1 /* -*- mode: c; c-basic-offset: 8; indent-tabs-mode: nil; -*-
2 * vim:expandtab:shiftwidth=8:tabstop=8:
4 * Copyright (C) 2004 Cluster File Systems, Inc.
5 * Author: Eric Barton <eric@bartonsoftware.com>
7 * This file is part of Lustre, http://www.lustre.org.
9 * Lustre is free software; you can redistribute it and/or
10 * modify it under the terms of version 2 of the GNU General Public
11 * License as published by the Free Software Foundation.
13 * Lustre is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with Lustre; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 ptl_handle_ni_t kranal_ni;
28 kra_data_t kranal_data;
29 kra_tunables_t kranal_tunables;
32 #define RANAL_SYSCTL_TIMEOUT 1
33 #define RANAL_SYSCTL_LISTENER_TIMEOUT 2
34 #define RANAL_SYSCTL_BACKLOG 3
35 #define RANAL_SYSCTL_PORT 4
36 #define RANAL_SYSCTL_MAX_IMMEDIATE 5
38 #define RANAL_SYSCTL 202
40 static ctl_table kranal_ctl_table[] = {
41 {RANAL_SYSCTL_TIMEOUT, "timeout",
42 &kranal_tunables.kra_timeout, sizeof(int),
43 0644, NULL, &proc_dointvec},
44 {RANAL_SYSCTL_LISTENER_TIMEOUT, "listener_timeout",
45 &kranal_tunables.kra_listener_timeout, sizeof(int),
46 0644, NULL, &proc_dointvec},
47 {RANAL_SYSCTL_BACKLOG, "backlog",
48 &kranal_tunables.kra_backlog, sizeof(int),
49 0644, NULL, kranal_listener_procint},
50 {RANAL_SYSCTL_PORT, "port",
51 &kranal_tunables.kra_port, sizeof(int),
52 0644, NULL, kranal_listener_procint},
53 {RANAL_SYSCTL_MAX_IMMEDIATE, "max_immediate",
54 &kranal_tunables.kra_max_immediate, sizeof(int),
55 0644, NULL, &proc_dointvec},
59 static ctl_table kranal_top_ctl_table[] = {
60 {RANAL_SYSCTL, "ranal", NULL, 0, 0555, kranal_ctl_table},
66 kranal_sock_write (struct socket *sock, void *buffer, int nob)
69 mm_segment_t oldmm = get_fs();
81 .msg_flags = MSG_DONTWAIT
84 /* We've set up the socket's send buffer to be large enough for
85 * everything we send, so a single non-blocking send should
86 * complete without error. */
89 rc = sock_sendmsg(sock, &msg, iov.iov_len);
96 kranal_sock_read (struct socket *sock, void *buffer, int nob, int timeout)
99 mm_segment_t oldmm = get_fs();
100 long ticks = timeout * HZ;
112 struct msghdr msg = {
122 /* Set receive timeout to remaining time */
123 tv = (struct timeval) {
124 .tv_sec = ticks / HZ,
125 .tv_usec = ((ticks % HZ) * 1000000) / HZ
128 rc = sock_setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO,
129 (char *)&tv, sizeof(tv));
132 CERROR("Can't set socket recv timeout %d: %d\n",
139 rc = sock_recvmsg(sock, &msg, iov.iov_len, 0);
140 ticks -= jiffies - then;
147 return -ECONNABORTED;
149 buffer = ((char *)buffer) + rc;
161 kranal_create_sock(struct socket **sockp)
167 mm_segment_t oldmm = get_fs();
169 rc = sock_create(PF_INET, SOCK_STREAM, 0, &sock);
171 CERROR("Can't create socket: %d\n", rc);
175 /* Ensure sending connection info doesn't block */
176 option = 2 * sizeof(kra_connreq_t);
178 rc = sock_setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
179 (char *)&option, sizeof(option));
182 CERROR("Can't set send buffer %d: %d\n", option, rc);
188 rc = sock_setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
189 (char *)&option, sizeof(option));
192 CERROR("Can't set SO_REUSEADDR: %d\n", rc);
205 kranal_pause(int ticks)
207 set_current_state(TASK_UNINTERRUPTIBLE);
208 schedule_timeout(ticks);
212 kranal_pack_connreq(kra_connreq_t *connreq, kra_conn_t *conn)
216 memset(connreq, 0, sizeof(*connreq));
218 connreq->racr_magic = RANAL_MSG_MAGIC;
219 connreq->racr_version = RANAL_MSG_VERSION;
220 connreq->racr_devid = conn->rac_device->rad_id;
221 connreq->racr_nid = kranal_lib.libnal_ni.ni_pid.nid;
222 connreq->racr_timeout = conn->rac_timeout;
223 connreq->racr_incarnation = conn->rac_my_incarnation;
225 rrc = RapkGetRiParams(conn->rac_rihandle, &connreq->racr_riparams);
226 LASSERT(rrc == RAP_SUCCESS);
230 kranal_recv_connreq(struct socket *sock, kra_connreq_t *connreq, int timeout)
235 rc = kranal_sock_read(sock, connreq, sizeof(*connreq), timeout);
237 CERROR("Read failed: %d\n", rc);
241 if (connreq->racr_magic != RANAL_MSG_MAGIC) {
242 if (__swab32(connreq->racr_magic) != RANAL_MSG_MAGIC) {
243 CERROR("Unexpected magic %08x\n", connreq->racr_magic);
247 __swab32s(&connreq->racr_magic);
248 __swab16s(&connreq->racr_version);
249 __swab16s(&connreq->racr_devid);
250 __swab64s(&connreq->racr_nid);
251 __swab64s(&connreq->racr_incarnation);
252 __swab32s(&connreq->racr_timeout);
254 __swab32s(&connreq->racr_riparams.FmaDomainHndl);
255 __swab32s(&connreq->racr_riparams.RcvCqHndl);
256 __swab32s(&connreq->racr_riparams.PTag);
257 __swab32s(&connreq->racr_riparams.CompletionCookie);
260 if (connreq->racr_version != RANAL_MSG_VERSION) {
261 CERROR("Unexpected version %d\n", connreq->racr_version);
265 if (connreq->racr_nid == PTL_NID_ANY) {
266 CERROR("Received PTL_NID_ANY\n");
270 if (connreq->racr_timeout < RANAL_MIN_TIMEOUT) {
271 CERROR("Received timeout %d < MIN %d\n",
272 connreq->racr_timeout, RANAL_MIN_TIMEOUT);
276 for (i = 0; i < kranal_data.kra_ndevs; i++)
277 if (connreq->racr_devid ==
278 kranal_data.kra_devices[i].rad_id)
281 if (i == kranal_data.kra_ndevs) {
282 CERROR("Can't match device %d\n", connreq->racr_devid);
290 kranal_conn_isdup_locked(kra_peer_t *peer, __u64 incarnation)
293 struct list_head *tmp;
296 list_for_each(tmp, &peer->rap_conns) {
