af_smc.c 43 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756
  1. /*
  2. * Shared Memory Communications over RDMA (SMC-R) and RoCE
  3. *
  4. * AF_SMC protocol family socket handler keeping the AF_INET sock address type
  5. * applies to SOCK_STREAM sockets only
  6. * offers an alternative communication option for TCP-protocol sockets
  7. * applicable with RoCE-cards only
  8. *
  9. * Initial restrictions:
  10. * - support for alternate links postponed
  11. *
  12. * Copyright IBM Corp. 2016, 2018
  13. *
  14. * Author(s): Ursula Braun <ubraun@linux.vnet.ibm.com>
  15. * based on prototype from Frank Blaschka
  16. */
  17. #define KMSG_COMPONENT "smc"
  18. #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
  19. #include <linux/module.h>
  20. #include <linux/socket.h>
  21. #include <linux/workqueue.h>
  22. #include <linux/in.h>
  23. #include <linux/sched/signal.h>
  24. #include <net/sock.h>
  25. #include <net/tcp.h>
  26. #include <net/smc.h>
  27. #include <asm/ioctls.h>
  28. #include "smc.h"
  29. #include "smc_clc.h"
  30. #include "smc_llc.h"
  31. #include "smc_cdc.h"
  32. #include "smc_core.h"
  33. #include "smc_ib.h"
  34. #include "smc_pnet.h"
  35. #include "smc_tx.h"
  36. #include "smc_rx.h"
  37. #include "smc_close.h"
  38. static DEFINE_MUTEX(smc_create_lgr_pending); /* serialize link group
  39. * creation
  40. */
  41. static void smc_tcp_listen_work(struct work_struct *);
  42. static void smc_set_keepalive(struct sock *sk, int val)
  43. {
  44. struct smc_sock *smc = smc_sk(sk);
  45. smc->clcsock->sk->sk_prot->keepalive(smc->clcsock->sk, val);
  46. }
  47. static struct smc_hashinfo smc_v4_hashinfo = {
  48. .lock = __RW_LOCK_UNLOCKED(smc_v4_hashinfo.lock),
  49. };
  50. static struct smc_hashinfo smc_v6_hashinfo = {
  51. .lock = __RW_LOCK_UNLOCKED(smc_v6_hashinfo.lock),
  52. };
  53. int smc_hash_sk(struct sock *sk)
  54. {
  55. struct smc_hashinfo *h = sk->sk_prot->h.smc_hash;
  56. struct hlist_head *head;
  57. head = &h->ht;
  58. write_lock_bh(&h->lock);
  59. sk_add_node(sk, head);
  60. sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1);
  61. write_unlock_bh(&h->lock);
  62. return 0;
  63. }
  64. EXPORT_SYMBOL_GPL(smc_hash_sk);
  65. void smc_unhash_sk(struct sock *sk)
  66. {
  67. struct smc_hashinfo *h = sk->sk_prot->h.smc_hash;
  68. write_lock_bh(&h->lock);
  69. if (sk_del_node_init(sk))
  70. sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1);
  71. write_unlock_bh(&h->lock);
  72. }
  73. EXPORT_SYMBOL_GPL(smc_unhash_sk);
  74. struct proto smc_proto = {
  75. .name = "SMC",
  76. .owner = THIS_MODULE,
  77. .keepalive = smc_set_keepalive,
  78. .hash = smc_hash_sk,
  79. .unhash = smc_unhash_sk,
  80. .obj_size = sizeof(struct smc_sock),
  81. .h.smc_hash = &smc_v4_hashinfo,
  82. .slab_flags = SLAB_TYPESAFE_BY_RCU,
  83. };
  84. EXPORT_SYMBOL_GPL(smc_proto);
  85. struct proto smc_proto6 = {
  86. .name = "SMC6",
  87. .owner = THIS_MODULE,
  88. .keepalive = smc_set_keepalive,
  89. .hash = smc_hash_sk,
  90. .unhash = smc_unhash_sk,
  91. .obj_size = sizeof(struct smc_sock),
  92. .h.smc_hash = &smc_v6_hashinfo,
  93. .slab_flags = SLAB_TYPESAFE_BY_RCU,
  94. };
  95. EXPORT_SYMBOL_GPL(smc_proto6);
  96. static int smc_release(struct socket *sock)
  97. {
  98. struct sock *sk = sock->sk;
  99. struct smc_sock *smc;
  100. int rc = 0;
  101. if (!sk)
  102. goto out;
  103. smc = smc_sk(sk);
  104. if (sk->sk_state == SMC_LISTEN)
  105. /* smc_close_non_accepted() is called and acquires
  106. * sock lock for child sockets again
  107. */
  108. lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
  109. else
  110. lock_sock(sk);
  111. if (!smc->use_fallback) {
  112. rc = smc_close_active(smc);
  113. sock_set_flag(sk, SOCK_DEAD);
  114. sk->sk_shutdown |= SHUTDOWN_MASK;
  115. }
  116. if (smc->clcsock) {
  117. sock_release(smc->clcsock);
  118. smc->clcsock = NULL;
  119. }
  120. if (smc->use_fallback) {
  121. sock_put(sk); /* passive closing */
  122. sk->sk_state = SMC_CLOSED;
  123. sk->sk_state_change(sk);
  124. }
  125. /* detach socket */
  126. sock_orphan(sk);
  127. sock->sk = NULL;
  128. if (!smc->use_fallback && sk->sk_state == SMC_CLOSED)
  129. smc_conn_free(&smc->conn);
  130. release_sock(sk);
  131. sk->sk_prot->unhash(sk);
  132. sock_put(sk); /* final sock_put */
  133. out:
  134. return rc;
  135. }
  136. static void smc_destruct(struct sock *sk)
  137. {
  138. if (sk->sk_state != SMC_CLOSED)
  139. return;
  140. if (!sock_flag(sk, SOCK_DEAD))
  141. return;
  142. sk_refcnt_debug_dec(sk);
  143. }
  144. static struct sock *smc_sock_alloc(struct net *net, struct socket *sock,
  145. int protocol)
  146. {
  147. struct smc_sock *smc;
  148. struct proto *prot;
  149. struct sock *sk;
  150. prot = (protocol == SMCPROTO_SMC6) ? &smc_proto6 : &smc_proto;
  151. sk = sk_alloc(net, PF_SMC, GFP_KERNEL, prot, 0);
  152. if (!sk)
  153. return NULL;
  154. sock_init_data(sock, sk); /* sets sk_refcnt to 1 */
  155. sk->sk_state = SMC_INIT;
  156. sk->sk_destruct = smc_destruct;
  157. sk->sk_protocol = protocol;
  158. smc = smc_sk(sk);
  159. INIT_WORK(&smc->tcp_listen_work, smc_tcp_listen_work);
  160. INIT_DELAYED_WORK(&smc->conn.tx_work, smc_tx_work);
  161. INIT_LIST_HEAD(&smc->accept_q);
  162. spin_lock_init(&smc->accept_q_lock);
  163. spin_lock_init(&smc->conn.send_lock);
  164. sk->sk_prot->hash(sk);
  165. sk_refcnt_debug_inc(sk);
  166. return sk;
  167. }
  168. static int smc_bind(struct socket *sock, struct sockaddr *uaddr,
  169. int addr_len)
  170. {
  171. struct sockaddr_in *addr = (struct sockaddr_in *)uaddr;
  172. struct sock *sk = sock->sk;
  173. struct smc_sock *smc;
  174. int rc;
  175. smc = smc_sk(sk);
  176. /* replicate tests from inet_bind(), to be safe wrt. future changes */
  177. rc = -EINVAL;
  178. if (addr_len < sizeof(struct sockaddr_in))
  179. goto out;
  180. rc = -EAFNOSUPPORT;
  181. if (addr->sin_family != AF_INET &&
  182. addr->sin_family != AF_INET6 &&
  183. addr->sin_family != AF_UNSPEC)
  184. goto out;
  185. /* accept AF_UNSPEC (mapped to AF_INET) only if s_addr is INADDR_ANY */
  186. if (addr->sin_family == AF_UNSPEC &&
  187. addr->sin_addr.s_addr != htonl(INADDR_ANY))
  188. goto out;
  189. lock_sock(sk);
  190. /* Check if socket is already active */
  191. rc = -EINVAL;
  192. if (sk->sk_state != SMC_INIT)
  193. goto out_rel;
  194. smc->clcsock->sk->sk_reuse = sk->sk_reuse;
  195. rc = kernel_bind(smc->clcsock, uaddr, addr_len);
  196. out_rel:
  197. release_sock(sk);
  198. out:
  199. return rc;
  200. }
  201. static void smc_copy_sock_settings(struct sock *nsk, struct sock *osk,
  202. unsigned long mask)
