blob: e64f9e4c3cdaf6c0f7c566421241b659c0603a69 [file] [log] [blame]
Andy Grover00e0f342009-02-24 15:30:23 +00001/*
Ka-Cheong Pooneee2fa62018-07-23 20:51:21 -07002 * Copyright (c) 2006, 2018 Oracle and/or its affiliates. All rights reserved.
Andy Grover00e0f342009-02-24 15:30:23 +00003 *
4 * This software is available to you under a choice of one of two
5 * licenses. You may choose to be licensed under the terms of the GNU
6 * General Public License (GPL) Version 2, available from the file
7 * COPYING in the main directory of this source tree, or the
8 * OpenIB.org BSD license below:
9 *
10 * Redistribution and use in source and binary forms, with or
11 * without modification, are permitted provided that the following
12 * conditions are met:
13 *
14 * - Redistributions of source code must retain the above
15 * copyright notice, this list of conditions and the following
16 * disclaimer.
17 *
18 * - Redistributions in binary form must reproduce the above
19 * copyright notice, this list of conditions and the following
20 * disclaimer in the documentation and/or other materials
21 * provided with the distribution.
22 *
23 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
24 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
25 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
26 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
27 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
28 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
29 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
30 * SOFTWARE.
31 *
32 */
33#include <linux/kernel.h>
34#include <linux/random.h>
Paul Gortmakerbc3b2d72011-07-15 11:47:34 -040035#include <linux/export.h>
Andy Grover00e0f342009-02-24 15:30:23 +000036
37#include "rds.h"
38
39/*
40 * All of connection management is simplified by serializing it through
41 * work queues that execute in a connection managing thread.
42 *
43 * TCP wants to send acks through sendpage() in response to data_ready(),
44 * but it needs a process context to do so.
45 *
46 * The receive paths need to allocate but can't drop packets (!) so we have
47 * a thread around to block allocating if the receive fast path sees an
48 * allocation failure.
49 */
50
51/* Grand Unified Theory of connection life cycle:
52 * At any point in time, the connection can be in one of these states:
53 * DOWN, CONNECTING, UP, DISCONNECTING, ERROR
54 *
55 * The following transitions are possible:
56 * ANY -> ERROR
57 * UP -> DISCONNECTING
58 * ERROR -> DISCONNECTING
59 * DISCONNECTING -> DOWN
60 * DOWN -> CONNECTING
61 * CONNECTING -> UP
62 *
63 * Transition to state DISCONNECTING/DOWN:
64 * - Inside the shutdown worker; synchronizes with xmit path
Zach Brown0f4b1c72010-06-04 14:41:41 -070065 * through RDS_IN_XMIT, and with connection management callbacks
Andy Grover00e0f342009-02-24 15:30:23 +000066 * via c_cm_lock.
67 *
68 * For receive callbacks, we rely on the underlying transport
69 * (TCP, IB/RDMA) to provide the necessary synchronisation.
70 */
71struct workqueue_struct *rds_wq;
Andy Grover616b7572009-08-21 12:28:32 +000072EXPORT_SYMBOL_GPL(rds_wq);
Andy Grover00e0f342009-02-24 15:30:23 +000073
Sowmini Varadhan0cb43962016-06-13 09:44:26 -070074void rds_connect_path_complete(struct rds_conn_path *cp, int curr)
Andy Grover00e0f342009-02-24 15:30:23 +000075{
Sowmini Varadhan0cb43962016-06-13 09:44:26 -070076 if (!rds_conn_path_transition(cp, curr, RDS_CONN_UP)) {
Andy Grover00e0f342009-02-24 15:30:23 +000077 printk(KERN_WARNING "%s: Cannot transition to state UP, "