297 conn = list_entry(tmp, kra_conn_t, rac_list);
299 if (conn->rac_peer_incarnation < incarnation) {
300 /* Conns with an older incarnation get culled later */
305 conn->rac_peer_incarnation == incarnation &&
306 peer->rap_nid == kranal_lib.libnal_ni.ni_pid.nid) {
307 /* loopback creates 2 conns */
319 kranal_set_conn_uniqueness (kra_conn_t *conn)
323 write_lock_irqsave(&kranal_data.kra_global_lock, flags);
325 conn->rac_my_incarnation = kranal_data.kra_next_incarnation++;
327 do { /* allocate a unique cqid */
328 conn->rac_cqid = kranal_data.kra_next_cqid++;
329 } while (kranal_cqid2conn_locked(conn->rac_cqid) != NULL);
332 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
336 kranal_alloc_conn(kra_conn_t **connp, kra_device_t *dev)
341 LASSERT (!in_interrupt());
342 PORTAL_ALLOC(conn, sizeof(*conn));
347 memset(conn, 0, sizeof(*conn));
348 atomic_set(&conn->rac_refcount, 1);
349 INIT_LIST_HEAD(&conn->rac_list);
350 INIT_LIST_HEAD(&conn->rac_hashlist);
351 INIT_LIST_HEAD(&conn->rac_fmaq);
352 INIT_LIST_HEAD(&conn->rac_rdmaq);
353 INIT_LIST_HEAD(&conn->rac_replyq);
354 spin_lock_init(&conn->rac_lock);
356 kranal_set_conn_uniqueness(conn);
358 conn->rac_timeout = MAX(kranal_tunables.kra_timeout, RANAL_MIN_TIMEOUT);
359 kranal_update_reaper_timeout(conn->rac_timeout);
361 rrc = RapkCreateRi(dev->rad_handle, conn->rac_cqid,
363 dev->rad_rdma_cq, dev->rad_fma_cq,
364 &conn->rac_rihandle);
365 if (rrc != RAP_SUCCESS) {
366 CERROR("RapkCreateRi failed: %d\n", rrc);
367 PORTAL_FREE(conn, sizeof(*conn));
371 atomic_inc(&kranal_data.kra_nconns);
377 __kranal_conn_decref(kra_conn_t *conn)
382 LASSERT (!in_interrupt());
383 LASSERT (!conn->rac_scheduled);
384 LASSERT (list_empty(&conn->rac_list));
385 LASSERT (list_empty(&conn->rac_hashlist));
386 LASSERT (atomic_read(&conn->rac_refcount) == 0);
388 while (!list_empty(&conn->rac_fmaq)) {
389 tx = list_entry(conn->rac_fmaq.next, kra_tx_t, tx_list);
391 list_del(&tx->tx_list);
392 kranal_tx_done(tx, -ECONNABORTED);
395 /* We may not destroy this connection while it has RDMAs outstanding */
396 LASSERT (list_empty(&conn->rac_rdmaq));
398 while (!list_empty(&conn->rac_replyq)) {
399 tx = list_entry(conn->rac_replyq.next, kra_tx_t, tx_list);
401 list_del(&tx->tx_list);
402 kranal_tx_done(tx, -ECONNABORTED);
405 rrc = RapkDestroyRi(conn->rac_device->rad_handle,
407 LASSERT (rrc == RAP_SUCCESS);
409 if (conn->rac_peer != NULL)
410 kranal_peer_decref(conn->rac_peer);
412 PORTAL_FREE(conn, sizeof(*conn));
413 atomic_dec(&kranal_data.kra_nconns);
417 kranal_terminate_conn_locked (kra_conn_t *conn)
419 kra_peer_t *peer = conn->rac_peer;
421 LASSERT (!in_interrupt());
422 LASSERT (conn->rac_closing);
423 LASSERT (!list_empty(&conn->rac_hashlist));
424 LASSERT (list_empty(&conn->rac_list));
426 /* Remove from conn hash table (no new callbacks) */
427 list_del_init(&conn->rac_hashlist);
428 kranal_conn_decref(conn);
430 /* Conn is now just waiting for remaining refs to go */
434 kranal_close_conn_locked (kra_conn_t *conn, int error)
436 kra_peer_t *peer = conn->rac_peer;
438 CDEBUG(error == 0 ? D_NET : D_ERROR,
439 "closing conn to "LPX64": error %d\n", peer->rap_nid, error);
441 LASSERT (!in_interrupt());
442 LASSERT (!conn->rac_closing);
443 LASSERT (!list_empty(&conn->rac_hashlist));
444 LASSERT (!list_empty(&conn->rac_list));
446 list_del_init(&conn->rac_list);
448 if (list_empty(&peer->rap_conns) &&
449 peer->rap_persistence == 0) {
450 /* Non-persistent peer with no more conns... */
451 kranal_unlink_peer_locked(peer);
454 conn->rac_closing = 1;
455 kranal_schedule_conn(conn);
457 kranal_conn_decref(conn); /* lose peer's ref */
461 kranal_close_conn (kra_conn_t *conn, int error)
466 write_lock_irqsave(&kranal_data.kra_global_lock, flags);
468 if (!conn->rac_closing)
469 kranal_close_conn_locked(conn, error);
471 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
475 kranal_passive_conn_handshake (struct socket *sock,
476 ptl_nid_t *peer_nidp, kra_conn_t **connp)
478 struct sockaddr_in addr;
480 unsigned int peer_port;
481 kra_connreq_t connreq;
491 rc = sock->ops->getname(sock, (struct sockaddr *)&addr, &len, 2);
493 CERROR("Can't get peer's IP: %d\n", rc);
497 peer_ip = ntohl(addr.sin_addr.s_addr);
498 peer_port = ntohs(addr.sin_port);
500 if (peer_port >= 1024) {
501 CERROR("Refusing unprivileged connection from %u.%u.%u.%u/%d\n",
502 HIPQUAD(peer_ip), peer_port);
503 return -ECONNREFUSED;
506 rc = kranal_recv_connreq(sock, &connreq,
507 kranal_tunables.kra_listener_timeout);
509 CERROR("Can't rx connreq from %u.%u.%u.%u/%d: %d\n",
510 HIPQUAD(peer_ip), peer_port, rc);
514 peer_nid = connreq.racr_nid;
515 LASSERT (peer_nid != PTL_NID_ANY);
518 LASSERT(i < kranal_data.kra_ndevs);
519 dev = &kranal_data.kra_devices[i];
520 if (dev->rad_id == connreq.racr_devid)
524 rc = kranal_alloc_conn(&conn, dev);
528 conn->rac_peer_incarnation = connreq.racr_incarnation;
529 conn->rac_keepalive = RANAL_TIMEOUT2KEEPALIVE(connreq.racr_timeout);
530 kranal_update_reaper_timeout(conn->rac_keepalive);
532 rrc = RapkSetRiParams(conn->rac_rihandle, &connreq.racr_riparams);
533 if (rrc != RAP_SUCCESS) {
534 CERROR("Can't set riparams for "LPX64": %d\n", peer_nid, rrc);
535 kranal_conn_decref(conn);
539 kranal_pack_connreq(&connreq, conn);
541 rc = kranal_sock_write(sock, &connreq, sizeof(connreq));
