blob: 21113bfd4ecaf6a3cb79329af81fb40168830d35 [file] [log] [blame]
Chuck Levera2268cf2018-05-04 15:34:32 -04001// SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -04002/*
Chuck Lever62b56a62017-10-30 16:22:14 -04003 * Copyright (c) 2014-2017 Oracle. All rights reserved.
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04004 * Copyright (c) 2003-2007 Network Appliance, Inc. All rights reserved.
5 *
6 * This software is available to you under a choice of one of two
7 * licenses. You may choose to be licensed under the terms of the GNU
8 * General Public License (GPL) Version 2, available from the file
9 * COPYING in the main directory of this source tree, or the BSD-type
10 * license below:
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 *
19 * Redistributions in binary form must reproduce the above
20 * copyright notice, this list of conditions and the following
21 * disclaimer in the documentation and/or other materials provided
22 * with the distribution.
23 *
24 * Neither the name of the Network Appliance, Inc. nor the names of
25 * its contributors may be used to endorse or promote products
26 * derived from this software without specific prior written
27 * permission.
28 *
29 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
30 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
31 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
32 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
33 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
34 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
35 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
36 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
37 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
38 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
39 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040040 */
41
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -040042/*
43 * verbs.c
44 *
45 * Encapsulates the major functions managing:
46 * o adapters
47 * o endpoints
48 * o connections
49 * o buffer memory
50 */
51
Alexey Dobriyana6b7a402011-06-06 10:43:46 +000052#include <linux/interrupt.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090053#include <linux/slab.h>
Chuck Lever0dd39ca2015-03-30 14:33:43 -040054#include <linux/sunrpc/addr.h>
Chuck Lever05c97462016-09-06 11:22:58 -040055#include <linux/sunrpc/svc_rdma.h>
Chuck Leverae729502017-10-20 10:48:12 -040056
57#include <asm-generic/barrier.h>
Chuck Lever65866f82014-05-28 10:33:59 -040058#include <asm/bitops.h>
Chuck Lever56a6bd12017-04-11 13:23:34 -040059
Chuck Lever0a904872017-02-08 17:00:35 -050060#include <rdma/ib_cm.h>
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -040061
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040062#include "xprt_rdma.h"
Chuck Leverb6e717cb2018-05-07 15:27:05 -040063#include <trace/events/rpcrdma.h>
\"Talpey, Thomas\f58851e2007-09-10 13:50:12 -040064
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -040065/*
66 * Globals/Macros
67 */
68
Jeff Laytonf895b252014-11-17 16:58:04 -050069#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -040070# define RPCDBG_FACILITY RPCDBG_TRANS
71#endif
72
73/*
74 * internal functions
75 */
Chuck Leverefd81e92018-05-04 15:35:41 -040076static void rpcrdma_sendctx_put_locked(struct rpcrdma_sendctx *sc);
Chuck Lever96cedde2017-12-14 20:57:55 -050077static void rpcrdma_mrs_create(struct rpcrdma_xprt *r_xprt);
78static void rpcrdma_mrs_destroy(struct rpcrdma_buffer *buf);
Chuck Lever7c8d9e72018-05-04 15:35:20 -040079static int rpcrdma_create_rep(struct rpcrdma_xprt *r_xprt, bool temp);
Chuck Leverbebd0312017-04-11 13:23:10 -040080static void rpcrdma_dma_unmap_regbuf(struct rpcrdma_regbuf *rb);
Chuck Lever6ceea362018-12-19 10:58:24 -050081static void rpcrdma_post_recvs(struct rpcrdma_xprt *r_xprt, bool temp);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -040082
Chuck Lever6d2d0ee2018-12-19 10:58:29 -050083/* Wait for outstanding transport work to finish.
84 */
85static void rpcrdma_xprt_drain(struct rpcrdma_xprt *r_xprt)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -040086{
Chuck Lever6d2d0ee2018-12-19 10:58:29 -050087 struct rpcrdma_buffer *buf = &r_xprt->rx_buf;
88 struct rpcrdma_ia *ia = &r_xprt->rx_ia;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -040089
Chuck Lever6d2d0ee2018-12-19 10:58:29 -050090 /* Flush Receives, then wait for deferred Reply work
91 * to complete.
92 */
93 ib_drain_qp(ia->ri_id->qp);
94 drain_workqueue(buf->rb_completion_wq);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -040095
Chuck Lever6d2d0ee2018-12-19 10:58:29 -050096 /* Deferred Reply processing might have scheduled
97 * local invalidations.
98 */
99 ib_drain_sq(ia->ri_id->qp);
Chuck Leverf1a03b72014-11-08 20:14:37 -0500100}
101
Chuck Lever31e62d22018-10-01 14:26:08 -0400102/**
Chuck Leverf9521d52018-10-01 14:26:13 -0400103 * rpcrdma_qp_event_handler - Handle one QP event (error notification)
104 * @event: details of the event
105 * @context: ep that owns QP where event occurred
106 *
107 * Called from the RDMA provider (device driver) possibly in an interrupt
108 * context.
109 */
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400110static void
Chuck Leverf9521d52018-10-01 14:26:13 -0400111rpcrdma_qp_event_handler(struct ib_event *event, void *context)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400112{
113 struct rpcrdma_ep *ep = context;
Chuck Lever643cf322017-12-20 16:31:45 -0500114 struct rpcrdma_xprt *r_xprt = container_of(ep, struct rpcrdma_xprt,
115 rx_ep);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400116
Chuck Leverf9521d52018-10-01 14:26:13 -0400117 trace_xprtrdma_qp_event(r_xprt, event);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400118}
119
Chuck Lever2fa8f882016-03-04 11:28:53 -0500120/**
121 * rpcrdma_wc_send - Invoked by RDMA provider for each polled Send WC
122 * @cq: completion queue (ignored)
123 * @wc: completed WR
124 *
Chuck Lever4220a072015-10-24 17:26:45 -0400125 */
126static void
Chuck Lever2fa8f882016-03-04 11:28:53 -0500127rpcrdma_wc_send(struct ib_cq *cq, struct ib_wc *wc)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400128{
Chuck Leverae729502017-10-20 10:48:12 -0400129 struct ib_cqe *cqe = wc->wr_cqe;
130 struct rpcrdma_sendctx *sc =
131 container_of(cqe, struct rpcrdma_sendctx, sc_cqe);
132
Chuck Lever2fa8f882016-03-04 11:28:53 -0500133 /* WARNING: Only wr_cqe and status are reliable at this point */
Chuck Leverab03eff2017-12-20 16:30:40 -0500134 trace_xprtrdma_wc_send(sc, wc);
Chuck Lever2fa8f882016-03-04 11:28:53 -0500135 if (wc->status != IB_WC_SUCCESS && wc->status != IB_WC_WR_FLUSH_ERR)
136 pr_err("rpcrdma: Send: %s (%u/0x%x)\n",
137 ib_wc_status_msg(wc->status),
138 wc->status, wc->vendor_err);
Chuck Leverae729502017-10-20 10:48:12 -0400139
140 rpcrdma_sendctx_put_locked(sc);
Chuck Leverfc664482014-05-28 10:33:25 -0400141}
142
Chuck Lever552bf222016-03-04 11:28:36 -0500143/**
Chuck Lever1519e962016-09-15 10:57:49 -0400144 * rpcrdma_wc_receive - Invoked by RDMA provider for each polled Receive WC
Chuck Lever552bf222016-03-04 11:28:36 -0500145 * @cq: completion queue (ignored)
146 * @wc: completed WR
147 *
148 */
Chuck Leverfe97b472015-10-24 17:27:10 -0400149static void
Chuck Lever1519e962016-09-15 10:57:49 -0400150rpcrdma_wc_receive(struct ib_cq *cq, struct ib_wc *wc)
Chuck Leverfc664482014-05-28 10:33:25 -0400151{
Chuck Lever552bf222016-03-04 11:28:36 -0500152 struct ib_cqe *cqe = wc->wr_cqe;
153 struct rpcrdma_rep *rep = container_of(cqe, struct rpcrdma_rep,
154 rr_cqe);
Chuck Lever6ceea362018-12-19 10:58:24 -0500155 struct rpcrdma_xprt *r_xprt = rep->rr_rxprt;
Chuck Leverfc664482014-05-28 10:33:25 -0400156
Chuck Lever6ceea362018-12-19 10:58:24 -0500157 /* WARNING: Only wr_cqe and status are reliable at this point */
Chuck Lever0e0b8542018-05-04 15:35:14 -0400158 trace_xprtrdma_wc_receive(wc);
Chuck Lever6ceea362018-12-19 10:58:24 -0500159 --r_xprt->rx_ep.rep_receive_count;
Chuck Lever85024272015-01-21 11:02:04 -0500160 if (wc->status != IB_WC_SUCCESS)
Chuck Lever6ceea362018-12-19 10:58:24 -0500161 goto out_flushed;
Chuck Leverfc664482014-05-28 10:33:25 -0400162
Chuck Lever85024272015-01-21 11:02:04 -0500163 /* status == SUCCESS means all fields in wc are trustworthy */
Chuck Lever96f87782017-08-03 14:30:03 -0400164 rpcrdma_set_xdrlen(&rep->rr_hdrbuf, wc->byte_len);
Chuck Leverc8b920b2016-09-15 10:57:16 -0400165 rep->rr_wc_flags = wc->wc_flags;
166 rep->rr_inv_rkey = wc->ex.invalidate_rkey;
167
Chuck Lever91a10c52017-04-11 13:23:02 -0400168 ib_dma_sync_single_for_cpu(rdmab_device(rep->rr_rdmabuf),
Chuck Lever6b1184c2015-01-21 11:04:25 -0500169 rdmab_addr(rep->rr_rdmabuf),
Chuck Levere2a67192017-08-03 14:30:44 -0400170 wc->byte_len, DMA_FROM_DEVICE);
Chuck Lever23826c72016-03-04 11:28:27 -0500171
Chuck Lever6ceea362018-12-19 10:58:24 -0500172 rpcrdma_post_recvs(r_xprt, false);
Chuck Leverd8f532d2017-10-16 15:01:30 -0400173 rpcrdma_reply_handler(rep);
Chuck Lever85024272015-01-21 11:02:04 -0500174 return;
Chuck Leverfe97b472015-10-24 17:27:10 -0400175
Chuck Lever6ceea362018-12-19 10:58:24 -0500176out_flushed:
Chuck Lever85024272015-01-21 11:02:04 -0500177 if (wc->status != IB_WC_WR_FLUSH_ERR)
Chuck Lever552bf222016-03-04 11:28:36 -0500178 pr_err("rpcrdma: Recv: %s (%u/0x%x)\n",
179 ib_wc_status_msg(wc->status),
180 wc->status, wc->vendor_err);
Chuck Lever6ceea362018-12-19 10:58:24 -0500181 rpcrdma_recv_buffer_put(rep);
Chuck Leverfc664482014-05-28 10:33:25 -0400182}
183
Chuck Lever87cfb9a2016-09-15 10:57:07 -0400184static void
185rpcrdma_update_connect_private(struct rpcrdma_xprt *r_xprt,
186 struct rdma_conn_param *param)
187{
188 struct rpcrdma_create_data_internal *cdata = &r_xprt->rx_data;
189 const struct rpcrdma_connect_private *pmsg = param->private_data;
190 unsigned int rsize, wsize;
191
Chuck Leverc8b920b2016-09-15 10:57:16 -0400192 /* Default settings for RPC-over-RDMA Version One */
Chuck Leverb5f0afb2017-02-08 16:59:54 -0500193 r_xprt->rx_ia.ri_implicit_roundup = xprt_rdma_pad_optimize;
Chuck Lever87cfb9a2016-09-15 10:57:07 -0400194 rsize = RPCRDMA_V1_DEF_INLINE_SIZE;
195 wsize = RPCRDMA_V1_DEF_INLINE_SIZE;
196
197 if (pmsg &&
198 pmsg->cp_magic == rpcrdma_cmp_magic &&
199 pmsg->cp_version == RPCRDMA_CMP_VERSION) {
Chuck Leverc95a3c62017-02-08 17:00:02 -0500200 r_xprt->rx_ia.ri_implicit_roundup = true;
Chuck Lever87cfb9a2016-09-15 10:57:07 -0400201 rsize = rpcrdma_decode_buffer_size(pmsg->cp_send_size);
202 wsize = rpcrdma_decode_buffer_size(pmsg->cp_recv_size);
203 }
204
205 if (rsize < cdata->inline_rsize)
206 cdata->inline_rsize = rsize;
207 if (wsize < cdata->inline_wsize)
208 cdata->inline_wsize = wsize;
Chuck Lever6d6bf722016-11-29 10:53:13 -0500209 dprintk("RPC: %s: max send %u, max recv %u\n",
210 __func__, cdata->inline_wsize, cdata->inline_rsize);
Chuck Lever87cfb9a2016-09-15 10:57:07 -0400211 rpcrdma_set_max_header_sizes(r_xprt);
212}
213
Chuck Leverae382882018-10-01 14:25:47 -0400214/**
215 * rpcrdma_cm_event_handler - Handle RDMA CM events
216 * @id: rdma_cm_id on which an event has occurred
217 * @event: details of the event
218 *
219 * Called with @id's mutex held. Returns 1 if caller should
220 * destroy @id, otherwise 0.
