xref: /openbmc/linux/net/smc/af_smc.c (revision 3ea31e66)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  *  Shared Memory Communications over RDMA (SMC-R) and RoCE
4  *
5  *  AF_SMC protocol family socket handler keeping the AF_INET sock address type
6  *  applies to SOCK_STREAM sockets only
7  *  offers an alternative communication option for TCP-protocol sockets
8  *  applicable with RoCE-cards only
9  *
10  *  Initial restrictions:
11  *    - support for alternate links postponed
12  *
13  *  Copyright IBM Corp. 2016, 2018
14  *
15  *  Author(s):  Ursula Braun <ubraun@linux.vnet.ibm.com>
16  *              based on prototype from Frank Blaschka
17  */
18 
19 #define KMSG_COMPONENT "smc"
20 #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
21 
22 #include <linux/module.h>
23 #include <linux/socket.h>
24 #include <linux/workqueue.h>
25 #include <linux/in.h>
26 #include <linux/sched/signal.h>
27 #include <linux/if_vlan.h>
28 #include <linux/rcupdate_wait.h>
29 #include <linux/ctype.h>
30 #include <linux/splice.h>
31 
32 #include <net/sock.h>
33 #include <net/tcp.h>
34 #include <net/smc.h>
35 #include <asm/ioctls.h>
36 
37 #include <net/net_namespace.h>
38 #include <net/netns/generic.h>
39 #include "smc_netns.h"
40 
41 #include "smc.h"
42 #include "smc_clc.h"
43 #include "smc_llc.h"
44 #include "smc_cdc.h"
45 #include "smc_core.h"
46 #include "smc_ib.h"
47 #include "smc_ism.h"
48 #include "smc_pnet.h"
49 #include "smc_netlink.h"
50 #include "smc_tx.h"
51 #include "smc_rx.h"
52 #include "smc_close.h"
53 #include "smc_stats.h"
54 #include "smc_tracepoint.h"
55 #include "smc_sysctl.h"
56 
57 static DEFINE_MUTEX(smc_server_lgr_pending);	/* serialize link group
58 						 * creation on server
59 						 */
60 static DEFINE_MUTEX(smc_client_lgr_pending);	/* serialize link group
61 						 * creation on client
62 						 */
63 
64 static struct workqueue_struct	*smc_tcp_ls_wq;	/* wq for tcp listen work */
65 struct workqueue_struct	*smc_hs_wq;	/* wq for handshake work */
66 struct workqueue_struct	*smc_close_wq;	/* wq for close work */
67 
68 static void smc_tcp_listen_work(struct work_struct *);
69 static void smc_connect_work(struct work_struct *);
70 
71 int smc_nl_dump_hs_limitation(struct sk_buff *skb, struct netlink_callback *cb)
72 {
73 	struct smc_nl_dmp_ctx *cb_ctx = smc_nl_dmp_ctx(cb);
74 	void *hdr;
75 
76 	if (cb_ctx->pos[0])
77 		goto out;
78 
79 	hdr = genlmsg_put(skb, NETLINK_CB(cb->skb).portid, cb->nlh->nlmsg_seq,
80 			  &smc_gen_nl_family, NLM_F_MULTI,
81 			  SMC_NETLINK_DUMP_HS_LIMITATION);
82 	if (!hdr)
83 		return -ENOMEM;
84 
85 	if (nla_put_u8(skb, SMC_NLA_HS_LIMITATION_ENABLED,
86 		       sock_net(skb->sk)->smc.limit_smc_hs))
87 		goto err;
88 
89 	genlmsg_end(skb, hdr);
90 	cb_ctx->pos[0] = 1;
91 out:
92 	return skb->len;
93 err:
94 	genlmsg_cancel(skb, hdr);
95 	return -EMSGSIZE;
96 }
97 
98 int smc_nl_enable_hs_limitation(struct sk_buff *skb, struct genl_info *info)
99 {
100 	sock_net(skb->sk)->smc.limit_smc_hs = true;
101 	return 0;
102 }
103 
104 int smc_nl_disable_hs_limitation(struct sk_buff *skb, struct genl_info *info)
105 {
106 	sock_net(skb->sk)->smc.limit_smc_hs = false;
107 	return 0;
108 }
109 
110 static void smc_set_keepalive(struct sock *sk, int val)
111 {
112 	struct smc_sock *smc = smc_sk(sk);
113 
114 	smc->clcsock->sk->sk_prot->keepalive(smc->clcsock->sk, val);
115 }
116 
117 static struct sock *smc_tcp_syn_recv_sock(const struct sock *sk,
118 					  struct sk_buff *skb,
119 					  struct request_sock *req,
120 					  struct dst_entry *dst,
121 					  struct request_sock *req_unhash,
122 					  bool *own_req)
123 {
124 	struct smc_sock *smc;
125 	struct sock *child;
126 
127 	smc = smc_clcsock_user_data(sk);
128 
129 	if (READ_ONCE(sk->sk_ack_backlog) + atomic_read(&smc->queued_smc_hs) >
130 				sk->sk_max_ack_backlog)
131 		goto drop;
132 
133 	if (sk_acceptq_is_full(&smc->sk)) {
134 		NET_INC_STATS(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS);
135 		goto drop;
136 	}
137 
138 	/* passthrough to original syn recv sock fct */
139 	child = smc->ori_af_ops->syn_recv_sock(sk, skb, req, dst, req_unhash,
140 					       own_req);
141 	/* child must not inherit smc or its ops */
142 	if (child) {
143 		rcu_assign_sk_user_data(child, NULL);
144 
145 		/* v4-mapped sockets don't inherit parent ops. Don't restore. */
146 		if (inet_csk(child)->icsk_af_ops == inet_csk(sk)->icsk_af_ops)
147 			inet_csk(child)->icsk_af_ops = smc->ori_af_ops;
148 	}
149 	return child;
150 
151 drop:
152 	dst_release(dst);
153 	tcp_listendrop(sk);
154 	return NULL;
155 }
156 
157 static bool smc_hs_congested(const struct sock *sk)
158 {
159 	const struct smc_sock *smc;
160 
161 	smc = smc_clcsock_user_data(sk);
162 
163 	if (!smc)
164 		return true;
165 
166 	if (workqueue_congested(WORK_CPU_UNBOUND, smc_hs_wq))
167 		return true;
168 
169 	return false;
170 }
171 
172 static struct smc_hashinfo smc_v4_hashinfo = {
173 	.lock = __RW_LOCK_UNLOCKED(smc_v4_hashinfo.lock),
174 };
175 
176 static struct smc_hashinfo smc_v6_hashinfo = {
177 	.lock = __RW_LOCK_UNLOCKED(smc_v6_hashinfo.lock),
178 };
179 
180 int smc_hash_sk(struct sock *sk)
181 {
182 	struct smc_hashinfo *h = sk->sk_prot->h.smc_hash;
183 	struct hlist_head *head;
184 
185 	head = &h->ht;
186 
187 	write_lock_bh(&h->lock);
188 	sk_add_node(sk, head);
189 	write_unlock_bh(&h->lock);
190 	sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1);
191 
192 	return 0;
193 }
194 EXPORT_SYMBOL_GPL(smc_hash_sk);
195 
196 void smc_unhash_sk(struct sock *sk)
197 {
198 	struct smc_hashinfo *h = sk->sk_prot->h.smc_hash;
199 
200 	write_lock_bh(&h->lock);
201 	if (sk_del_node_init(sk))
202 		sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1);
203 	write_unlock_bh(&h->lock);
204 }
205 EXPORT_SYMBOL_GPL(smc_unhash_sk);
206 
207 /* This will be called before user really release sock_lock. So do the
208  * work which we didn't do because of user hold the sock_lock in the
209  * BH context
210  */
211 static void smc_release_cb(struct sock *sk)
212 {
213 	struct smc_sock *smc = smc_sk(sk);
214 
215 	if (smc->conn.tx_in_release_sock) {
216 		smc_tx_pending(&smc->conn);
217 		smc->conn.tx_in_release_sock = false;
218 	}
219 }
220 
221 struct proto smc_proto = {
222 	.name		= "SMC",
223 	.owner		= THIS_MODULE,
224 	.keepalive	= smc_set_keepalive,
225 	.hash		= smc_hash_sk,
226 	.unhash		= smc_unhash_sk,
227 	.release_cb	= smc_release_cb,
228 	.obj_size	= sizeof(struct smc_sock),
229 	.h.smc_hash	= &smc_v4_hashinfo,
230 	.slab_flags	= SLAB_TYPESAFE_BY_RCU,
231 };
232 EXPORT_SYMBOL_GPL(smc_proto);
233 
234 struct proto smc_proto6 = {
235 	.name		= "SMC6",
236 	.owner		= THIS_MODULE,
237 	.keepalive	= smc_set_keepalive,
238 	.hash		= smc_hash_sk,
239 	.unhash		= smc_unhash_sk,
240 	.release_cb	= smc_release_cb,
241 	.obj_size	= sizeof(struct smc_sock),
242 	.h.smc_hash	= &smc_v6_hashinfo,
243 	.slab_flags	= SLAB_TYPESAFE_BY_RCU,
244 };
245 EXPORT_SYMBOL_GPL(smc_proto6);
246 
247 static void smc_fback_restore_callbacks(struct smc_sock *smc)
248 {
249 	struct sock *clcsk = smc->clcsock->sk;
250 
251 	write_lock_bh(&clcsk->sk_callback_lock);
252 	clcsk->sk_user_data = NULL;
253 
254 	smc_clcsock_restore_cb(&clcsk->sk_state_change, &smc->clcsk_state_change);
255 	smc_clcsock_restore_cb(&clcsk->sk_data_ready, &smc->clcsk_data_ready);
256 	smc_clcsock_restore_cb(&clcsk->sk_write_space, &smc->clcsk_write_space);
257 	smc_clcsock_restore_cb(&clcsk->sk_error_report, &smc->clcsk_error_report);
258 
259 	write_unlock_bh(&clcsk->sk_callback_lock);
260 }
261 
262 static void smc_restore_fallback_changes(struct smc_sock *smc)
263 {
264 	if (smc->clcsock->file) { /* non-accepted sockets have no file yet */
265 		smc->clcsock->file->private_data = smc->sk.sk_socket;
266 		smc->clcsock->file = NULL;
267 		smc_fback_restore_callbacks(smc);
268 	}
269 }
270 
271 static int __smc_release(struct smc_sock *smc)
272 {
273 	struct sock *sk = &smc->sk;
274 	int rc = 0;
275 
276 	if (!smc->use_fallback) {
277 		rc = smc_close_active(smc);
278 		sock_set_flag(sk, SOCK_DEAD);
279 		sk->sk_shutdown |= SHUTDOWN_MASK;
280 	} else {
281 		if (sk->sk_state != SMC_CLOSED) {
282 			if (sk->sk_state != SMC_LISTEN &&
283 			    sk->sk_state != SMC_INIT)
284 				sock_put(sk); /* passive closing */
285 			if (sk->sk_state == SMC_LISTEN) {
286 				/* wake up clcsock accept */
287 				rc = kernel_sock_shutdown(smc->clcsock,
288 							  SHUT_RDWR);
289 			}
290 			sk->sk_state = SMC_CLOSED;
291 			sk->sk_state_change(sk);
292 		}
293 		smc_restore_fallback_changes(smc);
294 	}
295 
296 	sk->sk_prot->unhash(sk);
297 
298 	if (sk->sk_state == SMC_CLOSED) {
299 		if (smc->clcsock) {
300 			release_sock(sk);
301 			smc_clcsock_release(smc);
302 			lock_sock(sk);
303 		}
304 		if (!smc->use_fallback)
305 			smc_conn_free(&smc->conn);
306 	}
307 
308 	return rc;
309 }
310 
311 static int smc_release(struct socket *sock)
312 {
313 	struct sock *sk = sock->sk;
314 	struct smc_sock *smc;
315 	int old_state, rc = 0;
316 
317 	if (!sk)
318 		goto out;
319 
320 	sock_hold(sk); /* sock_put below */
321 	smc = smc_sk(sk);
322 
323 	old_state = sk->sk_state;
324 
325 	/* cleanup for a dangling non-blocking connect */
326 	if (smc->connect_nonblock && old_state == SMC_INIT)
327 		tcp_abort(smc->clcsock->sk, ECONNABORTED);
328 
329 	if (cancel_work_sync(&smc->connect_work))
330 		sock_put(&smc->sk); /* sock_hold in smc_connect for passive closing */
331 
332 	if (sk->sk_state == SMC_LISTEN)
333 		/* smc_close_non_accepted() is called and acquires
334 		 * sock lock for child sockets again
335 		 */
336 		lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
337 	else
338 		lock_sock(sk);
339 
340 	if (old_state == SMC_INIT && sk->sk_state == SMC_ACTIVE &&
341 	    !smc->use_fallback)
342 		smc_close_active_abort(smc);
343 
344 	rc = __smc_release(smc);
345 
346 	/* detach socket */
347 	sock_orphan(sk);
348 	sock->sk = NULL;
349 	release_sock(sk);
350 
351 	sock_put(sk); /* sock_hold above */
352 	sock_put(sk); /* final sock_put */
353 out:
354 	return rc;
355 }
356 
357 static void smc_destruct(struct sock *sk)
358 {
359 	if (sk->sk_state != SMC_CLOSED)
360 		return;
361 	if (!sock_flag(sk, SOCK_DEAD))
362 		return;
363 }
364 
365 static struct sock *smc_sock_alloc(struct net *net, struct socket *sock,
366 				   int protocol)
367 {
368 	struct smc_sock *smc;
369 	struct proto *prot;
370 	struct sock *sk;
371 
372 	prot = (protocol == SMCPROTO_SMC6) ? &smc_proto6 : &smc_proto;
373 	sk = sk_alloc(net, PF_SMC, GFP_KERNEL, prot, 0);
374 	if (!sk)
375 		return NULL;
376 
377 	sock_init_data(sock, sk); /* sets sk_refcnt to 1 */
378 	sk->sk_state = SMC_INIT;
379 	sk->sk_destruct = smc_destruct;
380 	sk->sk_protocol = protocol;
381 	WRITE_ONCE(sk->sk_sndbuf, READ_ONCE(net->smc.sysctl_wmem));
382 	WRITE_ONCE(sk->sk_rcvbuf, READ_ONCE(net->smc.sysctl_rmem));
383 	smc = smc_sk(sk);
384 	INIT_WORK(&smc->tcp_listen_work, smc_tcp_listen_work);
385 	INIT_WORK(&smc->connect_work, smc_connect_work);
386 	INIT_DELAYED_WORK(&smc->conn.tx_work, smc_tx_work);
387 	INIT_LIST_HEAD(&smc->accept_q);
388 	spin_lock_init(&smc->accept_q_lock);
389 	spin_lock_init(&smc->conn.send_lock);
390 	sk->sk_prot->hash(sk);
391 	mutex_init(&smc->clcsock_release_lock);
392 	smc_init_saved_callbacks(smc);
393 
394 	return sk;
395 }
396 
397 static int smc_bind(struct socket *sock, struct sockaddr *uaddr,
398 		    int addr_len)
399 {
400 	struct sockaddr_in *addr = (struct sockaddr_in *)uaddr;
401 	struct sock *sk = sock->sk;
402 	struct smc_sock *smc;
403 	int rc;
404 
405 	smc = smc_sk(sk);
406 
407 	/* replicate tests from inet_bind(), to be safe wrt. future changes */
408 	rc = -EINVAL;
409 	if (addr_len < sizeof(struct sockaddr_in))
410 		goto out;
411 
412 	rc = -EAFNOSUPPORT;
413 	if (addr->sin_family != AF_INET &&
414 	    addr->sin_family != AF_INET6 &&
415 	    addr->sin_family != AF_UNSPEC)
416 		goto out;
417 	/* accept AF_UNSPEC (mapped to AF_INET) only if s_addr is INADDR_ANY */
418 	if (addr->sin_family == AF_UNSPEC &&
419 	    addr->sin_addr.s_addr != htonl(INADDR_ANY))
420 		goto out;
421 
422 	lock_sock(sk);
423 
424 	/* Check if socket is already active */
425 	rc = -EINVAL;
426 	if (sk->sk_state != SMC_INIT || smc->connect_nonblock)
427 		goto out_rel;
428 
429 	smc->clcsock->sk->sk_reuse = sk->sk_reuse;
430 	smc->clcsock->sk->sk_reuseport = sk->sk_reuseport;
431 	rc = kernel_bind(smc->clcsock, uaddr, addr_len);
432 
433 out_rel:
434 	release_sock(sk);
435 out:
436 	return rc;
437 }
438 
439 static void smc_copy_sock_settings(struct sock *nsk, struct sock *osk,
440 				   unsigned long mask)
441 {
442 	/* options we don't get control via setsockopt for */
443 	nsk->sk_type = osk->sk_type;
444 	nsk->sk_sndbuf = osk->sk_sndbuf;
445 	nsk->sk_rcvbuf = osk->sk_rcvbuf;
446 	nsk->sk_sndtimeo = osk->sk_sndtimeo;
447 	nsk->sk_rcvtimeo = osk->sk_rcvtimeo;
448 	nsk->sk_mark = osk->sk_mark;
449 	nsk->sk_priority = osk->sk_priority;
450 	nsk->sk_rcvlowat = osk->sk_rcvlowat;
451 	nsk->sk_bound_dev_if = osk->sk_bound_dev_if;
452 	nsk->sk_err = osk->sk_err;
453 
454 	nsk->sk_flags &= ~mask;
455 	nsk->sk_flags |= osk->sk_flags & mask;
456 }
457 
458 #define SK_FLAGS_SMC_TO_CLC ((1UL << SOCK_URGINLINE) | \
459 			     (1UL << SOCK_KEEPOPEN) | \
460 			     (1UL << SOCK_LINGER) | \
461 			     (1UL << SOCK_BROADCAST) | \
462 			     (1UL << SOCK_TIMESTAMP) | \
463 			     (1UL << SOCK_DBG) | \
464 			     (1UL << SOCK_RCVTSTAMP) | \
465 			     (1UL << SOCK_RCVTSTAMPNS) | \
466 			     (1UL << SOCK_LOCALROUTE) | \
467 			     (1UL << SOCK_TIMESTAMPING_RX_SOFTWARE) | \
468 			     (1UL << SOCK_RXQ_OVFL) | \
469 			     (1UL << SOCK_WIFI_STATUS) | \
470 			     (1UL << SOCK_NOFCS) | \