543 CERROR("Can't tx connreq to %u.%u.%u.%u/%d: %d\n",
544 HIPQUAD(peer_ip), peer_port, rc);
545 kranal_conn_decref(conn);
550 *peer_nidp = peer_nid;
555 ranal_connect_sock(kra_peer_t *peer, struct socket **sockp)
557 struct sockaddr_in locaddr;
558 struct sockaddr_in srvaddr;
563 mm_segment_t oldmm = get_fs();
566 for (port = 1023; port >= 512; port--) {
568 memset(&locaddr, 0, sizeof(locaddr));
569 locaddr.sin_family = AF_INET;
570 locaddr.sin_port = htons(port);
571 locaddr.sin_addr.s_addr = htonl(INADDR_ANY);
573 memset (&srvaddr, 0, sizeof (srvaddr));
574 srvaddr.sin_family = AF_INET;
575 srvaddr.sin_port = htons (peer->rap_port);
576 srvaddr.sin_addr.s_addr = htonl (peer->rap_ip);
578 rc = kranal_create_sock(&sock);
582 rc = sock->ops->bind(sock,
583 (struct sockaddr *)&locaddr, sizeof(locaddr));
587 if (rc == -EADDRINUSE) {
588 CDEBUG(D_NET, "Port %d already in use\n", port);
592 CERROR("Can't bind to reserved port %d: %d\n", port, rc);
596 rc = sock->ops->connect(sock,
597 (struct sockaddr *)&srvaddr, sizeof(srvaddr),
606 if (rc != -EADDRNOTAVAIL) {
607 CERROR("Can't connect port %d to %u.%u.%u.%u/%d: %d\n",
608 port, HIPQUAD(peer->rap_ip), peer->rap_port, rc);
612 CDEBUG(D_NET, "Port %d not available for %u.%u.%u.%u/%d\n",
613 port, HIPQUAD(peer->rap_ip), peer->rap_port);
617 return -EHOSTUNREACH;
622 kranal_active_conn_handshake(kra_peer_t *peer, kra_conn_t **connp)
624 struct sockaddr_in dstaddr;
625 kra_connreq_t connreq;
633 idx = peer->rap_nid & 0x7fffffff;
634 dev = &kranal_data.kra_devices[idx % kranal_data.kra_ndevs];
636 rc = kranal_alloc_conn(&conn, dev);
640 kranal_pack_connreq(&connreq, conn);
642 rc = ranal_connect_sock(peer, &sock);
646 /* CAVEAT EMPTOR: the passive side receives with a SHORT rx timeout
647 * immediately after accepting a connection, so we connect and then
648 * send immediately. */
650 rc = kranal_sock_write(sock, &connreq, sizeof(connreq));
652 CERROR("Can't tx connreq to %u.%u.%u.%u/%d: %d\n",
653 HIPQUAD(peer->rap_ip), peer->rap_port, rc);
657 rc = kranal_recv_connreq(sock, &connreq, kranal_tunables.kra_timeout);
659 CERROR("Can't rx connreq from %u.%u.%u.%u/%d: %d\n",
660 HIPQUAD(peer->rap_ip), peer->rap_port, rc);
667 if (connreq.racr_nid != peer->rap_nid) {
668 CERROR("Unexpected nid from %u.%u.%u.%u/%d: "
669 "received "LPX64" expected "LPX64"\n",
670 HIPQUAD(peer->rap_ip), peer->rap_port,
671 connreq.racr_nid, peer->rap_nid);
675 if (connreq.racr_devid != dev->rad_id) {
676 CERROR("Unexpected device id from %u.%u.%u.%u/%d: "
677 "received %d expected %d\n",
678 HIPQUAD(peer->rap_ip), peer->rap_port,
679 connreq.racr_devid, dev->rad_id);
683 conn->rac_peer_incarnation = connreq.racr_incarnation;
684 conn->rac_keepalive = RANAL_TIMEOUT2KEEPALIVE(connreq.racr_timeout);
685 kranal_update_reaper_timeout(conn->rac_keepalive);
688 rrc = RapkSetRiParams(conn->rac_rihandle, &connreq.racr_riparams);
689 if (rrc != RAP_SUCCESS) {
690 CERROR("Can't set riparams for "LPX64": %d\n",
701 kranal_conn_decref(conn);
706 kranal_conn_handshake (struct socket *sock, kra_peer_t *peer)
712 unsigned long timeout;
718 /* passive: listener accepted sock */
719 LASSERT (peer == NULL);
721 rc = kranal_passive_conn_handshake(sock, &peer_nid, &conn);
725 /* assume this is a new peer */
726 peer = kranal_create_peer(peer_nid);
728 CERROR("Can't allocate peer for "LPX64"\n", peer_nid);
729 kranal_conn_decref(conn);
733 write_lock_irqsave(&kranal_data.kra_global_lock, flags);
735 peer2 = kranal_find_peer_locked(peer_nid);
737 /* peer table takes my initial ref on peer */
738 list_add_tail(&peer->rap_list,
739 kranal_nid2peerlist(peer_nid));
741 /* peer_nid already in the peer table */
742 kranal_peer_decref(peer);
745 /* NB I may now have a non-persistent peer in the peer
746 * table with no connections: I can't drop the global lock
747 * until I've given it a connection or removed it, and when
748 * I do 'peer' can disappear under me. */
750 /* active: connd wants to connect to peer */
751 LASSERT (peer != NULL);
752 LASSERT (peer->rap_connecting);
754 rc = kranal_active_conn_handshake(peer, &conn);
758 write_lock_irqsave(&kranal_data.kra_global_lock, flags);
760 if (!kranal_peer_active(peer)) {
761 /* raced with peer getting unlinked */
762 write_unlock_irqrestore(&kranal_data.kra_global_lock,
764 kranal_conn_decref(conn);
769 LASSERT (kranal_peer_active(peer)); /* peer is in the peer table */
770 peer_nid = peer->rap_nid;
772 /* Refuse to duplicate an existing connection (both sides might try
773 * to connect at once). NB we return success! We _do_ have a
774 * connection (so we don't need to remove the peer from the peer
775 * table) and we _don't_ have any blocked txs to complete */
776 if (kranal_conn_isdup_locked(peer, conn->rac_peer_incarnation)) {
777 LASSERT (!list_empty(&peer->rap_conns));
778 LASSERT (list_empty(&peer->rap_tx_queue));
779 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
780 CWARN("Not creating duplicate connection to "LPX64"\n",
782 kranal_conn_decref(conn);
786 kranal_peer_addref(peer); /* +1 ref for conn */
787 conn->rac_peer = peer;
788 list_add_tail(&conn->rac_list, &peer->rap_conns);
790 kranal_conn_addref(conn); /* +1 ref for conn table */
791 list_add_tail(&conn->rac_hashlist,
792 kranal_cqid2connlist(conn->rac_cqid));
794 /* Schedule all packets blocking for a connection */
