blob: 361e59146807f2d8fdf69fba05757726c03c27c9 [file] [log] [blame]
Chuck Levera2268cf2018-05-04 15:34:32 -04001// SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -04002/*
Chuck Lever62b56a62017-10-30 16:22:14 -04003 * Copyright (c) 2014-2017 Oracle. All rights reserved.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -04004 * Copyright (c) 2003-2007 Network Appliance, Inc. All rights reserved.
5 *
6 * This software is available to you under a choice of one of two
7 * licenses. You may choose to be licensed under the terms of the GNU
8 * General Public License (GPL) Version 2, available from the file
9 * COPYING in the main directory of this source tree, or the BSD-type
10 * license below:
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 *
19 * Redistributions in binary form must reproduce the above
20 * copyright notice, this list of conditions and the following
21 * disclaimer in the documentation and/or other materials provided
22 * with the distribution.
23 *
24 * Neither the name of the Network Appliance, Inc. nor the names of
25 * its contributors may be used to endorse or promote products
26 * derived from this software without specific prior written
27 * permission.
28 *
29 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
30 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
31 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
32 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
33 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
34 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
35 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
36 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
37 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
38 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
39 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
40 */
41
42/*
43 * transport.c
44 *
45 * This file contains the top-level implementation of an RPC RDMA
46 * transport.
47 *
48 * Naming convention: functions beginning with xprt_ are part of the
49 * transport switch. All others are RPC RDMA internal.
50 */
51
52#include <linux/module.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090053#include <linux/slab.h>
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040054#include <linux/seq_file.h>
Chuck Leverbd2abef2018-05-07 15:27:16 -040055#include <linux/smp.h>
56
Jeff Layton59766872013-02-04 12:50:00 -050057#include <linux/sunrpc/addr.h>
Chuck Leverbd2abef2018-05-07 15:27:16 -040058#include <linux/sunrpc/svc_rdma.h>
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040059
60#include "xprt_rdma.h"
Chuck Leverb6e717cb2018-05-07 15:27:05 -040061#include <trace/events/rpcrdma.h>
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040062
Jeff Laytonf895b252014-11-17 16:58:04 -050063#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040064# define RPCDBG_FACILITY RPCDBG_TRANS
65#endif
66
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040067/*
68 * tunables
69 */
70
Chuck Lever86c4ccd2019-04-24 09:40:25 -040071unsigned int xprt_rdma_slot_table_entries = RPCRDMA_DEF_SLOT_TABLE;
Chuck Lever5d252f92016-01-07 14:50:10 -050072unsigned int xprt_rdma_max_inline_read = RPCRDMA_DEF_INLINE;
Chuck Lever94087e92019-04-24 09:40:20 -040073unsigned int xprt_rdma_max_inline_write = RPCRDMA_DEF_INLINE;
Chuck Leverce5b3712017-12-14 20:57:47 -050074unsigned int xprt_rdma_memreg_strategy = RPCRDMA_FRWR;
Chuck Leverfff09592017-04-11 13:22:54 -040075int xprt_rdma_pad_optimize;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040076
Jeff Laytonf895b252014-11-17 16:58:04 -050077#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040078
79static unsigned int min_slot_table_size = RPCRDMA_MIN_SLOT_TABLE;
80static unsigned int max_slot_table_size = RPCRDMA_MAX_SLOT_TABLE;
Chuck Lever29c55422016-05-02 14:40:48 -040081static unsigned int min_inline_size = RPCRDMA_MIN_INLINE;
82static unsigned int max_inline_size = RPCRDMA_MAX_INLINE;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040083static unsigned int max_padding = PAGE_SIZE;
84static unsigned int min_memreg = RPCRDMA_BOUNCEBUFFERS;
85static unsigned int max_memreg = RPCRDMA_LAST - 1;
Chuck Lever10492702017-12-14 20:56:42 -050086static unsigned int dummy;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040087
88static struct ctl_table_header *sunrpc_table_header;
89
Joe Perchesfe2c6332013-06-11 23:04:25 -070090static struct ctl_table xr_tunables_table[] = {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040091 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040092 .procname = "rdma_slot_table_entries",
93 .data = &xprt_rdma_slot_table_entries,
94 .maxlen = sizeof(unsigned int),
95 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -080096 .proc_handler = proc_dointvec_minmax,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040097 .extra1 = &min_slot_table_size,
98 .extra2 = &max_slot_table_size
99 },
100 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400101 .procname = "rdma_max_inline_read",
102 .data = &xprt_rdma_max_inline_read,
103 .maxlen = sizeof(unsigned int),
104 .mode = 0644,
Chuck Lever44829d02016-09-15 10:57:32 -0400105 .proc_handler = proc_dointvec_minmax,
Chuck Lever29c55422016-05-02 14:40:48 -0400106 .extra1 = &min_inline_size,
107 .extra2 = &max_inline_size,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400108 },
109 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400110 .procname = "rdma_max_inline_write",
111 .data = &xprt_rdma_max_inline_write,
112 .maxlen = sizeof(unsigned int),
113 .mode = 0644,
Chuck Lever44829d02016-09-15 10:57:32 -0400114 .proc_handler = proc_dointvec_minmax,
Chuck Lever29c55422016-05-02 14:40:48 -0400115 .extra1 = &min_inline_size,
116 .extra2 = &max_inline_size,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400117 },
118 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400119 .procname = "rdma_inline_write_padding",
Chuck Lever10492702017-12-14 20:56:42 -0500120 .data = &dummy,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400121 .maxlen = sizeof(unsigned int),
