1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Shared Memory Communications over RDMA (SMC-R) and RoCE 4 * 5 * AF_SMC protocol family socket handler keeping the AF_INET sock address type 6 * applies to SOCK_STREAM sockets only 7 * offers an alternative communication option for TCP-protocol sockets 8 * applicable with RoCE-cards only 9 * 10 * Initial restrictions: 11 * - support for alternate links postponed 12 * 13 * Copyright IBM Corp. 2016, 2018 14 * 15 * Author(s): Ursula Braun <ubraun@linux.vnet.ibm.com> 16 * based on prototype from Frank Blaschka 17 */ 18 19 #define pr_fmt(fmt) "smc: " fmt 20 21 #include <linux/module.h> 22 #include <linux/socket.h> 23 #include <linux/workqueue.h> 24 #include <linux/in.h> 25 #include <linux/sched/signal.h> 26 #include <linux/if_vlan.h> 27 #include <linux/rcupdate_wait.h> 28 #include <linux/ctype.h> 29 #include <linux/splice.h> 30 31 #include <net/sock.h> 32 #include <net/inet_common.h> 33 #if IS_ENABLED(CONFIG_IPV6) 34 #include <net/ipv6.h> 35 #endif 36 #include <net/tcp.h> 37 #include <net/smc.h> 38 #include <asm/ioctls.h> 39 40 #include <net/net_namespace.h> 41 #include <net/netns/generic.h> 42 #include "smc_netns.h" 43 44 #include "smc.h" 45 #include "smc_clc.h" 46 #include "smc_llc.h" 47 #include "smc_cdc.h" 48 #include "smc_core.h" 49 #include "smc_ib.h" 50 #include "smc_ism.h" 51 #include "smc_pnet.h" 52 #include "smc_netlink.h" 53 #include "smc_tx.h" 54 #include "smc_rx.h" 55 #include "smc_close.h" 56 #include "smc_stats.h" 57 #include "smc_tracepoint.h" 58 #include "smc_sysctl.h" 59 #include "smc_inet.h" 60 #include "smc_hs_bpf.h" 61 62 static DEFINE_MUTEX(smc_server_lgr_pending); /* serialize link group 63 * creation on server 64 */ 65 static DEFINE_MUTEX(smc_client_lgr_pending); /* serialize link group 66 * creation on client 67 */ 68 69 static struct workqueue_struct *smc_tcp_ls_wq; /* wq for tcp listen work */ 70 struct workqueue_struct *smc_hs_wq; /* wq for handshake work */ 71 struct workqueue_struct *smc_close_wq; /* wq for close work */ 72 73 static void smc_tcp_listen_work(struct work_struct *); 74 static void smc_connect_work(struct work_struct *); 75 76 int smc_nl_dump_hs_limitation(struct sk_buff *skb, struct netlink_callback *cb) 77 { 78 struct smc_nl_dmp_ctx *cb_ctx = smc_nl_dmp_ctx(cb); 79 void *hdr; 80 81 if (cb_ctx->pos[0]) 82 goto out; 83 84 hdr = genlmsg_put(skb, NETLINK_CB(cb->skb).portid, cb->nlh->nlmsg_seq, 85 &smc_gen_nl_family, NLM_F_MULTI, 86 SMC_NETLINK_DUMP_HS_LIMITATION); 87 if (!hdr) 88 return -ENOMEM; 89 90 if (nla_put_u8(skb, SMC_NLA_HS_LIMITATION_ENABLED, 91 sock_net(skb->sk)->smc.limit_smc_hs)) 92 goto err; 93 94 genlmsg_end(skb, hdr); 95 cb_ctx->pos[0] = 1; 96 out: 97 return skb->len; 98 err: 99 genlmsg_cancel(skb, hdr); 100 return -EMSGSIZE; 101 } 102 103 int smc_nl_enable_hs_limitation(struct sk_buff *skb, struct genl_info *info) 104 { 105 sock_net(skb->sk)->smc.limit_smc_hs = true; 106 return 0; 107 } 108 109 int smc_nl_disable_hs_limitation(struct sk_buff *skb, struct genl_info *info) 110 { 111 sock_net(skb->sk)->smc.limit_smc_hs = false; 112 return 0; 113 } 114 115 static void smc_set_keepalive(struct sock *sk, int val) 116 { 117 struct smc_sock *smc = smc_sk(sk); 118 119 smc->clcsock->sk->sk_prot->keepalive(smc->clcsock->sk, val); 120 } 121 122 static struct sock *smc_tcp_syn_recv_sock(const struct sock *sk, 123 struct sk_buff *skb, 124 struct request_sock *req, 125 struct dst_entry *dst, 126 struct request_sock *req_unhash, 127 bool *own_req, 128 void (*opt_child_init)(struct sock *newsk, 129 const struct sock *sk)) 130 { 131 struct smc_sock *smc; 132 struct sock *child; 133 134 smc = smc_clcsock_user_data(sk); 135 136 if (READ_ONCE(sk->sk_ack_backlog) + atomic_read(&smc->queued_smc_hs) > 137 sk->sk_max_ack_backlog) 138 goto drop; 139 140 if (sk_acceptq_is_full(&smc->sk)) { 141 NET_INC_STATS(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS); 142 goto drop; 143 } 144 145 /* passthrough to original syn recv sock fct */ 146 child = smc->ori_af_ops->syn_recv_sock(sk, skb, req, dst, req_unhash, 147 own_req, opt_child_init); 148 /* child must not inherit smc or its ops */ 149 if (child) { 150 rcu_assign_sk_user_data(child, NULL); 151 152 /* v4-mapped sockets don't inherit parent ops. Don't restore. */ 153 if (inet_csk(child)->icsk_af_ops == inet_csk(sk)->icsk_af_ops) 154 inet_csk(child)->icsk_af_ops = smc->ori_af_ops; 155 } 156 return child; 157 158 drop: 159 dst_release(dst); 160 tcp_listendrop(sk); 161 return NULL; 162 } 163 164 static bool smc_hs_congested(const struct sock *sk) 165 { 166 const struct smc_sock *smc; 167 168 smc = smc_clcsock_user_data(sk); 169 170 if (!smc) 171 return true; 172 173 if (workqueue_congested(WORK_CPU_UNBOUND, smc_hs_wq)) 174 return true; 175 176 return false; 177 } 178 179 struct smc_hashinfo smc_v4_hashinfo = { 180 .lock = __RW_LOCK_UNLOCKED(smc_v4_hashinfo.lock), 181 }; 182 183 struct smc_hashinfo smc_v6_hashinfo = { 184 .lock = __RW_LOCK_UNLOCKED(smc_v6_hashinfo.lock), 185 }; 186 187 int smc_hash_sk(struct sock *sk) 188 { 189 struct smc_hashinfo *h = sk->sk_prot->h.smc_hash; 190 struct hlist_head *head; 191 192 head = &h->ht; 193 194 write_lock_bh(&h->lock); 195 sk_add_node(sk, head); 196 write_unlock_bh(&h->lock); 197 sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1); 198 199 return 0; 200 } 201 202 void smc_unhash_sk(struct sock *sk) 203 { 204 struct smc_hashinfo *h = sk->sk_prot->h.smc_hash; 205 206 write_lock_bh(&h->lock); 207 if (sk_del_node_init(sk)) 208 sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1); 209 write_unlock_bh(&h->lock); 210 } 211 212 /* This will be called before user really release sock_lock. So do the 213 * work which we didn't do because of user hold the sock_lock in the 214 * BH context 215 */ 216 void smc_release_cb(struct sock *sk) 217 { 218 struct smc_sock *smc = smc_sk(sk); 219 220 if (smc->conn.tx_in_release_sock) { 221 smc_tx_pending(&smc->conn); 222 smc->conn.tx_in_release_sock = false; 223 } 224 } 225 226 struct proto smc_proto = { 227 .name = "SMC", 228 .owner = THIS_MODULE, 229 .keepalive = smc_set_keepalive, 230 .hash = smc_hash_sk, 231 .unhash = smc_unhash_sk, 232 .release_cb = smc_release_cb, 233 .obj_size = sizeof(struct smc_sock), 234 .h.smc_hash = &smc_v4_hashinfo, 235 .slab_flags = SLAB_TYPESAFE_BY_RCU, 236 }; 237 EXPORT_SYMBOL_GPL(smc_proto); 238 239 struct proto smc_proto6 = { 240 .name = "SMC6", 241 .owner = THIS_MODULE, 242 .keepalive = smc_set_keepalive, 243 .hash = smc_hash_sk, 244 .unhash = smc_unhash_sk, 245 .release_cb = smc_release_cb, 246 .obj_size = sizeof(struct smc_sock), 247 .h.smc_hash = &smc_v6_hashinfo, 248 .slab_flags = SLAB_TYPESAFE_BY_RCU, 249 }; 250 EXPORT_SYMBOL_GPL(smc_proto6); 251 252 static void smc_fback_restore_callbacks(struct smc_sock *smc) 253 { 254 struct sock *clcsk = smc->clcsock->sk; 255 256 write_lock_bh(&clcsk->sk_callback_lock); 257 clcsk->sk_user_data = NULL; 258 259 smc_clcsock_restore_cb(&clcsk->sk_state_change, &smc->clcsk_state_change); 260 smc_clcsock_restore_cb(&clcsk->sk_data_ready, &smc->clcsk_data_ready); 261 smc_clcsock_restore_cb(&clcsk->sk_write_space, &smc->clcsk_write_space); 262 smc_clcsock_restore_cb(&clcsk->sk_error_report, &smc->clcsk_error_report); 263 264 write_unlock_bh(&clcsk->sk_callback_lock); 265 } 266 267 static void smc_restore_fallback_changes(struct smc_sock *smc) 268 { 269 if (smc->clcsock->file) { /* non-accepted sockets have no file yet */ 270 smc->clcsock->file->private_data = smc->sk.sk_socket; 271 smc->clcsock->file = NULL; 272 smc_fback_restore_callbacks(smc); 273 } 274 } 275 276 static int __smc_release(struct smc_sock *smc) 277 { 278 struct sock *sk = &smc->sk; 279 int rc = 0; 280 281 if (!smc->use_fallback) { 282 rc = smc_close_active(smc); 283 smc_sock_set_flag(sk, SOCK_DEAD); 284 sk->sk_shutdown |= SHUTDOWN_MASK; 285 } else { 286 if (sk->sk_state != SMC_CLOSED) { 287 if (sk->sk_state != SMC_LISTEN && 288 sk->sk_state != SMC_INIT) 289 sock_put(sk); /* passive closing */ 290 if (sk->sk_state == SMC_LISTEN) { 291 /* wake up clcsock accept */ 292 rc = kernel_sock_shutdown(smc->clcsock, 293 SHUT_RDWR); 294 } 295 sk->sk_state = SMC_CLOSED; 296 sk->sk_state_change(sk); 297 } 298 smc_restore_fallback_changes(smc); 299 } 300 301 sk->sk_prot->unhash(sk); 302 303 if (sk->sk_state == SMC_CLOSED) { 304 if (smc->clcsock) { 305 release_sock(sk); 306 smc_clcsock_release(smc); 307 lock_sock(sk); 308 } 309 if (!smc->use_fallback) 310 smc_conn_free(&smc->conn); 311 } 312 313 return rc; 314 } 315 316 int smc_release(struct socket *sock) 317 { 318 struct sock *sk = sock->sk; 319 struct smc_sock *smc; 320 int old_state, rc = 0; 321 322 if (!sk) 323 goto out; 324 325 sock_hold(sk); /* sock_put below */ 326 smc = smc_sk(sk); 327 328 old_state = sk->sk_state; 329 330 /* cleanup for a dangling non-blocking connect */ 331 if (smc->connect_nonblock && old_state == SMC_INIT) 332 tcp_abort(smc->clcsock->sk, ECONNABORTED); 333 334 if (cancel_work_sync(&smc->connect_work)) 335 sock_put(&smc->sk); /* sock_hold in smc_connect for passive closing */ 336 337 if (sk->sk_state == SMC_LISTEN) 338 /* smc_close_non_accepted() is called and acquires 339 * sock lock for child sockets again 340 */ 341 lock_sock_nested(sk, SINGLE_DEPTH_NESTING); 342 else 343 lock_sock(sk); 344 345 if (old_state == SMC_INIT && sk->sk_state == SMC_ACTIVE && 346 !smc->use_fallback) 347 smc_close_active_abort(smc); 348 349 rc = __smc_release(smc); 350 351 /* detach socket */ 352 sock_orphan(sk); 353 sock->sk = NULL; 354 release_sock(sk); 355 356 sock_put(sk); /* sock_hold above */ 357 sock_put(sk); /* final sock_put */ 358 out: 359 return rc; 360 } 361 362 static void smc_destruct(struct sock *sk) 363 { 364 if (sk->sk_state != SMC_CLOSED) 365 return; 366 if (!sock_flag(sk, SOCK_DEAD)) 367 return; 368 switch (sk->sk_family) { 369 case AF_INET: 370 inet_sock_destruct(sk); 371 break; 372 #if IS_ENABLED(CONFIG_IPV6) 373 case AF_INET6: 374 inet6_sock_destruct(sk); 375 break; 376 #endif 377 } 378 } 379 380 static struct lock_class_key smc_key; 381 static struct lock_class_key smc_slock_key; 382 383 void smc_sk_init(struct net *net, struct sock *sk, int protocol) 384 { 385 struct smc_sock *smc = smc_sk(sk); 386 387 sk->sk_state = SMC_INIT; 388 sk->sk_destruct = smc_destruct; 389 sk->sk_protocol = protocol; 390 WRITE_ONCE(sk->sk_sndbuf, 2 * READ_ONCE(net->smc.sysctl_wmem)); 391 WRITE_ONCE(sk->sk_rcvbuf, 2 * READ_ONCE(net->smc.sysctl_rmem)); 392 INIT_WORK(&smc->tcp_listen_work, smc_tcp_listen_work); 393 INIT_WORK(&smc->connect_work, smc_connect_work); 394 INIT_DELAYED_WORK(&smc->conn.tx_work, smc_tx_work); 395 INIT_LIST_HEAD(&smc->accept_q); 396 sock_lock_init_class_and_name(sk, "slock-AF_SMC", &smc_slock_key, 397 "sk_lock-AF_SMC", &smc_key); 398 spin_lock_init(&smc->accept_q_lock); 399 spin_lock_init(&smc->conn.send_lock); 400 sk->sk_prot->hash(sk); 401 mutex_init(&smc->clcsock_release_lock); 402 smc_init_saved_callbacks(smc); 403 smc->limit_smc_hs = net->smc.limit_smc_hs; 404 smc->use_fallback = false; /* assume rdma capability first */ 405 smc->fallback_rsn = 0; 406 smc_close_init(smc); 407 } 408 409 static struct sock *smc_sock_alloc(struct net *net, struct socket *sock, 410 int protocol) 411 { 412 struct proto *prot; 413 struct sock *sk; 414 415 prot = (protocol == SMCPROTO_SMC6) ? &smc_proto6 : &smc_proto; 416 sk = sk_alloc(net, PF_SMC, GFP_KERNEL, prot, 0); 417 if (!sk) 418 return NULL; 419 420 sock_init_data(sock, sk); /* sets sk_refcnt to 1 */ 421 smc_sk_init(net, sk, protocol); 422 423 return sk; 424 } 425 426 int smc_bind(struct socket *sock, struct sockaddr_unsized *uaddr, 427 int addr_len) 428 { 429 struct sockaddr_in *addr = (struct sockaddr_in *)uaddr; 430 struct sock *sk = sock->sk; 431 struct smc_sock *smc; 432 int rc; 433 434 smc = smc_sk(sk); 435 436 /* replicate tests from inet_bind(), to be safe wrt. future changes */ 437 rc = -EINVAL; 438 if (addr_len < sizeof(struct sockaddr_in)) 439 goto out; 440 441 rc = -EAFNOSUPPORT; 442 if (addr->sin_family != AF_INET && 443 addr->sin_family != AF_INET6 && 444 addr->sin_family != AF_UNSPEC) 445 goto out; 446 /* accept AF_UNSPEC (mapped to AF_INET) only if s_addr is INADDR_ANY */ 447 if (addr->sin_family == AF_UNSPEC && 448 addr->sin_addr.s_addr != htonl(INADDR_ANY)) 449 goto out; 450 451 lock_sock(sk); 452 453 /* Check if socket is already active */ 454 rc = -EINVAL; 455 if (sk->sk_state != SMC_INIT || smc->connect_nonblock) 456 goto out_rel; 457 458 smc->clcsock->sk->sk_reuse = sk->sk_reuse; 459 smc->clcsock->sk->sk_reuseport = sk->sk_reuseport; 460 rc = kernel_bind(smc->clcsock, uaddr, addr_len); 461 462 out_rel: 463 release_sock(sk); 464 out: 465 return rc; 466 } 467 468 /* copy only relevant settings and flags of SOL_SOCKET level from smc to 469 * clc socket (since smc is not called for these options from net/core) 470 */ 471 472 #define SK_FLAGS_SMC_TO_CLC ((1UL << SOCK_URGINLINE) | \ 473 (1UL << SOCK_KEEPOPEN) | \ 474 (1UL << SOCK_LINGER) | \ 475 (1UL << SOCK_BROADCAST) | \ 476 (1UL << SOCK_TIMESTAMP) | \ 477 (1UL << SOCK_DBG) | \ 478 (1UL << SOCK_RCVTSTAMP) | \ 479 (1UL << SOCK_RCVTSTAMPNS) | \ 480 (1UL << SOCK_LOCALROUTE) | \ 481 (1UL << SOCK_TIMESTAMPING_RX_SOFTWARE) | \ 482 (1UL << SOCK_RXQ_OVFL) | \ 483 (1UL << SOCK_WIFI_STATUS) | \ 484 (1UL << SOCK_NOFCS) | \ 485 (1UL << SOCK_FILTER_LOCKED) | \ 486 (1UL << SOCK_TSTAMP_NEW)) 487 488 /* if set, use value set by setsockopt() - else use IPv4 or SMC sysctl value */ 489 static void smc_adjust_sock_bufsizes(struct sock *nsk, struct sock *osk, 490 unsigned long mask) 491 { 492 nsk->sk_userlocks = osk->sk_userlocks; 493 if (osk->sk_userlocks & SOCK_SNDBUF_LOCK) 494 nsk->sk_sndbuf = osk->sk_sndbuf; 495 if (osk->sk_userlocks & SOCK_RCVBUF_LOCK) 496 nsk->sk_rcvbuf = osk->sk_rcvbuf; 497 } 498 499 static void smc_copy_sock_settings(struct sock *nsk, struct sock *osk, 500 unsigned long mask) 501 { 502 /* options we don't get control via setsockopt for */ 503 nsk->sk_type = osk->sk_type; 504 nsk->sk_sndtimeo = READ_ONCE(osk->sk_sndtimeo); 505 nsk->sk_rcvtimeo = READ_ONCE(osk->sk_rcvtimeo); 506 nsk->sk_mark = READ_ONCE(osk->sk_mark); 507 nsk->sk_priority = READ_ONCE(osk->sk_priority); 508 nsk->sk_rcvlowat = osk->sk_rcvlowat; 509 nsk->sk_bound_dev_if = osk->sk_bound_dev_if; 510 nsk->sk_err = osk->sk_err; 511 512 nsk->sk_flags &= ~mask; 513 nsk->sk_flags |= osk->sk_flags & mask; 514 515 smc_adjust_sock_bufsizes(nsk, osk, mask); 516 } 517 518 static void smc_copy_sock_settings_to_clc(struct smc_sock *smc) 519 { 520 smc_copy_sock_settings(smc->clcsock->sk, &smc->sk, SK_FLAGS_SMC_TO_CLC); 521 } 522 523 #define SK_FLAGS_CLC_TO_SMC ((1UL << SOCK_URGINLINE) | \ 524 (1UL << SOCK_KEEPOPEN) | \ 525 (1UL << SOCK_LINGER) | \ 526 (1UL << SOCK_DBG)) 527 /* copy only settings and flags relevant for smc from clc to smc socket */ 528 static void smc_copy_sock_settings_to_smc(struct smc_sock *smc) 529 { 530 smc_copy_sock_settings(&smc->sk, smc->clcsock->sk, SK_FLAGS_CLC_TO_SMC); 531 } 532 533 /* register the new vzalloced sndbuf on all links */ 534 static int smcr_lgr_reg_sndbufs(struct smc_link *link, 535 struct smc_buf_desc *snd_desc) 536 { 537 struct smc_link_group *lgr = link->lgr; 538 int i, rc = 0; 539 540 if (!snd_desc->is_vm) 541 return -EINVAL; 542 543 /* protect against parallel smcr_link_reg_buf() */ 544 down_write(&lgr->llc_conf_mutex); 545 for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) { 546 if (!smc_link_active(&lgr->lnk[i])) 547 continue; 548 rc = smcr_link_reg_buf(&lgr->lnk[i], snd_desc); 549 if (rc) 550 break; 551 } 552 up_write(&lgr->llc_conf_mutex); 553 return rc; 554 } 555 556 /* register the new rmb on all links */ 557 static int smcr_lgr_reg_rmbs(struct smc_link *link, 558 struct smc_buf_desc *rmb_desc) 559 { 560 struct smc_link_group *lgr = link->lgr; 561 bool do_slow = false; 562 int i, rc = 0; 563 564 rc = smc_llc_flow_initiate(lgr, SMC_LLC_FLOW_RKEY); 565 if (rc) 566 return rc; 567 568 down_read(&lgr->llc_conf_mutex); 569 for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) { 570 if (!smc_link_active(&lgr->lnk[i])) 571 continue; 572 if (!rmb_desc->is_reg_mr[link->link_idx]) { 573 up_read(&lgr->llc_conf_mutex); 574 goto slow_path; 575 } 576 } 577 /* mr register already */ 578 goto fast_path; 579 slow_path: 580 do_slow = true; 581 /* protect against parallel smc_llc_cli_rkey_exchange() and 582 * parallel smcr_link_reg_buf() 583 */ 584 down_write(&lgr->llc_conf_mutex); 585 for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) { 586 if (!smc_link_active(&lgr->lnk[i])) 587 continue; 588 rc = smcr_link_reg_buf(&lgr->lnk[i], rmb_desc); 589 if (rc) 590 goto out; 591 } 592 fast_path: 593 /* exchange confirm_rkey msg with peer */ 594 rc = smc_llc_do_confirm_rkey(link, rmb_desc); 595 if (rc) { 596 rc = -EFAULT; 597 goto out; 598 } 599 rmb_desc->is_conf_rkey = true; 600 out: 601 do_slow ? up_write(&lgr->llc_conf_mutex) : up_read(&lgr->llc_conf_mutex); 602 smc_llc_flow_stop(lgr, &lgr->llc_flow_lcl); 603 return rc; 604 } 605 606 static int smcr_clnt_conf_first_link(struct smc_sock *smc) 607 { 608 struct smc_link *link = smc->conn.lnk; 609 struct smc_llc_qentry *qentry; 610 int rc; 611 612 /* Receive CONFIRM LINK request from server over RoCE fabric. 613 * Increasing the client's timeout by twice as much as the server's 614 * timeout by default can temporarily avoid decline messages of 615 * both sides crossing or colliding 616 */ 617 qentry = smc_llc_wait(link->lgr, NULL, 2 * SMC_LLC_WAIT_TIME, 618 SMC_LLC_CONFIRM_LINK); 619 if (!qentry) { 620 struct smc_clc_msg_decline dclc; 621 622 rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc), 623 SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT); 624 return rc == -EAGAIN ? SMC_CLC_DECL_TIMEOUT_CL : rc; 625 } 626 smc_llc_save_peer_uid(qentry); 627 rc = smc_llc_eval_conf_link(qentry, SMC_LLC_REQ); 628 smc_llc_flow_qentry_del(&link->lgr->llc_flow_lcl); 629 if (rc) 630 return SMC_CLC_DECL_RMBE_EC; 631 632 rc = smc_ib_modify_qp_rts(link); 633 if (rc) 634 return SMC_CLC_DECL_ERR_RDYLNK; 635 636 smc_wr_remember_qp_attr(link); 637 638 /* reg the sndbuf if it was vzalloced */ 639 if (smc->conn.sndbuf_desc->is_vm) { 640 if (smcr_link_reg_buf(link, smc->conn.sndbuf_desc)) 641 return SMC_CLC_DECL_ERR_REGBUF; 642 } 643 644 /* reg the rmb */ 645 if (smcr_link_reg_buf(link, smc->conn.rmb_desc)) 646 return SMC_CLC_DECL_ERR_REGBUF; 647 648 /* confirm_rkey is implicit on 1st contact */ 649 smc->conn.rmb_desc->is_conf_rkey = true; 650 651 /* send CONFIRM LINK response over RoCE fabric */ 652 rc = smc_llc_send_confirm_link(link, SMC_LLC_RESP); 653 if (rc < 0) 654 return SMC_CLC_DECL_TIMEOUT_CL; 655 656 smc_llc_link_active(link); 657 smcr_lgr_set_type(link->lgr, SMC_LGR_SINGLE); 658 659 if (link->lgr->max_links > 1) { 660 /* optional 2nd link, receive ADD LINK request from server */ 661 qentry = smc_llc_wait(link->lgr, NULL, SMC_LLC_WAIT_TIME, 662 SMC_LLC_ADD_LINK); 663 if (!qentry) { 664 struct smc_clc_msg_decline dclc; 665 666 rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc), 667 SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT); 668 if (rc == -EAGAIN) 669 rc = 0; /* no DECLINE received, go with one link */ 670 return rc; 671 } 672 smc_llc_flow_qentry_clr(&link->lgr->llc_flow_lcl); 673 smc_llc_cli_add_link(link, qentry); 674 } 675 return 0; 676 } 677 678 static bool smc_isascii(char *hostname) 679 { 680 int i; 681 682 for (i = 0; i < SMC_MAX_HOSTNAME_LEN; i++) 683 if (!isascii(hostname[i])) 684 return false; 685 return true; 686 } 687 688 static void smc_conn_save_peer_info_fce(struct smc_sock *smc, 689 struct smc_clc_msg_accept_confirm *clc) 690 { 691 struct smc_clc_first_contact_ext *fce; 692 int clc_v2_len; 693 694 if (clc->hdr.version == SMC_V1 || 695 !(clc->hdr.typev2 & SMC_FIRST_CONTACT_MASK)) 696 return; 697 698 if (smc->conn.lgr->is_smcd) { 699 memcpy(smc->conn.lgr->negotiated_eid, clc->d1.eid, 700 SMC_MAX_EID_LEN); 701 clc_v2_len = offsetofend(struct smc_clc_msg_accept_confirm, d1); 702 } else { 703 memcpy(smc->conn.lgr->negotiated_eid, clc->r1.eid, 704 SMC_MAX_EID_LEN); 705 clc_v2_len = offsetofend(struct smc_clc_msg_accept_confirm, r1); 706 } 707 fce = (struct smc_clc_first_contact_ext *)(((u8 *)clc) + clc_v2_len); 708 smc->conn.lgr->peer_os = fce->os_type; 709 smc->conn.lgr->peer_smc_release = fce->release; 710 if (smc_isascii(fce->hostname)) 711 memcpy(smc->conn.lgr->peer_hostname, fce->hostname, 712 SMC_MAX_HOSTNAME_LEN); 713 } 714 715 static void smcr_conn_save_peer_info(struct smc_sock *smc, 716 struct smc_clc_msg_accept_confirm *clc) 717 { 718 int bufsize = smc_uncompress_bufsize(clc->r0.rmbe_size); 719 720 smc->conn.peer_rmbe_idx = clc->r0.rmbe_idx; 721 smc->conn.local_tx_ctrl.token = ntohl(clc->r0.rmbe_alert_token); 722 smc->conn.peer_rmbe_size = bufsize; 723 atomic_set(&smc->conn.peer_rmbe_space, smc->conn.peer_rmbe_size); 724 smc->conn.tx_off = bufsize * (smc->conn.peer_rmbe_idx - 1); 725 } 726 727 static void smcd_conn_save_peer_info(struct smc_sock *smc, 728 struct smc_clc_msg_accept_confirm *clc) 729 { 730 int bufsize = smc_uncompress_bufsize(clc->d0.dmbe_size); 731 732 smc->conn.peer_rmbe_idx = clc->d0.dmbe_idx; 733 smc->conn.peer_token = ntohll(clc->d0.token); 734 /* msg header takes up space in the buffer */ 735 smc->conn.peer_rmbe_size = bufsize - sizeof(struct smcd_cdc_msg); 736 atomic_set(&smc->conn.peer_rmbe_space, smc->conn.peer_rmbe_size); 737 smc->conn.tx_off = bufsize * smc->conn.peer_rmbe_idx; 738 } 739 740 static void smc_conn_save_peer_info(struct smc_sock *smc, 741 struct smc_clc_msg_accept_confirm *clc) 742 { 743 if (smc->conn.lgr->is_smcd) 744 smcd_conn_save_peer_info(smc, clc); 745 else 746 smcr_conn_save_peer_info(smc, clc); 747 smc_conn_save_peer_info_fce(smc, clc); 748 } 749 750 static void smc_link_save_peer_info(struct smc_link *link, 751 struct smc_clc_msg_accept_confirm *clc, 752 struct smc_init_info *ini) 753 { 754 link->peer_qpn = ntoh24(clc->r0.qpn); 755 memcpy(link->peer_gid, ini->peer_gid, SMC_GID_SIZE); 756 memcpy(link->peer_mac, ini->peer_mac, sizeof(link->peer_mac)); 757 link->peer_psn = ntoh24(clc->r0.psn); 758 link->peer_mtu = clc->r0.qp_mtu; 759 } 760 761 static void smc_stat_inc_fback_rsn_cnt(struct smc_sock *smc, 762 struct smc_stats_fback *fback_arr) 763 { 764 int cnt; 765 766 for (cnt = 0; cnt < SMC_MAX_FBACK_RSN_CNT; cnt++) { 767 if (fback_arr[cnt].fback_code == smc->fallback_rsn) { 768 fback_arr[cnt].count++; 769 break; 770 } 771 if (!fback_arr[cnt].fback_code) { 772 fback_arr[cnt].fback_code = smc->fallback_rsn; 773 fback_arr[cnt].count++; 774 break; 775 } 776 } 777 } 778 779 static void smc_stat_fallback(struct smc_sock *smc) 780 { 781 struct net *net = sock_net(&smc->sk); 782 783 mutex_lock(&net->smc.mutex_fback_rsn); 784 if (smc->listen_smc) { 785 smc_stat_inc_fback_rsn_cnt(smc, net->smc.fback_rsn->srv); 786 net->smc.fback_rsn->srv_fback_cnt++; 787 } else { 788 smc_stat_inc_fback_rsn_cnt(smc, net->smc.fback_rsn->clnt); 789 net->smc.fback_rsn->clnt_fback_cnt++; 790 } 791 mutex_unlock(&net->smc.mutex_fback_rsn); 792 } 793 794 /* must be called under rcu read lock */ 795 static void smc_fback_wakeup_waitqueue(struct smc_sock *smc, void *key) 796 { 797 struct socket_wq *wq; 798 __poll_t flags; 799 800 wq = rcu_dereference(smc->sk.sk_wq); 801 if (!skwq_has_sleeper(wq)) 802 return; 803 804 /* wake up smc sk->sk_wq */ 805 if (!key) { 806 /* sk_state_change */ 807 wake_up_interruptible_all(&wq->wait); 808 } else { 809 flags = key_to_poll(key); 810 if (flags & (EPOLLIN | EPOLLOUT)) 811 /* sk_data_ready or sk_write_space */ 812 wake_up_interruptible_sync_poll(&wq->wait, flags); 813 else if (flags & EPOLLERR) 814 /* sk_error_report */ 815 wake_up_interruptible_poll(&wq->wait, flags); 816 } 817 } 818 819 static int smc_fback_mark_woken(wait_queue_entry_t *wait, 820 unsigned int mode, int sync, void *key) 821 { 822 struct smc_mark_woken *mark = 823 container_of(wait, struct smc_mark_woken, wait_entry); 824 825 mark->woken = true; 826 mark->key = key; 827 return 0; 828 } 829 830 static void smc_fback_forward_wakeup(struct smc_sock *smc, struct sock *clcsk, 831 void (*clcsock_callback)(struct sock *sk)) 832 { 833 struct smc_mark_woken mark = { .woken = false }; 834 struct socket_wq *wq; 835 836 init_waitqueue_func_entry(&mark.wait_entry, 837 smc_fback_mark_woken); 838 rcu_read_lock(); 839 wq = rcu_dereference(clcsk->sk_wq); 840 if (!wq) 841 goto out; 842 add_wait_queue(sk_sleep(clcsk), &mark.wait_entry); 843 clcsock_callback(clcsk); 844 remove_wait_queue(sk_sleep(clcsk), &mark.wait_entry); 845 846 if (mark.woken) 847 smc_fback_wakeup_waitqueue(smc, mark.key); 848 out: 849 rcu_read_unlock(); 850 } 851 852 static void smc_fback_state_change(struct sock *clcsk) 853 { 854 struct smc_sock *smc; 855 856 read_lock_bh(&clcsk->sk_callback_lock); 857 smc = smc_clcsock_user_data(clcsk); 858 if (smc) 859 smc_fback_forward_wakeup(smc, clcsk, 860 smc->clcsk_state_change); 861 read_unlock_bh(&clcsk->sk_callback_lock); 862 } 863 864 static void smc_fback_data_ready(struct sock *clcsk) 865 { 866 struct smc_sock *smc; 867 868 read_lock_bh(&clcsk->sk_callback_lock); 869 smc = smc_clcsock_user_data(clcsk); 870 if (smc) 871 smc_fback_forward_wakeup(smc, clcsk, 872 smc->clcsk_data_ready); 873 read_unlock_bh(&clcsk->sk_callback_lock); 874 } 875 876 static void smc_fback_write_space(struct sock *clcsk) 877 { 878 struct smc_sock *smc; 879 880 read_lock_bh(&clcsk->sk_callback_lock); 881 smc = smc_clcsock_user_data(clcsk); 882 if (smc) 883 smc_fback_forward_wakeup(smc, clcsk, 884 smc->clcsk_write_space); 885 read_unlock_bh(&clcsk->sk_callback_lock); 886 } 887 888 static void smc_fback_error_report(struct sock *clcsk) 889 { 890 struct smc_sock *smc; 891 892 read_lock_bh(&clcsk->sk_callback_lock); 893 smc = smc_clcsock_user_data(clcsk); 894 if (smc) 895 smc_fback_forward_wakeup(smc, clcsk, 896 smc->clcsk_error_report); 897 read_unlock_bh(&clcsk->sk_callback_lock); 898 } 899 900 static void smc_fback_replace_callbacks(struct smc_sock *smc) 901 { 902 struct sock *clcsk = smc->clcsock->sk; 903 904 write_lock_bh(&clcsk->sk_callback_lock); 905 clcsk->sk_user_data = (void *)((uintptr_t)smc | SK_USER_DATA_NOCOPY); 906 907 