2009-02-24 15:30:18 +00:00
|
|
|
/*
|
2019-08-15 09:36:43 +00:00
|
|
|
* Copyright (c) 2006, 2019 Oracle and/or its affiliates. All rights reserved.
|
2009-02-24 15:30:18 +00:00
|
|
|
*
|
|
|
|
* This software is available to you under a choice of one of two
|
|
|
|
* licenses. You may choose to be licensed under the terms of the GNU
|
|
|
|
* General Public License (GPL) Version 2, available from the file
|
|
|
|
* COPYING in the main directory of this source tree, or the
|
|
|
|
* OpenIB.org BSD license below:
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or
|
|
|
|
* without modification, are permitted provided that the following
|
|
|
|
* conditions are met:
|
|
|
|
*
|
|
|
|
* - Redistributions of source code must retain the above
|
|
|
|
* copyright notice, this list of conditions and the following
|
|
|
|
* disclaimer.
|
|
|
|
*
|
|
|
|
* - Redistributions in binary form must reproduce the above
|
|
|
|
* copyright notice, this list of conditions and the following
|
|
|
|
* disclaimer in the documentation and/or other materials
|
|
|
|
* provided with the distribution.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
|
|
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
* SOFTWARE.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/kernel.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 08:04:11 +00:00
|
|
|
#include <linux/gfp.h>
|
2009-02-24 15:30:18 +00:00
|
|
|
#include <linux/in.h>
|
2018-07-24 03:51:21 +00:00
|
|
|
#include <linux/ipv6.h>
|
2009-02-24 15:30:18 +00:00
|
|
|
#include <linux/poll.h>
|
|
|
|
#include <net/sock.h>
|
|
|
|
|
|
|
|
#include "rds.h"
|
|
|
|
|
|
|
|
/* this is just used for stats gathering :/ */
|
|
|
|
static DEFINE_SPINLOCK(rds_sock_lock);
|
|
|
|
static unsigned long rds_sock_count;
|
|
|
|
static LIST_HEAD(rds_sock_list);
|
|
|
|
DECLARE_WAIT_QUEUE_HEAD(rds_poll_waitq);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is called as the final descriptor referencing this socket is closed.
|
|
|
|
* We have to unbind the socket so that another socket can be bound to the
|
|
|
|
* address it was using.
|
|
|
|
*
|
|
|
|
* We have to be careful about racing with the incoming path. sock_orphan()
|
|
|
|
* sets SOCK_DEAD and we use that as an indicator to the rx path that new
|
|
|
|
* messages shouldn't be queued.
|
|
|
|
*/
|
|
|
|
static int rds_release(struct socket *sock)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct rds_sock *rs;
|
|
|
|
|
2010-01-12 19:56:44 +00:00
|
|
|
if (!sk)
|
2009-02-24 15:30:18 +00:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
rs = rds_sk_to_rs(sk);
|
|
|
|
|
|
|
|
sock_orphan(sk);
|
|
|
|
/* Note - rds_clear_recv_queue grabs rs_recv_lock, so
|
|
|
|
* that ensures the recv path has completed messing
|
|
|
|
* with the socket. */
|
|
|
|
rds_clear_recv_queue(rs);
|
|
|
|
rds_cong_remove_socket(rs);
|
2010-05-11 22:09:45 +00:00
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
rds_remove_bound(rs);
|
2010-05-11 22:09:45 +00:00
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
rds_send_drop_to(rs, NULL);
|
|
|
|
rds_rdma_drop_keys(rs);
|
|
|
|
rds_notify_queue_get(rs, NULL);
|
2018-03-06 15:22:34 +00:00
|
|
|
rds_notify_msg_zcopy_purge(&rs->rs_zcookie_queue);
|
2009-02-24 15:30:18 +00:00
|
|
|
|
2012-01-24 22:03:44 +00:00
|
|
|
spin_lock_bh(&rds_sock_lock);
|
2009-02-24 15:30:18 +00:00
|
|
|
list_del_init(&rs->rs_item);
|
|
|
|
rds_sock_count--;
|
2012-01-24 22:03:44 +00:00
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
2009-02-24 15:30:18 +00:00
|
|
|
|
2010-07-23 17:32:31 +00:00
|
|
|
rds_trans_put(rs->rs_transport);
|
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
sock->sk = NULL;
|
|
|
|
sock_put(sk);
|
|
|
|
out:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Careful not to race with rds_release -> sock_orphan which clears sk_sleep.
|
|
|
|
* _bh() isn't OK here, we're called from interrupt handlers. It's probably OK
|
|
|
|
* to wake the waitqueue after sk_sleep is clear as we hold a sock ref, but
|
|
|
|
* this seems more conservative.
|
|
|
|
* NB - normally, one would use sk_callback_lock for this, but we can
|
|
|
|
* get here from interrupts, whereas the network code grabs sk_callback_lock
|
|
|
|
* with _lock_bh only - so relying on sk_callback_lock introduces livelocks.