471 			     (1UL << SOCK_FILTER_LOCKED) | \
472 			     (1UL << SOCK_TSTAMP_NEW))
473 /* copy only relevant settings and flags of SOL_SOCKET level from smc to
474  * clc socket (since smc is not called for these options from net/core)
475  */
476 static void smc_copy_sock_settings_to_clc(struct smc_sock *smc)
477 {
478 	smc_copy_sock_settings(smc->clcsock->sk, &smc->sk, SK_FLAGS_SMC_TO_CLC);
479 }
480 
481 #define SK_FLAGS_CLC_TO_SMC ((1UL << SOCK_URGINLINE) | \
482 			     (1UL << SOCK_KEEPOPEN) | \
483 			     (1UL << SOCK_LINGER) | \
484 			     (1UL << SOCK_DBG))
485 /* copy only settings and flags relevant for smc from clc to smc socket */
486 static void smc_copy_sock_settings_to_smc(struct smc_sock *smc)
487 {
488 	smc_copy_sock_settings(&smc->sk, smc->clcsock->sk, SK_FLAGS_CLC_TO_SMC);
489 }
490 
491 /* register the new vzalloced sndbuf on all links */
492 static int smcr_lgr_reg_sndbufs(struct smc_link *link,
493 				struct smc_buf_desc *snd_desc)
494 {
495 	struct smc_link_group *lgr = link->lgr;
496 	int i, rc = 0;
497 
498 	if (!snd_desc->is_vm)
499 		return -EINVAL;
500 
501 	/* protect against parallel smcr_link_reg_buf() */
502 	down_write(&lgr->llc_conf_mutex);
503 	for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) {
504 		if (!smc_link_active(&lgr->lnk[i]))
505 			continue;
506 		rc = smcr_link_reg_buf(&lgr->lnk[i], snd_desc);
507 		if (rc)
508 			break;
509 	}
510 	up_write(&lgr->llc_conf_mutex);
511 	return rc;
512 }
513 
514 /* register the new rmb on all links */
515 static int smcr_lgr_reg_rmbs(struct smc_link *link,
516 			     struct smc_buf_desc *rmb_desc)
517 {
518 	struct smc_link_group *lgr = link->lgr;
519 	bool do_slow = false;
520 	int i, rc = 0;
521 
522 	rc = smc_llc_flow_initiate(lgr, SMC_LLC_FLOW_RKEY);
523 	if (rc)
524 		return rc;
525 
526 	down_read(&lgr->llc_conf_mutex);
527 	for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) {
528 		if (!smc_link_active(&lgr->lnk[i]))
529 			continue;
530 		if (!rmb_desc->is_reg_mr[link->link_idx]) {
531 			up_read(&lgr->llc_conf_mutex);
532 			goto slow_path;
533 		}
534 	}
535 	/* mr register already */
536 	goto fast_path;
537 slow_path:
538 	do_slow = true;
539 	/* protect against parallel smc_llc_cli_rkey_exchange() and
540 	 * parallel smcr_link_reg_buf()
541 	 */
542 	down_write(&lgr->llc_conf_mutex);
543 	for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) {
544 		if (!smc_link_active(&lgr->lnk[i]))
545 			continue;
546 		rc = smcr_link_reg_buf(&lgr->lnk[i], rmb_desc);
547 		if (rc)
548 			goto out;
549 	}
550 fast_path:
551 	/* exchange confirm_rkey msg with peer */
552 	rc = smc_llc_do_confirm_rkey(link, rmb_desc);
553 	if (rc) {
554 		rc = -EFAULT;
555 		goto out;
556 	}
557 	rmb_desc->is_conf_rkey = true;
558 out:
559 	do_slow ? up_write(&lgr->llc_conf_mutex) : up_read(&lgr->llc_conf_mutex);
560 	smc_llc_flow_stop(lgr, &lgr->llc_flow_lcl);
561 	return rc;
562 }
563 
564 static int smcr_clnt_conf_first_link(struct smc_sock *smc)
565 {
566 	struct smc_link *link = smc->conn.lnk;
567 	struct smc_llc_qentry *qentry;
568 	int rc;
569 
570 	/* receive CONFIRM LINK request from server over RoCE fabric */
571 	qentry = smc_llc_wait(link->lgr, NULL, SMC_LLC_WAIT_TIME,
572 			      SMC_LLC_CONFIRM_LINK);
573 	if (!qentry) {
574 		struct smc_clc_msg_decline dclc;
575 
576 		rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
577 				      SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT);
578 		return rc == -EAGAIN ? SMC_CLC_DECL_TIMEOUT_CL : rc;
579 	}
580 	smc_llc_save_peer_uid(qentry);
581 	rc = smc_llc_eval_conf_link(qentry, SMC_LLC_REQ);
582 	smc_llc_flow_qentry_del(&link->lgr->llc_flow_lcl);
583 	if (rc)
584 		return SMC_CLC_DECL_RMBE_EC;
585 
586 	rc = smc_ib_modify_qp_rts(link);
587 	if (rc)
588 		return SMC_CLC_DECL_ERR_RDYLNK;
589 
590 	smc_wr_remember_qp_attr(link);
591 
592 	/* reg the sndbuf if it was vzalloced */
593 	if (smc->conn.sndbuf_desc->is_vm) {
594 		if (smcr_link_reg_buf(link, smc->conn.sndbuf_desc))
595 			return SMC_CLC_DECL_ERR_REGBUF;
596 	}
597 
598 	/* reg the rmb */
599 	if (smcr_link_reg_buf(link, smc->conn.rmb_desc))
600 		return SMC_CLC_DECL_ERR_REGBUF;
601 
602 	/* confirm_rkey is implicit on 1st contact */
603 	smc->conn.rmb_desc->is_conf_rkey = true;
604 
605 	/* send CONFIRM LINK response over RoCE fabric */
606 	rc = smc_llc_send_confirm_link(link, SMC_LLC_RESP);
607 	if (rc < 0)
608 		return SMC_CLC_DECL_TIMEOUT_CL;
609 
610 	smc_llc_link_active(link);
611 	smcr_lgr_set_type(link->lgr, SMC_LGR_SINGLE);
612 
613 	/* optional 2nd link, receive ADD LINK request from server */
614 	qentry = smc_llc_wait(link->lgr, NULL, SMC_LLC_WAIT_TIME,
615 			      SMC_LLC_ADD_LINK);
616 	if (!qentry) {
617 		struct smc_clc_msg_decline dclc;
618 
619 		rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
620 				      SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT);
621 		if (rc == -EAGAIN)
622 			rc = 0; /* no DECLINE received, go with one link */
623 		return rc;
624 	}
625 	smc_llc_flow_qentry_clr(&link->lgr->llc_flow_lcl);
626 	smc_llc_cli_add_link(link, qentry);
627 	return 0;
628 }
629 
630 static bool smc_isascii(char *hostname)
631 {
632 	int i;
633 
634 	for (i = 0; i < SMC_MAX_HOSTNAME_LEN; i++)
635 		if (!isascii(hostname[i]))
636 			return false;
637 	return true;
638 }
639 
640 static void smc_conn_save_peer_info_fce(struct smc_sock *smc,
641 					struct smc_clc_msg_accept_confirm *clc)
642 {
643 	struct smc_clc_msg_accept_confirm_v2 *clc_v2 =
644 		(struct smc_clc_msg_accept_confirm_v2 *)clc;
645 	struct smc_clc_first_contact_ext *fce;
646 	int clc_v2_len;
647 
648 	if (clc->hdr.version == SMC_V1 ||
649 	    !(clc->hdr.typev2 & SMC_FIRST_CONTACT_MASK))
650 		return;
651 
652 	if (smc->conn.lgr->is_smcd) {
653 		memcpy(smc->conn.lgr->negotiated_eid, clc_v2->d1.eid,
654 		       SMC_MAX_EID_LEN);
655 		clc_v2_len = offsetofend(struct smc_clc_msg_accept_confirm_v2,
656 					 d1);
657 	} else {
658 		memcpy(smc->conn.lgr->negotiated_eid, clc_v2->r1.eid,
659 		       SMC_MAX_EID_LEN);
660 		clc_v2_len = offsetofend(struct smc_clc_msg_accept_confirm_v2,
661 					 r1);
662 	}
663 	fce = (struct smc_clc_first_contact_ext *)(((u8 *)clc_v2) + clc_v2_len);
664 	smc->conn.lgr->peer_os = fce->os_type;
665 	smc->conn.lgr->peer_smc_release = fce->release;
666 	if (smc_isascii(fce->hostname))
667 		memcpy(smc->conn.lgr->peer_hostname, fce->hostname,
668 		       SMC_MAX_HOSTNAME_LEN);
669 }
670 
671 static void smcr_conn_save_peer_info(struct smc_sock *smc,
672 				     struct smc_clc_msg_accept_confirm *clc)
673 {
674 	int bufsize = smc_uncompress_bufsize(clc->r0.rmbe_size);
675 
676 	smc->conn.peer_rmbe_idx = clc->r0.rmbe_idx;
677 	smc->conn.local_tx_ctrl.token = ntohl(clc->r0.rmbe_alert_token);
678 	smc->conn.peer_rmbe_size = bufsize;
679 	atomic_set(&smc->conn.peer_rmbe_space, smc->conn.peer_rmbe_size);
680 	smc->conn.tx_off = bufsize * (smc->conn.peer_rmbe_idx - 1);
681 }
682 
683 static void smcd_conn_save_peer_info(struct smc_sock *smc,
684 				     struct smc_clc_msg_accept_confirm *clc)
685 {
686 	int bufsize = smc_uncompress_bufsize(clc->d0.dmbe_size);
687 
688 	smc->conn.peer_rmbe_idx = clc->d0.dmbe_idx;
689 	smc->conn.peer_token = clc->d0.token;
690 	/* msg header takes up space in the buffer */
691 	smc->conn.peer_rmbe_size = bufsize - sizeof(struct smcd_cdc_msg);
692 	atomic_set(&smc->conn.peer_rmbe_space, smc->conn.peer_rmbe_size);
693 	smc->conn.tx_off = bufsize * smc->conn.peer_rmbe_idx;
694 }
695 
696 static void smc_conn_save_peer_info(struct smc_sock *smc,
697 				    struct smc_clc_msg_accept_confirm *clc)
698 {
699 	if (smc->conn.lgr->is_smcd)
700 		smcd_conn_save_peer_info(smc, clc);
701 	else
702 		smcr_conn_save_peer_info(smc, clc);
703 	smc_conn_save_peer_info_fce(smc, clc);
704 }
705 
706 static void smc_link_save_peer_info(struct smc_link *link,
707 				    struct smc_clc_msg_accept_confirm *clc,
708 				    struct smc_init_info *ini)
709 {
710 	link->peer_qpn = ntoh24(clc->r0.qpn);
711 	memcpy(link->peer_gid, ini->peer_gid, SMC_GID_SIZE);
712 	memcpy(link->peer_mac, ini->peer_mac, sizeof(link->peer_mac));
713 	link->peer_psn = ntoh24(clc->r0.psn);
714 	link->peer_mtu = clc->r0.qp_mtu;
715 }
716 
717 static void smc_stat_inc_fback_rsn_cnt(struct smc_sock *smc,
718 				       struct smc_stats_fback *fback_arr)
719 {
720 	int cnt;
721 
722 	for (cnt = 0; cnt < SMC_MAX_FBACK_RSN_CNT; cnt++) {
723 		if (fback_arr[cnt].fback_code == smc->fallback_rsn) {
724 			fback_arr[cnt].count++;
725 			break;
726 		}
727 		if (!fback_arr[cnt].fback_code) {
728 			fback_arr[cnt].fback_code = smc->fallback_rsn;
729 			fback_arr[cnt].count++;
730 			break;
731 		}
732 	}
733 }
734 
735 static void smc_stat_fallback(struct smc_sock *smc)
736 {
737 	struct net *net = sock_net(&smc->sk);
738 
739 	mutex_lock(&net->smc.mutex_fback_rsn);
740 	if (smc->listen_smc) {
741 		smc_stat_inc_fback_rsn_cnt(smc, net->smc.fback_rsn->srv);
742 		net->smc.fback_rsn->srv_fback_cnt++;
743 	} else {
744 		smc_stat_inc_fback_rsn_cnt(smc, net->smc.fback_rsn->clnt);
745 		net->smc.fback_rsn->clnt_fback_cnt++;
746 	}
747 	mutex_unlock(&net->smc.mutex_fback_rsn);
748 }
749 
750 /* must be called under rcu read lock */
751 static void smc_fback_wakeup_waitqueue(struct smc_sock *smc, void *key)
752 {
753 	struct socket_wq *wq;
754 	__poll_t flags;
755 
756 	wq = rcu_dereference(smc->sk.sk_wq);
757 	if (!skwq_has_sleeper(wq))
758 		return;
759 
760 	/* wake up smc sk->sk_wq */
761 	if (!key) {
762 		/* sk_state_change */
763 		wake_up_interruptible_all(&wq->wait);
764 	} else {
765 		flags = key_to_poll(key);
766 		if (flags & (EPOLLIN | EPOLLOUT))
767 			/* sk_data_ready or sk_write_space */
768 			wake_up_interruptible_sync_poll(&wq->wait, flags);
769 		else if (flags & EPOLLERR)
770 			/* sk_error_report */
771 			wake_up_interruptible_poll(&wq->wait, flags);
772 	}
773 }
774 
775 static int smc_fback_mark_woken(wait_queue_entry_t *wait,
776 				unsigned int mode, int sync, void *key)
777 {
778 	struct smc_mark_woken *mark =
779 		container_of(wait, struct smc_mark_woken, wait_entry);
780 
781 	mark->woken = true;
782 	mark->key = key;
783 	return 0;
784 }
785 
786 static void smc_fback_forward_wakeup(struct smc_sock *smc, struct sock *clcsk,
787 				     void (*clcsock_callback)(struct sock *sk))
788 {
789 	struct smc_mark_woken mark = { .woken = false };
790 	struct socket_wq *wq;
791 
792 	init_waitqueue_func_entry(&mark.wait_entry,
793 				  smc_fback_mark_woken);
794 	rcu_read_lock();
795 	wq = rcu_dereference(clcsk->sk_wq);
796 	if (!wq)
797 		goto out;
798 	add_wait_queue(sk_sleep(clcsk), &mark.wait_entry);
799 	clcsock_callback(clcsk);
800 	remove_wait_queue(sk_sleep(clcsk), &mark.wait_entry);
801 
802 	if (mark.woken)
803 		smc_fback_wakeup_waitqueue(smc, mark.key);
804 out:
805 	rcu_read_unlock();
806 }
807 
808 static void smc_fback_state_change(struct sock *clcsk)
809 {
810 	struct smc_sock *smc;
811 
812 	read_lock_bh(&clcsk->sk_callback_lock);
813 	smc = smc_clcsock_user_data(clcsk);
814 	if (smc)
815 		smc_fback_forward_wakeup(smc, clcsk,
816 					 smc->clcsk_state_change);
817 	read_unlock_bh(&clcsk->sk_callback_lock);
818 }
819 
820 static void smc_fback_data_ready(struct sock *clcsk)
821 {
822 	struct smc_sock *smc;
823 
824 	read_lock_bh(&clcsk->sk_callback_lock);
825 	smc = smc_clcsock_user_data(clcsk);
826 	if (smc)
827 		smc_fback_forward_wakeup(smc, clcsk,
828 					 smc->clcsk_data_ready);
829 	read_unlock_bh(&clcsk->sk_callback_lock);
830 }
831 
832 static void smc_fback_write_space(struct sock *clcsk)
833 {
834 	struct smc_sock *smc;
835 
836 	read_lock_bh(&clcsk->sk_callback_lock);
837 	smc = smc_clcsock_user_data(clcsk);
838 	if (smc)
839 		smc_fback_forward_wakeup(smc, clcsk,
840 					 smc->clcsk_write_space);
841 	read_unlock_bh(&clcsk->sk_callback_lock);
842 }
843 
844 static void smc_fback_error_report(struct sock *clcsk)
845 {
846 	struct smc_sock *smc;
847 
848 	read_lock_bh(&clcsk->sk_callback_lock);
849 	smc = smc_clcsock_user_data(clcsk);
850 	if (smc)
851 		smc_fback_forward_wakeup(smc, clcsk,
852 					 smc->clcsk_error_report);
853 	read_unlock_bh(&clcsk->sk_callback_lock);
854 }
855 
856 static void smc_fback_replace_callbacks(struct smc_sock *smc)
857 {
858 	struct sock *clcsk = smc->clcsock->sk;
859 
860 	write_lock_bh(&clcsk->sk_callback_lock);
861 	clcsk->sk_user_data = (void *)((uintptr_t)smc | SK_USER_DATA_NOCOPY);
862 
863 	smc_clcsock_replace_cb(&clcsk->sk_state_change, smc_fback_state_change,
864 			       &smc->clcsk_state_change);
865 	smc_clcsock_replace_cb(&clcsk->sk_data_ready, smc_fback_data_ready,
866 			       &smc->clcsk_data_ready);
867 	smc_clcsock_replace_cb(&clcsk->sk_write_space, smc_fback_write_space,
868 			       &smc->clcsk_write_space);
869 	smc_clcsock_replace_cb(&clcsk->sk_error_report, smc_fback_error_report,
870 			       &smc->clcsk_error_report);
871 
872 	write_unlock_bh(&clcsk->sk_callback_lock);
873 }
874 
875 static int smc_switch_to_fallback(struct smc_sock *smc, int reason_code)
876 {
877 	int rc = 0;
878 
879 	mutex_lock(&smc->clcsock_release_lock);
880 	if (!smc->clcsock) {
881 		rc = -EBADF;
882 		goto out;
883 	}
884 
885 	smc->use_fallback = true;
886 	smc->fallback_rsn = reason_code;
887 	smc_stat_fallback(smc);
888 	trace_smc_switch_to_fallback(smc, reason_code);
889 	if (smc->sk.sk_socket && smc->sk.sk_socket->file) {
890 		smc->clcsock->file = smc->sk.sk_socket->file;
891 		smc->clcsock->file->private_data = smc->clcsock;
892 		smc->clcsock->wq.fasync_list =
893 			smc->sk.sk_socket->wq.fasync_list;
894 
895 		/* There might be some wait entries remaining
896 		 * in smc sk->sk_wq and they should be woken up
897 		 * as clcsock's wait queue is woken up.
