2018-08-02 02:21:45 +00:00
|
|
|
/*-
|
|
|
|
* BSD LICENSE
|
|
|
|
*
|
2019-10-02 07:43:17 +00:00
|
|
|
* Copyright (c) Intel Corporation. All rights reserved.
|
|
|
|
* Copyright (c) 2019 Mellanox Technologies LTD. All rights reserved.
|
2018-08-02 02:21:45 +00:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* * Neither the name of Intel Corporation nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived
|
|
|
|
* from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "spdk/stdinc.h"
|
|
|
|
#include "spdk/crc32.h"
|
|
|
|
#include "spdk/endian.h"
|
|
|
|
#include "spdk/assert.h"
|
|
|
|
#include "spdk/thread.h"
|
|
|
|
#include "spdk/nvmf.h"
|
|
|
|
#include "spdk/nvmf_spec.h"
|
|
|
|
#include "spdk/sock.h"
|
|
|
|
#include "spdk/string.h"
|
|
|
|
#include "spdk/trace.h"
|
|
|
|
#include "spdk/util.h"
|
|
|
|
|
|
|
|
#include "nvmf_internal.h"
|
|
|
|
#include "transport.h"
|
|
|
|
|
2019-09-20 01:44:11 +00:00
|
|
|
#include "spdk_internal/assert.h"
|
2018-08-02 02:21:45 +00:00
|
|
|
#include "spdk_internal/log.h"
|
|
|
|
#include "spdk_internal/nvme_tcp.h"
|
|
|
|
|
|
|
|
#define NVMF_TCP_MAX_ACCEPT_SOCK_ONE_TIME 16
|
|
|
|
|
|
|
|
#define NVMF_TCP_PDU_MAX_H2C_DATA_SIZE 131072
|
|
|
|
#define NVMF_TCP_PDU_MAX_C2H_DATA_SIZE 131072
|
|
|
|
#define NVMF_TCP_QPAIR_MAX_C2H_PDU_NUM 64 /* Maximal c2h_data pdu number for ecah tqpair */
|
2019-07-15 12:58:16 +00:00
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_MAX_SOCK_PRIORITY 6
|
2019-08-12 11:44:22 +00:00
|
|
|
#define SPDK_NVMF_TCP_RECV_BUF_SIZE_FACTOR 4
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
/* spdk nvmf related structure */
|
|
|
|
enum spdk_nvmf_tcp_req_state {
|
|
|
|
|
|
|
|
/* The request is not currently in use */
|
|
|
|
TCP_REQUEST_STATE_FREE = 0,
|
|
|
|
|
|
|
|
/* Initial state when request first received */
|
|
|
|
TCP_REQUEST_STATE_NEW,
|
|
|
|
|
|
|
|
/* The request is queued until a data buffer is available. */
|
|
|
|
TCP_REQUEST_STATE_NEED_BUFFER,
|
|
|
|
|
|
|
|
/* The request is currently transferring data from the host to the controller. */
|
|
|
|
TCP_REQUEST_STATE_TRANSFERRING_HOST_TO_CONTROLLER,
|
|
|
|
|
|
|
|
/* The request is ready to execute at the block device */
|
|
|
|
TCP_REQUEST_STATE_READY_TO_EXECUTE,
|
|
|
|
|
|
|
|
/* The request is currently executing at the block device */
|
|
|
|
TCP_REQUEST_STATE_EXECUTING,
|
|
|
|
|
|
|
|
/* The request finished executing at the block device */
|
|
|
|
TCP_REQUEST_STATE_EXECUTED,
|
|
|
|
|
|
|
|
/* The request is ready to send a completion */
|
|
|
|
TCP_REQUEST_STATE_READY_TO_COMPLETE,
|
|
|
|
|
|
|
|
/* The request is currently transferring final pdus from the controller to the host. */
|
|
|
|
TCP_REQUEST_STATE_TRANSFERRING_CONTROLLER_TO_HOST,
|
|
|
|
|
|
|
|
/* The request completed and can be marked free. */
|
|
|
|
TCP_REQUEST_STATE_COMPLETED,
|
|
|
|
|
|
|
|
/* Terminator */
|
|
|
|
TCP_REQUEST_NUM_STATES,
|
|
|
|
};
|
|
|
|
|
2019-01-28 22:01:59 +00:00
|
|
|
static const char *spdk_nvmf_tcp_term_req_fes_str[] = {
|
2018-08-02 02:21:45 +00:00
|
|
|
"Invalid PDU Header Field",
|
|
|
|
"PDU Sequence Error",
|
|
|
|
"Header Digiest Error",
|
|
|
|
"Data Transfer Out of Range",
|
|
|
|
"R2T Limit Exceeded",
|
|
|
|
"Unsupported parameter",
|
|
|
|
};
|
|
|
|
|
|
|
|
#define OBJECT_NVMF_TCP_IO 0x80
|
|
|
|
|
2018-11-29 05:29:15 +00:00
|
|
|
#define TRACE_GROUP_NVMF_TCP 0x5
|
2018-08-02 02:21:45 +00:00
|
|
|
#define TRACE_TCP_REQUEST_STATE_NEW SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x0)
|
|
|
|
#define TRACE_TCP_REQUEST_STATE_NEED_BUFFER SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x1)
|
2019-05-27 12:45:58 +00:00
|
|
|
#define TRACE_TCP_REQUEST_STATE_TRANSFERRING_HOST_TO_CONTROLLER SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x2)
|
|
|
|
#define TRACE_TCP_REQUEST_STATE_READY_TO_EXECUTE SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x3)
|
|
|
|
#define TRACE_TCP_REQUEST_STATE_EXECUTING SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x4)
|
|
|
|
#define TRACE_TCP_REQUEST_STATE_EXECUTED SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x5)
|
|
|
|
#define TRACE_TCP_REQUEST_STATE_READY_TO_COMPLETE SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x6)
|
|
|
|
#define TRACE_TCP_REQUEST_STATE_TRANSFERRING_CONTROLLER_TO_HOST SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x7)
|
|
|
|
#define TRACE_TCP_REQUEST_STATE_COMPLETED SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x8)
|
|
|
|
#define TRACE_TCP_FLUSH_WRITEBUF_START SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0x9)
|
|
|
|
#define TRACE_TCP_FLUSH_WRITEBUF_DONE SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0xA)
|
|
|
|
#define TRACE_TCP_READ_FROM_SOCKET_DONE SPDK_TPOINT_ID(TRACE_GROUP_NVMF_TCP, 0xB)
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2018-11-29 08:11:57 +00:00
|
|
|
SPDK_TRACE_REGISTER_FN(nvmf_tcp_trace, "nvmf_tcp", TRACE_GROUP_NVMF_TCP)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
spdk_trace_register_object(OBJECT_NVMF_TCP_IO, 'r');
|
2019-04-30 20:45:03 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_NEW",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_NEW,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 1, 1, "");
|
2019-04-30 20:45:03 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_NEED_BUFFER",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_NEED_BUFFER,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 0, 1, "");
|
2019-04-30 20:45:03 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_TX_H_TO_C",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_TRANSFERRING_HOST_TO_CONTROLLER,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 0, 1, "");
|
2019-04-30 20:45:03 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_RDY_TO_EXECUTE",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_READY_TO_EXECUTE,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 0, 1, "");
|
2019-04-30 20:45:03 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_EXECUTING",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_EXECUTING,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 0, 1, "");
|
2019-04-30 20:45:03 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_EXECUTED",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_EXECUTED,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 0, 1, "");
|
2019-04-30 20:45:03 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_RDY_TO_COMPLETE",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_READY_TO_COMPLETE,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 0, 1, "");
|
2019-04-30 20:45:07 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_TRANSFER_C2H",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_TRANSFERRING_CONTROLLER_TO_HOST,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 0, 1, "");
|
2019-04-30 20:45:03 +00:00
|
|
|
spdk_trace_register_description("TCP_REQ_COMPLETED",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_REQUEST_STATE_COMPLETED,
|
|
|
|
OWNER_NONE, OBJECT_NVMF_TCP_IO, 0, 1, "");
|
2019-04-30 20:45:07 +00:00
|
|
|
spdk_trace_register_description("TCP_WRITE_START",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_FLUSH_WRITEBUF_START,
|
|
|
|
OWNER_NONE, OBJECT_NONE, 0, 0, "");
|
2019-04-30 20:45:07 +00:00
|
|
|
spdk_trace_register_description("TCP_WRITE_DONE",
|
2018-08-02 02:21:45 +00:00
|
|
|
TRACE_TCP_FLUSH_WRITEBUF_DONE,
|
|
|
|
OWNER_NONE, OBJECT_NONE, 0, 0, "");
|
2019-04-30 20:45:07 +00:00
|
|
|
spdk_trace_register_description("TCP_READ_DONE",
|
2019-04-17 21:50:44 +00:00
|
|
|
TRACE_TCP_READ_FROM_SOCKET_DONE,
|
|
|
|
OWNER_NONE, OBJECT_NONE, 0, 0, "");
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req {
|
2018-08-02 02:21:45 +00:00
|
|
|
struct spdk_nvmf_request req;
|
|
|
|
struct spdk_nvme_cpl rsp;
|
|
|
|
struct spdk_nvme_cmd cmd;
|
|
|
|
|
|
|
|
/* In-capsule data buffer */
|
|
|
|
uint8_t *buf;
|
|
|
|
|
2019-07-05 10:11:46 +00:00
|
|
|
bool has_incapsule_data;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
/* transfer_tag */
|
|
|
|
uint16_t ttag;
|
|
|
|
|
2019-07-05 10:11:46 +00:00
|
|
|
enum spdk_nvmf_tcp_req_state state;
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
/*
|
|
|
|
* next_expected_r2t_offset is used when we receive the h2c_data PDU.
|
|
|
|
*/
|
|
|
|
uint32_t next_expected_r2t_offset;
|
|
|
|
uint32_t r2tl_remain;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* c2h_data_offset is used when we send the c2h_data PDU.
|
|
|
|
*/
|
|
|
|
uint32_t c2h_data_offset;
|
|
|
|
uint32_t c2h_data_pdu_num;
|
|
|
|
|
2019-08-29 00:42:26 +00:00
|
|
|
STAILQ_ENTRY(spdk_nvmf_tcp_req) link;
|
2019-01-28 22:25:22 +00:00
|
|
|
TAILQ_ENTRY(spdk_nvmf_tcp_req) state_link;
|
2018-08-02 02:21:45 +00:00
|
|
|
};
|
|
|
|
|
2019-08-12 11:44:22 +00:00
|
|
|
struct nvme_tcp_pdu_recv_buf {
|
|
|
|
char *buf;
|
|
|
|
uint32_t off;
|
|
|
|
uint32_t size;
|
|
|
|
uint32_t remain_size;
|
|
|
|
};
|
|
|
|
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair {
|
2018-08-02 02:21:45 +00:00
|
|
|
struct spdk_nvmf_qpair qpair;
|
2019-01-28 21:02:47 +00:00
|
|
|
struct spdk_nvmf_tcp_poll_group *group;
|
2018-08-02 02:21:45 +00:00
|
|
|
struct spdk_nvmf_tcp_port *port;
|
|
|
|
struct spdk_sock *sock;
|
|
|
|
struct spdk_poller *flush_poller;
|
|
|
|
|
|
|
|
enum nvme_tcp_pdu_recv_state recv_state;
|
|
|
|
enum nvme_tcp_qpair_state state;
|
|
|
|
|
|
|
|
struct nvme_tcp_pdu pdu_in_progress;
|
2019-08-12 11:44:22 +00:00
|
|
|
struct nvme_tcp_pdu_recv_buf pdu_recv_buf;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
TAILQ_HEAD(, nvme_tcp_pdu) send_queue;
|
|
|
|
TAILQ_HEAD(, nvme_tcp_pdu) free_queue;
|
|
|
|
|
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
struct nvme_tcp_pdu *pdu_pool;
|
|
|
|
uint16_t free_pdu_num;
|
|
|
|
|
|
|
|
/* Queues to track the requests in all states */
|
2019-01-28 22:25:22 +00:00
|
|
|
TAILQ_HEAD(, spdk_nvmf_tcp_req) state_queue[TCP_REQUEST_NUM_STATES];
|
2018-08-02 02:21:45 +00:00
|
|
|
/* Number of requests in each state */
|
|
|
|
int32_t state_cntr[TCP_REQUEST_NUM_STATES];
|
|
|
|
|
2019-08-29 00:42:26 +00:00
|
|
|
STAILQ_HEAD(, spdk_nvmf_tcp_req) queued_c2h_data_tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
uint8_t cpda;
|
|
|
|
|
|
|
|
/* Array of size "max_queue_depth * InCapsuleDataSize" containing
|
|
|
|
* buffers to be used for in capsule data.
|
|
|
|
*/
|
|
|
|
void *buf;
|
|
|
|
void *bufs;
|
2019-02-28 08:13:40 +00:00
|
|
|
struct spdk_nvmf_tcp_req *req;
|
|
|
|
struct spdk_nvmf_tcp_req *reqs;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
bool host_hdgst_enable;
|
|
|
|
bool host_ddgst_enable;
|
|
|
|
|
|
|
|
|
|
|
|
/* The maximum number of I/O outstanding on this connection at one time */
|
|
|
|
uint16_t max_queue_depth;
|
|
|
|
|
|
|
|
|
|
|
|
/** Specifies the maximum number of PDU-Data bytes per H2C Data Transfer PDU */
|
|
|
|
uint32_t maxh2cdata;
|
|
|
|
|
|
|
|
uint32_t c2h_data_pdu_cnt;
|
|
|
|
|
|
|
|
/* IP address */
|
|
|
|
char initiator_addr[SPDK_NVMF_TRADDR_MAX_LEN];
|
|
|
|
char target_addr[SPDK_NVMF_TRADDR_MAX_LEN];
|
|
|
|
|
|
|
|
/* IP port */
|
|
|
|
uint16_t initiator_port;
|
|
|
|
uint16_t target_port;
|
|
|
|
|
2019-01-17 10:18:16 +00:00
|
|
|
/* Timer used to destroy qpair after detecting transport error issue if initiator does
|
|
|
|
* not close the connection.