|
|
|
|
*/
|
|
|
|
void rds_wake_sk_sleep(struct rds_sock *rs)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
read_lock_irqsave(&rs->rs_recv_lock, flags);
|
|
|
|
__rds_wake_sk_sleep(rds_rs_to_sk(rs));
|
|
|
|
read_unlock_irqrestore(&rs->rs_recv_lock, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int rds_getname(struct socket *sock, struct sockaddr *uaddr,
|
2018-02-12 19:00:20 +00:00
|
|
|
int peer)
|
2009-02-24 15:30:18 +00:00
|
|
|
{
|
|
|
|
struct rds_sock *rs = rds_sk_to_rs(sock->sk);
|
2018-07-24 03:51:21 +00:00
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
int uaddr_len;
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
/* racey, don't care */
|
|
|
|
if (peer) {
|
2018-07-24 03:51:21 +00:00
|
|
|
if (ipv6_addr_any(&rs->rs_conn_addr))
|
2009-02-24 15:30:18 +00:00
|
|
|
return -ENOTCONN;
|
|
|
|
|
2018-07-24 03:51:21 +00:00
|
|
|
if (ipv6_addr_v4mapped(&rs->rs_conn_addr)) {
|
|
|
|
sin = (struct sockaddr_in *)uaddr;
|
|
|
|
memset(sin->sin_zero, 0, sizeof(sin->sin_zero));
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
sin->sin_port = rs->rs_conn_port;
|
|
|
|
sin->sin_addr.s_addr = rs->rs_conn_addr_v4;
|
|
|
|
uaddr_len = sizeof(*sin);
|
|
|
|
} else {
|
|
|
|
sin6 = (struct sockaddr_in6 *)uaddr;
|
|
|
|
sin6->sin6_family = AF_INET6;
|
|
|
|
sin6->sin6_port = rs->rs_conn_port;
|
|
|
|
sin6->sin6_addr = rs->rs_conn_addr;
|
|
|
|
sin6->sin6_flowinfo = 0;
|
|
|
|
/* scope_id is the same as in the bound address. */
|
|
|
|
sin6->sin6_scope_id = rs->rs_bound_scope_id;
|
|
|
|
uaddr_len = sizeof(*sin6);
|
|
|
|
}
|
2009-02-24 15:30:18 +00:00
|
|
|
} else {
|
2018-07-24 03:51:22 +00:00
|
|
|
/* If socket is not yet bound and the socket is connected,
|
|
|
|
* set the return address family to be the same as the
|
|
|
|
* connected address, but with 0 address value. If it is not
|
|
|
|
* connected, set the family to be AF_UNSPEC (value 0) and
|
|
|
|
* the address size to be that of an IPv4 address.
|
2018-07-24 03:51:21 +00:00
|
|
|
*/
|
|
|
|
if (ipv6_addr_any(&rs->rs_bound_addr)) {
|
2018-07-24 03:51:22 +00:00
|
|
|
if (ipv6_addr_any(&rs->rs_conn_addr)) {
|
|
|
|
sin = (struct sockaddr_in *)uaddr;
|
|
|
|
memset(sin, 0, sizeof(*sin));
|
|
|
|
sin->sin_family = AF_UNSPEC;
|
|
|
|
return sizeof(*sin);
|
|
|
|
}
|
|
|
|
|
2018-07-31 05:48:42 +00:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
if (!(ipv6_addr_type(&rs->rs_conn_addr) &
|
|
|
|
IPV6_ADDR_MAPPED)) {
|
|
|
|
sin6 = (struct sockaddr_in6 *)uaddr;
|
|
|
|
memset(sin6, 0, sizeof(*sin6));
|
|
|
|
sin6->sin6_family = AF_INET6;
|
|
|
|
return sizeof(*sin6);
|
2018-07-24 03:51:22 +00:00
|
|
|
}
|
2018-07-31 05:48:42 +00:00
|
|
|
#endif
|
2018-07-24 03:51:22 +00:00
|
|
|
|
2018-07-31 05:48:42 +00:00
|
|
|
sin = (struct sockaddr_in *)uaddr;
|
|
|
|
memset(sin, 0, sizeof(*sin));
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
return sizeof(*sin);
|
2018-07-24 03:51:21 +00:00
|
|
|
}
|
|
|
|
if (ipv6_addr_v4mapped(&rs->rs_bound_addr)) {
|
|
|
|
sin = (struct sockaddr_in *)uaddr;
|
|
|
|
memset(sin->sin_zero, 0, sizeof(sin->sin_zero));
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
sin->sin_port = rs->rs_bound_port;
|
|
|
|
sin->sin_addr.s_addr = rs->rs_bound_addr_v4;
|
|
|
|
uaddr_len = sizeof(*sin);
|
|
|
|
} else {
|
|
|
|
sin6 = (struct sockaddr_in6 *)uaddr;
|
|
|
|
sin6->sin6_family = AF_INET6;
|
|
|
|
sin6->sin6_port = rs->rs_bound_port;
|
|
|
|
sin6->sin6_addr = rs->rs_bound_addr;
|
|
|
|
sin6->sin6_flowinfo = 0;
|
|
|
|
sin6->sin6_scope_id = rs->rs_bound_scope_id;
|
|
|
|
uaddr_len = sizeof(*sin6);
|
|
|
|
}
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
|
2018-07-24 03:51:21 +00:00
|
|
|
return uaddr_len;
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* RDS' poll is without a doubt the least intuitive part of the interface,
|
2018-02-11 22:34:03 +00:00
|
|
|
* as EPOLLIN and EPOLLOUT do not behave entirely as you would expect from
|
2009-02-24 15:30:18 +00:00
|
|
|
* a network protocol.
|
|
|
|
*
|
2018-02-11 22:34:03 +00:00
|
|
|
* EPOLLIN is asserted if
|
2009-02-24 15:30:18 +00:00
|
|
|
* - there is data on the receive queue.
|
|
|
|
* - to signal that a previously congested destination may have become
|
|
|
|
* uncongested
|
|
|
|
* - A notification has been queued to the socket (this can be a congestion
|
2018-02-27 17:52:43 +00:00
|
|
|
* update, or a RDMA completion, or a MSG_ZEROCOPY completion).
|
2009-02-24 15:30:18 +00:00
|
|
|
*
|
2018-02-11 22:34:03 +00:00
|
|
|
* EPOLLOUT is asserted if there is room on the send queue. This does not mean
|
2009-02-24 15:30:18 +00:00
|
|
|
* however, that the next sendmsg() call will succeed. If the application tries
|
|
|
|
* to send to a congested destination, the system call may still fail (and
|
|
|
|
* return ENOBUFS).
