License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 21:07:57 +07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2017-01-09 22:55:23 +07:00
|
|
|
/*
|
|
|
|
* Shared Memory Communications over RDMA (SMC-R) and RoCE
|
|
|
|
*
|
|
|
|
* Manage send buffer.
|
|
|
|
* Producer:
|
|
|
|
* Copy user space data into send buffer, if send buffer space available.
|
|
|
|
* Consumer:
|
|
|
|
* Trigger RDMA write into RMBE of peer and send CDC, if RMBE space available.
|
|
|
|
*
|
|
|
|
* Copyright IBM Corp. 2016
|
|
|
|
*
|
|
|
|
* Author(s): Ursula Braun <ubraun@linux.vnet.ibm.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/net.h>
|
|
|
|
#include <linux/rcupdate.h>
|
|
|
|
#include <linux/workqueue.h>
|
2017-02-02 14:35:14 +07:00
|
|
|
#include <linux/sched/signal.h>
|
|
|
|
|
2017-01-09 22:55:23 +07:00
|
|
|
#include <net/sock.h>
|
2018-04-26 22:18:22 +07:00
|
|
|
#include <net/tcp.h>
|
2017-01-09 22:55:23 +07:00
|
|
|
|
|
|
|
#include "smc.h"
|
|
|
|
#include "smc_wr.h"
|
|
|
|
#include "smc_cdc.h"
|
|
|
|
#include "smc_tx.h"
|
|
|
|
|
2017-09-21 14:16:33 +07:00
|
|
|
#define SMC_TX_WORK_DELAY HZ
|
2018-04-26 22:18:22 +07:00
|
|
|
#define SMC_TX_CORK_DELAY (HZ >> 2) /* 250 ms */
|
2017-09-21 14:16:33 +07:00
|
|
|
|
2017-01-09 22:55:23 +07:00
|
|
|
/***************************** sndbuf producer *******************************/
|
|
|
|
|
|
|
|
/* callback implementation for sk.sk_write_space()
|
2018-05-23 21:38:11 +07:00
|
|
|
* to wakeup sndbuf producers that blocked with smc_tx_wait().
|
2017-01-09 22:55:23 +07:00
|
|
|
* called under sk_socket lock.
|
|
|
|
*/
|
|
|
|
static void smc_tx_write_space(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct socket *sock = sk->sk_socket;
|
|
|
|
struct smc_sock *smc = smc_sk(sk);
|
|
|
|
struct socket_wq *wq;
|
|
|
|
|
|
|
|
/* similar to sk_stream_write_space */
|
|
|
|
if (atomic_read(&smc->conn.sndbuf_space) && sock) {
|
|
|
|
clear_bit(SOCK_NOSPACE, &sock->flags);
|
|
|
|
rcu_read_lock();
|
|
|
|
wq = rcu_dereference(sk->sk_wq);
|
|
|
|
if (skwq_has_sleeper(wq))
|
|
|
|
wake_up_interruptible_poll(&wq->wait,
|
2018-02-12 05:34:03 +07:00
|
|
|
EPOLLOUT | EPOLLWRNORM |
|
|
|
|
EPOLLWRBAND);
|
2017-01-09 22:55:23 +07:00
|
|
|
if (wq && wq->fasync_list && !(sk->sk_shutdown & SEND_SHUTDOWN))
|
|
|
|
sock_wake_async(wq, SOCK_WAKE_SPACE, POLL_OUT);
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-23 21:38:11 +07:00
|
|
|
/* Wakeup sndbuf producers that blocked with smc_tx_wait().
|
2017-01-09 22:55:23 +07:00
|
|
|
* Cf. tcp_data_snd_check()=>tcp_check_space()=>tcp_new_space().