221 */
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400222static int
Chuck Leverae382882018-10-01 14:25:47 -0400223rpcrdma_cm_event_handler(struct rdma_cm_id *id, struct rdma_cm_event *event)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400224{
Chuck Levered97f1f2018-10-01 14:25:52 -0400225 struct rpcrdma_xprt *r_xprt = id->context;
226 struct rpcrdma_ia *ia = &r_xprt->rx_ia;
227 struct rpcrdma_ep *ep = &r_xprt->rx_ep;
228 struct rpc_xprt *xprt = &r_xprt->rx_xprt;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400229
Chuck Leverae382882018-10-01 14:25:47 -0400230 might_sleep();
231
Chuck Levered97f1f2018-10-01 14:25:52 -0400232 trace_xprtrdma_cm_event(r_xprt, event);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400233 switch (event->event) {
234 case RDMA_CM_EVENT_ADDR_RESOLVED:
235 case RDMA_CM_EVENT_ROUTE_RESOLVED:
Tom Talpey5675add2008-10-09 15:01:41 -0400236 ia->ri_async_rc = 0;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400237 complete(&ia->ri_done);
Chuck Lever316a6162018-10-01 14:26:03 -0400238 return 0;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400239 case RDMA_CM_EVENT_ADDR_ERROR:
Chuck Lever52d28fe2018-05-04 15:34:37 -0400240 ia->ri_async_rc = -EPROTO;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400241 complete(&ia->ri_done);
Chuck Lever316a6162018-10-01 14:26:03 -0400242 return 0;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400243 case RDMA_CM_EVENT_ROUTE_ERROR:
244 ia->ri_async_rc = -ENETUNREACH;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400245 complete(&ia->ri_done);
Chuck Lever316a6162018-10-01 14:26:03 -0400246 return 0;
Chuck Leverbebd0312017-04-11 13:23:10 -0400247 case RDMA_CM_EVENT_DEVICE_REMOVAL:
248#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
Chuck Leverd461f1f2017-12-14 20:56:50 -0500249 pr_info("rpcrdma: removing device %s for %s:%s\n",
Chuck Lever173b8f42017-06-08 11:53:00 -0400250 ia->ri_device->name,
Chuck Levered97f1f2018-10-01 14:25:52 -0400251 rpcrdma_addrstr(r_xprt), rpcrdma_portstr(r_xprt));
Chuck Leverbebd0312017-04-11 13:23:10 -0400252#endif
253 set_bit(RPCRDMA_IAF_REMOVING, &ia->ri_flags);
254 ep->rep_connected = -ENODEV;
Chuck Levered97f1f2018-10-01 14:25:52 -0400255 xprt_force_disconnect(xprt);
Chuck Leverbebd0312017-04-11 13:23:10 -0400256 wait_for_completion(&ia->ri_remove_done);
257
258 ia->ri_id = NULL;
Chuck Leverbebd0312017-04-11 13:23:10 -0400259 ia->ri_device = NULL;
260 /* Return 1 to ensure the core destroys the id. */
261 return 1;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400262 case RDMA_CM_EVENT_ESTABLISHED:
Chuck Levered97f1f2018-10-01 14:25:52 -0400263 ++xprt->connect_cookie;
Chuck Leveraadc5a92018-10-01 14:25:57 -0400264 ep->rep_connected = 1;
Chuck Levered97f1f2018-10-01 14:25:52 -0400265 rpcrdma_update_connect_private(r_xprt, &event->param.conn);
Chuck Lever31e62d22018-10-01 14:26:08 -0400266 wake_up_all(&ep->rep_connect_wait);
267 break;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400268 case RDMA_CM_EVENT_CONNECT_ERROR:
Chuck Leveraadc5a92018-10-01 14:25:57 -0400269 ep->rep_connected = -ENOTCONN;
Chuck Lever31e62d22018-10-01 14:26:08 -0400270 goto disconnected;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400271 case RDMA_CM_EVENT_UNREACHABLE:
Chuck Leveraadc5a92018-10-01 14:25:57 -0400272 ep->rep_connected = -ENETUNREACH;
Chuck Lever31e62d22018-10-01 14:26:08 -0400273 goto disconnected;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400274 case RDMA_CM_EVENT_REJECTED:
Chuck Leverd461f1f2017-12-14 20:56:50 -0500275 dprintk("rpcrdma: connection to %s:%s rejected: %s\n",
Chuck Levered97f1f2018-10-01 14:25:52 -0400276 rpcrdma_addrstr(r_xprt), rpcrdma_portstr(r_xprt),
Chuck Lever0a904872017-02-08 17:00:35 -0500277 rdma_reject_msg(id, event->status));
Chuck Leveraadc5a92018-10-01 14:25:57 -0400278 ep->rep_connected = -ECONNREFUSED;
Chuck Lever0a904872017-02-08 17:00:35 -0500279 if (event->status == IB_CM_REJ_STALE_CONN)
Chuck Leveraadc5a92018-10-01 14:25:57 -0400280 ep->rep_connected = -EAGAIN;
Chuck Lever31e62d22018-10-01 14:26:08 -0400281 goto disconnected;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400282 case RDMA_CM_EVENT_DISCONNECTED:
Chuck Leveraadc5a92018-10-01 14:25:57 -0400283 ep->rep_connected = -ECONNABORTED;
Chuck Lever31e62d22018-10-01 14:26:08 -0400284disconnected:
285 xprt_force_disconnect(xprt);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400286 wake_up_all(&ep->rep_connect_wait);
Chuck Lever316a6162018-10-01 14:26:03 -0400287 break;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400288 default:
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400289 break;
290 }
291
Chuck Lever5f624122018-12-19 10:59:01 -0500292 dprintk("RPC: %s: %s:%s on %s/frwr: %s\n", __func__,
Chuck Lever316a6162018-10-01 14:26:03 -0400293 rpcrdma_addrstr(r_xprt), rpcrdma_portstr(r_xprt),
Chuck Lever5f624122018-12-19 10:59:01 -0500294 ia->ri_device->name, rdma_event_msg(event->event));
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400295 return 0;
296}
297
298static struct rdma_cm_id *
Chuck Leverdd229ce2017-12-14 20:56:58 -0500299rpcrdma_create_id(struct rpcrdma_xprt *xprt, struct rpcrdma_ia *ia)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400300{
Chuck Lever109b88a2016-11-29 10:52:40 -0500301 unsigned long wtimeout = msecs_to_jiffies(RDMA_RESOLVE_TIMEOUT) + 1;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400302 struct rdma_cm_id *id;
303 int rc;
304
Chuck Leverb4744e02017-12-20 16:31:29 -0500305 trace_xprtrdma_conn_start(xprt);
306
Tom Talpey1a954052008-10-09 15:01:31 -0400307 init_completion(&ia->ri_done);
Chuck Leverbebd0312017-04-11 13:23:10 -0400308 init_completion(&ia->ri_remove_done);
Tom Talpey1a954052008-10-09 15:01:31 -0400309
Chuck Leverae382882018-10-01 14:25:47 -0400310 id = rdma_create_id(xprt->rx_xprt.xprt_net, rpcrdma_cm_event_handler,
Chuck Lever107c4be2018-05-04 15:34:42 -0400311 xprt, RDMA_PS_TCP, IB_QPT_RC);
Chuck Leverddbb3472018-12-19 10:59:39 -0500312 if (IS_ERR(id))
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400313 return id;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400314
Tom Talpey5675add2008-10-09 15:01:41 -0400315 ia->ri_async_rc = -ETIMEDOUT;
Chuck Leverdd229ce2017-12-14 20:56:58 -0500316 rc = rdma_resolve_addr(id, NULL,
317 (struct sockaddr *)&xprt->rx_xprt.addr,
318 RDMA_RESOLVE_TIMEOUT);
Chuck Leverddbb3472018-12-19 10:59:39 -0500319 if (rc)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400320 goto out;
Chuck Lever109b88a2016-11-29 10:52:40 -0500321 rc = wait_for_completion_interruptible_timeout(&ia->ri_done, wtimeout);
322 if (rc < 0) {
Chuck Leverb4744e02017-12-20 16:31:29 -0500323 trace_xprtrdma_conn_tout(xprt);
Chuck Lever109b88a2016-11-29 10:52:40 -0500324 goto out;
325 }
Devesh Sharmad0f36c42015-08-03 13:05:04 -0400326
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400327 rc = ia->ri_async_rc;
328 if (rc)
329 goto out;
330
Tom Talpey5675add2008-10-09 15:01:41 -0400331 ia->ri_async_rc = -ETIMEDOUT;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400332 rc = rdma_resolve_route(id, RDMA_RESOLVE_TIMEOUT);
Chuck Leverddbb3472018-12-19 10:59:39 -0500333 if (rc)
Chuck Lever56a6bd12017-04-11 13:23:34 -0400334 goto out;
Chuck Lever109b88a2016-11-29 10:52:40 -0500335 rc = wait_for_completion_interruptible_timeout(&ia->ri_done, wtimeout);
336 if (rc < 0) {
Chuck Leverb4744e02017-12-20 16:31:29 -0500337 trace_xprtrdma_conn_tout(xprt);
Chuck Lever56a6bd12017-04-11 13:23:34 -0400338 goto out;
Chuck Lever109b88a2016-11-29 10:52:40 -0500339 }
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400340 rc = ia->ri_async_rc;
341 if (rc)
Chuck Lever56a6bd12017-04-11 13:23:34 -0400342 goto out;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400343
344 return id;
Chuck Lever56a6bd12017-04-11 13:23:34 -0400345
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400346out:
347 rdma_destroy_id(id);
348 return ERR_PTR(rc);
349}
350
351/*
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400352 * Exported functions.
