blob: fbc171ebfe9172dd8eb9a29f35ce6ef3e9bdeea3 [file] [log] [blame]
Chuck Levera2268cf2018-05-04 15:34:32 -04001// SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -04002/*
Chuck Lever62b56a62017-10-30 16:22:14 -04003 * Copyright (c) 2014-2017 Oracle. All rights reserved.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -04004 * Copyright (c) 2003-2007 Network Appliance, Inc. All rights reserved.
5 *
6 * This software is available to you under a choice of one of two
7 * licenses. You may choose to be licensed under the terms of the GNU
8 * General Public License (GPL) Version 2, available from the file
9 * COPYING in the main directory of this source tree, or the BSD-type
10 * license below:
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 *
19 * Redistributions in binary form must reproduce the above
20 * copyright notice, this list of conditions and the following
21 * disclaimer in the documentation and/or other materials provided
22 * with the distribution.
23 *
24 * Neither the name of the Network Appliance, Inc. nor the names of
25 * its contributors may be used to endorse or promote products
26 * derived from this software without specific prior written
27 * permission.
28 *
29 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
30 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
31 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
32 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
33 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
34 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
35 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
36 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
37 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
38 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
39 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
40 */
41
42/*
43 * transport.c
44 *
45 * This file contains the top-level implementation of an RPC RDMA
46 * transport.
47 *
48 * Naming convention: functions beginning with xprt_ are part of the
49 * transport switch. All others are RPC RDMA internal.
50 */
51
52#include <linux/module.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090053#include <linux/slab.h>
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040054#include <linux/seq_file.h>
Chuck Leverbd2abef2018-05-07 15:27:16 -040055#include <linux/smp.h>
56
Jeff Layton59766872013-02-04 12:50:00 -050057#include <linux/sunrpc/addr.h>
Chuck Leverbd2abef2018-05-07 15:27:16 -040058#include <linux/sunrpc/svc_rdma.h>
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040059
60#include "xprt_rdma.h"
Chuck Leverb6e717cb2018-05-07 15:27:05 -040061#include <trace/events/rpcrdma.h>
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040062
Jeff Laytonf895b252014-11-17 16:58:04 -050063#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040064# define RPCDBG_FACILITY RPCDBG_TRANS
65#endif
66
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040067/*
68 * tunables
69 */
70
71static unsigned int xprt_rdma_slot_table_entries = RPCRDMA_DEF_SLOT_TABLE;
Chuck Lever5d252f92016-01-07 14:50:10 -050072unsigned int xprt_rdma_max_inline_read = RPCRDMA_DEF_INLINE;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040073static unsigned int xprt_rdma_max_inline_write = RPCRDMA_DEF_INLINE;
Chuck Leverce5b3712017-12-14 20:57:47 -050074unsigned int xprt_rdma_memreg_strategy = RPCRDMA_FRWR;
Chuck Leverfff09592017-04-11 13:22:54 -040075int xprt_rdma_pad_optimize;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040076
Jeff Laytonf895b252014-11-17 16:58:04 -050077#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040078
79static unsigned int min_slot_table_size = RPCRDMA_MIN_SLOT_TABLE;
80static unsigned int max_slot_table_size = RPCRDMA_MAX_SLOT_TABLE;
Chuck Lever29c55422016-05-02 14:40:48 -040081static unsigned int min_inline_size = RPCRDMA_MIN_INLINE;
82static unsigned int max_inline_size = RPCRDMA_MAX_INLINE;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040083static unsigned int zero;
84static unsigned int max_padding = PAGE_SIZE;
85static unsigned int min_memreg = RPCRDMA_BOUNCEBUFFERS;
86static unsigned int max_memreg = RPCRDMA_LAST - 1;
Chuck Lever10492702017-12-14 20:56:42 -050087static unsigned int dummy;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040088
89static struct ctl_table_header *sunrpc_table_header;
90
Joe Perchesfe2c6332013-06-11 23:04:25 -070091static struct ctl_table xr_tunables_table[] = {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040092 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040093 .procname = "rdma_slot_table_entries",
94 .data = &xprt_rdma_slot_table_entries,
95 .maxlen = sizeof(unsigned int),
96 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -080097 .proc_handler = proc_dointvec_minmax,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040098 .extra1 = &min_slot_table_size,
99 .extra2 = &max_slot_table_size
100 },
101 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400102 .procname = "rdma_max_inline_read",
103 .data = &xprt_rdma_max_inline_read,
104 .maxlen = sizeof(unsigned int),
105 .mode = 0644,
Chuck Lever44829d02016-09-15 10:57:32 -0400106 .proc_handler = proc_dointvec_minmax,
Chuck Lever29c55422016-05-02 14:40:48 -0400107 .extra1 = &min_inline_size,
108 .extra2 = &max_inline_size,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400109 },
110 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400111 .procname = "rdma_max_inline_write",
112 .data = &xprt_rdma_max_inline_write,
113 .maxlen = sizeof(unsigned int),
114 .mode = 0644,
Chuck Lever44829d02016-09-15 10:57:32 -0400115 .proc_handler = proc_dointvec_minmax,
Chuck Lever29c55422016-05-02 14:40:48 -0400116 .extra1 = &min_inline_size,
117 .extra2 = &max_inline_size,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400118 },
119 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400120 .procname = "rdma_inline_write_padding",
Chuck Lever10492702017-12-14 20:56:42 -0500121 .data = &dummy,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400122 .maxlen = sizeof(unsigned int),
