2018-05-07 22:26:55 +03:00
|
|
|
// SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause
|
2007-12-13 01:13:21 +03:00
|
|
|
/*
|
2018-05-07 22:28:04 +03:00
|
|
|
* Copyright (c) 2015-2018 Oracle. All rights reserved.
|
2014-05-29 00:12:01 +04:00
|
|
|
* Copyright (c) 2014 Open Grid Computing, Inc. All rights reserved.
|
2007-12-13 01:13:21 +03:00
|
|
|
* Copyright (c) 2005-2007 Network Appliance, Inc. All rights reserved.
|
|
|
|
*
|
|
|
|
* This software is available to you under a choice of one of two
|
|
|
|
* licenses. You may choose to be licensed under the terms of the GNU
|
|
|
|
* General Public License (GPL) Version 2, available from the file
|
|
|
|
* COPYING in the main directory of this source tree, or the BSD-type
|
|
|
|
* license below:
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* Redistributions in binary form must reproduce the above
|
|
|
|
* copyright notice, this list of conditions and the following
|
|
|
|
* disclaimer in the documentation and/or other materials provided
|
|
|
|
* with the distribution.
|
|
|
|
*
|
|
|
|
* Neither the name of the Network Appliance, Inc. nor the names of
|
|
|
|
* its contributors may be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written
|
|
|
|
* permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* Author: Tom Tucker <tom@opengridcomputing.com>
|
|
|
|
*/
|
|
|
|
|
2011-06-06 14:43:46 +04:00
|
|
|
#include <linux/interrupt.h>
|
2009-10-07 17:09:06 +04:00
|
|
|
#include <linux/sched.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 11:04:11 +03:00
|
|
|
#include <linux/slab.h>
|
2007-12-13 01:13:21 +03:00
|
|
|
#include <linux/spinlock.h>
|
2010-10-15 19:49:27 +04:00
|
|
|
#include <linux/workqueue.h>
|
2018-05-07 22:27:11 +03:00
|
|
|
#include <linux/export.h>
|
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
#include <rdma/ib_verbs.h>
|
|
|
|
#include <rdma/rdma_cm.h>
|
2017-08-28 22:06:22 +03:00
|
|
|
#include <rdma/rw.h>
|
2018-05-07 22:27:11 +03:00
|
|
|
|
|
|
|
#include <linux/sunrpc/addr.h>
|
|
|
|
#include <linux/sunrpc/debug.h>
|
|
|
|
#include <linux/sunrpc/svc_xprt.h>
|
2007-12-13 01:13:21 +03:00
|
|
|
#include <linux/sunrpc/svc_rdma.h>
|
2018-05-07 22:27:11 +03:00
|
|
|
|
2012-02-15 21:30:00 +04:00
|
|
|
#include "xprt_rdma.h"
|
2018-05-07 22:27:11 +03:00
|
|
|
#include <trace/events/rpcrdma.h>
|
2007-12-13 01:13:21 +03:00
|
|
|
|
|
|
|
#define RPCDBG_FACILITY RPCDBG_SVCXPRT
|
|
|
|
|
2018-05-07 22:27:00 +03:00
|
|
|
static struct svcxprt_rdma *svc_rdma_create_xprt(struct svc_serv *serv,
|
|
|
|
struct net *net);
|
2007-12-13 01:13:21 +03:00
|
|
|
static struct svc_xprt *svc_rdma_create(struct svc_serv *serv,
|
2010-09-29 16:04:18 +04:00
|
|
|
struct net *net,
|
2007-12-13 01:13:21 +03:00
|
|
|
struct sockaddr *sa, int salen,
|
|
|
|
int flags);
|
|
|
|
static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt);
|
|
|
|
static void svc_rdma_detach(struct svc_xprt *xprt);
|
|
|
|
static void svc_rdma_free(struct svc_xprt *xprt);
|
|
|
|
static int svc_rdma_has_wspace(struct svc_xprt *xprt);
|
2018-03-27 17:49:38 +03:00
|
|
|
static void svc_rdma_secure_port(struct svc_rqst *);
|
2016-11-11 21:16:22 +03:00
|
|
|
static void svc_rdma_kill_temp_xprt(struct svc_xprt *);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2017-08-01 18:59:49 +03:00
|
|
|
static const struct svc_xprt_ops svc_rdma_ops = {
|
2007-12-13 01:13:21 +03:00
|
|
|
.xpo_create = svc_rdma_create,
|
|
|
|
.xpo_recvfrom = svc_rdma_recvfrom,
|
|
|
|
.xpo_sendto = svc_rdma_sendto,
|
2020-06-10 17:36:42 +03:00
|
|
|
.xpo_result_payload = svc_rdma_result_payload,
|
2007-12-13 01:13:21 +03:00
|
|
|
.xpo_release_rqst = svc_rdma_release_rqst,
|
|
|
|
.xpo_detach = svc_rdma_detach,
|
|
|
|
.xpo_free = svc_rdma_free,
|
|
|
|
.xpo_has_wspace = svc_rdma_has_wspace,
|
|
|
|
.xpo_accept = svc_rdma_accept,
|
2014-05-19 21:40:22 +04:00
|
|
|
.xpo_secure_port = svc_rdma_secure_port,
|
2016-11-11 21:16:22 +03:00
|
|
|
.xpo_kill_temp_xprt = svc_rdma_kill_temp_xprt,
|
2007-12-13 01:13:21 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
struct svc_xprt_class svc_rdma_class = {
|
|
|
|
.xcl_name = "rdma",
|