353 */
354
Chuck Leverfff09592017-04-11 13:22:54 -0400355/**
356 * rpcrdma_ia_open - Open and initialize an Interface Adapter.
Chuck Leverdd229ce2017-12-14 20:56:58 -0500357 * @xprt: transport with IA to (re)initialize
Chuck Leverfff09592017-04-11 13:22:54 -0400358 *
359 * Returns 0 on success, negative errno if an appropriate
360 * Interface Adapter could not be found and opened.
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400361 */
362int
Chuck Leverdd229ce2017-12-14 20:56:58 -0500363rpcrdma_ia_open(struct rpcrdma_xprt *xprt)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400364{
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400365 struct rpcrdma_ia *ia = &xprt->rx_ia;
Chuck Leverd1ed8572015-08-03 13:03:30 -0400366 int rc;
367
Chuck Leverdd229ce2017-12-14 20:56:58 -0500368 ia->ri_id = rpcrdma_create_id(xprt, ia);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400369 if (IS_ERR(ia->ri_id)) {
370 rc = PTR_ERR(ia->ri_id);
Chuck Leverfff09592017-04-11 13:22:54 -0400371 goto out_err;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400372 }
Chuck Lever89e0d1122015-05-26 11:51:56 -0400373 ia->ri_device = ia->ri_id->device;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400374
Christoph Hellwiged082d32016-09-05 12:56:17 +0200375 ia->ri_pd = ib_alloc_pd(ia->ri_device, 0);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400376 if (IS_ERR(ia->ri_pd)) {
377 rc = PTR_ERR(ia->ri_pd);
Chuck Leverb54054c2016-06-29 13:53:27 -0400378 pr_err("rpcrdma: ib_alloc_pd() returned %d\n", rc);
Chuck Leverfff09592017-04-11 13:22:54 -0400379 goto out_err;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400380 }
381
Chuck Leverfff09592017-04-11 13:22:54 -0400382 switch (xprt_rdma_memreg_strategy) {
Chuck Leverce5b3712017-12-14 20:57:47 -0500383 case RPCRDMA_FRWR:
Chuck Lever5f624122018-12-19 10:59:01 -0500384 if (frwr_is_supported(ia))
Chuck Leverb54054c2016-06-29 13:53:27 -0400385 break;
Chuck Leverb54054c2016-06-29 13:53:27 -0400386 /*FALLTHROUGH*/
Tom Talpeybd7ed1d2008-10-09 15:00:09 -0400387 default:
Chuck Leverfff09592017-04-11 13:22:54 -0400388 pr_err("rpcrdma: Device %s does not support memreg mode %d\n",
389 ia->ri_device->name, xprt_rdma_memreg_strategy);
Chuck Leverb54054c2016-06-29 13:53:27 -0400390 rc = -EINVAL;
Chuck Leverfff09592017-04-11 13:22:54 -0400391 goto out_err;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400392 }
393
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400394 return 0;
Chuck Lever5ae711a2015-01-21 11:03:19 -0500395
Chuck Leverfff09592017-04-11 13:22:54 -0400396out_err:
397 rpcrdma_ia_close(ia);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400398 return rc;
399}
400
Chuck Leverfff09592017-04-11 13:22:54 -0400401/**
Chuck Leverbebd0312017-04-11 13:23:10 -0400402 * rpcrdma_ia_remove - Handle device driver unload
403 * @ia: interface adapter being removed
404 *
405 * Divest transport H/W resources associated with this adapter,
406 * but allow it to be restored later.
407 */
408void
409rpcrdma_ia_remove(struct rpcrdma_ia *ia)
410{
411 struct rpcrdma_xprt *r_xprt = container_of(ia, struct rpcrdma_xprt,
412 rx_ia);
413 struct rpcrdma_ep *ep = &r_xprt->rx_ep;
414 struct rpcrdma_buffer *buf = &r_xprt->rx_buf;
415 struct rpcrdma_req *req;
416 struct rpcrdma_rep *rep;
417
418 cancel_delayed_work_sync(&buf->rb_refresh_worker);
419
420 /* This is similar to rpcrdma_ep_destroy, but:
421 * - Don't cancel the connect worker.
422 * - Don't call rpcrdma_ep_disconnect, which waits
423 * for another conn upcall, which will deadlock.
424 * - rdma_disconnect is unneeded, the underlying
425 * connection is already gone.
426 */
427 if (ia->ri_id->qp) {
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500428 rpcrdma_xprt_drain(r_xprt);
Chuck Leverbebd0312017-04-11 13:23:10 -0400429 rdma_destroy_qp(ia->ri_id);
430 ia->ri_id->qp = NULL;
431 }
432 ib_free_cq(ep->rep_attr.recv_cq);
Chuck Lever25524282018-03-19 14:23:16 -0400433 ep->rep_attr.recv_cq = NULL;
Chuck Leverbebd0312017-04-11 13:23:10 -0400434 ib_free_cq(ep->rep_attr.send_cq);
Chuck Lever25524282018-03-19 14:23:16 -0400435 ep->rep_attr.send_cq = NULL;
Chuck Leverbebd0312017-04-11 13:23:10 -0400436
437 /* The ULP is responsible for ensuring all DMA
438 * mappings and MRs are gone.
439 */
440 list_for_each_entry(rep, &buf->rb_recv_bufs, rr_list)
441 rpcrdma_dma_unmap_regbuf(rep->rr_rdmabuf);
442 list_for_each_entry(req, &buf->rb_allreqs, rl_all) {
443 rpcrdma_dma_unmap_regbuf(req->rl_rdmabuf);
444 rpcrdma_dma_unmap_regbuf(req->rl_sendbuf);
445 rpcrdma_dma_unmap_regbuf(req->rl_recvbuf);
446 }
Chuck Lever96cedde2017-12-14 20:57:55 -0500447 rpcrdma_mrs_destroy(buf);
Chuck Lever25524282018-03-19 14:23:16 -0400448 ib_dealloc_pd(ia->ri_pd);
449 ia->ri_pd = NULL;
Chuck Leverbebd0312017-04-11 13:23:10 -0400450
451 /* Allow waiters to continue */
452 complete(&ia->ri_remove_done);
Chuck Leverb4744e02017-12-20 16:31:29 -0500453
454 trace_xprtrdma_remove(r_xprt);
Chuck Leverbebd0312017-04-11 13:23:10 -0400455}
456
457/**
Chuck Leverfff09592017-04-11 13:22:54 -0400458 * rpcrdma_ia_close - Clean up/close an IA.
459 * @ia: interface adapter to close
460 *
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400461 */
462void
463rpcrdma_ia_close(struct rpcrdma_ia *ia)
464{
Tom Talpeyfee08ca2008-10-09 15:01:00 -0400465 if (ia->ri_id != NULL && !IS_ERR(ia->ri_id)) {
466 if (ia->ri_id->qp)
467 rdma_destroy_qp(ia->ri_id);
Chuck Lever56a6bd12017-04-11 13:23:34 -0400468 rdma_destroy_id(ia->ri_id);
Tom Talpeyfee08ca2008-10-09 15:01:00 -0400469 }
Chuck Leverfff09592017-04-11 13:22:54 -0400470 ia->ri_id = NULL;
471 ia->ri_device = NULL;
Chuck Lever6d446982015-05-26 11:51:27 -0400472
473 /* If the pd is still busy, xprtrdma missed freeing a resource */
474 if (ia->ri_pd && !IS_ERR(ia->ri_pd))
Jason Gunthorpe7dd78642015-08-05 14:34:31 -0600475 ib_dealloc_pd(ia->ri_pd);
Chuck Leverfff09592017-04-11 13:22:54 -0400476 ia->ri_pd = NULL;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400477}
478
479/*
480 * Create unconnected endpoint.
481 */
482int
483rpcrdma_ep_create(struct rpcrdma_ep *ep, struct rpcrdma_ia *ia,
Chuck Lever16f906d2017-02-08 17:00:10 -0500484 struct rpcrdma_create_data_internal *cdata)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400485{
Chuck Lever87cfb9a2016-09-15 10:57:07 -0400486 struct rpcrdma_connect_private *pmsg = &ep->rep_cm_private;
Chuck Leverfc664482014-05-28 10:33:25 -0400487 struct ib_cq *sendcq, *recvcq;
Chuck Lever914fcad2018-05-04 15:34:48 -0400488 unsigned int max_sge;
Chuck Lever2fa8f882016-03-04 11:28:53 -0500489 int rc;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400490
Steve Wise33023fb2018-06-18 08:05:26 -0700491 max_sge = min_t(unsigned int, ia->ri_device->attrs.max_send_sge,
Chuck Levereed50872017-03-11 15:52:47 -0500492 RPCRDMA_MAX_SEND_SGES);
Chuck Lever16f906d2017-02-08 17:00:10 -0500493 if (max_sge < RPCRDMA_MIN_SEND_SGES) {
494 pr_warn("rpcrdma: HCA provides only %d send SGEs\n", max_sge);
Chuck Leverb3221d62015-08-03 13:03:39 -0400495 return -ENOMEM;
496 }
Chuck Lever1179e2c2018-01-31 12:34:05 -0500497 ia->ri_max_send_sges = max_sge;
Chuck Leverb3221d62015-08-03 13:03:39 -0400498
Chuck Lever5f624122018-12-19 10:59:01 -0500499 rc = frwr_open(ia, ep, cdata);
Chuck Lever914fcad2018-05-04 15:34:48 -0400500 if (rc)
501 return rc;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400502
Chuck Leverf9521d52018-10-01 14:26:13 -0400503 ep->rep_attr.event_handler = rpcrdma_qp_event_handler;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400504 ep->rep_attr.qp_context = ep;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400505 ep->rep_attr.srq = NULL;
Chuck Lever16f906d2017-02-08 17:00:10 -0500506 ep->rep_attr.cap.max_send_sge = max_sge;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400507 ep->rep_attr.cap.max_recv_sge = 1;
508 ep->rep_attr.cap.max_inline_data = 0;
509 ep->rep_attr.sq_sig_type = IB_SIGNAL_REQ_WR;
510 ep->rep_attr.qp_type = IB_QPT_RC;
511 ep->rep_attr.port_num = ~0;
512
513 dprintk("RPC: %s: requested max: dtos: send %d recv %d; "
514 "iovs: send %d recv %d\n",
515 __func__,
516 ep->rep_attr.cap.max_send_wr,
517 ep->rep_attr.cap.max_recv_wr,
518 ep->rep_attr.cap.max_send_sge,
519 ep->rep_attr.cap.max_recv_sge);
520
521 /* set trigger for requesting send completion */
Chuck Leverae729502017-10-20 10:48:12 -0400522 ep->rep_send_batch = min_t(unsigned int, RPCRDMA_MAX_SEND_BATCH,
523 cdata->max_requests >> 2);
524 ep->rep_send_count = ep->rep_send_batch;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400525 init_waitqueue_head(&ep->rep_connect_wait);
Chuck Lever6ceea362018-12-19 10:58:24 -0500526 ep->rep_receive_count = 0;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400527
Chuck Lever2fa8f882016-03-04 11:28:53 -0500528 sendcq = ib_alloc_cq(ia->ri_device, NULL,
529 ep->rep_attr.cap.max_send_wr + 1,
Nicolas Morey-Chaisemartina4cb5bd2019-02-05 18:21:02 +0100530 ia->ri_device->num_comp_vectors > 1 ? 1 : 0,
531 IB_POLL_WORKQUEUE);
Chuck Leverfc664482014-05-28 10:33:25 -0400532 if (IS_ERR(sendcq)) {
533 rc = PTR_ERR(sendcq);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400534 goto out1;
535 }
536
Chuck Lever552bf222016-03-04 11:28:36 -0500537 recvcq = ib_alloc_cq(ia->ri_device, NULL,
538 ep->rep_attr.cap.max_recv_wr + 1,
Chuck Leverd8f532d2017-10-16 15:01:30 -0400539 0, IB_POLL_WORKQUEUE);
Chuck Leverfc664482014-05-28 10:33:25 -0400540 if (IS_ERR(recvcq)) {
541 rc = PTR_ERR(recvcq);
Chuck Leverfc664482014-05-28 10:33:25 -0400542 goto out2;
543 }
544
Chuck Leverfc664482014-05-28 10:33:25 -0400545 ep->rep_attr.send_cq = sendcq;
546 ep->rep_attr.recv_cq = recvcq;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400547
548 /* Initialize cma parameters */
Chuck Leverb2dde942016-05-02 14:43:03 -0400549 memset(&ep->rep_remote_cma, 0, sizeof(ep->rep_remote_cma));
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400550
Chuck Lever87cfb9a2016-09-15 10:57:07 -0400551 /* Prepare RDMA-CM private message */
552 pmsg->cp_magic = rpcrdma_cmp_magic;
553 pmsg->cp_version = RPCRDMA_CMP_VERSION;
Chuck Lever5f624122018-12-19 10:59:01 -0500554 pmsg->cp_flags |= RPCRDMA_CMP_F_SND_W_INV_OK;
Chuck Lever87cfb9a2016-09-15 10:57:07 -0400555 pmsg->cp_send_size = rpcrdma_encode_buffer_size(cdata->inline_wsize);
556 pmsg->cp_recv_size = rpcrdma_encode_buffer_size(cdata->inline_rsize);
557 ep->rep_remote_cma.private_data = pmsg;
558 ep->rep_remote_cma.private_data_len = sizeof(*pmsg);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400559
560 /* Client offers RDMA Read but does not initiate */
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400561 ep->rep_remote_cma.initiator_depth = 0;
Chuck Leverb7e85fff2018-02-28 15:30:33 -0500562 ep->rep_remote_cma.responder_resources =
563 min_t(int, U8_MAX, ia->ri_device->attrs.max_qp_rd_atom);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400564
Chuck Leverb2dde942016-05-02 14:43:03 -0400565 /* Limit transport retries so client can detect server
566 * GID changes quickly. RPC layer handles re-establishing
567 * transport connection and retransmission.