  203. {
  204. /* options we don't get control via setsockopt for */
  205. nsk->sk_type = osk->sk_type;
  206. nsk->sk_sndbuf = osk->sk_sndbuf;
  207. nsk->sk_rcvbuf = osk->sk_rcvbuf;
  208. nsk->sk_sndtimeo = osk->sk_sndtimeo;
  209. nsk->sk_rcvtimeo = osk->sk_rcvtimeo;
  210. nsk->sk_mark = osk->sk_mark;
  211. nsk->sk_priority = osk->sk_priority;
  212. nsk->sk_rcvlowat = osk->sk_rcvlowat;
  213. nsk->sk_bound_dev_if = osk->sk_bound_dev_if;
  214. nsk->sk_err = osk->sk_err;
  215. nsk->sk_flags &= ~mask;
  216. nsk->sk_flags |= osk->sk_flags & mask;
  217. }
  218. #define SK_FLAGS_SMC_TO_CLC ((1UL << SOCK_URGINLINE) | \
  219. (1UL << SOCK_KEEPOPEN) | \
  220. (1UL << SOCK_LINGER) | \
  221. (1UL << SOCK_BROADCAST) | \
  222. (1UL << SOCK_TIMESTAMP) | \
  223. (1UL << SOCK_DBG) | \
  224. (1UL << SOCK_RCVTSTAMP) | \
  225. (1UL << SOCK_RCVTSTAMPNS) | \
  226. (1UL << SOCK_LOCALROUTE) | \
  227. (1UL << SOCK_TIMESTAMPING_RX_SOFTWARE) | \
  228. (1UL << SOCK_RXQ_OVFL) | \
  229. (1UL << SOCK_WIFI_STATUS) | \
  230. (1UL << SOCK_NOFCS) | \
  231. (1UL << SOCK_FILTER_LOCKED))
  232. /* copy only relevant settings and flags of SOL_SOCKET level from smc to
  233. * clc socket (since smc is not called for these options from net/core)
  234. */
  235. static void smc_copy_sock_settings_to_clc(struct smc_sock *smc)
  236. {
  237. smc_copy_sock_settings(smc->clcsock->sk, &smc->sk, SK_FLAGS_SMC_TO_CLC);
  238. }
  239. #define SK_FLAGS_CLC_TO_SMC ((1UL << SOCK_URGINLINE) | \
  240. (1UL << SOCK_KEEPOPEN) | \
  241. (1UL << SOCK_LINGER) | \
  242. (1UL << SOCK_DBG))
  243. /* copy only settings and flags relevant for smc from clc to smc socket */
  244. static void smc_copy_sock_settings_to_smc(struct smc_sock *smc)
  245. {
  246. smc_copy_sock_settings(&smc->sk, smc->clcsock->sk, SK_FLAGS_CLC_TO_SMC);
  247. }
  248. /* register a new rmb, optionally send confirm_rkey msg to register with peer */
  249. static int smc_reg_rmb(struct smc_link *link, struct smc_buf_desc *rmb_desc,
  250. bool conf_rkey)
  251. {
  252. /* register memory region for new rmb */
  253. if (smc_wr_reg_send(link, rmb_desc->mr_rx[SMC_SINGLE_LINK])) {
  254. rmb_desc->regerr = 1;
  255. return -EFAULT;
  256. }
  257. if (!conf_rkey)
  258. return 0;
  259. /* exchange confirm_rkey msg with peer */
  260. if (smc_llc_do_confirm_rkey(link, rmb_desc)) {
  261. rmb_desc->regerr = 1;
  262. return -EFAULT;
  263. }
  264. return 0;
  265. }
  266. static int smc_clnt_conf_first_link(struct smc_sock *smc)
  267. {
  268. struct net *net = sock_net(smc->clcsock->sk);
  269. struct smc_link_group *lgr = smc->conn.lgr;
  270. struct smc_link *link;
  271. int rest;
  272. int rc;
  273. link = &lgr->lnk[SMC_SINGLE_LINK];
  274. /* receive CONFIRM LINK request from server over RoCE fabric */
  275. rest = wait_for_completion_interruptible_timeout(
  276. &link->llc_confirm,
  277. SMC_LLC_WAIT_FIRST_TIME);
  278. if (rest <= 0) {
  279. struct smc_clc_msg_decline dclc;
  280. rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
  281. SMC_CLC_DECLINE);
  282. return rc;
  283. }
  284. if (link->llc_confirm_rc)
  285. return SMC_CLC_DECL_RMBE_EC;
  286. rc = smc_ib_modify_qp_rts(link);
  287. if (rc)
  288. return SMC_CLC_DECL_INTERR;
  289. smc_wr_remember_qp_attr(link);
  290. if (smc_reg_rmb(link, smc->conn.rmb_desc, false))
  291. return SMC_CLC_DECL_INTERR;
  292. /* send CONFIRM LINK response over RoCE fabric */
  293. rc = smc_llc_send_confirm_link(link,
  294. link->smcibdev->mac[link->ibport - 1],
  295. &link->smcibdev->gid[link->ibport - 1],
  296. SMC_LLC_RESP);
  297. if (rc < 0)
  298. return SMC_CLC_DECL_TCL;
  299. /* receive ADD LINK request from server over RoCE fabric */
  300. rest = wait_for_completion_interruptible_timeout(&link->llc_add,
  301. SMC_LLC_WAIT_TIME);
  302. if (rest <= 0) {
  303. struct smc_clc_msg_decline dclc;
  304. rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
  305. SMC_CLC_DECLINE);
  306. return rc;
  307. }
  308. /* send add link reject message, only one link supported for now */
  309. rc = smc_llc_send_add_link(link,
  310. link->smcibdev->mac[link->ibport - 1],
  311. &link->smcibdev->gid[link->ibport - 1],
  312. SMC_LLC_RESP);
  313. if (rc < 0)
  314. return SMC_CLC_DECL_TCL;
  315. smc_llc_link_active(link, net->ipv4.sysctl_tcp_keepalive_time);
  316. return 0;
  317. }
  318. static void smc_conn_save_peer_info(struct smc_sock *smc,
  319. struct smc_clc_msg_accept_confirm *clc)
  320. {
  321. int bufsize = smc_uncompress_bufsize(clc->rmbe_size);
  322. smc->conn.peer_rmbe_idx = clc->rmbe_idx;
  323. smc->conn.local_tx_ctrl.token = ntohl(clc->rmbe_alert_token);
  324. smc->conn.peer_rmbe_size = bufsize;
  325. atomic_set(&smc->conn.peer_rmbe_space, smc->conn.peer_rmbe_size);
  326. smc->conn.tx_off = bufsize * (smc->conn.peer_rmbe_idx - 1);
  327. }
  328. static void smc_link_save_peer_info(struct smc_link *link,
  329. struct smc_clc_msg_accept_confirm *clc)
  330. {
  331. link->peer_qpn = ntoh24(clc->qpn);
  332. memcpy(link->peer_gid, clc->lcl.gid, SMC_GID_SIZE);
  333. memcpy(link->peer_mac, clc->lcl.mac, sizeof(link->peer_mac));
  334. link->peer_psn = ntoh24(clc->psn);
  335. link->peer_mtu = clc->qp_mtu;
  336. }
  337. /* fall back during connect */
  338. static int smc_connect_fallback(struct smc_sock *smc)
  339. {
  340. smc->use_fallback = true;
  341. smc_copy_sock_settings_to_clc(smc);
  342. if (smc->sk.sk_state == SMC_INIT)
  343. smc->sk.sk_state = SMC_ACTIVE;
  344. return 0;
  345. }
  346. /* decline and fall back during connect */
  347. static int smc_connect_decline_fallback(struct smc_sock *smc, int reason_code)
  348. {
  349. int rc;
  350. if (reason_code < 0) /* error, fallback is not possible */
  351. return reason_code;
  352. if (reason_code != SMC_CLC_DECL_REPLY) {
  353. rc = smc_clc_send_decline(smc, reason_code);
  354. if (rc < 0)
  355. return rc;
  356. }
  357. return smc_connect_fallback(smc);
  358. }
  359. /* abort connecting */
  360. static int smc_connect_abort(struct smc_sock *smc, int reason_code,
  361. int local_contact)
  362. {
  363. if (local_contact == SMC_FIRST_CONTACT)
  364. smc_lgr_forget(smc->conn.lgr);
  365. mutex_unlock(&smc_create_lgr_pending);
  366. smc_conn_free(&smc->conn);
  367. if (reason_code < 0 && smc->sk.sk_state == SMC_INIT)
  368. sock_put(&smc->sk); /* passive closing */
  369. return reason_code;
  370. }
  371. /* check if there is a rdma device available for this connection. */
  372. /* called for connect and listen */
  373. static int smc_check_rdma(struct smc_sock *smc, struct smc_ib_device **ibdev,
  374. u8 *ibport)
  375. {
  376. int reason_code = 0;
