4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.gnu.org/licenses/gpl-2.0.html
23 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
24 * Use is subject to license terms.
26 * Copyright (c) 2011, 2017, Intel Corporation.
29 * This file is part of Lustre, http://www.lustre.org/
30 * Lustre is a trademark of Sun Microsystems, Inc.
33 #define DEBUG_SUBSYSTEM S_LNET
35 #include <linux/ctype.h>
36 #include <linux/log2.h>
37 #include <linux/ktime.h>
38 #include <linux/moduleparam.h>
39 #include <linux/uaccess.h>
41 #include <lnet/lib-lnet.h>
43 #define D_LNI D_CONSOLE
46 * initialize ln_api_mutex statically, since it needs to be used in
47 * discovery_set callback. That module parameter callback can be called
48 * before module init completes. The mutex needs to be ready for use then.
50 struct lnet the_lnet = {
51 .ln_api_mutex = __MUTEX_INITIALIZER(the_lnet.ln_api_mutex),
52 }; /* THE state of the network */
53 EXPORT_SYMBOL(the_lnet);
55 static char *ip2nets = "";
56 module_param(ip2nets, charp, 0444);
57 MODULE_PARM_DESC(ip2nets, "LNET network <- IP table");
59 static char *networks = "";
60 module_param(networks, charp, 0444);
61 MODULE_PARM_DESC(networks, "local networks");
63 static char *routes = "";
64 module_param(routes, charp, 0444);
65 MODULE_PARM_DESC(routes, "routes to non-local networks");
67 static int rnet_htable_size = LNET_REMOTE_NETS_HASH_DEFAULT;
68 module_param(rnet_htable_size, int, 0444);
69 MODULE_PARM_DESC(rnet_htable_size, "size of remote network hash table");
71 static int use_tcp_bonding = false;
72 module_param(use_tcp_bonding, int, 0444);
73 MODULE_PARM_DESC(use_tcp_bonding,
74 "Set to 1 to use socklnd bonding. 0 to use Multi-Rail");
76 unsigned int lnet_numa_range = 0;
77 module_param(lnet_numa_range, uint, 0444);
78 MODULE_PARM_DESC(lnet_numa_range,
79 "NUMA range to consider during Multi-Rail selection");
82 * lnet_health_sensitivity determines by how much we decrement the health
83 * value on sending error. The value defaults to 100, which means health
84 * interface health is decremented by 100 points every failure.
86 unsigned int lnet_health_sensitivity = 100;
87 static int sensitivity_set(const char *val, cfs_kernel_param_arg_t *kp);
88 #ifdef HAVE_KERNEL_PARAM_OPS
89 static struct kernel_param_ops param_ops_health_sensitivity = {
90 .set = sensitivity_set,
93 #define param_check_health_sensitivity(name, p) \
94 __param_check(name, p, int)
95 module_param(lnet_health_sensitivity, health_sensitivity, S_IRUGO|S_IWUSR);
97 module_param_call(lnet_health_sensitivity, sensitivity_set, param_get_int,
98 &lnet_health_sensitivity, S_IRUGO|S_IWUSR);
100 MODULE_PARM_DESC(lnet_health_sensitivity,
101 "Value to decrement the health value by on error");
104 * lnet_recovery_interval determines how often we should perform recovery
105 * on unhealthy interfaces.
107 unsigned int lnet_recovery_interval = 1;
108 static int recovery_interval_set(const char *val, cfs_kernel_param_arg_t *kp);
109 #ifdef HAVE_KERNEL_PARAM_OPS
110 static struct kernel_param_ops param_ops_recovery_interval = {
111 .set = recovery_interval_set,
112 .get = param_get_int,
114 #define param_check_recovery_interval(name, p) \
115 __param_check(name, p, int)
116 module_param(lnet_recovery_interval, recovery_interval, S_IRUGO|S_IWUSR);
118 module_param_call(lnet_recovery_interval, recovery_interval_set, param_get_int,
119 &lnet_recovery_interval, S_IRUGO|S_IWUSR);
121 MODULE_PARM_DESC(lnet_recovery_interval,
122 "Interval to recover unhealthy interfaces in seconds");
124 static int lnet_interfaces_max = LNET_INTERFACES_MAX_DEFAULT;
125 static int intf_max_set(const char *val, cfs_kernel_param_arg_t *kp);
127 static struct kernel_param_ops param_ops_interfaces_max = {
129 .get = param_get_int,
132 #define param_check_interfaces_max(name, p) \
133 __param_check(name, p, int)
135 #ifdef HAVE_KERNEL_PARAM_OPS
136 module_param(lnet_interfaces_max, interfaces_max, 0644);
138 module_param_call(lnet_interfaces_max, intf_max_set, param_get_int,
139 ¶m_ops_interfaces_max, 0644);
141 MODULE_PARM_DESC(lnet_interfaces_max,
142 "Maximum number of interfaces in a node.");
144 unsigned lnet_peer_discovery_disabled = 0;
145 static int discovery_set(const char *val, cfs_kernel_param_arg_t *kp);
147 static struct kernel_param_ops param_ops_discovery_disabled = {
148 .set = discovery_set,
149 .get = param_get_int,
152 #define param_check_discovery_disabled(name, p) \
153 __param_check(name, p, int)
154 #ifdef HAVE_KERNEL_PARAM_OPS
155 module_param(lnet_peer_discovery_disabled, discovery_disabled, 0644);
157 module_param_call(lnet_peer_discovery_disabled, discovery_set, param_get_int,
158 ¶m_ops_discovery_disabled, 0644);
160 MODULE_PARM_DESC(lnet_peer_discovery_disabled,
161 "Set to 1 to disable peer discovery on this node.");
163 unsigned int lnet_drop_asym_route;
164 static int drop_asym_route_set(const char *val, cfs_kernel_param_arg_t *kp);
166 static struct kernel_param_ops param_ops_drop_asym_route = {
167 .set = drop_asym_route_set,
168 .get = param_get_int,
171 #define param_check_drop_asym_route(name, p) \
172 __param_check(name, p, int)
173 #ifdef HAVE_KERNEL_PARAM_OPS
174 module_param(lnet_drop_asym_route, drop_asym_route, 0644);
176 module_param_call(lnet_drop_asym_route, drop_asym_route_set, param_get_int,
177 ¶m_ops_drop_asym_route, 0644);
179 MODULE_PARM_DESC(lnet_drop_asym_route,
180 "Set to 1 to drop asymmetrical route messages.");
182 #define LNET_TRANSACTION_TIMEOUT_NO_HEALTH_DEFAULT 50
183 #define LNET_TRANSACTION_TIMEOUT_HEALTH_DEFAULT 10
185 unsigned lnet_transaction_timeout = LNET_TRANSACTION_TIMEOUT_HEALTH_DEFAULT;
186 static int transaction_to_set(const char *val, cfs_kernel_param_arg_t *kp);
187 #ifdef HAVE_KERNEL_PARAM_OPS
188 static struct kernel_param_ops param_ops_transaction_timeout = {
189 .set = transaction_to_set,
190 .get = param_get_int,
193 #define param_check_transaction_timeout(name, p) \
194 __param_check(name, p, int)
195 module_param(lnet_transaction_timeout, transaction_timeout, S_IRUGO|S_IWUSR);
197 module_param_call(lnet_transaction_timeout, transaction_to_set, param_get_int,
198 &lnet_transaction_timeout, S_IRUGO|S_IWUSR);
200 MODULE_PARM_DESC(lnet_transaction_timeout,
201 "Maximum number of seconds to wait for a peer response.");
203 #define LNET_RETRY_COUNT_HEALTH_DEFAULT 3
204 unsigned lnet_retry_count = LNET_RETRY_COUNT_HEALTH_DEFAULT;
205 static int retry_count_set(const char *val, cfs_kernel_param_arg_t *kp);
206 #ifdef HAVE_KERNEL_PARAM_OPS
207 static struct kernel_param_ops param_ops_retry_count = {
208 .set = retry_count_set,
209 .get = param_get_int,
212 #define param_check_retry_count(name, p) \
213 __param_check(name, p, int)
214 module_param(lnet_retry_count, retry_count, S_IRUGO|S_IWUSR);
216 module_param_call(lnet_retry_count, retry_count_set, param_get_int,
217 &lnet_retry_count, S_IRUGO|S_IWUSR);
219 MODULE_PARM_DESC(lnet_retry_count,
220 "Maximum number of times to retry transmitting a message");
223 unsigned lnet_lnd_timeout = LNET_LND_DEFAULT_TIMEOUT;
226 * This sequence number keeps track of how many times DLC was used to
227 * update the local NIs. It is incremented when a NI is added or
228 * removed and checked when sending a message to determine if there is
229 * a need to re-run the selection algorithm. See lnet_select_pathway()
230 * for more details on its usage.
232 static atomic_t lnet_dlc_seq_no = ATOMIC_INIT(0);
234 static int lnet_ping(struct lnet_process_id id, signed long timeout,
235 struct lnet_process_id __user *ids, int n_ids);
237 static int lnet_discover(struct lnet_process_id id, __u32 force,
238 struct lnet_process_id __user *ids, int n_ids);
241 sensitivity_set(const char *val, cfs_kernel_param_arg_t *kp)
244 unsigned *sensitivity = (unsigned *)kp->arg;
247 rc = kstrtoul(val, 0, &value);
249 CERROR("Invalid module parameter value for 'lnet_health_sensitivity'\n");
254 * The purpose of locking the api_mutex here is to ensure that
255 * the correct value ends up stored properly.
257 mutex_lock(&the_lnet.ln_api_mutex);
259 if (value > LNET_MAX_HEALTH_VALUE) {
260 mutex_unlock(&the_lnet.ln_api_mutex);
261 CERROR("Invalid health value. Maximum: %d value = %lu\n",
262 LNET_MAX_HEALTH_VALUE, value);
267 * if we're turning on health then use the health timeout
270 if (*sensitivity == 0 && value != 0) {
271 lnet_transaction_timeout = LNET_TRANSACTION_TIMEOUT_HEALTH_DEFAULT;
272 lnet_retry_count = LNET_RETRY_COUNT_HEALTH_DEFAULT;
274 * if we're turning off health then use the no health timeout
277 } else if (*sensitivity != 0 && value == 0) {
278 lnet_transaction_timeout =
279 LNET_TRANSACTION_TIMEOUT_NO_HEALTH_DEFAULT;
280 lnet_retry_count = 0;
283 *sensitivity = value;
285 mutex_unlock(&the_lnet.ln_api_mutex);
291 recovery_interval_set(const char *val, cfs_kernel_param_arg_t *kp)
294 unsigned *interval = (unsigned *)kp->arg;
297 rc = kstrtoul(val, 0, &value);
299 CERROR("Invalid module parameter value for 'lnet_recovery_interval'\n");
304 CERROR("lnet_recovery_interval must be at least 1 second\n");
309 * The purpose of locking the api_mutex here is to ensure that
310 * the correct value ends up stored properly.
312 mutex_lock(&the_lnet.ln_api_mutex);
316 mutex_unlock(&the_lnet.ln_api_mutex);
322 discovery_set(const char *val, cfs_kernel_param_arg_t *kp)
325 unsigned *discovery = (unsigned *)kp->arg;
327 struct lnet_ping_buffer *pbuf;
329 rc = kstrtoul(val, 0, &value);
331 CERROR("Invalid module parameter value for 'lnet_peer_discovery_disabled'\n");
335 value = (value) ? 1 : 0;
338 * The purpose of locking the api_mutex here is to ensure that
339 * the correct value ends up stored properly.
341 mutex_lock(&the_lnet.ln_api_mutex);
343 if (value == *discovery) {
344 mutex_unlock(&the_lnet.ln_api_mutex);
350 if (the_lnet.ln_state != LNET_STATE_RUNNING) {
351 mutex_unlock(&the_lnet.ln_api_mutex);
355 /* tell peers that discovery setting has changed */
356 lnet_net_lock(LNET_LOCK_EX);
357 pbuf = the_lnet.ln_ping_target;
359 pbuf->pb_info.pi_features &= ~LNET_PING_FEAT_DISCOVERY;
361 pbuf->pb_info.pi_features |= LNET_PING_FEAT_DISCOVERY;
362 lnet_net_unlock(LNET_LOCK_EX);
364 lnet_push_update_to_peers(1);
366 mutex_unlock(&the_lnet.ln_api_mutex);
372 drop_asym_route_set(const char *val, cfs_kernel_param_arg_t *kp)
375 unsigned int *drop_asym_route = (unsigned int *)kp->arg;
378 rc = kstrtoul(val, 0, &value);
380 CERROR("Invalid module parameter value for "
381 "'lnet_drop_asym_route'\n");
386 * The purpose of locking the api_mutex here is to ensure that
387 * the correct value ends up stored properly.
389 mutex_lock(&the_lnet.ln_api_mutex);
391 if (value == *drop_asym_route) {
392 mutex_unlock(&the_lnet.ln_api_mutex);
396 *drop_asym_route = value;
398 mutex_unlock(&the_lnet.ln_api_mutex);
404 transaction_to_set(const char *val, cfs_kernel_param_arg_t *kp)
407 unsigned *transaction_to = (unsigned *)kp->arg;
410 rc = kstrtoul(val, 0, &value);
412 CERROR("Invalid module parameter value for 'lnet_transaction_timeout'\n");
417 * The purpose of locking the api_mutex here is to ensure that
418 * the correct value ends up stored properly.
