1 // SPDX-License-Identifier: GPL-2.0-only
3 * Shared Memory Communications over RDMA (SMC-R) and RoCE
5 * AF_SMC protocol family socket handler keeping the AF_INET sock address type
6 * applies to SOCK_STREAM sockets only
7 * offers an alternative communication option for TCP-protocol sockets
8 * applicable with RoCE-cards only
10 * Initial restrictions:
11 * - support for alternate links postponed
13 * Copyright IBM Corp. 2016, 2018
15 * Author(s): Ursula Braun <ubraun@linux.vnet.ibm.com>
16 * based on prototype from Frank Blaschka
19 #define KMSG_COMPONENT "smc"
20 #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
22 #include <linux/module.h>
23 #include <linux/socket.h>
24 #include <linux/workqueue.h>
26 #include <linux/sched/signal.h>
27 #include <linux/if_vlan.h>
28 #include <linux/rcupdate_wait.h>
29 #include <linux/ctype.h>
34 #include <asm/ioctls.h>
36 #include <net/net_namespace.h>
37 #include <net/netns/generic.h>
38 #include "smc_netns.h"
48 #include "smc_netlink.h"
51 #include "smc_close.h"
52 #include "smc_stats.h"
53 #include "smc_tracepoint.h"
54 #include "smc_sysctl.h"
56 static DEFINE_MUTEX(smc_server_lgr_pending); /* serialize link group
59 static DEFINE_MUTEX(smc_client_lgr_pending); /* serialize link group
63 static struct workqueue_struct *smc_tcp_ls_wq; /* wq for tcp listen work */
64 struct workqueue_struct *smc_hs_wq; /* wq for handshake work */
65 struct workqueue_struct *smc_close_wq; /* wq for close work */
67 static void smc_tcp_listen_work(struct work_struct *);
68 static void smc_connect_work(struct work_struct *);
70 int smc_nl_dump_hs_limitation(struct sk_buff *skb, struct netlink_callback *cb)
72 struct smc_nl_dmp_ctx *cb_ctx = smc_nl_dmp_ctx(cb);
78 hdr = genlmsg_put(skb, NETLINK_CB(cb->skb).portid, cb->nlh->nlmsg_seq,
79 &smc_gen_nl_family, NLM_F_MULTI,
80 SMC_NETLINK_DUMP_HS_LIMITATION);
84 if (nla_put_u8(skb, SMC_NLA_HS_LIMITATION_ENABLED,
85 sock_net(skb->sk)->smc.limit_smc_hs))
88 genlmsg_end(skb, hdr);
93 genlmsg_cancel(skb, hdr);
97 int smc_nl_enable_hs_limitation(struct sk_buff *skb, struct genl_info *info)
99 sock_net(skb->sk)->smc.limit_smc_hs = true;
103 int smc_nl_disable_hs_limitation(struct sk_buff *skb, struct genl_info *info)
105 sock_net(skb->sk)->smc.limit_smc_hs = false;
109 static void smc_set_keepalive(struct sock *sk, int val)
111 struct smc_sock *smc = smc_sk(sk);
113 smc->clcsock->sk->sk_prot->keepalive(smc->clcsock->sk, val);
116 static struct sock *smc_tcp_syn_recv_sock(const struct sock *sk,
118 struct request_sock *req,
119 struct dst_entry *dst,
120 struct request_sock *req_unhash,
123 struct smc_sock *smc;
126 smc = smc_clcsock_user_data(sk);
128 if (READ_ONCE(sk->sk_ack_backlog) + atomic_read(&smc->queued_smc_hs) >
129 sk->sk_max_ack_backlog)
132 if (sk_acceptq_is_full(&smc->sk)) {
133 NET_INC_STATS(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS);
137 /* passthrough to original syn recv sock fct */
138 child = smc->ori_af_ops->syn_recv_sock(sk, skb, req, dst, req_unhash,
140 /* child must not inherit smc or its ops */
142 rcu_assign_sk_user_data(child, NULL);
144 /* v4-mapped sockets don't inherit parent ops. Don't restore. */
145 if (inet_csk(child)->icsk_af_ops == inet_csk(sk)->icsk_af_ops)
146 inet_csk(child)->icsk_af_ops = smc->ori_af_ops;
156 static bool smc_hs_congested(const struct sock *sk)
158 const struct smc_sock *smc;
160 smc = smc_clcsock_user_data(sk);
165 if (workqueue_congested(WORK_CPU_UNBOUND, smc_hs_wq))
171 static struct smc_hashinfo smc_v4_hashinfo = {
172 .lock = __RW_LOCK_UNLOCKED(smc_v4_hashinfo.lock),
175 static struct smc_hashinfo smc_v6_hashinfo = {
176 .lock = __RW_LOCK_UNLOCKED(smc_v6_hashinfo.lock),
179 int smc_hash_sk(struct sock *sk)
181 struct smc_hashinfo *h = sk->sk_prot->h.smc_hash;
182 struct hlist_head *head;
186 write_lock_bh(&h->lock);
187 sk_add_node(sk, head);
188 write_unlock_bh(&h->lock);
189 sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1);
193 EXPORT_SYMBOL_GPL(smc_hash_sk);
195 void smc_unhash_sk(struct sock *sk)
197 struct smc_hashinfo *h = sk->sk_prot->h.smc_hash;
199 write_lock_bh(&h->lock);
200 if (sk_del_node_init(sk))
201 sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1);
202 write_unlock_bh(&h->lock);
204 EXPORT_SYMBOL_GPL(smc_unhash_sk);
206 /* This will be called before user really release sock_lock. So do the
207 * work which we didn't do because of user hold the sock_lock in the
210 static void smc_release_cb(struct sock *sk)
212 struct smc_sock *smc = smc_sk(sk);
214 if (smc->conn.tx_in_release_sock) {
215 smc_tx_pending(&smc->conn);
216 smc->conn.tx_in_release_sock = false;
220 struct proto smc_proto = {
222 .owner = THIS_MODULE,
223 .keepalive = smc_set_keepalive,
225 .unhash = smc_unhash_sk,
226 .release_cb = smc_release_cb,
227 .obj_size = sizeof(struct smc_sock),
228 .h.smc_hash = &smc_v4_hashinfo,
229 .slab_flags = SLAB_TYPESAFE_BY_RCU,
231 EXPORT_SYMBOL_GPL(smc_proto);
233 struct proto smc_proto6 = {
235 .owner = THIS_MODULE,
236 .keepalive = smc_set_keepalive,
238 .unhash = smc_unhash_sk,
239 .release_cb = smc_release_cb,
240 .obj_size = sizeof(struct smc_sock),
241 .h.smc_hash = &smc_v6_hashinfo,
242 .slab_flags = SLAB_TYPESAFE_BY_RCU,
244 EXPORT_SYMBOL_GPL(smc_proto6);
246 static void smc_fback_restore_callbacks(struct smc_sock *smc)
248 struct sock *clcsk = smc->clcsock->sk;
250 write_lock_bh(&clcsk->sk_callback_lock);
251 clcsk->sk_user_data = NULL;
253 smc_clcsock_restore_cb(&clcsk->sk_state_change, &smc->clcsk_state_change);
254 smc_clcsock_restore_cb(&clcsk->sk_data_ready, &smc->clcsk_data_ready);
255 smc_clcsock_restore_cb(&clcsk->sk_write_space, &smc->clcsk_write_space);
256 smc_clcsock_restore_cb(&clcsk->sk_error_report, &smc->clcsk_error_report);
258 write_unlock_bh(&clcsk->sk_callback_lock);
261 static void smc_restore_fallback_changes(struct smc_sock *smc)
263 if (smc->clcsock->file) { /* non-accepted sockets have no file yet */
264 smc->clcsock->file->private_data = smc->sk.sk_socket;
265 smc->clcsock->file = NULL;
266 smc_fback_restore_callbacks(smc);
270 static int __smc_release(struct smc_sock *smc)
272 struct sock *sk = &smc->sk;
275 if (!smc->use_fallback) {
276 rc = smc_close_active(smc);
277 smc_sock_set_flag(sk, SOCK_DEAD);
278 sk->sk_shutdown |= SHUTDOWN_MASK;
280 if (sk->sk_state != SMC_CLOSED) {
281 if (sk->sk_state != SMC_LISTEN &&
282 sk->sk_state != SMC_INIT)
283 sock_put(sk); /* passive closing */
284 if (sk->sk_state == SMC_LISTEN) {
285 /* wake up clcsock accept */
286 rc = kernel_sock_shutdown(smc->clcsock,
289 sk->sk_state = SMC_CLOSED;
290 sk->sk_state_change(sk);
292 smc_restore_fallback_changes(smc);
295 sk->sk_prot->unhash(sk);
297 if (sk->sk_state == SMC_CLOSED) {
300 smc_clcsock_release(smc);
303 if (!smc->use_fallback)
304 smc_conn_free(&smc->conn);
310 static int smc_release(struct socket *sock)
312 struct sock *sk = sock->sk;
313 struct smc_sock *smc;
314 int old_state, rc = 0;
319 sock_hold(sk); /* sock_put below */
322 old_state = sk->sk_state;
324 /* cleanup for a dangling non-blocking connect */
325 if (smc->connect_nonblock && old_state == SMC_INIT)
326 tcp_abort(smc->clcsock->sk, ECONNABORTED);
328 if (cancel_work_sync(&smc->connect_work))
329 sock_put(&smc->sk); /* sock_hold in smc_connect for passive closing */
331 if (sk->sk_state == SMC_LISTEN)
332 /* smc_close_non_accepted() is called and acquires
333 * sock lock for child sockets again
335 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
339 if (old_state == SMC_INIT && sk->sk_state == SMC_ACTIVE &&
341 smc_close_active_abort(smc);
343 rc = __smc_release(smc);
350 sock_put(sk); /* sock_hold above */
351 sock_put(sk); /* final sock_put */
356 static void smc_destruct(struct sock *sk)
358 if (sk->sk_state != SMC_CLOSED)
360 if (!sock_flag(sk, SOCK_DEAD))
363 sk_refcnt_debug_dec(sk);
366 static struct sock *smc_sock_alloc(struct net *net, struct socket *sock,
369 struct smc_sock *smc;
373 prot = (protocol == SMCPROTO_SMC6) ? &smc_proto6 : &smc_proto;
374 sk = sk_alloc(net, PF_SMC, GFP_KERNEL, prot, 0);
378 sock_init_data(sock, sk); /* sets sk_refcnt to 1 */
379 sk->sk_state = SMC_INIT;
380 sk->sk_destruct = smc_destruct;
381 sk->sk_protocol = protocol;
382 WRITE_ONCE(sk->sk_sndbuf, 2 * READ_ONCE(net->smc.sysctl_wmem));
383 WRITE_ONCE(sk->sk_rcvbuf, 2 * READ_ONCE(net->smc.sysctl_rmem));
385 INIT_WORK(&smc->tcp_listen_work, smc_tcp_listen_work);
386 INIT_WORK(&smc->connect_work, smc_connect_work);
387 INIT_DELAYED_WORK(&smc->conn.tx_work, smc_tx_work);
388 INIT_LIST_HEAD(&smc->accept_q);
389 spin_lock_init(&smc->accept_q_lock);
390 spin_lock_init(&smc->conn.send_lock);
391 sk->sk_prot->hash(sk);
392 sk_refcnt_debug_inc(sk);
393 mutex_init(&smc->clcsock_release_lock);
394 smc_init_saved_callbacks(smc);
399 static int smc_bind(struct socket *sock, struct sockaddr *uaddr,
402 struct sockaddr_in *addr = (struct sockaddr_in *)uaddr;
403 struct sock *sk = sock->sk;
404 struct smc_sock *smc;
409 /* replicate tests from inet_bind(), to be safe wrt. future changes */
411 if (addr_len < sizeof(struct sockaddr_in))
415 if (addr->sin_family != AF_INET &&
416 addr->sin_family != AF_INET6 &&
417 addr->sin_family != AF_UNSPEC)
419 /* accept AF_UNSPEC (mapped to AF_INET) only if s_addr is INADDR_ANY */
420 if (addr->sin_family == AF_UNSPEC &&
421 addr->sin_addr.s_addr != htonl(INADDR_ANY))
426 /* Check if socket is already active */
428 if (sk->sk_state != SMC_INIT || smc->connect_nonblock)
431 smc->clcsock->sk->sk_reuse = sk->sk_reuse;
432 smc->clcsock->sk->sk_reuseport = sk->sk_reuseport;
433 rc = kernel_bind(smc->clcsock, uaddr, addr_len);
441 /* copy only relevant settings and flags of SOL_SOCKET level from smc to
442 * clc socket (since smc is not called for these options from net/core)
445 #define SK_FLAGS_SMC_TO_CLC ((1UL << SOCK_URGINLINE) | \
446 (1UL << SOCK_KEEPOPEN) | \
447 (1UL << SOCK_LINGER) | \
448 (1UL << SOCK_BROADCAST) | \
449 (1UL << SOCK_TIMESTAMP) | \
450 (1UL << SOCK_DBG) | \
451 (1UL << SOCK_RCVTSTAMP) | \
452 (1UL << SOCK_RCVTSTAMPNS) | \
453 (1UL << SOCK_LOCALROUTE) | \
454 (1UL << SOCK_TIMESTAMPING_RX_SOFTWARE) | \
455 (1UL << SOCK_RXQ_OVFL) | \
456 (1UL << SOCK_WIFI_STATUS) | \
457 (1UL << SOCK_NOFCS) | \
458 (1UL << SOCK_FILTER_LOCKED) | \
459 (1UL << SOCK_TSTAMP_NEW))
461 /* if set, use value set by setsockopt() - else use IPv4 or SMC sysctl value */
462 static void smc_adjust_sock_bufsizes(struct sock *nsk, struct sock *osk,
465 struct net *nnet = sock_net(nsk);
467 nsk->sk_userlocks = osk->sk_userlocks;
468 if (osk->sk_userlocks & SOCK_SNDBUF_LOCK) {
469 nsk->sk_sndbuf = osk->sk_sndbuf;
471 if (mask == SK_FLAGS_SMC_TO_CLC)
472 WRITE_ONCE(nsk->sk_sndbuf,
473 READ_ONCE(nnet->ipv4.sysctl_tcp_wmem[1]));
475 WRITE_ONCE(nsk->sk_sndbuf,
476 2 * READ_ONCE(nnet->smc.sysctl_wmem));
478 if (osk->sk_userlocks & SOCK_RCVBUF_LOCK) {
479 nsk->sk_rcvbuf = osk->sk_rcvbuf;
481 if (mask == SK_FLAGS_SMC_TO_CLC)
482 WRITE_ONCE(nsk->sk_rcvbuf,
483 READ_ONCE(nnet->ipv4.sysctl_tcp_rmem[1]));
485 WRITE_ONCE(nsk->sk_rcvbuf,
486 2 * READ_ONCE(nnet->smc.sysctl_rmem));
490 static void smc_copy_sock_settings(struct sock *nsk, struct sock *osk,
493 /* options we don't get control via setsockopt for */
494 nsk->sk_type = osk->sk_type;
495 nsk->sk_sndtimeo = osk->sk_sndtimeo;
496 nsk->sk_rcvtimeo = osk->sk_rcvtimeo;
497 nsk->sk_mark = READ_ONCE(osk->sk_mark);
498 nsk->sk_priority = osk->sk_priority;
499 nsk->sk_rcvlowat = osk->sk_rcvlowat;
500 nsk->sk_bound_dev_if = osk->sk_bound_dev_if;
501 nsk->sk_err = osk->sk_err;
503 nsk->sk_flags &= ~mask;
504 nsk->sk_flags |= osk->sk_flags & mask;
506 smc_adjust_sock_bufsizes(nsk, osk, mask);
509 static void smc_copy_sock_settings_to_clc(struct smc_sock *smc)
511 smc_copy_sock_settings(smc->clcsock->sk, &smc->sk, SK_FLAGS_SMC_TO_CLC);
514 #define SK_FLAGS_CLC_TO_SMC ((1UL << SOCK_URGINLINE) | \
515 (1UL << SOCK_KEEPOPEN) | \
516 (1UL << SOCK_LINGER) | \
518 /* copy only settings and flags relevant for smc from clc to smc socket */
519 static void smc_copy_sock_settings_to_smc(struct smc_sock *smc)
521 smc_copy_sock_settings(&smc->sk, smc->clcsock->sk, SK_FLAGS_CLC_TO_SMC);
524 /* register the new vzalloced sndbuf on all links */
525 static int smcr_lgr_reg_sndbufs(struct smc_link *link,
526 struct smc_buf_desc *snd_desc)
528 struct smc_link_group *lgr = link->lgr;
531 if (!snd_desc->is_vm)
534 /* protect against parallel smcr_link_reg_buf() */
535 mutex_lock(&lgr->llc_conf_mutex);
536 for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) {
537 if (!smc_link_active(&lgr->lnk[i]))
539 rc = smcr_link_reg_buf(&lgr->lnk[i], snd_desc);
543 mutex_unlock(&lgr->llc_conf_mutex);
547 /* register the new rmb on all links */
548 static int smcr_lgr_reg_rmbs(struct smc_link *link,
549 struct smc_buf_desc *rmb_desc)
551 struct smc_link_group *lgr = link->lgr;
554 rc = smc_llc_flow_initiate(lgr, SMC_LLC_FLOW_RKEY);
557 /* protect against parallel smc_llc_cli_rkey_exchange() and
558 * parallel smcr_link_reg_buf()
560 mutex_lock(&lgr->llc_conf_mutex);
561 for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) {
562 if (!smc_link_active(&lgr->lnk[i]))
564 rc = smcr_link_reg_buf(&lgr->lnk[i], rmb_desc);
569 /* exchange confirm_rkey msg with peer */
570 rc = smc_llc_do_confirm_rkey(link, rmb_desc);
575 rmb_desc->is_conf_rkey = true;
577 mutex_unlock(&lgr->llc_conf_mutex);
578 smc_llc_flow_stop(lgr, &lgr->llc_flow_lcl);
582 static int smcr_clnt_conf_first_link(struct smc_sock *smc)
584 struct smc_link *link = smc->conn.lnk;
585 struct smc_llc_qentry *qentry;
588 /* Receive CONFIRM LINK request from server over RoCE fabric.