898 		 */
899 		smc_fback_replace_callbacks(smc);
900 	}
901 out:
902 	mutex_unlock(&smc->clcsock_release_lock);
903 	return rc;
904 }
905 
906 /* fall back during connect */
907 static int smc_connect_fallback(struct smc_sock *smc, int reason_code)
908 {
909 	struct net *net = sock_net(&smc->sk);
910 	int rc = 0;
911 
912 	rc = smc_switch_to_fallback(smc, reason_code);
913 	if (rc) { /* fallback fails */
914 		this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt);
915 		if (smc->sk.sk_state == SMC_INIT)
916 			sock_put(&smc->sk); /* passive closing */
917 		return rc;
918 	}
919 	smc_copy_sock_settings_to_clc(smc);
920 	smc->connect_nonblock = 0;
921 	if (smc->sk.sk_state == SMC_INIT)
922 		smc->sk.sk_state = SMC_ACTIVE;
923 	return 0;
924 }
925 
926 /* decline and fall back during connect */
927 static int smc_connect_decline_fallback(struct smc_sock *smc, int reason_code,
928 					u8 version)
929 {
930 	struct net *net = sock_net(&smc->sk);
931 	int rc;
932 
933 	if (reason_code < 0) { /* error, fallback is not possible */
934 		this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt);
935 		if (smc->sk.sk_state == SMC_INIT)
936 			sock_put(&smc->sk); /* passive closing */
937 		return reason_code;
938 	}
939 	if (reason_code != SMC_CLC_DECL_PEERDECL) {
940 		rc = smc_clc_send_decline(smc, reason_code, version);
941 		if (rc < 0) {
942 			this_cpu_inc(net->smc.smc_stats->clnt_hshake_err_cnt);
943 			if (smc->sk.sk_state == SMC_INIT)
944 				sock_put(&smc->sk); /* passive closing */
945 			return rc;
946 		}
947 	}
948 	return smc_connect_fallback(smc, reason_code);
949 }
950 
951 static void smc_conn_abort(struct smc_sock *smc, int local_first)
952 {
953 	struct smc_connection *conn = &smc->conn;
954 	struct smc_link_group *lgr = conn->lgr;
955 	bool lgr_valid = false;
956 
957 	if (smc_conn_lgr_valid(conn))
958 		lgr_valid = true;
959 
960 	smc_conn_free(conn);
961 	if (local_first && lgr_valid)
962 		smc_lgr_cleanup_early(lgr);
963 }
964 
965 /* check if there is a rdma device available for this connection. */
966 /* called for connect and listen */
967 static int smc_find_rdma_device(struct smc_sock *smc, struct smc_init_info *ini)
968 {
969 	/* PNET table look up: search active ib_device and port
970 	 * within same PNETID that also contains the ethernet device
971 	 * used for the internal TCP socket
972 	 */
973 	smc_pnet_find_roce_resource(smc->clcsock->sk, ini);
974 	if (!ini->check_smcrv2 && !ini->ib_dev)
975 		return SMC_CLC_DECL_NOSMCRDEV;
976 	if (ini->check_smcrv2 && !ini->smcrv2.ib_dev_v2)
977 		return SMC_CLC_DECL_NOSMCRDEV;
978 	return 0;
979 }
980 
981 /* check if there is an ISM device available for this connection. */
982 /* called for connect and listen */
983 static int smc_find_ism_device(struct smc_sock *smc, struct smc_init_info *ini)
984 {
985 	/* Find ISM device with same PNETID as connecting interface  */
986 	smc_pnet_find_ism_resource(smc->clcsock->sk, ini);
987 	if (!ini->ism_dev[0])
988 		return SMC_CLC_DECL_NOSMCDDEV;
989 	else
990 		ini->ism_chid[0] = smc_ism_get_chid(ini->ism_dev[0]);
991 	return 0;
992 }
993 
994 /* is chid unique for the ism devices that are already determined? */
995 static bool smc_find_ism_v2_is_unique_chid(u16 chid, struct smc_init_info *ini,
996 					   int cnt)
997 {
998 	int i = (!ini->ism_dev[0]) ? 1 : 0;
999 
1000 	for (; i < cnt; i++)
1001 		if (ini->ism_chid[i] == chid)
1002 			return false;
1003 	return true;
1004 }
1005 
1006 /* determine possible V2 ISM devices (either without PNETID or with PNETID plus
1007  * PNETID matching net_device)
1008  */
1009 static int smc_find_ism_v2_device_clnt(struct smc_sock *smc,
1010 				       struct smc_init_info *ini)
1011 {
1012 	int rc = SMC_CLC_DECL_NOSMCDDEV;
1013 	struct smcd_dev *smcd;
1014 	int i = 1;
1015 	u16 chid;
1016 
1017 	if (smcd_indicated(ini->smc_type_v1))
1018 		rc = 0;		/* already initialized for V1 */
1019 	mutex_lock(&smcd_dev_list.mutex);
1020 	list_for_each_entry(smcd, &smcd_dev_list.list, list) {
1021 		if (smcd->going_away || smcd == ini->ism_dev[0])
1022 			continue;
1023 		chid = smc_ism_get_chid(smcd);
1024 		if (!smc_find_ism_v2_is_unique_chid(chid, ini, i))
1025 			continue;
1026 		if (!smc_pnet_is_pnetid_set(smcd->pnetid) ||
1027 		    smc_pnet_is_ndev_pnetid(sock_net(&smc->sk), smcd->pnetid)) {
1028 			ini->ism_dev[i] = smcd;
1029 			ini->ism_chid[i] = chid;
1030 			ini->is_smcd = true;
1031 			rc = 0;
1032 			i++;
1033 			if (i > SMC_MAX_ISM_DEVS)
1034 				break;
1035 		}
1036 	}
1037 	mutex_unlock(&smcd_dev_list.mutex);
1038 	ini->ism_offered_cnt = i - 1;
1039 	if (!ini->ism_dev[0] && !ini->ism_dev[1])
1040 		ini->smcd_version = 0;
1041 
1042 	return rc;
1043 }
1044 
1045 /* Check for VLAN ID and register it on ISM device just for CLC handshake */
1046 static int smc_connect_ism_vlan_setup(struct smc_sock *smc,
1047 				      struct smc_init_info *ini)
1048 {
1049 	if (ini->vlan_id && smc_ism_get_vlan(ini->ism_dev[0], ini->vlan_id))
1050 		return SMC_CLC_DECL_ISMVLANERR;
1051 	return 0;
1052 }
1053 
1054 static int smc_find_proposal_devices(struct smc_sock *smc,
1055 				     struct smc_init_info *ini)
1056 {
1057 	int rc = 0;
1058 
1059 	/* check if there is an ism device available */
1060 	if (!(ini->smcd_version & SMC_V1) ||
1061 	    smc_find_ism_device(smc, ini) ||
1062 	    smc_connect_ism_vlan_setup(smc, ini))
1063 		ini->smcd_version &= ~SMC_V1;
1064 	/* else ISM V1 is supported for this connection */
1065 
1066 	/* check if there is an rdma device available */
1067 	if (!(ini->smcr_version & SMC_V1) ||
1068 	    smc_find_rdma_device(smc, ini))
1069 		ini->smcr_version &= ~SMC_V1;
1070 	/* else RDMA is supported for this connection */
1071 
1072 	ini->smc_type_v1 = smc_indicated_type(ini->smcd_version & SMC_V1,
1073 					      ini->smcr_version & SMC_V1);
1074 
1075 	/* check if there is an ism v2 device available */
1076 	if (!(ini->smcd_version & SMC_V2) ||
1077 	    !smc_ism_is_v2_capable() ||
1078 	    smc_find_ism_v2_device_clnt(smc, ini))
1079 		ini->smcd_version &= ~SMC_V2;
1080 
1081 	/* check if there is an rdma v2 device available */
1082 	ini->check_smcrv2 = true;
1083 	ini->smcrv2.saddr = smc->clcsock->sk->sk_rcv_saddr;
1084 	if (!(ini->smcr_version & SMC_V2) ||
1085 	    smc->clcsock->sk->sk_family != AF_INET ||
1086 	    !smc_clc_ueid_count() ||
1087 	    smc_find_rdma_device(smc, ini))
1088 		ini->smcr_version &= ~SMC_V2;
1089 	ini->check_smcrv2 = false;
1090 
1091 	ini->smc_type_v2 = smc_indicated_type(ini->smcd_version & SMC_V2,
1092 					      ini->smcr_version & SMC_V2);
1093 
1094 	/* if neither ISM nor RDMA are supported, fallback */
1095 	if (ini->smc_type_v1 == SMC_TYPE_N && ini->smc_type_v2 == SMC_TYPE_N)
1096 		rc = SMC_CLC_DECL_NOSMCDEV;
1097 
1098 	return rc;
1099 }
1100 
1101 /* cleanup temporary VLAN ID registration used for CLC handshake. If ISM is
1102  * used, the VLAN ID will be registered again during the connection setup.
1103  */
1104 static int smc_connect_ism_vlan_cleanup(struct smc_sock *smc,
1105 					struct smc_init_info *ini)
1106 {
1107 	if (!smcd_indicated(ini->smc_type_v1))
1108 		return 0;
1109 	if (ini->vlan_id && smc_ism_put_vlan(ini->ism_dev[0], ini->vlan_id))
1110 		return SMC_CLC_DECL_CNFERR;
1111 	return 0;
1112 }
1113 
1114 #define SMC_CLC_MAX_ACCEPT_LEN \
1115 	(sizeof(struct smc_clc_msg_accept_confirm_v2) + \
1116 	 sizeof(struct smc_clc_first_contact_ext) + \
1117 	 sizeof(struct smc_clc_msg_trail))
1118 
1119 /* CLC handshake during connect */
1120 static int smc_connect_clc(struct smc_sock *smc,
1121 			   struct smc_clc_msg_accept_confirm_v2 *aclc2,
1122 			   struct smc_init_info *ini)
1123 {
1124 	int rc = 0;
1125 
1126 	/* do inband token exchange */
1127 	rc = smc_clc_send_proposal(smc, ini);
1128 	if (rc)
1129 		return rc;
1130 	/* receive SMC Accept CLC message */
1131 	return smc_clc_wait_msg(smc, aclc2, SMC_CLC_MAX_ACCEPT_LEN,
1132 				SMC_CLC_ACCEPT, CLC_WAIT_TIME);
1133 }
1134 
1135 void smc_fill_gid_list(struct smc_link_group *lgr,
1136 		       struct smc_gidlist *gidlist,
1137 		       struct smc_ib_device *known_dev, u8 *known_gid)
1138 {
1139 	struct smc_init_info *alt_ini = NULL;
1140 
1141 	memset(gidlist, 0, sizeof(*gidlist));
1142 	memcpy(gidlist->list[gidlist->len++], known_gid, SMC_GID_SIZE);
1143 
1144 	alt_ini = kzalloc(sizeof(*alt_ini), GFP_KERNEL);
1145 	if (!alt_ini)
1146 		goto out;
1147 
1148 	alt_ini->vlan_id = lgr->vlan_id;
1149 	alt_ini->check_smcrv2 = true;
1150 	alt_ini->smcrv2.saddr = lgr->saddr;
1151 	smc_pnet_find_alt_roce(lgr, alt_ini, known_dev);
1152 
1153 	if (!alt_ini->smcrv2.ib_dev_v2)
1154 		goto out;
1155 
1156 	memcpy(gidlist->list[gidlist->len++], alt_ini->smcrv2.ib_gid_v2,
1157 	       SMC_GID_SIZE);
1158 
1159 out:
1160 	kfree(alt_ini);
1161 }
1162 
1163 static int smc_connect_rdma_v2_prepare(struct smc_sock *smc,
1164 				       struct smc_clc_msg_accept_confirm *aclc,
1165 				       struct smc_init_info *ini)
1166 {
1167 	struct smc_clc_msg_accept_confirm_v2 *clc_v2 =
1168 		(struct smc_clc_msg_accept_confirm_v2 *)aclc;
1169 	struct smc_clc_first_contact_ext *fce =
1170 		(struct smc_clc_first_contact_ext *)
1171 			(((u8 *)clc_v2) + sizeof(*clc_v2));
1172 
1173 	if (!ini->first_contact_peer || aclc->hdr.version == SMC_V1)
1174 		return 0;
1175 
1176 	if (fce->v2_direct) {
1177 		memcpy(ini->smcrv2.nexthop_mac, &aclc->r0.lcl.mac, ETH_ALEN);
1178 		ini->smcrv2.uses_gateway = false;
1179 	} else {
1180 		if (smc_ib_find_route(smc->clcsock->sk->sk_rcv_saddr,
1181 				      smc_ib_gid_to_ipv4(aclc->r0.lcl.gid),
1182 				      ini->smcrv2.nexthop_mac,
1183 				      &ini->smcrv2.uses_gateway))
1184 			return SMC_CLC_DECL_NOROUTE;
1185 		if (!ini->smcrv2.uses_gateway) {
1186 			/* mismatch: peer claims indirect, but its direct */
1187 			return SMC_CLC_DECL_NOINDIRECT;
1188 		}
1189 	}
1190 	return 0;
1191 }
1192 
1193 /* setup for RDMA connection of client */
1194 static int smc_connect_rdma(struct smc_sock *smc,
1195 			    struct smc_clc_msg_accept_confirm *aclc,
1196 			    struct smc_init_info *ini)
1197 {
1198 	int i, reason_code = 0;
1199 	struct smc_link *link;
1200 	u8 *eid = NULL;
1201 
1202 	ini->is_smcd = false;
1203 	ini->ib_clcqpn = ntoh24(aclc->r0.qpn);
1204 	ini->first_contact_peer = aclc->hdr.typev2 & SMC_FIRST_CONTACT_MASK;
1205 	memcpy(ini->peer_systemid, aclc->r0.lcl.id_for_peer, SMC_SYSTEMID_LEN);
1206 	memcpy(ini->peer_gid, aclc->r0.lcl.gid, SMC_GID_SIZE);
1207 	memcpy(ini->peer_mac, aclc->r0.lcl.mac, ETH_ALEN);
1208 
1209 	reason_code = smc_connect_rdma_v2_prepare(smc, aclc, ini);
1210 	if (reason_code)
1211 		return reason_code;
1212 
1213 	mutex_lock(&smc_client_lgr_pending);
1214 	reason_code = smc_conn_create(smc, ini);
1215 	if (reason_code) {
1216 		mutex_unlock(&smc_client_lgr_pending);
1217 		return reason_code;
1218 	}
1219 
1220 	smc_conn_save_peer_info(smc, aclc);
1221 
1222 	if (ini->first_contact_local) {
1223 		link = smc->conn.lnk;
1224 	} else {
1225 		/* set link that was assigned by server */
1226 		link = NULL;
1227 		for (i = 0; i < SMC_LINKS_PER_LGR_MAX; i++) {
1228 			struct smc_link *l = &smc->conn.lgr->lnk[i];
1229 
1230 			if (l->peer_qpn == ntoh24(aclc->r0.qpn) &&
1231 			    !memcmp(l->peer_gid, &aclc->r0.lcl.gid,
1232 				    SMC_GID_SIZE) &&
1233 			    (aclc->hdr.version > SMC_V1 ||
1234 			     !memcmp(l->peer_mac, &aclc->r0.lcl.mac,
1235 				     sizeof(l->peer_mac)))) {
1236 				link = l;
1237 				break;
1238 			}
1239 		}
1240 		if (!link) {
1241 			reason_code = SMC_CLC_DECL_NOSRVLINK;
1242 			goto connect_abort;
1243 		}
1244 		smc_switch_link_and_count(&smc->conn, link);
1245 	}
1246 
1247 	/* create send buffer and rmb */
1248 	if (smc_buf_create(smc, false)) {
1249 		reason_code = SMC_CLC_DECL_MEM;
1250 		goto connect_abort;
1251 	}
1252 
1253 	if (ini->first_contact_local)
1254 		smc_link_save_peer_info(link, aclc, ini);
1255 
1256 	if (smc_rmb_rtoken_handling(&smc->conn, link, aclc)) {
1257 		reason_code = SMC_CLC_DECL_ERR_RTOK;
1258 		goto connect_abort;
1259 	}
1260 
1261 	smc_close_init(smc);
1262 	smc_rx_init(smc);
1263 
1264 	if (ini->first_contact_local) {
1265 		if (smc_ib_ready_link(link)) {
1266 			reason_code = SMC_CLC_DECL_ERR_RDYLNK;
1267 			goto connect_abort;
1268 		}
1269 	} else {
1270 		/* reg sendbufs if they were vzalloced */
1271 		if (smc->conn.sndbuf_desc->is_vm) {
1272 			if (smcr_lgr_reg_sndbufs(link, smc->conn.sndbuf_desc)) {
1273 				reason_code = SMC_CLC_DECL_ERR_REGBUF;
1274 				goto connect_abort;
1275 			}
1276 		}
1277 		if (smcr_lgr_reg_rmbs(link, smc->conn.rmb_desc)) {
1278 			reason_code = SMC_CLC_DECL_ERR_REGBUF;
1279 			goto connect_abort;
1280 		}
1281 	}
1282 
1283 	if (aclc->hdr.version > SMC_V1) {
1284 		struct smc_clc_msg_accept_confirm_v2 *clc_v2 =
1285 			(struct smc_clc_msg_accept_confirm_v2 *)aclc;
1286 
1287 		eid = clc_v2->r1.eid;
1288 		if (ini->first_contact_local)
1289 			smc_fill_gid_list(link->lgr, &ini->smcrv2.gidlist,
1290 					  link->smcibdev, link->gid);
1291 	}
1292 
1293 	reason_code = smc_clc_send_confirm(smc, ini->first_contact_local,
1294 					   aclc->hdr.version, eid, ini);
1295 	if (reason_code)
1296 		goto connect_abort;
1297 
1298 	smc_tx_init(smc);
1299 
1300 	if (ini->first_contact_local) {
1301 		/* QP confirmation over RoCE fabric */
1302 		smc_llc_flow_initiate(link->lgr, SMC_LLC_FLOW_ADD_LINK);
1303 		reason_code = smcr_clnt_conf_first_link(smc);
1304 		smc_llc_flow_stop(link->lgr, &link->lgr->llc_flow_lcl);
1305 		if (reason_code)
1306 			goto connect_abort;
1307 	}
1308 	mutex_unlock(&smc_client_lgr_pending);
1309 
1310 	smc_copy_sock_settings_to_clc(smc);
1311 	smc->connect_nonblock = 0;
1312 	if (smc->sk.sk_state == SMC_INIT)
1313 		smc->sk.sk_state = SMC_ACTIVE;
1314 
1315 	return 0;
1316 connect_abort:
1317 	smc_conn_abort(smc, ini->first_contact_local);
1318 	mutex_unlock(&smc_client_lgr_pending);
1319 	smc->connect_nonblock = 0;
1320 
1321 	return reason_code;
1322 }
1323 
1324 /* The server has chosen one of the proposed ISM devices for the communication.
1325  * Determine from the CHID of the received CLC ACCEPT the ISM device chosen.
