416
45025bce
DH
417 /* We come here if we found a suitable connection already in existence.
418 * Discard any candidate we may have allocated, and try to get a
419 * channel on this one.
420 */
421found_extant_conn:
422 _debug("found conn");
423 spin_unlock(&local->client_conns_lock);
c6d2b8d7 424
363deeab
DH
425 if (candidate) {
426 trace_rxrpc_client(candidate, -1, rxrpc_client_duplicate);
427 rxrpc_put_connection(candidate);
428 candidate = NULL;
429 }
c6d2b8d7 430
45025bce
DH
431 spin_lock(&conn->channel_lock);
432 call->conn = conn;
278ac0cd 433 call->security_ix = conn->security_ix;
68d6d1ae 434 call->service_id = conn->service_id;
69ffaebb 435 list_add_tail(&call->chan_wait_link, &conn->waiting_calls);
c6d2b8d7 436 spin_unlock(&conn->channel_lock);
45025bce
DH
437 _leave(" = 0 [extant %d]", conn->debug_id);
438 return 0;
439
440error_peer:
c6d2b8d7
DH
441 rxrpc_put_peer(cp->peer);
442 cp->peer = NULL;
45025bce
DH
443error:
444 _leave(" = %d", ret);
445 return ret;
446}
c6d2b8d7 447
45025bce
DH
448/*
449 * Activate a connection.
450 */
2baec2c3
DH
451static void rxrpc_activate_conn(struct rxrpc_net *rxnet,
452 struct rxrpc_connection *conn)
45025bce 453{
4e255721
DH
454 if (test_bit(RXRPC_CONN_PROBING_FOR_UPGRADE, &conn->flags)) {
455 trace_rxrpc_client(conn, -1, rxrpc_client_to_upgrade);
456 conn->cache_state = RXRPC_CONN_CLIENT_UPGRADE;
457 } else {
458 trace_rxrpc_client(conn, -1, rxrpc_client_to_active);
459 conn->cache_state = RXRPC_CONN_CLIENT_ACTIVE;
460 }
2baec2c3
DH
461 rxnet->nr_active_client_conns++;
462 list_move_tail(&conn->cache_link, &rxnet->active_client_conns);
45025bce
DH
463}
464
465/*
466 * Attempt to animate a connection for a new call.
467 *
468 * If it's not exclusive, the connection is in the endpoint tree, and we're in
469 * the conn's list of those waiting to grab a channel. There is, however, a
470 * limit on the number of live connections allowed at any one time, so we may
471 * have to wait for capacity to become available.
472 *
473 * Note that a connection on the waiting queue might *also* have active
474 * channels if it has been culled to make space and then re-requested by a new
475 * call.
476 */
2baec2c3
DH
477static void rxrpc_animate_client_conn(struct rxrpc_net *rxnet,
478 struct rxrpc_connection *conn)
45025bce
DH
479{
480 unsigned int nr_conns;
481
482 _enter("%d,%d", conn->debug_id, conn->cache_state);
483
4e255721
DH
484 if (conn->cache_state == RXRPC_CONN_CLIENT_ACTIVE ||
485 conn->cache_state == RXRPC_CONN_CLIENT_UPGRADE)
45025bce
DH
486 goto out;
487
2baec2c3 488 spin_lock(&rxnet->client_conn_cache_lock);
45025bce 489
2baec2c3 490 nr_conns = rxnet->nr_client_conns;
363deeab
DH
491 if (!test_and_set_bit(RXRPC_CONN_COUNTED, &conn->flags)) {
492 trace_rxrpc_client(conn, -1, rxrpc_client_count);
2baec2c3 493 rxnet->nr_client_conns = nr_conns + 1;
363deeab 494 }
45025bce
DH
495
496 switch (conn->cache_state) {
497 case RXRPC_CONN_CLIENT_ACTIVE:
4e255721 498 case RXRPC_CONN_CLIENT_UPGRADE:
45025bce
DH
499 case RXRPC_CONN_CLIENT_WAITING:
500 break;
501
502 case RXRPC_CONN_CLIENT_INACTIVE:
503 case RXRPC_CONN_CLIENT_CULLED:
504 case RXRPC_CONN_CLIENT_IDLE:
505 if (nr_conns >= rxrpc_max_client_connections)
506 goto wait_for_capacity;
507 goto activate_conn;
508
509 default:
510 BUG();
001c1122
DH
511 }
512
45025bce 513out_unlock:
2baec2c3 514 spin_unlock(&rxnet->client_conn_cache_lock);
45025bce
DH
515out:
516 _leave(" [%d]", conn->cache_state);
517 return;
c6d2b8d7 518
45025bce
DH
519activate_conn:
520 _debug("activate");
2baec2c3 521 rxrpc_activate_conn(rxnet, conn);
45025bce
DH
522 goto out_unlock;
523
524wait_for_capacity:
525 _debug("wait");
363deeab 526 trace_rxrpc_client(conn, -1, rxrpc_client_to_waiting);
45025bce 527 conn->cache_state = RXRPC_CONN_CLIENT_WAITING;
2baec2c3 528 list_move_tail(&conn->cache_link, &rxnet->waiting_client_conns);
45025bce
DH
529 goto out_unlock;
530}
531
532/*
533 * Deactivate a channel.