  377. /* PNET table look up: search active ib_device and port
  378. * within same PNETID that also contains the ethernet device
  379. * used for the internal TCP socket
  380. */
  381. smc_pnet_find_roce_resource(smc->clcsock->sk, ibdev, ibport);
  382. if (!(*ibdev))
  383. reason_code = SMC_CLC_DECL_CNFERR; /* configuration error */
  384. return reason_code;
  385. }
  386. /* CLC handshake during connect */
  387. static int smc_connect_clc(struct smc_sock *smc,
  388. struct smc_clc_msg_accept_confirm *aclc,
  389. struct smc_ib_device *ibdev, u8 ibport)
  390. {
  391. int rc = 0;
  392. /* do inband token exchange */
  393. rc = smc_clc_send_proposal(smc, ibdev, ibport);
  394. if (rc)
  395. return rc;
  396. /* receive SMC Accept CLC message */
  397. return smc_clc_wait_msg(smc, aclc, sizeof(*aclc), SMC_CLC_ACCEPT);
  398. }
  399. /* setup for RDMA connection of client */
  400. static int smc_connect_rdma(struct smc_sock *smc,
  401. struct smc_clc_msg_accept_confirm *aclc,
  402. struct smc_ib_device *ibdev, u8 ibport)
  403. {
  404. int local_contact = SMC_FIRST_CONTACT;
  405. struct smc_link *link;
  406. int reason_code = 0;
  407. mutex_lock(&smc_create_lgr_pending);
  408. local_contact = smc_conn_create(smc, ibdev, ibport, &aclc->lcl,
  409. aclc->hdr.flag);
  410. if (local_contact < 0) {
  411. if (local_contact == -ENOMEM)
  412. reason_code = SMC_CLC_DECL_MEM;/* insufficient memory*/
  413. else if (local_contact == -ENOLINK)
  414. reason_code = SMC_CLC_DECL_SYNCERR; /* synchr. error */
  415. else
  416. reason_code = SMC_CLC_DECL_INTERR; /* other error */
  417. return smc_connect_abort(smc, reason_code, 0);
  418. }
  419. link = &smc->conn.lgr->lnk[SMC_SINGLE_LINK];
  420. smc_conn_save_peer_info(smc, aclc);
  421. /* create send buffer and rmb */
  422. if (smc_buf_create(smc))
  423. return smc_connect_abort(smc, SMC_CLC_DECL_MEM, local_contact);
  424. if (local_contact == SMC_FIRST_CONTACT)
  425. smc_link_save_peer_info(link, aclc);
  426. if (smc_rmb_rtoken_handling(&smc->conn, aclc))
  427. return smc_connect_abort(smc, SMC_CLC_DECL_INTERR,
  428. local_contact);
  429. smc_close_init(smc);
  430. smc_rx_init(smc);
  431. if (local_contact == SMC_FIRST_CONTACT) {
  432. if (smc_ib_ready_link(link))
  433. return smc_connect_abort(smc, SMC_CLC_DECL_INTERR,
  434. local_contact);
  435. } else {
  436. if (!smc->conn.rmb_desc->reused &&
  437. smc_reg_rmb(link, smc->conn.rmb_desc, true))
  438. return smc_connect_abort(smc, SMC_CLC_DECL_INTERR,
  439. local_contact);
  440. }
  441. smc_rmb_sync_sg_for_device(&smc->conn);
  442. reason_code = smc_clc_send_confirm(smc);
  443. if (reason_code)
  444. return smc_connect_abort(smc, reason_code, local_contact);
  445. smc_tx_init(smc);
  446. if (local_contact == SMC_FIRST_CONTACT) {
  447. /* QP confirmation over RoCE fabric */
  448. reason_code = smc_clnt_conf_first_link(smc);
  449. if (reason_code)
  450. return smc_connect_abort(smc, reason_code,
  451. local_contact);
  452. }
  453. mutex_unlock(&smc_create_lgr_pending);
  454. smc_copy_sock_settings_to_clc(smc);
  455. if (smc->sk.sk_state == SMC_INIT)
  456. smc->sk.sk_state = SMC_ACTIVE;
  457. return 0;
  458. }
  459. /* perform steps before actually connecting */
  460. static int __smc_connect(struct smc_sock *smc)
  461. {
  462. struct smc_clc_msg_accept_confirm aclc;
  463. struct smc_ib_device *ibdev;
  464. int rc = 0;
  465. u8 ibport;
  466. sock_hold(&smc->sk); /* sock put in passive closing */
  467. if (smc->use_fallback)
  468. return smc_connect_fallback(smc);
  469. /* if peer has not signalled SMC-capability, fall back */
  470. if (!tcp_sk(smc->clcsock->sk)->syn_smc)
  471. return smc_connect_fallback(smc);
  472. /* IPSec connections opt out of SMC-R optimizations */
  473. if (using_ipsec(smc))
  474. return smc_connect_decline_fallback(smc, SMC_CLC_DECL_IPSEC);
  475. /* check if a RDMA device is available; if not, fall back */
  476. if (smc_check_rdma(smc, &ibdev, &ibport))
  477. return smc_connect_decline_fallback(smc, SMC_CLC_DECL_CNFERR);
  478. /* perform CLC handshake */
  479. rc = smc_connect_clc(smc, &aclc, ibdev, ibport);
  480. if (rc)
  481. return smc_connect_decline_fallback(smc, rc);
  482. /* connect using rdma */
  483. rc = smc_connect_rdma(smc, &aclc, ibdev, ibport);
  484. if (rc)
  485. return smc_connect_decline_fallback(smc, rc);
  486. return 0;
  487. }
  488. static int smc_connect(struct socket *sock, struct sockaddr *addr,
  489. int alen, int flags)
  490. {
  491. struct sock *sk = sock->sk;
  492. struct smc_sock *smc;
  493. int rc = -EINVAL;
  494. smc = smc_sk(sk);
  495. /* separate smc parameter checking to be safe */
  496. if (alen < sizeof(addr->sa_family))
  497. goto out_err;
  498. if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6)
  499. goto out_err;
  500. lock_sock(sk);
  501. switch (sk->sk_state) {
  502. default:
  503. goto out;
  504. case SMC_ACTIVE:
  505. rc = -EISCONN;
  506. goto out;
  507. case SMC_INIT:
  508. rc = 0;
  509. break;
  510. }
  511. smc_copy_sock_settings_to_clc(smc);
  512. tcp_sk(smc->clcsock->sk)->syn_smc = 1;
  513. rc = kernel_connect(smc->clcsock, addr, alen, flags);
  514. if (rc)
  515. goto out;
  516. rc = __smc_connect(smc);
  517. if (rc < 0)
  518. goto out;
  519. else
  520. rc = 0; /* success cases including fallback */
  521. out:
  522. release_sock(sk);
  523. out_err:
  524. return rc;
  525. }
  526. static int smc_clcsock_accept(struct smc_sock *lsmc, struct smc_sock **new_smc)
  527. {
  528. struct socket *new_clcsock = NULL;
  529. struct sock *lsk = &lsmc->sk;
  530. struct sock *new_sk;
  531. int rc;
  532. release_sock(lsk);
  533. new_sk = smc_sock_alloc(sock_net(lsk), NULL, lsk->sk_protocol);
  534. if (!new_sk) {
  535. rc = -ENOMEM;
  536. lsk->sk_err = ENOMEM;
  537. *new_smc = NULL;
  538. lock_sock(lsk);
  539. goto out;
  540. }
  541. *new_smc = smc_sk(new_sk);
  542. rc = kernel_accept(lsmc->clcsock, &new_clcsock, 0);
  543. lock_sock(lsk);
  544. if (rc < 0)
  545. lsk->sk_err = -rc;
  546. if (rc < 0 || lsk->sk_state == SMC_CLOSED) {
  547. if (new_clcsock)
  548. sock_release(new_clcsock);
  549. new_sk->sk_state = SMC_CLOSED;
  550. sock_set_flag(new_sk, SOCK_DEAD);
  551. new_sk->sk_prot->unhash(new_sk);
  552. sock_put(new_sk); /* final */
  553. *new_smc = NULL;
  554. goto out;
  555. }
  556. (*new_smc)->clcsock = new_clcsock;
  557. out:
  558. return rc;
  559. }
  560. /* add a just created sock to the accept queue of the listen sock as
  561. * candidate for a following socket accept call from user space
  562. */
  563. static void smc_accept_enqueue(struct sock *parent, struct sock *sk)