122 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800123 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700124 .extra1 = SYSCTL_ZERO,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400125 .extra2 = &max_padding,
126 },
127 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400128 .procname = "rdma_memreg_strategy",
129 .data = &xprt_rdma_memreg_strategy,
130 .maxlen = sizeof(unsigned int),
131 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800132 .proc_handler = proc_dointvec_minmax,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400133 .extra1 = &min_memreg,
134 .extra2 = &max_memreg,
135 },
136 {
Tom Talpey9191ca32008-10-09 15:01:11 -0400137 .procname = "rdma_pad_optimize",
138 .data = &xprt_rdma_pad_optimize,
139 .maxlen = sizeof(unsigned int),
140 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800141 .proc_handler = proc_dointvec,
Tom Talpey9191ca32008-10-09 15:01:11 -0400142 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -0800143 { },
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400144};
145
Joe Perchesfe2c6332013-06-11 23:04:25 -0700146static struct ctl_table sunrpc_table[] = {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400147 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400148 .procname = "sunrpc",
149 .mode = 0555,
150 .child = xr_tunables_table
151 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -0800152 { },
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400153};
154
155#endif
156
Chuck Leverd31ae252017-08-01 12:00:39 -0400157static const struct rpc_xprt_ops xprt_rdma_procs;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400158
159static void
Chuck Lever0dd39ca2015-03-30 14:33:43 -0400160xprt_rdma_format_addresses4(struct rpc_xprt *xprt, struct sockaddr *sap)
161{
162 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
163 char buf[20];
164
165 snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr));
166 xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL);
167
168 xprt->address_strings[RPC_DISPLAY_NETID] = RPCBIND_NETID_RDMA;
169}
170
171static void
172xprt_rdma_format_addresses6(struct rpc_xprt *xprt, struct sockaddr *sap)
173{
174 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
175 char buf[40];
176
177 snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr);
178 xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL);
179
180 xprt->address_strings[RPC_DISPLAY_NETID] = RPCBIND_NETID_RDMA6;
181}
182
Chuck Lever5d252f92016-01-07 14:50:10 -0500183void
Chuck Lever5231eb92015-08-03 13:02:41 -0400184xprt_rdma_format_addresses(struct rpc_xprt *xprt, struct sockaddr *sap)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400185{
Chuck Lever0dd39ca2015-03-30 14:33:43 -0400186 char buf[128];
187
188 switch (sap->sa_family) {
189 case AF_INET:
190 xprt_rdma_format_addresses4(xprt, sap);
191 break;
192 case AF_INET6:
193 xprt_rdma_format_addresses6(xprt, sap);
194 break;
195 default:
196 pr_err("rpcrdma: Unrecognized address family\n");
197 return;
198 }
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400199
Chuck Leverc877b842009-08-09 15:09:36 -0400200 (void)rpc_ntop(sap, buf, sizeof(buf));
201 xprt->address_strings[RPC_DISPLAY_ADDR] = kstrdup(buf, GFP_KERNEL);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400202
Joe Perches81160e662010-03-08 12:15:59 -0800203 snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap));
Chuck Leverc877b842009-08-09 15:09:36 -0400204 xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400205
Joe Perches81160e662010-03-08 12:15:59 -0800206 snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap));
Chuck Leverc877b842009-08-09 15:09:36 -0400207 xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400208
Chuck Lever0dd39ca2015-03-30 14:33:43 -0400209 xprt->address_strings[RPC_DISPLAY_PROTO] = "rdma";
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400210}
211
Chuck Lever5d252f92016-01-07 14:50:10 -0500212void
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400213xprt_rdma_free_addresses(struct rpc_xprt *xprt)
214{
Chuck Lever33e01dc2008-01-14 12:32:20 -0500215 unsigned int i;
216
217 for (i = 0; i < RPC_DISPLAY_MAX; i++)
218 switch (i) {
219 case RPC_DISPLAY_PROTO:
220 case RPC_DISPLAY_NETID:
221 continue;
222 default:
223 kfree(xprt->address_strings[i]);
224 }
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400225}
226
Chuck Lever31e62d22018-10-01 14:26:08 -0400227/**
228 * xprt_rdma_connect_worker - establish connection in the background
229 * @work: worker thread context
230 *
231 * Requester holds the xprt's send lock to prevent activity on this
232 * transport while a fresh connection is being established. RPC tasks
233 * sleep on the xprt's pending queue waiting for connect to complete.
234 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400235static void
236xprt_rdma_connect_worker(struct work_struct *work)
237{
Chuck Lever5abefb82015-01-21 11:02:37 -0500238 struct rpcrdma_xprt *r_xprt = container_of(work, struct rpcrdma_xprt,
239 rx_connect_worker.work);
240 struct rpc_xprt *xprt = &r_xprt->rx_xprt;
Chuck Lever31e62d22018-10-01 14:26:08 -0400241 int rc;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400242
Trond Myklebustd19751e2012-09-11 17:21:25 -0400243 rc = rpcrdma_ep_connect(&r_xprt->rx_ep, &r_xprt->rx_ia);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400244 xprt_clear_connecting(xprt);
Chuck Lever31e62d22018-10-01 14:26:08 -0400245 if (r_xprt->rx_ep.rep_connected > 0) {
Chuck Lever6cb28682019-10-23 10:01:52 -0400246 xprt->stat.connect_count++;
247 xprt->stat.connect_time += (long)jiffies -
248 xprt->stat.connect_start;
249 xprt_set_connected(xprt);
250 rc = -EAGAIN;
Chuck Lever31e62d22018-10-01 14:26:08 -0400251 }
Chuck Lever6cb28682019-10-23 10:01:52 -0400252 xprt_wake_pending_tasks(xprt, rc);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400253}
254
Chuck Leverf26c32f2018-10-01 14:26:40 -0400255/**
256 * xprt_rdma_inject_disconnect - inject a connection fault
257 * @xprt: transport context
258 *
259 * If @xprt is connected, disconnect it to simulate spurious connection
260 * loss.