534 */
535static void rxrpc_deactivate_one_channel(struct rxrpc_connection *conn,
536 unsigned int channel)
537{
538 struct rxrpc_channel *chan = &conn->channels[channel];
539
540 rcu_assign_pointer(chan->call, NULL);
541 conn->active_chans &= ~(1 << channel);
542}
543
544/*
545 * Assign a channel to the call at the front of the queue and wake the call up.
546 * We don't increment the callNumber counter until this number has been exposed
547 * to the world.
548 */
549static void rxrpc_activate_one_channel(struct rxrpc_connection *conn,
550 unsigned int channel)
551{
552 struct rxrpc_channel *chan = &conn->channels[channel];
553 struct rxrpc_call *call = list_entry(conn->waiting_calls.next,
554 struct rxrpc_call, chan_wait_link);
555 u32 call_id = chan->call_counter + 1;
556
363deeab
DH
557 trace_rxrpc_client(conn, channel, rxrpc_client_chan_activate);
558
3136ef49
DH
559 /* Cancel the final ACK on the previous call if it hasn't been sent yet
560 * as the DATA packet will implicitly ACK it.
561 */
562 clear_bit(RXRPC_CONN_FINAL_ACK_0 + channel, &conn->flags);
563
af338a9e 564 write_lock_bh(&call->state_lock);
e122d845 565 call->state = RXRPC_CALL_CLIENT_SEND_REQUEST;
af338a9e
DH
566 write_unlock_bh(&call->state_lock);
567
e34d4234 568 rxrpc_see_call(call);
45025bce
DH
569 list_del_init(&call->chan_wait_link);
570 conn->active_chans |= 1 << channel;
571 call->peer = rxrpc_get_peer(conn->params.peer);
572 call->cid = conn->proto.cid | channel;
573 call->call_id = call_id;
574
89ca6948 575 trace_rxrpc_connect_call(call);
45025bce
DH
576 _net("CONNECT call %08x:%08x as call %d on conn %d",
577 call->cid, call->call_id, call->debug_id, conn->debug_id);
578
579 /* Paired with the read barrier in rxrpc_wait_for_channel(). This
580 * orders cid and epoch in the connection wrt to call_id without the
581 * need to take the channel_lock.
582 *
583 * We provisionally assign a callNumber at this point, but we don't
584 * confirm it until the call is about to be exposed.
585 *
586 * TODO: Pair with a barrier in the data_ready handler when that looks
587 * at the call ID through a connection channel.
588 */
589 smp_wmb();
590 chan->call_id = call_id;
4764c0da 591 chan->call_debug_id = call->debug_id;
45025bce
DH
592 rcu_assign_pointer(chan->call, call);
593 wake_up(&call->waitq);
594}
595
2629c7fa
DH
596/*
597 * Assign channels and callNumbers to waiting calls with channel_lock
598 * held by caller.