420 mutex_lock(&the_lnet.ln_api_mutex);
422 if (value < lnet_retry_count || value == 0) {
423 mutex_unlock(&the_lnet.ln_api_mutex);
424 CERROR("Invalid value for lnet_transaction_timeout (%lu). "
425 "Has to be greater than lnet_retry_count (%u)\n",
426 value, lnet_retry_count);
430 if (value == *transaction_to) {
431 mutex_unlock(&the_lnet.ln_api_mutex);
435 *transaction_to = value;
436 if (lnet_retry_count == 0)
437 lnet_lnd_timeout = value;
439 lnet_lnd_timeout = value / lnet_retry_count;
441 mutex_unlock(&the_lnet.ln_api_mutex);
447 retry_count_set(const char *val, cfs_kernel_param_arg_t *kp)
450 unsigned *retry_count = (unsigned *)kp->arg;
453 rc = kstrtoul(val, 0, &value);
455 CERROR("Invalid module parameter value for 'lnet_retry_count'\n");
460 * The purpose of locking the api_mutex here is to ensure that
461 * the correct value ends up stored properly.
463 mutex_lock(&the_lnet.ln_api_mutex);
465 if (lnet_health_sensitivity == 0) {
466 mutex_unlock(&the_lnet.ln_api_mutex);
467 CERROR("Can not set retry_count when health feature is turned off\n");
471 if (value > lnet_transaction_timeout) {
472 mutex_unlock(&the_lnet.ln_api_mutex);
473 CERROR("Invalid value for lnet_retry_count (%lu). "
474 "Has to be smaller than lnet_transaction_timeout (%u)\n",
475 value, lnet_transaction_timeout);
479 *retry_count = value;
482 lnet_lnd_timeout = lnet_transaction_timeout;
484 lnet_lnd_timeout = lnet_transaction_timeout / value;
486 mutex_unlock(&the_lnet.ln_api_mutex);
492 intf_max_set(const char *val, cfs_kernel_param_arg_t *kp)
496 rc = kstrtoint(val, 0, &value);
498 CERROR("Invalid module parameter value for 'lnet_interfaces_max'\n");
502 if (value < LNET_INTERFACES_MIN) {
503 CWARN("max interfaces provided are too small, setting to %d\n",
504 LNET_INTERFACES_MAX_DEFAULT);
505 value = LNET_INTERFACES_MAX_DEFAULT;
508 *(int *)kp->arg = value;
514 lnet_get_routes(void)
520 lnet_get_networks(void)
525 if (*networks != 0 && *ip2nets != 0) {
526 LCONSOLE_ERROR_MSG(0x101, "Please specify EITHER 'networks' or "
527 "'ip2nets' but not both at once\n");
532 rc = lnet_parse_ip2nets(&nets, ip2nets);
533 return (rc == 0) ? nets : NULL;
543 lnet_init_locks(void)
545 spin_lock_init(&the_lnet.ln_eq_wait_lock);
546 spin_lock_init(&the_lnet.ln_msg_resend_lock);
547 init_waitqueue_head(&the_lnet.ln_eq_waitq);
548 init_waitqueue_head(&the_lnet.ln_mt_waitq);
549 mutex_init(&the_lnet.ln_lnd_mutex);
553 lnet_fini_locks(void)
557 struct kmem_cache *lnet_mes_cachep; /* MEs kmem_cache */
558 struct kmem_cache *lnet_small_mds_cachep; /* <= LNET_SMALL_MD_SIZE bytes
562 lnet_descriptor_setup(void)
564 /* create specific kmem_cache for MEs and small MDs (i.e., originally
565 * allocated in <size-xxx> kmem_cache).
567 lnet_mes_cachep = kmem_cache_create("lnet_MEs", sizeof(struct lnet_me),
569 if (!lnet_mes_cachep)
572 lnet_small_mds_cachep = kmem_cache_create("lnet_small_MDs",
573 LNET_SMALL_MD_SIZE, 0, 0,
575 if (!lnet_small_mds_cachep)
582 lnet_descriptor_cleanup(void)
585 if (lnet_small_mds_cachep) {
586 kmem_cache_destroy(lnet_small_mds_cachep);
587 lnet_small_mds_cachep = NULL;
590 if (lnet_mes_cachep) {
591 kmem_cache_destroy(lnet_mes_cachep);
592 lnet_mes_cachep = NULL;
597 lnet_create_remote_nets_table(void)
600 struct list_head *hash;
602 LASSERT(the_lnet.ln_remote_nets_hash == NULL);
603 LASSERT(the_lnet.ln_remote_nets_hbits > 0);
604 LIBCFS_ALLOC(hash, LNET_REMOTE_NETS_HASH_SIZE * sizeof(*hash));
606 CERROR("Failed to create remote nets hash table\n");
610 for (i = 0; i < LNET_REMOTE_NETS_HASH_SIZE; i++)
611 INIT_LIST_HEAD(&hash[i]);
612 the_lnet.ln_remote_nets_hash = hash;
617 lnet_destroy_remote_nets_table(void)
621 if (the_lnet.ln_remote_nets_hash == NULL)
624 for (i = 0; i < LNET_REMOTE_NETS_HASH_SIZE; i++)
625 LASSERT(list_empty(&the_lnet.ln_remote_nets_hash[i]));
627 LIBCFS_FREE(the_lnet.ln_remote_nets_hash,
628 LNET_REMOTE_NETS_HASH_SIZE *
629 sizeof(the_lnet.ln_remote_nets_hash[0]));
630 the_lnet.ln_remote_nets_hash = NULL;
634 lnet_destroy_locks(void)
636 if (the_lnet.ln_res_lock != NULL) {
637 cfs_percpt_lock_free(the_lnet.ln_res_lock);
638 the_lnet.ln_res_lock = NULL;
641 if (the_lnet.ln_net_lock != NULL) {
642 cfs_percpt_lock_free(the_lnet.ln_net_lock);
643 the_lnet.ln_net_lock = NULL;
650 lnet_create_locks(void)
654 the_lnet.ln_res_lock = cfs_percpt_lock_alloc(lnet_cpt_table());
655 if (the_lnet.ln_res_lock == NULL)
658 the_lnet.ln_net_lock = cfs_percpt_lock_alloc(lnet_cpt_table());
659 if (the_lnet.ln_net_lock == NULL)
665 lnet_destroy_locks();
669 static void lnet_assert_wire_constants(void)
671 /* Wire protocol assertions generated by 'wirecheck'
672 * running on Linux robert.bartonsoftware.com 2.6.8-1.521
673 * #1 Mon Aug 16 09:01:18 EDT 2004 i686 athlon i386 GNU/Linux
674 * with gcc version 3.3.3 20040412 (Red Hat Linux 3.3.3-7) */
677 CLASSERT(LNET_PROTO_TCP_MAGIC == 0xeebc0ded);
678 CLASSERT(LNET_PROTO_TCP_VERSION_MAJOR == 1);
679 CLASSERT(LNET_PROTO_TCP_VERSION_MINOR == 0);
680 CLASSERT(LNET_MSG_ACK == 0);
681 CLASSERT(LNET_MSG_PUT == 1);
682 CLASSERT(LNET_MSG_GET == 2);
683 CLASSERT(LNET_MSG_REPLY == 3);
684 CLASSERT(LNET_MSG_HELLO == 4);
686 /* Checks for struct lnet_handle_wire */
687 CLASSERT((int)sizeof(struct lnet_handle_wire) == 16);
688 CLASSERT((int)offsetof(struct lnet_handle_wire, wh_interface_cookie) == 0);
689 CLASSERT((int)sizeof(((struct lnet_handle_wire *)0)->wh_interface_cookie) == 8);
690 CLASSERT((int)offsetof(struct lnet_handle_wire, wh_object_cookie) == 8);
691 CLASSERT((int)sizeof(((struct lnet_handle_wire *)0)->wh_object_cookie) == 8);
693 /* Checks for struct struct lnet_magicversion */
694 CLASSERT((int)sizeof(struct lnet_magicversion) == 8);
695 CLASSERT((int)offsetof(struct lnet_magicversion, magic) == 0);
696 CLASSERT((int)sizeof(((struct lnet_magicversion *)0)->magic) == 4);
697 CLASSERT((int)offsetof(struct lnet_magicversion, version_major) == 4);
698 CLASSERT((int)sizeof(((struct lnet_magicversion *)0)->version_major) == 2);
699 CLASSERT((int)offsetof(struct lnet_magicversion, version_minor) == 6);
700 CLASSERT((int)sizeof(((struct lnet_magicversion *)0)->version_minor) == 2);
702 /* Checks for struct struct lnet_hdr */
703 CLASSERT((int)sizeof(struct lnet_hdr) == 72);
704 CLASSERT((int)offsetof(struct lnet_hdr, dest_nid) == 0);
705 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->dest_nid) == 8);
706 CLASSERT((int)offsetof(struct lnet_hdr, src_nid) == 8);
707 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->src_nid) == 8);
708 CLASSERT((int)offsetof(struct lnet_hdr, dest_pid) == 16);
709 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->dest_pid) == 4);
710 CLASSERT((int)offsetof(struct lnet_hdr, src_pid) == 20);
711 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->src_pid) == 4);
712 CLASSERT((int)offsetof(struct lnet_hdr, type) == 24);
713 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->type) == 4);
714 CLASSERT((int)offsetof(struct lnet_hdr, payload_length) == 28);
715 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->payload_length) == 4);
716 CLASSERT((int)offsetof(struct lnet_hdr, msg) == 32);
717 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg) == 40);
720 CLASSERT((int)offsetof(struct lnet_hdr, msg.ack.dst_wmd) == 32);
721 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.ack.dst_wmd) == 16);
722 CLASSERT((int)offsetof(struct lnet_hdr, msg.ack.match_bits) == 48);
723 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.ack.match_bits) == 8);
724 CLASSERT((int)offsetof(struct lnet_hdr, msg.ack.mlength) == 56);
725 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.ack.mlength) == 4);
728 CLASSERT((int)offsetof(struct lnet_hdr, msg.put.ack_wmd) == 32);
729 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.put.ack_wmd) == 16);
730 CLASSERT((int)offsetof(struct lnet_hdr, msg.put.match_bits) == 48);
731 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.put.match_bits) == 8);
732 CLASSERT((int)offsetof(struct lnet_hdr, msg.put.hdr_data) == 56);
733 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.put.hdr_data) == 8);
734 CLASSERT((int)offsetof(struct lnet_hdr, msg.put.ptl_index) == 64);
735 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.put.ptl_index) == 4);
736 CLASSERT((int)offsetof(struct lnet_hdr, msg.put.offset) == 68);
737 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.put.offset) == 4);
740 CLASSERT((int)offsetof(struct lnet_hdr, msg.get.return_wmd) == 32);
741 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.get.return_wmd) == 16);
742 CLASSERT((int)offsetof(struct lnet_hdr, msg.get.match_bits) == 48);
743 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.get.match_bits) == 8);
744 CLASSERT((int)offsetof(struct lnet_hdr, msg.get.ptl_index) == 56);
745 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.get.ptl_index) == 4);
746 CLASSERT((int)offsetof(struct lnet_hdr, msg.get.src_offset) == 60);
747 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.get.src_offset) == 4);
748 CLASSERT((int)offsetof(struct lnet_hdr, msg.get.sink_length) == 64);
749 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.get.sink_length) == 4);
752 CLASSERT((int)offsetof(struct lnet_hdr, msg.reply.dst_wmd) == 32);
753 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.reply.dst_wmd) == 16);
756 CLASSERT((int)offsetof(struct lnet_hdr, msg.hello.incarnation) == 32);
757 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.hello.incarnation) == 8);
758 CLASSERT((int)offsetof(struct lnet_hdr, msg.hello.type) == 40);
759 CLASSERT((int)sizeof(((struct lnet_hdr *)0)->msg.hello.type) == 4);
761 /* Checks for struct lnet_ni_status and related constants */
762 CLASSERT(LNET_NI_STATUS_INVALID == 0x00000000);
763 CLASSERT(LNET_NI_STATUS_UP == 0x15aac0de);
764 CLASSERT(LNET_NI_STATUS_DOWN == 0xdeadface);
766 /* Checks for struct lnet_ni_status */
767 CLASSERT((int)sizeof(struct lnet_ni_status) == 16);
768 CLASSERT((int)offsetof(struct lnet_ni_status, ns_nid) == 0);
