blob: 166e36fcf3e4c16867821dd11c6c6df2c9440bd9 [file] [log] [blame]
Thomas Gleixner2522fe42019-05-28 09:57:20 -07001// SPDX-License-Identifier: GPL-2.0-only
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01002/******************************************************************************
3*******************************************************************************
4**
5** Copyright (C) Sistina Software, Inc. 1997-2003 All rights reserved.
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06006** Copyright (C) 2004-2009 Red Hat, Inc. All rights reserved.
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01007**
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01008**
9*******************************************************************************
10******************************************************************************/
11
12/*
13 * lowcomms.c
14 *
15 * This is the "low-level" comms layer.
16 *
17 * It is responsible for sending/receiving messages
18 * from other nodes in the cluster.
19 *
20 * Cluster nodes are referred to by their nodeids. nodeids are
21 * simply 32 bit numbers to the locking module - if they need to
Joe Perches2cf12c02009-01-22 13:26:47 -080022 * be expanded for the cluster infrastructure then that is its
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010023 * responsibility. It is this layer's
24 * responsibility to resolve these into IP address or
25 * whatever it needs for inter-node communication.
26 *
27 * The comms level is two kernel threads that deal mainly with
28 * the receiving of messages from other nodes and passing them
29 * up to the mid-level comms layer (which understands the
30 * message format) for execution by the locking core, and
31 * a send thread which does all the setting up of connections
32 * to remote nodes and the sending of data. Threads are not allowed
33 * to send their own data because it may cause them to wait in times
34 * of high load. Also, this way, the sending thread can collect together
35 * messages bound for one node and send them in one block.
36 *
Joe Perches2cf12c02009-01-22 13:26:47 -080037 * lowcomms will choose to use either TCP or SCTP as its transport layer
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010038 * depending on the configuration variable 'protocol'. This should be set
Joe Perches2cf12c02009-01-22 13:26:47 -080039 * to 0 (default) for TCP or 1 for SCTP. It should be configured using a
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010040 * cluster-wide mechanism as it must be the same on all nodes of the cluster
41 * for the DLM to function.
42 *
43 */
44
45#include <asm/ioctls.h>
46#include <net/sock.h>
47#include <net/tcp.h>
48#include <linux/pagemap.h>
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010049#include <linux/file.h>
Matthias Kaehlcke7a936ce2008-05-12 10:04:51 -050050#include <linux/mutex.h>
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010051#include <linux/sctp.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090052#include <linux/slab.h>
Benjamin Poirier2f2d76c2012-03-08 05:55:59 +000053#include <net/sctp/sctp.h>
Joe Perches44ad5322009-01-22 13:24:49 -080054#include <net/ipv6.h>
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010055
56#include "dlm_internal.h"
57#include "lowcomms.h"
58#include "midcomms.h"
59#include "config.h"
60
61#define NEEDED_RMEM (4*1024*1024)
Christine Caulfield5e9ccc32009-01-28 12:57:40 -060062#define CONN_HASH_SIZE 32
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010063
Bob Petersonf92c8dd2010-11-12 11:15:20 -060064/* Number of messages to send before rescheduling */
65#define MAX_SEND_MSG_COUNT 25
Alexander Aring055923b2020-07-27 09:13:38 -040066#define DLM_SHUTDOWN_WAIT_TIMEOUT msecs_to_jiffies(10000)
Bob Petersonf92c8dd2010-11-12 11:15:20 -060067
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010068struct connection {
69 struct socket *sock; /* NULL if not connected */
70 uint32_t nodeid; /* So we know who we are in the list */
71 struct mutex sock_mutex;
72 unsigned long flags;
73#define CF_READ_PENDING 1
tsutomu.owa@toshiba.co.jp8a4abb02017-09-12 09:01:16 +000074#define CF_WRITE_PENDING 2
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010075#define CF_INIT_PENDING 4
76#define CF_IS_OTHERCON 5
Lars Marowsky-Bree063c4c92009-08-11 16:18:23 -050077#define CF_CLOSE 6
David Millerb36930d2010-11-10 21:56:39 -080078#define CF_APP_LIMITED 7
tsutomu.owa@toshiba.co.jpb2a66622017-09-12 08:55:50 +000079#define CF_CLOSING 8
Alexander Aring055923b2020-07-27 09:13:38 -040080#define CF_SHUTDOWN 9
Alexander Aring19633c72020-11-02 20:04:20 -050081#define CF_CONNECTED 10
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010082 struct list_head writequeue; /* List of outgoing writequeue_entries */
83 spinlock_t writequeue_lock;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010084 void (*connect_action) (struct connection *); /* What to do to connect */
Alexander Aring055923b2020-07-27 09:13:38 -040085 void (*shutdown_action)(struct connection *con); /* What to do to shutdown */
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010086 int retries;
87#define MAX_CONNECT_RETRIES 3
Christine Caulfield5e9ccc32009-01-28 12:57:40 -060088 struct hlist_node list;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010089 struct connection *othercon;
90 struct work_struct rwork; /* Receive workqueue */
91 struct work_struct swork; /* Send workqueue */
Alexander Aring055923b2020-07-27 09:13:38 -040092 wait_queue_head_t shutdown_wait; /* wait for graceful shutdown */
Alexander Aring4798cbb2020-09-24 10:31:26 -040093 unsigned char *rx_buf;
94 int rx_buflen;
95 int rx_leftover;
Alexander Aringa47666eb2020-08-27 15:02:49 -040096 struct rcu_head rcu;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +010097};
98#define sock2con(x) ((struct connection *)(x)->sk_user_data)
99
Alexander Aringd11ccd42020-11-02 20:04:25 -0500100struct listen_connection {
101 struct socket *sock;
102 struct work_struct rwork;
103};
104
Alexander Aringf0747ebf2021-03-01 17:05:16 -0500105#define DLM_WQ_REMAIN_BYTES(e) (PAGE_SIZE - e->end)
106#define DLM_WQ_LENGTH_BYTES(e) (e->end - e->offset)
107
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100108/* An entry waiting to be sent */
109struct writequeue_entry {
110 struct list_head list;
111 struct page *page;
112 int offset;
113 int len;
114 int end;
115 int users;
116 struct connection *con;
117};
118
David Teigland36b71a82012-07-26 12:44:30 -0500119struct dlm_node_addr {
120 struct list_head list;
121 int nodeid;
Alexander Aringe125fbe2021-03-01 17:05:09 -0500122 int mark;
David Teigland36b71a82012-07-26 12:44:30 -0500123 int addr_count;
Mike Christie98e1b602013-06-14 04:56:12 -0500124 int curr_addr_index;
David Teigland36b71a82012-07-26 12:44:30 -0500125 struct sockaddr_storage *addr[DLM_MAX_ADDR_COUNT];
126};
127
Bob Petersoncc661fc2017-09-12 08:55:23 +0000128static struct listen_sock_callbacks {
129 void (*sk_error_report)(struct sock *);
130 void (*sk_data_ready)(struct sock *);
131 void (*sk_state_change)(struct sock *);
132 void (*sk_write_space)(struct sock *);
133} listen_sock;
134
David Teigland36b71a82012-07-26 12:44:30 -0500135static LIST_HEAD(dlm_node_addrs);
136static DEFINE_SPINLOCK(dlm_node_addrs_spin);
137
Alexander Aringd11ccd42020-11-02 20:04:25 -0500138static struct listen_connection listen_con;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100139static struct sockaddr_storage *dlm_local_addr[DLM_MAX_ADDR_COUNT];
140static int dlm_local_count;
Alexander Aring51746162021-03-01 17:05:13 -0500141int dlm_allow_conn;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100142
143/* Work queues */
144static struct workqueue_struct *recv_workqueue;
145static struct workqueue_struct *send_workqueue;
146
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600147static struct hlist_head connection_hash[CONN_HASH_SIZE];
Alexander Aringa47666eb2020-08-27 15:02:49 -0400148static DEFINE_SPINLOCK(connections_lock);
149DEFINE_STATIC_SRCU(connections_srcu);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100150
151static void process_recv_sockets(struct work_struct *work);
152static void process_send_sockets(struct work_struct *work);
153
Alexander Aring0672c3c2020-11-02 20:04:22 -0500154static void sctp_connect_to_sock(struct connection *con);
155static void tcp_connect_to_sock(struct connection *con);
Alexander Aring42873c92020-11-02 20:04:23 -0500156static void dlm_tcp_shutdown(struct connection *con);
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600157
158/* This is deliberately very simple because most clusters have simple
159 sequential nodeids, so we should be able to go straight to a connection
160 struct in the array */
161static inline int nodeid_hash(int nodeid)
162{
163 return nodeid & (CONN_HASH_SIZE-1);
164}
165
166static struct connection *__find_con(int nodeid)
167{
Alexander Aringa47666eb2020-08-27 15:02:49 -0400168 int r, idx;
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600169 struct connection *con;
170
171 r = nodeid_hash(nodeid);
172
Alexander Aringa47666eb2020-08-27 15:02:49 -0400173 idx = srcu_read_lock(&connections_srcu);
174 hlist_for_each_entry_rcu(con, &connection_hash[r], list) {
175 if (con->nodeid == nodeid) {
176 srcu_read_unlock(&connections_srcu, idx);
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600177 return con;
Alexander Aringa47666eb2020-08-27 15:02:49 -0400178 }
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600179 }
Alexander Aringa47666eb2020-08-27 15:02:49 -0400180 srcu_read_unlock(&connections_srcu, idx);
181
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600182 return NULL;
183}
184
Alexander Aring6cde2102020-11-02 20:04:21 -0500185static int dlm_con_init(struct connection *con, int nodeid)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100186{
Alexander Aring4798cbb2020-09-24 10:31:26 -0400187 con->rx_buflen = dlm_config.ci_buffer_size;
188 con->rx_buf = kmalloc(con->rx_buflen, GFP_NOFS);
Alexander Aring6cde2102020-11-02 20:04:21 -0500189 if (!con->rx_buf)
190 return -ENOMEM;
Alexander Aring4798cbb2020-09-24 10:31:26 -0400191
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100192 con->nodeid = nodeid;
193 mutex_init(&con->sock_mutex);
194 INIT_LIST_HEAD(&con->writequeue);
195 spin_lock_init(&con->writequeue_lock);
196 INIT_WORK(&con->swork, process_send_sockets);
197 INIT_WORK(&con->rwork, process_recv_sockets);
Alexander Aring055923b2020-07-27 09:13:38 -0400198 init_waitqueue_head(&con->shutdown_wait);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100199
Alexander Aring42873c92020-11-02 20:04:23 -0500200 if (dlm_config.ci_protocol == 0) {
Alexander Aring0672c3c2020-11-02 20:04:22 -0500201 con->connect_action = tcp_connect_to_sock;
Alexander Aring42873c92020-11-02 20:04:23 -0500202 con->shutdown_action = dlm_tcp_shutdown;
203 } else {
Alexander Aring0672c3c2020-11-02 20:04:22 -0500204 con->connect_action = sctp_connect_to_sock;
Alexander Aring42873c92020-11-02 20:04:23 -0500205 }
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100206
Alexander Aring6cde2102020-11-02 20:04:21 -0500207 return 0;
208}
209
210/*
211 * If 'allocation' is zero then we don't attempt to create a new
212 * connection structure for this node.
