1 /* 2 * Copyright (c) 2006, 2018 Oracle and/or its affiliates. All rights reserved. 3 * 4 * This software is available to you under a choice of one of two 5 * licenses. You may choose to be licensed under the terms of the GNU 6 * General Public License (GPL) Version 2, available from the file 7 * COPYING in the main directory of this source tree, or the 8 * OpenIB.org BSD license below: 9 * 10 * Redistribution and use in source and binary forms, with or 11 * without modification, are permitted provided that the following 12 * conditions are met: 13 * 14 * - Redistributions of source code must retain the above 15 * copyright notice, this list of conditions and the following 16 * disclaimer. 17 * 18 * - Redistributions in binary form must reproduce the above 19 * copyright notice, this list of conditions and the following 20 * disclaimer in the documentation and/or other materials 21 * provided with the distribution. 22 * 23 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 24 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 25 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 26 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 27 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 28 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN 29 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 30 * SOFTWARE. 31 * 32 */ 33 #include <linux/kernel.h> 34 #include <linux/list.h> 35 #include <linux/slab.h> 36 #include <linux/export.h> 37 #include <net/ipv6.h> 38 #include <net/inet6_hashtables.h> 39 #include <net/addrconf.h> 40 41 #include "rds.h" 42 #include "loop.h" 43 44 #define RDS_CONNECTION_HASH_BITS 12 45 #define RDS_CONNECTION_HASH_ENTRIES (1 << RDS_CONNECTION_HASH_BITS) 46 #define RDS_CONNECTION_HASH_MASK (RDS_CONNECTION_HASH_ENTRIES - 1) 47 48 /* converting this to RCU is a chore for another day.. */ 49 static DEFINE_SPINLOCK(rds_conn_lock); 50 static unsigned long rds_conn_count; 51 static struct hlist_head rds_conn_hash[RDS_CONNECTION_HASH_ENTRIES]; 52 static struct kmem_cache *rds_conn_slab; 53 54 static struct hlist_head *rds_conn_bucket(const struct in6_addr *laddr, 55 const struct in6_addr *faddr) 56 { 57 static u32 rds6_hash_secret __read_mostly; 58 static u32 rds_hash_secret __read_mostly; 59 60 __be32 lhash, fhash; 61 u32 hash; 62 63 net_get_random_once(&rds_hash_secret, sizeof(rds_hash_secret)); 64 net_get_random_once(&rds6_hash_secret, sizeof(rds6_hash_secret)); 65 66 lhash = laddr->s6_addr32[3]; 67 #if IS_ENABLED(CONFIG_IPV6) 68 fhash = (__force __be32)__ipv6_addr_jhash(faddr, rds6_hash_secret); 69 #else 70 fhash = faddr->s6_addr32[3]; 71 #endif 72 hash = __inet_ehashfn(lhash, 0, fhash, 0, rds_hash_secret); 73 74 return &rds_conn_hash[hash & RDS_CONNECTION_HASH_MASK]; 75 } 76 77 #define rds_conn_info_set(var, test, suffix) do { \ 78 if (test) \ 79 var |= RDS_INFO_CONNECTION_FLAG_##suffix; \ 80 } while (0) 81 82 /* rcu read lock must be held or the connection spinlock */ 83 static struct rds_connection *rds_conn_lookup(struct net *net, 84 struct hlist_head *head, 85 const struct in6_addr *laddr, 86 const struct in6_addr *faddr, 87 struct rds_transport *trans, 88 u8 tos, int dev_if) 89 { 90 struct rds_connection *conn, *ret = NULL; 91 92 hlist_for_each_entry_rcu(conn, head, c_hash_node) { 93 if (ipv6_addr_equal(&conn->c_faddr, faddr) && 94 ipv6_addr_equal(&conn->c_laddr, laddr) && 95 conn->c_trans == trans && 96 conn->c_tos == tos && 97 net == rds_conn_net(conn) && 98 conn->c_dev_if == dev_if) { 99 ret = conn; 100 break; 101 } 102 } 103 rdsdebug("returning conn %p for %pI6c -> %pI6c\n", ret, 104 laddr, faddr); 105 return ret; 106 } 107 108 /* 109 * This is called by transports as they're bringing down a connection. 