\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (c) 2003-2007 Network Appliance, Inc. All rights reserved. |
| 3 | * |
| 4 | * This software is available to you under a choice of one of two |
| 5 | * licenses. You may choose to be licensed under the terms of the GNU |
| 6 | * General Public License (GPL) Version 2, available from the file |
| 7 | * COPYING in the main directory of this source tree, or the BSD-type |
| 8 | * license below: |
| 9 | * |
| 10 | * Redistribution and use in source and binary forms, with or without |
| 11 | * modification, are permitted provided that the following conditions |
| 12 | * are met: |
| 13 | * |
| 14 | * Redistributions of source code must retain the above copyright |
| 15 | * notice, this list of conditions and the following disclaimer. |
| 16 | * |
| 17 | * Redistributions in binary form must reproduce the above |
| 18 | * copyright notice, this list of conditions and the following |
| 19 | * disclaimer in the documentation and/or other materials provided |
| 20 | * with the distribution. |
| 21 | * |
| 22 | * Neither the name of the Network Appliance, Inc. nor the names of |
| 23 | * its contributors may be used to endorse or promote products |
| 24 | * derived from this software without specific prior written |
| 25 | * permission. |
| 26 | * |
| 27 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| 28 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| 29 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| 30 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| 31 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| 32 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| 33 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 34 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 35 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 36 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| 37 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 38 | */ |
| 39 | |
| 40 | /* |
| 41 | * transport.c |
| 42 | * |
| 43 | * This file contains the top-level implementation of an RPC RDMA |
| 44 | * transport. |
| 45 | * |
| 46 | * Naming convention: functions beginning with xprt_ are part of the |
| 47 | * transport switch. All others are RPC RDMA internal. |
| 48 | */ |
| 49 | |
| 50 | #include <linux/module.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 51 | #include <linux/slab.h> |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 52 | #include <linux/seq_file.h> |
Jeff Layton | 5976687 | 2013-02-04 12:50:00 -0500 | [diff] [blame] | 53 | #include <linux/sunrpc/addr.h> |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 54 | |
| 55 | #include "xprt_rdma.h" |
| 56 | |
Jeff Layton | f895b25 | 2014-11-17 16:58:04 -0500 | [diff] [blame] | 57 | #if IS_ENABLED(CONFIG_SUNRPC_DEBUG) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 58 | # define RPCDBG_FACILITY RPCDBG_TRANS |
| 59 | #endif |
| 60 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 61 | /* |
| 62 | * tunables |
| 63 | */ |
| 64 | |
| 65 | static unsigned int xprt_rdma_slot_table_entries = RPCRDMA_DEF_SLOT_TABLE; |
Chuck Lever | 5d252f9 | 2016-01-07 14:50:10 -0500 | [diff] [blame] | 66 | unsigned int xprt_rdma_max_inline_read = RPCRDMA_DEF_INLINE; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 67 | static unsigned int xprt_rdma_max_inline_write = RPCRDMA_DEF_INLINE; |
| 68 | static unsigned int xprt_rdma_inline_write_padding; |
Chuck Lever | fff0959 | 2017-04-11 13:22:54 -0400 | [diff] [blame] | 69 | unsigned int xprt_rdma_memreg_strategy = RPCRDMA_FRMR; |
| 70 | int xprt_rdma_pad_optimize; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 71 | |
Jeff Layton | f895b25 | 2014-11-17 16:58:04 -0500 | [diff] [blame] | 72 | #if IS_ENABLED(CONFIG_SUNRPC_DEBUG) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 73 | |
| 74 | static unsigned int min_slot_table_size = RPCRDMA_MIN_SLOT_TABLE; |
| 75 | static unsigned int max_slot_table_size = RPCRDMA_MAX_SLOT_TABLE; |
Chuck Lever | 29c5542 | 2016-05-02 14:40:48 -0400 | [diff] [blame] | 76 | static unsigned int min_inline_size = RPCRDMA_MIN_INLINE; |
| 77 | static unsigned int max_inline_size = RPCRDMA_MAX_INLINE; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 78 | static unsigned int zero; |
| 79 | static unsigned int max_padding = PAGE_SIZE; |
| 80 | static unsigned int min_memreg = RPCRDMA_BOUNCEBUFFERS; |
| 81 | static unsigned int max_memreg = RPCRDMA_LAST - 1; |
| 82 | |
| 83 | static struct ctl_table_header *sunrpc_table_header; |
| 84 | |
Joe Perches | fe2c633 | 2013-06-11 23:04:25 -0700 | [diff] [blame] | 85 | static struct ctl_table xr_tunables_table[] = { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 86 | { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 87 | .procname = "rdma_slot_table_entries", |
| 88 | .data = &xprt_rdma_slot_table_entries, |
| 89 | .maxlen = sizeof(unsigned int), |
| 90 | .mode = 0644, |
Eric W. Biederman | 6d45611 | 2009-11-16 03:11:48 -0800 | [diff] [blame] | 91 | .proc_handler = proc_dointvec_minmax, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 92 | .extra1 = &min_slot_table_size, |
| 93 | .extra2 = &max_slot_table_size |
| 94 | }, |
| 95 | { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 96 | .procname = "rdma_max_inline_read", |
| 97 | .data = &xprt_rdma_max_inline_read, |
| 98 | .maxlen = sizeof(unsigned int), |
| 99 | .mode = 0644, |
Chuck Lever | 44829d0 | 2016-09-15 10:57:32 -0400 | [diff] [blame] | 100 | .proc_handler = proc_dointvec_minmax, |
Chuck Lever | 29c5542 | 2016-05-02 14:40:48 -0400 | [diff] [blame] | 101 | .extra1 = &min_inline_size, |
| 102 | .extra2 = &max_inline_size, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 103 | }, |
| 104 | { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 105 | .procname = "rdma_max_inline_write", |
| 106 | .data = &xprt_rdma_max_inline_write, |
| 107 | .maxlen = sizeof(unsigned int), |
| 108 | .mode = 0644, |
Chuck Lever | 44829d0 | 2016-09-15 10:57:32 -0400 | [diff] [blame] | 109 | .proc_handler = proc_dointvec_minmax, |
Chuck Lever | 29c5542 | 2016-05-02 14:40:48 -0400 | [diff] [blame] | 110 | .extra1 = &min_inline_size, |
| 111 | .extra2 = &max_inline_size, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 112 | }, |