123 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800124 .proc_handler = proc_dointvec_minmax,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400125 .extra1 = &zero,
126 .extra2 = &max_padding,
127 },
128 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400129 .procname = "rdma_memreg_strategy",
130 .data = &xprt_rdma_memreg_strategy,
131 .maxlen = sizeof(unsigned int),
132 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800133 .proc_handler = proc_dointvec_minmax,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400134 .extra1 = &min_memreg,
135 .extra2 = &max_memreg,
136 },
137 {
Tom Talpey9191ca32008-10-09 15:01:11 -0400138 .procname = "rdma_pad_optimize",
139 .data = &xprt_rdma_pad_optimize,
140 .maxlen = sizeof(unsigned int),
141 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800142 .proc_handler = proc_dointvec,
Tom Talpey9191ca32008-10-09 15:01:11 -0400143 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -0800144 { },
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400145};
146
Joe Perchesfe2c6332013-06-11 23:04:25 -0700147static struct ctl_table sunrpc_table[] = {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400148 {
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400149 .procname = "sunrpc",
150 .mode = 0555,
151 .child = xr_tunables_table
152 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -0800153 { },
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400154};
155
156#endif
157
Chuck Leverd31ae252017-08-01 12:00:39 -0400158static const struct rpc_xprt_ops xprt_rdma_procs;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400159
160static void
Chuck Lever0dd39ca2015-03-30 14:33:43 -0400161xprt_rdma_format_addresses4(struct rpc_xprt *xprt, struct sockaddr *sap)
162{
163 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
164 char buf[20];
165
166 snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr));
167 xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL);
168
169 xprt->address_strings[RPC_DISPLAY_NETID] = RPCBIND_NETID_RDMA;
170}
171
172static void
173xprt_rdma_format_addresses6(struct rpc_xprt *xprt, struct sockaddr *sap)
174{
175 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
176 char buf[40];
177
178 snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr);
179 xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL);
180
181 xprt->address_strings[RPC_DISPLAY_NETID] = RPCBIND_NETID_RDMA6;
182}
183
Chuck Lever5d252f92016-01-07 14:50:10 -0500184void
Chuck Lever5231eb92015-08-03 13:02:41 -0400185xprt_rdma_format_addresses(struct rpc_xprt *xprt, struct sockaddr *sap)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400186{
Chuck Lever0dd39ca2015-03-30 14:33:43 -0400187 char buf[128];
188
189 switch (sap->sa_family) {
190 case AF_INET:
191 xprt_rdma_format_addresses4(xprt, sap);
192 break;
193 case AF_INET6:
194 xprt_rdma_format_addresses6(xprt, sap);
195 break;
196 default:
197 pr_err("rpcrdma: Unrecognized address family\n");
198 return;
199 }
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400200
Chuck Leverc877b842009-08-09 15:09:36 -0400201 (void)rpc_ntop(sap, buf, sizeof(buf));
202 xprt->address_strings[RPC_DISPLAY_ADDR] = kstrdup(buf, GFP_KERNEL);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400203
Joe Perches81160e662010-03-08 12:15:59 -0800204 snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap));
Chuck Leverc877b842009-08-09 15:09:36 -0400205 xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400206
Joe Perches81160e662010-03-08 12:15:59 -0800207 snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap));
Chuck Leverc877b842009-08-09 15:09:36 -0400208 xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400209
Chuck Lever0dd39ca2015-03-30 14:33:43 -0400210 xprt->address_strings[RPC_DISPLAY_PROTO] = "rdma";
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400211}
212
Chuck Lever5d252f92016-01-07 14:50:10 -0500213void
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400214xprt_rdma_free_addresses(struct rpc_xprt *xprt)
215{
Chuck Lever33e01dc2008-01-14 12:32:20 -0500216 unsigned int i;
217
218 for (i = 0; i < RPC_DISPLAY_MAX; i++)
219 switch (i) {
220 case RPC_DISPLAY_PROTO:
221 case RPC_DISPLAY_NETID:
222 continue;
223 default:
224 kfree(xprt->address_strings[i]);
225 }
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400226}
227
Chuck Lever31e62d22018-10-01 14:26:08 -0400228/**
229 * xprt_rdma_connect_worker - establish connection in the background
230 * @work: worker thread context
231 *
232 * Requester holds the xprt's send lock to prevent activity on this
233 * transport while a fresh connection is being established. RPC tasks
234 * sleep on the xprt's pending queue waiting for connect to complete.
235 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400236static void
237xprt_rdma_connect_worker(struct work_struct *work)
238{
Chuck Lever5abefb82015-01-21 11:02:37 -0500239 struct rpcrdma_xprt *r_xprt = container_of(work, struct rpcrdma_xprt,
240 rx_connect_worker.work);
241 struct rpc_xprt *xprt = &r_xprt->rx_xprt;
Chuck Lever31e62d22018-10-01 14:26:08 -0400242 int rc;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400243
Trond Myklebustd19751e2012-09-11 17:21:25 -0400244 rc = rpcrdma_ep_connect(&r_xprt->rx_ep, &r_xprt->rx_ia);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400245 xprt_clear_connecting(xprt);
Chuck Lever31e62d22018-10-01 14:26:08 -0400246 if (r_xprt->rx_ep.rep_connected > 0) {
247 if (!xprt_test_and_set_connected(xprt)) {
248 xprt->stat.connect_count++;
249 xprt->stat.connect_time += (long)jiffies -
250 xprt->stat.connect_start;
251 xprt_wake_pending_tasks(xprt, -EAGAIN);
252 }
253 } else {
254 if (xprt_test_and_clear_connected(xprt))
255 xprt_wake_pending_tasks(xprt, rc);
256 }
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400257}
258
Chuck Leverf26c32f2018-10-01 14:26:40 -0400259/**
260 * xprt_rdma_inject_disconnect - inject a connection fault
261 * @xprt: transport context
262 *
263 * If @xprt is connected, disconnect it to simulate spurious connection
264 * loss.