110 * It clears partial message state so that the transport can start sending 111 * and receiving over this connection again in the future. It is up to 112 * the transport to have serialized this call with its send and recv. 113 */ 114 static void rds_conn_path_reset(struct rds_conn_path *cp) 115 { 116 struct rds_connection *conn = cp->cp_conn; 117 118 rdsdebug("connection %pI6c to %pI6c reset\n", 119 &conn->c_laddr, &conn->c_faddr); 120 121 rds_stats_inc(s_conn_reset); 122 rds_send_path_reset(cp); 123 cp->cp_flags = 0; 124 125 /* Do not clear next_rx_seq here, else we cannot distinguish 126 * retransmitted packets from new packets, and will hand all 127 * of them to the application. That is not consistent with the 128 * reliability guarantees of RDS. */ 129 } 130 131 static void __rds_conn_path_init(struct rds_connection *conn, 132 struct rds_conn_path *cp, bool is_outgoing) 133 { 134 spin_lock_init(&cp->cp_lock); 135 cp->cp_next_tx_seq = 1; 136 init_waitqueue_head(&cp->cp_waitq); 137 INIT_LIST_HEAD(&cp->cp_send_queue); 138 INIT_LIST_HEAD(&cp->cp_retrans); 139 140 cp->cp_conn = conn; 141 atomic_set(&cp->cp_state, RDS_CONN_DOWN); 142 cp->cp_send_gen = 0; 143 cp->cp_reconnect_jiffies = 0; 144 cp->cp_conn->c_proposed_version = RDS_PROTOCOL_VERSION; 145 INIT_DELAYED_WORK(&cp->cp_send_w, rds_send_worker); 146 INIT_DELAYED_WORK(&cp->cp_recv_w, rds_recv_worker); 147 INIT_DELAYED_WORK(&cp->cp_conn_w, rds_connect_worker); 148 INIT_WORK(&cp->cp_down_w, rds_shutdown_worker); 149 mutex_init(&cp->cp_cm_lock); 150 cp->cp_flags = 0; 151 } 152 153 /* 154 * There is only every one 'conn' for a given pair of addresses in the 155 * system at a time. They contain messages to be retransmitted and so 156 * span the lifetime of the actual underlying transport connections. 157 * 158 * For now they are not garbage collected once they're created. They 159 * are torn down as the module is removed, if ever. 160 */ 161 static struct rds_connection *__rds_conn_create(struct net *net, 162 const struct in6_addr *laddr, 163 const struct in6_addr *faddr, 164 struct rds_transport *trans, 165 gfp_t gfp, u8 tos, 166 int is_outgoing, 167 int dev_if) 168 { 169 struct rds_connection *conn, *parent = NULL; 170 struct hlist_head *head = rds_conn_bucket(laddr, faddr); 171 struct rds_transport *loop_trans; 172 unsigned long flags; 173 int ret, i; 174 int npaths = (trans->t_mp_capable ? RDS_MPATH_WORKERS : 1); 175 176 rcu_read_lock(); 177 conn = rds_conn_lookup(net, head, laddr, faddr, trans, tos, dev_if); 178 if (conn && 179 conn->c_loopback && 180 conn->c_trans != &rds_loop_transport && 181 ipv6_addr_equal(laddr, faddr) && 182 !is_outgoing) { 183 /* This is a looped back IB connection, and we're 184 * called by the code handling the incoming connect. 185 * We need a second connection object into which we 186 * can stick the other QP. */ 187 parent = conn; 188 conn = parent->c_passive; 189 } 190 rcu_read_unlock(); 191 if (conn) 192 goto out; 193 194 conn = kmem_cache_zalloc(rds_conn_slab, gfp); 195 if (!conn) { 196 conn = ERR_PTR(-ENOMEM); 197 goto out; 198 } 199 conn->c_path = kcalloc(npaths, sizeof(struct rds_conn_path), gfp); 200 if (!conn->c_path) { 201 kmem_cache_free(rds_conn_slab, conn); 202 conn = ERR_PTR(-ENOMEM); 203 goto out; 204 } 205 206 INIT_HLIST_NODE(&conn->c_hash_node); 207 conn->c_laddr = *laddr; 208 conn->c_isv6 = !ipv6_addr_v4mapped(laddr); 209 conn->c_faddr = *faddr; 210 conn->c_dev_if = dev_if; 211 conn->c_tos = tos; 212 213 #if IS_ENABLED(CONFIG_IPV6) 214 /* If the local address is link local, set c_bound_if to be the 215 * index used for this connection. Otherwise, set it to 0 as 216 * the socket is not bound to an interface. c_bound_if is used 217 * to look up a socket when a packet is received 218 */ 219 if (ipv6_addr_type(laddr) & IPV6_ADDR_LINKLOCAL) 220 conn->c_bound_if = dev_if; 221 else 222 #endif 223 conn->c_bound_if = 0; 224 225 rds_conn_net_set(conn, net); 226 227 ret = rds_cong_get_maps(conn); 228 if (ret) { 229 kfree(conn->c_path); 230 kmem_cache_free(rds_conn_slab, conn); 231 conn = ERR_PTR(ret); 232 goto out; 233 } 234 235 /* 236 * This is where a connection becomes loopback. If *any* RDS sockets 237 * can bind to the destination address then we'd rather the messages 238 * flow through loopback rather than either transport. 239 */ 240 loop_trans = rds_trans_get_preferred(net, faddr, conn->c_dev_if); 241 if (loop_trans) { 242 rds_trans_put(loop_trans); 243 conn->c_loopback = 1; 244 if (trans->t_prefer_loopback) { 245 if (likely(is_outgoing)) { 246 /* "outgoing" connection to local address. 247 * Protocol says it wants the connection 248 * handled by the loopback transport. 249 * This is what TCP does. 250 */ 251 trans = &rds_loop_transport; 252 } else { 253 /* No transport currently in use 254 * should end up here, but if it 255 * does, reset/destroy the connection. 256 */ 257 kfree(conn->c_path); 258 kmem_cache_free(rds_conn_slab, conn); 259 conn = ERR_PTR(-EOPNOTSUPP); 260 goto out; 261 } 262 } 263 } 264 265 conn->c_trans = trans; 266 267 init_waitqueue_head(&conn->c_hs_waitq); 268 for (i = 0; i < npaths; i++) { 269 __rds_conn_path_init(conn, &conn->c_path[i], 270 is_outgoing); 271 conn->c_path[i].cp_index = i; 272 } 273 rcu_read_lock(); 274 if (rds_destroy_pending(conn)) 275 ret = -ENETDOWN; 276 else 277 ret = trans->conn_alloc(conn, GFP_ATOMIC); 278 if (ret) { 279 rcu_read_unlock(); 280 kfree(conn->c_path); 281 kmem_cache_free(rds_conn_slab, conn); 282 conn = ERR_PTR(ret); 283 goto out; 284 } 285 286 rdsdebug("allocated conn %p for %pI6c -> %pI6c over %s %s\n", 287 conn, laddr, faddr, 288 strnlen(trans->t_name, sizeof(trans->t_name)) ? 289 trans->t_name : "[unknown]", is_outgoing ? "(outgoing)" : ""); 290 291 /* 292 * Since we ran without holding the conn lock, someone could 293 * have created the same conn (either normal or passive) in the 294 * interim. We check while holding the lock. If we won, we complete 295 * init and return our conn. If we lost, we rollback and return the 296 * other one. 297 */ 298 spin_lock_irqsave(&rds_conn_lock, flags); 299 if (parent) { 300 /* Creating passive conn */ 301 if (parent->c_passive) { 302 trans->conn_free(conn->c_path[0].cp_transport_data); 303 kfree(conn->c_path); 304 kmem_cache_free(rds_conn_slab, conn); 305 conn = parent->c_passive; 306 } else { 307 parent->c_passive = conn; 308 rds_cong_add_conn(conn); 309 rds_conn_count++; 310 } 311 } else { 312 /* Creating normal conn */ 313 struct rds_connection *found; 314 315 found = rds_conn_lookup(net, head, laddr, faddr, trans, 316 tos, dev_if); 317 if (found) { 318 struct rds_conn_path *cp; 319 int i; 320 321 for (i = 0; i < npaths; i++) { 322 cp = &conn->c_path[i]; 323 /* The ->conn_alloc invocation may have 324 * allocated resource for all paths, so all 325 * of them may have to be freed here. 326 */ 327 if (cp->cp_transport_data) 328 trans->conn_free(cp->cp_transport_data); 329 } 330 kfree(conn->c_path); 331 kmem_cache_free(rds_conn_slab, conn); 