|
|
|
.xcl_owner = THIS_MODULE,
|
|
|
|
.xcl_ops = &svc_rdma_ops,
|
2015-08-07 23:55:46 +03:00
|
|
|
.xcl_max_payload = RPCSVC_MAXPAYLOAD_RDMA,
|
2014-07-16 23:38:32 +04:00
|
|
|
.xcl_ident = XPRT_TRANSPORT_RDMA,
|
2007-12-13 01:13:21 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
/* QP event handler */
|
|
|
|
static void qp_event_handler(struct ib_event *event, void *context)
|
|
|
|
{
|
|
|
|
struct svc_xprt *xprt = context;
|
|
|
|
|
2018-05-07 22:27:16 +03:00
|
|
|
trace_svcrdma_qp_error(event, (struct sockaddr *)&xprt->xpt_remote);
|
2007-12-13 01:13:21 +03:00
|
|
|
switch (event->event) {
|
|
|
|
/* These are considered benign events */
|
|
|
|
case IB_EVENT_PATH_MIG:
|
|
|
|
case IB_EVENT_COMM_EST:
|
|
|
|
case IB_EVENT_SQ_DRAINED:
|
|
|
|
case IB_EVENT_QP_LAST_WQE_REACHED:
|
|
|
|
break;
|
2018-05-07 22:27:16 +03:00
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
/* These are considered fatal events */
|
|
|
|
case IB_EVENT_PATH_MIG_ERR:
|
|
|
|
case IB_EVENT_QP_FATAL:
|
|
|
|
case IB_EVENT_QP_REQ_ERR:
|
|
|
|
case IB_EVENT_QP_ACCESS_ERR:
|
|
|
|
case IB_EVENT_DEVICE_FATAL:
|
|
|
|
default:
|
2021-02-21 02:53:40 +03:00
|
|
|
svc_xprt_deferred_close(xprt);
|
2007-12-13 01:13:21 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-07 22:27:00 +03:00
|
|
|
static struct svcxprt_rdma *svc_rdma_create_xprt(struct svc_serv *serv,
|
|
|
|
struct net *net)
|
2007-12-13 01:13:21 +03:00
|
|
|
{
|
|
|
|
struct svcxprt_rdma *cma_xprt = kzalloc(sizeof *cma_xprt, GFP_KERNEL);
|
|
|
|
|
2018-05-07 22:27:00 +03:00
|
|
|
if (!cma_xprt) {
|
|
|
|
dprintk("svcrdma: failed to create new transport\n");
|
2007-12-13 01:13:21 +03:00
|
|
|
return NULL;
|
2018-05-07 22:27:00 +03:00
|
|
|
}
|
|
|
|
svc_xprt_init(net, &svc_rdma_class, &cma_xprt->sc_xprt, serv);
|
2007-12-13 01:13:21 +03:00
|
|
|
INIT_LIST_HEAD(&cma_xprt->sc_accept_q);
|
|
|
|
INIT_LIST_HEAD(&cma_xprt->sc_rq_dto_q);
|
2018-05-07 22:28:04 +03:00
|
|
|
INIT_LIST_HEAD(&cma_xprt->sc_send_ctxts);
|
2019-08-17 00:49:38 +03:00
|
|
|
init_llist_head(&cma_xprt->sc_recv_ctxts);
|
2017-04-09 20:06:16 +03:00
|
|
|
INIT_LIST_HEAD(&cma_xprt->sc_rw_ctxts);
|
2007-12-13 01:13:21 +03:00
|
|
|
init_waitqueue_head(&cma_xprt->sc_send_wait);
|
|
|
|
|
|
|
|
spin_lock_init(&cma_xprt->sc_lock);
|
|
|
|
spin_lock_init(&cma_xprt->sc_rq_dto_lock);
|
2018-05-07 22:28:04 +03:00
|
|
|
spin_lock_init(&cma_xprt->sc_send_lock);
|
2017-04-09 20:06:16 +03:00
|
|
|
spin_lock_init(&cma_xprt->sc_rw_ctxt_lock);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2017-02-24 21:25:23 +03:00
|
|
|
/*
|
|
|
|
* Note that this implies that the underlying transport support
|
|
|
|
* has some form of congestion control (see RFC 7530 section 3.1
|
|
|
|
* paragraph 2). For now, we assume that all supported RDMA
|
|
|
|
* transports are suitable here.
|
|
|
|
*/
|
|
|
|
set_bit(XPT_CONG_CTRL, &cma_xprt->sc_xprt.xpt_flags);
|
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
return cma_xprt;
|
|
|
|
}
|
|
|
|
|
2016-09-13 17:53:15 +03:00
|
|
|
static void
|
|
|
|
svc_rdma_parse_connect_private(struct svcxprt_rdma *newxprt,
|
|
|
|
struct rdma_conn_param *param)
|
|
|
|
{
|
|
|
|
const struct rpcrdma_connect_private *pmsg = param->private_data;
|
|
|
|
|
|
|
|
if (pmsg &&
|
|
|
|
pmsg->cp_magic == rpcrdma_cmp_magic &&
|
|
|
|
pmsg->cp_version == RPCRDMA_CMP_VERSION) {
|
2016-09-13 17:53:23 +03:00
|
|
|
newxprt->sc_snd_w_inv = pmsg->cp_flags &
|
|
|
|
RPCRDMA_CMP_F_SND_W_INV_OK;
|
|
|
|
|
|
|
|
dprintk("svcrdma: client send_size %u, recv_size %u "
|
|
|
|
"remote inv %ssupported\n",
|
2016-09-13 17:53:15 +03:00
|
|
|
rpcrdma_decode_buffer_size(pmsg->cp_send_size),
|
2016-09-13 17:53:23 +03:00
|
|
|
rpcrdma_decode_buffer_size(pmsg->cp_recv_size),
|
|
|
|
newxprt->sc_snd_w_inv ? "" : "un");
|
2016-09-13 17:53:15 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
/*
|
|
|
|
* This function handles the CONNECT_REQUEST event on a listening
|
|
|
|
* endpoint. It is passed the cma_id for the _new_ connection. The context in
|
|
|
|
* this cma_id is inherited from the listening cma_id and is the svc_xprt
|
|
|
|
* structure for the listening endpoint.