smc_clcsock_replace_cb(&clcsk->sk_state_change, smc_fback_state_change, 908 &smc->clcsk_state_change); 909 smc_clcsock_replace_cb(&clcsk->sk_data_ready, smc_fback_data_ready, 910 &smc->clcsk_data_ready); 911 smc_clcsock_replace_cb(&clcsk->sk_write_space, smc_fback_write_space, 912 &smc->clcsk_write_space); 913 smc_clcsock_replace_cb(&clcsk->sk_error_report, smc_fback_error_report, 914 &smc->clcsk_error_report); 915 916 write_unlock_bh(&clcsk->sk_callback_lock); 917 } 918 919 static int smc_switch_to_fallback(struct smc_sock *smc, int reason_code) 920 { 921 int rc = 0; 922 923 mutex_lock(&smc->clcsock_release_lock); 924 if (!smc->clcsock) { 925 rc = -EBADF; 926 goto out; 927 } 928 929 smc->use_fallback = true; 930 smc->fallback_rsn = reason_code; 931 smc_stat_fallback(smc); 932 trace_smc_switch_to_fallback(smc, reason_code); 933 if (smc->sk.sk_socket && smc->sk.sk_socket->file) { 934 smc->clcsock->file = smc->sk.sk_socket->file; 935 smc->clcsock->file->private_data = smc->clcsock; 936 smc->clcsock->wq.fasync_list = 937 smc->sk.sk_socket->wq.fasync_list; 938 smc->sk.sk_socket->wq.fasync_list = NULL; 939 940 /* There might be some wait entries remaining 941 * in smc sk->sk_wq and they should be woken up 942 * as clcsock's wait queue is woken up. 943 */ 944 smc_fback_replace_callbacks(smc); 945 } 946 out: 947 mutex_unlock(&smc->clcsock_release_lock); 948 return rc; 949 } 950 951 /* fall back during connect */ 952 static int smc_connect_fallback(struct smc_sock *smc, int reason_code) 953 { 954 struct net *net = sock_net(&smc->sk); 955 int rc = 0; 956 957 rc = smc_switch_to_fallback(smc, reason_code); 958 if (rc) { /* fallback fails */ 959 this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt); 960 if (smc->sk.sk_state == SMC_INIT) 961 sock_put(&smc->sk); /* passive closing */ 962 return rc; 963 } 964 smc_copy_sock_settings_to_clc(smc); 965 smc->connect_nonblock = 0; 966 if (smc->sk.sk_state == SMC_INIT) 967 smc->sk.sk_state = SMC_ACTIVE; 968 return 0; 969 } 970 971 /* decline and fall back during connect */ 972 static int smc_connect_decline_fallback(struct smc_sock *smc, int reason_code, 973 u8 version) 974 { 975 struct net *net = sock_net(&smc->sk); 976 int rc; 977 978 if (reason_code < 0) { /* error, fallback is not possible */ 979 this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt); 980 if (smc->sk.sk_state == SMC_INIT) 981 sock_put(&smc->sk); /* passive closing */ 982 return reason_code; 983 } 984 if (reason_code != SMC_CLC_DECL_PEERDECL) { 985 rc = smc_clc_send_decline(smc, reason_code, version); 986 if (rc < 0) { 987 this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt); 988 if (smc->sk.sk_state == SMC_INIT) 989 sock_put(&smc->sk); /* passive closing */ 990 return rc; 991 } 992 } 993 return smc_connect_fallback(smc, reason_code); 994 } 995 996 static void smc_conn_abort(struct smc_sock *smc, int local_first) 997 { 998 struct smc_connection *conn = &smc->conn; 999 struct smc_link_group *lgr = conn->lgr; 1000 bool lgr_valid = false; 1001 1002 if (smc_conn_lgr_valid(conn)) 1003 lgr_valid = true; 1004 1005 smc_conn_free(conn); 1006 if (local_first && lgr_valid) 1007 smc_lgr_cleanup_early(lgr); 1008 } 1009 1010 /* check if there is a rdma device available for this connection. */ 1011 /* called for connect and listen */ 1012 static int smc_find_rdma_device(struct smc_sock *smc, struct smc_init_info *ini) 1013 { 1014 /* PNET table look up: search active ib_device and port 1015 * within same PNETID that also contains the ethernet device 1016 * used for the internal TCP socket 1017 */ 1018 smc_pnet_find_roce_resource(smc->clcsock->sk, ini); 1019 if (!ini->check_smcrv2 && !ini->ib_dev) 1020 return SMC_CLC_DECL_NOSMCRDEV; 1021 if (ini->check_smcrv2 && !ini->smcrv2.ib_dev_v2) 1022 return SMC_CLC_DECL_NOSMCRDEV; 1023 return 0; 1024 } 1025 1026 /* check if there is an ISM device available for this connection. */ 1027 /* called for connect and listen */ 1028 static int smc_find_ism_device(struct smc_sock *smc, struct smc_init_info *ini) 1029 { 1030 /* Find ISM device with same PNETID as connecting interface */ 1031 smc_pnet_find_ism_resource(smc->clcsock->sk, ini); 1032 if (!ini->ism_dev[0]) 1033 return SMC_CLC_DECL_NOSMCDDEV; 1034 else 1035 ini->ism_chid[0] = smc_ism_get_chid(ini->ism_dev[0]); 1036 return 0; 1037 } 1038 1039 /* is chid unique for the ism devices that are already determined? */ 1040 static bool smc_find_ism_v2_is_unique_chid(u16 chid, struct smc_init_info *ini, 1041 int cnt) 1042 { 1043 int i = (!ini->ism_dev[0]) ? 1 : 0; 1044 1045 for (; i < cnt; i++) 1046 if (ini->ism_chid[i] == chid) 1047 return false; 1048 return true; 1049 } 1050 1051 /* determine possible V2 ISM devices (either without PNETID or with PNETID plus 1052 * PNETID matching net_device) 1053 */ 1054 static int smc_find_ism_v2_device_clnt(struct smc_sock *smc, 1055 struct smc_init_info *ini) 1056 { 1057 int rc = SMC_CLC_DECL_NOSMCDDEV; 1058 struct smcd_dev *smcd; 1059 int i = 1, entry = 1; 1060 bool is_emulated; 1061 u16 chid; 1062 1063 if (smcd_indicated(ini->smc_type_v1)) 1064 rc = 0; /* already initialized for V1 */ 1065 mutex_lock(&smcd_dev_list.mutex); 1066 list_for_each_entry(smcd, &smcd_dev_list.list, list) { 1067 if (smcd->going_away || smcd == ini->ism_dev[0]) 1068 continue; 1069 chid = smc_ism_get_chid(smcd); 1070 if (!smc_find_ism_v2_is_unique_chid(chid, ini, i)) 1071 continue; 1072 is_emulated = __smc_ism_is_emulated(chid); 1073 if (!smc_pnet_is_pnetid_set(smcd->pnetid) || 1074 smc_pnet_is_ndev_pnetid(sock_net(&smc->sk), smcd->pnetid)) { 1075 if (is_emulated && entry == SMCD_CLC_MAX_V2_GID_ENTRIES) 1076 /* It's the last GID-CHID entry left in CLC 1077 * Proposal SMC-Dv2 extension, but an Emulated- 1078 * ISM device will take two entries. So give 1079 * up it and try the next potential ISM device. 1080 */ 1081 continue; 1082 ini->ism_dev[i] = smcd; 1083 ini->ism_chid[i] = chid; 1084 ini->is_smcd = true; 1085 rc = 0; 1086 i++; 1087 entry = is_emulated ? entry + 2 : entry + 1; 1088 if (entry > SMCD_CLC_MAX_V2_GID_ENTRIES) 1089 break; 1090 } 1091 } 1092 mutex_unlock(&smcd_dev_list.mutex); 1093 ini->ism_offered_cnt = i - 1; 1094 if (!ini->ism_dev[0] && !ini->ism_dev[1]) 1095 ini->smcd_version = 0; 1096 1097 return rc; 1098 } 1099 1100 /* Check for VLAN ID and register it on ISM device just for CLC handshake */ 1101 static int smc_connect_ism_vlan_setup(struct smc_init_info *ini) 1102 { 1103 if (ini->vlan_id && smc_ism_get_vlan(ini->ism_dev[0], ini->vlan_id)) 1104 return SMC_CLC_DECL_ISMVLANERR; 1105 return 0; 1106 } 1107 1108 static int smc_find_proposal_devices(struct smc_sock *smc, 1109 struct smc_init_info *ini) 1110 { 1111 int rc = 0; 1112 1113 /* check if there is an ism device available */ 1114 if (!(ini->smcd_version & SMC_V1) || 1115 smc_find_ism_device(smc, ini) || 1116 smc_connect_ism_vlan_setup(ini)) 1117 ini->smcd_version &= ~SMC_V1; 1118 /* else ISM V1 is supported for this connection */ 1119 1120 /* check if there is an rdma device available */ 1121 if (!(ini->smcr_version & SMC_V1) || 1122 smc_find_rdma_device(smc, ini)) 1123 ini->smcr_version &= ~SMC_V1; 1124 /* else RDMA is supported for this connection */ 1125 1126 ini->smc_type_v1 = smc_indicated_type(ini->smcd_version & SMC_V1, 1127 ini->smcr_version & SMC_V1); 1128 1129 /* check if there is an ism v2 device available */ 1130 if (!(ini->smcd_version & SMC_V2) || 1131 !smc_ism_is_v2_capable() || 1132 smc_find_ism_v2_device_clnt(smc, ini)) 1133 ini->smcd_version &= ~SMC_V2; 1134 1135 /* check if there is an rdma v2 device available */ 1136 ini->check_smcrv2 = true; 1137 ini->smcrv2.saddr = smc->clcsock->sk->sk_rcv_saddr; 1138 if (!(ini->smcr_version & SMC_V2) || 1139 #if IS_ENABLED(CONFIG_IPV6) 1140 (smc->clcsock->sk->sk_family == AF_INET6 && 1141 !ipv6_addr_v4mapped(&smc->clcsock->sk->sk_v6_rcv_saddr)) || 1142 #endif 1143 !smc_clc_ueid_count() || 1144 smc_find_rdma_device(smc, ini)) 1145 ini->smcr_version &= ~SMC_V2; 1146 ini->check_smcrv2 = false; 1147 1148 ini->smc_type_v2 = smc_indicated_type(ini->smcd_version & SMC_V2, 1149 ini->smcr_version & SMC_V2); 1150 1151 /* if neither ISM nor RDMA are supported, fallback */ 1152 if (ini->smc_type_v1 == SMC_TYPE_N && ini->smc_type_v2 == SMC_TYPE_N) 1153 rc = SMC_CLC_DECL_NOSMCDEV; 1154 1155 return rc; 1156 } 1157 1158 /* cleanup temporary VLAN ID registration used for CLC handshake. If ISM is 1159 * used, the VLAN ID will be registered again during the connection setup. 1160 */ 1161 static int smc_connect_ism_vlan_cleanup(struct smc_init_info *ini) 1162 { 1163 if (!smcd_indicated(ini->smc_type_v1)) 1164 return 0; 1165 if (ini->vlan_id && smc_ism_put_vlan(ini->ism_dev[0], ini->vlan_id)) 1166 return SMC_CLC_DECL_CNFERR; 1167 return 0; 1168 } 1169 1170 #define SMC_CLC_MAX_ACCEPT_LEN \ 1171 (sizeof(struct smc_clc_msg_accept_confirm) + \ 1172 sizeof(struct smc_clc_first_contact_ext_v2x) + \ 1173 sizeof(struct smc_clc_msg_trail)) 1174 1175 /* CLC handshake during connect */ 1176 static int smc_connect_clc(struct smc_sock *smc, 1177 struct smc_clc_msg_accept_confirm *aclc, 1178 struct smc_init_info *ini) 1179 { 1180 int rc = 0; 1181 1182 /* do inband token exchange */ 1183 rc = smc_clc_send_proposal(smc, ini); 1184 if (rc) 1185 return rc; 1186 /* receive SMC Accept CLC message */ 1187 return smc_clc_wait_msg(smc, aclc, SMC_CLC_MAX_ACCEPT_LEN, 1188 SMC_CLC_ACCEPT, CLC_WAIT_TIME); 1189 } 1190 1191 void smc_fill_gid_list(struct smc_link_group *lgr, 1192 struct smc_gidlist *gidlist, 1193 struct smc_ib_device *known_dev, u8 *known_gid) 1194 { 1195 struct smc_init_info *alt_ini = NULL; 1196 1197 memset(gidlist, 0, sizeof(*gidlist)); 1198 memcpy(gidlist->list[gidlist->len++], known_gid, SMC_GID_SIZE); 1199 1200 alt_ini = kzalloc_obj(*alt_ini); 1201 if (!alt_ini) 1202 goto out; 1203 1204 alt_ini->vlan_id = lgr->vlan_id; 1205 alt_ini->check_smcrv2 = true; 1206 alt_ini->smcrv2.saddr = lgr->saddr; 1207 smc_pnet_find_alt_roce(lgr, alt_ini, known_dev); 1208 1209 if (!alt_ini->smcrv2.ib_dev_v2) 1210 goto out; 1211 1212 memcpy(gidlist->list[gidlist->len++], alt_ini->smcrv2.ib_gid_v2, 1213 SMC_GID_SIZE); 1214 1215 out: 1216 kfree(alt_ini); 1217 } 1218 1219 static int smc_connect_rdma_v2_prepare(struct smc_sock *smc, 1220 struct smc_clc_msg_accept_confirm *aclc, 1221 struct smc_init_info *ini) 1222 { 1223 struct smc_clc_first_contact_ext *fce = 1224 smc_get_clc_first_contact_ext(aclc, false); 1225 struct net *net = sock_net(&smc->sk); 1226 int rc; 1227 1228 if (!ini->first_contact_peer || aclc->hdr.version == SMC_V1) 1229 return 0; 1230 1231 if (fce->v2_direct) { 1232 memcpy(ini->smcrv2.nexthop_mac, &aclc->r0.lcl.mac, ETH_ALEN); 1233 ini->smcrv2.uses_gateway = false; 1234 } else { 1235 if (smc_ib_find_route(net, smc->clcsock->sk->sk_rcv_saddr, 1236 smc_ib_gid_to_ipv4(aclc->r0.lcl.gid), 1237 ini->smcrv2.nexthop_mac, 1238 &ini->smcrv2.uses_gateway)) 1239 return SMC_CLC_DECL_NOROUTE; 1240 if (!ini->smcrv2.uses_gateway) { 1241 /* mismatch: peer claims indirect, but its direct */ 1242 return SMC_CLC_DECL_NOINDIRECT; 1243 } 1244 } 1245 1246 ini->release_nr = fce->release; 1247 rc = smc_clc_clnt_v2x_features_validate(fce, ini); 1248 if (rc) 1249 return rc; 1250 1251 return 0; 1252 } 1253 1254 /* setup for RDMA connection of client */ 1255 static int smc_connect_rdma(struct smc_sock *smc, 1256 struct smc_clc_msg_accept_confirm *aclc, 1257 struct smc_init_info *ini) 1258 { 1259 int i, reason_code = 0; 1260 struct smc_link *link; 1261 u8 *eid = NULL; 1262 1263 ini->is_smcd = false; 1264 ini->ib_clcqpn = ntoh24(aclc->r0.qpn); 1265 ini->first_contact_peer = aclc->hdr.typev2 & SMC_FIRST_CONTACT_MASK; 1266 memcpy(ini->peer_systemid, aclc->r0.lcl.id_for_peer, SMC_SYSTEMID_LEN); 1267 memcpy(ini->peer_gid, aclc->r0.lcl.gid, SMC_GID_SIZE); 1268 memcpy(ini->peer_mac, aclc->r0.lcl.mac, ETH_ALEN); 1269 ini->max_conns = SMC_CONN_PER_LGR_MAX; 1270 ini->max_links = SMC_LINKS_ADD_LNK_MAX; 1271 1272 reason_code = smc_connect_rdma_v2_prepare(smc, aclc, ini); 1273 if (reason_code) 1274 return reason_code; 1275 1276 mutex_lock(&smc_client_lgr_pending); 1277 reason_code = smc_conn_create(smc, ini); 1278 if (reason_code) { 1279 mutex_unlock(&smc_client_lgr_pending); 1280 return reason_code; 1281 } 1282 1283 smc_conn_save_peer_info(smc, aclc); 1284 1285 if (ini->first_contact_local) { 1286 link = smc->conn.lnk; 1287 } else { 1288 /* set link that was assigned by server */ 1289 link = NULL; 1290 for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) { 1291 struct smc_link *l = &smc->conn.lgr->lnk[i]; 1292 1293 if (l->peer_qpn == ntoh24(aclc->r0.qpn) && 1294 !memcmp(l->peer_gid, &aclc->r0.lcl.gid, 1295 SMC_GID_SIZE) && 1296 (aclc->hdr.version > SMC_V1 || 1297 !memcmp(l->peer_mac, &aclc->r0.lcl.mac, 1298 sizeof(l->peer_mac)))) { 1299 link = l; 1300 break; 1301 } 1302 } 1303 if (!link) { 1304 reason_code = SMC_CLC_DECL_NOSRVLINK; 1305 goto connect_abort; 1306 } 1307 smc_switch_link_and_count(&smc->conn, link); 1308 } 1309 1310 /* create send buffer and rmb */ 1311 if (smc_buf_create(smc, false)) { 1312 reason_code = SMC_CLC_DECL_MEM; 1313 goto