output.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604
  1. /* RxRPC packet transmission
  2. *
  3. * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
  4. * Written by David Howells (dhowells@redhat.com)
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU General Public License
  8. * as published by the Free Software Foundation; either version
  9. * 2 of the License, or (at your option) any later version.
  10. */
  11. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  12. #include <linux/net.h>
  13. #include <linux/gfp.h>
  14. #include <linux/skbuff.h>
  15. #include <linux/export.h>
  16. #include <net/sock.h>
  17. #include <net/af_rxrpc.h>
  18. #include "ar-internal.h"
  19. struct rxrpc_ack_buffer {
  20. struct rxrpc_wire_header whdr;
  21. struct rxrpc_ackpacket ack;
  22. u8 acks[255];
  23. u8 pad[3];
  24. struct rxrpc_ackinfo ackinfo;
  25. };
  26. struct rxrpc_abort_buffer {
  27. struct rxrpc_wire_header whdr;
  28. __be32 abort_code;
  29. };
  30. static const char rxrpc_keepalive_string[] = "";
  31. /*
  32. * Arrange for a keepalive ping a certain time after we last transmitted. This
  33. * lets the far side know we're still interested in this call and helps keep
  34. * the route through any intervening firewall open.
  35. *
  36. * Receiving a response to the ping will prevent the ->expect_rx_by timer from
  37. * expiring.
  38. */
  39. static void rxrpc_set_keepalive(struct rxrpc_call *call)
  40. {
  41. unsigned long now = jiffies, keepalive_at = call->next_rx_timo / 6;
  42. keepalive_at += now;
  43. WRITE_ONCE(call->keepalive_at, keepalive_at);
  44. rxrpc_reduce_call_timer(call, keepalive_at, now,
  45. rxrpc_timer_set_for_keepalive);
  46. }
  47. /*
  48. * Fill out an ACK packet.
  49. */
  50. static size_t rxrpc_fill_out_ack(struct rxrpc_connection *conn,
  51. struct rxrpc_call *call,
  52. struct rxrpc_ack_buffer *pkt,
  53. rxrpc_seq_t *_hard_ack,
  54. rxrpc_seq_t *_top,
  55. u8 reason)
  56. {
  57. rxrpc_serial_t serial;
  58. rxrpc_seq_t hard_ack, top, seq;
  59. int ix;
  60. u32 mtu, jmax;
  61. u8 *ackp = pkt->acks;
  62. /* Barrier against rxrpc_input_data(). */
  63. serial = call->ackr_serial;
  64. hard_ack = READ_ONCE(call->rx_hard_ack);
  65. top = smp_load_acquire(&call->rx_top);
  66. *_hard_ack = hard_ack;
  67. *_top = top;
  68. pkt->ack.bufferSpace = htons(8);
  69. pkt->ack.maxSkew = htons(call->ackr_skew);
  70. pkt->ack.firstPacket = htonl(hard_ack + 1);
  71. pkt->ack.previousPacket = htonl(call->ackr_prev_seq);
  72. pkt->ack.serial = htonl(serial);
  73. pkt->ack.reason = reason;
  74. pkt->ack.nAcks = top - hard_ack;
  75. if (reason == RXRPC_ACK_PING)
  76. pkt->whdr.flags |= RXRPC_REQUEST_ACK;
  77. if (after(top, hard_ack)) {
  78. seq = hard_ack + 1;
  79. do {
  80. ix = seq & RXRPC_RXTX_BUFF_MASK;
  81. if (call->rxtx_buffer[ix])
  82. *ackp++ = RXRPC_ACK_TYPE_ACK;
  83. else
  84. *ackp++ = RXRPC_ACK_TYPE_NACK;
  85. seq++;
  86. } while (before_eq(seq, top));
  87. }
  88. mtu = conn->params.peer->if_mtu;
  89. mtu -= conn->params.peer->hdrsize;
  90. jmax = (call->nr_jumbo_bad > 3) ? 1 : rxrpc_rx_jumbo_max;
  91. pkt->ackinfo.rxMTU = htonl(rxrpc_rx_mtu);
  92. pkt->ackinfo.maxMTU = htonl(mtu);
  93. pkt->ackinfo.rwind = htonl(call->rx_winsize);
  94. pkt->ackinfo.jumbo_max = htonl(jmax);
  95. *ackp++ = 0;
  96. *ackp++ = 0;
  97. *ackp++ = 0;
  98. return top - hard_ack + 3;
  99. }
  100. /*
  101. * Send an ACK call packet.