|
|
|
|
*
|
|
|
|
* This function creates a new xprt for the new connection and enqueues it on
|
|
|
|
* the accept queue for the listent xprt. When the listen thread is kicked, it
|
|
|
|
* will call the recvfrom method on the listen xprt which will accept the new
|
|
|
|
* connection.
|
|
|
|
*/
|
2016-09-13 17:53:15 +03:00
|
|
|
static void handle_connect_req(struct rdma_cm_id *new_cma_id,
|
|
|
|
struct rdma_conn_param *param)
|
2007-12-13 01:13:21 +03:00
|
|
|
{
|
|
|
|
struct svcxprt_rdma *listen_xprt = new_cma_id->context;
|
|
|
|
struct svcxprt_rdma *newxprt;
|
2008-05-07 22:52:42 +04:00
|
|
|
struct sockaddr *sa;
|
2007-12-13 01:13:21 +03:00
|
|
|
|
|
|
|
/* Create a new transport */
|
2018-05-07 22:27:00 +03:00
|
|
|
newxprt = svc_rdma_create_xprt(listen_xprt->sc_xprt.xpt_server,
|
|
|
|
listen_xprt->sc_xprt.xpt_net);
|
|
|
|
if (!newxprt)
|
2007-12-13 01:13:21 +03:00
|
|
|
return;
|
|
|
|
newxprt->sc_cm_id = new_cma_id;
|
|
|
|
new_cma_id->context = newxprt;
|
2016-09-13 17:53:15 +03:00
|
|
|
svc_rdma_parse_connect_private(newxprt, param);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2008-05-20 04:00:24 +04:00
|
|
|
/* Save client advertised inbound read limit for use later in accept. */
|
2016-09-13 17:53:15 +03:00
|
|
|
newxprt->sc_ord = param->initiator_depth;
|
2008-05-20 04:00:24 +04:00
|
|
|
|
2008-05-07 22:52:42 +04:00
|
|
|
sa = (struct sockaddr *)&newxprt->sc_cm_id->route.addr.dst_addr;
|
2020-05-02 17:42:47 +03:00
|
|
|
newxprt->sc_xprt.xpt_remotelen = svc_addr_len(sa);
|
|
|
|
memcpy(&newxprt->sc_xprt.xpt_remote, sa,
|
|
|
|
newxprt->sc_xprt.xpt_remotelen);
|
|
|
|
snprintf(newxprt->sc_xprt.xpt_remotebuf,
|
|
|
|
sizeof(newxprt->sc_xprt.xpt_remotebuf) - 1, "%pISc", sa);
|
|
|
|
|
2019-06-11 18:01:16 +03:00
|
|
|
/* The remote port is arbitrary and not under the control of the
|
|
|
|
* client ULP. Set it to a fixed value so that the DRC continues
|
|
|
|
* to be effective after a reconnect.
|
|
|
|
*/
|
|
|
|
rpc_set_port((struct sockaddr *)&newxprt->sc_xprt.xpt_remote, 0);
|
|
|
|
|
2008-05-07 22:52:42 +04:00
|
|
|
sa = (struct sockaddr *)&newxprt->sc_cm_id->route.addr.src_addr;
|
|
|
|
svc_xprt_set_local(&newxprt->sc_xprt, sa, svc_addr_len(sa));
|
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
/*
|
|
|
|
* Enqueue the new transport on the accept queue of the listening
|
|
|
|
* transport
|
|
|
|
*/
|
2019-05-02 18:21:08 +03:00
|
|
|
spin_lock(&listen_xprt->sc_lock);
|
2007-12-13 01:13:21 +03:00
|
|
|
list_add_tail(&newxprt->sc_accept_q, &listen_xprt->sc_accept_q);
|
2019-05-02 18:21:08 +03:00
|
|
|
spin_unlock(&listen_xprt->sc_lock);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
|
|
|
set_bit(XPT_CONN, &listen_xprt->sc_xprt.xpt_flags);
|
|
|
|
svc_xprt_enqueue(&listen_xprt->sc_xprt);
|
|
|
|
}
|
|
|
|
|
2020-07-01 00:16:35 +03:00
|
|
|
/**
|
|
|
|
* svc_rdma_listen_handler - Handle CM events generated on a listening endpoint
|
|
|
|
* @cma_id: the server's listener rdma_cm_id
|
|
|
|
* @event: details of the event
|
|
|
|
*
|
|
|
|
* Return values:
|
|
|
|
* %0: Do not destroy @cma_id
|
|
|
|
* %1: Destroy @cma_id (never returned here)
|
|
|
|
*
|
|
|
|
* NB: There is never a DEVICE_REMOVAL event for INADDR_ANY listeners.