|
|
|
|
*/
|
2017-07-03 04:01:49 +00:00
|
|
|
static __poll_t rds_poll(struct file *file, struct socket *sock,
|
2009-02-24 15:30:18 +00:00
|
|
|
poll_table *wait)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct rds_sock *rs = rds_sk_to_rs(sk);
|
2017-07-03 04:01:49 +00:00
|
|
|
__poll_t mask = 0;
|
2009-02-24 15:30:18 +00:00
|
|
|
unsigned long flags;
|
|
|
|
|
2010-04-20 13:03:51 +00:00
|
|
|
poll_wait(file, sk_sleep(sk), wait);
|
2009-02-24 15:30:18 +00:00
|
|
|
|
2010-03-11 13:50:04 +00:00
|
|
|
if (rs->rs_seen_congestion)
|
|
|
|
poll_wait(file, &rds_poll_waitq, wait);
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
read_lock_irqsave(&rs->rs_recv_lock, flags);
|
|
|
|
if (!rs->rs_cong_monitor) {
|
2018-02-11 22:34:03 +00:00
|
|
|
/* When a congestion map was updated, we signal EPOLLIN for
|
2009-02-24 15:30:18 +00:00
|
|
|
* "historical" reasons. Applications can also poll for
|
|
|
|
* WRBAND instead. */
|
|
|
|
if (rds_cong_updated_since(&rs->rs_cong_track))
|
2018-02-11 22:34:03 +00:00
|
|
|
mask |= (EPOLLIN | EPOLLRDNORM | EPOLLWRBAND);
|
2009-02-24 15:30:18 +00:00
|
|
|
} else {
|
|
|
|
spin_lock(&rs->rs_lock);
|
|
|
|
if (rs->rs_cong_notify)
|
2018-02-11 22:34:03 +00:00
|
|
|
mask |= (EPOLLIN | EPOLLRDNORM);
|
2009-02-24 15:30:18 +00:00
|
|
|
spin_unlock(&rs->rs_lock);
|
|
|
|
}
|
2009-11-30 00:55:45 +00:00
|
|
|
if (!list_empty(&rs->rs_recv_queue) ||
|
2018-02-27 17:52:43 +00:00
|
|
|
!list_empty(&rs->rs_notify_queue) ||
|
2018-03-06 15:22:34 +00:00
|
|
|
!list_empty(&rs->rs_zcookie_queue.zcookie_head))
|
2018-02-11 22:34:03 +00:00
|
|
|
mask |= (EPOLLIN | EPOLLRDNORM);
|
2009-02-24 15:30:18 +00:00
|
|
|
if (rs->rs_snd_bytes < rds_sk_sndbuf(rs))
|
2018-02-11 22:34:03 +00:00
|
|
|
mask |= (EPOLLOUT | EPOLLWRNORM);
|
2018-02-15 18:49:35 +00:00
|
|
|
if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
|
|
|
|
mask |= POLLERR;
|
2009-02-24 15:30:18 +00:00
|
|
|
read_unlock_irqrestore(&rs->rs_recv_lock, flags);
|
|
|
|
|
2010-03-11 13:50:04 +00:00
|
|
|
/* clear state any time we wake a seen-congested socket */
|
|
|
|
if (mask)
|
|
|
|
rs->rs_seen_congestion = 0;
|
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
return mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int rds_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
|
|
|
|
{
|
2018-10-24 03:21:14 +00:00
|
|
|
struct rds_sock *rs = rds_sk_to_rs(sock->sk);
|
2018-10-13 13:36:49 +00:00
|
|
|
rds_tos_t utos, tos = 0;
|
2018-10-24 03:21:14 +00:00
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCRDSSETTOS:
|
2018-10-13 13:36:49 +00:00
|
|
|
if (get_user(utos, (rds_tos_t __user *)arg))
|
2018-10-24 03:21:14 +00:00
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
if (rs->rs_transport &&
|
2018-10-13 13:36:49 +00:00
|
|
|
rs->rs_transport->get_tos_map)
|
|
|
|
tos = rs->rs_transport->get_tos_map(utos);
|
|
|
|
else
|
|
|
|
return -ENOIOCTLCMD;
|
2018-10-24 03:21:14 +00:00
|
|
|
|
|
|
|
spin_lock_bh(&rds_sock_lock);
|
|
|
|
if (rs->rs_tos || rs->rs_conn) {
|
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
rs->rs_tos = tos;
|
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
|
|
|
break;
|
|
|
|
case SIOCRDSGETTOS:
|
|
|
|
spin_lock_bh(&rds_sock_lock);
|
|
|
|
tos = rs->rs_tos;
|
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
|
|
|
if (put_user(tos, (rds_tos_t __user *)arg))
|
|
|
|
return -EFAULT;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -ENOIOCTLCMD;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
static int rds_cancel_sent_to(struct rds_sock *rs, sockptr_t optval, int len)
|
2009-02-24 15:30:18 +00:00
|
|
|
{
|
2018-07-24 03:51:21 +00:00
|
|
|
struct sockaddr_in6 sin6;
|
2009-02-24 15:30:18 +00:00
|
|
|
struct sockaddr_in sin;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
/* racing with another thread binding seems ok here */
|
2018-07-24 03:51:21 +00:00
|
|
|
if (ipv6_addr_any(&rs->rs_bound_addr)) {
|
2009-02-24 15:30:18 +00:00
|
|
|
ret = -ENOTCONN; /* XXX not a great errno */
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len < sizeof(struct sockaddr_in)) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
2018-07-24 03:51:21 +00:00
|
|
|
} else if (len < sizeof(struct sockaddr_in6)) {
|
|
|
|
/* Assume IPv4 */
|
2020-07-23 06:09:07 +00:00
|
|
|
if (copy_from_sockptr(&sin, optval,
|
|
|
|
sizeof(struct sockaddr_in))) {
|
2018-07-24 03:51:21 +00:00
|
|
|
ret = -EFAULT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
ipv6_addr_set_v4mapped(sin.sin_addr.s_addr, &sin6.sin6_addr);
|
|
|
|
sin6.sin6_port = sin.sin_port;
|
|
|
|
} else {
|
2020-07-23 06:09:07 +00:00
|
|
|
if (copy_from_sockptr(&sin6, optval,
|
2018-07-24 03:51:21 +00:00
|
|
|