  564. {
  565. struct smc_sock *par = smc_sk(parent);
  566. sock_hold(sk); /* sock_put in smc_accept_unlink () */
  567. spin_lock(&par->accept_q_lock);
  568. list_add_tail(&smc_sk(sk)->accept_q, &par->accept_q);
  569. spin_unlock(&par->accept_q_lock);
  570. sk_acceptq_added(parent);
  571. }
  572. /* remove a socket from the accept queue of its parental listening socket */
  573. static void smc_accept_unlink(struct sock *sk)
  574. {
  575. struct smc_sock *par = smc_sk(sk)->listen_smc;
  576. spin_lock(&par->accept_q_lock);
  577. list_del_init(&smc_sk(sk)->accept_q);
  578. spin_unlock(&par->accept_q_lock);
  579. sk_acceptq_removed(&smc_sk(sk)->listen_smc->sk);
  580. sock_put(sk); /* sock_hold in smc_accept_enqueue */
  581. }
  582. /* remove a sock from the accept queue to bind it to a new socket created
  583. * for a socket accept call from user space
  584. */
  585. struct sock *smc_accept_dequeue(struct sock *parent,
  586. struct socket *new_sock)
  587. {
  588. struct smc_sock *isk, *n;
  589. struct sock *new_sk;
  590. list_for_each_entry_safe(isk, n, &smc_sk(parent)->accept_q, accept_q) {
  591. new_sk = (struct sock *)isk;
  592. smc_accept_unlink(new_sk);
  593. if (new_sk->sk_state == SMC_CLOSED) {
  594. if (isk->clcsock) {
  595. sock_release(isk->clcsock);
  596. isk->clcsock = NULL;
  597. }
  598. new_sk->sk_prot->unhash(new_sk);
  599. sock_put(new_sk); /* final */
  600. continue;
  601. }
  602. if (new_sock)
  603. sock_graft(new_sk, new_sock);
  604. return new_sk;
  605. }
  606. return NULL;
  607. }
  608. /* clean up for a created but never accepted sock */
  609. void smc_close_non_accepted(struct sock *sk)
  610. {
  611. struct smc_sock *smc = smc_sk(sk);
  612. lock_sock(sk);
  613. if (!sk->sk_lingertime)
  614. /* wait for peer closing */
  615. sk->sk_lingertime = SMC_MAX_STREAM_WAIT_TIMEOUT;
  616. if (!smc->use_fallback) {
  617. smc_close_active(smc);
  618. sock_set_flag(sk, SOCK_DEAD);
  619. sk->sk_shutdown |= SHUTDOWN_MASK;
  620. }
  621. if (smc->clcsock) {
  622. struct socket *tcp;
  623. tcp = smc->clcsock;
  624. smc->clcsock = NULL;
  625. sock_release(tcp);
  626. }
  627. if (smc->use_fallback) {
  628. sock_put(sk); /* passive closing */
  629. sk->sk_state = SMC_CLOSED;
  630. } else {
  631. if (sk->sk_state == SMC_CLOSED)
  632. smc_conn_free(&smc->conn);
  633. }
  634. release_sock(sk);
  635. sk->sk_prot->unhash(sk);
  636. sock_put(sk); /* final sock_put */
  637. }
  638. static int smc_serv_conf_first_link(struct smc_sock *smc)
  639. {
  640. struct net *net = sock_net(smc->clcsock->sk);
  641. struct smc_link_group *lgr = smc->conn.lgr;
  642. struct smc_link *link;
  643. int rest;
  644. int rc;
  645. link = &lgr->lnk[SMC_SINGLE_LINK];
  646. if (smc_reg_rmb(link, smc->conn.rmb_desc, false))
  647. return SMC_CLC_DECL_INTERR;
  648. /* send CONFIRM LINK request to client over the RoCE fabric */
  649. rc = smc_llc_send_confirm_link(link,
  650. link->smcibdev->mac[link->ibport - 1],
  651. &link->smcibdev->gid[link->ibport - 1],
  652. SMC_LLC_REQ);
  653. if (rc < 0)
  654. return SMC_CLC_DECL_TCL;
  655. /* receive CONFIRM LINK response from client over the RoCE fabric */
  656. rest = wait_for_completion_interruptible_timeout(
  657. &link->llc_confirm_resp,
  658. SMC_LLC_WAIT_FIRST_TIME);
  659. if (rest <= 0) {
  660. struct smc_clc_msg_decline dclc;
  661. rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
  662. SMC_CLC_DECLINE);
  663. return rc;
  664. }
  665. if (link->llc_confirm_resp_rc)
  666. return SMC_CLC_DECL_RMBE_EC;
  667. /* send ADD LINK request to client over the RoCE fabric */
  668. rc = smc_llc_send_add_link(link,
  669. link->smcibdev->mac[link->ibport - 1],
  670. &link->smcibdev->gid[link->ibport - 1],
  671. SMC_LLC_REQ);
  672. if (rc < 0)
  673. return SMC_CLC_DECL_TCL;
  674. /* receive ADD LINK response from client over the RoCE fabric */
  675. rest = wait_for_completion_interruptible_timeout(&link->llc_add_resp,
  676. SMC_LLC_WAIT_TIME);
  677. if (rest <= 0) {
  678. struct smc_clc_msg_decline dclc;
  679. rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
  680. SMC_CLC_DECLINE);
  681. return rc;
  682. }
  683. smc_llc_link_active(link, net->ipv4.sysctl_tcp_keepalive_time);
  684. return 0;
  685. }
  686. /* listen worker: finish */
  687. static void smc_listen_out(struct smc_sock *new_smc)
  688. {
  689. struct smc_sock *lsmc = new_smc->listen_smc;
  690. struct sock *newsmcsk = &new_smc->sk;
  691. lock_sock_nested(&lsmc->sk, SINGLE_DEPTH_NESTING);
  692. if (lsmc->sk.sk_state == SMC_LISTEN) {
  693. smc_accept_enqueue(&lsmc->sk, newsmcsk);
  694. } else { /* no longer listening */
  695. smc_close_non_accepted(newsmcsk);
  696. }
  697. release_sock(&lsmc->sk);
  698. /* Wake up accept */
  699. lsmc->sk.sk_data_ready(&lsmc->sk);
  700. sock_put(&lsmc->sk); /* sock_hold in smc_tcp_listen_work */
  701. }
  702. /* listen worker: finish in state connected */
  703. static void smc_listen_out_connected(struct smc_sock *new_smc)
  704. {
  705. struct sock *newsmcsk = &new_smc->sk;
  706. sk_refcnt_debug_inc(newsmcsk);
  707. if (newsmcsk->sk_state == SMC_INIT)
  708. newsmcsk->sk_state = SMC_ACTIVE;
  709. smc_listen_out(new_smc);
  710. }
  711. /* listen worker: finish in error state */
  712. static void smc_listen_out_err(struct smc_sock *new_smc)
  713. {
  714. struct sock *newsmcsk = &new_smc->sk;
  715. if (newsmcsk->sk_state == SMC_INIT)
  716. sock_put(&new_smc->sk); /* passive closing */
  717. newsmcsk->sk_state = SMC_CLOSED;
  718. smc_conn_free(&new_smc->conn);
  719. smc_listen_out(new_smc);
  720. }
  721. /* listen worker: decline and fall back if possible */
  722. static void smc_listen_decline(struct smc_sock *new_smc, int reason_code,
  723. int local_contact)
  724. {
  725. /* RDMA setup failed, switch back to TCP */
  726. if (local_contact == SMC_FIRST_CONTACT)
  727. smc_lgr_forget(new_smc->conn.lgr);
  728. if (reason_code < 0) { /* error, no fallback possible */
  729. smc_listen_out_err(new_smc);
  730. return;
  731. }
  732. smc_conn_free(&new_smc->conn);
  733. new_smc->use_fallback = true;
  734. if (reason_code && reason_code != SMC_CLC_DECL_REPLY) {
  735. if (smc_clc_send_decline(new_smc, reason_code) < 0) {
  736. smc_listen_out_err(new_smc);
  737. return;
  738. }
  739. }
  740. smc_listen_out_connected(new_smc);
  741. }
  742. /* listen worker: check prefixes */
  743. static int smc_listen_rdma_check(struct smc_sock *new_smc,
  744. struct smc_clc_msg_proposal *pclc)
  745. {
  746. struct smc_clc_msg_proposal_prefix *pclc_prfx;
  747. struct socket *newclcsock = new_smc->clcsock;