  102. */
  103. int rxrpc_send_ack_packet(struct rxrpc_call *call, bool ping,
  104. rxrpc_serial_t *_serial)
  105. {
  106. struct rxrpc_connection *conn = NULL;
  107. struct rxrpc_ack_buffer *pkt;
  108. struct msghdr msg;
  109. struct kvec iov[2];
  110. rxrpc_serial_t serial;
  111. rxrpc_seq_t hard_ack, top;
  112. ktime_t now;
  113. size_t len, n;
  114. int ret;
  115. u8 reason;
  116. spin_lock_bh(&call->lock);
  117. if (call->conn)
  118. conn = rxrpc_get_connection_maybe(call->conn);
  119. spin_unlock_bh(&call->lock);
  120. if (!conn)
  121. return -ECONNRESET;
  122. pkt = kzalloc(sizeof(*pkt), GFP_KERNEL);
  123. if (!pkt) {
  124. rxrpc_put_connection(conn);
  125. return -ENOMEM;
  126. }
  127. msg.msg_name = &call->peer->srx.transport;
  128. msg.msg_namelen = call->peer->srx.transport_len;
  129. msg.msg_control = NULL;
  130. msg.msg_controllen = 0;
  131. msg.msg_flags = 0;
  132. pkt->whdr.epoch = htonl(conn->proto.epoch);
  133. pkt->whdr.cid = htonl(call->cid);
  134. pkt->whdr.callNumber = htonl(call->call_id);
  135. pkt->whdr.seq = 0;
  136. pkt->whdr.type = RXRPC_PACKET_TYPE_ACK;
  137. pkt->whdr.flags = RXRPC_SLOW_START_OK | conn->out_clientflag;
  138. pkt->whdr.userStatus = 0;
  139. pkt->whdr.securityIndex = call->security_ix;
  140. pkt->whdr._rsvd = 0;
  141. pkt->whdr.serviceId = htons(call->service_id);
  142. spin_lock_bh(&call->lock);
  143. if (ping) {
  144. reason = RXRPC_ACK_PING;
  145. } else {
  146. reason = call->ackr_reason;
  147. if (!call->ackr_reason) {
  148. spin_unlock_bh(&call->lock);
  149. ret = 0;
  150. goto out;
  151. }
  152. call->ackr_reason = 0;
  153. }
  154. n = rxrpc_fill_out_ack(conn, call, pkt, &hard_ack, &top, reason);
  155. spin_unlock_bh(&call->lock);
  156. iov[0].iov_base = pkt;
  157. iov[0].iov_len = sizeof(pkt->whdr) + sizeof(pkt->ack) + n;
  158. iov[1].iov_base = &pkt->ackinfo;
  159. iov[1].iov_len = sizeof(pkt->ackinfo);
  160. len = iov[0].iov_len + iov[1].iov_len;
  161. serial = atomic_inc_return(&conn->serial);
  162. pkt->whdr.serial = htonl(serial);
  163. trace_rxrpc_tx_ack(call, serial,
  164. ntohl(pkt->ack.firstPacket),
  165. ntohl(pkt->ack.serial),
  166. pkt->ack.reason, pkt->ack.nAcks);
  167. if (_serial)
  168. *_serial = serial;
  169. if (ping) {
  170. call->ping_serial = serial;
  171. smp_wmb();
  172. /* We need to stick a time in before we send the packet in case
  173. * the reply gets back before kernel_sendmsg() completes - but
  174. * asking UDP to send the packet can take a relatively long
  175. * time, so we update the time after, on the assumption that
  176. * the packet transmission is more likely to happen towards the
  177. * end of the kernel_sendmsg() call.