769 CLASSERT((int)sizeof(((struct lnet_ni_status *)0)->ns_nid) == 8);
770 CLASSERT((int)offsetof(struct lnet_ni_status, ns_status) == 8);
771 CLASSERT((int)sizeof(((struct lnet_ni_status *)0)->ns_status) == 4);
772 CLASSERT((int)offsetof(struct lnet_ni_status, ns_unused) == 12);
773 CLASSERT((int)sizeof(((struct lnet_ni_status *)0)->ns_unused) == 4);
775 /* Checks for struct lnet_ping_info and related constants */
776 CLASSERT(LNET_PROTO_PING_MAGIC == 0x70696E67);
777 CLASSERT(LNET_PING_FEAT_INVAL == 0);
778 CLASSERT(LNET_PING_FEAT_BASE == 1);
779 CLASSERT(LNET_PING_FEAT_NI_STATUS == 2);
780 CLASSERT(LNET_PING_FEAT_RTE_DISABLED == 4);
781 CLASSERT(LNET_PING_FEAT_MULTI_RAIL == 8);
782 CLASSERT(LNET_PING_FEAT_DISCOVERY == 16);
783 CLASSERT(LNET_PING_FEAT_BITS == 31);
785 /* Checks for struct lnet_ping_info */
786 CLASSERT((int)sizeof(struct lnet_ping_info) == 16);
787 CLASSERT((int)offsetof(struct lnet_ping_info, pi_magic) == 0);
788 CLASSERT((int)sizeof(((struct lnet_ping_info *)0)->pi_magic) == 4);
789 CLASSERT((int)offsetof(struct lnet_ping_info, pi_features) == 4);
790 CLASSERT((int)sizeof(((struct lnet_ping_info *)0)->pi_features) == 4);
791 CLASSERT((int)offsetof(struct lnet_ping_info, pi_pid) == 8);
792 CLASSERT((int)sizeof(((struct lnet_ping_info *)0)->pi_pid) == 4);
793 CLASSERT((int)offsetof(struct lnet_ping_info, pi_nnis) == 12);
794 CLASSERT((int)sizeof(((struct lnet_ping_info *)0)->pi_nnis) == 4);
795 CLASSERT((int)offsetof(struct lnet_ping_info, pi_ni) == 16);
796 CLASSERT((int)sizeof(((struct lnet_ping_info *)0)->pi_ni) == 0);
799 static struct lnet_lnd *lnet_find_lnd_by_type(__u32 type)
801 struct lnet_lnd *lnd;
802 struct list_head *tmp;
804 /* holding lnd mutex */
805 list_for_each(tmp, &the_lnet.ln_lnds) {
806 lnd = list_entry(tmp, struct lnet_lnd, lnd_list);
808 if (lnd->lnd_type == type)
815 lnet_get_lnd_timeout(void)
817 return lnet_lnd_timeout;
819 EXPORT_SYMBOL(lnet_get_lnd_timeout);
822 lnet_register_lnd(struct lnet_lnd *lnd)
824 mutex_lock(&the_lnet.ln_lnd_mutex);
826 LASSERT(libcfs_isknown_lnd(lnd->lnd_type));
827 LASSERT(lnet_find_lnd_by_type(lnd->lnd_type) == NULL);
829 list_add_tail(&lnd->lnd_list, &the_lnet.ln_lnds);
830 lnd->lnd_refcount = 0;
832 CDEBUG(D_NET, "%s LND registered\n", libcfs_lnd2str(lnd->lnd_type));
834 mutex_unlock(&the_lnet.ln_lnd_mutex);
836 EXPORT_SYMBOL(lnet_register_lnd);
839 lnet_unregister_lnd(struct lnet_lnd *lnd)
841 mutex_lock(&the_lnet.ln_lnd_mutex);
843 LASSERT(lnet_find_lnd_by_type(lnd->lnd_type) == lnd);
844 LASSERT(lnd->lnd_refcount == 0);
846 list_del(&lnd->lnd_list);
847 CDEBUG(D_NET, "%s LND unregistered\n", libcfs_lnd2str(lnd->lnd_type));
849 mutex_unlock(&the_lnet.ln_lnd_mutex);
851 EXPORT_SYMBOL(lnet_unregister_lnd);
854 lnet_counters_get_common(struct lnet_counters_common *common)
856 struct lnet_counters *ctr;
859 memset(common, 0, sizeof(*common));
861 lnet_net_lock(LNET_LOCK_EX);
863 cfs_percpt_for_each(ctr, i, the_lnet.ln_counters) {
864 common->lcc_msgs_max += ctr->lct_common.lcc_msgs_max;
865 common->lcc_msgs_alloc += ctr->lct_common.lcc_msgs_alloc;
866 common->lcc_errors += ctr->lct_common.lcc_errors;
867 common->lcc_send_count += ctr->lct_common.lcc_send_count;
868 common->lcc_recv_count += ctr->lct_common.lcc_recv_count;
869 common->lcc_route_count += ctr->lct_common.lcc_route_count;
870 common->lcc_drop_count += ctr->lct_common.lcc_drop_count;
871 common->lcc_send_length += ctr->lct_common.lcc_send_length;
872 common->lcc_recv_length += ctr->lct_common.lcc_recv_length;
873 common->lcc_route_length += ctr->lct_common.lcc_route_length;
874 common->lcc_drop_length += ctr->lct_common.lcc_drop_length;
876 lnet_net_unlock(LNET_LOCK_EX);
878 EXPORT_SYMBOL(lnet_counters_get_common);
881 lnet_counters_get(struct lnet_counters *counters)
883 struct lnet_counters *ctr;
884 struct lnet_counters_health *health = &counters->lct_health;
887 memset(counters, 0, sizeof(*counters));
889 lnet_counters_get_common(&counters->lct_common);
891 lnet_net_lock(LNET_LOCK_EX);
893 cfs_percpt_for_each(ctr, i, the_lnet.ln_counters) {
894 health->lch_rst_alloc += ctr->lct_health.lch_rst_alloc;
895 health->lch_resend_count += ctr->lct_health.lch_resend_count;
896 health->lch_response_timeout_count +=
897 ctr->lct_health.lch_response_timeout_count;
898 health->lch_local_interrupt_count +=
899 ctr->lct_health.lch_local_interrupt_count;
900 health->lch_local_dropped_count +=
901 ctr->lct_health.lch_local_dropped_count;
902 health->lch_local_aborted_count +=
903 ctr->lct_health.lch_local_aborted_count;
904 health->lch_local_no_route_count +=
905 ctr->lct_health.lch_local_no_route_count;
906 health->lch_local_timeout_count +=
907 ctr->lct_health.lch_local_timeout_count;
908 health->lch_local_error_count +=
909 ctr->lct_health.lch_local_error_count;
910 health->lch_remote_dropped_count +=
911 ctr->lct_health.lch_remote_dropped_count;
912 health->lch_remote_error_count +=
913 ctr->lct_health.lch_remote_error_count;
914 health->lch_remote_timeout_count +=
915 ctr->lct_health.lch_remote_timeout_count;
916 health->lch_network_timeout_count +=
917 ctr->lct_health.lch_network_timeout_count;
919 lnet_net_unlock(LNET_LOCK_EX);
921 EXPORT_SYMBOL(lnet_counters_get);
924 lnet_counters_reset(void)
926 struct lnet_counters *counters;
929 lnet_net_lock(LNET_LOCK_EX);
931 cfs_percpt_for_each(counters, i, the_lnet.ln_counters)
932 memset(counters, 0, sizeof(struct lnet_counters));
934 lnet_net_unlock(LNET_LOCK_EX);
938 lnet_res_type2str(int type)
943 case LNET_COOKIE_TYPE_MD:
945 case LNET_COOKIE_TYPE_ME:
947 case LNET_COOKIE_TYPE_EQ:
953 lnet_res_container_cleanup(struct lnet_res_container *rec)
957 if (rec->rec_type == 0) /* not set yet, it's uninitialized */
960 while (!list_empty(&rec->rec_active)) {
961 struct list_head *e = rec->rec_active.next;
964 if (rec->rec_type == LNET_COOKIE_TYPE_EQ) {
965 lnet_eq_free(list_entry(e, struct lnet_eq, eq_list));
967 } else if (rec->rec_type == LNET_COOKIE_TYPE_MD) {
968 lnet_md_free(list_entry(e, struct lnet_libmd, md_list));
970 } else { /* NB: Active MEs should be attached on portals */
977 /* Found alive MD/ME/EQ, user really should unlink/free
978 * all of them before finalize LNet, but if someone didn't,
979 * we have to recycle garbage for him */
980 CERROR("%d active elements on exit of %s container\n",
981 count, lnet_res_type2str(rec->rec_type));
984 if (rec->rec_lh_hash != NULL) {
985 LIBCFS_FREE(rec->rec_lh_hash,
986 LNET_LH_HASH_SIZE * sizeof(rec->rec_lh_hash[0]));
987 rec->rec_lh_hash = NULL;
990 rec->rec_type = 0; /* mark it as finalized */
994 lnet_res_container_setup(struct lnet_res_container *rec, int cpt, int type)
999 LASSERT(rec->rec_type == 0);
1001 rec->rec_type = type;
1002 INIT_LIST_HEAD(&rec->rec_active);
1004 rec->rec_lh_cookie = (cpt << LNET_COOKIE_TYPE_BITS) | type;
1006 /* Arbitrary choice of hash table size */
1007 LIBCFS_CPT_ALLOC(rec->rec_lh_hash, lnet_cpt_table(), cpt,
1008 LNET_LH_HASH_SIZE * sizeof(rec->rec_lh_hash[0]));
1009 if (rec->rec_lh_hash == NULL) {
1014 for (i = 0; i < LNET_LH_HASH_SIZE; i++)
1015 INIT_LIST_HEAD(&rec->rec_lh_hash[i]);
1020 CERROR("Failed to setup %s resource container\n",
1021 lnet_res_type2str(type));
1022 lnet_res_container_cleanup(rec);
1027 lnet_res_containers_destroy(struct lnet_res_container **recs)
1029 struct lnet_res_container *rec;
1032 cfs_percpt_for_each(rec, i, recs)
1033 lnet_res_container_cleanup(rec);
1035 cfs_percpt_free(recs);
1038 static struct lnet_res_container **
1039 lnet_res_containers_create(int type)
1041 struct lnet_res_container **recs;
1042 struct lnet_res_container *rec;
1046 recs = cfs_percpt_alloc(lnet_cpt_table(), sizeof(*rec));
1048 CERROR("Failed to allocate %s resource containers\n",
1049 lnet_res_type2str(type));
1053 cfs_percpt_for_each(rec, i, recs) {
1054 rc = lnet_res_container_setup(rec, i, type);
1056 lnet_res_containers_destroy(recs);
1064 struct lnet_libhandle *
1065 lnet_res_lh_lookup(struct lnet_res_container *rec, __u64 cookie)
1067 /* ALWAYS called with lnet_res_lock held */
1068 struct list_head *head;
1069 struct lnet_libhandle *lh;
1072 if ((cookie & LNET_COOKIE_MASK) != rec->rec_type)
1075 hash = cookie >> (LNET_COOKIE_TYPE_BITS + LNET_CPT_BITS);
1076 head = &rec->rec_lh_hash[hash & LNET_LH_HASH_MASK];
1078 list_for_each_entry(lh, head, lh_hash_chain) {
1079 if (lh->lh_cookie == cookie)
1087 lnet_res_lh_initialize(struct lnet_res_container *rec,
1088 struct lnet_libhandle *lh)
1090 /* ALWAYS called with lnet_res_lock held */
1091 unsigned int ibits = LNET_COOKIE_TYPE_BITS + LNET_CPT_BITS;
1094 lh->lh_cookie = rec->rec_lh_cookie;
1095 rec->rec_lh_cookie += 1 << ibits;
1097 hash = (lh->lh_cookie >> ibits) & LNET_LH_HASH_MASK;
1099 list_add(&lh->lh_hash_chain, &rec->rec_lh_hash[hash]);
1102 static int lnet_unprepare(void);
1105 lnet_prepare(lnet_pid_t requested_pid)
1107 /* Prepare to bring up the network */
1108 struct lnet_res_container **recs;
1111 if (requested_pid == LNET_PID_ANY) {
1112 /* Don't instantiate LNET just for me */
1116 LASSERT(the_lnet.ln_refcount == 0);
1118 the_lnet.ln_routing = 0;
1120 LASSERT((requested_pid & LNET_PID_USERFLAG) == 0);
1121 the_lnet.ln_pid = requested_pid;
1123 INIT_LIST_HEAD(&the_lnet.ln_test_peers);
1124 INIT_LIST_HEAD(&the_lnet.ln_remote_peer_ni_list);
1125 INIT_LIST_HEAD(&the_lnet.ln_nets);
1126 INIT_LIST_HEAD(&the_lnet.ln_routers);
1127 INIT_LIST_HEAD(&the_lnet.ln_drop_rules);
1128 INIT_LIST_HEAD(&the_lnet.ln_delay_rules);
1129 INIT_LIST_HEAD(&the_lnet.ln_dc_request);
1130 INIT_LIST_HEAD(&the_lnet.ln_dc_working);
1131 INIT_LIST_HEAD(&the_lnet.ln_dc_expired);
1132 INIT_LIST_HEAD(&the_lnet.ln_mt_localNIRecovq);
1133 INIT_LIST_HEAD(&the_lnet.ln_mt_peerNIRecovq);
1134 init_waitqueue_head(&the_lnet.ln_dc_waitq);
1135 LNetInvalidateEQHandle(&the_lnet.ln_mt_eqh);
1137 rc = lnet_descriptor_setup();
1141 rc = lnet_create_remote_nets_table();
1146 * NB the interface cookie in wire handles guards against delayed
1147 * replies and ACKs appearing valid after reboot.