332 conn = found; 333 } else { 334 conn->c_my_gen_num = rds_gen_num; 335 conn->c_peer_gen_num = 0; 336 hlist_add_head_rcu(&conn->c_hash_node, head); 337 rds_cong_add_conn(conn); 338 rds_conn_count++; 339 } 340 } 341 spin_unlock_irqrestore(&rds_conn_lock, flags); 342 rcu_read_unlock(); 343 344 out: 345 return conn; 346 } 347 348 struct rds_connection *rds_conn_create(struct net *net, 349 const struct in6_addr *laddr, 350 const struct in6_addr *faddr, 351 struct rds_transport *trans, u8 tos, 352 gfp_t gfp, int dev_if) 353 { 354 return __rds_conn_create(net, laddr, faddr, trans, gfp, tos, 0, dev_if); 355 } 356 EXPORT_SYMBOL_GPL(rds_conn_create); 357 358 struct rds_connection *rds_conn_create_outgoing(struct net *net, 359 const struct in6_addr *laddr, 360 const struct in6_addr *faddr, 361 struct rds_transport *trans, 362 u8 tos, gfp_t gfp, int dev_if) 363 { 364 return __rds_conn_create(net, laddr, faddr, trans, gfp, tos, 1, dev_if); 365 } 366 EXPORT_SYMBOL_GPL(rds_conn_create_outgoing); 367 368 void rds_conn_shutdown(struct rds_conn_path *cp) 369 { 370 struct rds_connection *conn = cp->cp_conn; 371 372 /* shut it down unless it's down already */ 373 if (!rds_conn_path_transition(cp, RDS_CONN_DOWN, RDS_CONN_DOWN)) { 374 /* 375 * Quiesce the connection mgmt handlers before we start tearing 376 * things down. We don't hold the mutex for the entire 377 * duration of the shutdown operation, else we may be 378 * deadlocking with the CM handler. Instead, the CM event 379 * handler is supposed to check for state DISCONNECTING 380 */ 381 mutex_lock(&cp->cp_cm_lock); 382 if (!rds_conn_path_transition(cp, RDS_CONN_UP, 383 RDS_CONN_DISCONNECTING) && 384 !rds_conn_path_transition(cp, RDS_CONN_ERROR, 385 RDS_CONN_DISCONNECTING)) { 386 rds_conn_path_error(cp, 387 "shutdown called in state %d\n", 388 atomic_read(&cp->cp_state)); 389 mutex_unlock(&cp->cp_cm_lock); 390 return; 391 } 392 mutex_unlock(&cp->cp_cm_lock); 393 394 wait_event(cp->cp_waitq, 395 !test_bit(RDS_IN_XMIT, &cp->cp_flags)); 396 wait_event(cp->cp_waitq, 397 !test_bit(RDS_RECV_REFILL, &cp->cp_flags)); 398 399 conn->c_trans->conn_path_shutdown(cp); 400 rds_conn_path_reset(cp); 401 402 if (!rds_conn_path_transition(cp, RDS_CONN_DISCONNECTING, 403 RDS_CONN_DOWN) && 404 !rds_conn_path_transition(cp, RDS_CONN_ERROR, 405 RDS_CONN_DOWN)) { 406 /* This can happen - eg when we're in the middle of tearing 407 * down the connection, and someone unloads the rds module. 408 * Quite reproducible with loopback connections. 409 * Mostly harmless. 410 * 411 * Note that this also happens with rds-tcp because 412 * we could have triggered rds_conn_path_drop in irq 413 * mode from rds_tcp_state change on the receipt of 414 * a FIN, thus we need to recheck for RDS_CONN_ERROR 415 * here. 416 */ 417 rds_conn_path_error(cp, "%s: failed to transition " 418 "to state DOWN, current state " 419 "is %d\n", __func__, 420 atomic_read(&cp->cp_state)); 421 return; 422 } 423 } 424 425 /* Then reconnect if it's still live. 426 * The passive side of an IB loopback connection is never added 427 * to the conn hash, so we never trigger a reconnect on this 428 * conn - the reconnect is always triggered by the active peer. */ 429 cancel_delayed_work_sync(&cp->cp_conn_w); 430 rcu_read_lock(); 431 if (!hlist_unhashed(&conn->c_hash_node)) { 432 rcu_read_unlock(); 433 rds_queue_reconnect(cp); 434 } else { 435 rcu_read_unlock(); 436 } 437 } 438 439 /* destroy a single rds_conn_path. rds_conn_destroy() iterates over 440 * all paths using rds_conn_path_destroy() 441 */ 442 