589 * Increasing the client's timeout by twice as much as the server's
590 * timeout by default can temporarily avoid decline messages of
591 * both sides crossing or colliding
593 qentry = smc_llc_wait(link->lgr, NULL, 2 * SMC_LLC_WAIT_TIME,
594 SMC_LLC_CONFIRM_LINK);
596 struct smc_clc_msg_decline dclc;
598 rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
599 SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT);
600 return rc == -EAGAIN ? SMC_CLC_DECL_TIMEOUT_CL : rc;
602 smc_llc_save_peer_uid(qentry);
603 rc = smc_llc_eval_conf_link(qentry, SMC_LLC_REQ);
604 smc_llc_flow_qentry_del(&link->lgr->llc_flow_lcl);
606 return SMC_CLC_DECL_RMBE_EC;
608 rc = smc_ib_modify_qp_rts(link);
610 return SMC_CLC_DECL_ERR_RDYLNK;
612 smc_wr_remember_qp_attr(link);
614 /* reg the sndbuf if it was vzalloced */
615 if (smc->conn.sndbuf_desc->is_vm) {
616 if (smcr_link_reg_buf(link, smc->conn.sndbuf_desc))
617 return SMC_CLC_DECL_ERR_REGBUF;
621 if (smcr_link_reg_buf(link, smc->conn.rmb_desc))
622 return SMC_CLC_DECL_ERR_REGBUF;
624 /* confirm_rkey is implicit on 1st contact */
625 smc->conn.rmb_desc->is_conf_rkey = true;
627 /* send CONFIRM LINK response over RoCE fabric */
628 rc = smc_llc_send_confirm_link(link, SMC_LLC_RESP);
630 return SMC_CLC_DECL_TIMEOUT_CL;
632 smc_llc_link_active(link);
633 smcr_lgr_set_type(link->lgr, SMC_LGR_SINGLE);
635 /* optional 2nd link, receive ADD LINK request from server */
636 qentry = smc_llc_wait(link->lgr, NULL, SMC_LLC_WAIT_TIME,
639 struct smc_clc_msg_decline dclc;
641 rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
642 SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT);
644 rc = 0; /* no DECLINE received, go with one link */
647 smc_llc_flow_qentry_clr(&link->lgr->llc_flow_lcl);
648 smc_llc_cli_add_link(link, qentry);
652 static bool smc_isascii(char *hostname)
656 for (i = 0; i < SMC_MAX_HOSTNAME_LEN; i++)
657 if (!isascii(hostname[i]))
662 static void smc_conn_save_peer_info_fce(struct smc_sock *smc,
663 struct smc_clc_msg_accept_confirm *clc)
665 struct smc_clc_msg_accept_confirm_v2 *clc_v2 =
666 (struct smc_clc_msg_accept_confirm_v2 *)clc;
667 struct smc_clc_first_contact_ext *fce;
670 if (clc->hdr.version == SMC_V1 ||
671 !(clc->hdr.typev2 & SMC_FIRST_CONTACT_MASK))
674 if (smc->conn.lgr->is_smcd) {
675 memcpy(smc->conn.lgr->negotiated_eid, clc_v2->d1.eid,
677 clc_v2_len = offsetofend(struct smc_clc_msg_accept_confirm_v2,
680 memcpy(smc->conn.lgr->negotiated_eid, clc_v2->r1.eid,
682 clc_v2_len = offsetofend(struct smc_clc_msg_accept_confirm_v2,
685 fce = (struct smc_clc_first_contact_ext *)(((u8 *)clc_v2) + clc_v2_len);
686 smc->conn.lgr->peer_os = fce->os_type;
687 smc->conn.lgr->peer_smc_release = fce->release;
688 if (smc_isascii(fce->hostname))
689 memcpy(smc->conn.lgr->peer_hostname, fce->hostname,
690 SMC_MAX_HOSTNAME_LEN);
693 static void smcr_conn_save_peer_info(struct smc_sock *smc,
694 struct smc_clc_msg_accept_confirm *clc)
696 int bufsize = smc_uncompress_bufsize(clc->r0.rmbe_size);
698 smc->conn.peer_rmbe_idx = clc->r0.rmbe_idx;
699 smc->conn.local_tx_ctrl.token = ntohl(clc->r0.rmbe_alert_token);
700 smc->conn.peer_rmbe_size = bufsize;
701 atomic_set(&smc->conn.peer_rmbe_space, smc->conn.peer_rmbe_size);
702 smc->conn.tx_off = bufsize * (smc->conn.peer_rmbe_idx - 1);
705 static void smcd_conn_save_peer_info(struct smc_sock *smc,
706 struct smc_clc_msg_accept_confirm *clc)
708 int bufsize = smc_uncompress_bufsize(clc->d0.dmbe_size);
710 smc->conn.peer_rmbe_idx = clc->d0.dmbe_idx;
711 smc->conn.peer_token = clc->d0.token;
712 /* msg header takes up space in the buffer */
713 smc->conn.peer_rmbe_size = bufsize - sizeof(struct smcd_cdc_msg);
714 atomic_set(&smc->conn.peer_rmbe_space, smc->conn.peer_rmbe_size);
715 smc->conn.tx_off = bufsize * smc->conn.peer_rmbe_idx;
718 static void smc_conn_save_peer_info(struct smc_sock *smc,
719 struct smc_clc_msg_accept_confirm *clc)
721 if (smc->conn.lgr->is_smcd)
722 smcd_conn_save_peer_info(smc, clc);
724 smcr_conn_save_peer_info(smc, clc);
725 smc_conn_save_peer_info_fce(smc, clc);
728 static void smc_link_save_peer_info(struct smc_link *link,
729 struct smc_clc_msg_accept_confirm *clc,
730 struct smc_init_info *ini)
732 link->peer_qpn = ntoh24(clc->r0.qpn);
733 memcpy(link->peer_gid, ini->peer_gid, SMC_GID_SIZE);
734 memcpy(link->peer_mac, ini->peer_mac, sizeof(link->peer_mac));
735 link->peer_psn = ntoh24(clc->r0.psn);
736 link->peer_mtu = clc->r0.qp_mtu;
739 static void smc_stat_inc_fback_rsn_cnt(struct smc_sock *smc,
740 struct smc_stats_fback *fback_arr)
744 for (cnt = 0; cnt < SMC_MAX_FBACK_RSN_CNT; cnt++) {
745 if (fback_arr[cnt].fback_code == smc->fallback_rsn) {
746 fback_arr[cnt].count++;
749 if (!fback_arr[cnt].fback_code) {
750 fback_arr[cnt].fback_code = smc->fallback_rsn;
751 fback_arr[cnt].count++;
757 static void smc_stat_fallback(struct smc_sock *smc)
759 struct net *net = sock_net(&smc->sk);
761 mutex_lock(&net->smc.mutex_fback_rsn);
762 if (smc->listen_smc) {
763 smc_stat_inc_fback_rsn_cnt(smc, net->smc.fback_rsn->srv);
764 net->smc.fback_rsn->srv_fback_cnt++;
766 smc_stat_inc_fback_rsn_cnt(smc, net->smc.fback_rsn->clnt);
767 net->smc.fback_rsn->clnt_fback_cnt++;
769 mutex_unlock(&net->smc.mutex_fback_rsn);
772 /* must be called under rcu read lock */
773 static void smc_fback_wakeup_waitqueue(struct smc_sock *smc, void *key)
775 struct socket_wq *wq;
778 wq = rcu_dereference(smc->sk.sk_wq);
779 if (!skwq_has_sleeper(wq))
782 /* wake up smc sk->sk_wq */
784 /* sk_state_change */
785 wake_up_interruptible_all(&wq->wait);
787 flags = key_to_poll(key);
788 if (flags & (EPOLLIN | EPOLLOUT))
789 /* sk_data_ready or sk_write_space */
790 wake_up_interruptible_sync_poll(&wq->wait, flags);
791 else if (flags & EPOLLERR)
792 /* sk_error_report */
793 wake_up_interruptible_poll(&wq->wait, flags);
797 static int smc_fback_mark_woken(wait_queue_entry_t *wait,
798 unsigned int mode, int sync, void *key)
800 struct smc_mark_woken *mark =
801 container_of(wait, struct smc_mark_woken, wait_entry);
808 static void smc_fback_forward_wakeup(struct smc_sock *smc, struct sock *clcsk,
809 void (*clcsock_callback)(struct sock *sk))
811 struct smc_mark_woken mark = { .woken = false };
812 struct socket_wq *wq;
814 init_waitqueue_func_entry(&mark.wait_entry,
815 smc_fback_mark_woken);
817 wq = rcu_dereference(clcsk->sk_wq);
820 add_wait_queue(sk_sleep(clcsk), &mark.wait_entry);
821 clcsock_callback(clcsk);
822 remove_wait_queue(sk_sleep(clcsk), &mark.wait_entry);
825 smc_fback_wakeup_waitqueue(smc, mark.key);
830 static void smc_fback_state_change(struct sock *clcsk)
832 struct smc_sock *smc;
834 read_lock_bh(&clcsk->sk_callback_lock);
835 smc = smc_clcsock_user_data(clcsk);
837 smc_fback_forward_wakeup(smc, clcsk,
838 smc->clcsk_state_change);
839 read_unlock_bh(&clcsk->sk_callback_lock);
842 static void smc_fback_data_ready(struct sock *clcsk)
844 struct smc_sock *smc;
846 read_lock_bh(&clcsk->sk_callback_lock);
847 smc = smc_clcsock_user_data(clcsk);
849 smc_fback_forward_wakeup(smc, clcsk,
850 smc->clcsk_data_ready);
851 read_unlock_bh(&clcsk->sk_callback_lock);
854 static void smc_fback_write_space(struct sock *clcsk)
856 struct smc_sock *smc;
858 read_lock_bh(&clcsk->sk_callback_lock);
859 smc = smc_clcsock_user_data(clcsk);
861 smc_fback_forward_wakeup(smc, clcsk,
862 smc->clcsk_write_space);
863 read_unlock_bh(&clcsk->sk_callback_lock);
866 static void smc_fback_error_report(struct sock *clcsk)
868 struct smc_sock *smc;
870 read_lock_bh(&clcsk->sk_callback_lock);
871 smc = smc_clcsock_user_data(clcsk);
873 smc_fback_forward_wakeup(smc, clcsk,
874 smc->clcsk_error_report);
875 read_unlock_bh(&clcsk->sk_callback_lock);
878 static void smc_fback_replace_callbacks(struct smc_sock *smc)
880 struct sock *clcsk = smc->clcsock->sk;
882 write_lock_bh(&clcsk->sk_callback_lock);
883 clcsk->sk_user_data = (void *)((uintptr_t)smc | SK_USER_DATA_NOCOPY);
885 smc_clcsock_replace_cb(&clcsk->sk_state_change, smc_fback_state_change,
886 &smc->clcsk_state_change);
887 smc_clcsock_replace_cb(&clcsk->sk_data_ready, smc_fback_data_ready,
888 &smc->clcsk_data_ready);
889 smc_clcsock_replace_cb(&clcsk->sk_write_space, smc_fback_write_space,
890 &smc->clcsk_write_space);
891 smc_clcsock_replace_cb(&clcsk->sk_error_report, smc_fback_error_report,
892 &smc->clcsk_error_report);
894 write_unlock_bh(&clcsk->sk_callback_lock);
897 static int smc_switch_to_fallback(struct smc_sock *smc, int reason_code)
901 mutex_lock(&smc->clcsock_release_lock);
907 smc->use_fallback = true;
908 smc->fallback_rsn = reason_code;
909 smc_stat_fallback(smc);
910 trace_smc_switch_to_fallback(smc, reason_code);
911 if (smc->sk.sk_socket && smc->sk.sk_socket->file) {
912 smc->clcsock->file = smc->sk.sk_socket->file;
913 smc->clcsock->file->private_data = smc->clcsock;
914 smc->clcsock->wq.fasync_list =
915 smc->sk.sk_socket->wq.fasync_list;
917 /* There might be some wait entries remaining
918 * in smc sk->sk_wq and they should be woken up
919 * as clcsock's wait queue is woken up.