568 */
569 ep->rep_remote_cma.retry_count = 6;
570
571 /* RPC-over-RDMA handles its own flow control. In addition,
572 * make all RNR NAKs visible so we know that RPC-over-RDMA
573 * flow control is working correctly (no NAKs should be seen).
574 */
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400575 ep->rep_remote_cma.flow_control = 0;
576 ep->rep_remote_cma.rnr_retry_count = 0;
577
578 return 0;
579
580out2:
Chuck Lever2fa8f882016-03-04 11:28:53 -0500581 ib_free_cq(sendcq);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400582out1:
583 return rc;
584}
585
586/*
587 * rpcrdma_ep_destroy
588 *
589 * Disconnect and destroy endpoint. After this, the only
590 * valid operations on the ep are to free it (if dynamically
591 * allocated) or re-create it.
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400592 */
Chuck Lever7f1d5412014-05-28 10:33:16 -0400593void
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400594rpcrdma_ep_destroy(struct rpcrdma_ep *ep, struct rpcrdma_ia *ia)
595{
Chuck Lever25524282018-03-19 14:23:16 -0400596 if (ia->ri_id && ia->ri_id->qp) {
Chuck Lever550d7502016-05-02 14:41:47 -0400597 rpcrdma_ep_disconnect(ep, ia);
Tom Talpeyfee08ca2008-10-09 15:01:00 -0400598 rdma_destroy_qp(ia->ri_id);
599 ia->ri_id->qp = NULL;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400600 }
601
Chuck Lever25524282018-03-19 14:23:16 -0400602 if (ep->rep_attr.recv_cq)
603 ib_free_cq(ep->rep_attr.recv_cq);
604 if (ep->rep_attr.send_cq)
605 ib_free_cq(ep->rep_attr.send_cq);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400606}
607
Chuck Levera9b0e382017-04-11 13:23:26 -0400608/* Re-establish a connection after a device removal event.
609 * Unlike a normal reconnection, a fresh PD and a new set
610 * of MRs and buffers is needed.
611 */
612static int
613rpcrdma_ep_recreate_xprt(struct rpcrdma_xprt *r_xprt,
614 struct rpcrdma_ep *ep, struct rpcrdma_ia *ia)
615{
Chuck Levera9b0e382017-04-11 13:23:26 -0400616 int rc, err;
617
Chuck Leverb4744e02017-12-20 16:31:29 -0500618 trace_xprtrdma_reinsert(r_xprt);
Chuck Levera9b0e382017-04-11 13:23:26 -0400619
620 rc = -EHOSTUNREACH;
Chuck Leverdd229ce2017-12-14 20:56:58 -0500621 if (rpcrdma_ia_open(r_xprt))
Chuck Levera9b0e382017-04-11 13:23:26 -0400622 goto out1;
623
624 rc = -ENOMEM;
625 err = rpcrdma_ep_create(ep, ia, &r_xprt->rx_data);
626 if (err) {
627 pr_err("rpcrdma: rpcrdma_ep_create returned %d\n", err);
628 goto out2;
629 }
630
631 rc = -ENETUNREACH;
632 err = rdma_create_qp(ia->ri_id, ia->ri_pd, &ep->rep_attr);
633 if (err) {
634 pr_err("rpcrdma: rdma_create_qp returned %d\n", err);
635 goto out3;
636 }
637
Chuck Lever96cedde2017-12-14 20:57:55 -0500638 rpcrdma_mrs_create(r_xprt);
Chuck Levera9b0e382017-04-11 13:23:26 -0400639 return 0;
640
641out3:
642 rpcrdma_ep_destroy(ep, ia);
643out2:
644 rpcrdma_ia_close(ia);
645out1:
646 return rc;
647}
648
Chuck Lever18908962017-04-11 13:23:18 -0400649static int
650rpcrdma_ep_reconnect(struct rpcrdma_xprt *r_xprt, struct rpcrdma_ep *ep,
651 struct rpcrdma_ia *ia)
652{
Chuck Lever18908962017-04-11 13:23:18 -0400653 struct rdma_cm_id *id, *old;
654 int err, rc;
655
Chuck Leverb4744e02017-12-20 16:31:29 -0500656 trace_xprtrdma_reconnect(r_xprt);
Chuck Lever18908962017-04-11 13:23:18 -0400657
658 rpcrdma_ep_disconnect(ep, ia);
659
660 rc = -EHOSTUNREACH;
Chuck Leverdd229ce2017-12-14 20:56:58 -0500661 id = rpcrdma_create_id(r_xprt, ia);
Chuck Lever18908962017-04-11 13:23:18 -0400662 if (IS_ERR(id))
663 goto out;
664
665 /* As long as the new ID points to the same device as the
666 * old ID, we can reuse the transport's existing PD and all
667 * previously allocated MRs. Also, the same device means
668 * the transport's previous DMA mappings are still valid.
669 *
670 * This is a sanity check only. There should be no way these
671 * point to two different devices here.
672 */
673 old = id;
674 rc = -ENETUNREACH;
675 if (ia->ri_device != id->device) {
676 pr_err("rpcrdma: can't reconnect on different device!\n");
677 goto out_destroy;
678 }
679
680 err = rdma_create_qp(id, ia->ri_pd, &ep->rep_attr);
Chuck Leverddbb3472018-12-19 10:59:39 -0500681 if (err)
Chuck Lever18908962017-04-11 13:23:18 -0400682 goto out_destroy;
Chuck Lever18908962017-04-11 13:23:18 -0400683
684 /* Atomically replace the transport's ID and QP. */
685 rc = 0;
686 old = ia->ri_id;
687 ia->ri_id = id;
688 rdma_destroy_qp(old);
689
690out_destroy:
Chuck Lever56a6bd12017-04-11 13:23:34 -0400691 rdma_destroy_id(old);
Chuck Lever18908962017-04-11 13:23:18 -0400692out:
693 return rc;
694}
695
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400696/*
697 * Connect unconnected endpoint.
698 */
699int
700rpcrdma_ep_connect(struct rpcrdma_ep *ep, struct rpcrdma_ia *ia)
701{
Chuck Lever0a904872017-02-08 17:00:35 -0500702 struct rpcrdma_xprt *r_xprt = container_of(ia, struct rpcrdma_xprt,
703 rx_ia);
Chuck Lever31e62d22018-10-01 14:26:08 -0400704 struct rpc_xprt *xprt = &r_xprt->rx_xprt;
Chuck Lever18908962017-04-11 13:23:18 -0400705 int rc;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400706
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400707retry:
Chuck Lever18908962017-04-11 13:23:18 -0400708 switch (ep->rep_connected) {
709 case 0:
Chuck Leverec62f402014-05-28 10:34:07 -0400710 dprintk("RPC: %s: connecting...\n", __func__);
711 rc = rdma_create_qp(ia->ri_id, ia->ri_pd, &ep->rep_attr);
712 if (rc) {
Chuck Lever18908962017-04-11 13:23:18 -0400713 rc = -ENETUNREACH;
714 goto out_noupdate;
Chuck Leverec62f402014-05-28 10:34:07 -0400715 }
Chuck Lever18908962017-04-11 13:23:18 -0400716 break;
Chuck Levera9b0e382017-04-11 13:23:26 -0400717 case -ENODEV:
718 rc = rpcrdma_ep_recreate_xprt(r_xprt, ep, ia);
719 if (rc)
720 goto out_noupdate;
721 break;
Chuck Lever18908962017-04-11 13:23:18 -0400722 default:
723 rc = rpcrdma_ep_reconnect(r_xprt, ep, ia);
724 if (rc)
725 goto out;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400726 }
727
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400728 ep->rep_connected = 0;
Chuck Lever31e62d22018-10-01 14:26:08 -0400729 xprt_clear_connected(xprt);
730
Chuck Lever8d4fb8f2018-07-28 10:46:47 -0400731 rpcrdma_post_recvs(r_xprt, true);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400732
733 rc = rdma_connect(ia->ri_id, &ep->rep_remote_cma);
Chuck Leverddbb3472018-12-19 10:59:39 -0500734 if (rc)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400735 goto out;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400736
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400737 wait_event_interruptible(ep->rep_connect_wait, ep->rep_connected != 0);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400738 if (ep->rep_connected <= 0) {
Chuck Lever0a904872017-02-08 17:00:35 -0500739 if (ep->rep_connected == -EAGAIN)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400740 goto retry;
741 rc = ep->rep_connected;
Chuck Lever0a904872017-02-08 17:00:35 -0500742 goto out;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400743 }
744
Chuck Lever0a904872017-02-08 17:00:35 -0500745 dprintk("RPC: %s: connected\n", __func__);
Chuck Lever7c8d9e72018-05-04 15:35:20 -0400746
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400747out:
748 if (rc)
749 ep->rep_connected = rc;
Chuck Lever18908962017-04-11 13:23:18 -0400750
751out_noupdate:
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400752 return rc;
753}
754
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500755/**
756 * rpcrdma_ep_disconnect - Disconnect underlying transport
757 * @ep: endpoint to disconnect
758 * @ia: associated interface adapter
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400759 *
760 * This is separate from destroy to facilitate the ability
761 * to reconnect without recreating the endpoint.