265 */
Chuck Lever4a068252015-05-11 14:02:25 -0400266static void
267xprt_rdma_inject_disconnect(struct rpc_xprt *xprt)
268{
Chuck Leverad091182018-10-01 14:26:45 -0400269 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
Chuck Lever4a068252015-05-11 14:02:25 -0400270
Chuck Lever395069f2018-12-19 11:00:00 -0500271 trace_xprtrdma_op_inject_dsc(r_xprt);
Chuck Lever4a068252015-05-11 14:02:25 -0400272 rdma_disconnect(r_xprt->rx_ia.ri_id);
273}
274
Chuck Leverf26c32f2018-10-01 14:26:40 -0400275/**
276 * xprt_rdma_destroy - Full tear down of transport
277 * @xprt: doomed transport context
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400278 *
Chuck Leverf26c32f2018-10-01 14:26:40 -0400279 * Caller guarantees there will be no more calls to us with
280 * this @xprt.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400281 */
282static void
283xprt_rdma_destroy(struct rpc_xprt *xprt)
284{
285 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400286
Chuck Lever395069f2018-12-19 11:00:00 -0500287 trace_xprtrdma_op_destroy(r_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400288
Chuck Lever5abefb82015-01-21 11:02:37 -0500289 cancel_delayed_work_sync(&r_xprt->rx_connect_worker);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400290
Chuck Lever7f1d5412014-05-28 10:33:16 -0400291 rpcrdma_ep_destroy(&r_xprt->rx_ep, &r_xprt->rx_ia);
Steve Wise72c02172015-09-21 12:24:23 -0500292 rpcrdma_buffer_destroy(&r_xprt->rx_buf);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400293 rpcrdma_ia_close(&r_xprt->rx_ia);
294
295 xprt_rdma_free_addresses(xprt);
Pavel Emelyanove204e622010-09-29 16:03:13 +0400296 xprt_free(xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400297
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400298 module_put(THIS_MODULE);
299}
300
Trond Myklebust2881ae72007-12-20 16:03:54 -0500301static const struct rpc_timeout xprt_rdma_default_timeout = {
302 .to_initval = 60 * HZ,
303 .to_maxval = 60 * HZ,
304};
305
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400306/**
307 * xprt_setup_rdma - Set up transport to use RDMA
308 *
309 * @args: rpc transport arguments
310 */
311static struct rpc_xprt *
312xprt_setup_rdma(struct xprt_create *args)
313{
314 struct rpcrdma_create_data_internal cdata;
315 struct rpc_xprt *xprt;
316 struct rpcrdma_xprt *new_xprt;
317 struct rpcrdma_ep *new_ep;
Chuck Lever5231eb92015-08-03 13:02:41 -0400318 struct sockaddr *sap;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400319 int rc;
320
Chuck Leverddbb3472018-12-19 10:59:39 -0500321 if (args->addrlen > sizeof(xprt->addr))
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400322 return ERR_PTR(-EBADF);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400323
Chuck Leveredb41e62018-05-04 15:35:09 -0400324 xprt = xprt_alloc(args->net, sizeof(struct rpcrdma_xprt), 0, 0);
Chuck Leverddbb3472018-12-19 10:59:39 -0500325 if (!xprt)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400326 return ERR_PTR(-ENOMEM);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400327
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400328 /* 60 second timeout, no retries */
Trond Myklebustba7392b2007-12-20 16:03:55 -0500329 xprt->timeout = &xprt_rdma_default_timeout;
Chuck Leverbfaee092014-05-28 10:34:32 -0400330 xprt->bind_timeout = RPCRDMA_BIND_TO;
331 xprt->reestablish_timeout = RPCRDMA_INIT_REEST_TO;
332 xprt->idle_timeout = RPCRDMA_IDLE_DISC_TO;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400333
334 xprt->resvport = 0; /* privileged port not needed */
335 xprt->tsh_size = 0; /* RPC-RDMA handles framing */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400336 xprt->ops = &xprt_rdma_procs;
337
338 /*
339 * Set up RDMA-specific connect data.
340 */
Chuck Leverdd229ce2017-12-14 20:56:58 -0500341 sap = args->dstaddr;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400342
343 /* Ensure xprt->addr holds valid server TCP (not RDMA)
344 * address, for any side protocols which peek at it */
345 xprt->prot = IPPROTO_TCP;
346 xprt->addrlen = args->addrlen;
Chuck Lever5231eb92015-08-03 13:02:41 -0400347 memcpy(&xprt->addr, sap, xprt->addrlen);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400348
Chuck Lever5231eb92015-08-03 13:02:41 -0400349 if (rpc_get_port(sap))
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400350 xprt_set_bound(xprt);
Chuck Leverd461f1f2017-12-14 20:56:50 -0500351 xprt_rdma_format_addresses(xprt, sap);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400352
Chuck Leveredb41e62018-05-04 15:35:09 -0400353 cdata.max_requests = xprt_rdma_slot_table_entries;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400354
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400355 cdata.rsize = RPCRDMA_MAX_SEGS * PAGE_SIZE; /* RDMA write max */
356 cdata.wsize = RPCRDMA_MAX_SEGS * PAGE_SIZE; /* RDMA read max */
357
358 cdata.inline_wsize = xprt_rdma_max_inline_write;
359 if (cdata.inline_wsize > cdata.wsize)
360 cdata.inline_wsize = cdata.wsize;
361
362 cdata.inline_rsize = xprt_rdma_max_inline_read;
363 if (cdata.inline_rsize > cdata.rsize)
364 cdata.inline_rsize = cdata.rsize;
