]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blob - net/rds/tcp_connect.c
UBUNTU: ubuntu: vbox -- Update to 5.1.16-dfsg-1
[mirror_ubuntu-zesty-kernel.git] / net / rds / tcp_connect.c
1 /*
2 * Copyright (c) 2006 Oracle. All rights reserved.
3 *
4 * This software is available to you under a choice of one of two
5 * licenses. You may choose to be licensed under the terms of the GNU
6 * General Public License (GPL) Version 2, available from the file
7 * COPYING in the main directory of this source tree, or the
8 * OpenIB.org BSD license below:
9 *
10 * Redistribution and use in source and binary forms, with or
11 * without modification, are permitted provided that the following
12 * conditions are met:
13 *
14 * - Redistributions of source code must retain the above
15 * copyright notice, this list of conditions and the following
16 * disclaimer.
17 *
18 * - Redistributions in binary form must reproduce the above
19 * copyright notice, this list of conditions and the following
20 * disclaimer in the documentation and/or other materials
21 * provided with the distribution.
22 *
23 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
24 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
25 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
26 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
27 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
28 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
29 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
30 * SOFTWARE.
31 *
32 */
33 #include <linux/kernel.h>
34 #include <linux/in.h>
35 #include <net/tcp.h>
36
37 #include "rds.h"
38 #include "tcp.h"
39
40 void rds_tcp_state_change(struct sock *sk)
41 {
42 void (*state_change)(struct sock *sk);
43 struct rds_conn_path *cp;
44 struct rds_tcp_connection *tc;
45
46 read_lock_bh(&sk->sk_callback_lock);
47 cp = sk->sk_user_data;
48 if (!cp) {
49 state_change = sk->sk_state_change;
50 goto out;
51 }
52 tc = cp->cp_transport_data;
53 state_change = tc->t_orig_state_change;
54
55 rdsdebug("sock %p state_change to %d\n", tc->t_sock, sk->sk_state);
56
57 switch (sk->sk_state) {
58 /* ignore connecting sockets as they make progress */
59 case TCP_SYN_SENT:
60 case TCP_SYN_RECV:
61 break;
62 case TCP_ESTABLISHED:
63 /* Force the peer to reconnect so that we have the
64 * TCP ports going from <smaller-ip>.<transient> to
65 * <larger-ip>.<RDS_TCP_PORT>. We avoid marking the
66 * RDS connection as RDS_CONN_UP until the reconnect,
67 * to avoid RDS datagram loss.
68 */
69 if (cp->cp_conn->c_laddr > cp->cp_conn->c_faddr &&
70 rds_conn_path_transition(cp, RDS_CONN_CONNECTING,
71 RDS_CONN_ERROR)) {
72 rds_conn_path_drop(cp);
73 } else {
74 rds_connect_path_complete(cp, RDS_CONN_CONNECTING);
75 }
76 break;
77 case TCP_CLOSE_WAIT:
78 case TCP_CLOSE:
79 rds_conn_path_drop(cp);
80 default:
81 break;
82 }
83 out:
84 read_unlock_bh(&sk->sk_callback_lock);
85 state_change(sk);
86 }
87
88 int rds_tcp_conn_path_connect(struct rds_conn_path *cp)
89 {
90 struct socket *sock = NULL;
91 struct sockaddr_in src, dest;
92 int ret;
93 struct rds_connection *conn = cp->cp_conn;
94 struct rds_tcp_connection *tc = cp->cp_transport_data;
95
96 /* for multipath rds,we only trigger the connection after
97 * the handshake probe has determined the number of paths.
98 */
99 if (cp->cp_index > 0 && cp->cp_conn->c_npaths < 2)
100 return -EAGAIN;
101
102 mutex_lock(&tc->t_conn_path_lock);
103
104 if (rds_conn_path_up(cp)) {
105 mutex_unlock(&tc->t_conn_path_lock);
106 return 0;
107 }
108 ret = sock_create_kern(rds_conn_net(conn), PF_INET,
109 SOCK_STREAM, IPPROTO_TCP, &sock);
110 if (ret < 0)
111 goto out;
112
113 rds_tcp_tune(sock);
114
115 src.sin_family = AF_INET;
116 src.sin_addr.s_addr = (__force u32)conn->c_laddr;
117 src.sin_port = (__force u16)htons(0);
118
119 ret = sock->ops->bind(sock, (struct sockaddr *)&src, sizeof(src));
120 if (ret) {
121 rdsdebug("bind failed with %d at address %pI4\n",
122 ret, &conn->c_laddr);
123 goto out;
124 }
125
126 dest.sin_family = AF_INET;
127 dest.sin_addr.s_addr = (__force u32)conn->c_faddr;
128 dest.sin_port = (__force u16)htons(RDS_TCP_PORT);
129
130 /*
131 * once we call connect() we can start getting callbacks and they
132 * own the socket
133 */
134 rds_tcp_set_callbacks(sock, cp);
135 ret = sock->ops->connect(sock, (struct sockaddr *)&dest, sizeof(dest),
136 O_NONBLOCK);
137
138 cp->cp_outgoing = 1;
139 rdsdebug("connect to address %pI4 returned %d\n", &conn->c_faddr, ret);
140 if (ret == -EINPROGRESS)
141 ret = 0;
142 if (ret == 0) {
143 rds_tcp_keepalive(sock);
144 sock = NULL;
145 } else {
146 rds_tcp_restore_callbacks(sock, cp->cp_transport_data);
147 }
148
149 out:
150 mutex_unlock(&tc->t_conn_path_lock);
151 if (sock)
152 sock_release(sock);
153 return ret;
154 }
155
156 /*
157 * Before killing the tcp socket this needs to serialize with callbacks. The
158 * caller has already grabbed the sending sem so we're serialized with other
159 * senders.
160 *
161 * TCP calls the callbacks with the sock lock so we hold it while we reset the
162 * callbacks to those set by TCP. Our callbacks won't execute again once we
163 * hold the sock lock.
164 */
165 void rds_tcp_conn_path_shutdown(struct rds_conn_path *cp)
166 {
167 struct rds_tcp_connection *tc = cp->cp_transport_data;
168 struct socket *sock = tc->t_sock;
169
170 rdsdebug("shutting down conn %p tc %p sock %p\n",
171 cp->cp_conn, tc, sock);
172
173 if (sock) {
174 sock->ops->shutdown(sock, RCV_SHUTDOWN | SEND_SHUTDOWN);
175 lock_sock(sock->sk);
176 rds_tcp_restore_callbacks(sock, tc); /* tc->tc_sock = NULL */
177
178 release_sock(sock->sk);
179 sock_release(sock);
180 }
181
182 if (tc->t_tinc) {
183 rds_inc_put(&tc->t_tinc->ti_inc);
184 tc->t_tinc = NULL;
185 }
186 tc->t_tinc_hdr_rem = sizeof(struct rds_header);
187 tc->t_tinc_data_rem = 0;
188 }