smc_clc.c 17.6 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
2 3 4 5 6 7
/*
 *  Shared Memory Communications over RDMA (SMC-R) and RoCE
 *
 *  CLC (connection layer control) handshake over initial TCP socket to
 *  prepare for RDMA traffic
 *
8
 *  Copyright IBM Corp. 2016, 2018
9 10 11 12 13
 *
 *  Author(s):  Ursula Braun <ubraun@linux.vnet.ibm.com>
 */

#include <linux/in.h>
14
#include <linux/inetdevice.h>
15
#include <linux/if_ether.h>
16 17
#include <linux/sched/signal.h>

18
#include <net/addrconf.h>
19 20 21 22
#include <net/sock.h>
#include <net/tcp.h>

#include "smc.h"
23
#include "smc_core.h"
24 25
#include "smc_clc.h"
#include "smc_ib.h"
26 27 28 29
#include "smc_ism.h"

#define SMCR_CLC_ACCEPT_CONFIRM_LEN 68
#define SMCD_CLC_ACCEPT_CONFIRM_LEN 48
30
#define SMC_CLC_RECV_BUF_LEN	100
31

32 33
/* eye catcher "SMCR" EBCDIC for CLC messages */
static const char SMC_EYECATCHER[4] = {'\xe2', '\xd4', '\xc3', '\xd9'};
34 35
/* eye catcher "SMCD" EBCDIC for CLC messages */
static const char SMCD_EYECATCHER[4] = {'\xe2', '\xd4', '\xc3', '\xc4'};
36

37 38 39
/* check if received message has a correct header length and contains valid
 * heading and trailing eyecatchers
 */
40
static bool smc_clc_msg_hdr_valid(struct smc_clc_msg_hdr *clcm, bool check_trl)
41 42 43 44 45 46 47
{
	struct smc_clc_msg_proposal_prefix *pclc_prfx;
	struct smc_clc_msg_accept_confirm *clc;
	struct smc_clc_msg_proposal *pclc;
	struct smc_clc_msg_decline *dclc;
	struct smc_clc_msg_trail *trl;

48 49
	if (memcmp(clcm->eyecatcher, SMC_EYECATCHER, sizeof(SMC_EYECATCHER)) &&
	    memcmp(clcm->eyecatcher, SMCD_EYECATCHER, sizeof(SMCD_EYECATCHER)))
50 51 52 53 54
		return false;
	switch (clcm->type) {
	case SMC_CLC_PROPOSAL:
		pclc = (struct smc_clc_msg_proposal *)clcm;
		pclc_prfx = smc_clc_proposal_get_prefix(pclc);
55
		if (ntohs(pclc->hdr.length) <
56 57 58 59 60 61 62 63 64 65 66
			sizeof(*pclc) + ntohs(pclc->iparea_offset) +
			sizeof(*pclc_prfx) +
			pclc_prfx->ipv6_prefixes_cnt *
				sizeof(struct smc_clc_ipv6_prefix) +
			sizeof(*trl))
			return false;
		trl = (struct smc_clc_msg_trail *)
			((u8 *)pclc + ntohs(pclc->hdr.length) - sizeof(*trl));
		break;
	case SMC_CLC_ACCEPT:
	case SMC_CLC_CONFIRM:
67 68
		if (clcm->path != SMC_TYPE_R && clcm->path != SMC_TYPE_D)
			return false;
69
		clc = (struct smc_clc_msg_accept_confirm *)clcm;
70 71 72 73
		if ((clcm->path == SMC_TYPE_R &&
		     ntohs(clc->hdr.length) != SMCR_CLC_ACCEPT_CONFIRM_LEN) ||
		    (clcm->path == SMC_TYPE_D &&
		     ntohs(clc->hdr.length) != SMCD_CLC_ACCEPT_CONFIRM_LEN))
74
			return false;
75 76
		trl = (struct smc_clc_msg_trail *)
			((u8 *)clc + ntohs(clc->hdr.length) - sizeof(*trl));
77 78 79 80 81 82 83 84 85 86
		break;
	case SMC_CLC_DECLINE:
		dclc = (struct smc_clc_msg_decline *)clcm;
		if (ntohs(dclc->hdr.length) != sizeof(*dclc))
			return false;
		trl = &dclc->trl;
		break;
	default:
		return false;
	}
87 88
	if (check_trl &&
	    memcmp(trl->eyecatcher, SMC_EYECATCHER, sizeof(SMC_EYECATCHER)) &&
89
	    memcmp(trl->eyecatcher, SMCD_EYECATCHER, sizeof(SMCD_EYECATCHER)))
90 91 92 93
		return false;
	return true;
}