  178. */
  179. call->ping_time = ktime_get_real();
  180. set_bit(RXRPC_CALL_PINGING, &call->flags);
  181. trace_rxrpc_rtt_tx(call, rxrpc_rtt_tx_ping, serial);
  182. }
  183. ret = kernel_sendmsg(conn->params.local->socket, &msg, iov, 2, len);
  184. now = ktime_get_real();
  185. if (ping)
  186. call->ping_time = now;
  187. conn->params.peer->last_tx_at = ktime_get_real();
  188. if (ret < 0)
  189. trace_rxrpc_tx_fail(call->debug_id, serial, ret,
  190. rxrpc_tx_fail_call_ack);
  191. if (call->state < RXRPC_CALL_COMPLETE) {
  192. if (ret < 0) {
  193. if (ping)
  194. clear_bit(RXRPC_CALL_PINGING, &call->flags);
  195. rxrpc_propose_ACK(call, pkt->ack.reason,
  196. ntohs(pkt->ack.maxSkew),
  197. ntohl(pkt->ack.serial),
  198. true, true,
  199. rxrpc_propose_ack_retry_tx);
  200. } else {
  201. spin_lock_bh(&call->lock);
  202. if (after(hard_ack, call->ackr_consumed))
  203. call->ackr_consumed = hard_ack;
  204. if (after(top, call->ackr_seen))
  205. call->ackr_seen = top;
  206. spin_unlock_bh(&call->lock);
  207. }
  208. rxrpc_set_keepalive(call);
  209. }
  210. out:
  211. rxrpc_put_connection(conn);
  212. kfree(pkt);
  213. return ret;
  214. }
  215. /*
  216. * Send an ABORT call packet.
  217. */
  218. int rxrpc_send_abort_packet(struct rxrpc_call *call)
  219. {
  220. struct rxrpc_connection *conn = NULL;
  221. struct rxrpc_abort_buffer pkt;
  222. struct msghdr msg;
  223. struct kvec iov[1];
  224. rxrpc_serial_t serial;
  225. int ret;
  226. /* Don't bother sending aborts for a client call once the server has
  227. * hard-ACK'd all of its request data. After that point, we're not
  228. * going to stop the operation proceeding, and whilst we might limit
  229. * the reply, it's not worth it if we can send a new call on the same
  230. * channel instead, thereby closing off this call.
  231. */
  232. if (rxrpc_is_client_call(call) &&
  233. test_bit(RXRPC_CALL_TX_LAST, &call->flags))
  234. return 0;
  235. spin_lock_bh(&call->lock);
  236. if (call->conn)
  237. conn = rxrpc_get_connection_maybe(call->conn);
  238. spin_unlock_bh(&call->lock);
  239. if (!conn)
  240. return -ECONNRESET;
  241. msg.msg_name = &call->peer->srx.transport;
  242. msg.msg_namelen = call->peer->srx.transport_len;
  243. msg.msg_control = NULL;
  244. msg.msg_controllen = 0;
  245. msg.msg_flags = 0;
  246. pkt.whdr.epoch = htonl(conn->proto.epoch);
  247. pkt.whdr.cid = htonl(call->cid);
  248. pkt.whdr.callNumber = htonl(call->call_id);
  249. pkt.whdr.seq = 0;
  250. pkt.whdr.type = RXRPC_PACKET_TYPE_ABORT;
  251. pkt.whdr.flags = conn->out_clientflag;
  252. pkt.whdr.userStatus = 0;
  253. pkt.whdr.securityIndex = call->security_ix;
  254. pkt.whdr._rsvd = 0;
  255. pkt.whdr.serviceId = htons(call->service_id);
  256. pkt.abort_code = htonl(call->abort_code);
  257. iov[0].iov_base = &pkt;
  258. iov[0].iov_len = sizeof(pkt);
  259. serial = atomic_inc_return(&conn->serial);
  260. pkt.whdr.serial = htonl(serial);
  261. ret = kernel_sendmsg(conn->params.local->socket,
  262. &msg, iov, 1, sizeof(pkt));