599 */
600static void rxrpc_activate_channels_locked(struct rxrpc_connection *conn)
601{
602 u8 avail, mask;
603
604 switch (conn->cache_state) {
605 case RXRPC_CONN_CLIENT_ACTIVE:
606 mask = RXRPC_ACTIVE_CHANS_MASK;
607 break;
4e255721
DH
608 case RXRPC_CONN_CLIENT_UPGRADE:
609 mask = 0x01;
610 break;
2629c7fa
DH
611 default:
612 return;
613 }
614
615 while (!list_empty(&conn->waiting_calls) &&
616 (avail = ~conn->active_chans,
617 avail &= mask,
618 avail != 0))
619 rxrpc_activate_one_channel(conn, __ffs(avail));
620}
621
45025bce
DH
622/*
623 * Assign channels and callNumbers to waiting calls.
624 */
625static void rxrpc_activate_channels(struct rxrpc_connection *conn)
626{
45025bce
DH
627 _enter("%d", conn->debug_id);
628
363deeab
DH
629 trace_rxrpc_client(conn, -1, rxrpc_client_activate_chans);
630
2629c7fa 631 if (conn->active_chans == RXRPC_ACTIVE_CHANS_MASK)
45025bce
DH
632 return;
633
634 spin_lock(&conn->channel_lock);
2629c7fa 635 rxrpc_activate_channels_locked(conn);
45025bce
DH
636 spin_unlock(&conn->channel_lock);
637 _leave("");
638}
639
640/*
641 * Wait for a callNumber and a channel to be granted to a call.
642 */
643static int rxrpc_wait_for_channel(struct rxrpc_call *call, gfp_t gfp)
644{
645 int ret = 0;
646
647 _enter("%d", call->debug_id);
648
649 if (!call->call_id) {
650 DECLARE_WAITQUEUE(myself, current);
c6d2b8d7 651
c6d2b8d7 652 if (!gfpflags_allow_blocking(gfp)) {
45025bce
DH
653 ret = -EAGAIN;
654 goto out;
c6d2b8d7
DH
655 }
656
45025bce 657 add_wait_queue_exclusive(&call->waitq, &myself);
c6d2b8d7
DH
658 for (;;) {
659 set_current_state(TASK_INTERRUPTIBLE);
45025bce
DH
660 if (call->call_id)
661 break;
662 if (signal_pending(current)) {
663 ret = -ERESTARTSYS;
c6d2b8d7 664 break;
45025bce 665 }
c6d2b8d7
DH
666 schedule();
667 }
45025bce 668 remove_wait_queue(&call->waitq, &myself);
c6d2b8d7
DH
669 __set_current_state(TASK_RUNNING);
670 }
671
45025bce
DH
672 /* Paired with the write barrier in rxrpc_activate_one_channel(). */
673 smp_rmb();
674
675out:
676 _leave(" = %d", ret);
677 return ret;
678}
679
680/*
681 * find a connection for a call
682 * - called in process context with IRQs enabled
683 */
5e33a23b
DH
684int rxrpc_connect_call(struct rxrpc_sock *rx,
685 struct rxrpc_call *call,
45025bce
DH
686 struct rxrpc_conn_parameters *cp,
687 struct sockaddr_rxrpc *srx,
688 gfp_t gfp)
689{
2baec2c3 690 struct rxrpc_net *rxnet = cp->local->rxnet;
45025bce
DH
691 int ret;
692
693 _enter("{%d,%lx},", call->debug_id, call->user_call_ID);
694
3d18cbb7 695 rxrpc_discard_expired_client_conns(&rxnet->client_conn_reaper);
2baec2c3 696 rxrpc_cull_active_client_conns(rxnet);
45025bce 697
5e33a23b 698 ret = rxrpc_get_client_conn(rx, call, cp, srx, gfp);
45025bce 699 if (ret < 0)
c038a58c 700 goto out;
45025bce 701
2baec2c3 702 rxrpc_animate_client_conn(rxnet, call->conn);
45025bce
DH
703 rxrpc_activate_channels(call->conn);
704
705 ret = rxrpc_wait_for_channel(call, gfp);
c038a58c 706 if (ret < 0) {
930c9f91 707 trace_rxrpc_client(call->conn, ret, rxrpc_client_chan_wait_failed);
45025bce 708 rxrpc_disconnect_client_call(call);
c038a58c
DH
709 goto out;
710 }
711
712 spin_lock_bh(&call->conn->params.peer->lock);
f3344303
DH
713 hlist_add_head_rcu(&call->error_link,
714 &call->conn->params.peer->error_targets);
c038a58c 715 spin_unlock_bh(&call->conn->params.peer->lock);
45025bce 716
c038a58c 717out:
45025bce
DH
718 _leave(" = %d", ret);
719 return ret;
720}
721
722/*
723 * Note that a connection is about to be exposed to the world. Once it is
724 * exposed, we maintain an extra ref on it that stops it from being summarily
725 * discarded before it's (a) had a chance to deal with retransmission and (b)
726 * had a chance at re-use (the per-connection security negotiation is
727 * expensive).