365
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400366 /*
367 * Create new transport instance, which includes initialized
368 * o ia
369 * o endpoint
370 * o buffers
371 */
372
373 new_xprt = rpcx_to_rdmax(xprt);
374
Chuck Leverdd229ce2017-12-14 20:56:58 -0500375 rc = rpcrdma_ia_open(new_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400376 if (rc)
377 goto out1;
378
379 /*
380 * initialize and create ep
381 */
382 new_xprt->rx_data = cdata;
383 new_ep = &new_xprt->rx_ep;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400384
385 rc = rpcrdma_ep_create(&new_xprt->rx_ep,
386 &new_xprt->rx_ia, &new_xprt->rx_data);
387 if (rc)
388 goto out2;
389
Chuck Leverac920d02015-01-21 11:03:44 -0500390 rc = rpcrdma_buffer_create(new_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400391 if (rc)
392 goto out3;
393
Chuck Lever5abefb82015-01-21 11:02:37 -0500394 INIT_DELAYED_WORK(&new_xprt->rx_connect_worker,
395 xprt_rdma_connect_worker);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400396
Chuck Lever5f624122018-12-19 10:59:01 -0500397 xprt->max_payload = frwr_maxpages(new_xprt);
Chuck Lever1c9351e2015-03-30 14:34:30 -0400398 if (xprt->max_payload == 0)
399 goto out4;
400 xprt->max_payload <<= PAGE_SHIFT;
Chuck Lever43e95982014-07-29 17:23:34 -0400401 dprintk("RPC: %s: transport data payload maximum: %zu bytes\n",
402 __func__, xprt->max_payload);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400403
404 if (!try_module_get(THIS_MODULE))
405 goto out4;
406
Chuck Lever5231eb92015-08-03 13:02:41 -0400407 dprintk("RPC: %s: %s:%s\n", __func__,
408 xprt->address_strings[RPC_DISPLAY_ADDR],
409 xprt->address_strings[RPC_DISPLAY_PORT]);
Chuck Leverb4744e02017-12-20 16:31:29 -0500410 trace_xprtrdma_create(new_xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400411 return xprt;
412
413out4:
Chuck Lever03ac1a72017-12-14 20:56:01 -0500414 rpcrdma_buffer_destroy(&new_xprt->rx_buf);
Chuck Lever03ac1a72017-12-14 20:56:01 -0500415 rc = -ENODEV;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400416out3:
Chuck Lever7f1d5412014-05-28 10:33:16 -0400417 rpcrdma_ep_destroy(new_ep, &new_xprt->rx_ia);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400418out2:
419 rpcrdma_ia_close(&new_xprt->rx_ia);
420out1:
Chuck Lever395069f2018-12-19 11:00:00 -0500421 trace_xprtrdma_op_destroy(new_xprt);
Chuck Leverd461f1f2017-12-14 20:56:50 -0500422 xprt_rdma_free_addresses(xprt);
Pavel Emelyanove204e622010-09-29 16:03:13 +0400423 xprt_free(xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400424 return ERR_PTR(rc);
425}
426
Chuck Leverbebd0312017-04-11 13:23:10 -0400427/**
Chuck Leverf26c32f2018-10-01 14:26:40 -0400428 * xprt_rdma_close - close a transport connection
429 * @xprt: transport context
Chuck Leverbebd0312017-04-11 13:23:10 -0400430 *
Chuck Lever395069f2018-12-19 11:00:00 -0500431 * Called during autoclose or device removal.
432 *
Chuck Leverf26c32f2018-10-01 14:26:40 -0400433 * Caller holds @xprt's send lock to prevent activity on this
434 * transport while the connection is torn down.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400435 */
Chuck Lever0c0829b2018-12-19 10:58:40 -0500436void xprt_rdma_close(struct rpc_xprt *xprt)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400437{
438 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
Chuck Leverbebd0312017-04-11 13:23:10 -0400439 struct rpcrdma_ep *ep = &r_xprt->rx_ep;
440 struct rpcrdma_ia *ia = &r_xprt->rx_ia;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400441
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500442 might_sleep();
443
Chuck Lever395069f2018-12-19 11:00:00 -0500444 trace_xprtrdma_op_close(r_xprt);
445
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500446 /* Prevent marshaling and sending of new requests */
447 xprt_clear_connected(xprt);
Chuck Leverbebd0312017-04-11 13:23:10 -0400448
449 if (test_and_clear_bit(RPCRDMA_IAF_REMOVING, &ia->ri_flags)) {
Chuck Leverbebd0312017-04-11 13:23:10 -0400450 rpcrdma_ia_remove(ia);
Chuck Lever0c0829b2018-12-19 10:58:40 -0500451 goto out;
Chuck Leverbebd0312017-04-11 13:23:10 -0400452 }
Chuck Lever0c0829b2018-12-19 10:58:40 -0500453
Chuck Leverbebd0312017-04-11 13:23:10 -0400454 if (ep->rep_connected == -ENODEV)
455 return;
456 if (ep->rep_connected > 0)
Tom Talpey08ca0dc2008-10-10 11:32:34 -0400457 xprt->reestablish_timeout = 0;
Chuck Leverbebd0312017-04-11 13:23:10 -0400458 rpcrdma_ep_disconnect(ep, ia);
Chuck Leveref739b22018-10-01 14:25:14 -0400459
460 /* Prepare @xprt for the next connection by reinitializing
461 * its credit grant to one (see RFC 8166, Section 3.3.3).
462 */
463 r_xprt->rx_buf.rb_credits = 1;
464 xprt->cwnd = RPC_CWNDSHIFT;
Chuck Lever0c0829b2018-12-19 10:58:40 -0500465
466out:
467 ++xprt->connect_cookie;
468 xprt_disconnect_done(xprt);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400469}
470
Chuck Lever20035ed2017-12-14 20:57:06 -0500471/**
472 * xprt_rdma_set_port - update server port with rpcbind result
473 * @xprt: controlling RPC transport
474 * @port: new port value
475 *
476 * Transport connect status is unchanged.