78 "current state is %d\n",
79 __func__,
Sowmini Varadhan0cb43962016-06-13 09:44:26 -070080 atomic_read(&cp->cp_state));
Sowmini Varadhanaed20a52017-07-16 16:43:46 -070081 rds_conn_path_drop(cp, false);
Andy Grover00e0f342009-02-24 15:30:23 +000082 return;
83 }
84
Ka-Cheong Pooneee2fa62018-07-23 20:51:21 -070085 rdsdebug("conn %p for %pI6c to %pI6c complete\n",
86 cp->cp_conn, &cp->cp_conn->c_laddr, &cp->cp_conn->c_faddr);
Andy Grover00e0f342009-02-24 15:30:23 +000087
Sowmini Varadhan0cb43962016-06-13 09:44:26 -070088 cp->cp_reconnect_jiffies = 0;
89 set_bit(0, &cp->cp_conn->c_map_queued);
Sowmini Varadhan3db6e0d2018-01-04 06:53:00 -080090 rcu_read_lock();
Sowmini Varadhanebeeb1a2018-02-03 04:26:51 -080091 if (!rds_destroy_pending(cp->cp_conn)) {
Sowmini Varadhan3db6e0d2018-01-04 06:53:00 -080092 queue_delayed_work(rds_wq, &cp->cp_send_w, 0);
93 queue_delayed_work(rds_wq, &cp->cp_recv_w, 0);
94 }
95 rcu_read_unlock();
Andy Grover00e0f342009-02-24 15:30:23 +000096}
Sowmini Varadhan9c794402016-06-04 14:00:00 -070097EXPORT_SYMBOL_GPL(rds_connect_path_complete);
98
99void rds_connect_complete(struct rds_connection *conn)
100{
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700101 rds_connect_path_complete(&conn->c_path[0], RDS_CONN_CONNECTING);
Sowmini Varadhan9c794402016-06-04 14:00:00 -0700102}
Andy Grover616b7572009-08-21 12:28:32 +0000103EXPORT_SYMBOL_GPL(rds_connect_complete);
Andy Grover00e0f342009-02-24 15:30:23 +0000104
105/*
106 * This random exponential backoff is relied on to eventually resolve racing
107 * connects.
108 *
109 * If connect attempts race then both parties drop both connections and come
110 * here to wait for a random amount of time before trying again. Eventually
111 * the backoff range will be so much greater than the time it takes to
112 * establish a connection that one of the pair will establish the connection
113 * before the other's random delay fires.
114 *
115 * Connection attempts that arrive while a connection is already established
116 * are also considered to be racing connects. This lets a connection from
117 * a rebooted machine replace an existing stale connection before the transport
118 * notices that the connection has failed.
119 *
120 * We should *always* start with a random backoff; otherwise a broken connection
121 * will always take several iterations to be re-established.
122 */
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700123void rds_queue_reconnect(struct rds_conn_path *cp)
Andy Grover00e0f342009-02-24 15:30:23 +0000124{
125 unsigned long rand;
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700126 struct rds_connection *conn = cp->cp_conn;
Andy Grover00e0f342009-02-24 15:30:23 +0000127
Ka-Cheong Pooneee2fa62018-07-23 20:51:21 -0700128 rdsdebug("conn %p for %pI6c to %pI6c reconnect jiffies %lu\n",
129 conn, &conn->c_laddr, &conn->c_faddr,
130 cp->cp_reconnect_jiffies);
Andy Grover00e0f342009-02-24 15:30:23 +0000131
Sowmini Varadhan83150112016-06-30 16:11:17 -0700132 /* let peer with smaller addr initiate reconnect, to avoid duels */
133 if (conn->c_trans->t_type == RDS_TRANS_TCP &&
Ka-Cheong Pooneee2fa62018-07-23 20:51:21 -0700134 rds_addr_cmp(&conn->c_laddr, &conn->c_faddr) >= 0)
Sowmini Varadhan83150112016-06-30 16:11:17 -0700135 return;
136
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700137 set_bit(RDS_RECONNECT_PENDING, &cp->cp_flags);
138 if (cp->cp_reconnect_jiffies == 0) {
139 cp->cp_reconnect_jiffies = rds_sysctl_reconnect_min_jiffies;
Sowmini Varadhan3db6e0d2018-01-04 06:53:00 -0800140 rcu_read_lock();