728 */
363deeab
DH
729static void rxrpc_expose_client_conn(struct rxrpc_connection *conn,
730 unsigned int channel)
45025bce 731{
363deeab
DH
732 if (!test_and_set_bit(RXRPC_CONN_EXPOSED, &conn->flags)) {
733 trace_rxrpc_client(conn, channel, rxrpc_client_exposed);
45025bce 734 rxrpc_get_connection(conn);
363deeab 735 }
45025bce
DH
736}
737
738/*
739 * Note that a call, and thus a connection, is about to be exposed to the
740 * world.
741 */
742void rxrpc_expose_client_call(struct rxrpc_call *call)
743{
363deeab 744 unsigned int channel = call->cid & RXRPC_CHANNELMASK;
45025bce 745 struct rxrpc_connection *conn = call->conn;
363deeab 746 struct rxrpc_channel *chan = &conn->channels[channel];
45025bce
DH
747
748 if (!test_and_set_bit(RXRPC_CALL_EXPOSED, &call->flags)) {
749 /* Mark the call ID as being used. If the callNumber counter
750 * exceeds ~2 billion, we kill the connection after its
751 * outstanding calls have finished so that the counter doesn't
752 * wrap.
753 */
754 chan->call_counter++;
755 if (chan->call_counter >= INT_MAX)
756 set_bit(RXRPC_CONN_DONT_REUSE, &conn->flags);
363deeab 757 rxrpc_expose_client_conn(conn, channel);
45025bce
DH
758 }
759}
760
3d18cbb7
DH
761/*
762 * Set the reap timer.
763 */
764static void rxrpc_set_client_reap_timer(struct rxrpc_net *rxnet)
765{
766 unsigned long now = jiffies;
767 unsigned long reap_at = now + rxrpc_conn_idle_client_expiry;
768
769 if (rxnet->live)
770 timer_reduce(&rxnet->client_conn_reap_timer, reap_at);
771}
772
45025bce
DH
773/*
774 * Disconnect a client call.
775 */
776void rxrpc_disconnect_client_call(struct rxrpc_call *call)
777{
45025bce 778 struct rxrpc_connection *conn = call->conn;
930c9f91 779 struct rxrpc_channel *chan = NULL;
88f2a825 780 struct rxrpc_net *rxnet = conn->params.local->rxnet;
930c9f91
DH
781 unsigned int channel = -1;
782 u32 cid;
45025bce 783
930c9f91
DH
784 spin_lock(&conn->channel_lock);
785
786 cid = call->cid;
787 if (cid) {
788 channel = cid & RXRPC_CHANNELMASK;
789 chan = &conn->channels[channel];
790 }
363deeab 791 trace_rxrpc_client(conn, channel, rxrpc_client_chan_disconnect);
45025bce
DH
792 call->conn = NULL;
793
45025bce
DH
794 /* Calls that have never actually been assigned a channel can simply be
795 * discarded. If the conn didn't get used either, it will follow
796 * immediately unless someone else grabs it in the meantime.
797 */
798 if (!list_empty(&call->chan_wait_link)) {
799 _debug("call is waiting");
800 ASSERTCMP(call->call_id, ==, 0);
801 ASSERT(!test_bit(RXRPC_CALL_EXPOSED, &call->flags));
802 list_del_init(&call->chan_wait_link);
803
363deeab
DH
804 trace_rxrpc_client(conn, channel, rxrpc_client_chan_unstarted);
805
45025bce
DH
806 /* We must deactivate or idle the connection if it's now
807 * waiting for nothing.