94 95 96 97 98
/* find ipv4 addr on device and get the prefix len, fill CLC proposal msg */
static int smc_clc_prfx_set4_rcu(struct dst_entry *dst, __be32 ipv4,
				 struct smc_clc_msg_proposal_prefix *prop)
{
	struct in_device *in_dev = __in_dev_get_rcu(dst->dev);
99
	const struct in_ifaddr *ifa;
100 101 102

	if (!in_dev)
		return -ENODEV;
103 104

	in_dev_for_each_ifa_rcu(ifa, in_dev) {
105 106 107 108 109 110
		if (!inet_ifa_match(ipv4, ifa))
			continue;
		prop->prefix_len = inet_mask_len(ifa->ifa_mask);
		prop->outgoing_subnet = ifa->ifa_address & ifa->ifa_mask;
		/* prop->ipv6_prefixes_cnt = 0; already done by memset before */
		return 0;
111
	}
112 113 114
	return -ENOENT;
}

115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144
/* fill CLC proposal msg with ipv6 prefixes from device */
static int smc_clc_prfx_set6_rcu(struct dst_entry *dst,
				 struct smc_clc_msg_proposal_prefix *prop,
				 struct smc_clc_ipv6_prefix *ipv6_prfx)
{
#if IS_ENABLED(CONFIG_IPV6)
	struct inet6_dev *in6_dev = __in6_dev_get(dst->dev);
	struct inet6_ifaddr *ifa;
	int cnt = 0;

	if (!in6_dev)
		return -ENODEV;
	/* use a maximum of 8 IPv6 prefixes from device */
	list_for_each_entry(ifa, &in6_dev->addr_list, if_list) {
		if (ipv6_addr_type(&ifa->addr) & IPV6_ADDR_LINKLOCAL)
			continue;
		ipv6_addr_prefix(&ipv6_prfx[cnt].prefix,
				 &ifa->addr, ifa->prefix_len);
		ipv6_prfx[cnt].prefix_len = ifa->prefix_len;
		cnt++;
		if (cnt == SMC_CLC_MAX_V6_PREFIX)
			break;
	}
	prop->ipv6_prefixes_cnt = cnt;
	if (cnt)
		return 0;
#endif
	return -ENOENT;
}

145 146
/* retrieve and set prefixes in CLC proposal msg */
static int smc_clc_prfx_set(struct socket *clcsock,
147 148
			    struct smc_clc_msg_proposal_prefix *prop,
			    struct smc_clc_ipv6_prefix *ipv6_prfx)
149 150
{
	struct dst_entry *dst = sk_dst_get(clcsock->sk);
151
	struct sockaddr_storage addrs;
152
	struct sockaddr_in6 *addr6;
153
	struct sockaddr_in *addr;
154 155 156 157 158 159 160 161 162 163 164
	int rc = -ENOENT;

	if (!dst) {
		rc = -ENOTCONN;
		goto out;
	}
	if (!dst->dev) {
		rc = -ENODEV;
		goto out_rel;
	}
	/* get address to which the internal TCP socket is bound */
165 166
	kernel_getsockname(clcsock, (struct sockaddr *)&addrs);
	/* analyze IP specific data of net_device belonging to TCP socket */
167
	addr6 = (struct sockaddr_in6 *)&addrs;
168
	rcu_read_lock();
169 170 171 172
	if (addrs.ss_family == PF_INET) {
		/* IPv4 */
		addr = (struct sockaddr_in *)&addrs;
		rc = smc_clc_prfx_set4_rcu(dst, addr->sin_addr.s_addr, prop);
173 174 175 176 177 178 179
	} else if (ipv6_addr_v4mapped(&addr6->sin6_addr)) {
		/* mapped IPv4 address - peer is IPv4 only */
		rc = smc_clc_prfx_set4_rcu(dst, addr6->sin6_addr.s6_addr32[3],
					   prop);
	} else {
		/* IPv6 */
		rc = smc_clc_prfx_set6_rcu(dst, prop, ipv6_prfx);
180 181 182 183 184 185 186 187 188 189 190 191 192
	}
	rcu_read_unlock();
out_rel:
	dst_release(dst);
out:
	return rc;
}