|
|
|
|
*/
|
|
|
|
void smc_tx_sndbuf_nonfull(struct smc_sock *smc)
|
|
|
|
{
|
|
|
|
if (smc->sk.sk_socket &&
|
|
|
|
test_bit(SOCK_NOSPACE, &smc->sk.sk_socket->flags))
|
|
|
|
smc->sk.sk_write_space(&smc->sk);
|
|
|
|
}
|
|
|
|
|
2018-05-23 21:38:11 +07:00
|
|
|
/* blocks sndbuf producer until at least one byte of free space available
|
|
|
|
* or urgent Byte was consumed
|
|
|
|
*/
|
|
|
|
static int smc_tx_wait(struct smc_sock *smc, int flags)
|
2017-01-09 22:55:23 +07:00
|
|
|
{
|
|
|
|
DEFINE_WAIT_FUNC(wait, woken_wake_function);
|
|
|
|
struct smc_connection *conn = &smc->conn;
|
|
|
|
struct sock *sk = &smc->sk;
|
|
|
|
bool noblock;
|
|
|
|
long timeo;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
/* similar to sk_stream_wait_memory */
|
|
|
|
timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
|
|
|
|
noblock = timeo ? false : true;
|
|
|
|
add_wait_queue(sk_sleep(sk), &wait);
|
|
|
|
while (1) {
|
|
|
|
sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
|
|
|
|
if (sk->sk_err ||
|
|
|
|
(sk->sk_shutdown & SEND_SHUTDOWN) ||
|
|
|
|
conn->local_tx_ctrl.conn_state_flags.peer_done_writing) {
|
|
|
|
rc = -EPIPE;
|
|
|
|
break;
|
|
|
|
}
|
2018-01-24 16:28:17 +07:00
|
|
|
if (smc_cdc_rxed_any_close(conn)) {
|
2017-01-09 22:55:23 +07:00
|
|
|
rc = -ECONNRESET;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!timeo) {
|
|
|
|
if (noblock)
|
|
|
|
set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
|
|
|
|
rc = -EAGAIN;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (signal_pending(current)) {
|
|
|
|
rc = sock_intr_errno(timeo);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
sk_clear_bit(SOCKWQ_ASYNC_NOSPACE, sk);
|
2018-05-23 21:38:11 +07:00
|
|
|
if (atomic_read(&conn->sndbuf_space) && !conn->urg_tx_pend)
|
|
|
|
break; /* at least 1 byte of free & no urgent data */
|
2017-01-09 22:55:23 +07:00
|
|
|
set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
|
|
|
|
sk_wait_event(sk, &timeo,
|
|
|
|
sk->sk_err ||
|
|
|
|
(sk->sk_shutdown & SEND_SHUTDOWN) ||
|
2018-01-24 16:28:17 +07:00
|
|
|
smc_cdc_rxed_any_close(conn) ||
|
2018-05-23 21:38:11 +07:00
|
|
|
(atomic_read(&conn->sndbuf_space) &&
|
|
|
|
!conn->urg_tx_pend),
|
2017-01-09 22:55:23 +07:00
|
|
|
&wait);
|
|
|
|
}
|
|
|
|
remove_wait_queue(sk_sleep(sk), &wait);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2018-04-26 22:18:22 +07:00
|
|
|
static bool smc_tx_is_corked(struct smc_sock *smc)
|
|
|
|
{
|
|
|
|
struct tcp_sock *tp = tcp_sk(smc->clcsock->sk);
|
|
|
|
|
|
|
|
return (tp->nonagle & TCP_NAGLE_CORK) ? true : false;
|
|
|
|
}
|
|
|
|
|
2017-01-09 22:55:23 +07:00
|
|
|
/* sndbuf producer: main API called by socket layer.
|
|
|
|
* called under sock lock.
|
|
|
|
*/
|
|
|
|
int smc_tx_sendmsg(struct smc_sock *smc, struct msghdr *msg, size_t len)
|
|
|
|
{
|
|
|
|
size_t copylen, send_done = 0, send_remaining = len;
|
|
|
|
size_t chunk_len, chunk_off, chunk_len_sum;
|
|
|
|
struct smc_connection *conn = &smc->conn;
|
|
|
|
union smc_host_cursor prep;
|
|
|
|
struct sock *sk = &smc->sk;
|
|
|
|
char *sndbuf_base;
|
|
|
|
int tx_cnt_prep;
|
|
|
|
int writespace;
|
|
|
|
int rc, chunk;
|
|
|
|
|
|
|
|
/* This should be in poll */
|
|
|
|
sk_clear_bit(SOCKWQ_ASYNC_NOSPACE, sk);
|
|
|
|
|
|
|
|