213 */
214static struct connection *nodeid2con(int nodeid, gfp_t alloc)
215{
216 struct connection *con, *tmp;
217 int r, ret;
218
219 con = __find_con(nodeid);
220 if (con || !alloc)
221 return con;
222
223 con = kzalloc(sizeof(*con), alloc);
224 if (!con)
225 return NULL;
226
227 ret = dlm_con_init(con, nodeid);
228 if (ret) {
229 kfree(con);
230 return NULL;
231 }
232
Alexander Aringa47666eb2020-08-27 15:02:49 -0400233 r = nodeid_hash(nodeid);
234
235 spin_lock(&connections_lock);
Alexander Aring4f2b30f2020-09-30 18:37:29 -0400236 /* Because multiple workqueues/threads calls this function it can
237 * race on multiple cpu's. Instead of locking hot path __find_con()
238 * we just check in rare cases of recently added nodes again
239 * under protection of connections_lock. If this is the case we
240 * abort our connection creation and return the existing connection.
241 */
242 tmp = __find_con(nodeid);
243 if (tmp) {
244 spin_unlock(&connections_lock);
245 kfree(con->rx_buf);
246 kfree(con);
247 return tmp;
248 }
249
Alexander Aringa47666eb2020-08-27 15:02:49 -0400250 hlist_add_head_rcu(&con->list, &connection_hash[r]);
251 spin_unlock(&connections_lock);
252
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100253 return con;
254}
255
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600256/* Loop round all connections */
257static void foreach_conn(void (*conn_func)(struct connection *c))
258{
Alexander Aringa47666eb2020-08-27 15:02:49 -0400259 int i, idx;
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600260 struct connection *con;
261
Alexander Aringa47666eb2020-08-27 15:02:49 -0400262 idx = srcu_read_lock(&connections_srcu);
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600263 for (i = 0; i < CONN_HASH_SIZE; i++) {
Alexander Aringa47666eb2020-08-27 15:02:49 -0400264 hlist_for_each_entry_rcu(con, &connection_hash[i], list)
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600265 conn_func(con);
Christine Caulfield5e9ccc32009-01-28 12:57:40 -0600266 }
Alexander Aringa47666eb2020-08-27 15:02:49 -0400267 srcu_read_unlock(&connections_srcu, idx);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100268}
269
David Teigland36b71a82012-07-26 12:44:30 -0500270static struct dlm_node_addr *find_node_addr(int nodeid)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100271{
David Teigland36b71a82012-07-26 12:44:30 -0500272 struct dlm_node_addr *na;
273
274 list_for_each_entry(na, &dlm_node_addrs, list) {
275 if (na->nodeid == nodeid)
276 return na;
277 }
278 return NULL;
279}
280
Alexander Aring40c6b832020-11-02 20:04:27 -0500281static int addr_compare(const struct sockaddr_storage *x,
282 const struct sockaddr_storage *y)
David Teigland36b71a82012-07-26 12:44:30 -0500283{
284 switch (x->ss_family) {
285 case AF_INET: {
286 struct sockaddr_in *sinx = (struct sockaddr_in *)x;
287 struct sockaddr_in *siny = (struct sockaddr_in *)y;
288 if (sinx->sin_addr.s_addr != siny->sin_addr.s_addr)
289 return 0;
290 if (sinx->sin_port != siny->sin_port)
291 return 0;
292 break;
293 }
294 case AF_INET6: {
295 struct sockaddr_in6 *sinx = (struct sockaddr_in6 *)x;
296 struct sockaddr_in6 *siny = (struct sockaddr_in6 *)y;
297 if (!ipv6_addr_equal(&sinx->sin6_addr, &siny->sin6_addr))
298 return 0;
299 if (sinx->sin6_port != siny->sin6_port)
300 return 0;
301 break;
302 }
303 default:
304 return 0;
305 }
306 return 1;
307}
308
309static int nodeid_to_addr(int nodeid, struct sockaddr_storage *sas_out,
Alexander Aringe125fbe2021-03-01 17:05:09 -0500310 struct sockaddr *sa_out, bool try_new_addr,
311 unsigned int *mark)
David Teigland36b71a82012-07-26 12:44:30 -0500312{
313 struct sockaddr_storage sas;
314 struct dlm_node_addr *na;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100315
316 if (!dlm_local_count)
317 return -1;
318
David Teigland36b71a82012-07-26 12:44:30 -0500319 spin_lock(&dlm_node_addrs_spin);
320 na = find_node_addr(nodeid);
Mike Christie98e1b602013-06-14 04:56:12 -0500321 if (na && na->addr_count) {
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -0300322 memcpy(&sas, na->addr[na->curr_addr_index],
323 sizeof(struct sockaddr_storage));
324
Mike Christie98e1b602013-06-14 04:56:12 -0500325 if (try_new_addr) {
326 na->curr_addr_index++;
327 if (na->curr_addr_index == na->addr_count)
328 na->curr_addr_index = 0;
329 }
Mike Christie98e1b602013-06-14 04:56:12 -0500330 }
David Teigland36b71a82012-07-26 12:44:30 -0500331 spin_unlock(&dlm_node_addrs_spin);
332
333 if (!na)
334 return -EEXIST;
335
336 if (!na->addr_count)
337 return -ENOENT;
338
Alexander Aringe125fbe2021-03-01 17:05:09 -0500339 *mark = na->mark;
340
David Teigland36b71a82012-07-26 12:44:30 -0500341 if (sas_out)
342 memcpy(sas_out, &sas, sizeof(struct sockaddr_storage));
343
344 if (!sa_out)
345 return 0;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100346
347 if (dlm_local_addr[0]->ss_family == AF_INET) {
David Teigland36b71a82012-07-26 12:44:30 -0500348 struct sockaddr_in *in4 = (struct sockaddr_in *) &sas;
349 struct sockaddr_in *ret4 = (struct sockaddr_in *) sa_out;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100350 ret4->sin_addr.s_addr = in4->sin_addr.s_addr;
351 } else {
David Teigland36b71a82012-07-26 12:44:30 -0500352 struct sockaddr_in6 *in6 = (struct sockaddr_in6 *) &sas;
353 struct sockaddr_in6 *ret6 = (struct sockaddr_in6 *) sa_out;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000354 ret6->sin6_addr = in6->sin6_addr;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100355 }
356
357 return 0;
358}
359
Alexander Aringe125fbe2021-03-01 17:05:09 -0500360static int addr_to_nodeid(struct sockaddr_storage *addr, int *nodeid,
361 unsigned int *mark)
David Teigland36b71a82012-07-26 12:44:30 -0500362{
363 struct dlm_node_addr *na;
364 int rv = -EEXIST;
Mike Christie98e1b602013-06-14 04:56:12 -0500365 int addr_i;
David Teigland36b71a82012-07-26 12:44:30 -0500366
367 spin_lock(&dlm_node_addrs_spin);
368 list_for_each_entry(na, &dlm_node_addrs, list) {
369 if (!na->addr_count)
370 continue;
371
Mike Christie98e1b602013-06-14 04:56:12 -0500372 for (addr_i = 0; addr_i < na->addr_count; addr_i++) {
373 if (addr_compare(na->addr[addr_i], addr)) {
374 *nodeid = na->nodeid;
Alexander Aringe125fbe2021-03-01 17:05:09 -0500375 *mark = na->mark;
Mike Christie98e1b602013-06-14 04:56:12 -0500376 rv = 0;
377 goto unlock;
378 }
379 }
David Teigland36b71a82012-07-26 12:44:30 -0500380 }
Mike Christie98e1b602013-06-14 04:56:12 -0500381unlock:
David Teigland36b71a82012-07-26 12:44:30 -0500382 spin_unlock(&dlm_node_addrs_spin);
383 return rv;
384}
385
Alexander Aring4f19d072020-11-02 20:04:28 -0500386/* caller need to held dlm_node_addrs_spin lock */
387static bool dlm_lowcomms_na_has_addr(const struct dlm_node_addr *na,
388 const struct sockaddr_storage *addr)
389{
390 int i;
391
392 for (i = 0; i < na->addr_count; i++) {
393 if (addr_compare(na->addr[i], addr))
394 return true;
395 }
396
397 return false;
398}
399
David Teigland36b71a82012-07-26 12:44:30 -0500400int dlm_lowcomms_addr(int nodeid, struct sockaddr_storage *addr, int len)
401{
402 struct sockaddr_storage *new_addr;
403 struct dlm_node_addr *new_node, *na;
Alexander Aring4f19d072020-11-02 20:04:28 -0500404 bool ret;
David Teigland36b71a82012-07-26 12:44:30 -0500405
406 new_node = kzalloc(sizeof(struct dlm_node_addr), GFP_NOFS);
407 if (!new_node)
408 return -ENOMEM;
409
410 new_addr = kzalloc(sizeof(struct sockaddr_storage), GFP_NOFS);
411 if (!new_addr) {
412 kfree(new_node);
413 return -ENOMEM;
414 }
415
416 memcpy(new_addr, addr, len);
417
418 spin_lock(&dlm_node_addrs_spin);
419 na = find_node_addr(nodeid);
420 if (!na) {
421 new_node->nodeid = nodeid;
422 new_node->addr[0] = new_addr;
423 new_node->addr_count = 1;
Alexander Aringe125fbe2021-03-01 17:05:09 -0500424 new_node->mark = dlm_config.ci_mark;
David Teigland36b71a82012-07-26 12:44:30 -0500425 list_add(&new_node->list, &dlm_node_addrs);
426 spin_unlock(&dlm_node_addrs_spin);
427 return 0;
428 }
429
Alexander Aring4f19d072020-11-02 20:04:28 -0500430 ret = dlm_lowcomms_na_has_addr(na, addr);
431 if (ret) {
432 spin_unlock(&dlm_node_addrs_spin);
433 kfree(new_addr);
434 kfree(new_node);
435 return -EEXIST;
436 }
437
David Teigland36b71a82012-07-26 12:44:30 -0500438 if (na->addr_count >= DLM_MAX_ADDR_COUNT) {
439 spin_unlock(&dlm_node_addrs_spin);
440 kfree(new_addr);