808 */
2baec2c3 809 spin_lock(&rxnet->client_conn_cache_lock);
45025bce
DH
810 if (conn->cache_state == RXRPC_CONN_CLIENT_WAITING &&
811 list_empty(&conn->waiting_calls) &&
812 !conn->active_chans)
813 goto idle_connection;
814 goto out;
815 }
816
930c9f91
DH
817 if (rcu_access_pointer(chan->call) != call) {
818 spin_unlock(&conn->channel_lock);
819 BUG();
820 }
45025bce
DH
821
822 /* If a client call was exposed to the world, we save the result for
823 * retransmission.
824 *
825 * We use a barrier here so that the call number and abort code can be
826 * read without needing to take a lock.
827 *
828 * TODO: Make the incoming packet handler check this and handle
829 * terminal retransmission without requiring access to the call.
830 */
831 if (test_bit(RXRPC_CALL_EXPOSED, &call->flags)) {
f5c17aae 832 _debug("exposed %u,%u", call->call_id, call->abort_code);
45025bce
DH
833 __rxrpc_disconnect_call(conn, call);
834 }
835
836 /* See if we can pass the channel directly to another call. */
837 if (conn->cache_state == RXRPC_CONN_CLIENT_ACTIVE &&
838 !list_empty(&conn->waiting_calls)) {
363deeab 839 trace_rxrpc_client(conn, channel, rxrpc_client_chan_pass);
45025bce
DH
840 rxrpc_activate_one_channel(conn, channel);
841 goto out_2;
842 }
843
3136ef49
DH
844 /* Schedule the final ACK to be transmitted in a short while so that it
845 * can be skipped if we find a follow-on call. The first DATA packet
846 * of the follow on call will implicitly ACK this call.
847 */
17e9e23b
DH
848 if (call->completion == RXRPC_CALL_SUCCEEDED &&
849 test_bit(RXRPC_CALL_EXPOSED, &call->flags)) {
3136ef49
DH
850 unsigned long final_ack_at = jiffies + 2;
851
852 WRITE_ONCE(chan->final_ack_at, final_ack_at);
853 smp_wmb(); /* vs rxrpc_process_delayed_final_acks() */
854 set_bit(RXRPC_CONN_FINAL_ACK_0 + channel, &conn->flags);
855 rxrpc_reduce_conn_timer(conn, final_ack_at);
856 }
857
45025bce
DH
858 /* Things are more complex and we need the cache lock. We might be
859 * able to simply idle the conn or it might now be lurking on the wait
860 * list. It might even get moved back to the active list whilst we're
861 * waiting for the lock.
862 */
2baec2c3 863 spin_lock(&rxnet->client_conn_cache_lock);
45025bce
DH
864
865 switch (conn->cache_state) {
4e255721
DH
866 case RXRPC_CONN_CLIENT_UPGRADE:
867 /* Deal with termination of a service upgrade probe. */
868 if (test_bit(RXRPC_CONN_EXPOSED, &conn->flags)) {
869 clear_bit(RXRPC_CONN_PROBING_FOR_UPGRADE, &conn->flags);
870 trace_rxrpc_client(conn, channel, rxrpc_client_to_active);
871 conn->cache_state = RXRPC_CONN_CLIENT_ACTIVE;
872 rxrpc_activate_channels_locked(conn);
873 }
874 /* fall through */
45025bce
DH
875 case RXRPC_CONN_CLIENT_ACTIVE:
876 if (list_empty(&conn->waiting_calls)) {
877 rxrpc_deactivate_one_channel(conn, channel);
878 if (!conn->active_chans) {
2baec2c3 879 rxnet->nr_active_client_conns--;
45025bce
DH
880 goto idle_connection;
881 }
882 goto out;
883 }
884
363deeab 885 trace_rxrpc_client(conn, channel, rxrpc_client_chan_pass);
45025bce
DH
886 rxrpc_activate_one_channel(conn, channel);
887 goto out;
888
889 case RXRPC_CONN_CLIENT_CULLED:
890 rxrpc_deactivate_one_channel(conn, channel);
891 ASSERT(list_empty(&conn->waiting_calls));
892 if (!conn->active_chans)
893 goto idle_connection;
894 goto out;
895
896 case RXRPC_CONN_CLIENT_WAITING:
897 rxrpc_deactivate_one_channel(conn, channel);
898 goto out;
899
900 default:
901 BUG();
902 }
c6d2b8d7 903
45025bce 904out:
2baec2c3 905 spin_unlock(&rxnet->client_conn_cache_lock);
45025bce
DH
906out_2:
907 spin_unlock(&conn->channel_lock);
c6d2b8d7 908 rxrpc_put_connection(conn);
45025bce
DH
909 _leave("");
910 return;
911
912idle_connection:
913 /* As no channels remain active, the connection gets deactivated
914 * immediately or moved to the idle list for a short while.