1326  */
1327 static int
1328 smc_v2_determine_accepted_chid(struct smc_clc_msg_accept_confirm_v2 *aclc,
1329 			       struct smc_init_info *ini)
1330 {
1331 	int i;
1332 
1333 	for (i = 0; i < ini->ism_offered_cnt + 1; i++) {
1334 		if (ini->ism_chid[i] == ntohs(aclc->d1.chid)) {
1335 			ini->ism_selected = i;
1336 			return 0;
1337 		}
1338 	}
1339 
1340 	return -EPROTO;
1341 }
1342 
1343 /* setup for ISM connection of client */
1344 static int smc_connect_ism(struct smc_sock *smc,
1345 			   struct smc_clc_msg_accept_confirm *aclc,
1346 			   struct smc_init_info *ini)
1347 {
1348 	u8 *eid = NULL;
1349 	int rc = 0;
1350 
1351 	ini->is_smcd = true;
1352 	ini->first_contact_peer = aclc->hdr.typev2 & SMC_FIRST_CONTACT_MASK;
1353 
1354 	if (aclc->hdr.version == SMC_V2) {
1355 		struct smc_clc_msg_accept_confirm_v2 *aclc_v2 =
1356 			(struct smc_clc_msg_accept_confirm_v2 *)aclc;
1357 
1358 		rc = smc_v2_determine_accepted_chid(aclc_v2, ini);
1359 		if (rc)
1360 			return rc;
1361 	}
1362 	ini->ism_peer_gid[ini->ism_selected] = aclc->d0.gid;
1363 
1364 	/* there is only one lgr role for SMC-D; use server lock */
1365 	mutex_lock(&smc_server_lgr_pending);
1366 	rc = smc_conn_create(smc, ini);
1367 	if (rc) {
1368 		mutex_unlock(&smc_server_lgr_pending);
1369 		return rc;
1370 	}
1371 
1372 	/* Create send and receive buffers */
1373 	rc = smc_buf_create(smc, true);
1374 	if (rc) {
1375 		rc = (rc == -ENOSPC) ? SMC_CLC_DECL_MAX_DMB : SMC_CLC_DECL_MEM;
1376 		goto connect_abort;
1377 	}
1378 
1379 	smc_conn_save_peer_info(smc, aclc);
1380 	smc_close_init(smc);
1381 	smc_rx_init(smc);
1382 	smc_tx_init(smc);
1383 
1384 	if (aclc->hdr.version > SMC_V1) {
1385 		struct smc_clc_msg_accept_confirm_v2 *clc_v2 =
1386 			(struct smc_clc_msg_accept_confirm_v2 *)aclc;
1387 
1388 		eid = clc_v2->d1.eid;
1389 	}
1390 
1391 	rc = smc_clc_send_confirm(smc, ini->first_contact_local,
1392 				  aclc->hdr.version, eid, NULL);
1393 	if (rc)
1394 		goto connect_abort;
1395 	mutex_unlock(&smc_server_lgr_pending);
1396 
1397 	smc_copy_sock_settings_to_clc(smc);
1398 	smc->connect_nonblock = 0;
1399 	if (smc->sk.sk_state == SMC_INIT)
1400 		smc->sk.sk_state = SMC_ACTIVE;
1401 
1402 	return 0;
1403 connect_abort:
1404 	smc_conn_abort(smc, ini->first_contact_local);
1405 	mutex_unlock(&smc_server_lgr_pending);
1406 	smc->connect_nonblock = 0;
1407 
1408 	return rc;
1409 }
1410 
1411 /* check if received accept type and version matches a proposed one */
1412 static int smc_connect_check_aclc(struct smc_init_info *ini,
1413 				  struct smc_clc_msg_accept_confirm *aclc)
1414 {
1415 	if (aclc->hdr.typev1 != SMC_TYPE_R &&
1416 	    aclc->hdr.typev1 != SMC_TYPE_D)
1417 		return SMC_CLC_DECL_MODEUNSUPP;
1418 
1419 	if (aclc->hdr.version >= SMC_V2) {
1420 		if ((aclc->hdr.typev1 == SMC_TYPE_R &&
1421 		     !smcr_indicated(ini->smc_type_v2)) ||
1422 		    (aclc->hdr.typev1 == SMC_TYPE_D &&
1423 		     !smcd_indicated(ini->smc_type_v2)))
1424 			return SMC_CLC_DECL_MODEUNSUPP;
1425 	} else {
1426 		if ((aclc->hdr.typev1 == SMC_TYPE_R &&
1427 		     !smcr_indicated(ini->smc_type_v1)) ||
1428 		    (aclc->hdr.typev1 == SMC_TYPE_D &&
1429 		     !smcd_indicated(ini->smc_type_v1)))
1430 			return SMC_CLC_DECL_MODEUNSUPP;
1431 	}
1432 
1433 	return 0;
1434 }
1435 
1436 /* perform steps before actually connecting */
1437 static int __smc_connect(struct smc_sock *smc)
1438 {
1439 	u8 version = smc_ism_is_v2_capable() ? SMC_V2 : SMC_V1;
1440 	struct smc_clc_msg_accept_confirm_v2 *aclc2;
1441 	struct smc_clc_msg_accept_confirm *aclc;
1442 	struct smc_init_info *ini = NULL;
1443 	u8 *buf = NULL;
1444 	int rc = 0;
1445 
1446 	if (smc->use_fallback)
1447 		return smc_connect_fallback(smc, smc->fallback_rsn);
1448 
1449 	/* if peer has not signalled SMC-capability, fall back */
1450 	if (!tcp_sk(smc->clcsock->sk)->syn_smc)
1451 		return smc_connect_fallback(smc, SMC_CLC_DECL_PEERNOSMC);
1452 
1453 	/* IPSec connections opt out of SMC optimizations */
1454 	if (using_ipsec(smc))
1455 		return smc_connect_decline_fallback(smc, SMC_CLC_DECL_IPSEC,
1456 						    version);
1457 
1458 	ini = kzalloc(sizeof(*ini), GFP_KERNEL);
1459 	if (!ini)
1460 		return smc_connect_decline_fallback(smc, SMC_CLC_DECL_MEM,
1461 						    version);
1462 
1463 	ini->smcd_version = SMC_V1 | SMC_V2;
1464 	ini->smcr_version = SMC_V1 | SMC_V2;
1465 	ini->smc_type_v1 = SMC_TYPE_B;
1466 	ini->smc_type_v2 = SMC_TYPE_B;
1467 
1468 	/* get vlan id from IP device */
1469 	if (smc_vlan_by_tcpsk(smc->clcsock, ini)) {
1470 		ini->smcd_version &= ~SMC_V1;
1471 		ini->smcr_version = 0;
1472 		ini->smc_type_v1 = SMC_TYPE_N;
1473 		if (!ini->smcd_version) {
1474 			rc = SMC_CLC_DECL_GETVLANERR;
1475 			goto fallback;
1476 		}
1477 	}
1478 
1479 	rc = smc_find_proposal_devices(smc, ini);
1480 	if (rc)
1481 		goto fallback;
1482 
1483 	buf = kzalloc(SMC_CLC_MAX_ACCEPT_LEN, GFP_KERNEL);
1484 	if (!buf) {
1485 		rc = SMC_CLC_DECL_MEM;
1486 		goto fallback;
1487 	}
1488 	aclc2 = (struct smc_clc_msg_accept_confirm_v2 *)buf;
1489 	aclc = (struct smc_clc_msg_accept_confirm *)aclc2;
1490 
1491 	/* perform CLC handshake */
1492 	rc = smc_connect_clc(smc, aclc2, ini);
1493 	if (rc) {
1494 		/* -EAGAIN on timeout, see tcp_recvmsg() */
1495 		if (rc == -EAGAIN) {
1496 			rc = -ETIMEDOUT;
1497 			smc->sk.sk_err = ETIMEDOUT;
1498 		}
1499 		goto vlan_cleanup;
1500 	}
1501 
1502 	/* check if smc modes and versions of CLC proposal and accept match */
1503 	rc = smc_connect_check_aclc(ini, aclc);
1504 	version = aclc->hdr.version == SMC_V1 ? SMC_V1 : SMC_V2;
1505 	if (rc)
1506 		goto vlan_cleanup;
1507 
1508 	/* depending on previous steps, connect using rdma or ism */
1509 	if (aclc->hdr.typev1 == SMC_TYPE_R) {
1510 		ini->smcr_version = version;
1511 		rc = smc_connect_rdma(smc, aclc, ini);
1512 	} else if (aclc->hdr.typev1 == SMC_TYPE_D) {
1513 		ini->smcd_version = version;
1514 		rc = smc_connect_ism(smc, aclc, ini);
1515 	}
1516 	if (rc)
1517 		goto vlan_cleanup;
1518 
1519 	SMC_STAT_CLNT_SUCC_INC(sock_net(smc->clcsock->sk), aclc);
1520 	smc_connect_ism_vlan_cleanup(smc, ini);
1521 	kfree(buf);
1522 	kfree(ini);
1523 	return 0;
1524 
1525 vlan_cleanup:
1526 	smc_connect_ism_vlan_cleanup(smc, ini);
1527 	kfree(buf);
1528 fallback:
1529 	kfree(ini);
1530 	return smc_connect_decline_fallback(smc, rc, version);
1531 }
1532 
1533 static void smc_connect_work(struct work_struct *work)
1534 {
1535 	struct smc_sock *smc = container_of(work, struct smc_sock,
1536 					    connect_work);
1537 	long timeo = smc->sk.sk_sndtimeo;
1538 	int rc = 0;
1539 
1540 	if (!timeo)
1541 		timeo = MAX_SCHEDULE_TIMEOUT;
1542 	lock_sock(smc->clcsock->sk);
1543 	if (smc->clcsock->sk->sk_err) {
1544 		smc->sk.sk_err = smc->clcsock->sk->sk_err;
1545 	} else if ((1 << smc->clcsock->sk->sk_state) &
1546 					(TCPF_SYN_SENT | TCPF_SYN_RECV)) {
1547 		rc = sk_stream_wait_connect(smc->clcsock->sk, &timeo);
1548 		if ((rc == -EPIPE) &&
1549 		    ((1 << smc->clcsock->sk->sk_state) &
1550 					(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT)))
1551 			rc = 0;
1552 	}
1553 	release_sock(smc->clcsock->sk);
1554 	lock_sock(&smc->sk);
1555 	if (rc != 0 || smc->sk.sk_err) {
1556 		smc->sk.sk_state = SMC_CLOSED;
1557 		if (rc == -EPIPE || rc == -EAGAIN)
1558 			smc->sk.sk_err = EPIPE;
1559 		else if (rc == -ECONNREFUSED)
1560 			smc->sk.sk_err = ECONNREFUSED;
1561 		else if (signal_pending(current))
1562 			smc->sk.sk_err = -sock_intr_errno(timeo);
1563 		sock_put(&smc->sk); /* passive closing */
1564 		goto out;
1565 	}
1566 
1567 	rc = __smc_connect(smc);
1568 	if (rc < 0)
1569 		smc->sk.sk_err = -rc;
1570 
1571 out:
1572 	if (!sock_flag(&smc->sk, SOCK_DEAD)) {
1573 		if (smc->sk.sk_err) {
1574 			smc->sk.sk_state_change(&smc->sk);
1575 		} else { /* allow polling before and after fallback decision */
1576 			smc->clcsock->sk->sk_write_space(smc->clcsock->sk);
1577 			smc->sk.sk_write_space(&smc->sk);
1578 		}
1579 	}
1580 	release_sock(&smc->sk);
1581 }
1582 
1583 static int smc_connect(struct socket *sock, struct sockaddr *addr,
1584 		       int alen, int flags)
1585 {
1586 	struct sock *sk = sock->sk;
1587 	struct smc_sock *smc;
1588 	int rc = -EINVAL;
1589 
1590 	smc = smc_sk(sk);
1591 
1592 	/* separate smc parameter checking to be safe */
1593 	if (alen < sizeof(addr->sa_family))
1594 		goto out_err;
1595 	if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6)
1596 		goto out_err;
1597 
1598 	lock_sock(sk);
1599 	switch (sock->state) {
1600 	default:
1601 		rc = -EINVAL;
1602 		goto out;
1603 	case SS_CONNECTED:
1604 		rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
1605 		goto out;
1606 	case SS_CONNECTING:
1607 		if (sk->sk_state == SMC_ACTIVE)
1608 			goto connected;
1609 		break;
1610 	case SS_UNCONNECTED:
1611 		sock->state = SS_CONNECTING;
1612 		break;
1613 	}
1614 
1615 	switch (sk->sk_state) {
1616 	default:
1617 		goto out;
1618 	case SMC_CLOSED:
1619 		rc = sock_error(sk) ? : -ECONNABORTED;
1620 		sock->state = SS_UNCONNECTED;
1621 		goto out;
1622 	case SMC_ACTIVE:
1623 		rc = -EISCONN;
1624 		goto out;
1625 	case SMC_INIT:
1626 		break;
1627 	}
1628 
1629 	smc_copy_sock_settings_to_clc(smc);
1630 	tcp_sk(smc->clcsock->sk)->syn_smc = 1;
1631 	if (smc->connect_nonblock) {
1632 		rc = -EALREADY;
1633 		goto out;
1634 	}
1635 	rc = kernel_connect(smc->clcsock, addr, alen, flags);
1636 	if (rc && rc != -EINPROGRESS)
1637 		goto out;
1638 
1639 	if (smc->use_fallback) {
1640 		sock->state = rc ? SS_CONNECTING : SS_CONNECTED;
1641 		goto out;
1642 	}
1643 	sock_hold(&smc->sk); /* sock put in passive closing */
1644 	if (flags & O_NONBLOCK) {
1645 		if (queue_work(smc_hs_wq, &smc->connect_work))
1646 			smc->connect_nonblock = 1;
1647 		rc = -EINPROGRESS;
1648 		goto out;
1649 	} else {
1650 		rc = __smc_connect(smc);
1651 		if (rc < 0)
1652 			goto out;
1653 	}
1654 
1655 connected:
1656 	rc = 0;
1657 	sock->state = SS_CONNECTED;
1658 out:
1659 	release_sock(sk);
1660 out_err:
1661 	return rc;
1662 }
1663 
1664 static int smc_clcsock_accept(struct smc_sock *lsmc, struct smc_sock **new_smc)
1665 {
1666 	struct socket *new_clcsock = NULL;
1667 	struct sock *lsk = &lsmc->sk;
1668 	struct sock *new_sk;
1669 	int rc = -EINVAL;
1670 
1671 	release_sock(lsk);
1672 	new_sk = smc_sock_alloc(sock_net(lsk), NULL, lsk->sk_protocol);
1673 	if (!new_sk) {
1674 		rc = -ENOMEM;
1675 		lsk->sk_err = ENOMEM;
1676 		*new_smc = NULL;
1677 		lock_sock(lsk);
1678 		goto out;
1679 	}
1680 	*new_smc = smc_sk(new_sk);
1681 
1682 	mutex_lock(&lsmc->clcsock_release_lock);
1683 	if (lsmc->clcsock)
1684 		rc = kernel_accept(lsmc->clcsock, &new_clcsock, SOCK_NONBLOCK);
1685 	mutex_unlock(&lsmc->clcsock_release_lock);
1686 	lock_sock(lsk);
1687 	if  (rc < 0 && rc != -EAGAIN)
1688 		lsk->sk_err = -rc;
1689 	if (rc < 0 || lsk->sk_state == SMC_CLOSED) {
1690 		new_sk->sk_prot->unhash(new_sk);
1691 		if (new_clcsock)
1692 			sock_release(new_clcsock);
1693 		new_sk->sk_state = SMC_CLOSED;
1694 		sock_set_flag(new_sk, SOCK_DEAD);
1695 		sock_put(new_sk); /* final */
1696 		*new_smc = NULL;
1697 		goto out;
1698 	}
1699 
1700 	/* new clcsock has inherited the smc listen-specific sk_data_ready
1701 	 * function; switch it back to the original sk_data_ready function
1702 	 */
1703 	new_clcsock->sk->sk_data_ready = lsmc->clcsk_data_ready;
1704 
1705 	/* if new clcsock has also inherited the fallback-specific callback
1706 	 * functions, switch them back to the original ones.