| 113 | { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 114 | .procname = "rdma_inline_write_padding", |
| 115 | .data = &xprt_rdma_inline_write_padding, |
| 116 | .maxlen = sizeof(unsigned int), |
| 117 | .mode = 0644, |
Eric W. Biederman | 6d45611 | 2009-11-16 03:11:48 -0800 | [diff] [blame] | 118 | .proc_handler = proc_dointvec_minmax, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 119 | .extra1 = &zero, |
| 120 | .extra2 = &max_padding, |
| 121 | }, |
| 122 | { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 123 | .procname = "rdma_memreg_strategy", |
| 124 | .data = &xprt_rdma_memreg_strategy, |
| 125 | .maxlen = sizeof(unsigned int), |
| 126 | .mode = 0644, |
Eric W. Biederman | 6d45611 | 2009-11-16 03:11:48 -0800 | [diff] [blame] | 127 | .proc_handler = proc_dointvec_minmax, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 128 | .extra1 = &min_memreg, |
| 129 | .extra2 = &max_memreg, |
| 130 | }, |
| 131 | { |
Tom Talpey | 9191ca3 | 2008-10-09 15:01:11 -0400 | [diff] [blame] | 132 | .procname = "rdma_pad_optimize", |
| 133 | .data = &xprt_rdma_pad_optimize, |
| 134 | .maxlen = sizeof(unsigned int), |
| 135 | .mode = 0644, |
Eric W. Biederman | 6d45611 | 2009-11-16 03:11:48 -0800 | [diff] [blame] | 136 | .proc_handler = proc_dointvec, |
Tom Talpey | 9191ca3 | 2008-10-09 15:01:11 -0400 | [diff] [blame] | 137 | }, |
Eric W. Biederman | f8572d8 | 2009-11-05 13:32:03 -0800 | [diff] [blame] | 138 | { }, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 139 | }; |
| 140 | |
Joe Perches | fe2c633 | 2013-06-11 23:04:25 -0700 | [diff] [blame] | 141 | static struct ctl_table sunrpc_table[] = { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 142 | { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 143 | .procname = "sunrpc", |
| 144 | .mode = 0555, |
| 145 | .child = xr_tunables_table |
| 146 | }, |
Eric W. Biederman | f8572d8 | 2009-11-05 13:32:03 -0800 | [diff] [blame] | 147 | { }, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 148 | }; |
| 149 | |
| 150 | #endif |
| 151 | |
Chuck Lever | d31ae25 | 2017-08-01 12:00:39 -0400 | [diff] [blame^] | 152 | static const struct rpc_xprt_ops xprt_rdma_procs; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 153 | |
| 154 | static void |
Chuck Lever | 0dd39ca | 2015-03-30 14:33:43 -0400 | [diff] [blame] | 155 | xprt_rdma_format_addresses4(struct rpc_xprt *xprt, struct sockaddr *sap) |
| 156 | { |
| 157 | struct sockaddr_in *sin = (struct sockaddr_in *)sap; |
| 158 | char buf[20]; |
| 159 | |
| 160 | snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr)); |
| 161 | xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL); |
| 162 | |
| 163 | xprt->address_strings[RPC_DISPLAY_NETID] = RPCBIND_NETID_RDMA; |
| 164 | } |
| 165 | |
| 166 | static void |
| 167 | xprt_rdma_format_addresses6(struct rpc_xprt *xprt, struct sockaddr *sap) |
| 168 | { |
| 169 | struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap; |
| 170 | char buf[40]; |
| 171 | |
| 172 | snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr); |
| 173 | xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL); |
| 174 | |
| 175 | xprt->address_strings[RPC_DISPLAY_NETID] = RPCBIND_NETID_RDMA6; |
| 176 | } |
| 177 | |
Chuck Lever | 5d252f9 | 2016-01-07 14:50:10 -0500 | [diff] [blame] | 178 | void |
Chuck Lever | 5231eb9 | 2015-08-03 13:02:41 -0400 | [diff] [blame] | 179 | xprt_rdma_format_addresses(struct rpc_xprt *xprt, struct sockaddr *sap) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 180 | { |
Chuck Lever | 0dd39ca | 2015-03-30 14:33:43 -0400 | [diff] [blame] | 181 | char buf[128]; |
| 182 | |
| 183 | switch (sap->sa_family) { |
| 184 | case AF_INET: |
| 185 | xprt_rdma_format_addresses4(xprt, sap); |
| 186 | break; |
| 187 | case AF_INET6: |
| 188 | xprt_rdma_format_addresses6(xprt, sap); |
| 189 | break; |
| 190 | default: |
| 191 | pr_err("rpcrdma: Unrecognized address family\n"); |
| 192 | return; |
| 193 | } |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 194 | |
Chuck Lever | c877b84 | 2009-08-09 15:09:36 -0400 | [diff] [blame] | 195 | (void)rpc_ntop(sap, buf, sizeof(buf)); |
| 196 | xprt->address_strings[RPC_DISPLAY_ADDR] = kstrdup(buf, GFP_KERNEL); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 197 | |
Joe Perches | 81160e66 | 2010-03-08 12:15:59 -0800 | [diff] [blame] | 198 | snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap)); |
Chuck Lever | c877b84 | 2009-08-09 15:09:36 -0400 | [diff] [blame] | 199 | xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 200 | |
Joe Perches | 81160e66 | 2010-03-08 12:15:59 -0800 | [diff] [blame] | 201 | snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap)); |
Chuck Lever | c877b84 | 2009-08-09 15:09:36 -0400 | [diff] [blame] | 202 | xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 203 | |
Chuck Lever | 0dd39ca | 2015-03-30 14:33:43 -0400 | [diff] [blame] | 204 | xprt->address_strings[RPC_DISPLAY_PROTO] = "rdma"; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 205 | } |
| 206 | |
Chuck Lever | 5d252f9 | 2016-01-07 14:50:10 -0500 | [diff] [blame] | 207 | void |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 208 | xprt_rdma_free_addresses(struct rpc_xprt *xprt) |
| 209 | { |
Chuck Lever | 33e01dc | 2008-01-14 12:32:20 -0500 | [diff] [blame] | 210 | unsigned int i; |
| 211 | |
| 212 | for (i = 0; i < RPC_DISPLAY_MAX; i++) |
| 213 | switch (i) { |
| 214 | case RPC_DISPLAY_PROTO: |
| 215 | case RPC_DISPLAY_NETID: |
| 216 | continue; |
| 217 | default: |
| 218 | kfree(xprt->address_strings[i]); |
| 219 | } |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 220 | } |
| 221 | |
Chuck Lever | 3a72dc7 | 2016-11-29 10:53:37 -0500 | [diff] [blame] | 222 | void |
| 223 | rpcrdma_conn_func(struct rpcrdma_ep *ep) |
| 224 | { |
| 225 | schedule_delayed_work(&ep->rep_connect_worker, 0); |
| 226 | } |
| 227 | |
| 228 | void |
| 229 | rpcrdma_connect_worker(struct work_struct *work) |
| 230 | { |
| 231 | struct rpcrdma_ep *ep = |
| 232 | container_of(work, struct rpcrdma_ep, rep_connect_worker.work); |
| 233 | struct rpcrdma_xprt *r_xprt = |
| 234 | container_of(ep, struct rpcrdma_xprt, rx_ep); |
| 235 | struct rpc_xprt *xprt = &r_xprt->rx_xprt; |
| 236 | |
| 237 | spin_lock_bh(&xprt->transport_lock); |