441 kfree(new_node);
442 return -ENOSPC;
443 }
444
445 na->addr[na->addr_count++] = new_addr;
446 spin_unlock(&dlm_node_addrs_spin);
447 kfree(new_node);
448 return 0;
449}
450
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100451/* Data available on socket or listen socket received a connect */
David S. Miller676d2362014-04-11 16:15:36 -0400452static void lowcomms_data_ready(struct sock *sk)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100453{
tsutomu.owa@toshiba.co.jp93eaade2017-09-12 09:01:55 +0000454 struct connection *con;
455
456 read_lock_bh(&sk->sk_callback_lock);
457 con = sock2con(sk);
Patrick Caulfieldafb853f2007-06-01 10:07:26 -0500458 if (con && !test_and_set_bit(CF_READ_PENDING, &con->flags))
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100459 queue_work(recv_workqueue, &con->rwork);
tsutomu.owa@toshiba.co.jp93eaade2017-09-12 09:01:55 +0000460 read_unlock_bh(&sk->sk_callback_lock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100461}
462
Alexander Aringd11ccd42020-11-02 20:04:25 -0500463static void lowcomms_listen_data_ready(struct sock *sk)
464{
465 queue_work(recv_workqueue, &listen_con.rwork);
466}
467
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100468static void lowcomms_write_space(struct sock *sk)
469{
tsutomu.owa@toshiba.co.jp93eaade2017-09-12 09:01:55 +0000470 struct connection *con;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100471
tsutomu.owa@toshiba.co.jp93eaade2017-09-12 09:01:55 +0000472 read_lock_bh(&sk->sk_callback_lock);
473 con = sock2con(sk);
David Millerb36930d2010-11-10 21:56:39 -0800474 if (!con)
tsutomu.owa@toshiba.co.jp93eaade2017-09-12 09:01:55 +0000475 goto out;
David Millerb36930d2010-11-10 21:56:39 -0800476
Alexander Aring19633c72020-11-02 20:04:20 -0500477 if (!test_and_set_bit(CF_CONNECTED, &con->flags)) {
478 log_print("successful connected to node %d", con->nodeid);
479 queue_work(send_workqueue, &con->swork);
480 goto out;
481 }
482
David Millerb36930d2010-11-10 21:56:39 -0800483 clear_bit(SOCK_NOSPACE, &con->sock->flags);
484
485 if (test_and_clear_bit(CF_APP_LIMITED, &con->flags)) {
486 con->sock->sk->sk_write_pending--;
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800487 clear_bit(SOCKWQ_ASYNC_NOSPACE, &con->sock->flags);
David Millerb36930d2010-11-10 21:56:39 -0800488 }
489
Bob Peterson01da24d2017-09-12 08:55:14 +0000490 queue_work(send_workqueue, &con->swork);
tsutomu.owa@toshiba.co.jp93eaade2017-09-12 09:01:55 +0000491out:
492 read_unlock_bh(&sk->sk_callback_lock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100493}
494
495static inline void lowcomms_connect_sock(struct connection *con)
496{
Lars Marowsky-Bree063c4c92009-08-11 16:18:23 -0500497 if (test_bit(CF_CLOSE, &con->flags))
498 return;
Bob Peterson61d9102b2017-09-12 08:55:04 +0000499 queue_work(send_workqueue, &con->swork);
500 cond_resched();
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100501}
502
503static void lowcomms_state_change(struct sock *sk)
504{
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -0300505 /* SCTP layer is not calling sk_data_ready when the connection
506 * is done, so we catch the signal through here. Also, it
507 * doesn't switch socket state when entering shutdown, so we
508 * skip the write in that case.
509 */
510 if (sk->sk_shutdown) {
511 if (sk->sk_shutdown == RCV_SHUTDOWN)
512 lowcomms_data_ready(sk);
513 } else if (sk->sk_state == TCP_ESTABLISHED) {
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100514 lowcomms_write_space(sk);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -0300515 }
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100516}
517
Christine Caulfield391fbdc2009-05-07 10:54:16 -0500518int dlm_lowcomms_connect_node(int nodeid)
519{
520 struct connection *con;
521
522 if (nodeid == dlm_our_nodeid())
523 return 0;
524
525 con = nodeid2con(nodeid, GFP_NOFS);
526 if (!con)
527 return -ENOMEM;
528 lowcomms_connect_sock(con);
529 return 0;
530}
531
Alexander Aringe125fbe2021-03-01 17:05:09 -0500532int dlm_lowcomms_nodes_set_mark(int nodeid, unsigned int mark)
533{
534 struct dlm_node_addr *na;
535
536 spin_lock(&dlm_node_addrs_spin);
537 na = find_node_addr(nodeid);
538 if (!na) {
539 spin_unlock(&dlm_node_addrs_spin);
540 return -ENOENT;
541 }
542
543 na->mark = mark;
544 spin_unlock(&dlm_node_addrs_spin);
545
546 return 0;
547}
548
Bob Petersonb3a5bbf2015-08-27 09:34:47 -0500549static void lowcomms_error_report(struct sock *sk)
550{
Bob Petersonb81171c2016-02-05 14:39:02 -0500551 struct connection *con;
Bob Petersonb3a5bbf2015-08-27 09:34:47 -0500552 struct sockaddr_storage saddr;
Bob Petersonb81171c2016-02-05 14:39:02 -0500553 void (*orig_report)(struct sock *) = NULL;
Bob Petersonb3a5bbf2015-08-27 09:34:47 -0500554
Bob Petersonb81171c2016-02-05 14:39:02 -0500555 read_lock_bh(&sk->sk_callback_lock);
556 con = sock2con(sk);
557 if (con == NULL)
558 goto out;
559
Bob Petersoncc661fc2017-09-12 08:55:23 +0000560 orig_report = listen_sock.sk_error_report;
Bob Peterson1a318332016-01-18 12:29:15 -0500561 if (con->sock == NULL ||
Denys Vlasenko9b2c45d2018-02-12 20:00:20 +0100562 kernel_getpeername(con->sock, (struct sockaddr *)&saddr) < 0) {
Bob Petersonb3a5bbf2015-08-27 09:34:47 -0500563 printk_ratelimited(KERN_ERR "dlm: node %d: socket error "
564 "sending to node %d, port %d, "
565 "sk_err=%d/%d\n", dlm_our_nodeid(),
566 con->nodeid, dlm_config.ci_tcp_port,
567 sk->sk_err, sk->sk_err_soft);
Bob Petersonb3a5bbf2015-08-27 09:34:47 -0500568 } else if (saddr.ss_family == AF_INET) {
569 struct sockaddr_in *sin4 = (struct sockaddr_in *)&saddr;
570
571 printk_ratelimited(KERN_ERR "dlm: node %d: socket error "
572 "sending to node %d at %pI4, port %d, "
573 "sk_err=%d/%d\n", dlm_our_nodeid(),
574 con->nodeid, &sin4->sin_addr.s_addr,
575 dlm_config.ci_tcp_port, sk->sk_err,
576 sk->sk_err_soft);
577 } else {
578 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)&saddr;
579
580 printk_ratelimited(KERN_ERR "dlm: node %d: socket error "
581 "sending to node %d at %u.%u.%u.%u, "
582 "port %d, sk_err=%d/%d\n", dlm_our_nodeid(),
583 con->nodeid, sin6->sin6_addr.s6_addr32[0],
584 sin6->sin6_addr.s6_addr32[1],
585 sin6->sin6_addr.s6_addr32[2],
586 sin6->sin6_addr.s6_addr32[3],
587 dlm_config.ci_tcp_port, sk->sk_err,
588 sk->sk_err_soft);
589 }
Bob Petersonb81171c2016-02-05 14:39:02 -0500590out:
591 read_unlock_bh(&sk->sk_callback_lock);
592 if (orig_report)
593 orig_report(sk);
594}
595
596/* Note: sk_callback_lock must be locked before calling this function. */
Bob Petersoncc661fc2017-09-12 08:55:23 +0000597static void save_listen_callbacks(struct socket *sock)
Bob Petersonb81171c2016-02-05 14:39:02 -0500598{
Bob Petersoncc661fc2017-09-12 08:55:23 +0000599 struct sock *sk = sock->sk;
600
601 listen_sock.sk_data_ready = sk->sk_data_ready;
602 listen_sock.sk_state_change = sk->sk_state_change;
603 listen_sock.sk_write_space = sk->sk_write_space;
604 listen_sock.sk_error_report = sk->sk_error_report;
Bob Petersonb81171c2016-02-05 14:39:02 -0500605}
606
Bob Petersoncc661fc2017-09-12 08:55:23 +0000607static void restore_callbacks(struct socket *sock)
Bob Petersonb81171c2016-02-05 14:39:02 -0500608{
Bob Petersoncc661fc2017-09-12 08:55:23 +0000609 struct sock *sk = sock->sk;
610
Bob Petersonb81171c2016-02-05 14:39:02 -0500611 write_lock_bh(&sk->sk_callback_lock);
Bob Petersonb81171c2016-02-05 14:39:02 -0500612 sk->sk_user_data = NULL;
Bob Petersoncc661fc2017-09-12 08:55:23 +0000613 sk->sk_data_ready = listen_sock.sk_data_ready;
614 sk->sk_state_change = listen_sock.sk_state_change;
615 sk->sk_write_space = listen_sock.sk_write_space;
616 sk->sk_error_report = listen_sock.sk_error_report;
Bob Petersonb81171c2016-02-05 14:39:02 -0500617 write_unlock_bh(&sk->sk_callback_lock);
Bob Petersonb3a5bbf2015-08-27 09:34:47 -0500618}
619
Alexander Aringd11ccd42020-11-02 20:04:25 -0500620static void add_listen_sock(struct socket *sock, struct listen_connection *con)
621{
622 struct sock *sk = sock->sk;
623
624 write_lock_bh(&sk->sk_callback_lock);
625 save_listen_callbacks(sock);
626 con->sock = sock;
627
628 sk->sk_user_data = con;
629 sk->sk_allocation = GFP_NOFS;
630 /* Install a data_ready callback */
631 sk->sk_data_ready = lowcomms_listen_data_ready;
632 write_unlock_bh(&sk->sk_callback_lock);
633}
634
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100635/* Make a socket active */