1149 the_lnet.ln_interface_cookie = ktime_get_real_ns();
1151 the_lnet.ln_counters = cfs_percpt_alloc(lnet_cpt_table(),
1152 sizeof(struct lnet_counters));
1153 if (the_lnet.ln_counters == NULL) {
1154 CERROR("Failed to allocate counters for LNet\n");
1159 rc = lnet_peer_tables_create();
1163 rc = lnet_msg_containers_create();
1167 rc = lnet_res_container_setup(&the_lnet.ln_eq_container, 0,
1168 LNET_COOKIE_TYPE_EQ);
1172 recs = lnet_res_containers_create(LNET_COOKIE_TYPE_ME);
1178 the_lnet.ln_me_containers = recs;
1180 recs = lnet_res_containers_create(LNET_COOKIE_TYPE_MD);
1186 the_lnet.ln_md_containers = recs;
1188 rc = lnet_portals_create();
1190 CERROR("Failed to create portals for LNet: %d\n", rc);
1202 lnet_unprepare (void)
1206 /* NB no LNET_LOCK since this is the last reference. All LND instances
1207 * have shut down already, so it is safe to unlink and free all
1208 * descriptors, even those that appear committed to a network op (eg MD
1209 * with non-zero pending count) */
1211 lnet_fail_nid(LNET_NID_ANY, 0);
1213 LASSERT(the_lnet.ln_refcount == 0);
1214 LASSERT(list_empty(&the_lnet.ln_test_peers));
1215 LASSERT(list_empty(&the_lnet.ln_nets));
1217 if (!LNetEQHandleIsInvalid(the_lnet.ln_mt_eqh)) {
1218 rc = LNetEQFree(the_lnet.ln_mt_eqh);
1219 LNetInvalidateEQHandle(&the_lnet.ln_mt_eqh);
1223 lnet_portals_destroy();
1225 if (the_lnet.ln_md_containers != NULL) {
1226 lnet_res_containers_destroy(the_lnet.ln_md_containers);
1227 the_lnet.ln_md_containers = NULL;
1230 if (the_lnet.ln_me_containers != NULL) {
1231 lnet_res_containers_destroy(the_lnet.ln_me_containers);
1232 the_lnet.ln_me_containers = NULL;
1235 lnet_res_container_cleanup(&the_lnet.ln_eq_container);
1237 lnet_msg_containers_destroy();
1239 lnet_rtrpools_free(0);
1241 if (the_lnet.ln_counters != NULL) {
1242 cfs_percpt_free(the_lnet.ln_counters);
1243 the_lnet.ln_counters = NULL;
1245 lnet_destroy_remote_nets_table();
1246 lnet_descriptor_cleanup();
1252 lnet_net2ni_locked(__u32 net_id, int cpt)
1255 struct lnet_net *net;
1257 LASSERT(cpt != LNET_LOCK_EX);
1259 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
1260 if (net->net_id == net_id) {
1261 ni = list_entry(net->net_ni_list.next, struct lnet_ni,
1271 lnet_net2ni_addref(__u32 net)
1276 ni = lnet_net2ni_locked(net, 0);
1278 lnet_ni_addref_locked(ni, 0);
1283 EXPORT_SYMBOL(lnet_net2ni_addref);
1286 lnet_get_net_locked(__u32 net_id)
1288 struct lnet_net *net;
1290 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
1291 if (net->net_id == net_id)
1299 lnet_nid_cpt_hash(lnet_nid_t nid, unsigned int number)
1304 LASSERT(number >= 1 && number <= LNET_CPT_NUMBER);
1309 val = hash_long(key, LNET_CPT_BITS);
1310 /* NB: LNET_CP_NUMBER doesn't have to be PO2 */
1314 return (unsigned int)(key + val + (val >> 1)) % number;
1318 lnet_cpt_of_nid_locked(lnet_nid_t nid, struct lnet_ni *ni)
1320 struct lnet_net *net;
1322 /* must called with hold of lnet_net_lock */
1323 if (LNET_CPT_NUMBER == 1)
1324 return 0; /* the only one */
1327 * If NI is provided then use the CPT identified in the NI cpt
1328 * list if one exists. If one doesn't exist, then that NI is
1329 * associated with all CPTs and it follows that the net it belongs
1330 * to is implicitly associated with all CPTs, so just hash the nid
1334 if (ni->ni_cpts != NULL)
1335 return ni->ni_cpts[lnet_nid_cpt_hash(nid,
1338 return lnet_nid_cpt_hash(nid, LNET_CPT_NUMBER);
1341 /* no NI provided so look at the net */
1342 net = lnet_get_net_locked(LNET_NIDNET(nid));
1344 if (net != NULL && net->net_cpts != NULL) {
1345 return net->net_cpts[lnet_nid_cpt_hash(nid, net->net_ncpts)];
1348 return lnet_nid_cpt_hash(nid, LNET_CPT_NUMBER);
1352 lnet_cpt_of_nid(lnet_nid_t nid, struct lnet_ni *ni)
1357 if (LNET_CPT_NUMBER == 1)
1358 return 0; /* the only one */
1360 cpt = lnet_net_lock_current();
1362 cpt2 = lnet_cpt_of_nid_locked(nid, ni);
1364 lnet_net_unlock(cpt);
1368 EXPORT_SYMBOL(lnet_cpt_of_nid);
1371 lnet_islocalnet(__u32 net_id)
1373 struct lnet_net *net;
1377 cpt = lnet_net_lock_current();
1379 net = lnet_get_net_locked(net_id);
1381 local = net != NULL;
1383 lnet_net_unlock(cpt);
1389 lnet_nid2ni_locked(lnet_nid_t nid, int cpt)
1391 struct lnet_net *net;
1394 LASSERT(cpt != LNET_LOCK_EX);
1396 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
1397 list_for_each_entry(ni, &net->net_ni_list, ni_netlist) {
1398 if (ni->ni_nid == nid)
1407 lnet_nid2ni_addref(lnet_nid_t nid)
1412 ni = lnet_nid2ni_locked(nid, 0);
1414 lnet_ni_addref_locked(ni, 0);
1419 EXPORT_SYMBOL(lnet_nid2ni_addref);
1422 lnet_islocalnid(lnet_nid_t nid)
1427 cpt = lnet_net_lock_current();
1428 ni = lnet_nid2ni_locked(nid, cpt);
1429 lnet_net_unlock(cpt);
1435 lnet_count_acceptor_nets(void)
1437 /* Return the # of NIs that need the acceptor. */
1439 struct lnet_net *net;
1442 cpt = lnet_net_lock_current();
1443 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
1444 /* all socklnd type networks should have the acceptor
1446 if (net->net_lnd->lnd_accept != NULL)
1450 lnet_net_unlock(cpt);
1455 struct lnet_ping_buffer *
1456 lnet_ping_buffer_alloc(int nnis, gfp_t gfp)
1458 struct lnet_ping_buffer *pbuf;
1460 LIBCFS_ALLOC_GFP(pbuf, LNET_PING_BUFFER_SIZE(nnis), gfp);
1462 pbuf->pb_nnis = nnis;
1463 atomic_set(&pbuf->pb_refcnt, 1);
1470 lnet_ping_buffer_free(struct lnet_ping_buffer *pbuf)
1472 LASSERT(lnet_ping_buffer_numref(pbuf) == 0);
1473 LIBCFS_FREE(pbuf, LNET_PING_BUFFER_SIZE(pbuf->pb_nnis));
1476 static struct lnet_ping_buffer *
1477 lnet_ping_target_create(int nnis)
1479 struct lnet_ping_buffer *pbuf;
1481 pbuf = lnet_ping_buffer_alloc(nnis, GFP_NOFS);
1483 CERROR("Can't allocate ping source [%d]\n", nnis);
1487 pbuf->pb_info.pi_nnis = nnis;
1488 pbuf->pb_info.pi_pid = the_lnet.ln_pid;
1489 pbuf->pb_info.pi_magic = LNET_PROTO_PING_MAGIC;
1490 pbuf->pb_info.pi_features =
1491 LNET_PING_FEAT_NI_STATUS | LNET_PING_FEAT_MULTI_RAIL;
1497 lnet_get_net_ni_count_locked(struct lnet_net *net)
1502 list_for_each_entry(ni, &net->net_ni_list, ni_netlist)
1509 lnet_get_net_ni_count_pre(struct lnet_net *net)
1514 list_for_each_entry(ni, &net->net_ni_added, ni_netlist)
1521 lnet_get_ni_count(void)
1524 struct lnet_net *net;
1529 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
1530 list_for_each_entry(ni, &net->net_ni_list, ni_netlist)
1540 lnet_swap_pinginfo(struct lnet_ping_buffer *pbuf)
1542 struct lnet_ni_status *stat;
1546 __swab32s(&pbuf->pb_info.pi_magic);
1547 __swab32s(&pbuf->pb_info.pi_features);
1548 __swab32s(&pbuf->pb_info.pi_pid);
1549 __swab32s(&pbuf->pb_info.pi_nnis);
1550 nnis = pbuf->pb_info.pi_nnis;
1551 if (nnis > pbuf->pb_nnis)
1552 nnis = pbuf->pb_nnis;
1553 for (i = 0; i < nnis; i++) {
1554 stat = &pbuf->pb_info.pi_ni[i];
1555 __swab64s(&stat->ns_nid);
1556 __swab32s(&stat->ns_status);
1562 lnet_ping_info_validate(struct lnet_ping_info *pinfo)
1566 if (pinfo->pi_magic != LNET_PROTO_PING_MAGIC)
1568 if (!(pinfo->pi_features & LNET_PING_FEAT_NI_STATUS))
1570 /* Loopback is guaranteed to be present */
1571 if (pinfo->pi_nnis < 1 || pinfo->pi_nnis > lnet_interfaces_max)
1573 if (LNET_NETTYP(LNET_NIDNET(LNET_PING_INFO_LONI(pinfo))) != LOLND)
1579 lnet_ping_target_destroy(void)
1581 struct lnet_net *net;
1584 lnet_net_lock(LNET_LOCK_EX);
1586 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
1587 list_for_each_entry(ni, &net->net_ni_list, ni_netlist) {
1589 ni->ni_status = NULL;
1594 lnet_ping_buffer_decref(the_lnet.ln_ping_target);
1595 the_lnet.ln_ping_target = NULL;
1597 lnet_net_unlock(LNET_LOCK_EX);
1601 lnet_ping_target_event_handler(struct lnet_event *event)
1603 struct lnet_ping_buffer *pbuf = event->md.user_ptr;
1605 if (event->unlinked)
1606 lnet_ping_buffer_decref(pbuf);
1610 lnet_ping_target_setup(struct lnet_ping_buffer **ppbuf,
1611 struct lnet_handle_md *ping_mdh,
1612 int ni_count, bool set_eq)
1614 struct lnet_process_id id = {
1615 .nid = LNET_NID_ANY,
1618 struct lnet_handle_me me_handle;
1619 struct lnet_md md = { NULL };
1623 rc = LNetEQAlloc(0, lnet_ping_target_event_handler,
1624 &the_lnet.ln_ping_target_eq);
1626 CERROR("Can't allocate ping buffer EQ: %d\n", rc);
1631 *ppbuf = lnet_ping_target_create(ni_count);
1632 if (*ppbuf == NULL) {
1637 /* Ping target ME/MD */
1638 rc = LNetMEAttach(LNET_RESERVED_PORTAL, id,
1639 LNET_PROTO_PING_MATCHBITS, 0,
1640 LNET_UNLINK, LNET_INS_AFTER,
1643 CERROR("Can't create ping target ME: %d\n", rc);
1644 goto fail_decref_ping_buffer;
1647 /* initialize md content */
1648 md.start = &(*ppbuf)->pb_info;
1649 md.length = LNET_PING_INFO_SIZE((*ppbuf)->pb_nnis);
1650 md.threshold = LNET_MD_THRESH_INF;
1652 md.options = LNET_MD_OP_GET | LNET_MD_TRUNCATE |
1653 LNET_MD_MANAGE_REMOTE;
1654 md.eq_handle = the_lnet.ln_ping_target_eq;
1655 md.user_ptr = *ppbuf;
1657 rc = LNetMDAttach(me_handle, md, LNET_RETAIN, ping_mdh);
1659 CERROR("Can't attach ping target MD: %d\n", rc);
1660 goto fail_unlink_ping_me;
1662 lnet_ping_buffer_addref(*ppbuf);
1666 fail_unlink_ping_me:
1667 rc2 = LNetMEUnlink(me_handle);
1669 fail_decref_ping_buffer:
1670 LASSERT(lnet_ping_buffer_numref(*ppbuf) == 1);
1671 lnet_ping_buffer_decref(*ppbuf);
1675 rc2 = LNetEQFree(the_lnet.ln_ping_target_eq);
1682 lnet_ping_md_unlink(struct lnet_ping_buffer *pbuf,
1683 struct lnet_handle_md *ping_mdh)
1685 sigset_t blocked = cfs_block_allsigs();
1687 LNetMDUnlink(*ping_mdh);
1688 LNetInvalidateMDHandle(ping_mdh);
1690 /* NB the MD could be busy; this just starts the unlink */
1691 while (lnet_ping_buffer_numref(pbuf) > 1) {
1692 CDEBUG(D_NET, "Still waiting for ping data MD to unlink\n");
1693 set_current_state(TASK_UNINTERRUPTIBLE);
1694 schedule_timeout(cfs_time_seconds(1));
1697 cfs_restore_sigs(blocked);
1701 lnet_ping_target_install_locked(struct lnet_ping_buffer *pbuf)
1704 struct lnet_net *net;
1705 struct lnet_ni_status *ns;
1710 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
1711 list_for_each_entry(ni, &net->net_ni_list, ni_netlist) {
1712 LASSERT(i < pbuf->pb_nnis);
1714 ns = &pbuf->pb_info.pi_ni[i];
1716 ns->ns_nid = ni->ni_nid;
1719 ns->ns_status = (ni->ni_status != NULL) ?