/* match ipv4 addrs of dev against addr in CLC proposal */
static int smc_clc_prfx_match4_rcu(struct net_device *dev,
				   struct smc_clc_msg_proposal_prefix *prop)
{
	struct in_device *in_dev = __in_dev_get_rcu(dev);
193
	const struct in_ifaddr *ifa;
194 195 196

	if (!in_dev)
		return -ENODEV;
197
	in_dev_for_each_ifa_rcu(ifa, in_dev) {
198 199 200
		if (prop->prefix_len == inet_mask_len(ifa->ifa_mask) &&
		    inet_ifa_match(prop->outgoing_subnet, ifa))
			return 0;
201
	}
202

203 204 205
	return -ENOENT;
}

206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234
/* match ipv6 addrs of dev against addrs in CLC proposal */
static int smc_clc_prfx_match6_rcu(struct net_device *dev,
				   struct smc_clc_msg_proposal_prefix *prop)
{
#if IS_ENABLED(CONFIG_IPV6)
	struct inet6_dev *in6_dev = __in6_dev_get(dev);
	struct smc_clc_ipv6_prefix *ipv6_prfx;
	struct inet6_ifaddr *ifa;
	int i, max;

	if (!in6_dev)
		return -ENODEV;
	/* ipv6 prefix list starts behind smc_clc_msg_proposal_prefix */
	ipv6_prfx = (struct smc_clc_ipv6_prefix *)((u8 *)prop + sizeof(*prop));
	max = min_t(u8, prop->ipv6_prefixes_cnt, SMC_CLC_MAX_V6_PREFIX);
	list_for_each_entry(ifa, &in6_dev->addr_list, if_list) {
		if (ipv6_addr_type(&ifa->addr) & IPV6_ADDR_LINKLOCAL)
			continue;
		for (i = 0; i < max; i++) {
			if (ifa->prefix_len == ipv6_prfx[i].prefix_len &&
			    ipv6_prefix_equal(&ifa->addr, &ipv6_prfx[i].prefix,
					      ifa->prefix_len))
				return 0;
		}
	}
#endif
	return -ENOENT;
}

235 236 237 238 239
/* check if proposed prefixes match one of our device prefixes */
int smc_clc_prfx_match(struct socket *clcsock,
		       struct smc_clc_msg_proposal_prefix *prop)
{
	struct dst_entry *dst = sk_dst_get(clcsock->sk);
240
	int rc;
241 242 243 244 245 246 247 248 249 250 251 252

	if (!dst) {
		rc = -ENOTCONN;
		goto out;
	}
	if (!dst->dev) {
		rc = -ENODEV;
		goto out_rel;
	}
	rcu_read_lock();
	if (!prop->ipv6_prefixes_cnt)
		rc = smc_clc_prfx_match4_rcu(dst->dev, prop);
253 254
	else
		rc = smc_clc_prfx_match6_rcu(dst->dev, prop);
255
	rcu_read_unlock();
256 257 258 259 260 261
out_rel:
	dst_release(dst);
out:
	return rc;
}

262 263 264 265 266 267 268
/* Wait for data on the tcp-socket, analyze received data
 * Returns:
 * 0 if success and it was not a decline that we received.
 * SMC_CLC_DECL_REPLY if decline received for fallback w/o another decl send.
 * clcsock error, -EINTR, -ECONNRESET, -EPROTO otherwise.
 */
int smc_clc_wait_msg(struct smc_sock *smc, void *buf, int buflen,
269
		     u8 expected_type, unsigned long timeout)
270
{
271
	long rcvtimeo = smc->clcsock->sk->sk_rcvtimeo;
272 273 274 275
	struct sock *clc_sk = smc->clcsock->sk;
	struct smc_clc_msg_hdr *clcm = buf;
	struct msghdr msg = {NULL, 0};
	int reason_code = 0;
A
Al Viro 已提交
276
	struct kvec vec = {buf, buflen};
277 278
	int len, datlen, recvlen;
	bool check_trl = true;
279 280 281 282 283 284
	int krflags;