sizeof(struct sockaddr_in6))) {
|
|
|
|
ret = -EFAULT;
|
|
|
|
goto out;
|
|
|
|
}
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
|
2018-07-24 03:51:21 +00:00
|
|
|
rds_send_drop_to(rs, &sin6);
|
2009-02-24 15:30:18 +00:00
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
static int rds_set_bool_option(unsigned char *optvar, sockptr_t optval,
|
2009-02-24 15:30:18 +00:00
|
|
|
int optlen)
|
|
|
|
{
|
|
|
|
int value;
|
|
|
|
|
|
|
|
if (optlen < sizeof(int))
|
|
|
|
return -EINVAL;
|
2020-07-23 06:09:07 +00:00
|
|
|
if (copy_from_sockptr(&value, optval, sizeof(int)))
|
2009-02-24 15:30:18 +00:00
|
|
|
return -EFAULT;
|
|
|
|
*optvar = !!value;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
static int rds_cong_monitor(struct rds_sock *rs, sockptr_t optval, int optlen)
|
2009-02-24 15:30:18 +00:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = rds_set_bool_option(&rs->rs_cong_monitor, optval, optlen);
|
|
|
|
if (ret == 0) {
|
|
|
|
if (rs->rs_cong_monitor) {
|
|
|
|
rds_cong_add_socket(rs);
|
|
|
|
} else {
|
|
|
|
rds_cong_remove_socket(rs);
|
|
|
|
rs->rs_cong_mask = 0;
|
|
|
|
rs->rs_cong_notify = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
static int rds_set_transport(struct rds_sock *rs, sockptr_t optval, int optlen)
|
2015-05-29 21:28:08 +00:00
|
|
|
{
|
|
|
|
int t_type;
|
|
|
|
|
|
|
|
if (rs->rs_transport)
|
|
|
|
return -EOPNOTSUPP; /* previously attached to transport */
|
|
|
|
|
|
|
|
if (optlen != sizeof(int))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
if (copy_from_sockptr(&t_type, optval, sizeof(t_type)))
|
2015-05-29 21:28:08 +00:00
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
if (t_type < 0 || t_type >= RDS_TRANS_COUNT)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
rs->rs_transport = rds_trans_get(t_type);
|
|
|
|
|
|
|
|
return rs->rs_transport ? 0 : -ENOPROTOOPT;
|
|
|
|
}
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
static int rds_enable_recvtstamp(struct sock *sk, sockptr_t optval,
|
2019-02-02 15:34:50 +00:00
|
|
|
int optlen, int optname)
|
2016-03-01 23:20:43 +00:00
|
|
|
{
|
|
|
|
int val, valbool;
|
|
|
|
|
|
|
|
if (optlen != sizeof(int))
|
|
|
|
return -EFAULT;
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
if (copy_from_sockptr(&val, optval, sizeof(int)))
|
2016-03-01 23:20:43 +00:00
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
valbool = val ? 1 : 0;
|
|
|
|
|
2019-02-02 15:34:50 +00:00
|
|
|
if (optname == SO_TIMESTAMP_NEW)
|
|
|
|
sock_set_flag(sk, SOCK_TSTAMP_NEW);
|
|
|
|
|
2016-03-01 23:20:43 +00:00
|
|
|
if (valbool)
|
|
|
|
sock_set_flag(sk, SOCK_RCVTSTAMP);
|
|
|
|
else
|
|
|
|
sock_reset_flag(sk, SOCK_RCVTSTAMP);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
static int rds_recv_track_latency(struct rds_sock *rs, sockptr_t optval,
|
2016-07-05 05:35:15 +00:00
|
|
|
int optlen)
|
|
|
|
{
|
|
|
|
struct rds_rx_trace_so trace;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (optlen != sizeof(struct rds_rx_trace_so))
|
|
|
|
return -EFAULT;
|
|
|
|
|
2020-07-23 06:09:07 +00:00
|
|
|
if (copy_from_sockptr(&trace, optval, sizeof(trace)))
|
2016-07-05 05:35:15 +00:00
|
|
|
return -EFAULT;
|
|
|
|
|
2017-01-06 18:44:15 +00:00
|
|
|
if (trace.rx_traces > RDS_MSG_RX_DGRAM_TRACE_MAX)
|
|
|
|
return -EFAULT;
|
|
|
|
|
2016-07-05 05:35:15 +00:00
|
|
|
rs->rs_rx_traces = trace.rx_traces;
|
|
|
|
for (i = 0; i < rs->rs_rx_traces; i++) {
|
|
|
|
if (trace.rx_trace_pos[i] > RDS_MSG_RX_DGRAM_TRACE_MAX) {
|
|
|
|
rs->rs_rx_traces = 0;
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
rs->rs_rx_trace[i] = trace.rx_trace_pos[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
static int rds_setsockopt(struct socket *sock, int level, int optname,
|
2020-07-23 06:09:07 +00:00
|
|
|
sockptr_t optval, unsigned int optlen)
|
2009-02-24 15:30:18 +00:00
|
|
|
{
|
|
|
|
struct rds_sock *rs = rds_sk_to_rs(sock->sk);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (level != SOL_RDS) {
|
|
|
|
ret = -ENOPROTOOPT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (optname) {
|
|
|
|
case RDS_CANCEL_SENT_TO:
|
|
|
|
ret = rds_cancel_sent_to(rs, optval, optlen);
|
|
|
|
break;
|
|
|
|
case RDS_GET_MR:
|
|
|
|
ret = rds_get_mr(rs, optval, optlen);
|
|
|
|
break;
|
2009-10-30 08:54:53 +00:00
|
|
|
case RDS_GET_MR_FOR_DEST:
|
|
|
|
ret = rds_get_mr_for_dest(rs, optval, optlen);
|
|
|
|
break;
|
2009-02-24 15:30:18 +00:00
|
|
|
case RDS_FREE_MR:
|
|
|
|
ret = rds_free_mr(rs, optval, optlen);
|
|
|
|
break;
|
|
|
|
case RDS_RECVERR:
|
|
|
|
ret = rds_set_bool_option(&rs->rs_recverr, optval, optlen);
|
|
|
|
break;
|
|
|
|
case RDS_CONG_MONITOR:
|
|
|
|
ret = rds_cong_monitor(rs, optval, optlen);
|
|
|
|