1720 ni->ni_status->ns_status :
1729 * We (ab)use the ns_status of the loopback interface to
1730 * transmit the sequence number. The first interface listed
1731 * must be the loopback interface.
1733 rc = lnet_ping_info_validate(&pbuf->pb_info);
1735 LCONSOLE_EMERG("Invalid ping target: %d\n", rc);
1738 LNET_PING_BUFFER_SEQNO(pbuf) =
1739 atomic_inc_return(&the_lnet.ln_ping_target_seqno);
1743 lnet_ping_target_update(struct lnet_ping_buffer *pbuf,
1744 struct lnet_handle_md ping_mdh)
1746 struct lnet_ping_buffer *old_pbuf = NULL;
1747 struct lnet_handle_md old_ping_md;
1749 /* switch the NIs to point to the new ping info created */
1750 lnet_net_lock(LNET_LOCK_EX);
1752 if (!the_lnet.ln_routing)
1753 pbuf->pb_info.pi_features |= LNET_PING_FEAT_RTE_DISABLED;
1754 if (!lnet_peer_discovery_disabled)
1755 pbuf->pb_info.pi_features |= LNET_PING_FEAT_DISCOVERY;
1757 /* Ensure only known feature bits have been set. */
1758 LASSERT(pbuf->pb_info.pi_features & LNET_PING_FEAT_BITS);
1759 LASSERT(!(pbuf->pb_info.pi_features & ~LNET_PING_FEAT_BITS));
1761 lnet_ping_target_install_locked(pbuf);
1763 if (the_lnet.ln_ping_target) {
1764 old_pbuf = the_lnet.ln_ping_target;
1765 old_ping_md = the_lnet.ln_ping_target_md;
1767 the_lnet.ln_ping_target_md = ping_mdh;
1768 the_lnet.ln_ping_target = pbuf;
1770 lnet_net_unlock(LNET_LOCK_EX);
1773 /* unlink and free the old ping info */
1774 lnet_ping_md_unlink(old_pbuf, &old_ping_md);
1775 lnet_ping_buffer_decref(old_pbuf);
1778 lnet_push_update_to_peers(0);
1782 lnet_ping_target_fini(void)
1786 lnet_ping_md_unlink(the_lnet.ln_ping_target,
1787 &the_lnet.ln_ping_target_md);
1789 rc = LNetEQFree(the_lnet.ln_ping_target_eq);
1792 lnet_ping_target_destroy();
1795 /* Resize the push target. */
1796 int lnet_push_target_resize(void)
1798 struct lnet_process_id id = { LNET_NID_ANY, LNET_PID_ANY };
1799 struct lnet_md md = { NULL };
1800 struct lnet_handle_me meh;
1801 struct lnet_handle_md mdh;
1802 struct lnet_handle_md old_mdh;
1803 struct lnet_ping_buffer *pbuf;
1804 struct lnet_ping_buffer *old_pbuf;
1805 int nnis = the_lnet.ln_push_target_nnis;
1813 pbuf = lnet_ping_buffer_alloc(nnis, GFP_NOFS);
1819 rc = LNetMEAttach(LNET_RESERVED_PORTAL, id,
1820 LNET_PROTO_PING_MATCHBITS, 0,
1821 LNET_UNLINK, LNET_INS_AFTER,
1824 CERROR("Can't create push target ME: %d\n", rc);
1825 goto fail_decref_pbuf;
1828 /* initialize md content */
1829 md.start = &pbuf->pb_info;
1830 md.length = LNET_PING_INFO_SIZE(nnis);
1831 md.threshold = LNET_MD_THRESH_INF;
1833 md.options = LNET_MD_OP_PUT | LNET_MD_TRUNCATE |
1834 LNET_MD_MANAGE_REMOTE;
1836 md.eq_handle = the_lnet.ln_push_target_eq;
1838 rc = LNetMDAttach(meh, md, LNET_RETAIN, &mdh);
1840 CERROR("Can't attach push MD: %d\n", rc);
1841 goto fail_unlink_meh;
1843 lnet_ping_buffer_addref(pbuf);
1845 lnet_net_lock(LNET_LOCK_EX);
1846 old_pbuf = the_lnet.ln_push_target;
1847 old_mdh = the_lnet.ln_push_target_md;
1848 the_lnet.ln_push_target = pbuf;
1849 the_lnet.ln_push_target_md = mdh;
1850 lnet_net_unlock(LNET_LOCK_EX);
1853 LNetMDUnlink(old_mdh);
1854 lnet_ping_buffer_decref(old_pbuf);
1857 if (nnis < the_lnet.ln_push_target_nnis)
1860 CDEBUG(D_NET, "nnis %d success\n", nnis);
1867 lnet_ping_buffer_decref(pbuf);
1869 CDEBUG(D_NET, "nnis %d error %d\n", nnis, rc);
1873 static void lnet_push_target_event_handler(struct lnet_event *ev)
1875 struct lnet_ping_buffer *pbuf = ev->md.user_ptr;
1877 if (pbuf->pb_info.pi_magic == __swab32(LNET_PROTO_PING_MAGIC))
1878 lnet_swap_pinginfo(pbuf);
1880 lnet_peer_push_event(ev);
1882 lnet_ping_buffer_decref(pbuf);
1885 /* Initialize the push target. */
1886 static int lnet_push_target_init(void)
1890 if (the_lnet.ln_push_target)
1893 rc = LNetEQAlloc(0, lnet_push_target_event_handler,
1894 &the_lnet.ln_push_target_eq);
1896 CERROR("Can't allocated push target EQ: %d\n", rc);
1900 /* Start at the required minimum, we'll enlarge if required. */
1901 the_lnet.ln_push_target_nnis = LNET_INTERFACES_MIN;
1903 rc = lnet_push_target_resize();
1906 LNetEQFree(the_lnet.ln_push_target_eq);
1907 LNetInvalidateEQHandle(&the_lnet.ln_push_target_eq);
1913 /* Clean up the push target. */
1914 static void lnet_push_target_fini(void)
1916 if (!the_lnet.ln_push_target)
1919 /* Unlink and invalidate to prevent new references. */
1920 LNetMDUnlink(the_lnet.ln_push_target_md);
1921 LNetInvalidateMDHandle(&the_lnet.ln_push_target_md);
1923 /* Wait for the unlink to complete. */
1924 while (lnet_ping_buffer_numref(the_lnet.ln_push_target) > 1) {
1925 CDEBUG(D_NET, "Still waiting for ping data MD to unlink\n");
1926 set_current_state(TASK_UNINTERRUPTIBLE);
1927 schedule_timeout(cfs_time_seconds(1));
1930 lnet_ping_buffer_decref(the_lnet.ln_push_target);
1931 the_lnet.ln_push_target = NULL;
1932 the_lnet.ln_push_target_nnis = 0;
1934 LNetEQFree(the_lnet.ln_push_target_eq);
1935 LNetInvalidateEQHandle(&the_lnet.ln_push_target_eq);
1939 lnet_ni_tq_credits(struct lnet_ni *ni)
1943 LASSERT(ni->ni_ncpts >= 1);
1945 if (ni->ni_ncpts == 1)
1946 return ni->ni_net->net_tunables.lct_max_tx_credits;
1948 credits = ni->ni_net->net_tunables.lct_max_tx_credits / ni->ni_ncpts;
1949 credits = max(credits, 8 * ni->ni_net->net_tunables.lct_peer_tx_credits);
1950 credits = min(credits, ni->ni_net->net_tunables.lct_max_tx_credits);
1956 lnet_ni_unlink_locked(struct lnet_ni *ni)
1958 /* move it to zombie list and nobody can find it anymore */
1959 LASSERT(!list_empty(&ni->ni_netlist));
1960 list_move(&ni->ni_netlist, &ni->ni_net->net_ni_zombie);
1961 lnet_ni_decref_locked(ni, 0);
1965 lnet_clear_zombies_nis_locked(struct lnet_net *net)
1970 struct list_head *zombie_list = &net->net_ni_zombie;
1973 * Now wait for the NIs I just nuked to show up on the zombie
1974 * list and shut them down in guaranteed thread context
1977 while (!list_empty(zombie_list)) {
1981 ni = list_entry(zombie_list->next,
1982 struct lnet_ni, ni_netlist);
1983 list_del_init(&ni->ni_netlist);
1984 /* the ni should be in deleting state. If it's not it's
1986 LASSERT(ni->ni_state == LNET_NI_STATE_DELETING);
1987 cfs_percpt_for_each(ref, j, ni->ni_refs) {
1990 /* still busy, add it back to zombie list */
1991 list_add(&ni->ni_netlist, zombie_list);
1995 if (!list_empty(&ni->ni_netlist)) {
1996 lnet_net_unlock(LNET_LOCK_EX);
1998 if ((i & (-i)) == i) {
2000 "Waiting for zombie LNI %s\n",
2001 libcfs_nid2str(ni->ni_nid));
2003 set_current_state(TASK_UNINTERRUPTIBLE);
2004 schedule_timeout(cfs_time_seconds(1));
2005 lnet_net_lock(LNET_LOCK_EX);
2009 lnet_net_unlock(LNET_LOCK_EX);
2011 islo = ni->ni_net->net_lnd->lnd_type == LOLND;
2013 LASSERT(!in_interrupt());
2014 (net->net_lnd->lnd_shutdown)(ni);
2017 CDEBUG(D_LNI, "Removed LNI %s\n",
2018 libcfs_nid2str(ni->ni_nid));
2022 lnet_net_lock(LNET_LOCK_EX);
2026 /* shutdown down the NI and release refcount */
2028 lnet_shutdown_lndni(struct lnet_ni *ni)
2031 struct lnet_net *net = ni->ni_net;
2033 lnet_net_lock(LNET_LOCK_EX);
2035 ni->ni_state = LNET_NI_STATE_DELETING;
2037 lnet_ni_unlink_locked(ni);
2038 lnet_incr_dlc_seq();
2039 lnet_net_unlock(LNET_LOCK_EX);
2041 /* clear messages for this NI on the lazy portal */
2042 for (i = 0; i < the_lnet.ln_nportals; i++)
2043 lnet_clear_lazy_portal(ni, i, "Shutting down NI");
2045 lnet_net_lock(LNET_LOCK_EX);
2046 lnet_clear_zombies_nis_locked(net);
2047 lnet_net_unlock(LNET_LOCK_EX);
2051 lnet_shutdown_lndnet(struct lnet_net *net)
2055 lnet_net_lock(LNET_LOCK_EX);
2057 net->net_state = LNET_NET_STATE_DELETING;
2059 list_del_init(&net->net_list);
2061 while (!list_empty(&net->net_ni_list)) {
2062 ni = list_entry(net->net_ni_list.next,
2063 struct lnet_ni, ni_netlist);
2064 lnet_net_unlock(LNET_LOCK_EX);
2065 lnet_shutdown_lndni(ni);
2066 lnet_net_lock(LNET_LOCK_EX);
2069 lnet_net_unlock(LNET_LOCK_EX);
2071 /* Do peer table cleanup for this net */
2072 lnet_peer_tables_cleanup(net);
2074 lnet_net_lock(LNET_LOCK_EX);
2076 * decrement ref count on lnd only when the entire network goes
2079 net->net_lnd->lnd_refcount--;
2081 lnet_net_unlock(LNET_LOCK_EX);
2087 lnet_shutdown_lndnets(void)
2089 struct lnet_net *net;
2090 struct list_head resend;
2091 struct lnet_msg *msg, *tmp;
2093 INIT_LIST_HEAD(&resend);
2095 /* NB called holding the global mutex */
2097 /* All quiet on the API front */
2098 LASSERT(the_lnet.ln_state == LNET_STATE_RUNNING);
2099 LASSERT(the_lnet.ln_refcount == 0);
2101 lnet_net_lock(LNET_LOCK_EX);
2102 the_lnet.ln_state = LNET_STATE_STOPPING;
2104 while (!list_empty(&the_lnet.ln_nets)) {
2106 * move the nets to the zombie list to avoid them being
2107 * picked up for new work. LONET is also included in the
2108 * Nets that will be moved to the zombie list
2110 net = list_entry(the_lnet.ln_nets.next,
2111 struct lnet_net, net_list);
2112 list_move(&net->net_list, &the_lnet.ln_net_zombie);
2115 /* Drop the cached loopback Net. */
2116 if (the_lnet.ln_loni != NULL) {
2117 lnet_ni_decref_locked(the_lnet.ln_loni, 0);
2118 the_lnet.ln_loni = NULL;
2120 lnet_net_unlock(LNET_LOCK_EX);
2122 /* iterate through the net zombie list and delete each net */
2123 while (!list_empty(&the_lnet.ln_net_zombie)) {
2124 net = list_entry(the_lnet.ln_net_zombie.next,
2125 struct lnet_net, net_list);
2126 lnet_shutdown_lndnet(net);
2129 spin_lock(&the_lnet.ln_msg_resend_lock);
2130 list_splice(&the_lnet.ln_msg_resend, &resend);
2131 spin_unlock(&the_lnet.ln_msg_resend_lock);
2133 list_for_each_entry_safe(msg, tmp, &resend, msg_list) {
2134 list_del_init(&msg->msg_list);
2135 msg->msg_no_resend = true;
2136 lnet_finalize(msg, -ECANCELED);
2139 lnet_net_lock(LNET_LOCK_EX);
2140 the_lnet.ln_state = LNET_STATE_SHUTDOWN;
2141 lnet_net_unlock(LNET_LOCK_EX);
2145 lnet_startup_lndni(struct lnet_ni *ni, struct lnet_lnd_tunables *tun)
2148 struct lnet_tx_queue *tq;
2150 struct lnet_net *net = ni->ni_net;
2152 mutex_lock(&the_lnet.ln_lnd_mutex);
2155 memcpy(&ni->ni_lnd_tunables, tun, sizeof(*tun));
2156 ni->ni_lnd_tunables_set = true;
2159 rc = (net->net_lnd->lnd_startup)(ni);
2161 mutex_unlock(&the_lnet.ln_lnd_mutex);
2164 LCONSOLE_ERROR_MSG(0x105, "Error %d starting up LNI %s\n",
2165 rc, libcfs_lnd2str(net->net_lnd->lnd_type));
2166 lnet_net_lock(LNET_LOCK_EX);
2167 net->net_lnd->lnd_refcount--;
2168 lnet_net_unlock(LNET_LOCK_EX);
2173 ni->ni_state = LNET_NI_STATE_ACTIVE;
2176 /* We keep a reference on the loopback net through the loopback NI */
2177 if (net->net_lnd->lnd_type == LOLND) {
2179 LASSERT(the_lnet.ln_loni == NULL);
2180 the_lnet.ln_loni = ni;
2181 ni->ni_net->net_tunables.lct_peer_tx_credits = 0;
2182 ni->ni_net->net_tunables.lct_peer_rtr_credits = 0;
2183 ni->ni_net->net_tunables.lct_max_tx_credits = 0;
2184 ni->ni_net->net_tunables.lct_peer_timeout = 0;
2188 if (ni->ni_net->net_tunables.lct_peer_tx_credits == 0 ||
2189 ni->ni_net->net_tunables.lct_max_tx_credits == 0) {
2190 LCONSOLE_ERROR_MSG(0x107, "LNI %s has no %scredits\n",
2191 libcfs_lnd2str(net->net_lnd->lnd_type),
2192 ni->ni_net->net_tunables.lct_peer_tx_credits == 0 ?