	/* peek the first few bytes to determine length of data to receive
	 * so we don't consume any subsequent CLC message or payload data
	 * in the TCP byte stream
	 */
A
Al Viro 已提交
285 286 287 288
	/*
	 * Caller must make sure that buflen is no less than
	 * sizeof(struct smc_clc_msg_hdr)
	 */
289
	krflags = MSG_PEEK | MSG_WAITALL;
290
	clc_sk->sk_rcvtimeo = timeout;
291
	iov_iter_kvec(&msg.msg_iter, READ, &vec, 1,
A
Al Viro 已提交
292 293
			sizeof(struct smc_clc_msg_hdr));
	len = sock_recvmsg(smc->clcsock, &msg, krflags);
294 295 296 297 298 299 300 301
	if (signal_pending(current)) {
		reason_code = -EINTR;
		clc_sk->sk_err = EINTR;
		smc->sk.sk_err = EINTR;
		goto out;
	}
	if (clc_sk->sk_err) {
		reason_code = -clc_sk->sk_err;
302 303 304 305 306
		if (clc_sk->sk_err == EAGAIN &&
		    expected_type == SMC_CLC_DECLINE)
			clc_sk->sk_err = 0; /* reset for fallback usage */
		else
			smc->sk.sk_err = clc_sk->sk_err;
307 308 309 310 311 312 313 314
		goto out;
	}
	if (!len) { /* peer has performed orderly shutdown */
		smc->sk.sk_err = ECONNRESET;
		reason_code = -ECONNRESET;
		goto out;
	}
	if (len < 0) {
315 316
		if (len != -EAGAIN || expected_type != SMC_CLC_DECLINE)
			smc->sk.sk_err = -len;
317 318 319 320 321
		reason_code = len;
		goto out;
	}
	datlen = ntohs(clcm->length);
	if ((len < sizeof(struct smc_clc_msg_hdr)) ||
322
	    (clcm->version < SMC_V1) ||
323 324 325 326 327 328 329
	    ((clcm->type != SMC_CLC_DECLINE) &&
	     (clcm->type != expected_type))) {
		smc->sk.sk_err = EPROTO;
		reason_code = -EPROTO;
		goto out;
	}

330 331 332
	if (clcm->type == SMC_CLC_PROPOSAL && clcm->path == SMC_TYPE_N)
		reason_code = SMC_CLC_DECL_VERSMISMAT; /* just V2 offered */

333 334
	/* receive the complete CLC message */
	memset(&msg, 0, sizeof(struct msghdr));
335 336 337 338 339 340 341
	if (datlen > buflen) {
		check_trl = false;
		recvlen = buflen;
	} else {
		recvlen = datlen;
	}
	iov_iter_kvec(&msg.msg_iter, READ, &vec, 1, recvlen);
342
	krflags = MSG_WAITALL;
A
Al Viro 已提交
343
	len = sock_recvmsg(smc->clcsock, &msg, krflags);
344
	if (len < recvlen || !smc_clc_msg_hdr_valid(clcm, check_trl)) {
345 346 347 348
		smc->sk.sk_err = EPROTO;
		reason_code = -EPROTO;
		goto out;
	}
349 350 351 352 353 354 355 356 357 358 359 360 361
	datlen -= len;
	while (datlen) {
		u8 tmp[SMC_CLC_RECV_BUF_LEN];

		vec.iov_base = &tmp;
		vec.iov_len = SMC_CLC_RECV_BUF_LEN;
		/* receive remaining proposal message */
		recvlen = datlen > SMC_CLC_RECV_BUF_LEN ?
						SMC_CLC_RECV_BUF_LEN : datlen;
		iov_iter_kvec(&msg.msg_iter, READ, &vec, 1, recvlen);
		len = sock_recvmsg(smc->clcsock, &msg, krflags);
		datlen -= len;
	}
362
	if (clcm->type == SMC_CLC_DECLINE) {
363 364 365 366 367
		struct smc_clc_msg_decline *dclc;

		dclc = (struct smc_clc_msg_decline *)clcm;
		reason_code = SMC_CLC_DECL_PEERDECL;
		smc->peer_diagnosis = ntohl(dclc->peer_diagnosis);
368
		if (((struct smc_clc_msg_decline *)buf)->hdr.flag) {
369
			smc->conn.lgr->sync_err = 1;
370
			smc_lgr_terminate_sched(smc->conn.lgr);
371
		}
372 373
	}