261 */
Chuck Lever4a068252015-05-11 14:02:25 -0400262static void
263xprt_rdma_inject_disconnect(struct rpc_xprt *xprt)
264{
Chuck Leverad091182018-10-01 14:26:45 -0400265 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
Chuck Lever4a068252015-05-11 14:02:25 -0400266
Chuck Lever395069f2018-12-19 11:00:00 -0500267 trace_xprtrdma_op_inject_dsc(r_xprt);
Chuck Lever4a068252015-05-11 14:02:25 -0400268 rdma_disconnect(r_xprt->rx_ia.ri_id);
269}
270
Chuck Leverf26c32f2018-10-01 14:26:40 -0400271/**
272 * xprt_rdma_destroy - Full tear down of transport
273 * @xprt: doomed transport context
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400274 *
Chuck Leverf26c32f2018-10-01 14:26:40 -0400275 * Caller guarantees there will be no more calls to us with
276 * this @xprt.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400277 */
278static void
279xprt_rdma_destroy(struct rpc_xprt *xprt)
280{
281 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400282
Chuck Lever395069f2018-12-19 11:00:00 -0500283 trace_xprtrdma_op_destroy(r_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400284
Chuck Lever5abefb82015-01-21 11:02:37 -0500285 cancel_delayed_work_sync(&r_xprt->rx_connect_worker);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400286
Chuck Lever86c4ccd2019-04-24 09:40:25 -0400287 rpcrdma_ep_destroy(r_xprt);
Steve Wise72c02172015-09-21 12:24:23 -0500288 rpcrdma_buffer_destroy(&r_xprt->rx_buf);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400289 rpcrdma_ia_close(&r_xprt->rx_ia);
290
291 xprt_rdma_free_addresses(xprt);
Pavel Emelyanove204e622010-09-29 16:03:13 +0400292 xprt_free(xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400293
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400294 module_put(THIS_MODULE);
295}
296
Chuck Lever675dd902019-06-19 10:33:42 -0400297/* 60 second timeout, no retries */
Trond Myklebust2881ae72007-12-20 16:03:54 -0500298static const struct rpc_timeout xprt_rdma_default_timeout = {
299 .to_initval = 60 * HZ,
300 .to_maxval = 60 * HZ,
301};
302
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400303/**
304 * xprt_setup_rdma - Set up transport to use RDMA
305 *
306 * @args: rpc transport arguments
307 */
308static struct rpc_xprt *
309xprt_setup_rdma(struct xprt_create *args)
310{
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400311 struct rpc_xprt *xprt;
312 struct rpcrdma_xprt *new_xprt;
Chuck Lever5231eb92015-08-03 13:02:41 -0400313 struct sockaddr *sap;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400314 int rc;
315
Chuck Leverddbb3472018-12-19 10:59:39 -0500316 if (args->addrlen > sizeof(xprt->addr))
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400317 return ERR_PTR(-EBADF);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400318
Chuck Leveredb41e62018-05-04 15:35:09 -0400319 xprt = xprt_alloc(args->net, sizeof(struct rpcrdma_xprt), 0, 0);
Chuck Leverddbb3472018-12-19 10:59:39 -0500320 if (!xprt)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400321 return ERR_PTR(-ENOMEM);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400322
Trond Myklebustba7392b2007-12-20 16:03:55 -0500323 xprt->timeout = &xprt_rdma_default_timeout;
Chuck Lever675dd902019-06-19 10:33:42 -0400324 xprt->connect_timeout = xprt->timeout->to_initval;
325 xprt->max_reconnect_timeout = xprt->timeout->to_maxval;
Chuck Leverbfaee092014-05-28 10:34:32 -0400326 xprt->bind_timeout = RPCRDMA_BIND_TO;
327 xprt->reestablish_timeout = RPCRDMA_INIT_REEST_TO;
328 xprt->idle_timeout = RPCRDMA_IDLE_DISC_TO;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400329
330 xprt->resvport = 0; /* privileged port not needed */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400331 xprt->ops = &xprt_rdma_procs;
332
333 /*
334 * Set up RDMA-specific connect data.