762 *
763 * This call is not reentrant, and must not be made in parallel
764 * on the same endpoint.
765 */
Chuck Lever282191c2014-07-29 17:25:55 -0400766void
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400767rpcrdma_ep_disconnect(struct rpcrdma_ep *ep, struct rpcrdma_ia *ia)
768{
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500769 struct rpcrdma_xprt *r_xprt = container_of(ep, struct rpcrdma_xprt,
770 rx_ep);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400771 int rc;
772
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500773 /* returns without wait if ID is not connected */
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400774 rc = rdma_disconnect(ia->ri_id);
Chuck Leverb4744e02017-12-20 16:31:29 -0500775 if (!rc)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400776 wait_event_interruptible(ep->rep_connect_wait,
777 ep->rep_connected != 1);
Chuck Leverb4744e02017-12-20 16:31:29 -0500778 else
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400779 ep->rep_connected = rc;
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500780 trace_xprtrdma_disconnect(r_xprt, rc);
Chuck Lever550d7502016-05-02 14:41:47 -0400781
Chuck Lever6d2d0ee2018-12-19 10:58:29 -0500782 rpcrdma_xprt_drain(r_xprt);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -0400783}
784
Chuck Leverae729502017-10-20 10:48:12 -0400785/* Fixed-size circular FIFO queue. This implementation is wait-free and
786 * lock-free.
787 *
788 * Consumer is the code path that posts Sends. This path dequeues a
789 * sendctx for use by a Send operation. Multiple consumer threads
790 * are serialized by the RPC transport lock, which allows only one
791 * ->send_request call at a time.
792 *
793 * Producer is the code path that handles Send completions. This path
794 * enqueues a sendctx that has been completed. Multiple producer
795 * threads are serialized by the ib_poll_cq() function.
796 */
797
798/* rpcrdma_sendctxs_destroy() assumes caller has already quiesced
799 * queue activity, and ib_drain_qp has flushed all remaining Send
800 * requests.
801 */
802static void rpcrdma_sendctxs_destroy(struct rpcrdma_buffer *buf)
803{
804 unsigned long i;
805
806 for (i = 0; i <= buf->rb_sc_last; i++)
807 kfree(buf->rb_sc_ctxs[i]);
808 kfree(buf->rb_sc_ctxs);
809}
810
811static struct rpcrdma_sendctx *rpcrdma_sendctx_create(struct rpcrdma_ia *ia)
812{
813 struct rpcrdma_sendctx *sc;
814
815 sc = kzalloc(sizeof(*sc) +
816 ia->ri_max_send_sges * sizeof(struct ib_sge),
817 GFP_KERNEL);
818 if (!sc)
819 return NULL;
820
821 sc->sc_wr.wr_cqe = &sc->sc_cqe;
822 sc->sc_wr.sg_list = sc->sc_sges;
823 sc->sc_wr.opcode = IB_WR_SEND;
824 sc->sc_cqe.done = rpcrdma_wc_send;
825 return sc;
826}
827
828static int rpcrdma_sendctxs_create(struct rpcrdma_xprt *r_xprt)
829{
830 struct rpcrdma_buffer *buf = &r_xprt->rx_buf;
831 struct rpcrdma_sendctx *sc;
832 unsigned long i;
833
834 /* Maximum number of concurrent outstanding Send WRs. Capping
835 * the circular queue size stops Send Queue overflow by causing
836 * the ->send_request call to fail temporarily before too many
837 * Sends are posted.
838 */
839 i = buf->rb_max_requests + RPCRDMA_MAX_BC_REQUESTS;
840 dprintk("RPC: %s: allocating %lu send_ctxs\n", __func__, i);
841 buf->rb_sc_ctxs = kcalloc(i, sizeof(sc), GFP_KERNEL);
842 if (!buf->rb_sc_ctxs)
843 return -ENOMEM;
844
845 buf->rb_sc_last = i - 1;
846 for (i = 0; i <= buf->rb_sc_last; i++) {
847 sc = rpcrdma_sendctx_create(&r_xprt->rx_ia);
848 if (!sc)
Dan Carpenter6e17f582019-01-05 16:06:48 +0300849 return -ENOMEM;
Chuck Leverae729502017-10-20 10:48:12 -0400850
851 sc->sc_xprt = r_xprt;
852 buf->rb_sc_ctxs[i] = sc;
853 }
854
855 return 0;
Chuck Leverae729502017-10-20 10:48:12 -0400856}
857
858/* The sendctx queue is not guaranteed to have a size that is a
859 * power of two, thus the helpers in circ_buf.h cannot be used.
860 * The other option is to use modulus (%), which can be expensive.
861 */
862static unsigned long rpcrdma_sendctx_next(struct rpcrdma_buffer *buf,
863 unsigned long item)
864{
865 return likely(item < buf->rb_sc_last) ? item + 1 : 0;
866}
867
868/**
869 * rpcrdma_sendctx_get_locked - Acquire a send context
870 * @buf: transport buffers from which to acquire an unused context
871 *
872 * Returns pointer to a free send completion context; or NULL if
873 * the queue is empty.
874 *
875 * Usage: Called to acquire an SGE array before preparing a Send WR.
876 *
877 * The caller serializes calls to this function (per rpcrdma_buffer),
878 * and provides an effective memory barrier that flushes the new value
879 * of rb_sc_head.
880 */
881struct rpcrdma_sendctx *rpcrdma_sendctx_get_locked(struct rpcrdma_buffer *buf)
882{
883 struct rpcrdma_xprt *r_xprt;
884 struct rpcrdma_sendctx *sc;
885 unsigned long next_head;
886
887 next_head = rpcrdma_sendctx_next(buf, buf->rb_sc_head);
888
889 if (next_head == READ_ONCE(buf->rb_sc_tail))
890 goto out_emptyq;
891
892 /* ORDER: item must be accessed _before_ head is updated */
893 sc = buf->rb_sc_ctxs[next_head];
894
895 /* Releasing the lock in the caller acts as a memory
896 * barrier that flushes rb_sc_head.
897 */
898 buf->rb_sc_head = next_head;
899
900 return sc;
901
902out_emptyq:
903 /* The queue is "empty" if there have not been enough Send
904 * completions recently. This is a sign the Send Queue is
905 * backing up. Cause the caller to pause and try again.
906 */
Chuck Lever2fad6592018-05-04 15:35:57 -0400907 set_bit(RPCRDMA_BUF_F_EMPTY_SCQ, &buf->rb_flags);
Chuck Leverae729502017-10-20 10:48:12 -0400908 r_xprt = container_of(buf, struct rpcrdma_xprt, rx_buf);
909 r_xprt->rx_stats.empty_sendctx_q++;
910 return NULL;
911}
912
913/**
914 * rpcrdma_sendctx_put_locked - Release a send context
915 * @sc: send context to release
916 *
917 * Usage: Called from Send completion to return a sendctxt
918 * to the queue.
919 *
920 * The caller serializes calls to this function (per rpcrdma_buffer).
921 */
Chuck Leverefd81e92018-05-04 15:35:41 -0400922static void
923rpcrdma_sendctx_put_locked(struct rpcrdma_sendctx *sc)
Chuck Leverae729502017-10-20 10:48:12 -0400924{
925 struct rpcrdma_buffer *buf = &sc->sc_xprt->rx_buf;
926 unsigned long next_tail;
927
928 /* Unmap SGEs of previously completed by unsignaled
929 * Sends by walking up the queue until @sc is found.
930 */
931 next_tail = buf->rb_sc_tail;
932 do {
933 next_tail = rpcrdma_sendctx_next(buf, next_tail);
934
935 /* ORDER: item must be accessed _before_ tail is updated */
936 rpcrdma_unmap_sendctx(buf->rb_sc_ctxs[next_tail]);
937
938 } while (buf->rb_sc_ctxs[next_tail] != sc);
939
940 /* Paired with READ_ONCE */
941 smp_store_release(&buf->rb_sc_tail, next_tail);
Chuck Lever2fad6592018-05-04 15:35:57 -0400942
943 if (test_and_clear_bit(RPCRDMA_BUF_F_EMPTY_SCQ, &buf->rb_flags)) {
944 smp_mb__after_atomic();
945 xprt_write_space(&sc->sc_xprt->rx_xprt);
946 }
Chuck Leverae729502017-10-20 10:48:12 -0400947}
948
Chuck Lever505bbe62016-06-29 13:52:54 -0400949static void
Chuck Lever96cedde2017-12-14 20:57:55 -0500950rpcrdma_mrs_create(struct rpcrdma_xprt *r_xprt)
Chuck Levere2ac2362016-06-29 13:54:00 -0400951{
952 struct rpcrdma_buffer *buf = &r_xprt->rx_buf;
953 struct rpcrdma_ia *ia = &r_xprt->rx_ia;
954 unsigned int count;
955 LIST_HEAD(free);
956 LIST_HEAD(all);
957
Chuck Leverc421ece2018-10-01 14:25:20 -0400958 for (count = 0; count < ia->ri_max_segs; count++) {
Chuck Lever96cedde2017-12-14 20:57:55 -0500959 struct rpcrdma_mr *mr;
Chuck Levere2ac2362016-06-29 13:54:00 -0400960 int rc;
961
Chuck Lever96cedde2017-12-14 20:57:55 -0500962 mr = kzalloc(sizeof(*mr), GFP_KERNEL);
963 if (!mr)
Chuck Levere2ac2362016-06-29 13:54:00 -0400964 break;
965
Chuck Lever5f624122018-12-19 10:59:01 -0500966 rc = frwr_init_mr(ia, mr);
Chuck Levere2ac2362016-06-29 13:54:00 -0400967 if (rc) {
Chuck Lever96cedde2017-12-14 20:57:55 -0500968 kfree(mr);
Chuck Levere2ac2362016-06-29 13:54:00 -0400969 break;
970 }
971
Chuck Lever96cedde2017-12-14 20:57:55 -0500972 mr->mr_xprt = r_xprt;
Chuck Levere2ac2362016-06-29 13:54:00 -0400973
Chuck Lever96cedde2017-12-14 20:57:55 -0500974 list_add(&mr->mr_list, &free);
975 list_add(&mr->mr_all, &all);
Chuck Levere2ac2362016-06-29 13:54:00 -0400976 }
977
Chuck Lever96cedde2017-12-14 20:57:55 -0500978 spin_lock(&buf->rb_mrlock);