if (sk->sk_err || (sk->sk_shutdown & SEND_SHUTDOWN)) {
|
|
|
|
rc = -EPIPE;
|
|
|
|
goto out_err;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (msg_data_left(msg)) {
|
|
|
|
if (sk->sk_state == SMC_INIT)
|
|
|
|
return -ENOTCONN;
|
|
|
|
if (smc->sk.sk_shutdown & SEND_SHUTDOWN ||
|
2017-01-09 22:55:25 +07:00
|
|
|
(smc->sk.sk_err == ECONNABORTED) ||
|
2017-01-09 22:55:23 +07:00
|
|
|
conn->local_tx_ctrl.conn_state_flags.peer_conn_abort)
|
|
|
|
return -EPIPE;
|
|
|
|
if (smc_cdc_rxed_any_close(conn))
|
|
|
|
return send_done ?: -ECONNRESET;
|
|
|
|
|
2018-05-23 21:38:11 +07:00
|
|
|
if (msg->msg_flags & MSG_OOB)
|
|
|
|
conn->local_tx_ctrl.prod_flags.urg_data_pending = 1;
|
|
|
|
|
|
|
|
if (!atomic_read(&conn->sndbuf_space) || conn->urg_tx_pend) {
|
|
|
|
rc = smc_tx_wait(smc, msg->msg_flags);
|
2017-01-09 22:55:23 +07:00
|
|
|
if (rc) {
|
|
|
|
if (send_done)
|
|
|
|
return send_done;
|
|
|
|
goto out_err;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* initialize variables for 1st iteration of subsequent loop */
|
2018-05-23 21:38:11 +07:00
|
|
|
/* could be just 1 byte, even after smc_tx_wait above */
|
2017-01-09 22:55:23 +07:00
|
|
|
writespace = atomic_read(&conn->sndbuf_space);
|
|
|
|
/* not more than what user space asked for */
|
|
|
|
copylen = min_t(size_t, send_remaining, writespace);
|
|
|
|
/* determine start of sndbuf */
|
|
|
|
sndbuf_base = conn->sndbuf_desc->cpu_addr;
|
|
|
|
smc_curs_write(&prep,
|
|
|
|
smc_curs_read(&conn->tx_curs_prep, conn),
|
|
|
|
conn);
|
|
|
|
tx_cnt_prep = prep.count;
|
|
|
|
/* determine chunks where to write into sndbuf */
|
|
|
|
/* either unwrapped case, or 1st chunk of wrapped case */
|
2018-05-18 14:34:10 +07:00
|
|
|
chunk_len = min_t(size_t, copylen, conn->sndbuf_desc->len -
|
|
|
|
tx_cnt_prep);
|
2017-01-09 22:55:23 +07:00
|
|
|
chunk_len_sum = chunk_len;
|
|
|
|
chunk_off = tx_cnt_prep;
|
2017-07-28 18:56:22 +07:00
|
|
|
smc_sndbuf_sync_sg_for_cpu(conn);
|
2017-01-09 22:55:23 +07:00
|
|
|
for (chunk = 0; chunk < 2; chunk++) {
|
|
|
|
rc = memcpy_from_msg(sndbuf_base + chunk_off,
|
|
|
|
msg, chunk_len);
|
|
|
|
if (rc) {
|
2017-07-28 18:56:22 +07:00
|
|
|
smc_sndbuf_sync_sg_for_device(conn);
|
2017-01-09 22:55:23 +07:00
|
|
|
if (send_done)
|
|
|
|
return send_done;
|
|
|
|
goto out_err;
|
|
|
|
}
|
|
|
|
send_done += chunk_len;
|
|
|
|
send_remaining -= chunk_len;
|
|
|
|
|
|
|
|
if (chunk_len_sum == copylen)
|
|
|
|
break; /* either on 1st or 2nd iteration */
|
|
|
|
/* prepare next (== 2nd) iteration */
|
|
|
|
chunk_len = copylen - chunk_len; /* remainder */
|
|
|
|
chunk_len_sum += chunk_len;
|
|
|
|
chunk_off = 0; /* modulo offset in send ring buffer */
|
|
|
|
}
|
2017-07-28 18:56:22 +07:00
|
|
|
smc_sndbuf_sync_sg_for_device(conn);
|
2017-01-09 22:55:23 +07:00
|
|
|
/* update cursors */
|
2018-05-18 14:34:10 +07:00
|
|
|
smc_curs_add(conn->sndbuf_desc->len, &prep, copylen);
|
2017-01-09 22:55:23 +07:00
|
|
|
smc_curs_write(&conn->tx_curs_prep,
|
|
|
|
smc_curs_read(&prep, conn),
|
|
|
|
conn);
|
|
|
|
/* increased in send tasklet smc_cdc_tx_handler() */
|
|
|
|
smp_mb__before_atomic();
|
|
|
|
atomic_sub(copylen, &conn->sndbuf_space);
|
2018-05-18 14:34:10 +07:00
|
|
|
/* guarantee 0 <= sndbuf_space <= sndbuf_desc->len */
|