  748. pclc_prfx = smc_clc_proposal_get_prefix(pclc);
  749. if (smc_clc_prfx_match(newclcsock, pclc_prfx))
  750. return SMC_CLC_DECL_CNFERR;
  751. return 0;
  752. }
  753. /* listen worker: initialize connection and buffers */
  754. static int smc_listen_rdma_init(struct smc_sock *new_smc,
  755. struct smc_clc_msg_proposal *pclc,
  756. struct smc_ib_device *ibdev, u8 ibport,
  757. int *local_contact)
  758. {
  759. /* allocate connection / link group */
  760. *local_contact = smc_conn_create(new_smc, ibdev, ibport, &pclc->lcl, 0);
  761. if (*local_contact < 0) {
  762. if (*local_contact == -ENOMEM)
  763. return SMC_CLC_DECL_MEM;/* insufficient memory*/
  764. return SMC_CLC_DECL_INTERR; /* other error */
  765. }
  766. /* create send buffer and rmb */
  767. if (smc_buf_create(new_smc))
  768. return SMC_CLC_DECL_MEM;
  769. return 0;
  770. }
  771. /* listen worker: register buffers */
  772. static int smc_listen_rdma_reg(struct smc_sock *new_smc, int local_contact)
  773. {
  774. struct smc_link *link = &new_smc->conn.lgr->lnk[SMC_SINGLE_LINK];
  775. if (local_contact != SMC_FIRST_CONTACT) {
  776. if (!new_smc->conn.rmb_desc->reused) {
  777. if (smc_reg_rmb(link, new_smc->conn.rmb_desc, true))
  778. return SMC_CLC_DECL_INTERR;
  779. }
  780. }
  781. smc_rmb_sync_sg_for_device(&new_smc->conn);
  782. return 0;
  783. }
  784. /* listen worker: finish RDMA setup */
  785. static void smc_listen_rdma_finish(struct smc_sock *new_smc,
  786. struct smc_clc_msg_accept_confirm *cclc,
  787. int local_contact)
  788. {
  789. struct smc_link *link = &new_smc->conn.lgr->lnk[SMC_SINGLE_LINK];
  790. int reason_code = 0;
  791. if (local_contact == SMC_FIRST_CONTACT)
  792. smc_link_save_peer_info(link, cclc);
  793. if (smc_rmb_rtoken_handling(&new_smc->conn, cclc)) {
  794. reason_code = SMC_CLC_DECL_INTERR;
  795. goto decline;
  796. }
  797. if (local_contact == SMC_FIRST_CONTACT) {
  798. if (smc_ib_ready_link(link)) {
  799. reason_code = SMC_CLC_DECL_INTERR;
  800. goto decline;
  801. }
  802. /* QP confirmation over RoCE fabric */
  803. reason_code = smc_serv_conf_first_link(new_smc);
  804. if (reason_code)
  805. goto decline;
  806. }
  807. return;
  808. decline:
  809. mutex_unlock(&smc_create_lgr_pending);
  810. smc_listen_decline(new_smc, reason_code, local_contact);
  811. }
  812. /* setup for RDMA connection of server */
  813. static void smc_listen_work(struct work_struct *work)
  814. {
  815. struct smc_sock *new_smc = container_of(work, struct smc_sock,
  816. smc_listen_work);
  817. struct socket *newclcsock = new_smc->clcsock;
  818. struct smc_clc_msg_accept_confirm cclc;
  819. struct smc_clc_msg_proposal *pclc;
  820. struct smc_ib_device *ibdev;
  821. u8 buf[SMC_CLC_MAX_LEN];
  822. int local_contact = 0;
  823. int reason_code = 0;
  824. int rc = 0;
  825. u8 ibport;
  826. if (new_smc->use_fallback) {
  827. smc_listen_out_connected(new_smc);
  828. return;
  829. }
  830. /* check if peer is smc capable */
  831. if (!tcp_sk(newclcsock->sk)->syn_smc) {
  832. new_smc->use_fallback = true;
  833. smc_listen_out_connected(new_smc);
  834. return;
  835. }
  836. /* do inband token exchange -
  837. * wait for and receive SMC Proposal CLC message
  838. */
  839. pclc = (struct smc_clc_msg_proposal *)&buf;
  840. reason_code = smc_clc_wait_msg(new_smc, pclc, SMC_CLC_MAX_LEN,
  841. SMC_CLC_PROPOSAL);
  842. if (reason_code) {
  843. smc_listen_decline(new_smc, reason_code, 0);
  844. return;
  845. }
  846. /* IPSec connections opt out of SMC-R optimizations */
  847. if (using_ipsec(new_smc)) {
  848. smc_listen_decline(new_smc, SMC_CLC_DECL_IPSEC, 0);
  849. return;
  850. }
  851. mutex_lock(&smc_create_lgr_pending);
  852. smc_close_init(new_smc);
  853. smc_rx_init(new_smc);
  854. smc_tx_init(new_smc);
  855. /* check if RDMA is available */
  856. if (smc_check_rdma(new_smc, &ibdev, &ibport) ||
  857. smc_listen_rdma_check(new_smc, pclc) ||
  858. smc_listen_rdma_init(new_smc, pclc, ibdev, ibport,
  859. &local_contact) ||
  860. smc_listen_rdma_reg(new_smc, local_contact)) {
  861. /* SMC not supported, decline */
  862. mutex_unlock(&smc_create_lgr_pending);
  863. smc_listen_decline(new_smc, SMC_CLC_DECL_CNFERR, local_contact);
  864. return;
  865. }
  866. /* send SMC Accept CLC message */
  867. rc = smc_clc_send_accept(new_smc, local_contact);
  868. if (rc) {
  869. mutex_unlock(&smc_create_lgr_pending);
  870. smc_listen_decline(new_smc, rc, local_contact);
  871. return;
  872. }
  873. /* receive SMC Confirm CLC message */
  874. reason_code = smc_clc_wait_msg(new_smc, &cclc, sizeof(cclc),
  875. SMC_CLC_CONFIRM);
  876. if (reason_code) {
  877. mutex_unlock(&smc_create_lgr_pending);
  878. smc_listen_decline(new_smc, reason_code, local_contact);
  879. return;
  880. }
  881. /* finish worker */
  882. smc_listen_rdma_finish(new_smc, &cclc, local_contact);
  883. smc_conn_save_peer_info(new_smc, &cclc);
  884. mutex_unlock(&smc_create_lgr_pending);
  885. smc_listen_out_connected(new_smc);
  886. }
  887. static void smc_tcp_listen_work(struct work_struct *work)
  888. {
  889. struct smc_sock *lsmc = container_of(work, struct smc_sock,
  890. tcp_listen_work);
  891. struct sock *lsk = &lsmc->sk;
  892. struct smc_sock *new_smc;
  893. int rc = 0;
  894. lock_sock(lsk);
  895. while (lsk->sk_state == SMC_LISTEN) {
  896. rc = smc_clcsock_accept(lsmc, &new_smc);
  897. if (rc)
  898. goto out;
  899. if (!new_smc)
  900. continue;
  901. new_smc->listen_smc = lsmc;
  902. new_smc->use_fallback = lsmc->use_fallback;
  903. sock_hold(lsk); /* sock_put in smc_listen_work */
  904. INIT_WORK(&new_smc->smc_listen_work, smc_listen_work);
  905. smc_copy_sock_settings_to_smc(new_smc);
  906. sock_hold(&new_smc->sk); /* sock_put in passive closing */
  907. if (!schedule_work(&new_smc->smc_listen_work))
  908. sock_put(&new_smc->sk);
  909. }
  910. out:
  911. release_sock(lsk);
  912. sock_put(&lsmc->sk); /* sock_hold in smc_listen */
  913. }
  914. static int smc_listen(struct socket *sock, int backlog)
  915. {
  916. struct sock *sk = sock->sk;
  917. struct smc_sock *smc;
  918. int rc;
  919. smc = smc_sk(sk);
  920. lock_sock(sk);
  921. rc = -EINVAL;
  922. if ((sk->sk_state != SMC_INIT) && (sk->sk_state != SMC_LISTEN))
  923. goto out;
  924. rc = 0;
  925. if (sk->sk_state == SMC_LISTEN) {
  926. sk->sk_max_ack_backlog = backlog;
  927. goto out;
  928. }
  929. /* some socket options are handled in core, so we could not apply
  930. * them to the clc socket -- copy smc socket options to clc socket
  931. */
  932. smc_copy_sock_settings_to_clc(smc);
  933. if (!smc->use_fallback)
  934. tcp_sk(smc->clcsock->sk)->syn_smc = 1;
