]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/blame - net/rds/tcp_connect.c
UBUNTU: Ubuntu-5.4.0-117.132
[mirror_ubuntu-focal-kernel.git] / net / rds / tcp_connect.c
CommitLineData
70041088 1/*
eee2fa6a 2 * Copyright (c) 2006, 2017 Oracle and/or its affiliates. All rights reserved.
70041088
AG
3 *
4 * This software is available to you under a choice of one of two
5 * licenses. You may choose to be licensed under the terms of the GNU
6 * General Public License (GPL) Version 2, available from the file
7 * COPYING in the main directory of this source tree, or the
8 * OpenIB.org BSD license below:
9 *
10 * Redistribution and use in source and binary forms, with or
11 * without modification, are permitted provided that the following
12 * conditions are met:
13 *
14 * - Redistributions of source code must retain the above
15 * copyright notice, this list of conditions and the following
16 * disclaimer.
17 *
18 * - Redistributions in binary form must reproduce the above
19 * copyright notice, this list of conditions and the following
20 * disclaimer in the documentation and/or other materials
21 * provided with the distribution.
22 *
23 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
24 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
25 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
26 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
27 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
28 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
29 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
30 * SOFTWARE.
31 *
32 */
33#include <linux/kernel.h>
34#include <linux/in.h>
35#include <net/tcp.h>
36
37#include "rds.h"
38#include "tcp.h"
39
40void rds_tcp_state_change(struct sock *sk)
41{
42 void (*state_change)(struct sock *sk);
ea3b1ea5 43 struct rds_conn_path *cp;
70041088
AG
44 struct rds_tcp_connection *tc;
45
38036629 46 read_lock_bh(&sk->sk_callback_lock);
ea3b1ea5
SV
47 cp = sk->sk_user_data;
48 if (!cp) {
70041088
AG
49 state_change = sk->sk_state_change;
50 goto out;
51 }
ea3b1ea5 52 tc = cp->cp_transport_data;
70041088
AG
53 state_change = tc->t_orig_state_change;
54
55 rdsdebug("sock %p state_change to %d\n", tc->t_sock, sk->sk_state);
56
5c3da57d
JH
57 switch (sk->sk_state) {
58 /* ignore connecting sockets as they make progress */
59 case TCP_SYN_SENT:
60 case TCP_SYN_RECV:
61 break;
62 case TCP_ESTABLISHED:
1a0e100f
SV
63 /* Force the peer to reconnect so that we have the
64 * TCP ports going from <smaller-ip>.<transient> to
65 * <larger-ip>.<RDS_TCP_PORT>. We avoid marking the
66 * RDS connection as RDS_CONN_UP until the reconnect,
67 * to avoid RDS datagram loss.
68 */
eee2fa6a
KCP
69 if (rds_addr_cmp(&cp->cp_conn->c_laddr,
70 &cp->cp_conn->c_faddr) >= 0 &&
1a0e100f
SV
71 rds_conn_path_transition(cp, RDS_CONN_CONNECTING,
72 RDS_CONN_ERROR)) {
aed20a53 73 rds_conn_path_drop(cp, false);
1a0e100f
SV
74 } else {
75 rds_connect_path_complete(cp, RDS_CONN_CONNECTING);
76 }
5c3da57d
JH
77 break;
78 case TCP_CLOSE_WAIT:
79 case TCP_CLOSE:
aed20a53 80 rds_conn_path_drop(cp, false);
5c3da57d
JH
81 default:
82 break;
70041088
AG
83 }
84out:
38036629 85 read_unlock_bh(&sk->sk_callback_lock);
70041088
AG
86 state_change(sk);
87}
88
b04e8554 89int rds_tcp_conn_path_connect(struct rds_conn_path *cp)
70041088
AG
90{
91 struct socket *sock = NULL;
1e2b44e7 92 struct sockaddr_in6 sin6;
eee2fa6a
KCP
93 struct sockaddr_in sin;
94 struct sockaddr *addr;
95 int addrlen;
1e2b44e7 96 bool isv6;
70041088 97 int ret;
b04e8554
SV
98 struct rds_connection *conn = cp->cp_conn;
99 struct rds_tcp_connection *tc = cp->cp_transport_data;
bd7c5f98 100
5916e2c1
SV
101 /* for multipath rds,we only trigger the connection after
102 * the handshake probe has determined the number of paths.