static void rds_conn_path_destroy(struct rds_conn_path *cp) 443 { 444 struct rds_message *rm, *rtmp; 445 446 if (!cp->cp_transport_data) 447 return; 448 449 /* make sure lingering queued work won't try to ref the conn */ 450 cancel_delayed_work_sync(&cp->cp_send_w); 451 cancel_delayed_work_sync(&cp->cp_recv_w); 452 453 rds_conn_path_drop(cp, true); 454 flush_work(&cp->cp_down_w); 455 456 /* tear down queued messages */ 457 list_for_each_entry_safe(rm, rtmp, 458 &cp->cp_send_queue, 459 m_conn_item) { 460 list_del_init(&rm->m_conn_item); 461 BUG_ON(!list_empty(&rm->m_sock_item)); 462 rds_message_put(rm); 463 } 464 if (cp->cp_xmit_rm) 465 rds_message_put(cp->cp_xmit_rm); 466 467 WARN_ON(delayed_work_pending(&cp->cp_send_w)); 468 WARN_ON(delayed_work_pending(&cp->cp_recv_w)); 469 WARN_ON(delayed_work_pending(&cp->cp_conn_w)); 470 WARN_ON(work_pending(&cp->cp_down_w)); 471 472 cp->cp_conn->c_trans->conn_free(cp->cp_transport_data); 473 } 474 475 /* 476 * Stop and free a connection. 477 * 478 * This can only be used in very limited circumstances. It assumes that once 479 * the conn has been shutdown that no one else is referencing the connection. 480 * We can only ensure this in the rmmod path in the current code. 481 */ 482 void rds_conn_destroy(struct rds_connection *conn) 483 { 484 unsigned long flags; 485 int i; 486 struct rds_conn_path *cp; 487 int npaths = (conn->c_trans->t_mp_capable ? RDS_MPATH_WORKERS : 1); 488 489 rdsdebug("freeing conn %p for %pI4 -> " 490 "%pI4\n", conn, &conn->c_laddr, 491 &conn->c_faddr); 492 493 /* Ensure conn will not be scheduled for reconnect */ 494 spin_lock_irq(&rds_conn_lock); 495 hlist_del_init_rcu(&conn->c_hash_node); 496 spin_unlock_irq(&rds_conn_lock); 497 synchronize_rcu(); 498 499 /* shut the connection down */ 500 for (i = 0; i < npaths; i++) { 501 cp = &conn->c_path[i]; 502 rds_conn_path_destroy(cp); 503 BUG_ON(!list_empty(&cp->cp_retrans)); 504 } 505 506 /* 507 * The congestion maps aren't freed up here. They're 508 * freed by rds_cong_exit() after all the connections 509 * have been freed. 510 */ 511 rds_cong_remove_conn(conn); 512 513 kfree(conn->c_path); 514 kmem_cache_free(rds_conn_slab, conn); 515 516 spin_lock_irqsave(&rds_conn_lock, flags); 517 rds_conn_count--; 518 spin_unlock_irqrestore(&rds_conn_lock, flags); 519 } 520 EXPORT_SYMBOL_GPL(rds_conn_destroy); 521 522 static void __rds_inc_msg_cp(struct rds_incoming *inc, 523 struct rds_info_iterator *iter, 524 void *saddr, void *daddr, int flip, bool isv6) 525 { 526 #if IS_ENABLED(CONFIG_IPV6) 527 if (isv6) 528 rds6_inc_info_copy(inc, iter, saddr, daddr, flip); 529 else 530 #endif 531 rds_inc_info_copy(inc, iter, *(__be32 *)saddr, 532 *(__be32 *)daddr, flip); 533 } 534 535 static void rds_conn_message_info_cmn(struct socket *sock, unsigned int len, 536 struct rds_info_iterator *iter, 537 struct rds_info_lengths *lens, 538 int want_send, bool isv6) 539 { 540 struct hlist_head *head; 541 struct list_head *list; 542 struct rds_connection *conn; 543 struct rds_message *rm; 544 unsigned int total = 0; 545 unsigned long flags; 546 size_t i; 547 int j; 548 549 if (isv6) 550 len /= sizeof(struct rds6_info_message); 551 else 552 len /= sizeof(struct rds_info_message); 553 554 rcu_read_lock(); 555 556 for (i = 0, head = rds_conn_hash; i < ARRAY_SIZE(rds_conn_hash); 557 i++, head++) { 558 hlist_for_each_entry_rcu(conn, head, c_hash_node) { 559 struct rds_conn_path *cp; 560 int npaths; 561 562 if (!isv6 && conn->c_isv6) 563 continue; 564 565 npaths = (conn->c_trans->t_mp_capable ? 