|
2007-12-13 01:13:21 +03:00
|
|
|
*/
|
2020-07-01 00:16:35 +03:00
|
|
|
static int svc_rdma_listen_handler(struct rdma_cm_id *cma_id,
|
|
|
|
struct rdma_cm_event *event)
|
2007-12-13 01:13:21 +03:00
|
|
|
{
|
|
|
|
switch (event->event) {
|
|
|
|
case RDMA_CM_EVENT_CONNECT_REQUEST:
|
2016-09-13 17:53:15 +03:00
|
|
|
handle_connect_req(cma_id, &event->param.conn);
|
2007-12-13 01:13:21 +03:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2018-08-07 14:20:00 +03:00
|
|
|
return 0;
|
2007-12-13 01:13:21 +03:00
|
|
|
}
|
|
|
|
|
2020-07-01 00:16:35 +03:00
|
|
|
/**
|
|
|
|
* svc_rdma_cma_handler - Handle CM events on client connections
|
|
|
|
* @cma_id: the server's listener rdma_cm_id
|
|
|
|
* @event: details of the event
|
|
|
|
*
|
|
|
|
* Return values:
|
|
|
|
* %0: Do not destroy @cma_id
|
|
|
|
* %1: Destroy @cma_id (never returned here)
|
|
|
|
*/
|
|
|
|
static int svc_rdma_cma_handler(struct rdma_cm_id *cma_id,
|
|
|
|
struct rdma_cm_event *event)
|
2007-12-13 01:13:21 +03:00
|
|
|
{
|
2018-05-07 22:27:16 +03:00
|
|
|
struct svcxprt_rdma *rdma = cma_id->context;
|
|
|
|
struct svc_xprt *xprt = &rdma->sc_xprt;
|
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
switch (event->event) {
|
|
|
|
case RDMA_CM_EVENT_ESTABLISHED:
|
|
|
|
clear_bit(RDMAXPRT_CONN_PENDING, &rdma->sc_flags);
|
2021-03-01 21:34:38 +03:00
|
|
|
|
|
|
|
/* Handle any requests that were received while
|
|
|
|
* CONN_PENDING was set. */
|
2007-12-13 01:13:21 +03:00
|
|
|
svc_xprt_enqueue(xprt);
|
|
|
|
break;
|
|
|
|
case RDMA_CM_EVENT_DISCONNECTED:
|
|
|
|
case RDMA_CM_EVENT_DEVICE_REMOVAL:
|
2021-02-21 02:53:40 +03:00
|
|
|
svc_xprt_deferred_close(xprt);
|
2007-12-13 01:13:21 +03:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a listening RDMA service endpoint.
|
|
|
|
*/
|
|
|
|
static struct svc_xprt *svc_rdma_create(struct svc_serv *serv,
|
2010-09-29 16:04:18 +04:00
|
|
|
struct net *net,
|
2007-12-13 01:13:21 +03:00
|
|
|
struct sockaddr *sa, int salen,
|
|
|
|
int flags)
|
|
|
|
{
|
|
|
|
struct rdma_cm_id *listen_id;
|
|
|
|
struct svcxprt_rdma *cma_xprt;
|
|
|
|
int ret;
|
|
|
|
|
2020-03-18 00:41:43 +03:00
|
|
|
if (sa->sa_family != AF_INET && sa->sa_family != AF_INET6)
|
2010-04-03 17:27:29 +04:00
|
|
|
return ERR_PTR(-EAFNOSUPPORT);
|
2018-05-07 22:27:00 +03:00
|
|
|
cma_xprt = svc_rdma_create_xprt(serv, net);
|
2007-12-13 01:13:21 +03:00
|
|
|
if (!cma_xprt)
|
2008-05-06 18:45:54 +04:00
|
|
|
return ERR_PTR(-ENOMEM);
|
2018-05-07 22:27:00 +03:00
|
|
|
set_bit(XPT_LISTENER, &cma_xprt->sc_xprt.xpt_flags);
|
|
|
|
strcpy(cma_xprt->sc_xprt.xpt_remotebuf, "listener");
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2020-07-01 00:16:35 +03:00
|
|
|
listen_id = rdma_create_id(net, svc_rdma_listen_handler, cma_xprt,
|
2015-10-22 15:20:10 +03:00
|
|
|
RDMA_PS_TCP, IB_QPT_RC);
|
2007-12-13 01:13:21 +03:00
|
|
|
if (IS_ERR(listen_id)) {
|
2008-05-06 18:45:54 +04:00
|
|
|
ret = PTR_ERR(listen_id);
|
|
|
|
goto err0;
|
2007-12-13 01:13:21 +03:00
|
|
|
}
|
2008-05-06 18:45:54 +04:00
|
|
|
|
2016-05-04 17:52:47 +03:00
|
|
|
/* Allow both IPv4 and IPv6 sockets to bind a single port
|
|
|
|
* at the same time.
|
|
|
|
*/
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
ret = rdma_set_afonly(listen_id, 1);
|
2020-03-18 00:41:43 +03:00
|
|
|
if (ret)
|
2016-05-04 17:52:47 +03:00
|
|
|
goto err1;
|
|
|
|
#endif
|
2007-12-13 01:13:21 +03:00
|
|
|
ret = rdma_bind_addr(listen_id, sa);
|
2020-03-18 00:41:43 +03:00
|
|
|
if (ret)
|
2008-05-06 18:45:54 +04:00
|
|
|
goto err1;
|
2007-12-13 01:13:21 +03:00
|
|
|
cma_xprt->sc_cm_id = listen_id;
|
|
|
|
|
|
|
|
ret = rdma_listen(listen_id, RPCRDMA_LISTEN_BACKLOG);
|
2020-03-18 00:41:43 +03:00
|
|
|
if (ret)
|
2008-05-06 18:45:54 +04:00
|
|
|
goto err1;
|
2007-12-13 01:13:21 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We need to use the address from the cm_id in case the
|
|
|
|
* caller specified 0 for the port number.
|
|
|
|
*/
|
|
|
|
sa = (struct sockaddr *)&cma_xprt->sc_cm_id->route.addr.src_addr;
|
|
|
|
svc_xprt_set_local(&cma_xprt->sc_xprt, sa, salen);
|
|
|
|
|
|
|
|
return &cma_xprt->sc_xprt;
|
2008-05-06 18:45:54 +04:00
|
|
|
|
|
|
|
err1:
|
|
|
|
rdma_destroy_id(listen_id);
|
|
|
|
err0:
|
|
|
|
kfree(cma_xprt);
|
|
|
|
return ERR_PTR(ret);
|
2007-12-13 01:13:21 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is the xpo_recvfrom function for listening endpoints. Its
|
|
|
|
* purpose is to accept incoming connections. The CMA callback handler
|
|
|
|
* has already created a new transport and attached it to the new CMA
|
|
|
|
* ID.