| 238 | if (++xprt->connect_cookie == 0) /* maintain a reserved value */ |
| 239 | ++xprt->connect_cookie; |
| 240 | if (ep->rep_connected > 0) { |
| 241 | if (!xprt_test_and_set_connected(xprt)) |
| 242 | xprt_wake_pending_tasks(xprt, 0); |
| 243 | } else { |
| 244 | if (xprt_test_and_clear_connected(xprt)) |
| 245 | xprt_wake_pending_tasks(xprt, -ENOTCONN); |
| 246 | } |
| 247 | spin_unlock_bh(&xprt->transport_lock); |
| 248 | } |
| 249 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 250 | static void |
| 251 | xprt_rdma_connect_worker(struct work_struct *work) |
| 252 | { |
Chuck Lever | 5abefb8 | 2015-01-21 11:02:37 -0500 | [diff] [blame] | 253 | struct rpcrdma_xprt *r_xprt = container_of(work, struct rpcrdma_xprt, |
| 254 | rx_connect_worker.work); |
| 255 | struct rpc_xprt *xprt = &r_xprt->rx_xprt; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 256 | int rc = 0; |
| 257 | |
Trond Myklebust | d19751e | 2012-09-11 17:21:25 -0400 | [diff] [blame] | 258 | xprt_clear_connected(xprt); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 259 | |
Trond Myklebust | d19751e | 2012-09-11 17:21:25 -0400 | [diff] [blame] | 260 | dprintk("RPC: %s: %sconnect\n", __func__, |
| 261 | r_xprt->rx_ep.rep_connected != 0 ? "re" : ""); |
| 262 | rc = rpcrdma_ep_connect(&r_xprt->rx_ep, &r_xprt->rx_ia); |
| 263 | if (rc) |
| 264 | xprt_wake_pending_tasks(xprt, rc); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 265 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 266 | dprintk("RPC: %s: exit\n", __func__); |
| 267 | xprt_clear_connecting(xprt); |
| 268 | } |
| 269 | |
Chuck Lever | 4a06825 | 2015-05-11 14:02:25 -0400 | [diff] [blame] | 270 | static void |
| 271 | xprt_rdma_inject_disconnect(struct rpc_xprt *xprt) |
| 272 | { |
| 273 | struct rpcrdma_xprt *r_xprt = container_of(xprt, struct rpcrdma_xprt, |
| 274 | rx_xprt); |
| 275 | |
| 276 | pr_info("rpcrdma: injecting transport disconnect on xprt=%p\n", xprt); |
| 277 | rdma_disconnect(r_xprt->rx_ia.ri_id); |
| 278 | } |
| 279 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 280 | /* |
| 281 | * xprt_rdma_destroy |
| 282 | * |
| 283 | * Destroy the xprt. |
| 284 | * Free all memory associated with the object, including its own. |
| 285 | * NOTE: none of the *destroy methods free memory for their top-level |
| 286 | * objects, even though they may have allocated it (they do free |
| 287 | * private memory). It's up to the caller to handle it. In this |
| 288 | * case (RDMA transport), all structure memory is inlined with the |
| 289 | * struct rpcrdma_xprt. |
| 290 | */ |
| 291 | static void |
| 292 | xprt_rdma_destroy(struct rpc_xprt *xprt) |
| 293 | { |
| 294 | struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 295 | |
| 296 | dprintk("RPC: %s: called\n", __func__); |
| 297 | |
Chuck Lever | 5abefb8 | 2015-01-21 11:02:37 -0500 | [diff] [blame] | 298 | cancel_delayed_work_sync(&r_xprt->rx_connect_worker); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 299 | |
| 300 | xprt_clear_connected(xprt); |
| 301 | |
Chuck Lever | 7f1d541 | 2014-05-28 10:33:16 -0400 | [diff] [blame] | 302 | rpcrdma_ep_destroy(&r_xprt->rx_ep, &r_xprt->rx_ia); |
Steve Wise | 72c0217 | 2015-09-21 12:24:23 -0500 | [diff] [blame] | 303 | rpcrdma_buffer_destroy(&r_xprt->rx_buf); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 304 | rpcrdma_ia_close(&r_xprt->rx_ia); |
| 305 | |
| 306 | xprt_rdma_free_addresses(xprt); |
| 307 | |
Pavel Emelyanov | e204e62 | 2010-09-29 16:03:13 +0400 | [diff] [blame] | 308 | xprt_free(xprt); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 309 | |
| 310 | dprintk("RPC: %s: returning\n", __func__); |
| 311 | |
| 312 | module_put(THIS_MODULE); |
| 313 | } |
| 314 | |
Trond Myklebust | 2881ae7 | 2007-12-20 16:03:54 -0500 | [diff] [blame] | 315 | static const struct rpc_timeout xprt_rdma_default_timeout = { |
| 316 | .to_initval = 60 * HZ, |
| 317 | .to_maxval = 60 * HZ, |
| 318 | }; |
| 319 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 320 | /** |
| 321 | * xprt_setup_rdma - Set up transport to use RDMA |
| 322 | * |
| 323 | * @args: rpc transport arguments |
| 324 | */ |
| 325 | static struct rpc_xprt * |
| 326 | xprt_setup_rdma(struct xprt_create *args) |
| 327 | { |
| 328 | struct rpcrdma_create_data_internal cdata; |
| 329 | struct rpc_xprt *xprt; |
| 330 | struct rpcrdma_xprt *new_xprt; |
| 331 | struct rpcrdma_ep *new_ep; |
Chuck Lever | 5231eb9 | 2015-08-03 13:02:41 -0400 | [diff] [blame] | 332 | struct sockaddr *sap; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 333 | int rc; |
| 334 | |
| 335 | if (args->addrlen > sizeof(xprt->addr)) { |
| 336 | dprintk("RPC: %s: address too large\n", __func__); |
| 337 | return ERR_PTR(-EBADF); |
| 338 | } |
| 339 | |
Pavel Emelyanov | 37aa213 | 2010-09-29 16:05:43 +0400 | [diff] [blame] | 340 | xprt = xprt_alloc(args->net, sizeof(struct rpcrdma_xprt), |
Trond Myklebust | d9ba131 | 2011-07-17 18:11:30 -0400 | [diff] [blame] | 341 | xprt_rdma_slot_table_entries, |
Pavel Emelyanov | bd1722d | 2010-09-29 16:02:43 +0400 | [diff] [blame] | 342 | xprt_rdma_slot_table_entries); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 343 | if (xprt == NULL) { |
| 344 | dprintk("RPC: %s: couldn't allocate rpcrdma_xprt\n", |
| 345 | __func__); |
| 346 | return ERR_PTR(-ENOMEM); |
| 347 | } |
| 348 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 349 | /* 60 second timeout, no retries */ |
Trond Myklebust | ba7392b | 2007-12-20 16:03:55 -0500 | [diff] [blame] | 350 | xprt->timeout = &xprt_rdma_default_timeout; |
Chuck Lever | bfaee09 | 2014-05-28 10:34:32 -0400 | [diff] [blame] | 351 | xprt->bind_timeout = RPCRDMA_BIND_TO; |
| 352 | xprt->reestablish_timeout = RPCRDMA_INIT_REEST_TO; |
| 353 | xprt->idle_timeout = RPCRDMA_IDLE_DISC_TO; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 354 | |
| 355 | xprt->resvport = 0; /* privileged port not needed */ |
| 356 | xprt->tsh_size = 0; /* RPC-RDMA handles framing */ |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 357 | xprt->ops = &xprt_rdma_procs; |
| 358 | |
| 359 | /* |
| 360 | * Set up RDMA-specific connect data. |
| 361 | */ |
| 362 | |
Chuck Lever | 5231eb9 | 2015-08-03 13:02:41 -0400 | [diff] [blame] | 363 | sap = (struct sockaddr *)&cdata.addr; |