566 RDS_MPATH_WORKERS : 1); 567 568 for (j = 0; j < npaths; j++) { 569 cp = &conn->c_path[j]; 570 if (want_send) 571 list = &cp->cp_send_queue; 572 else 573 list = &cp->cp_retrans; 574 575 spin_lock_irqsave(&cp->cp_lock, flags); 576 577 /* XXX too lazy to maintain counts.. */ 578 list_for_each_entry(rm, list, m_conn_item) { 579 total++; 580 if (total <= len) 581 __rds_inc_msg_cp(&rm->m_inc, 582 iter, 583 &conn->c_laddr, 584 &conn->c_faddr, 585 0, isv6); 586 } 587 588 spin_unlock_irqrestore(&cp->cp_lock, flags); 589 } 590 } 591 } 592 rcu_read_unlock(); 593 594 lens->nr = total; 595 if (isv6) 596 lens->each = sizeof(struct rds6_info_message); 597 else 598 lens->each = sizeof(struct rds_info_message); 599 } 600 601 static void rds_conn_message_info(struct socket *sock, unsigned int len, 602 struct rds_info_iterator *iter, 603 struct rds_info_lengths *lens, 604 int want_send) 605 { 606 rds_conn_message_info_cmn(sock, len, iter, lens, want_send, false); 607 } 608 609 #if IS_ENABLED(CONFIG_IPV6) 610 static void rds6_conn_message_info(struct socket *sock, unsigned int len, 611 struct rds_info_iterator *iter, 612 struct rds_info_lengths *lens, 613 int want_send) 614 { 615 rds_conn_message_info_cmn(sock, len, iter, lens, want_send, true); 616 } 617 #endif 618 619 static void rds_conn_message_info_send(struct socket *sock, unsigned int len, 620 struct rds_info_iterator *iter, 621 struct rds_info_lengths *lens) 622 { 623 rds_conn_message_info(sock, len, iter, lens, 1); 624 } 625 626 #if IS_ENABLED(CONFIG_IPV6) 627 static void rds6_conn_message_info_send(struct socket *sock, unsigned int len, 628 struct rds_info_iterator *iter, 629 struct rds_info_lengths *lens) 630 { 631 rds6_conn_message_info(sock, len, iter, lens, 1); 632 } 633 #endif 634 635 static void rds_conn_message_info_retrans(struct socket *sock, 636 unsigned int len, 637 struct rds_info_iterator *iter, 638 struct rds_info_lengths *lens) 639 { 640 rds_conn_message_info(sock, len, iter, lens, 0); 641 } 642 643 #if IS_ENABLED(CONFIG_IPV6) 644 static void rds6_conn_message_info_retrans(struct socket *sock, 645 unsigned int len, 646 struct rds_info_iterator *iter, 647 struct rds_info_lengths *lens) 648 { 649 rds6_conn_message_info(sock, len, iter, lens, 0); 650 } 651 #endif 652 653 void rds_for_each_conn_info(struct socket *sock, unsigned int len, 654 struct rds_info_iterator *iter, 655 struct rds_info_lengths *lens, 656 int (*visitor)(struct rds_connection *, void *), 657 u64 *buffer, 658 size_t item_len) 659 { 660 struct hlist_head *head; 661 struct rds_connection *conn; 662 size_t i; 663 664 rcu_read_lock(); 665 666 lens->nr = 0; 667 lens->each = item_len; 668 669 for (i = 0, head = rds_conn_hash; i < ARRAY_SIZE(rds_conn_hash); 670 i++, head++) { 671 hlist_for_each_entry_rcu(conn, head, c_hash_node) { 672 673 /* XXX no c_lock usage.. */ 674 if (!visitor(conn, buffer)) 675 continue; 676 677 /* We copy as much as we can fit in the buffer, 678 * but we count all items so that the caller 679 * can resize the buffer. */ 680 if (len >= item_len) { 681 rds_info_copy(iter, buffer, item_len); 682 len -= item_len; 683 } 684 lens->nr++; 685 } 686 } 687 rcu_read_unlock(); 688 } 689 EXPORT_SYMBOL_GPL(rds_for_each_conn_info); 690 691 static void rds_walk_conn_path_info(struct socket *sock, unsigned int len, 692 struct rds_info_iterator *iter, 693 struct rds_info_lengths *lens, 694 int (*visitor)(struct rds_conn_path *, void *), 695 u64 *buffer, 696 size_t item_len) 697 { 698 struct hlist_head *head; 699 struct rds_connection *conn; 700 size_t i; 701 702 rcu_read_lock(); 703 704 