979 list_splice(&free, &buf->rb_mrs);
Chuck Levere2ac2362016-06-29 13:54:00 -0400980 list_splice(&all, &buf->rb_all);
981 r_xprt->rx_stats.mrs_allocated += count;
Chuck Lever96cedde2017-12-14 20:57:55 -0500982 spin_unlock(&buf->rb_mrlock);
Chuck Lever1c443eff2017-12-20 16:31:21 -0500983 trace_xprtrdma_createmrs(r_xprt, count);
Chuck Lever9e679d52018-02-28 15:30:44 -0500984
985 xprt_write_space(&r_xprt->rx_xprt);
Chuck Levere2ac2362016-06-29 13:54:00 -0400986}
987
988static void
989rpcrdma_mr_refresh_worker(struct work_struct *work)
990{
991 struct rpcrdma_buffer *buf = container_of(work, struct rpcrdma_buffer,
992 rb_refresh_worker.work);
993 struct rpcrdma_xprt *r_xprt = container_of(buf, struct rpcrdma_xprt,
994 rx_buf);
995
Chuck Lever96cedde2017-12-14 20:57:55 -0500996 rpcrdma_mrs_create(r_xprt);
Chuck Levere2ac2362016-06-29 13:54:00 -0400997}
998
Chuck Leverf531a5d2015-10-24 17:27:43 -0400999struct rpcrdma_req *
Chuck Lever13924022015-01-21 11:03:52 -05001000rpcrdma_create_req(struct rpcrdma_xprt *r_xprt)
1001{
Chuck Leverf531a5d2015-10-24 17:27:43 -04001002 struct rpcrdma_buffer *buffer = &r_xprt->rx_buf;
Chuck Lever2dd4a012018-02-28 15:31:05 -05001003 struct rpcrdma_regbuf *rb;
Chuck Lever13924022015-01-21 11:03:52 -05001004 struct rpcrdma_req *req;
Chuck Lever13924022015-01-21 11:03:52 -05001005
Chuck Lever85275c82015-01-21 11:04:16 -05001006 req = kzalloc(sizeof(*req), GFP_KERNEL);
Chuck Lever13924022015-01-21 11:03:52 -05001007 if (req == NULL)
Chuck Lever85275c82015-01-21 11:04:16 -05001008 return ERR_PTR(-ENOMEM);
Chuck Lever13924022015-01-21 11:03:52 -05001009
Chuck Lever2dd4a012018-02-28 15:31:05 -05001010 rb = rpcrdma_alloc_regbuf(RPCRDMA_HDRBUF_SIZE,
1011 DMA_TO_DEVICE, GFP_KERNEL);
1012 if (IS_ERR(rb)) {
1013 kfree(req);
1014 return ERR_PTR(-ENOMEM);
1015 }
1016 req->rl_rdmabuf = rb;
1017 xdr_buf_init(&req->rl_hdrbuf, rb->rg_base, rdmab_length(rb));
1018 req->rl_buffer = buffer;
1019 INIT_LIST_HEAD(&req->rl_registered);
1020
Chuck Lever92f44332018-12-19 10:59:33 -05001021 spin_lock(&buffer->rb_lock);
Chuck Leverf531a5d2015-10-24 17:27:43 -04001022 list_add(&req->rl_all, &buffer->rb_allreqs);
Chuck Lever92f44332018-12-19 10:59:33 -05001023 spin_unlock(&buffer->rb_lock);
Chuck Lever13924022015-01-21 11:03:52 -05001024 return req;
Chuck Lever13924022015-01-21 11:03:52 -05001025}
1026
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001027static int
1028rpcrdma_create_rep(struct rpcrdma_xprt *r_xprt, bool temp)
Chuck Lever13924022015-01-21 11:03:52 -05001029{
1030 struct rpcrdma_create_data_internal *cdata = &r_xprt->rx_data;
Chuck Leverd698c4a2017-12-14 20:56:09 -05001031 struct rpcrdma_buffer *buf = &r_xprt->rx_buf;
Chuck Lever13924022015-01-21 11:03:52 -05001032 struct rpcrdma_rep *rep;
1033 int rc;
1034
1035 rc = -ENOMEM;
Chuck Lever6b1184c2015-01-21 11:04:25 -05001036 rep = kzalloc(sizeof(*rep), GFP_KERNEL);
Chuck Lever13924022015-01-21 11:03:52 -05001037 if (rep == NULL)
1038 goto out;
Chuck Lever13924022015-01-21 11:03:52 -05001039
Chuck Lever13650c22016-09-15 10:56:26 -04001040 rep->rr_rdmabuf = rpcrdma_alloc_regbuf(cdata->inline_rsize,
Chuck Lever99ef4db2016-09-15 10:56:10 -04001041 DMA_FROM_DEVICE, GFP_KERNEL);
Chuck Lever6b1184c2015-01-21 11:04:25 -05001042 if (IS_ERR(rep->rr_rdmabuf)) {
1043 rc = PTR_ERR(rep->rr_rdmabuf);
Chuck Lever13924022015-01-21 11:03:52 -05001044 goto out_free;
Chuck Lever6b1184c2015-01-21 11:04:25 -05001045 }
Chuck Lever96f87782017-08-03 14:30:03 -04001046 xdr_buf_init(&rep->rr_hdrbuf, rep->rr_rdmabuf->rg_base,
1047 rdmab_length(rep->rr_rdmabuf));
Chuck Lever13924022015-01-21 11:03:52 -05001048
Chuck Lever1519e962016-09-15 10:57:49 -04001049 rep->rr_cqe.done = rpcrdma_wc_receive;
Chuck Leverfed171b2015-05-26 11:51:37 -04001050 rep->rr_rxprt = r_xprt;
Chuck Leverd8f532d2017-10-16 15:01:30 -04001051 INIT_WORK(&rep->rr_work, rpcrdma_deferred_completion);
Chuck Lever6ea8e712016-09-15 10:56:51 -04001052 rep->rr_recv_wr.next = NULL;
1053 rep->rr_recv_wr.wr_cqe = &rep->rr_cqe;
1054 rep->rr_recv_wr.sg_list = &rep->rr_rdmabuf->rg_iov;
1055 rep->rr_recv_wr.num_sge = 1;
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001056 rep->rr_temp = temp;
Chuck Leverd698c4a2017-12-14 20:56:09 -05001057
1058 spin_lock(&buf->rb_lock);
1059 list_add(&rep->rr_list, &buf->rb_recv_bufs);
1060 spin_unlock(&buf->rb_lock);
1061 return 0;
Chuck Lever13924022015-01-21 11:03:52 -05001062
1063out_free:
1064 kfree(rep);
1065out:
Chuck Leverd698c4a2017-12-14 20:56:09 -05001066 return rc;
Chuck Lever13924022015-01-21 11:03:52 -05001067}
1068
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001069int
Chuck Leverac920d02015-01-21 11:03:44 -05001070rpcrdma_buffer_create(struct rpcrdma_xprt *r_xprt)
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001071{
Chuck Leverac920d02015-01-21 11:03:44 -05001072 struct rpcrdma_buffer *buf = &r_xprt->rx_buf;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001073 int i, rc;
1074
Chuck Lever512ccfb2018-10-01 14:26:29 -04001075 buf->rb_flags = 0;
Chuck Lever1e465fd2015-10-24 17:27:02 -04001076 buf->rb_max_requests = r_xprt->rx_data.max_requests;
Chuck Leverf531a5d2015-10-24 17:27:43 -04001077 buf->rb_bc_srv_max_requests = 0;
Chuck Lever96cedde2017-12-14 20:57:55 -05001078 spin_lock_init(&buf->rb_mrlock);
Chuck Lever505bbe62016-06-29 13:52:54 -04001079 spin_lock_init(&buf->rb_lock);
Chuck Lever96cedde2017-12-14 20:57:55 -05001080 INIT_LIST_HEAD(&buf->rb_mrs);
Chuck Levere2ac2362016-06-29 13:54:00 -04001081 INIT_LIST_HEAD(&buf->rb_all);
Chuck Levere2ac2362016-06-29 13:54:00 -04001082 INIT_DELAYED_WORK(&buf->rb_refresh_worker,
1083 rpcrdma_mr_refresh_worker);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001084
Chuck Lever96cedde2017-12-14 20:57:55 -05001085 rpcrdma_mrs_create(r_xprt);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001086
Chuck Lever1e465fd2015-10-24 17:27:02 -04001087 INIT_LIST_HEAD(&buf->rb_send_bufs);
Chuck Leverf531a5d2015-10-24 17:27:43 -04001088 INIT_LIST_HEAD(&buf->rb_allreqs);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001089 for (i = 0; i < buf->rb_max_requests; i++) {
1090 struct rpcrdma_req *req;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001091
Chuck Lever13924022015-01-21 11:03:52 -05001092 req = rpcrdma_create_req(r_xprt);
1093 if (IS_ERR(req)) {
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001094 dprintk("RPC: %s: request buffer %d alloc"
1095 " failed\n", __func__, i);
Chuck Lever13924022015-01-21 11:03:52 -05001096 rc = PTR_ERR(req);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001097 goto out;
1098 }
Chuck Levera80d66c2017-06-08 11:52:12 -04001099 list_add(&req->rl_list, &buf->rb_send_bufs);
Chuck Lever1e465fd2015-10-24 17:27:02 -04001100 }
1101
Chuck Lever8d4fb8f2018-07-28 10:46:47 -04001102 buf->rb_credits = 1;
Chuck Lever1e465fd2015-10-24 17:27:02 -04001103 INIT_LIST_HEAD(&buf->rb_recv_bufs);
Chuck Lever13924022015-01-21 11:03:52 -05001104
Chuck Leverae729502017-10-20 10:48:12 -04001105 rc = rpcrdma_sendctxs_create(r_xprt);
1106 if (rc)
1107 goto out;
1108
Chuck Lever6d2d0ee2018-12-19 10:58:29 -05001109 buf->rb_completion_wq = alloc_workqueue("rpcrdma-%s",
1110 WQ_MEM_RECLAIM | WQ_HIGHPRI,
1111 0,
1112 r_xprt->rx_xprt.address_strings[RPC_DISPLAY_ADDR]);
Dan Carpenter4429b662019-01-05 16:06:07 +03001113 if (!buf->rb_completion_wq) {
1114 rc = -ENOMEM;
Chuck Lever6d2d0ee2018-12-19 10:58:29 -05001115 goto out;
Dan Carpenter4429b662019-01-05 16:06:07 +03001116 }
Chuck Lever6d2d0ee2018-12-19 10:58:29 -05001117
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001118 return 0;
1119out:
1120 rpcrdma_buffer_destroy(buf);
1121 return rc;
1122}
1123
Chuck Lever2e845222014-07-29 17:25:38 -04001124static void
Chuck Lever13650c22016-09-15 10:56:26 -04001125rpcrdma_destroy_rep(struct rpcrdma_rep *rep)
Chuck Lever13924022015-01-21 11:03:52 -05001126{
Chuck Lever13650c22016-09-15 10:56:26 -04001127 rpcrdma_free_regbuf(rep->rr_rdmabuf);
Chuck Lever13924022015-01-21 11:03:52 -05001128 kfree(rep);
1129}
1130
Chuck Lever92f44332018-12-19 10:59:33 -05001131/**
1132 * rpcrdma_req_destroy - Destroy an rpcrdma_req object
1133 * @req: unused object to be destroyed
1134 *
1135 * This function assumes that the caller prevents concurrent device
1136 * unload and transport tear-down.