921 smc_fback_replace_callbacks(smc);
924 mutex_unlock(&smc->clcsock_release_lock);
928 /* fall back during connect */
929 static int smc_connect_fallback(struct smc_sock *smc, int reason_code)
931 struct net *net = sock_net(&smc->sk);
934 rc = smc_switch_to_fallback(smc, reason_code);
935 if (rc) { /* fallback fails */
936 this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt);
937 if (smc->sk.sk_state == SMC_INIT)
938 sock_put(&smc->sk); /* passive closing */
941 smc_copy_sock_settings_to_clc(smc);
942 smc->connect_nonblock = 0;
943 if (smc->sk.sk_state == SMC_INIT)
944 smc->sk.sk_state = SMC_ACTIVE;
948 /* decline and fall back during connect */
949 static int smc_connect_decline_fallback(struct smc_sock *smc, int reason_code,
952 struct net *net = sock_net(&smc->sk);
955 if (reason_code < 0) { /* error, fallback is not possible */
956 this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt);
957 if (smc->sk.sk_state == SMC_INIT)
958 sock_put(&smc->sk); /* passive closing */
961 if (reason_code != SMC_CLC_DECL_PEERDECL) {
962 rc = smc_clc_send_decline(smc, reason_code, version);
964 this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt);
965 if (smc->sk.sk_state == SMC_INIT)
966 sock_put(&smc->sk); /* passive closing */
970 return smc_connect_fallback(smc, reason_code);
973 static void smc_conn_abort(struct smc_sock *smc, int local_first)
975 struct smc_connection *conn = &smc->conn;
976 struct smc_link_group *lgr = conn->lgr;
977 bool lgr_valid = false;
979 if (smc_conn_lgr_valid(conn))
983 if (local_first && lgr_valid)
984 smc_lgr_cleanup_early(lgr);
987 /* check if there is a rdma device available for this connection. */
988 /* called for connect and listen */
989 static int smc_find_rdma_device(struct smc_sock *smc, struct smc_init_info *ini)
991 /* PNET table look up: search active ib_device and port
992 * within same PNETID that also contains the ethernet device
993 * used for the internal TCP socket
995 smc_pnet_find_roce_resource(smc->clcsock->sk, ini);
996 if (!ini->check_smcrv2 && !ini->ib_dev)
997 return SMC_CLC_DECL_NOSMCRDEV;
998 if (ini->check_smcrv2 && !ini->smcrv2.ib_dev_v2)
999 return SMC_CLC_DECL_NOSMCRDEV;
1003 /* check if there is an ISM device available for this connection. */
1004 /* called for connect and listen */
1005 static int smc_find_ism_device(struct smc_sock *smc, struct smc_init_info *ini)
1007 /* Find ISM device with same PNETID as connecting interface */
1008 smc_pnet_find_ism_resource(smc->clcsock->sk, ini);
1009 if (!ini->ism_dev[0])
1010 return SMC_CLC_DECL_NOSMCDDEV;
1012 ini->ism_chid[0] = smc_ism_get_chid(ini->ism_dev[0]);
1016 /* is chid unique for the ism devices that are already determined? */
1017 static bool smc_find_ism_v2_is_unique_chid(u16 chid, struct smc_init_info *ini,
1020 int i = (!ini->ism_dev[0]) ? 1 : 0;
1022 for (; i < cnt; i++)
1023 if (ini->ism_chid[i] == chid)
1028 /* determine possible V2 ISM devices (either without PNETID or with PNETID plus
1029 * PNETID matching net_device)
1031 static int smc_find_ism_v2_device_clnt(struct smc_sock *smc,
1032 struct smc_init_info *ini)
1034 int rc = SMC_CLC_DECL_NOSMCDDEV;
1035 struct smcd_dev *smcd;
1039 if (smcd_indicated(ini->smc_type_v1))
1040 rc = 0; /* already initialized for V1 */
1041 mutex_lock(&smcd_dev_list.mutex);
1042 list_for_each_entry(smcd, &smcd_dev_list.list, list) {
1043 if (smcd->going_away || smcd == ini->ism_dev[0])
1045 chid = smc_ism_get_chid(smcd);
1046 if (!smc_find_ism_v2_is_unique_chid(chid, ini, i))
1048 if (!smc_pnet_is_pnetid_set(smcd->pnetid) ||
1049 smc_pnet_is_ndev_pnetid(sock_net(&smc->sk), smcd->pnetid)) {
1050 ini->ism_dev[i] = smcd;
1051 ini->ism_chid[i] = chid;
1052 ini->is_smcd = true;
1055 if (i > SMC_MAX_ISM_DEVS)
1059 mutex_unlock(&smcd_dev_list.mutex);
1060 ini->ism_offered_cnt = i - 1;
1061 if (!ini->ism_dev[0] && !ini->ism_dev[1])
1062 ini->smcd_version = 0;
1067 /* Check for VLAN ID and register it on ISM device just for CLC handshake */
1068 static int smc_connect_ism_vlan_setup(struct smc_sock *smc,
1069 struct smc_init_info *ini)
1071 if (ini->vlan_id && smc_ism_get_vlan(ini->ism_dev[0], ini->vlan_id))
1072 return SMC_CLC_DECL_ISMVLANERR;
1076 static int smc_find_proposal_devices(struct smc_sock *smc,
1077 struct smc_init_info *ini)
1081 /* check if there is an ism device available */
1082 if (!(ini->smcd_version & SMC_V1) ||
1083 smc_find_ism_device(smc, ini) ||
1084 smc_connect_ism_vlan_setup(smc, ini))
1085 ini->smcd_version &= ~SMC_V1;
1086 /* else ISM V1 is supported for this connection */
1088 /* check if there is an rdma device available */
1089 if (!(ini->smcr_version & SMC_V1) ||
1090 smc_find_rdma_device(smc, ini))
1091 ini->smcr_version &= ~SMC_V1;
1092 /* else RDMA is supported for this connection */
1094 ini->smc_type_v1 = smc_indicated_type(ini->smcd_version & SMC_V1,
1095 ini->smcr_version & SMC_V1);
1097 /* check if there is an ism v2 device available */
1098 if (!(ini->smcd_version & SMC_V2) ||
1099 !smc_ism_is_v2_capable() ||
1100 smc_find_ism_v2_device_clnt(smc, ini))
1101 ini->smcd_version &= ~SMC_V2;
1103 /* check if there is an rdma v2 device available */
1104 ini->check_smcrv2 = true;
1105 ini->smcrv2.saddr = smc->clcsock->sk->sk_rcv_saddr;
1106 if (!(ini->smcr_version & SMC_V2) ||
1107 smc->clcsock->sk->sk_family != AF_INET ||
1108 !smc_clc_ueid_count() ||
1109 smc_find_rdma_device(smc, ini))
1110 ini->smcr_version &= ~SMC_V2;
1111 ini->check_smcrv2 = false;
1113 ini->smc_type_v2 = smc_indicated_type(ini->smcd_version & SMC_V2,
1114 ini->smcr_version & SMC_V2);
1116 /* if neither ISM nor RDMA are supported, fallback */
1117 if (ini->smc_type_v1 == SMC_TYPE_N && ini->smc_type_v2 == SMC_TYPE_N)
1118 rc = SMC_CLC_DECL_NOSMCDEV;
1123 /* cleanup temporary VLAN ID registration used for CLC handshake. If ISM is
1124 * used, the VLAN ID will be registered again during the connection setup.
1126 static int smc_connect_ism_vlan_cleanup(struct smc_sock *smc,
1127 struct smc_init_info *ini)
1129 if (!smcd_indicated(ini->smc_type_v1))
1131 if (ini->vlan_id && smc_ism_put_vlan(ini->ism_dev[0], ini->vlan_id))
1132 return SMC_CLC_DECL_CNFERR;
1136 #define SMC_CLC_MAX_ACCEPT_LEN \
1137 (sizeof(struct smc_clc_msg_accept_confirm_v2) + \
1138 sizeof(struct smc_clc_first_contact_ext) + \
1139 sizeof(struct smc_clc_msg_trail))
1141 /* CLC handshake during connect */
1142 static int smc_connect_clc(struct smc_sock *smc,
1143 struct smc_clc_msg_accept_confirm_v2 *aclc2,
1144 struct smc_init_info *ini)
1148 /* do inband token exchange */
1149 rc = smc_clc_send_proposal(smc, ini);
1152 /* receive SMC Accept CLC message */
1153 return smc_clc_wait_msg(smc, aclc2, SMC_CLC_MAX_ACCEPT_LEN,
1154 SMC_CLC_ACCEPT, CLC_WAIT_TIME);
1157 void smc_fill_gid_list(struct smc_link_group *lgr,
1158 struct smc_gidlist *gidlist,
1159 struct smc_ib_device *known_dev, u8 *known_gid)
1161 struct smc_init_info *alt_ini = NULL;
1163 memset(gidlist, 0, sizeof(*gidlist));
1164 memcpy(gidlist->list[gidlist->len++], known_gid, SMC_GID_SIZE);
1166 alt_ini = kzalloc(sizeof(*alt_ini), GFP_KERNEL);
1170 alt_ini->vlan_id = lgr->vlan_id;
1171 alt_ini->check_smcrv2 = true;
1172 alt_ini->smcrv2.saddr = lgr->saddr;
1173 smc_pnet_find_alt_roce(lgr, alt_ini, known_dev);
1175 if (!alt_ini->smcrv2.ib_dev_v2)
1178 memcpy(gidlist->list[gidlist->len++], alt_ini->smcrv2.ib_gid_v2,
1185 static int smc_connect_rdma_v2_prepare(struct smc_sock *smc,
1186 struct smc_clc_msg_accept_confirm *aclc,
1187 struct smc_init_info *ini)
1189 struct smc_clc_msg_accept_confirm_v2 *clc_v2 =
1190 (struct smc_clc_msg_accept_confirm_v2 *)aclc;
1191 struct smc_clc_first_contact_ext *fce =
1192 (struct smc_clc_first_contact_ext *)
1193 (((u8 *)clc_v2) + sizeof(*clc_v2));
1194 struct net *net = sock_net(&smc->sk);
1196 if (!ini->first_contact_peer || aclc->hdr.version == SMC_V1)
1199 if (fce->v2_direct) {
1200 memcpy(ini->smcrv2.nexthop_mac, &aclc->r0.lcl.mac, ETH_ALEN);
1201 ini->smcrv2.uses_gateway = false;
1203 if (smc_ib_find_route(net, smc->clcsock->sk->sk_rcv_saddr,
1204 smc_ib_gid_to_ipv4(aclc->r0.lcl.gid),
1205 ini->smcrv2.nexthop_mac,
1206 &ini->smcrv2.uses_gateway))
1207 return SMC_CLC_DECL_NOROUTE;
1208 if (!ini->smcrv2.uses_gateway) {
1209 /* mismatch: peer claims indirect, but its direct */
1210 return SMC_CLC_DECL_NOINDIRECT;
1216 /* setup for RDMA connection of client */
1217 static int smc_connect_rdma(struct smc_sock *smc,
1218 struct smc_clc_msg_accept_confirm *aclc,
1219 struct smc_init_info *ini)
1221 int i, reason_code = 0;
1222 struct smc_link *link;
1225 ini->is_smcd = false;
1226 ini->ib_clcqpn = ntoh24(aclc->r0.qpn);
1227 ini->first_contact_peer = aclc->hdr.typev2 & SMC_FIRST_CONTACT_MASK;
1228 memcpy(ini->peer_systemid, aclc->r0.lcl.id_for_peer, SMC_SYSTEMID_LEN);
1229 memcpy(ini->peer_gid, aclc->r0.lcl.gid, SMC_GID_SIZE);
1230 memcpy(ini->peer_mac, aclc->r0.lcl.mac, ETH_ALEN);
1232 reason_code = smc_connect_rdma_v2_prepare(smc, aclc, ini);
1236 mutex_lock(&smc_client_lgr_pending);
1237 reason_code = smc_conn_create(smc, ini);
1239 mutex_unlock(&smc_client_lgr_pending);
1243 smc_conn_save_peer_info(smc, aclc);
1245 if (ini->first_contact_local) {
1246 link = smc->conn.lnk;
1248 /* set link that was assigned by server */
1250 for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) {
1251 struct smc_link *l = &smc->conn.lgr->lnk[i];
1253 if (l->peer_qpn == ntoh24(aclc->r0.qpn) &&
1254 !memcmp(l->peer_gid, &aclc->r0.lcl.gid,
1256 (aclc->hdr.version > SMC_V1 ||
1257 !memcmp(l->peer_mac, &aclc->r0.lcl.mac,
1258 sizeof(l->peer_mac)))) {
1264 reason_code = SMC_CLC_DECL_NOSRVLINK;
1267 smc_switch_link_and_count(&smc->conn, link);
1270 /* create send buffer and rmb */
1271 if (smc_buf_create(smc, false)) {
1272 reason_code = SMC_CLC_DECL_MEM;
1276 if (ini->first_contact_local)
1277 smc_link_save_peer_info(link, aclc, ini);
1279 if (smc_rmb_rtoken_handling(&smc->conn, link, aclc)) {
1280 reason_code = SMC_CLC_DECL_ERR_RTOK;
1284 smc_close_init(smc);
1287 if (ini->first_contact_local) {
1288 if (smc_ib_ready_link(link)) {
1289 reason_code = SMC_CLC_DECL_ERR_RDYLNK;
1293 /* reg sendbufs if they were vzalloced */
1294 if (smc->conn.sndbuf_desc->is_vm) {
1295 if (smcr_lgr_reg_sndbufs(link, smc->conn.sndbuf_desc)) {
1296 reason_code = SMC_CLC_DECL_ERR_REGBUF;
1300 if (smcr_lgr_reg_rmbs(link, smc->conn.rmb_desc)) {
1301 reason_code = SMC_CLC_DECL_ERR_REGBUF;
1306 if (aclc->hdr.version > SMC_V1) {
1307 struct smc_clc_msg_accept_confirm_v2 *clc_v2 =
1308 (struct smc_clc_msg_accept_confirm_v2 *)aclc;
1310 eid = clc_v2->r1.eid;
1311 if (ini->first_contact_local)
1312 smc_fill_gid_list(link->lgr, &ini->smcrv2.gidlist,
1313 link->smcibdev, link->gid);
1316 reason_code = smc_clc_send_confirm(smc, ini->first_contact_local,
1317 aclc->hdr.version, eid, ini);
1323 if (ini->first_contact_local) {
1324 /* QP confirmation over RoCE fabric */
1325 smc_llc_flow_initiate(link->lgr, SMC_LLC_FLOW_ADD_LINK);
1326 reason_code = smcr_clnt_conf_first_link(smc);
1327 smc_llc_flow_stop(link->lgr, &link->lgr->llc_flow_lcl);
1331 mutex_unlock(&smc_client_lgr_pending);
1333 smc_copy_sock_settings_to_clc(smc);
1334 smc->connect_nonblock = 0;
1335 if (smc->sk.sk_state == SMC_INIT)
1336 smc->sk.sk_state = SMC_ACTIVE;
1340 smc_conn_abort(smc, ini->first_contact_local);
1341 mutex_unlock(&smc_client_lgr_pending);
1342 smc->connect_nonblock = 0;
1347 /* The server has chosen one of the proposed ISM devices for the communication.