915 */
916 if (test_bit(RXRPC_CONN_EXPOSED, &conn->flags)) {
363deeab 917 trace_rxrpc_client(conn, channel, rxrpc_client_to_idle);
45025bce
DH
918 conn->idle_timestamp = jiffies;
919 conn->cache_state = RXRPC_CONN_CLIENT_IDLE;
2baec2c3
DH
920 list_move_tail(&conn->cache_link, &rxnet->idle_client_conns);
921 if (rxnet->idle_client_conns.next == &conn->cache_link &&
922 !rxnet->kill_all_client_conns)
3d18cbb7 923 rxrpc_set_client_reap_timer(rxnet);
45025bce 924 } else {
363deeab 925 trace_rxrpc_client(conn, channel, rxrpc_client_to_inactive);
45025bce
DH
926 conn->cache_state = RXRPC_CONN_CLIENT_INACTIVE;
927 list_del_init(&conn->cache_link);
928 }
929 goto out;
c6d2b8d7 930}
001c1122
DH
931
932/*
45025bce 933 * Clean up a dead client connection.
001c1122 934 */
45025bce
DH
935static struct rxrpc_connection *
936rxrpc_put_one_client_conn(struct rxrpc_connection *conn)
001c1122 937{
66d58af7 938 struct rxrpc_connection *next = NULL;
001c1122 939 struct rxrpc_local *local = conn->params.local;
2baec2c3 940 struct rxrpc_net *rxnet = local->rxnet;
45025bce 941 unsigned int nr_conns;
001c1122 942
363deeab
DH
943 trace_rxrpc_client(conn, -1, rxrpc_client_cleanup);
944
45025bce
DH
945 if (test_bit(RXRPC_CONN_IN_CLIENT_CONNS, &conn->flags)) {
946 spin_lock(&local->client_conns_lock);
947 if (test_and_clear_bit(RXRPC_CONN_IN_CLIENT_CONNS,
948 &conn->flags))
949 rb_erase(&conn->client_node, &local->client_conns);
950 spin_unlock(&local->client_conns_lock);
951 }
001c1122
DH
952
953 rxrpc_put_client_connection_id(conn);
45025bce
DH
954
955 ASSERTCMP(conn->cache_state, ==, RXRPC_CONN_CLIENT_INACTIVE);
956
66d58af7 957 if (test_bit(RXRPC_CONN_COUNTED, &conn->flags)) {
363deeab 958 trace_rxrpc_client(conn, -1, rxrpc_client_uncount);
2baec2c3
DH
959 spin_lock(&rxnet->client_conn_cache_lock);
960 nr_conns = --rxnet->nr_client_conns;
66d58af7
DH
961
962 if (nr_conns < rxrpc_max_client_connections &&
2baec2c3
DH
963 !list_empty(&rxnet->waiting_client_conns)) {
964 next = list_entry(rxnet->waiting_client_conns.next,
66d58af7
DH
965 struct rxrpc_connection, cache_link);
966 rxrpc_get_connection(next);
2baec2c3 967 rxrpc_activate_conn(rxnet, next);
66d58af7 968 }
45025bce 969
2baec2c3 970 spin_unlock(&rxnet->client_conn_cache_lock);
45025bce
DH
971 }
972
45025bce 973 rxrpc_kill_connection(conn);
45025bce
DH
974 if (next)
975 rxrpc_activate_channels(next);
976
977 /* We need to get rid of the temporary ref we took upon next, but we
978 * can't call rxrpc_put_connection() recursively.
979 */
980 return next;
981}
982
983/*
984 * Clean up a dead client connections.