335 */
Chuck Leverdd229ce2017-12-14 20:56:58 -0500336 sap = args->dstaddr;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400337
338 /* Ensure xprt->addr holds valid server TCP (not RDMA)
339 * address, for any side protocols which peek at it */
340 xprt->prot = IPPROTO_TCP;
341 xprt->addrlen = args->addrlen;
Chuck Lever5231eb92015-08-03 13:02:41 -0400342 memcpy(&xprt->addr, sap, xprt->addrlen);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400343
Chuck Lever5231eb92015-08-03 13:02:41 -0400344 if (rpc_get_port(sap))
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400345 xprt_set_bound(xprt);
Chuck Leverd461f1f2017-12-14 20:56:50 -0500346 xprt_rdma_format_addresses(xprt, sap);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400347
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400348 new_xprt = rpcx_to_rdmax(xprt);
Chuck Leverdd229ce2017-12-14 20:56:58 -0500349 rc = rpcrdma_ia_open(new_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400350 if (rc)
351 goto out1;
352
Chuck Lever86c4ccd2019-04-24 09:40:25 -0400353 rc = rpcrdma_ep_create(new_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400354 if (rc)
355 goto out2;
356
Chuck Leverac920d02015-01-21 11:03:44 -0500357 rc = rpcrdma_buffer_create(new_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400358 if (rc)
359 goto out3;
360
Chuck Lever5abefb82015-01-21 11:02:37 -0500361 INIT_DELAYED_WORK(&new_xprt->rx_connect_worker,
362 xprt_rdma_connect_worker);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400363
Chuck Lever5f624122018-12-19 10:59:01 -0500364 xprt->max_payload = frwr_maxpages(new_xprt);
Chuck Lever1c9351e2015-03-30 14:34:30 -0400365 if (xprt->max_payload == 0)
366 goto out4;
367 xprt->max_payload <<= PAGE_SHIFT;
Chuck Lever43e95982014-07-29 17:23:34 -0400368 dprintk("RPC: %s: transport data payload maximum: %zu bytes\n",
369 __func__, xprt->max_payload);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400370
371 if (!try_module_get(THIS_MODULE))
372 goto out4;
373
Chuck Lever5231eb92015-08-03 13:02:41 -0400374 dprintk("RPC: %s: %s:%s\n", __func__,
375 xprt->address_strings[RPC_DISPLAY_ADDR],
376 xprt->address_strings[RPC_DISPLAY_PORT]);
Chuck Leverb4744e02017-12-20 16:31:29 -0500377 trace_xprtrdma_create(new_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400378 return xprt;
379
380out4:
Chuck Lever03ac1a72017-12-14 20:56:01 -0500381 rpcrdma_buffer_destroy(&new_xprt->rx_buf);
Chuck Lever03ac1a72017-12-14 20:56:01 -0500382 rc = -ENODEV;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400383out3:
Chuck Lever86c4ccd2019-04-24 09:40:25 -0400384 rpcrdma_ep_destroy(new_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400385out2:
386 rpcrdma_ia_close(&new_xprt->rx_ia);
387out1:
Chuck Lever395069f2018-12-19 11:00:00 -0500388 trace_xprtrdma_op_destroy(new_xprt);
Chuck Leverd461f1f2017-12-14 20:56:50 -0500389 xprt_rdma_free_addresses(xprt);
Pavel Emelyanove204e622010-09-29 16:03:13 +0400390 xprt_free(xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400391 return ERR_PTR(rc);
392}
393
Chuck Leverbebd0312017-04-11 13:23:10 -0400394/**
Chuck Leverf26c32f2018-10-01 14:26:40 -0400395 * xprt_rdma_close - close a transport connection
396 * @xprt: transport context
Chuck Leverbebd0312017-04-11 13:23:10 -0400397 *
Chuck Lever395069f2018-12-19 11:00:00 -0500398 * Called during autoclose or device removal.
399 *
Chuck Leverf26c32f2018-10-01 14:26:40 -0400400 * Caller holds @xprt's send lock to prevent activity on this
401 * transport while the connection is torn down.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400402 */
Chuck Lever0c0829b2018-12-19 10:58:40 -0500403void xprt_rdma_close(struct rpc_xprt *xprt)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400404{
405 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
Chuck Leverbebd0312017-04-11 13:23:10 -0400406 struct rpcrdma_ep *ep = &r_xprt->rx_ep;
407 struct rpcrdma_ia *ia = &r_xprt->rx_ia;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400408
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500409 might_sleep();
410
Chuck Lever395069f2018-12-19 11:00:00 -0500411 trace_xprtrdma_op_close(r_xprt);
412
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500413 /* Prevent marshaling and sending of new requests */
414 xprt_clear_connected(xprt);
Chuck Leverbebd0312017-04-11 13:23:10 -0400415
416 if (test_and_clear_bit(RPCRDMA_IAF_REMOVING, &ia->ri_flags)) {
Chuck Leverbebd0312017-04-11 13:23:10 -0400417 rpcrdma_ia_remove(ia);
Chuck Lever0c0829b2018-12-19 10:58:40 -0500418 goto out;
Chuck Leverbebd0312017-04-11 13:23:10 -0400419 }
Chuck Lever0c0829b2018-12-19 10:58:40 -0500420
Chuck Leverbebd0312017-04-11 13:23:10 -0400421 if (ep->rep_connected == -ENODEV)
422 return;
Chuck Leverbebd0312017-04-11 13:23:10 -0400423 rpcrdma_ep_disconnect(ep, ia);
Chuck Leveref739b22018-10-01 14:25:14 -0400424
Chuck Lever0c0829b2018-12-19 10:58:40 -0500425out:
Chuck Leverf9e1afe2019-08-26 13:12:51 -0400426 xprt->reestablish_timeout = 0;
Chuck Lever0c0829b2018-12-19 10:58:40 -0500427 ++xprt->connect_cookie;
428 xprt_disconnect_done(xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400429}
430
Chuck Lever20035ed2017-12-14 20:57:06 -0500431/**
432 * xprt_rdma_set_port - update server port with rpcbind result
433 * @xprt: controlling RPC transport
434 * @port: new port value
435 *
436 * Transport connect status is unchanged.
437 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400438static void
439xprt_rdma_set_port(struct rpc_xprt *xprt, u16 port)
440{
Chuck Lever20035ed2017-12-14 20:57:06 -0500441 struct sockaddr *sap = (struct sockaddr *)&xprt->addr;
442 char buf[8];
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400443
Chuck Lever20035ed2017-12-14 20:57:06 -0500444 dprintk("RPC: %s: setting port for xprt %p (%s:%s) to %u\n",
445 __func__, xprt,
446 xprt->address_strings[RPC_DISPLAY_ADDR],
447 xprt->address_strings[RPC_DISPLAY_PORT],
448 port);
449
450 rpc_set_port(sap, port);
451
452 kfree(xprt->address_strings[RPC_DISPLAY_PORT]);
453 snprintf(buf, sizeof(buf), "%u", port);
454 xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL);
455
456 kfree(xprt->address_strings[RPC_DISPLAY_HEX_PORT]);
457 snprintf(buf, sizeof(buf), "%4hx", port);
458 xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400459}
460
Chuck Lever33849792017-04-11 13:22:46 -0400461/**
462 * xprt_rdma_timer - invoked when an RPC times out
463 * @xprt: controlling RPC transport
464 * @task: RPC task that timed out
465 *
466 * Invoked when the transport is still connected, but an RPC
467 * retransmit timeout occurs.