795 while (!list_empty(&peer->rap_tx_queue)) {
796 tx = list_entry(&peer->rap_tx_queue.next,
799 list_del(&tx->tx_list);
800 kranal_post_fma(conn, tx);
803 nstale = kranal_close_stale_conns_locked(peer, conn->rac_peer_incarnation);
805 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
807 /* CAVEAT EMPTOR: passive peer can disappear NOW */
810 CWARN("Closed %d stale conns to "LPX64"\n", nstale, peer_nid);
812 /* Ensure conn gets checked. Transmits may have been queued and an
813 * FMA event may have happened before it got in the cq hash table */
814 kranal_schedule_conn(conn);
819 kranal_connect (kra_peer_t *peer)
823 struct list_head zombies;
826 LASSERT (peer->rap_connecting);
828 rc = kranal_conn_handshake(NULL, peer);
830 write_lock_irqsave(&kranal_data.kra_global_lock, flags);
832 LASSERT (peer->rap_connecting);
833 peer->rap_connecting = 0;
836 /* kranal_conn_handshake() queues blocked txs immediately on
837 * success to avoid messages jumping the queue */
838 LASSERT (list_empty(&peer->rap_tx_queue));
840 /* reset reconnection timeouts */
841 peer->rap_reconnect_interval = RANAL_MIN_RECONNECT_INTERVAL;
842 peer->rap_reconnect_time = CURRENT_TIME;
844 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
848 LASSERT (peer->rap_reconnect_interval != 0);
849 peer->rap_reconnect_time = CURRENT_TIME + peer->rap_reconnect_interval;
850 peer->rap_reconnect_interval = MAX(RANAL_MAX_RECONNECT_INTERVAL,
851 1 * peer->rap_reconnect_interval);
853 /* Grab all blocked packets while we have the global lock */
854 list_add(&zombies, &peer->rap_tx_queue);
855 list_del_init(&peer->rap_tx_queue);
857 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
859 if (list_empty(&zombies))
862 CWARN("Dropping packets for "LPX64": connection failed\n",
866 tx = list_entry(zombies.next, kra_tx_t, tx_list);
868 list_del(&tx->tx_list);
869 kranal_tx_done(tx, -EHOSTUNREACH);
871 } while (!list_empty(&zombies));
875 kranal_listener(void *arg)
877 struct sockaddr_in addr;
880 struct socket *newsock;
882 kra_connreq_t *connreqs;
886 /* Parent thread holds kra_nid_mutex, and is, or is about to
887 * block on kra_listener_signal */
889 port = kranal_tunables.kra_port;
890 snprintf(name, sizeof(name), "kranal_lstn%03d", port);
891 kportal_daemonize(name);
892 kportal_blockallsigs();
894 init_waitqueue_entry(&wait, current);
897 PORTAL_ALLOC(connreqs, 2 * sizeof(*connreqs));
898 if (connreqs == NULL)
901 rc = kranal_create_sock(&sock);
905 memset(&addr, 0, sizeof(addr));
906 addr.sin_family = AF_INET;
907 addr.sin_port = htons(port);
908 addr.sin_addr.s_addr = INADDR_ANY;
910 rc = sock->ops->bind(sock, (struct sockaddr *)&addr, sizeof(addr));
912 CERROR("Can't bind to port %d\n", port);
916 rc = sock->ops->listen(sock, kranal_tunables.kra_backlog);
918 CERROR("Can't set listen backlog %d: %d\n",
919 kranal_tunables.kra_backlog, rc);
923 LASSERT (kranal_data.kra_listener_sock == NULL);
924 kranal_data.kra_listener_sock = sock;
926 /* unblock waiting parent */
927 LASSERT (kranal_data.kra_listener_shutdown == 0);
928 up(&kranal_data.kra_listener_signal);
930 /* Wake me any time something happens on my socket */
931 add_wait_queue(sock->sk->sk_sleep, &wait);
933 while (kranal_data.kra_listener_shutdown == 0) {
935 newsock = sock_alloc();
936 if (newsock == NULL) {
937 CERROR("Can't allocate new socket for accept\n");
942 set_current_state(TASK_INTERRUPTIBLE);
944 rc = sock->ops->accept(sock, newsock, O_NONBLOCK);
947 kranal_data.kra_listener_shutdown == 0)
950 set_current_state(TASK_RUNNING);
953 sock_release(newsock);
955 CERROR("Accept failed: %d\n", rc);
961 kranal_conn_handshake(newsock, NULL);
962 sock_release(newsock);
966 remove_wait_queue(sock->sk->sk_sleep, &wait);
969 kranal_data.kra_listener_sock = NULL;
971 PORTAL_FREE(connreqs, 2 * sizeof(*connreqs));
973 /* set completion status and unblock thread waiting for me
974 * (parent on startup failure, executioner on normal shutdown) */
975 kranal_data.kra_listener_shutdown = rc;
976 up(&kranal_data.kra_listener_signal);
982 kranal_start_listener (void)
987 CDEBUG(D_WARNING, "Starting listener\n");
989 /* Called holding kra_nid_mutex: listener stopped */
990 LASSERT (kranal_data.kra_listener_sock == NULL);
992 kranal_data.kra_listener_shutdown == 0;
993 pid = kernel_thread(kranal_listener, NULL, 0);
995 CERROR("Can't spawn listener: %ld\n", pid);
999 /* Block until listener has started up. */
1000 down(&kranal_data.kra_listener_signal);
1002 rc = kranal_data.kra_listener_shutdown;
1003 LASSERT ((rc != 0) == (kranal_data.kra_listener_sock == NULL));
1005 CDEBUG(D_WARNING, "Listener %ld started OK\n", pid);
1010 kranal_stop_listener(void)
1012 CDEBUG(D_WARNING, "Stopping listener\n");
1014 /* Called holding kra_nid_mutex: listener running */
1015 LASSERT (kranal_data.kra_listener_sock != NULL);
1017 kranal_data.kra_listener_shutdown = 1;
1018 wake_up_all(kranal_data.kra_listener_sock->sk->sk_sleep);
1020 /* Block until listener has torn down. */
1021 down(&kranal_data.kra_listener_signal);
1023 LASSERT (kranal_data.kra_listener_sock == NULL);
1024 CDEBUG(D_WARNING, "Listener stopped\n");
1028 kranal_listener_procint(ctl_table *table, int write, struct file *filp,
1029 void *buffer, size_t *lenp)
1031 int *tunable = (int *)table->data;
1035 down(&kranal_data.kra_nid_mutex);