985 */
986void rxrpc_put_client_conn(struct rxrpc_connection *conn)
987{
363deeab
DH
988 const void *here = __builtin_return_address(0);
989 int n;
45025bce
DH
990
991 do {
363deeab
DH
992 n = atomic_dec_return(&conn->usage);
993 trace_rxrpc_conn(conn, rxrpc_conn_put_client, n, here);
994 if (n > 0)
995 return;
996 ASSERTCMP(n, >=, 0);
997
998 conn = rxrpc_put_one_client_conn(conn);
999 } while (conn);
45025bce
DH
1000}
1001
1002/*
1003 * Kill the longest-active client connections to make room for new ones.
1004 */
2baec2c3 1005static void rxrpc_cull_active_client_conns(struct rxrpc_net *rxnet)
45025bce
DH
1006{
1007 struct rxrpc_connection *conn;
2baec2c3 1008 unsigned int nr_conns = rxnet->nr_client_conns;
45025bce
DH
1009 unsigned int nr_active, limit;
1010
1011 _enter("");
1012
1013 ASSERTCMP(nr_conns, >=, 0);
1014 if (nr_conns < rxrpc_max_client_connections) {
1015 _leave(" [ok]");
1016 return;
1017 }
1018 limit = rxrpc_reap_client_connections;
1019
2baec2c3
DH
1020 spin_lock(&rxnet->client_conn_cache_lock);
1021 nr_active = rxnet->nr_active_client_conns;
45025bce
DH
1022
1023 while (nr_active > limit) {
2baec2c3
DH
1024 ASSERT(!list_empty(&rxnet->active_client_conns));
1025 conn = list_entry(rxnet->active_client_conns.next,
45025bce 1026 struct rxrpc_connection, cache_link);
4e255721
DH
1027 ASSERTIFCMP(conn->cache_state != RXRPC_CONN_CLIENT_ACTIVE,
1028 conn->cache_state, ==, RXRPC_CONN_CLIENT_UPGRADE);
45025bce
DH
1029
1030 if (list_empty(&conn->waiting_calls)) {
363deeab 1031 trace_rxrpc_client(conn, -1, rxrpc_client_to_culled);
45025bce
DH
1032 conn->cache_state = RXRPC_CONN_CLIENT_CULLED;
1033 list_del_init(&conn->cache_link);
1034 } else {
363deeab 1035 trace_rxrpc_client(conn, -1, rxrpc_client_to_waiting);
45025bce
DH
1036 conn->cache_state = RXRPC_CONN_CLIENT_WAITING;
1037 list_move_tail(&conn->cache_link,
2baec2c3 1038 &rxnet->waiting_client_conns);
45025bce
DH
1039 }
1040
1041 nr_active--;
1042 }
1043
2baec2c3
DH
1044 rxnet->nr_active_client_conns = nr_active;
1045 spin_unlock(&rxnet->client_conn_cache_lock);
45025bce
DH
1046 ASSERTCMP(nr_active, >=, 0);
1047 _leave(" [culled]");
1048}
1049
1050/*
1051 * Discard expired client connections from the idle list. Each conn in the
1052 * idle list has been exposed and holds an extra ref because of that.
1053 *
1054 * This may be called from conn setup or from a work item so cannot be
1055 * considered non-reentrant.
1056 */
2baec2c3 1057void rxrpc_discard_expired_client_conns(struct work_struct *work)
45025bce
DH
1058{
1059 struct rxrpc_connection *conn;
2baec2c3 1060 struct rxrpc_net *rxnet =
3d18cbb7 1061 container_of(work, struct rxrpc_net, client_conn_reaper);
45025bce
DH
1062 unsigned long expiry, conn_expires_at, now;
1063 unsigned int nr_conns;
45025bce 1064
2baec2c3 1065 _enter("");
45025bce 1066
2baec2c3 1067 if (list_empty(&rxnet->idle_client_conns)) {
45025bce
DH
1068 _leave(" [empty]");
1069 return;
1070 }
1071
1072 /* Don't double up on the discarding */
2baec2c3 1073 if (!spin_trylock(&rxnet->client_conn_discard_lock)) {
45025bce
DH
1074 _leave(" [already]");
1075 return;
1076 }
1077
1078 /* We keep an estimate of what the number of conns ought to be after
1079 * we've discarded some so that we don't overdo the discarding.