2017-01-09 22:55:23 +07:00
|
|
|
smp_mb__after_atomic();
|
|
|
|
/* since we just produced more new data into sndbuf,
|
|
|
|
* trigger sndbuf consumer: RDMA write into peer RMBE and CDC
|
|
|
|
*/
|
2018-05-23 21:38:11 +07:00
|
|
|
if ((msg->msg_flags & MSG_OOB) && !send_remaining)
|
|
|
|
conn->urg_tx_pend = true;
|
2018-04-26 22:18:22 +07:00
|
|
|
if ((msg->msg_flags & MSG_MORE || smc_tx_is_corked(smc)) &&
|
|
|
|
(atomic_read(&conn->sndbuf_space) >
|
2018-05-18 14:34:10 +07:00
|
|
|
(conn->sndbuf_desc->len >> 1)))
|
2018-04-26 22:18:22 +07:00
|
|
|
/* for a corked socket defer the RDMA writes if there
|
|
|
|
* is still sufficient sndbuf_space available
|
|
|
|
*/
|
|
|
|
schedule_delayed_work(&conn->tx_work,
|
|
|
|
SMC_TX_CORK_DELAY);
|
|
|
|
else
|
|
|
|
smc_tx_sndbuf_nonempty(conn);
|
2017-01-09 22:55:23 +07:00
|
|
|
} /* while (msg_data_left(msg)) */
|
|
|
|
|
|
|
|
return send_done;
|
|
|
|
|
|
|
|
out_err:
|
|
|
|
rc = sk_stream_error(sk, msg->msg_flags, rc);
|
|
|
|
/* make sure we wake any epoll edge trigger waiter */
|
|
|
|
if (unlikely(rc == -EAGAIN))
|
|
|
|
sk->sk_write_space(sk);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/***************************** sndbuf consumer *******************************/
|
|
|
|
|
|
|
|
/* sndbuf consumer: actual data transfer of one target chunk with RDMA write */
|
|
|
|
static int smc_tx_rdma_write(struct smc_connection *conn, int peer_rmbe_offset,
|
|
|
|
int num_sges, struct ib_sge sges[])
|
|
|
|
{
|
|
|
|
struct smc_link_group *lgr = conn->lgr;
|
|
|
|
struct ib_send_wr *failed_wr = NULL;
|
|
|
|
struct ib_rdma_wr rdma_wr;
|
|
|
|
struct smc_link *link;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
memset(&rdma_wr, 0, sizeof(rdma_wr));
|
|
|
|
link = &lgr->lnk[SMC_SINGLE_LINK];
|
|
|
|
rdma_wr.wr.wr_id = smc_wr_tx_get_next_wr_id(link);
|
|
|
|
rdma_wr.wr.sg_list = sges;
|
|
|
|
rdma_wr.wr.num_sge = num_sges;
|
|
|
|
rdma_wr.wr.opcode = IB_WR_RDMA_WRITE;
|
|
|
|
rdma_wr.remote_addr =
|
|
|
|
lgr->rtokens[conn->rtoken_idx][SMC_SINGLE_LINK].dma_addr +
|
|
|
|
/* RMBE within RMB */
|
2018-05-18 14:34:13 +07:00
|
|
|
conn->tx_off +
|
2017-01-09 22:55:23 +07:00
|
|
|
/* offset within RMBE */
|
|
|
|
peer_rmbe_offset;
|
|
|
|
rdma_wr.rkey = lgr->rtokens[conn->rtoken_idx][SMC_SINGLE_LINK].rkey;
|
|
|
|
rc = ib_post_send(link->roce_qp, &rdma_wr.wr, &failed_wr);
|
2018-01-25 17:15:33 +07:00
|
|
|
if (rc) {
|
2017-01-09 22:55:23 +07:00
|
|
|
conn->local_tx_ctrl.conn_state_flags.peer_conn_abort = 1;
|
2018-01-25 17:15:33 +07:00
|
|
|
smc_lgr_terminate(lgr);
|
|
|
|
}
|
2017-01-09 22:55:23 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* sndbuf consumer */
|
|
|
|
static inline void smc_tx_advance_cursors(struct smc_connection *conn,
|
|
|
|
union smc_host_cursor *prod,
|
|
|
|
union smc_host_cursor *sent,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
smc_curs_add(conn->peer_rmbe_size, prod, len);
|
|
|
|
/* increased in recv tasklet smc_cdc_msg_rcv() */
|
|
|
|
smp_mb__before_atomic();
|
|
|
|
/* data in flight reduces usable snd_wnd */
|
|
|
|
atomic_sub(len, &conn->peer_rmbe_space);
|
|
|
|
/* guarantee 0 <= peer_rmbe_space <= peer_rmbe_size */
|
|
|
|
smp_mb__after_atomic();
|
2018-05-18 14:34:10 +07:00
|
|
|
smc_curs_add(conn->sndbuf_desc->len, sent, len);