break;
|
2015-05-29 21:28:08 +00:00
|
|
|
case SO_RDS_TRANSPORT:
|
|
|
|
lock_sock(sock->sk);
|
|
|
|
ret = rds_set_transport(rs, optval, optlen);
|
|
|
|
release_sock(sock->sk);
|
|
|
|
break;
|
2019-02-02 15:34:46 +00:00
|
|
|
case SO_TIMESTAMP_OLD:
|
2019-02-02 15:34:50 +00:00
|
|
|
case SO_TIMESTAMP_NEW:
|
2016-03-01 23:20:43 +00:00
|
|
|
lock_sock(sock->sk);
|
2019-02-02 15:34:50 +00:00
|
|
|
ret = rds_enable_recvtstamp(sock->sk, optval, optlen, optname);
|
2016-03-01 23:20:43 +00:00
|
|
|
release_sock(sock->sk);
|
|
|
|
break;
|
2016-07-05 05:35:15 +00:00
|
|
|
case SO_RDS_MSG_RXPATH_LATENCY:
|
|
|
|
ret = rds_recv_track_latency(rs, optval, optlen);
|
|
|
|
break;
|
2009-02-24 15:30:18 +00:00
|
|
|
default:
|
|
|
|
ret = -ENOPROTOOPT;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int rds_getsockopt(struct socket *sock, int level, int optname,
|
|
|
|
char __user *optval, int __user *optlen)
|
|
|
|
{
|
|
|
|
struct rds_sock *rs = rds_sk_to_rs(sock->sk);
|
|
|
|
int ret = -ENOPROTOOPT, len;
|
2015-05-29 21:28:09 +00:00
|
|
|
int trans;
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
if (level != SOL_RDS)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (get_user(len, optlen)) {
|
|
|
|
ret = -EFAULT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (optname) {
|
|
|
|
case RDS_INFO_FIRST ... RDS_INFO_LAST:
|
|
|
|
ret = rds_info_getsockopt(sock, optname, optval,
|
|
|
|
optlen);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case RDS_RECVERR:
|
|
|
|
if (len < sizeof(int))
|
|
|
|
ret = -EINVAL;
|
|
|
|
else
|
2009-11-30 00:55:45 +00:00
|
|
|
if (put_user(rs->rs_recverr, (int __user *) optval) ||
|
|
|
|
put_user(sizeof(int), optlen))
|
2009-02-24 15:30:18 +00:00
|
|
|
ret = -EFAULT;
|
|
|
|
else
|
|
|
|
ret = 0;
|
|
|
|
break;
|
2015-05-29 21:28:09 +00:00
|
|
|
case SO_RDS_TRANSPORT:
|
|
|
|
if (len < sizeof(int)) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
trans = (rs->rs_transport ? rs->rs_transport->t_type :
|
|
|
|
RDS_TRANS_NONE); /* unbound */
|
|
|
|
if (put_user(trans, (int __user *)optval) ||
|
|
|
|
put_user(sizeof(int), optlen))
|
|
|
|
ret = -EFAULT;
|
|
|
|
else
|
|
|
|
ret = 0;
|
|
|
|
break;
|
2009-02-24 15:30:18 +00:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
static int rds_connect(struct socket *sock, struct sockaddr *uaddr,
|
|
|
|
int addr_len, int flags)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
2018-07-24 03:51:21 +00:00
|
|
|
struct sockaddr_in *sin;
|
2009-02-24 15:30:18 +00:00
|
|
|
struct rds_sock *rs = rds_sk_to_rs(sk);
|
|
|
|
int ret = 0;
|
|
|
|
|
2019-04-12 10:51:52 +00:00
|
|
|
if (addr_len < offsetofend(struct sockaddr, sa_family))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
lock_sock(sk);
|
|
|
|
|
2018-07-24 03:51:22 +00:00
|
|
|
switch (uaddr->sa_family) {
|
|
|
|
case AF_INET:
|
2018-07-24 03:51:21 +00:00
|
|
|
sin = (struct sockaddr_in *)uaddr;
|
2018-07-24 03:51:22 +00:00
|
|
|
if (addr_len < sizeof(struct sockaddr_in)) {
|
|
|
|
ret = -EINVAL;
|
2018-07-24 03:51:21 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (sin->sin_addr.s_addr == htonl(INADDR_ANY)) {
|
|
|
|
ret = -EDESTADDRREQ;
|
|
|
|
break;
|
|
|
|
}
|
2019-09-02 23:29:36 +00:00
|
|
|
if (ipv4_is_multicast(sin->sin_addr.s_addr) ||
|
2018-07-24 03:51:21 +00:00
|
|
|
sin->sin_addr.s_addr == htonl(INADDR_BROADCAST)) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ipv6_addr_set_v4mapped(sin->sin_addr.s_addr, &rs->rs_conn_addr);
|
|
|
|
rs->rs_conn_port = sin->sin_port;
|
|
|
|
break;
|
2009-02-24 15:30:18 +00:00
|
|
|
|
2018-07-31 05:48:42 +00:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
case AF_INET6: {
|
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
int addr_type;
|
|
|
|
|
2018-07-24 03:51:22 +00:00
|
|
|
sin6 = (struct sockaddr_in6 *)uaddr;
|
|
|
|
if (addr_len < sizeof(struct sockaddr_in6)) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
addr_type = ipv6_addr_type(&sin6->sin6_addr);
|
|
|
|
if (!(addr_type & IPV6_ADDR_UNICAST)) {
|
|
|
|
__be32 addr4;
|
|
|
|
|
|
|
|
if (!(addr_type & IPV6_ADDR_MAPPED)) {
|
|
|
|
ret = -EPROTOTYPE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It is a mapped address. Need to do some sanity
|
|
|
|
* checks.
|
|
|
|
*/
|
|
|
|
addr4 = sin6->sin6_addr.s6_addr32[3];
|
|
|
|
if (addr4 == htonl(INADDR_ANY) ||
|
|
|
|
addr4 == htonl(INADDR_BROADCAST) ||
|
2019-09-02 23:29:36 +00:00
|
|
|
ipv4_is_multicast(addr4)) {
|
2018-07-24 03:51:22 +00:00
|
|
|
ret = -EPROTOTYPE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (addr_type & IPV6_ADDR_LINKLOCAL) {
|
|
|
|
/* If socket is arleady bound to a link local address,
|
|
|
|
* the peer address must be on the same link.