477 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400478static void
479xprt_rdma_set_port(struct rpc_xprt *xprt, u16 port)
480{
Chuck Lever20035ed2017-12-14 20:57:06 -0500481 struct sockaddr *sap = (struct sockaddr *)&xprt->addr;
482 char buf[8];
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400483
Chuck Lever20035ed2017-12-14 20:57:06 -0500484 dprintk("RPC: %s: setting port for xprt %p (%s:%s) to %u\n",
485 __func__, xprt,
486 xprt->address_strings[RPC_DISPLAY_ADDR],
487 xprt->address_strings[RPC_DISPLAY_PORT],
488 port);
489
490 rpc_set_port(sap, port);
491
492 kfree(xprt->address_strings[RPC_DISPLAY_PORT]);
493 snprintf(buf, sizeof(buf), "%u", port);
494 xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL);
495
496 kfree(xprt->address_strings[RPC_DISPLAY_HEX_PORT]);
497 snprintf(buf, sizeof(buf), "%4hx", port);
498 xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400499}
500
Chuck Lever33849792017-04-11 13:22:46 -0400501/**
502 * xprt_rdma_timer - invoked when an RPC times out
503 * @xprt: controlling RPC transport
504 * @task: RPC task that timed out
505 *
506 * Invoked when the transport is still connected, but an RPC
507 * retransmit timeout occurs.
508 *
509 * Since RDMA connections don't have a keep-alive, forcibly
510 * disconnect and retry to connect. This drives full
511 * detection of the network path, and retransmissions of
512 * all pending RPCs.
513 */
514static void
515xprt_rdma_timer(struct rpc_xprt *xprt, struct rpc_task *task)
516{
Chuck Lever33849792017-04-11 13:22:46 -0400517 xprt_force_disconnect(xprt);
518}
519
Chuck Leverf26c32f2018-10-01 14:26:40 -0400520/**
521 * xprt_rdma_connect - try to establish a transport connection
522 * @xprt: transport state
523 * @task: RPC scheduler context
524 *
525 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400526static void
Trond Myklebust1b092092013-01-08 09:26:49 -0500527xprt_rdma_connect(struct rpc_xprt *xprt, struct rpc_task *task)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400528{
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400529 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
530
Chuck Lever395069f2018-12-19 11:00:00 -0500531 trace_xprtrdma_op_connect(r_xprt);
Trond Myklebust0b9e7942010-04-16 16:41:57 -0400532 if (r_xprt->rx_ep.rep_connected != 0) {
533 /* Reconnect */
Chuck Lever5abefb82015-01-21 11:02:37 -0500534 schedule_delayed_work(&r_xprt->rx_connect_worker,
535 xprt->reestablish_timeout);
Trond Myklebust0b9e7942010-04-16 16:41:57 -0400536 xprt->reestablish_timeout <<= 1;
Chuck Leverbfaee092014-05-28 10:34:32 -0400537 if (xprt->reestablish_timeout > RPCRDMA_MAX_REEST_TO)
538 xprt->reestablish_timeout = RPCRDMA_MAX_REEST_TO;
539 else if (xprt->reestablish_timeout < RPCRDMA_INIT_REEST_TO)
540 xprt->reestablish_timeout = RPCRDMA_INIT_REEST_TO;
Trond Myklebust0b9e7942010-04-16 16:41:57 -0400541 } else {
Chuck Lever5abefb82015-01-21 11:02:37 -0500542 schedule_delayed_work(&r_xprt->rx_connect_worker, 0);
Trond Myklebust0b9e7942010-04-16 16:41:57 -0400543 if (!RPC_IS_ASYNC(task))
Chuck Lever5abefb82015-01-21 11:02:37 -0500544 flush_delayed_work(&r_xprt->rx_connect_worker);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400545 }
546}
547
Chuck Lever48be5392018-05-04 15:35:04 -0400548/**
549 * xprt_rdma_alloc_slot - allocate an rpc_rqst
550 * @xprt: controlling RPC transport
551 * @task: RPC task requesting a fresh rpc_rqst
552 *
553 * tk_status values:
554 * %0 if task->tk_rqstp points to a fresh rpc_rqst
555 * %-EAGAIN if no rpc_rqst is available; queued on backlog
556 */
557static void
558xprt_rdma_alloc_slot(struct rpc_xprt *xprt, struct rpc_task *task)
559{
Chuck Leveredb41e62018-05-04 15:35:09 -0400560 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
561 struct rpcrdma_req *req;
Chuck Lever48be5392018-05-04 15:35:04 -0400562
Chuck Leveredb41e62018-05-04 15:35:09 -0400563 req = rpcrdma_buffer_get(&r_xprt->rx_buf);
564 if (!req)
Chuck Lever48be5392018-05-04 15:35:04 -0400565 goto out_sleep;
Chuck Leveredb41e62018-05-04 15:35:09 -0400566 task->tk_rqstp = &req->rl_slot;
Chuck Lever48be5392018-05-04 15:35:04 -0400567 task->tk_status = 0;
568 return;
569
570out_sleep:
571 rpc_sleep_on(&xprt->backlog, task, NULL);
Chuck Lever48be5392018-05-04 15:35:04 -0400572 task->tk_status = -EAGAIN;
573}
574
575/**
576 * xprt_rdma_free_slot - release an rpc_rqst
577 * @xprt: controlling RPC transport
578 * @rqst: rpc_rqst to release
579 *
580 */
581static void
582xprt_rdma_free_slot(struct rpc_xprt *xprt, struct rpc_rqst *rqst)
583{
584 memset(rqst, 0, sizeof(*rqst));
Chuck Leveredb41e62018-05-04 15:35:09 -0400585 rpcrdma_buffer_put(rpcr_to_rdmar(rqst));
Chuck Lever48be5392018-05-04 15:35:04 -0400586 rpc_wake_up_next(&xprt->backlog);
Chuck Lever48be5392018-05-04 15:35:04 -0400587}
588
Chuck Lever9c40c492016-09-15 10:55:53 -0400589static bool
590rpcrdma_get_sendbuf(struct rpcrdma_xprt *r_xprt, struct rpcrdma_req *req,
591 size_t size, gfp_t flags)
592{
593 struct rpcrdma_regbuf *rb;
Chuck Lever9c40c492016-09-15 10:55:53 -0400594
595 if (req->rl_sendbuf && rdmab_length(req->rl_sendbuf) >= size)
596 return true;
597
Chuck Lever655fec62016-09-15 10:57:24 -0400598 rb = rpcrdma_alloc_regbuf(size, DMA_TO_DEVICE, flags);
Chuck Lever9c40c492016-09-15 10:55:53 -0400599 if (IS_ERR(rb))
600 return false;
601
Chuck Lever13650c22016-09-15 10:56:26 -0400602 rpcrdma_free_regbuf(req->rl_sendbuf);
Chuck Lever655fec62016-09-15 10:57:24 -0400603 r_xprt->rx_stats.hardway_register_count += size;
Chuck Lever9c40c492016-09-15 10:55:53 -0400604 req->rl_sendbuf = rb;
605 return true;
606}
607
608/* The rq_rcv_buf is used only if a Reply chunk is necessary.