468 *
469 * Since RDMA connections don't have a keep-alive, forcibly
470 * disconnect and retry to connect. This drives full
471 * detection of the network path, and retransmissions of
472 * all pending RPCs.
473 */
474static void
475xprt_rdma_timer(struct rpc_xprt *xprt, struct rpc_task *task)
476{
Chuck Lever33849792017-04-11 13:22:46 -0400477 xprt_force_disconnect(xprt);
478}
479
Chuck Leverf26c32f2018-10-01 14:26:40 -0400480/**
Chuck Lever675dd902019-06-19 10:33:42 -0400481 * xprt_rdma_set_connect_timeout - set timeouts for establishing a connection
482 * @xprt: controlling transport instance
483 * @connect_timeout: reconnect timeout after client disconnects
484 * @reconnect_timeout: reconnect timeout after server disconnects
485 *
486 */
Chuck Lever2a7f77c72019-08-19 18:49:30 -0400487static void xprt_rdma_set_connect_timeout(struct rpc_xprt *xprt,
488 unsigned long connect_timeout,
489 unsigned long reconnect_timeout)
Chuck Lever675dd902019-06-19 10:33:42 -0400490{
491 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
492
493 trace_xprtrdma_op_set_cto(r_xprt, connect_timeout, reconnect_timeout);
494
495 spin_lock(&xprt->transport_lock);
496
497 if (connect_timeout < xprt->connect_timeout) {
498 struct rpc_timeout to;
499 unsigned long initval;
500
501 to = *xprt->timeout;
502 initval = connect_timeout;
503 if (initval < RPCRDMA_INIT_REEST_TO << 1)
504 initval = RPCRDMA_INIT_REEST_TO << 1;
505 to.to_initval = initval;
506 to.to_maxval = initval;
507 r_xprt->rx_timeout = to;
508 xprt->timeout = &r_xprt->rx_timeout;
509 xprt->connect_timeout = connect_timeout;
510 }
511
512 if (reconnect_timeout < xprt->max_reconnect_timeout)
513 xprt->max_reconnect_timeout = reconnect_timeout;
514
515 spin_unlock(&xprt->transport_lock);
516}
517
518/**
519 * xprt_rdma_connect - schedule an attempt to reconnect
Chuck Leverf26c32f2018-10-01 14:26:40 -0400520 * @xprt: transport state
Chuck Lever675dd902019-06-19 10:33:42 -0400521 * @task: RPC scheduler context (unused)
Chuck Leverf26c32f2018-10-01 14:26:40 -0400522 *
523 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400524static void
Trond Myklebust1b092092013-01-08 09:26:49 -0500525xprt_rdma_connect(struct rpc_xprt *xprt, struct rpc_task *task)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400526{
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400527 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
Chuck Lever675dd902019-06-19 10:33:42 -0400528 unsigned long delay;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400529
Chuck Lever395069f2018-12-19 11:00:00 -0500530 trace_xprtrdma_op_connect(r_xprt);
Chuck Lever675dd902019-06-19 10:33:42 -0400531
532 delay = 0;
Trond Myklebust0b9e7942010-04-16 16:41:57 -0400533 if (r_xprt->rx_ep.rep_connected != 0) {
Chuck Lever675dd902019-06-19 10:33:42 -0400534 delay = xprt_reconnect_delay(xprt);
535 xprt_reconnect_backoff(xprt, RPCRDMA_INIT_REEST_TO);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400536 }
Chuck Lever675dd902019-06-19 10:33:42 -0400537 queue_delayed_work(xprtiod_workqueue, &r_xprt->rx_connect_worker,
538 delay);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400539}
540
Chuck Lever48be5392018-05-04 15:35:04 -0400541/**
542 * xprt_rdma_alloc_slot - allocate an rpc_rqst
543 * @xprt: controlling RPC transport
544 * @task: RPC task requesting a fresh rpc_rqst
545 *
546 * tk_status values:
547 * %0 if task->tk_rqstp points to a fresh rpc_rqst
548 * %-EAGAIN if no rpc_rqst is available; queued on backlog
549 */
550static void
551xprt_rdma_alloc_slot(struct rpc_xprt *xprt, struct rpc_task *task)
552{
Chuck Leveredb41e62018-05-04 15:35:09 -0400553 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
554 struct rpcrdma_req *req;
Chuck Lever48be5392018-05-04 15:35:04 -0400555
Chuck Leveredb41e62018-05-04 15:35:09 -0400556 req = rpcrdma_buffer_get(&r_xprt->rx_buf);
557 if (!req)
Chuck Lever48be5392018-05-04 15:35:04 -0400558 goto out_sleep;
Chuck Leveredb41e62018-05-04 15:35:09 -0400559 task->tk_rqstp = &req->rl_slot;
Chuck Lever48be5392018-05-04 15:35:04 -0400560 task->tk_status = 0;
561 return;
562
563out_sleep:
Chuck Lever39579052019-08-19 18:43:17 -0400564 set_bit(XPRT_CONGESTED, &xprt->state);
Chuck Lever48be5392018-05-04 15:35:04 -0400565 rpc_sleep_on(&xprt->backlog, task, NULL);
Chuck Lever48be5392018-05-04 15:35:04 -0400566 task->tk_status = -EAGAIN;
567}
568
569/**
570 * xprt_rdma_free_slot - release an rpc_rqst
571 * @xprt: controlling RPC transport
572 * @rqst: rpc_rqst to release
573 *
574 */
575static void
576xprt_rdma_free_slot(struct rpc_xprt *xprt, struct rpc_rqst *rqst)
577{
Chuck Lever5828ceb2019-06-19 10:33:36 -0400578 struct rpcrdma_xprt *r_xprt =
579 container_of(xprt, struct rpcrdma_xprt, rx_xprt);
580