2194 /* shutdown the NI since if we get here then it must've already
2197 lnet_shutdown_lndni(ni);
2201 cfs_percpt_for_each(tq, i, ni->ni_tx_queues) {
2202 tq->tq_credits_min =
2203 tq->tq_credits_max =
2204 tq->tq_credits = lnet_ni_tq_credits(ni);
2207 atomic_set(&ni->ni_tx_credits,
2208 lnet_ni_tq_credits(ni) * ni->ni_ncpts);
2209 atomic_set(&ni->ni_healthv, LNET_MAX_HEALTH_VALUE);
2211 CDEBUG(D_LNI, "Added LNI %s [%d/%d/%d/%d]\n",
2212 libcfs_nid2str(ni->ni_nid),
2213 ni->ni_net->net_tunables.lct_peer_tx_credits,
2214 lnet_ni_tq_credits(ni) * LNET_CPT_NUMBER,
2215 ni->ni_net->net_tunables.lct_peer_rtr_credits,
2216 ni->ni_net->net_tunables.lct_peer_timeout);
2225 lnet_startup_lndnet(struct lnet_net *net, struct lnet_lnd_tunables *tun)
2228 struct lnet_net *net_l = NULL;
2229 struct list_head local_ni_list;
2233 struct lnet_lnd *lnd;
2235 net->net_tunables.lct_peer_timeout;
2237 net->net_tunables.lct_max_tx_credits;
2238 int peerrtrcredits =
2239 net->net_tunables.lct_peer_rtr_credits;
2241 INIT_LIST_HEAD(&local_ni_list);
2244 * make sure that this net is unique. If it isn't then
2245 * we are adding interfaces to an already existing network, and
2246 * 'net' is just a convenient way to pass in the list.
2247 * if it is unique we need to find the LND and load it if
2250 if (lnet_net_unique(net->net_id, &the_lnet.ln_nets, &net_l)) {
2251 lnd_type = LNET_NETTYP(net->net_id);
2253 mutex_lock(&the_lnet.ln_lnd_mutex);
2254 lnd = lnet_find_lnd_by_type(lnd_type);
2257 mutex_unlock(&the_lnet.ln_lnd_mutex);
2258 rc = request_module("%s", libcfs_lnd2modname(lnd_type));
2259 mutex_lock(&the_lnet.ln_lnd_mutex);
2261 lnd = lnet_find_lnd_by_type(lnd_type);
2263 mutex_unlock(&the_lnet.ln_lnd_mutex);
2264 CERROR("Can't load LND %s, module %s, rc=%d\n",
2265 libcfs_lnd2str(lnd_type),
2266 libcfs_lnd2modname(lnd_type), rc);
2267 #ifndef HAVE_MODULE_LOADING_SUPPORT
2268 LCONSOLE_ERROR_MSG(0x104, "Your kernel must be "
2269 "compiled with kernel module "
2270 "loading support.");
2277 lnet_net_lock(LNET_LOCK_EX);
2278 lnd->lnd_refcount++;
2279 lnet_net_unlock(LNET_LOCK_EX);
2283 mutex_unlock(&the_lnet.ln_lnd_mutex);
2289 * net_l: if the network being added is unique then net_l
2290 * will point to that network
2291 * if the network being added is not unique then
2292 * net_l points to the existing network.
2294 * When we enter the loop below, we'll pick NIs off he
2295 * network beign added and start them up, then add them to
2296 * a local ni list. Once we've successfully started all
2297 * the NIs then we join the local NI list (of started up
2298 * networks) with the net_l->net_ni_list, which should
2299 * point to the correct network to add the new ni list to
2301 * If any of the new NIs fail to start up, then we want to
2302 * iterate through the local ni list, which should include
2303 * any NIs which were successfully started up, and shut
2306 * After than we want to delete the network being added,
2307 * to avoid a memory leak.
2311 * When a network uses TCP bonding then all its interfaces
2312 * must be specified when the network is first defined: the
2313 * TCP bonding code doesn't allow for interfaces to be added
2316 if (net_l != net && net_l != NULL && use_tcp_bonding &&
2317 LNET_NETTYP(net_l->net_id) == SOCKLND) {
2322 while (!list_empty(&net->net_ni_added)) {
2323 ni = list_entry(net->net_ni_added.next, struct lnet_ni,
2325 list_del_init(&ni->ni_netlist);
2327 /* make sure that the the NI we're about to start
2328 * up is actually unique. if it's not fail. */
2329 if (!lnet_ni_unique_net(&net_l->net_ni_list,
2330 ni->ni_interfaces[0])) {
2335 /* adjust the pointer the parent network, just in case it
2336 * the net is a duplicate */
2339 rc = lnet_startup_lndni(ni, tun);
2341 LASSERT(ni->ni_net->net_tunables.lct_peer_timeout <= 0 ||
2342 ni->ni_net->net_lnd->lnd_query != NULL);
2348 list_add_tail(&ni->ni_netlist, &local_ni_list);
2353 lnet_net_lock(LNET_LOCK_EX);
2354 list_splice_tail(&local_ni_list, &net_l->net_ni_list);
2355 lnet_incr_dlc_seq();
2356 lnet_net_unlock(LNET_LOCK_EX);
2358 /* if the network is not unique then we don't want to keep
2359 * it around after we're done. Free it. Otherwise add that
2360 * net to the global the_lnet.ln_nets */
2361 if (net_l != net && net_l != NULL) {
2363 * TODO - note. currently the tunables can not be updated
2368 net->net_state = LNET_NET_STATE_ACTIVE;
2370 * restore tunables after it has been overwitten by the
2373 if (peer_timeout != -1)
2374 net->net_tunables.lct_peer_timeout = peer_timeout;
2375 if (maxtxcredits != -1)
2376 net->net_tunables.lct_max_tx_credits = maxtxcredits;
2377 if (peerrtrcredits != -1)
2378 net->net_tunables.lct_peer_rtr_credits = peerrtrcredits;
2380 lnet_net_lock(LNET_LOCK_EX);
2381 list_add_tail(&net->net_list, &the_lnet.ln_nets);
2382 lnet_net_unlock(LNET_LOCK_EX);
2389 * shutdown the new NIs that are being started up
2390 * free the NET being started
2392 while (!list_empty(&local_ni_list)) {
2393 ni = list_entry(local_ni_list.next, struct lnet_ni,
2396 lnet_shutdown_lndni(ni);
2406 lnet_startup_lndnets(struct list_head *netlist)
2408 struct lnet_net *net;
2413 * Change to running state before bringing up the LNDs. This
2414 * allows lnet_shutdown_lndnets() to assert that we've passed
2417 lnet_net_lock(LNET_LOCK_EX);
2418 the_lnet.ln_state = LNET_STATE_RUNNING;
2419 lnet_net_unlock(LNET_LOCK_EX);
2421 while (!list_empty(netlist)) {
2422 net = list_entry(netlist->next, struct lnet_net, net_list);
2423 list_del_init(&net->net_list);
2425 rc = lnet_startup_lndnet(net, NULL);
2435 lnet_shutdown_lndnets();
2441 * Initialize LNet library.
2443 * Automatically called at module loading time. Caller has to call
2444 * lnet_lib_exit() after a call to lnet_lib_init(), if and only if the
2445 * latter returned 0. It must be called exactly once.
2447 * \retval 0 on success
2448 * \retval -ve on failures.
2450 int lnet_lib_init(void)
2454 lnet_assert_wire_constants();
2456 /* refer to global cfs_cpt_table for now */
2457 the_lnet.ln_cpt_table = cfs_cpt_table;
2458 the_lnet.ln_cpt_number = cfs_cpt_number(cfs_cpt_table);
2460 LASSERT(the_lnet.ln_cpt_number > 0);
2461 if (the_lnet.ln_cpt_number > LNET_CPT_MAX) {
2462 /* we are under risk of consuming all lh_cookie */
2463 CERROR("Can't have %d CPTs for LNet (max allowed is %d), "
2464 "please change setting of CPT-table and retry\n",
2465 the_lnet.ln_cpt_number, LNET_CPT_MAX);
2469 while ((1 << the_lnet.ln_cpt_bits) < the_lnet.ln_cpt_number)
2470 the_lnet.ln_cpt_bits++;
2472 rc = lnet_create_locks();
2474 CERROR("Can't create LNet global locks: %d\n", rc);
2478 the_lnet.ln_refcount = 0;
2479 INIT_LIST_HEAD(&the_lnet.ln_lnds);
2480 INIT_LIST_HEAD(&the_lnet.ln_net_zombie);
2481 INIT_LIST_HEAD(&the_lnet.ln_msg_resend);
2483 /* The hash table size is the number of bits it takes to express the set
2484 * ln_num_routes, minus 1 (better to under estimate than over so we
2485 * don't waste memory). */
2486 if (rnet_htable_size <= 0)
2487 rnet_htable_size = LNET_REMOTE_NETS_HASH_DEFAULT;
2488 else if (rnet_htable_size > LNET_REMOTE_NETS_HASH_MAX)
2489 rnet_htable_size = LNET_REMOTE_NETS_HASH_MAX;
2490 the_lnet.ln_remote_nets_hbits = max_t(int, 1,
2491 order_base_2(rnet_htable_size) - 1);
2493 /* All LNDs apart from the LOLND are in separate modules. They
2494 * register themselves when their module loads, and unregister
2495 * themselves when their module is unloaded. */
2496 lnet_register_lnd(&the_lolnd);
2501 * Finalize LNet library.
2503 * \pre lnet_lib_init() called with success.
2504 * \pre All LNet users called LNetNIFini() for matching LNetNIInit() calls.
2506 void lnet_lib_exit(void)
2508 LASSERT(the_lnet.ln_refcount == 0);
2510 while (!list_empty(&the_lnet.ln_lnds))
2511 lnet_unregister_lnd(list_entry(the_lnet.ln_lnds.next,
2512 struct lnet_lnd, lnd_list));
2513 lnet_destroy_locks();
2517 * Set LNet PID and start LNet interfaces, routing, and forwarding.
2519 * Users must call this function at least once before any other functions.
2520 * For each successful call there must be a corresponding call to
2521 * LNetNIFini(). For subsequent calls to LNetNIInit(), \a requested_pid is
2524 * The PID used by LNet may be different from the one requested.
2527 * \param requested_pid PID requested by the caller.
2529 * \return >= 0 on success, and < 0 error code on failures.