| 364 | memcpy(sap, args->dstaddr, args->addrlen); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 365 | |
| 366 | /* Ensure xprt->addr holds valid server TCP (not RDMA) |
| 367 | * address, for any side protocols which peek at it */ |
| 368 | xprt->prot = IPPROTO_TCP; |
| 369 | xprt->addrlen = args->addrlen; |
Chuck Lever | 5231eb9 | 2015-08-03 13:02:41 -0400 | [diff] [blame] | 370 | memcpy(&xprt->addr, sap, xprt->addrlen); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 371 | |
Chuck Lever | 5231eb9 | 2015-08-03 13:02:41 -0400 | [diff] [blame] | 372 | if (rpc_get_port(sap)) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 373 | xprt_set_bound(xprt); |
| 374 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 375 | cdata.max_requests = xprt->max_reqs; |
| 376 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 377 | cdata.rsize = RPCRDMA_MAX_SEGS * PAGE_SIZE; /* RDMA write max */ |
| 378 | cdata.wsize = RPCRDMA_MAX_SEGS * PAGE_SIZE; /* RDMA read max */ |
| 379 | |
| 380 | cdata.inline_wsize = xprt_rdma_max_inline_write; |
| 381 | if (cdata.inline_wsize > cdata.wsize) |
| 382 | cdata.inline_wsize = cdata.wsize; |
| 383 | |
| 384 | cdata.inline_rsize = xprt_rdma_max_inline_read; |
| 385 | if (cdata.inline_rsize > cdata.rsize) |
| 386 | cdata.inline_rsize = cdata.rsize; |
| 387 | |
| 388 | cdata.padding = xprt_rdma_inline_write_padding; |
| 389 | |
| 390 | /* |
| 391 | * Create new transport instance, which includes initialized |
| 392 | * o ia |
| 393 | * o endpoint |
| 394 | * o buffers |
| 395 | */ |
| 396 | |
| 397 | new_xprt = rpcx_to_rdmax(xprt); |
| 398 | |
Chuck Lever | fff0959 | 2017-04-11 13:22:54 -0400 | [diff] [blame] | 399 | rc = rpcrdma_ia_open(new_xprt, sap); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 400 | if (rc) |
| 401 | goto out1; |
| 402 | |
| 403 | /* |
| 404 | * initialize and create ep |
| 405 | */ |
| 406 | new_xprt->rx_data = cdata; |
| 407 | new_ep = &new_xprt->rx_ep; |
| 408 | new_ep->rep_remote_addr = cdata.addr; |
| 409 | |
| 410 | rc = rpcrdma_ep_create(&new_xprt->rx_ep, |
| 411 | &new_xprt->rx_ia, &new_xprt->rx_data); |
| 412 | if (rc) |
| 413 | goto out2; |
| 414 | |
| 415 | /* |
| 416 | * Allocate pre-registered send and receive buffers for headers and |
| 417 | * any inline data. Also specify any padding which will be provided |
| 418 | * from a preregistered zero buffer. |
| 419 | */ |
Chuck Lever | ac920d0 | 2015-01-21 11:03:44 -0500 | [diff] [blame] | 420 | rc = rpcrdma_buffer_create(new_xprt); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 421 | if (rc) |
| 422 | goto out3; |
| 423 | |
| 424 | /* |
| 425 | * Register a callback for connection events. This is necessary because |
| 426 | * connection loss notification is async. We also catch connection loss |
| 427 | * when reaping receives. |
| 428 | */ |
Chuck Lever | 5abefb8 | 2015-01-21 11:02:37 -0500 | [diff] [blame] | 429 | INIT_DELAYED_WORK(&new_xprt->rx_connect_worker, |
| 430 | xprt_rdma_connect_worker); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 431 | |
Chuck Lever | 5231eb9 | 2015-08-03 13:02:41 -0400 | [diff] [blame] | 432 | xprt_rdma_format_addresses(xprt, sap); |
Chuck Lever | 1c9351e | 2015-03-30 14:34:30 -0400 | [diff] [blame] | 433 | xprt->max_payload = new_xprt->rx_ia.ri_ops->ro_maxpages(new_xprt); |
| 434 | if (xprt->max_payload == 0) |
| 435 | goto out4; |
| 436 | xprt->max_payload <<= PAGE_SHIFT; |
Chuck Lever | 43e9598 | 2014-07-29 17:23:34 -0400 | [diff] [blame] | 437 | dprintk("RPC: %s: transport data payload maximum: %zu bytes\n", |
| 438 | __func__, xprt->max_payload); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 439 | |
| 440 | if (!try_module_get(THIS_MODULE)) |
| 441 | goto out4; |
| 442 | |
Chuck Lever | 5231eb9 | 2015-08-03 13:02:41 -0400 | [diff] [blame] | 443 | dprintk("RPC: %s: %s:%s\n", __func__, |
| 444 | xprt->address_strings[RPC_DISPLAY_ADDR], |
| 445 | xprt->address_strings[RPC_DISPLAY_PORT]); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 446 | return xprt; |
| 447 | |
| 448 | out4: |
| 449 | xprt_rdma_free_addresses(xprt); |
| 450 | rc = -EINVAL; |
| 451 | out3: |
Chuck Lever | 7f1d541 | 2014-05-28 10:33:16 -0400 | [diff] [blame] | 452 | rpcrdma_ep_destroy(new_ep, &new_xprt->rx_ia); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 453 | out2: |
| 454 | rpcrdma_ia_close(&new_xprt->rx_ia); |
| 455 | out1: |
Pavel Emelyanov | e204e62 | 2010-09-29 16:03:13 +0400 | [diff] [blame] | 456 | xprt_free(xprt); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 457 | return ERR_PTR(rc); |
| 458 | } |
| 459 | |
Chuck Lever | bebd031 | 2017-04-11 13:23:10 -0400 | [diff] [blame] | 460 | /** |
| 461 | * xprt_rdma_close - Close down RDMA connection |
| 462 | * @xprt: generic transport to be closed |
| 463 | * |
| 464 | * Called during transport shutdown reconnect, or device |
| 465 | * removal. Caller holds the transport's write lock. |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 466 | */ |
| 467 | static void |
| 468 | xprt_rdma_close(struct rpc_xprt *xprt) |
| 469 | { |
| 470 | struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt); |
Chuck Lever | bebd031 | 2017-04-11 13:23:10 -0400 | [diff] [blame] | 471 | struct rpcrdma_ep *ep = &r_xprt->rx_ep; |
| 472 | struct rpcrdma_ia *ia = &r_xprt->rx_ia; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 473 | |
Chuck Lever | bebd031 | 2017-04-11 13:23:10 -0400 | [diff] [blame] | 474 | dprintk("RPC: %s: closing xprt %p\n", __func__, xprt); |
| 475 | |
| 476 | if (test_and_clear_bit(RPCRDMA_IAF_REMOVING, &ia->ri_flags)) { |
| 477 | xprt_clear_connected(xprt); |
| 478 | rpcrdma_ia_remove(ia); |
| 479 | return; |
| 480 | } |
| 481 | if (ep->rep_connected == -ENODEV) |
| 482 | return; |
| 483 | if (ep->rep_connected > 0) |
Tom Talpey | 08ca0dc | 2008-10-10 11:32:34 -0400 | [diff] [blame] | 484 | xprt->reestablish_timeout = 0; |
Trond Myklebust | 62da3b2 | 2007-11-06 18:44:20 -0500 | [diff] [blame] | 485 | xprt_disconnect_done(xprt); |
Chuck Lever | bebd031 | 2017-04-11 13:23:10 -0400 | [diff] [blame] | 486 | rpcrdma_ep_disconnect(ep, ia); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 487 | } |
| 488 | |
| 489 | static void |
| 490 | xprt_rdma_set_port(struct rpc_xprt *xprt, u16 port) |
| 491 | { |