  935. rc = kernel_listen(smc->clcsock, backlog);
  936. if (rc)
  937. goto out;
  938. sk->sk_max_ack_backlog = backlog;
  939. sk->sk_ack_backlog = 0;
  940. sk->sk_state = SMC_LISTEN;
  941. INIT_WORK(&smc->tcp_listen_work, smc_tcp_listen_work);
  942. sock_hold(sk); /* sock_hold in tcp_listen_worker */
  943. if (!schedule_work(&smc->tcp_listen_work))
  944. sock_put(sk);
  945. out:
  946. release_sock(sk);
  947. return rc;
  948. }
  949. static int smc_accept(struct socket *sock, struct socket *new_sock,
  950. int flags, bool kern)
  951. {
  952. struct sock *sk = sock->sk, *nsk;
  953. DECLARE_WAITQUEUE(wait, current);
  954. struct smc_sock *lsmc;
  955. long timeo;
  956. int rc = 0;
  957. lsmc = smc_sk(sk);
  958. sock_hold(sk); /* sock_put below */
  959. lock_sock(sk);
  960. if (lsmc->sk.sk_state != SMC_LISTEN) {
  961. rc = -EINVAL;
  962. release_sock(sk);
  963. goto out;
  964. }
  965. /* Wait for an incoming connection */
  966. timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
  967. add_wait_queue_exclusive(sk_sleep(sk), &wait);
  968. while (!(nsk = smc_accept_dequeue(sk, new_sock))) {
  969. set_current_state(TASK_INTERRUPTIBLE);
  970. if (!timeo) {
  971. rc = -EAGAIN;
  972. break;
  973. }
  974. release_sock(sk);
  975. timeo = schedule_timeout(timeo);
  976. /* wakeup by sk_data_ready in smc_listen_work() */
  977. sched_annotate_sleep();
  978. lock_sock(sk);
  979. if (signal_pending(current)) {
  980. rc = sock_intr_errno(timeo);
  981. break;
  982. }
  983. }
  984. set_current_state(TASK_RUNNING);
  985. remove_wait_queue(sk_sleep(sk), &wait);
  986. if (!rc)
  987. rc = sock_error(nsk);
  988. release_sock(sk);
  989. if (rc)
  990. goto out;
  991. if (lsmc->sockopt_defer_accept && !(flags & O_NONBLOCK)) {
  992. /* wait till data arrives on the socket */
  993. timeo = msecs_to_jiffies(lsmc->sockopt_defer_accept *
  994. MSEC_PER_SEC);
  995. if (smc_sk(nsk)->use_fallback) {
  996. struct sock *clcsk = smc_sk(nsk)->clcsock->sk;
  997. lock_sock(clcsk);
  998. if (skb_queue_empty(&clcsk->sk_receive_queue))
  999. sk_wait_data(clcsk, &timeo, NULL);
  1000. release_sock(clcsk);
  1001. } else if (!atomic_read(&smc_sk(nsk)->conn.bytes_to_rcv)) {
  1002. lock_sock(nsk);
  1003. smc_rx_wait(smc_sk(nsk), &timeo, smc_rx_data_available);
  1004. release_sock(nsk);
  1005. }
  1006. }
  1007. out:
  1008. sock_put(sk); /* sock_hold above */
  1009. return rc;
  1010. }
  1011. static int smc_getname(struct socket *sock, struct sockaddr *addr,
  1012. int peer)
  1013. {
  1014. struct smc_sock *smc;
  1015. if (peer && (sock->sk->sk_state != SMC_ACTIVE) &&
  1016. (sock->sk->sk_state != SMC_APPCLOSEWAIT1))
  1017. return -ENOTCONN;
  1018. smc = smc_sk(sock->sk);
  1019. return smc->clcsock->ops->getname(smc->clcsock, addr, peer);
  1020. }
  1021. static int smc_sendmsg(struct socket *sock, struct msghdr *msg, size_t len)
  1022. {
  1023. struct sock *sk = sock->sk;
  1024. struct smc_sock *smc;
  1025. int rc = -EPIPE;
  1026. smc = smc_sk(sk);
  1027. lock_sock(sk);
  1028. if ((sk->sk_state != SMC_ACTIVE) &&
  1029. (sk->sk_state != SMC_APPCLOSEWAIT1) &&
  1030. (sk->sk_state != SMC_INIT))
  1031. goto out;
  1032. if (msg->msg_flags & MSG_FASTOPEN) {
  1033. if (sk->sk_state == SMC_INIT) {
  1034. smc->use_fallback = true;
  1035. } else {
  1036. rc = -EINVAL;
  1037. goto out;
  1038. }
  1039. }
  1040. if (smc->use_fallback)
  1041. rc = smc->clcsock->ops->sendmsg(smc->clcsock, msg, len);
  1042. else
  1043. rc = smc_tx_sendmsg(smc, msg, len);
  1044. out:
  1045. release_sock(sk);
  1046. return rc;
  1047. }
  1048. static int smc_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
  1049. int flags)
  1050. {
  1051. struct sock *sk = sock->sk;
  1052. struct smc_sock *smc;
  1053. int rc = -ENOTCONN;
  1054. smc = smc_sk(sk);
  1055. lock_sock(sk);
  1056. if ((sk->sk_state == SMC_INIT) ||
  1057. (sk->sk_state == SMC_LISTEN) ||
  1058. (sk->sk_state == SMC_CLOSED))
  1059. goto out;
  1060. if (sk->sk_state == SMC_PEERFINCLOSEWAIT) {
  1061. rc = 0;
  1062. goto out;
  1063. }
  1064. if (smc->use_fallback) {
  1065. rc = smc->clcsock->ops->recvmsg(smc->clcsock, msg, len, flags);
  1066. } else {
  1067. msg->msg_namelen = 0;
  1068. rc = smc_rx_recvmsg(smc, msg, NULL, len, flags);
  1069. }
  1070. out:
  1071. release_sock(sk);
  1072. return rc;
  1073. }
  1074. static __poll_t smc_accept_poll(struct sock *parent)
  1075. {
  1076. struct smc_sock *isk = smc_sk(parent);
  1077. __poll_t mask = 0;
  1078. spin_lock(&isk->accept_q_lock);
  1079. if (!list_empty(&isk->accept_q))
  1080. mask = EPOLLIN | EPOLLRDNORM;
  1081. spin_unlock(&isk->accept_q_lock);
  1082. return mask;
  1083. }
  1084. static __poll_t smc_poll_mask(struct socket *sock, __poll_t events)
  1085. {
  1086. struct sock *sk = sock->sk;
  1087. __poll_t mask = 0;
  1088. struct smc_sock *smc;
  1089. int rc;
  1090. if (!sk)
  1091. return EPOLLNVAL;
  1092. smc = smc_sk(sock->sk);
  1093. sock_hold(sk);
  1094. lock_sock(sk);
  1095. if ((sk->sk_state == SMC_INIT) || smc->use_fallback) {
  1096. /* delegate to CLC child sock */
  1097. release_sock(sk);
  1098. mask = smc->clcsock->ops->poll_mask(smc->clcsock, events);
  1099. lock_sock(sk);
  1100. sk->sk_err = smc->clcsock->sk->sk_err;
  1101. if (sk->sk_err) {
  1102. mask |= EPOLLERR;
  1103. } else {
  1104. /* if non-blocking connect finished ... */
  1105. if (sk->sk_state == SMC_INIT &&
  1106. mask & EPOLLOUT &&
  1107. smc->clcsock->sk->sk_state != TCP_CLOSE) {
  1108. rc = __smc_connect(smc);
  1109. if (rc < 0)
  1110. mask |= EPOLLERR;
  1111. /* success cases including fallback */
  1112. mask |= EPOLLOUT | EPOLLWRNORM;
  1113. }
  1114. }
  1115. } else {
  1116. if (sk->sk_err)
  1117. mask |= EPOLLERR;
  1118. if ((sk->sk_shutdown == SHUTDOWN_MASK) ||
  1119. (sk->sk_state == SMC_CLOSED))
  1120. mask |= EPOLLHUP;
  1121. if (sk->sk_state == SMC_LISTEN) {
  1122. /* woken up by sk_data_ready in smc_listen_work() */
  1123. mask = smc_accept_poll(sk);
  1124. } else {
  1125. if (atomic_read(&smc->conn.sndbuf_space) ||
  1126. sk->sk_shutdown & SEND_SHUTDOWN) {
  1127. mask |= EPOLLOUT | EPOLLWRNORM;
  1128. } else {
  1129. sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
  1130. set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
  1131. }
  1132. if (atomic_read(&smc->conn.bytes_to_rcv))
  1133. mask |= EPOLLIN | EPOLLRDNORM;
  1134. if (sk->sk_shutdown & RCV_SHUTDOWN)
  1135. mask |= EPOLLIN | EPOLLRDNORM | EPOLLRDHUP;
  1136. if (sk->sk_state == SMC_APPCLOSEWAIT1)
  1137. mask |= EPOLLIN;
  1138. }
  1139. if (smc->conn.urg_state == SMC_URG_VALID)
  1140. mask |= EPOLLPRI;