|
|
|
|
*
|
|
|
|
* There is a queue of pending connections hung on the listening
|
|
|
|
* transport. This queue contains the new svc_xprt structure. This
|
|
|
|
* function takes svc_xprt structures off the accept_q and completes
|
|
|
|
* the connection.
|
|
|
|
*/
|
|
|
|
static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt)
|
|
|
|
{
|
|
|
|
struct svcxprt_rdma *listen_rdma;
|
|
|
|
struct svcxprt_rdma *newxprt = NULL;
|
|
|
|
struct rdma_conn_param conn_param;
|
2016-09-13 17:53:15 +03:00
|
|
|
struct rpcrdma_connect_private pmsg;
|
2007-12-13 01:13:21 +03:00
|
|
|
struct ib_qp_init_attr qp_attr;
|
2018-05-07 22:27:27 +03:00
|
|
|
unsigned int ctxts, rq_depth;
|
2015-12-18 11:59:48 +03:00
|
|
|
struct ib_device *dev;
|
|
|
|
int ret = 0;
|
2019-02-06 20:00:52 +03:00
|
|
|
RPC_IFDEBUG(struct sockaddr *sap);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
|
|
|
listen_rdma = container_of(xprt, struct svcxprt_rdma, sc_xprt);
|
|
|
|
clear_bit(XPT_CONN, &xprt->xpt_flags);
|
|
|
|
/* Get the next entry off the accept list */
|
2019-05-02 18:21:08 +03:00
|
|
|
spin_lock(&listen_rdma->sc_lock);
|
2007-12-13 01:13:21 +03:00
|
|
|
if (!list_empty(&listen_rdma->sc_accept_q)) {
|
|
|
|
newxprt = list_entry(listen_rdma->sc_accept_q.next,
|
|
|
|
struct svcxprt_rdma, sc_accept_q);
|
|
|
|
list_del_init(&newxprt->sc_accept_q);
|
|
|
|
}
|
|
|
|
if (!list_empty(&listen_rdma->sc_accept_q))
|
|
|
|
set_bit(XPT_CONN, &listen_rdma->sc_xprt.xpt_flags);
|
2019-05-02 18:21:08 +03:00
|
|
|
spin_unlock(&listen_rdma->sc_lock);
|
2007-12-13 01:13:21 +03:00
|
|
|
if (!newxprt)
|
|
|
|
return NULL;
|
|
|
|
|
2015-12-18 11:59:48 +03:00
|
|
|
dev = newxprt->sc_cm_id->device;
|
2017-04-09 20:06:16 +03:00
|
|
|
newxprt->sc_port_num = newxprt->sc_cm_id->port_num;
|
2007-12-13 01:13:21 +03:00
|
|
|
|
|
|
|
/* Qualify the transport resource defaults with the
|
|
|
|
* capabilities of this particular device */
|
2018-10-01 21:15:56 +03:00
|
|
|
/* Transport header, head iovec, tail iovec */
|
|
|
|
newxprt->sc_max_send_sges = 3;
|
|
|
|
/* Add one SGE per page list entry */
|
svcrdma: Remove max_sge check at connect time
Two and a half years ago, the client was changed to use gathered
Send for larger inline messages, in commit 655fec6987b ("xprtrdma:
Use gathered Send for large inline messages"). Several fixes were
required because there are a few in-kernel device drivers whose
max_sge is 3, and these were broken by the change.
Apparently my memory is going, because some time later, I submitted
commit 25fd86eca11c ("svcrdma: Don't overrun the SGE array in
svc_rdma_send_ctxt"), and after that, commit f3c1fd0ee294 ("svcrdma:
Reduce max_send_sges"). These too incorrectly assumed in-kernel
device drivers would have more than a few Send SGEs available.
The fix for the server side is not the same. This is because the
fundamental problem on the server is that, whether or not the client
has provisioned a chunk for the RPC reply, the server must squeeze
even the most complex RPC replies into a single RDMA Send. Failing
in the send path because of Send SGE exhaustion should never be an
option.
Therefore, instead of failing when the send path runs out of SGEs,
switch to using a bounce buffer mechanism to handle RPC replies that
are too complex for the device to send directly. That allows us to
remove the max_sge check to enable drivers with small max_sge to
work again.
Reported-by: Don Dutile <ddutile@redhat.com>
Fixes: 25fd86eca11c ("svcrdma: Don't overrun the SGE array in ...")