|
|
|
|
*/
|
|
|
|
struct spdk_poller *timeout_poller;
|
|
|
|
|
|
|
|
TAILQ_ENTRY(spdk_nvmf_tcp_qpair) link;
|
2018-08-02 02:21:45 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct spdk_nvmf_tcp_poll_group {
|
|
|
|
struct spdk_nvmf_transport_poll_group group;
|
|
|
|
struct spdk_sock_group *sock_group;
|
2019-01-28 21:02:47 +00:00
|
|
|
|
|
|
|
TAILQ_HEAD(, spdk_nvmf_tcp_qpair) qpairs;
|
2018-08-02 02:21:45 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct spdk_nvmf_tcp_port {
|
|
|
|
struct spdk_nvme_transport_id trid;
|
|
|
|
struct spdk_sock *listen_sock;
|
|
|
|
uint32_t ref;
|
|
|
|
TAILQ_ENTRY(spdk_nvmf_tcp_port) link;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct spdk_nvmf_tcp_transport {
|
|
|
|
struct spdk_nvmf_transport transport;
|
|
|
|
|
|
|
|
pthread_mutex_t lock;
|
|
|
|
|
|
|
|
TAILQ_HEAD(, spdk_nvmf_tcp_port) ports;
|
|
|
|
};
|
|
|
|
|
|
|
|
static bool spdk_nvmf_tcp_req_process(struct spdk_nvmf_tcp_transport *ttransport,
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req);
|
2019-01-28 22:32:30 +00:00
|
|
|
static void spdk_nvmf_tcp_handle_pending_c2h_data_queue(struct spdk_nvmf_tcp_qpair *tqpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
static void
|
2019-01-28 22:25:22 +00:00
|
|
|
spdk_nvmf_tcp_req_set_state(struct spdk_nvmf_tcp_req *tcp_req,
|
2018-08-02 02:21:45 +00:00
|
|
|
enum spdk_nvmf_tcp_req_state state)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_qpair *qpair;
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
qpair = tcp_req->req.qpair;
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = SPDK_CONTAINEROF(qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
TAILQ_REMOVE(&tqpair->state_queue[tcp_req->state], tcp_req, state_link);
|
|
|
|
tqpair->state_cntr[tcp_req->state]--;
|
|
|
|
assert(tqpair->state_cntr[tcp_req->state] >= 0);
|
|
|
|
|
|
|
|
TAILQ_INSERT_TAIL(&tqpair->state_queue[state], tcp_req, state_link);
|
|
|
|
tqpair->state_cntr[state]++;
|
|
|
|
|
|
|
|
tcp_req->state = state;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct nvme_tcp_pdu *
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_pdu_get(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
|
|
|
|
pdu = TAILQ_FIRST(&tqpair->free_queue);
|
|
|
|
if (!pdu) {
|
|
|
|
SPDK_ERRLOG("Unable to get PDU for tqpair=%p\n", tqpair);
|
|
|
|
abort();
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
tqpair->free_pdu_num--;
|
|
|
|
TAILQ_REMOVE(&tqpair->free_queue, pdu, tailq);
|
|
|
|
memset(pdu, 0, sizeof(*pdu));
|
2019-10-01 20:47:30 +00:00
|
|
|
pdu->qpair = tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
pdu->ref = 1;
|
2019-08-20 07:38:24 +00:00
|
|
|
pdu->hdr = &pdu->hdr_mem;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
return pdu;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_pdu_put(struct spdk_nvmf_tcp_qpair *tqpair, struct nvme_tcp_pdu *pdu)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
if (!pdu) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
assert(pdu->ref > 0);
|
|
|
|
|
|
|
|
pdu->ref--;
|
|
|
|
if (pdu->ref == 0) {
|
|
|
|
tqpair->free_pdu_num++;
|
|
|
|
TAILQ_INSERT_HEAD(&tqpair->free_queue, pdu, tailq);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-28 22:25:22 +00:00
|
|
|
static struct spdk_nvmf_tcp_req *
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_req_get(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
tcp_req = TAILQ_FIRST(&tqpair->state_queue[TCP_REQUEST_STATE_FREE]);
|
|
|
|
if (!tcp_req) {
|
|
|
|
SPDK_ERRLOG("Cannot allocate tcp_req on tqpair=%p\n", tqpair);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&tcp_req->cmd, 0, sizeof(tcp_req->cmd));
|
|
|
|
memset(&tcp_req->rsp, 0, sizeof(tcp_req->rsp));
|
|
|
|
tcp_req->next_expected_r2t_offset = 0;
|
|
|
|
tcp_req->r2tl_remain = 0;
|
|
|
|
tcp_req->c2h_data_offset = 0;
|
2018-12-04 15:00:44 +00:00
|
|
|
tcp_req->has_incapsule_data = false;
|
2019-10-02 07:43:17 +00:00
|
|
|
memset(&tcp_req->req.dif, 0, sizeof(tcp_req->req.dif));
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_NEW);
|
|
|
|
return tcp_req;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:25:22 +00:00
|
|
|
nvmf_tcp_request_free(struct spdk_nvmf_tcp_req *tcp_req)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
|
|
|
|
|
|
|
if (!tcp_req) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "tcp_req=%p will be freed\n", tcp_req);
|
|
|
|
ttransport = SPDK_CONTAINEROF(tcp_req->req.qpair->transport,
|
|
|
|
struct spdk_nvmf_tcp_transport, transport);
|
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_COMPLETED);
|
|
|
|
spdk_nvmf_tcp_req_process(ttransport, tcp_req);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_req_free(struct spdk_nvmf_request *req)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req = SPDK_CONTAINEROF(req, struct spdk_nvmf_tcp_req, req);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
nvmf_tcp_request_free(tcp_req);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_drain_state_queue(struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
enum spdk_nvmf_tcp_req_state state)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req, *req_tmp;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
TAILQ_FOREACH_SAFE(tcp_req, &tqpair->state_queue[state], state_link, req_tmp) {
|
|
|
|
nvmf_tcp_request_free(tcp_req);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_cleanup_all_states(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req, *req_tmp;
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu, *tmp_pdu;
|
|
|
|
|
2019-01-17 14:42:49 +00:00
|
|
|
/* Free the pdus in the send_queue */
|
2018-08-02 02:21:45 +00:00
|
|
|
TAILQ_FOREACH_SAFE(pdu, &tqpair->send_queue, tailq, tmp_pdu) {
|
|
|
|
TAILQ_REMOVE(&tqpair->send_queue, pdu, tailq);
|
2019-01-17 14:42:49 +00:00
|
|
|
/* Also check the pdu type, we need to calculte the c2h_data_pdu_cnt later */
|
2019-08-20 07:38:24 +00:00
|
|
|
if (pdu->hdr->common.pdu_type == SPDK_NVME_TCP_PDU_TYPE_C2H_DATA) {
|
2019-01-17 14:42:49 +00:00
|
|
|
assert(tqpair->c2h_data_pdu_cnt > 0);
|
|
|
|
tqpair->c2h_data_pdu_cnt--;
|
|
|
|
}
|
2019-01-28 22:30:14 +00:00
|
|
|
spdk_nvmf_tcp_pdu_put(tqpair, pdu);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
2019-08-29 00:42:26 +00:00
|
|
|
while (!STAILQ_EMPTY(&tqpair->queued_c2h_data_tcp_req)) {
|
|
|
|
STAILQ_REMOVE_HEAD(&tqpair->queued_c2h_data_tcp_req, link);
|
2019-01-17 14:42:49 +00:00
|
|
|
}
|
|
|
|
spdk_nvmf_tcp_drain_state_queue(tqpair, TCP_REQUEST_STATE_TRANSFERRING_CONTROLLER_TO_HOST);
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_drain_state_queue(tqpair, TCP_REQUEST_STATE_NEW);
|
|
|
|
|
|
|
|
/* Wipe the requests waiting for buffer from the global list */
|
2018-12-05 14:49:21 +00:00
|
|
|
TAILQ_FOREACH_SAFE(tcp_req, &tqpair->state_queue[TCP_REQUEST_STATE_NEED_BUFFER], state_link,
|
|
|
|
req_tmp) {
|
2019-09-02 06:00:58 +00:00
|
|
|
STAILQ_REMOVE(&tqpair->group->group.pending_buf_queue, &tcp_req->req,
|
|
|
|
spdk_nvmf_request, buf_link);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
spdk_nvmf_tcp_drain_state_queue(tqpair, TCP_REQUEST_STATE_NEED_BUFFER);
|
|
|
|
spdk_nvmf_tcp_drain_state_queue(tqpair, TCP_REQUEST_STATE_EXECUTING);
|
|
|
|
spdk_nvmf_tcp_drain_state_queue(tqpair, TCP_REQUEST_STATE_TRANSFERRING_HOST_TO_CONTROLLER);
|
|
|
|
}
|
|
|
|
|
2019-01-17 14:23:38 +00:00
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
nvmf_tcp_dump_qpair_req_contents(struct spdk_nvmf_tcp_qpair *tqpair)
|
2019-01-17 14:23:38 +00:00
|
|
|
{
|
|
|
|
int i;
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2019-01-17 14:23:38 +00:00
|
|
|
|
|
|
|
SPDK_ERRLOG("Dumping contents of queue pair (QID %d)\n", tqpair->qpair.qid);
|
|
|
|
for (i = 1; i < TCP_REQUEST_NUM_STATES; i++) {
|
|
|
|
SPDK_ERRLOG("\tNum of requests in state[%d] = %d\n", i, tqpair->state_cntr[i]);
|
|
|
|
TAILQ_FOREACH(tcp_req, &tqpair->state_queue[i], state_link) {
|
2019-08-22 22:45:07 +00:00
|
|
|
SPDK_ERRLOG("\t\tRequest Data From Pool: %d\n", tcp_req->req.data_from_pool);
|
2019-01-17 14:23:38 +00:00
|
|
|
SPDK_ERRLOG("\t\tRequest opcode: %d\n", tcp_req->req.cmd->nvmf_cmd.opcode);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_qpair_destroy(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
2019-01-17 14:23:38 +00:00
|
|
|
int err = 0;
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "enter\n");
|
|
|
|
|
|
|
|
spdk_poller_unregister(&tqpair->flush_poller);
|
|
|
|
spdk_sock_close(&tqpair->sock);
|
|
|
|
spdk_nvmf_tcp_cleanup_all_states(tqpair);
|
|
|
|
|
|
|
|
if (tqpair->free_pdu_num != (tqpair->max_queue_depth + NVMF_TCP_QPAIR_MAX_C2H_PDU_NUM)) {
|
|
|
|
SPDK_ERRLOG("tqpair(%p) free pdu pool num is %u but should be %u\n", tqpair,
|
|
|
|
tqpair->free_pdu_num,
|
|
|
|
(tqpair->max_queue_depth + NVMF_TCP_QPAIR_MAX_C2H_PDU_NUM));
|
2019-01-17 14:23:38 +00:00
|
|
|
err++;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (tqpair->state_cntr[TCP_REQUEST_STATE_FREE] != tqpair->max_queue_depth) {
|
|
|
|
SPDK_ERRLOG("tqpair(%p) free tcp request num is %u but should be %u\n", tqpair,
|
|
|
|
tqpair->state_cntr[TCP_REQUEST_STATE_FREE],
|
|
|
|
tqpair->max_queue_depth);
|
2019-01-17 14:23:38 +00:00
|
|
|
err++;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (tqpair->c2h_data_pdu_cnt != 0) {
|
|
|
|
SPDK_ERRLOG("tqpair(%p) free c2h_data_pdu cnt is %u but should be 0\n", tqpair,
|
|
|
|
tqpair->c2h_data_pdu_cnt);
|
2019-01-17 14:23:38 +00:00
|
|
|
err++;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
2019-01-17 14:23:38 +00:00
|
|
|
if (err > 0) {
|
|
|
|
nvmf_tcp_dump_qpair_req_contents(tqpair);
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
free(tqpair->pdu);
|
|
|
|
free(tqpair->pdu_pool);
|
|
|
|
free(tqpair->req);
|
|
|
|
free(tqpair->reqs);
|
2019-06-26 09:20:32 +00:00
|
|
|
spdk_free(tqpair->buf);
|
|
|
|
spdk_free(tqpair->bufs);
|
2019-08-12 11:44:22 +00:00
|
|
|
free(tqpair->pdu_recv_buf.buf);
|
2018-08-02 02:21:45 +00:00
|
|
|
free(tqpair);
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Leave\n");
|
|
|
|
}
|
|
|
|
|
2019-01-07 18:07:59 +00:00
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_destroy(struct spdk_nvmf_transport *transport)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
|
|
|
|
|
|
|
assert(transport != NULL);
|
|
|
|
ttransport = SPDK_CONTAINEROF(transport, struct spdk_nvmf_tcp_transport, transport);
|
|
|
|
|
|
|
|
pthread_mutex_destroy(&ttransport->lock);
|
|
|
|
free(ttransport);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static struct spdk_nvmf_transport *
|
|
|
|
spdk_nvmf_tcp_create(struct spdk_nvmf_transport_opts *opts)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
2018-12-14 14:49:44 +00:00
|
|
|
uint32_t sge_count;
|
2019-01-07 18:07:59 +00:00
|
|
|
uint32_t min_shared_buffers;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
ttransport = calloc(1, sizeof(*ttransport));
|
|
|
|
if (!ttransport) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_INIT(&ttransport->ports);
|
|
|
|
|
|
|
|
ttransport->transport.ops = &spdk_nvmf_transport_tcp;
|
|
|
|
|
|
|
|
SPDK_NOTICELOG("*** TCP Transport Init ***\n");
|
|
|
|
|
2018-12-14 14:49:44 +00:00
|
|
|
SPDK_INFOLOG(SPDK_LOG_NVMF_TCP, "*** TCP Transport Init ***\n"
|
|
|
|
" Transport opts: max_ioq_depth=%d, max_io_size=%d,\n"
|
|
|
|
" max_qpairs_per_ctrlr=%d, io_unit_size=%d,\n"
|
2018-12-14 14:29:48 +00:00
|
|
|
" in_capsule_data_size=%d, max_aq_depth=%d\n"
|
2019-06-26 07:45:25 +00:00
|
|
|
" num_shared_buffers=%d, c2h_success=%d,\n"
|
2019-07-15 12:58:16 +00:00
|
|
|
" dif_insert_or_strip=%d, sock_priority=%d\n",
|
2018-12-14 14:49:44 +00:00
|
|
|
opts->max_queue_depth,
|
|
|
|
opts->max_io_size,
|
|
|
|
opts->max_qpairs_per_ctrlr,
|
|
|
|
opts->io_unit_size,
|
|
|
|
opts->in_capsule_data_size,
|
2018-12-14 14:29:48 +00:00
|
|
|
opts->max_aq_depth,
|
2019-06-11 15:07:28 +00:00
|
|
|
opts->num_shared_buffers,
|
2019-06-26 07:45:25 +00:00
|
|
|
opts->c2h_success,
|
2019-07-15 12:58:16 +00:00
|
|
|
opts->dif_insert_or_strip,
|
|
|
|
opts->sock_priority);
|
|
|
|
|
|
|
|
if (opts->sock_priority > SPDK_NVMF_TCP_DEFAULT_MAX_SOCK_PRIORITY) {
|
|
|
|
SPDK_ERRLOG("Unsupported socket_priority=%d, the current range is: 0 to %d\n"
|
|
|
|
"you can use man 7 socket to view the range of priority under SO_PRIORITY item\n",
|
|
|
|
opts->sock_priority, SPDK_NVMF_TCP_DEFAULT_MAX_SOCK_PRIORITY);
|
|
|
|
free(ttransport);
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
/* I/O unit size cannot be larger than max I/O size */
|
2018-12-14 14:49:44 +00:00
|
|
|
if (opts->io_unit_size > opts->max_io_size) {
|
|
|
|
opts->io_unit_size = opts->max_io_size;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
2018-12-14 14:49:44 +00:00
|
|
|
sge_count = opts->max_io_size / opts->io_unit_size;
|
2018-08-02 02:21:45 +00:00
|
|
|
if (sge_count > SPDK_NVMF_MAX_SGL_ENTRIES) {
|
2018-12-14 14:49:44 +00:00
|
|
|
SPDK_ERRLOG("Unsupported IO Unit size specified, %d bytes\n", opts->io_unit_size);
|
2018-08-02 02:21:45 +00:00
|
|
|
free(ttransport);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2019-01-07 18:07:59 +00:00
|
|
|
min_shared_buffers = spdk_thread_get_count() * opts->buf_cache_size;
|
|
|
|
if (min_shared_buffers > opts->num_shared_buffers) {
|
|
|
|
SPDK_ERRLOG("There are not enough buffers to satisfy"
|
|
|
|
"per-poll group caches for each thread. (%" PRIu32 ")"
|
|
|
|
"supplied. (%" PRIu32 ") required\n", opts->num_shared_buffers, min_shared_buffers);
|
|
|
|
SPDK_ERRLOG("Please specify a larger number of shared buffers\n");
|
|
|
|
spdk_nvmf_tcp_destroy(&ttransport->transport);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-11-20 14:37:25 +00:00
|
|
|
pthread_mutex_init(&ttransport->lock, NULL);
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
return &ttransport->transport;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
_spdk_nvmf_tcp_trsvcid_to_int(const char *trsvcid)
|
|
|
|
{
|
|
|
|
unsigned long long ull;
|
|
|
|
char *end = NULL;
|
|
|
|
|
|
|
|
ull = strtoull(trsvcid, &end, 10);
|
|
|
|
if (end == NULL || end == trsvcid || *end != '\0') {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Valid TCP/IP port numbers are in [0, 65535] */
|
|
|
|
if (ull > 65535) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (int)ull;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Canonicalize a listen address trid.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
_spdk_nvmf_tcp_canon_listen_trid(struct spdk_nvme_transport_id *canon_trid,
|
|
|
|
const struct spdk_nvme_transport_id *trid)
|
|
|
|
{
|
|
|
|
int trsvcid_int;
|
|
|
|
|
|
|
|
trsvcid_int = _spdk_nvmf_tcp_trsvcid_to_int(trid->trsvcid);
|
|
|
|
if (trsvcid_int < 0) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(canon_trid, 0, sizeof(*canon_trid));
|
|
|
|
canon_trid->trtype = SPDK_NVME_TRANSPORT_TCP;
|
|
|
|
canon_trid->adrfam = trid->adrfam;
|
|
|
|
snprintf(canon_trid->traddr, sizeof(canon_trid->traddr), "%s", trid->traddr);
|
|
|
|
snprintf(canon_trid->trsvcid, sizeof(canon_trid->trsvcid), "%d", trsvcid_int);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Find an existing listening port.
|
|
|
|
*
|
|
|
|
* Caller must hold ttransport->lock.