1037 LASSERT (tunable == &kranal_tunables.kra_port ||
1038 tunable == &kranal_tunables.kra_backlog);
1041 rc = proc_dointvec(table, write, filp, buffer, lenp);
1044 (*tunable != old_val ||
1045 kranal_data.kra_listener_sock == NULL)) {
1047 if (kranal_data.kra_listener_sock != NULL)
1048 kranal_stop_listener();
1050 rc = kranal_start_listener();
1054 kranal_start_listener();
1058 up(&kranal_data.kra_nid_mutex);
1063 kranal_set_mynid(ptl_nid_t nid)
1065 lib_ni_t *ni = &kranal_lib.libnal_ni;
1068 CDEBUG(D_NET, "setting mynid to "LPX64" (old nid="LPX64")\n",
1069 nid, ni->ni_pid.nid);
1071 down(&kranal_data.kra_nid_mutex);
1073 if (nid == ni->ni_pid.nid) {
1074 /* no change of NID */
1075 up(&kranal_data.kra_nid_mutex);
1079 if (kranal_data.kra_listener_sock != NULL)
1080 kranal_stop_listener();
1082 ni->ni_pid.nid = nid;
1084 /* Delete all existing peers and their connections after new
1085 * NID/incarnation set to ensure no old connections in our brave
1087 kranal_del_peer(PTL_NID_ANY, 0);
1089 if (nid != PTL_NID_ANY)
1090 rc = kranal_start_listener();
1092 up(&kranal_data.kra_nid_mutex);
1097 kranal_create_peer (ptl_nid_t nid)
1101 LASSERT (nid != PTL_NID_ANY);
1103 PORTAL_ALLOC(peer, sizeof(*peer));
1107 memset(peer, 0, sizeof(*peer)); /* zero flags etc */
1109 peer->rap_nid = nid;
1110 atomic_set(&peer->rap_refcount, 1); /* 1 ref for caller */
1112 INIT_LIST_HEAD(&peer->rap_list); /* not in the peer table yet */
1113 INIT_LIST_HEAD(&peer->rap_conns);
1114 INIT_LIST_HEAD(&peer->rap_tx_queue);
1116 peer->rap_reconnect_time = CURRENT_TIME;
1117 peer->rap_reconnect_interval = RANAL_MIN_RECONNECT_INTERVAL;
1119 atomic_inc(&kranal_data.kra_npeers);
1124 __kranal_peer_decref (kra_peer_t *peer)
1126 CDEBUG(D_NET, "peer "LPX64" %p deleted\n", peer->rap_nid, peer);
1128 LASSERT (atomic_read(&peer->rap_refcount) == 0);
1129 LASSERT (peer->rap_persistence == 0);
1130 LASSERT (!kranal_peer_active(peer));
1131 LASSERT (peer->rap_connecting == 0);
1132 LASSERT (list_empty(&peer->rap_conns));
1133 LASSERT (list_empty(&peer->rap_tx_queue));
1135 PORTAL_FREE(peer, sizeof(*peer));
1137 /* NB a peer's connections keep a reference on their peer until
1138 * they are destroyed, so we can be assured that _all_ state to do
1139 * with this peer has been cleaned up when its refcount drops to
1141 atomic_dec(&kranal_data.kra_npeers);
1145 kranal_find_peer_locked (ptl_nid_t nid)
1147 struct list_head *peer_list = kranal_nid2peerlist(nid);
1148 struct list_head *tmp;
1151 list_for_each (tmp, peer_list) {
1153 peer = list_entry(tmp, kra_peer_t, rap_list);
1155 LASSERT (peer->rap_persistence > 0 || /* persistent peer */
1156 !list_empty(&peer->rap_conns)); /* active conn */
1158 if (peer->rap_nid != nid)
1161 CDEBUG(D_NET, "got peer [%p] -> "LPX64" (%d)\n",
1162 peer, nid, atomic_read(&peer->rap_refcount));
1169 kranal_find_peer (ptl_nid_t nid)
1173 read_lock(&kranal_data.kra_global_lock);
1174 peer = kranal_find_peer_locked(nid);
1175 if (peer != NULL) /* +1 ref for caller? */
1176 kranal_peer_addref(peer);
1177 read_unlock(&kranal_data.kra_global_lock);
1183 kranal_unlink_peer_locked (kra_peer_t *peer)
1185 LASSERT (peer->rap_persistence == 0);
1186 LASSERT (list_empty(&peer->rap_conns));
1188 LASSERT (kranal_peer_active(peer));
1189 list_del_init(&peer->rap_list);
1191 /* lose peerlist's ref */
1192 kranal_peer_decref(peer);
1196 kranal_get_peer_info (int index, ptl_nid_t *nidp, __u32 *ipp, int *portp,
1200 struct list_head *ptmp;
1203 read_lock(&kranal_data.kra_global_lock);
1205 for (i = 0; i < kranal_data.kra_peer_hash_size; i++) {
1207 list_for_each(ptmp, &kranal_data.kra_peers[i]) {
1209 peer = list_entry(ptmp, kra_peer_t, rap_list);
1210 LASSERT (peer->rap_persistence > 0 ||
1211 !list_empty(&peer->rap_conns));
1216 *nidp = peer->rap_nid;
1217 *ipp = peer->rap_ip;
1218 *portp = peer->rap_port;
1219 *persistencep = peer->rap_persistence;
1221 read_unlock(&kranal_data.kra_global_lock);
1226 read_unlock(&kranal_data.kra_global_lock);
1231 kranal_add_persistent_peer (ptl_nid_t nid, __u32 ip, int port)
1233 unsigned long flags;
1237 if (nid == PTL_NID_ANY)
1240 peer = kranal_create_peer(nid);
1244 write_lock_irqsave(&kranal_data.kra_global_lock, flags);
1246 peer2 = kranal_find_peer_locked(nid);
1247 if (peer2 != NULL) {
1248 kranal_peer_decref(peer);
1251 /* peer table takes existing ref on peer */
1252 list_add_tail(&peer->rap_list,
1253 kranal_nid2peerlist(nid));
1257 peer->rap_port = port;
1258 peer->rap_persistence++;
1260 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
1265 kranal_del_peer_locked (kra_peer_t *peer, int single_share)
1267 struct list_head *ctmp;
1268 struct list_head *cnxt;
1272 peer->rap_persistence = 0;
1273 else if (peer->rap_persistence > 0)
1274 peer->rap_persistence--;
1276 if (peer->rap_persistence != 0)
1279 if (list_empty(&peer->rap_conns)) {
1280 kranal_unlink_peer_locked(peer);
1282 list_for_each_safe(ctmp, cnxt, &peer->rap_conns) {
1283 conn = list_entry(ctmp, kra_conn_t, rac_list);
1285 kranal_close_conn_locked(conn, 0);
1287 /* peer unlinks itself when last conn is closed */
1292 kranal_del_peer (ptl_nid_t nid, int single_share)
1294 unsigned long flags;
1295 struct list_head *ptmp;
1296 struct list_head *pnxt;
1303 write_lock_irqsave(&kranal_data.kra_global_lock, flags);
1305 if (nid != PTL_NID_ANY)
