xref: /openbmc/linux/net/rds/tcp_connect.c (revision d236d361)
1 /*
2  * Copyright (c) 2006 Oracle.  All rights reserved.
3  *
4  * This software is available to you under a choice of one of two
5  * licenses.  You may choose to be licensed under the terms of the GNU
6  * General Public License (GPL) Version 2, available from the file
7  * COPYING in the main directory of this source tree, or the
8  * OpenIB.org BSD license below:
9  *
10  *     Redistribution and use in source and binary forms, with or
11  *     without modification, are permitted provided that the following
12  *     conditions are met:
13  *
14  *      - Redistributions of source code must retain the above
15  *        copyright notice, this list of conditions and the following
16  *        disclaimer.
17  *
18  *      - Redistributions in binary form must reproduce the above
19  *        copyright notice, this list of conditions and the following
20  *        disclaimer in the documentation and/or other materials
21  *        provided with the distribution.
22  *
23  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
24  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
25  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
26  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
27  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
28  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
29  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
30  * SOFTWARE.
31  *
32  */
33 #include <linux/kernel.h>
34 #include <linux/in.h>
35 #include <net/tcp.h>
36 
37 #include "rds.h"
38 #include "tcp.h"
39 
40 void rds_tcp_state_change(struct sock *sk)
41 {
42 	void (*state_change)(struct sock *sk);
43 	struct rds_conn_path *cp;
44 	struct rds_tcp_connection *tc;
45 
46 	read_lock_bh(&sk->sk_callback_lock);
47 	cp = sk->sk_user_data;
48 	if (!cp) {
49 		state_change = sk->sk_state_change;
50 		goto out;
51 	}
52 	tc = cp->cp_transport_data;
53 	state_change = tc->t_orig_state_change;
54 
55 	rdsdebug("sock %p state_change to %d\n", tc->t_sock, sk->sk_state);
56 
57 	switch (sk->sk_state) {
58 	/* ignore connecting sockets as they make progress */
59 	case TCP_SYN_SENT:
60 	case TCP_SYN_RECV:
61 		break;
62 	case TCP_ESTABLISHED:
63 		/* Force the peer to reconnect so that we have the
64 		 * TCP ports going from <smaller-ip>.<transient> to
65 		 * <larger-ip>.<RDS_TCP_PORT>. We avoid marking the
66 		 * RDS connection as RDS_CONN_UP until the reconnect,
67 		 * to avoid RDS datagram loss.
68 		 */
69 		if (cp->cp_conn->c_laddr > cp->cp_conn->c_faddr &&
70 		    rds_conn_path_transition(cp, RDS_CONN_CONNECTING,
71 					     RDS_CONN_ERROR)) {
72 			rds_conn_path_drop(cp);
73 		} else {
74 			rds_connect_path_complete(cp, RDS_CONN_CONNECTING);
75 		}
76 		break;
77 	case TCP_CLOSE_WAIT:
78 	case TCP_CLOSE:
79 		rds_conn_path_drop(cp);
80 	default:
81 		break;
82 	}
83 out:
84 	read_unlock_bh(&sk->sk_callback_lock);
85 	state_change(sk);
86 }
87 
88 int rds_tcp_conn_path_connect(struct rds_conn_path *cp)
89 {
90 	struct socket *sock = NULL;
91 	struct sockaddr_in src, dest;
92 	int ret;
93 	struct rds_connection *conn = cp->cp_conn;
94 	struct rds_tcp_connection *tc = cp->cp_transport_data;
95 
96 	/* for multipath rds,we only trigger the connection after
97 	 * the handshake probe has determined the number of paths.
98 	 */
99 	if (cp->cp_index > 0 && cp->cp_conn->c_npaths < 2)
100 		return -EAGAIN;
101 
102 	mutex_lock(&tc->t_conn_path_lock);
103 
104 	if (rds_conn_path_up(cp)) {
105 		mutex_unlock(&tc->t_conn_path_lock);
106 		return 0;
107 	}
108 	ret = sock_create_kern(rds_conn_net(conn), PF_INET,
109 			       SOCK_STREAM, IPPROTO_TCP, &sock);
110 	if (ret < 0)
111 		goto out;
112 
113 	rds_tcp_tune(sock);
114 
115 	src.sin_family = AF_INET;
116 	src.sin_addr.s_addr = (__force u32)conn->c_laddr;
117 	src.sin_port = (__force u16)htons(0);
118 
119 	ret = sock->ops->bind(sock, (struct sockaddr *)&src, sizeof(src));
120 	if (ret) {
121 		rdsdebug("bind failed with %d at address %pI4\n",
122 			 ret, &conn->c_laddr);
123 		goto out;
124 	}
125 
126 	dest.sin_family = AF_INET;
127 	dest.sin_addr.s_addr = (__force u32)conn->c_faddr;
128 	dest.sin_port = (__force u16)htons(RDS_TCP_PORT);
129 
130 	/*
131 	 * once we call connect() we can start getting callbacks and they
132 	 * own the socket
133 	 */
134 	rds_tcp_set_callbacks(sock, cp);
135 	ret = sock->ops->connect(sock, (struct sockaddr *)&dest, sizeof(dest),
136 				 O_NONBLOCK);
137 
138 	cp->cp_outgoing = 1;
139 	rdsdebug("connect to address %pI4 returned %d\n", &conn->c_faddr, ret);
140 	if (ret == -EINPROGRESS)
141 		ret = 0;
142 	if (ret == 0) {
143 		rds_tcp_keepalive(sock);
144 		sock = NULL;
145 	} else {
146 		rds_tcp_restore_callbacks(sock, cp->cp_transport_data);
147 	}
148 
149 out:
150 	mutex_unlock(&tc->t_conn_path_lock);
151 	if (sock)
152 		sock_release(sock);
153 	return ret;
154 }
155 
156 /*
157  * Before killing the tcp socket this needs to serialize with callbacks.  The
158  * caller has already grabbed the sending sem so we're serialized with other
159  * senders.
160  *
161  * TCP calls the callbacks with the sock lock so we hold it while we reset the
162  * callbacks to those set by TCP.  Our callbacks won't execute again once we
163  * hold the sock lock.
164  */
165 void rds_tcp_conn_path_shutdown(struct rds_conn_path *cp)
166 {
167 	struct rds_tcp_connection *tc = cp->cp_transport_data;
168 	struct socket *sock = tc->t_sock;
169 
170 	rdsdebug("shutting down conn %p tc %p sock %p\n",
171 		 cp->cp_conn, tc, sock);
172 
173 	if (sock) {
174 		sock->ops->shutdown(sock, RCV_SHUTDOWN | SEND_SHUTDOWN);
175 		lock_sock(sock->sk);
176 		rds_tcp_restore_callbacks(sock, tc); /* tc->tc_sock = NULL */
177 
178 		release_sock(sock->sk);
179 		sock_release(sock);
180 	}
181 
182 	if (tc->t_tinc) {
183 		rds_inc_put(&tc->t_tinc->ti_inc);
184 		tc->t_tinc = NULL;
185 	}
186 	tc->t_tinc_hdr_rem = sizeof(struct rds_header);
187 	tc->t_tinc_data_rem = 0;
188 }
189