Cc: stable@vger.kernel.org
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
2019-01-26 00:54:54 +03:00
|
|
|
newxprt->sc_max_send_sges += (svcrdma_max_req_size / PAGE_SIZE) + 1;
|
|
|
|
if (newxprt->sc_max_send_sges > dev->attrs.max_send_sge)
|
|
|
|
newxprt->sc_max_send_sges = dev->attrs.max_send_sge;
|
2016-01-07 22:48:55 +03:00
|
|
|
newxprt->sc_max_req_size = svcrdma_max_req_size;
|
2017-08-28 22:06:06 +03:00
|
|
|
newxprt->sc_max_requests = svcrdma_max_requests;
|
|
|
|
newxprt->sc_max_bc_requests = svcrdma_max_bc_requests;
|
2021-03-12 02:32:30 +03:00
|
|
|
newxprt->sc_recv_batch = RPCRDMA_MAX_RECV_BATCH;
|
|
|
|
rq_depth = newxprt->sc_max_requests + newxprt->sc_max_bc_requests +
|
|
|
|
newxprt->sc_recv_batch;
|
2018-05-07 22:27:27 +03:00
|
|
|
if (rq_depth > dev->attrs.max_qp_wr) {
|
2017-08-28 22:06:06 +03:00
|
|
|
pr_warn("svcrdma: reducing receive depth to %d\n",
|
|
|
|
dev->attrs.max_qp_wr);
|
2018-05-07 22:27:27 +03:00
|
|
|
rq_depth = dev->attrs.max_qp_wr;
|
2021-03-12 02:32:30 +03:00
|
|
|
newxprt->sc_recv_batch = 1;
|
2018-05-07 22:27:27 +03:00
|
|
|
newxprt->sc_max_requests = rq_depth - 2;
|
2017-08-28 22:06:06 +03:00
|
|
|
newxprt->sc_max_bc_requests = 2;
|
|
|
|
}
|
|
|
|
newxprt->sc_fc_credits = cpu_to_be32(newxprt->sc_max_requests);
|
2017-08-28 22:06:22 +03:00
|
|
|
ctxts = rdma_rw_mr_factor(dev, newxprt->sc_port_num, RPCSVC_MAXPAGES);
|
|
|
|
ctxts *= newxprt->sc_max_requests;
|
2018-05-07 22:27:27 +03:00
|
|
|
newxprt->sc_sq_depth = rq_depth + ctxts;
|
2017-08-28 22:06:22 +03:00
|
|
|
if (newxprt->sc_sq_depth > dev->attrs.max_qp_wr) {
|
|
|
|
pr_warn("svcrdma: reducing send depth to %d\n",
|
|
|
|
dev->attrs.max_qp_wr);
|
|
|
|
newxprt->sc_sq_depth = dev->attrs.max_qp_wr;
|
|
|
|
}
|
2016-11-29 19:04:50 +03:00
|
|
|
atomic_set(&newxprt->sc_sq_avail, newxprt->sc_sq_depth);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2016-09-05 13:56:17 +03:00
|
|
|
newxprt->sc_pd = ib_alloc_pd(dev, 0);
|
2007-12-13 01:13:21 +03:00
|
|
|
if (IS_ERR(newxprt->sc_pd)) {
|
2020-04-30 22:25:01 +03:00
|
|
|
trace_svcrdma_pd_err(newxprt, PTR_ERR(newxprt->sc_pd));
|
2007-12-13 01:13:21 +03:00
|
|
|
goto errout;
|
|
|
|
}
|
2019-07-29 20:22:09 +03:00
|
|
|
newxprt->sc_sq_cq = ib_alloc_cq_any(dev, newxprt, newxprt->sc_sq_depth,
|
|
|
|
IB_POLL_WORKQUEUE);
|
2020-04-30 22:25:01 +03:00
|
|
|
if (IS_ERR(newxprt->sc_sq_cq))
|
2007-12-13 01:13:21 +03:00
|
|
|
goto errout;
|
2019-07-29 20:22:09 +03:00
|
|
|
newxprt->sc_rq_cq =
|
|
|
|
ib_alloc_cq_any(dev, newxprt, rq_depth, IB_POLL_WORKQUEUE);
|
2020-04-30 22:25:01 +03:00
|
|
|
if (IS_ERR(newxprt->sc_rq_cq))
|
2007-12-13 01:13:21 +03:00
|
|
|
goto errout;
|
|
|
|
|
|
|
|
memset(&qp_attr, 0, sizeof qp_attr);
|
|
|
|
qp_attr.event_handler = qp_event_handler;
|
|
|
|
qp_attr.qp_context = &newxprt->sc_xprt;
|
2017-06-24 00:19:13 +03:00
|
|
|
qp_attr.port_num = newxprt->sc_port_num;
|
2017-08-28 22:06:22 +03:00
|
|
|
qp_attr.cap.max_rdma_ctxs = ctxts;
|
|
|
|
qp_attr.cap.max_send_wr = newxprt->sc_sq_depth - ctxts;
|
2018-05-07 22:27:27 +03:00
|
|
|
qp_attr.cap.max_recv_wr = rq_depth;
|
2018-05-07 22:28:09 +03:00
|
|
|
qp_attr.cap.max_send_sge = newxprt->sc_max_send_sges;
|
2018-05-07 22:27:43 +03:00
|
|
|
qp_attr.cap.max_recv_sge = 1;
|
2007-12-13 01:13:21 +03:00
|
|
|
qp_attr.sq_sig_type = IB_SIGNAL_REQ_WR;
|
|
|
|
qp_attr.qp_type = IB_QPT_RC;
|
|
|
|
qp_attr.send_cq = newxprt->sc_sq_cq;
|
|
|
|
qp_attr.recv_cq = newxprt->sc_rq_cq;
|
2016-11-29 19:05:31 +03:00
|
|
|
dprintk("svcrdma: newxprt->sc_cm_id=%p, newxprt->sc_pd=%p\n",
|
|
|
|
newxprt->sc_cm_id, newxprt->sc_pd);
|
|
|
|
dprintk(" cap.max_send_wr = %d, cap.max_recv_wr = %d\n",
|
|
|
|
qp_attr.cap.max_send_wr, qp_attr.cap.max_recv_wr);
|
|
|
|
dprintk(" cap.max_send_sge = %d, cap.max_recv_sge = %d\n",
|
|
|
|
qp_attr.cap.max_send_sge, qp_attr.cap.max_recv_sge);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