|
|
|
|
*/
|
|
|
|
static struct spdk_nvmf_tcp_port *
|
|
|
|
_spdk_nvmf_tcp_find_port(struct spdk_nvmf_tcp_transport *ttransport,
|
|
|
|
const struct spdk_nvme_transport_id *trid)
|
|
|
|
{
|
|
|
|
struct spdk_nvme_transport_id canon_trid;
|
|
|
|
struct spdk_nvmf_tcp_port *port;
|
|
|
|
|
|
|
|
if (_spdk_nvmf_tcp_canon_listen_trid(&canon_trid, trid) != 0) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_FOREACH(port, &ttransport->ports, link) {
|
|
|
|
if (spdk_nvme_transport_id_compare(&canon_trid, &port->trid) == 0) {
|
|
|
|
return port;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_listen(struct spdk_nvmf_transport *transport,
|
|
|
|
const struct spdk_nvme_transport_id *trid)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
|
|
|
struct spdk_nvmf_tcp_port *port;
|
|
|
|
int trsvcid_int;
|
|
|
|
uint8_t adrfam;
|
|
|
|
|
|
|
|
ttransport = SPDK_CONTAINEROF(transport, struct spdk_nvmf_tcp_transport, transport);
|
|
|
|
|
|
|
|
trsvcid_int = _spdk_nvmf_tcp_trsvcid_to_int(trid->trsvcid);
|
|
|
|
if (trsvcid_int < 0) {
|
|
|
|
SPDK_ERRLOG("Invalid trsvcid '%s'\n", trid->trsvcid);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_lock(&ttransport->lock);
|
|
|
|
|
|
|
|
port = _spdk_nvmf_tcp_find_port(ttransport, trid);
|
|
|
|
if (port) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Already listening on %s port %s\n",
|
|
|
|
trid->traddr, trid->trsvcid);
|
|
|
|
port->ref++;
|
|
|
|
pthread_mutex_unlock(&ttransport->lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
port = calloc(1, sizeof(*port));
|
|
|
|
if (!port) {
|
|
|
|
SPDK_ERRLOG("Port allocation failed\n");
|
|
|
|
free(port);
|
|
|
|
pthread_mutex_unlock(&ttransport->lock);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
port->ref = 1;
|
|
|
|
|
|
|
|
if (_spdk_nvmf_tcp_canon_listen_trid(&port->trid, trid) != 0) {
|
|
|
|
SPDK_ERRLOG("Invalid traddr %s / trsvcid %s\n",
|
|
|
|
trid->traddr, trid->trsvcid);
|
|
|
|
free(port);
|
|
|
|
pthread_mutex_unlock(&ttransport->lock);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
port->listen_sock = spdk_sock_listen(trid->traddr, trsvcid_int);
|
|
|
|
if (port->listen_sock == NULL) {
|
|
|
|
SPDK_ERRLOG("spdk_sock_listen(%s, %d) failed: %s (%d)\n",
|
|
|
|
trid->traddr, trsvcid_int,
|
|
|
|
spdk_strerror(errno), errno);
|
|
|
|
free(port);
|
|
|
|
pthread_mutex_unlock(&ttransport->lock);
|
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (spdk_sock_is_ipv4(port->listen_sock)) {
|
|
|
|
adrfam = SPDK_NVMF_ADRFAM_IPV4;
|
|
|
|
} else if (spdk_sock_is_ipv6(port->listen_sock)) {
|
|
|
|
adrfam = SPDK_NVMF_ADRFAM_IPV6;
|
|
|
|
} else {
|
|
|
|
SPDK_ERRLOG("Unhandled socket type\n");
|
|
|
|
adrfam = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (adrfam != trid->adrfam) {
|
|
|
|
SPDK_ERRLOG("Socket address family mismatch\n");
|
|
|
|
spdk_sock_close(&port->listen_sock);
|
|
|
|
free(port);
|
|
|
|
pthread_mutex_unlock(&ttransport->lock);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
SPDK_NOTICELOG("*** NVMe/TCP Target Listening on %s port %d ***\n",
|
|
|
|
trid->traddr, trsvcid_int);
|
|
|
|
|
|
|
|
TAILQ_INSERT_TAIL(&ttransport->ports, port, link);
|
|
|
|
pthread_mutex_unlock(&ttransport->lock);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_stop_listen(struct spdk_nvmf_transport *transport,
|
|
|
|
const struct spdk_nvme_transport_id *trid)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
|
|
|
struct spdk_nvmf_tcp_port *port;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
ttransport = SPDK_CONTAINEROF(transport, struct spdk_nvmf_tcp_transport, transport);
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Removing listen address %s port %s\n",
|
|
|
|
trid->traddr, trid->trsvcid);
|
|
|
|
|
|
|
|
pthread_mutex_lock(&ttransport->lock);
|
|
|
|
port = _spdk_nvmf_tcp_find_port(ttransport, trid);
|
|
|
|
if (port) {
|
|
|
|
assert(port->ref > 0);
|
|
|
|
port->ref--;
|
|
|
|
if (port->ref == 0) {
|
|
|
|
TAILQ_REMOVE(&ttransport->ports, port, link);
|
|
|
|
spdk_sock_close(&port->listen_sock);
|
|
|
|
free(port);
|
|
|
|
}
|
|
|
|
rc = 0;
|
|
|
|
} else {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Port not found\n");
|
|
|
|
rc = -ENOENT;
|
|
|
|
}
|
|
|
|
pthread_mutex_unlock(&ttransport->lock);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_qpair_flush_pdus_internal(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
const int array_size = 32;
|
2019-05-24 07:36:12 +00:00
|
|
|
struct iovec iovs[array_size];
|
|
|
|
int iovcnt = 0;
|
2018-08-02 02:21:45 +00:00
|
|
|
int bytes = 0;
|
|
|
|
int total_length = 0;
|
2019-09-03 14:28:13 +00:00
|
|
|
uint32_t mapped_length = 0;
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
int pdu_length;
|
|
|
|
TAILQ_HEAD(, nvme_tcp_pdu) completed_pdus_list;
|
|
|
|
|
|
|
|
pdu = TAILQ_FIRST(&tqpair->send_queue);
|
|
|
|
|
|
|
|
if (pdu == NULL) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Build up a list of iovecs for the first few PDUs in the
|
|
|
|
* tqpair 's send_queue.
|
|
|
|
*/
|
2019-09-03 14:28:13 +00:00
|
|
|
while (pdu != NULL && ((array_size - iovcnt) >= (2 + (int)pdu->data_iovcnt))) {
|
2019-05-24 07:36:12 +00:00
|
|
|
iovcnt += nvme_tcp_build_iovs(&iovs[iovcnt],
|
|
|
|
array_size - iovcnt,
|
|
|
|
pdu,
|
|
|
|
tqpair->host_hdgst_enable,
|
|
|
|
tqpair->host_ddgst_enable,
|
|
|
|
&mapped_length);
|
2019-03-04 14:19:21 +00:00
|
|
|
total_length += mapped_length;
|
2018-08-02 02:21:45 +00:00
|
|
|
pdu = TAILQ_NEXT(pdu, tailq);
|
|
|
|
}
|
|
|
|
|
2019-05-24 07:36:12 +00:00
|
|
|
spdk_trace_record(TRACE_TCP_FLUSH_WRITEBUF_START, 0, total_length, 0, iovcnt);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-05-24 07:36:12 +00:00
|
|
|
bytes = spdk_sock_writev(tqpair->sock, iovs, iovcnt);
|
2018-08-02 02:21:45 +00:00
|
|
|
if (bytes == -1) {
|
|
|
|
if (errno == EWOULDBLOCK || errno == EAGAIN) {
|
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
SPDK_ERRLOG("spdk_sock_writev() failed, errno %d: %s\n",
|
|
|
|
errno, spdk_strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
spdk_trace_record(TRACE_TCP_FLUSH_WRITEBUF_DONE, 0, bytes, 0, 0);
|
|
|
|
|
|
|
|
pdu = TAILQ_FIRST(&tqpair->send_queue);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Free any PDUs that were fully written. If a PDU was only
|
|
|
|
* partially written, update its writev_offset so that next
|
|
|
|
* time only the unwritten portion will be sent to writev().
|
|
|
|
*/
|
|
|
|
TAILQ_INIT(&completed_pdus_list);
|
|
|
|
while (bytes > 0) {
|
2019-08-20 07:38:24 +00:00
|
|
|
pdu_length = pdu->hdr->common.plen - pdu->writev_offset;
|
2018-08-02 02:21:45 +00:00
|
|
|
if (bytes >= pdu_length) {
|
|
|
|
bytes -= pdu_length;
|
|
|
|
TAILQ_REMOVE(&tqpair->send_queue, pdu, tailq);
|
|
|
|
TAILQ_INSERT_TAIL(&completed_pdus_list, pdu, tailq);
|
|
|
|
pdu = TAILQ_FIRST(&tqpair->send_queue);
|
|
|
|
|
|
|
|
} else {
|
|
|
|
pdu->writev_offset += bytes;
|
|
|
|
bytes = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
while (!TAILQ_EMPTY(&completed_pdus_list)) {
|
|
|
|
pdu = TAILQ_FIRST(&completed_pdus_list);
|
|
|
|
TAILQ_REMOVE(&completed_pdus_list, pdu, tailq);
|
|
|
|
assert(pdu->cb_fn != NULL);
|
|
|
|
pdu->cb_fn(pdu->cb_arg);
|
2019-01-28 22:30:14 +00:00
|
|
|
spdk_nvmf_tcp_pdu_put(tqpair, pdu);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return TAILQ_EMPTY(&tqpair->send_queue) ? 0 : 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_qpair_flush_pdus(void *_tqpair)
|
|
|
|
{
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair = _tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (tqpair->state == NVME_TCP_QPAIR_STATE_RUNNING) {
|
|
|
|
rc = spdk_nvmf_tcp_qpair_flush_pdus_internal(tqpair);
|
|
|
|
if (rc == 0 && tqpair->flush_poller != NULL) {
|
|
|
|
spdk_poller_unregister(&tqpair->flush_poller);
|
|
|
|
} else if (rc == 1 && tqpair->flush_poller == NULL) {
|
|
|
|
tqpair->flush_poller = spdk_poller_register(spdk_nvmf_tcp_qpair_flush_pdus,
|
|
|
|
tqpair, 50);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* If the tqpair state is not RUNNING, then
|
|
|
|
* keep trying to flush PDUs until our list is
|
|
|
|
* empty - to make sure all data is sent before
|
|
|
|
* closing the connection.
|
|
|
|
*/
|
|
|
|
do {
|
|
|
|
rc = spdk_nvmf_tcp_qpair_flush_pdus_internal(tqpair);
|
|
|
|
} while (rc == 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rc < 0 && tqpair->state < NVME_TCP_QPAIR_STATE_EXITING) {
|
|
|
|
/*
|
|
|
|
* If the poller has already started destruction of the tqpair,
|
|
|
|
* i.e. the socket read failed, then the connection state may already
|
|
|
|
* be EXITED. We don't want to set it back to EXITING in that case.
|
|
|
|
*/
|
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_EXITING;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-10-04 16:58:18 +00:00
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_qpair_disconnect(struct spdk_nvmf_tcp_qpair *tqpair)
|
|
|
|
{
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Disconnecting qpair %p\n", tqpair);
|
|
|
|
|
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_EXITED;
|
|
|
|
spdk_nvmf_tcp_qpair_flush_pdus(tqpair);
|
|
|
|
spdk_poller_unregister(&tqpair->timeout_poller);
|
|
|
|
spdk_nvmf_qpair_disconnect(&tqpair->qpair, NULL, NULL);
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_qpair_write_pdu(struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu,
|
|
|
|
nvme_tcp_qpair_xfer_complete_cb cb_fn,
|
|
|
|
void *cb_arg)
|
|
|
|
{
|
|
|
|
int enable_digest;
|
|
|
|
int hlen;
|
|
|
|
uint32_t crc32c;
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
hlen = pdu->hdr->common.hlen;
|
2018-08-02 02:21:45 +00:00
|
|
|
enable_digest = 1;
|
2019-08-20 07:38:24 +00:00
|
|
|
if (pdu->hdr->common.pdu_type == SPDK_NVME_TCP_PDU_TYPE_IC_RESP ||
|
|
|
|
pdu->hdr->common.pdu_type == SPDK_NVME_TCP_PDU_TYPE_C2H_TERM_REQ) {
|
2018-08-02 02:21:45 +00:00
|
|
|
/* this PDU should be sent without digest */
|
|
|
|
enable_digest = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Header Digest */
|
|
|
|
if (enable_digest && tqpair->host_hdgst_enable) {
|
|
|
|
crc32c = nvme_tcp_pdu_calc_header_digest(pdu);
|
2019-08-20 07:38:24 +00:00
|
|
|
MAKE_DIGEST_WORD((uint8_t *)pdu->hdr->raw + hlen, crc32c);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Data Digest */
|
|
|
|
if (pdu->data_len > 0 && enable_digest && tqpair->host_ddgst_enable) {
|
|
|
|
crc32c = nvme_tcp_pdu_calc_data_digest(pdu);
|
|
|
|
MAKE_DIGEST_WORD(pdu->data_digest, crc32c);
|
|
|
|
}
|
|
|
|
|
|
|
|
pdu->cb_fn = cb_fn;
|
|
|
|
pdu->cb_arg = cb_arg;
|
|
|
|
TAILQ_INSERT_TAIL(&tqpair->send_queue, pdu, tailq);
|
|
|
|
spdk_nvmf_tcp_qpair_flush_pdus(tqpair);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_qpair_init_mem_resource(struct spdk_nvmf_tcp_qpair *tqpair, uint16_t size)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
int i;
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-12-14 14:49:44 +00:00
|
|
|
struct spdk_nvmf_transport *transport = tqpair->qpair.transport;
|
2019-07-11 01:59:38 +00:00
|
|
|
uint32_t in_capsule_data_size;
|
|
|
|
|
|
|
|
in_capsule_data_size = transport->opts.in_capsule_data_size;
|
|
|
|
if (transport->opts.dif_insert_or_strip) {
|
|
|
|
in_capsule_data_size = SPDK_BDEV_BUF_SIZE_WITH_MD(in_capsule_data_size);
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
if (!tqpair->qpair.sq_head_max) {
|
|
|
|
tqpair->req = calloc(1, sizeof(*tqpair->req));
|
|
|
|
if (!tqpair->req) {
|
|
|
|
SPDK_ERRLOG("Unable to allocate req on tqpair=%p.\n", tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-07-11 01:59:38 +00:00
|
|
|
if (in_capsule_data_size) {
|
2019-06-26 09:20:32 +00:00
|
|
|
tqpair->buf = spdk_zmalloc(in_capsule_data_size, 0x1000,
|
|
|
|
NULL, SPDK_ENV_LCORE_ID_ANY,
|
|
|
|
SPDK_MALLOC_DMA);
|
2018-08-02 02:21:45 +00:00
|
|
|
if (!tqpair->buf) {
|
|
|
|
SPDK_ERRLOG("Unable to allocate buf on tqpair=%p.\n", tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
tcp_req = tqpair->req;
|
|
|
|
tcp_req->ttag = 0;
|
|
|
|
tcp_req->req.qpair = &tqpair->qpair;
|
|
|
|
|
|
|
|
/* Set up memory to receive commands */
|
|
|
|
if (tqpair->buf) {
|
|
|
|
tcp_req->buf = tqpair->buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set the cmdn and rsp */
|
|
|
|
tcp_req->req.rsp = (union nvmf_c2h_msg *)&tcp_req->rsp;
|
|
|
|
tcp_req->req.cmd = (union nvmf_h2c_msg *)&tcp_req->cmd;
|
|
|
|
|
|
|
|
/* Initialize request state to FREE */
|
|
|
|
tcp_req->state = TCP_REQUEST_STATE_FREE;
|
|
|
|
TAILQ_INSERT_TAIL(&tqpair->state_queue[tcp_req->state], tcp_req, state_link);
|
|
|
|
|
|
|
|
tqpair->pdu = calloc(NVMF_TCP_QPAIR_MAX_C2H_PDU_NUM + 1, sizeof(*tqpair->pdu));
|
|
|
|
if (!tqpair->pdu) {
|
|
|
|
SPDK_ERRLOG("Unable to allocate pdu on tqpair=%p.\n", tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < 1 + NVMF_TCP_QPAIR_MAX_C2H_PDU_NUM; i++) {
|
|
|
|
TAILQ_INSERT_TAIL(&tqpair->free_queue, &tqpair->pdu[i], tailq);
|
|
|
|
}
|
|
|
|
|
2019-08-12 11:44:22 +00:00
|
|
|
tqpair->pdu_recv_buf.size = (in_capsule_data_size + sizeof(struct spdk_nvme_tcp_cmd) + 2 *
|
|
|
|
SPDK_NVME_TCP_DIGEST_LEN) * SPDK_NVMF_TCP_RECV_BUF_SIZE_FACTOR;
|
|
|
|
tqpair->pdu_recv_buf.buf = calloc(1, tqpair->pdu_recv_buf.size);
|
|
|
|
if (!tqpair->pdu_recv_buf.buf) {
|
|
|
|
SPDK_ERRLOG("Unable to allocate the pdu recv buf on tqpair=%p with size=%d\n", tqpair,
|
|
|
|
tqpair->pdu_recv_buf.size);
|
|
|
|
return -1;
|
|
|
|
}
|
2019-08-15 20:48:07 +00:00
|
|
|
tqpair->pdu_in_progress.hdr = (union nvme_tcp_pdu_hdr *)tqpair->pdu_recv_buf.buf;
|
2018-08-02 02:21:45 +00:00
|
|
|
} else {
|
|
|
|
tqpair->reqs = calloc(size, sizeof(*tqpair->reqs));
|
|
|
|
if (!tqpair->reqs) {
|
|
|
|
SPDK_ERRLOG("Unable to allocate reqs on tqpair=%p\n", tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-07-11 01:59:38 +00:00
|
|
|
if (in_capsule_data_size) {
|
2019-06-26 09:20:32 +00:00
|
|
|
tqpair->bufs = spdk_zmalloc(size * in_capsule_data_size, 0x1000,
|
|
|
|
NULL, SPDK_ENV_LCORE_ID_ANY,
|
|
|
|
SPDK_MALLOC_DMA);
|
2018-08-02 02:21:45 +00:00
|
|
|
if (!tqpair->bufs) {
|
|
|
|
SPDK_ERRLOG("Unable to allocate bufs on tqpair=%p.\n", tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < size; i++) {
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req = &tqpair->reqs[i];
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
tcp_req->ttag = i + 1;
|
|
|
|
tcp_req->req.qpair = &tqpair->qpair;
|
|
|
|
|
|
|
|
/* Set up memory to receive commands */
|
|
|
|
if (tqpair->bufs) {
|
2019-07-11 01:59:38 +00:00
|
|
|
tcp_req->buf = (void *)((uintptr_t)tqpair->bufs + (i * in_capsule_data_size));
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Set the cmdn and rsp */
|
|
|
|
tcp_req->req.rsp = (union nvmf_c2h_msg *)&tcp_req->rsp;
|
|
|
|
tcp_req->req.cmd = (union nvmf_h2c_msg *)&tcp_req->cmd;
|
|
|
|
|
|
|
|