lens->nr = 0; 705 lens->each = item_len; 706 707 for (i = 0, head = rds_conn_hash; i < ARRAY_SIZE(rds_conn_hash); 708 i++, head++) { 709 hlist_for_each_entry_rcu(conn, head, c_hash_node) { 710 struct rds_conn_path *cp; 711 712 /* XXX We only copy the information from the first 713 * path for now. The problem is that if there are 714 * more than one underlying paths, we cannot report 715 * information of all of them using the existing 716 * API. For example, there is only one next_tx_seq, 717 * which path's next_tx_seq should we report? It is 718 * a bug in the design of MPRDS. 719 */ 720 cp = conn->c_path; 721 722 /* XXX no cp_lock usage.. */ 723 if (!visitor(cp, buffer)) 724 continue; 725 726 /* We copy as much as we can fit in the buffer, 727 * but we count all items so that the caller 728 * can resize the buffer. 729 */ 730 if (len >= item_len) { 731 rds_info_copy(iter, buffer, item_len); 732 len -= item_len; 733 } 734 lens->nr++; 735 } 736 } 737 rcu_read_unlock(); 738 } 739 740 static int rds_conn_info_visitor(struct rds_conn_path *cp, void *buffer) 741 { 742 struct rds_info_connection *cinfo = buffer; 743 struct rds_connection *conn = cp->cp_conn; 744 745 if (conn->c_isv6) 746 return 0; 747 748 cinfo->next_tx_seq = cp->cp_next_tx_seq; 749 cinfo->next_rx_seq = cp->cp_next_rx_seq; 750 cinfo->laddr = conn->c_laddr.s6_addr32[3]; 751 cinfo->faddr = conn->c_faddr.s6_addr32[3]; 752 cinfo->tos = conn->c_tos; 753 strscpy_pad(cinfo->transport, conn->c_trans->t_name); 754 cinfo->flags = 0; 755 756 rds_conn_info_set(cinfo->flags, test_bit(RDS_IN_XMIT, &cp->cp_flags), 757 SENDING); 758 /* XXX Future: return the state rather than these funky bits */ 759 rds_conn_info_set(cinfo->flags, 760 atomic_read(&cp->cp_state) == RDS_CONN_CONNECTING, 761 CONNECTING); 762 rds_conn_info_set(cinfo->flags, 763 atomic_read(&cp->cp_state) == RDS_CONN_UP, 764 CONNECTED); 765 return 1; 766 } 767 768 #if IS_ENABLED(CONFIG_IPV6) 769 static int rds6_conn_info_visitor(struct rds_conn_path *cp, void *buffer) 770 { 771 struct rds6_info_connection *cinfo6 = buffer; 772 struct rds_connection *conn = cp->cp_conn; 773 774 cinfo6->next_tx_seq = cp->cp_next_tx_seq; 775 cinfo6->next_rx_seq = cp->cp_next_rx_seq; 776 cinfo6->laddr = conn->c_laddr; 777 cinfo6->faddr = conn->c_faddr; 778 strscpy_pad(cinfo6->transport, conn->c_trans->t_name); 779 cinfo6->flags = 0; 780 781 rds_conn_info_set(cinfo6->flags, test_bit(RDS_IN_XMIT, &cp->cp_flags), 782 SENDING); 783 /* XXX Future: return the state rather than these funky bits */ 784 rds_conn_info_set(cinfo6->flags, 785 atomic_read(&cp->cp_state) == RDS_CONN_CONNECTING, 786 CONNECTING); 787 rds_conn_info_set(cinfo6->flags, 788 atomic_read(&cp->cp_state) == RDS_CONN_UP, 789 CONNECTED); 790 /* Just return 1 as there is no error case. This is a helper function 791 * for rds_walk_conn_path_info() and it wants a return value. 792 */ 793 return 1; 794 } 795 #endif 796 797 static void rds_conn_info(struct socket *sock, unsigned int len, 798 struct rds_info_iterator *iter, 799 struct rds_info_lengths *lens) 800 { 801 u64 buffer[(sizeof(struct rds_info_connection) + 7) / 8]; 802 803 rds_walk_conn_path_info(sock, len, iter, lens, 804 rds_conn_info_visitor, 805 buffer, 806 sizeof(struct rds_info_connection)); 807 } 808 809 #if IS_ENABLED(CONFIG_IPV6) 810 static void rds6_conn_info(struct socket *sock, unsigned int len, 811 struct rds_info_iterator *iter, 812 struct rds_info_lengths *lens) 813 { 814 u64 buffer[(sizeof(struct rds6_info_connection) + 7) / 8]; 815 816 rds_walk_conn_path_info(sock, len, iter, lens, 