609 * The decision to use a Reply chunk is made later in
610 * rpcrdma_marshal_req. This buffer is registered at that time.
611 *
612 * Otherwise, the associated RPC Reply arrives in a separate
613 * Receive buffer, arbitrarily chosen by the HCA. The buffer
614 * allocated here for the RPC Reply is not utilized in that
615 * case. See rpcrdma_inline_fixup.
616 *
617 * A regbuf is used here to remember the buffer size.
618 */
619static bool
620rpcrdma_get_recvbuf(struct rpcrdma_xprt *r_xprt, struct rpcrdma_req *req,
621 size_t size, gfp_t flags)
622{
623 struct rpcrdma_regbuf *rb;
624
625 if (req->rl_recvbuf && rdmab_length(req->rl_recvbuf) >= size)
626 return true;
627
Chuck Lever13650c22016-09-15 10:56:26 -0400628 rb = rpcrdma_alloc_regbuf(size, DMA_NONE, flags);
Chuck Lever9c40c492016-09-15 10:55:53 -0400629 if (IS_ERR(rb))
630 return false;
631
Chuck Lever13650c22016-09-15 10:56:26 -0400632 rpcrdma_free_regbuf(req->rl_recvbuf);
Chuck Lever9c40c492016-09-15 10:55:53 -0400633 r_xprt->rx_stats.hardway_register_count += size;
634 req->rl_recvbuf = rb;
635 return true;
636}
637
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400638/**
639 * xprt_rdma_allocate - allocate transport resources for an RPC
640 * @task: RPC task
641 *
642 * Return values:
643 * 0: Success; rq_buffer points to RPC buffer to use
644 * ENOMEM: Out of memory, call again later
645 * EIO: A permanent error occurred, do not retry
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400646 */
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400647static int
648xprt_rdma_allocate(struct rpc_task *task)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400649{
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400650 struct rpc_rqst *rqst = task->tk_rqstp;
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400651 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(rqst->rq_xprt);
Chuck Leveredb41e62018-05-04 15:35:09 -0400652 struct rpcrdma_req *req = rpcr_to_rdmar(rqst);
Chuck Levera0a1d502015-01-26 17:11:47 -0500653 gfp_t flags;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400654
Chuck Lever5d252f92016-01-07 14:50:10 -0500655 flags = RPCRDMA_DEF_GFP;
Chuck Levera0a1d502015-01-26 17:11:47 -0500656 if (RPC_IS_SWAPPER(task))
657 flags = __GFP_MEMALLOC | GFP_NOWAIT | __GFP_NOWARN;
658
Chuck Lever9c40c492016-09-15 10:55:53 -0400659 if (!rpcrdma_get_sendbuf(r_xprt, req, rqst->rq_callsize, flags))
660 goto out_fail;
661 if (!rpcrdma_get_recvbuf(r_xprt, req, rqst->rq_rcvsize, flags))
662 goto out_fail;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400663
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400664 rqst->rq_buffer = req->rl_sendbuf->rg_base;
Chuck Lever9c40c492016-09-15 10:55:53 -0400665 rqst->rq_rbuffer = req->rl_recvbuf->rg_base;
Chuck Lever395069f2018-12-19 11:00:00 -0500666 trace_xprtrdma_op_allocate(task, req);
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400667 return 0;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400668
Chuck Lever0ca77dc2015-01-21 11:04:08 -0500669out_fail:
Chuck Lever395069f2018-12-19 11:00:00 -0500670 trace_xprtrdma_op_allocate(task, NULL);
Chuck Lever5fe6eaa2016-09-15 10:55:20 -0400671 return -ENOMEM;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400672}
673
Chuck Lever3435c742016-09-15 10:55:29 -0400674/**
675 * xprt_rdma_free - release resources allocated by xprt_rdma_allocate
676 * @task: RPC task
677 *
678 * Caller guarantees rqst->rq_buffer is non-NULL.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400679 */
680static void
Chuck Lever3435c742016-09-15 10:55:29 -0400681xprt_rdma_free(struct rpc_task *task)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400682{
Chuck Lever3435c742016-09-15 10:55:29 -0400683 struct rpc_rqst *rqst = task->tk_rqstp;
684 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(rqst->rq_xprt);
685 struct rpcrdma_req *req = rpcr_to_rdmar(rqst);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400686
Chuck Lever0ba6f372017-10-20 10:48:28 -0400687 if (test_bit(RPCRDMA_REQ_F_PENDING, &req->rl_flags))
688 rpcrdma_release_rqst(r_xprt, req);
Chuck Lever395069f2018-12-19 11:00:00 -0500689 trace_xprtrdma_op_free(task, req);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400690}
691
Chuck Lever7a89f9c2016-06-29 13:53:43 -0400692/**
693 * xprt_rdma_send_request - marshal and send an RPC request
Trond Myklebustadfa7142018-09-03 23:58:59 -0400694 * @rqst: RPC message in rq_snd_buf
Chuck Lever7a89f9c2016-06-29 13:53:43 -0400695 *
Chuck Leverbebd0312017-04-11 13:23:10 -0400696 * Caller holds the transport's write lock.