  1141. }
  1142. release_sock(sk);
  1143. sock_put(sk);
  1144. return mask;
  1145. }
  1146. static int smc_shutdown(struct socket *sock, int how)
  1147. {
  1148. struct sock *sk = sock->sk;
  1149. struct smc_sock *smc;
  1150. int rc = -EINVAL;
  1151. int rc1 = 0;
  1152. smc = smc_sk(sk);
  1153. if ((how < SHUT_RD) || (how > SHUT_RDWR))
  1154. return rc;
  1155. lock_sock(sk);
  1156. rc = -ENOTCONN;
  1157. if ((sk->sk_state != SMC_LISTEN) &&
  1158. (sk->sk_state != SMC_ACTIVE) &&
  1159. (sk->sk_state != SMC_PEERCLOSEWAIT1) &&
  1160. (sk->sk_state != SMC_PEERCLOSEWAIT2) &&
  1161. (sk->sk_state != SMC_APPCLOSEWAIT1) &&
  1162. (sk->sk_state != SMC_APPCLOSEWAIT2) &&
  1163. (sk->sk_state != SMC_APPFINCLOSEWAIT))
  1164. goto out;
  1165. if (smc->use_fallback) {
  1166. rc = kernel_sock_shutdown(smc->clcsock, how);
  1167. sk->sk_shutdown = smc->clcsock->sk->sk_shutdown;
  1168. if (sk->sk_shutdown == SHUTDOWN_MASK)
  1169. sk->sk_state = SMC_CLOSED;
  1170. goto out;
  1171. }
  1172. switch (how) {
  1173. case SHUT_RDWR: /* shutdown in both directions */
  1174. rc = smc_close_active(smc);
  1175. break;
  1176. case SHUT_WR:
  1177. rc = smc_close_shutdown_write(smc);
  1178. break;
  1179. case SHUT_RD:
  1180. rc = 0;
  1181. /* nothing more to do because peer is not involved */
  1182. break;
  1183. }
  1184. if (smc->clcsock)
  1185. rc1 = kernel_sock_shutdown(smc->clcsock, how);
  1186. /* map sock_shutdown_cmd constants to sk_shutdown value range */
  1187. sk->sk_shutdown |= how + 1;
  1188. out:
  1189. release_sock(sk);
  1190. return rc ? rc : rc1;
  1191. }
  1192. static int smc_setsockopt(struct socket *sock, int level, int optname,
  1193. char __user *optval, unsigned int optlen)
  1194. {
  1195. struct sock *sk = sock->sk;
  1196. struct smc_sock *smc;
  1197. int val, rc;
  1198. smc = smc_sk(sk);
  1199. /* generic setsockopts reaching us here always apply to the
  1200. * CLC socket
  1201. */
  1202. rc = smc->clcsock->ops->setsockopt(smc->clcsock, level, optname,
  1203. optval, optlen);
  1204. if (smc->clcsock->sk->sk_err) {
  1205. sk->sk_err = smc->clcsock->sk->sk_err;
  1206. sk->sk_error_report(sk);
  1207. }
  1208. if (rc)
  1209. return rc;
  1210. if (optlen < sizeof(int))
  1211. return -EINVAL;
  1212. get_user(val, (int __user *)optval);
  1213. lock_sock(sk);
  1214. switch (optname) {
  1215. case TCP_ULP:
  1216. case TCP_FASTOPEN:
  1217. case TCP_FASTOPEN_CONNECT:
  1218. case TCP_FASTOPEN_KEY:
  1219. case TCP_FASTOPEN_NO_COOKIE:
  1220. /* option not supported by SMC */
  1221. if (sk->sk_state == SMC_INIT) {
  1222. smc->use_fallback = true;
  1223. } else {
  1224. if (!smc->use_fallback)
  1225. rc = -EINVAL;
  1226. }
  1227. break;
  1228. case TCP_NODELAY:
  1229. if (sk->sk_state != SMC_INIT && sk->sk_state != SMC_LISTEN) {
  1230. if (val && !smc->use_fallback)
  1231. mod_delayed_work(system_wq, &smc->conn.tx_work,
  1232. 0);
  1233. }
  1234. break;
  1235. case TCP_CORK:
  1236. if (sk->sk_state != SMC_INIT && sk->sk_state != SMC_LISTEN) {
  1237. if (!val && !smc->use_fallback)
  1238. mod_delayed_work(system_wq, &smc->conn.tx_work,
  1239. 0);
  1240. }
  1241. break;
  1242. case TCP_DEFER_ACCEPT:
  1243. smc->sockopt_defer_accept = val;
  1244. break;
  1245. default:
  1246. break;
  1247. }
  1248. release_sock(sk);
  1249. return rc;
  1250. }
  1251. static int smc_getsockopt(struct socket *sock, int level, int optname,
  1252. char __user *optval, int __user *optlen)
  1253. {
  1254. struct smc_sock *smc;
  1255. smc = smc_sk(sock->sk);
  1256. /* socket options apply to the CLC socket */
  1257. return smc->clcsock->ops->getsockopt(smc->clcsock, level, optname,
  1258. optval, optlen);
  1259. }
  1260. static int smc_ioctl(struct socket *sock, unsigned int cmd,
  1261. unsigned long arg)
  1262. {
  1263. union smc_host_cursor cons, urg;
  1264. struct smc_connection *conn;
  1265. struct smc_sock *smc;
  1266. int answ;
  1267. smc = smc_sk(sock->sk);
  1268. conn = &smc->conn;
  1269. if (smc->use_fallback) {
  1270. if (!smc->clcsock)
  1271. return -EBADF;
  1272. return smc->clcsock->ops->ioctl(smc->clcsock, cmd, arg);
  1273. }
  1274. switch (cmd) {
  1275. case SIOCINQ: /* same as FIONREAD */
  1276. if (smc->sk.sk_state == SMC_LISTEN)
  1277. return -EINVAL;
  1278. if (smc->sk.sk_state == SMC_INIT ||
  1279. smc->sk.sk_state == SMC_CLOSED)
  1280. answ = 0;
  1281. else
  1282. answ = atomic_read(&smc->conn.bytes_to_rcv);
  1283. break;
  1284. case SIOCOUTQ:
  1285. /* output queue size (not send + not acked) */
  1286. if (smc->sk.sk_state == SMC_LISTEN)
  1287. return -EINVAL;
  1288. if (smc->sk.sk_state == SMC_INIT ||
  1289. smc->sk.sk_state == SMC_CLOSED)
  1290. answ = 0;
  1291. else
  1292. answ = smc->conn.sndbuf_desc->len -
  1293. atomic_read(&smc->conn.sndbuf_space);
  1294. break;
  1295. case SIOCOUTQNSD:
  1296. /* output queue size (not send only) */
  1297. if (smc->sk.sk_state == SMC_LISTEN)
  1298. return -EINVAL;
  1299. if (smc->sk.sk_state == SMC_INIT ||
  1300. smc->sk.sk_state == SMC_CLOSED)
  1301. answ = 0;
  1302. else
  1303. answ = smc_tx_prepared_sends(&smc->conn);
  1304. break;
  1305. case SIOCATMARK:
  1306. if (smc->sk.sk_state == SMC_LISTEN)
  1307. return -EINVAL;
  1308. if (smc->sk.sk_state == SMC_INIT ||
  1309. smc->sk.sk_state == SMC_CLOSED) {
  1310. answ = 0;
  1311. } else {
  1312. smc_curs_write(&cons,
  1313. smc_curs_read(&conn->local_tx_ctrl.cons, conn),
  1314. conn);
  1315. smc_curs_write(&urg,
  1316. smc_curs_read(&conn->urg_curs, conn),
  1317. conn);
  1318. answ = smc_curs_diff(conn->rmb_desc->len,
  1319. &cons, &urg) == 1;
  1320. }
  1321. break;
  1322. default:
  1323. return -ENOIOCTLCMD;
  1324. }
  1325. return put_user(answ, (int __user *)arg);
  1326. }
  1327. static ssize_t smc_sendpage(struct socket *sock, struct page *page,
  1328. int offset, size_t size, int flags)
  1329. {
  1330. struct sock *sk = sock->sk;
  1331. struct smc_sock *smc;
  1332. int rc = -EPIPE;
  1333. smc = smc_sk(sk);
  1334. lock_sock(sk);
  1335. if (sk->sk_state != SMC_ACTIVE) {
  1336. release_sock(sk);
  1337. goto out;
  1338. }
  1339. release_sock(sk);
  1340. if (smc->use_fallback)
  1341. rc = kernel_sendpage(smc->clcsock, page, offset,
  1342. size, flags);
  1343. else
  1344. rc = sock_no_sendpage(sock, page, offset, size, flags);
  1345. out:
  1346. return rc;
  1347. }
  1348. /* Map the affected portions of the rmbe into an spd, note the number of bytes
  1349. * to splice in conn->splice_pending, and press 'go'. Delays consumer cursor
  1350. * updates till whenever a respective page has been fully processed.