connect_abort; 1314 } 1315 1316 if (ini->first_contact_local) 1317 smc_link_save_peer_info(link, aclc, ini); 1318 1319 if (smc_rmb_rtoken_handling(&smc->conn, link, aclc)) { 1320 reason_code = SMC_CLC_DECL_ERR_RTOK; 1321 goto connect_abort; 1322 } 1323 1324 smc_rx_init(smc); 1325 1326 if (ini->first_contact_local) { 1327 if (smc_ib_ready_link(link)) { 1328 reason_code = SMC_CLC_DECL_ERR_RDYLNK; 1329 goto connect_abort; 1330 } 1331 } else { 1332 /* reg sendbufs if they were vzalloced */ 1333 if (smc->conn.sndbuf_desc->is_vm) { 1334 if (smcr_lgr_reg_sndbufs(link, smc->conn.sndbuf_desc)) { 1335 reason_code = SMC_CLC_DECL_ERR_REGBUF; 1336 goto connect_abort; 1337 } 1338 } 1339 if (smcr_lgr_reg_rmbs(link, smc->conn.rmb_desc)) { 1340 reason_code = SMC_CLC_DECL_ERR_REGBUF; 1341 goto connect_abort; 1342 } 1343 } 1344 1345 if (aclc->hdr.version > SMC_V1) { 1346 eid = aclc->r1.eid; 1347 if (ini->first_contact_local) 1348 smc_fill_gid_list(link->lgr, &ini->smcrv2.gidlist, 1349 link->smcibdev, link->gid); 1350 } 1351 1352 reason_code = smc_clc_send_confirm(smc, ini->first_contact_local, 1353 aclc->hdr.version, eid, ini); 1354 if (reason_code) 1355 goto connect_abort; 1356 1357 smc_tx_init(smc); 1358 1359 if (ini->first_contact_local) { 1360 /* QP confirmation over RoCE fabric */ 1361 smc_llc_flow_initiate(link->lgr, SMC_LLC_FLOW_ADD_LINK); 1362 reason_code = smcr_clnt_conf_first_link(smc); 1363 smc_llc_flow_stop(link->lgr, &link->lgr->llc_flow_lcl); 1364 if (reason_code) 1365 goto connect_abort; 1366 } 1367 mutex_unlock(&smc_client_lgr_pending); 1368 1369 smc_copy_sock_settings_to_clc(smc); 1370 smc->connect_nonblock = 0; 1371 if (smc->sk.sk_state == SMC_INIT) 1372 smc->sk.sk_state = SMC_ACTIVE; 1373 1374 return 0; 1375 connect_abort: 1376 smc_conn_abort(smc, ini->first_contact_local); 1377 mutex_unlock(&smc_client_lgr_pending); 1378 smc->connect_nonblock = 0; 1379 1380 return reason_code; 1381 } 1382 1383 /* The server has chosen one of the proposed ISM devices for the communication. 1384 * Determine from the CHID of the received CLC ACCEPT the ISM device chosen. 1385 */ 1386 static int 1387 smc_v2_determine_accepted_chid(struct smc_clc_msg_accept_confirm *aclc, 1388 struct smc_init_info *ini) 1389 { 1390 int i; 1391 1392 for (i = 0; i < ini->ism_offered_cnt + 1; i++) { 1393 if (ini->ism_chid[i] == ntohs(aclc->d1.chid)) { 1394 ini->ism_selected = i; 1395 return 0; 1396 } 1397 } 1398 1399 return -EPROTO; 1400 } 1401 1402 /* setup for ISM connection of client */ 1403 static int smc_connect_ism(struct smc_sock *smc, 1404 struct smc_clc_msg_accept_confirm *aclc, 1405 struct smc_init_info *ini) 1406 { 1407 u8 *eid = NULL; 1408 int rc = 0; 1409 1410 ini->is_smcd = true; 1411 ini->first_contact_peer = aclc->hdr.typev2 & SMC_FIRST_CONTACT_MASK; 1412 1413 if (aclc->hdr.version == SMC_V2) { 1414 if (ini->first_contact_peer) { 1415 struct smc_clc_first_contact_ext *fce = 1416 smc_get_clc_first_contact_ext(aclc, true); 1417 1418 ini->release_nr = fce->release; 1419 rc = smc_clc_clnt_v2x_features_validate(fce, ini); 1420 if (rc) 1421 return rc; 1422 } 1423 1424 rc = smc_v2_determine_accepted_chid(aclc, ini); 1425 if (rc) 1426 return rc; 1427 1428 if (__smc_ism_is_emulated(ini->ism_chid[ini->ism_selected])) 1429 ini->ism_peer_gid[ini->ism_selected].gid_ext = 1430 ntohll(aclc->d1.gid_ext); 1431 /* for non-Emulated-ISM devices, peer gid_ext remains 0. */ 1432 } 1433 ini->ism_peer_gid[ini->ism_selected].gid = ntohll(aclc->d0.gid); 1434 1435 /* there is only one lgr role for SMC-D; use server lock */ 1436 mutex_lock(&smc_server_lgr_pending); 1437 rc = smc_conn_create(smc, ini); 1438 if (rc) { 1439 mutex_unlock(&smc_server_lgr_pending); 1440 return rc; 1441 } 1442 1443 /* Create send and receive buffers */ 1444 rc = smc_buf_create(smc, true); 1445 if (rc) { 1446 rc = (rc == -ENOSPC) ? SMC_CLC_DECL_MAX_DMB : SMC_CLC_DECL_MEM; 1447 goto connect_abort; 1448 } 1449 1450 smc_conn_save_peer_info(smc, aclc); 1451 1452 if (smc_ism_support_dmb_nocopy(smc->conn.lgr->smcd)) { 1453 rc = smcd_buf_attach(smc); 1454 if (rc) { 1455 rc = SMC_CLC_DECL_MEM; /* try to fallback */ 1456 goto connect_abort; 1457 } 1458 } 1459 smc_rx_init(smc); 1460 smc_tx_init(smc); 1461 1462 if (aclc->hdr.version > SMC_V1) 1463 eid = aclc->d1.eid; 1464 1465 rc = smc_clc_send_confirm(smc, ini->first_contact_local, 1466 aclc->hdr.version, eid, ini); 1467 if (rc) 1468 goto connect_abort; 1469 mutex_unlock(&smc_server_lgr_pending); 1470 1471 smc_copy_sock_settings_to_clc(smc); 1472 smc->connect_nonblock = 0; 1473 if (smc->sk.sk_state == SMC_INIT) 1474 smc->sk.sk_state = SMC_ACTIVE; 1475 1476 return 0; 1477 connect_abort: 1478 smc_conn_abort(smc, ini->first_contact_local); 1479 mutex_unlock(&smc_server_lgr_pending); 1480 smc->connect_nonblock = 0; 1481 1482 return rc; 1483 } 1484 1485 /* check if received accept type and version matches a proposed one */ 1486 static int smc_connect_check_aclc(struct smc_init_info *ini, 1487 struct smc_clc_msg_accept_confirm *aclc) 1488 { 1489 if (aclc->hdr.version >= SMC_V2) { 1490 if ((aclc->hdr.typev1 == SMC_TYPE_R && 1491 !smcr_indicated(ini->smc_type_v2)) || 1492 (aclc->hdr.typev1 == SMC_TYPE_D && 1493 !smcd_indicated(ini->smc_type_v2))) 1494 return SMC_CLC_DECL_MODEUNSUPP; 1495 } else { 1496 if ((aclc->hdr.typev1 == SMC_TYPE_R && 1497 !smcr_indicated(ini->smc_type_v1)) || 1498 (aclc->hdr.typev1 == SMC_TYPE_D && 1499 !smcd_indicated(ini->smc_type_v1))) 1500 return SMC_CLC_DECL_MODEUNSUPP; 1501 } 1502 1503 return 0; 1504 } 1505 1506 /* perform steps before actually connecting */ 1507 static int __smc_connect(struct smc_sock *smc) 1508 { 1509 u8 version = smc_ism_is_v2_capable() ? SMC_V2 : SMC_V1; 1510 struct smc_clc_msg_accept_confirm *aclc; 1511 struct smc_init_info *ini = NULL; 1512 u8 *buf = NULL; 1513 int rc = 0; 1514 1515 if (smc->use_fallback) 1516 return smc_connect_fallback(smc, smc->fallback_rsn); 1517 1518 /* if peer has not signalled SMC-capability, fall back */ 1519 if (!tcp_sk(smc->clcsock->sk)->syn_smc) 1520 return smc_connect_fallback(smc, SMC_CLC_DECL_PEERNOSMC); 1521 1522 /* IPSec connections opt out of SMC optimizations */ 1523 if (using_ipsec(smc)) 1524 return smc_connect_decline_fallback(smc, SMC_CLC_DECL_IPSEC, 1525 version); 1526 1527 ini = kzalloc_obj(*ini); 1528 if (!ini) 1529 return smc_connect_decline_fallback(smc, SMC_CLC_DECL_MEM, 1530 version); 1531 1532 ini->smcd_version = SMC_V1 | SMC_V2; 1533 ini->smcr_version = SMC_V1 | SMC_V2; 1534 ini->smc_type_v1 = SMC_TYPE_B; 1535 ini->smc_type_v2 = SMC_TYPE_B; 1536 1537 /* get vlan id from IP device */ 1538 if (smc_vlan_by_tcpsk(smc->clcsock, ini)) { 1539 ini->smcd_version &= ~SMC_V1; 1540 ini->smcr_version = 0; 1541 ini->smc_type_v1 = SMC_TYPE_N; 1542 } 1543 1544 rc = smc_find_proposal_devices(smc, ini); 1545 if (rc) 1546 goto fallback; 1547 1548 buf = kzalloc(SMC_CLC_MAX_ACCEPT_LEN, GFP_KERNEL); 1549 if (!buf) { 1550 rc = SMC_CLC_DECL_MEM; 1551 goto fallback; 1552 } 1553 aclc = (struct smc_clc_msg_accept_confirm *)buf; 1554 1555 /* perform CLC handshake */ 1556 rc = smc_connect_clc(smc, aclc, ini); 1557 if (rc) { 1558 /* -EAGAIN on timeout, see tcp_recvmsg() */ 1559 if (rc == -EAGAIN) { 1560 rc = -ETIMEDOUT; 1561 smc->sk.sk_err = ETIMEDOUT; 1562 } 1563 goto vlan_cleanup; 1564 } 1565 1566 /* check if smc modes and versions of CLC proposal and accept match */ 1567 rc = smc_connect_check_aclc(ini, aclc); 1568 version = aclc->hdr.version == SMC_V1 ? SMC_V1 : SMC_V2; 1569 if (rc) 1570 goto vlan_cleanup; 1571 1572 /* depending on previous steps, connect using rdma or ism */ 1573 if (aclc->hdr.typev1 == SMC_TYPE_R) { 1574 ini->smcr_version = version; 1575 rc = smc_connect_rdma(smc, aclc, ini); 1576 } else if (aclc->hdr.typev1 == SMC_TYPE_D) { 1577 ini->smcd_version = version; 1578 rc = smc_connect_ism(smc, aclc, ini); 1579 } 1580 if (rc) 1581 goto vlan_cleanup; 1582 1583 SMC_STAT_CLNT_SUCC_INC(sock_net(smc->clcsock->sk), aclc); 1584 smc_connect_ism_vlan_cleanup(ini); 1585 kfree(buf); 1586 kfree(ini); 1587 return 0; 1588 1589 vlan_cleanup: 1590 smc_connect_ism_vlan_cleanup(ini); 1591 kfree(buf); 1592 fallback: 1593 kfree(ini); 1594 return smc_connect_decline_fallback(smc, rc, version); 1595 } 1596 1597 static void smc_connect_work(struct work_struct *work) 1598 { 1599 struct smc_sock *smc = container_of(work, struct smc_sock, 1600 connect_work); 1601 long timeo = READ_ONCE(smc->sk.sk_sndtimeo); 1602 int rc = 0; 1603 1604 if (!timeo) 1605 timeo = MAX_SCHEDULE_TIMEOUT; 1606 lock_sock(smc->clcsock->sk); 1607 if (smc->clcsock->sk->sk_err) { 1608 smc->sk.sk_err = smc->clcsock->sk->sk_err; 1609 } else if ((1 << smc->clcsock->sk->sk_state) & 1610 (TCPF_SYN_SENT | TCPF_SYN_RECV)) { 1611 rc = sk_stream_wait_connect(smc->clcsock->sk, &timeo); 1612 if ((rc == -EPIPE) && 1613 ((1 << smc->clcsock->sk->sk_state) & 1614 (TCPF_ESTABLISHED | TCPF_CLOSE_WAIT))) 1615 rc = 0; 1616 } 1617 release_sock(smc->clcsock->sk); 1618 lock_sock(&smc->sk); 1619 if (rc != 0 || smc->sk.sk_err) { 1620 smc->sk.sk_state = SMC_CLOSED; 1621 if (rc == -EPIPE || rc == -EAGAIN) 1622 smc->sk.sk_err = EPIPE; 1623 else if (rc == -ECONNREFUSED) 1624 smc->sk.sk_err = ECONNREFUSED; 1625 else if (signal_pending(current)) 1626 smc->sk.sk_err = -sock_intr_errno(timeo); 1627 sock_put(&smc->sk); /* passive closing */ 1628 goto out; 1629 } 1630 1631 rc = __smc_connect(smc); 1632 if (rc < 0) 1633 smc->sk.sk_err = -rc; 1634 1635 out: 1636 if (!sock_flag(&smc->sk, SOCK_DEAD)) { 1637 if (smc->sk.sk_err) { 1638 smc->sk.sk_state_change(&smc->sk); 1639 } else { /* allow polling before and after fallback decision */ 1640 smc->clcsock->sk->sk_write_space(smc->clcsock->sk); 1641 smc->sk.sk_write_space(&smc->sk); 1642 } 1643 } 1644 release_sock(&smc->sk); 1645 } 1646 1647 int smc_connect(struct socket *sock, struct sockaddr_unsized *addr, 1648 int alen, int flags) 1649 { 1650 struct sock *sk = sock->sk; 1651 struct smc_sock *smc; 1652 int rc = -EINVAL; 1653 1654 smc = smc_sk(sk); 1655 1656 /* separate smc parameter checking to be safe */ 1657 if (alen < sizeof(addr->sa_family)) 1658 goto out_err; 1659 if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6) 1660 goto out_err; 1661 1662 lock_sock(sk); 1663 switch (sock->state) { 1664 default: 1665 rc = -EINVAL; 1666 goto out; 1667 case SS_CONNECTED: 1668 rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL; 1669 goto out; 1670 case SS_CONNECTING: 1671 if (sk->sk_state == SMC_ACTIVE) 1672 goto connected; 1673 break; 1674 case SS_UNCONNECTED: 1675 sock->state = SS_CONNECTING; 1676 break; 1677 } 1678 1679 switch (sk->sk_state) { 1680 default: 1681 goto out; 1682 case SMC_CLOSED: 1683 rc = sock_error(sk) ? : -ECONNABORTED; 1684 sock->state = SS_UNCONNECTED; 1685 goto out; 1686 case SMC_ACTIVE: 1687 rc = -EISCONN; 1688 goto out; 1689 case SMC_INIT: 1690 break; 1691 } 1692 1693 smc_copy_sock_settings_to_clc(smc); 1694 tcp_sk(smc->clcsock->sk)->syn_smc = 1; 1695 if (smc->connect_nonblock) { 1696 rc = -EALREADY; 1697 goto out; 1698 } 1699 rc = kernel_connect(smc->clcsock, (struct sockaddr_unsized *)addr, alen, flags); 1700 if (rc && rc != -EINPROGRESS) 1701 goto out; 1702 1703 if (smc->use_fallback) { 1704 sock->state = rc ? SS_CONNECTING : SS_CONNECTED; 1705 goto out; 1706 } 1707 sock_hold(&smc->sk); /* sock put in passive closing */ 1708 if (flags & O_NONBLOCK) { 1709 if (queue_work(smc_hs_wq, &smc->connect_work)) 1710 smc->connect_nonblock = 1; 1711 rc = -EINPROGRESS; 1712 goto out; 1713 } else { 1714 rc = __smc_connect(smc); 1715 if (rc < 0) 1716 goto out; 1717 } 1718 1719 connected: 1720 rc = 0; 1721 sock->state = SS_CONNECTED; 1722 out: 1723 release_sock(sk); 1724 out_err: 1725 return rc; 1726 } 1727 1728 static int smc_clcsock_accept(struct smc_sock *lsmc, struct smc_sock **new_smc) 1729 { 1730 struct socket *new_clcsock = NULL; 1731 struct sock *lsk = &lsmc->sk; 1732 struct sock *new_sk; 1733 int rc = -EINVAL; 1734 1735 release_sock(lsk); 1736 new_sk = smc_sock_alloc(sock_net(lsk), NULL, lsk->sk_protocol); 1737 if (!new_sk) { 1738 rc = -ENOMEM; 1739 lsk->sk_err = ENOMEM; 1740 *new_smc = NULL; 1741 lock_sock(lsk); 1742 goto out; 1743 } 1744 *new_smc = smc_sk(new_sk); 1745 1746 mutex_lock(&lsmc->clcsock_release_lock); 1747 if (lsmc->clcsock) 1748 rc = kernel_accept(lsmc->clcsock, &new_clcsock, SOCK_NONBLOCK); 1749 mutex_unlock(&lsmc->clcsock_release_lock); 1750 lock_sock(lsk); 1751 if (rc < 0 && rc != -EAGAIN) 1752 lsk->sk_err = -rc; 1753 if (rc < 0 || lsk->sk_state == SMC_CLOSED) { 1754 new_sk->sk_prot->unhash(new_sk); 1755 if (new_clcsock) 1756 sock_release(new_clcsock); 1757 new_sk->sk_state = SMC_CLOSED; 1758 smc_sock_set_flag(new_sk, SOCK_DEAD); 1759 sock_put(new_sk); /* final */ 1760 *new_smc = NULL; 1761 goto out; 1762 } 1763 1764 /* new clcsock has inherited the smc listen-specific sk_data_ready 1765 * function; switch it back to the original sk_data_ready function 1766 */ 1767 new_clcsock->sk->sk_data_ready = lsmc->clcsk_data_ready; 1768 1769 /* if new clcsock has also inherited the fallback-specific callback 1770 * functions, switch them back to the original ones. 1771 */ 1772 if (lsmc->use_fallback) { 1773 if (lsmc->clcsk_state_change) 1774 new_clcsock->sk->sk_state_change = lsmc->clcsk_state_change; 1775 if (lsmc->clcsk_write_space) 1776 new_clcsock->sk->sk_write_space = lsmc->clcsk_write_space; 1777 if (lsmc->clcsk_error_report) 1778 new_clcsock->sk->sk_error_report = lsmc->clcsk_error_report; 1779 } 1780 1781 (*new_smc)->clcsock = new_clcsock; 1782 out: 1783 return rc; 1784 } 1785 1786 /* add a just created sock to the accept queue of the listen sock as 1787 * candidate for a following socket accept call from user space 1788 */ 1789 static void smc_accept_enqueue(struct sock *parent, struct sock *sk) 1790 { 1791 struct smc_sock *par = smc_sk(parent); 1792 1793 sock_hold(sk); /* sock_put in smc_accept_unlink () */ 1794 spin_lock(&par->accept_q_lock); 1795 list_add_tail(&smc_sk(sk)->accept_q, &par->accept_q); 1796 spin_unlock(&par->accept_q_lock); 1797 sk_acceptq_added(parent); 1798 } 1799 1800 /* remove a socket from the accept queue of its parental listening socket */ 1801 static void smc_accept_unlink(struct sock *sk) 1802 { 1803 struct smc_sock *par = smc_sk(sk)->listen_smc; 1804 1805 spin_lock(&par->accept_q_lock); 1806 list_del_init(&smc_sk(sk)->accept_q); 1807 spin_unlock(&par->accept_q_lock); 1808 sk_acceptq_removed(&smc_sk(sk)->listen_smc->sk); 1809 sock_put(sk); /* sock_hold in smc_accept_enqueue */ 1810 } 1811 1812 /* remove a sock from the accept queue to bind it to a new socket created 1813 * for a socket accept call from user space 1814 */ 1815 struct sock *smc_accept_dequeue(struct sock *parent, 1816 struct socket *new_sock) 1817 { 1818 struct smc_sock *isk, *n; 1819 struct sock *new_sk; 1820 1821 list_for_each_entry_safe(isk, n, &smc_sk(parent)->accept_q, accept_q) { 1822 new_sk = (struct sock *)isk; 1823 1824 smc_accept_unlink(new_sk); 1825 if (new_sk->sk_state == SMC_CLOSED) { 1826 new_sk->sk_prot->unhash(new_sk); 1827 if (isk->clcsock) { 1828 sock_release(isk->clcsock); 1829 isk->clcsock = NULL; 1830 } 1831 sock_put(new_sk); /* final */ 1832 continue; 1833 } 1834 if (new_sock) { 1835 sock_graft(new_sk, new_sock); 1836 new_sock->state = SS_CONNECTED; 1837 if (isk->use_fallback) { 1838 smc_sk(new_sk)->clcsock->file = new_sock->file; 1839 isk->clcsock->file->private_data = isk->clcsock; 1840 } 1841 } 1842 return new_sk; 1843 } 1844 return NULL; 1845 } 1846 1847 /* clean up for a created but never accepted sock */ 1848 void smc_close_non_accepted(struct sock *sk) 1849 { 1850 struct smc_sock *smc = smc_sk(sk); 1851 1852 sock_hold(sk); /* sock_put below */ 1853 lock_sock(sk); 1854 if (!sk->sk_lingertime) 1855 /* wait for peer closing */ 1856 WRITE_ONCE(sk->sk_lingertime, SMC_MAX_STREAM_WAIT_TIMEOUT); 1857 __smc_release(smc); 1858 release_sock(sk); 1859 sock_put(sk); /* sock_hold above */ 1860 sock_put(sk); /* final sock_put */ 1861 } 1862 1863 static int smcr_serv_conf_first_link(struct smc_sock *smc) 1864 { 1865 struct smc_link *link = smc->conn.lnk; 1866 struct smc_llc_qentry *qentry; 1867 int rc; 1868 1869 /* reg the sndbuf if it was vzalloced*/ 1870 if (smc->conn.sndbuf_desc->is_vm) { 1871 if (smcr_link_reg_buf(link, smc->conn.sndbuf_desc)) 1872 return SMC_CLC_DECL_ERR_REGBUF; 1873 } 1874 1875 /* reg the rmb */ 1876 if (smcr_link_reg_buf(link, smc->conn.rmb_desc)) 1877 return SMC_CLC_DECL_ERR_REGBUF; 1878 1879 /* send CONFIRM LINK request to client over the RoCE fabric */ 1880 rc = smc_llc_send_confirm_link(link, SMC_LLC_REQ); 1881 if (rc < 0) 1882 return SMC_CLC_DECL_TIMEOUT_CL; 1883 1884 /* receive CONFIRM LINK response from client over the RoCE fabric */ 1885 qentry = smc_llc_wait(link->lgr, link, SMC_LLC_WAIT_TIME, 1886 SMC_LLC_CONFIRM_LINK); 1887 if (!qentry) { 1888 struct smc_clc_msg_decline dclc; 1889 1890 rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc), 1891 SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT); 1892 return rc == -EAGAIN ? SMC_CLC_DECL_TIMEOUT_CL : rc; 1893 } 1894 smc_llc_save_peer_uid(qentry); 1895 rc = smc_llc_eval_conf_link(qentry, SMC_LLC_RESP); 1896 smc_llc_flow_qentry_del(&link->lgr->llc_flow_lcl); 1897 if (rc) 1898 return SMC_CLC_DECL_RMBE_EC; 1899 1900 /* confirm_rkey is implicit on 1st contact */ 1901 smc->conn.rmb_desc->is_conf_rkey = true; 1902 1903 smc_llc_link_active(link); 1904 smcr_lgr_set_type(link->lgr, SMC_LGR_SINGLE); 1905 1906 if (link->lgr->max_links > 1) { 1907 down_write(&link->lgr->llc_conf_mutex); 1908 /* initial contact - try to establish second link */ 1909 smc_llc_srv_add_link(link, NULL); 1910 up_write(&link->lgr->llc_conf_mutex); 1911 } 1912 return 0; 1913 } 1914 1915 /* listen worker: finish */ 1916 static void smc_listen_out(struct smc_sock *new_smc) 1917 { 1918 struct smc_sock *lsmc = new_smc->listen_smc; 1919 struct sock *newsmcsk = &new_smc->sk; 1920 1921 if (tcp_sk(new_smc->clcsock->sk)->syn_smc) 1922 atomic_dec(&lsmc->queued_smc_hs); 1923 1924 release_sock(newsmcsk); /* lock in smc_listen_work() */ 1925 if (lsmc->sk.sk_state == SMC_LISTEN) { 1926 lock_sock_nested(&lsmc->sk, SINGLE_DEPTH_NESTING); 1927 smc_accept_enqueue(&lsmc->sk, newsmcsk); 1928 release_sock(&lsmc->sk); 1929 } else { /* no longer listening */ 1930 smc_close_non_accepted(newsmcsk); 1931 } 1932 1933 /* Wake up accept */ 1934 lsmc->sk.sk_data_ready(&lsmc->sk); 1935 sock_put(&lsmc->sk); /* sock_hold in smc_tcp_listen_work */ 1936 } 1937 1938 /* listen worker: finish in state connected */ 1939 static void smc_listen_out_connected(struct smc_sock *new_smc) 1940 { 1941 struct sock *newsmcsk = &new_smc->sk; 1942 1943 if (newsmcsk->sk_state == SMC_INIT) 1944 newsmcsk->sk_state = SMC_ACTIVE; 1945 1946 smc_listen_out(new_smc); 1947 } 1948 1949 /* listen worker: finish in error state */ 1950 static void smc_listen_out_err(struct smc_sock *new_smc) 1951 { 1952 struct sock *newsmcsk = &new_smc->sk; 1953 struct net *net = sock_net(newsmcsk); 1954 1955 this_cpu_inc(net->smc.smc_stats->srv_hshake_err_cnt); 1956 if (newsmcsk->sk_state == SMC_INIT) 1957 sock_put(&new_smc->sk); /* passive closing */ 1958 newsmcsk->sk_state = SMC_CLOSED; 1959 1960 smc_listen_out(new_smc); 1961 } 1962 1963 /* listen worker: decline and fall back if possible */ 1964 static void smc_listen_decline(struct smc_sock *new_smc, int reason_code, 1965 int local_first, u8 version) 1966 { 1967 /* RDMA setup failed, switch back to TCP */ 1968 smc_conn_abort(new_smc, local_first); 1969 if (reason_code < 0 || 1970 smc_switch_to_fallback(new_smc, reason_code)) { 1971 /* error, no fallback possible */ 1972 smc_listen_out_err(new_smc); 1973 return; 1974 } 1975 if (reason_code && reason_code != SMC_CLC_DECL_PEERDECL) { 1976 if (smc_clc_send_decline(new_smc, reason_code, version) < 0) { 1977 smc_listen_out_err(new_smc); 1978 return; 1979 } 1980 } 1981 smc_listen_out_connected(new_smc); 1982 } 1983 1984 /* listen worker: version checking */ 1985 static int smc_listen_v2_check(struct smc_sock *new_smc, 1986 struct smc_clc_msg_proposal *pclc, 1987 struct smc_init_info *ini) 1988 { 1989 struct smc_clc_smcd_v2_extension *pclc_smcd_v2_ext; 1990 struct smc_clc_v2_extension *pclc_v2_ext; 1991 int rc = SMC_CLC_DECL_PEERNOSMC; 1992 1993 ini->smc_type_v1 = pclc->hdr.typev1; 1994 ini->smc_type_v2 = pclc->hdr.typev2; 1995 ini->smcd_version = smcd_indicated(ini->smc_type_v1) ? SMC_V1 : 0; 1996 ini->smcr_version = smcr_indicated(ini->smc_type_v1) ? SMC_V1 : 0; 1997 if (pclc->hdr.version > SMC_V1) { 1998 if (smcd_indicated(ini->smc_type_v2)) 1999 ini->smcd_version |= SMC_V2; 2000 if (smcr_indicated(ini->smc_type_v2)) 2001 ini->smcr_version |= SMC_V2; 2002 } 2003 if (!(ini->smcd_version & SMC_V2) && !(ini->smcr_version & SMC_V2)) { 2004 rc = SMC_CLC_DECL_PEERNOSMC; 2005 goto out; 2006 } 2007 pclc_v2_ext = smc_get_clc_v2_ext(pclc); 2008 if (!pclc_v2_ext) { 2009 ini->smcd_version &= ~SMC_V2; 2010 ini->smcr_version &= ~SMC_V2; 2011 rc = SMC_CLC_DECL_NOV2EXT; 2012 goto out; 2013 } 2014 pclc_smcd_v2_ext = smc_get_clc_smcd_v2_ext(pclc_v2_ext); 2015 if (ini->smcd_version & SMC_V2) { 2016 if (!smc_ism_is_v2_capable()) { 2017 ini->smcd_version &= ~SMC_V2; 2018 rc = SMC_CLC_DECL_NOISM2SUPP; 2019 } else if (!pclc_smcd_v2_ext) { 2020 ini->smcd_version &= ~SMC_V2; 2021 rc = SMC_CLC_DECL_NOV2DEXT; 2022 } else if (!pclc_v2_ext->hdr.eid_cnt && 2023 !pclc_v2_ext->hdr.flag.seid) { 2024 ini->smcd_version &= ~SMC_V2; 2025 rc = SMC_CLC_DECL_NOUEID; 2026 } 2027 } 2028 if (ini->smcr_version & SMC_V2) { 2029 if (!pclc_v2_ext->hdr.eid_cnt) { 2030 ini->smcr_version &= ~SMC_V2; 2031 rc = SMC_CLC_DECL_NOUEID; 2032 } 2033 } 2034 2035 ini->release_nr = pclc_v2_ext->hdr.flag.release; 2036 if (pclc_v2_ext->hdr.flag.release > SMC_RELEASE) 2037 ini->release_nr = SMC_RELEASE; 2038 2039 out: 2040 if (!ini->smcd_version && !ini->smcr_version) 2041 return rc; 2042 2043 return 0; 2044 } 2045 2046 /* listen worker: check prefixes */ 2047 static int smc_listen_prfx_check(struct smc_sock *new_smc, 2048 struct smc_clc_msg_proposal *pclc) 2049 { 2050 struct smc_clc_msg_proposal_prefix *pclc_prfx; 2051 struct socket *newclcsock = new_smc->clcsock; 2052 2053 if (pclc->hdr.typev1 == SMC_TYPE_N) 2054 return 0; 2055 pclc_prfx = smc_clc_proposal_get_prefix(pclc); 2056 if (!pclc_prfx) 2057 return -EPROTO; 2058 if (smc_clc_prfx_match(newclcsock, pclc_prfx)) 2059 return SMC_CLC_DECL_DIFFPREFIX; 2060 2061 return 0; 2062 } 2063 2064 /* listen worker: initialize connection and buffers */ 2065 static int smc_listen_rdma_init(struct smc_sock *new_smc, 2066 struct smc_init_info *ini) 2067 { 2068 int rc; 2069 2070 /* allocate connection / link group */ 2071 rc = smc_conn_create(new_smc, ini); 2072 if (rc) 2073 return rc; 2074 2075 /* create send buffer and rmb */ 2076 if (smc_buf_create(new_smc, false)) { 2077 smc_conn_abort(new_smc, ini->first_contact_local); 2078 return SMC_CLC_DECL_MEM; 2079 } 2080 2081 return 0; 2082 } 2083 2084 /* listen worker: initialize connection and buffers for SMC-D */ 2085 static int smc_listen_ism_init(struct smc_sock *new_smc, 2086 struct smc_init_info *ini) 2087 { 2088 int rc; 2089 2090 rc = smc_conn_create(new_smc, ini); 2091 if (rc) 2092 return rc; 2093 2094 /* Create send and receive buffers */ 2095 rc = smc_buf_create(new_smc, true); 2096 if (rc) { 2097 smc_conn_abort(new_smc, ini->first_contact_local); 2098 return (rc == -ENOSPC) ? SMC_CLC_DECL_MAX_DMB : 2099 SMC_CLC_DECL_MEM; 2100 } 2101 2102 return 0; 2103 } 2104 2105 static bool smc_is_already_selected(struct smcd_dev *smcd, 2106 struct smc_init_info *ini, 2107 int matches) 2108 { 2109 int i; 2110 2111 for (i = 0; i < matches; i++) 2112 if (smcd == ini->ism_dev[i]) 2113 return true; 2114 2115 return false; 2116 } 2117 2118 /* check for ISM devices matching proposed ISM devices */ 2119 static void smc_check_ism_v2_match(struct smc_init_info *ini, 2120 u16 proposed_chid, 2121 struct smcd_gid *proposed_gid, 2122 unsigned int *matches) 2123 { 2124 struct smcd_dev *smcd; 2125 2126 list_for_each_entry(smcd, &smcd_dev_list.list, list) { 2127 if (smcd->going_away) 2128 continue; 2129 if (smc_is_already_selected(smcd, ini, *matches)) 2130 continue; 2131 if (smc_ism_get_chid(smcd) == proposed_chid && 2132 !smc_ism_cantalk(proposed_gid, ISM_RESERVED_VLANID, smcd)) { 2133 ini->ism_peer_gid[*matches].gid = proposed_gid->gid; 2134 if (__smc_ism_is_emulated(proposed_chid)) 2135 ini->ism_peer_gid[*matches].gid_ext = 2136 proposed_gid->gid_ext; 2137 /* non-Emulated-ISM's peer gid_ext remains 0. */ 2138 ini->ism_dev[*matches] = smcd; 2139 (*matches)++; 2140 break; 2141 } 2142 } 2143 } 2144 2145 static void smc_init_info_store_rc(u32 rc, struct smc_init_info *ini) 2146 { 2147 if (!ini->rc) 2148 ini->rc = rc; 2149 } 2150 2151 static void smc_find_ism_v2_device_serv(struct smc_sock *new_smc, 2152 struct smc_clc_msg_proposal *pclc, 2153 struct smc_init_info *ini) 2154 { 2155 struct smc_clc_smcd_v2_extension *smcd_v2_ext; 2156 struct smc_clc_v2_extension *smc_v2_ext; 2157 struct smc_clc_msg_smcd *pclc_smcd; 2158 unsigned int matches = 0; 2159 struct smcd_gid smcd_gid; 2160 u8 smcd_version; 2161 u8 *eid = NULL; 2162 int i, rc; 2163 u16 chid; 2164 2165 if (!(ini->smcd_version & SMC_V2) || !smcd_indicated(ini->smc_type_v2)) 2166 goto not_found; 2167 2168 pclc_smcd = smc_get_clc_msg_smcd(pclc); 2169 smc_v2_ext = smc_get_clc_v2_ext(pclc); 2170 smcd_v2_ext = smc_get_clc_smcd_v2_ext(smc_v2_ext); 2171 if (!pclc_smcd || !smc_v2_ext || !smcd_v2_ext) 2172 goto not_found; 2173 2174 mutex_lock(&smcd_dev_list.mutex); 2175 if (pclc_smcd->ism.chid) { 2176 /* check for ISM device matching proposed native ISM device */ 2177 smcd_gid.gid = ntohll(pclc_smcd->ism.gid); 2178 smcd_gid.gid_ext = 0; 2179 smc_check_ism_v2_match(ini, ntohs(pclc_smcd->ism.chid), 2180 &smcd_gid, &matches); 2181 } 2182 for (i = 0; i < smc_v2_ext->hdr.ism_gid_cnt; i++) { 2183 /* check for ISM devices matching proposed non-native ISM 2184 * devices 2185 */ 2186 smcd_gid.gid = ntohll(smcd_v2_ext->gidchid[i].gid); 2187 smcd_gid.gid_ext = 0; 2188 chid = ntohs(smcd_v2_ext->gidchid[i].chid); 2189 if (__smc_ism_is_emulated(chid)) { 2190 if ((i + 1) == smc_v2_ext->hdr.ism_gid_cnt || 2191 chid != ntohs(smcd_v2_ext->gidchid[i + 1].chid)) 2192 /* each Emulated-ISM device takes two GID-CHID 2193 * entries and CHID of the second entry repeats 2194 * that of the first entry. 