1348 * Determine from the CHID of the received CLC ACCEPT the ISM device chosen.
1351 smc_v2_determine_accepted_chid(struct smc_clc_msg_accept_confirm_v2 *aclc,
1352 struct smc_init_info *ini)
1356 for (i = 0; i < ini->ism_offered_cnt + 1; i++) {
1357 if (ini->ism_chid[i] == ntohs(aclc->d1.chid)) {
1358 ini->ism_selected = i;
1366 /* setup for ISM connection of client */
1367 static int smc_connect_ism(struct smc_sock *smc,
1368 struct smc_clc_msg_accept_confirm *aclc,
1369 struct smc_init_info *ini)
1374 ini->is_smcd = true;
1375 ini->first_contact_peer = aclc->hdr.typev2 & SMC_FIRST_CONTACT_MASK;
1377 if (aclc->hdr.version == SMC_V2) {
1378 struct smc_clc_msg_accept_confirm_v2 *aclc_v2 =
1379 (struct smc_clc_msg_accept_confirm_v2 *)aclc;
1381 rc = smc_v2_determine_accepted_chid(aclc_v2, ini);
1385 ini->ism_peer_gid[ini->ism_selected] = aclc->d0.gid;
1387 /* there is only one lgr role for SMC-D; use server lock */
1388 mutex_lock(&smc_server_lgr_pending);
1389 rc = smc_conn_create(smc, ini);
1391 mutex_unlock(&smc_server_lgr_pending);
1395 /* Create send and receive buffers */
1396 rc = smc_buf_create(smc, true);
1398 rc = (rc == -ENOSPC) ? SMC_CLC_DECL_MAX_DMB : SMC_CLC_DECL_MEM;
1402 smc_conn_save_peer_info(smc, aclc);
1403 smc_close_init(smc);
1407 if (aclc->hdr.version > SMC_V1) {
1408 struct smc_clc_msg_accept_confirm_v2 *clc_v2 =
1409 (struct smc_clc_msg_accept_confirm_v2 *)aclc;
1411 eid = clc_v2->d1.eid;
1414 rc = smc_clc_send_confirm(smc, ini->first_contact_local,
1415 aclc->hdr.version, eid, NULL);
1418 mutex_unlock(&smc_server_lgr_pending);
1420 smc_copy_sock_settings_to_clc(smc);
1421 smc->connect_nonblock = 0;
1422 if (smc->sk.sk_state == SMC_INIT)
1423 smc->sk.sk_state = SMC_ACTIVE;
1427 smc_conn_abort(smc, ini->first_contact_local);
1428 mutex_unlock(&smc_server_lgr_pending);
1429 smc->connect_nonblock = 0;
1434 /* check if received accept type and version matches a proposed one */
1435 static int smc_connect_check_aclc(struct smc_init_info *ini,
1436 struct smc_clc_msg_accept_confirm *aclc)
1438 if (aclc->hdr.typev1 != SMC_TYPE_R &&
1439 aclc->hdr.typev1 != SMC_TYPE_D)
1440 return SMC_CLC_DECL_MODEUNSUPP;
1442 if (aclc->hdr.version >= SMC_V2) {
1443 if ((aclc->hdr.typev1 == SMC_TYPE_R &&
1444 !smcr_indicated(ini->smc_type_v2)) ||
1445 (aclc->hdr.typev1 == SMC_TYPE_D &&
1446 !smcd_indicated(ini->smc_type_v2)))
1447 return SMC_CLC_DECL_MODEUNSUPP;
1449 if ((aclc->hdr.typev1 == SMC_TYPE_R &&
1450 !smcr_indicated(ini->smc_type_v1)) ||
1451 (aclc->hdr.typev1 == SMC_TYPE_D &&
1452 !smcd_indicated(ini->smc_type_v1)))
1453 return SMC_CLC_DECL_MODEUNSUPP;
1459 /* perform steps before actually connecting */
1460 static int __smc_connect(struct smc_sock *smc)
1462 u8 version = smc_ism_is_v2_capable() ? SMC_V2 : SMC_V1;
1463 struct smc_clc_msg_accept_confirm_v2 *aclc2;
1464 struct smc_clc_msg_accept_confirm *aclc;
1465 struct smc_init_info *ini = NULL;
1469 if (smc->use_fallback)
1470 return smc_connect_fallback(smc, smc->fallback_rsn);
1472 /* if peer has not signalled SMC-capability, fall back */
1473 if (!tcp_sk(smc->clcsock->sk)->syn_smc)
1474 return smc_connect_fallback(smc, SMC_CLC_DECL_PEERNOSMC);
1476 /* IPSec connections opt out of SMC optimizations */
1477 if (using_ipsec(smc))
1478 return smc_connect_decline_fallback(smc, SMC_CLC_DECL_IPSEC,
1481 ini = kzalloc(sizeof(*ini), GFP_KERNEL);
1483 return smc_connect_decline_fallback(smc, SMC_CLC_DECL_MEM,
1486 ini->smcd_version = SMC_V1 | SMC_V2;
1487 ini->smcr_version = SMC_V1 | SMC_V2;
1488 ini->smc_type_v1 = SMC_TYPE_B;
1489 ini->smc_type_v2 = SMC_TYPE_B;
1491 /* get vlan id from IP device */
1492 if (smc_vlan_by_tcpsk(smc->clcsock, ini)) {
1493 ini->smcd_version &= ~SMC_V1;
1494 ini->smcr_version = 0;
1495 ini->smc_type_v1 = SMC_TYPE_N;
1496 if (!ini->smcd_version) {
1497 rc = SMC_CLC_DECL_GETVLANERR;
1502 rc = smc_find_proposal_devices(smc, ini);
1506 buf = kzalloc(SMC_CLC_MAX_ACCEPT_LEN, GFP_KERNEL);
1508 rc = SMC_CLC_DECL_MEM;
1511 aclc2 = (struct smc_clc_msg_accept_confirm_v2 *)buf;
1512 aclc = (struct smc_clc_msg_accept_confirm *)aclc2;
1514 /* perform CLC handshake */
1515 rc = smc_connect_clc(smc, aclc2, ini);
1517 /* -EAGAIN on timeout, see tcp_recvmsg() */
1518 if (rc == -EAGAIN) {
1520 smc->sk.sk_err = ETIMEDOUT;
1525 /* check if smc modes and versions of CLC proposal and accept match */
1526 rc = smc_connect_check_aclc(ini, aclc);
1527 version = aclc->hdr.version == SMC_V1 ? SMC_V1 : SMC_V2;
1531 /* depending on previous steps, connect using rdma or ism */
1532 if (aclc->hdr.typev1 == SMC_TYPE_R) {
1533 ini->smcr_version = version;
1534 rc = smc_connect_rdma(smc, aclc, ini);
1535 } else if (aclc->hdr.typev1 == SMC_TYPE_D) {
1536 ini->smcd_version = version;
1537 rc = smc_connect_ism(smc, aclc, ini);
1542 SMC_STAT_CLNT_SUCC_INC(sock_net(smc->clcsock->sk), aclc);
1543 smc_connect_ism_vlan_cleanup(smc, ini);
1549 smc_connect_ism_vlan_cleanup(smc, ini);
1553 return smc_connect_decline_fallback(smc, rc, version);
1556 static void smc_connect_work(struct work_struct *work)
1558 struct smc_sock *smc = container_of(work, struct smc_sock,
1560 long timeo = smc->sk.sk_sndtimeo;
1564 timeo = MAX_SCHEDULE_TIMEOUT;
1565 lock_sock(smc->clcsock->sk);
1566 if (smc->clcsock->sk->sk_err) {
1567 smc->sk.sk_err = smc->clcsock->sk->sk_err;
1568 } else if ((1 << smc->clcsock->sk->sk_state) &
1569 (TCPF_SYN_SENT | TCPF_SYN_RECV)) {
1570 rc = sk_stream_wait_connect(smc->clcsock->sk, &timeo);
1571 if ((rc == -EPIPE) &&
1572 ((1 << smc->clcsock->sk->sk_state) &
1573 (TCPF_ESTABLISHED | TCPF_CLOSE_WAIT)))
1576 release_sock(smc->clcsock->sk);
1577 lock_sock(&smc->sk);
1578 if (rc != 0 || smc->sk.sk_err) {
1579 smc->sk.sk_state = SMC_CLOSED;
1580 if (rc == -EPIPE || rc == -EAGAIN)
1581 smc->sk.sk_err = EPIPE;
1582 else if (rc == -ECONNREFUSED)
1583 smc->sk.sk_err = ECONNREFUSED;
1584 else if (signal_pending(current))
1585 smc->sk.sk_err = -sock_intr_errno(timeo);
1586 sock_put(&smc->sk); /* passive closing */
1590 rc = __smc_connect(smc);
1592 smc->sk.sk_err = -rc;
1595 if (!sock_flag(&smc->sk, SOCK_DEAD)) {
1596 if (smc->sk.sk_err) {
1597 smc->sk.sk_state_change(&smc->sk);
1598 } else { /* allow polling before and after fallback decision */
1599 smc->clcsock->sk->sk_write_space(smc->clcsock->sk);
1600 smc->sk.sk_write_space(&smc->sk);
1603 release_sock(&smc->sk);
1606 static int smc_connect(struct socket *sock, struct sockaddr *addr,
1607 int alen, int flags)
1609 struct sock *sk = sock->sk;
1610 struct smc_sock *smc;
1615 /* separate smc parameter checking to be safe */
1616 if (alen < sizeof(addr->sa_family))
1618 if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6)
1622 switch (sock->state) {
1627 rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
1630 if (sk->sk_state == SMC_ACTIVE)
1633 case SS_UNCONNECTED:
1634 sock->state = SS_CONNECTING;
1638 switch (sk->sk_state) {
1642 rc = sock_error(sk) ? : -ECONNABORTED;
1643 sock->state = SS_UNCONNECTED;
1652 smc_copy_sock_settings_to_clc(smc);
1653 tcp_sk(smc->clcsock->sk)->syn_smc = 1;
1654 if (smc->connect_nonblock) {
1658 rc = kernel_connect(smc->clcsock, addr, alen, flags);
1659 if (rc && rc != -EINPROGRESS)
1662 if (smc->use_fallback) {
1663 sock->state = rc ? SS_CONNECTING : SS_CONNECTED;
1666 sock_hold(&smc->sk); /* sock put in passive closing */
1667 if (flags & O_NONBLOCK) {
1668 if (queue_work(smc_hs_wq, &smc->connect_work))
1669 smc->connect_nonblock = 1;
1673 rc = __smc_connect(smc);
1680 sock->state = SS_CONNECTED;
1687 static int smc_clcsock_accept(struct smc_sock *lsmc, struct smc_sock **new_smc)
1689 struct socket *new_clcsock = NULL;
1690 struct sock *lsk = &lsmc->sk;
1691 struct sock *new_sk;
1695 new_sk = smc_sock_alloc(sock_net(lsk), NULL, lsk->sk_protocol);
1698 lsk->sk_err = ENOMEM;
1703 *new_smc = smc_sk(new_sk);
1705 mutex_lock(&lsmc->clcsock_release_lock);
1707 rc = kernel_accept(lsmc->clcsock, &new_clcsock, SOCK_NONBLOCK);
1708 mutex_unlock(&lsmc->clcsock_release_lock);
1710 if (rc < 0 && rc != -EAGAIN)
1712 if (rc < 0 || lsk->sk_state == SMC_CLOSED) {
1713 new_sk->sk_prot->unhash(new_sk);
1715 sock_release(new_clcsock);
1716 new_sk->sk_state = SMC_CLOSED;
1717 smc_sock_set_flag(new_sk, SOCK_DEAD);
1718 sock_put(new_sk); /* final */
1723 /* new clcsock has inherited the smc listen-specific sk_data_ready
1724 * function; switch it back to the original sk_data_ready function
1726 new_clcsock->sk->sk_data_ready = lsmc->clcsk_data_ready;
1728 /* if new clcsock has also inherited the fallback-specific callback
1729 * functions, switch them back to the original ones.