|
|
|
ret = rdma_create_qp(newxprt->sc_cm_id, newxprt->sc_pd, &qp_attr);
|
|
|
|
if (ret) {
|
2020-04-30 22:25:01 +03:00
|
|
|
trace_svcrdma_qp_err(newxprt, ret);
|
2014-08-01 00:26:07 +04:00
|
|
|
goto errout;
|
2007-12-13 01:13:21 +03:00
|
|
|
}
|
|
|
|
newxprt->sc_qp = newxprt->sc_cm_id->qp;
|
|
|
|
|
2017-06-24 00:19:13 +03:00
|
|
|
if (!(dev->attrs.device_cap_flags & IB_DEVICE_MEM_MGT_EXTENSIONS))
|
2016-09-13 17:53:23 +03:00
|
|
|
newxprt->sc_snd_w_inv = false;
|
2017-06-24 00:19:13 +03:00
|
|
|
if (!rdma_protocol_iwarp(dev, newxprt->sc_port_num) &&
|
2020-04-30 22:25:01 +03:00
|
|
|
!rdma_ib_or_roce(dev, newxprt->sc_port_num)) {
|
|
|
|
trace_svcrdma_fabric_err(newxprt, -EINVAL);
|
2007-12-13 01:13:21 +03:00
|
|
|
goto errout;
|
2020-04-30 22:25:01 +03:00
|
|
|
}
|
2015-05-05 15:50:25 +03:00
|
|
|
|
2018-05-07 22:27:21 +03:00
|
|
|
if (!svc_rdma_post_recvs(newxprt))
|
|
|
|
goto errout;
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2016-09-13 17:53:15 +03:00
|
|
|
/* Construct RDMA-CM private message */
|
|
|
|
pmsg.cp_magic = rpcrdma_cmp_magic;
|
|
|
|
pmsg.cp_version = RPCRDMA_CMP_VERSION;
|
|
|
|
pmsg.cp_flags = 0;
|
|
|
|
pmsg.cp_send_size = pmsg.cp_recv_size =
|
|
|
|
rpcrdma_encode_buffer_size(newxprt->sc_max_req_size);
|
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
/* Accept Connection */
|
|
|
|
set_bit(RDMAXPRT_CONN_PENDING, &newxprt->sc_flags);
|
|
|
|
memset(&conn_param, 0, sizeof conn_param);
|
|
|
|
conn_param.responder_resources = 0;
|
2018-03-21 00:05:15 +03:00
|
|
|
conn_param.initiator_depth = min_t(int, newxprt->sc_ord,
|
|
|
|
dev->attrs.max_qp_init_rd_atom);
|
|
|
|
if (!conn_param.initiator_depth) {
|
|
|
|
ret = -EINVAL;
|
2020-04-30 22:25:01 +03:00
|
|
|
trace_svcrdma_initdepth_err(newxprt, ret);
|
2018-03-21 00:05:15 +03:00
|
|
|
goto errout;
|
|
|
|
}
|
2016-09-13 17:53:15 +03:00
|
|
|
conn_param.private_data = &pmsg;
|
|
|
|
conn_param.private_data_len = sizeof(pmsg);
|
2021-02-09 18:48:57 +03:00
|
|
|
rdma_lock_handler(newxprt->sc_cm_id);
|
|
|
|
newxprt->sc_cm_id->event_handler = svc_rdma_cma_handler;
|
2007-12-13 01:13:21 +03:00
|
|
|
ret = rdma_accept(newxprt->sc_cm_id, &conn_param);
|
2021-02-09 18:48:57 +03:00
|
|
|
rdma_unlock_handler(newxprt->sc_cm_id);
|
2020-04-30 22:25:01 +03:00
|
|
|
if (ret) {
|
|
|
|
trace_svcrdma_accept_err(newxprt, ret);
|
2007-12-13 01:13:21 +03:00
|
|
|
goto errout;
|
2020-04-30 22:25:01 +03:00
|
|
|
}
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2019-02-06 20:00:52 +03:00
|
|
|
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
|
2016-11-29 19:05:31 +03:00
|
|
|
dprintk("svcrdma: new connection %p accepted:\n", newxprt);
|
|
|
|
sap = (struct sockaddr *)&newxprt->sc_cm_id->route.addr.src_addr;
|
|
|
|
dprintk(" local address : %pIS:%u\n", sap, rpc_get_port(sap));
|
|
|
|
sap = (struct sockaddr *)&newxprt->sc_cm_id->route.addr.dst_addr;
|
|
|
|
dprintk(" remote address : %pIS:%u\n", sap, rpc_get_port(sap));
|
2018-05-07 22:28:09 +03:00
|
|
|
dprintk(" max_sge : %d\n", newxprt->sc_max_send_sges);
|
2016-11-29 19:05:31 +03:00
|
|
|
dprintk(" sq_depth : %d\n", newxprt->sc_sq_depth);
|
2017-08-28 22:06:22 +03:00
|
|
|
dprintk(" rdma_rw_ctxs : %d\n", ctxts);
|
2016-11-29 19:05:31 +03:00
|
|
|
dprintk(" max_requests : %d\n", newxprt->sc_max_requests);
|
2018-03-21 00:05:15 +03:00
|
|
|
dprintk(" ord : %d\n", conn_param.initiator_depth);
|
2019-02-06 20:00:52 +03:00
|
|
|
#endif
|
2007-12-13 01:13:21 +03:00
|
|
|
|
|
|
|
return &newxprt->sc_xprt;
|
|
|
|
|
|
|
|
errout:
|
2008-03-11 21:31:39 +03:00
|
|
|
/* Take a reference in case the DTO handler runs */
|
|
|
|
svc_xprt_get(&newxprt->sc_xprt);
|
2008-05-01 20:13:50 +04:00
|
|
|
if (newxprt->sc_qp && !IS_ERR(newxprt->sc_qp))
|
2008-03-11 21:31:39 +03:00
|
|
|
ib_destroy_qp(newxprt->sc_qp);
|
2007-12-13 01:13:21 +03:00