tsutomu.owa@toshiba.co.jp988419a2017-09-12 08:55:32 +0000636static void add_sock(struct socket *sock, struct connection *con)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100637{
Bob Petersonb81171c2016-02-05 14:39:02 -0500638 struct sock *sk = sock->sk;
639
640 write_lock_bh(&sk->sk_callback_lock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100641 con->sock = sock;
642
Bob Petersonb81171c2016-02-05 14:39:02 -0500643 sk->sk_user_data = con;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100644 /* Install a data_ready callback */
Bob Petersonb81171c2016-02-05 14:39:02 -0500645 sk->sk_data_ready = lowcomms_data_ready;
646 sk->sk_write_space = lowcomms_write_space;
647 sk->sk_state_change = lowcomms_state_change;
648 sk->sk_allocation = GFP_NOFS;
649 sk->sk_error_report = lowcomms_error_report;
650 write_unlock_bh(&sk->sk_callback_lock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100651}
652
653/* Add the port number to an IPv6 or 4 sockaddr and return the address
654 length */
655static void make_sockaddr(struct sockaddr_storage *saddr, uint16_t port,
656 int *addr_len)
657{
658 saddr->ss_family = dlm_local_addr[0]->ss_family;
659 if (saddr->ss_family == AF_INET) {
660 struct sockaddr_in *in4_addr = (struct sockaddr_in *)saddr;
661 in4_addr->sin_port = cpu_to_be16(port);
662 *addr_len = sizeof(struct sockaddr_in);
663 memset(&in4_addr->sin_zero, 0, sizeof(in4_addr->sin_zero));
664 } else {
665 struct sockaddr_in6 *in6_addr = (struct sockaddr_in6 *)saddr;
666 in6_addr->sin6_port = cpu_to_be16(port);
667 *addr_len = sizeof(struct sockaddr_in6);
668 }
Patrick Caulfield01c8cab2007-07-17 16:53:15 +0100669 memset((char *)saddr + *addr_len, 0, sizeof(struct sockaddr_storage) - *addr_len);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100670}
671
Alexander Aringd11ccd42020-11-02 20:04:25 -0500672static void dlm_close_sock(struct socket **sock)
673{
674 if (*sock) {
675 restore_callbacks(*sock);
676 sock_release(*sock);
677 *sock = NULL;
678 }
679}
680
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100681/* Close a remote connection and tidy up */
Marcelo Ricardo Leitner0d737a82015-08-11 19:22:21 -0300682static void close_connection(struct connection *con, bool and_other,
683 bool tx, bool rx)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100684{
tsutomu.owa@toshiba.co.jpb2a66622017-09-12 08:55:50 +0000685 bool closing = test_and_set_bit(CF_CLOSING, &con->flags);
686
tsutomu.owa@toshiba.co.jp0aa18462017-09-12 09:02:02 +0000687 if (tx && !closing && cancel_work_sync(&con->swork)) {
Marcelo Ricardo Leitner0d737a82015-08-11 19:22:21 -0300688 log_print("canceled swork for node %d", con->nodeid);
tsutomu.owa@toshiba.co.jp0aa18462017-09-12 09:02:02 +0000689 clear_bit(CF_WRITE_PENDING, &con->flags);
690 }
691 if (rx && !closing && cancel_work_sync(&con->rwork)) {
Marcelo Ricardo Leitner0d737a82015-08-11 19:22:21 -0300692 log_print("canceled rwork for node %d", con->nodeid);
tsutomu.owa@toshiba.co.jp0aa18462017-09-12 09:02:02 +0000693 clear_bit(CF_READ_PENDING, &con->flags);
694 }
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100695
Marcelo Ricardo Leitner0d737a82015-08-11 19:22:21 -0300696 mutex_lock(&con->sock_mutex);
Alexander Aringd11ccd42020-11-02 20:04:25 -0500697 dlm_close_sock(&con->sock);
698
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100699 if (con->othercon && and_other) {
700 /* Will only re-enter once. */
Marcelo Ricardo Leitner0d737a82015-08-11 19:22:21 -0300701 close_connection(con->othercon, false, true, true);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100702 }
Patrick Caulfield9e5f2822007-08-02 14:58:14 +0100703
Alexander Aring4798cbb2020-09-24 10:31:26 -0400704 con->rx_leftover = 0;
Patrick Caulfield61d96be02007-08-20 15:13:38 +0100705 con->retries = 0;
Alexander Aring19633c72020-11-02 20:04:20 -0500706 clear_bit(CF_CONNECTED, &con->flags);
Patrick Caulfield61d96be02007-08-20 15:13:38 +0100707 mutex_unlock(&con->sock_mutex);
tsutomu.owa@toshiba.co.jpb2a66622017-09-12 08:55:50 +0000708 clear_bit(CF_CLOSING, &con->flags);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100709}
710
Alexander Aring055923b2020-07-27 09:13:38 -0400711static void shutdown_connection(struct connection *con)
712{
713 int ret;
714
Alexander Aringeec054b2021-03-01 17:05:19 -0500715 flush_work(&con->swork);
Alexander Aring055923b2020-07-27 09:13:38 -0400716
717 mutex_lock(&con->sock_mutex);
718 /* nothing to shutdown */
719 if (!con->sock) {
720 mutex_unlock(&con->sock_mutex);
721 return;
722 }
723
724 set_bit(CF_SHUTDOWN, &con->flags);
725 ret = kernel_sock_shutdown(con->sock, SHUT_WR);
726 mutex_unlock(&con->sock_mutex);
727 if (ret) {
728 log_print("Connection %p failed to shutdown: %d will force close",
729 con, ret);
730 goto force_close;
731 } else {
732 ret = wait_event_timeout(con->shutdown_wait,
733 !test_bit(CF_SHUTDOWN, &con->flags),
734 DLM_SHUTDOWN_WAIT_TIMEOUT);
735 if (ret == 0) {
736 log_print("Connection %p shutdown timed out, will force close",
737 con);
738 goto force_close;
739 }
740 }
741
742 return;
743
744force_close:
745 clear_bit(CF_SHUTDOWN, &con->flags);
746 close_connection(con, false, true, true);
747}
748
749static void dlm_tcp_shutdown(struct connection *con)
750{
751 if (con->othercon)
752 shutdown_connection(con->othercon);
753 shutdown_connection(con);
754}
755
Alexander Aring4798cbb2020-09-24 10:31:26 -0400756static int con_realloc_receive_buf(struct connection *con, int newlen)
757{
758 unsigned char *newbuf;
759
760 newbuf = kmalloc(newlen, GFP_NOFS);
761 if (!newbuf)
762 return -ENOMEM;
763
764 /* copy any leftover from last receive */
765 if (con->rx_leftover)
766 memmove(newbuf, con->rx_buf, con->rx_leftover);
767
768 /* swap to new buffer space */
769 kfree(con->rx_buf);
770 con->rx_buflen = newlen;
771 con->rx_buf = newbuf;
772
773 return 0;
774}
775
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100776/* Data received from remote end */
777static int receive_from_sock(struct connection *con)
778{
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100779 int call_again_soon = 0;
Alexander Aring4798cbb2020-09-24 10:31:26 -0400780 struct msghdr msg;
781 struct kvec iov;
782 int ret, buflen;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100783
784 mutex_lock(&con->sock_mutex);
785
786 if (con->sock == NULL) {
787 ret = -EAGAIN;
788 goto out_close;
789 }
Alexander Aring4798cbb2020-09-24 10:31:26 -0400790
Alexander Aring4798cbb2020-09-24 10:31:26 -0400791 /* realloc if we get new buffer size to read out */
792 buflen = dlm_config.ci_buffer_size;
793 if (con->rx_buflen != buflen && con->rx_leftover <= buflen) {
794 ret = con_realloc_receive_buf(con, buflen);
795 if (ret < 0)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100796 goto out_resched;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100797 }
798
Alexander Aring4798cbb2020-09-24 10:31:26 -0400799 /* calculate new buffer parameter regarding last receive and
800 * possible leftover bytes
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100801 */
Alexander Aring4798cbb2020-09-24 10:31:26 -0400802 iov.iov_base = con->rx_buf + con->rx_leftover;
803 iov.iov_len = con->rx_buflen - con->rx_leftover;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100804
Alexander Aring4798cbb2020-09-24 10:31:26 -0400805 memset(&msg, 0, sizeof(msg));
806 msg.msg_flags = MSG_DONTWAIT | MSG_NOSIGNAL;
807 ret = kernel_recvmsg(con->sock, &msg, &iov, 1, iov.iov_len,
808 msg.msg_flags);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100809 if (ret <= 0)
810 goto out_close;
Alexander Aring4798cbb2020-09-24 10:31:26 -0400811 else if (ret == iov.iov_len)
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -0300812 call_again_soon = 1;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100813
Alexander Aring4798cbb2020-09-24 10:31:26 -0400814 /* new buflen according readed bytes and leftover from last receive */
815 buflen = ret + con->rx_leftover;
816 ret = dlm_process_incoming_buffer(con->nodeid, con->rx_buf, buflen);
817 if (ret < 0)
818 goto out_close;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100819
Alexander Aring4798cbb2020-09-24 10:31:26 -0400820 /* calculate leftover bytes from process and put it into begin of
821 * the receive buffer, so next receive we have the full message
822 * at the start address of the receive buffer.