1731 if (lsmc->use_fallback) {
1732 if (lsmc->clcsk_state_change)
1733 new_clcsock->sk->sk_state_change = lsmc->clcsk_state_change;
1734 if (lsmc->clcsk_write_space)
1735 new_clcsock->sk->sk_write_space = lsmc->clcsk_write_space;
1736 if (lsmc->clcsk_error_report)
1737 new_clcsock->sk->sk_error_report = lsmc->clcsk_error_report;
1740 (*new_smc)->clcsock = new_clcsock;
1745 /* add a just created sock to the accept queue of the listen sock as
1746 * candidate for a following socket accept call from user space
1748 static void smc_accept_enqueue(struct sock *parent, struct sock *sk)
1750 struct smc_sock *par = smc_sk(parent);
1752 sock_hold(sk); /* sock_put in smc_accept_unlink () */
1753 spin_lock(&par->accept_q_lock);
1754 list_add_tail(&smc_sk(sk)->accept_q, &par->accept_q);
1755 spin_unlock(&par->accept_q_lock);
1756 sk_acceptq_added(parent);
1759 /* remove a socket from the accept queue of its parental listening socket */
1760 static void smc_accept_unlink(struct sock *sk)
1762 struct smc_sock *par = smc_sk(sk)->listen_smc;
1764 spin_lock(&par->accept_q_lock);
1765 list_del_init(&smc_sk(sk)->accept_q);
1766 spin_unlock(&par->accept_q_lock);
1767 sk_acceptq_removed(&smc_sk(sk)->listen_smc->sk);
1768 sock_put(sk); /* sock_hold in smc_accept_enqueue */
1771 /* remove a sock from the accept queue to bind it to a new socket created
1772 * for a socket accept call from user space
1774 struct sock *smc_accept_dequeue(struct sock *parent,
1775 struct socket *new_sock)
1777 struct smc_sock *isk, *n;
1778 struct sock *new_sk;
1780 list_for_each_entry_safe(isk, n, &smc_sk(parent)->accept_q, accept_q) {
1781 new_sk = (struct sock *)isk;
1783 smc_accept_unlink(new_sk);
1784 if (new_sk->sk_state == SMC_CLOSED) {
1785 new_sk->sk_prot->unhash(new_sk);
1787 sock_release(isk->clcsock);
1788 isk->clcsock = NULL;
1790 sock_put(new_sk); /* final */
1794 sock_graft(new_sk, new_sock);
1795 new_sock->state = SS_CONNECTED;
1796 if (isk->use_fallback) {
1797 smc_sk(new_sk)->clcsock->file = new_sock->file;
1798 isk->clcsock->file->private_data = isk->clcsock;
1806 /* clean up for a created but never accepted sock */
1807 void smc_close_non_accepted(struct sock *sk)
1809 struct smc_sock *smc = smc_sk(sk);
1811 sock_hold(sk); /* sock_put below */
1813 if (!sk->sk_lingertime)
1814 /* wait for peer closing */
1815 WRITE_ONCE(sk->sk_lingertime, SMC_MAX_STREAM_WAIT_TIMEOUT);
1818 sock_put(sk); /* sock_hold above */
1819 sock_put(sk); /* final sock_put */
1822 static int smcr_serv_conf_first_link(struct smc_sock *smc)
1824 struct smc_link *link = smc->conn.lnk;
1825 struct smc_llc_qentry *qentry;
1828 /* reg the sndbuf if it was vzalloced*/
1829 if (smc->conn.sndbuf_desc->is_vm) {
1830 if (smcr_link_reg_buf(link, smc->conn.sndbuf_desc))
1831 return SMC_CLC_DECL_ERR_REGBUF;
1835 if (smcr_link_reg_buf(link, smc->conn.rmb_desc))
1836 return SMC_CLC_DECL_ERR_REGBUF;
1838 /* send CONFIRM LINK request to client over the RoCE fabric */
1839 rc = smc_llc_send_confirm_link(link, SMC_LLC_REQ);
1841 return SMC_CLC_DECL_TIMEOUT_CL;
1843 /* receive CONFIRM LINK response from client over the RoCE fabric */
1844 qentry = smc_llc_wait(link->lgr, link, SMC_LLC_WAIT_TIME,
1845 SMC_LLC_CONFIRM_LINK);
1847 struct smc_clc_msg_decline dclc;
1849 rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
1850 SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT);
1851 return rc == -EAGAIN ? SMC_CLC_DECL_TIMEOUT_CL : rc;
1853 smc_llc_save_peer_uid(qentry);
1854 rc = smc_llc_eval_conf_link(qentry, SMC_LLC_RESP);
1855 smc_llc_flow_qentry_del(&link->lgr->llc_flow_lcl);
1857 return SMC_CLC_DECL_RMBE_EC;
1859 /* confirm_rkey is implicit on 1st contact */
1860 smc->conn.rmb_desc->is_conf_rkey = true;
1862 smc_llc_link_active(link);
1863 smcr_lgr_set_type(link->lgr, SMC_LGR_SINGLE);
1865 mutex_lock(&link->lgr->llc_conf_mutex);
1866 /* initial contact - try to establish second link */
1867 smc_llc_srv_add_link(link, NULL);
1868 mutex_unlock(&link->lgr->llc_conf_mutex);
1872 /* listen worker: finish */
1873 static void smc_listen_out(struct smc_sock *new_smc)
1875 struct smc_sock *lsmc = new_smc->listen_smc;
1876 struct sock *newsmcsk = &new_smc->sk;
1878 if (tcp_sk(new_smc->clcsock->sk)->syn_smc)
1879 atomic_dec(&lsmc->queued_smc_hs);
1881 if (lsmc->sk.sk_state == SMC_LISTEN) {
1882 lock_sock_nested(&lsmc->sk, SINGLE_DEPTH_NESTING);
1883 smc_accept_enqueue(&lsmc->sk, newsmcsk);
1884 release_sock(&lsmc->sk);
1885 } else { /* no longer listening */
1886 smc_close_non_accepted(newsmcsk);
1889 /* Wake up accept */
1890 lsmc->sk.sk_data_ready(&lsmc->sk);
1891 sock_put(&lsmc->sk); /* sock_hold in smc_tcp_listen_work */
1894 /* listen worker: finish in state connected */
1895 static void smc_listen_out_connected(struct smc_sock *new_smc)
1897 struct sock *newsmcsk = &new_smc->sk;
1899 if (newsmcsk->sk_state == SMC_INIT)
1900 newsmcsk->sk_state = SMC_ACTIVE;
1902 smc_listen_out(new_smc);
1905 /* listen worker: finish in error state */
1906 static void smc_listen_out_err(struct smc_sock *new_smc)
1908 struct sock *newsmcsk = &new_smc->sk;
1909 struct net *net = sock_net(newsmcsk);
1911 this_cpu_inc(net->smc.smc_stats->srv_hshake_err_cnt);
1912 if (newsmcsk->sk_state == SMC_INIT)
1913 sock_put(&new_smc->sk); /* passive closing */
1914 newsmcsk->sk_state = SMC_CLOSED;
1916 smc_listen_out(new_smc);
1919 /* listen worker: decline and fall back if possible */
1920 static void smc_listen_decline(struct smc_sock *new_smc, int reason_code,
1921 int local_first, u8 version)
1923 /* RDMA setup failed, switch back to TCP */
1924 smc_conn_abort(new_smc, local_first);
1925 if (reason_code < 0 ||
1926 smc_switch_to_fallback(new_smc, reason_code)) {
1927 /* error, no fallback possible */
1928 smc_listen_out_err(new_smc);
1931 if (reason_code && reason_code != SMC_CLC_DECL_PEERDECL) {
1932 if (smc_clc_send_decline(new_smc, reason_code, version) < 0) {
1933 smc_listen_out_err(new_smc);
1937 smc_listen_out_connected(new_smc);
1940 /* listen worker: version checking */
1941 static int smc_listen_v2_check(struct smc_sock *new_smc,
1942 struct smc_clc_msg_proposal *pclc,
1943 struct smc_init_info *ini)
1945 struct smc_clc_smcd_v2_extension *pclc_smcd_v2_ext;
1946 struct smc_clc_v2_extension *pclc_v2_ext;
1947 int rc = SMC_CLC_DECL_PEERNOSMC;
1949 ini->smc_type_v1 = pclc->hdr.typev1;
1950 ini->smc_type_v2 = pclc->hdr.typev2;
1951 ini->smcd_version = smcd_indicated(ini->smc_type_v1) ? SMC_V1 : 0;
1952 ini->smcr_version = smcr_indicated(ini->smc_type_v1) ? SMC_V1 : 0;
1953 if (pclc->hdr.version > SMC_V1) {
1954 if (smcd_indicated(ini->smc_type_v2))
1955 ini->smcd_version |= SMC_V2;
1956 if (smcr_indicated(ini->smc_type_v2))
1957 ini->smcr_version |= SMC_V2;
1959 if (!(ini->smcd_version & SMC_V2) && !(ini->smcr_version & SMC_V2)) {
1960 rc = SMC_CLC_DECL_PEERNOSMC;
1963 pclc_v2_ext = smc_get_clc_v2_ext(pclc);
1965 ini->smcd_version &= ~SMC_V2;
1966 ini->smcr_version &= ~SMC_V2;
1967 rc = SMC_CLC_DECL_NOV2EXT;
1970 pclc_smcd_v2_ext = smc_get_clc_smcd_v2_ext(pclc_v2_ext);
1971 if (ini->smcd_version & SMC_V2) {
1972 if (!smc_ism_is_v2_capable()) {
1973 ini->smcd_version &= ~SMC_V2;
1974 rc = SMC_CLC_DECL_NOISM2SUPP;
1975 } else if (!pclc_smcd_v2_ext) {
1976 ini->smcd_version &= ~SMC_V2;
1977 rc = SMC_CLC_DECL_NOV2DEXT;
1978 } else if (!pclc_v2_ext->hdr.eid_cnt &&
1979 !pclc_v2_ext->hdr.flag.seid) {
1980 ini->smcd_version &= ~SMC_V2;
1981 rc = SMC_CLC_DECL_NOUEID;
1984 if (ini->smcr_version & SMC_V2) {
1985 if (!pclc_v2_ext->hdr.eid_cnt) {
1986 ini->smcr_version &= ~SMC_V2;
1987 rc = SMC_CLC_DECL_NOUEID;
1992 if (!ini->smcd_version && !ini->smcr_version)
1998 /* listen worker: check prefixes */
1999 static int smc_listen_prfx_check(struct smc_sock *new_smc,
2000 struct smc_clc_msg_proposal *pclc)
2002 struct smc_clc_msg_proposal_prefix *pclc_prfx;
2003 struct socket *newclcsock = new_smc->clcsock;
2005 if (pclc->hdr.typev1 == SMC_TYPE_N)
2007 pclc_prfx = smc_clc_proposal_get_prefix(pclc);
2008 if (smc_clc_prfx_match(newclcsock, pclc_prfx))
2009 return SMC_CLC_DECL_DIFFPREFIX;
2014 /* listen worker: initialize connection and buffers */
2015 static int smc_listen_rdma_init(struct smc_sock *new_smc,
2016 struct smc_init_info *ini)
2020 /* allocate connection / link group */
2021 rc = smc_conn_create(new_smc, ini);
2025 /* create send buffer and rmb */
2026 if (smc_buf_create(new_smc, false)) {
2027 smc_conn_abort(new_smc, ini->first_contact_local);
2028 return SMC_CLC_DECL_MEM;
2034 /* listen worker: initialize connection and buffers for SMC-D */
2035 static int smc_listen_ism_init(struct smc_sock *new_smc,
2036 struct smc_init_info *ini)
2040 rc = smc_conn_create(new_smc, ini);
2044 /* Create send and receive buffers */
2045 rc = smc_buf_create(new_smc, true);
2047 smc_conn_abort(new_smc, ini->first_contact_local);
2048 return (rc == -ENOSPC) ? SMC_CLC_DECL_MAX_DMB :
2055 static bool smc_is_already_selected(struct smcd_dev *smcd,
2056 struct smc_init_info *ini,
2061 for (i = 0; i < matches; i++)
2062 if (smcd == ini->ism_dev[i])
2068 /* check for ISM devices matching proposed ISM devices */
2069 static void smc_check_ism_v2_match(struct smc_init_info *ini,
2070 u16 proposed_chid, u64 proposed_gid,
2071 unsigned int *matches)
2073 struct smcd_dev *smcd;
2075 list_for_each_entry(smcd, &smcd_dev_list.list, list) {
2076 if (smcd->going_away)
2078 if (smc_is_already_selected(smcd, ini, *matches))
2080 if (smc_ism_get_chid(smcd) == proposed_chid &&
2081 !smc_ism_cantalk(proposed_gid, ISM_RESERVED_VLANID, smcd)) {
2082 ini->ism_peer_gid[*matches] = proposed_gid;
2083 ini->ism_dev[*matches] = smcd;
2090 static void smc_find_ism_store_rc(u32 rc, struct smc_init_info *ini)
2096 static void smc_find_ism_v2_device_serv(struct smc_sock *new_smc,
2097 struct smc_clc_msg_proposal *pclc,
2098 struct smc_init_info *ini)
2100 struct smc_clc_smcd_v2_extension *smcd_v2_ext;
2101 struct smc_clc_v2_extension *smc_v2_ext;
2102 struct smc_clc_msg_smcd *pclc_smcd;
2103 unsigned int matches = 0;
2108 if (!(ini->smcd_version & SMC_V2) || !smcd_indicated(ini->smc_type_v2))
2111 pclc_smcd = smc_get_clc_msg_smcd(pclc);
2112 smc_v2_ext = smc_get_clc_v2_ext(pclc);
2113 smcd_v2_ext = smc_get_clc_smcd_v2_ext(smc_v2_ext);
2115 mutex_lock(&smcd_dev_list.mutex);
2116 if (pclc_smcd->ism.chid)
2117 /* check for ISM device matching proposed native ISM device */
2118 smc_check_ism_v2_match(ini, ntohs(pclc_smcd->ism.chid),