  263. conn->params.peer->last_tx_at = ktime_get_real();
  264. if (ret < 0)
  265. trace_rxrpc_tx_fail(call->debug_id, serial, ret,
  266. rxrpc_tx_fail_call_abort);
  267. rxrpc_put_connection(conn);
  268. return ret;
  269. }
  270. /*
  271. * send a packet through the transport endpoint
  272. */
  273. int rxrpc_send_data_packet(struct rxrpc_call *call, struct sk_buff *skb,
  274. bool retrans)
  275. {
  276. struct rxrpc_connection *conn = call->conn;
  277. struct rxrpc_wire_header whdr;
  278. struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
  279. struct msghdr msg;
  280. struct kvec iov[2];
  281. rxrpc_serial_t serial;
  282. size_t len;
  283. bool lost = false;
  284. int ret, opt;
  285. _enter(",{%d}", skb->len);
  286. /* Each transmission of a Tx packet needs a new serial number */
  287. serial = atomic_inc_return(&conn->serial);
  288. whdr.epoch = htonl(conn->proto.epoch);
  289. whdr.cid = htonl(call->cid);
  290. whdr.callNumber = htonl(call->call_id);
  291. whdr.seq = htonl(sp->hdr.seq);
  292. whdr.serial = htonl(serial);
  293. whdr.type = RXRPC_PACKET_TYPE_DATA;
  294. whdr.flags = sp->hdr.flags;
  295. whdr.userStatus = 0;
  296. whdr.securityIndex = call->security_ix;
  297. whdr._rsvd = htons(sp->hdr._rsvd);
  298. whdr.serviceId = htons(call->service_id);
  299. if (test_bit(RXRPC_CONN_PROBING_FOR_UPGRADE, &conn->flags) &&
  300. sp->hdr.seq == 1)
  301. whdr.userStatus = RXRPC_USERSTATUS_SERVICE_UPGRADE;
  302. iov[0].iov_base = &whdr;
  303. iov[0].iov_len = sizeof(whdr);
  304. iov[1].iov_base = skb->head;
  305. iov[1].iov_len = skb->len;
  306. len = iov[0].iov_len + iov[1].iov_len;
  307. msg.msg_name = &call->peer->srx.transport;
  308. msg.msg_namelen = call->peer->srx.transport_len;
  309. msg.msg_control = NULL;
  310. msg.msg_controllen = 0;
  311. msg.msg_flags = 0;
  312. /* If our RTT cache needs working on, request an ACK. Also request
  313. * ACKs if a DATA packet appears to have been lost.
  314. */
  315. if (!(sp->hdr.flags & RXRPC_LAST_PACKET) &&
  316. (test_and_clear_bit(RXRPC_CALL_EV_ACK_LOST, &call->events) ||
  317. retrans ||
  318. call->cong_mode == RXRPC_CALL_SLOW_START ||
  319. (call->peer->rtt_usage < 3 && sp->hdr.seq & 1) ||
  320. ktime_before(ktime_add_ms(call->peer->rtt_last_req, 1000),
  321. ktime_get_real())))
  322. whdr.flags |= RXRPC_REQUEST_ACK;
  323. if (IS_ENABLED(CONFIG_AF_RXRPC_INJECT_LOSS)) {
  324. static int lose;
  325. if ((lose++ & 7) == 7) {
  326. ret = 0;
  327. lost = true;
  328. goto done;
  329. }
  330. }
  331. _proto("Tx DATA %%%u { #%u }", serial, sp->hdr.seq);
  332. /* send the packet with the don't fragment bit set if we currently
  333. * think it's small enough */
  334. if (iov[1].iov_len >= call->peer->maxdata)
  335. goto send_fragmentable;
  336. down_read(&conn->params.local->defrag_sem);
  337. /* send the packet by UDP
  338. * - returns -EMSGSIZE if UDP would have to fragment the packet
  339. * to go out of the interface
  340. * - in which case, we'll have processed the ICMP error
  341. * message and update the peer record