823 */
824 con->rx_leftover = buflen - ret;
825 if (con->rx_leftover) {
826 memmove(con->rx_buf, con->rx_buf + ret,
827 con->rx_leftover);
828 call_again_soon = true;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100829 }
830
831 if (call_again_soon)
832 goto out_resched;
Alexander Aring4798cbb2020-09-24 10:31:26 -0400833
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100834 mutex_unlock(&con->sock_mutex);
835 return 0;
836
837out_resched:
838 if (!test_and_set_bit(CF_READ_PENDING, &con->flags))
839 queue_work(recv_workqueue, &con->rwork);
840 mutex_unlock(&con->sock_mutex);
841 return -EAGAIN;
842
843out_close:
844 mutex_unlock(&con->sock_mutex);
Patrick Caulfield9e5f2822007-08-02 14:58:14 +0100845 if (ret != -EAGAIN) {
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100846 /* Reconnect when there is something to send */
Alexander Aring055923b2020-07-27 09:13:38 -0400847 close_connection(con, false, true, false);
848 if (ret == 0) {
849 log_print("connection %p got EOF from %d",
850 con, con->nodeid);
851 /* handling for tcp shutdown */
852 clear_bit(CF_SHUTDOWN, &con->flags);
853 wake_up(&con->shutdown_wait);
854 /* signal to breaking receive worker */
855 ret = -1;
856 }
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100857 }
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100858 return ret;
859}
860
861/* Listening socket is busy, accept a connection */
Alexander Aringd11ccd42020-11-02 20:04:25 -0500862static int accept_from_sock(struct listen_connection *con)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100863{
864 int result;
865 struct sockaddr_storage peeraddr;
866 struct socket *newsock;
867 int len;
868 int nodeid;
869 struct connection *newcon;
870 struct connection *addcon;
Alexander Aring3f78cd72020-09-24 10:31:23 -0400871 unsigned int mark;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100872
David Teigland513ef592012-03-30 11:46:08 -0500873 if (!dlm_allow_conn) {
David Teigland513ef592012-03-30 11:46:08 -0500874 return -1;
875 }
David Teigland513ef592012-03-30 11:46:08 -0500876
Alexander Aringd11ccd42020-11-02 20:04:25 -0500877 if (!con->sock)
tsutomu.owa@toshiba.co.jp3421fb12017-09-12 09:01:38 +0000878 return -ENOTCONN;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100879
tsutomu.owa@toshiba.co.jp3421fb12017-09-12 09:01:38 +0000880 result = kernel_accept(con->sock, &newsock, O_NONBLOCK);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100881 if (result < 0)
882 goto accept_err;
883
884 /* Get the connected socket's peer */
885 memset(&peeraddr, 0, sizeof(peeraddr));
Denys Vlasenko9b2c45d2018-02-12 20:00:20 +0100886 len = newsock->ops->getname(newsock, (struct sockaddr *)&peeraddr, 2);
887 if (len < 0) {
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100888 result = -ECONNABORTED;
889 goto accept_err;
890 }
891
892 /* Get the new node's NODEID */
893 make_sockaddr(&peeraddr, 0, &len);
Alexander Aringe125fbe2021-03-01 17:05:09 -0500894 if (addr_to_nodeid(&peeraddr, &nodeid, &mark)) {
Masatake YAMATObcaadf52011-07-04 12:25:51 +0900895 unsigned char *b=(unsigned char *)&peeraddr;
David Teigland617e82e2007-04-26 13:46:49 -0500896 log_print("connect from non cluster node");
Masatake YAMATObcaadf52011-07-04 12:25:51 +0900897 print_hex_dump_bytes("ss: ", DUMP_PREFIX_NONE,
898 b, sizeof(struct sockaddr_storage));
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100899 sock_release(newsock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100900 return -1;
901 }
902
903 log_print("got connection from %d", nodeid);
904
905 /* Check to see if we already have a connection to this node. This
906 * could happen if the two nodes initiate a connection at roughly
907 * the same time and the connections cross on the wire.
908 * In this case we store the incoming one in "othercon"
909 */
David Teigland748285c2009-05-15 10:50:57 -0500910 newcon = nodeid2con(nodeid, GFP_NOFS);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100911 if (!newcon) {
912 result = -ENOMEM;
913 goto accept_err;
914 }
Alexander Aringd11ccd42020-11-02 20:04:25 -0500915
Alexander Aringe125fbe2021-03-01 17:05:09 -0500916 sock_set_mark(newsock->sk, mark);
917
Alexander Aringd11ccd42020-11-02 20:04:25 -0500918 mutex_lock(&newcon->sock_mutex);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100919 if (newcon->sock) {
920 struct connection *othercon = newcon->othercon;
921
922 if (!othercon) {
Alexander Aringa47666eb2020-08-27 15:02:49 -0400923 othercon = kzalloc(sizeof(*othercon), GFP_NOFS);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100924 if (!othercon) {
David Teigland617e82e2007-04-26 13:46:49 -0500925 log_print("failed to allocate incoming socket");
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100926 mutex_unlock(&newcon->sock_mutex);
927 result = -ENOMEM;
928 goto accept_err;
929 }
Alexander Aring4798cbb2020-09-24 10:31:26 -0400930
Alexander Aring6cde2102020-11-02 20:04:21 -0500931 result = dlm_con_init(othercon, nodeid);
932 if (result < 0) {
Alexander Aring4798cbb2020-09-24 10:31:26 -0400933 kfree(othercon);
Yang Yingliang2fd8db22021-03-27 16:37:04 +0800934 mutex_unlock(&newcon->sock_mutex);
Alexander Aring4798cbb2020-09-24 10:31:26 -0400935 goto accept_err;
936 }
937
Alexander Aringe9a470a2021-03-01 17:05:11 -0500938 lockdep_set_subclass(&othercon->sock_mutex, 1);
Alexander Aring6cde2102020-11-02 20:04:21 -0500939 newcon->othercon = othercon;
Alexander Aringba3ab3c2020-07-27 09:13:37 -0400940 } else {
941 /* close other sock con if we have something new */
942 close_connection(othercon, false, true, false);
Patrick Caulfield61d96be02007-08-20 15:13:38 +0100943 }
Alexander Aringba3ab3c2020-07-27 09:13:37 -0400944
Alexander Aringe9a470a2021-03-01 17:05:11 -0500945 mutex_lock(&othercon->sock_mutex);
Alexander Aringba3ab3c2020-07-27 09:13:37 -0400946 add_sock(newsock, othercon);
947 addcon = othercon;
948 mutex_unlock(&othercon->sock_mutex);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100949 }
950 else {
Bob Peterson3735b4b2016-09-23 14:23:26 -0400951 /* accept copies the sk after we've saved the callbacks, so we
952 don't want to save them a second time or comm errors will
953 result in calling sk_error_report recursively. */
tsutomu.owa@toshiba.co.jp988419a2017-09-12 08:55:32 +0000954 add_sock(newsock, newcon);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100955 addcon = newcon;
956 }
957
Alexander Aringb30a6242021-03-01 17:05:10 -0500958 set_bit(CF_CONNECTED, &addcon->flags);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100959 mutex_unlock(&newcon->sock_mutex);
960
961 /*
962 * Add it to the active queue in case we got data
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300963 * between processing the accept adding the socket
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100964 * to the read_sockets list
965 */
966 if (!test_and_set_bit(CF_READ_PENDING, &addcon->flags))
967 queue_work(recv_workqueue, &addcon->rwork);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100968
969 return 0;
970
971accept_err:
tsutomu.owa@toshiba.co.jp3421fb12017-09-12 09:01:38 +0000972 if (newsock)
973 sock_release(newsock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100974
975 if (result != -EAGAIN)
David Teigland617e82e2007-04-26 13:46:49 -0500976 log_print("error accepting connection from node: %d", result);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +0100977 return result;
978}
979
980static void free_entry(struct writequeue_entry *e)
981{
982 __free_page(e->page);
983 kfree(e);
984}
985
Mike Christie5d689872013-06-14 04:56:13 -0500986/*
987 * writequeue_entry_complete - try to delete and free write queue entry
988 * @e: write queue entry to try to delete
989 * @completed: bytes completed
990 *
991 * writequeue_lock must be held.
992 */
993static void writequeue_entry_complete(struct writequeue_entry *e, int completed)
994{
995 e->offset += completed;
996 e->len -= completed;
997
998 if (e->len == 0 && e->users == 0) {
999 list_del(&e->list);
1000 free_entry(e);
1001 }
1002}
1003
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001004/*
1005 * sctp_bind_addrs - bind a SCTP socket to all our addresses
1006 */
Alexander Aring13004e82020-11-02 20:04:24 -05001007static int sctp_bind_addrs(struct socket *sock, uint16_t port)
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001008{
1009 struct sockaddr_storage localaddr;
Christoph Hellwigc0425a42020-05-29 14:09:42 +02001010 struct sockaddr *addr = (struct sockaddr *)&localaddr;
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001011 int i, addr_len, result = 0;
1012
1013 for (i = 0; i < dlm_local_count; i++) {
1014 memcpy(&localaddr, dlm_local_addr[i], sizeof(localaddr));
1015 make_sockaddr(&localaddr, port, &addr_len);
1016
1017 if (!i)
Alexander Aring13004e82020-11-02 20:04:24 -05001018 result = kernel_bind(sock, addr, addr_len);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001019 else
Alexander Aring13004e82020-11-02 20:04:24 -05001020 result = sock_bind_add(sock->sk, addr, addr_len);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001021
1022 if (result < 0) {
1023 log_print("Can't bind to %d addr number %d, %d.\n",
1024 port, i + 1, result);
1025 break;
1026 }
1027 }
1028 return result;
1029}
1030
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001031/* Initiate an SCTP association.
1032 This is a special case of send_to_sock() in that we don't yet have a
1033 peeled-off socket for this association, so we use the listening socket
1034 and add the primary IP address of the remote node.
1035 */
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001036static void sctp_connect_to_sock(struct connection *con)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001037{
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001038 struct sockaddr_storage daddr;
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001039 int result;
1040 int addr_len;
1041 struct socket *sock;
Alexander Aring9c9f1682020-06-26 13:26:50 -04001042 unsigned int mark;
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001043
Mike Christie5d689872013-06-14 04:56:13 -05001044 mutex_lock(&con->sock_mutex);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001045
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001046 /* Some odd races can cause double-connects, ignore them */
1047 if (con->retries++ > MAX_CONNECT_RETRIES)
1048 goto out;
1049
1050 if (con->sock) {
1051 log_print("node %d already connected.", con->nodeid);
1052 goto out;
1053 }
1054
1055 memset(&daddr, 0, sizeof(daddr));
Alexander Aringe125fbe2021-03-01 17:05:09 -05001056 result = nodeid_to_addr(con->nodeid, &daddr, NULL, true, &mark);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001057 if (result < 0) {
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001058 log_print("no address for nodeid %d", con->nodeid);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001059 goto out;
David Teigland04bedd72009-09-18 14:31:47 -05001060 }
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001061
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001062 /* Create a socket to communicate with */
1063 result = sock_create_kern(&init_net, dlm_local_addr[0]->ss_family,
1064 SOCK_STREAM, IPPROTO_SCTP, &sock);
1065 if (result < 0)
1066 goto socket_err;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001067
Alexander Aring9c9f1682020-06-26 13:26:50 -04001068 sock_set_mark(sock->sk, mark);
1069
tsutomu.owa@toshiba.co.jp988419a2017-09-12 08:55:32 +00001070 add_sock(sock, con);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001071
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001072 /* Bind to all addresses. */
Alexander Aring13004e82020-11-02 20:04:24 -05001073 if (sctp_bind_addrs(con->sock, 0))
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001074 goto bind_err;
Mike Christie98e1b602013-06-14 04:56:12 -05001075
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001076 make_sockaddr(&daddr, dlm_config.ci_tcp_port, &addr_len);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001077
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001078 log_print("connecting to %d", con->nodeid);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001079
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001080 /* Turn off Nagle's algorithm */
Christoph Hellwig40ef92c2020-05-29 14:09:40 +02001081 sctp_sock_set_nodelay(sock->sk);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001082
Gang Hef706d832018-05-02 10:28:35 -05001083 /*
1084 * Make sock->ops->connect() function return in specified time,
1085 * since O_NONBLOCK argument in connect() function does not work here,
1086 * then, we should restore the default value of this attribute.