817 rds6_conn_info_visitor, 818 buffer, 819 sizeof(struct rds6_info_connection)); 820 } 821 #endif 822 823 int rds_conn_init(void) 824 { 825 int ret; 826 827 ret = rds_loop_net_init(); /* register pernet callback */ 828 if (ret) 829 return ret; 830 831 rds_conn_slab = KMEM_CACHE(rds_connection, 0); 832 if (!rds_conn_slab) { 833 rds_loop_net_exit(); 834 return -ENOMEM; 835 } 836 837 rds_info_register_func(RDS_INFO_CONNECTIONS, rds_conn_info); 838 rds_info_register_func(RDS_INFO_SEND_MESSAGES, 839 rds_conn_message_info_send); 840 rds_info_register_func(RDS_INFO_RETRANS_MESSAGES, 841 rds_conn_message_info_retrans); 842 #if IS_ENABLED(CONFIG_IPV6) 843 rds_info_register_func(RDS6_INFO_CONNECTIONS, rds6_conn_info); 844 rds_info_register_func(RDS6_INFO_SEND_MESSAGES, 845 rds6_conn_message_info_send); 846 rds_info_register_func(RDS6_INFO_RETRANS_MESSAGES, 847 rds6_conn_message_info_retrans); 848 #endif 849 return 0; 850 } 851 852 void rds_conn_exit(void) 853 { 854 rds_loop_net_exit(); /* unregister pernet callback */ 855 rds_loop_exit(); 856 857 WARN_ON(!hlist_empty(rds_conn_hash)); 858 859 kmem_cache_destroy(rds_conn_slab); 860 861 rds_info_deregister_func(RDS_INFO_CONNECTIONS, rds_conn_info); 862 rds_info_deregister_func(RDS_INFO_SEND_MESSAGES, 863 rds_conn_message_info_send); 864 rds_info_deregister_func(RDS_INFO_RETRANS_MESSAGES, 865 rds_conn_message_info_retrans); 866 #if IS_ENABLED(CONFIG_IPV6) 867 rds_info_deregister_func(RDS6_INFO_CONNECTIONS, rds6_conn_info); 868 rds_info_deregister_func(RDS6_INFO_SEND_MESSAGES, 869 rds6_conn_message_info_send); 870 rds_info_deregister_func(RDS6_INFO_RETRANS_MESSAGES, 871 rds6_conn_message_info_retrans); 872 #endif 873 } 874 875 /* 876 * Force a disconnect 877 */ 878 void rds_conn_path_drop(struct rds_conn_path *cp, bool destroy) 879 { 880 atomic_set(&cp->cp_state, RDS_CONN_ERROR); 881 882 rcu_read_lock(); 883 if (!destroy && rds_destroy_pending(cp->cp_conn)) { 884 rcu_read_unlock(); 885 return; 886 } 887 queue_work(rds_wq, &cp->cp_down_w); 888 rcu_read_unlock(); 889 } 890 EXPORT_SYMBOL_GPL(rds_conn_path_drop); 891 892 void rds_conn_drop(struct rds_connection *conn) 893 { 894 WARN_ON(conn->c_trans->t_mp_capable); 895 rds_conn_path_drop(&conn->c_path[0], false); 896 } 897 EXPORT_SYMBOL_GPL(rds_conn_drop); 898 899 /* 900 * If the connection is down, trigger a connect. We may have scheduled a 901 * delayed reconnect however - in this case we should not interfere. 902 */ 903 void rds_conn_path_connect_if_down(struct rds_conn_path *cp) 904 { 905 rcu_read_lock(); 906 if (rds_destroy_pending(cp->cp_conn)) { 907 rcu_read_unlock(); 908 return; 909 } 910 if (rds_conn_path_state(cp) == RDS_CONN_DOWN && 911 !test_and_set_bit(RDS_RECONNECT_PENDING, &cp->cp_flags)) 912 queue_delayed_work(rds_wq, &cp->cp_conn_w, 0); 913 rcu_read_unlock(); 914 } 915 EXPORT_SYMBOL_GPL(rds_conn_path_connect_if_down); 916 917 /* Check connectivity of all paths 918 */ 919 void rds_check_all_paths(struct rds_connection *conn) 920 { 921 int i = 0; 922 923 do { 924 rds_conn_path_connect_if_down(&conn->c_path[i]); 925 } while (++i < conn->c_npaths); 926 } 927 928 void rds_conn_connect_if_down(struct rds_connection *conn) 929 { 930 WARN_ON(conn->c_trans->t_mp_capable); 931 rds_conn_path_connect_if_down(&conn->c_path[0]); 932 } 933 EXPORT_SYMBOL_GPL(rds_conn_connect_if_down); 934 935 void 936 __rds_conn_path_error(struct rds_conn_path *cp, const char *fmt, ...) 937 { 938 va_list ap; 939 940 va_start(ap, fmt); 941 vprintk(fmt, ap); 942 va_end(ap); 943 944 rds_conn_path_drop(cp, false); 945 } 946