Sowmini Varadhanebeeb1a2018-02-03 04:26:51 -0800141 if (!rds_destroy_pending(cp->cp_conn))
Sowmini Varadhan3db6e0d2018-01-04 06:53:00 -0800142 queue_delayed_work(rds_wq, &cp->cp_conn_w, 0);
143 rcu_read_unlock();
Andy Grover00e0f342009-02-24 15:30:23 +0000144 return;
145 }
146
147 get_random_bytes(&rand, sizeof(rand));
Ka-Cheong Pooneee2fa62018-07-23 20:51:21 -0700148 rdsdebug("%lu delay %lu ceil conn %p for %pI6c -> %pI6c\n",
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700149 rand % cp->cp_reconnect_jiffies, cp->cp_reconnect_jiffies,
Andy Grover00e0f342009-02-24 15:30:23 +0000150 conn, &conn->c_laddr, &conn->c_faddr);
Sowmini Varadhan3db6e0d2018-01-04 06:53:00 -0800151 rcu_read_lock();
Sowmini Varadhanebeeb1a2018-02-03 04:26:51 -0800152 if (!rds_destroy_pending(cp->cp_conn))
Sowmini Varadhan3db6e0d2018-01-04 06:53:00 -0800153 queue_delayed_work(rds_wq, &cp->cp_conn_w,
154 rand % cp->cp_reconnect_jiffies);
155 rcu_read_unlock();
Andy Grover00e0f342009-02-24 15:30:23 +0000156
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700157 cp->cp_reconnect_jiffies = min(cp->cp_reconnect_jiffies * 2,
Andy Grover00e0f342009-02-24 15:30:23 +0000158 rds_sysctl_reconnect_max_jiffies);
159}
160
161void rds_connect_worker(struct work_struct *work)
162{
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700163 struct rds_conn_path *cp = container_of(work,
164 struct rds_conn_path,
165 cp_conn_w.work);
166 struct rds_connection *conn = cp->cp_conn;
Andy Grover00e0f342009-02-24 15:30:23 +0000167 int ret;
168
Sowmini Varadhan00354de2017-06-15 11:28:54 -0700169 if (cp->cp_index > 0 &&
Ka-Cheong Pooneee2fa62018-07-23 20:51:21 -0700170 rds_addr_cmp(&cp->cp_conn->c_laddr, &cp->cp_conn->c_faddr) >= 0)
Sowmini Varadhan5916e2c2016-07-14 03:51:03 -0700171 return;
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700172 clear_bit(RDS_RECONNECT_PENDING, &cp->cp_flags);
Sowmini Varadhanb04e8552016-06-30 16:11:16 -0700173 ret = rds_conn_path_transition(cp, RDS_CONN_DOWN, RDS_CONN_CONNECTING);
174 if (ret) {
175 ret = conn->c_trans->conn_path_connect(cp);
Ka-Cheong Pooneee2fa62018-07-23 20:51:21 -0700176 rdsdebug("conn %p for %pI6c to %pI6c dispatched, ret %d\n",
177 conn, &conn->c_laddr, &conn->c_faddr, ret);
Andy Grover00e0f342009-02-24 15:30:23 +0000178
179 if (ret) {
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700180 if (rds_conn_path_transition(cp,
181 RDS_CONN_CONNECTING,
182 RDS_CONN_DOWN))
183 rds_queue_reconnect(cp);
Andy Grover00e0f342009-02-24 15:30:23 +0000184 else
Joe Perches9c7cbcf2016-10-15 11:53:22 -0700185 rds_conn_path_error(cp, "connect failed\n");
Andy Grover00e0f342009-02-24 15:30:23 +0000186 }
187 }
188}
189
Andy Grover00e0f342009-02-24 15:30:23 +0000190void rds_send_worker(struct work_struct *work)
191{
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700192 struct rds_conn_path *cp = container_of(work,
193 struct rds_conn_path,
194 cp_send_w.work);
Andy Grover00e0f342009-02-24 15:30:23 +0000195 int ret;
196
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700197 if (rds_conn_path_state(cp) == RDS_CONN_UP) {
198 clear_bit(RDS_LL_SEND_FULL, &cp->cp_flags);
Sowmini Varadhan1f9ecd72016-06-13 09:44:34 -0700199 ret = rds_send_xmit(cp);
Santosh Shilimkardb6526d2015-09-11 15:44:29 -0700200 cond_resched();
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700201 rdsdebug("conn %p ret %d\n", cp->cp_conn, ret);
Andy Grover00e0f342009-02-24 15:30:23 +0000202 switch (ret) {
203 case -EAGAIN:
204 rds_stats_inc(s_send_immediate_retry);