697 *
Chuck Levercf73daf2017-12-14 20:57:31 -0500698 * Returns:
699 * %0 if the RPC message has been sent
700 * %-ENOTCONN if the caller should reconnect and call again
Chuck Lever9e679d52018-02-28 15:30:44 -0500701 * %-EAGAIN if the caller should call again
702 * %-ENOBUFS if the caller should call again after a delay
Chuck Lever6946f822018-12-19 10:58:45 -0500703 * %-EMSGSIZE if encoding ran out of buffer space. The request
704 * was not sent. Do not try to send this message again.
705 * %-EIO if an I/O error occurred. The request was not sent.
706 * Do not try to send this message again.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400707 */
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400708static int
Trond Myklebustadfa7142018-09-03 23:58:59 -0400709xprt_rdma_send_request(struct rpc_rqst *rqst)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400710{
Trond Myklebusta4f08352013-01-08 09:10:21 -0500711 struct rpc_xprt *xprt = rqst->rq_xprt;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400712 struct rpcrdma_req *req = rpcr_to_rdmar(rqst);
713 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
Chuck Lever6ab59942014-07-29 17:23:43 -0400714 int rc = 0;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400715
Chuck Levercf73daf2017-12-14 20:57:31 -0500716#if defined(CONFIG_SUNRPC_BACKCHANNEL)
717 if (unlikely(!rqst->rq_buffer))
718 return xprt_rdma_bc_send_reply(rqst);
719#endif /* CONFIG_SUNRPC_BACKCHANNEL */
720
Chuck Leverbebd0312017-04-11 13:23:10 -0400721 if (!xprt_connected(xprt))
Chuck Lever0c0829b2018-12-19 10:58:40 -0500722 return -ENOTCONN;
Chuck Leverbebd0312017-04-11 13:23:10 -0400723
Trond Myklebust75891f52018-09-03 17:37:36 -0400724 if (!xprt_request_get_cong(xprt, rqst))
725 return -EBADSLT;
726
Chuck Lever09e60642017-08-10 12:47:12 -0400727 rc = rpcrdma_marshal_req(r_xprt, rqst);
Chuck Lever6ab59942014-07-29 17:23:43 -0400728 if (rc < 0)
729 goto failed_marshal;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400730
Tom Talpey575448b2008-10-09 15:00:40 -0400731 /* Must suppress retransmit to maintain credits */
Chuck Lever8a147932018-02-28 15:30:38 -0500732 if (rqst->rq_connect_cookie == xprt->connect_cookie)
Tom Talpey575448b2008-10-09 15:00:40 -0400733 goto drop_connection;
Chuck Lever78215752018-03-05 15:13:07 -0500734 rqst->rq_xtime = ktime_get();
Tom Talpey575448b2008-10-09 15:00:40 -0400735
Chuck Lever42b9f5c2017-12-14 20:56:18 -0500736 __set_bit(RPCRDMA_REQ_F_PENDING, &req->rl_flags);
Tom Talpey575448b2008-10-09 15:00:40 -0400737 if (rpcrdma_ep_post(&r_xprt->rx_ia, &r_xprt->rx_ep, req))
738 goto drop_connection;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400739
Trond Myklebustd60dbb22010-05-13 12:51:49 -0400740 rqst->rq_xmit_bytes_sent += rqst->rq_snd_buf.len;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400741 rqst->rq_bytes_sent = 0;
Chuck Leverfb14ae82018-02-28 15:30:54 -0500742
743 /* An RPC with no reply will throw off credit accounting,
744 * so drop the connection to reset the credit grant.
745 */
Trond Myklebust50f484e2018-08-30 13:27:29 -0400746 if (!rpc_reply_expected(rqst->rq_task))
Chuck Leverfb14ae82018-02-28 15:30:54 -0500747 goto drop_connection;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400748 return 0;
Tom Talpey575448b2008-10-09 15:00:40 -0400749
Chuck Leverc93c6222014-05-28 10:35:14 -0400750failed_marshal:
Chuck Lever7a89f9c2016-06-29 13:53:43 -0400751 if (rc != -ENOTCONN)
752 return rc;
Tom Talpey575448b2008-10-09 15:00:40 -0400753drop_connection:
Chuck Lever0c0829b2018-12-19 10:58:40 -0500754 xprt_rdma_close(xprt);
755 return -ENOTCONN;
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400756}
757
Chuck Lever5d252f92016-01-07 14:50:10 -0500758void xprt_rdma_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400759{
760 struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt);
761 long idle_time = 0;
762
763 if (xprt_connected(xprt))
764 idle_time = (long)(jiffies - xprt->last_used) / HZ;
765
Chuck Lever763f7e42015-08-03 13:04:36 -0400766 seq_puts(seq, "\txprt:\trdma ");
767 seq_printf(seq, "%u %lu %lu %lu %ld %lu %lu %lu %llu %llu ",
768 0, /* need a local port? */
769 xprt->stat.bind_count,
770 xprt->stat.connect_count,
Chuck Lever8440a882018-10-01 14:25:41 -0400771 xprt->stat.connect_time / HZ,
Chuck Lever763f7e42015-08-03 13:04:36 -0400772 idle_time,
773 xprt->stat.sends,
774 xprt->stat.recvs,
775 xprt->stat.bad_xids,
776 xprt->stat.req_u,
777 xprt->stat.bklog_u);
Chuck Lever505bbe62016-06-29 13:52:54 -0400778 seq_printf(seq, "%lu %lu %lu %llu %llu %llu %llu %lu %lu %lu %lu ",
Chuck Lever763f7e42015-08-03 13:04:36 -0400779 r_xprt->rx_stats.read_chunk_count,
780 r_xprt->rx_stats.write_chunk_count,