|
2017-01-09 22:55:23 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* sndbuf consumer: prepare all necessary (src&dst) chunks of data transmit;
|
|
|
|
* usable snd_wnd as max transmit
|
|
|
|
*/
|
|
|
|
static int smc_tx_rdma_writes(struct smc_connection *conn)
|
|
|
|
{
|
|
|
|
size_t src_off, src_len, dst_off, dst_len; /* current chunk values */
|
|
|
|
size_t len, dst_len_sum, src_len_sum, dstchunk, srcchunk;
|
|
|
|
union smc_host_cursor sent, prep, prod, cons;
|
|
|
|
struct ib_sge sges[SMC_IB_MAX_SEND_SGE];
|
|
|
|
struct smc_link_group *lgr = conn->lgr;
|
2018-05-23 21:38:11 +07:00
|
|
|
struct smc_cdc_producer_flags *pflags;
|
2017-01-09 22:55:23 +07:00
|
|
|
int to_send, rmbespace;
|
|
|
|
struct smc_link *link;
|
2017-07-28 18:56:19 +07:00
|
|
|
dma_addr_t dma_addr;
|
2017-01-09 22:55:23 +07:00
|
|
|
int num_sges;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
/* source: sndbuf */
|
|
|
|
smc_curs_write(&sent, smc_curs_read(&conn->tx_curs_sent, conn), conn);
|
|
|
|
smc_curs_write(&prep, smc_curs_read(&conn->tx_curs_prep, conn), conn);
|
|
|
|
/* cf. wmem_alloc - (snd_max - snd_una) */
|
2018-05-18 14:34:10 +07:00
|
|
|
to_send = smc_curs_diff(conn->sndbuf_desc->len, &sent, &prep);
|
2017-01-09 22:55:23 +07:00
|
|
|
if (to_send <= 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* destination: RMBE */
|
|
|
|
/* cf. snd_wnd */
|
|
|
|
rmbespace = atomic_read(&conn->peer_rmbe_space);
|
|
|
|
if (rmbespace <= 0)
|
|
|
|
return 0;
|
|
|
|
smc_curs_write(&prod,
|
|
|
|
smc_curs_read(&conn->local_tx_ctrl.prod, conn),
|
|
|
|
conn);
|
|
|
|
smc_curs_write(&cons,
|
|
|
|
smc_curs_read(&conn->local_rx_ctrl.cons, conn),
|
|
|
|
conn);
|
|
|
|
|
|
|
|
/* if usable snd_wnd closes ask peer to advertise once it opens again */
|
2018-05-23 21:38:11 +07:00
|
|
|
pflags = &conn->local_tx_ctrl.prod_flags;
|
|
|
|
pflags->write_blocked = (to_send >= rmbespace);
|
2017-01-09 22:55:23 +07:00
|
|
|
/* cf. usable snd_wnd */
|
|
|
|
len = min(to_send, rmbespace);
|
|
|
|
|
|
|
|
/* initialize variables for first iteration of subsequent nested loop */
|
|
|
|
link = &lgr->lnk[SMC_SINGLE_LINK];
|
|
|
|
dst_off = prod.count;
|
|
|
|
if (prod.wrap == cons.wrap) {
|
|
|
|
/* the filled destination area is unwrapped,
|
|
|
|
* hence the available free destination space is wrapped
|
|
|
|
* and we need 2 destination chunks of sum len; start with 1st
|
|
|
|
* which is limited by what's available in sndbuf
|
|
|
|
*/
|
|
|
|
dst_len = min_t(size_t,
|
|
|
|
conn->peer_rmbe_size - prod.count, len);
|
|
|
|
} else {
|
|
|
|
/* the filled destination area is wrapped,
|
|
|
|
* hence the available free destination space is unwrapped
|
|
|
|
* and we need a single destination chunk of entire len
|
|
|
|
*/
|
|
|
|
dst_len = len;
|
|
|
|
}
|
|
|
|
dst_len_sum = dst_len;
|
|
|
|
src_off = sent.count;
|
|
|
|
/* dst_len determines the maximum src_len */
|
2018-05-18 14:34:10 +07:00
|
|
|
if (sent.count + dst_len <= conn->sndbuf_desc->len) {
|
2017-01-09 22:55:23 +07:00
|
|
|
/* unwrapped src case: single chunk of entire dst_len */
|
|
|
|
src_len = dst_len;
|
|
|
|
} else {
|
|
|
|
/* wrapped src case: 2 chunks of sum dst_len; start with 1st: */
|
2018-05-18 14:34:10 +07:00
|
|
|
src_len = conn->sndbuf_desc->len - sent.count;