/* Initialize request state to FREE */
|
|
|
|
tcp_req->state = TCP_REQUEST_STATE_FREE;
|
|
|
|
TAILQ_INSERT_TAIL(&tqpair->state_queue[tcp_req->state], tcp_req, state_link);
|
|
|
|
}
|
|
|
|
|
|
|
|
tqpair->pdu_pool = calloc(size, sizeof(*tqpair->pdu_pool));
|
|
|
|
if (!tqpair->pdu_pool) {
|
|
|
|
SPDK_ERRLOG("Unable to allocate pdu pool on tqpair =%p.\n", tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < size; i++) {
|
|
|
|
TAILQ_INSERT_TAIL(&tqpair->free_queue, &tqpair->pdu_pool[i], tailq);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_qpair_init(struct spdk_nvmf_qpair *qpair)
|
|
|
|
{
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
int i;
|
|
|
|
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = SPDK_CONTAINEROF(qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "New TCP Connection: %p\n", qpair);
|
|
|
|
|
|
|
|
TAILQ_INIT(&tqpair->send_queue);
|
|
|
|
TAILQ_INIT(&tqpair->free_queue);
|
2019-08-29 00:42:26 +00:00
|
|
|
STAILQ_INIT(&tqpair->queued_c2h_data_tcp_req);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
/* Initialise request state queues of the qpair */
|
|
|
|
for (i = TCP_REQUEST_STATE_FREE; i < TCP_REQUEST_NUM_STATES; i++) {
|
|
|
|
TAILQ_INIT(&tqpair->state_queue[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
tqpair->host_hdgst_enable = true;
|
|
|
|
tqpair->host_ddgst_enable = true;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_qpair_sock_init(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
/* set low water mark */
|
|
|
|
rc = spdk_sock_set_recvlowat(tqpair->sock, sizeof(struct spdk_nvme_tcp_c2h_data_hdr));
|
|
|
|
if (rc != 0) {
|
|
|
|
SPDK_ERRLOG("spdk_sock_set_recvlowat() failed\n");
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
_spdk_nvmf_tcp_handle_connect(struct spdk_nvmf_transport *transport,
|
|
|
|
struct spdk_nvmf_tcp_port *port,
|
2019-09-18 20:16:15 +00:00
|
|
|
struct spdk_sock *sock,
|
|
|
|
new_qpair_fn cb_fn, void *cb_arg)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "New connection accepted on %s port %s\n",
|
|
|
|
port->trid.traddr, port->trid.trsvcid);
|
|
|
|
|
2019-07-15 12:58:16 +00:00
|
|
|
if (transport->opts.sock_priority) {
|
|
|
|
rc = spdk_sock_set_priority(sock, transport->opts.sock_priority);
|
|
|
|
if (rc) {
|
|
|
|
SPDK_ERRLOG("Failed to set the priority of the socket\n");
|
|
|
|
spdk_sock_close(&sock);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = calloc(1, sizeof(struct spdk_nvmf_tcp_qpair));
|
2018-08-02 02:21:45 +00:00
|
|
|
if (tqpair == NULL) {
|
|
|
|
SPDK_ERRLOG("Could not allocate new connection.\n");
|
|
|
|
spdk_sock_close(&sock);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
tqpair->sock = sock;
|
|
|
|
tqpair->max_queue_depth = 1;
|
|
|
|
tqpair->free_pdu_num = tqpair->max_queue_depth + NVMF_TCP_QPAIR_MAX_C2H_PDU_NUM;
|
|
|
|
tqpair->state_cntr[TCP_REQUEST_STATE_FREE] = tqpair->max_queue_depth;
|
|
|
|
tqpair->port = port;
|
|
|
|
tqpair->qpair.transport = transport;
|
|
|
|
|
|
|
|
rc = spdk_sock_getaddr(tqpair->sock, tqpair->target_addr,
|
|
|
|
sizeof(tqpair->target_addr), &tqpair->target_port,
|
|
|
|
tqpair->initiator_addr, sizeof(tqpair->initiator_addr),
|
|
|
|
&tqpair->initiator_port);
|
|
|
|
if (rc < 0) {
|
|
|
|
SPDK_ERRLOG("spdk_sock_getaddr() failed of tqpair=%p\n", tqpair);
|
|
|
|
spdk_nvmf_tcp_qpair_destroy(tqpair);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-18 20:16:15 +00:00
|
|
|
cb_fn(&tqpair->qpair, cb_arg);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_port_accept(struct spdk_nvmf_transport *transport, struct spdk_nvmf_tcp_port *port,
|
2019-09-18 20:16:15 +00:00
|
|
|
new_qpair_fn cb_fn, void *cb_arg)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct spdk_sock *sock;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < NVMF_TCP_MAX_ACCEPT_SOCK_ONE_TIME; i++) {
|
|
|
|
sock = spdk_sock_accept(port->listen_sock);
|
2019-11-04 11:41:12 +00:00
|
|
|
if (sock == NULL) {
|
|
|
|
break;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
2019-11-04 11:41:12 +00:00
|
|
|
_spdk_nvmf_tcp_handle_connect(transport, port, sock, cb_fn, cb_arg);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-09-18 20:16:15 +00:00
|
|
|
spdk_nvmf_tcp_accept(struct spdk_nvmf_transport *transport, new_qpair_fn cb_fn, void *cb_arg)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
|
|
|
struct spdk_nvmf_tcp_port *port;
|
|
|
|
|
|
|
|
ttransport = SPDK_CONTAINEROF(transport, struct spdk_nvmf_tcp_transport, transport);
|
|
|
|
|
|
|
|
TAILQ_FOREACH(port, &ttransport->ports, link) {
|
2019-09-18 20:16:15 +00:00
|
|
|
spdk_nvmf_tcp_port_accept(transport, port, cb_fn, cb_arg);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_discover(struct spdk_nvmf_transport *transport,
|
|
|
|
struct spdk_nvme_transport_id *trid,
|
|
|
|
struct spdk_nvmf_discovery_log_page_entry *entry)
|
|
|
|
{
|
|
|
|
entry->trtype = SPDK_NVMF_TRTYPE_TCP;
|
|
|
|
entry->adrfam = trid->adrfam;
|
2019-08-18 09:10:34 +00:00
|
|
|
entry->treq.secure_channel = SPDK_NVMF_TREQ_SECURE_CHANNEL_NOT_REQUIRED;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
spdk_strcpy_pad(entry->trsvcid, trid->trsvcid, sizeof(entry->trsvcid), ' ');
|
|
|
|
spdk_strcpy_pad(entry->traddr, trid->traddr, sizeof(entry->traddr), ' ');
|
|
|
|
|
|
|
|
entry->tsas.tcp.sectype = SPDK_NVME_TCP_SECURITY_NONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct spdk_nvmf_transport_poll_group *
|
|
|
|
spdk_nvmf_tcp_poll_group_create(struct spdk_nvmf_transport *transport)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_poll_group *tgroup;
|
|
|
|
|
|
|
|
tgroup = calloc(1, sizeof(*tgroup));
|
|
|
|
if (!tgroup) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2019-05-15 13:53:39 +00:00
|
|
|
tgroup->sock_group = spdk_sock_group_create(&tgroup->group);
|
2018-08-02 02:21:45 +00:00
|
|
|
if (!tgroup->sock_group) {
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_INIT(&tgroup->qpairs);
|
2018-11-28 15:22:37 +00:00
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
return &tgroup->group;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
free(tgroup);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2019-05-15 13:53:39 +00:00
|
|
|
static struct spdk_nvmf_transport_poll_group *
|
|
|
|
spdk_nvmf_tcp_get_optimal_poll_group(struct spdk_nvmf_qpair *qpair)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
|
|
|
struct spdk_sock_group *group = NULL;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
tqpair = SPDK_CONTAINEROF(qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
|
|
|
rc = spdk_sock_get_optimal_sock_group(tqpair->sock, &group);
|
|
|
|
if (!rc && group != NULL) {
|
|
|
|
return spdk_sock_group_get_ctx(group);
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_poll_group_destroy(struct spdk_nvmf_transport_poll_group *group)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_poll_group *tgroup;
|
|
|
|
|
|
|
|
tgroup = SPDK_CONTAINEROF(group, struct spdk_nvmf_tcp_poll_group, group);
|
|
|
|
spdk_sock_group_close(&tgroup->sock_group);
|
2018-12-06 21:48:51 +00:00
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
free(tgroup);
|
|
|
|
}
|
|
|
|
|
2019-08-15 20:48:07 +00:00
|
|
|
static inline void
|
|
|
|
spdk_nvmf_tcp_reset_pdu_in_process(struct spdk_nvmf_tcp_qpair *tqpair)
|
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu_recv_buf *pdu_recv_buf = &tqpair->pdu_recv_buf;
|
|
|
|
char *dst, *src;
|
|
|
|
|
|
|
|
if (spdk_unlikely((pdu_recv_buf->off + sizeof(union nvme_tcp_pdu_hdr)) >
|
|
|
|
pdu_recv_buf->size)) {
|
|
|
|
if (pdu_recv_buf->remain_size) {
|
|
|
|
dst = pdu_recv_buf->buf;
|
|
|
|
src = (char *)((void *)pdu_recv_buf->buf + pdu_recv_buf->off);
|
|
|
|
|
|
|
|
/* purpose: to avoid overlap copy, so do not use memcpy if there is overlap case */
|
|
|
|
memmove(dst, src, pdu_recv_buf->remain_size);
|
|
|
|
}
|
|
|
|
tqpair->pdu_recv_buf.off = 0;
|
|
|
|
} else if (!pdu_recv_buf->remain_size) {
|
|
|
|
tqpair->pdu_recv_buf.off = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
tqpair->pdu_in_progress.hdr = (union nvme_tcp_pdu_hdr *)((void *)pdu_recv_buf->buf +
|
|
|
|
pdu_recv_buf->off);
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
enum nvme_tcp_pdu_recv_state state)
|
|
|
|
{
|
|
|
|
if (tqpair->recv_state == state) {
|
|
|
|
SPDK_ERRLOG("The recv state of tqpair=%p is same with the state(%d) to be set\n",
|
|
|
|
tqpair, state);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "tqpair(%p) recv state=%d\n", tqpair, state);
|
|
|
|
tqpair->recv_state = state;
|
2019-01-24 05:08:35 +00:00
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
switch (state) {
|
|
|
|
case NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_CH:
|
|
|
|
case NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PSH:
|
|
|
|
case NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PAYLOAD:
|
|
|
|
break;
|
|
|
|
case NVME_TCP_PDU_RECV_STATE_ERROR:
|
|
|
|
case NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_READY:
|
|
|
|
memset(&tqpair->pdu_in_progress, 0, sizeof(tqpair->pdu_in_progress));
|
2019-08-15 20:48:07 +00:00
|
|
|
spdk_nvmf_tcp_reset_pdu_in_process(tqpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SPDK_ERRLOG("The state(%d) is invalid\n", state);
|
|
|
|
abort();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-17 10:18:16 +00:00
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_qpair_handle_timeout(void *ctx)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair = ctx;
|
|
|
|
|
|
|
|
assert(tqpair->recv_state == NVME_TCP_PDU_RECV_STATE_ERROR);
|
|
|
|
|
|
|
|
SPDK_ERRLOG("No pdu coming for tqpair=%p within %d seconds\n", tqpair,
|
|
|
|
SPDK_NVME_TCP_QPAIR_EXIT_TIMEOUT);
|
|
|
|
|
2019-10-04 16:58:18 +00:00
|
|
|
spdk_nvmf_tcp_qpair_disconnect(tqpair);
|
2019-01-17 10:18:16 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req_complete(void *cb_arg)
|
|
|
|
{
|
2019-01-17 10:18:16 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair = (struct spdk_nvmf_tcp_qpair *)cb_arg;
|
|
|
|
|
|
|
|
if (!tqpair->timeout_poller) {
|
|
|
|
tqpair->timeout_poller = spdk_poller_register(spdk_nvmf_tcp_qpair_handle_timeout, tqpair,
|
|
|
|
SPDK_NVME_TCP_QPAIR_EXIT_TIMEOUT * 1000000);
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(struct spdk_nvmf_tcp_qpair *tqpair, struct nvme_tcp_pdu *pdu,
|
2018-08-02 02:21:45 +00:00
|
|
|
enum spdk_nvme_tcp_term_req_fes fes, uint32_t error_offset)
|
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *rsp_pdu;
|
|
|
|
struct spdk_nvme_tcp_term_req_hdr *c2h_term_req;
|
|
|
|
uint32_t c2h_term_req_hdr_len = sizeof(*c2h_term_req);
|
2018-12-05 13:48:28 +00:00
|
|
|
uint32_t copy_len;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
rsp_pdu = spdk_nvmf_tcp_pdu_get(tqpair);
|
|
|
|
if (!rsp_pdu) {
|
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_EXITING;
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_ERROR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
c2h_term_req = &rsp_pdu->hdr->term_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
c2h_term_req->common.pdu_type = SPDK_NVME_TCP_PDU_TYPE_C2H_TERM_REQ;
|
|
|
|
c2h_term_req->common.hlen = c2h_term_req_hdr_len;
|
|
|
|
|
|
|
|
if ((fes == SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD) ||
|
|
|
|
(fes == SPDK_NVME_TCP_TERM_REQ_FES_INVALID_DATA_UNSUPPORTED_PARAMETER)) {
|
|
|
|
DSET32(&c2h_term_req->fei, error_offset);
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
copy_len = pdu->hdr->common.hlen;
|
2018-12-05 13:48:28 +00:00
|
|
|
if (copy_len > SPDK_NVME_TCP_TERM_REQ_ERROR_DATA_MAX_SIZE) {
|
|
|
|
copy_len = SPDK_NVME_TCP_TERM_REQ_ERROR_DATA_MAX_SIZE;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
2018-12-05 13:48:28 +00:00
|
|
|
/* Copy the error info into the buffer */
|
2019-08-20 07:38:24 +00:00
|
|
|
memcpy((uint8_t *)rsp_pdu->hdr->raw + c2h_term_req_hdr_len, pdu->hdr->raw, copy_len);
|
|
|
|
nvme_tcp_pdu_set_data(rsp_pdu, (uint8_t *)rsp_pdu->hdr->raw + c2h_term_req_hdr_len, copy_len);
|
2018-12-05 13:48:28 +00:00
|
|
|
|
|
|
|
/* Contain the header of the wrong received pdu */
|
|
|
|
c2h_term_req->common.plen = c2h_term_req->common.hlen + copy_len;
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_ERROR);
|
|
|
|
spdk_nvmf_tcp_qpair_write_pdu(tqpair, rsp_pdu, spdk_nvmf_tcp_send_c2h_term_req_complete, tqpair);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_capsule_cmd_hdr_handle(struct spdk_nvmf_tcp_transport *ttransport,
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
tcp_req = spdk_nvmf_tcp_req_get(tqpair);
|
|
|
|
if (!tcp_req) {
|
|
|
|
SPDK_ERRLOG("Cannot allocate tcp_req\n");
|
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_EXITING;
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_ERROR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-10-01 20:45:35 +00:00
|
|
|
pdu->req = tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_NEW);
|
|
|
|
spdk_nvmf_tcp_req_process(ttransport, tcp_req);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_capsule_cmd_payload_handle(struct spdk_nvmf_tcp_transport *ttransport,
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
struct spdk_nvme_tcp_cmd *capsule_cmd;
|
|
|
|
uint32_t error_offset = 0;
|
|
|
|
enum spdk_nvme_tcp_term_req_fes fes;
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
capsule_cmd = &pdu->hdr->capsule_cmd;
|
2019-10-01 20:45:35 +00:00
|
|
|
tcp_req = pdu->req;
|
2018-08-02 02:21:45 +00:00
|
|
|
assert(tcp_req != NULL);
|
|
|
|
if (capsule_cmd->common.pdo > SPDK_NVME_TCP_PDU_PDO_MAX_OFFSET) {
|
|
|
|
SPDK_ERRLOG("Expected ICReq capsule_cmd pdu offset <= %d, got %c\n",
|
|
|
|
SPDK_NVME_TCP_PDU_PDO_MAX_OFFSET, capsule_cmd->common.pdo);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD;
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_common_pdu_hdr, pdo);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_READY);
|
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_READY_TO_EXECUTE);
|
|
|
|
spdk_nvmf_tcp_req_process(ttransport, tcp_req);
|
|
|
|
|
|
|
|
return;
|
|
|
|
err:
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(tqpair, pdu, fes, error_offset);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_h2c_data_hdr_handle(struct spdk_nvmf_tcp_transport *ttransport,
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
uint32_t error_offset = 0;
|
|
|
|
enum spdk_nvme_tcp_term_req_fes fes = 0;
|
|
|
|
struct spdk_nvme_tcp_h2c_data_hdr *h2c_data;
|
|
|
|
bool ttag_offset_error = false;
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
h2c_data = &pdu->hdr->h2c_data;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "tqpair=%p, r2t_info: datao=%u, datal=%u, cccid=%u, ttag=%u\n",
|
|
|
|
tqpair, h2c_data->datao, h2c_data->datal, h2c_data->cccid, h2c_data->ttag);
|
|
|
|
|
|
|
|
/* According to the information in the pdu to find the req */
|
|
|