Chuck Lever48be5392018-05-04 15:35:04 -0400581 memset(rqst, 0, sizeof(*rqst));
Chuck Lever5828ceb2019-06-19 10:33:36 -0400582 rpcrdma_buffer_put(&r_xprt->rx_buf, rpcr_to_rdmar(rqst));
Chuck Lever39579052019-08-19 18:43:17 -0400583 if (unlikely(!rpc_wake_up_next(&xprt->backlog)))
584 clear_bit(XPRT_CONGESTED, &xprt->state);
Chuck Lever48be5392018-05-04 15:35:04 -0400585}
586
Chuck Lever0f665ce2019-04-24 09:39:27 -0400587static bool rpcrdma_check_regbuf(struct rpcrdma_xprt *r_xprt,
588 struct rpcrdma_regbuf *rb, size_t size,
589 gfp_t flags)
Chuck Lever9c40c492016-09-15 10:55:53 -0400590{
Chuck Lever0f665ce2019-04-24 09:39:27 -0400591 if (unlikely(rdmab_length(rb) < size)) {
592 if (!rpcrdma_regbuf_realloc(rb, size, flags))
593 return false;
594 r_xprt->rx_stats.hardway_register_count += size;
595 }
Chuck Lever9c40c492016-09-15 10:55:53 -0400596 return true;
597}
598
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400599/**
600 * xprt_rdma_allocate - allocate transport resources for an RPC
601 * @task: RPC task
602 *
603 * Return values:
604 * 0: Success; rq_buffer points to RPC buffer to use
605 * ENOMEM: Out of memory, call again later
606 * EIO: A permanent error occurred, do not retry
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400607 */
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400608static int
609xprt_rdma_allocate(struct rpc_task *task)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400610{
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400611 struct rpc_rqst *rqst = task->tk_rqstp;
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400612 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(rqst->rq_xprt);
Chuck Leveredb41e62018-05-04 15:35:09 -0400613 struct rpcrdma_req *req = rpcr_to_rdmar(rqst);
Chuck Levera0a1d502015-01-26 17:11:47 -0500614 gfp_t flags;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400615
Chuck Lever5d252f92016-01-07 14:50:10 -0500616 flags = RPCRDMA_DEF_GFP;
Chuck Levera0a1d502015-01-26 17:11:47 -0500617 if (RPC_IS_SWAPPER(task))
618 flags = __GFP_MEMALLOC | GFP_NOWAIT | __GFP_NOWARN;
619
Chuck Lever0f665ce2019-04-24 09:39:27 -0400620 if (!rpcrdma_check_regbuf(r_xprt, req->rl_sendbuf, rqst->rq_callsize,
621 flags))
Chuck Lever9c40c492016-09-15 10:55:53 -0400622 goto out_fail;
Chuck Lever0f665ce2019-04-24 09:39:27 -0400623 if (!rpcrdma_check_regbuf(r_xprt, req->rl_recvbuf, rqst->rq_rcvsize,
624 flags))
Chuck Lever9c40c492016-09-15 10:55:53 -0400625 goto out_fail;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400626
Chuck Lever8cec3db2019-04-24 09:39:16 -0400627 rqst->rq_buffer = rdmab_data(req->rl_sendbuf);
628 rqst->rq_rbuffer = rdmab_data(req->rl_recvbuf);
Chuck Lever395069f2018-12-19 11:00:00 -0500629 trace_xprtrdma_op_allocate(task, req);
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400630 return 0;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400631
Chuck Lever0ca77dc2015-01-21 11:04:08 -0500632out_fail:
Chuck Lever395069f2018-12-19 11:00:00 -0500633 trace_xprtrdma_op_allocate(task, NULL);
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400634 return -ENOMEM;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400635}
636
Chuck Lever3435c742016-09-15 10:55:29 -0400637/**
638 * xprt_rdma_free - release resources allocated by xprt_rdma_allocate
639 * @task: RPC task
640 *
641 * Caller guarantees rqst->rq_buffer is non-NULL.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400642 */
643static void
Chuck Lever3435c742016-09-15 10:55:29 -0400644xprt_rdma_free(struct rpc_task *task)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400645{
Chuck Lever3435c742016-09-15 10:55:29 -0400646 struct rpc_rqst *rqst = task->tk_rqstp;
647 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(rqst->rq_xprt);
648 struct rpcrdma_req *req = rpcr_to_rdmar(rqst);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400649
Chuck Lever395069f2018-12-19 11:00:00 -0500650 trace_xprtrdma_op_free(task, req);
Chuck Lever0ab11522019-06-19 10:33:15 -0400651
652 if (!list_empty(&req->rl_registered))
653 frwr_unmap_sync(r_xprt, req);
654
655 /* XXX: If the RPC is completing because of a signal and
656 * not because a reply was received, we ought to ensure
657 * that the Send completion has fired, so that memory
658 * involved with the Send is not still visible to the NIC.
659 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400660}
661
Chuck Lever7a89f9c2016-06-29 13:53:43 -0400662/**
663 * xprt_rdma_send_request - marshal and send an RPC request
Trond Myklebustadfa7142018-09-03 23:58:59 -0400664 * @rqst: RPC message in rq_snd_buf
Chuck Lever7a89f9c2016-06-29 13:53:43 -0400665 *
Chuck Leverbebd0312017-04-11 13:23:10 -0400666 * Caller holds the transport's write lock.