|
2017-01-09 22:55:23 +07:00
|
|
|
}
|
|
|
|
src_len_sum = src_len;
|
2017-07-28 18:56:19 +07:00
|
|
|
dma_addr = sg_dma_address(conn->sndbuf_desc->sgt[SMC_SINGLE_LINK].sgl);
|
2017-01-09 22:55:23 +07:00
|
|
|
for (dstchunk = 0; dstchunk < 2; dstchunk++) {
|
|
|
|
num_sges = 0;
|
|
|
|
for (srcchunk = 0; srcchunk < 2; srcchunk++) {
|
2017-07-28 18:56:19 +07:00
|
|
|
sges[srcchunk].addr = dma_addr + src_off;
|
2017-01-09 22:55:23 +07:00
|
|
|
sges[srcchunk].length = src_len;
|
|
|
|
sges[srcchunk].lkey = link->roce_pd->local_dma_lkey;
|
|
|
|
num_sges++;
|
|
|
|
src_off += src_len;
|
2018-05-18 14:34:10 +07:00
|
|
|
if (src_off >= conn->sndbuf_desc->len)
|
|
|
|
src_off -= conn->sndbuf_desc->len;
|
2017-01-09 22:55:23 +07:00
|
|
|
/* modulo in send ring */
|
|
|
|
if (src_len_sum == dst_len)
|
|
|
|
break; /* either on 1st or 2nd iteration */
|
|
|
|
/* prepare next (== 2nd) iteration */
|
|
|
|
src_len = dst_len - src_len; /* remainder */
|
|
|
|
src_len_sum += src_len;
|
|
|
|
}
|
|
|
|
rc = smc_tx_rdma_write(conn, dst_off, num_sges, sges);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
if (dst_len_sum == len)
|
|
|
|
break; /* either on 1st or 2nd iteration */
|
|
|
|
/* prepare next (== 2nd) iteration */
|
|
|
|
dst_off = 0; /* modulo offset in RMBE ring buffer */
|
|
|
|
dst_len = len - dst_len; /* remainder */
|
|
|
|
dst_len_sum += dst_len;
|
|
|
|
src_len = min_t(int,
|
2018-05-18 14:34:10 +07:00
|
|
|
dst_len, conn->sndbuf_desc->len - sent.count);
|
2017-01-09 22:55:23 +07:00
|
|
|
src_len_sum = src_len;
|
|
|
|
}
|
|
|
|
|
2018-05-23 21:38:11 +07:00
|
|
|
if (conn->urg_tx_pend && len == to_send)
|
|
|
|
pflags->urg_data_present = 1;
|
2017-01-09 22:55:23 +07:00
|
|
|
smc_tx_advance_cursors(conn, &prod, &sent, len);
|
|
|
|
/* update connection's cursors with advanced local cursors */
|
|
|
|
smc_curs_write(&conn->local_tx_ctrl.prod,
|
|
|
|
smc_curs_read(&prod, conn),
|
|
|
|
conn);
|
|
|
|
/* dst: peer RMBE */
|
|
|
|
smc_curs_write(&conn->tx_curs_sent,
|
|
|
|
smc_curs_read(&sent, conn),
|
|
|
|
conn);
|
|
|
|
/* src: local sndbuf */
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Wakeup sndbuf consumers from any context (IRQ or process)
|
|
|
|
* since there is more data to transmit; usable snd_wnd as max transmit
|
|
|
|
*/
|
|
|
|
int smc_tx_sndbuf_nonempty(struct smc_connection *conn)
|
|
|
|
{
|
2018-05-23 21:38:11 +07:00
|
|
|
struct smc_cdc_producer_flags *pflags;
|
2017-01-09 22:55:23 +07:00
|
|
|
struct smc_cdc_tx_pend *pend;
|
|
|
|
struct smc_wr_buf *wr_buf;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
spin_lock_bh(&conn->send_lock);
|
2017-09-21 14:17:34 +07:00
|
|
|
rc = smc_cdc_get_free_slot(conn, &wr_buf, &pend);
|
2017-01-09 22:55:23 +07:00
|
|
|
if (rc < 0) {
|
|
|
|
if (rc == -EBUSY) {
|
2017-01-09 22:55:25 +07:00
|
|
|
struct smc_sock *smc =
|
|
|
|
container_of(conn, struct smc_sock, conn);
|
|
|
|
|
|
|
|
if (smc->sk.sk_err == ECONNABORTED) {
|
|
|
|
rc = sock_error(&smc->sk);
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
2017-01-09 22:55:23 +07:00
|
|
|
rc = 0;
|
2018-01-25 17:15:36 +07:00
|
|
|
if (conn->alert_token_local) /* connection healthy */
|
2018-04-26 22:18:22 +07:00
|
|
|
mod_delayed_work(system_wq, &conn->tx_work,
|