374
out:
375
	clc_sk->sk_rcvtimeo = rcvtimeo;
376 377 378 379
	return reason_code;
}

/* send CLC DECLINE message across internal TCP socket */
380
int smc_clc_send_decline(struct smc_sock *smc, u32 peer_diag_info)
381 382 383 384 385 386 387 388 389 390
{
	struct smc_clc_msg_decline dclc;
	struct msghdr msg;
	struct kvec vec;
	int len;

	memset(&dclc, 0, sizeof(dclc));
	memcpy(dclc.hdr.eyecatcher, SMC_EYECATCHER, sizeof(SMC_EYECATCHER));
	dclc.hdr.type = SMC_CLC_DECLINE;
	dclc.hdr.length = htons(sizeof(struct smc_clc_msg_decline));
391
	dclc.hdr.version = SMC_V1;
392
	dclc.hdr.flag = (peer_diag_info == SMC_CLC_DECL_SYNCERR) ? 1 : 0;
393 394
	if ((!smc->conn.lgr || !smc->conn.lgr->is_smcd) &&
	    smc_ib_is_valid_local_systemid())
395 396
		memcpy(dclc.id_for_peer, local_systemid,
		       sizeof(local_systemid));
397 398 399 400 401 402 403 404
	dclc.peer_diagnosis = htonl(peer_diag_info);
	memcpy(dclc.trl.eyecatcher, SMC_EYECATCHER, sizeof(SMC_EYECATCHER));

	memset(&msg, 0, sizeof(msg));
	vec.iov_base = &dclc;
	vec.iov_len = sizeof(struct smc_clc_msg_decline);
	len = kernel_sendmsg(smc->clcsock, &msg, &vec, 1,
			     sizeof(struct smc_clc_msg_decline));
405
	if (len < 0 || len < sizeof(struct smc_clc_msg_decline))
406 407
		len = -EPROTO;
	return len > 0 ? 0 : len;
408 409 410
}

/* send CLC PROPOSAL message across internal TCP socket */
411
int smc_clc_send_proposal(struct smc_sock *smc, int smc_type,
412
			  struct smc_init_info *ini)
413
{
414 415 416 417 418 419
	struct smc_clc_msg_proposal_prefix *pclc_prfx;
	struct smc_clc_msg_proposal *pclc_base;
	struct smc_clc_msg_proposal_area *pclc;
	struct smc_clc_ipv6_prefix *ipv6_prfx;
	struct smc_clc_msg_smcd *pclc_smcd;
	struct smc_clc_msg_trail *trl;
420
	int len, i, plen, rc;
421
	int reason_code = 0;
422
	struct kvec vec[5];
423 424
	struct msghdr msg;

425 426 427 428 429 430 431 432 433 434
	pclc = kzalloc(sizeof(*pclc), GFP_KERNEL);
	if (!pclc)
		return -ENOMEM;

	pclc_base = &pclc->pclc_base;
	pclc_smcd = &pclc->pclc_smcd;
	pclc_prfx = &pclc->pclc_prfx;
	ipv6_prfx = pclc->pclc_prfx_ipv6;
	trl = &pclc->pclc_trl;

435
	/* retrieve ip prefixes for CLC proposal msg */
436 437 438
	rc = smc_clc_prfx_set(smc->clcsock, pclc_prfx, ipv6_prfx);
	if (rc) {
		kfree(pclc);
439
		return SMC_CLC_DECL_CNFERR; /* configuration error */
440
	}
441