1137 */
Chuck Leverf531a5d2015-10-24 17:27:43 -04001138void
Chuck Lever92f44332018-12-19 10:59:33 -05001139rpcrdma_req_destroy(struct rpcrdma_req *req)
Chuck Lever13924022015-01-21 11:03:52 -05001140{
Chuck Lever92f44332018-12-19 10:59:33 -05001141 list_del(&req->rl_all);
1142
Chuck Lever13650c22016-09-15 10:56:26 -04001143 rpcrdma_free_regbuf(req->rl_recvbuf);
1144 rpcrdma_free_regbuf(req->rl_sendbuf);
1145 rpcrdma_free_regbuf(req->rl_rdmabuf);
Chuck Lever13924022015-01-21 11:03:52 -05001146 kfree(req);
1147}
1148
Chuck Levere2ac2362016-06-29 13:54:00 -04001149static void
Chuck Lever96cedde2017-12-14 20:57:55 -05001150rpcrdma_mrs_destroy(struct rpcrdma_buffer *buf)
Chuck Levere2ac2362016-06-29 13:54:00 -04001151{
1152 struct rpcrdma_xprt *r_xprt = container_of(buf, struct rpcrdma_xprt,
1153 rx_buf);
Chuck Lever96cedde2017-12-14 20:57:55 -05001154 struct rpcrdma_mr *mr;
Chuck Levere2ac2362016-06-29 13:54:00 -04001155 unsigned int count;
1156
1157 count = 0;
Chuck Lever96cedde2017-12-14 20:57:55 -05001158 spin_lock(&buf->rb_mrlock);
Chuck Levere2ac2362016-06-29 13:54:00 -04001159 while (!list_empty(&buf->rb_all)) {
Chuck Lever96cedde2017-12-14 20:57:55 -05001160 mr = list_entry(buf->rb_all.next, struct rpcrdma_mr, mr_all);
1161 list_del(&mr->mr_all);
Chuck Levere2ac2362016-06-29 13:54:00 -04001162
Chuck Lever96cedde2017-12-14 20:57:55 -05001163 spin_unlock(&buf->rb_mrlock);
Chuck Lever054f1552018-05-01 11:37:14 -04001164
1165 /* Ensure MW is not on any rl_registered list */
1166 if (!list_empty(&mr->mr_list))
1167 list_del(&mr->mr_list);
1168
Chuck Lever5f624122018-12-19 10:59:01 -05001169 frwr_release_mr(mr);
Chuck Levere2ac2362016-06-29 13:54:00 -04001170 count++;
Chuck Lever96cedde2017-12-14 20:57:55 -05001171 spin_lock(&buf->rb_mrlock);
Chuck Levere2ac2362016-06-29 13:54:00 -04001172 }
Chuck Lever96cedde2017-12-14 20:57:55 -05001173 spin_unlock(&buf->rb_mrlock);
Chuck Levere2ac2362016-06-29 13:54:00 -04001174 r_xprt->rx_stats.mrs_allocated = 0;
1175
1176 dprintk("RPC: %s: released %u MRs\n", __func__, count);
1177}
1178
Chuck Leveraf65ed42018-12-19 11:00:37 -05001179/**
1180 * rpcrdma_buffer_destroy - Release all hw resources
1181 * @buf: root control block for resources
1182 *
1183 * ORDERING: relies on a prior ib_drain_qp :
1184 * - No more Send or Receive completions can occur
1185 * - All MRs, reps, and reqs are returned to their free lists
1186 */
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001187void
1188rpcrdma_buffer_destroy(struct rpcrdma_buffer *buf)
1189{
Chuck Lever9378b272017-04-11 13:22:29 -04001190 cancel_delayed_work_sync(&buf->rb_refresh_worker);
Chuck Lever505bbe62016-06-29 13:52:54 -04001191
Chuck Lever6d2d0ee2018-12-19 10:58:29 -05001192 if (buf->rb_completion_wq) {
1193 destroy_workqueue(buf->rb_completion_wq);
1194 buf->rb_completion_wq = NULL;
1195 }
1196
Chuck Leverae729502017-10-20 10:48:12 -04001197 rpcrdma_sendctxs_destroy(buf);
1198
Chuck Lever1e465fd2015-10-24 17:27:02 -04001199 while (!list_empty(&buf->rb_recv_bufs)) {
1200 struct rpcrdma_rep *rep;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001201
Chuck Lever9d95cd52018-05-04 15:35:36 -04001202 rep = list_first_entry(&buf->rb_recv_bufs,
1203 struct rpcrdma_rep, rr_list);
1204 list_del(&rep->rr_list);
Chuck Lever13650c22016-09-15 10:56:26 -04001205 rpcrdma_destroy_rep(rep);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001206 }
1207
Chuck Lever92f44332018-12-19 10:59:33 -05001208 while (!list_empty(&buf->rb_send_bufs)) {
Chuck Lever1e465fd2015-10-24 17:27:02 -04001209 struct rpcrdma_req *req;
Allen Andrews4034ba02014-05-28 10:32:09 -04001210
Chuck Lever92f44332018-12-19 10:59:33 -05001211 req = list_first_entry(&buf->rb_send_bufs,
1212 struct rpcrdma_req, rl_list);
1213 list_del(&req->rl_list);
1214 rpcrdma_req_destroy(req);
Chuck Lever9f9d8022014-07-29 17:24:45 -04001215 }
1216
Chuck Lever96cedde2017-12-14 20:57:55 -05001217 rpcrdma_mrs_destroy(buf);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001218}
1219
Chuck Lever96cedde2017-12-14 20:57:55 -05001220/**
1221 * rpcrdma_mr_get - Allocate an rpcrdma_mr object
1222 * @r_xprt: controlling transport
1223 *
1224 * Returns an initialized rpcrdma_mr or NULL if no free
1225 * rpcrdma_mr objects are available.
1226 */
1227struct rpcrdma_mr *
1228rpcrdma_mr_get(struct rpcrdma_xprt *r_xprt)
Chuck Leverc2922c02014-07-29 17:24:36 -04001229{
Chuck Lever346aa662015-05-26 11:52:06 -04001230 struct rpcrdma_buffer *buf = &r_xprt->rx_buf;
Chuck Lever96cedde2017-12-14 20:57:55 -05001231 struct rpcrdma_mr *mr = NULL;
Chuck Lever346aa662015-05-26 11:52:06 -04001232
Chuck Lever96cedde2017-12-14 20:57:55 -05001233 spin_lock(&buf->rb_mrlock);
1234 if (!list_empty(&buf->rb_mrs))
1235 mr = rpcrdma_mr_pop(&buf->rb_mrs);
1236 spin_unlock(&buf->rb_mrlock);
Chuck Lever346aa662015-05-26 11:52:06 -04001237
Chuck Lever96cedde2017-12-14 20:57:55 -05001238 if (!mr)
1239 goto out_nomrs;
1240 return mr;
Chuck Levere2ac2362016-06-29 13:54:00 -04001241
Chuck Lever96cedde2017-12-14 20:57:55 -05001242out_nomrs:
Chuck Lever1c443eff2017-12-20 16:31:21 -05001243 trace_xprtrdma_nomrs(r_xprt);
Chuck Leverbebd0312017-04-11 13:23:10 -04001244 if (r_xprt->rx_ep.rep_connected != -ENODEV)
1245 schedule_delayed_work(&buf->rb_refresh_worker, 0);
Chuck Levere2ac2362016-06-29 13:54:00 -04001246
1247 /* Allow the reply handler and refresh worker to run */
1248 cond_resched();
1249
1250 return NULL;
Chuck Leverc2922c02014-07-29 17:24:36 -04001251}
1252
Chuck Leverec12e472017-12-14 20:58:04 -05001253static void
1254__rpcrdma_mr_put(struct rpcrdma_buffer *buf, struct rpcrdma_mr *mr)
1255{
1256 spin_lock(&buf->rb_mrlock);
1257 rpcrdma_mr_push(mr, &buf->rb_mrs);
1258 spin_unlock(&buf->rb_mrlock);
1259}
1260
Chuck Lever96cedde2017-12-14 20:57:55 -05001261/**
1262 * rpcrdma_mr_put - Release an rpcrdma_mr object
1263 * @mr: object to release
1264 *
1265 */
Chuck Lever346aa662015-05-26 11:52:06 -04001266void
Chuck Lever96cedde2017-12-14 20:57:55 -05001267rpcrdma_mr_put(struct rpcrdma_mr *mr)
Chuck Leverc2922c02014-07-29 17:24:36 -04001268{
Chuck Leverec12e472017-12-14 20:58:04 -05001269 __rpcrdma_mr_put(&mr->mr_xprt->rx_buf, mr);
1270}
Chuck Leverc2922c02014-07-29 17:24:36 -04001271
Chuck Leverec12e472017-12-14 20:58:04 -05001272/**
1273 * rpcrdma_mr_unmap_and_put - DMA unmap an MR and release it
1274 * @mr: object to release
1275 *
1276 */
1277void
1278rpcrdma_mr_unmap_and_put(struct rpcrdma_mr *mr)
1279{
1280 struct rpcrdma_xprt *r_xprt = mr->mr_xprt;
1281
Chuck Levere2f34e22018-12-19 10:58:13 -05001282 if (mr->mr_dir != DMA_NONE) {
1283 trace_xprtrdma_mr_unmap(mr);
1284 ib_dma_unmap_sg(r_xprt->rx_ia.ri_device,
1285 mr->mr_sg, mr->mr_nents, mr->mr_dir);
1286 mr->mr_dir = DMA_NONE;
1287 }
Chuck Leverec12e472017-12-14 20:58:04 -05001288 __rpcrdma_mr_put(&r_xprt->rx_buf, mr);
Chuck Leverc2922c02014-07-29 17:24:36 -04001289}
1290
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001291/**
1292 * rpcrdma_buffer_get - Get a request buffer
1293 * @buffers: Buffer pool from which to obtain a buffer
Chuck Lever78d506e2016-09-06 11:22:49 -04001294 *
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001295 * Returns a fresh rpcrdma_req, or NULL if none are available.
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001296 */
1297struct rpcrdma_req *
1298rpcrdma_buffer_get(struct rpcrdma_buffer *buffers)
1299{
1300 struct rpcrdma_req *req;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001301
Chuck Levera5b027e2015-10-24 17:27:27 -04001302 spin_lock(&buffers->rb_lock);
Chuck Levere68699c2018-05-04 15:35:31 -04001303 req = list_first_entry_or_null(&buffers->rb_send_bufs,
1304 struct rpcrdma_req, rl_list);
1305 if (req)
1306 list_del_init(&req->rl_list);
Chuck Levera5b027e2015-10-24 17:27:27 -04001307 spin_unlock(&buffers->rb_lock);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001308 return req;
1309}
1310
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001311/**
1312 * rpcrdma_buffer_put - Put request/reply buffers back into pool
1313 * @req: object to return
1314 *
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001315 */
1316void
1317rpcrdma_buffer_put(struct rpcrdma_req *req)
1318{
1319 struct rpcrdma_buffer *buffers = req->rl_buffer;
Chuck Lever1e465fd2015-10-24 17:27:02 -04001320 struct rpcrdma_rep *rep = req->rl_reply;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001321
Chuck Lever1e465fd2015-10-24 17:27:02 -04001322 req->rl_reply = NULL;
1323
Chuck Levera5b027e2015-10-24 17:27:27 -04001324 spin_lock(&buffers->rb_lock);
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001325 list_add(&req->rl_list, &buffers->rb_send_bufs);
Chuck Lever05c97462016-09-06 11:22:58 -04001326 if (rep) {
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001327 if (!rep->rr_temp) {
1328 list_add(&rep->rr_list, &buffers->rb_recv_bufs);
1329 rep = NULL;
1330 }
Chuck Lever05c97462016-09-06 11:22:58 -04001331 }
Chuck Levera5b027e2015-10-24 17:27:27 -04001332 spin_unlock(&buffers->rb_lock);
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001333 if (rep)
1334 rpcrdma_destroy_rep(rep);
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001335}
1336
1337/*
1338 * Put reply buffers back into pool when not attached to
Chuck Leverb45ccfd2014-05-28 10:32:34 -04001339 * request. This happens in error conditions.