781 r_xprt->rx_stats.reply_chunk_count,
782 r_xprt->rx_stats.total_rdma_request,
783 r_xprt->rx_stats.total_rdma_reply,
784 r_xprt->rx_stats.pullup_copy_count,
785 r_xprt->rx_stats.fixup_copy_count,
786 r_xprt->rx_stats.hardway_register_count,
787 r_xprt->rx_stats.failed_marshal_count,
Chuck Lever860477d2015-08-03 13:04:45 -0400788 r_xprt->rx_stats.bad_reply_count,
789 r_xprt->rx_stats.nomsg_call_count);
Chuck Lever01bb35c2017-10-20 10:48:36 -0400790 seq_printf(seq, "%lu %lu %lu %lu %lu %lu\n",
Chuck Lever61da8862018-10-01 14:25:25 -0400791 r_xprt->rx_stats.mrs_recycled,
Chuck Levere2ac2362016-06-29 13:54:00 -0400792 r_xprt->rx_stats.mrs_orphaned,
Chuck Leverc8b920b2016-09-15 10:57:16 -0400793 r_xprt->rx_stats.mrs_allocated,
Chuck Leverae729502017-10-20 10:48:12 -0400794 r_xprt->rx_stats.local_inv_needed,
Chuck Lever01bb35c2017-10-20 10:48:36 -0400795 r_xprt->rx_stats.empty_sendctx_q,
796 r_xprt->rx_stats.reply_waits_for_send);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400797}
798
Jeff Laytond67fa4d2015-06-03 16:14:29 -0400799static int
800xprt_rdma_enable_swap(struct rpc_xprt *xprt)
801{
Chuck Levera0451782015-10-24 17:26:29 -0400802 return 0;
Jeff Laytond67fa4d2015-06-03 16:14:29 -0400803}
804
805static void
806xprt_rdma_disable_swap(struct rpc_xprt *xprt)
807{
808}
809
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400810/*
811 * Plumbing for rpc transport switch and kernel module
812 */
813
Chuck Leverd31ae252017-08-01 12:00:39 -0400814static const struct rpc_xprt_ops xprt_rdma_procs = {
Chuck Levere7ce7102014-05-28 10:34:57 -0400815 .reserve_xprt = xprt_reserve_xprt_cong,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400816 .release_xprt = xprt_release_xprt_cong, /* sunrpc/xprt.c */
Chuck Lever48be5392018-05-04 15:35:04 -0400817 .alloc_slot = xprt_rdma_alloc_slot,
818 .free_slot = xprt_rdma_free_slot,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400819 .release_request = xprt_release_rqst_cong, /* ditto */
820 .set_retrans_timeout = xprt_set_retrans_timeout_def, /* ditto */
Chuck Lever33849792017-04-11 13:22:46 -0400821 .timer = xprt_rdma_timer,
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400822 .rpcbind = rpcb_getport_async, /* sunrpc/rpcb_clnt.c */
823 .set_port = xprt_rdma_set_port,
824 .connect = xprt_rdma_connect,
825 .buf_alloc = xprt_rdma_allocate,
826 .buf_free = xprt_rdma_free,
827 .send_request = xprt_rdma_send_request,
828 .close = xprt_rdma_close,
829 .destroy = xprt_rdma_destroy,
Jeff Laytond67fa4d2015-06-03 16:14:29 -0400830 .print_stats = xprt_rdma_print_stats,
831 .enable_swap = xprt_rdma_enable_swap,
832 .disable_swap = xprt_rdma_disable_swap,
Chuck Leverf531a5d2015-10-24 17:27:43 -0400833 .inject_disconnect = xprt_rdma_inject_disconnect,
834#if defined(CONFIG_SUNRPC_BACKCHANNEL)
835 .bc_setup = xprt_rdma_bc_setup,
Chuck Lever6b26cc82016-05-02 14:40:40 -0400836 .bc_maxpayload = xprt_rdma_bc_maxpayload,
Chuck Leverf531a5d2015-10-24 17:27:43 -0400837 .bc_free_rqst = xprt_rdma_bc_free_rqst,
838 .bc_destroy = xprt_rdma_bc_destroy,
839#endif
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400840};
841
842static struct xprt_class xprt_rdma = {
843 .list = LIST_HEAD_INIT(xprt_rdma.list),
844 .name = "rdma",
845 .owner = THIS_MODULE,
846 .ident = XPRT_TRANSPORT_RDMA,
847 .setup = xprt_setup_rdma,
848};
849
Chuck Leverffe1f0d2015-06-04 11:21:42 -0400850void xprt_rdma_cleanup(void)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400851{
Jeff Laytonf895b252014-11-17 16:58:04 -0500852#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400853 if (sunrpc_table_header) {
854 unregister_sysctl_table(sunrpc_table_header);
855 sunrpc_table_header = NULL;
856 }
857#endif
Chuck Lever951e7212015-05-26 11:52:25 -0400858
Chuck Leverddbb3472018-12-19 10:59:39 -0500859 xprt_unregister_transport(&xprt_rdma);
860 xprt_unregister_transport(&xprt_rdma_bc);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400861}
862
Chuck Leverffe1f0d2015-06-04 11:21:42 -0400863int xprt_rdma_init(void)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400864{
865 int rc;
866
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500867 rc = xprt_register_transport(&xprt_rdma);
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400868 if (rc)
869 return rc;
870
Chuck Lever5d252f92016-01-07 14:50:10 -0500871 rc = xprt_register_transport(&xprt_rdma_bc);
872 if (rc) {
873 xprt_unregister_transport(&xprt_rdma);
Chuck Lever5d252f92016-01-07 14:50:10 -0500874 return rc;
875 }
876
Jeff Laytonf895b252014-11-17 16:58:04 -0500877#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -0400878 if (!sunrpc_table_header)
879 sunrpc_table_header = register_sysctl_table(sunrpc_table);
880#endif
881 return 0;
882}