2119 ntohll(pclc_smcd->ism.gid), &matches);
2120 for (i = 1; i <= smc_v2_ext->hdr.ism_gid_cnt; i++) {
2121 /* check for ISM devices matching proposed non-native ISM
2124 smc_check_ism_v2_match(ini,
2125 ntohs(smcd_v2_ext->gidchid[i - 1].chid),
2126 ntohll(smcd_v2_ext->gidchid[i - 1].gid),
2129 mutex_unlock(&smcd_dev_list.mutex);
2131 if (!ini->ism_dev[0]) {
2132 smc_find_ism_store_rc(SMC_CLC_DECL_NOSMCD2DEV, ini);
2136 smc_ism_get_system_eid(&eid);
2137 if (!smc_clc_match_eid(ini->negotiated_eid, smc_v2_ext,
2138 smcd_v2_ext->system_eid, eid))
2141 /* separate - outside the smcd_dev_list.lock */
2142 smcd_version = ini->smcd_version;
2143 for (i = 0; i < matches; i++) {
2144 ini->smcd_version = SMC_V2;
2145 ini->is_smcd = true;
2146 ini->ism_selected = i;
2147 rc = smc_listen_ism_init(new_smc, ini);
2149 smc_find_ism_store_rc(rc, ini);
2150 /* try next active ISM device */
2153 return; /* matching and usable V2 ISM device found */
2155 /* no V2 ISM device could be initialized */
2156 ini->smcd_version = smcd_version; /* restore original value */
2157 ini->negotiated_eid[0] = 0;
2160 ini->smcd_version &= ~SMC_V2;
2161 ini->ism_dev[0] = NULL;
2162 ini->is_smcd = false;
2165 static void smc_find_ism_v1_device_serv(struct smc_sock *new_smc,
2166 struct smc_clc_msg_proposal *pclc,
2167 struct smc_init_info *ini)
2169 struct smc_clc_msg_smcd *pclc_smcd = smc_get_clc_msg_smcd(pclc);
2172 /* check if ISM V1 is available */
2173 if (!(ini->smcd_version & SMC_V1) || !smcd_indicated(ini->smc_type_v1))
2175 ini->is_smcd = true; /* prepare ISM check */
2176 ini->ism_peer_gid[0] = ntohll(pclc_smcd->ism.gid);
2177 rc = smc_find_ism_device(new_smc, ini);
2180 ini->ism_selected = 0;
2181 rc = smc_listen_ism_init(new_smc, ini);
2183 return; /* V1 ISM device found */
2186 smc_find_ism_store_rc(rc, ini);
2187 ini->smcd_version &= ~SMC_V1;
2188 ini->ism_dev[0] = NULL;
2189 ini->is_smcd = false;
2192 /* listen worker: register buffers */
2193 static int smc_listen_rdma_reg(struct smc_sock *new_smc, bool local_first)
2195 struct smc_connection *conn = &new_smc->conn;
2198 /* reg sendbufs if they were vzalloced */
2199 if (conn->sndbuf_desc->is_vm) {
2200 if (smcr_lgr_reg_sndbufs(conn->lnk,
2202 return SMC_CLC_DECL_ERR_REGBUF;
2204 if (smcr_lgr_reg_rmbs(conn->lnk, conn->rmb_desc))
2205 return SMC_CLC_DECL_ERR_REGBUF;
2211 static void smc_find_rdma_v2_device_serv(struct smc_sock *new_smc,
2212 struct smc_clc_msg_proposal *pclc,
2213 struct smc_init_info *ini)
2215 struct smc_clc_v2_extension *smc_v2_ext;
2219 if (!(ini->smcr_version & SMC_V2) || !smcr_indicated(ini->smc_type_v2))
2222 smc_v2_ext = smc_get_clc_v2_ext(pclc);
2223 if (!smc_clc_match_eid(ini->negotiated_eid, smc_v2_ext, NULL, NULL))
2226 /* prepare RDMA check */
2227 memcpy(ini->peer_systemid, pclc->lcl.id_for_peer, SMC_SYSTEMID_LEN);
2228 memcpy(ini->peer_gid, smc_v2_ext->roce, SMC_GID_SIZE);
2229 memcpy(ini->peer_mac, pclc->lcl.mac, ETH_ALEN);
2230 ini->check_smcrv2 = true;
2231 ini->smcrv2.clc_sk = new_smc->clcsock->sk;
2232 ini->smcrv2.saddr = new_smc->clcsock->sk->sk_rcv_saddr;
2233 ini->smcrv2.daddr = smc_ib_gid_to_ipv4(smc_v2_ext->roce);
2234 rc = smc_find_rdma_device(new_smc, ini);
2236 smc_find_ism_store_rc(rc, ini);
2239 if (!ini->smcrv2.uses_gateway)
2240 memcpy(ini->smcrv2.nexthop_mac, pclc->lcl.mac, ETH_ALEN);
2242 smcr_version = ini->smcr_version;
2243 ini->smcr_version = SMC_V2;
2244 rc = smc_listen_rdma_init(new_smc, ini);
2246 rc = smc_listen_rdma_reg(new_smc, ini->first_contact_local);
2248 smc_conn_abort(new_smc, ini->first_contact_local);
2252 ini->smcr_version = smcr_version;
2253 smc_find_ism_store_rc(rc, ini);
2256 ini->smcr_version &= ~SMC_V2;
2257 ini->smcrv2.ib_dev_v2 = NULL;
2258 ini->check_smcrv2 = false;
2261 static int smc_find_rdma_v1_device_serv(struct smc_sock *new_smc,
2262 struct smc_clc_msg_proposal *pclc,
2263 struct smc_init_info *ini)
2267 if (!(ini->smcr_version & SMC_V1) || !smcr_indicated(ini->smc_type_v1))
2268 return SMC_CLC_DECL_NOSMCDEV;
2270 /* prepare RDMA check */
2271 memcpy(ini->peer_systemid, pclc->lcl.id_for_peer, SMC_SYSTEMID_LEN);
2272 memcpy(ini->peer_gid, pclc->lcl.gid, SMC_GID_SIZE);
2273 memcpy(ini->peer_mac, pclc->lcl.mac, ETH_ALEN);
2274 rc = smc_find_rdma_device(new_smc, ini);
2276 /* no RDMA device found */
2277 return SMC_CLC_DECL_NOSMCDEV;
2279 rc = smc_listen_rdma_init(new_smc, ini);
2282 return smc_listen_rdma_reg(new_smc, ini->first_contact_local);
2285 /* determine the local device matching to proposal */
2286 static int smc_listen_find_device(struct smc_sock *new_smc,
2287 struct smc_clc_msg_proposal *pclc,
2288 struct smc_init_info *ini)
2292 /* check for ISM device matching V2 proposed device */
2293 smc_find_ism_v2_device_serv(new_smc, pclc, ini);
2294 if (ini->ism_dev[0])
2297 /* check for matching IP prefix and subnet length (V1) */
2298 prfx_rc = smc_listen_prfx_check(new_smc, pclc);
2300 smc_find_ism_store_rc(prfx_rc, ini);
2302 /* get vlan id from IP device */
2303 if (smc_vlan_by_tcpsk(new_smc->clcsock, ini))
2304 return ini->rc ?: SMC_CLC_DECL_GETVLANERR;
2306 /* check for ISM device matching V1 proposed device */
2308 smc_find_ism_v1_device_serv(new_smc, pclc, ini);
2309 if (ini->ism_dev[0])
2312 if (!smcr_indicated(pclc->hdr.typev1) &&
2313 !smcr_indicated(pclc->hdr.typev2))
2314 /* skip RDMA and decline */
2315 return ini->rc ?: SMC_CLC_DECL_NOSMCDDEV;
2317 /* check if RDMA V2 is available */
2318 smc_find_rdma_v2_device_serv(new_smc, pclc, ini);
2319 if (ini->smcrv2.ib_dev_v2)
2322 /* check if RDMA V1 is available */
2326 rc = smc_find_rdma_v1_device_serv(new_smc, pclc, ini);
2327 smc_find_ism_store_rc(rc, ini);
2328 return (!rc) ? 0 : ini->rc;
2333 /* listen worker: finish RDMA setup */
2334 static int smc_listen_rdma_finish(struct smc_sock *new_smc,
2335 struct smc_clc_msg_accept_confirm *cclc,
2337 struct smc_init_info *ini)
2339 struct smc_link *link = new_smc->conn.lnk;
2340 int reason_code = 0;
2343 smc_link_save_peer_info(link, cclc, ini);
2345 if (smc_rmb_rtoken_handling(&new_smc->conn, link, cclc))
2346 return SMC_CLC_DECL_ERR_RTOK;
2349 if (smc_ib_ready_link(link))
2350 return SMC_CLC_DECL_ERR_RDYLNK;
2351 /* QP confirmation over RoCE fabric */
2352 smc_llc_flow_initiate(link->lgr, SMC_LLC_FLOW_ADD_LINK);
2353 reason_code = smcr_serv_conf_first_link(new_smc);
2354 smc_llc_flow_stop(link->lgr, &link->lgr->llc_flow_lcl);
2359 /* setup for connection of server */
2360 static void smc_listen_work(struct work_struct *work)
2362 struct smc_sock *new_smc = container_of(work, struct smc_sock,
2364 struct socket *newclcsock = new_smc->clcsock;
2365 struct smc_clc_msg_accept_confirm *cclc;
2366 struct smc_clc_msg_proposal_area *buf;
2367 struct smc_clc_msg_proposal *pclc;
2368 struct smc_init_info *ini = NULL;
2369 u8 proposal_version = SMC_V1;
2373 if (new_smc->listen_smc->sk.sk_state != SMC_LISTEN)
2374 return smc_listen_out_err(new_smc);
2376 if (new_smc->use_fallback) {
2377 smc_listen_out_connected(new_smc);
2381 /* check if peer is smc capable */
2382 if (!tcp_sk(newclcsock->sk)->syn_smc) {
2383 rc = smc_switch_to_fallback(new_smc, SMC_CLC_DECL_PEERNOSMC);
2385 smc_listen_out_err(new_smc);
2387 smc_listen_out_connected(new_smc);
2391 /* do inband token exchange -
2392 * wait for and receive SMC Proposal CLC message
2394 buf = kzalloc(sizeof(*buf), GFP_KERNEL);
2396 rc = SMC_CLC_DECL_MEM;
2399 pclc = (struct smc_clc_msg_proposal *)buf;
2400 rc = smc_clc_wait_msg(new_smc, pclc, sizeof(*buf),
2401 SMC_CLC_PROPOSAL, CLC_WAIT_TIME);
2405 if (pclc->hdr.version > SMC_V1)
2406 proposal_version = SMC_V2;
2408 /* IPSec connections opt out of SMC optimizations */
2409 if (using_ipsec(new_smc)) {
2410 rc = SMC_CLC_DECL_IPSEC;
2414 ini = kzalloc(sizeof(*ini), GFP_KERNEL);
2416 rc = SMC_CLC_DECL_MEM;
2420 /* initial version checking */
2421 rc = smc_listen_v2_check(new_smc, pclc, ini);
2425 mutex_lock(&smc_server_lgr_pending);
2426 smc_close_init(new_smc);
2427 smc_rx_init(new_smc);
2428 smc_tx_init(new_smc);
2430 /* determine ISM or RoCE device used for connection */
2431 rc = smc_listen_find_device(new_smc, pclc, ini);
2435 /* send SMC Accept CLC message */
2436 accept_version = ini->is_smcd ? ini->smcd_version : ini->smcr_version;
2437 rc = smc_clc_send_accept(new_smc, ini->first_contact_local,
2438 accept_version, ini->negotiated_eid);
2442 /* SMC-D does not need this lock any more */
2444 mutex_unlock(&smc_server_lgr_pending);
2446 /* receive SMC Confirm CLC message */
2447 memset(buf, 0, sizeof(*buf));
2448 cclc = (struct smc_clc_msg_accept_confirm *)buf;
2449 rc = smc_clc_wait_msg(new_smc, cclc, sizeof(*buf),
2450 SMC_CLC_CONFIRM, CLC_WAIT_TIME);
2458 if (!ini->is_smcd) {
2459 rc = smc_listen_rdma_finish(new_smc, cclc,
2460 ini->first_contact_local, ini);
2463 mutex_unlock(&smc_server_lgr_pending);
2465 smc_conn_save_peer_info(new_smc, cclc);
2466 smc_listen_out_connected(new_smc);
2467 SMC_STAT_SERV_SUCC_INC(sock_net(newclcsock->sk), ini);
2471 mutex_unlock(&smc_server_lgr_pending);
2473 smc_listen_decline(new_smc, rc, ini ? ini->first_contact_local : 0,
2480 static void smc_tcp_listen_work(struct work_struct *work)
2482 struct smc_sock *lsmc = container_of(work, struct smc_sock,
2484 struct sock *lsk = &lsmc->sk;
2485 struct smc_sock *new_smc;
2489 while (lsk->sk_state == SMC_LISTEN) {
2490 rc = smc_clcsock_accept(lsmc, &new_smc);
2491 if (rc) /* clcsock accept queue empty or error */
2496 if (tcp_sk(new_smc->clcsock->sk)->syn_smc)
2497 atomic_inc(&lsmc->queued_smc_hs);
2499 new_smc->listen_smc = lsmc;
2500 new_smc->use_fallback = lsmc->use_fallback;
2501 new_smc->fallback_rsn = lsmc->fallback_rsn;
2502 sock_hold(lsk); /* sock_put in smc_listen_work */
2503 INIT_WORK(&new_smc->smc_listen_work, smc_listen_work);
2504 smc_copy_sock_settings_to_smc(new_smc);
2505 sock_hold(&new_smc->sk); /* sock_put in passive closing */
2506 if (!queue_work(smc_hs_wq, &new_smc->smc_listen_work))
2507 sock_put(&new_smc->sk);
2512 sock_put(&lsmc->sk); /* sock_hold in smc_clcsock_data_ready() */
2515 static void smc_clcsock_data_ready(struct sock *listen_clcsock)
2517 struct smc_sock *lsmc;
2519 read_lock_bh(&listen_clcsock->sk_callback_lock);
2520 lsmc = smc_clcsock_user_data(listen_clcsock);
2523 lsmc->clcsk_data_ready(listen_clcsock);
2524 if (lsmc->sk.sk_state == SMC_LISTEN) {
2525 sock_hold(&lsmc->sk); /* sock_put in smc_tcp_listen_work() */
2526 if (!queue_work(smc_tcp_ls_wq, &lsmc->tcp_listen_work))