|
TAILQ_FOREACH(tcp_req, &tqpair->state_queue[TCP_REQUEST_STATE_TRANSFERRING_HOST_TO_CONTROLLER],
|
|
|
|
state_link) {
|
|
|
|
if ((tcp_req->req.cmd->nvme_cmd.cid == h2c_data->cccid) && (tcp_req->ttag == h2c_data->ttag)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ttag_offset_error && (tcp_req->req.cmd->nvme_cmd.cid == h2c_data->cccid)) {
|
|
|
|
ttag_offset_error = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!tcp_req) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "tcp_req is not found for tqpair=%p\n", tqpair);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_DATA_UNSUPPORTED_PARAMETER;
|
|
|
|
if (!ttag_offset_error) {
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_h2c_data_hdr, cccid);
|
|
|
|
} else {
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_h2c_data_hdr, ttag);
|
|
|
|
}
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tcp_req->next_expected_r2t_offset != h2c_data->datao) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP,
|
|
|
|
"tcp_req(%p), tqpair=%p, expected_r2t_offset=%u, but data offset =%u\n",
|
|
|
|
tcp_req, tqpair, tcp_req->next_expected_r2t_offset, h2c_data->datao);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_DATA_TRANSFER_OUT_OF_RANGE;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (h2c_data->datal > tqpair->maxh2cdata) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "tcp_req(%p), tqpair=%p, datao=%u execeeds maxh2cdata size=%u\n",
|
|
|
|
tcp_req, tqpair, h2c_data->datao, tqpair->maxh2cdata);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_DATA_TRANSFER_OUT_OF_RANGE;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((h2c_data->datao + h2c_data->datal) > tcp_req->req.length) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP,
|
|
|
|
"tcp_req(%p), tqpair=%p, (datao=%u + datal=%u) execeeds requested length=%u\n",
|
|
|
|
tcp_req, tqpair, h2c_data->datao, h2c_data->datal, tcp_req->req.length);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_R2T_LIMIT_EXCEEDED;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2019-10-01 20:45:35 +00:00
|
|
|
pdu->req = tcp_req;
|
2019-06-24 06:23:50 +00:00
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
if (spdk_unlikely(tcp_req->req.dif.dif_insert_or_strip)) {
|
|
|
|
pdu->dif_ctx = &tcp_req->req.dif.dif_ctx;
|
2019-06-24 06:23:50 +00:00
|
|
|
}
|
|
|
|
|
2019-05-29 08:57:50 +00:00
|
|
|
nvme_tcp_pdu_set_data_buf(pdu, tcp_req->req.iov, tcp_req->req.iovcnt,
|
|
|
|
h2c_data->datao, h2c_data->datal);
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PAYLOAD);
|
|
|
|
return;
|
|
|
|
|
|
|
|
err:
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(tqpair, pdu, fes, error_offset);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_pdu_cmd_complete(void *cb_arg)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req = cb_arg;
|
2018-08-02 02:21:45 +00:00
|
|
|
nvmf_tcp_request_free(tcp_req);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:25:22 +00:00
|
|
|
spdk_nvmf_tcp_send_capsule_resp_pdu(struct spdk_nvmf_tcp_req *tcp_req,
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *rsp_pdu;
|
|
|
|
struct spdk_nvme_tcp_rsp *capsule_resp;
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "enter, tqpair=%p\n", tqpair);
|
|
|
|
rsp_pdu = spdk_nvmf_tcp_pdu_get(tqpair);
|
|
|
|
if (!rsp_pdu) {
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_ERROR);
|
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_EXITING;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
capsule_resp = &rsp_pdu->hdr->capsule_resp;
|
2018-08-02 02:21:45 +00:00
|
|
|
capsule_resp->common.pdu_type = SPDK_NVME_TCP_PDU_TYPE_CAPSULE_RESP;
|
|
|
|
capsule_resp->common.plen = capsule_resp->common.hlen = sizeof(*capsule_resp);
|
|
|
|
capsule_resp->rccqe = tcp_req->req.rsp->nvme_cpl;
|
|
|
|
if (tqpair->host_hdgst_enable) {
|
|
|
|
capsule_resp->common.flags |= SPDK_NVME_TCP_CH_FLAGS_HDGSTF;
|
|
|
|
capsule_resp->common.plen += SPDK_NVME_TCP_DIGEST_LEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
spdk_nvmf_tcp_qpair_write_pdu(tqpair, rsp_pdu, spdk_nvmf_tcp_pdu_cmd_complete, tcp_req);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_pdu_c2h_data_complete(void *cb_arg)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req = cb_arg;
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair = SPDK_CONTAINEROF(tcp_req->req.qpair,
|
|
|
|
struct spdk_nvmf_tcp_qpair, qpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
assert(tqpair != NULL);
|
|
|
|
assert(tcp_req->c2h_data_pdu_num > 0);
|
|
|
|
tcp_req->c2h_data_pdu_num--;
|
|
|
|
if (!tcp_req->c2h_data_pdu_num) {
|
2019-06-11 15:07:28 +00:00
|
|
|
if (tqpair->qpair.transport->opts.c2h_success) {
|
|
|
|
nvmf_tcp_request_free(tcp_req);
|
|
|
|
} else {
|
|
|
|
spdk_nvmf_tcp_send_capsule_resp_pdu(tcp_req, tqpair);
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tqpair->c2h_data_pdu_cnt--;
|
|
|
|
spdk_nvmf_tcp_handle_pending_c2h_data_queue(tqpair);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_send_r2t_pdu(struct spdk_nvmf_tcp_qpair *tqpair,
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *rsp_pdu;
|
|
|
|
struct spdk_nvme_tcp_r2t_hdr *r2t;
|
|
|
|
|
|
|
|
rsp_pdu = spdk_nvmf_tcp_pdu_get(tqpair);
|
|
|
|
if (!rsp_pdu) {
|
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_EXITING;
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_ERROR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
r2t = &rsp_pdu->hdr->r2t;
|
2018-08-02 02:21:45 +00:00
|
|
|
r2t->common.pdu_type = SPDK_NVME_TCP_PDU_TYPE_R2T;
|
|
|
|
r2t->common.plen = r2t->common.hlen = sizeof(*r2t);
|
|
|
|
|
|
|
|
if (tqpair->host_hdgst_enable) {
|
|
|
|
r2t->common.flags |= SPDK_NVME_TCP_CH_FLAGS_HDGSTF;
|
|
|
|
r2t->common.plen += SPDK_NVME_TCP_DIGEST_LEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
r2t->cccid = tcp_req->req.cmd->nvme_cmd.cid;
|
|
|
|
r2t->ttag = tcp_req->ttag;
|
|
|
|
r2t->r2to = tcp_req->next_expected_r2t_offset;
|
|
|
|
r2t->r2tl = spdk_min(tcp_req->req.length - tcp_req->next_expected_r2t_offset, tqpair->maxh2cdata);
|
|
|
|
tcp_req->r2tl_remain = r2t->r2tl;
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP,
|
|
|
|
"tcp_req(%p) on tqpair(%p), r2t_info: cccid=%u, ttag=%u, r2to=%u, r2tl=%u\n",
|
|
|
|
tcp_req, tqpair, r2t->cccid, r2t->ttag, r2t->r2to, r2t->r2tl);
|
|
|
|
spdk_nvmf_tcp_qpair_write_pdu(tqpair, rsp_pdu, spdk_nvmf_tcp_pdu_cmd_complete, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_h2c_data_payload_handle(struct spdk_nvmf_tcp_transport *ttransport,
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-10-01 20:45:35 +00:00
|
|
|
tcp_req = pdu->req;
|
2018-08-02 02:21:45 +00:00
|
|
|
assert(tcp_req != NULL);
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "enter\n");
|
|
|
|
|
|
|
|
tcp_req->next_expected_r2t_offset += pdu->data_len;
|
|
|
|
tcp_req->r2tl_remain -= pdu->data_len;
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_READY);
|
|
|
|
|
|
|
|
if (!tcp_req->r2tl_remain) {
|
|
|
|
if (tcp_req->next_expected_r2t_offset == tcp_req->req.length) {
|
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_READY_TO_EXECUTE);
|
|
|
|
spdk_nvmf_tcp_req_process(ttransport, tcp_req);
|
|
|
|
} else {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Send r2t pdu for tcp_req=%p on tqpair=%p\n", tcp_req, tqpair);
|
2018-12-06 12:40:54 +00:00
|
|
|
spdk_nvmf_tcp_send_r2t_pdu(tqpair, tcp_req);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_h2c_term_req_dump(struct spdk_nvme_tcp_term_req_hdr *h2c_term_req)
|
|
|
|
{
|
|
|
|
SPDK_ERRLOG("Error info of pdu(%p): %s\n", h2c_term_req,
|
2019-01-28 22:01:59 +00:00
|
|
|
spdk_nvmf_tcp_term_req_fes_str[h2c_term_req->fes]);
|
2018-08-02 02:21:45 +00:00
|
|
|
if ((h2c_term_req->fes == SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD) ||
|
|
|
|
(h2c_term_req->fes == SPDK_NVME_TCP_TERM_REQ_FES_INVALID_DATA_UNSUPPORTED_PARAMETER)) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "The offset from the start of the PDU header is %u\n",
|
|
|
|
DGET32(h2c_term_req->fei));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_h2c_term_req_hdr_handle(struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu)
|
|
|
|
{
|
2019-08-20 07:38:24 +00:00
|
|
|
struct spdk_nvme_tcp_term_req_hdr *h2c_term_req = &pdu->hdr->term_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
uint32_t error_offset = 0;
|
|
|
|
enum spdk_nvme_tcp_term_req_fes fes;
|
|
|
|
|
|
|
|
|
|
|
|
if (h2c_term_req->fes > SPDK_NVME_TCP_TERM_REQ_FES_INVALID_DATA_UNSUPPORTED_PARAMETER) {
|
|
|
|
SPDK_ERRLOG("Fatal Error Stauts(FES) is unknown for h2c_term_req pdu=%p\n", pdu);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD;
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_term_req_hdr, fes);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* set the data buffer */
|
2019-08-20 07:38:24 +00:00
|
|
|
nvme_tcp_pdu_set_data(pdu, (uint8_t *)pdu->hdr->raw + h2c_term_req->common.hlen,
|
2019-04-03 09:29:33 +00:00
|
|
|
h2c_term_req->common.plen - h2c_term_req->common.hlen);
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PAYLOAD);
|
|
|
|
return;
|
|
|
|
end:
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(tqpair, pdu, fes, error_offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_h2c_term_req_payload_handle(struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu)
|
|
|
|
{
|
2019-08-20 07:38:24 +00:00
|
|
|
struct spdk_nvme_tcp_term_req_hdr *h2c_term_req = &pdu->hdr->term_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
spdk_nvmf_tcp_h2c_term_req_dump(h2c_term_req);
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_ERROR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_pdu_payload_handle(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
uint32_t crc32c, error_offset = 0;
|
|
|
|
enum spdk_nvme_tcp_term_req_fes fes;
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
|
|
|
|
|
|
|
assert(tqpair->recv_state == NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PAYLOAD);
|
|
|
|
pdu = &tqpair->pdu_in_progress;
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "enter\n");
|
|
|
|
/* check data digest if need */
|
2019-03-11 18:21:56 +00:00
|
|
|
if (pdu->ddgst_enable) {
|
2018-08-02 02:21:45 +00:00
|
|
|
crc32c = nvme_tcp_pdu_calc_data_digest(pdu);
|
|
|
|
rc = MATCH_DIGEST_WORD(pdu->data_digest, crc32c);
|
|
|
|
if (rc == 0) {
|
|
|
|
SPDK_ERRLOG("Data digest error on tqpair=(%p) with pdu=%p\n", tqpair, pdu);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_HDGST_ERROR;
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(tqpair, pdu, fes, error_offset);
|
|
|
|
return;
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ttransport = SPDK_CONTAINEROF(tqpair->qpair.transport, struct spdk_nvmf_tcp_transport, transport);
|
2019-08-20 07:38:24 +00:00
|
|
|
switch (pdu->hdr->common.pdu_type) {
|
2018-08-02 02:21:45 +00:00
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_CAPSULE_CMD:
|
|
|
|
spdk_nvmf_tcp_capsule_cmd_payload_handle(ttransport, tqpair, pdu);
|
|
|
|
break;
|
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_H2C_DATA:
|
|
|
|
spdk_nvmf_tcp_h2c_data_payload_handle(ttransport, tqpair, pdu);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_H2C_TERM_REQ:
|
|
|
|
spdk_nvmf_tcp_h2c_term_req_payload_handle(tqpair, pdu);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
/* The code should not go to here */
|
|
|
|
SPDK_ERRLOG("The code should not go to here\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_send_icresp_complete(void *cb_arg)
|
|
|
|
{
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair = cb_arg;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_RUNNING;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_icreq_handle(struct spdk_nvmf_tcp_transport *ttransport,
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair,
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *pdu)
|
|
|
|
{
|
2019-08-20 07:38:24 +00:00
|
|
|
struct spdk_nvme_tcp_ic_req *ic_req = &pdu->hdr->ic_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
struct nvme_tcp_pdu *rsp_pdu;
|
|
|
|
struct spdk_nvme_tcp_ic_resp *ic_resp;
|
|
|
|
uint32_t error_offset = 0;
|
|
|
|
enum spdk_nvme_tcp_term_req_fes fes;
|
|
|
|
|
|
|
|
/* Only PFV 0 is defined currently */
|
|
|
|
if (ic_req->pfv != 0) {
|
|
|
|
SPDK_ERRLOG("Expected ICReq PFV %u, got %u\n", 0u, ic_req->pfv);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD;
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_ic_req, pfv);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* MAXR2T is 0's based */
|
2019-05-27 12:45:58 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "maxr2t =%u\n", (ic_req->maxr2t + 1u));
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
tqpair->host_hdgst_enable = ic_req->dgst.bits.hdgst_enable ? true : false;
|
2019-08-12 11:44:22 +00:00
|
|
|
if (!tqpair->host_hdgst_enable) {
|
|
|
|
tqpair->pdu_recv_buf.size -= SPDK_NVME_TCP_DIGEST_LEN * SPDK_NVMF_TCP_RECV_BUF_SIZE_FACTOR;
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
tqpair->host_ddgst_enable = ic_req->dgst.bits.ddgst_enable ? true : false;
|
2019-08-12 11:44:22 +00:00
|
|
|
if (!tqpair->host_ddgst_enable) {
|
|
|
|
tqpair->pdu_recv_buf.size -= SPDK_NVME_TCP_DIGEST_LEN * SPDK_NVMF_TCP_RECV_BUF_SIZE_FACTOR;
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
tqpair->cpda = spdk_min(ic_req->hpda, SPDK_NVME_TCP_CPDA_MAX);
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "cpda of tqpair=(%p) is : %u\n", tqpair, tqpair->cpda);
|
|
|
|
|
|
|
|
rsp_pdu = spdk_nvmf_tcp_pdu_get(tqpair);
|
|
|
|
if (!rsp_pdu) {
|
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_EXITING;
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_ERROR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
ic_resp = &rsp_pdu->hdr->ic_resp;
|
2018-08-02 02:21:45 +00:00
|
|
|
ic_resp->common.pdu_type = SPDK_NVME_TCP_PDU_TYPE_IC_RESP;
|
|
|
|
ic_resp->common.hlen = ic_resp->common.plen = sizeof(*ic_resp);
|
|
|
|
ic_resp->pfv = 0;
|
|
|
|
ic_resp->cpda = tqpair->cpda;
|
2018-12-14 14:49:44 +00:00
|
|
|
tqpair->maxh2cdata = spdk_min(NVMF_TCP_PDU_MAX_H2C_DATA_SIZE,
|
|
|
|
ttransport->transport.opts.io_unit_size);
|
2018-08-02 02:21:45 +00:00
|
|
|
ic_resp->maxh2cdata = tqpair->maxh2cdata;
|
|
|
|
ic_resp->dgst.bits.hdgst_enable = tqpair->host_hdgst_enable ? 1 : 0;
|
|
|
|
ic_resp->dgst.bits.ddgst_enable = tqpair->host_ddgst_enable ? 1 : 0;
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "host_hdgst_enable: %u\n", tqpair->host_hdgst_enable);
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "host_ddgst_enable: %u\n", tqpair->host_ddgst_enable);
|
|
|
|
|
nvmf/tcp: Fix the potential issue of connection construction.
When we use async writev (e.g., lib io_uring), we find that
the callback of writev is executed after recving the new
data from the initiator, and this is possible.