103 */
104 if (cp->cp_index > 0 && cp->cp_conn->c_npaths < 2)
105 return -EAGAIN;
106
02105b2c 107 mutex_lock(&tc->t_conn_path_lock);
70041088 108
b04e8554 109 if (rds_conn_path_up(cp)) {
02105b2c 110 mutex_unlock(&tc->t_conn_path_lock);
bd7c5f98
SV
111 return 0;
112 }
1e2b44e7
KCP
113 if (ipv6_addr_v4mapped(&conn->c_laddr)) {
114 ret = sock_create_kern(rds_conn_net(conn), PF_INET,
115 SOCK_STREAM, IPPROTO_TCP, &sock);
116 isv6 = false;
117 } else {
118 ret = sock_create_kern(rds_conn_net(conn), PF_INET6,
119 SOCK_STREAM, IPPROTO_TCP, &sock);
120 isv6 = true;
121 }
122
70041088
AG
123 if (ret < 0)
124 goto out;
125
126 rds_tcp_tune(sock);
127
1e2b44e7
KCP
128 if (isv6) {
129 sin6.sin6_family = AF_INET6;
130 sin6.sin6_addr = conn->c_laddr;
131 sin6.sin6_port = 0;
132 sin6.sin6_flowinfo = 0;
133 sin6.sin6_scope_id = conn->c_dev_if;
134 addr = (struct sockaddr *)&sin6;
135 addrlen = sizeof(sin6);
136 } else {
137 sin.sin_family = AF_INET;
138 sin.sin_addr.s_addr = conn->c_laddr.s6_addr32[3];
139 sin.sin_port = 0;
140 addr = (struct sockaddr *)&sin;
141 addrlen = sizeof(sin);
142 }
70041088 143
eee2fa6a 144 ret = sock->ops->bind(sock, addr, addrlen);
70041088 145 if (ret) {
eee2fa6a 146 rdsdebug("bind failed with %d at address %pI6c\n",
6884b348 147 ret, &conn->c_laddr);
70041088
AG
148 goto out;
149 }
150
1e2b44e7
KCP
151 if (isv6) {
152 sin6.sin6_family = AF_INET6;
153 sin6.sin6_addr = conn->c_faddr;
154 sin6.sin6_port = htons(RDS_TCP_PORT);
155 sin6.sin6_flowinfo = 0;
156 sin6.sin6_scope_id = conn->c_dev_if;
157 addr = (struct sockaddr *)&sin6;
158 addrlen = sizeof(sin6);
159 } else {
160 sin.sin_family = AF_INET;
161 sin.sin_addr.s_addr = conn->c_faddr.s6_addr32[3];
162 sin.sin_port = htons(RDS_TCP_PORT);
163 addr = (struct sockaddr *)&sin;
164 addrlen = sizeof(sin);
165 }
70041088
AG
166
167 /*
168 * once we call connect() we can start getting callbacks and they
169 * own the socket
170 */
ea3b1ea5 171 rds_tcp_set_callbacks(sock, cp);
eee2fa6a 172 ret = sock->ops->connect(sock, addr, addrlen, O_NONBLOCK);
70041088 173
eee2fa6a 174 rdsdebug("connect to address %pI6c returned %d\n", &conn->c_faddr, ret);
70041088
AG
175 if (ret == -EINPROGRESS)
176 ret = 0;
467fa153
SV
177 if (ret == 0) {
178 rds_tcp_keepalive(sock);
eb74cc97 179 sock = NULL;
467fa153 180 } else {
b04e8554 181 rds_tcp_restore_callbacks(sock, cp->cp_transport_data);
467fa153 182 }
70041088
AG
183
184out:
02105b2c 185 mutex_unlock(&tc->t_conn_path_lock);
70041088
AG
186 if (sock)
187 sock_release(sock);
188 return ret;
189}
190
191/*
192 * Before killing the tcp socket this needs to serialize with callbacks. The
193 * caller has already grabbed the sending sem so we're serialized with other
194 * senders.
195 *
196 * TCP calls the callbacks with the sock lock so we hold it while we reset the
197 * callbacks to those set by TCP. Our callbacks won't execute again once we
198 * hold the sock lock.
199 */
226f7a7d 200void rds_tcp_conn_path_shutdown(struct rds_conn_path *cp)
70041088 201{
226f7a7d 202 struct rds_tcp_connection *tc = cp->cp_transport_data;
70041088
AG
203 struct socket *sock = tc->t_sock;
204
226f7a7d
SV
205 rdsdebug("shutting down conn %p tc %p sock %p\n",
206 cp->cp_conn, tc, sock);
70041088
AG
207
208 if (sock) {
ebeeb1ad 209 if (rds_destroy_pending(cp->cp_conn))
c14b0366 210 rds_tcp_set_linger(sock);
70041088
AG
211 sock->ops->shutdown(sock, RCV_SHUTDOWN | SEND_SHUTDOWN);
212 lock_sock(sock->sk);
213 rds_tcp_restore_callbacks(sock, tc); /* tc->tc_sock = NULL */
214
215 release_sock(sock->sk);
216 sock_release(sock);
ccbd6a5a 217 }
70041088
AG
218
219 if (tc->t_tinc) {
220 rds_inc_put(&tc->t_tinc->ti_inc);
221 tc->t_tinc = NULL;
222 }
223 tc->t_tinc_hdr_rem = sizeof(struct rds_header);
224 tc->t_tinc_data_rem = 0;
225}