1087 */
Christoph Hellwig76ee0782020-05-28 07:12:12 +02001088 sock_set_sndtimeo(sock->sk, 5);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001089 result = sock->ops->connect(sock, (struct sockaddr *)&daddr, addr_len,
Gang Heda3627c2018-05-29 11:09:22 +08001090 0);
Christoph Hellwig76ee0782020-05-28 07:12:12 +02001091 sock_set_sndtimeo(sock->sk, 0);
Gang Hef706d832018-05-02 10:28:35 -05001092
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001093 if (result == -EINPROGRESS)
1094 result = 0;
Alexander Aring19633c72020-11-02 20:04:20 -05001095 if (result == 0) {
1096 if (!test_and_set_bit(CF_CONNECTED, &con->flags))
1097 log_print("successful connected to node %d", con->nodeid);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001098 goto out;
Alexander Aring19633c72020-11-02 20:04:20 -05001099 }
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001100
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001101bind_err:
1102 con->sock = NULL;
1103 sock_release(sock);
1104
1105socket_err:
1106 /*
1107 * Some errors are fatal and this list might need adjusting. For other
1108 * errors we try again until the max number of retries is reached.
1109 */
1110 if (result != -EHOSTUNREACH &&
1111 result != -ENETUNREACH &&
1112 result != -ENETDOWN &&
1113 result != -EINVAL &&
1114 result != -EPROTONOSUPPORT) {
1115 log_print("connect %d try %d error %d", con->nodeid,
1116 con->retries, result);
1117 mutex_unlock(&con->sock_mutex);
1118 msleep(1000);
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001119 lowcomms_connect_sock(con);
1120 return;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001121 }
Mike Christie5d689872013-06-14 04:56:13 -05001122
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001123out:
Mike Christie5d689872013-06-14 04:56:13 -05001124 mutex_unlock(&con->sock_mutex);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001125}
1126
1127/* Connect a new socket to its peer */
1128static void tcp_connect_to_sock(struct connection *con)
1129{
Lon Hohberger6bd8fed2007-10-25 18:51:54 -04001130 struct sockaddr_storage saddr, src_addr;
Alexander Aringe125fbe2021-03-01 17:05:09 -05001131 unsigned int mark;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001132 int addr_len;
Casey Dahlina89d63a2009-07-14 12:17:51 -05001133 struct socket *sock = NULL;
David Teigland36b71a82012-07-26 12:44:30 -05001134 int result;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001135
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001136 mutex_lock(&con->sock_mutex);
1137 if (con->retries++ > MAX_CONNECT_RETRIES)
1138 goto out;
1139
1140 /* Some odd races can cause double-connects, ignore them */
David Teigland36b71a82012-07-26 12:44:30 -05001141 if (con->sock)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001142 goto out;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001143
1144 /* Create a socket to communicate with */
Eric W. Biedermaneeb1bd52015-05-08 21:08:05 -05001145 result = sock_create_kern(&init_net, dlm_local_addr[0]->ss_family,
1146 SOCK_STREAM, IPPROTO_TCP, &sock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001147 if (result < 0)
1148 goto out_err;
1149
1150 memset(&saddr, 0, sizeof(saddr));
Alexander Aringe125fbe2021-03-01 17:05:09 -05001151 result = nodeid_to_addr(con->nodeid, &saddr, NULL, false, &mark);
David Teigland36b71a82012-07-26 12:44:30 -05001152 if (result < 0) {
1153 log_print("no address for nodeid %d", con->nodeid);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001154 goto out_err;
David Teigland36b71a82012-07-26 12:44:30 -05001155 }
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001156
Alexander Aringe125fbe2021-03-01 17:05:09 -05001157 sock_set_mark(sock->sk, mark);
1158
tsutomu.owa@toshiba.co.jp988419a2017-09-12 08:55:32 +00001159 add_sock(sock, con);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001160
Lon Hohberger6bd8fed2007-10-25 18:51:54 -04001161 /* Bind to our cluster-known address connecting to avoid
1162 routing problems */
1163 memcpy(&src_addr, dlm_local_addr[0], sizeof(src_addr));
1164 make_sockaddr(&src_addr, 0, &addr_len);
1165 result = sock->ops->bind(sock, (struct sockaddr *) &src_addr,
1166 addr_len);
1167 if (result < 0) {
1168 log_print("could not bind for connect: %d", result);
1169 /* This *may* not indicate a critical error */
1170 }
1171
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001172 make_sockaddr(&saddr, dlm_config.ci_tcp_port, &addr_len);
1173
1174 log_print("connecting to %d", con->nodeid);
David Teiglandcb2d45d2010-11-12 11:12:55 -06001175
1176 /* Turn off Nagle's algorithm */
Christoph Hellwig12abc5e2020-05-28 07:12:19 +02001177 tcp_sock_set_nodelay(sock->sk);
David Teiglandcb2d45d2010-11-12 11:12:55 -06001178
David Teigland36b71a82012-07-26 12:44:30 -05001179 result = sock->ops->connect(sock, (struct sockaddr *)&saddr, addr_len,
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001180 O_NONBLOCK);
1181 if (result == -EINPROGRESS)
1182 result = 0;
1183 if (result == 0)
1184 goto out;
1185
1186out_err:
1187 if (con->sock) {
1188 sock_release(con->sock);
1189 con->sock = NULL;
Casey Dahlina89d63a2009-07-14 12:17:51 -05001190 } else if (sock) {
1191 sock_release(sock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001192 }
1193 /*
1194 * Some errors are fatal and this list might need adjusting. For other
1195 * errors we try again until the max number of retries is reached.
1196 */
David Teigland36b71a82012-07-26 12:44:30 -05001197 if (result != -EHOSTUNREACH &&
1198 result != -ENETUNREACH &&
1199 result != -ENETDOWN &&
1200 result != -EINVAL &&
1201 result != -EPROTONOSUPPORT) {
1202 log_print("connect %d try %d error %d", con->nodeid,
1203 con->retries, result);
1204 mutex_unlock(&con->sock_mutex);
1205 msleep(1000);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001206 lowcomms_connect_sock(con);
David Teigland36b71a82012-07-26 12:44:30 -05001207 return;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001208 }
1209out:
1210 mutex_unlock(&con->sock_mutex);
1211 return;
1212}
1213
Alexander Aringd11ccd42020-11-02 20:04:25 -05001214/* On error caller must run dlm_close_sock() for the
1215 * listen connection socket.
1216 */
1217static int tcp_create_listen_sock(struct listen_connection *con,
1218 struct sockaddr_storage *saddr)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001219{
1220 struct socket *sock = NULL;
1221 int result = 0;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001222 int addr_len;
1223
1224 if (dlm_local_addr[0]->ss_family == AF_INET)
1225 addr_len = sizeof(struct sockaddr_in);
1226 else
1227 addr_len = sizeof(struct sockaddr_in6);
1228
1229 /* Create a socket to communicate with */
Eric W. Biedermaneeb1bd52015-05-08 21:08:05 -05001230 result = sock_create_kern(&init_net, dlm_local_addr[0]->ss_family,
1231 SOCK_STREAM, IPPROTO_TCP, &sock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001232 if (result < 0) {
David Teigland617e82e2007-04-26 13:46:49 -05001233 log_print("Can't create listening comms socket");
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001234 goto create_out;
1235 }
1236
Alexander Aringa5b7ab62020-06-26 13:26:49 -04001237 sock_set_mark(sock->sk, dlm_config.ci_mark);
1238
David Teiglandcb2d45d2010-11-12 11:12:55 -06001239 /* Turn off Nagle's algorithm */
Christoph Hellwig12abc5e2020-05-28 07:12:19 +02001240 tcp_sock_set_nodelay(sock->sk);
David Teiglandcb2d45d2010-11-12 11:12:55 -06001241
Christoph Hellwigb58f0e82020-05-28 07:12:09 +02001242 sock_set_reuseaddr(sock->sk);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001243
Alexander Aringd11ccd42020-11-02 20:04:25 -05001244 add_listen_sock(sock, con);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001245
1246 /* Bind to our port */
1247 make_sockaddr(saddr, dlm_config.ci_tcp_port, &addr_len);
1248 result = sock->ops->bind(sock, (struct sockaddr *) saddr, addr_len);
1249 if (result < 0) {
David Teigland617e82e2007-04-26 13:46:49 -05001250 log_print("Can't bind to port %d", dlm_config.ci_tcp_port);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001251 goto create_out;
1252 }
Christoph Hellwigce3d9542020-05-28 07:12:15 +02001253 sock_set_keepalive(sock->sk);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001254
1255 result = sock->ops->listen(sock, 5);
1256 if (result < 0) {
David Teigland617e82e2007-04-26 13:46:49 -05001257 log_print("Can't listen on port %d", dlm_config.ci_tcp_port);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001258 goto create_out;
1259 }
1260
Alexander Aringd11ccd42020-11-02 20:04:25 -05001261 return 0;
1262
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001263create_out:
Alexander Aringd11ccd42020-11-02 20:04:25 -05001264 return result;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001265}
1266
1267/* Get local addresses */
1268static void init_local(void)
1269{
1270 struct sockaddr_storage sas, *addr;
1271 int i;
1272
Patrick Caulfield30d3a232007-04-23 16:26:21 +01001273 dlm_local_count = 0;
David Teigland1b189b82012-03-21 09:18:34 -05001274 for (i = 0; i < DLM_MAX_ADDR_COUNT; i++) {
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001275 if (dlm_our_addr(&sas, i))
1276 break;
1277
Amitoj Kaur Chawla5c93f562016-06-23 10:22:01 +05301278 addr = kmemdup(&sas, sizeof(*addr), GFP_NOFS);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001279 if (!addr)
1280 break;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001281 dlm_local_addr[dlm_local_count++] = addr;
1282 }
1283}
1284
Alexander Aring043697f2020-08-27 15:02:50 -04001285static void deinit_local(void)
1286{
1287 int i;
1288
1289 for (i = 0; i < dlm_local_count; i++)
1290 kfree(dlm_local_addr[i]);
1291}
1292
Alexander Aringd11ccd42020-11-02 20:04:25 -05001293/* Initialise SCTP socket and bind to all interfaces
1294 * On error caller must run dlm_close_sock() for the
1295 * listen connection socket.