  342. */
  343. ret = kernel_sendmsg(conn->params.local->socket, &msg, iov, 2, len);
  344. conn->params.peer->last_tx_at = ktime_get_real();
  345. up_read(&conn->params.local->defrag_sem);
  346. if (ret < 0)
  347. trace_rxrpc_tx_fail(call->debug_id, serial, ret,
  348. rxrpc_tx_fail_call_data_nofrag);
  349. if (ret == -EMSGSIZE)
  350. goto send_fragmentable;
  351. done:
  352. trace_rxrpc_tx_data(call, sp->hdr.seq, serial, whdr.flags,
  353. retrans, lost);
  354. if (ret >= 0) {
  355. ktime_t now = ktime_get_real();
  356. skb->tstamp = now;
  357. smp_wmb();
  358. sp->hdr.serial = serial;
  359. if (whdr.flags & RXRPC_REQUEST_ACK) {
  360. call->peer->rtt_last_req = now;
  361. trace_rxrpc_rtt_tx(call, rxrpc_rtt_tx_data, serial);
  362. if (call->peer->rtt_usage > 1) {
  363. unsigned long nowj = jiffies, ack_lost_at;
  364. ack_lost_at = nsecs_to_jiffies(2 * call->peer->rtt);
  365. if (ack_lost_at < 1)
  366. ack_lost_at = 1;
  367. ack_lost_at += nowj;
  368. WRITE_ONCE(call->ack_lost_at, ack_lost_at);
  369. rxrpc_reduce_call_timer(call, ack_lost_at, nowj,
  370. rxrpc_timer_set_for_lost_ack);
  371. }
  372. }
  373. if (sp->hdr.seq == 1 &&
  374. !test_and_set_bit(RXRPC_CALL_BEGAN_RX_TIMER,
  375. &call->flags)) {
  376. unsigned long nowj = jiffies, expect_rx_by;
  377. expect_rx_by = nowj + call->next_rx_timo;
  378. WRITE_ONCE(call->expect_rx_by, expect_rx_by);
  379. rxrpc_reduce_call_timer(call, expect_rx_by, nowj,
  380. rxrpc_timer_set_for_normal);
  381. }
  382. }
  383. rxrpc_set_keepalive(call);
  384. _leave(" = %d [%u]", ret, call->peer->maxdata);
  385. return ret;
  386. send_fragmentable:
  387. /* attempt to send this message with fragmentation enabled */
  388. _debug("send fragment");
  389. down_write(&conn->params.local->defrag_sem);
  390. switch (conn->params.local->srx.transport.family) {
  391. case AF_INET:
  392. opt = IP_PMTUDISC_DONT;
  393. ret = kernel_setsockopt(conn->params.local->socket,
  394. SOL_IP, IP_MTU_DISCOVER,
  395. (char *)&opt, sizeof(opt));
  396. if (ret == 0) {
  397. ret = kernel_sendmsg(conn->params.local->socket, &msg,
  398. iov, 2, len);
  399. conn->params.peer->last_tx_at = ktime_get_real();
  400. opt = IP_PMTUDISC_DO;
  401. kernel_setsockopt(conn->params.local->socket, SOL_IP,
  402. IP_MTU_DISCOVER,
  403. (char *)&opt, sizeof(opt));
  404. }
  405. break;
  406. #ifdef CONFIG_AF_RXRPC_IPV6
  407. case AF_INET6:
  408. opt = IPV6_PMTUDISC_DONT;
  409. ret = kernel_setsockopt(conn->params.local->socket,
  410. SOL_IPV6, IPV6_MTU_DISCOVER,
  411. (char *)&opt, sizeof(opt));
  412. if (ret == 0) {
  413. ret = kernel_sendmsg(conn->params.local->socket, &msg,
  414. iov, 2, len);
  415. conn->params.peer->last_tx_at = ktime_get_real();
  416. opt = IPV6_PMTUDISC_DO;
  417. kernel_setsockopt(conn->params.local->socket,
  418. SOL_IPV6, IPV6_MTU_DISCOVER,
  419. (char *)&opt, sizeof(opt));
  420. }
  421. break;
  422. #endif
  423. }
  424. if (ret < 0)
  425. trace_rxrpc_tx_fail(call->debug_id, serial, ret,
  426. rxrpc_tx_fail_call_data_frag);