| 492 | struct sockaddr_in *sap; |
| 493 | |
| 494 | sap = (struct sockaddr_in *)&xprt->addr; |
| 495 | sap->sin_port = htons(port); |
| 496 | sap = (struct sockaddr_in *)&rpcx_to_rdmad(xprt).addr; |
| 497 | sap->sin_port = htons(port); |
| 498 | dprintk("RPC: %s: %u\n", __func__, port); |
| 499 | } |
| 500 | |
Chuck Lever | 3384979 | 2017-04-11 13:22:46 -0400 | [diff] [blame] | 501 | /** |
| 502 | * xprt_rdma_timer - invoked when an RPC times out |
| 503 | * @xprt: controlling RPC transport |
| 504 | * @task: RPC task that timed out |
| 505 | * |
| 506 | * Invoked when the transport is still connected, but an RPC |
| 507 | * retransmit timeout occurs. |
| 508 | * |
| 509 | * Since RDMA connections don't have a keep-alive, forcibly |
| 510 | * disconnect and retry to connect. This drives full |
| 511 | * detection of the network path, and retransmissions of |
| 512 | * all pending RPCs. |
| 513 | */ |
| 514 | static void |
| 515 | xprt_rdma_timer(struct rpc_xprt *xprt, struct rpc_task *task) |
| 516 | { |
| 517 | dprintk("RPC: %5u %s: xprt = %p\n", task->tk_pid, __func__, xprt); |
| 518 | |
| 519 | xprt_force_disconnect(xprt); |
| 520 | } |
| 521 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 522 | static void |
Trond Myklebust | 1b09209 | 2013-01-08 09:26:49 -0500 | [diff] [blame] | 523 | xprt_rdma_connect(struct rpc_xprt *xprt, struct rpc_task *task) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 524 | { |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 525 | struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt); |
| 526 | |
Trond Myklebust | 0b9e794 | 2010-04-16 16:41:57 -0400 | [diff] [blame] | 527 | if (r_xprt->rx_ep.rep_connected != 0) { |
| 528 | /* Reconnect */ |
Chuck Lever | 5abefb8 | 2015-01-21 11:02:37 -0500 | [diff] [blame] | 529 | schedule_delayed_work(&r_xprt->rx_connect_worker, |
| 530 | xprt->reestablish_timeout); |
Trond Myklebust | 0b9e794 | 2010-04-16 16:41:57 -0400 | [diff] [blame] | 531 | xprt->reestablish_timeout <<= 1; |
Chuck Lever | bfaee09 | 2014-05-28 10:34:32 -0400 | [diff] [blame] | 532 | if (xprt->reestablish_timeout > RPCRDMA_MAX_REEST_TO) |
| 533 | xprt->reestablish_timeout = RPCRDMA_MAX_REEST_TO; |
| 534 | else if (xprt->reestablish_timeout < RPCRDMA_INIT_REEST_TO) |
| 535 | xprt->reestablish_timeout = RPCRDMA_INIT_REEST_TO; |
Trond Myklebust | 0b9e794 | 2010-04-16 16:41:57 -0400 | [diff] [blame] | 536 | } else { |
Chuck Lever | 5abefb8 | 2015-01-21 11:02:37 -0500 | [diff] [blame] | 537 | schedule_delayed_work(&r_xprt->rx_connect_worker, 0); |
Trond Myklebust | 0b9e794 | 2010-04-16 16:41:57 -0400 | [diff] [blame] | 538 | if (!RPC_IS_ASYNC(task)) |
Chuck Lever | 5abefb8 | 2015-01-21 11:02:37 -0500 | [diff] [blame] | 539 | flush_delayed_work(&r_xprt->rx_connect_worker); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 540 | } |
| 541 | } |
| 542 | |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 543 | /* Allocate a fixed-size buffer in which to construct and send the |
| 544 | * RPC-over-RDMA header for this request. |
| 545 | */ |
| 546 | static bool |
| 547 | rpcrdma_get_rdmabuf(struct rpcrdma_xprt *r_xprt, struct rpcrdma_req *req, |
| 548 | gfp_t flags) |
| 549 | { |
Chuck Lever | 08cf2ef | 2016-09-15 10:56:02 -0400 | [diff] [blame] | 550 | size_t size = RPCRDMA_HDRBUF_SIZE; |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 551 | struct rpcrdma_regbuf *rb; |
| 552 | |
| 553 | if (req->rl_rdmabuf) |
| 554 | return true; |
| 555 | |
Chuck Lever | 13650c2 | 2016-09-15 10:56:26 -0400 | [diff] [blame] | 556 | rb = rpcrdma_alloc_regbuf(size, DMA_TO_DEVICE, flags); |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 557 | if (IS_ERR(rb)) |
| 558 | return false; |
| 559 | |
| 560 | r_xprt->rx_stats.hardway_register_count += size; |
| 561 | req->rl_rdmabuf = rb; |
| 562 | return true; |
| 563 | } |
| 564 | |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 565 | static bool |
| 566 | rpcrdma_get_sendbuf(struct rpcrdma_xprt *r_xprt, struct rpcrdma_req *req, |
| 567 | size_t size, gfp_t flags) |
| 568 | { |
| 569 | struct rpcrdma_regbuf *rb; |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 570 | |
| 571 | if (req->rl_sendbuf && rdmab_length(req->rl_sendbuf) >= size) |
| 572 | return true; |
| 573 | |
Chuck Lever | 655fec6 | 2016-09-15 10:57:24 -0400 | [diff] [blame] | 574 | rb = rpcrdma_alloc_regbuf(size, DMA_TO_DEVICE, flags); |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 575 | if (IS_ERR(rb)) |
| 576 | return false; |
| 577 | |
Chuck Lever | 13650c2 | 2016-09-15 10:56:26 -0400 | [diff] [blame] | 578 | rpcrdma_free_regbuf(req->rl_sendbuf); |
Chuck Lever | 655fec6 | 2016-09-15 10:57:24 -0400 | [diff] [blame] | 579 | r_xprt->rx_stats.hardway_register_count += size; |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 580 | req->rl_sendbuf = rb; |
| 581 | return true; |
| 582 | } |
| 583 | |
| 584 | /* The rq_rcv_buf is used only if a Reply chunk is necessary. |
| 585 | * The decision to use a Reply chunk is made later in |
| 586 | * rpcrdma_marshal_req. This buffer is registered at that time. |
| 587 | * |
| 588 | * Otherwise, the associated RPC Reply arrives in a separate |
| 589 | * Receive buffer, arbitrarily chosen by the HCA. The buffer |
| 590 | * allocated here for the RPC Reply is not utilized in that |
| 591 | * case. See rpcrdma_inline_fixup. |
| 592 | * |
| 593 | * A regbuf is used here to remember the buffer size. |
| 594 | */ |
| 595 | static bool |
| 596 | rpcrdma_get_recvbuf(struct rpcrdma_xprt *r_xprt, struct rpcrdma_req *req, |
| 597 | size_t size, gfp_t flags) |
| 598 | { |
| 599 | struct rpcrdma_regbuf *rb; |
| 600 | |
| 601 | if (req->rl_recvbuf && rdmab_length(req->rl_recvbuf) >= size) |
| 602 | return true; |
| 603 | |
Chuck Lever | 13650c2 | 2016-09-15 10:56:26 -0400 | [diff] [blame] | 604 | rb = rpcrdma_alloc_regbuf(size, DMA_NONE, flags); |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 605 | if (IS_ERR(rb)) |
| 606 | return false; |
| 607 | |
Chuck Lever | 13650c2 | 2016-09-15 10:56:26 -0400 | [diff] [blame] | 608 | rpcrdma_free_regbuf(req->rl_recvbuf); |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 609 | r_xprt->rx_stats.hardway_register_count += size; |
| 610 | req->rl_recvbuf = rb; |
| 611 | return true; |
| 612 | } |
| 613 | |
