On 12/30/19 2:29 AM, Jack Wang wrote:
+MODULE_DESCRIPTION("RTRS Server");
Please expand the "RTRS" abbreviation in the module description.
+static void rtrs_srv_get_ops_ids(struct rtrs_srv_sess *sess)
+{
+ atomic_inc(&sess->ids_inflight);
+}
+
+static void rtrs_srv_put_ops_ids(struct rtrs_srv_sess *sess)
+{
+ if (atomic_dec_and_test(&sess->ids_inflight))
+ wake_up(&sess->ids_waitq);
+}
+
+static void rtrs_srv_wait_ops_ids(struct rtrs_srv_sess *sess)
+{
+ wait_event(sess->ids_waitq, !atomic_read(&sess->ids_inflight));
+}
So rtrs_srv_wait_ops_ids() returns without grabbing any synchronization
object? What guarantees that ids_inflight is not increased after
wait_event() has returned and before rtrs_srv_wait_ops_ids() returns?
+ /*
+ * From time to time we have to post signalled sends,
+ * or send queue will fill up and only QP reset can help.
+ */
+ flags = atomic_inc_return(&id->con->wr_cnt) % srv->queue_depth ?
+ 0 : IB_SEND_SIGNALED;
Should "signalled" perhaps be changed into "signaled"?
How can posting a signaled send prevent that the send queue overflows?
Isn't that something that can only be guaranteed by tracking the number
of WQE's in the send queue?
+/**
+ * send_io_resp_imm() - response with empty IMM on failed READ/WRITE requests or
+ * on successful WRITE request.
+ * @con the connection to send back result
+ * @id the id associated to io
+ * @errno the error number of the IO.
+ *
+ * Return 0 on success, errno otherwise.
+ */
Should "response ... on" perhaps be changed into "respond ... to"?
Should "associated to" perhaps be changed into "associated with"?
+static int map_cont_bufs(struct rtrs_srv_sess *sess)
A comment that explains what "cont" in this function name means would be
welcome.
+static inline int sockaddr_cmp(const struct sockaddr *a,
+ const struct sockaddr *b)
+{
+ switch (a->sa_family) {
+ case AF_IB:
+ return memcmp(&((struct sockaddr_ib *)a)->sib_addr,
+ &((struct sockaddr_ib *)b)->sib_addr,
+ sizeof(struct ib_addr));
+ case AF_INET:
+ return memcmp(&((struct sockaddr_in *)a)->sin_addr,
+ &((struct sockaddr_in *)b)->sin_addr,
+ sizeof(struct in_addr));
+ case AF_INET6:
+ return memcmp(&((struct sockaddr_in6 *)a)->sin6_addr,
+ &((struct sockaddr_in6 *)b)->sin6_addr,
+ sizeof(struct in6_addr));
+ default:
+ return -ENOENT;
+ }
+}
The memcmp() return value can be used to sort values. Since that is not
the case for the sockaddr_cmp() return value, please document this.
Additionally, it seems like a comparison of a->sa_family and
b->sa_family is missing?
+static int rtrs_rdma_do_accept(struct rtrs_srv_sess *sess,
+ struct rdma_cm_id *cm_id)
+{
+ struct rtrs_srv *srv = sess->srv;
+ struct rtrs_msg_conn_rsp msg;
+ struct rdma_conn_param param;
+ int err;
+
+ memset(¶m, 0, sizeof(param));
+ param.rnr_retry_count = 7;
+ param.private_data = &msg;
+ param.private_data_len = sizeof(msg);
+
+ memset(&msg, 0, sizeof(msg));
+ msg.magic = cpu_to_le16(RTRS_MAGIC);
+ msg.version = cpu_to_le16(RTRS_PROTO_VER);
+ msg.errno = 0;
+ msg.queue_depth = cpu_to_le16(srv->queue_depth);
+ msg.max_io_size = cpu_to_le32(max_chunk_size - MAX_HDR_SIZE);
+ msg.max_hdr_size = cpu_to_le32(MAX_HDR_SIZE);
+
+ if (always_invalidate)
+ msg.flags = cpu_to_le32(RTRS_MSG_NEW_RKEY_F);
+
+ err = rdma_accept(cm_id, ¶m);
+ if (err)
+ pr_err("rdma_accept(), err: %d\n", err);
+
+ return err;
+}
Please use a designated initializer list instead of memset() followed by
initialization of multiple structure members.
+static int rtrs_srv_rdma_init(struct rtrs_srv_ctx *ctx, unsigned int port)
+{
+ struct sockaddr_in6 sin = {
+ .sin6_family = AF_INET6,
+ .sin6_addr = IN6ADDR_ANY_INIT,
+ .sin6_port = htons(port),
+ };
+ struct sockaddr_ib sib = {
+ .sib_family = AF_IB,
+ .sib_addr.sib_subnet_prefix = 0ULL,
+ .sib_addr.sib_interface_id = 0ULL,
+ .sib_sid = cpu_to_be64(RDMA_IB_IP_PS_IB | port),
+ .sib_sid_mask = cpu_to_be64(0xffffffffffffffffULL),
+ .sib_pkey = cpu_to_be16(0xffff),
+ };
A minor comment: structure members that are zero do not have to be
initialized explicitly. The compiler does that automatically.
+struct rtrs_srv_ctx *rtrs_srv_open(rdma_ev_fn *rdma_ev, link_ev_fn *link_ev,
+ unsigned int port)
+{
+ struct rtrs_srv_ctx *ctx;
+ int err;
+
+ ctx = alloc_srv_ctx(rdma_ev, link_ev);
+ if (unlikely(!ctx))
+ return ERR_PTR(-ENOMEM);
+
+ err = rtrs_srv_rdma_init(ctx, port);
+ if (unlikely(err)) {
+ free_srv_ctx(ctx);
+ return ERR_PTR(err);
+ }
+ /* Do not let module be unloaded if server context is alive */
+ __module_get(THIS_MODULE);
+
+ return ctx;
+}
+EXPORT_SYMBOL(rtrs_srv_open);
Isn't it inconvenient for users if module unloading is prevented while
one or more connections are active? This requires users to figure out
how to trigger a log out if they want to unload a kernel module.
Additionally, how are users expected to prevent that the client relogins
after the server has told them to log out and before the server kernel
module is unloaded?
Thanks,
Bart.