1296 */
1297static int sctp_listen_for_all(struct listen_connection *con)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001298{
1299 struct socket *sock = NULL;
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001300 int result = -EINVAL;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001301
1302 log_print("Using SCTP for communications");
1303
Eric W. Biedermaneeb1bd52015-05-08 21:08:05 -05001304 result = sock_create_kern(&init_net, dlm_local_addr[0]->ss_family,
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001305 SOCK_STREAM, IPPROTO_SCTP, &sock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001306 if (result < 0) {
1307 log_print("Can't create comms socket, check SCTP is loaded");
1308 goto out;
1309 }
1310
Christoph Hellwig26cfabf2020-05-28 07:12:16 +02001311 sock_set_rcvbuf(sock->sk, NEEDED_RMEM);
Alexander Aringa5b7ab62020-06-26 13:26:49 -04001312 sock_set_mark(sock->sk, dlm_config.ci_mark);
Christoph Hellwig40ef92c2020-05-29 14:09:40 +02001313 sctp_sock_set_nodelay(sock->sk);
Mike Christie86e92ad2013-06-14 04:56:14 -05001314
Alexander Aringd11ccd42020-11-02 20:04:25 -05001315 add_listen_sock(sock, con);
Bob Petersonb81171c2016-02-05 14:39:02 -05001316
Marcelo Ricardo Leitneree44b4b2015-08-11 19:22:23 -03001317 /* Bind to all addresses. */
Alexander Aringd11ccd42020-11-02 20:04:25 -05001318 result = sctp_bind_addrs(con->sock, dlm_config.ci_tcp_port);
1319 if (result < 0)
1320 goto out;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001321
1322 result = sock->ops->listen(sock, 5);
1323 if (result < 0) {
1324 log_print("Can't set socket listening");
Alexander Aringd11ccd42020-11-02 20:04:25 -05001325 goto out;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001326 }
1327
1328 return 0;
1329
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001330out:
1331 return result;
1332}
1333
1334static int tcp_listen_for_all(void)
1335{
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001336 /* We don't support multi-homed hosts */
Alexander Aring1a26bfa2020-11-02 20:04:26 -05001337 if (dlm_local_count > 1) {
David Teigland617e82e2007-04-26 13:46:49 -05001338 log_print("TCP protocol can't handle multi-homed hosts, "
1339 "try SCTP");
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001340 return -EINVAL;
1341 }
1342
1343 log_print("Using TCP for communications");
1344
Alexander Aringd11ccd42020-11-02 20:04:25 -05001345 return tcp_create_listen_sock(&listen_con, dlm_local_addr[0]);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001346}
1347
1348
1349
1350static struct writequeue_entry *new_writequeue_entry(struct connection *con,
1351 gfp_t allocation)
1352{
1353 struct writequeue_entry *entry;
1354
Alexander Aringf0747ebf2021-03-01 17:05:16 -05001355 entry = kzalloc(sizeof(*entry), allocation);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001356 if (!entry)
1357 return NULL;
1358
Alexander Aringe1a7cbc2021-03-01 17:05:15 -05001359 entry->page = alloc_page(allocation | __GFP_ZERO);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001360 if (!entry->page) {
1361 kfree(entry);
1362 return NULL;
1363 }
1364
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001365 entry->con = con;
Alexander Aringf0747ebf2021-03-01 17:05:16 -05001366 entry->users = 1;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001367
1368 return entry;
1369}
1370
Alexander Aringf0747ebf2021-03-01 17:05:16 -05001371static struct writequeue_entry *new_wq_entry(struct connection *con, int len,
1372 gfp_t allocation, char **ppc)
1373{
1374 struct writequeue_entry *e;
1375
1376 spin_lock(&con->writequeue_lock);
1377 if (!list_empty(&con->writequeue)) {
1378 e = list_last_entry(&con->writequeue, struct writequeue_entry, list);
1379 if (DLM_WQ_REMAIN_BYTES(e) >= len) {
1380 *ppc = page_address(e->page) + e->end;
1381 e->end += len;
1382 e->users++;
1383 spin_unlock(&con->writequeue_lock);
1384
1385 return e;
1386 }
1387 }
1388 spin_unlock(&con->writequeue_lock);
1389
1390 e = new_writequeue_entry(con, allocation);
1391 if (!e)
1392 return NULL;
1393
1394 *ppc = page_address(e->page);
1395 e->end += len;
1396
1397 spin_lock(&con->writequeue_lock);
1398 list_add_tail(&e->list, &con->writequeue);
1399 spin_unlock(&con->writequeue_lock);
1400
1401 return e;
1402};
1403
David Teigland617e82e2007-04-26 13:46:49 -05001404void *dlm_lowcomms_get_buffer(int nodeid, int len, gfp_t allocation, char **ppc)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001405{
1406 struct connection *con;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001407
Alexander Aringc45674f2021-03-01 17:05:14 -05001408 if (len > DEFAULT_BUFFER_SIZE ||
1409 len < sizeof(struct dlm_header)) {
1410 BUILD_BUG_ON(PAGE_SIZE < DEFAULT_BUFFER_SIZE);
Alexander Aring692f51c2020-11-02 20:04:18 -05001411 log_print("failed to allocate a buffer of size %d", len);
Alexander Aringc45674f2021-03-01 17:05:14 -05001412 WARN_ON(1);
Alexander Aring692f51c2020-11-02 20:04:18 -05001413 return NULL;
1414 }
1415
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001416 con = nodeid2con(nodeid, allocation);
1417 if (!con)
1418 return NULL;
1419
Alexander Aringf0747ebf2021-03-01 17:05:16 -05001420 return new_wq_entry(con, len, allocation, ppc);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001421}
1422
1423void dlm_lowcomms_commit_buffer(void *mh)
1424{
1425 struct writequeue_entry *e = (struct writequeue_entry *)mh;
1426 struct connection *con = e->con;
1427 int users;
1428
1429 spin_lock(&con->writequeue_lock);
1430 users = --e->users;
1431 if (users)
1432 goto out;
Alexander Aringf0747ebf2021-03-01 17:05:16 -05001433
1434 e->len = DLM_WQ_LENGTH_BYTES(e);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001435 spin_unlock(&con->writequeue_lock);
1436
Bob Peterson01da24d2017-09-12 08:55:14 +00001437 queue_work(send_workqueue, &con->swork);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001438 return;
1439
1440out:
1441 spin_unlock(&con->writequeue_lock);
1442 return;
1443}
1444
1445/* Send a message */
1446static void send_to_sock(struct connection *con)
1447{
1448 int ret = 0;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001449 const int msg_flags = MSG_DONTWAIT | MSG_NOSIGNAL;
1450 struct writequeue_entry *e;
1451 int len, offset;
Bob Petersonf92c8dd2010-11-12 11:15:20 -06001452 int count = 0;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001453
1454 mutex_lock(&con->sock_mutex);
1455 if (con->sock == NULL)
1456 goto out_connect;
1457
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001458 spin_lock(&con->writequeue_lock);
1459 for (;;) {
Alexander Aringf0747ebf2021-03-01 17:05:16 -05001460 if (list_empty(&con->writequeue))
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001461 break;
1462
Alexander Aringf0747ebf2021-03-01 17:05:16 -05001463 e = list_first_entry(&con->writequeue, struct writequeue_entry, list);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001464 len = e->len;
1465 offset = e->offset;
1466 BUG_ON(len == 0 && e->users == 0);
1467 spin_unlock(&con->writequeue_lock);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001468
1469 ret = 0;
1470 if (len) {
Paolo Bonzini1329e3f2009-08-24 13:18:04 -05001471 ret = kernel_sendpage(con->sock, e->page, offset, len,
1472 msg_flags);
Patrick Caulfieldd66f8272007-09-14 08:49:21 +01001473 if (ret == -EAGAIN || ret == 0) {
David Millerb36930d2010-11-10 21:56:39 -08001474 if (ret == -EAGAIN &&
Eric Dumazet9cd3e072015-11-29 20:03:10 -08001475 test_bit(SOCKWQ_ASYNC_NOSPACE, &con->sock->flags) &&
David Millerb36930d2010-11-10 21:56:39 -08001476 !test_and_set_bit(CF_APP_LIMITED, &con->flags)) {
1477 /* Notify TCP that we're limited by the
1478 * application window size.