Chuck Lever | 5fe6eaa | 2016-09-15 10:55:20 -0400 | [diff] [blame] | 614 | /** |
| 615 | * xprt_rdma_allocate - allocate transport resources for an RPC |
| 616 | * @task: RPC task |
| 617 | * |
| 618 | * Return values: |
| 619 | * 0: Success; rq_buffer points to RPC buffer to use |
| 620 | * ENOMEM: Out of memory, call again later |
| 621 | * EIO: A permanent error occurred, do not retry |
| 622 | * |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 623 | * The RDMA allocate/free functions need the task structure as a place |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 624 | * to hide the struct rpcrdma_req, which is necessary for the actual |
| 625 | * send/recv sequence. |
Chuck Lever | 0ca77dc | 2015-01-21 11:04:08 -0500 | [diff] [blame] | 626 | * |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 627 | * xprt_rdma_allocate provides buffers that are already mapped for |
| 628 | * DMA, and a local DMA lkey is provided for each. |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 629 | */ |
Chuck Lever | 5fe6eaa | 2016-09-15 10:55:20 -0400 | [diff] [blame] | 630 | static int |
| 631 | xprt_rdma_allocate(struct rpc_task *task) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 632 | { |
Chuck Lever | 5fe6eaa | 2016-09-15 10:55:20 -0400 | [diff] [blame] | 633 | struct rpc_rqst *rqst = task->tk_rqstp; |
Chuck Lever | 5fe6eaa | 2016-09-15 10:55:20 -0400 | [diff] [blame] | 634 | struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(rqst->rq_xprt); |
Chuck Lever | 0ca77dc | 2015-01-21 11:04:08 -0500 | [diff] [blame] | 635 | struct rpcrdma_req *req; |
Chuck Lever | a0a1d50 | 2015-01-26 17:11:47 -0500 | [diff] [blame] | 636 | gfp_t flags; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 637 | |
Chuck Lever | 0ca77dc | 2015-01-21 11:04:08 -0500 | [diff] [blame] | 638 | req = rpcrdma_buffer_get(&r_xprt->rx_buf); |
Chuck Lever | c977dea | 2014-05-28 10:35:06 -0400 | [diff] [blame] | 639 | if (req == NULL) |
Chuck Lever | 5fe6eaa | 2016-09-15 10:55:20 -0400 | [diff] [blame] | 640 | return -ENOMEM; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 641 | |
Chuck Lever | 5d252f9 | 2016-01-07 14:50:10 -0500 | [diff] [blame] | 642 | flags = RPCRDMA_DEF_GFP; |
Chuck Lever | a0a1d50 | 2015-01-26 17:11:47 -0500 | [diff] [blame] | 643 | if (RPC_IS_SWAPPER(task)) |
| 644 | flags = __GFP_MEMALLOC | GFP_NOWAIT | __GFP_NOWARN; |
| 645 | |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 646 | if (!rpcrdma_get_rdmabuf(r_xprt, req, flags)) |
| 647 | goto out_fail; |
| 648 | if (!rpcrdma_get_sendbuf(r_xprt, req, rqst->rq_callsize, flags)) |
| 649 | goto out_fail; |
| 650 | if (!rpcrdma_get_recvbuf(r_xprt, req, rqst->rq_rcvsize, flags)) |
| 651 | goto out_fail; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 652 | |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 653 | dprintk("RPC: %5u %s: send size = %zd, recv size = %zd, req = %p\n", |
| 654 | task->tk_pid, __func__, rqst->rq_callsize, |
| 655 | rqst->rq_rcvsize, req); |
| 656 | |
Tom Talpey | 575448b | 2008-10-09 15:00:40 -0400 | [diff] [blame] | 657 | req->rl_connect_cookie = 0; /* our reserved value */ |
Chuck Lever | 5a6d1db | 2016-09-15 10:55:45 -0400 | [diff] [blame] | 658 | rpcrdma_set_xprtdata(rqst, req); |
Chuck Lever | 5fe6eaa | 2016-09-15 10:55:20 -0400 | [diff] [blame] | 659 | rqst->rq_buffer = req->rl_sendbuf->rg_base; |
Chuck Lever | 9c40c49 | 2016-09-15 10:55:53 -0400 | [diff] [blame] | 660 | rqst->rq_rbuffer = req->rl_recvbuf->rg_base; |
Chuck Lever | 5fe6eaa | 2016-09-15 10:55:20 -0400 | [diff] [blame] | 661 | return 0; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 662 | |
Chuck Lever | 0ca77dc | 2015-01-21 11:04:08 -0500 | [diff] [blame] | 663 | out_fail: |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 664 | rpcrdma_buffer_put(req); |
Chuck Lever | 5fe6eaa | 2016-09-15 10:55:20 -0400 | [diff] [blame] | 665 | return -ENOMEM; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 666 | } |
| 667 | |
Chuck Lever | 3435c74 | 2016-09-15 10:55:29 -0400 | [diff] [blame] | 668 | /** |
| 669 | * xprt_rdma_free - release resources allocated by xprt_rdma_allocate |
| 670 | * @task: RPC task |
| 671 | * |
| 672 | * Caller guarantees rqst->rq_buffer is non-NULL. |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 673 | */ |
| 674 | static void |
Chuck Lever | 3435c74 | 2016-09-15 10:55:29 -0400 | [diff] [blame] | 675 | xprt_rdma_free(struct rpc_task *task) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 676 | { |
Chuck Lever | 3435c74 | 2016-09-15 10:55:29 -0400 | [diff] [blame] | 677 | struct rpc_rqst *rqst = task->tk_rqstp; |
| 678 | struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(rqst->rq_xprt); |
| 679 | struct rpcrdma_req *req = rpcr_to_rdmar(rqst); |
Chuck Lever | 655fec6 | 2016-09-15 10:57:24 -0400 | [diff] [blame] | 680 | struct rpcrdma_ia *ia = &r_xprt->rx_ia; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 681 | |
Chuck Lever | ffc4d9b | 2015-12-16 17:22:14 -0500 | [diff] [blame] | 682 | if (req->rl_backchannel) |
| 683 | return; |
| 684 | |
Chuck Lever | 0ca77dc | 2015-01-21 11:04:08 -0500 | [diff] [blame] | 685 | dprintk("RPC: %s: called on 0x%p\n", __func__, req->rl_reply); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 686 | |
Chuck Lever | 431af64 | 2017-06-08 11:52:20 -0400 | [diff] [blame] | 687 | rpcrdma_remove_req(&r_xprt->rx_buf, req); |
| 688 | if (!list_empty(&req->rl_registered)) |
Chuck Lever | 48016dc | 2016-11-29 10:52:48 -0500 | [diff] [blame] | 689 | ia->ri_ops->ro_unmap_safe(r_xprt, req, !RPC_IS_ASYNC(task)); |
Chuck Lever | 655fec6 | 2016-09-15 10:57:24 -0400 | [diff] [blame] | 690 | rpcrdma_unmap_sges(ia, req); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 691 | rpcrdma_buffer_put(req); |
| 692 | } |
| 693 | |
Chuck Lever | 7a89f9c | 2016-06-29 13:53:43 -0400 | [diff] [blame] | 694 | /** |
| 695 | * xprt_rdma_send_request - marshal and send an RPC request |
| 696 | * @task: RPC task with an RPC message in rq_snd_buf |
| 697 | * |
Chuck Lever | bebd031 | 2017-04-11 13:23:10 -0400 | [diff] [blame] | 698 | * Caller holds the transport's write lock. |
| 699 | * |
Chuck Lever | 7a89f9c | 2016-06-29 13:53:43 -0400 | [diff] [blame] | 700 | * Return values: |
| 701 | * 0: The request has been sent |