1306 lo = hi = kranal_nid2peerlist(nid) - kranal_data.kra_peers;
1309 hi = kranal_data.kra_peer_hash_size - 1;
1312 for (i = lo; i <= hi; i++) {
1313 list_for_each_safe (ptmp, pnxt, &kranal_data.kra_peers[i]) {
1314 peer = list_entry(ptmp, kra_peer_t, rap_list);
1315 LASSERT (peer->rap_persistence > 0 ||
1316 !list_empty(&peer->rap_conns));
1318 if (!(nid == PTL_NID_ANY || peer->rap_nid == nid))
1321 kranal_del_peer_locked(peer, single_share);
1322 rc = 0; /* matched something */
1329 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
1335 kranal_get_conn_by_idx (int index)
1338 struct list_head *ptmp;
1340 struct list_head *ctmp;
1343 read_lock (&kranal_data.kra_global_lock);
1345 for (i = 0; i < kranal_data.kra_peer_hash_size; i++) {
1346 list_for_each (ptmp, &kranal_data.kra_peers[i]) {
1348 peer = list_entry(ptmp, kra_peer_t, rap_list);
1349 LASSERT (peer->rap_persistence > 0 ||
1350 !list_empty(&peer->rap_conns));
1352 list_for_each (ctmp, &peer->rap_conns) {
1356 conn = list_entry(ctmp, kra_conn_t, rac_list);
1357 CDEBUG(D_NET, "++conn[%p] -> "LPX64" (%d)\n",
1358 conn, conn->rac_peer->rap_nid,
1359 atomic_read(&conn->rac_refcount));
1360 atomic_inc(&conn->rac_refcount);
1361 read_unlock(&kranal_data.kra_global_lock);
1367 read_unlock(&kranal_data.kra_global_lock);
1372 kranal_close_peer_conns_locked (kra_peer_t *peer, int why)
1375 struct list_head *ctmp;
1376 struct list_head *cnxt;
1379 list_for_each_safe (ctmp, cnxt, &peer->rap_conns) {
1380 conn = list_entry(ctmp, kra_conn_t, rac_list);
1383 kranal_close_conn_locked(conn, why);
1390 kranal_close_stale_conns_locked (kra_peer_t *peer, __u64 incarnation)
1393 struct list_head *ctmp;
1394 struct list_head *cnxt;
1397 list_for_each_safe (ctmp, cnxt, &peer->rap_conns) {
1398 conn = list_entry(ctmp, kra_conn_t, rac_list);
1400 if (conn->rac_peer_incarnation == incarnation)
1403 CDEBUG(D_NET, "Closing stale conn nid:"LPX64" incarnation:"LPX64"("LPX64")\n",
1404 peer->rap_nid, conn->rac_peer_incarnation, incarnation);
1405 LASSERT (conn->rac_peer_incarnation < incarnation);
1408 kranal_close_conn_locked(conn, -ESTALE);
1415 kranal_close_matching_conns (ptl_nid_t nid)
1417 unsigned long flags;
1419 struct list_head *ptmp;
1420 struct list_head *pnxt;
1426 write_lock_irqsave(&kranal_data.kra_global_lock, flags);
1428 if (nid != PTL_NID_ANY)
1429 lo = hi = kranal_nid2peerlist(nid) - kranal_data.kra_peers;
1432 hi = kranal_data.kra_peer_hash_size - 1;
1435 for (i = lo; i <= hi; i++) {
1436 list_for_each_safe (ptmp, pnxt, &kranal_data.kra_peers[i]) {
1438 peer = list_entry(ptmp, kra_peer_t, rap_list);
1439 LASSERT (peer->rap_persistence > 0 ||
1440 !list_empty(&peer->rap_conns));
1442 if (!(nid == PTL_NID_ANY || nid == peer->rap_nid))
1445 count += kranal_close_peer_conns_locked(peer, 0);
1449 write_unlock_irqrestore(&kranal_data.kra_global_lock, flags);
1451 /* wildcards always succeed */
1452 if (nid == PTL_NID_ANY)
1455 return (count == 0) ? -ENOENT : 0;
1459 kranal_cmd(struct portals_cfg *pcfg, void * private)
1463 LASSERT (pcfg != NULL);
1465 switch(pcfg->pcfg_command) {
1466 case NAL_CMD_GET_PEER: {
1470 int share_count = 0;
1472 rc = kranal_get_peer_info(pcfg->pcfg_count,
1473 &nid, &ip, &port, &share_count);
1474 pcfg->pcfg_nid = nid;
1475 pcfg->pcfg_size = 0;
1477 pcfg->pcfg_misc = port;
1478 pcfg->pcfg_count = 0;
1479 pcfg->pcfg_wait = share_count;
1482 case NAL_CMD_ADD_PEER: {
1483 rc = kranal_add_persistent_peer(pcfg->pcfg_nid,
1484 pcfg->pcfg_id, /* IP */
1485 pcfg->pcfg_misc); /* port */
1488 case NAL_CMD_DEL_PEER: {
1489 rc = kranal_del_peer(pcfg->pcfg_nid,
1490 /* flags == single_share */
1491 pcfg->pcfg_flags != 0);
1494 case NAL_CMD_GET_CONN: {
1495 kra_conn_t *conn = kranal_get_conn_by_idx(pcfg->pcfg_count);
1501 pcfg->pcfg_nid = conn->rac_peer->rap_nid;
1503 pcfg->pcfg_misc = 0;
1504 pcfg->pcfg_flags = 0;
1505 kranal_conn_decref(conn);
1509 case NAL_CMD_CLOSE_CONNECTION: {
1510 rc = kranal_close_matching_conns(pcfg->pcfg_nid);
1513 case NAL_CMD_REGISTER_MYNID: {
1514 if (pcfg->pcfg_nid == PTL_NID_ANY)
1517 rc = kranal_set_mynid(pcfg->pcfg_nid);
1526 kranal_free_txdescs(struct list_head *freelist)
1530 while (!list_empty(freelist)) {
1531 tx = list_entry(freelist->next, kra_tx_t, tx_list);
1533 list_del(&tx->tx_list);
1534 PORTAL_FREE(tx->tx_phys, PTL_MD_MAX_IOV * sizeof(*tx->tx_phys));
1535 PORTAL_FREE(tx, sizeof(*tx));
1540 kranal_alloc_txdescs(struct list_head *freelist, int n)
1542 int isnblk = (freelist == &kranal_data.kra_idle_nblk_txs);
1546 LASSERT (freelist == &kranal_data.kra_idle_txs ||
1547 freelist == &kranal_data.kra_idle_nblk_txs);
1548 LASSERT (list_empty(freelist));
1550 for (i = 0; i < n; i++) {
1552 PORTAL_ALLOC(tx, sizeof(*tx));
1554 CERROR("Can't allocate %stx[%d]\n",
1555 isnblk ? "nblk " : "", i);
1556 kranal_free_txdescs(freelist);
1560 PORTAL_ALLOC(tx->tx_phys,
1561 PTL_MD_MAX_IOV * sizeof(*tx->tx_phys));
1562 if (tx->tx_phys == NULL) {
1563 CERROR("Can't allocate %stx[%d]->tx_phys\n",
1564 isnblk ? "nblk " : "", i);
1566 PORTAL_FREE(tx, sizeof(*tx));
1567 kranal_free_txdescs(freelist);
1571 tx->tx_isnblk = isnblk;
1572 tx->tx_buftype = RANAL_BUF_NONE;
1574 list_add(&tx->tx_list, freelist);
1581 kranal_device_init(int id, kra_device_t *dev)
1583 const int total_ntx = RANAL_NTX + RANAL_NTX_NBLK;
1587 rrc = RapkGetDeviceByIndex(id, kranal_device_callback,