1479 */
1480 set_bit(SOCK_NOSPACE, &con->sock->flags);
1481 con->sock->sk->sk_write_pending++;
1482 }
Patrick Caulfieldd66f8272007-09-14 08:49:21 +01001483 cond_resched();
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001484 goto out;
Ying Xue9c5bef52012-08-13 14:29:55 +08001485 } else if (ret < 0)
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001486 goto send_error;
Patrick Caulfieldd66f8272007-09-14 08:49:21 +01001487 }
Bob Petersonf92c8dd2010-11-12 11:15:20 -06001488
1489 /* Don't starve people filling buffers */
1490 if (++count >= MAX_SEND_MSG_COUNT) {
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001491 cond_resched();
Bob Petersonf92c8dd2010-11-12 11:15:20 -06001492 count = 0;
1493 }
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001494
1495 spin_lock(&con->writequeue_lock);
Mike Christie5d689872013-06-14 04:56:13 -05001496 writequeue_entry_complete(e, ret);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001497 }
1498 spin_unlock(&con->writequeue_lock);
1499out:
1500 mutex_unlock(&con->sock_mutex);
1501 return;
1502
1503send_error:
1504 mutex_unlock(&con->sock_mutex);
Alexander Aringba3ab3c2020-07-27 09:13:37 -04001505 close_connection(con, false, false, true);
Bob Peterson01da24d2017-09-12 08:55:14 +00001506 /* Requeue the send work. When the work daemon runs again, it will try
1507 a new connection, then call this function again. */
1508 queue_work(send_workqueue, &con->swork);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001509 return;
1510
1511out_connect:
1512 mutex_unlock(&con->sock_mutex);
Bob Peterson01da24d2017-09-12 08:55:14 +00001513 queue_work(send_workqueue, &con->swork);
1514 cond_resched();
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001515}
1516
1517static void clean_one_writequeue(struct connection *con)
1518{
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06001519 struct writequeue_entry *e, *safe;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001520
1521 spin_lock(&con->writequeue_lock);
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06001522 list_for_each_entry_safe(e, safe, &con->writequeue, list) {
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001523 list_del(&e->list);
1524 free_entry(e);
1525 }
1526 spin_unlock(&con->writequeue_lock);
1527}
1528
1529/* Called from recovery when it knows that a node has
1530 left the cluster */
1531int dlm_lowcomms_close(int nodeid)
1532{
1533 struct connection *con;
David Teigland36b71a82012-07-26 12:44:30 -05001534 struct dlm_node_addr *na;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001535
1536 log_print("closing connection to node %d", nodeid);
1537 con = nodeid2con(nodeid, 0);
1538 if (con) {
Lars Marowsky-Bree063c4c92009-08-11 16:18:23 -05001539 set_bit(CF_CLOSE, &con->flags);
Marcelo Ricardo Leitner0d737a82015-08-11 19:22:21 -03001540 close_connection(con, true, true, true);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001541 clean_one_writequeue(con);
Alexander Aring53a5eda2020-11-02 20:04:19 -05001542 if (con->othercon)
1543 clean_one_writequeue(con->othercon);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001544 }
David Teigland36b71a82012-07-26 12:44:30 -05001545
1546 spin_lock(&dlm_node_addrs_spin);
1547 na = find_node_addr(nodeid);
1548 if (na) {
1549 list_del(&na->list);
1550 while (na->addr_count--)
1551 kfree(na->addr[na->addr_count]);
1552 kfree(na);
1553 }
1554 spin_unlock(&dlm_node_addrs_spin);
1555
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001556 return 0;
1557}
1558
1559/* Receive workqueue function */
1560static void process_recv_sockets(struct work_struct *work)
1561{
1562 struct connection *con = container_of(work, struct connection, rwork);
1563 int err;
1564
1565 clear_bit(CF_READ_PENDING, &con->flags);
1566 do {
Alexander Aringd11ccd42020-11-02 20:04:25 -05001567 err = receive_from_sock(con);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001568 } while (!err);
1569}
1570
Alexander Aringd11ccd42020-11-02 20:04:25 -05001571static void process_listen_recv_socket(struct work_struct *work)
1572{
1573 accept_from_sock(&listen_con);
1574}
1575
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001576/* Send workqueue function */
1577static void process_send_sockets(struct work_struct *work)
1578{
1579 struct connection *con = container_of(work, struct connection, swork);
1580
tsutomu.owa@toshiba.co.jp8a4abb02017-09-12 09:01:16 +00001581 clear_bit(CF_WRITE_PENDING, &con->flags);
Bob Peterson61d9102b2017-09-12 08:55:04 +00001582 if (con->sock == NULL) /* not mutex protected so check it inside too */
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001583 con->connect_action(con);
Bob Peterson01da24d2017-09-12 08:55:14 +00001584 if (!list_empty(&con->writequeue))
Lars Marowsky-Bree063c4c92009-08-11 16:18:23 -05001585 send_to_sock(con);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001586}
1587
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001588static void work_stop(void)
1589{
David Windsorb3555162019-04-02 08:37:10 -04001590 if (recv_workqueue)
1591 destroy_workqueue(recv_workqueue);
1592 if (send_workqueue)
1593 destroy_workqueue(send_workqueue);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001594}
1595
1596static int work_start(void)
1597{
David Teiglande43f0552011-03-10 13:22:34 -06001598 recv_workqueue = alloc_workqueue("dlm_recv",
1599 WQ_UNBOUND | WQ_MEM_RECLAIM, 1);
Namhyung Kimb9d41052010-12-13 13:42:24 -06001600 if (!recv_workqueue) {
1601 log_print("can't start dlm_recv");
1602 return -ENOMEM;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001603 }
1604
David Teiglande43f0552011-03-10 13:22:34 -06001605 send_workqueue = alloc_workqueue("dlm_send",
1606 WQ_UNBOUND | WQ_MEM_RECLAIM, 1);
Namhyung Kimb9d41052010-12-13 13:42:24 -06001607 if (!send_workqueue) {
1608 log_print("can't start dlm_send");
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001609 destroy_workqueue(recv_workqueue);
Namhyung Kimb9d41052010-12-13 13:42:24 -06001610 return -ENOMEM;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001611 }
1612
1613 return 0;
1614}
1615
Alexander Aring9d232462021-03-01 17:05:20 -05001616static void shutdown_conn(struct connection *con)
1617{
1618 if (con->shutdown_action)
1619 con->shutdown_action(con);
1620}
1621
1622void dlm_lowcomms_shutdown(void)
1623{
1624 /* Set all the flags to prevent any
1625 * socket activity.
1626 */
1627 dlm_allow_conn = 0;
1628
1629 if (recv_workqueue)
1630 flush_workqueue(recv_workqueue);
1631 if (send_workqueue)
1632 flush_workqueue(send_workqueue);
1633
1634 dlm_close_sock(&listen_con.sock);
1635
1636 foreach_conn(shutdown_conn);
1637}
1638
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001639static void _stop_conn(struct connection *con, bool and_other)
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06001640{
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001641 mutex_lock(&con->sock_mutex);
tsutomu.owa@toshiba.co.jp173a31f2017-09-12 09:01:24 +00001642 set_bit(CF_CLOSE, &con->flags);
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001643 set_bit(CF_READ_PENDING, &con->flags);
tsutomu.owa@toshiba.co.jp8a4abb02017-09-12 09:01:16 +00001644 set_bit(CF_WRITE_PENDING, &con->flags);
tsutomu.owa@toshiba.co.jp93eaade2017-09-12 09:01:55 +00001645 if (con->sock && con->sock->sk) {
1646 write_lock_bh(&con->sock->sk->sk_callback_lock);
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06001647 con->sock->sk->sk_user_data = NULL;
tsutomu.owa@toshiba.co.jp93eaade2017-09-12 09:01:55 +00001648 write_unlock_bh(&con->sock->sk->sk_callback_lock);
1649 }
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001650 if (con->othercon && and_other)
1651 _stop_conn(con->othercon, false);
1652 mutex_unlock(&con->sock_mutex);
1653}
1654
1655static void stop_conn(struct connection *con)
1656{
1657 _stop_conn(con, true);
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06001658}
1659
Alexander Aring4798cbb2020-09-24 10:31:26 -04001660static void connection_release(struct rcu_head *rcu)
1661{
1662 struct connection *con = container_of(rcu, struct connection, rcu);
1663
1664 kfree(con->rx_buf);
1665 kfree(con);
1666}
1667
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06001668static void free_conn(struct connection *con)
1669{
Marcelo Ricardo Leitner0d737a82015-08-11 19:22:21 -03001670 close_connection(con, true, true, true);
Alexander Aringa47666eb2020-08-27 15:02:49 -04001671 spin_lock(&connections_lock);
1672 hlist_del_rcu(&con->list);
1673 spin_unlock(&connections_lock);
Alexander Aring948c47e2020-08-27 15:02:53 -04001674 if (con->othercon) {
1675 clean_one_writequeue(con->othercon);
Alexander Aring5cbec202020-11-02 20:04:16 -05001676 call_srcu(&connections_srcu, &con->othercon->rcu,
1677 connection_release);
Alexander Aring948c47e2020-08-27 15:02:53 -04001678 }
Alexander Aring0de98432020-08-27 15:02:52 -04001679 clean_one_writequeue(con);
Alexander Aring5cbec202020-11-02 20:04:16 -05001680 call_srcu(&connections_srcu, &con->rcu, connection_release);
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06001681}
1682
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001683static void work_flush(void)
1684{
Alexander Aringa47666eb2020-08-27 15:02:49 -04001685 int ok, idx;
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001686 int i;
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001687 struct connection *con;
1688
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001689 do {
1690 ok = 1;
1691 foreach_conn(stop_conn);
David Windsorb3555162019-04-02 08:37:10 -04001692 if (recv_workqueue)
1693 flush_workqueue(recv_workqueue);
1694 if (send_workqueue)
1695 flush_workqueue(send_workqueue);
Alexander Aringa47666eb2020-08-27 15:02:49 -04001696 idx = srcu_read_lock(&connections_srcu);
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001697 for (i = 0; i < CONN_HASH_SIZE && ok; i++) {
Alexander Aringa47666eb2020-08-27 15:02:49 -04001698 hlist_for_each_entry_rcu(con, &connection_hash[i],
1699 list) {
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001700 ok &= test_bit(CF_READ_PENDING, &con->flags);
tsutomu.owa@toshiba.co.jp8a4abb02017-09-12 09:01:16 +00001701 ok &= test_bit(CF_WRITE_PENDING, &con->flags);
1702 if (con->othercon) {
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001703 ok &= test_bit(CF_READ_PENDING,
1704 &con->othercon->flags);
tsutomu.owa@toshiba.co.jp8a4abb02017-09-12 09:01:16 +00001705 ok &= test_bit(CF_WRITE_PENDING,
1706 &con->othercon->flags);
1707 }
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001708 }
1709 }
Alexander Aringa47666eb2020-08-27 15:02:49 -04001710 srcu_read_unlock(&connections_srcu, idx);
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001711 } while (!ok);
1712}
1713
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001714void dlm_lowcomms_stop(void)
1715{
tsutomu.owa@toshiba.co.jpf0fb83c2017-09-12 08:55:40 +00001716 work_flush();
Marcelo Ricardo Leitner3a8db792016-10-08 10:14:37 -03001717 foreach_conn(free_conn);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001718 work_stop();
Alexander Aring043697f2020-08-27 15:02:50 -04001719 deinit_local();
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001720}
1721
1722int dlm_lowcomms_start(void)
1723{
1724 int error = -EINVAL;
Christine Caulfield5e9ccc32009-01-28 12:57:40 -06001725 int i;
1726
1727 for (i = 0; i < CONN_HASH_SIZE; i++)
1728 INIT_HLIST_HEAD(&connection_hash[i]);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001729
1730 init_local();
1731 if (!dlm_local_count) {
David Teigland617e82e2007-04-26 13:46:49 -05001732 error = -ENOTCONN;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001733 log_print("no local IP address has been set");
David Teigland513ef592012-03-30 11:46:08 -05001734 goto fail;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001735 }
1736
Alexander Aringd11ccd42020-11-02 20:04:25 -05001737 INIT_WORK(&listen_con.rwork, process_listen_recv_socket);
1738
David Teigland513ef592012-03-30 11:46:08 -05001739 error = work_start();
1740 if (error)
Alexander Aringa47666eb2020-08-27 15:02:49 -04001741 goto fail;
David Teigland513ef592012-03-30 11:46:08 -05001742
1743 dlm_allow_conn = 1;
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001744
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001745 /* Start listening */
1746 if (dlm_config.ci_protocol == 0)
1747 error = tcp_listen_for_all();
1748 else
Alexander Aringd11ccd42020-11-02 20:04:25 -05001749 error = sctp_listen_for_all(&listen_con);
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001750 if (error)
1751 goto fail_unlisten;
1752
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001753 return 0;
1754
1755fail_unlisten:
David Teigland513ef592012-03-30 11:46:08 -05001756 dlm_allow_conn = 0;
Alexander Aringd11ccd42020-11-02 20:04:25 -05001757 dlm_close_sock(&listen_con.sock);
David Teigland513ef592012-03-30 11:46:08 -05001758fail:
Patrick Caulfield6ed7257b2007-04-17 15:39:57 +01001759 return error;
1760}
David Teigland36b71a82012-07-26 12:44:30 -05001761
1762void dlm_lowcomms_exit(void)
1763{
1764 struct dlm_node_addr *na, *safe;
1765
1766 spin_lock(&dlm_node_addrs_spin);
1767 list_for_each_entry_safe(na, safe, &dlm_node_addrs, list) {
1768 list_del(&na->list);
1769 while (na->addr_count--)
1770 kfree(na->addr[na->addr_count]);
1771 kfree(na);
1772 }
1773 spin_unlock(&dlm_node_addrs_spin);
1774}