667 *
Chuck Levercf73daf2017-12-14 20:57:31 -0500668 * Returns:
669 * %0 if the RPC message has been sent
670 * %-ENOTCONN if the caller should reconnect and call again
Chuck Lever9e679d52018-02-28 15:30:44 -0500671 * %-EAGAIN if the caller should call again
672 * %-ENOBUFS if the caller should call again after a delay
Chuck Lever6946f822018-12-19 10:58:45 -0500673 * %-EMSGSIZE if encoding ran out of buffer space. The request
674 * was not sent. Do not try to send this message again.
675 * %-EIO if an I/O error occurred. The request was not sent.
676 * Do not try to send this message again.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400677 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400678static int
Trond Myklebustadfa7142018-09-03 23:58:59 -0400679xprt_rdma_send_request(struct rpc_rqst *rqst)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400680{
Trond Myklebusta4f08352013-01-08 09:10:21 -0500681 struct rpc_xprt *xprt = rqst->rq_xprt;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400682 struct rpcrdma_req *req = rpcr_to_rdmar(rqst);
683 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
Chuck Lever6ab59942014-07-29 17:23:43 -0400684 int rc = 0;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400685
Chuck Levercf73daf2017-12-14 20:57:31 -0500686#if defined(CONFIG_SUNRPC_BACKCHANNEL)
687 if (unlikely(!rqst->rq_buffer))
688 return xprt_rdma_bc_send_reply(rqst);
689#endif /* CONFIG_SUNRPC_BACKCHANNEL */
690
Chuck Leverbebd0312017-04-11 13:23:10 -0400691 if (!xprt_connected(xprt))
Chuck Lever0c0829b2018-12-19 10:58:40 -0500692 return -ENOTCONN;
Chuck Leverbebd0312017-04-11 13:23:10 -0400693
Trond Myklebust75891f52018-09-03 17:37:36 -0400694 if (!xprt_request_get_cong(xprt, rqst))
695 return -EBADSLT;
696
Chuck Lever09e60642017-08-10 12:47:12 -0400697 rc = rpcrdma_marshal_req(r_xprt, rqst);
Chuck Lever6ab59942014-07-29 17:23:43 -0400698 if (rc < 0)
699 goto failed_marshal;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400700
Tom Talpey575448b2008-10-09 15:00:40 -0400701 /* Must suppress retransmit to maintain credits */
Chuck Lever8a147932018-02-28 15:30:38 -0500702 if (rqst->rq_connect_cookie == xprt->connect_cookie)
Tom Talpey575448b2008-10-09 15:00:40 -0400703 goto drop_connection;
Chuck Lever78215752018-03-05 15:13:07 -0500704 rqst->rq_xtime = ktime_get();
Tom Talpey575448b2008-10-09 15:00:40 -0400705
706 if (rpcrdma_ep_post(&r_xprt->rx_ia, &r_xprt->rx_ep, req))
707 goto drop_connection;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400708
Trond Myklebustd60dbb22010-05-13 12:51:49 -0400709 rqst->rq_xmit_bytes_sent += rqst->rq_snd_buf.len;
Chuck Leverfb14ae82018-02-28 15:30:54 -0500710
711 /* An RPC with no reply will throw off credit accounting,
712 * so drop the connection to reset the credit grant.
713 */
Trond Myklebust50f484e2018-08-30 13:27:29 -0400714 if (!rpc_reply_expected(rqst->rq_task))
Chuck Leverfb14ae82018-02-28 15:30:54 -0500715 goto drop_connection;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400716 return 0;
Tom Talpey575448b2008-10-09 15:00:40 -0400717
Chuck Leverc93c6222014-05-28 10:35:14 -0400718failed_marshal:
Chuck Lever7a89f9c2016-06-29 13:53:43 -0400719 if (rc != -ENOTCONN)
720 return rc;
Tom Talpey575448b2008-10-09 15:00:40 -0400721drop_connection:
Chuck Lever0c0829b2018-12-19 10:58:40 -0500722 xprt_rdma_close(xprt);
723 return -ENOTCONN;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400724}
725
Chuck Lever5d252f92016-01-07 14:50:10 -0500726void xprt_rdma_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400727{
728 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
729 long idle_time = 0;
730
731 if (xprt_connected(xprt))
732 idle_time = (long)(jiffies - xprt->last_used) / HZ;
733
Chuck Lever763f7e42015-08-03 13:04:36 -0400734 seq_puts(seq, "\txprt:\trdma ");
735 seq_printf(seq, "%u %lu %lu %lu %ld %lu %lu %lu %llu %llu ",
736 0, /* need a local port? */
737 xprt->stat.bind_count,
738 xprt->stat.connect_count,
Chuck Lever8440a882018-10-01 14:25:41 -0400739 xprt->stat.connect_time / HZ,
Chuck Lever763f7e42015-08-03 13:04:36 -0400740 idle_time,
741 xprt->stat.sends,
742 xprt->stat.recvs,
743 xprt->stat.bad_xids,
744 xprt->stat.req_u,
745 xprt->stat.bklog_u);
Chuck Lever505bbe62016-06-29 13:52:54 -0400746 seq_printf(seq, "%lu %lu %lu %llu %llu %llu %llu %lu %lu %lu %lu ",
Chuck Lever763f7e42015-08-03 13:04:36 -0400747 r_xprt->rx_stats.read_chunk_count,
748 r_xprt->rx_stats.write_chunk_count,
749 r_xprt->rx_stats.reply_chunk_count,
750 r_xprt->rx_stats.total_rdma_request,
751 r_xprt->rx_stats.total_rdma_reply,
752 r_xprt->rx_stats.pullup_copy_count,
753 r_xprt->rx_stats.fixup_copy_count,
754 r_xprt->rx_stats.hardway_register_count,