1589 if (rrc != RAP_SUCCESS) {
1590 CERROR("Can't get Rapidarray Device %d: %d\n", id, rrc);
1594 rrc = RapkReserveRdma(dev->rad_handle, total_ntx);
1595 if (rrc != RAP_SUCCESS) {
1596 CERROR("Can't reserve %d RDMA descriptors"
1597 " for device %d: %d\n", total_ntx, id, rrc);
1601 rrc = RapkCreatePtag(dev->rad_handle,
1603 if (rrc != RAP_SUCCESS) {
1604 CERROR("Can't create ptag"
1605 " for device %d: %d\n", id, rrc);
1609 rrc = RapkCreateCQ(dev->rad_handle, total_ntx, dev->rad_ptag,
1611 if (rrc != RAP_SUCCESS) {
1612 CERROR("Can't create rdma cq size %d"
1613 " for device %d: %d\n", total_ntx, id, rrc);
1617 rrc = RapkCreateCQ(dev->rad_handle, RANAL_FMA_CQ_SIZE,
1618 dev->rad_ptag, &dev->rad_fma_cq);
1619 if (rrc != RAP_SUCCESS) {
1620 CERROR("Can't create fma cq size %d"
1621 " for device %d: %d\n", RANAL_FMA_CQ_SIZE, id, rrc);
1628 RapkDestroyCQ(dev->rad_handle, dev->rad_rdma_cq, dev->rad_ptag);
1630 RapkDestroyPtag(dev->rad_handle, dev->rad_ptag);
1632 RapkReleaseDevice(dev->rad_handle);
1638 kranal_device_fini(kra_device_t *dev)
1640 RapkDestroyCQ(dev->rad_handle, dev->rad_fma_cq, dev->rad_ptag);
1641 RapkDestroyCQ(dev->rad_handle, dev->rad_rdma_cq, dev->rad_ptag);
1642 RapkDestroyPtag(dev->rad_handle, dev->rad_ptag);
1643 RapkReleaseDevice(dev->rad_handle);
1647 kranal_api_shutdown (nal_t *nal)
1651 unsigned long flags;
1653 if (nal->nal_refct != 0) {
1654 /* This module got the first ref */
1655 PORTAL_MODULE_UNUSE;
1659 CDEBUG(D_MALLOC, "before NAL cleanup: kmem %d\n",
1660 atomic_read(&portal_kmemory));
1662 LASSERT (nal == &kranal_api);
1664 switch (kranal_data.kra_init) {
1666 CERROR("Unexpected state %d\n", kranal_data.kra_init);
1669 case RANAL_INIT_ALL:
1670 /* stop calls to nal_cmd */
1671 libcfs_nal_cmd_unregister(RANAL);
1672 /* No new persistent peers */
1674 /* resetting my NID to unadvertises me, removes my
1675 * listener and nukes all current peers */
1676 kranal_set_mynid(PTL_NID_ANY);
1677 /* no new peers or conns */
1679 /* Wait for all peer/conn state to clean up */
1681 while (atomic_read(&kranal_data.kra_nconns) != 0 ||
1682 atomic_read(&kranal_data.kra_npeers) != 0) {
1684 CDEBUG(((i & (-i)) == i) ? D_WARNING : D_NET, /* power of 2? */
1685 "waiting for %d peers and %d conns to close down\n",
1686 atomic_read(&kranal_data.kra_npeers),
1687 atomic_read(&kranal_data.kra_nconns));
1692 case RANAL_INIT_LIB:
1693 lib_fini(&kranal_lib);
1696 case RANAL_INIT_DATA:
1700 /* flag threads to terminate; wake and wait for them to die */
1701 kranal_data.kra_shutdown = 1;
1703 for (i = 0; i < kranal_data.kra_ndevs; i++) {
1704 kra_device_t *dev = &kranal_data.kra_devices[i];
1706 LASSERT (list_empty(&dev->rad_connq));
1708 spin_lock_irqsave(&dev->rad_lock, flags);
1709 wake_up(&dev->rad_waitq);
1710 spin_unlock_irqrestore(&dev->rad_lock, flags);
1713 spin_lock_irqsave(&kranal_data.kra_reaper_lock, flags);
1714 wake_up_all(&kranal_data.kra_reaper_waitq);
1715 spin_unlock_irqrestore(&kranal_data.kra_reaper_lock, flags);
1717 LASSERT (list_empty(&kranal_data.kra_connd_peers));
1718 spin_lock_irqsave(&kranal_data.kra_connd_lock, flags);
1719 wake_up_all(&kranal_data.kra_connd_waitq);
1720 spin_unlock_irqrestore(&kranal_data.kra_connd_lock, flags);
1723 while (atomic_read(&kranal_data.kra_nthreads) != 0) {
1725 CDEBUG(((i & (-i)) == i) ? D_WARNING : D_NET, /* power of 2? */
1726 "Waiting for %d threads to terminate\n",
1727 atomic_read(&kranal_data.kra_nthreads));
1731 LASSERT (atomic_read(&kranal_data.kra_npeers) == 0);
1732 if (kranal_data.kra_peers != NULL) {
1733 for (i = 0; i < kranal_data.kra_peer_hash_size; i++)
1734 LASSERT (list_empty(&kranal_data.kra_peers[i]));
1736 PORTAL_FREE(kranal_data.kra_peers,
1737 sizeof (struct list_head) *
1738 kranal_data.kra_peer_hash_size);
1741 LASSERT (atomic_read(&kranal_data.kra_nconns) == 0);
1742 if (kranal_data.kra_conns != NULL) {
1743 for (i = 0; i < kranal_data.kra_conn_hash_size; i++)
1744 LASSERT (list_empty(&kranal_data.kra_conns[i]));
1746 PORTAL_FREE(kranal_data.kra_conns,
1747 sizeof (struct list_head) *
1748 kranal_data.kra_conn_hash_size);
1751 for (i = 0; i < kranal_data.kra_ndevs; i++)
1752 kranal_device_fini(&kranal_data.kra_devices[i]);
1754 kranal_free_txdescs(&kranal_data.kra_idle_txs);
1755 kranal_free_txdescs(&kranal_data.kra_idle_nblk_txs);
1757 CDEBUG(D_MALLOC, "after NAL cleanup: kmem %d\n",
1758 atomic_read(&portal_kmemory));
1759 printk(KERN_INFO "Lustre: RapidArray NAL unloaded (final mem %d)\n",
1760 atomic_read(&portal_kmemory));
1762 kranal_data.kra_init = RANAL_INIT_NOTHING;
1766 kranal_api_startup (nal_t *nal, ptl_pid_t requested_pid,
1767 ptl_ni_limits_t *requested_limits,
1768 ptl_ni_limits_t *actual_limits)
1770 static int device_ids[] = {RAPK_MAIN_DEVICE_ID,
1771 RAPK_EXPANSION_DEVICE_ID};
1773 ptl_process_id_t process_id;
1774 int pkmem = atomic_read(&portal_kmemory);
1779 LASSERT (nal == &kranal_api);
1781 if (nal->nal_refct != 0) {
1782 if (actual_limits != NULL)
1783 *actual_limits = kranal_lib.libnal_ni.ni_actual_limits;
1784 /* This module got the first ref */
1789 LASSERT (kranal_data.kra_init == RANAL_INIT_NOTHING);
1791 memset(&kranal_data, 0, sizeof(kranal_data)); /* zero pointers, flags etc */
1793 /* CAVEAT EMPTOR: Every 'Fma' message includes the sender's NID and