|
|
|
|
*/
|
|
|
|
if (sin6->sin6_scope_id == 0 ||
|
|
|
|
(!ipv6_addr_any(&rs->rs_bound_addr) &&
|
|
|
|
rs->rs_bound_scope_id &&
|
|
|
|
sin6->sin6_scope_id != rs->rs_bound_scope_id)) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* Remember the connected address scope ID. It will
|
|
|
|
* be checked against the binding local address when
|
|
|
|
* the socket is bound.
|
|
|
|
*/
|
|
|
|
rs->rs_bound_scope_id = sin6->sin6_scope_id;
|
|
|
|
}
|
|
|
|
rs->rs_conn_addr = sin6->sin6_addr;
|
|
|
|
rs->rs_conn_port = sin6->sin6_port;
|
2018-07-24 03:51:21 +00:00
|
|
|
break;
|
2018-07-31 05:48:42 +00:00
|
|
|
}
|
|
|
|
#endif
|
2009-02-24 15:30:18 +00:00
|
|
|
|
2018-07-24 03:51:21 +00:00
|
|
|
default:
|
2018-07-24 03:51:22 +00:00
|
|
|
ret = -EAFNOSUPPORT;
|
2018-07-24 03:51:21 +00:00
|
|
|
break;
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
release_sock(sk);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct proto rds_proto = {
|
|
|
|
.name = "RDS",
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.obj_size = sizeof(struct rds_sock),
|
|
|
|
};
|
|
|
|
|
2009-09-14 12:23:23 +00:00
|
|
|
static const struct proto_ops rds_proto_ops = {
|
2009-02-24 15:30:18 +00:00
|
|
|
.family = AF_RDS,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.release = rds_release,
|
|
|
|
.bind = rds_bind,
|
|
|
|
.connect = rds_connect,
|
|
|
|
.socketpair = sock_no_socketpair,
|
|
|
|
.accept = sock_no_accept,
|
|
|
|
.getname = rds_getname,
|
|
|
|
.poll = rds_poll,
|
|
|
|
.ioctl = rds_ioctl,
|
|
|
|
.listen = sock_no_listen,
|
|
|
|
.shutdown = sock_no_shutdown,
|
|
|
|
.setsockopt = rds_setsockopt,
|
|
|
|
.getsockopt = rds_getsockopt,
|
|
|
|
.sendmsg = rds_sendmsg,
|
|
|
|
.recvmsg = rds_recvmsg,
|
|
|
|
.mmap = sock_no_mmap,
|
|
|
|
.sendpage = sock_no_sendpage,
|
|
|
|
};
|
|
|
|
|
2015-08-22 22:45:28 +00:00
|
|
|
static void rds_sock_destruct(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct rds_sock *rs = rds_sk_to_rs(sk);
|
|
|
|
|
|
|
|
WARN_ON((&rs->rs_item != rs->rs_item.next ||
|
|
|
|
&rs->rs_item != rs->rs_item.prev));
|
|
|
|
}
|
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
static int __rds_create(struct socket *sock, struct sock *sk, int protocol)
|
|
|
|
{
|
|
|
|
struct rds_sock *rs;
|
|
|
|
|
|
|
|
sock_init_data(sock, sk);
|
|
|
|
sock->ops = &rds_proto_ops;
|
|
|
|
sk->sk_protocol = protocol;
|
2015-08-22 22:45:28 +00:00
|
|
|
sk->sk_destruct = rds_sock_destruct;
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
rs = rds_sk_to_rs(sk);
|
|
|
|
spin_lock_init(&rs->rs_lock);
|
|
|
|
rwlock_init(&rs->rs_recv_lock);
|
|
|
|
INIT_LIST_HEAD(&rs->rs_send_queue);
|
|
|
|
INIT_LIST_HEAD(&rs->rs_recv_queue);
|
|
|
|
INIT_LIST_HEAD(&rs->rs_notify_queue);
|
|
|
|
INIT_LIST_HEAD(&rs->rs_cong_list);
|
2018-03-06 15:22:34 +00:00
|
|
|
rds_message_zcopy_queue_init(&rs->rs_zcookie_queue);
|
2009-02-24 15:30:18 +00:00
|
|
|
spin_lock_init(&rs->rs_rdma_lock);
|
|
|
|
rs->rs_rdma_keys = RB_ROOT;
|
2016-07-05 05:35:15 +00:00
|
|
|
rs->rs_rx_traces = 0;
|
2018-10-24 03:21:14 +00:00
|
|
|
rs->rs_tos = 0;
|
|
|
|
rs->rs_conn = NULL;
|
2009-02-24 15:30:18 +00:00
|
|
|
|
2012-01-24 22:03:44 +00:00
|
|
|
spin_lock_bh(&rds_sock_lock);
|
2009-02-24 15:30:18 +00:00
|
|
|
list_add_tail(&rs->rs_item, &rds_sock_list);
|
|
|
|
rds_sock_count++;
|
2012-01-24 22:03:44 +00:00
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-11-06 06:18:14 +00:00
|
|
|
static int rds_create(struct net *net, struct socket *sock, int protocol,
|
|
|
|
int kern)
|
2009-02-24 15:30:18 +00:00
|
|
|
{
|
|
|
|
struct sock *sk;
|
|
|
|
|
|
|
|
if (sock->type != SOCK_SEQPACKET || protocol)
|
|
|
|
return -ESOCKTNOSUPPORT;
|
|
|
|
|
2012-02-03 16:08:51 +00:00
|
|
|
sk = sk_alloc(net, AF_RDS, GFP_KERNEL, &rds_proto, kern);
|
2009-02-24 15:30:18 +00:00
|
|
|
if (!sk)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
return __rds_create(sock, sk, protocol);
|
|
|
|
}
|
|
|
|
|
|
|
|
void rds_sock_addref(struct rds_sock *rs)
|
|
|
|
{
|
|
|
|
sock_hold(rds_rs_to_sk(rs));
|
|
|
|
}
|
|
|
|
|
|
|
|
void rds_sock_put(struct rds_sock *rs)
|
|
|
|
{
|
|
|
|
sock_put(rds_rs_to_sk(rs));
|
|
|
|
}
|
|
|
|
|
2009-10-05 05:58:39 +00:00
|
|
|
static const struct net_proto_family rds_family_ops = {
|