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001340 */
1341void
1342rpcrdma_recv_buffer_put(struct rpcrdma_rep *rep)
1343{
Chuck Leverfed171b2015-05-26 11:51:37 -04001344 struct rpcrdma_buffer *buffers = &rep->rr_rxprt->rx_buf;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001345
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001346 if (!rep->rr_temp) {
1347 spin_lock(&buffers->rb_lock);
1348 list_add(&rep->rr_list, &buffers->rb_recv_bufs);
1349 spin_unlock(&buffers->rb_lock);
1350 } else {
1351 rpcrdma_destroy_rep(rep);
1352 }
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001353}
1354
Chuck Lever9128c3e2015-01-21 11:04:00 -05001355/**
Chuck Lever99ef4db2016-09-15 10:56:10 -04001356 * rpcrdma_alloc_regbuf - allocate and DMA-map memory for SEND/RECV buffers
Chuck Lever9128c3e2015-01-21 11:04:00 -05001357 * @size: size of buffer to be allocated, in bytes
Chuck Lever99ef4db2016-09-15 10:56:10 -04001358 * @direction: direction of data movement
Chuck Lever9128c3e2015-01-21 11:04:00 -05001359 * @flags: GFP flags
1360 *
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001361 * Returns an ERR_PTR, or a pointer to a regbuf, a buffer that
1362 * can be persistently DMA-mapped for I/O.
Chuck Lever9128c3e2015-01-21 11:04:00 -05001363 *
1364 * xprtrdma uses a regbuf for posting an outgoing RDMA SEND, or for
Chuck Lever99ef4db2016-09-15 10:56:10 -04001365 * receiving the payload of RDMA RECV operations. During Long Calls
Chuck Lever5f624122018-12-19 10:59:01 -05001366 * or Replies they may be registered externally via frwr_map.
Chuck Lever9128c3e2015-01-21 11:04:00 -05001367 */
1368struct rpcrdma_regbuf *
Chuck Lever13650c22016-09-15 10:56:26 -04001369rpcrdma_alloc_regbuf(size_t size, enum dma_data_direction direction,
1370 gfp_t flags)
Chuck Lever9128c3e2015-01-21 11:04:00 -05001371{
1372 struct rpcrdma_regbuf *rb;
Chuck Lever9128c3e2015-01-21 11:04:00 -05001373
Chuck Lever9128c3e2015-01-21 11:04:00 -05001374 rb = kmalloc(sizeof(*rb) + size, flags);
1375 if (rb == NULL)
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001376 return ERR_PTR(-ENOMEM);
Chuck Lever9128c3e2015-01-21 11:04:00 -05001377
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001378 rb->rg_device = NULL;
Chuck Lever99ef4db2016-09-15 10:56:10 -04001379 rb->rg_direction = direction;
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001380 rb->rg_iov.length = size;
Chuck Lever9128c3e2015-01-21 11:04:00 -05001381
1382 return rb;
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001383}
Chuck Lever9128c3e2015-01-21 11:04:00 -05001384
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001385/**
1386 * __rpcrdma_map_regbuf - DMA-map a regbuf
1387 * @ia: controlling rpcrdma_ia
1388 * @rb: regbuf to be mapped
1389 */
1390bool
1391__rpcrdma_dma_map_regbuf(struct rpcrdma_ia *ia, struct rpcrdma_regbuf *rb)
1392{
Chuck Lever91a10c52017-04-11 13:23:02 -04001393 struct ib_device *device = ia->ri_device;
1394
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001395 if (rb->rg_direction == DMA_NONE)
1396 return false;
1397
Chuck Lever91a10c52017-04-11 13:23:02 -04001398 rb->rg_iov.addr = ib_dma_map_single(device,
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001399 (void *)rb->rg_base,
1400 rdmab_length(rb),
1401 rb->rg_direction);
Chuck Lever53b2c1c2018-12-19 11:00:06 -05001402 if (ib_dma_mapping_error(device, rdmab_addr(rb))) {
1403 trace_xprtrdma_dma_maperr(rdmab_addr(rb));
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001404 return false;
Chuck Lever53b2c1c2018-12-19 11:00:06 -05001405 }
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001406
Chuck Lever91a10c52017-04-11 13:23:02 -04001407 rb->rg_device = device;
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001408 rb->rg_iov.lkey = ia->ri_pd->local_dma_lkey;
1409 return true;
1410}
1411
1412static void
1413rpcrdma_dma_unmap_regbuf(struct rpcrdma_regbuf *rb)
1414{
Chuck Levere89e8d8f2018-01-31 12:34:13 -05001415 if (!rb)
1416 return;
1417
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001418 if (!rpcrdma_regbuf_is_mapped(rb))
1419 return;
1420
1421 ib_dma_unmap_single(rb->rg_device, rdmab_addr(rb),
1422 rdmab_length(rb), rb->rg_direction);
1423 rb->rg_device = NULL;
Chuck Lever9128c3e2015-01-21 11:04:00 -05001424}
1425
1426/**
1427 * rpcrdma_free_regbuf - deregister and free registered buffer
Chuck Lever9128c3e2015-01-21 11:04:00 -05001428 * @rb: regbuf to be deregistered and freed
1429 */
1430void
Chuck Lever13650c22016-09-15 10:56:26 -04001431rpcrdma_free_regbuf(struct rpcrdma_regbuf *rb)
Chuck Lever9128c3e2015-01-21 11:04:00 -05001432{
Chuck Lever54cbd6b2016-09-15 10:56:18 -04001433 rpcrdma_dma_unmap_regbuf(rb);
Chuck Levere531dca2015-08-03 13:03:20 -04001434 kfree(rb);
Chuck Lever9128c3e2015-01-21 11:04:00 -05001435}
1436
Chuck Lever995d3122018-12-19 11:00:32 -05001437/**
1438 * rpcrdma_ep_post - Post WRs to a transport's Send Queue
1439 * @ia: transport's device information
1440 * @ep: transport's RDMA endpoint information
1441 * @req: rpcrdma_req containing the Send WR to post
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001442 *
Chuck Lever995d3122018-12-19 11:00:32 -05001443 * Returns 0 if the post was successful, otherwise -ENOTCONN
1444 * is returned.
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001445 */
1446int
1447rpcrdma_ep_post(struct rpcrdma_ia *ia,
1448 struct rpcrdma_ep *ep,
1449 struct rpcrdma_req *req)
1450{
Chuck Leverae729502017-10-20 10:48:12 -04001451 struct ib_send_wr *send_wr = &req->rl_sendctx->sc_wr;
Chuck Lever655fec62016-09-15 10:57:24 -04001452 int rc;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001453
Chuck Lever01bb35c2017-10-20 10:48:36 -04001454 if (!ep->rep_send_count ||
1455 test_bit(RPCRDMA_REQ_F_TX_RESOURCES, &req->rl_flags)) {
Chuck Leverae729502017-10-20 10:48:12 -04001456 send_wr->send_flags |= IB_SEND_SIGNALED;
1457 ep->rep_send_count = ep->rep_send_batch;
1458 } else {
1459 send_wr->send_flags &= ~IB_SEND_SIGNALED;
1460 --ep->rep_send_count;
1461 }
Chuck Lever7a89f9c2016-06-29 13:53:43 -04001462
Chuck Lever5f624122018-12-19 10:59:01 -05001463 rc = frwr_send(ia, req);
Chuck Leverab03eff2017-12-20 16:30:40 -05001464 trace_xprtrdma_post_send(req, rc);
1465 if (rc)
1466 return -ENOTCONN;
1467 return 0;
\"Talpey, Thomas\c56c65f2007-09-10 13:51:18 -04001468}
1469
Chuck Lever6ceea362018-12-19 10:58:24 -05001470static void
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001471rpcrdma_post_recvs(struct rpcrdma_xprt *r_xprt, bool temp)
Chuck Leverf531a5d2015-10-24 17:27:43 -04001472{
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001473 struct rpcrdma_buffer *buf = &r_xprt->rx_buf;
Chuck Lever6ceea362018-12-19 10:58:24 -05001474 struct rpcrdma_ep *ep = &r_xprt->rx_ep;
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001475 struct ib_recv_wr *wr, *bad_wr;
1476 int needed, count, rc;
Chuck Leverf531a5d2015-10-24 17:27:43 -04001477
Chuck Lever61c208a2018-10-01 14:26:35 -04001478 rc = 0;
1479 count = 0;
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001480 needed = buf->rb_credits + (buf->rb_bc_srv_max_requests << 1);
Chuck Lever6ceea362018-12-19 10:58:24 -05001481 if (ep->rep_receive_count > needed)
Chuck Lever61c208a2018-10-01 14:26:35 -04001482 goto out;
Chuck Lever6ceea362018-12-19 10:58:24 -05001483 needed -= ep->rep_receive_count;
Chuck Leverf531a5d2015-10-24 17:27:43 -04001484
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001485 count = 0;
1486 wr = NULL;
1487 while (needed) {
1488 struct rpcrdma_regbuf *rb;
1489 struct rpcrdma_rep *rep;
1490
1491 spin_lock(&buf->rb_lock);
1492 rep = list_first_entry_or_null(&buf->rb_recv_bufs,
1493 struct rpcrdma_rep, rr_list);
1494 if (likely(rep))
1495 list_del(&rep->rr_list);
1496 spin_unlock(&buf->rb_lock);
1497 if (!rep) {
1498 if (rpcrdma_create_rep(r_xprt, temp))
1499 break;
1500 continue;
1501 }
1502
1503 rb = rep->rr_rdmabuf;
1504 if (!rpcrdma_regbuf_is_mapped(rb)) {
1505 if (!__rpcrdma_dma_map_regbuf(&r_xprt->rx_ia, rb)) {
1506 rpcrdma_recv_buffer_put(rep);
1507 break;
1508 }
1509 }
1510
1511 trace_xprtrdma_post_recv(rep->rr_recv_wr.wr_cqe);
1512 rep->rr_recv_wr.next = wr;
1513 wr = &rep->rr_recv_wr;
1514 ++count;
1515 --needed;
Chuck Leverf531a5d2015-10-24 17:27:43 -04001516 }
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001517 if (!count)
Chuck Lever61c208a2018-10-01 14:26:35 -04001518 goto out;
Chuck Leverf531a5d2015-10-24 17:27:43 -04001519
Bart Van Assched34ac5c2018-07-18 09:25:32 -07001520 rc = ib_post_recv(r_xprt->rx_ia.ri_id->qp, wr,
1521 (const struct ib_recv_wr **)&bad_wr);
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001522 if (rc) {
1523 for (wr = bad_wr; wr; wr = wr->next) {
1524 struct rpcrdma_rep *rep;
Chuck Leverf531a5d2015-10-24 17:27:43 -04001525
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001526 rep = container_of(wr, struct rpcrdma_rep, rr_recv_wr);
1527 rpcrdma_recv_buffer_put(rep);
1528 --count;
1529 }
1530 }
Chuck Lever6ceea362018-12-19 10:58:24 -05001531 ep->rep_receive_count += count;
Chuck Lever61c208a2018-10-01 14:26:35 -04001532out:
Chuck Lever7c8d9e72018-05-04 15:35:20 -04001533 trace_xprtrdma_post_recvs(r_xprt, count, rc);
Chuck Leverf531a5d2015-10-24 17:27:43 -04001534}