442
	/* send SMC Proposal CLC message */
443 444 445 446 447 448 449 450
	plen = sizeof(*pclc_base) + sizeof(*pclc_prfx) +
	       (pclc_prfx->ipv6_prefixes_cnt * sizeof(ipv6_prfx[0])) +
	       sizeof(*trl);
	memcpy(pclc_base->hdr.eyecatcher, SMC_EYECATCHER,
	       sizeof(SMC_EYECATCHER));
	pclc_base->hdr.type = SMC_CLC_PROPOSAL;
	pclc_base->hdr.version = SMC_V1;		/* SMC version */
	pclc_base->hdr.path = smc_type;
451 452
	if (smc_type == SMC_TYPE_R || smc_type == SMC_TYPE_B) {
		/* add SMC-R specifics */
453
		memcpy(pclc_base->lcl.id_for_peer, local_systemid,
454
		       sizeof(local_systemid));
455 456
		memcpy(pclc_base->lcl.gid, ini->ib_gid, SMC_GID_SIZE);
		memcpy(pclc_base->lcl.mac, &ini->ib_dev->mac[ini->ib_port - 1],
457
		       ETH_ALEN);
458
		pclc_base->iparea_offset = htons(0);
459 460 461
	}
	if (smc_type == SMC_TYPE_D || smc_type == SMC_TYPE_B) {
		/* add SMC-D specifics */
462 463 464
		plen += sizeof(*pclc_smcd);
		pclc_base->iparea_offset = htons(sizeof(*pclc_smcd));
		pclc_smcd->gid = ini->ism_dev->local_gid;
465
	}
466
	pclc_base->hdr.length = htons(plen);
467

468
	memcpy(trl->eyecatcher, SMC_EYECATCHER, sizeof(SMC_EYECATCHER));
469
	memset(&msg, 0, sizeof(msg));
470
	i = 0;
471 472
	vec[i].iov_base = pclc_base;
	vec[i++].iov_len = sizeof(*pclc_base);
473
	if (smc_type == SMC_TYPE_D || smc_type == SMC_TYPE_B) {
474 475
		vec[i].iov_base = pclc_smcd;
		vec[i++].iov_len = sizeof(*pclc_smcd);
476
	}
477 478 479 480 481
	vec[i].iov_base = pclc_prfx;
	vec[i++].iov_len = sizeof(*pclc_prfx);
	if (pclc_prfx->ipv6_prefixes_cnt > 0) {
		vec[i].iov_base = ipv6_prfx;
		vec[i++].iov_len = pclc_prfx->ipv6_prefixes_cnt *
482 483
				   sizeof(ipv6_prfx[0]);
	}
484 485
	vec[i].iov_base = trl;
	vec[i++].iov_len = sizeof(*trl);
486
	/* due to the few bytes needed for clc-handshake this cannot block */
487
	len = kernel_sendmsg(smc->clcsock, &msg, vec, i, plen);
488 489 490
	if (len < 0) {
		smc->sk.sk_err = smc->clcsock->sk->sk_err;
		reason_code = -smc->sk.sk_err;
491
	} else if (len < ntohs(pclc_base->hdr.length)) {
492 493
		reason_code = -ENETUNREACH;
		smc->sk.sk_err = -reason_code;
494 495
	}

496
	kfree(pclc);
497 498 499
	return reason_code;
}

500 501 502 503
/* build and send CLC CONFIRM / ACCEPT message */
static int smc_clc_send_confirm_accept(struct smc_sock *smc,
				       struct smc_clc_msg_accept_confirm *clc,
				       int first_contact)
504
{
505
	struct smc_connection *conn = &smc->conn;
506 507 508 509
	struct msghdr msg;
	struct kvec vec;

	/* send SMC Confirm CLC msg */
510 511 512
	clc->hdr.version = SMC_V1;		/* SMC version */
	if (first_contact)
		clc->hdr.flag = 1;
513
	if (conn->lgr->is_smcd) {
514
		/* SMC-D specific settings */
515
		memcpy(clc->hdr.eyecatcher, SMCD_EYECATCHER,
516
		       sizeof(SMCD_EYECATCHER));
517 518 519 520 521 522 523 524
		clc->hdr.path = SMC_TYPE_D;
		clc->hdr.length = htons(SMCD_CLC_ACCEPT_CONFIRM_LEN);
		clc->d0.gid = conn->lgr->smcd->local_gid;
		clc->d0.token = conn->rmb_desc->token;
		clc->d0.dmbe_size = conn->rmbe_size_short;
		clc->d0.dmbe_idx = 0;
		memcpy(&clc->d0.linkid, conn->lgr->id, SMC_LGR_ID_SIZE);
		memcpy(clc->d0.smcd_trl.eyecatcher, SMCD_EYECATCHER,
525 526
		       sizeof(SMCD_EYECATCHER));
	} else {
527 528
		struct smc_link *link = conn->lnk;