2009-02-24 15:30:18 +00:00
|
|
|
.family = AF_RDS,
|
|
|
|
.create = rds_create,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void rds_sock_inc_info(struct socket *sock, unsigned int len,
|
|
|
|
struct rds_info_iterator *iter,
|
|
|
|
struct rds_info_lengths *lens)
|
|
|
|
{
|
|
|
|
struct rds_sock *rs;
|
|
|
|
struct rds_incoming *inc;
|
|
|
|
unsigned int total = 0;
|
|
|
|
|
|
|
|
len /= sizeof(struct rds_info_message);
|
|
|
|
|
2012-01-24 22:03:44 +00:00
|
|
|
spin_lock_bh(&rds_sock_lock);
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
list_for_each_entry(rs, &rds_sock_list, rs_item) {
|
2019-08-15 09:36:43 +00:00
|
|
|
/* This option only supports IPv4 sockets. */
|
|
|
|
if (!ipv6_addr_v4mapped(&rs->rs_bound_addr))
|
|
|
|
continue;
|
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
read_lock(&rs->rs_recv_lock);
|
|
|
|
|
|
|
|
/* XXX too lazy to maintain counts.. */
|
|
|
|
list_for_each_entry(inc, &rs->rs_recv_queue, i_item) {
|
|
|
|
total++;
|
|
|
|
if (total <= len)
|
2018-07-24 03:51:21 +00:00
|
|
|
rds_inc_info_copy(inc, iter,
|
|
|
|
inc->i_saddr.s6_addr32[3],
|
|
|
|
rs->rs_bound_addr_v4,
|
|
|
|
1);
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
read_unlock(&rs->rs_recv_lock);
|
|
|
|
}
|
|
|
|
|
2012-01-24 22:03:44 +00:00
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
lens->nr = total;
|
|
|
|
lens->each = sizeof(struct rds_info_message);
|
|
|
|
}
|
|
|
|
|
2019-08-15 09:36:43 +00:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
static void rds6_sock_inc_info(struct socket *sock, unsigned int len,
|
|
|
|
struct rds_info_iterator *iter,
|
|
|
|
struct rds_info_lengths *lens)
|
|
|
|
{
|
|
|
|
struct rds_incoming *inc;
|
|
|
|
unsigned int total = 0;
|
|
|
|
struct rds_sock *rs;
|
|
|
|
|
|
|
|
len /= sizeof(struct rds6_info_message);
|
|
|
|
|
|
|
|
spin_lock_bh(&rds_sock_lock);
|
|
|
|
|
|
|
|
list_for_each_entry(rs, &rds_sock_list, rs_item) {
|
|
|
|
read_lock(&rs->rs_recv_lock);
|
|
|
|
|
|
|
|
list_for_each_entry(inc, &rs->rs_recv_queue, i_item) {
|
|
|
|
total++;
|
|
|
|
if (total <= len)
|
|
|
|
rds6_inc_info_copy(inc, iter, &inc->i_saddr,
|
|
|
|
&rs->rs_bound_addr, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
read_unlock(&rs->rs_recv_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
|
|
|
|
|
|
|
lens->nr = total;
|
|
|
|
lens->each = sizeof(struct rds6_info_message);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
static void rds_sock_info(struct socket *sock, unsigned int len,
|
|
|
|
struct rds_info_iterator *iter,
|
|
|
|
struct rds_info_lengths *lens)
|
|
|
|
{
|
|
|
|
struct rds_info_socket sinfo;
|
2019-08-15 09:36:43 +00:00
|
|
|
unsigned int cnt = 0;
|
2009-02-24 15:30:18 +00:00
|
|
|
struct rds_sock *rs;
|
|
|
|
|
|
|
|
len /= sizeof(struct rds_info_socket);
|
|
|
|
|
2012-01-24 22:03:44 +00:00
|
|
|
spin_lock_bh(&rds_sock_lock);
|
2009-02-24 15:30:18 +00:00
|
|
|
|
2019-08-15 09:36:43 +00:00
|
|
|
if (len < rds_sock_count) {
|
|
|
|
cnt = rds_sock_count;
|
2009-02-24 15:30:18 +00:00
|
|
|
goto out;
|
2019-08-15 09:36:43 +00:00
|
|
|
}
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
list_for_each_entry(rs, &rds_sock_list, rs_item) {
|
2019-08-15 09:36:43 +00:00
|
|
|
/* This option only supports IPv4 sockets. */
|
|
|
|
if (!ipv6_addr_v4mapped(&rs->rs_bound_addr))
|
|
|
|
continue;
|
2009-02-24 15:30:18 +00:00
|
|
|
sinfo.sndbuf = rds_sk_sndbuf(rs);
|
|
|
|
sinfo.rcvbuf = rds_sk_rcvbuf(rs);
|
2018-07-24 03:51:21 +00:00
|
|
|
sinfo.bound_addr = rs->rs_bound_addr_v4;
|
|
|
|
sinfo.connected_addr = rs->rs_conn_addr_v4;
|
2009-02-24 15:30:18 +00:00
|
|
|
sinfo.bound_port = rs->rs_bound_port;
|
|
|
|
sinfo.connected_port = rs->rs_conn_port;
|
|
|
|
sinfo.inum = sock_i_ino(rds_rs_to_sk(rs));
|
|
|
|
|
|
|
|
rds_info_copy(iter, &sinfo, sizeof(sinfo));
|
2019-08-15 09:36:43 +00:00
|
|
|
cnt++;
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2019-08-15 09:36:43 +00:00
|
|
|
lens->nr = cnt;
|
2009-02-24 15:30:18 +00:00
|
|
|
lens->each = sizeof(struct rds_info_socket);
|
|
|
|
|
2012-01-24 22:03:44 +00:00
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
|
2019-08-15 09:36:43 +00:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
static void rds6_sock_info(struct socket *sock, unsigned int len,