1794 * a unique (for all time) incarnation so we can uniquely identify
1795 * the sender. The incarnation is an incrementing counter
1796 * initialised with seconds + microseconds at startup time. So we
1797 * rely on NOT creating connections more frequently on average than
1798 * 1MHz to ensure we don't use old incarnations when we reboot. */
1799 do_gettimeofday(&tv);
1800 kranal_data.kra_next_incarnation = (((__u64)tv.tv_sec) * 1000000) + tv.tv_usec;
1802 init_MUTEX(&kranal_data.kra_nid_mutex);
1803 init_MUTEX_LOCKED(&kranal_data.kra_listener_signal);
1805 rwlock_init(&kranal_data.kra_global_lock);
1807 for (i = 0; i < RANAL_MAXDEVS; i++ ) {
1808 kra_device_t *dev = &kranal_data.kra_devices[i];
1811 INIT_LIST_HEAD(&dev->rad_connq);
1812 init_waitqueue_head(&dev->rad_waitq);
1813 spin_lock_init(&dev->rad_lock);
1816 init_waitqueue_head(&kranal_data.kra_reaper_waitq);
1817 spin_lock_init(&kranal_data.kra_reaper_lock);
1819 INIT_LIST_HEAD(&kranal_data.kra_connd_peers);
1820 init_waitqueue_head(&kranal_data.kra_connd_waitq);
1821 spin_lock_init(&kranal_data.kra_connd_lock);
1823 INIT_LIST_HEAD(&kranal_data.kra_idle_txs);
1824 INIT_LIST_HEAD(&kranal_data.kra_idle_nblk_txs);
1825 init_waitqueue_head(&kranal_data.kra_idle_tx_waitq);
1826 spin_lock_init(&kranal_data.kra_tx_lock);
1828 /* OK to call kranal_api_shutdown() to cleanup now */
1829 kranal_data.kra_init = RANAL_INIT_DATA;
1831 kranal_data.kra_peer_hash_size = RANAL_PEER_HASH_SIZE;
1832 PORTAL_ALLOC(kranal_data.kra_peers,
1833 sizeof(struct list_head) * kranal_data.kra_peer_hash_size);
1834 if (kranal_data.kra_peers == NULL)
1837 for (i = 0; i < kranal_data.kra_peer_hash_size; i++)
1838 INIT_LIST_HEAD(&kranal_data.kra_peers[i]);
1840 kranal_data.kra_conn_hash_size = RANAL_PEER_HASH_SIZE;
1841 PORTAL_ALLOC(kranal_data.kra_conns,
1842 sizeof(struct list_head) * kranal_data.kra_conn_hash_size);
1843 if (kranal_data.kra_conns == NULL)
1846 for (i = 0; i < kranal_data.kra_conn_hash_size; i++)
1847 INIT_LIST_HEAD(&kranal_data.kra_conns[i]);
1849 rc = kranal_alloc_txdescs(&kranal_data.kra_idle_txs, RANAL_NTX);
1853 rc = kranal_alloc_txdescs(&kranal_data.kra_idle_nblk_txs,RANAL_NTX_NBLK);
1857 process_id.pid = requested_pid;
1858 process_id.nid = PTL_NID_ANY; /* don't know my NID yet */
1860 rc = lib_init(&kranal_lib, nal, process_id,
1861 requested_limits, actual_limits);
1863 CERROR("lib_init failed: error %d\n", rc);
1867 /* lib interface initialised */
1868 kranal_data.kra_init = RANAL_INIT_LIB;
1869 /*****************************************************/
1871 rc = kranal_thread_start(kranal_reaper, NULL);
1873 CERROR("Can't spawn ranal reaper: %d\n", rc);
1877 for (i = 0; i < RANAL_N_CONND; i++) {
1878 rc = kranal_thread_start(kranal_connd, (void *)i);
1880 CERROR("Can't spawn ranal connd[%d]: %d\n",
1886 LASSERT(kranal_data.kra_ndevs == 0);
1887 for (i = 0; i < sizeof(device_ids)/sizeof(device_ids[0]); i++) {
1888 dev = &kranal_data.kra_devices[kranal_data.kra_ndevs];
1890 rc = kranal_device_init(device_ids[i], dev);
1892 kranal_data.kra_ndevs++;
1894 rc = kranal_thread_start(kranal_scheduler, dev);
1896 CERROR("Can't spawn ranal scheduler[%d]: %d\n",
1902 if (kranal_data.kra_ndevs == 0)
1905 rc = libcfs_nal_cmd_register(RANAL, &kranal_cmd, NULL);
1907 CERROR("Can't initialise command interface (rc = %d)\n", rc);
1911 /* flag everything initialised */
1912 kranal_data.kra_init = RANAL_INIT_ALL;
1913 /*****************************************************/
1915 CDEBUG(D_MALLOC, "initial kmem %d\n", atomic_read(&portal_kmemory));
1916 printk(KERN_INFO "Lustre: RapidArray NAL loaded "
1917 "(initial mem %d)\n", pkmem);
1922 kranal_api_shutdown(&kranal_api);
1927 kranal_module_fini (void)
1929 #ifdef CONFIG_SYSCTL
1930 if (kranal_tunables.kra_sysctl != NULL)
1931 unregister_sysctl_table(kranal_tunables.kra_sysctl);
1933 PtlNIFini(kranal_ni);
1935 ptl_unregister_nal(RANAL);
1939 kranal_module_init (void)
1943 /* the following must be sizeof(int) for
1944 * proc_dointvec/kranal_listener_procint() */
1945 LASSERT (sizeof(kranal_tunables.kra_timeout) == sizeof(int));
1946 LASSERT (sizeof(kranal_tunables.kra_listener_timeout) == sizeof(int));
1947 LASSERT (sizeof(kranal_tunables.kra_backlog) == sizeof(int));
1948 LASSERT (sizeof(kranal_tunables.kra_port) == sizeof(int));
1949 LASSERT (sizeof(kranal_tunables.kra_max_immediate) == sizeof(int));
1951 kranal_api.nal_ni_init = kranal_api_startup;
1952 kranal_api.nal_ni_fini = kranal_api_shutdown;
1954 /* Initialise dynamic tunables to defaults once only */
1955 kranal_tunables.kra_timeout = RANAL_TIMEOUT;
1957 rc = ptl_register_nal(RANAL, &kranal_api);
1959 CERROR("Can't register RANAL: %d\n", rc);
1960 return -ENOMEM; /* or something... */
1963 /* Pure gateways want the NAL started up at module load time... */
1964 rc = PtlNIInit(RANAL, LUSTRE_SRV_PTL_PID, NULL, NULL, &kranal_ni);
1965 if (rc != PTL_OK && rc != PTL_IFACE_DUP) {
1966 ptl_unregister_nal(RANAL);
1970 #ifdef CONFIG_SYSCTL
1971 /* Press on regardless even if registering sysctl doesn't work */
1972 kranal_tunables.kra_sysctl =
1973 register_sysctl_table(kranal_top_ctl_table, 0);
1978 MODULE_AUTHOR("Cluster File Systems, Inc. <info@clusterfs.com>");
1979 MODULE_DESCRIPTION("Kernel RapidArray NAL v0.01");
1980 MODULE_LICENSE("GPL");
1982 module_init(kranal_module_init);
1983 module_exit(kranal_module_fini);