2527 sock_put(&lsmc->sk);
2530 read_unlock_bh(&listen_clcsock->sk_callback_lock);
2533 static int smc_listen(struct socket *sock, int backlog)
2535 struct sock *sk = sock->sk;
2536 struct smc_sock *smc;
2543 if ((sk->sk_state != SMC_INIT && sk->sk_state != SMC_LISTEN) ||
2544 smc->connect_nonblock || sock->state != SS_UNCONNECTED)
2548 if (sk->sk_state == SMC_LISTEN) {
2549 sk->sk_max_ack_backlog = backlog;
2552 /* some socket options are handled in core, so we could not apply
2553 * them to the clc socket -- copy smc socket options to clc socket
2555 smc_copy_sock_settings_to_clc(smc);
2556 if (!smc->use_fallback)
2557 tcp_sk(smc->clcsock->sk)->syn_smc = 1;
2559 /* save original sk_data_ready function and establish
2560 * smc-specific sk_data_ready function
2562 write_lock_bh(&smc->clcsock->sk->sk_callback_lock);
2563 smc->clcsock->sk->sk_user_data =
2564 (void *)((uintptr_t)smc | SK_USER_DATA_NOCOPY);
2565 smc_clcsock_replace_cb(&smc->clcsock->sk->sk_data_ready,
2566 smc_clcsock_data_ready, &smc->clcsk_data_ready);
2567 write_unlock_bh(&smc->clcsock->sk->sk_callback_lock);
2569 /* save original ops */
2570 smc->ori_af_ops = inet_csk(smc->clcsock->sk)->icsk_af_ops;
2572 smc->af_ops = *smc->ori_af_ops;
2573 smc->af_ops.syn_recv_sock = smc_tcp_syn_recv_sock;
2575 inet_csk(smc->clcsock->sk)->icsk_af_ops = &smc->af_ops;
2577 if (smc->limit_smc_hs)
2578 tcp_sk(smc->clcsock->sk)->smc_hs_congested = smc_hs_congested;
2580 rc = kernel_listen(smc->clcsock, backlog);
2582 write_lock_bh(&smc->clcsock->sk->sk_callback_lock);
2583 smc_clcsock_restore_cb(&smc->clcsock->sk->sk_data_ready,
2584 &smc->clcsk_data_ready);
2585 smc->clcsock->sk->sk_user_data = NULL;
2586 write_unlock_bh(&smc->clcsock->sk->sk_callback_lock);
2589 sk->sk_max_ack_backlog = backlog;
2590 sk->sk_ack_backlog = 0;
2591 sk->sk_state = SMC_LISTEN;
2598 static int smc_accept(struct socket *sock, struct socket *new_sock,
2599 int flags, bool kern)
2601 struct sock *sk = sock->sk, *nsk;
2602 DECLARE_WAITQUEUE(wait, current);
2603 struct smc_sock *lsmc;
2608 sock_hold(sk); /* sock_put below */
2611 if (lsmc->sk.sk_state != SMC_LISTEN) {
2617 /* Wait for an incoming connection */
2618 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
2619 add_wait_queue_exclusive(sk_sleep(sk), &wait);
2620 while (!(nsk = smc_accept_dequeue(sk, new_sock))) {
2621 set_current_state(TASK_INTERRUPTIBLE);
2627 timeo = schedule_timeout(timeo);
2628 /* wakeup by sk_data_ready in smc_listen_work() */
2629 sched_annotate_sleep();
2631 if (signal_pending(current)) {
2632 rc = sock_intr_errno(timeo);
2636 set_current_state(TASK_RUNNING);
2637 remove_wait_queue(sk_sleep(sk), &wait);
2640 rc = sock_error(nsk);
2645 if (lsmc->sockopt_defer_accept && !(flags & O_NONBLOCK)) {
2646 /* wait till data arrives on the socket */
2647 timeo = msecs_to_jiffies(lsmc->sockopt_defer_accept *
2649 if (smc_sk(nsk)->use_fallback) {
2650 struct sock *clcsk = smc_sk(nsk)->clcsock->sk;
2653 if (skb_queue_empty(&clcsk->sk_receive_queue))
2654 sk_wait_data(clcsk, &timeo, NULL);
2655 release_sock(clcsk);
2656 } else if (!atomic_read(&smc_sk(nsk)->conn.bytes_to_rcv)) {
2658 smc_rx_wait(smc_sk(nsk), &timeo, smc_rx_data_available);
2664 sock_put(sk); /* sock_hold above */
2668 static int smc_getname(struct socket *sock, struct sockaddr *addr,
2671 struct smc_sock *smc;
2673 if (peer && (sock->sk->sk_state != SMC_ACTIVE) &&
2674 (sock->sk->sk_state != SMC_APPCLOSEWAIT1))
2677 smc = smc_sk(sock->sk);
2679 return smc->clcsock->ops->getname(smc->clcsock, addr, peer);
2682 static int smc_sendmsg(struct socket *sock, struct msghdr *msg, size_t len)
2684 struct sock *sk = sock->sk;
2685 struct smc_sock *smc;
2691 /* SMC does not support connect with fastopen */
2692 if (msg->msg_flags & MSG_FASTOPEN) {
2693 /* not connected yet, fallback */
2694 if (sk->sk_state == SMC_INIT && !smc->connect_nonblock) {
2695 rc = smc_switch_to_fallback(smc, SMC_CLC_DECL_OPTUNSUPP);
2702 } else if ((sk->sk_state != SMC_ACTIVE) &&
2703 (sk->sk_state != SMC_APPCLOSEWAIT1) &&
2704 (sk->sk_state != SMC_INIT)) {
2709 if (smc->use_fallback) {
2710 rc = smc->clcsock->ops->sendmsg(smc->clcsock, msg, len);
2712 rc = smc_tx_sendmsg(smc, msg, len);
2713 SMC_STAT_TX_PAYLOAD(smc, len, rc);
2720 static int smc_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
2723 struct sock *sk = sock->sk;
2724 struct smc_sock *smc;
2729 if (sk->sk_state == SMC_CLOSED && (sk->sk_shutdown & RCV_SHUTDOWN)) {
2730 /* socket was connected before, no more data to read */
2734 if ((sk->sk_state == SMC_INIT) ||
2735 (sk->sk_state == SMC_LISTEN) ||
2736 (sk->sk_state == SMC_CLOSED))
2739 if (sk->sk_state == SMC_PEERFINCLOSEWAIT) {
2744 if (smc->use_fallback) {
2745 rc = smc->clcsock->ops->recvmsg(smc->clcsock, msg, len, flags);
2747 msg->msg_namelen = 0;
2748 rc = smc_rx_recvmsg(smc, msg, NULL, len, flags);
2749 SMC_STAT_RX_PAYLOAD(smc, rc, rc);
2757 static __poll_t smc_accept_poll(struct sock *parent)
2759 struct smc_sock *isk = smc_sk(parent);
2762 spin_lock(&isk->accept_q_lock);
2763 if (!list_empty(&isk->accept_q))
2764 mask = EPOLLIN | EPOLLRDNORM;
2765 spin_unlock(&isk->accept_q_lock);
2770 static __poll_t smc_poll(struct file *file, struct socket *sock,
2773 struct sock *sk = sock->sk;
2774 struct smc_sock *smc;
2780 smc = smc_sk(sock->sk);
2781 if (smc->use_fallback) {
2782 /* delegate to CLC child sock */
2783 mask = smc->clcsock->ops->poll(file, smc->clcsock, wait);
2784 sk->sk_err = smc->clcsock->sk->sk_err;
2786 if (sk->sk_state != SMC_CLOSED)
2787 sock_poll_wait(file, sock, wait);
2790 if ((sk->sk_shutdown == SHUTDOWN_MASK) ||
2791 (sk->sk_state == SMC_CLOSED))
2793 if (sk->sk_state == SMC_LISTEN) {
2794 /* woken up by sk_data_ready in smc_listen_work() */
2795 mask |= smc_accept_poll(sk);
2796 } else if (smc->use_fallback) { /* as result of connect_work()*/
2797 mask |= smc->clcsock->ops->poll(file, smc->clcsock,
2799 sk->sk_err = smc->clcsock->sk->sk_err;
2801 if ((sk->sk_state != SMC_INIT &&
2802 atomic_read(&smc->conn.sndbuf_space)) ||
2803 sk->sk_shutdown & SEND_SHUTDOWN) {
2804 mask |= EPOLLOUT | EPOLLWRNORM;
2806 sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
2807 set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
2809 if (atomic_read(&smc->conn.bytes_to_rcv))
2810 mask |= EPOLLIN | EPOLLRDNORM;
2811 if (sk->sk_shutdown & RCV_SHUTDOWN)
2812 mask |= EPOLLIN | EPOLLRDNORM | EPOLLRDHUP;
2813 if (sk->sk_state == SMC_APPCLOSEWAIT1)
2815 if (smc->conn.urg_state == SMC_URG_VALID)
2823 static int smc_shutdown(struct socket *sock, int how)
2825 struct sock *sk = sock->sk;
2826 bool do_shutdown = true;
2827 struct smc_sock *smc;
2834 if ((how < SHUT_RD) || (how > SHUT_RDWR))
2839 if (sock->state == SS_CONNECTING) {
2840 if (sk->sk_state == SMC_ACTIVE)
2841 sock->state = SS_CONNECTED;
2842 else if (sk->sk_state == SMC_PEERCLOSEWAIT1 ||
2843 sk->sk_state == SMC_PEERCLOSEWAIT2 ||
2844 sk->sk_state == SMC_APPCLOSEWAIT1 ||
2845 sk->sk_state == SMC_APPCLOSEWAIT2 ||
2846 sk->sk_state == SMC_APPFINCLOSEWAIT)
2847 sock->state = SS_DISCONNECTING;
2851 if ((sk->sk_state != SMC_ACTIVE) &&
2852 (sk->sk_state != SMC_PEERCLOSEWAIT1) &&
2853 (sk->sk_state != SMC_PEERCLOSEWAIT2) &&
2854 (sk->sk_state != SMC_APPCLOSEWAIT1) &&
2855 (sk->sk_state != SMC_APPCLOSEWAIT2) &&
2856 (sk->sk_state != SMC_APPFINCLOSEWAIT))
2858 if (smc->use_fallback) {
2859 rc = kernel_sock_shutdown(smc->clcsock, how);
2860 sk->sk_shutdown = smc->clcsock->sk->sk_shutdown;
2861 if (sk->sk_shutdown == SHUTDOWN_MASK) {
2862 sk->sk_state = SMC_CLOSED;
2863 sk->sk_socket->state = SS_UNCONNECTED;
2869 case SHUT_RDWR: /* shutdown in both directions */
2870 old_state = sk->sk_state;
2871 rc = smc_close_active(smc);
2872 if (old_state == SMC_ACTIVE &&
2873 sk->sk_state == SMC_PEERCLOSEWAIT1)
2874 do_shutdown = false;
2877 rc = smc_close_shutdown_write(smc);
2881 /* nothing more to do because peer is not involved */
2884 if (do_shutdown && smc->clcsock)
2885 rc1 = kernel_sock_shutdown(smc->clcsock, how);
2886 /* map sock_shutdown_cmd constants to sk_shutdown value range */
2887 sk->sk_shutdown |= how + 1;
2889 if (sk->sk_state == SMC_CLOSED)
2890 sock->state = SS_UNCONNECTED;
2892 sock->state = SS_DISCONNECTING;
2895 return rc ? rc : rc1;
2898 static int __smc_getsockopt(struct socket *sock, int level, int optname,
2899 char __user *optval, int __user *optlen)
2901 struct smc_sock *smc;
2904 smc = smc_sk(sock->sk);
2906 if (get_user(len, optlen))
2909 len = min_t(int, len, sizeof(int));
2916 val = smc->limit_smc_hs;
2922 if (put_user(len, optlen))
2924 if (copy_to_user(optval, &val, len))
2930 static int __smc_setsockopt(struct socket *sock, int level, int optname,
2931 sockptr_t optval, unsigned int optlen)
2933 struct sock *sk = sock->sk;
2934 struct smc_sock *smc;
2942 if (optlen < sizeof(int)) {
2946 if (copy_from_sockptr(&val, optval, sizeof(int))) {
2951 smc->limit_smc_hs = !!val;
2963 static int smc_setsockopt(struct socket *sock, int level, int optname,
2964 sockptr_t optval, unsigned int optlen)
2966 struct sock *sk = sock->sk;
2967 struct smc_sock *smc;
2970 if (level == SOL_TCP && optname == TCP_ULP)
2972 else if (level == SOL_SMC)
2973 return __smc_setsockopt(sock, level, optname, optval, optlen);
2977 /* generic setsockopts reaching us here always apply to the
2980 mutex_lock(&smc->clcsock_release_lock);
2981 if (!smc->clcsock) {
2982 mutex_unlock(&smc->clcsock_release_lock);
2985 if (unlikely(!smc->clcsock->ops->setsockopt))
2988 rc = smc->clcsock->ops->setsockopt(smc->clcsock, level, optname,
2990 if (smc->clcsock->sk->sk_err) {
2991 sk->sk_err = smc->clcsock->sk->sk_err;
2992 sk_error_report(sk);
2994 mutex_unlock(&smc->clcsock_release_lock);
2996 if (optlen < sizeof(int))
2998 if (copy_from_sockptr(&val, optval, sizeof(int)))
3002 if (rc || smc->use_fallback)
3006 case TCP_FASTOPEN_CONNECT:
3007 case TCP_FASTOPEN_KEY:
3008 case TCP_FASTOPEN_NO_COOKIE:
3009 /* option not supported by SMC */
3010 if (sk->sk_state == SMC_INIT && !smc->connect_nonblock) {
3011 rc = smc_switch_to_fallback(smc, SMC_CLC_DECL_OPTUNSUPP);
3017 if (sk->sk_state != SMC_INIT &&
3018 sk->sk_state != SMC_LISTEN &&
3019 sk->sk_state != SMC_CLOSED) {
3021 SMC_STAT_INC(smc, ndly_cnt);
3022 smc_tx_pending(&smc->conn);
3023 cancel_delayed_work(&smc->conn.tx_work);
3028 if (sk->sk_state != SMC_INIT &&
3029 sk->sk_state != SMC_LISTEN &&
3030 sk->sk_state != SMC_CLOSED) {