2195 * 2196 * So check if the next GID-CHID entry exists 2197 * and both two entries' CHIDs are the same. 2198 */ 2199 continue; 2200 smcd_gid.gid_ext = 2201 ntohll(smcd_v2_ext->gidchid[++i].gid); 2202 } 2203 smc_check_ism_v2_match(ini, chid, &smcd_gid, &matches); 2204 } 2205 mutex_unlock(&smcd_dev_list.mutex); 2206 2207 if (!ini->ism_dev[0]) { 2208 smc_init_info_store_rc(SMC_CLC_DECL_NOSMCD2DEV, ini); 2209 goto not_found; 2210 } 2211 2212 smc_ism_get_system_eid(&eid); 2213 if (!smc_clc_match_eid(ini->negotiated_eid, smc_v2_ext, 2214 smcd_v2_ext->system_eid, eid)) 2215 goto not_found; 2216 2217 /* separate - outside the smcd_dev_list.lock */ 2218 smcd_version = ini->smcd_version; 2219 for (i = 0; i < matches; i++) { 2220 ini->smcd_version = SMC_V2; 2221 ini->is_smcd = true; 2222 ini->ism_selected = i; 2223 rc = smc_listen_ism_init(new_smc, ini); 2224 if (rc) { 2225 smc_init_info_store_rc(rc, ini); 2226 /* try next active ISM device */ 2227 continue; 2228 } 2229 return; /* matching and usable V2 ISM device found */ 2230 } 2231 /* no V2 ISM device could be initialized */ 2232 ini->smcd_version = smcd_version; /* restore original value */ 2233 ini->negotiated_eid[0] = 0; 2234 2235 not_found: 2236 ini->smcd_version &= ~SMC_V2; 2237 ini->ism_dev[0] = NULL; 2238 ini->is_smcd = false; 2239 } 2240 2241 static void smc_find_ism_v1_device_serv(struct smc_sock *new_smc, 2242 struct smc_clc_msg_proposal *pclc, 2243 struct smc_init_info *ini) 2244 { 2245 struct smc_clc_msg_smcd *pclc_smcd = smc_get_clc_msg_smcd(pclc); 2246 int rc = 0; 2247 2248 /* check if ISM V1 is available */ 2249 if (!(ini->smcd_version & SMC_V1) || 2250 !smcd_indicated(ini->smc_type_v1) || 2251 !pclc_smcd) 2252 goto not_found; 2253 ini->is_smcd = true; /* prepare ISM check */ 2254 ini->ism_peer_gid[0].gid = ntohll(pclc_smcd->ism.gid); 2255 ini->ism_peer_gid[0].gid_ext = 0; 2256 rc = smc_find_ism_device(new_smc, ini); 2257 if (rc) 2258 goto not_found; 2259 ini->ism_selected = 0; 2260 rc = smc_listen_ism_init(new_smc, ini); 2261 if (!rc) 2262 return; /* V1 ISM device found */ 2263 2264 not_found: 2265 smc_init_info_store_rc(rc, ini); 2266 ini->smcd_version &= ~SMC_V1; 2267 ini->ism_dev[0] = NULL; 2268 ini->is_smcd = false; 2269 } 2270 2271 /* listen worker: register buffers */ 2272 static int smc_listen_rdma_reg(struct smc_sock *new_smc, bool local_first) 2273 { 2274 struct smc_connection *conn = &new_smc->conn; 2275 2276 if (!local_first) { 2277 /* reg sendbufs if they were vzalloced */ 2278 if (conn->sndbuf_desc->is_vm) { 2279 if (smcr_lgr_reg_sndbufs(conn->lnk, 2280 conn->sndbuf_desc)) 2281 return SMC_CLC_DECL_ERR_REGBUF; 2282 } 2283 if (smcr_lgr_reg_rmbs(conn->lnk, conn->rmb_desc)) 2284 return SMC_CLC_DECL_ERR_REGBUF; 2285 } 2286 2287 return 0; 2288 } 2289 2290 static void smc_find_rdma_v2_device_serv(struct smc_sock *new_smc, 2291 struct smc_clc_msg_proposal *pclc, 2292 struct smc_init_info *ini) 2293 { 2294 struct smc_clc_v2_extension *smc_v2_ext; 2295 u8 smcr_version; 2296 int rc; 2297 2298 if (!(ini->smcr_version & SMC_V2) || !smcr_indicated(ini->smc_type_v2)) 2299 goto not_found; 2300 2301 smc_v2_ext = smc_get_clc_v2_ext(pclc); 2302 if (!smc_v2_ext || 2303 !smc_clc_match_eid(ini->negotiated_eid, smc_v2_ext, NULL, NULL)) 2304 goto not_found; 2305 2306 /* prepare RDMA check */ 2307 memcpy(ini->peer_systemid, pclc->lcl.id_for_peer, SMC_SYSTEMID_LEN); 2308 memcpy(ini->peer_gid, smc_v2_ext->roce, SMC_GID_SIZE); 2309 memcpy(ini->peer_mac, pclc->lcl.mac, ETH_ALEN); 2310 ini->check_smcrv2 = true; 2311 ini->smcrv2.clc_sk = new_smc->clcsock->sk; 2312 ini->smcrv2.saddr = new_smc->clcsock->sk->sk_rcv_saddr; 2313 ini->smcrv2.daddr = smc_ib_gid_to_ipv4(smc_v2_ext->roce); 2314 rc = smc_find_rdma_device(new_smc, ini); 2315 if (rc) { 2316 smc_init_info_store_rc(rc, ini); 2317 goto not_found; 2318 } 2319 if (!ini->smcrv2.uses_gateway) 2320 memcpy(ini->smcrv2.nexthop_mac, pclc->lcl.mac, ETH_ALEN); 2321 2322 smcr_version = ini->smcr_version; 2323 ini->smcr_version = SMC_V2; 2324 rc = smc_listen_rdma_init(new_smc, ini); 2325 if (!rc) { 2326 rc = smc_listen_rdma_reg(new_smc, ini->first_contact_local); 2327 if (rc) 2328 smc_conn_abort(new_smc, ini->first_contact_local); 2329 } 2330 if (!rc) 2331 return; 2332 ini->smcr_version = smcr_version; 2333 smc_init_info_store_rc(rc, ini); 2334 2335 not_found: 2336 ini->smcr_version &= ~SMC_V2; 2337 ini->smcrv2.ib_dev_v2 = NULL; 2338 ini->check_smcrv2 = false; 2339 } 2340 2341 static int smc_find_rdma_v1_device_serv(struct smc_sock *new_smc, 2342 struct smc_clc_msg_proposal *pclc, 2343 struct smc_init_info *ini) 2344 { 2345 int rc; 2346 2347 if (!(ini->smcr_version & SMC_V1) || !smcr_indicated(ini->smc_type_v1)) 2348 return SMC_CLC_DECL_NOSMCDEV; 2349 2350 /* prepare RDMA check */ 2351 memcpy(ini->peer_systemid, pclc->lcl.id_for_peer, SMC_SYSTEMID_LEN); 2352 memcpy(ini->peer_gid, pclc->lcl.gid, SMC_GID_SIZE); 2353 memcpy(ini->peer_mac, pclc->lcl.mac, ETH_ALEN); 2354 rc = smc_find_rdma_device(new_smc, ini); 2355 if (rc) { 2356 /* no RDMA device found */ 2357 return SMC_CLC_DECL_NOSMCDEV; 2358 } 2359 rc = smc_listen_rdma_init(new_smc, ini); 2360 if (rc) 2361 return rc; 2362 return smc_listen_rdma_reg(new_smc, ini->first_contact_local); 2363 } 2364 2365 /* determine the local device matching to proposal */ 2366 static int smc_listen_find_device(struct smc_sock *new_smc, 2367 struct smc_clc_msg_proposal *pclc, 2368 struct smc_init_info *ini) 2369 { 2370 int prfx_rc; 2371 2372 /* check for ISM device matching V2 proposed device */ 2373 smc_find_ism_v2_device_serv(new_smc, pclc, ini); 2374 if (ini->ism_dev[0]) 2375 return 0; 2376 2377 /* check for matching IP prefix and subnet length (V1) */ 2378 prfx_rc = smc_listen_prfx_check(new_smc, pclc); 2379 if (prfx_rc) 2380 smc_init_info_store_rc(prfx_rc, ini); 2381 2382 /* get vlan id from IP device */ 2383 if (smc_vlan_by_tcpsk(new_smc->clcsock, ini)) 2384 return ini->rc ?: SMC_CLC_DECL_GETVLANERR; 2385 2386 /* check for ISM device matching V1 proposed device */ 2387 if (!prfx_rc) 2388 smc_find_ism_v1_device_serv(new_smc, pclc, ini); 2389 if (ini->ism_dev[0]) 2390 return 0; 2391 2392 if (!smcr_indicated(pclc->hdr.typev1) && 2393 !smcr_indicated(pclc->hdr.typev2)) 2394 /* skip RDMA and decline */ 2395 return ini->rc ?: SMC_CLC_DECL_NOSMCDDEV; 2396 2397 /* check if RDMA V2 is available */ 2398 smc_find_rdma_v2_device_serv(new_smc, pclc, ini); 2399 if (ini->smcrv2.ib_dev_v2) 2400 return 0; 2401 2402 /* check if RDMA V1 is available */ 2403 if (!prfx_rc) { 2404 int rc; 2405 2406 rc = smc_find_rdma_v1_device_serv(new_smc, pclc, ini); 2407 smc_init_info_store_rc(rc, ini); 2408 return (!rc) ? 0 : ini->rc; 2409 } 2410 return prfx_rc; 2411 } 2412 2413 /* listen worker: finish RDMA setup */ 2414 static int smc_listen_rdma_finish(struct smc_sock *new_smc, 2415 struct smc_clc_msg_accept_confirm *cclc, 2416 bool local_first, 2417 struct smc_init_info *ini) 2418 { 2419 struct smc_link *link = new_smc->conn.lnk; 2420 int reason_code = 0; 2421 2422 if (local_first) 2423 smc_link_save_peer_info(link, cclc, ini); 2424 2425 if (smc_rmb_rtoken_handling(&new_smc->conn, link, cclc)) 2426 return SMC_CLC_DECL_ERR_RTOK; 2427 2428 if (local_first) { 2429 if (smc_ib_ready_link(link)) 2430 return SMC_CLC_DECL_ERR_RDYLNK; 2431 /* QP confirmation over RoCE fabric */ 2432 smc_llc_flow_initiate(link->lgr, SMC_LLC_FLOW_ADD_LINK); 2433 reason_code = smcr_serv_conf_first_link(new_smc); 2434 smc_llc_flow_stop(link->lgr, &link->lgr->llc_flow_lcl); 2435 } 2436 return reason_code; 2437 } 2438 2439 /* setup for connection of server */ 2440 static void smc_listen_work(struct work_struct *work) 2441 { 2442 struct smc_sock *new_smc = container_of(work, struct smc_sock, 2443 smc_listen_work); 2444 struct socket *newclcsock = new_smc->clcsock; 2445 struct smc_clc_msg_accept_confirm *cclc; 2446 struct smc_clc_msg_proposal_area *buf; 2447 struct smc_clc_msg_proposal *pclc; 2448 struct smc_init_info *ini = NULL; 2449 u8 proposal_version = SMC_V1; 2450 u8 accept_version; 2451 int rc = 0; 2452 2453 lock_sock(&new_smc->sk); /* release in smc_listen_out() */ 2454 if (new_smc->listen_smc->sk.sk_state != SMC_LISTEN) 2455 return smc_listen_out_err(new_smc); 2456 2457 if (new_smc->use_fallback) { 2458 smc_listen_out_connected(new_smc); 2459 return; 2460 } 2461 2462 /* check if peer is smc capable */ 2463 if (!tcp_sk(newclcsock->sk)->syn_smc) { 2464 rc = smc_switch_to_fallback(new_smc, SMC_CLC_DECL_PEERNOSMC); 2465 if (rc) 2466 smc_listen_out_err(new_smc); 2467 else 2468 smc_listen_out_connected(new_smc); 2469 return; 2470 } 2471 2472 /* do inband token exchange - 2473 * wait for and receive SMC Proposal CLC message 2474 */ 2475 buf = kzalloc_obj(*buf); 2476 if (!buf) { 2477 rc = SMC_CLC_DECL_MEM; 2478 goto out_decl; 2479 } 2480 pclc = (struct smc_clc_msg_proposal *)buf; 2481 rc = smc_clc_wait_msg(new_smc, pclc, sizeof(*buf), 2482 SMC_CLC_PROPOSAL, CLC_WAIT_TIME); 2483 if (rc) 2484 goto out_decl; 2485 2486 if (pclc->hdr.version > SMC_V1) 2487 proposal_version = SMC_V2; 2488 2489 /* IPSec connections opt out of SMC optimizations */ 2490 if (using_ipsec(new_smc)) { 2491 rc = SMC_CLC_DECL_IPSEC; 2492 goto out_decl; 2493 } 2494 2495 ini = kzalloc_obj(*ini); 2496 if (!ini) { 2497 rc = SMC_CLC_DECL_MEM; 2498 goto out_decl; 2499 } 2500 2501 /* initial version checking */ 2502 rc = smc_listen_v2_check(new_smc, pclc, ini); 2503 if (rc) 2504 goto out_decl; 2505 2506 rc = smc_clc_srv_v2x_features_validate(new_smc, pclc, ini); 2507 if (rc) 2508 goto out_decl; 2509 2510 mutex_lock(&smc_server_lgr_pending); 2511 smc_rx_init(new_smc); 2512 smc_tx_init(new_smc); 2513 2514 /* determine ISM or RoCE device used for connection */ 2515 rc = smc_listen_find_device(new_smc, pclc, ini); 2516 if (rc) 2517 goto out_unlock; 2518 2519 /* send SMC Accept CLC message */ 2520 accept_version = ini->is_smcd ? ini->smcd_version : ini->smcr_version; 2521 rc = smc_clc_send_accept(new_smc, ini->first_contact_local, 2522 accept_version, ini->negotiated_eid, ini); 2523 if (rc) 2524 goto out_unlock; 2525 2526 /* SMC-D does not need this lock any more */ 2527 if (ini->is_smcd) 2528 mutex_unlock(&smc_server_lgr_pending); 2529 2530 /* receive SMC Confirm CLC message */ 2531 memset(buf, 0, sizeof(*buf)); 2532 cclc = (struct smc_clc_msg_accept_confirm *)buf; 2533 rc = smc_clc_wait_msg(new_smc, cclc, sizeof(*buf), 2534 SMC_CLC_CONFIRM, CLC_WAIT_TIME); 2535 if (rc) { 2536 if (!ini->is_smcd) 2537 goto out_unlock; 2538 goto out_decl; 2539 } 2540 2541 rc = smc_clc_v2x_features_confirm_check(cclc, ini); 2542 if (rc) { 2543 if (!ini->is_smcd) 2544 goto out_unlock; 2545 goto out_decl; 2546 } 2547 2548 /* fce smc release version is needed in smc_listen_rdma_finish, 2549 * so save fce info here. 2550 */ 2551 smc_conn_save_peer_info_fce(new_smc, cclc); 2552 2553 /* finish worker */ 2554 if (!ini->is_smcd) { 2555 rc = smc_listen_rdma_finish(new_smc, cclc, 2556 ini->first_contact_local, ini); 2557 if (rc) 2558 goto out_unlock; 2559 mutex_unlock(&smc_server_lgr_pending); 2560 } 2561 smc_conn_save_peer_info(new_smc, cclc); 2562 2563 if (ini->is_smcd && 2564 smc_ism_support_dmb_nocopy(new_smc->conn.lgr->smcd)) { 2565 rc = smcd_buf_attach(new_smc); 2566 if (rc) 2567 goto out_decl; 2568 } 2569 2570 SMC_STAT_SERV_SUCC_INC(sock_net(newclcsock->sk), ini); 2571 /* smc_listen_out() will release smcsk */ 2572 smc_listen_out_connected(new_smc); 2573 goto out_free; 2574 2575 out_unlock: 2576 mutex_unlock(&smc_server_lgr_pending); 2577 out_decl: 2578 smc_listen_decline(new_smc, rc, ini ? ini->first_contact_local : 0, 2579 proposal_version); 2580 out_free: 2581 kfree(ini); 2582 kfree(buf); 2583 } 2584 2585 static void smc_tcp_listen_work(struct work_struct *work) 2586 { 2587 struct smc_sock *lsmc = container_of(work, struct smc_sock, 2588 tcp_listen_work); 2589 struct sock *lsk = &lsmc->sk; 2590 struct smc_sock *new_smc; 2591 int rc = 0; 2592 2593 lock_sock(lsk); 2594 while (lsk->sk_state == SMC_LISTEN) { 2595 rc = smc_clcsock_accept(lsmc, &new_smc); 2596 if (rc) /* clcsock accept queue empty or error */ 2597 goto out; 2598 if (!new_smc) 2599 continue; 2600 2601 if (tcp_sk(new_smc->clcsock->sk)->syn_smc) 2602 atomic_inc(&lsmc->queued_smc_hs); 2603 2604 new_smc->listen_smc = lsmc; 2605 new_smc->use_fallback = lsmc->use_fallback; 2606 new_smc->fallback_rsn = lsmc->fallback_rsn; 2607 sock_hold(lsk); /* sock_put in smc_listen_work */ 2608 INIT_WORK(&new_smc->smc_listen_work, smc_listen_work); 2609 smc_copy_sock_settings_to_smc(new_smc); 2610 sock_hold(&new_smc->sk); /* sock_put in passive closing */ 2611 if (!queue_work(smc_hs_wq, &new_smc->smc_listen_work)) 2612 sock_put(&new_smc->sk); 2613 } 2614 2615 out: 2616 release_sock(lsk); 2617 sock_put(&lsmc->sk); /* sock_hold in smc_clcsock_data_ready() */ 2618 } 2619 2620 static void smc_clcsock_data_ready(struct sock *listen_clcsock) 2621 { 2622 struct smc_sock *lsmc; 2623 2624 read_lock_bh(&listen_clcsock->sk_callback_lock); 2625 lsmc = smc_clcsock_user_data(listen_clcsock); 2626 if (!lsmc) 2627 goto out; 2628 lsmc->clcsk_data_ready(listen_clcsock); 2629 if (lsmc->sk.sk_state == SMC_LISTEN) { 2630 sock_hold(&lsmc->sk); /* sock_put in smc_tcp_listen_work() */ 2631 if (!queue_work(smc_tcp_ls_wq, &lsmc->tcp_listen_work)) 2632 sock_put(&lsmc->sk); 2633 } 2634 out: 2635 read_unlock_bh(&listen_clcsock->sk_callback_lock); 2636 } 2637 2638 int smc_listen(struct socket *sock, int backlog) 2639 { 2640 struct sock *sk = sock->sk; 2641 struct smc_sock *smc; 2642 int rc; 2643 2644 smc = smc_sk(sk); 2645 lock_sock(sk); 2646 2647 rc = -EINVAL; 2648 if ((sk->sk_state != SMC_INIT && sk->sk_state != SMC_LISTEN) || 2649 smc->connect_nonblock || sock->state != SS_UNCONNECTED) 2650 goto out; 2651 2652 rc = 0; 2653 if (sk->sk_state == SMC_LISTEN) { 2654 sk->sk_max_ack_backlog = backlog; 2655 goto out; 2656 } 2657 /* some socket options are handled in core, so we could not apply 2658 * them to the clc socket -- copy smc socket options to clc socket 2659 */ 2660 smc_copy_sock_settings_to_clc(smc); 2661 if (!smc->use_fallback) 2662 tcp_sk(smc->clcsock->sk)->syn_smc = 1; 2663 2664 /* save original sk_data_ready function and establish 2665 * smc-specific sk_data_ready function 2666 */ 2667 write_lock_bh(&smc->clcsock->sk->sk_callback_lock); 2668 smc->clcsock->sk->sk_user_data = 2669 (void *)((uintptr_t)smc | SK_USER_DATA_NOCOPY); 2670 smc_clcsock_replace_cb(&smc->clcsock->sk->sk_data_ready, 2671 smc_clcsock_data_ready, &smc->clcsk_data_ready); 2672 write_unlock_bh(&smc->clcsock->sk->sk_callback_lock); 2673 2674 /* save original ops */ 2675 smc->ori_af_ops = inet_csk(smc->clcsock->sk)->icsk_af_ops; 2676 2677 smc->af_ops = *smc->ori_af_ops; 2678 smc->af_ops.syn_recv_sock = smc_tcp_syn_recv_sock; 2679 2680 inet_csk(smc->clcsock->sk)->icsk_af_ops = &smc->af_ops; 2681 2682 if (smc->limit_smc_hs) 2683 tcp_sk(smc->clcsock->sk)->smc_hs_congested = smc_hs_congested; 2684 2685 rc = kernel_listen(smc->clcsock, backlog); 2686 if (rc) { 2687 write_lock_bh(&smc->clcsock->sk->sk_callback_lock); 2688 smc_clcsock_restore_cb(&smc->clcsock->sk->sk_data_ready, 2689 &smc->clcsk_data_ready); 2690 smc->clcsock->sk->sk_user_data = NULL; 2691 write_unlock_bh(&smc->clcsock->sk->sk_callback_lock); 2692 goto out; 2693 } 2694 sk->sk_max_ack_backlog = backlog; 2695 sk->sk_ack_backlog = 0; 2696 sk->sk_state = SMC_LISTEN; 2697 2698 out: 2699 release_sock(sk); 2700 return rc; 2701 } 2702 2703 int smc_accept(struct socket *sock, struct socket *new_sock, 2704 struct proto_accept_arg *arg) 2705 { 2706 struct sock *sk = sock->sk, *nsk; 2707 DECLARE_WAITQUEUE(wait, current); 2708 struct smc_sock *lsmc; 2709 long timeo; 2710 int rc = 0; 2711 2712 lsmc = smc_sk(sk); 2713 sock_hold(sk); /* sock_put below */ 2714 lock_sock(sk); 2715 2716 if (lsmc->sk.sk_state != SMC_LISTEN) { 2717 rc = -EINVAL; 2718 release_sock(sk); 2719 goto out; 2720 } 2721 2722 /* Wait for an incoming connection */ 2723 timeo = sock_rcvtimeo(sk, arg->flags & O_NONBLOCK); 2724 add_wait_queue_exclusive(sk_sleep(sk), &wait); 2725 while (!(nsk = smc_accept_dequeue(sk, new_sock))) { 2726 set_current_state(TASK_INTERRUPTIBLE); 2727 if (!timeo) { 2728 rc = -EAGAIN; 2729 break; 2730 } 2731 release_sock(sk); 2732 timeo = schedule_timeout(timeo); 2733 /* wakeup by sk_data_ready in smc_listen_work() */ 2734 sched_annotate_sleep(); 2735 lock_sock(sk); 2736 if (signal_pending(current)) { 2737 rc = sock_intr_errno(timeo); 2738 break; 2739 } 2740 } 2741 set_current_state(TASK_RUNNING); 2742 remove_wait_queue(sk_sleep(sk), &wait); 2743 2744 if (!rc) 2745 rc = sock_error(nsk); 2746 release_sock(sk); 2747 if (rc) 2748 goto out; 2749 2750 if (lsmc->sockopt_defer_accept && !(arg->flags & O_NONBLOCK)) { 2751 /* wait till data arrives on the socket */ 2752 timeo = secs_to_jiffies(lsmc->sockopt_defer_accept); 2753 if (smc_sk(nsk)->use_fallback) { 2754 struct sock *clcsk = smc_sk(nsk)->clcsock->sk; 2755 2756 lock_sock(clcsk); 2757 if (skb_queue_empty(&clcsk->sk_receive_queue)) 2758 sk_wait_data(clcsk, &timeo, NULL); 2759 release_sock(clcsk); 2760 } else if (!atomic_read(&smc_sk(nsk)->conn.bytes_to_rcv)) { 2761 lock_sock(nsk); 2762 smc_rx_wait(smc_sk(nsk), &timeo, 0, smc_rx_data_available); 2763 release_sock(nsk); 2764 } 2765 } 2766 2767 out: 2768 sock_put(sk); /* sock_hold above */ 2769 return rc; 2770 } 2771 2772 int smc_getname(struct socket *sock, struct sockaddr *addr, 2773 int peer) 2774 { 2775 struct smc_sock *smc; 2776 2777 if (peer && (sock->sk->sk_state != SMC_ACTIVE) && 2778 (sock->sk->sk_state != SMC_APPCLOSEWAIT1)) 2779 return -ENOTCONN; 2780 2781 smc = smc_sk(sock->sk); 2782 2783 return smc->clcsock->ops->getname(smc->clcsock, addr, peer); 2784 } 2785 2786 int smc_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) 2787 { 2788 struct sock *sk = sock->sk; 2789 struct smc_sock *smc; 2790 int rc; 2791 2792 smc = smc_sk(sk); 2793 lock_sock(sk); 2794 2795 /* SMC does not support connect with fastopen */ 2796 if (msg->msg_flags & MSG_FASTOPEN) { 2797 /* not connected yet, fallback */ 2798 if (sk->sk_state == SMC_INIT && !smc->connect_nonblock) { 2799 rc = smc_switch_to_fallback(smc, SMC_CLC_DECL_OPTUNSUPP); 2800 if (rc) 2801 goto out; 2802 } else { 2803 rc = -EINVAL; 2804 goto out; 2805 } 2806 } else if ((sk->sk_state != SMC_ACTIVE) && 2807 (sk->sk_state != SMC_APPCLOSEWAIT1) && 2808 (sk->sk_state != SMC_INIT)) { 2809 rc = -EPIPE; 2810 goto out; 2811 } 2812 2813 if (smc->use_fallback) { 2814 rc = smc->clcsock->ops->sendmsg(smc->clcsock, msg, len); 2815 } else { 2816 rc = smc_tx_sendmsg(smc, msg, len); 2817 SMC_STAT_TX_PAYLOAD(smc, len, rc); 2818 } 2819 out: 2820 release_sock(sk); 2821 return rc; 2822 } 2823 2824 int smc_recvmsg(struct socket *sock, struct msghdr *msg, size_t len, 2825 int flags) 2826 { 2827 struct sock *sk = sock->sk; 2828 struct smc_sock *smc; 2829 int rc = -ENOTCONN; 2830 2831 smc = smc_sk(sk); 2832 lock_sock(sk); 2833 if (sk->sk_state == SMC_CLOSED && (sk->sk_shutdown & RCV_SHUTDOWN)) { 2834 /* socket was connected before, no more data to read */ 2835 rc = 0; 2836 goto out; 2837 } 2838 if ((sk->sk_state == SMC_INIT) || 2839 (sk->sk_state == SMC_LISTEN) || 2840 (sk->sk_state == SMC_CLOSED)) 2841 goto out; 2842 2843 if (sk->sk_state == SMC_PEERFINCLOSEWAIT) { 2844 rc = 0; 2845 goto out; 2846 } 2847 2848 if (smc->use_fallback) { 2849 rc = smc->clcsock->ops->recvmsg(smc->clcsock, msg, len, flags); 2850 } else { 2851 msg->msg_namelen = 0; 2852 rc = smc_rx_recvmsg(smc, msg, NULL, len, flags); 2853 SMC_STAT_RX_PAYLOAD(smc, rc, rc); 2854 } 2855 2856 out: 2857 release_sock(sk); 2858 return rc; 2859 } 2860 2861 static __poll_t smc_accept_poll(struct sock *parent) 2862 { 2863 struct smc_sock *isk = smc_sk(parent); 2864 __poll_t mask = 0; 2865 2866 spin_lock(&isk->accept_q_lock); 2867 if (!list_empty(&isk->accept_q)) 2868 mask = EPOLLIN | EPOLLRDNORM; 2869 spin_unlock(&isk->accept_q_lock); 2870 2871 return mask; 2872 } 2873 2874 __poll_t smc_poll(struct file *file, struct socket *sock, 2875 poll_table *wait) 2876 { 2877 struct sock *sk = sock->sk; 2878 struct smc_sock *smc; 2879 __poll_t mask = 0; 2880 2881 if (!sk) 2882 return EPOLLNVAL; 2883 2884 smc = smc_sk(sock->sk); 2885 if (smc->use_fallback) { 2886 /* delegate to CLC child sock */ 2887 mask = smc->clcsock->ops->poll(file, smc->clcsock, wait); 2888 sk->sk_err = smc->clcsock->sk->sk_err; 2889 } else { 2890 if (sk->sk_state != SMC_CLOSED) 2891 sock_poll_wait(file, sock, wait); 2892 if (sk->sk_err) 2893 mask |= EPOLLERR; 2894 if ((sk->sk_shutdown == SHUTDOWN_MASK) || 2895 (sk->sk_state == SMC_CLOSED)) 2896 mask |= EPOLLHUP; 2897 if (sk->sk_state == SMC_LISTEN) { 2898 /* woken up by sk_data_ready in smc_listen_work() */ 2899 mask |= smc_accept_poll(sk); 2900 } else if (smc->use_fallback) { /* as result of connect_work()*/ 2901 mask |= smc->clcsock->ops->poll(file, smc->clcsock, 2902 wait); 2903 sk->sk_err = smc->clcsock->sk->sk_err; 2904 } else { 2905 if ((sk->sk_state != SMC_INIT && 2906 atomic_read(&smc->conn.sndbuf_space)) || 2907 sk->sk_shutdown & SEND_SHUTDOWN) { 2908 mask |= EPOLLOUT | EPOLLWRNORM; 2909 } else { 2910 sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk); 2911 set_bit(SOCK_NOSPACE, &sk->sk_socket->flags); 2912 2913 if (sk->sk_state != SMC_INIT) { 2914 /* Race breaker the same way as tcp_poll(). */ 2915 smp_mb__after_atomic(); 2916 if (atomic_read(&smc->conn.sndbuf_space)) 2917 mask |= EPOLLOUT | EPOLLWRNORM; 2918 } 2919 } 2920 if (atomic_read(&smc->conn.bytes_to_rcv)) 2921 mask |= EPOLLIN | EPOLLRDNORM; 2922 if (sk->sk_shutdown & RCV_SHUTDOWN) 2923 mask |= EPOLLIN | EPOLLRDNORM | EPOLLRDHUP; 2924 if (sk->sk_state == SMC_APPCLOSEWAIT1) 2925 mask |= EPOLLIN; 2926 if (smc->conn.urg_state == SMC_URG_VALID) 2927 mask |= EPOLLPRI; 2928 } 2929 } 2930 2931 return mask; 2932 } 2933 2934 int smc_shutdown(struct socket *sock, int how) 2935 { 2936 struct sock *sk = sock->sk; 2937 bool do_shutdown = true; 2938 struct smc_sock *smc; 2939 int rc = -EINVAL; 2940 int old_state; 2941 int rc1 = 0; 2942 2943 smc = smc_sk(sk); 2944 2945 if ((how < SHUT_RD) || (how > SHUT_RDWR)) 2946 return rc; 2947 2948 lock_sock(sk); 2949 2950 if (sock->state == SS_CONNECTING) { 2951 if (sk->sk_state == SMC_ACTIVE) 2952 sock->state = SS_CONNECTED; 2953 else if (sk->sk_state == SMC_PEERCLOSEWAIT1 || 2954 sk->sk_state == SMC_PEERCLOSEWAIT2 || 2955 sk->sk_state == SMC_APPCLOSEWAIT1 || 2956 sk->sk_state == SMC_APPCLOSEWAIT2 || 2957 sk->sk_state == SMC_APPFINCLOSEWAIT) 2958 sock->state = SS_DISCONNECTING; 2959 } 2960 2961 rc = -ENOTCONN; 2962 if ((sk->sk_state != SMC_ACTIVE) && 2963 (sk->sk_state != SMC_PEERCLOSEWAIT1) && 2964 (sk->sk_state != SMC_PEERCLOSEWAIT2) && 2965 (sk->sk_state != SMC_APPCLOSEWAIT1) && 2966 (sk->sk_state != SMC_APPCLOSEWAIT2) && 2967 (sk->sk_state != SMC_APPFINCLOSEWAIT)) 2968 goto out; 2969 if (smc->use_fallback) { 2970 rc = kernel_sock_shutdown(smc->clcsock, how); 2971 sk->sk_shutdown = smc->clcsock->sk->sk_shutdown; 2972 if (sk->sk_shutdown == SHUTDOWN_MASK) { 2973 sk->sk_state = SMC_CLOSED; 2974 sk->sk_socket->state = SS_UNCONNECTED; 2975 sock_put(sk); 2976 } 2977 goto out; 2978 } 2979 switch (how) { 2980 case SHUT_RDWR: /* shutdown in both directions */ 2981 old_state = sk->sk_state; 2982 rc = smc_close_active(smc); 2983 if (old_state == SMC_ACTIVE && 2984 sk->sk_state == SMC_PEERCLOSEWAIT1) 2985 do_shutdown = false; 2986 break; 2987 case SHUT_WR: 2988 rc = smc_close_shutdown_write(smc); 2989 break; 2990 case SHUT_RD: 2991 rc = 0; 2992 /* nothing more to do because peer is not involved */ 2993 break; 2994 } 2995 if (do_shutdown && smc->clcsock) 2996 rc1 = kernel_sock_shutdown(smc->clcsock, how); 2997 /* map sock_shutdown_cmd constants to sk_shutdown value range */ 2998 sk->sk_shutdown |= how + 1; 2999 3000 if (sk->sk_state == SMC_CLOSED) 3001 sock->state = SS_UNCONNECTED; 3002 else 3003 sock->state = SS_DISCONNECTING; 3004 out: 3005 release_sock(sk); 3006 return rc ? rc : rc1; 3007 } 3008 3009 static int __smc_getsockopt(struct socket *sock, int level, int optname, 3010 char __user *optval, int __user *optlen) 3011 { 3012 struct smc_sock *smc; 3013 int val, len; 3014 3015 smc = smc_sk(sock->sk); 3016 3017 if (get_user(len, optlen)) 3018 return -EFAULT; 3019 3020 len = min_t(int, len, sizeof(int)); 3021 3022 if (len < 0) 3023 return -EINVAL; 3024 3025 switch (optname) { 3026 case SMC_LIMIT_HS: 3027 val = smc->limit_smc_hs; 3028 break; 3029 default: 3030 return -EOPNOTSUPP; 3031 } 3032 3033 if (put_user(len, optlen)) 3034 return -EFAULT; 3035 if (copy_to_user(optval, &val, len)) 3036 return -EFAULT; 3037 3038 return 0; 3039 } 3040 3041 static int __smc_setsockopt(struct socket *sock, int level, int optname, 3042 sockptr_t optval, unsigned int optlen) 3043 { 3044 struct sock *sk = sock->sk; 3045 struct smc_sock *smc; 3046 int val, rc; 3047 3048 smc = smc_sk(sk); 3049 3050 lock_sock(sk); 3051 switch (optname) { 3052 case SMC_LIMIT_HS: 3053 if (optlen < sizeof(int)) { 3054 rc = -EINVAL; 3055 break; 3056 } 3057 if (copy_from_sockptr(&val, optval, sizeof(int))) { 3058 rc = -EFAULT; 3059 break; 3060 } 3061 3062 smc->limit_smc_hs = !!val; 3063 rc = 0; 3064 break; 3065 default: 3066 rc = -EOPNOTSUPP; 3067 break; 3068 } 3069 release_sock(sk); 3070 3071 return rc; 3072 } 3073 3074 int smc_setsockopt(struct socket *sock, int level, int optname, 3075 sockptr_t optval, unsigned int optlen) 3076 { 3077 struct sock *sk = sock->sk; 3078 struct smc_sock *smc; 3079 int val, rc; 3080 3081 if (level == SOL_TCP && optname == TCP_ULP) 3082 return -EOPNOTSUPP; 3083 else if (level == SOL_SMC) 3084 return __smc_setsockopt(sock, level, optname, optval, optlen); 3085 3086 smc = smc_sk(sk); 3087 3088 /* generic setsockopts reaching us here always apply to the 3089 * CLC socket 3090 */ 3091 mutex_lock(&smc->clcsock_release_lock); 3092 if (!smc->clcsock) { 3093 mutex_unlock(&smc->clcsock_release_lock); 3094 return -EBADF; 3095 } 3096 if (unlikely(!smc->clcsock->ops->setsockopt)) 3097 rc = -EOPNOTSUPP; 3098 else 3099 rc = smc->clcsock->ops->setsockopt(smc->clcsock, level, optname, 3100 optval, optlen); 