  427. up_write(&conn->params.local->defrag_sem);
  428. goto done;
  429. }
  430. /*
  431. * reject packets through the local endpoint
  432. */
  433. void rxrpc_reject_packets(struct rxrpc_local *local)
  434. {
  435. struct sockaddr_rxrpc srx;
  436. struct rxrpc_skb_priv *sp;
  437. struct rxrpc_wire_header whdr;
  438. struct sk_buff *skb;
  439. struct msghdr msg;
  440. struct kvec iov[2];
  441. size_t size;
  442. __be32 code;
  443. int ret;
  444. _enter("%d", local->debug_id);
  445. iov[0].iov_base = &whdr;
  446. iov[0].iov_len = sizeof(whdr);
  447. iov[1].iov_base = &code;
  448. iov[1].iov_len = sizeof(code);
  449. size = sizeof(whdr) + sizeof(code);
  450. msg.msg_name = &srx.transport;
  451. msg.msg_control = NULL;
  452. msg.msg_controllen = 0;
  453. msg.msg_flags = 0;
  454. memset(&whdr, 0, sizeof(whdr));
  455. whdr.type = RXRPC_PACKET_TYPE_ABORT;
  456. while ((skb = skb_dequeue(&local->reject_queue))) {
  457. rxrpc_see_skb(skb, rxrpc_skb_rx_seen);
  458. sp = rxrpc_skb(skb);
  459. if (rxrpc_extract_addr_from_skb(local, &srx, skb) == 0) {
  460. msg.msg_namelen = srx.transport_len;
  461. code = htonl(skb->priority);
  462. whdr.epoch = htonl(sp->hdr.epoch);
  463. whdr.cid = htonl(sp->hdr.cid);
  464. whdr.callNumber = htonl(sp->hdr.callNumber);
  465. whdr.serviceId = htons(sp->hdr.serviceId);
  466. whdr.flags = sp->hdr.flags;
  467. whdr.flags ^= RXRPC_CLIENT_INITIATED;
  468. whdr.flags &= RXRPC_CLIENT_INITIATED;
  469. ret = kernel_sendmsg(local->socket, &msg, iov, 2, size);
  470. if (ret < 0)
  471. trace_rxrpc_tx_fail(local->debug_id, 0, ret,
  472. rxrpc_tx_fail_reject);
  473. }
  474. rxrpc_free_skb(skb, rxrpc_skb_rx_freed);
  475. }
  476. _leave("");
  477. }
  478. /*
  479. * Send a VERSION reply to a peer as a keepalive.
  480. */
  481. void rxrpc_send_keepalive(struct rxrpc_peer *peer)
  482. {
  483. struct rxrpc_wire_header whdr;
  484. struct msghdr msg;
  485. struct kvec iov[2];
  486. size_t len;
  487. int ret;
  488. _enter("");
  489. msg.msg_name = &peer->srx.transport;
  490. msg.msg_namelen = peer->srx.transport_len;
  491. msg.msg_control = NULL;
  492. msg.msg_controllen = 0;
  493. msg.msg_flags = 0;
  494. whdr.epoch = htonl(peer->local->rxnet->epoch);
  495. whdr.cid = 0;
  496. whdr.callNumber = 0;
  497. whdr.seq = 0;
  498. whdr.serial = 0;
  499. whdr.type = RXRPC_PACKET_TYPE_VERSION; /* Not client-initiated */
  500. whdr.flags = RXRPC_LAST_PACKET;
  501. whdr.userStatus = 0;
  502. whdr.securityIndex = 0;
  503. whdr._rsvd = 0;
  504. whdr.serviceId = 0;
  505. iov[0].iov_base = &whdr;
  506. iov[0].iov_len = sizeof(whdr);
  507. iov[1].iov_base = (char *)rxrpc_keepalive_string;
  508. iov[1].iov_len = sizeof(rxrpc_keepalive_string);
  509. len = iov[0].iov_len + iov[1].iov_len;
  510. _proto("Tx VERSION (keepalive)");
  511. ret = kernel_sendmsg(peer->local->socket, &msg, iov, 2, len);
  512. if (ret < 0)
  513. trace_rxrpc_tx_fail(peer->debug_id, 0, ret,
  514. rxrpc_tx_fail_version_keepalive);
  515. peer->last_tx_at = ktime_get_real();
  516. _leave("");
  517. }