3032 SMC_STAT_INC(smc, cork_cnt);
3033 smc_tx_pending(&smc->conn);
3034 cancel_delayed_work(&smc->conn.tx_work);
3038 case TCP_DEFER_ACCEPT:
3039 smc->sockopt_defer_accept = val;
3050 static int smc_getsockopt(struct socket *sock, int level, int optname,
3051 char __user *optval, int __user *optlen)
3053 struct smc_sock *smc;
3056 if (level == SOL_SMC)
3057 return __smc_getsockopt(sock, level, optname, optval, optlen);
3059 smc = smc_sk(sock->sk);
3060 mutex_lock(&smc->clcsock_release_lock);
3061 if (!smc->clcsock) {
3062 mutex_unlock(&smc->clcsock_release_lock);
3065 /* socket options apply to the CLC socket */
3066 if (unlikely(!smc->clcsock->ops->getsockopt)) {
3067 mutex_unlock(&smc->clcsock_release_lock);
3070 rc = smc->clcsock->ops->getsockopt(smc->clcsock, level, optname,
3072 mutex_unlock(&smc->clcsock_release_lock);
3076 static int smc_ioctl(struct socket *sock, unsigned int cmd,
3079 union smc_host_cursor cons, urg;
3080 struct smc_connection *conn;
3081 struct smc_sock *smc;
3084 smc = smc_sk(sock->sk);
3086 lock_sock(&smc->sk);
3087 if (smc->use_fallback) {
3088 if (!smc->clcsock) {
3089 release_sock(&smc->sk);
3092 answ = smc->clcsock->ops->ioctl(smc->clcsock, cmd, arg);
3093 release_sock(&smc->sk);
3097 case SIOCINQ: /* same as FIONREAD */
3098 if (smc->sk.sk_state == SMC_LISTEN) {
3099 release_sock(&smc->sk);
3102 if (smc->sk.sk_state == SMC_INIT ||
3103 smc->sk.sk_state == SMC_CLOSED)
3106 answ = atomic_read(&smc->conn.bytes_to_rcv);
3109 /* output queue size (not send + not acked) */
3110 if (smc->sk.sk_state == SMC_LISTEN) {
3111 release_sock(&smc->sk);
3114 if (smc->sk.sk_state == SMC_INIT ||
3115 smc->sk.sk_state == SMC_CLOSED)
3118 answ = smc->conn.sndbuf_desc->len -
3119 atomic_read(&smc->conn.sndbuf_space);
3122 /* output queue size (not send only) */
3123 if (smc->sk.sk_state == SMC_LISTEN) {
3124 release_sock(&smc->sk);
3127 if (smc->sk.sk_state == SMC_INIT ||
3128 smc->sk.sk_state == SMC_CLOSED)
3131 answ = smc_tx_prepared_sends(&smc->conn);
3134 if (smc->sk.sk_state == SMC_LISTEN) {
3135 release_sock(&smc->sk);
3138 if (smc->sk.sk_state == SMC_INIT ||
3139 smc->sk.sk_state == SMC_CLOSED) {
3142 smc_curs_copy(&cons, &conn->local_tx_ctrl.cons, conn);
3143 smc_curs_copy(&urg, &conn->urg_curs, conn);
3144 answ = smc_curs_diff(conn->rmb_desc->len,
3149 release_sock(&smc->sk);
3150 return -ENOIOCTLCMD;
3152 release_sock(&smc->sk);
3154 return put_user(answ, (int __user *)arg);
3157 static ssize_t smc_sendpage(struct socket *sock, struct page *page,
3158 int offset, size_t size, int flags)
3160 struct sock *sk = sock->sk;
3161 struct smc_sock *smc;
3166 if (sk->sk_state != SMC_ACTIVE) {
3171 if (smc->use_fallback) {
3172 rc = kernel_sendpage(smc->clcsock, page, offset,
3176 rc = smc_tx_sendpage(smc, page, offset, size, flags);
3178 SMC_STAT_INC(smc, sendpage_cnt);
3185 /* Map the affected portions of the rmbe into an spd, note the number of bytes
3186 * to splice in conn->splice_pending, and press 'go'. Delays consumer cursor
3187 * updates till whenever a respective page has been fully processed.
3188 * Note that subsequent recv() calls have to wait till all splice() processing
3191 static ssize_t smc_splice_read(struct socket *sock, loff_t *ppos,
3192 struct pipe_inode_info *pipe, size_t len,
3195 struct sock *sk = sock->sk;
3196 struct smc_sock *smc;
3201 if (sk->sk_state == SMC_CLOSED && (sk->sk_shutdown & RCV_SHUTDOWN)) {
3202 /* socket was connected before, no more data to read */
3206 if (sk->sk_state == SMC_INIT ||
3207 sk->sk_state == SMC_LISTEN ||
3208 sk->sk_state == SMC_CLOSED)
3211 if (sk->sk_state == SMC_PEERFINCLOSEWAIT) {
3216 if (smc->use_fallback) {
3217 rc = smc->clcsock->ops->splice_read(smc->clcsock, ppos,
3224 if (flags & SPLICE_F_NONBLOCK)
3225 flags = MSG_DONTWAIT;
3228 SMC_STAT_INC(smc, splice_cnt);
3229 rc = smc_rx_recvmsg(smc, NULL, pipe, len, flags);
3237 /* must look like tcp */
3238 static const struct proto_ops smc_sock_ops = {
3240 .owner = THIS_MODULE,
3241 .release = smc_release,
3243 .connect = smc_connect,
3244 .socketpair = sock_no_socketpair,
3245 .accept = smc_accept,
3246 .getname = smc_getname,
3249 .listen = smc_listen,
3250 .shutdown = smc_shutdown,
3251 .setsockopt = smc_setsockopt,
3252 .getsockopt = smc_getsockopt,
3253 .sendmsg = smc_sendmsg,
3254 .recvmsg = smc_recvmsg,
3255 .mmap = sock_no_mmap,
3256 .sendpage = smc_sendpage,
3257 .splice_read = smc_splice_read,
3260 static int __smc_create(struct net *net, struct socket *sock, int protocol,
3261 int kern, struct socket *clcsock)
3263 int family = (protocol == SMCPROTO_SMC6) ? PF_INET6 : PF_INET;
3264 struct smc_sock *smc;
3268 rc = -ESOCKTNOSUPPORT;
3269 if (sock->type != SOCK_STREAM)
3272 rc = -EPROTONOSUPPORT;
3273 if (protocol != SMCPROTO_SMC && protocol != SMCPROTO_SMC6)
3277 sock->ops = &smc_sock_ops;
3278 sock->state = SS_UNCONNECTED;
3279 sk = smc_sock_alloc(net, sock, protocol);
3283 /* create internal TCP socket for CLC handshake and fallback */
3285 smc->use_fallback = false; /* assume rdma capability first */
3286 smc->fallback_rsn = 0;
3288 /* default behavior from limit_smc_hs in every net namespace */
3289 smc->limit_smc_hs = net->smc.limit_smc_hs;
3293 rc = sock_create_kern(net, family, SOCK_STREAM, IPPROTO_TCP,
3296 sk_common_release(sk);
3300 smc->clcsock = clcsock;
3307 static int smc_create(struct net *net, struct socket *sock, int protocol,
3310 return __smc_create(net, sock, protocol, kern, NULL);
3313 static const struct net_proto_family smc_sock_family_ops = {
3315 .owner = THIS_MODULE,
3316 .create = smc_create,
3319 static int smc_ulp_init(struct sock *sk)
3321 struct socket *tcp = sk->sk_socket;
3322 struct net *net = sock_net(sk);
3323 struct socket *smcsock;
3326 /* only TCP can be replaced */
3327 if (tcp->type != SOCK_STREAM || sk->sk_protocol != IPPROTO_TCP ||
3328 (sk->sk_family != AF_INET && sk->sk_family != AF_INET6))
3329 return -ESOCKTNOSUPPORT;
3330 /* don't handle wq now */
3331 if (tcp->state != SS_UNCONNECTED || !tcp->file || tcp->wq.fasync_list)
3334 if (sk->sk_family == AF_INET)
3335 protocol = SMCPROTO_SMC;
3337 protocol = SMCPROTO_SMC6;
3339 smcsock = sock_alloc();
3343 smcsock->type = SOCK_STREAM;
3344 __module_get(THIS_MODULE); /* tried in __tcp_ulp_find_autoload */
3345 ret = __smc_create(net, smcsock, protocol, 1, tcp);
3347 sock_release(smcsock); /* module_put() which ops won't be NULL */
3351 /* replace tcp socket to smc */
3352 smcsock->file = tcp->file;
3353 smcsock->file->private_data = smcsock;
3354 smcsock->file->f_inode = SOCK_INODE(smcsock); /* replace inode when sock_close */
3355 smcsock->file->f_path.dentry->d_inode = SOCK_INODE(smcsock); /* dput() in __fput */
3361 static void smc_ulp_clone(const struct request_sock *req, struct sock *newsk,
3362 const gfp_t priority)
3364 struct inet_connection_sock *icsk = inet_csk(newsk);
3366 /* don't inherit ulp ops to child when listen */
3367 icsk->icsk_ulp_ops = NULL;
3370 static struct tcp_ulp_ops smc_ulp_ops __read_mostly = {
3372 .owner = THIS_MODULE,
3373 .init = smc_ulp_init,
3374 .clone = smc_ulp_clone,
3377 unsigned int smc_net_id;
3379 static __net_init int smc_net_init(struct net *net)
3383 rc = smc_sysctl_net_init(net);
3386 return smc_pnet_net_init(net);
3389 static void __net_exit smc_net_exit(struct net *net)
3391 smc_sysctl_net_exit(net);
3392 smc_pnet_net_exit(net);
3395 static __net_init int smc_net_stat_init(struct net *net)
3397 return smc_stats_init(net);
3400 static void __net_exit smc_net_stat_exit(struct net *net)
3402 smc_stats_exit(net);
3405 static struct pernet_operations smc_net_ops = {
3406 .init = smc_net_init,
3407 .exit = smc_net_exit,
3409 .size = sizeof(struct smc_net),
3412 static struct pernet_operations smc_net_stat_ops = {
3413 .init = smc_net_stat_init,
3414 .exit = smc_net_stat_exit,
3417 static int __init smc_init(void)
3421 rc = register_pernet_subsys(&smc_net_ops);
3425 rc = register_pernet_subsys(&smc_net_stat_ops);
3427 goto out_pernet_subsys;
3434 goto out_pernet_subsys_stat;
3436 rc = smc_pnet_init();
3442 smc_tcp_ls_wq = alloc_workqueue("smc_tcp_ls_wq", 0, 0);
3446 smc_hs_wq = alloc_workqueue("smc_hs_wq", 0, 0);
3448 goto out_alloc_tcp_ls_wq;
3450 smc_close_wq = alloc_workqueue("smc_close_wq", 0, 0);
3452 goto out_alloc_hs_wq;
3454 rc = smc_core_init();
3456 pr_err("%s: smc_core_init fails with %d\n", __func__, rc);
3460 rc = smc_llc_init();
3462 pr_err("%s: smc_llc_init fails with %d\n", __func__, rc);
3466 rc = smc_cdc_init();
3468 pr_err("%s: smc_cdc_init fails with %d\n", __func__, rc);
3472 rc = proto_register(&smc_proto, 1);
3474 pr_err("%s: proto_register(v4) fails with %d\n", __func__, rc);
3478 rc = proto_register(&smc_proto6, 1);
3480 pr_err("%s: proto_register(v6) fails with %d\n", __func__, rc);
3484 rc = sock_register(&smc_sock_family_ops);
3486 pr_err("%s: sock_register fails with %d\n", __func__, rc);
3489 INIT_HLIST_HEAD(&smc_v4_hashinfo.ht);
3490 INIT_HLIST_HEAD(&smc_v6_hashinfo.ht);
3492 rc = smc_ib_register_client();
3494 pr_err("%s: ib_register fails with %d\n", __func__, rc);
3498 rc = tcp_register_ulp(&smc_ulp_ops);
3500 pr_err("%s: tcp_ulp_register fails with %d\n", __func__, rc);
3504 static_branch_enable(&tcp_have_smc);
3508 smc_ib_unregister_client();
3510 sock_unregister(PF_SMC);
3512 proto_unregister(&smc_proto6);
3514 proto_unregister(&smc_proto);
3518 destroy_workqueue(smc_close_wq);
3520 destroy_workqueue(smc_hs_wq);
3521 out_alloc_tcp_ls_wq:
3522 destroy_workqueue(smc_tcp_ls_wq);
3527 out_pernet_subsys_stat:
3528 unregister_pernet_subsys(&smc_net_stat_ops);
3530 unregister_pernet_subsys(&smc_net_ops);
3535 static void __exit smc_exit(void)
3537 static_branch_disable(&tcp_have_smc);
3538 tcp_unregister_ulp(&smc_ulp_ops);
3539 sock_unregister(PF_SMC);
3541 smc_ib_unregister_client();
3542 destroy_workqueue(smc_close_wq);
3543 destroy_workqueue(smc_tcp_ls_wq);
3544 destroy_workqueue(smc_hs_wq);
3545 proto_unregister(&smc_proto6);
3546 proto_unregister(&smc_proto);
3550 unregister_pernet_subsys(&smc_net_stat_ops);
3551 unregister_pernet_subsys(&smc_net_ops);
3555 module_init(smc_init);
3556 module_exit(smc_exit);
3558 MODULE_AUTHOR("Ursula Braun <ubraun@linux.vnet.ibm.com>");
3559 MODULE_DESCRIPTION("smc socket address family");
3560 MODULE_LICENSE("GPL");
3561 MODULE_ALIAS_NETPROTO(PF_SMC);
3562 MODULE_ALIAS_TCP_ULP("smc");
3563 MODULE_ALIAS_GENL_FAMILY(SMC_GENL_FAMILY_NAME);