1707 	 */
1708 	if (lsmc->use_fallback) {
1709 		if (lsmc->clcsk_state_change)
1710 			new_clcsock->sk->sk_state_change = lsmc->clcsk_state_change;
1711 		if (lsmc->clcsk_write_space)
1712 			new_clcsock->sk->sk_write_space = lsmc->clcsk_write_space;
1713 		if (lsmc->clcsk_error_report)
1714 			new_clcsock->sk->sk_error_report = lsmc->clcsk_error_report;
1715 	}
1716 
1717 	(*new_smc)->clcsock = new_clcsock;
1718 out:
1719 	return rc;
1720 }
1721 
1722 /* add a just created sock to the accept queue of the listen sock as
1723  * candidate for a following socket accept call from user space
1724  */
1725 static void smc_accept_enqueue(struct sock *parent, struct sock *sk)
1726 {
1727 	struct smc_sock *par = smc_sk(parent);
1728 
1729 	sock_hold(sk); /* sock_put in smc_accept_unlink () */
1730 	spin_lock(&par->accept_q_lock);
1731 	list_add_tail(&smc_sk(sk)->accept_q, &par->accept_q);
1732 	spin_unlock(&par->accept_q_lock);
1733 	sk_acceptq_added(parent);
1734 }
1735 
1736 /* remove a socket from the accept queue of its parental listening socket */
1737 static void smc_accept_unlink(struct sock *sk)
1738 {
1739 	struct smc_sock *par = smc_sk(sk)->listen_smc;
1740 
1741 	spin_lock(&par->accept_q_lock);
1742 	list_del_init(&smc_sk(sk)->accept_q);
1743 	spin_unlock(&par->accept_q_lock);
1744 	sk_acceptq_removed(&smc_sk(sk)->listen_smc->sk);
1745 	sock_put(sk); /* sock_hold in smc_accept_enqueue */
1746 }
1747 
1748 /* remove a sock from the accept queue to bind it to a new socket created
1749  * for a socket accept call from user space
1750  */
1751 struct sock *smc_accept_dequeue(struct sock *parent,
1752 				struct socket *new_sock)
1753 {
1754 	struct smc_sock *isk, *n;
1755 	struct sock *new_sk;
1756 
1757 	list_for_each_entry_safe(isk, n, &smc_sk(parent)->accept_q, accept_q) {
1758 		new_sk = (struct sock *)isk;
1759 
1760 		smc_accept_unlink(new_sk);
1761 		if (new_sk->sk_state == SMC_CLOSED) {
1762 			new_sk->sk_prot->unhash(new_sk);
1763 			if (isk->clcsock) {
1764 				sock_release(isk->clcsock);
1765 				isk->clcsock = NULL;
1766 			}
1767 			sock_put(new_sk); /* final */
1768 			continue;
1769 		}
1770 		if (new_sock) {
1771 			sock_graft(new_sk, new_sock);
1772 			new_sock->state = SS_CONNECTED;
1773 			if (isk->use_fallback) {
1774 				smc_sk(new_sk)->clcsock->file = new_sock->file;
1775 				isk->clcsock->file->private_data = isk->clcsock;
1776 			}
1777 		}
1778 		return new_sk;
1779 	}
1780 	return NULL;
1781 }
1782 
1783 /* clean up for a created but never accepted sock */
1784 void smc_close_non_accepted(struct sock *sk)
1785 {
1786 	struct smc_sock *smc = smc_sk(sk);
1787 
1788 	sock_hold(sk); /* sock_put below */
1789 	lock_sock(sk);
1790 	if (!sk->sk_lingertime)
1791 		/* wait for peer closing */
1792 		sk->sk_lingertime = SMC_MAX_STREAM_WAIT_TIMEOUT;
1793 	__smc_release(smc);
1794 	release_sock(sk);
1795 	sock_put(sk); /* sock_hold above */
1796 	sock_put(sk); /* final sock_put */
1797 }
1798 
1799 static int smcr_serv_conf_first_link(struct smc_sock *smc)
1800 {
1801 	struct smc_link *link = smc->conn.lnk;
1802 	struct smc_llc_qentry *qentry;
1803 	int rc;
1804 
1805 	/* reg the sndbuf if it was vzalloced*/
1806 	if (smc->conn.sndbuf_desc->is_vm) {
1807 		if (smcr_link_reg_buf(link, smc->conn.sndbuf_desc))
1808 			return SMC_CLC_DECL_ERR_REGBUF;
1809 	}
1810 
1811 	/* reg the rmb */
1812 	if (smcr_link_reg_buf(link, smc->conn.rmb_desc))
1813 		return SMC_CLC_DECL_ERR_REGBUF;
1814 
1815 	/* send CONFIRM LINK request to client over the RoCE fabric */
1816 	rc = smc_llc_send_confirm_link(link, SMC_LLC_REQ);
1817 	if (rc < 0)
1818 		return SMC_CLC_DECL_TIMEOUT_CL;
1819 
1820 	/* receive CONFIRM LINK response from client over the RoCE fabric */
1821 	qentry = smc_llc_wait(link->lgr, link, SMC_LLC_WAIT_TIME,
1822 			      SMC_LLC_CONFIRM_LINK);
1823 	if (!qentry) {
1824 		struct smc_clc_msg_decline dclc;
1825 
1826 		rc = smc_clc_wait_msg(smc, &dclc, sizeof(dclc),
1827 				      SMC_CLC_DECLINE, CLC_WAIT_TIME_SHORT);
1828 		return rc == -EAGAIN ? SMC_CLC_DECL_TIMEOUT_CL : rc;
1829 	}
1830 	smc_llc_save_peer_uid(qentry);
1831 	rc = smc_llc_eval_conf_link(qentry, SMC_LLC_RESP);
1832 	smc_llc_flow_qentry_del(&link->lgr->llc_flow_lcl);
1833 	if (rc)
1834 		return SMC_CLC_DECL_RMBE_EC;
1835 
1836 	/* confirm_rkey is implicit on 1st contact */
1837 	smc->conn.rmb_desc->is_conf_rkey = true;
1838 
1839 	smc_llc_link_active(link);
1840 	smcr_lgr_set_type(link->lgr, SMC_LGR_SINGLE);
1841 
1842 	down_write(&link->lgr->llc_conf_mutex);
1843 	/* initial contact - try to establish second link */
1844 	smc_llc_srv_add_link(link, NULL);
1845 	up_write(&link->lgr->llc_conf_mutex);
1846 	return 0;
1847 }
1848 
1849 /* listen worker: finish */
1850 static void smc_listen_out(struct smc_sock *new_smc)
1851 {
1852 	struct smc_sock *lsmc = new_smc->listen_smc;
1853 	struct sock *newsmcsk = &new_smc->sk;
1854 
1855 	if (tcp_sk(new_smc->clcsock->sk)->syn_smc)
1856 		atomic_dec(&lsmc->queued_smc_hs);
1857 
1858 	if (lsmc->sk.sk_state == SMC_LISTEN) {
1859 		lock_sock_nested(&lsmc->sk, SINGLE_DEPTH_NESTING);
1860 		smc_accept_enqueue(&lsmc->sk, newsmcsk);
1861 		release_sock(&lsmc->sk);
1862 	} else { /* no longer listening */
1863 		smc_close_non_accepted(newsmcsk);
1864 	}
1865 
1866 	/* Wake up accept */
1867 	lsmc->sk.sk_data_ready(&lsmc->sk);
1868 	sock_put(&lsmc->sk); /* sock_hold in smc_tcp_listen_work */
1869 }
1870 
1871 /* listen worker: finish in state connected */
1872 static void smc_listen_out_connected(struct smc_sock *new_smc)
1873 {
1874 	struct sock *newsmcsk = &new_smc->sk;
1875 
1876 	if (newsmcsk->sk_state == SMC_INIT)
1877 		newsmcsk->sk_state = SMC_ACTIVE;
1878 
1879 	smc_listen_out(new_smc);
1880 }
1881 
1882 /* listen worker: finish in error state */
1883 static void smc_listen_out_err(struct smc_sock *new_smc)
1884 {
1885 	struct sock *newsmcsk = &new_smc->sk;
1886 	struct net *net = sock_net(newsmcsk);
1887 
1888 	this_cpu_inc(net->smc.smc_stats->srv_hshake_err_cnt);
1889 	if (newsmcsk->sk_state == SMC_INIT)
1890 		sock_put(&new_smc->sk); /* passive closing */
1891 	newsmcsk->sk_state = SMC_CLOSED;
1892 
1893 	smc_listen_out(new_smc);
1894 }
1895 
1896 /* listen worker: decline and fall back if possible */
1897 static void smc_listen_decline(struct smc_sock *new_smc, int reason_code,
1898 			       int local_first, u8 version)
1899 {
1900 	/* RDMA setup failed, switch back to TCP */
1901 	smc_conn_abort(new_smc, local_first);
1902 	if (reason_code < 0 ||
1903 	    smc_switch_to_fallback(new_smc, reason_code)) {
1904 		/* error, no fallback possible */
1905 		smc_listen_out_err(new_smc);
1906 		return;
1907 	}
1908 	if (reason_code && reason_code != SMC_CLC_DECL_PEERDECL) {
1909 		if (smc_clc_send_decline(new_smc, reason_code, version) < 0) {
1910 			smc_listen_out_err(new_smc);
1911 			return;
1912 		}
1913 	}
1914 	smc_listen_out_connected(new_smc);
1915 }
1916 
1917 /* listen worker: version checking */
1918 static int smc_listen_v2_check(struct smc_sock *new_smc,
1919 			       struct smc_clc_msg_proposal *pclc,
1920 			       struct smc_init_info *ini)
1921 {
1922 	struct smc_clc_smcd_v2_extension *pclc_smcd_v2_ext;
1923 	struct smc_clc_v2_extension *pclc_v2_ext;
1924 	int rc = SMC_CLC_DECL_PEERNOSMC;
1925 
1926 	ini->smc_type_v1 = pclc->hdr.typev1;
1927 	ini->smc_type_v2 = pclc->hdr.typev2;
1928 	ini->smcd_version = smcd_indicated(ini->smc_type_v1) ? SMC_V1 : 0;
1929 	ini->smcr_version = smcr_indicated(ini->smc_type_v1) ? SMC_V1 : 0;
1930 	if (pclc->hdr.version > SMC_V1) {
1931 		if (smcd_indicated(ini->smc_type_v2))
1932 			ini->smcd_version |= SMC_V2;
1933 		if (smcr_indicated(ini->smc_type_v2))
1934 			ini->smcr_version |= SMC_V2;
1935 	}
1936 	if (!(ini->smcd_version & SMC_V2) && !(ini->smcr_version & SMC_V2)) {
1937 		rc = SMC_CLC_DECL_PEERNOSMC;
1938 		goto out;
1939 	}
1940 	pclc_v2_ext = smc_get_clc_v2_ext(pclc);
1941 	if (!pclc_v2_ext) {
1942 		ini->smcd_version &= ~SMC_V2;
1943 		ini->smcr_version &= ~SMC_V2;
1944 		rc = SMC_CLC_DECL_NOV2EXT;
1945 		goto out;
1946 	}
1947 	pclc_smcd_v2_ext = smc_get_clc_smcd_v2_ext(pclc_v2_ext);
1948 	if (ini->smcd_version & SMC_V2) {
1949 		if (!smc_ism_is_v2_capable()) {
1950 			ini->smcd_version &= ~SMC_V2;
1951 			rc = SMC_CLC_DECL_NOISM2SUPP;
1952 		} else if (!pclc_smcd_v2_ext) {
1953 			ini->smcd_version &= ~SMC_V2;
1954 			rc = SMC_CLC_DECL_NOV2DEXT;
1955 		} else if (!pclc_v2_ext->hdr.eid_cnt &&
1956 			   !pclc_v2_ext->hdr.flag.seid) {
1957 			ini->smcd_version &= ~SMC_V2;
1958 			rc = SMC_CLC_DECL_NOUEID;
1959 		}
1960 	}
1961 	if (ini->smcr_version & SMC_V2) {
1962 		if (!pclc_v2_ext->hdr.eid_cnt) {
1963 			ini->smcr_version &= ~SMC_V2;
1964 			rc = SMC_CLC_DECL_NOUEID;
1965 		}
1966 	}
1967 
1968 out:
1969 	if (!ini->smcd_version && !ini->smcr_version)
1970 		return rc;
1971 
1972 	return 0;
1973 }
1974 
1975 /* listen worker: check prefixes */
1976 static int smc_listen_prfx_check(struct smc_sock *new_smc,
1977 				 struct smc_clc_msg_proposal *pclc)
1978 {
1979 	struct smc_clc_msg_proposal_prefix *pclc_prfx;
1980 	struct socket *newclcsock = new_smc->clcsock;
1981 
1982 	if (pclc->hdr.typev1 == SMC_TYPE_N)
1983 		return 0;
1984 	pclc_prfx = smc_clc_proposal_get_prefix(pclc);
1985 	if (smc_clc_prfx_match(newclcsock, pclc_prfx))
1986 		return SMC_CLC_DECL_DIFFPREFIX;
1987 
1988 	return 0;
1989 }
1990 
1991 /* listen worker: initialize connection and buffers */
1992 static int smc_listen_rdma_init(struct smc_sock *new_smc,
1993 				struct smc_init_info *ini)
1994 {
1995 	int rc;
1996 
1997 	/* allocate connection / link group */
1998 	rc = smc_conn_create(new_smc, ini);
1999 	if (rc)
2000 		return rc;
2001 
2002 	/* create send buffer and rmb */
2003 	if (smc_buf_create(new_smc, false))
2004 		return SMC_CLC_DECL_MEM;
2005 
2006 	return 0;
2007 }
2008 
2009 /* listen worker: initialize connection and buffers for SMC-D */
2010 static int smc_listen_ism_init(struct smc_sock *new_smc,
2011 			       struct smc_init_info *ini)
2012 {
2013 	int rc;
2014 
2015 	rc = smc_conn_create(new_smc, ini);
2016 	if (rc)
2017 		return rc;
2018 
2019 	/* Create send and receive buffers */
2020 	rc = smc_buf_create(new_smc, true);
2021 	if (rc) {
2022 		smc_conn_abort(new_smc, ini->first_contact_local);
2023 		return (rc == -ENOSPC) ? SMC_CLC_DECL_MAX_DMB :
2024 					 SMC_CLC_DECL_MEM;
2025 	}
2026 
2027 	return 0;
2028 }
2029 
2030 static bool smc_is_already_selected(struct smcd_dev *smcd,
2031 				    struct smc_init_info *ini,
2032 				    int matches)
2033 {
2034 	int i;
2035 
2036 	for (i = 0; i < matches; i++)
2037 		if (smcd == ini->ism_dev[i])
2038 			return true;
2039 
2040 	return false;
2041 }
2042 
2043 /* check for ISM devices matching proposed ISM devices */
2044 static void smc_check_ism_v2_match(struct smc_init_info *ini,
2045 				   u16 proposed_chid, u64 proposed_gid,
2046 				   unsigned int *matches)
2047 {
2048 	struct smcd_dev *smcd;
2049 
2050 	list_for_each_entry(smcd, &smcd_dev_list.list, list) {
2051 		if (smcd->going_away)
2052 			continue;
2053 		if (smc_is_already_selected(smcd, ini, *matches))
2054 			continue;
2055 		if (smc_ism_get_chid(smcd) == proposed_chid &&
2056 		    !smc_ism_cantalk(proposed_gid, ISM_RESERVED_VLANID, smcd)) {
2057 			ini->ism_peer_gid[*matches] = proposed_gid;
2058 			ini->ism_dev[*matches] = smcd;
2059 			(*matches)++;
2060 			break;
2061 		}
2062 	}
2063 }
2064 
2065 static void smc_find_ism_store_rc(u32 rc, struct smc_init_info *ini)
2066 {
2067 	if (!ini->rc)
2068 		ini->rc = rc;
2069 }
2070 
2071 static void smc_find_ism_v2_device_serv(struct smc_sock *new_smc,
2072 					struct smc_clc_msg_proposal *pclc,
2073 					struct smc_init_info *ini)
2074 {
2075 	struct smc_clc_smcd_v2_extension *smcd_v2_ext;
2076 	struct smc_clc_v2_extension *smc_v2_ext;
2077 	struct smc_clc_msg_smcd *pclc_smcd;
2078 	unsigned int matches = 0;
2079 	u8 smcd_version;
2080 	u8 *eid = NULL;
2081 	int i, rc;
2082 
2083 	if (!(ini->smcd_version & SMC_V2) || !smcd_indicated(ini->smc_type_v2))
2084 		goto not_found;
2085 
2086 	pclc_smcd = smc_get_clc_msg_smcd(pclc);
2087 	smc_v2_ext = smc_get_clc_v2_ext(pclc);
2088 	smcd_v2_ext = smc_get_clc_smcd_v2_ext(smc_v2_ext);
2089 
2090 	mutex_lock(&smcd_dev_list.mutex);
2091 	if (pclc_smcd->ism.chid)
2092 		/* check for ISM device matching proposed native ISM device */
2093 		smc_check_ism_v2_match(ini, ntohs(pclc_smcd->ism.chid),
2094 				       ntohll(pclc_smcd->ism.gid), &matches);
2095 	for (i = 1; i <= smc_v2_ext->hdr.ism_gid_cnt; i++) {
2096 		/* check for ISM devices matching proposed non-native ISM
2097 		 * devices
2098 		 */
2099 		smc_check_ism_v2_match(ini,
2100 				       ntohs(smcd_v2_ext->gidchid[i - 1].chid),
2101 				       ntohll(smcd_v2_ext->gidchid[i - 1].gid),
2102 				       &matches);
2103 	}
2104 	mutex_unlock(&smcd_dev_list.mutex);
2105 
2106 	if (!ini->ism_dev[0]) {
2107 		smc_find_ism_store_rc(SMC_CLC_DECL_NOSMCD2DEV, ini);
2108 		goto not_found;
2109 	}
2110 
2111 	smc_ism_get_system_eid(&eid);
2112 	if (!smc_clc_match_eid(ini->negotiated_eid, smc_v2_ext,
2113 			       smcd_v2_ext->system_eid, eid))
2114 		goto not_found;
2115 
2116 	/* separate - outside the smcd_dev_list.lock */
2117 	smcd_version = ini->smcd_version;
2118 	for (i = 0; i < matches; i++) {
2119 		ini->smcd_version = SMC_V2;
2120 		ini->is_smcd = true;
2121 		ini->ism_selected = i;
2122 		rc = smc_listen_ism_init(new_smc, ini);
2123 		if (rc) {
2124 			smc_find_ism_store_rc(rc, ini);
2125 			/* try next active ISM device */
2126 			continue;
2127 		}
2128 		return; /* matching and usable V2 ISM device found */
2129 	}
2130 	/* no V2 ISM device could be initialized */
2131 	ini->smcd_version = smcd_version;	/* restore original value */
2132 	ini->negotiated_eid[0] = 0;
2133 
2134 not_found:
2135 	ini->smcd_version &= ~SMC_V2;
2136 	ini->ism_dev[0] = NULL;
2137 	ini->is_smcd = false;
2138 }
2139 
2140 static void smc_find_ism_v1_device_serv(struct smc_sock *new_smc,
2141 					struct smc_clc_msg_proposal *pclc,
2142 					struct smc_init_info *ini)
2143 {
2144 	struct smc_clc_msg_smcd *pclc_smcd = smc_get_clc_msg_smcd(pclc);
2145 	int rc = 0;
2146 
2147 	/* check if ISM V1 is available */
2148 	if (!(ini->smcd_version & SMC_V1) || !smcd_indicated(ini->smc_type_v1))
2149 		goto not_found;
2150 	ini->is_smcd = true; /* prepare ISM check */
2151 	ini->ism_peer_gid[0] = ntohll(pclc_smcd->ism.gid);
2152 	rc = smc_find_ism_device(new_smc, ini);
2153 	if (rc)
2154 		goto not_found;
2155 	ini->ism_selected = 0;
2156 	rc = smc_listen_ism_init(new_smc, ini);
2157 	if (!rc)
2158 		return;		/* V1 ISM device found */
2159 
2160 not_found:
2161 	smc_find_ism_store_rc(rc, ini);
2162 	ini->smcd_version &= ~SMC_V1;
2163 	ini->ism_dev[0] = NULL;
2164 	ini->is_smcd = false;
2165 }
2166 
2167 /* listen worker: register buffers */
2168 static int smc_listen_rdma_reg(struct smc_sock *new_smc, bool local_first)
2169 {
2170 	struct smc_connection *conn = &new_smc->conn;