|
|
|
SMC_TX_WORK_DELAY);
|
2017-01-09 22:55:23 +07:00
|
|
|
}
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
2018-05-23 21:38:11 +07:00
|
|
|
if (!conn->local_tx_ctrl.prod_flags.urg_data_present) {
|
|
|
|
rc = smc_tx_rdma_writes(conn);
|
|
|
|
if (rc) {
|
|
|
|
smc_wr_tx_put_slot(&conn->lgr->lnk[SMC_SINGLE_LINK],
|
|
|
|
(struct smc_wr_tx_pend_priv *)pend);
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
2017-01-09 22:55:23 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
rc = smc_cdc_msg_send(conn, wr_buf, pend);
|
2018-05-23 21:38:11 +07:00
|
|
|
pflags = &conn->local_tx_ctrl.prod_flags;
|
|
|
|
if (!rc && pflags->urg_data_present) {
|
|
|
|
pflags->urg_data_pending = 0;
|
|
|
|
pflags->urg_data_present = 0;
|
|
|
|
}
|
2017-01-09 22:55:23 +07:00
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
spin_unlock_bh(&conn->send_lock);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Wakeup sndbuf consumers from process context
|
|
|
|
* since there is more data to transmit
|
|
|
|
*/
|
net/smc: init conn.tx_work & conn.send_lock sooner
syzkaller found that following program crashes the host :
{
int fd = socket(AF_SMC, SOCK_STREAM, 0);
int val = 1;
listen(fd, 0);
shutdown(fd, SHUT_RDWR);
setsockopt(fd, 6, TCP_NODELAY, &val, 4);
}
Simply initialize conn.tx_work & conn.send_lock at socket creation,
rather than deeper in the stack.
ODEBUG: assert_init not available (active state 0) object type: timer_list hint: (null)
WARNING: CPU: 1 PID: 13988 at lib/debugobjects.c:329 debug_print_object+0x16a/0x210 lib/debugobjects.c:326
Kernel panic - not syncing: panic_on_warn set ...
CPU: 1 PID: 13988 Comm: syz-executor0 Not tainted 4.17.0-rc4+ #46
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b9/0x294 lib/dump_stack.c:113
panic+0x22f/0x4de kernel/panic.c:184
__warn.cold.8+0x163/0x1b3 kernel/panic.c:536
report_bug+0x252/0x2d0 lib/bug.c:186
fixup_bug arch/x86/kernel/traps.c:178 [inline]
do_error_trap+0x1de/0x490 arch/x86/kernel/traps.c:296
do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:315
invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:992
RIP: 0010:debug_print_object+0x16a/0x210 lib/debugobjects.c:326
RSP: 0018:ffff880197a37880 EFLAGS: 00010086
RAX: 0000000000000061 RBX: 0000000000000005 RCX: ffffc90001ed0000
RDX: 0000000000004aaf RSI: ffffffff8160f6f1 RDI: 0000000000000001
RBP: ffff880197a378c0 R08: ffff8801aa7a0080 R09: ffffed003b5e3eb2
R10: ffffed003b5e3eb2 R11: ffff8801daf1f597 R12: 0000000000000001
R13: ffffffff88d96980 R14: ffffffff87fa19a0 R15: ffffffff81666ec0
debug_object_assert_init+0x309/0x500 lib/debugobjects.c:692
debug_timer_assert_init kernel/time/timer.c:724 [inline]
debug_assert_init kernel/time/timer.c:776 [inline]
del_timer+0x74/0x140 kernel/time/timer.c:1198
try_to_grab_pending+0x439/0x9a0 kernel/workqueue.c:1223
mod_delayed_work_on+0x91/0x250 kernel/workqueue.c:1592
mod_delayed_work include/linux/workqueue.h:541 [inline]
smc_setsockopt+0x387/0x6d0 net/smc/af_smc.c:1367
__sys_setsockopt+0x1bd/0x390 net/socket.c:1903
__do_sys_setsockopt net/socket.c:1914 [inline]
__se_sys_setsockopt net/socket.c:1911 [inline]
__x64_sys_setsockopt+0xbe/0x150 net/socket.c:1911
do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287
entry_SYSCALL_64_after_hwframe+0x49/0xbe