755 r_xprt->rx_stats.failed_marshal_count,
Chuck Lever860477d2015-08-03 13:04:45 -0400756 r_xprt->rx_stats.bad_reply_count,
757 r_xprt->rx_stats.nomsg_call_count);
Chuck Lever01bb35c2017-10-20 10:48:36 -0400758 seq_printf(seq, "%lu %lu %lu %lu %lu %lu\n",
Chuck Lever61da8862018-10-01 14:25:25 -0400759 r_xprt->rx_stats.mrs_recycled,
Chuck Levere2ac2362016-06-29 13:54:00 -0400760 r_xprt->rx_stats.mrs_orphaned,
Chuck Leverc8b920b2016-09-15 10:57:16 -0400761 r_xprt->rx_stats.mrs_allocated,
Chuck Leverae729502017-10-20 10:48:12 -0400762 r_xprt->rx_stats.local_inv_needed,
Chuck Lever01bb35c2017-10-20 10:48:36 -0400763 r_xprt->rx_stats.empty_sendctx_q,
764 r_xprt->rx_stats.reply_waits_for_send);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400765}
766
Jeff Laytond67fa4d2015-06-03 16:14:29 -0400767static int
768xprt_rdma_enable_swap(struct rpc_xprt *xprt)
769{
Chuck Levera0451782015-10-24 17:26:29 -0400770 return 0;
Jeff Laytond67fa4d2015-06-03 16:14:29 -0400771}
772
773static void
774xprt_rdma_disable_swap(struct rpc_xprt *xprt)
775{
776}
777
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400778/*
779 * Plumbing for rpc transport switch and kernel module
780 */
781
Chuck Leverd31ae252017-08-01 12:00:39 -0400782static const struct rpc_xprt_ops xprt_rdma_procs = {
Chuck Levere7ce7102014-05-28 10:34:57 -0400783 .reserve_xprt = xprt_reserve_xprt_cong,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400784 .release_xprt = xprt_release_xprt_cong, /* sunrpc/xprt.c */
Chuck Lever48be5392018-05-04 15:35:04 -0400785 .alloc_slot = xprt_rdma_alloc_slot,
786 .free_slot = xprt_rdma_free_slot,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400787 .release_request = xprt_release_rqst_cong, /* ditto */
Trond Myklebust8ba6a922019-04-07 13:58:46 -0400788 .wait_for_reply_request = xprt_wait_for_reply_request_def, /* ditto */
Chuck Lever33849792017-04-11 13:22:46 -0400789 .timer = xprt_rdma_timer,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400790 .rpcbind = rpcb_getport_async, /* sunrpc/rpcb_clnt.c */
791 .set_port = xprt_rdma_set_port,
792 .connect = xprt_rdma_connect,
793 .buf_alloc = xprt_rdma_allocate,
794 .buf_free = xprt_rdma_free,
795 .send_request = xprt_rdma_send_request,
796 .close = xprt_rdma_close,
797 .destroy = xprt_rdma_destroy,
Chuck Lever2a7f77c72019-08-19 18:49:30 -0400798 .set_connect_timeout = xprt_rdma_set_connect_timeout,
Jeff Laytond67fa4d2015-06-03 16:14:29 -0400799 .print_stats = xprt_rdma_print_stats,
800 .enable_swap = xprt_rdma_enable_swap,
801 .disable_swap = xprt_rdma_disable_swap,
Chuck Leverf531a5d2015-10-24 17:27:43 -0400802 .inject_disconnect = xprt_rdma_inject_disconnect,
803#if defined(CONFIG_SUNRPC_BACKCHANNEL)
804 .bc_setup = xprt_rdma_bc_setup,
Chuck Lever6b26cc82016-05-02 14:40:40 -0400805 .bc_maxpayload = xprt_rdma_bc_maxpayload,
Trond Myklebust7402a4f2019-07-16 13:51:29 -0400806 .bc_num_slots = xprt_rdma_bc_max_slots,
Chuck Leverf531a5d2015-10-24 17:27:43 -0400807 .bc_free_rqst = xprt_rdma_bc_free_rqst,
808 .bc_destroy = xprt_rdma_bc_destroy,
809#endif
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400810};
811
812static struct xprt_class xprt_rdma = {
813 .list = LIST_HEAD_INIT(xprt_rdma.list),
814 .name = "rdma",
815 .owner = THIS_MODULE,
816 .ident = XPRT_TRANSPORT_RDMA,
817 .setup = xprt_setup_rdma,
818};
819
Chuck Leverffe1f0d2015-06-04 11:21:42 -0400820void xprt_rdma_cleanup(void)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400821{
Jeff Laytonf895b252014-11-17 16:58:04 -0500822#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400823 if (sunrpc_table_header) {
824 unregister_sysctl_table(sunrpc_table_header);
825 sunrpc_table_header = NULL;
826 }
827#endif
Chuck Lever951e7212015-05-26 11:52:25 -0400828
Chuck Leverddbb3472018-12-19 10:59:39 -0500829 xprt_unregister_transport(&xprt_rdma);
830 xprt_unregister_transport(&xprt_rdma_bc);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400831}
832
Chuck Leverffe1f0d2015-06-04 11:21:42 -0400833int xprt_rdma_init(void)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400834{
835 int rc;
836
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500837 rc = xprt_register_transport(&xprt_rdma);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400838 if (rc)
839 return rc;
840
Chuck Lever5d252f92016-01-07 14:50:10 -0500841 rc = xprt_register_transport(&xprt_rdma_bc);
842 if (rc) {
843 xprt_unregister_transport(&xprt_rdma);
Chuck Lever5d252f92016-01-07 14:50:10 -0500844 return rc;
845 }
846
Jeff Laytonf895b252014-11-17 16:58:04 -0500847#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400848 if (!sunrpc_table_header)
849 sunrpc_table_header = register_sysctl_table(sunrpc_table);
850#endif
851 return 0;
852}