529
		/* SMC-R specific settings */
530
		link = conn->lnk;
531
		memcpy(clc->hdr.eyecatcher, SMC_EYECATCHER,
532
		       sizeof(SMC_EYECATCHER));
533 534 535
		clc->hdr.path = SMC_TYPE_R;
		clc->hdr.length = htons(SMCR_CLC_ACCEPT_CONFIRM_LEN);
		memcpy(clc->r0.lcl.id_for_peer, local_systemid,
536
		       sizeof(local_systemid));
537 538
		memcpy(&clc->r0.lcl.gid, link->gid, SMC_GID_SIZE);
		memcpy(&clc->r0.lcl.mac, &link->smcibdev->mac[link->ibport - 1],
539
		       ETH_ALEN);
540 541
		hton24(clc->r0.qpn, link->roce_qp->qp_num);
		clc->r0.rmb_rkey =
542
			htonl(conn->rmb_desc->mr_rx[link->link_idx]->rkey);
543 544 545 546 547 548 549 550 551 552 553 554
		clc->r0.rmbe_idx = 1; /* for now: 1 RMB = 1 RMBE */
		clc->r0.rmbe_alert_token = htonl(conn->alert_token_local);
		switch (clc->hdr.type) {
		case SMC_CLC_ACCEPT:
			clc->r0.qp_mtu = link->path_mtu;
			break;
		case SMC_CLC_CONFIRM:
			clc->r0.qp_mtu = min(link->path_mtu, link->peer_mtu);
			break;
		}
		clc->r0.rmbe_size = conn->rmbe_size_short;
		clc->r0.rmb_dma_addr = cpu_to_be64((u64)sg_dma_address
555
				(conn->rmb_desc->sgt[link->link_idx].sgl));
556 557
		hton24(clc->r0.psn, link->psn_initial);
		memcpy(clc->r0.smcr_trl.eyecatcher, SMC_EYECATCHER,
558 559
		       sizeof(SMC_EYECATCHER));
	}
560 561

	memset(&msg, 0, sizeof(msg));
562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578
	vec.iov_base = clc;
	vec.iov_len = ntohs(clc->hdr.length);
	return kernel_sendmsg(smc->clcsock, &msg, &vec, 1,
			      ntohs(clc->hdr.length));
}

/* send CLC CONFIRM message across internal TCP socket */
int smc_clc_send_confirm(struct smc_sock *smc)
{
	struct smc_clc_msg_accept_confirm cclc;
	int reason_code = 0;
	int len;

	/* send SMC Confirm CLC msg */
	memset(&cclc, 0, sizeof(cclc));
	cclc.hdr.type = SMC_CLC_CONFIRM;
	len = smc_clc_send_confirm_accept(smc, &cclc, 0);
579
	if (len < ntohs(cclc.hdr.length)) {
580 581 582 583 584 585 586 587 588 589 590 591
		if (len >= 0) {
			reason_code = -ENETUNREACH;
			smc->sk.sk_err = -reason_code;
		} else {
			smc->sk.sk_err = smc->clcsock->sk->sk_err;
			reason_code = -smc->sk.sk_err;
		}
	}
	return reason_code;
}

/* send CLC ACCEPT message across internal TCP socket */
592
int smc_clc_send_accept(struct smc_sock *new_smc, bool srv_first_contact)
593 594 595 596 597 598
{
	struct smc_clc_msg_accept_confirm aclc;
	int len;

	memset(&aclc, 0, sizeof(aclc));
	aclc.hdr.type = SMC_CLC_ACCEPT;
599
	len = smc_clc_send_confirm_accept(new_smc, &aclc, srv_first_contact);
600 601
	if (len < ntohs(aclc.hdr.length))
		len = len >= 0 ? -EPROTO : -new_smc->clcsock->sk->sk_err;
602

603
	return len > 0 ? 0 : len;
604
}