^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) * Copyright (c) 2006, 2017 Oracle and/or its affiliates. All rights reserved.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) * This software is available to you under a choice of one of two
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * licenses. You may choose to be licensed under the terms of the GNU
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) * General Public License (GPL) Version 2, available from the file
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) * COPYING in the main directory of this source tree, or the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) * OpenIB.org BSD license below:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) * Redistribution and use in source and binary forms, with or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) * without modification, are permitted provided that the following
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) * conditions are met:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) * - Redistributions of source code must retain the above
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) * copyright notice, this list of conditions and the following
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) * disclaimer.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) * - Redistributions in binary form must reproduce the above
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) * copyright notice, this list of conditions and the following
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) * disclaimer in the documentation and/or other materials
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) * provided with the distribution.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) * SOFTWARE.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) #include <linux/kernel.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) #include <linux/in.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) #include <net/tcp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) #include "rds.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) #include "tcp.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) void rds_tcp_state_change(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) void (*state_change)(struct sock *sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) struct rds_conn_path *cp;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) struct rds_tcp_connection *tc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) read_lock_bh(&sk->sk_callback_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) cp = sk->sk_user_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) if (!cp) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) state_change = sk->sk_state_change;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) tc = cp->cp_transport_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) state_change = tc->t_orig_state_change;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) rdsdebug("sock %p state_change to %d\n", tc->t_sock, sk->sk_state);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) switch (sk->sk_state) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) /* ignore connecting sockets as they make progress */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) case TCP_SYN_SENT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) case TCP_SYN_RECV:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) case TCP_ESTABLISHED:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) /* Force the peer to reconnect so that we have the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) * TCP ports going from <smaller-ip>.<transient> to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) * <larger-ip>.<RDS_TCP_PORT>. We avoid marking the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) * RDS connection as RDS_CONN_UP until the reconnect,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) * to avoid RDS datagram loss.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) if (rds_addr_cmp(&cp->cp_conn->c_laddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) &cp->cp_conn->c_faddr) >= 0 &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) rds_conn_path_transition(cp, RDS_CONN_CONNECTING,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) RDS_CONN_ERROR)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) rds_conn_path_drop(cp, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) rds_connect_path_complete(cp, RDS_CONN_CONNECTING);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) case TCP_CLOSE_WAIT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) case TCP_CLOSE:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) rds_conn_path_drop(cp, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) read_unlock_bh(&sk->sk_callback_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) state_change(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89) int rds_tcp_conn_path_connect(struct rds_conn_path *cp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91) struct socket *sock = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) struct sockaddr_in6 sin6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93) struct sockaddr_in sin;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94) struct sockaddr *addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95) int addrlen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96) bool isv6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97) int ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98) struct rds_connection *conn = cp->cp_conn;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) struct rds_tcp_connection *tc = cp->cp_transport_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) /* for multipath rds,we only trigger the connection after
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) * the handshake probe has determined the number of paths.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) if (cp->cp_index > 0 && cp->cp_conn->c_npaths < 2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) mutex_lock(&tc->t_conn_path_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) if (rds_conn_path_up(cp)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) mutex_unlock(&tc->t_conn_path_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) if (ipv6_addr_v4mapped(&conn->c_laddr)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) ret = sock_create_kern(rds_conn_net(conn), PF_INET,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) SOCK_STREAM, IPPROTO_TCP, &sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) isv6 = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) ret = sock_create_kern(rds_conn_net(conn), PF_INET6,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) SOCK_STREAM, IPPROTO_TCP, &sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) isv6 = true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) rds_tcp_tune(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) if (isv6) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) sin6.sin6_family = AF_INET6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) sin6.sin6_addr = conn->c_laddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) sin6.sin6_port = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) sin6.sin6_flowinfo = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) sin6.sin6_scope_id = conn->c_dev_if;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) addr = (struct sockaddr *)&sin6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) addrlen = sizeof(sin6);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) sin.sin_family = AF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) sin.sin_addr.s_addr = conn->c_laddr.s6_addr32[3];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) sin.sin_port = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) addr = (struct sockaddr *)&sin;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) addrlen = sizeof(sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) ret = sock->ops->bind(sock, addr, addrlen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) if (ret) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) rdsdebug("bind failed with %d at address %pI6c\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) ret, &conn->c_laddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) if (isv6) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) sin6.sin6_family = AF_INET6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) sin6.sin6_addr = conn->c_faddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) sin6.sin6_port = htons(RDS_TCP_PORT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) sin6.sin6_flowinfo = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) sin6.sin6_scope_id = conn->c_dev_if;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) addr = (struct sockaddr *)&sin6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) addrlen = sizeof(sin6);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) sin.sin_family = AF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) sin.sin_addr.s_addr = conn->c_faddr.s6_addr32[3];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) sin.sin_port = htons(RDS_TCP_PORT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) addr = (struct sockaddr *)&sin;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) addrlen = sizeof(sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) * once we call connect() we can start getting callbacks and they
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) * own the socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) rds_tcp_set_callbacks(sock, cp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) ret = sock->ops->connect(sock, addr, addrlen, O_NONBLOCK);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) rdsdebug("connect to address %pI6c returned %d\n", &conn->c_faddr, ret);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) if (ret == -EINPROGRESS)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) ret = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) if (ret == 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) rds_tcp_keepalive(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) sock = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) rds_tcp_restore_callbacks(sock, cp->cp_transport_data);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) mutex_unlock(&tc->t_conn_path_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) if (sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) sock_release(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) * Before killing the tcp socket this needs to serialize with callbacks. The
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) * caller has already grabbed the sending sem so we're serialized with other
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) * senders.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) * TCP calls the callbacks with the sock lock so we hold it while we reset the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) * callbacks to those set by TCP. Our callbacks won't execute again once we
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) * hold the sock lock.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) void rds_tcp_conn_path_shutdown(struct rds_conn_path *cp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) struct rds_tcp_connection *tc = cp->cp_transport_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) struct socket *sock = tc->t_sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) rdsdebug("shutting down conn %p tc %p sock %p\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) cp->cp_conn, tc, sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) if (sock) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) if (rds_destroy_pending(cp->cp_conn))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) sock_no_linger(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) sock->ops->shutdown(sock, RCV_SHUTDOWN | SEND_SHUTDOWN);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) lock_sock(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) rds_tcp_restore_callbacks(sock, tc); /* tc->tc_sock = NULL */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215) release_sock(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216) sock_release(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 217) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 218)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 219) if (tc->t_tinc) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 220) rds_inc_put(&tc->t_tinc->ti_inc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 221) tc->t_tinc = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 222) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 223) tc->t_tinc_hdr_rem = sizeof(struct rds_header);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 224) tc->t_tinc_data_rem = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 225) }