2171 
2172 	if (!local_first) {
2173 		/* reg sendbufs if they were vzalloced */
2174 		if (conn->sndbuf_desc->is_vm) {
2175 			if (smcr_lgr_reg_sndbufs(conn->lnk,
2176 						 conn->sndbuf_desc))
2177 				return SMC_CLC_DECL_ERR_REGBUF;
2178 		}
2179 		if (smcr_lgr_reg_rmbs(conn->lnk, conn->rmb_desc))
2180 			return SMC_CLC_DECL_ERR_REGBUF;
2181 	}
2182 
2183 	return 0;
2184 }
2185 
2186 static void smc_find_rdma_v2_device_serv(struct smc_sock *new_smc,
2187 					 struct smc_clc_msg_proposal *pclc,
2188 					 struct smc_init_info *ini)
2189 {
2190 	struct smc_clc_v2_extension *smc_v2_ext;
2191 	u8 smcr_version;
2192 	int rc;
2193 
2194 	if (!(ini->smcr_version & SMC_V2) || !smcr_indicated(ini->smc_type_v2))
2195 		goto not_found;
2196 
2197 	smc_v2_ext = smc_get_clc_v2_ext(pclc);
2198 	if (!smc_clc_match_eid(ini->negotiated_eid, smc_v2_ext, NULL, NULL))
2199 		goto not_found;
2200 
2201 	/* prepare RDMA check */
2202 	memcpy(ini->peer_systemid, pclc->lcl.id_for_peer, SMC_SYSTEMID_LEN);
2203 	memcpy(ini->peer_gid, smc_v2_ext->roce, SMC_GID_SIZE);
2204 	memcpy(ini->peer_mac, pclc->lcl.mac, ETH_ALEN);
2205 	ini->check_smcrv2 = true;
2206 	ini->smcrv2.clc_sk = new_smc->clcsock->sk;
2207 	ini->smcrv2.saddr = new_smc->clcsock->sk->sk_rcv_saddr;
2208 	ini->smcrv2.daddr = smc_ib_gid_to_ipv4(smc_v2_ext->roce);
2209 	rc = smc_find_rdma_device(new_smc, ini);
2210 	if (rc) {
2211 		smc_find_ism_store_rc(rc, ini);
2212 		goto not_found;
2213 	}
2214 	if (!ini->smcrv2.uses_gateway)
2215 		memcpy(ini->smcrv2.nexthop_mac, pclc->lcl.mac, ETH_ALEN);
2216 
2217 	smcr_version = ini->smcr_version;
2218 	ini->smcr_version = SMC_V2;
2219 	rc = smc_listen_rdma_init(new_smc, ini);
2220 	if (!rc)
2221 		rc = smc_listen_rdma_reg(new_smc, ini->first_contact_local);
2222 	if (!rc)
2223 		return;
2224 	ini->smcr_version = smcr_version;
2225 	smc_find_ism_store_rc(rc, ini);
2226 
2227 not_found:
2228 	ini->smcr_version &= ~SMC_V2;
2229 	ini->smcrv2.ib_dev_v2 = NULL;
2230 	ini->check_smcrv2 = false;
2231 }
2232 
2233 static int smc_find_rdma_v1_device_serv(struct smc_sock *new_smc,
2234 					struct smc_clc_msg_proposal *pclc,
2235 					struct smc_init_info *ini)
2236 {
2237 	int rc;
2238 
2239 	if (!(ini->smcr_version & SMC_V1) || !smcr_indicated(ini->smc_type_v1))
2240 		return SMC_CLC_DECL_NOSMCDEV;
2241 
2242 	/* prepare RDMA check */
2243 	memcpy(ini->peer_systemid, pclc->lcl.id_for_peer, SMC_SYSTEMID_LEN);
2244 	memcpy(ini->peer_gid, pclc->lcl.gid, SMC_GID_SIZE);
2245 	memcpy(ini->peer_mac, pclc->lcl.mac, ETH_ALEN);
2246 	rc = smc_find_rdma_device(new_smc, ini);
2247 	if (rc) {
2248 		/* no RDMA device found */
2249 		return SMC_CLC_DECL_NOSMCDEV;
2250 	}
2251 	rc = smc_listen_rdma_init(new_smc, ini);
2252 	if (rc)
2253 		return rc;
2254 	return smc_listen_rdma_reg(new_smc, ini->first_contact_local);
2255 }
2256 
2257 /* determine the local device matching to proposal */
2258 static int smc_listen_find_device(struct smc_sock *new_smc,
2259 				  struct smc_clc_msg_proposal *pclc,
2260 				  struct smc_init_info *ini)
2261 {
2262 	int prfx_rc;
2263 
2264 	/* check for ISM device matching V2 proposed device */
2265 	smc_find_ism_v2_device_serv(new_smc, pclc, ini);
2266 	if (ini->ism_dev[0])
2267 		return 0;
2268 
2269 	/* check for matching IP prefix and subnet length (V1) */
2270 	prfx_rc = smc_listen_prfx_check(new_smc, pclc);
2271 	if (prfx_rc)
2272 		smc_find_ism_store_rc(prfx_rc, ini);
2273 
2274 	/* get vlan id from IP device */
2275 	if (smc_vlan_by_tcpsk(new_smc->clcsock, ini))
2276 		return ini->rc ?: SMC_CLC_DECL_GETVLANERR;
2277 
2278 	/* check for ISM device matching V1 proposed device */
2279 	if (!prfx_rc)
2280 		smc_find_ism_v1_device_serv(new_smc, pclc, ini);
2281 	if (ini->ism_dev[0])
2282 		return 0;
2283 
2284 	if (!smcr_indicated(pclc->hdr.typev1) &&
2285 	    !smcr_indicated(pclc->hdr.typev2))
2286 		/* skip RDMA and decline */
2287 		return ini->rc ?: SMC_CLC_DECL_NOSMCDDEV;
2288 
2289 	/* check if RDMA V2 is available */
2290 	smc_find_rdma_v2_device_serv(new_smc, pclc, ini);
2291 	if (ini->smcrv2.ib_dev_v2)
2292 		return 0;
2293 
2294 	/* check if RDMA V1 is available */
2295 	if (!prfx_rc) {
2296 		int rc;
2297 
2298 		rc = smc_find_rdma_v1_device_serv(new_smc, pclc, ini);
2299 		smc_find_ism_store_rc(rc, ini);
2300 		return (!rc) ? 0 : ini->rc;
2301 	}
2302 	return SMC_CLC_DECL_NOSMCDEV;
2303 }
2304 
2305 /* listen worker: finish RDMA setup */
2306 static int smc_listen_rdma_finish(struct smc_sock *new_smc,
2307 				  struct smc_clc_msg_accept_confirm *cclc,
2308 				  bool local_first,
2309 				  struct smc_init_info *ini)
2310 {
2311 	struct smc_link *link = new_smc->conn.lnk;
2312 	int reason_code = 0;
2313 
2314 	if (local_first)
2315 		smc_link_save_peer_info(link, cclc, ini);
2316 
2317 	if (smc_rmb_rtoken_handling(&new_smc->conn, link, cclc))
2318 		return SMC_CLC_DECL_ERR_RTOK;
2319 
2320 	if (local_first) {
2321 		if (smc_ib_ready_link(link))
2322 			return SMC_CLC_DECL_ERR_RDYLNK;
2323 		/* QP confirmation over RoCE fabric */
2324 		smc_llc_flow_initiate(link->lgr, SMC_LLC_FLOW_ADD_LINK);
2325 		reason_code = smcr_serv_conf_first_link(new_smc);
2326 		smc_llc_flow_stop(link->lgr, &link->lgr->llc_flow_lcl);
2327 	}
2328 	return reason_code;
2329 }
2330 
2331 /* setup for connection of server */
2332 static void smc_listen_work(struct work_struct *work)
2333 {
2334 	struct smc_sock *new_smc = container_of(work, struct smc_sock,
2335 						smc_listen_work);
2336 	struct socket *newclcsock = new_smc->clcsock;
2337 	struct smc_clc_msg_accept_confirm *cclc;
2338 	struct smc_clc_msg_proposal_area *buf;
2339 	struct smc_clc_msg_proposal *pclc;
2340 	struct smc_init_info *ini = NULL;
2341 	u8 proposal_version = SMC_V1;
2342 	u8 accept_version;
2343 	int rc = 0;
2344 
2345 	if (new_smc->listen_smc->sk.sk_state != SMC_LISTEN)
2346 		return smc_listen_out_err(new_smc);
2347 
2348 	if (new_smc->use_fallback) {
2349 		smc_listen_out_connected(new_smc);
2350 		return;
2351 	}
2352 
2353 	/* check if peer is smc capable */
2354 	if (!tcp_sk(newclcsock->sk)->syn_smc) {
2355 		rc = smc_switch_to_fallback(new_smc, SMC_CLC_DECL_PEERNOSMC);
2356 		if (rc)
2357 			smc_listen_out_err(new_smc);
2358 		else
2359 			smc_listen_out_connected(new_smc);
2360 		return;
2361 	}
2362 
2363 	/* do inband token exchange -
2364 	 * wait for and receive SMC Proposal CLC message
2365 	 */
2366 	buf = kzalloc(sizeof(*buf), GFP_KERNEL);
2367 	if (!buf) {
2368 		rc = SMC_CLC_DECL_MEM;
2369 		goto out_decl;
2370 	}
2371 	pclc = (struct smc_clc_msg_proposal *)buf;
2372 	rc = smc_clc_wait_msg(new_smc, pclc, sizeof(*buf),
2373 			      SMC_CLC_PROPOSAL, CLC_WAIT_TIME);
2374 	if (rc)
2375 		goto out_decl;
2376 
2377 	if (pclc->hdr.version > SMC_V1)
2378 		proposal_version = SMC_V2;
2379 
2380 	/* IPSec connections opt out of SMC optimizations */
2381 	if (using_ipsec(new_smc)) {
2382 		rc = SMC_CLC_DECL_IPSEC;
2383 		goto out_decl;
2384 	}
2385 
2386 	ini = kzalloc(sizeof(*ini), GFP_KERNEL);
2387 	if (!ini) {
2388 		rc = SMC_CLC_DECL_MEM;
2389 		goto out_decl;
2390 	}
2391 
2392 	/* initial version checking */
2393 	rc = smc_listen_v2_check(new_smc, pclc, ini);
2394 	if (rc)
2395 		goto out_decl;
2396 
2397 	mutex_lock(&smc_server_lgr_pending);
2398 	smc_close_init(new_smc);
2399 	smc_rx_init(new_smc);
2400 	smc_tx_init(new_smc);
2401 
2402 	/* determine ISM or RoCE device used for connection */
2403 	rc = smc_listen_find_device(new_smc, pclc, ini);
2404 	if (rc)
2405 		goto out_unlock;
2406 
2407 	/* send SMC Accept CLC message */
2408 	accept_version = ini->is_smcd ? ini->smcd_version : ini->smcr_version;
2409 	rc = smc_clc_send_accept(new_smc, ini->first_contact_local,
2410 				 accept_version, ini->negotiated_eid);
2411 	if (rc)
2412 		goto out_unlock;
2413 
2414 	/* SMC-D does not need this lock any more */
2415 	if (ini->is_smcd)
2416 		mutex_unlock(&smc_server_lgr_pending);
2417 
2418 	/* receive SMC Confirm CLC message */
2419 	memset(buf, 0, sizeof(*buf));
2420 	cclc = (struct smc_clc_msg_accept_confirm *)buf;
2421 	rc = smc_clc_wait_msg(new_smc, cclc, sizeof(*buf),
2422 			      SMC_CLC_CONFIRM, CLC_WAIT_TIME);
2423 	if (rc) {
2424 		if (!ini->is_smcd)
2425 			goto out_unlock;
2426 		goto out_decl;
2427 	}
2428 
2429 	/* finish worker */
2430 	if (!ini->is_smcd) {
2431 		rc = smc_listen_rdma_finish(new_smc, cclc,
2432 					    ini->first_contact_local, ini);
2433 		if (rc)
2434 			goto out_unlock;
2435 		mutex_unlock(&smc_server_lgr_pending);
2436 	}
2437 	smc_conn_save_peer_info(new_smc, cclc);
2438 	smc_listen_out_connected(new_smc);
2439 	SMC_STAT_SERV_SUCC_INC(sock_net(newclcsock->sk), ini);
2440 	goto out_free;
2441 
2442 out_unlock:
2443 	mutex_unlock(&smc_server_lgr_pending);
2444 out_decl:
2445 	smc_listen_decline(new_smc, rc, ini ? ini->first_contact_local : 0,
2446 			   proposal_version);
2447 out_free:
2448 	kfree(ini);
2449 	kfree(buf);
2450 }
2451 
2452 static void smc_tcp_listen_work(struct work_struct *work)
2453 {
2454 	struct smc_sock *lsmc = container_of(work, struct smc_sock,
2455 					     tcp_listen_work);
2456 	struct sock *lsk = &lsmc->sk;
2457 	struct smc_sock *new_smc;
2458 	int rc = 0;
2459 
2460 	lock_sock(lsk);
2461 	while (lsk->sk_state == SMC_LISTEN) {
2462 		rc = smc_clcsock_accept(lsmc, &new_smc);
2463 		if (rc) /* clcsock accept queue empty or error */
2464 			goto out;
2465 		if (!new_smc)
2466 			continue;
2467 
2468 		if (tcp_sk(new_smc->clcsock->sk)->syn_smc)
2469 			atomic_inc(&lsmc->queued_smc_hs);
2470 
2471 		new_smc->listen_smc = lsmc;
2472 		new_smc->use_fallback = lsmc->use_fallback;
2473 		new_smc->fallback_rsn = lsmc->fallback_rsn;
2474 		sock_hold(lsk); /* sock_put in smc_listen_work */
2475 		INIT_WORK(&new_smc->smc_listen_work, smc_listen_work);
2476 		smc_copy_sock_settings_to_smc(new_smc);
2477 		new_smc->sk.sk_sndbuf = lsmc->sk.sk_sndbuf;
2478 		new_smc->sk.sk_rcvbuf = lsmc->sk.sk_rcvbuf;
2479 		sock_hold(&new_smc->sk); /* sock_put in passive closing */
2480 		if (!queue_work(smc_hs_wq, &new_smc->smc_listen_work))
2481 			sock_put(&new_smc->sk);
2482 	}
2483 
2484 out:
2485 	release_sock(lsk);
2486 	sock_put(&lsmc->sk); /* sock_hold in smc_clcsock_data_ready() */
2487 }
2488 
2489 static void smc_clcsock_data_ready(struct sock *listen_clcsock)
2490 {
2491 	struct smc_sock *lsmc;
2492 
2493 	read_lock_bh(&listen_clcsock->sk_callback_lock);
2494 	lsmc = smc_clcsock_user_data(listen_clcsock);
2495 	if (!lsmc)
2496 		goto out;
2497 	lsmc->clcsk_data_ready(listen_clcsock);
2498 	if (lsmc->sk.sk_state == SMC_LISTEN) {
2499 		sock_hold(&lsmc->sk); /* sock_put in smc_tcp_listen_work() */
2500 		if (!queue_work(smc_tcp_ls_wq, &lsmc->tcp_listen_work))
2501 			sock_put(&lsmc->sk);
2502 	}
2503 out:
2504 	read_unlock_bh(&listen_clcsock->sk_callback_lock);
2505 }
2506 
2507 static int smc_listen(struct socket *sock, int backlog)
2508 {
2509 	struct sock *sk = sock->sk;
2510 	struct smc_sock *smc;
2511 	int rc;
2512 
2513 	smc = smc_sk(sk);
2514 	lock_sock(sk);
2515 
2516 	rc = -EINVAL;
2517 	if ((sk->sk_state != SMC_INIT && sk->sk_state != SMC_LISTEN) ||
2518 	    smc->connect_nonblock || sock->state != SS_UNCONNECTED)
2519 		goto out;
2520 
2521 	rc = 0;
2522 	if (sk->sk_state == SMC_LISTEN) {
2523 		sk->sk_max_ack_backlog = backlog;
2524 		goto out;
2525 	}
2526 	/* some socket options are handled in core, so we could not apply
2527 	 * them to the clc socket -- copy smc socket options to clc socket
2528 	 */
2529 	smc_copy_sock_settings_to_clc(smc);
2530 	if (!smc->use_fallback)
2531 		tcp_sk(smc->clcsock->sk)->syn_smc = 1;
2532 
2533 	/* save original sk_data_ready function and establish
2534 	 * smc-specific sk_data_ready function
2535 	 */
2536 	write_lock_bh(&smc->clcsock->sk->sk_callback_lock);
2537 	smc->clcsock->sk->sk_user_data =
2538 		(void *)((uintptr_t)smc | SK_USER_DATA_NOCOPY);
2539 	smc_clcsock_replace_cb(&smc->clcsock->sk->sk_data_ready,
2540 			       smc_clcsock_data_ready, &smc->clcsk_data_ready);
2541 	write_unlock_bh(&smc->clcsock->sk->sk_callback_lock);
2542 
2543 	/* save original ops */
2544 	smc->ori_af_ops = inet_csk(smc->clcsock->sk)->icsk_af_ops;
2545 
2546 	smc->af_ops = *smc->ori_af_ops;
2547 	smc->af_ops.syn_recv_sock = smc_tcp_syn_recv_sock;
2548 
2549 	inet_csk(smc->clcsock->sk)->icsk_af_ops = &smc->af_ops;
2550 
2551 	if (smc->limit_smc_hs)
2552 		tcp_sk(smc->clcsock->sk)->smc_hs_congested = smc_hs_congested;
2553 
2554 	rc = kernel_listen(smc->clcsock, backlog);
2555 	if (rc) {
2556 		write_lock_bh(&smc->clcsock->sk->sk_callback_lock);
2557 		smc_clcsock_restore_cb(&smc->clcsock->sk->sk_data_ready,
2558 				       &smc->clcsk_data_ready);
2559 		smc->clcsock->sk->sk_user_data = NULL;
2560 		write_unlock_bh(&smc->clcsock->sk->sk_callback_lock);
2561 		goto out;
2562 	}
2563 	sk->sk_max_ack_backlog = backlog;
2564 	sk->sk_ack_backlog = 0;
2565 	sk->sk_state = SMC_LISTEN;
2566 
2567 out:
2568 	release_sock(sk);
2569 	return rc;
2570 }
2571 
2572 static int smc_accept(struct socket *sock, struct socket *new_sock,
2573 		      int flags, bool kern)
2574 {
2575 	struct sock *sk = sock->sk, *nsk;
2576 	DECLARE_WAITQUEUE(wait, current);
2577 	struct smc_sock *lsmc;
2578 	long timeo;
2579 	int rc = 0;
2580 
2581 	lsmc = smc_sk(sk);
2582 	sock_hold(sk); /* sock_put below */
2583 	lock_sock(sk);
2584 
2585 	if (lsmc->sk.sk_state != SMC_LISTEN) {
2586 		rc = -EINVAL;
2587 		release_sock(sk);
2588 		goto out;
2589 	}
2590 
2591 	/* Wait for an incoming connection */
2592 	timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
2593 	add_wait_queue_exclusive(sk_sleep(sk), &wait);
2594 	while (!(nsk = smc_accept_dequeue(sk, new_sock))) {
2595 		set_current_state(TASK_INTERRUPTIBLE);
2596 		if (!timeo) {
2597 			rc = -EAGAIN;
2598 			break;
2599 		}
2600 		release_sock(sk);
2601 		timeo = schedule_timeout(timeo);
2602 		/* wakeup by sk_data_ready in smc_listen_work() */
2603 		sched_annotate_sleep();
2604 		lock_sock(sk);
2605 		if (signal_pending(current)) {
2606 			rc = sock_intr_errno(timeo);
2607 			break;
2608 		}
2609 	}
2610 	set_current_state(TASK_RUNNING);
2611 	remove_wait_queue(sk_sleep(sk), &wait);
2612 
2613 	if (!rc)
2614 		rc = sock_error(nsk);
2615 	release_sock(sk);
2616 	if (rc)
2617 		goto out;
2618 
2619 	if (lsmc->sockopt_defer_accept && !(flags & O_NONBLOCK)) {
2620 		/* wait till data arrives on the socket */
2621 		timeo = msecs_to_jiffies(lsmc->sockopt_defer_accept *
2622 								MSEC_PER_SEC);
2623 		if (smc_sk(nsk)->use_fallback) {
2624 			struct sock *clcsk = smc_sk(nsk)->clcsock->sk;
2625 
2626 			lock_sock(clcsk);
2627 			if (skb_queue_empty(&clcsk->sk_receive_queue))
2628 				sk_wait_data(clcsk, &timeo, NULL);
2629 			release_sock(clcsk);
2630 		} else if (!atomic_read(&smc_sk(nsk)->conn.bytes_to_rcv)) {
2631 			lock_sock(nsk);
2632 			smc_rx_wait(smc_sk(nsk), &timeo, smc_rx_data_available);
2633 			release_sock(nsk);
2634 		}
2635 	}
2636 
2637 out:
2638 	sock_put(sk); /* sock_hold above */
2639 	return rc;
2640 }
2641 
2642 static int smc_getname(struct socket *sock, struct sockaddr *addr,
2643 		       int peer)
2644 {
2645 	struct smc_sock *smc;
2646 
2647 	if (peer && (sock->sk->sk_state != SMC_ACTIVE) &&
2648 	    (sock->sk->sk_state != SMC_APPCLOSEWAIT1))
2649 		return -ENOTCONN;
2650 
2651 	smc = smc_sk(sock->sk);
2652 
2653 	return smc->clcsock->ops->getname(smc->clcsock, addr, peer);
2654 }
2655 
2656 static int smc_sendmsg(struct socket *sock, struct msghdr *msg, size_t len)
2657 {
2658 	struct sock *sk = sock->sk;
2659 	struct smc_sock *smc;
2660 	int rc;
2661 
2662 	smc = smc_sk(sk);
2663 	lock_sock(sk);
2664 
2665 	/* SMC does not support connect with fastopen */
2666 	if (msg->msg_flags & MSG_FASTOPEN) {
2667 		/* not connected yet, fallback */
2668 		if (sk->sk_state == SMC_INIT && !smc->connect_nonblock) {
2669 			rc = smc_switch_to_fallback(smc, SMC_CLC_DECL_OPTUNSUPP);
2670 			if (rc)
2671 				goto out;
2672 		} else {
2673 			rc = -EINVAL;
2674 			goto out;
2675 		}
2676 	} else if ((sk->sk_state != SMC_ACTIVE) &&
2677 		   (sk->sk_state != SMC_APPCLOSEWAIT1) &&
2678 		   (sk->sk_state != SMC_INIT)) {
2679 		rc = -EPIPE;
2680 		goto out;
2681 	}
2682 
2683 	if (smc->use_fallback) {
2684 		rc = smc->clcsock->ops->sendmsg(smc->clcsock, msg, len);
2685 	} else {
2686 		rc = smc_tx_sendmsg(smc, msg, len);
2687 		SMC_STAT_TX_PAYLOAD(smc, len, rc);
2688 	}
2689 out:
2690 	release_sock(sk);
2691 	return rc;
2692 }
2693 
2694 static int smc_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
2695 		       int flags)
2696 {
2697 	struct sock *sk = sock->sk;
2698 	struct smc_sock *smc;
2699 	int rc = -ENOTCONN;
2700 
2701 	smc = smc_sk(sk);
2702 	lock_sock(sk);
2703 	if (sk->sk_state == SMC_CLOSED && (sk->sk_shutdown & RCV_SHUTDOWN)) {
2704 		/* socket was connected before, no more data to read */
2705 		rc = 0;
2706 		goto out;
2707 	}
2708 	if ((sk->sk_state == SMC_INIT) ||
2709 	    (sk->sk_state == SMC_LISTEN) ||
2710 	    (sk->sk_state == SMC_CLOSED))
2711 		goto out;
2712 
2713 	if (sk->sk_state == SMC_PEERFINCLOSEWAIT) {
2714 		rc = 0;
2715 		goto out;
2716 	}
2717 
2718 	if (smc->use_fallback) {
2719 		rc = smc->clcsock->ops->recvmsg(smc->clcsock, msg, len, flags);
2720 	} else {
2721 		msg->msg_namelen = 0;
2722 		rc = smc_rx_recvmsg(smc, msg, NULL, len, flags);
2723 		SMC_STAT_RX_PAYLOAD(smc, rc, rc);
2724 	}
2725 
2726 out:
2727 	release_sock(sk);
2728 	return rc;
2729 }
2730 
2731 static __poll_t smc_accept_poll(struct sock *parent)
2732 {
2733 	struct smc_sock *isk = smc_sk(parent);
2734 	__poll_t mask = 0;
2735 
2736 	spin_lock(&isk->accept_q_lock);
2737 	if (!list_empty(&isk->accept_q))
2738 		mask = EPOLLIN | EPOLLRDNORM;
2739 	spin_unlock(&isk->accept_q_lock);
2740 
2741 	return mask;
2742 }
2743 
2744 static __poll_t smc_poll(struct file *file, struct socket *sock,
2745 			     poll_table *wait)
2746 {
2747 	struct sock *sk = sock->sk;
2748 	struct smc_sock *smc;
2749 	__poll_t mask = 0;
2750 
2751 	if (!sk)
2752 		return EPOLLNVAL;
2753 
2754 	smc = smc_sk(sock->sk);
2755 	if (smc->use_fallback) {
2756 		/* delegate to CLC child sock */
2757 		mask = smc->clcsock->ops->poll(file, smc->clcsock, wait);
2758 		sk->sk_err = smc->clcsock->sk->sk_err;
2759 	} else {
2760 		if (sk->sk_state != SMC_CLOSED)
2761 			sock_poll_wait(file, sock, wait);
2762 		if (sk->sk_err)
2763 			mask |= EPOLLERR;
2764 		if ((sk->sk_shutdown == SHUTDOWN_MASK) ||
2765 		    (sk->sk_state == SMC_CLOSED))
2766 			mask |= EPOLLHUP;
2767 		if (sk->sk_state == SMC_LISTEN) {
2768 			/* woken up by sk_data_ready in smc_listen_work() */
2769 			mask |= smc_accept_poll(sk);
2770 		} else if (smc->use_fallback) { /* as result of connect_work()*/
2771 			mask |= smc->clcsock->ops->poll(file, smc->clcsock,
2772 							   wait);
2773 			sk->sk_err = smc->clcsock->sk->sk_err;
2774 		} else {
2775 			if ((sk->sk_state != SMC_INIT &&
2776 			     atomic_read(&smc->conn.sndbuf_space)) ||
2777 			    sk->sk_shutdown & SEND_SHUTDOWN) {
2778 				mask |= EPOLLOUT | EPOLLWRNORM;
2779 			} else {
2780 				sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
2781 				set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
2782 			}
2783 			if (atomic_read(&smc->conn.bytes_to_rcv))
2784 				mask |= EPOLLIN | EPOLLRDNORM;
2785 			if (sk->sk_shutdown & RCV_SHUTDOWN)
2786 				mask |= EPOLLIN | EPOLLRDNORM | EPOLLRDHUP;
2787 			if (sk->sk_state == SMC_APPCLOSEWAIT1)
2788 				mask |= EPOLLIN;
2789 			if (smc->conn.urg_state == SMC_URG_VALID)
2790 				mask |= EPOLLPRI;
2791 		}
2792 	}
2793 
2794 	return mask;
2795 }
2796 
2797 static int smc_shutdown(struct socket *sock, int how)
2798 {
2799 	struct sock *sk = sock->sk;
2800 	bool do_shutdown = true;
2801 	struct smc_sock *smc;
2802 	int rc = -EINVAL;
2803 	int old_state;
2804 	int rc1 = 0;
2805 
2806 	smc = smc_sk(sk);
2807 
2808 	if ((how < SHUT_RD) || (how > SHUT_RDWR))
2809 		return rc;
2810 
2811 	lock_sock(sk);
2812 
2813 	if (sock->state == SS_CONNECTING) {
2814 		if (sk->sk_state == SMC_ACTIVE)
2815 			sock->state = SS_CONNECTED;
2816 		else if (sk->sk_state == SMC_PEERCLOSEWAIT1 ||
2817 			 sk->sk_state == SMC_PEERCLOSEWAIT2 ||
2818 			 sk->sk_state == SMC_APPCLOSEWAIT1 ||
2819 			 sk->sk_state == SMC_APPCLOSEWAIT2 ||
2820 			 sk->sk_state == SMC_APPFINCLOSEWAIT)
2821 			sock->state = SS_DISCONNECTING;
2822 	}
2823 
2824 	rc = -ENOTCONN;
2825 	if ((sk->sk_state != SMC_ACTIVE) &&
2826 	    (sk->sk_state != SMC_PEERCLOSEWAIT1) &&
2827 	    (sk->sk_state != SMC_PEERCLOSEWAIT2) &&
2828 	    (sk->sk_state != SMC_APPCLOSEWAIT1) &&
2829 	    (sk->sk_state != SMC_APPCLOSEWAIT2) &&
2830 	    (sk->sk_state != SMC_APPFINCLOSEWAIT))
2831 		goto out;
2832 	if (smc->use_fallback) {
2833 		rc = kernel_sock_shutdown(smc->clcsock, how);
2834 		sk->sk_shutdown = smc->clcsock->sk->sk_shutdown;
2835 		if (sk->sk_shutdown == SHUTDOWN_MASK) {
2836 			sk->sk_state = SMC_CLOSED;
2837 			sk->sk_socket->state = SS_UNCONNECTED;
2838 			sock_put(sk);
2839 		}
2840 		goto out;
2841 	}
2842 	switch (how) {
2843 	case SHUT_RDWR:		/* shutdown in both directions */
2844 		old_state = sk->sk_state;
2845 		rc = smc_close_active(smc);
2846 		if (old_state == SMC_ACTIVE &&
2847 		    sk->sk_state == SMC_PEERCLOSEWAIT1)
2848 			do_shutdown = false;
2849 		break;
2850 	case SHUT_WR:
2851 		rc = smc_close_shutdown_write(smc);
2852 		break;
2853 	case SHUT_RD:
2854 		rc = 0;
2855 		/* nothing more to do because peer is not involved */
2856 		break;
2857 	}
2858 	if (do_shutdown && smc->clcsock)
2859 		rc1 = kernel_sock_shutdown(smc->clcsock, how);
2860 	/* map sock_shutdown_cmd constants to sk_shutdown value range */
2861 	sk->sk_shutdown |= how + 1;
2862 
2863 	if (sk->sk_state == SMC_CLOSED)
2864 		sock->state = SS_UNCONNECTED;
2865 	else
2866 		sock->state = SS_DISCONNECTING;
2867 out:
2868 	release_sock(sk);
2869 	return rc ? rc : rc1;
2870 }
2871 
2872 static int __smc_getsockopt(struct socket *sock, int level, int optname,
2873 			    char __user *optval, int __user *optlen)
2874 {
2875 	struct smc_sock *smc;
2876 	int val, len;
2877 
2878 	smc = smc_sk(sock->sk);
2879 
2880 	if (get_user(len, optlen))
2881 		return -EFAULT;
2882 
2883 	len = min_t(int, len, sizeof(int));
2884 
2885 	if (len < 0)
2886 		return -EINVAL;
2887 
2888 	switch (optname) {
2889 	case SMC_LIMIT_HS:
2890 		val = smc->limit_smc_hs;
2891 		break;
2892 	default:
2893 		return -EOPNOTSUPP;
2894 	}
2895 
2896 	if (put_user(len, optlen))
2897 		return -EFAULT;
2898 	if (copy_to_user(optval, &val, len))
2899 		return -EFAULT;
2900 
2901 	return 0;
2902 }
2903 
2904 static int __smc_setsockopt(struct socket *sock, int level, int optname,
2905 			    sockptr_t optval, unsigned int optlen)
2906 {
2907 	struct sock *sk = sock->sk;
2908 	struct smc_sock *smc;
2909 	int val, rc;
2910 
2911 	smc = smc_sk(sk);
2912 
2913 	lock_sock(sk);
2914 	switch (optname) {
2915 	case SMC_LIMIT_HS:
2916 		if (optlen < sizeof(int)) {
2917 			rc = -EINVAL;
2918 			break;
2919 		}
2920 		if (copy_from_sockptr(&val, optval, sizeof(int))) {
2921 			rc = -EFAULT;
2922 			break;
2923 		}
2924 
2925 		smc->limit_smc_hs = !!val;
2926 		rc = 0;
2927 		break;
2928 	default:
2929 		rc = -EOPNOTSUPP;
2930 		break;
2931 	}
2932 	release_sock(sk);
2933 
2934 	return rc;
2935 }
2936 
2937 static int smc_setsockopt(struct socket *sock, int level, int optname,
2938 			  sockptr_t optval, unsigned int optlen)
2939 {
2940 	struct sock *sk = sock->sk;
2941 	struct smc_sock *smc;
2942 	int val, rc;
2943 
2944 	if (level == SOL_TCP && optname == TCP_ULP)
2945 		return -EOPNOTSUPP;
2946 	else if (level == SOL_SMC)
2947 		return __smc_setsockopt(sock, level, optname, optval, optlen);
2948 
2949 	smc = smc_sk(sk);
2950 
2951 	/* generic setsockopts reaching us here always apply to the
2952 	 * CLC socket
2953 	 */
2954 	mutex_lock(&smc->clcsock_release_lock);
2955 	if (!smc->clcsock) {
2956 		mutex_unlock(&smc->clcsock_release_lock);
2957 		return -EBADF;
2958 	}
2959 	if (unlikely(!smc->clcsock->ops->setsockopt))
2960 		rc = -EOPNOTSUPP;
2961 	else
2962 		rc = smc->clcsock->ops->setsockopt(smc->clcsock, level, optname,
2963 						   optval, optlen);
2964 	if (smc->clcsock->sk->sk_err) {
2965 		sk->sk_err = smc->clcsock->sk->sk_err;
2966 		sk_error_report(sk);
2967 	}
2968 	mutex_unlock(&smc->clcsock_release_lock);
2969 
2970 	if (optlen < sizeof(int))
2971 		return -EINVAL;
2972 	if (copy_from_sockptr(&val, optval, sizeof(int)))
2973 		return -EFAULT;
2974 
2975 	lock_sock(sk);
2976 	if (rc || smc->use_fallback)
2977 		goto out;
2978 	switch (optname) {
2979 	case TCP_FASTOPEN:
2980 	case TCP_FASTOPEN_CONNECT:
2981 	case TCP_FASTOPEN_KEY:
2982 	case TCP_FASTOPEN_NO_COOKIE:
2983 		/* option not supported by SMC */
2984 		if (sk->sk_state == SMC_INIT && !smc->connect_nonblock) {
2985 			rc = smc_switch_to_fallback(smc, SMC_CLC_DECL_OPTUNSUPP);
2986 		} else {
2987 			rc = -EINVAL;
2988 		}
2989 		break;
2990 	case TCP_NODELAY:
2991 		if (sk->sk_state != SMC_INIT &&
2992 		    sk->sk_state != SMC_LISTEN &&
2993 		    sk->sk_state != SMC_CLOSED) {
2994 			if (val) {
2995 				SMC_STAT_INC(smc, ndly_cnt);
2996 				smc_tx_pending(&smc->conn);
2997 				cancel_delayed_work(&smc->conn.tx_work);
2998 			}
2999 		}
3000 		break;
3001 	case TCP_CORK:
3002 		if (sk->sk_state != SMC_INIT &&
3003 		    sk->sk_state != SMC_LISTEN &&
3004 		    sk->sk_state != SMC_CLOSED) {
3005 			if (!val) {
3006 				SMC_STAT_INC(smc, cork_cnt);
3007 				smc_tx_pending(&smc->conn);
3008 				cancel_delayed_work(&smc->conn.tx_work);
3009 			}
3010 		}
3011 		break;
3012 	case TCP_DEFER_ACCEPT:
3013 		smc->sockopt_defer_accept = val;
3014 		break;
3015 	default:
3016 		break;
3017 	}
3018 out:
3019 	release_sock(sk);
3020 
3021 	return rc;
3022 }
3023 
3024 static int smc_getsockopt(struct socket *sock, int level, int optname,
3025 			  char __user *optval, int __user *optlen)
3026 {
3027 	struct smc_sock *smc;
3028 	int rc;
3029 
3030 	if (level == SOL_SMC)
3031 		return __smc_getsockopt(sock, level, optname, optval, optlen);
3032 
3033 	smc = smc_sk(sock->sk);
3034 	mutex_lock(&smc->clcsock_release_lock);
3035 	if (!smc->clcsock) {
3036 		mutex_unlock(&smc->clcsock_release_lock);
3037 		return -EBADF;
3038 	}
3039 	/* socket options apply to the CLC socket */
3040 	if (unlikely(!smc->clcsock->ops->getsockopt)) {
3041 		mutex_unlock(&smc->clcsock_release_lock);
3042 		return -EOPNOTSUPP;
3043 	}
3044 	rc = smc->clcsock->ops->getsockopt(smc->clcsock, level, optname,
3045 					   optval, optlen);
3046 	mutex_unlock(&smc->clcsock_release_lock);
3047 	return rc;
3048 }
3049 
3050 static int smc_ioctl(struct socket *sock, unsigned int cmd,
3051 		     unsigned long arg)
3052 {
3053 	union smc_host_cursor cons, urg;
3054 	struct smc_connection *conn;
3055 	struct smc_sock *smc;
3056 	int answ;
3057 
3058 	smc = smc_sk(sock->sk);
3059 	conn = &smc->conn;
3060 	lock_sock(&smc->sk);
3061 	if (smc->use_fallback) {
3062 		if (!smc->clcsock) {
3063 			release_sock(&smc->sk);
3064 			return -EBADF;
3065 		}
3066 		answ = smc->clcsock->ops->ioctl(smc->clcsock, cmd, arg);
3067 		release_sock(&smc->sk);
3068 		return answ;
3069 	}
3070 	switch (cmd) {
3071 	case SIOCINQ: /* same as FIONREAD */
3072 		if (smc->sk.sk_state == SMC_LISTEN) {
3073 			release_sock(&smc->sk);
3074 			return -EINVAL;
3075 		}
3076 		if (smc->sk.sk_state == SMC_INIT ||
3077 		    smc->sk.sk_state == SMC_CLOSED)
3078 			answ = 0;
3079 		else
3080 			answ = atomic_read(&smc->conn.bytes_to_rcv);
3081 		break;
3082 	case SIOCOUTQ:
3083 		/* output queue size (not send + not acked) */
3084 		if (smc->sk.sk_state == SMC_LISTEN) {
3085 			release_sock(&smc->sk);
3086 			return -EINVAL;
3087 		}
3088 		if (smc->sk.sk_state == SMC_INIT ||
3089 		    smc->sk.sk_state == SMC_CLOSED)
3090 			answ = 0;
3091 		else
3092 			answ = smc->conn.sndbuf_desc->len -
3093 					atomic_read(&smc->conn.sndbuf_space);
3094 		break;
3095 	case SIOCOUTQNSD:
3096 		/* output queue size (not send only) */
3097 		if (smc->sk.sk_state == SMC_LISTEN) {
3098 			release_sock(&smc->sk);
3099 			return -EINVAL;
3100 		}
3101 		if (smc->sk.sk_state == SMC_INIT ||
3102 		    smc->sk.sk_state == SMC_CLOSED)
3103 			answ = 0;
3104 		else
3105 			answ = smc_tx_prepared_sends(&smc->conn);
3106 		break;
3107 	case SIOCATMARK:
3108 		if (smc->sk.sk_state == SMC_LISTEN) {
3109 			release_sock(&smc->sk);
3110 			return -EINVAL;
3111 		}
3112 		if (smc->sk.sk_state == SMC_INIT ||
3113 		    smc->sk.sk_state == SMC_CLOSED) {
3114 			answ = 0;
3115 		} else {
3116 			smc_curs_copy(&cons, &conn->local_tx_ctrl.cons, conn);
3117 			smc_curs_copy(&urg, &conn->urg_curs, conn);
3118 			answ = smc_curs_diff(conn->rmb_desc->len,
3119 					     &cons, &urg) == 1;
3120 		}
3121 		break;
3122 	default:
3123 		release_sock(&smc->sk);
3124 		return -ENOIOCTLCMD;
3125 	}
3126 	release_sock(&smc->sk);
3127 
3128 	return put_user(answ, (int __user *)arg);
3129 }
3130 
3131 static ssize_t smc_sendpage(struct socket *sock, struct page *page,
3132 			    int offset, size_t size, int flags)
3133 {
3134 	struct sock *sk = sock->sk;
3135 	struct smc_sock *smc;
3136 	int rc = -EPIPE;
3137 
3138 	smc = smc_sk(sk);
3139 	lock_sock(sk);
3140 	if (sk->sk_state != SMC_ACTIVE) {
3141 		release_sock(sk);
3142 		goto out;
3143 	}
3144 	release_sock(sk);
3145 	if (smc->use_fallback) {
3146 		rc = kernel_sendpage(smc->clcsock, page, offset,
3147 				     size, flags);
3148 	} else {
3149 		lock_sock(sk);
3150 		rc = smc_tx_sendpage(smc, page, offset, size, flags);
3151 		release_sock(sk);
3152 		SMC_STAT_INC(smc, sendpage_cnt);
3153 	}
3154 
3155 out:
3156 	return rc;
3157 }
3158 
3159 /* Map the affected portions of the rmbe into an spd, note the number of bytes
3160  * to splice in conn->splice_pending, and press 'go'. Delays consumer cursor
3161  * updates till whenever a respective page has been fully processed.