| 702 | * ENOTCONN: Caller needs to invoke connect logic then call again |
| 703 | * ENOBUFS: Call again later to send the request |
| 704 | * EIO: A permanent error occurred. The request was not sent, |
| 705 | * and don't try it again |
| 706 | * |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 707 | * send_request invokes the meat of RPC RDMA. It must do the following: |
Chuck Lever | 7a89f9c | 2016-06-29 13:53:43 -0400 | [diff] [blame] | 708 | * |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 709 | * 1. Marshal the RPC request into an RPC RDMA request, which means |
| 710 | * putting a header in front of data, and creating IOVs for RDMA |
| 711 | * from those in the request. |
| 712 | * 2. In marshaling, detect opportunities for RDMA, and use them. |
| 713 | * 3. Post a recv message to set up asynch completion, then send |
| 714 | * the request (rpcrdma_ep_post). |
| 715 | * 4. No partial sends are possible in the RPC-RDMA protocol (as in UDP). |
| 716 | */ |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 717 | static int |
| 718 | xprt_rdma_send_request(struct rpc_task *task) |
| 719 | { |
| 720 | struct rpc_rqst *rqst = task->tk_rqstp; |
Trond Myklebust | a4f0835 | 2013-01-08 09:10:21 -0500 | [diff] [blame] | 721 | struct rpc_xprt *xprt = rqst->rq_xprt; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 722 | struct rpcrdma_req *req = rpcr_to_rdmar(rqst); |
| 723 | struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt); |
Chuck Lever | 6ab5994 | 2014-07-29 17:23:43 -0400 | [diff] [blame] | 724 | int rc = 0; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 725 | |
Chuck Lever | bebd031 | 2017-04-11 13:23:10 -0400 | [diff] [blame] | 726 | if (!xprt_connected(xprt)) |
| 727 | goto drop_connection; |
| 728 | |
Chuck Lever | 9d6b040 | 2016-06-29 13:54:16 -0400 | [diff] [blame] | 729 | /* On retransmit, remove any previously registered chunks */ |
Chuck Lever | 48016dc | 2016-11-29 10:52:48 -0500 | [diff] [blame] | 730 | if (unlikely(!list_empty(&req->rl_registered))) |
| 731 | r_xprt->rx_ia.ri_ops->ro_unmap_safe(r_xprt, req, false); |
Chuck Lever | 9d6b040 | 2016-06-29 13:54:16 -0400 | [diff] [blame] | 732 | |
Chuck Lever | e237794 | 2015-03-30 14:33:53 -0400 | [diff] [blame] | 733 | rc = rpcrdma_marshal_req(rqst); |
Chuck Lever | 6ab5994 | 2014-07-29 17:23:43 -0400 | [diff] [blame] | 734 | if (rc < 0) |
| 735 | goto failed_marshal; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 736 | |
| 737 | if (req->rl_reply == NULL) /* e.g. reconnection */ |
| 738 | rpcrdma_recv_buffer_get(req); |
| 739 | |
Tom Talpey | 575448b | 2008-10-09 15:00:40 -0400 | [diff] [blame] | 740 | /* Must suppress retransmit to maintain credits */ |
| 741 | if (req->rl_connect_cookie == xprt->connect_cookie) |
| 742 | goto drop_connection; |
| 743 | req->rl_connect_cookie = xprt->connect_cookie; |
| 744 | |
| 745 | if (rpcrdma_ep_post(&r_xprt->rx_ia, &r_xprt->rx_ep, req)) |
| 746 | goto drop_connection; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 747 | |
Trond Myklebust | d60dbb2 | 2010-05-13 12:51:49 -0400 | [diff] [blame] | 748 | rqst->rq_xmit_bytes_sent += rqst->rq_snd_buf.len; |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 749 | rqst->rq_bytes_sent = 0; |
| 750 | return 0; |
Tom Talpey | 575448b | 2008-10-09 15:00:40 -0400 | [diff] [blame] | 751 | |
Chuck Lever | c93c622 | 2014-05-28 10:35:14 -0400 | [diff] [blame] | 752 | failed_marshal: |
Chuck Lever | 7a89f9c | 2016-06-29 13:53:43 -0400 | [diff] [blame] | 753 | if (rc != -ENOTCONN) |
| 754 | return rc; |
Tom Talpey | 575448b | 2008-10-09 15:00:40 -0400 | [diff] [blame] | 755 | drop_connection: |
| 756 | xprt_disconnect_done(xprt); |
| 757 | return -ENOTCONN; /* implies disconnect */ |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 758 | } |
| 759 | |
Chuck Lever | 5d252f9 | 2016-01-07 14:50:10 -0500 | [diff] [blame] | 760 | void xprt_rdma_print_stats(struct rpc_xprt *xprt, struct seq_file *seq) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 761 | { |
| 762 | struct rpcrdma_xprt *r_xprt = rpcx_to_rdmax(xprt); |
| 763 | long idle_time = 0; |
| 764 | |
| 765 | if (xprt_connected(xprt)) |
| 766 | idle_time = (long)(jiffies - xprt->last_used) / HZ; |
| 767 | |
Chuck Lever | 763f7e4 | 2015-08-03 13:04:36 -0400 | [diff] [blame] | 768 | seq_puts(seq, "\txprt:\trdma "); |
| 769 | seq_printf(seq, "%u %lu %lu %lu %ld %lu %lu %lu %llu %llu ", |
| 770 | 0, /* need a local port? */ |
| 771 | xprt->stat.bind_count, |
| 772 | xprt->stat.connect_count, |
| 773 | xprt->stat.connect_time, |
| 774 | idle_time, |
| 775 | xprt->stat.sends, |
| 776 | xprt->stat.recvs, |
| 777 | xprt->stat.bad_xids, |
| 778 | xprt->stat.req_u, |
| 779 | xprt->stat.bklog_u); |
Chuck Lever | 505bbe6 | 2016-06-29 13:52:54 -0400 | [diff] [blame] | 780 | seq_printf(seq, "%lu %lu %lu %llu %llu %llu %llu %lu %lu %lu %lu ", |
Chuck Lever | 763f7e4 | 2015-08-03 13:04:36 -0400 | [diff] [blame] | 781 | r_xprt->rx_stats.read_chunk_count, |
| 782 | r_xprt->rx_stats.write_chunk_count, |
| 783 | r_xprt->rx_stats.reply_chunk_count, |
| 784 | r_xprt->rx_stats.total_rdma_request, |
| 785 | r_xprt->rx_stats.total_rdma_reply, |
| 786 | r_xprt->rx_stats.pullup_copy_count, |
| 787 | r_xprt->rx_stats.fixup_copy_count, |
| 788 | r_xprt->rx_stats.hardway_register_count, |
| 789 | r_xprt->rx_stats.failed_marshal_count, |
Chuck Lever | 860477d | 2015-08-03 13:04:45 -0400 | [diff] [blame] | 790 | r_xprt->rx_stats.bad_reply_count, |
| 791 | r_xprt->rx_stats.nomsg_call_count); |
Chuck Lever | c8b920b | 2016-09-15 10:57:16 -0400 | [diff] [blame] | 792 | seq_printf(seq, "%lu %lu %lu %lu\n", |
Chuck Lever | 505bbe6 | 2016-06-29 13:52:54 -0400 | [diff] [blame] | 793 | r_xprt->rx_stats.mrs_recovered, |
Chuck Lever | e2ac236 | 2016-06-29 13:54:00 -0400 | [diff] [blame] | 794 | r_xprt->rx_stats.mrs_orphaned, |
Chuck Lever | c8b920b | 2016-09-15 10:57:16 -0400 | [diff] [blame] | 795 | r_xprt->rx_stats.mrs_allocated, |
| 796 | r_xprt->rx_stats.local_inv_needed); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 797 | } |
| 798 | |
Jeff Layton | d67fa4d | 2015-06-03 16:14:29 -0400 | [diff] [blame] | 799 | static int |
| 800 | xprt_rdma_enable_swap(struct rpc_xprt *xprt) |
| 801 | { |
