tcp_connect.c 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177
  1. /*
  2. * Copyright (c) 2006 Oracle. All rights reserved.
  3. *
  4. * This software is available to you under a choice of one of two
  5. * licenses. You may choose to be licensed under the terms of the GNU
  6. * General Public License (GPL) Version 2, available from the file
  7. * COPYING in the main directory of this source tree, or the
  8. * OpenIB.org BSD license below:
  9. *
  10. * Redistribution and use in source and binary forms, with or
  11. * without modification, are permitted provided that the following
  12. * conditions are met:
  13. *
  14. * - Redistributions of source code must retain the above
  15. * copyright notice, this list of conditions and the following
  16. * disclaimer.
  17. *
  18. * - Redistributions in binary form must reproduce the above
  19. * copyright notice, this list of conditions and the following
  20. * disclaimer in the documentation and/or other materials
  21. * provided with the distribution.
  22. *
  23. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  24. * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  25. * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
  26. * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
  27. * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
  28. * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
  29. * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  30. * SOFTWARE.
  31. *
  32. */
  33. #include <linux/kernel.h>
  34. #include <linux/in.h>
  35. #include <net/tcp.h>
  36. #include "rds.h"
  37. #include "tcp.h"
  38. void rds_tcp_state_change(struct sock *sk)
  39. {
  40. void (*state_change)(struct sock *sk);
  41. struct rds_conn_path *cp;
  42. struct rds_tcp_connection *tc;
  43. read_lock_bh(&sk->sk_callback_lock);
  44. cp = sk->sk_user_data;
  45. if (!cp) {
  46. state_change = sk->sk_state_change;
  47. goto out;
  48. }
  49. tc = cp->cp_transport_data;
  50. state_change = tc->t_orig_state_change;
  51. rdsdebug("sock %p state_change to %d\n", tc->t_sock, sk->sk_state);
  52. switch (sk->sk_state) {
  53. /* ignore connecting sockets as they make progress */
  54. case TCP_SYN_SENT:
  55. case TCP_SYN_RECV:
  56. break;
  57. case TCP_ESTABLISHED:
  58. rds_connect_path_complete(cp, RDS_CONN_CONNECTING);
  59. break;
  60. case TCP_CLOSE_WAIT:
  61. case TCP_CLOSE:
  62. rds_conn_path_drop(cp);
  63. default:
  64. break;
  65. }
  66. out:
  67. read_unlock_bh(&sk->sk_callback_lock);
  68. state_change(sk);
  69. }
  70. int rds_tcp_conn_path_connect(struct rds_conn_path *cp)
  71. {
  72. struct socket *sock = NULL;
  73. struct sockaddr_in src, dest;
  74. int ret;
  75. struct rds_connection *conn = cp->cp_conn;
  76. struct rds_tcp_connection *tc = cp->cp_transport_data;
  77. /* for multipath rds,we only trigger the connection after
  78. * the handshake probe has determined the number of paths.
  79. */
  80. if (cp->cp_index > 0 && cp->cp_conn->c_npaths < 2)
  81. return -EAGAIN;
  82. mutex_lock(&tc->t_conn_path_lock);
  83. if (rds_conn_path_up(cp)) {
  84. mutex_unlock(&tc->t_conn_path_lock);
  85. return 0;
  86. }
  87. ret = sock_create_kern(rds_conn_net(conn), PF_INET,
  88. SOCK_STREAM, IPPROTO_TCP, &sock);
  89. if (ret < 0)
  90. goto out;
  91. rds_tcp_tune(sock);
  92. src.sin_family = AF_INET;
  93. src.sin_addr.s_addr = (__force u32)conn->c_laddr;
  94. src.sin_port = (__force u16)htons(0);
  95. ret = sock->ops->bind(sock, (struct sockaddr *)&src, sizeof(src));
  96. if (ret) {
  97. rdsdebug("bind failed with %d at address %pI4\n",
  98. ret, &conn->c_laddr);
  99. goto out;
  100. }
  101. dest.sin_family = AF_INET;
  102. dest.sin_addr.s_addr = (__force u32)conn->c_faddr;
  103. dest.sin_port = (__force u16)htons(RDS_TCP_PORT);
  104. /*
  105. * once we call connect() we can start getting callbacks and they
  106. * own the socket
  107. */
  108. rds_tcp_set_callbacks(sock, cp);
  109. ret = sock->ops->connect(sock, (struct sockaddr *)&dest, sizeof(dest),
  110. O_NONBLOCK);
  111. cp->cp_outgoing = 1;
  112. rdsdebug("connect to address %pI4 returned %d\n", &conn->c_faddr, ret);
  113. if (ret == -EINPROGRESS)
  114. ret = 0;
  115. if (ret == 0) {
  116. rds_tcp_keepalive(sock);
  117. sock = NULL;
  118. } else {
  119. rds_tcp_restore_callbacks(sock, cp->cp_transport_data);
  120. }
  121. out:
  122. mutex_unlock(&tc->t_conn_path_lock);
  123. if (sock)
  124. sock_release(sock);
  125. return ret;
  126. }
  127. /*
  128. * Before killing the tcp socket this needs to serialize with callbacks. The
  129. * caller has already grabbed the sending sem so we're serialized with other
  130. * senders.
  131. *
  132. * TCP calls the callbacks with the sock lock so we hold it while we reset the
  133. * callbacks to those set by TCP. Our callbacks won't execute again once we
  134. * hold the sock lock.
  135. */
  136. void rds_tcp_conn_path_shutdown(struct rds_conn_path *cp)
  137. {
  138. struct rds_tcp_connection *tc = cp->cp_transport_data;
  139. struct socket *sock = tc->t_sock;
  140. rdsdebug("shutting down conn %p tc %p sock %p\n",
  141. cp->cp_conn, tc, sock);
  142. if (sock) {
  143. sock->ops->shutdown(sock, RCV_SHUTDOWN | SEND_SHUTDOWN);
  144. lock_sock(sock->sk);
  145. rds_tcp_restore_callbacks(sock, tc); /* tc->tc_sock = NULL */
  146. release_sock(sock->sk);
  147. sock_release(sock);
  148. }
  149. if (tc->t_tinc) {
  150. rds_inc_put(&tc->t_tinc->ti_inc);
  151. tc->t_tinc = NULL;
  152. }
  153. tc->t_tinc_hdr_rem = sizeof(struct rds_header);
  154. tc->t_tinc_data_rem = 0;
  155. }