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700205 queue_delayed_work(rds_wq, &cp->cp_send_w, 0);
Andy Grover00e0f342009-02-24 15:30:23 +0000206 break;
207 case -ENOMEM:
208 rds_stats_inc(s_send_delayed_retry);
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700209 queue_delayed_work(rds_wq, &cp->cp_send_w, 2);
Andy Grover00e0f342009-02-24 15:30:23 +0000210 default:
211 break;
212 }
213 }
214}
215
216void rds_recv_worker(struct work_struct *work)
217{
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700218 struct rds_conn_path *cp = container_of(work,
219 struct rds_conn_path,
220 cp_recv_w.work);
Andy Grover00e0f342009-02-24 15:30:23 +0000221 int ret;
222
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700223 if (rds_conn_path_state(cp) == RDS_CONN_UP) {
Sowmini Varadhan2da43c42016-06-30 16:11:15 -0700224 ret = cp->cp_conn->c_trans->recv_path(cp);
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700225 rdsdebug("conn %p ret %d\n", cp->cp_conn, ret);
Andy Grover00e0f342009-02-24 15:30:23 +0000226 switch (ret) {
227 case -EAGAIN:
228 rds_stats_inc(s_recv_immediate_retry);
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700229 queue_delayed_work(rds_wq, &cp->cp_recv_w, 0);
Andy Grover00e0f342009-02-24 15:30:23 +0000230 break;
231 case -ENOMEM:
232 rds_stats_inc(s_recv_delayed_retry);
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700233 queue_delayed_work(rds_wq, &cp->cp_recv_w, 2);
Andy Grover00e0f342009-02-24 15:30:23 +0000234 default:
235 break;
236 }
237 }
238}
239
Andy Grover2dc39352010-06-11 13:49:13 -0700240void rds_shutdown_worker(struct work_struct *work)
241{
Sowmini Varadhan0cb43962016-06-13 09:44:26 -0700242 struct rds_conn_path *cp = container_of(work,
243 struct rds_conn_path,
244 cp_down_w);
Andy Grover2dc39352010-06-11 13:49:13 -0700245
Sowmini Varadhand769ef82016-06-13 09:44:41 -0700246 rds_conn_shutdown(cp);
Andy Grover2dc39352010-06-11 13:49:13 -0700247}
248
Andy Grover00e0f342009-02-24 15:30:23 +0000249void rds_threads_exit(void)
250{
251 destroy_workqueue(rds_wq);
252}
253
Zach Brownef87b7e2010-07-09 12:26:20 -0700254int rds_threads_init(void)
Andy Grover00e0f342009-02-24 15:30:23 +0000255{
Zach Brown80c51be2010-07-06 15:08:48 -0700256 rds_wq = create_singlethread_workqueue("krdsd");
Andy Grover8690bfa2010-01-12 11:56:44 -0800257 if (!rds_wq)
Andy Grover00e0f342009-02-24 15:30:23 +0000258 return -ENOMEM;
259
260 return 0;
261}
Ka-Cheong Pooneee2fa62018-07-23 20:51:21 -0700262
263/* Compare two IPv6 addresses. Return 0 if the two addresses are equal.
264 * Return 1 if the first is greater. Return -1 if the second is greater.
265 */
266int rds_addr_cmp(const struct in6_addr *addr1,
267 const struct in6_addr *addr2)
268{
269#if defined(CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS) && BITS_PER_LONG == 64
270 const __be64 *a1, *a2;
271 u64 x, y;
272
273 a1 = (__be64 *)addr1;
274 a2 = (__be64 *)addr2;
275
276 if (*a1 != *a2) {
277 if (be64_to_cpu(*a1) < be64_to_cpu(*a2))
278 return -1;
279 else
280 return 1;
281 } else {
282 x = be64_to_cpu(*++a1);
283 y = be64_to_cpu(*++a2);
284 if (x < y)
285 return -1;
286 else if (x > y)
287 return 1;
288 else
289 return 0;
290 }
291#else
292 u32 a, b;
293 int i;
294
295 for (i = 0; i < 4; i++) {
296 if (addr1->s6_addr32[i] != addr2->s6_addr32[i]) {
297 a = ntohl(addr1->s6_addr32[i]);
298 b = ntohl(addr2->s6_addr32[i]);
299 if (a < b)
300 return -1;
301 else if (a > b)
302 return 1;
303 }
304 }
305 return 0;
306#endif
307}
308EXPORT_SYMBOL_GPL(rds_addr_cmp);