2532 LNetNIInit(lnet_pid_t requested_pid)
2534 int im_a_router = 0;
2537 struct lnet_ping_buffer *pbuf;
2538 struct lnet_handle_md ping_mdh;
2539 struct list_head net_head;
2540 struct lnet_net *net;
2542 INIT_LIST_HEAD(&net_head);
2544 mutex_lock(&the_lnet.ln_api_mutex);
2546 CDEBUG(D_OTHER, "refs %d\n", the_lnet.ln_refcount);
2548 if (the_lnet.ln_refcount > 0) {
2549 rc = the_lnet.ln_refcount++;
2550 mutex_unlock(&the_lnet.ln_api_mutex);
2554 rc = lnet_prepare(requested_pid);
2556 mutex_unlock(&the_lnet.ln_api_mutex);
2560 /* create a network for Loopback network */
2561 net = lnet_net_alloc(LNET_MKNET(LOLND, 0), &net_head);
2564 goto err_empty_list;
2567 /* Add in the loopback NI */
2568 if (lnet_ni_alloc(net, NULL, NULL) == NULL) {
2570 goto err_empty_list;
2573 /* If LNet is being initialized via DLC it is possible
2574 * that the user requests not to load module parameters (ones which
2575 * are supported by DLC) on initialization. Therefore, make sure not
2576 * to load networks, routes and forwarding from module parameters
2577 * in this case. On cleanup in case of failure only clean up
2578 * routes if it has been loaded */
2579 if (!the_lnet.ln_nis_from_mod_params) {
2580 rc = lnet_parse_networks(&net_head, lnet_get_networks(),
2583 goto err_empty_list;
2586 ni_count = lnet_startup_lndnets(&net_head);
2589 goto err_empty_list;
2592 if (!the_lnet.ln_nis_from_mod_params) {
2593 rc = lnet_parse_routes(lnet_get_routes(), &im_a_router);
2595 goto err_shutdown_lndnis;
2597 rc = lnet_rtrpools_alloc(im_a_router);
2599 goto err_destroy_routes;
2602 rc = lnet_acceptor_start();
2604 goto err_destroy_routes;
2606 the_lnet.ln_refcount = 1;
2607 /* Now I may use my own API functions... */
2609 rc = lnet_ping_target_setup(&pbuf, &ping_mdh, ni_count, true);
2611 goto err_acceptor_stop;
2613 lnet_ping_target_update(pbuf, ping_mdh);
2615 rc = LNetEQAlloc(0, lnet_mt_event_handler, &the_lnet.ln_mt_eqh);
2617 CERROR("Can't allocate monitor thread EQ: %d\n", rc);
2621 rc = lnet_monitor_thr_start();
2625 rc = lnet_push_target_init();
2627 goto err_stop_monitor_thr;
2629 rc = lnet_peer_discovery_start();
2631 goto err_destroy_push_target;
2634 lnet_router_debugfs_init();
2636 mutex_unlock(&the_lnet.ln_api_mutex);
2640 err_destroy_push_target:
2641 lnet_push_target_fini();
2642 err_stop_monitor_thr:
2643 lnet_monitor_thr_stop();
2645 lnet_ping_target_fini();
2647 the_lnet.ln_refcount = 0;
2648 lnet_acceptor_stop();
2650 if (!the_lnet.ln_nis_from_mod_params)
2651 lnet_destroy_routes();
2652 err_shutdown_lndnis:
2653 lnet_shutdown_lndnets();
2657 mutex_unlock(&the_lnet.ln_api_mutex);
2658 while (!list_empty(&net_head)) {
2659 struct lnet_net *net;
2661 net = list_entry(net_head.next, struct lnet_net, net_list);
2662 list_del_init(&net->net_list);
2667 EXPORT_SYMBOL(LNetNIInit);
2670 * Stop LNet interfaces, routing, and forwarding.
2672 * Users must call this function once for each successful call to LNetNIInit().
2673 * Once the LNetNIFini() operation has been started, the results of pending
2674 * API operations are undefined.
2676 * \return always 0 for current implementation.
2681 mutex_lock(&the_lnet.ln_api_mutex);
2683 LASSERT(the_lnet.ln_refcount > 0);
2685 if (the_lnet.ln_refcount != 1) {
2686 the_lnet.ln_refcount--;
2688 LASSERT(!the_lnet.ln_niinit_self);
2692 lnet_router_debugfs_fini();
2693 lnet_peer_discovery_stop();
2694 lnet_push_target_fini();
2695 lnet_monitor_thr_stop();
2696 lnet_ping_target_fini();
2698 /* Teardown fns that use my own API functions BEFORE here */
2699 the_lnet.ln_refcount = 0;
2701 lnet_acceptor_stop();
2702 lnet_destroy_routes();
2703 lnet_shutdown_lndnets();
2707 mutex_unlock(&the_lnet.ln_api_mutex);
2710 EXPORT_SYMBOL(LNetNIFini);
2713 * Grabs the ni data from the ni structure and fills the out
2716 * \param[in] ni network interface structure
2717 * \param[out] cfg_ni NI config information
2718 * \param[out] tun network and LND tunables
2721 lnet_fill_ni_info(struct lnet_ni *ni, struct lnet_ioctl_config_ni *cfg_ni,
2722 struct lnet_ioctl_config_lnd_tunables *tun,
2723 struct lnet_ioctl_element_stats *stats,
2726 size_t min_size = 0;
2729 if (!ni || !cfg_ni || !tun)
2732 if (ni->ni_interfaces[0] != NULL) {
2733 for (i = 0; i < ARRAY_SIZE(ni->ni_interfaces); i++) {
2734 if (ni->ni_interfaces[i] != NULL) {
2735 strncpy(cfg_ni->lic_ni_intf[i],
2736 ni->ni_interfaces[i],
2737 sizeof(cfg_ni->lic_ni_intf[i]));
2742 cfg_ni->lic_nid = ni->ni_nid;
2743 if (LNET_NETTYP(LNET_NIDNET(ni->ni_nid)) == LOLND)
2744 cfg_ni->lic_status = LNET_NI_STATUS_UP;
2746 cfg_ni->lic_status = ni->ni_status->ns_status;
2747 cfg_ni->lic_tcp_bonding = use_tcp_bonding;
2748 cfg_ni->lic_dev_cpt = ni->ni_dev_cpt;
2750 memcpy(&tun->lt_cmn, &ni->ni_net->net_tunables, sizeof(tun->lt_cmn));
2753 stats->iel_send_count = lnet_sum_stats(&ni->ni_stats,
2754 LNET_STATS_TYPE_SEND);
2755 stats->iel_recv_count = lnet_sum_stats(&ni->ni_stats,
2756 LNET_STATS_TYPE_RECV);
2757 stats->iel_drop_count = lnet_sum_stats(&ni->ni_stats,
2758 LNET_STATS_TYPE_DROP);
2762 * tun->lt_tun will always be present, but in order to be
2763 * backwards compatible, we need to deal with the cases when
2764 * tun->lt_tun is smaller than what the kernel has, because it
2765 * comes from an older version of a userspace program, then we'll
2766 * need to copy as much information as we have available space.
2768 min_size = tun_size - sizeof(tun->lt_cmn);
2769 memcpy(&tun->lt_tun, &ni->ni_lnd_tunables, min_size);
2771 /* copy over the cpts */
2772 if (ni->ni_ncpts == LNET_CPT_NUMBER &&
2773 ni->ni_cpts == NULL) {
2774 for (i = 0; i < ni->ni_ncpts; i++)
2775 cfg_ni->lic_cpts[i] = i;
2778 ni->ni_cpts != NULL && i < ni->ni_ncpts &&
2779 i < LNET_MAX_SHOW_NUM_CPT;
2781 cfg_ni->lic_cpts[i] = ni->ni_cpts[i];
2783 cfg_ni->lic_ncpts = ni->ni_ncpts;
2787 * NOTE: This is a legacy function left in the code to be backwards
2788 * compatible with older userspace programs. It should eventually be
2791 * Grabs the ni data from the ni structure and fills the out
2794 * \param[in] ni network interface structure
2795 * \param[out] config config information
2798 lnet_fill_ni_info_legacy(struct lnet_ni *ni,
2799 struct lnet_ioctl_config_data *config)
2801 struct lnet_ioctl_net_config *net_config;
2802 struct lnet_ioctl_config_lnd_tunables *lnd_cfg = NULL;
2803 size_t min_size, tunable_size = 0;
2809 net_config = (struct lnet_ioctl_net_config *) config->cfg_bulk;
2813 BUILD_BUG_ON(ARRAY_SIZE(ni->ni_interfaces) !=
2814 ARRAY_SIZE(net_config->ni_interfaces));
2816 for (i = 0; i < ARRAY_SIZE(ni->ni_interfaces); i++) {
2817 if (!ni->ni_interfaces[i])
2820 strncpy(net_config->ni_interfaces[i],
2821 ni->ni_interfaces[i],
2822 sizeof(net_config->ni_interfaces[i]));
2825 config->cfg_nid = ni->ni_nid;
2826 config->cfg_config_u.cfg_net.net_peer_timeout =
2827 ni->ni_net->net_tunables.lct_peer_timeout;
2828 config->cfg_config_u.cfg_net.net_max_tx_credits =
2829 ni->ni_net->net_tunables.lct_max_tx_credits;
2830 config->cfg_config_u.cfg_net.net_peer_tx_credits =
2831 ni->ni_net->net_tunables.lct_peer_tx_credits;
2832 config->cfg_config_u.cfg_net.net_peer_rtr_credits =
2833 ni->ni_net->net_tunables.lct_peer_rtr_credits;
2835 if (LNET_NETTYP(LNET_NIDNET(ni->ni_nid)) == LOLND)
2836 net_config->ni_status = LNET_NI_STATUS_UP;
2838 net_config->ni_status = ni->ni_status->ns_status;
2841 int num_cpts = min(ni->ni_ncpts, LNET_MAX_SHOW_NUM_CPT);
2843 for (i = 0; i < num_cpts; i++)
2844 net_config->ni_cpts[i] = ni->ni_cpts[i];
2846 config->cfg_ncpts = num_cpts;
2850 * See if user land tools sent in a newer and larger version
2851 * of struct lnet_tunables than what the kernel uses.
2853 min_size = sizeof(*config) + sizeof(*net_config);
2855 if (config->cfg_hdr.ioc_len > min_size)
2856 tunable_size = config->cfg_hdr.ioc_len - min_size;
2858 /* Don't copy too much data to user space */
2859 min_size = min(tunable_size, sizeof(ni->ni_lnd_tunables));
2860 lnd_cfg = (struct lnet_ioctl_config_lnd_tunables *)net_config->cfg_bulk;
2862 if (lnd_cfg && min_size) {
2863 memcpy(&lnd_cfg->lt_tun, &ni->ni_lnd_tunables, min_size);
2864 config->cfg_config_u.cfg_net.net_interface_count = 1;
2866 /* Tell user land that kernel side has less data */
2867 if (tunable_size > sizeof(ni->ni_lnd_tunables)) {
2868 min_size = tunable_size - sizeof(ni->ni_lnd_tunables);
2869 config->cfg_hdr.ioc_len -= min_size;
2875 lnet_get_ni_idx_locked(int idx)
2878 struct lnet_net *net;
2880 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
2881 list_for_each_entry(ni, &net->net_ni_list, ni_netlist) {
2891 lnet_get_next_ni_locked(struct lnet_net *mynet, struct lnet_ni *prev)
2894 struct lnet_net *net = mynet;
2897 * It is possible that the net has been cleaned out while there is
2898 * a message being sent. This function accessed the net without
2899 * checking if the list is empty
2903 net = list_entry(the_lnet.ln_nets.next, struct lnet_net,
2905 if (list_empty(&net->net_ni_list))
2907 ni = list_entry(net->net_ni_list.next, struct lnet_ni,
2913 if (prev->ni_netlist.next == &prev->ni_net->net_ni_list) {
2914 /* if you reached the end of the ni list and the net is
2915 * specified, then there are no more nis in that net */
2919 /* we reached the end of this net ni list. move to the
2921 if (prev->ni_net->net_list.next == &the_lnet.ln_nets)
2922 /* no more nets and no more NIs. */
2925 /* get the next net */
2926 net = list_entry(prev->ni_net->net_list.next, struct lnet_net,
2928 if (list_empty(&net->net_ni_list))
2930 /* get the ni on it */
2931 ni = list_entry(net->net_ni_list.next, struct lnet_ni,
2937 if (list_empty(&prev->ni_netlist))
2940 /* there are more nis left */
2941 ni = list_entry(prev->ni_netlist.next, struct lnet_ni, ni_netlist);
2947 lnet_get_net_config(struct lnet_ioctl_config_data *config)
2952 int idx = config->cfg_count;
2954 cpt = lnet_net_lock_current();
2956 ni = lnet_get_ni_idx_locked(idx);
2961 lnet_fill_ni_info_legacy(ni, config);
2965 lnet_net_unlock(cpt);
2970 lnet_get_ni_config(struct lnet_ioctl_config_ni *cfg_ni,
2971 struct lnet_ioctl_config_lnd_tunables *tun,
2972 struct lnet_ioctl_element_stats *stats,
2979 if (!cfg_ni || !tun || !stats)
2982 cpt = lnet_net_lock_current();
2984 ni = lnet_get_ni_idx_locked(cfg_ni->lic_idx);
2989 lnet_fill_ni_info(ni, cfg_ni, tun, stats, tun_size);
2993 lnet_net_unlock(cpt);
2997 int lnet_get_ni_stats(struct lnet_ioctl_element_msg_stats *msg_stats)
3006 cpt = lnet_net_lock_current();
3008 ni = lnet_get_ni_idx_locked(msg_stats->im_idx);
3011 lnet_usr_translate_stats(msg_stats, &ni->ni_stats);
3015 lnet_net_unlock(cpt);
3020 static int lnet_add_net_common(struct lnet_net *net,
3021 struct lnet_ioctl_config_lnd_tunables *tun)
3024 struct lnet_ping_buffer *pbuf;
3025 struct lnet_handle_md ping_mdh;
3027 struct lnet_remotenet *rnet;
3029 int num_acceptor_nets;
3031 lnet_net_lock(LNET_LOCK_EX);
3032 rnet = lnet_find_rnet_locked(net->net_id);
3033 lnet_net_unlock(LNET_LOCK_EX);
3035 * make sure that the net added doesn't invalidate the current
3036 * configuration LNet is keeping
3039 CERROR("Adding net %s will invalidate routing configuration\n",
3040 libcfs_net2str(net->net_id));
3046 * make sure you calculate the correct number of slots in the ping
3047 * buffer. Since the ping info is a flattened list of all the NIs,
3048 * we should allocate enough slots to accomodate the number of NIs
3049 * which will be added.