For example, if the NVMe-oF TCP target receives the ic_req from the
initiator, and sendout the ic_resp, the state of tqpair will change from
invalid to running until the callback is executed. And the data of ic_resp
is already sent to the initiator, and we receive the new command later. However,
we may still not get the call back function executed
(i.e, spdk_nvmf_tcp_send_icresp_complete). And it is possible
for using lib io_uring, I faced this issue when using lib uring.
And this patch can fix this issue.
Signed-off-by: Ziye Yang <ziye.yang@intel.com>
Change-Id: I7f4332522866d475e106ac6d36a8ec715133f0dc
Reviewed-on: https://review.gerrithub.io/c/spdk/spdk/+/472770
Tested-by: SPDK CI Jenkins <sys_sgci@intel.com>
Reviewed-by: Jim Harris <james.r.harris@intel.com>
Reviewed-by: Ben Walker <benjamin.walker@intel.com>
Reviewed-by: Shuhei Matsumoto <shuhei.matsumoto.xt@hitachi.com>
Community-CI: Broadcom SPDK FC-NVMe CI <spdk-ci.pdl@broadcom.com>
2019-10-30 15:37:18 +00:00
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_INITIALIZING;
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_qpair_write_pdu(tqpair, rsp_pdu, spdk_nvmf_tcp_send_icresp_complete, tqpair);
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_READY);
|
|
|
|
return;
|
|
|
|
end:
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(tqpair, pdu, fes, error_offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_pdu_psh_handle(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
int rc;
|
|
|
|
uint32_t crc32c, error_offset = 0;
|
|
|
|
enum spdk_nvme_tcp_term_req_fes fes;
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
|
|
|
|
|
|
|
assert(tqpair->recv_state == NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PSH);
|
|
|
|
pdu = &tqpair->pdu_in_progress;
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "pdu type of tqpair(%p) is %d\n", tqpair,
|
2019-08-20 07:38:24 +00:00
|
|
|
pdu->hdr->common.pdu_type);
|
2018-08-02 02:21:45 +00:00
|
|
|
/* check header digest if needed */
|
|
|
|
if (pdu->has_hdgst) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Compare the header of pdu=%p on tqpair=%p\n", pdu, tqpair);
|
|
|
|
crc32c = nvme_tcp_pdu_calc_header_digest(pdu);
|
2019-08-20 07:38:24 +00:00
|
|
|
rc = MATCH_DIGEST_WORD((uint8_t *)pdu->hdr->raw + pdu->hdr->common.hlen, crc32c);
|
2018-08-02 02:21:45 +00:00
|
|
|
if (rc == 0) {
|
|
|
|
SPDK_ERRLOG("Header digest error on tqpair=(%p) with pdu=%p\n", tqpair, pdu);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_HDGST_ERROR;
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(tqpair, pdu, fes, error_offset);
|
|
|
|
return;
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ttransport = SPDK_CONTAINEROF(tqpair->qpair.transport, struct spdk_nvmf_tcp_transport, transport);
|
2019-08-20 07:38:24 +00:00
|
|
|
switch (pdu->hdr->common.pdu_type) {
|
2018-08-02 02:21:45 +00:00
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_IC_REQ:
|
|
|
|
spdk_nvmf_tcp_icreq_handle(ttransport, tqpair, pdu);
|
|
|
|
break;
|
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_CAPSULE_CMD:
|
|
|
|
spdk_nvmf_tcp_capsule_cmd_hdr_handle(ttransport, tqpair, pdu);
|
|
|
|
break;
|
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_H2C_DATA:
|
|
|
|
spdk_nvmf_tcp_h2c_data_hdr_handle(ttransport, tqpair, pdu);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_H2C_TERM_REQ:
|
|
|
|
spdk_nvmf_tcp_h2c_term_req_hdr_handle(tqpair, pdu);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2019-08-20 07:38:24 +00:00
|
|
|
SPDK_ERRLOG("Unexpected PDU type 0x%02x\n", tqpair->pdu_in_progress.hdr->common.pdu_type);
|
2018-08-02 02:21:45 +00:00
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD;
|
|
|
|
error_offset = 1;
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(tqpair, pdu, fes, error_offset);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_pdu_ch_handle(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
uint32_t error_offset = 0;
|
|
|
|
enum spdk_nvme_tcp_term_req_fes fes;
|
|
|
|
uint8_t expected_hlen, pdo;
|
|
|
|
bool plen_error = false, pdo_error = false;
|
|
|
|
|
|
|
|
assert(tqpair->recv_state == NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_CH);
|
|
|
|
pdu = &tqpair->pdu_in_progress;
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
if (pdu->hdr->common.pdu_type == SPDK_NVME_TCP_PDU_TYPE_IC_REQ) {
|
2018-08-02 02:21:45 +00:00
|
|
|
if (tqpair->state != NVME_TCP_QPAIR_STATE_INVALID) {
|
|
|
|
SPDK_ERRLOG("Already received ICreq PDU, and reject this pdu=%p\n", pdu);
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_PDU_SEQUENCE_ERROR;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
expected_hlen = sizeof(struct spdk_nvme_tcp_ic_req);
|
2019-08-20 07:38:24 +00:00
|
|
|
if (pdu->hdr->common.plen != expected_hlen) {
|
2018-08-02 02:21:45 +00:00
|
|
|
plen_error = true;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (tqpair->state != NVME_TCP_QPAIR_STATE_RUNNING) {
|
|
|
|
SPDK_ERRLOG("The TCP/IP connection is not negotitated\n");
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_PDU_SEQUENCE_ERROR;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
switch (pdu->hdr->common.pdu_type) {
|
2018-08-02 02:21:45 +00:00
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_CAPSULE_CMD:
|
|
|
|
expected_hlen = sizeof(struct spdk_nvme_tcp_cmd);
|
2019-08-20 07:38:24 +00:00
|
|
|
pdo = pdu->hdr->common.pdo;
|
2018-08-02 02:21:45 +00:00
|
|
|
if ((tqpair->cpda != 0) && (pdo != ((tqpair->cpda + 1) << 2))) {
|
|
|
|
pdo_error = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
if (pdu->hdr->common.plen < expected_hlen) {
|
2018-08-02 02:21:45 +00:00
|
|
|
plen_error = true;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_H2C_DATA:
|
|
|
|
expected_hlen = sizeof(struct spdk_nvme_tcp_h2c_data_hdr);
|
2019-08-20 07:38:24 +00:00
|
|
|
pdo = pdu->hdr->common.pdo;
|
2018-08-02 02:21:45 +00:00
|
|
|
if ((tqpair->cpda != 0) && (pdo != ((tqpair->cpda + 1) << 2))) {
|
|
|
|
pdo_error = true;
|
|
|
|
break;
|
|
|
|
}
|
2019-08-20 07:38:24 +00:00
|
|
|
if (pdu->hdr->common.plen < expected_hlen) {
|
2018-08-02 02:21:45 +00:00
|
|
|
plen_error = true;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SPDK_NVME_TCP_PDU_TYPE_H2C_TERM_REQ:
|
|
|
|
expected_hlen = sizeof(struct spdk_nvme_tcp_term_req_hdr);
|
2019-08-20 07:38:24 +00:00
|
|
|
if ((pdu->hdr->common.plen <= expected_hlen) ||
|
|
|
|
(pdu->hdr->common.plen > SPDK_NVME_TCP_TERM_REQ_PDU_MAX_SIZE)) {
|
2018-08-02 02:21:45 +00:00
|
|
|
plen_error = true;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2019-08-20 07:38:24 +00:00
|
|
|
SPDK_ERRLOG("Unexpected PDU type 0x%02x\n", pdu->hdr->common.pdu_type);
|
2018-08-02 02:21:45 +00:00
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD;
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_common_pdu_hdr, pdu_type);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
if (pdu->hdr->common.hlen != expected_hlen) {
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_ERRLOG("PDU type=0x%02x, Expected ICReq header length %u, got %u on tqpair=%p\n",
|
2019-08-20 07:38:24 +00:00
|
|
|
pdu->hdr->common.pdu_type,
|
|
|
|
expected_hlen, pdu->hdr->common.hlen, tqpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD;
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_common_pdu_hdr, hlen);
|
|
|
|
goto err;
|
|
|
|
} else if (pdo_error) {
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD;
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_common_pdu_hdr, pdo);
|
|
|
|
} else if (plen_error) {
|
|
|
|
fes = SPDK_NVME_TCP_TERM_REQ_FES_INVALID_HEADER_FIELD;
|
|
|
|
error_offset = offsetof(struct spdk_nvme_tcp_common_pdu_hdr, plen);
|
|
|
|
goto err;
|
|
|
|
} else {
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PSH);
|
2019-08-06 09:34:45 +00:00
|
|
|
nvme_tcp_pdu_calc_psh_len(&tqpair->pdu_in_progress, tqpair->host_hdgst_enable);
|
2018-08-02 02:21:45 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
err:
|
|
|
|
spdk_nvmf_tcp_send_c2h_term_req(tqpair, pdu, fes, error_offset);
|
|
|
|
}
|
|
|
|
|
2019-06-24 07:42:35 +00:00
|
|
|
static int
|
2019-07-10 00:53:53 +00:00
|
|
|
nvmf_tcp_pdu_payload_insert_dif(struct nvme_tcp_pdu *pdu, uint32_t read_offset,
|
|
|
|
int read_len)
|
2019-06-24 07:42:35 +00:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = spdk_dif_generate_stream(pdu->data_iov, pdu->data_iovcnt,
|
2019-07-10 00:53:53 +00:00
|
|
|
read_offset, read_len, pdu->dif_ctx);
|
2019-06-24 07:42:35 +00:00
|
|
|
if (rc != 0) {
|
|
|
|
SPDK_ERRLOG("DIF generate failed\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2019-08-12 11:44:22 +00:00
|
|
|
static int
|
|
|
|
nvme_tcp_recv_buf_read(struct spdk_sock *sock, struct nvme_tcp_pdu_recv_buf *pdu_recv_buf)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2019-08-15 20:48:07 +00:00
|
|
|
rc = nvme_tcp_read_data(sock, pdu_recv_buf->size - pdu_recv_buf->off,
|
|
|
|
(void *)pdu_recv_buf->buf + pdu_recv_buf->off);
|
2019-08-12 11:44:22 +00:00
|
|
|
if (rc < 0) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "will disconnect sock=%p\n", sock);
|
|
|
|
} else if (rc > 0) {
|
|
|
|
pdu_recv_buf->remain_size = rc;
|
|
|
|
spdk_trace_record(TRACE_TCP_READ_FROM_SOCKET_DONE, 0, rc, 0, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint32_t
|
|
|
|
nvme_tcp_read_data_from_pdu_recv_buf(struct nvme_tcp_pdu_recv_buf *pdu_recv_buf,
|
|
|
|
uint32_t expected_size,
|
|
|
|
char *dst)
|
|
|
|
{
|
|
|
|
uint32_t size;
|
|
|
|
|
|
|
|
assert(pdu_recv_buf->remain_size > 0);
|
|
|
|
size = spdk_min(expected_size, pdu_recv_buf->remain_size);
|
2019-08-15 20:48:07 +00:00
|
|
|
if (dst) {
|
|
|
|
memcpy(dst, (void *)pdu_recv_buf->buf + pdu_recv_buf->off, size);
|
|
|
|
}
|
2019-08-12 11:44:22 +00:00
|
|
|
pdu_recv_buf->off += size;
|
|
|
|
pdu_recv_buf->remain_size -= size;
|
2019-08-15 20:48:07 +00:00
|
|
|
|
2019-08-12 11:44:22 +00:00
|
|
|
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
nvme_tcp_read_payload_data_from_pdu_recv_buf(struct nvme_tcp_pdu_recv_buf *pdu_recv_buf,
|
|
|
|
struct nvme_tcp_pdu *pdu)
|
|
|
|
{
|
|
|
|
struct iovec iov[NVME_TCP_MAX_SGL_DESCRIPTORS + 1];
|
|
|
|
int iovcnt, i;
|
|
|
|
uint32_t size = 0;
|
2019-08-15 20:48:07 +00:00
|
|
|
void *dst;
|
2019-08-12 11:44:22 +00:00
|
|
|
|
|
|
|
assert(pdu_recv_buf->remain_size > 0);
|
|
|
|
iovcnt = nvme_tcp_build_payload_iovs(iov, NVME_TCP_MAX_SGL_DESCRIPTORS + 1, pdu,
|
|
|
|
pdu->ddgst_enable, NULL);
|
|
|
|
assert(iovcnt >= 0);
|
|
|
|
for (i = 0; i < iovcnt; i++) {
|
|
|
|
if (!pdu_recv_buf->remain_size) {
|
|
|
|
break;
|
|
|
|
}
|
2019-08-15 20:48:07 +00:00
|
|
|
|
|
|
|
dst = NULL;
|
|
|
|
if (pdu->hdr->common.pdu_type != SPDK_NVME_TCP_PDU_TYPE_H2C_TERM_REQ) {
|
|
|
|
dst = iov[i].iov_base;
|
|
|
|
}
|
|
|
|
size += nvme_tcp_read_data_from_pdu_recv_buf(pdu_recv_buf, iov[i].iov_len, dst);
|
2019-08-12 11:44:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return size;
|
|
|
|
}
|
2019-06-14 08:48:37 +00:00
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static int
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_sock_process(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
enum nvme_tcp_pdu_recv_state prev_state;
|
2019-08-12 11:44:22 +00:00
|
|
|
uint32_t data_len;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
/* The loop here is to allow for several back-to-back state changes. */
|
|
|
|
do {
|
|
|
|
prev_state = tqpair->recv_state;
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "tqpair(%p) recv pdu entering state %d\n", tqpair, prev_state);
|
|
|
|
|
2019-08-08 14:56:08 +00:00
|
|
|
pdu = &tqpair->pdu_in_progress;
|
2018-08-02 02:21:45 +00:00
|
|
|
switch (tqpair->recv_state) {
|
|
|
|
/* Wait for the common header */
|
2019-01-24 05:08:35 +00:00
|
|
|
case NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_READY:
|
2018-08-02 02:21:45 +00:00
|
|
|
case NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_CH:
|
nvmf/tcp: Fix the potential issue of connection construction.
When we use async writev (e.g., lib io_uring), we find that
the callback of writev is executed after recving the new
data from the initiator, and this is possible.
For example, if the NVMe-oF TCP target receives the ic_req from the
initiator, and sendout the ic_resp, the state of tqpair will change from
invalid to running until the callback is executed. And the data of ic_resp
is already sent to the initiator, and we receive the new command later. However,
we may still not get the call back function executed
(i.e, spdk_nvmf_tcp_send_icresp_complete). And it is possible
for using lib io_uring, I faced this issue when using lib uring.
And this patch can fix this issue.