Chuck Lever | a045178 | 2015-10-24 17:26:29 -0400 | [diff] [blame] | 802 | return 0; |
Jeff Layton | d67fa4d | 2015-06-03 16:14:29 -0400 | [diff] [blame] | 803 | } |
| 804 | |
| 805 | static void |
| 806 | xprt_rdma_disable_swap(struct rpc_xprt *xprt) |
| 807 | { |
| 808 | } |
| 809 | |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 810 | /* |
| 811 | * Plumbing for rpc transport switch and kernel module |
| 812 | */ |
| 813 | |
Chuck Lever | d31ae25 | 2017-08-01 12:00:39 -0400 | [diff] [blame^] | 814 | static const struct rpc_xprt_ops xprt_rdma_procs = { |
Chuck Lever | e7ce710 | 2014-05-28 10:34:57 -0400 | [diff] [blame] | 815 | .reserve_xprt = xprt_reserve_xprt_cong, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 816 | .release_xprt = xprt_release_xprt_cong, /* sunrpc/xprt.c */ |
Trond Myklebust | f39c1bf | 2012-09-07 11:08:50 -0400 | [diff] [blame] | 817 | .alloc_slot = xprt_alloc_slot, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 818 | .release_request = xprt_release_rqst_cong, /* ditto */ |
| 819 | .set_retrans_timeout = xprt_set_retrans_timeout_def, /* ditto */ |
Chuck Lever | 3384979 | 2017-04-11 13:22:46 -0400 | [diff] [blame] | 820 | .timer = xprt_rdma_timer, |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 821 | .rpcbind = rpcb_getport_async, /* sunrpc/rpcb_clnt.c */ |
| 822 | .set_port = xprt_rdma_set_port, |
| 823 | .connect = xprt_rdma_connect, |
| 824 | .buf_alloc = xprt_rdma_allocate, |
| 825 | .buf_free = xprt_rdma_free, |
| 826 | .send_request = xprt_rdma_send_request, |
| 827 | .close = xprt_rdma_close, |
| 828 | .destroy = xprt_rdma_destroy, |
Jeff Layton | d67fa4d | 2015-06-03 16:14:29 -0400 | [diff] [blame] | 829 | .print_stats = xprt_rdma_print_stats, |
| 830 | .enable_swap = xprt_rdma_enable_swap, |
| 831 | .disable_swap = xprt_rdma_disable_swap, |
Chuck Lever | f531a5d | 2015-10-24 17:27:43 -0400 | [diff] [blame] | 832 | .inject_disconnect = xprt_rdma_inject_disconnect, |
| 833 | #if defined(CONFIG_SUNRPC_BACKCHANNEL) |
| 834 | .bc_setup = xprt_rdma_bc_setup, |
Chuck Lever | 7656677 | 2015-10-24 17:28:32 -0400 | [diff] [blame] | 835 | .bc_up = xprt_rdma_bc_up, |
Chuck Lever | 6b26cc8 | 2016-05-02 14:40:40 -0400 | [diff] [blame] | 836 | .bc_maxpayload = xprt_rdma_bc_maxpayload, |
Chuck Lever | f531a5d | 2015-10-24 17:27:43 -0400 | [diff] [blame] | 837 | .bc_free_rqst = xprt_rdma_bc_free_rqst, |
| 838 | .bc_destroy = xprt_rdma_bc_destroy, |
| 839 | #endif |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 840 | }; |
| 841 | |
| 842 | static struct xprt_class xprt_rdma = { |
| 843 | .list = LIST_HEAD_INIT(xprt_rdma.list), |
| 844 | .name = "rdma", |
| 845 | .owner = THIS_MODULE, |
| 846 | .ident = XPRT_TRANSPORT_RDMA, |
| 847 | .setup = xprt_setup_rdma, |
| 848 | }; |
| 849 | |
Chuck Lever | ffe1f0d | 2015-06-04 11:21:42 -0400 | [diff] [blame] | 850 | void xprt_rdma_cleanup(void) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 851 | { |
| 852 | int rc; |
| 853 | |
Chuck Lever | 3a0799a | 2014-03-12 12:51:39 -0400 | [diff] [blame] | 854 | dprintk("RPCRDMA Module Removed, deregister RPC RDMA transport\n"); |
Jeff Layton | f895b25 | 2014-11-17 16:58:04 -0500 | [diff] [blame] | 855 | #if IS_ENABLED(CONFIG_SUNRPC_DEBUG) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 856 | if (sunrpc_table_header) { |
| 857 | unregister_sysctl_table(sunrpc_table_header); |
| 858 | sunrpc_table_header = NULL; |
| 859 | } |
| 860 | #endif |
| 861 | rc = xprt_unregister_transport(&xprt_rdma); |
| 862 | if (rc) |
| 863 | dprintk("RPC: %s: xprt_unregister returned %i\n", |
| 864 | __func__, rc); |
Chuck Lever | 951e721 | 2015-05-26 11:52:25 -0400 | [diff] [blame] | 865 | |
Chuck Lever | fe97b47 | 2015-10-24 17:27:10 -0400 | [diff] [blame] | 866 | rpcrdma_destroy_wq(); |
Chuck Lever | 5d252f9 | 2016-01-07 14:50:10 -0500 | [diff] [blame] | 867 | |
| 868 | rc = xprt_unregister_transport(&xprt_rdma_bc); |
| 869 | if (rc) |
| 870 | dprintk("RPC: %s: xprt_unregister(bc) returned %i\n", |
| 871 | __func__, rc); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 872 | } |
| 873 | |
Chuck Lever | ffe1f0d | 2015-06-04 11:21:42 -0400 | [diff] [blame] | 874 | int xprt_rdma_init(void) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 875 | { |
| 876 | int rc; |
| 877 | |
Chuck Lever | 505bbe6 | 2016-06-29 13:52:54 -0400 | [diff] [blame] | 878 | rc = rpcrdma_alloc_wq(); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 879 | if (rc) |
| 880 | return rc; |
| 881 | |
Chuck Lever | 951e721 | 2015-05-26 11:52:25 -0400 | [diff] [blame] | 882 | rc = xprt_register_transport(&xprt_rdma); |
| 883 | if (rc) { |
Chuck Lever | fe97b47 | 2015-10-24 17:27:10 -0400 | [diff] [blame] | 884 | rpcrdma_destroy_wq(); |
Chuck Lever | 951e721 | 2015-05-26 11:52:25 -0400 | [diff] [blame] | 885 | return rc; |
| 886 | } |
| 887 | |
Chuck Lever | 5d252f9 | 2016-01-07 14:50:10 -0500 | [diff] [blame] | 888 | rc = xprt_register_transport(&xprt_rdma_bc); |
| 889 | if (rc) { |
| 890 | xprt_unregister_transport(&xprt_rdma); |
| 891 | rpcrdma_destroy_wq(); |
Chuck Lever | 5d252f9 | 2016-01-07 14:50:10 -0500 | [diff] [blame] | 892 | return rc; |
| 893 | } |
| 894 | |
Chuck Lever | 3a0799a | 2014-03-12 12:51:39 -0400 | [diff] [blame] | 895 | dprintk("RPCRDMA Module Init, register RPC RDMA transport\n"); |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 896 | |
Chuck Lever | 3a0799a | 2014-03-12 12:51:39 -0400 | [diff] [blame] | 897 | dprintk("Defaults:\n"); |
| 898 | dprintk("\tSlots %d\n" |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 899 | "\tMaxInlineRead %d\n\tMaxInlineWrite %d\n", |
| 900 | xprt_rdma_slot_table_entries, |
| 901 | xprt_rdma_max_inline_read, xprt_rdma_max_inline_write); |
Chuck Lever | 3a0799a | 2014-03-12 12:51:39 -0400 | [diff] [blame] | 902 | dprintk("\tPadding %d\n\tMemreg %d\n", |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 903 | xprt_rdma_inline_write_padding, xprt_rdma_memreg_strategy); |
| 904 | |
Jeff Layton | f895b25 | 2014-11-17 16:58:04 -0500 | [diff] [blame] | 905 | #if IS_ENABLED(CONFIG_SUNRPC_DEBUG) |
\"Talpey, Thomas\ | f58851e | 2007-09-10 13:50:12 -0400 | [diff] [blame] | 906 | if (!sunrpc_table_header) |
| 907 | sunrpc_table_header = register_sysctl_table(sunrpc_table); |
| 908 | #endif |
| 909 | return 0; |
| 910 | } |