1080 */
2baec2c3 1081 nr_conns = rxnet->nr_client_conns;
45025bce
DH
1082
1083next:
2baec2c3 1084 spin_lock(&rxnet->client_conn_cache_lock);
45025bce 1085
2baec2c3 1086 if (list_empty(&rxnet->idle_client_conns))
45025bce
DH
1087 goto out;
1088
2baec2c3 1089 conn = list_entry(rxnet->idle_client_conns.next,
45025bce
DH
1090 struct rxrpc_connection, cache_link);
1091 ASSERT(test_bit(RXRPC_CONN_EXPOSED, &conn->flags));
1092
2baec2c3 1093 if (!rxnet->kill_all_client_conns) {
45025bce
DH
1094 /* If the number of connections is over the reap limit, we
1095 * expedite discard by reducing the expiry timeout. We must,
1096 * however, have at least a short grace period to be able to do
1097 * final-ACK or ABORT retransmission.
1098 */
1099 expiry = rxrpc_conn_idle_client_expiry;
1100 if (nr_conns > rxrpc_reap_client_connections)
1101 expiry = rxrpc_conn_idle_client_fast_expiry;
f859ab61
DH
1102 if (conn->params.local->service_closed)
1103 expiry = rxrpc_closed_conn_expiry * HZ;
45025bce
DH
1104
1105 conn_expires_at = conn->idle_timestamp + expiry;
1106
1107 now = READ_ONCE(jiffies);
1108 if (time_after(conn_expires_at, now))
1109 goto not_yet_expired;
1110 }
1111
363deeab 1112 trace_rxrpc_client(conn, -1, rxrpc_client_discard);
45025bce
DH
1113 if (!test_and_clear_bit(RXRPC_CONN_EXPOSED, &conn->flags))
1114 BUG();
1115 conn->cache_state = RXRPC_CONN_CLIENT_INACTIVE;
1116 list_del_init(&conn->cache_link);
1117
2baec2c3 1118 spin_unlock(&rxnet->client_conn_cache_lock);
45025bce
DH
1119
1120 /* When we cleared the EXPOSED flag, we took on responsibility for the
1121 * reference that that had on the usage count. We deal with that here.
1122 * If someone re-sets the flag and re-gets the ref, that's fine.
1123 */
1124 rxrpc_put_connection(conn);
45025bce
DH
1125 nr_conns--;
1126 goto next;
1127
1128not_yet_expired:
1129 /* The connection at the front of the queue hasn't yet expired, so
1130 * schedule the work item for that point if we discarded something.
1131 *
1132 * We don't worry if the work item is already scheduled - it can look
1133 * after rescheduling itself at a later time. We could cancel it, but
1134 * then things get messier.
1135 */
1136 _debug("not yet");
2baec2c3 1137 if (!rxnet->kill_all_client_conns)
3d18cbb7
DH
1138 timer_reduce(&rxnet->client_conn_reap_timer,
1139 conn_expires_at);
45025bce
DH
1140
1141out:
2baec2c3
DH
1142 spin_unlock(&rxnet->client_conn_cache_lock);
1143 spin_unlock(&rxnet->client_conn_discard_lock);
45025bce
DH
1144 _leave("");
1145}
1146
1147/*
1148 * Preemptively destroy all the client connection records rather than waiting
1149 * for them to time out
1150 */
2baec2c3 1151void rxrpc_destroy_all_client_connections(struct rxrpc_net *rxnet)
45025bce
DH
1152{
1153 _enter("");
1154
2baec2c3
DH
1155 spin_lock(&rxnet->client_conn_cache_lock);
1156 rxnet->kill_all_client_conns = true;
1157 spin_unlock(&rxnet->client_conn_cache_lock);
45025bce 1158
3d18cbb7 1159 del_timer_sync(&rxnet->client_conn_reap_timer);
45025bce 1160
3d18cbb7 1161 if (!rxrpc_queue_work(&rxnet->client_conn_reaper))
45025bce
DH
1162 _debug("destroy: queue failed");
1163
1164 _leave("");
001c1122 1165}