|
|
|
|
struct rds_info_iterator *iter,
|
|
|
|
struct rds_info_lengths *lens)
|
|
|
|
{
|
|
|
|
struct rds6_info_socket sinfo6;
|
|
|
|
struct rds_sock *rs;
|
|
|
|
|
|
|
|
len /= sizeof(struct rds6_info_socket);
|
|
|
|
|
|
|
|
spin_lock_bh(&rds_sock_lock);
|
|
|
|
|
|
|
|
if (len < rds_sock_count)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
list_for_each_entry(rs, &rds_sock_list, rs_item) {
|
|
|
|
sinfo6.sndbuf = rds_sk_sndbuf(rs);
|
|
|
|
sinfo6.rcvbuf = rds_sk_rcvbuf(rs);
|
|
|
|
sinfo6.bound_addr = rs->rs_bound_addr;
|
|
|
|
sinfo6.connected_addr = rs->rs_conn_addr;
|
|
|
|
sinfo6.bound_port = rs->rs_bound_port;
|
|
|
|
sinfo6.connected_port = rs->rs_conn_port;
|
|
|
|
sinfo6.inum = sock_i_ino(rds_rs_to_sk(rs));
|
|
|
|
|
|
|
|
rds_info_copy(iter, &sinfo6, sizeof(sinfo6));
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
lens->nr = rds_sock_count;
|
|
|
|
lens->each = sizeof(struct rds6_info_socket);
|
|
|
|
|
|
|
|
spin_unlock_bh(&rds_sock_lock);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2010-07-09 19:26:20 +00:00
|
|
|
static void rds_exit(void)
|
2009-02-24 15:30:18 +00:00
|
|
|
{
|
|
|
|
sock_unregister(rds_family_ops.family);
|
|
|
|
proto_unregister(&rds_proto);
|
|
|
|
rds_conn_exit();
|
|
|
|
rds_cong_exit();
|
|
|
|
rds_sysctl_exit();
|
|
|
|
rds_threads_exit();
|
|
|
|
rds_stats_exit();
|
|
|
|
rds_page_exit();
|
2015-10-30 15:49:10 +00:00
|
|
|
rds_bind_lock_destroy();
|
2009-02-24 15:30:18 +00:00
|
|
|
rds_info_deregister_func(RDS_INFO_SOCKETS, rds_sock_info);
|
|
|
|
rds_info_deregister_func(RDS_INFO_RECV_MESSAGES, rds_sock_inc_info);
|
2019-08-15 09:36:43 +00:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
rds_info_deregister_func(RDS6_INFO_SOCKETS, rds6_sock_info);
|
|
|
|
rds_info_deregister_func(RDS6_INFO_RECV_MESSAGES, rds6_sock_inc_info);
|
|
|
|
#endif
|
2009-02-24 15:30:18 +00:00
|
|
|
}
|
|
|
|
module_exit(rds_exit);
|
|
|
|
|
2016-11-16 21:29:49 +00:00
|
|
|
u32 rds_gen_num;
|
|
|
|
|
2022-09-09 09:18:40 +00:00
|
|
|
static int __init rds_init(void)
|
2009-02-24 15:30:18 +00:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2016-11-16 21:29:49 +00:00
|
|
|
net_get_random_once(&rds_gen_num, sizeof(rds_gen_num));
|
|
|
|
|
2015-10-30 15:49:10 +00:00
|
|
|
ret = rds_bind_lock_init();
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2014-02-12 03:34:25 +00:00
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
ret = rds_conn_init();
|
|
|
|
if (ret)
|
2015-10-30 15:49:10 +00:00
|
|
|
goto out_bind;
|
|
|
|
|
2009-02-24 15:30:18 +00:00
|
|
|
ret = rds_threads_init();
|
|
|
|
if (ret)
|
|
|
|
goto out_conn;
|
|
|
|
ret = rds_sysctl_init();
|
|
|
|
if (ret)
|
|
|
|
goto out_threads;
|
|
|
|
ret = rds_stats_init();
|
|
|
|
if (ret)
|
|
|
|
goto out_sysctl;
|
|
|
|
ret = proto_register(&rds_proto, 1);
|
|
|
|
if (ret)
|
|
|
|
goto out_stats;
|
|
|
|
ret = sock_register(&rds_family_ops);
|
|
|
|
if (ret)
|
|
|
|
goto out_proto;
|
|
|
|
|
|
|
|
rds_info_register_func(RDS_INFO_SOCKETS, rds_sock_info);
|
|
|
|
rds_info_register_func(RDS_INFO_RECV_MESSAGES, rds_sock_inc_info);
|
2019-08-15 09:36:43 +00:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
rds_info_register_func(RDS6_INFO_SOCKETS, rds6_sock_info);
|
|
|
|
rds_info_register_func(RDS6_INFO_RECV_MESSAGES, rds6_sock_inc_info);
|
|
|
|
#endif
|
2009-02-24 15:30:18 +00:00
|
|
|
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
out_proto:
|
|
|
|
proto_unregister(&rds_proto);
|
|
|
|
out_stats:
|
|
|
|
rds_stats_exit();
|
|
|
|
out_sysctl:
|
|
|
|
rds_sysctl_exit();
|
|
|
|
out_threads:
|
|
|
|
rds_threads_exit();
|
|
|
|
out_conn:
|
|
|
|
rds_conn_exit();
|
|
|
|
rds_cong_exit();
|
|
|
|
rds_page_exit();
|
2015-10-30 15:49:10 +00:00
|
|
|
out_bind:
|
|
|
|
rds_bind_lock_destroy();
|
2009-02-24 15:30:18 +00:00
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
module_init(rds_init);
|
|
|
|
|
|
|
|
#define DRV_VERSION "4.0"
|
|
|
|
#define DRV_RELDATE "Feb 12, 2009"
|
|
|
|
|
|
|
|
MODULE_AUTHOR("Oracle Corporation <rds-devel@oss.oracle.com>");
|
|
|
|
MODULE_DESCRIPTION("RDS: Reliable Datagram Sockets"
|
|
|
|
" v" DRV_VERSION " (" DRV_RELDATE ")");
|
|
|
|
MODULE_VERSION(DRV_VERSION);
|
|
|
|
MODULE_LICENSE("Dual BSD/GPL");
|
|
|
|
MODULE_ALIAS_NETPROTO(PF_RDS);
|