|
|
|
rdma_destroy_id(newxprt->sc_cm_id);
|
2008-03-11 21:31:39 +03:00
|
|
|
/* This call to put will destroy the transport */
|
|
|
|
svc_xprt_put(&newxprt->sc_xprt);
|
2007-12-13 01:13:21 +03:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void svc_rdma_detach(struct svc_xprt *xprt)
|
|
|
|
{
|
|
|
|
struct svcxprt_rdma *rdma =
|
|
|
|
container_of(xprt, struct svcxprt_rdma, sc_xprt);
|
2008-03-11 21:31:39 +03:00
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
rdma_disconnect(rdma->sc_cm_id);
|
|
|
|
}
|
|
|
|
|
2008-05-01 07:00:46 +04:00
|
|
|
static void __svc_rdma_free(struct work_struct *work)
|
2007-12-13 01:13:21 +03:00
|
|
|
{
|
2008-05-01 07:00:46 +04:00
|
|
|
struct svcxprt_rdma *rdma =
|
|
|
|
container_of(work, struct svcxprt_rdma, sc_work);
|
2016-01-07 22:50:10 +03:00
|
|
|
struct svc_xprt *xprt = &rdma->sc_xprt;
|
|
|
|
|
2020-06-30 20:25:41 +03:00
|
|
|
/* This blocks until the Completion Queues are empty */
|
2016-05-04 17:53:30 +03:00
|
|
|
if (rdma->sc_qp && !IS_ERR(rdma->sc_qp))
|
|
|
|
ib_drain_qp(rdma->sc_qp);
|
|
|
|
|
2018-05-07 22:27:21 +03:00
|
|
|
svc_rdma_flush_recv_queues(rdma);
|
2008-05-01 20:25:02 +04:00
|
|
|
|
2016-01-07 22:50:10 +03:00
|
|
|
/* Final put of backchannel client transport */
|
|
|
|
if (xprt->xpt_bc_xprt) {
|
|
|
|
xprt_put(xprt->xpt_bc_xprt);
|
|
|
|
xprt->xpt_bc_xprt = NULL;
|
|
|
|
}
|
|
|
|
|
2017-04-09 20:06:16 +03:00
|
|
|
svc_rdma_destroy_rw_ctxts(rdma);
|
2018-05-07 22:28:04 +03:00
|
|
|
svc_rdma_send_ctxts_destroy(rdma);
|
2018-05-07 22:27:21 +03:00
|
|
|
svc_rdma_recv_ctxts_destroy(rdma);
|
2008-10-06 23:45:18 +04:00
|
|
|
|
2008-05-01 20:13:50 +04:00
|
|
|
/* Destroy the QP if present (not a listener) */
|
|
|
|
if (rdma->sc_qp && !IS_ERR(rdma->sc_qp))
|
|
|
|
ib_destroy_qp(rdma->sc_qp);
|
|
|
|
|
2008-03-11 21:31:39 +03:00
|
|
|
if (rdma->sc_sq_cq && !IS_ERR(rdma->sc_sq_cq))
|
2016-03-01 21:07:22 +03:00
|
|
|
ib_free_cq(rdma->sc_sq_cq);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2008-03-11 21:31:39 +03:00
|
|
|
if (rdma->sc_rq_cq && !IS_ERR(rdma->sc_rq_cq))
|
2016-03-01 21:07:13 +03:00
|
|
|
ib_free_cq(rdma->sc_rq_cq);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2008-03-11 21:31:39 +03:00
|
|
|
if (rdma->sc_pd && !IS_ERR(rdma->sc_pd))
|
|
|
|
ib_dealloc_pd(rdma->sc_pd);
|
2007-12-13 01:13:21 +03:00
|
|
|
|
2008-05-01 20:25:02 +04:00
|
|
|
/* Destroy the CM ID */
|
|
|
|
rdma_destroy_id(rdma->sc_cm_id);
|
|
|
|
|
2008-03-11 21:31:39 +03:00
|
|
|
kfree(rdma);
|
2007-12-13 01:13:21 +03:00
|
|
|
}
|
|
|
|
|
2008-05-01 07:00:46 +04:00
|
|
|
static void svc_rdma_free(struct svc_xprt *xprt)
|
|
|
|
{
|
|
|
|
struct svcxprt_rdma *rdma =
|
|
|
|
container_of(xprt, struct svcxprt_rdma, sc_xprt);
|
2019-08-17 00:48:36 +03:00
|
|
|
|
2008-05-01 07:00:46 +04:00
|
|
|
INIT_WORK(&rdma->sc_work, __svc_rdma_free);
|
2019-08-17 00:48:36 +03:00
|
|
|
schedule_work(&rdma->sc_work);
|
2008-05-01 07:00:46 +04:00
|
|
|
}
|
|
|
|
|
2007-12-13 01:13:21 +03:00
|
|
|
static int svc_rdma_has_wspace(struct svc_xprt *xprt)
|
|
|
|
{
|
|
|
|
struct svcxprt_rdma *rdma =
|
|
|
|
container_of(xprt, struct svcxprt_rdma, sc_xprt);
|
|
|
|
|
|
|
|
/*
|
2014-05-29 00:12:01 +04:00
|
|
|
* If there are already waiters on the SQ,
|
2007-12-13 01:13:21 +03:00
|
|
|
* return false.
|
|
|
|
*/
|
|
|
|
if (waitqueue_active(&rdma->sc_send_wait))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Otherwise return true. */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2018-03-27 17:49:38 +03:00
|
|
|
static void svc_rdma_secure_port(struct svc_rqst *rqstp)
|
2014-05-19 21:40:22 +04:00
|
|
|
{
|
2018-03-27 17:49:38 +03:00
|
|
|
set_bit(RQ_SECURE, &rqstp->rq_flags);
|
2014-05-19 21:40:22 +04:00
|
|
|
}
|
|
|
|
|
2016-11-11 21:16:22 +03:00
|
|
|
static void svc_rdma_kill_temp_xprt(struct svc_xprt *xprt)
|
|
|
|
{
|
|
|
|
}
|