Fixes: 01d2f7e2cdd3 ("net/smc: sockopts TCP_NODELAY and TCP_CORK")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Ursula Braun <ubraun@linux.ibm.com>
Cc: linux-s390@vger.kernel.org
Reported-by: syzbot <syzkaller@googlegroups.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-05-17 17:54:21 +07:00
|
|
|
void smc_tx_work(struct work_struct *work)
|
2017-01-09 22:55:23 +07:00
|
|
|
{
|
2017-09-21 14:16:33 +07:00
|
|
|
struct smc_connection *conn = container_of(to_delayed_work(work),
|
2017-01-09 22:55:23 +07:00
|
|
|
struct smc_connection,
|
|
|
|
tx_work);
|
|
|
|
struct smc_sock *smc = container_of(conn, struct smc_sock, conn);
|
2017-04-10 19:57:59 +07:00
|
|
|
int rc;
|
2017-01-09 22:55:23 +07:00
|
|
|
|
|
|
|
lock_sock(&smc->sk);
|
2018-01-25 17:15:36 +07:00
|
|
|
if (smc->sk.sk_err ||
|
|
|
|
!conn->alert_token_local ||
|
|
|
|
conn->local_rx_ctrl.conn_state_flags.peer_conn_abort)
|
|
|
|
goto out;
|
|
|
|
|
2017-04-10 19:57:59 +07:00
|
|
|
rc = smc_tx_sndbuf_nonempty(conn);
|
|
|
|
if (!rc && conn->local_rx_ctrl.prod_flags.write_blocked &&
|
|
|
|
!atomic_read(&conn->bytes_to_rcv))
|
|
|
|
conn->local_rx_ctrl.prod_flags.write_blocked = 0;
|
2018-01-25 17:15:36 +07:00
|
|
|
|
|
|
|
out:
|
2017-01-09 22:55:23 +07:00
|
|
|
release_sock(&smc->sk);
|
|
|
|
}
|
|
|
|
|
2018-05-23 21:38:11 +07:00
|
|
|
void smc_tx_consumer_update(struct smc_connection *conn, bool force)
|
2017-01-09 22:55:24 +07:00
|
|
|
{
|
|
|
|
union smc_host_cursor cfed, cons;
|
2017-12-07 19:38:48 +07:00
|
|
|
int to_confirm;
|
2017-01-09 22:55:24 +07:00
|
|
|
|
|
|
|
smc_curs_write(&cons,
|
|
|
|
smc_curs_read(&conn->local_tx_ctrl.cons, conn),
|
|
|
|
conn);
|
|
|
|
smc_curs_write(&cfed,
|
|
|
|
smc_curs_read(&conn->rx_curs_confirmed, conn),
|
|
|
|
conn);
|
2018-05-18 14:34:10 +07:00
|
|
|
to_confirm = smc_curs_diff(conn->rmb_desc->len, &cfed, &cons);
|
2017-01-09 22:55:24 +07:00
|
|
|
|
|
|
|
if (conn->local_rx_ctrl.prod_flags.cons_curs_upd_req ||
|
2018-05-23 21:38:11 +07:00
|
|
|
force ||
|
2017-01-09 22:55:24 +07:00
|
|
|
((to_confirm > conn->rmbe_update_limit) &&
|
2018-05-18 14:34:10 +07:00
|
|
|
((to_confirm > (conn->rmb_desc->len / 2)) ||
|
2017-01-09 22:55:24 +07:00
|
|
|
conn->local_rx_ctrl.prod_flags.write_blocked))) {
|
2018-01-25 17:15:36 +07:00
|
|
|
if ((smc_cdc_get_slot_and_msg_send(conn) < 0) &&
|
|
|
|
conn->alert_token_local) { /* connection healthy */
|
2017-09-21 14:16:33 +07:00
|
|
|
schedule_delayed_work(&conn->tx_work,
|
|
|
|
SMC_TX_WORK_DELAY);
|
2017-01-09 22:55:24 +07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
smc_curs_write(&conn->rx_curs_confirmed,
|
|
|
|
smc_curs_read(&conn->local_tx_ctrl.cons, conn),
|
|
|
|
conn);
|
|
|
|
conn->local_rx_ctrl.prod_flags.cons_curs_upd_req = 0;
|
|
|
|
}
|
|
|
|
if (conn->local_rx_ctrl.prod_flags.write_blocked &&
|
|
|
|
!atomic_read(&conn->bytes_to_rcv))
|
|
|
|
conn->local_rx_ctrl.prod_flags.write_blocked = 0;
|
|
|
|
}
|
|
|
|
|
2017-01-09 22:55:23 +07:00
|
|
|
/***************************** send initialize *******************************/
|
|
|
|
|
|
|
|
/* Initialize send properties on connection establishment. NB: not __init! */
|
|
|
|
void smc_tx_init(struct smc_sock *smc)
|
|
|
|
{
|
|
|
|
smc->sk.sk_write_space = smc_tx_write_space;
|
|
|
|
}
|