3101 if (smc->clcsock->sk->sk_err) { 3102 sk->sk_err = smc->clcsock->sk->sk_err; 3103 sk_error_report(sk); 3104 } 3105 mutex_unlock(&smc->clcsock_release_lock); 3106 3107 if (optlen < sizeof(int)) 3108 return -EINVAL; 3109 if (copy_from_sockptr(&val, optval, sizeof(int))) 3110 return -EFAULT; 3111 3112 lock_sock(sk); 3113 if (rc || smc->use_fallback) 3114 goto out; 3115 switch (optname) { 3116 case TCP_FASTOPEN: 3117 case TCP_FASTOPEN_CONNECT: 3118 case TCP_FASTOPEN_KEY: 3119 case TCP_FASTOPEN_NO_COOKIE: 3120 /* option not supported by SMC */ 3121 if (sk->sk_state == SMC_INIT && !smc->connect_nonblock) { 3122 rc = smc_switch_to_fallback(smc, SMC_CLC_DECL_OPTUNSUPP); 3123 } else { 3124 rc = -EINVAL; 3125 } 3126 break; 3127 case TCP_NODELAY: 3128 if (sk->sk_state != SMC_INIT && 3129 sk->sk_state != SMC_LISTEN && 3130 sk->sk_state != SMC_CLOSED) { 3131 if (val) { 3132 SMC_STAT_INC(smc, ndly_cnt); 3133 smc_tx_pending(&smc->conn); 3134 cancel_delayed_work(&smc->conn.tx_work); 3135 } 3136 } 3137 break; 3138 case TCP_CORK: 3139 if (sk->sk_state != SMC_INIT && 3140 sk->sk_state != SMC_LISTEN && 3141 sk->sk_state != SMC_CLOSED) { 3142 if (!val) { 3143 SMC_STAT_INC(smc, cork_cnt); 3144 smc_tx_pending(&smc->conn); 3145 cancel_delayed_work(&smc->conn.tx_work); 3146 } 3147 } 3148 break; 3149 case TCP_DEFER_ACCEPT: 3150 smc->sockopt_defer_accept = val; 3151 break; 3152 default: 3153 break; 3154 } 3155 out: 3156 release_sock(sk); 3157 3158 return rc; 3159 } 3160 3161 int smc_getsockopt(struct socket *sock, int level, int optname, 3162 char __user *optval, int __user *optlen) 3163 { 3164 struct smc_sock *smc; 3165 int rc; 3166 3167 if (level == SOL_SMC) 3168 return __smc_getsockopt(sock, level, optname, optval, optlen); 3169 3170 smc = smc_sk(sock->sk); 3171 mutex_lock(&smc->clcsock_release_lock); 3172 if (!smc->clcsock) { 3173 mutex_unlock(&smc->clcsock_release_lock); 3174 return -EBADF; 3175 } 3176 /* socket options apply to the CLC socket */ 3177 if (unlikely(!smc->clcsock->ops->getsockopt)) { 3178 mutex_unlock(&smc->clcsock_release_lock); 3179 return -EOPNOTSUPP; 3180 } 3181 rc = smc->clcsock->ops->getsockopt(smc->clcsock, level, optname, 3182 optval, optlen); 3183 mutex_unlock(&smc->clcsock_release_lock); 3184 return rc; 3185 } 3186 3187 int smc_ioctl(struct socket *sock, unsigned int cmd, 3188 unsigned long arg) 3189 { 3190 union smc_host_cursor cons, urg; 3191 struct smc_connection *conn; 3192 struct smc_sock *smc; 3193 int answ; 3194 3195 smc = smc_sk(sock->sk); 3196 conn = &smc->conn; 3197 lock_sock(&smc->sk); 3198 if (smc->use_fallback) { 3199 if (!smc->clcsock) { 3200 release_sock(&smc->sk); 3201 return -EBADF; 3202 } 3203 answ = smc->clcsock->ops->ioctl(smc->clcsock, cmd, arg); 3204 release_sock(&smc->sk); 3205 return answ; 3206 } 3207 switch (cmd) { 3208 case SIOCINQ: /* same as FIONREAD */ 3209 if (smc->sk.sk_state == SMC_LISTEN) { 3210 release_sock(&smc->sk); 3211 return -EINVAL; 3212 } 3213 if (smc->sk.sk_state == SMC_INIT || 3214 smc->sk.sk_state == SMC_CLOSED) 3215 answ = 0; 3216 else 3217 answ = atomic_read(&smc->conn.bytes_to_rcv); 3218 break; 3219 case SIOCOUTQ: 3220 /* output queue size (not send + not acked) */ 3221 if (smc->sk.sk_state == SMC_LISTEN) { 3222 release_sock(&smc->sk); 3223 return -EINVAL; 3224 } 3225 if (smc->sk.sk_state == SMC_INIT || 3226 smc->sk.sk_state == SMC_CLOSED) 3227 answ = 0; 3228 else 3229 answ = smc->conn.sndbuf_desc->len - 3230 atomic_read(&smc->conn.sndbuf_space); 3231 break; 3232 case SIOCOUTQNSD: 3233 /* output queue size (not send only) */ 3234 if (smc->sk.sk_state == SMC_LISTEN) { 3235 release_sock(&smc->sk); 3236 return -EINVAL; 3237 } 3238 if (smc->sk.sk_state == SMC_INIT || 3239 smc->sk.sk_state == SMC_CLOSED) 3240 answ = 0; 3241 else 3242 answ = smc_tx_prepared_sends(&smc->conn); 3243 break; 3244 case SIOCATMARK: 3245 if (smc->sk.sk_state == SMC_LISTEN) { 3246 release_sock(&smc->sk); 3247 return -EINVAL; 3248 } 3249 if (smc->sk.sk_state == SMC_INIT || 3250 smc->sk.sk_state == SMC_CLOSED) { 3251 answ = 0; 3252 } else { 3253 smc_curs_copy(&cons, &conn->local_tx_ctrl.cons, conn); 3254 smc_curs_copy(&urg, &conn->urg_curs, conn); 3255 answ = smc_curs_diff(conn->rmb_desc->len, 3256 &cons, &urg) == 1; 3257 } 3258 break; 3259 default: 3260 release_sock(&smc->sk); 3261 return -ENOIOCTLCMD; 3262 } 3263 release_sock(&smc->sk); 3264 3265 return put_user(answ, (int __user *)arg); 3266 } 3267 3268 /* Map the affected portions of the rmbe into an spd, note the number of bytes 3269 * to splice in conn->splice_pending, and press 'go'. Delays consumer cursor 3270 * updates till whenever a respective page has been fully processed. 3271 * Note that subsequent recv() calls have to wait till all splice() processing 3272 * completed. 3273 */ 3274 ssize_t smc_splice_read(struct socket *sock, loff_t *ppos, 3275 struct pipe_inode_info *pipe, size_t len, 3276 unsigned int flags) 3277 { 3278 struct sock *sk = sock->sk; 3279 struct smc_sock *smc; 3280 int rc = -ENOTCONN; 3281 3282 smc = smc_sk(sk); 3283 lock_sock(sk); 3284 if (sk->sk_state == SMC_CLOSED && (sk->sk_shutdown & RCV_SHUTDOWN)) { 3285 /* socket was connected before, no more data to read */ 3286 rc = 0; 3287 goto out; 3288 } 3289 if (sk->sk_state == SMC_INIT || 3290 sk->sk_state == SMC_LISTEN || 3291 sk->sk_state == SMC_CLOSED) 3292 goto out; 3293 3294 if (sk->sk_state == SMC_PEERFINCLOSEWAIT) { 3295 rc = 0; 3296 goto out; 3297 } 3298 3299 if (smc->use_fallback) { 3300 rc = smc->clcsock->ops->splice_read(smc->clcsock, ppos, 3301 pipe, len, flags); 3302 } else { 3303 if (*ppos) { 3304 rc = -ESPIPE; 3305 goto out; 3306 } 3307 if (flags & SPLICE_F_NONBLOCK) 3308 flags = MSG_DONTWAIT; 3309 else 3310 flags = 0; 3311 SMC_STAT_INC(smc, splice_cnt); 3312 rc = smc_rx_recvmsg(smc, NULL, pipe, len, flags); 3313 } 3314 out: 3315 release_sock(sk); 3316 3317 return rc; 3318 } 3319 3320 /* must look like tcp */ 3321 static const struct proto_ops smc_sock_ops = { 3322 .family = PF_SMC, 3323 .owner = THIS_MODULE, 3324 .release = smc_release, 3325 .bind = smc_bind, 3326 .connect = smc_connect, 3327 .socketpair = sock_no_socketpair, 3328 .accept = smc_accept, 3329 .getname = smc_getname, 3330 .poll = smc_poll, 3331 .ioctl = smc_ioctl, 3332 .listen = smc_listen, 3333 .shutdown = smc_shutdown, 3334 .setsockopt = smc_setsockopt, 3335 .getsockopt = smc_getsockopt, 3336 .sendmsg = smc_sendmsg, 3337 .recvmsg = smc_recvmsg, 3338 .mmap = sock_no_mmap, 3339 .splice_read = smc_splice_read, 3340 }; 3341 3342 int smc_create_clcsk(struct net *net, struct sock *sk, int family) 3343 { 3344 struct smc_sock *smc = smc_sk(sk); 3345 int rc; 3346 3347 rc = sock_create_kern(net, family, SOCK_STREAM, IPPROTO_TCP, 3348 &smc->clcsock); 3349 if (rc) 3350 return rc; 3351 3352 /* smc_clcsock_release() does not wait smc->clcsock->sk's 3353 * destruction; its sk_state might not be TCP_CLOSE after 3354 * smc->sk is close()d, and TCP timers can be fired later, 3355 * which need net ref. 3356 */ 3357 sk = smc->clcsock->sk; 3358 sk_net_refcnt_upgrade(sk); 3359 return 0; 3360 } 3361 3362 static int smc_create(struct net *net, struct socket *sock, int protocol, 3363 int kern) 3364 { 3365 int family = (protocol == SMCPROTO_SMC6) ? PF_INET6 : PF_INET; 3366 struct sock *sk; 3367 int rc; 3368 3369 rc = -ESOCKTNOSUPPORT; 3370 if (sock->type != SOCK_STREAM) 3371 goto out; 3372 3373 rc = -EPROTONOSUPPORT; 3374 if (protocol != SMCPROTO_SMC && protocol != SMCPROTO_SMC6) 3375 goto out; 3376 3377 rc = -ENOBUFS; 3378 sock->ops = &smc_sock_ops; 3379 sock->state = SS_UNCONNECTED; 3380 sk = smc_sock_alloc(net, sock, protocol); 3381 if (!sk) 3382 goto out; 3383 3384 rc = smc_create_clcsk(net, sk, family); 3385 if (rc) { 3386 sk_common_release(sk); 3387 sock->sk = NULL; 3388 } 3389 out: 3390 return rc; 3391 } 3392 3393 static const struct net_proto_family smc_sock_family_ops = { 3394 .family = PF_SMC, 3395 .owner = THIS_MODULE, 3396 .create = smc_create, 3397 }; 3398 3399 unsigned int smc_net_id; 3400 3401 static __net_init int smc_net_init(struct net *net) 3402 { 3403 int rc; 3404 3405 rc = smc_sysctl_net_init(net); 3406 if (rc) 3407 return rc; 3408 return smc_pnet_net_init(net); 3409 } 3410 3411 static void __net_exit smc_net_exit(struct net *net) 3412 { 3413 smc_sysctl_net_exit(net); 3414 smc_pnet_net_exit(net); 3415 } 3416 3417 static __net_init int smc_net_stat_init(struct net *net) 3418 { 3419 return smc_stats_init(net); 3420 } 3421 3422 static void __net_exit smc_net_stat_exit(struct net *net) 3423 { 3424 smc_stats_exit(net); 3425 } 3426 3427 static struct pernet_operations smc_net_ops = { 3428 .init = smc_net_init, 3429 .exit = smc_net_exit, 3430 .id = &smc_net_id, 3431 .size = sizeof(struct smc_net), 3432 }; 3433 3434 static struct pernet_operations smc_net_stat_ops = { 3435 .init = smc_net_stat_init, 3436 .exit = smc_net_stat_exit, 3437 }; 3438 3439 static int __init smc_init(void) 3440 { 3441 int rc; 3442 3443 rc = register_pernet_subsys(&smc_net_ops); 3444 if (rc) 3445 return rc; 3446 3447 rc = register_pernet_subsys(&smc_net_stat_ops); 3448 if (rc) 3449 goto out_pernet_subsys; 3450 3451 rc = smc_ism_init(); 3452 if (rc) 3453 goto out_pernet_subsys_stat; 3454 smc_clc_init(); 3455 3456 rc = smc_nl_init(); 3457 if (rc) 3458 goto out_ism; 3459 3460 rc = smc_pnet_init(); 3461 if (rc) 3462 goto out_nl; 3463 3464 rc = -ENOMEM; 3465 3466 smc_tcp_ls_wq = alloc_workqueue("smc_tcp_ls_wq", WQ_PERCPU, 0); 3467 if (!smc_tcp_ls_wq) 3468 goto out_pnet; 3469 3470 smc_hs_wq = alloc_workqueue("smc_hs_wq", WQ_PERCPU, 0); 3471 if (!smc_hs_wq) 3472 goto out_alloc_tcp_ls_wq; 3473 3474 smc_close_wq = alloc_workqueue("smc_close_wq", WQ_PERCPU, 0); 3475 if (!smc_close_wq) 3476 goto out_alloc_hs_wq; 3477 3478 rc = smc_core_init(); 3479 if (rc) { 3480 pr_err("%s: smc_core_init fails with %d\n", __func__, rc); 3481 goto out_alloc_wqs; 3482 } 3483 3484 rc = smc_llc_init(); 3485 if (rc) { 3486 pr_err("%s: smc_llc_init fails with %d\n", __func__, rc); 3487 goto out_core; 3488 } 3489 3490 rc = smc_cdc_init(); 3491 if (rc) { 3492 pr_err("%s: smc_cdc_init fails with %d\n", __func__, rc); 3493 goto out_core; 3494 } 3495 3496 rc = proto_register(&smc_proto, 1); 3497 if (rc) { 3498 pr_err("%s: proto_register(v4) fails with %d\n", __func__, rc); 3499 goto out_core; 3500 } 3501 3502 rc = proto_register(&smc_proto6, 1); 3503 if (rc) { 3504 pr_err("%s: proto_register(v6) fails with %d\n", __func__, rc); 3505 goto out_proto; 3506 } 3507 3508 rc = sock_register(&smc_sock_family_ops); 3509 if (rc) { 3510 pr_err("%s: sock_register fails with %d\n", __func__, rc); 3511 goto out_proto6; 3512 } 3513 INIT_HLIST_HEAD(&smc_v4_hashinfo.ht); 3514 INIT_HLIST_HEAD(&smc_v6_hashinfo.ht); 3515 3516 rc = smc_ib_register_client(); 3517 if (rc) { 3518 pr_err("%s: ib_register fails with %d\n", __func__, rc); 3519 goto out_sock; 3520 } 3521 rc = smc_inet_init(); 3522 if (rc) { 3523 pr_err("%s: smc_inet_init fails with %d\n", __func__, rc); 3524 goto out_ib; 3525 } 3526 rc = bpf_smc_hs_ctrl_init(); 3527 if (rc) { 3528 pr_err("%s: bpf_smc_hs_ctrl_init fails with %d\n", __func__, 3529 rc); 3530 goto out_inet; 3531 } 3532 static_branch_enable(&tcp_have_smc); 3533 return 0; 3534 out_inet: 3535 smc_inet_exit(); 3536 out_ib: 3537 smc_ib_unregister_client(); 3538 out_sock: 3539 sock_unregister(PF_SMC); 3540 out_proto6: 3541 proto_unregister(&smc_proto6); 3542 out_proto: 3543 proto_unregister(&smc_proto); 3544 out_core: 3545 smc_core_exit(); 3546 out_alloc_wqs: 3547 destroy_workqueue(smc_close_wq); 3548 out_alloc_hs_wq: 3549 destroy_workqueue(smc_hs_wq); 3550 out_alloc_tcp_ls_wq: 3551 destroy_workqueue(smc_tcp_ls_wq); 3552 out_pnet: 3553 smc_pnet_exit(); 3554 out_nl: 3555 smc_nl_exit(); 3556 out_ism: 3557 smc_clc_exit(); 3558 smc_ism_exit(); 3559 out_pernet_subsys_stat: 3560 unregister_pernet_subsys(&smc_net_stat_ops); 3561 out_pernet_subsys: 3562 unregister_pernet_subsys(&smc_net_ops); 3563 3564 return rc; 3565 } 3566 3567 static void __exit smc_exit(void) 3568 { 3569 static_branch_disable(&tcp_have_smc); 3570 smc_inet_exit(); 3571 sock_unregister(PF_SMC); 3572 smc_core_exit(); 3573 smc_ib_unregister_client(); 3574 smc_ism_exit(); 3575 destroy_workqueue(smc_close_wq); 3576 destroy_workqueue(smc_tcp_ls_wq); 3577 destroy_workqueue(smc_hs_wq); 3578 proto_unregister(&smc_proto6); 3579 proto_unregister(&smc_proto); 3580 smc_pnet_exit(); 3581 smc_nl_exit(); 3582 smc_clc_exit(); 3583 unregister_pernet_subsys(&smc_net_stat_ops); 3584 unregister_pernet_subsys(&smc_net_ops); 3585 rcu_barrier(); 3586 } 3587 3588 module_init(smc_init); 3589 module_exit(smc_exit); 3590 3591 MODULE_AUTHOR("Ursula Braun <ubraun@linux.vnet.ibm.com>"); 3592 MODULE_DESCRIPTION("smc socket address family"); 3593 MODULE_LICENSE("GPL"); 3594 MODULE_ALIAS_NETPROTO(PF_SMC); 3595 /* 256 for IPPROTO_SMC and 1 for SOCK_STREAM */ 3596 MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_INET, 256, 1); 3597 #if IS_ENABLED(CONFIG_IPV6) 3598 MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_INET6, 256, 1); 3599 #endif /* CONFIG_IPV6 */ 3600 MODULE_ALIAS_GENL_FAMILY(SMC_GENL_FAMILY_NAME); 3601