Signed-off-by: Ziye Yang <ziye.yang@intel.com>
Change-Id: I7f4332522866d475e106ac6d36a8ec715133f0dc
Reviewed-on: https://review.gerrithub.io/c/spdk/spdk/+/472770
Tested-by: SPDK CI Jenkins <sys_sgci@intel.com>
Reviewed-by: Jim Harris <james.r.harris@intel.com>
Reviewed-by: Ben Walker <benjamin.walker@intel.com>
Reviewed-by: Shuhei Matsumoto <shuhei.matsumoto.xt@hitachi.com>
Community-CI: Broadcom SPDK FC-NVMe CI <spdk-ci.pdl@broadcom.com>
2019-10-30 15:37:18 +00:00
|
|
|
if (spdk_unlikely(tqpair->state == NVME_TCP_QPAIR_STATE_INITIALIZING)) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2019-08-12 11:44:22 +00:00
|
|
|
if (!tqpair->pdu_recv_buf.remain_size) {
|
|
|
|
rc = nvme_tcp_recv_buf_read(tqpair->sock, &tqpair->pdu_recv_buf);
|
|
|
|
if (rc <= 0) {
|
|
|
|
return rc;
|
2019-02-21 14:39:24 +00:00
|
|
|
}
|
2019-01-24 05:08:35 +00:00
|
|
|
}
|
2019-08-12 11:44:22 +00:00
|
|
|
rc = nvme_tcp_read_data_from_pdu_recv_buf(&tqpair->pdu_recv_buf,
|
|
|
|
sizeof(struct spdk_nvme_tcp_common_pdu_hdr) - pdu->ch_valid_bytes,
|
2019-08-15 20:48:07 +00:00
|
|
|
NULL);
|
2019-08-12 11:44:22 +00:00
|
|
|
pdu->ch_valid_bytes += rc;
|
|
|
|
if (spdk_likely(tqpair->recv_state == NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_READY)) {
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_CH);
|
|
|
|
}
|
2019-01-24 05:08:35 +00:00
|
|
|
|
|
|
|
if (pdu->ch_valid_bytes < sizeof(struct spdk_nvme_tcp_common_pdu_hdr)) {
|
|
|
|
return NVME_TCP_PDU_IN_PROGRESS;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* The command header of this PDU has now been read from the socket. */
|
|
|
|
spdk_nvmf_tcp_pdu_ch_handle(tqpair);
|
|
|
|
break;
|
|
|
|
/* Wait for the pdu specific header */
|
|
|
|
case NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PSH:
|
2019-08-12 11:44:22 +00:00
|
|
|
if (!tqpair->pdu_recv_buf.remain_size) {
|
|
|
|
rc = nvme_tcp_recv_buf_read(tqpair->sock, &tqpair->pdu_recv_buf);
|
|
|
|
if (rc <= 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
2019-08-12 11:44:22 +00:00
|
|
|
|
|
|
|
rc = nvme_tcp_read_data_from_pdu_recv_buf(&tqpair->pdu_recv_buf,
|
|
|
|
pdu->psh_len - pdu->psh_valid_bytes,
|
2019-08-15 20:48:07 +00:00
|
|
|
NULL);
|
2019-08-12 11:44:22 +00:00
|
|
|
pdu->psh_valid_bytes += rc;
|
2019-08-06 09:34:45 +00:00
|
|
|
if (pdu->psh_valid_bytes < pdu->psh_len) {
|
|
|
|
return NVME_TCP_PDU_IN_PROGRESS;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* All header(ch, psh, head digist) of this PDU has now been read from the socket. */
|
|
|
|
spdk_nvmf_tcp_pdu_psh_handle(tqpair);
|
|
|
|
break;
|
|
|
|
case NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PAYLOAD:
|
|
|
|
/* check whether the data is valid, if not we just return */
|
2019-03-18 11:28:12 +00:00
|
|
|
if (!pdu->data_len) {
|
2018-08-02 02:21:45 +00:00
|
|
|
return NVME_TCP_PDU_IN_PROGRESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
data_len = pdu->data_len;
|
2019-03-11 18:21:56 +00:00
|
|
|
/* data digest */
|
2019-08-20 07:38:24 +00:00
|
|
|
if (spdk_unlikely((pdu->hdr->common.pdu_type != SPDK_NVME_TCP_PDU_TYPE_H2C_TERM_REQ) &&
|
2019-03-11 18:21:56 +00:00
|
|
|
tqpair->host_ddgst_enable)) {
|
|
|
|
data_len += SPDK_NVME_TCP_DIGEST_LEN;
|
|
|
|
pdu->ddgst_enable = true;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
2019-08-12 11:44:22 +00:00
|
|
|
if (tqpair->pdu_recv_buf.remain_size) {
|
|
|
|
rc = nvme_tcp_read_payload_data_from_pdu_recv_buf(&tqpair->pdu_recv_buf, pdu);
|
|
|
|
pdu->readv_offset += rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pdu->readv_offset < data_len) {
|
|
|
|
rc = nvme_tcp_read_payload_data(tqpair->sock, pdu);
|
|
|
|
if (rc < 0) {
|
|
|
|
return NVME_TCP_PDU_IN_PROGRESS;
|
|
|
|
}
|
|
|
|
pdu->readv_offset += rc;
|
2019-03-11 18:21:56 +00:00
|
|
|
}
|
2019-06-24 07:42:35 +00:00
|
|
|
|
|
|
|
if (spdk_unlikely(pdu->dif_ctx != NULL)) {
|
2019-07-10 00:53:53 +00:00
|
|
|
rc = nvmf_tcp_pdu_payload_insert_dif(pdu, pdu->readv_offset - rc, rc);
|
2019-06-24 07:42:35 +00:00
|
|
|
if (rc != 0) {
|
|
|
|
return NVME_TCP_PDU_FATAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-11 18:21:56 +00:00
|
|
|
if (pdu->readv_offset < data_len) {
|
|
|
|
return NVME_TCP_PDU_IN_PROGRESS;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* All of this PDU has now been read from the socket. */
|
|
|
|
spdk_nvmf_tcp_pdu_payload_handle(tqpair);
|
|
|
|
break;
|
|
|
|
case NVME_TCP_PDU_RECV_STATE_ERROR:
|
2019-10-04 17:52:09 +00:00
|
|
|
if (!spdk_sock_is_connected(tqpair->sock)) {
|
2019-01-24 14:29:18 +00:00
|
|
|
return NVME_TCP_PDU_FATAL;
|
|
|
|
}
|
2018-08-02 02:21:45 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
assert(0);
|
|
|
|
SPDK_ERRLOG("code should not come to here");
|
|
|
|
break;
|
|
|
|
}
|
2019-08-12 11:44:22 +00:00
|
|
|
} while (tqpair->recv_state != prev_state);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static enum spdk_nvme_data_transfer
|
2019-01-28 22:25:22 +00:00
|
|
|
spdk_nvmf_tcp_req_get_xfer(struct spdk_nvmf_tcp_req *tcp_req) {
|
2018-08-02 02:21:45 +00:00
|
|
|
enum spdk_nvme_data_transfer xfer;
|
|
|
|
struct spdk_nvme_cmd *cmd = &tcp_req->req.cmd->nvme_cmd;
|
|
|
|
struct spdk_nvme_sgl_descriptor *sgl = &cmd->dptr.sgl1;
|
|
|
|
|
|
|
|
/* Figure out data transfer direction */
|
|
|
|
if (cmd->opc == SPDK_NVME_OPC_FABRIC)
|
|
|
|
{
|
|
|
|
xfer = spdk_nvme_opc_get_data_transfer(tcp_req->req.cmd->nvmf_cmd.fctype);
|
|
|
|
} else
|
|
|
|
{
|
|
|
|
xfer = spdk_nvme_opc_get_data_transfer(cmd->opc);
|
|
|
|
|
|
|
|
/* Some admin commands are special cases */
|
|
|
|
if ((tcp_req->req.qpair->qid == 0) &&
|
|
|
|
((cmd->opc == SPDK_NVME_OPC_GET_FEATURES) ||
|
|
|
|
(cmd->opc == SPDK_NVME_OPC_SET_FEATURES))) {
|
|
|
|
switch (cmd->cdw10 & 0xff) {
|
|
|
|
case SPDK_NVME_FEAT_LBA_RANGE_TYPE:
|
|
|
|
case SPDK_NVME_FEAT_AUTONOMOUS_POWER_STATE_TRANSITION:
|
|
|
|
case SPDK_NVME_FEAT_HOST_IDENTIFIER:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
xfer = SPDK_NVME_DATA_NONE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (xfer == SPDK_NVME_DATA_NONE)
|
|
|
|
{
|
|
|
|
return xfer;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Even for commands that may transfer data, they could have specified 0 length.
|
|
|
|
* We want those to show up with xfer SPDK_NVME_DATA_NONE.
|
|
|
|
*/
|
|
|
|
switch (sgl->generic.type)
|
|
|
|
{
|
|
|
|
case SPDK_NVME_SGL_TYPE_DATA_BLOCK:
|
|
|
|
case SPDK_NVME_SGL_TYPE_BIT_BUCKET:
|
|
|
|
case SPDK_NVME_SGL_TYPE_SEGMENT:
|
|
|
|
case SPDK_NVME_SGL_TYPE_LAST_SEGMENT:
|
|
|
|
case SPDK_NVME_SGL_TYPE_TRANSPORT_DATA_BLOCK:
|
|
|
|
if (sgl->unkeyed.length == 0) {
|
|
|
|
xfer = SPDK_NVME_DATA_NONE;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SPDK_NVME_SGL_TYPE_KEYED_DATA_BLOCK:
|
|
|
|
if (sgl->keyed.length == 0) {
|
|
|
|
xfer = SPDK_NVME_DATA_NONE;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return xfer;
|
|
|
|
}
|
|
|
|
|
2019-08-22 00:13:07 +00:00
|
|
|
static int
|
2019-09-26 10:25:00 +00:00
|
|
|
spdk_nvmf_tcp_req_parse_sgl(struct spdk_nvmf_tcp_req *tcp_req,
|
|
|
|
struct spdk_nvmf_transport *transport,
|
|
|
|
struct spdk_nvmf_transport_poll_group *group)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
2019-09-26 10:25:00 +00:00
|
|
|
struct spdk_nvmf_request *req = &tcp_req->req;
|
2018-08-02 02:21:45 +00:00
|
|
|
struct spdk_nvme_cmd *cmd;
|
|
|
|
struct spdk_nvme_cpl *rsp;
|
|
|
|
struct spdk_nvme_sgl_descriptor *sgl;
|
2019-06-21 04:09:31 +00:00
|
|
|
uint32_t length;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-09-26 10:25:00 +00:00
|
|
|
cmd = &req->cmd->nvme_cmd;
|
|
|
|
rsp = &req->rsp->nvme_cpl;
|
2018-08-02 02:21:45 +00:00
|
|
|
sgl = &cmd->dptr.sgl1;
|
|
|
|
|
2019-06-21 04:09:31 +00:00
|
|
|
length = sgl->unkeyed.length;
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
if (sgl->generic.type == SPDK_NVME_SGL_TYPE_TRANSPORT_DATA_BLOCK &&
|
|
|
|
sgl->unkeyed.subtype == SPDK_NVME_SGL_SUBTYPE_TRANSPORT) {
|
2019-09-26 10:25:00 +00:00
|
|
|
if (length > transport->opts.max_io_size) {
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_ERRLOG("SGL length 0x%x exceeds max io size 0x%x\n",
|
2019-09-26 10:25:00 +00:00
|
|
|
length, transport->opts.max_io_size);
|
2018-08-02 02:21:45 +00:00
|
|
|
rsp->status.sc = SPDK_NVME_SC_DATA_SGL_LENGTH_INVALID;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fill request length and populate iovs */
|
2019-09-26 10:25:00 +00:00
|
|
|
req->length = length;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-06-21 04:09:31 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Data requested length= 0x%x\n", length);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
if (spdk_unlikely(req->dif.dif_insert_or_strip)) {
|
|
|
|
req->dif.orig_length = length;
|
|
|
|
length = spdk_dif_get_length_with_md(length, &req->dif.dif_ctx);
|
|
|
|
req->dif.elba_length = length;
|
2019-07-05 05:26:14 +00:00
|
|
|
}
|
|
|
|
|
2019-09-26 10:25:00 +00:00
|
|
|
if (spdk_nvmf_request_get_buffers(req, group, transport, length)) {
|
2018-08-02 02:21:45 +00:00
|
|
|
/* No available buffers. Queue this request up. */
|
2019-06-21 04:09:31 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "No available large data buffers. Queueing request %p\n",
|
|
|
|
tcp_req);
|
2018-08-02 02:21:45 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* backward compatible */
|
2019-09-26 10:25:00 +00:00
|
|
|
req->data = req->iov[0].iov_base;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Request %p took %d buffer/s from central pool, and data=%p\n",
|
2019-09-26 10:25:00 +00:00
|
|
|
tcp_req, req->iovcnt, req->data);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
} else if (sgl->generic.type == SPDK_NVME_SGL_TYPE_DATA_BLOCK &&
|
|
|
|
sgl->unkeyed.subtype == SPDK_NVME_SGL_SUBTYPE_OFFSET) {
|
|
|
|
uint64_t offset = sgl->address;
|
2019-09-26 10:25:00 +00:00
|
|
|
uint32_t max_len = transport->opts.in_capsule_data_size;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "In-capsule data: offset 0x%" PRIx64 ", length 0x%x\n",
|
2019-06-21 04:09:31 +00:00
|
|
|
offset, length);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
if (offset > max_len) {
|
|
|
|
SPDK_ERRLOG("In-capsule offset 0x%" PRIx64 " exceeds capsule length 0x%x\n",
|
|
|
|
offset, max_len);
|
|
|
|
rsp->status.sc = SPDK_NVME_SC_INVALID_SGL_OFFSET;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
max_len -= (uint32_t)offset;
|
|
|
|
|
2019-06-21 04:09:31 +00:00
|
|
|
if (length > max_len) {
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_ERRLOG("In-capsule data length 0x%x exceeds capsule length 0x%x\n",
|
2019-06-21 04:09:31 +00:00
|
|
|
length, max_len);
|
2018-08-02 02:21:45 +00:00
|
|
|
rsp->status.sc = SPDK_NVME_SC_DATA_SGL_LENGTH_INVALID;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-09-26 10:25:00 +00:00
|
|
|
req->data = tcp_req->buf + offset;
|
|
|
|
req->data_from_pool = false;
|
|
|
|
req->length = length;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
if (spdk_unlikely(req->dif.dif_insert_or_strip)) {
|
|
|
|
length = spdk_dif_get_length_with_md(length, &req->dif.dif_ctx);
|
|
|
|
req->dif.elba_length = length;
|
2019-07-05 05:26:14 +00:00
|
|
|
}
|
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
req->iov[0].iov_base = req->data;
|
2019-09-26 10:25:00 +00:00
|
|
|
req->iov[0].iov_len = length;
|
|
|
|
req->iovcnt = 1;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
SPDK_ERRLOG("Invalid NVMf I/O Command SGL: Type 0x%x, Subtype 0x%x\n",
|
|
|
|
sgl->generic.type, sgl->generic.subtype);
|
|
|
|
rsp->status.sc = SPDK_NVME_SC_SGL_DESCRIPTOR_TYPE_INVALID;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-09-20 01:44:11 +00:00
|
|
|
static inline enum spdk_nvme_media_error_status_code
|
|
|
|
nvmf_tcp_dif_error_to_compl_status(uint8_t err_type) {
|
|
|
|
enum spdk_nvme_media_error_status_code result;
|
2019-06-21 06:01:11 +00:00
|
|
|
|
2019-09-20 01:44:11 +00:00
|
|
|
switch (err_type)
|
|
|
|
{
|
|
|
|
case SPDK_DIF_REFTAG_ERROR:
|
|
|
|
result = SPDK_NVME_SC_REFERENCE_TAG_CHECK_ERROR;
|
|
|
|
break;
|
|
|
|
case SPDK_DIF_APPTAG_ERROR:
|
|
|
|
result = SPDK_NVME_SC_APPLICATION_TAG_CHECK_ERROR;
|
|
|
|
break;
|
|
|
|
case SPDK_DIF_GUARD_ERROR:
|
|
|
|
result = SPDK_NVME_SC_GUARD_CHECK_ERROR;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SPDK_UNREACHABLE();
|
|
|
|
break;
|
2019-06-21 06:01:11 +00:00
|
|
|
}
|
|
|
|
|
2019-09-20 01:44:11 +00:00
|
|
|
return result;
|
2019-06-21 06:01:11 +00:00
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_send_c2h_data(struct spdk_nvmf_tcp_qpair *tqpair,
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *rsp_pdu;
|
|
|
|
struct spdk_nvme_tcp_c2h_data_hdr *c2h_data;
|
2019-05-29 08:57:50 +00:00
|
|
|
uint32_t plen, pdo, alignment;
|
2019-06-21 06:01:11 +00:00
|
|
|
int rc;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-08-29 00:42:26 +00:00
|
|
|
assert(tcp_req == STAILQ_FIRST(&tqpair->queued_c2h_data_tcp_req));
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "enter\n");
|
|
|
|
|
|
|
|
rsp_pdu = spdk_nvmf_tcp_pdu_get(tqpair);
|
|
|
|
assert(rsp_pdu != NULL);
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
c2h_data = &rsp_pdu->hdr->c2h_data;
|
2018-08-02 02:21:45 +00:00
|
|
|
c2h_data->common.pdu_type = SPDK_NVME_TCP_PDU_TYPE_C2H_DATA;
|
|
|
|
plen = c2h_data->common.hlen = sizeof(*c2h_data);
|
|
|
|
|
|
|
|
if (tqpair->host_hdgst_enable) {
|
|
|
|
plen += SPDK_NVME_TCP_DIGEST_LEN;
|
|
|
|
c2h_data->common.flags |= SPDK_NVME_TCP_CH_FLAGS_HDGSTF;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* set the psh */
|
|
|
|
c2h_data->cccid = tcp_req->req.cmd->nvme_cmd.cid;
|
|
|
|
c2h_data->datal = spdk_min(NVMF_TCP_PDU_MAX_C2H_DATA_SIZE,
|
2019-05-29 08:57:50 +00:00
|
|
|
tcp_req->req.length - tcp_req->c2h_data_offset);
|
2018-08-02 02:21:45 +00:00
|
|
|
c2h_data->datao = tcp_req->c2h_data_offset;
|
|
|
|
|
|
|
|
/* set the padding */
|
|
|
|
rsp_pdu->padding_len = 0;
|
|
|
|
pdo = plen;
|
|
|
|
if (tqpair->cpda) {
|
|
|
|
alignment = (tqpair->cpda + 1) << 2;
|
|
|
|
if (alignment > plen) {
|
|
|
|
rsp_pdu->padding_len = alignment - plen;
|
|
|
|
pdo = plen = alignment;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
c2h_data->common.pdo = pdo;
|
|
|
|
plen += c2h_data->datal;
|
|
|
|
if (tqpair->host_ddgst_enable) {
|
|
|
|
c2h_data->common.flags |= SPDK_NVME_TCP_CH_FLAGS_DDGSTF;
|
|
|
|
plen += SPDK_NVME_TCP_DIGEST_LEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
c2h_data->common.plen = plen;
|
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
if (spdk_unlikely(tcp_req->req.dif.dif_insert_or_strip)) {