  1351. * Note that subsequent recv() calls have to wait till all splice() processing
  1352. * completed.
  1353. */
  1354. static ssize_t smc_splice_read(struct socket *sock, loff_t *ppos,
  1355. struct pipe_inode_info *pipe, size_t len,
  1356. unsigned int flags)
  1357. {
  1358. struct sock *sk = sock->sk;
  1359. struct smc_sock *smc;
  1360. int rc = -ENOTCONN;
  1361. smc = smc_sk(sk);
  1362. lock_sock(sk);
  1363. if (sk->sk_state == SMC_INIT ||
  1364. sk->sk_state == SMC_LISTEN ||
  1365. sk->sk_state == SMC_CLOSED)
  1366. goto out;
  1367. if (sk->sk_state == SMC_PEERFINCLOSEWAIT) {
  1368. rc = 0;
  1369. goto out;
  1370. }
  1371. if (smc->use_fallback) {
  1372. rc = smc->clcsock->ops->splice_read(smc->clcsock, ppos,
  1373. pipe, len, flags);
  1374. } else {
  1375. if (*ppos) {
  1376. rc = -ESPIPE;
  1377. goto out;
  1378. }
  1379. if (flags & SPLICE_F_NONBLOCK)
  1380. flags = MSG_DONTWAIT;
  1381. else
  1382. flags = 0;
  1383. rc = smc_rx_recvmsg(smc, NULL, pipe, len, flags);
  1384. }
  1385. out:
  1386. release_sock(sk);
  1387. return rc;
  1388. }
  1389. /* must look like tcp */
  1390. static const struct proto_ops smc_sock_ops = {
  1391. .family = PF_SMC,
  1392. .owner = THIS_MODULE,
  1393. .release = smc_release,
  1394. .bind = smc_bind,
  1395. .connect = smc_connect,
  1396. .socketpair = sock_no_socketpair,
  1397. .accept = smc_accept,
  1398. .getname = smc_getname,
  1399. .poll_mask = smc_poll_mask,
  1400. .ioctl = smc_ioctl,
  1401. .listen = smc_listen,
  1402. .shutdown = smc_shutdown,
  1403. .setsockopt = smc_setsockopt,
  1404. .getsockopt = smc_getsockopt,
  1405. .sendmsg = smc_sendmsg,
  1406. .recvmsg = smc_recvmsg,
  1407. .mmap = sock_no_mmap,
  1408. .sendpage = smc_sendpage,
  1409. .splice_read = smc_splice_read,
  1410. };
  1411. static int smc_create(struct net *net, struct socket *sock, int protocol,
  1412. int kern)
  1413. {
  1414. int family = (protocol == SMCPROTO_SMC6) ? PF_INET6 : PF_INET;
  1415. struct smc_sock *smc;
  1416. struct sock *sk;
  1417. int rc;
  1418. rc = -ESOCKTNOSUPPORT;
  1419. if (sock->type != SOCK_STREAM)
  1420. goto out;
  1421. rc = -EPROTONOSUPPORT;
  1422. if (protocol != SMCPROTO_SMC && protocol != SMCPROTO_SMC6)
  1423. goto out;
  1424. rc = -ENOBUFS;
  1425. sock->ops = &smc_sock_ops;
  1426. sk = smc_sock_alloc(net, sock, protocol);
  1427. if (!sk)
  1428. goto out;
  1429. /* create internal TCP socket for CLC handshake and fallback */
  1430. smc = smc_sk(sk);
  1431. smc->use_fallback = false; /* assume rdma capability first */
  1432. rc = sock_create_kern(net, family, SOCK_STREAM, IPPROTO_TCP,
  1433. &smc->clcsock);
  1434. if (rc) {
  1435. sk_common_release(sk);
  1436. goto out;
  1437. }
  1438. smc->sk.sk_sndbuf = max(smc->clcsock->sk->sk_sndbuf, SMC_BUF_MIN_SIZE);
  1439. smc->sk.sk_rcvbuf = max(smc->clcsock->sk->sk_rcvbuf, SMC_BUF_MIN_SIZE);
  1440. out:
  1441. return rc;
  1442. }
  1443. static const struct net_proto_family smc_sock_family_ops = {
  1444. .family = PF_SMC,
  1445. .owner = THIS_MODULE,
  1446. .create = smc_create,
  1447. };
  1448. static int __init smc_init(void)
  1449. {
  1450. int rc;
  1451. rc = smc_pnet_init();
  1452. if (rc)
  1453. return rc;
  1454. rc = smc_llc_init();
  1455. if (rc) {
  1456. pr_err("%s: smc_llc_init fails with %d\n", __func__, rc);
  1457. goto out_pnet;
  1458. }
  1459. rc = smc_cdc_init();
  1460. if (rc) {
  1461. pr_err("%s: smc_cdc_init fails with %d\n", __func__, rc);
  1462. goto out_pnet;
  1463. }
  1464. rc = proto_register(&smc_proto, 1);
  1465. if (rc) {
  1466. pr_err("%s: proto_register(v4) fails with %d\n", __func__, rc);
  1467. goto out_pnet;
  1468. }
  1469. rc = proto_register(&smc_proto6, 1);
  1470. if (rc) {
  1471. pr_err("%s: proto_register(v6) fails with %d\n", __func__, rc);
  1472. goto out_proto;
  1473. }
  1474. rc = sock_register(&smc_sock_family_ops);
  1475. if (rc) {
  1476. pr_err("%s: sock_register fails with %d\n", __func__, rc);
  1477. goto out_proto6;
  1478. }
  1479. INIT_HLIST_HEAD(&smc_v4_hashinfo.ht);
  1480. INIT_HLIST_HEAD(&smc_v6_hashinfo.ht);
  1481. rc = smc_ib_register_client();
  1482. if (rc) {
  1483. pr_err("%s: ib_register fails with %d\n", __func__, rc);
  1484. goto out_sock;
  1485. }
  1486. static_branch_enable(&tcp_have_smc);
  1487. return 0;
  1488. out_sock:
  1489. sock_unregister(PF_SMC);
  1490. out_proto6:
  1491. proto_unregister(&smc_proto6);
  1492. out_proto:
  1493. proto_unregister(&smc_proto);
  1494. out_pnet:
  1495. smc_pnet_exit();
  1496. return rc;
  1497. }
  1498. static void __exit smc_exit(void)
  1499. {
  1500. smc_core_exit();
  1501. static_branch_disable(&tcp_have_smc);
  1502. smc_ib_unregister_client();
  1503. sock_unregister(PF_SMC);
  1504. proto_unregister(&smc_proto6);
  1505. proto_unregister(&smc_proto);
  1506. smc_pnet_exit();
  1507. }
  1508. module_init(smc_init);
  1509. module_exit(smc_exit);
  1510. MODULE_AUTHOR("Ursula Braun <ubraun@linux.vnet.ibm.com>");
  1511. MODULE_DESCRIPTION("smc socket address family");
  1512. MODULE_LICENSE("GPL");
  1513. MODULE_ALIAS_NETPROTO(PF_SMC);