3051 * since ni hasn't been configured yet, use
3052 * lnet_get_net_ni_count_pre() which checks the net_ni_added list
3054 net_ni_count = lnet_get_net_ni_count_pre(net);
3056 rc = lnet_ping_target_setup(&pbuf, &ping_mdh,
3057 net_ni_count + lnet_get_ni_count(),
3065 memcpy(&net->net_tunables,
3066 &tun->lt_cmn, sizeof(net->net_tunables));
3068 memset(&net->net_tunables, -1, sizeof(net->net_tunables));
3071 * before starting this network get a count of the current TCP
3072 * networks which require the acceptor thread running. If that
3073 * count is == 0 before we start up this network, then we'd want to
3074 * start up the acceptor thread after starting up this network
3076 num_acceptor_nets = lnet_count_acceptor_nets();
3078 net_id = net->net_id;
3080 rc = lnet_startup_lndnet(net,
3081 (tun) ? &tun->lt_tun : NULL);
3085 lnet_net_lock(LNET_LOCK_EX);
3086 net = lnet_get_net_locked(net_id);
3087 lnet_net_unlock(LNET_LOCK_EX);
3092 * Start the acceptor thread if this is the first network
3093 * being added that requires the thread.
3095 if (net->net_lnd->lnd_accept && num_acceptor_nets == 0) {
3096 rc = lnet_acceptor_start();
3098 /* shutdown the net that we just started */
3099 CERROR("Failed to start up acceptor thread\n");
3100 lnet_shutdown_lndnet(net);
3105 lnet_net_lock(LNET_LOCK_EX);
3106 lnet_peer_net_added(net);
3107 lnet_net_unlock(LNET_LOCK_EX);
3109 lnet_ping_target_update(pbuf, ping_mdh);
3114 lnet_ping_md_unlink(pbuf, &ping_mdh);
3115 lnet_ping_buffer_decref(pbuf);
3119 static int lnet_handle_legacy_ip2nets(char *ip2nets,
3120 struct lnet_ioctl_config_lnd_tunables *tun)
3122 struct lnet_net *net;
3125 struct list_head net_head;
3127 INIT_LIST_HEAD(&net_head);
3129 rc = lnet_parse_ip2nets(&nets, ip2nets);
3133 rc = lnet_parse_networks(&net_head, nets, use_tcp_bonding);
3137 mutex_lock(&the_lnet.ln_api_mutex);
3138 while (!list_empty(&net_head)) {
3139 net = list_entry(net_head.next, struct lnet_net, net_list);
3140 list_del_init(&net->net_list);
3141 rc = lnet_add_net_common(net, tun);
3147 mutex_unlock(&the_lnet.ln_api_mutex);
3149 while (!list_empty(&net_head)) {
3150 net = list_entry(net_head.next, struct lnet_net, net_list);
3151 list_del_init(&net->net_list);
3157 int lnet_dyn_add_ni(struct lnet_ioctl_config_ni *conf)
3159 struct lnet_net *net;
3161 struct lnet_ioctl_config_lnd_tunables *tun = NULL;
3163 __u32 net_id, lnd_type;
3165 /* get the tunables if they are available */
3166 if (conf->lic_cfg_hdr.ioc_len >=
3167 sizeof(*conf) + sizeof(*tun))
3168 tun = (struct lnet_ioctl_config_lnd_tunables *)
3171 /* handle legacy ip2nets from DLC */
3172 if (conf->lic_legacy_ip2nets[0] != '\0')
3173 return lnet_handle_legacy_ip2nets(conf->lic_legacy_ip2nets,
3176 net_id = LNET_NIDNET(conf->lic_nid);
3177 lnd_type = LNET_NETTYP(net_id);
3179 if (!libcfs_isknown_lnd(lnd_type)) {
3180 CERROR("No valid net and lnd information provided\n");
3184 net = lnet_net_alloc(net_id, NULL);
3188 for (i = 0; i < conf->lic_ncpts; i++) {
3189 if (conf->lic_cpts[i] >= LNET_CPT_NUMBER)
3193 ni = lnet_ni_alloc_w_cpt_array(net, conf->lic_cpts, conf->lic_ncpts,
3194 conf->lic_ni_intf[0]);
3198 mutex_lock(&the_lnet.ln_api_mutex);
3200 rc = lnet_add_net_common(net, tun);
3202 mutex_unlock(&the_lnet.ln_api_mutex);
3207 int lnet_dyn_del_ni(struct lnet_ioctl_config_ni *conf)
3209 struct lnet_net *net;
3211 __u32 net_id = LNET_NIDNET(conf->lic_nid);
3212 struct lnet_ping_buffer *pbuf;
3213 struct lnet_handle_md ping_mdh;
3218 /* don't allow userspace to shutdown the LOLND */
3219 if (LNET_NETTYP(net_id) == LOLND)
3222 mutex_lock(&the_lnet.ln_api_mutex);
3226 net = lnet_get_net_locked(net_id);
3228 CERROR("net %s not found\n",
3229 libcfs_net2str(net_id));
3234 addr = LNET_NIDADDR(conf->lic_nid);
3236 /* remove the entire net */
3237 net_count = lnet_get_net_ni_count_locked(net);
3241 /* create and link a new ping info, before removing the old one */
3242 rc = lnet_ping_target_setup(&pbuf, &ping_mdh,
3243 lnet_get_ni_count() - net_count,
3246 goto unlock_api_mutex;
3248 lnet_shutdown_lndnet(net);
3250 if (lnet_count_acceptor_nets() == 0)
3251 lnet_acceptor_stop();
3253 lnet_ping_target_update(pbuf, ping_mdh);
3255 goto unlock_api_mutex;
3258 ni = lnet_nid2ni_locked(conf->lic_nid, 0);
3260 CERROR("nid %s not found\n",
3261 libcfs_nid2str(conf->lic_nid));
3266 net_count = lnet_get_net_ni_count_locked(net);
3270 /* create and link a new ping info, before removing the old one */
3271 rc = lnet_ping_target_setup(&pbuf, &ping_mdh,
3272 lnet_get_ni_count() - 1, false);
3274 goto unlock_api_mutex;
3276 lnet_shutdown_lndni(ni);
3278 if (lnet_count_acceptor_nets() == 0)
3279 lnet_acceptor_stop();
3281 lnet_ping_target_update(pbuf, ping_mdh);
3283 /* check if the net is empty and remove it if it is */
3285 lnet_shutdown_lndnet(net);
3287 goto unlock_api_mutex;
3292 mutex_unlock(&the_lnet.ln_api_mutex);
3298 * lnet_dyn_add_net and lnet_dyn_del_net are now deprecated.
3299 * They are only expected to be called for unique networks.
3300 * That can be as a result of older DLC library
3301 * calls. Multi-Rail DLC and beyond no longer uses these APIs.
3304 lnet_dyn_add_net(struct lnet_ioctl_config_data *conf)
3306 struct lnet_net *net;
3307 struct list_head net_head;
3309 struct lnet_ioctl_config_lnd_tunables tun;
3310 char *nets = conf->cfg_config_u.cfg_net.net_intf;
3312 INIT_LIST_HEAD(&net_head);
3314 /* Create a net/ni structures for the network string */
3315 rc = lnet_parse_networks(&net_head, nets, use_tcp_bonding);
3317 return rc == 0 ? -EINVAL : rc;
3319 mutex_lock(&the_lnet.ln_api_mutex);
3322 rc = -EINVAL; /* only add one network per call */
3323 goto out_unlock_clean;
3326 net = list_entry(net_head.next, struct lnet_net, net_list);
3327 list_del_init(&net->net_list);
3329 LASSERT(lnet_net_unique(net->net_id, &the_lnet.ln_nets, NULL));
3331 memset(&tun, 0, sizeof(tun));
3333 tun.lt_cmn.lct_peer_timeout =
3334 conf->cfg_config_u.cfg_net.net_peer_timeout;
3335 tun.lt_cmn.lct_peer_tx_credits =
3336 conf->cfg_config_u.cfg_net.net_peer_tx_credits;
3337 tun.lt_cmn.lct_peer_rtr_credits =
3338 conf->cfg_config_u.cfg_net.net_peer_rtr_credits;
3339 tun.lt_cmn.lct_max_tx_credits =
3340 conf->cfg_config_u.cfg_net.net_max_tx_credits;
3342 rc = lnet_add_net_common(net, &tun);
3345 mutex_unlock(&the_lnet.ln_api_mutex);
3346 while (!list_empty(&net_head)) {
3347 /* net_head list is empty in success case */
3348 net = list_entry(net_head.next, struct lnet_net, net_list);
3349 list_del_init(&net->net_list);
3356 lnet_dyn_del_net(__u32 net_id)
3358 struct lnet_net *net;
3359 struct lnet_ping_buffer *pbuf;
3360 struct lnet_handle_md ping_mdh;
3364 /* don't allow userspace to shutdown the LOLND */
3365 if (LNET_NETTYP(net_id) == LOLND)
3368 mutex_lock(&the_lnet.ln_api_mutex);
3372 net = lnet_get_net_locked(net_id);
3379 net_ni_count = lnet_get_net_ni_count_locked(net);
3383 /* create and link a new ping info, before removing the old one */
3384 rc = lnet_ping_target_setup(&pbuf, &ping_mdh,
3385 lnet_get_ni_count() - net_ni_count, false);
3389 lnet_shutdown_lndnet(net);
3391 if (lnet_count_acceptor_nets() == 0)
3392 lnet_acceptor_stop();
3394 lnet_ping_target_update(pbuf, ping_mdh);
3397 mutex_unlock(&the_lnet.ln_api_mutex);
3402 void lnet_incr_dlc_seq(void)
3404 atomic_inc(&lnet_dlc_seq_no);
3407 __u32 lnet_get_dlc_seq_locked(void)
3409 return atomic_read(&lnet_dlc_seq_no);
3413 lnet_ni_set_healthv(lnet_nid_t nid, int value, bool all)
3415 struct lnet_net *net;
3418 lnet_net_lock(LNET_LOCK_EX);
3419 list_for_each_entry(net, &the_lnet.ln_nets, net_list) {
3420 list_for_each_entry(ni, &net->net_ni_list, ni_netlist) {
3421 if (ni->ni_nid == nid || all) {
3422 atomic_set(&ni->ni_healthv, value);
3423 if (list_empty(&ni->ni_recovery) &&
3424 value < LNET_MAX_HEALTH_VALUE) {
3425 CERROR("manually adding local NI %s to recovery\n",
3426 libcfs_nid2str(ni->ni_nid));
3427 list_add_tail(&ni->ni_recovery,
3428 &the_lnet.ln_mt_localNIRecovq);
3429 lnet_ni_addref_locked(ni, 0);
3432 lnet_net_unlock(LNET_LOCK_EX);
3438 lnet_net_unlock(LNET_LOCK_EX);
3442 lnet_get_local_ni_hstats(struct lnet_ioctl_local_ni_hstats *stats)
3446 lnet_nid_t nid = stats->hlni_nid;
3448 cpt = lnet_net_lock_current();
3449 ni = lnet_nid2ni_locked(nid, cpt);
3456 stats->hlni_local_interrupt = atomic_read(&ni->ni_hstats.hlt_local_interrupt);
3457 stats->hlni_local_dropped = atomic_read(&ni->ni_hstats.hlt_local_dropped);
3458 stats->hlni_local_aborted = atomic_read(&ni->ni_hstats.hlt_local_aborted);
3459 stats->hlni_local_no_route = atomic_read(&ni->ni_hstats.hlt_local_no_route);
3460 stats->hlni_local_timeout = atomic_read(&ni->ni_hstats.hlt_local_timeout);
3461 stats->hlni_local_error = atomic_read(&ni->ni_hstats.hlt_local_error);
3462 stats->hlni_health_value = atomic_read(&ni->ni_healthv);
3465 lnet_net_unlock(cpt);
3471 lnet_get_local_ni_recovery_list(struct lnet_ioctl_recovery_list *list)
3476 lnet_net_lock(LNET_LOCK_EX);
3477 list_for_each_entry(ni, &the_lnet.ln_mt_localNIRecovq, ni_recovery) {
3478 list->rlst_nid_array[i] = ni->ni_nid;
3480 if (i >= LNET_MAX_SHOW_NUM_NID)
3483 lnet_net_unlock(LNET_LOCK_EX);
3484 list->rlst_num_nids = i;
3490 lnet_get_peer_ni_recovery_list(struct lnet_ioctl_recovery_list *list)
3492 struct lnet_peer_ni *lpni;
3495 lnet_net_lock(LNET_LOCK_EX);
3496 list_for_each_entry(lpni, &the_lnet.ln_mt_peerNIRecovq, lpni_recovery) {
3497 list->rlst_nid_array[i] = lpni->lpni_nid;
3499 if (i >= LNET_MAX_SHOW_NUM_NID)
3502 lnet_net_unlock(LNET_LOCK_EX);
3503 list->rlst_num_nids = i;
3509 * LNet ioctl handler.
3513 LNetCtl(unsigned int cmd, void *arg)
3515 struct libcfs_ioctl_data *data = arg;
3516 struct lnet_ioctl_config_data *