3162  * Note that subsequent recv() calls have to wait till all splice() processing
3163  * completed.
3164  */
3165 static ssize_t smc_splice_read(struct socket *sock, loff_t *ppos,
3166 			       struct pipe_inode_info *pipe, size_t len,
3167 			       unsigned int flags)
3168 {
3169 	struct sock *sk = sock->sk;
3170 	struct smc_sock *smc;
3171 	int rc = -ENOTCONN;
3172 
3173 	smc = smc_sk(sk);
3174 	lock_sock(sk);
3175 	if (sk->sk_state == SMC_CLOSED && (sk->sk_shutdown & RCV_SHUTDOWN)) {
3176 		/* socket was connected before, no more data to read */
3177 		rc = 0;
3178 		goto out;
3179 	}
3180 	if (sk->sk_state == SMC_INIT ||
3181 	    sk->sk_state == SMC_LISTEN ||
3182 	    sk->sk_state == SMC_CLOSED)
3183 		goto out;
3184 
3185 	if (sk->sk_state == SMC_PEERFINCLOSEWAIT) {
3186 		rc = 0;
3187 		goto out;
3188 	}
3189 
3190 	if (smc->use_fallback) {
3191 		rc = smc->clcsock->ops->splice_read(smc->clcsock, ppos,
3192 						    pipe, len, flags);
3193 	} else {
3194 		if (*ppos) {
3195 			rc = -ESPIPE;
3196 			goto out;
3197 		}
3198 		if (flags & SPLICE_F_NONBLOCK)
3199 			flags = MSG_DONTWAIT;
3200 		else
3201 			flags = 0;
3202 		SMC_STAT_INC(smc, splice_cnt);
3203 		rc = smc_rx_recvmsg(smc, NULL, pipe, len, flags);
3204 	}
3205 out:
3206 	release_sock(sk);
3207 
3208 	return rc;
3209 }
3210 
3211 /* must look like tcp */
3212 static const struct proto_ops smc_sock_ops = {
3213 	.family		= PF_SMC,
3214 	.owner		= THIS_MODULE,
3215 	.release	= smc_release,
3216 	.bind		= smc_bind,
3217 	.connect	= smc_connect,
3218 	.socketpair	= sock_no_socketpair,
3219 	.accept		= smc_accept,
3220 	.getname	= smc_getname,
3221 	.poll		= smc_poll,
3222 	.ioctl		= smc_ioctl,
3223 	.listen		= smc_listen,
3224 	.shutdown	= smc_shutdown,
3225 	.setsockopt	= smc_setsockopt,
3226 	.getsockopt	= smc_getsockopt,
3227 	.sendmsg	= smc_sendmsg,
3228 	.recvmsg	= smc_recvmsg,
3229 	.mmap		= sock_no_mmap,
3230 	.sendpage	= smc_sendpage,
3231 	.splice_read	= smc_splice_read,
3232 };
3233 
3234 static int __smc_create(struct net *net, struct socket *sock, int protocol,
3235 			int kern, struct socket *clcsock)
3236 {
3237 	int family = (protocol == SMCPROTO_SMC6) ? PF_INET6 : PF_INET;
3238 	struct smc_sock *smc;
3239 	struct sock *sk;
3240 	int rc;
3241 
3242 	rc = -ESOCKTNOSUPPORT;
3243 	if (sock->type != SOCK_STREAM)
3244 		goto out;
3245 
3246 	rc = -EPROTONOSUPPORT;
3247 	if (protocol != SMCPROTO_SMC && protocol != SMCPROTO_SMC6)
3248 		goto out;
3249 
3250 	rc = -ENOBUFS;
3251 	sock->ops = &smc_sock_ops;
3252 	sock->state = SS_UNCONNECTED;
3253 	sk = smc_sock_alloc(net, sock, protocol);
3254 	if (!sk)
3255 		goto out;
3256 
3257 	/* create internal TCP socket for CLC handshake and fallback */
3258 	smc = smc_sk(sk);
3259 	smc->use_fallback = false; /* assume rdma capability first */
3260 	smc->fallback_rsn = 0;
3261 
3262 	/* default behavior from limit_smc_hs in every net namespace */
3263 	smc->limit_smc_hs = net->smc.limit_smc_hs;
3264 
3265 	rc = 0;
3266 	if (!clcsock) {
3267 		rc = sock_create_kern(net, family, SOCK_STREAM, IPPROTO_TCP,
3268 				      &smc->clcsock);
3269 		if (rc) {
3270 			sk_common_release(sk);
3271 			goto out;
3272 		}
3273 
3274 		/* smc_clcsock_release() does not wait smc->clcsock->sk's
3275 		 * destruction;  its sk_state might not be TCP_CLOSE after
3276 		 * smc->sk is close()d, and TCP timers can be fired later,
3277 		 * which need net ref.
3278 		 */
3279 		sk = smc->clcsock->sk;
3280 		__netns_tracker_free(net, &sk->ns_tracker, false);
3281 		sk->sk_net_refcnt = 1;
3282 		get_net_track(net, &sk->ns_tracker, GFP_KERNEL);
3283 		sock_inuse_add(net, 1);
3284 	} else {
3285 		smc->clcsock = clcsock;
3286 	}
3287 
3288 out:
3289 	return rc;
3290 }
3291 
3292 static int smc_create(struct net *net, struct socket *sock, int protocol,
3293 		      int kern)
3294 {
3295 	return __smc_create(net, sock, protocol, kern, NULL);
3296 }
3297 
3298 static const struct net_proto_family smc_sock_family_ops = {
3299 	.family	= PF_SMC,
3300 	.owner	= THIS_MODULE,
3301 	.create	= smc_create,
3302 };
3303 
3304 static int smc_ulp_init(struct sock *sk)
3305 {
3306 	struct socket *tcp = sk->sk_socket;
3307 	struct net *net = sock_net(sk);
3308 	struct socket *smcsock;
3309 	int protocol, ret;
3310 
3311 	/* only TCP can be replaced */
3312 	if (tcp->type != SOCK_STREAM || sk->sk_protocol != IPPROTO_TCP ||
3313 	    (sk->sk_family != AF_INET && sk->sk_family != AF_INET6))
3314 		return -ESOCKTNOSUPPORT;
3315 	/* don't handle wq now */
3316 	if (tcp->state != SS_UNCONNECTED || !tcp->file || tcp->wq.fasync_list)
3317 		return -ENOTCONN;
3318 
3319 	if (sk->sk_family == AF_INET)
3320 		protocol = SMCPROTO_SMC;
3321 	else
3322 		protocol = SMCPROTO_SMC6;
3323 
3324 	smcsock = sock_alloc();
3325 	if (!smcsock)
3326 		return -ENFILE;
3327 
3328 	smcsock->type = SOCK_STREAM;
3329 	__module_get(THIS_MODULE); /* tried in __tcp_ulp_find_autoload */
3330 	ret = __smc_create(net, smcsock, protocol, 1, tcp);
3331 	if (ret) {
3332 		sock_release(smcsock); /* module_put() which ops won't be NULL */
3333 		return ret;
3334 	}
3335 
3336 	/* replace tcp socket to smc */
3337 	smcsock->file = tcp->file;
3338 	smcsock->file->private_data = smcsock;
3339 	smcsock->file->f_inode = SOCK_INODE(smcsock); /* replace inode when sock_close */
3340 	smcsock->file->f_path.dentry->d_inode = SOCK_INODE(smcsock); /* dput() in __fput */
3341 	tcp->file = NULL;
3342 
3343 	return ret;
3344 }
3345 
3346 static void smc_ulp_clone(const struct request_sock *req, struct sock *newsk,
3347 			  const gfp_t priority)
3348 {
3349 	struct inet_connection_sock *icsk = inet_csk(newsk);
3350 
3351 	/* don't inherit ulp ops to child when listen */
3352 	icsk->icsk_ulp_ops = NULL;
3353 }
3354 
3355 static struct tcp_ulp_ops smc_ulp_ops __read_mostly = {
3356 	.name		= "smc",
3357 	.owner		= THIS_MODULE,
3358 	.init		= smc_ulp_init,
3359 	.clone		= smc_ulp_clone,
3360 };
3361 
3362 unsigned int smc_net_id;
3363 
3364 static __net_init int smc_net_init(struct net *net)
3365 {
3366 	int rc;
3367 
3368 	rc = smc_sysctl_net_init(net);
3369 	if (rc)
3370 		return rc;
3371 	return smc_pnet_net_init(net);
3372 }
3373 
3374 static void __net_exit smc_net_exit(struct net *net)
3375 {
3376 	smc_sysctl_net_exit(net);
3377 	smc_pnet_net_exit(net);
3378 }
3379 
3380 static __net_init int smc_net_stat_init(struct net *net)
3381 {
3382 	return smc_stats_init(net);
3383 }
3384 
3385 static void __net_exit smc_net_stat_exit(struct net *net)
3386 {
3387 	smc_stats_exit(net);
3388 }
3389 
3390 static struct pernet_operations smc_net_ops = {
3391 	.init = smc_net_init,
3392 	.exit = smc_net_exit,
3393 	.id   = &smc_net_id,
3394 	.size = sizeof(struct smc_net),
3395 };
3396 
3397 static struct pernet_operations smc_net_stat_ops = {
3398 	.init = smc_net_stat_init,
3399 	.exit = smc_net_stat_exit,
3400 };
3401 
3402 static int __init smc_init(void)
3403 {
3404 	int rc;
3405 
3406 	rc = register_pernet_subsys(&smc_net_ops);
3407 	if (rc)
3408 		return rc;
3409 
3410 	rc = register_pernet_subsys(&smc_net_stat_ops);
3411 	if (rc)
3412 		goto out_pernet_subsys;
3413 
3414 	rc = smc_ism_init();
3415 	if (rc)
3416 		goto out_pernet_subsys_stat;
3417 	smc_clc_init();
3418 
3419 	rc = smc_nl_init();
3420 	if (rc)
3421 		goto out_ism;
3422 
3423 	rc = smc_pnet_init();
3424 	if (rc)
3425 		goto out_nl;
3426 
3427 	rc = -ENOMEM;
3428 
3429 	smc_tcp_ls_wq = alloc_workqueue("smc_tcp_ls_wq", 0, 0);
3430 	if (!smc_tcp_ls_wq)
3431 		goto out_pnet;
3432 
3433 	smc_hs_wq = alloc_workqueue("smc_hs_wq", 0, 0);
3434 	if (!smc_hs_wq)
3435 		goto out_alloc_tcp_ls_wq;
3436 
3437 	smc_close_wq = alloc_workqueue("smc_close_wq", 0, 0);
3438 	if (!smc_close_wq)
3439 		goto out_alloc_hs_wq;
3440 
3441 	rc = smc_core_init();
3442 	if (rc) {
3443 		pr_err("%s: smc_core_init fails with %d\n", __func__, rc);
3444 		goto out_alloc_wqs;
3445 	}
3446 
3447 	rc = smc_llc_init();
3448 	if (rc) {
3449 		pr_err("%s: smc_llc_init fails with %d\n", __func__, rc);
3450 		goto out_core;
3451 	}
3452 
3453 	rc = smc_cdc_init();
3454 	if (rc) {
3455 		pr_err("%s: smc_cdc_init fails with %d\n", __func__, rc);
3456 		goto out_core;
3457 	}
3458 
3459 	rc = proto_register(&smc_proto, 1);
3460 	if (rc) {
3461 		pr_err("%s: proto_register(v4) fails with %d\n", __func__, rc);
3462 		goto out_core;
3463 	}
3464 
3465 	rc = proto_register(&smc_proto6, 1);
3466 	if (rc) {
3467 		pr_err("%s: proto_register(v6) fails with %d\n", __func__, rc);
3468 		goto out_proto;
3469 	}
3470 
3471 	rc = sock_register(&smc_sock_family_ops);
3472 	if (rc) {
3473 		pr_err("%s: sock_register fails with %d\n", __func__, rc);
3474 		goto out_proto6;
3475 	}
3476 	INIT_HLIST_HEAD(&smc_v4_hashinfo.ht);
3477 	INIT_HLIST_HEAD(&smc_v6_hashinfo.ht);
3478 
3479 	rc = smc_ib_register_client();
3480 	if (rc) {
3481 		pr_err("%s: ib_register fails with %d\n", __func__, rc);
3482 		goto out_sock;
3483 	}
3484 
3485 	rc = tcp_register_ulp(&smc_ulp_ops);
3486 	if (rc) {
3487 		pr_err("%s: tcp_ulp_register fails with %d\n", __func__, rc);
3488 		goto out_ib;
3489 	}
3490 
3491 	static_branch_enable(&tcp_have_smc);
3492 	return 0;
3493 
3494 out_ib:
3495 	smc_ib_unregister_client();
3496 out_sock:
3497 	sock_unregister(PF_SMC);
3498 out_proto6:
3499 	proto_unregister(&smc_proto6);
3500 out_proto:
3501 	proto_unregister(&smc_proto);
3502 out_core:
3503 	smc_core_exit();
3504 out_alloc_wqs:
3505 	destroy_workqueue(smc_close_wq);
3506 out_alloc_hs_wq:
3507 	destroy_workqueue(smc_hs_wq);
3508 out_alloc_tcp_ls_wq:
3509 	destroy_workqueue(smc_tcp_ls_wq);
3510 out_pnet:
3511 	smc_pnet_exit();
3512 out_nl:
3513 	smc_nl_exit();
3514 out_ism:
3515 	smc_clc_exit();
3516 	smc_ism_exit();
3517 out_pernet_subsys_stat:
3518 	unregister_pernet_subsys(&smc_net_stat_ops);
3519 out_pernet_subsys:
3520 	unregister_pernet_subsys(&smc_net_ops);
3521 
3522 	return rc;
3523 }
3524 
3525 static void __exit smc_exit(void)
3526 {
3527 	static_branch_disable(&tcp_have_smc);
3528 	tcp_unregister_ulp(&smc_ulp_ops);
3529 	sock_unregister(PF_SMC);
3530 	smc_core_exit();
3531 	smc_ib_unregister_client();
3532 	smc_ism_exit();
3533 	destroy_workqueue(smc_close_wq);
3534 	destroy_workqueue(smc_tcp_ls_wq);
3535 	destroy_workqueue(smc_hs_wq);
3536 	proto_unregister(&smc_proto6);
3537 	proto_unregister(&smc_proto);
3538 	smc_pnet_exit();
3539 	smc_nl_exit();
3540 	smc_clc_exit();
3541 	unregister_pernet_subsys(&smc_net_stat_ops);
3542 	unregister_pernet_subsys(&smc_net_ops);
3543 	rcu_barrier();
3544 }
3545 
3546 module_init(smc_init);
3547 module_exit(smc_exit);
3548 
3549 MODULE_AUTHOR("Ursula Braun <ubraun@linux.vnet.ibm.com>");
3550 MODULE_DESCRIPTION("smc socket address family");
3551 MODULE_LICENSE("GPL");
3552 MODULE_ALIAS_NETPROTO(PF_SMC);
3553 MODULE_ALIAS_TCP_ULP("smc");
3554 MODULE_ALIAS_GENL_FAMILY(SMC_GENL_FAMILY_NAME);
3555