|
|
|
|
rsp_pdu->dif_ctx = &tcp_req->req.dif.dif_ctx;
|
2019-06-24 06:23:50 +00:00
|
|
|
}
|
|
|
|
|
2019-05-29 08:57:50 +00:00
|
|
|
nvme_tcp_pdu_set_data_buf(rsp_pdu, tcp_req->req.iov, tcp_req->req.iovcnt,
|
|
|
|
c2h_data->datao, c2h_data->datal);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
if (spdk_unlikely(tcp_req->req.dif.dif_insert_or_strip)) {
|
2019-09-20 01:44:11 +00:00
|
|
|
struct spdk_nvme_cpl *rsp = &tcp_req->req.rsp->nvme_cpl;
|
|
|
|
struct spdk_dif_error err_blk = {};
|
|
|
|
|
|
|
|
rc = spdk_dif_verify_stream(rsp_pdu->data_iov, rsp_pdu->data_iovcnt,
|
|
|
|
0, rsp_pdu->data_len, rsp_pdu->dif_ctx, &err_blk);
|
2019-06-21 06:01:11 +00:00
|
|
|
if (rc != 0) {
|
2019-09-20 01:44:11 +00:00
|
|
|
SPDK_ERRLOG("DIF error detected. type=%d, offset=%" PRIu32 "\n",
|
|
|
|
err_blk.err_type, err_blk.err_offset);
|
|
|
|
rsp->status.sct = SPDK_NVME_SCT_MEDIA_ERROR;
|
|
|
|
rsp->status.sc = nvmf_tcp_dif_error_to_compl_status(err_blk.err_type);
|
|
|
|
STAILQ_REMOVE_HEAD(&tqpair->queued_c2h_data_tcp_req, link);
|
|
|
|
spdk_nvmf_tcp_pdu_put(tqpair, rsp_pdu);
|
|
|
|
spdk_nvmf_tcp_send_capsule_resp_pdu(tcp_req, tqpair);
|
2019-06-21 06:01:11 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
tcp_req->c2h_data_offset += c2h_data->datal;
|
2019-05-29 08:57:50 +00:00
|
|
|
if (tcp_req->c2h_data_offset == tcp_req->req.length) {
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Last pdu for tcp_req=%p on tqpair=%p\n", tcp_req, tqpair);
|
|
|
|
c2h_data->common.flags |= SPDK_NVME_TCP_C2H_DATA_FLAGS_LAST_PDU;
|
2019-06-11 15:07:28 +00:00
|
|
|
if (tqpair->qpair.transport->opts.c2h_success) {
|
|
|
|
c2h_data->common.flags |= SPDK_NVME_TCP_C2H_DATA_FLAGS_SUCCESS;
|
|
|
|
}
|
2019-08-29 00:42:26 +00:00
|
|
|
STAILQ_REMOVE_HEAD(&tqpair->queued_c2h_data_tcp_req, link);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tqpair->c2h_data_pdu_cnt += 1;
|
|
|
|
spdk_nvmf_tcp_qpair_write_pdu(tqpair, rsp_pdu, spdk_nvmf_tcp_pdu_c2h_data_complete, tcp_req);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-01-28 22:25:22 +00:00
|
|
|
spdk_nvmf_tcp_calc_c2h_data_pdu_num(struct spdk_nvmf_tcp_req *tcp_req)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
2019-05-29 08:57:50 +00:00
|
|
|
return (tcp_req->req.length + NVMF_TCP_PDU_MAX_C2H_DATA_SIZE - 1) /
|
|
|
|
NVMF_TCP_PDU_MAX_C2H_DATA_SIZE;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_handle_pending_c2h_data_queue(struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-08-29 00:42:26 +00:00
|
|
|
while (!STAILQ_EMPTY(&tqpair->queued_c2h_data_tcp_req) &&
|
2018-08-02 02:21:45 +00:00
|
|
|
(tqpair->c2h_data_pdu_cnt < NVMF_TCP_QPAIR_MAX_C2H_PDU_NUM)) {
|
2019-08-29 00:42:26 +00:00
|
|
|
tcp_req = STAILQ_FIRST(&tqpair->queued_c2h_data_tcp_req);
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_send_c2h_data(tqpair, tcp_req);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:25:22 +00:00
|
|
|
spdk_nvmf_tcp_queue_c2h_data(struct spdk_nvmf_tcp_req *tcp_req,
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
tcp_req->c2h_data_pdu_num = spdk_nvmf_tcp_calc_c2h_data_pdu_num(tcp_req);
|
|
|
|
|
|
|
|
assert(tcp_req->c2h_data_pdu_num < NVMF_TCP_QPAIR_MAX_C2H_PDU_NUM);
|
|
|
|
|
2019-08-29 00:42:26 +00:00
|
|
|
STAILQ_INSERT_TAIL(&tqpair->queued_c2h_data_tcp_req, tcp_req, link);
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_handle_pending_c2h_data_queue(tqpair);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
request_transfer_out(struct spdk_nvmf_request *req)
|
|
|
|
{
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
struct spdk_nvmf_qpair *qpair;
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
struct spdk_nvme_cpl *rsp;
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "enter\n");
|
|
|
|
|
|
|
|
qpair = req->qpair;
|
|
|
|
rsp = &req->rsp->nvme_cpl;
|
2019-01-28 22:25:22 +00:00
|
|
|
tcp_req = SPDK_CONTAINEROF(req, struct spdk_nvmf_tcp_req, req);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
/* Advance our sq_head pointer */
|
|
|
|
if (qpair->sq_head == qpair->sq_head_max) {
|
|
|
|
qpair->sq_head = 0;
|
|
|
|
} else {
|
|
|
|
qpair->sq_head++;
|
|
|
|
}
|
|
|
|
rsp->sqhd = qpair->sq_head;
|
|
|
|
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = SPDK_CONTAINEROF(tcp_req->req.qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_TRANSFERRING_CONTROLLER_TO_HOST);
|
|
|
|
if (rsp->status.sc == SPDK_NVME_SC_SUCCESS &&
|
|
|
|
req->xfer == SPDK_NVME_DATA_CONTROLLER_TO_HOST) {
|
|
|
|
spdk_nvmf_tcp_queue_c2h_data(tcp_req, tqpair);
|
|
|
|
} else {
|
|
|
|
spdk_nvmf_tcp_send_capsule_resp_pdu(tcp_req, tqpair);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_pdu_set_buf_from_req(struct spdk_nvmf_tcp_qpair *tqpair,
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
|
2019-08-22 22:45:07 +00:00
|
|
|
if (tcp_req->req.data_from_pool) {
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Will send r2t for tcp_req(%p) on tqpair=%p\n", tcp_req, tqpair);
|
|
|
|
tcp_req->next_expected_r2t_offset = 0;
|
2019-05-27 12:45:58 +00:00
|
|
|
spdk_nvmf_tcp_send_r2t_pdu(tqpair, tcp_req);
|
2018-08-02 02:21:45 +00:00
|
|
|
} else {
|
2018-12-04 15:00:44 +00:00
|
|
|
pdu = &tqpair->pdu_in_progress;
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Not need to send r2t for tcp_req(%p) on tqpair=%p\n", tcp_req,
|
|
|
|
tqpair);
|
|
|
|
/* No need to send r2t, contained in the capsuled data */
|
2019-05-29 23:18:40 +00:00
|
|
|
nvme_tcp_pdu_set_data_buf(pdu, tcp_req->req.iov, tcp_req->req.iovcnt,
|
|
|
|
0, tcp_req->req.length);
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_PAYLOAD);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-04 15:00:44 +00:00
|
|
|
static void
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_set_incapsule_data(struct spdk_nvmf_tcp_qpair *tqpair,
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req)
|
2018-12-04 15:00:44 +00:00
|
|
|
{
|
|
|
|
struct nvme_tcp_pdu *pdu;
|
|
|
|
uint32_t plen = 0;
|
|
|
|
|
|
|
|
pdu = &tqpair->pdu_in_progress;
|
2019-08-20 07:38:24 +00:00
|
|
|
plen = pdu->hdr->common.hlen;
|
2018-12-04 15:00:44 +00:00
|
|
|
|
|
|
|
if (tqpair->host_hdgst_enable) {
|
|
|
|
plen += SPDK_NVME_TCP_DIGEST_LEN;
|
|
|
|
}
|
|
|
|
|
2019-08-20 07:38:24 +00:00
|
|
|
if (pdu->hdr->common.plen != plen) {
|
2018-12-04 15:00:44 +00:00
|
|
|
tcp_req->has_incapsule_data = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static bool
|
|
|
|
spdk_nvmf_tcp_req_process(struct spdk_nvmf_tcp_transport *ttransport,
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req)
|
2018-08-02 02:21:45 +00:00
|
|
|
{
|
2019-01-28 21:02:47 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
|
|
|
struct spdk_nvme_cpl *rsp = &tcp_req->req.rsp->nvme_cpl;
|
|
|
|
int rc;
|
|
|
|
enum spdk_nvmf_tcp_req_state prev_state;
|
|
|
|
bool progress = false;
|
2019-09-26 10:25:00 +00:00
|
|
|
struct spdk_nvmf_transport *transport = &ttransport->transport;
|
2019-01-28 21:02:47 +00:00
|
|
|
struct spdk_nvmf_transport_poll_group *group;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = SPDK_CONTAINEROF(tcp_req->req.qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
2019-01-28 21:02:47 +00:00
|
|
|
group = &tqpair->group->group;
|
2018-08-02 02:21:45 +00:00
|
|
|
assert(tcp_req->state != TCP_REQUEST_STATE_FREE);
|
|
|
|
|
|
|
|
/* The loop here is to allow for several back-to-back state changes. */
|
|
|
|
do {
|
|
|
|
prev_state = tcp_req->state;
|
|
|
|
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "Request %p entering state %d on tqpair=%p\n", tcp_req, prev_state,
|
|
|
|
tqpair);
|
|
|
|
|
|
|
|
switch (tcp_req->state) {
|
|
|
|
case TCP_REQUEST_STATE_FREE:
|
|
|
|
/* Some external code must kick a request into TCP_REQUEST_STATE_NEW
|
|
|
|
* to escape this state. */
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_NEW:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_NEW, 0, 0, (uintptr_t)tcp_req, 0);
|
|
|
|
|
|
|
|
/* copy the cmd from the receive pdu */
|
2019-08-20 07:38:24 +00:00
|
|
|
tcp_req->cmd = tqpair->pdu_in_progress.hdr->capsule_cmd.ccsqe;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
if (spdk_unlikely(spdk_nvmf_request_get_dif_ctx(&tcp_req->req, &tcp_req->req.dif.dif_ctx))) {
|
|
|
|
tcp_req->req.dif.dif_insert_or_strip = true;
|
|
|
|
tqpair->pdu_in_progress.dif_ctx = &tcp_req->req.dif.dif_ctx;
|
2019-06-21 05:00:28 +00:00
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
/* The next state transition depends on the data transfer needs of this request. */
|
|
|
|
tcp_req->req.xfer = spdk_nvmf_tcp_req_get_xfer(tcp_req);
|
|
|
|
|
|
|
|
/* If no data to transfer, ready to execute. */
|
|
|
|
if (tcp_req->req.xfer == SPDK_NVME_DATA_NONE) {
|
|
|
|
/* Reset the tqpair receving pdu state */
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_READY);
|
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_READY_TO_EXECUTE);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-12-04 15:00:44 +00:00
|
|
|
spdk_nvmf_tcp_set_incapsule_data(tqpair, tcp_req);
|
|
|
|
|
|
|
|
if (!tcp_req->has_incapsule_data) {
|
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_AWAIT_PDU_READY);
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_NEED_BUFFER);
|
2019-09-02 06:00:58 +00:00
|
|
|
STAILQ_INSERT_TAIL(&group->pending_buf_queue, &tcp_req->req, buf_link);
|
2018-08-02 02:21:45 +00:00
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_NEED_BUFFER:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_NEED_BUFFER, 0, 0, (uintptr_t)tcp_req, 0);
|
|
|
|
|
|
|
|
assert(tcp_req->req.xfer != SPDK_NVME_DATA_NONE);
|
|
|
|
|
2019-10-24 03:28:59 +00:00
|
|
|
if (!tcp_req->has_incapsule_data && (&tcp_req->req != STAILQ_FIRST(&group->pending_buf_queue))) {
|
2018-08-02 02:21:45 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP,
|
|
|
|
"Not the first element to wait for the buf for tcp_req(%p) on tqpair=%p\n",
|
|
|
|
tcp_req, tqpair);
|
|
|
|
/* This request needs to wait in line to obtain a buffer */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try to get a data buffer */
|
2019-09-26 10:25:00 +00:00
|
|
|
rc = spdk_nvmf_tcp_req_parse_sgl(tcp_req, transport, group);
|
2018-08-02 02:21:45 +00:00
|
|
|
if (rc < 0) {
|
2019-09-02 06:00:58 +00:00
|
|
|
STAILQ_REMOVE_HEAD(&group->pending_buf_queue, buf_link);
|
2018-08-02 02:21:45 +00:00
|
|
|
rsp->status.sc = SPDK_NVME_SC_INTERNAL_DEVICE_ERROR;
|
|
|
|
/* Reset the tqpair receving pdu state */
|
2018-12-04 15:00:44 +00:00
|
|
|
spdk_nvmf_tcp_qpair_set_recv_state(tqpair, NVME_TCP_PDU_RECV_STATE_ERROR);
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_READY_TO_COMPLETE);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!tcp_req->req.data) {
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "No buffer allocated for tcp_req(%p) on tqpair(%p\n)",
|
|
|
|
tcp_req, tqpair);
|
|
|
|
/* No buffers available. */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2019-10-24 03:28:59 +00:00
|
|
|
STAILQ_REMOVE(&group->pending_buf_queue, &tcp_req->req, spdk_nvmf_request, buf_link);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
/* If data is transferring from host to controller, we need to do a transfer from the host. */
|
|
|
|
if (tcp_req->req.xfer == SPDK_NVME_DATA_HOST_TO_CONTROLLER) {
|
2019-07-19 15:25:49 +00:00
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_TRANSFERRING_HOST_TO_CONTROLLER);
|
2018-12-04 15:00:44 +00:00
|
|
|
spdk_nvmf_tcp_pdu_set_buf_from_req(tqpair, tcp_req);
|
2018-08-02 02:21:45 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_READY_TO_EXECUTE);
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_TRANSFERRING_HOST_TO_CONTROLLER:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_TRANSFERRING_HOST_TO_CONTROLLER, 0, 0,
|
|
|
|
(uintptr_t)tcp_req, 0);
|
|
|
|
/* Some external code must kick a request into TCP_REQUEST_STATE_READY_TO_EXECUTE
|
|
|
|
* to escape this state. */
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_READY_TO_EXECUTE:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_READY_TO_EXECUTE, 0, 0, (uintptr_t)tcp_req, 0);
|
2019-06-21 04:43:15 +00:00
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
if (spdk_unlikely(tcp_req->req.dif.dif_insert_or_strip)) {
|
|
|
|
assert(tcp_req->req.dif.elba_length >= tcp_req->req.length);
|
|
|
|
tcp_req->req.length = tcp_req->req.dif.elba_length;
|
2019-06-21 04:43:15 +00:00
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_EXECUTING);
|
|
|
|
spdk_nvmf_request_exec(&tcp_req->req);
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_EXECUTING:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_EXECUTING, 0, 0, (uintptr_t)tcp_req, 0);
|
|
|
|
/* Some external code must kick a request into TCP_REQUEST_STATE_EXECUTED
|
|
|
|
* to escape this state. */
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_EXECUTED:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_EXECUTED, 0, 0, (uintptr_t)tcp_req, 0);
|
2019-06-21 04:43:15 +00:00
|
|
|
|
2019-10-02 07:43:17 +00:00
|
|
|
if (spdk_unlikely(tcp_req->req.dif.dif_insert_or_strip)) {
|
|
|
|
tcp_req->req.length = tcp_req->req.dif.orig_length;
|
2019-06-21 04:43:15 +00:00
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_READY_TO_COMPLETE);
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_READY_TO_COMPLETE:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_READY_TO_COMPLETE, 0, 0, (uintptr_t)tcp_req, 0);
|
|
|
|
rc = request_transfer_out(&tcp_req->req);
|
|
|
|
assert(rc == 0); /* No good way to handle this currently */
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_TRANSFERRING_CONTROLLER_TO_HOST:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_TRANSFERRING_CONTROLLER_TO_HOST, 0, 0,
|
|
|
|
(uintptr_t)tcp_req,
|
|
|
|
0);
|
|
|
|
/* Some external code must kick a request into TCP_REQUEST_STATE_COMPLETED
|
|
|
|
* to escape this state. */
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_STATE_COMPLETED:
|
|
|
|
spdk_trace_record(TRACE_TCP_REQUEST_STATE_COMPLETED, 0, 0, (uintptr_t)tcp_req, 0);
|
2019-08-22 22:45:07 +00:00
|
|
|
if (tcp_req->req.data_from_pool) {
|
2019-09-26 10:25:00 +00:00
|
|
|
spdk_nvmf_request_free_buffers(&tcp_req->req, group, transport);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
tcp_req->req.length = 0;
|
|
|
|
tcp_req->req.iovcnt = 0;
|
|
|
|
tcp_req->req.data = NULL;
|
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_FREE);
|
|
|
|
break;
|
|
|
|
case TCP_REQUEST_NUM_STATES:
|
|
|
|
default:
|
|
|
|
assert(0);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tcp_req->state != prev_state) {
|
|
|
|
progress = true;
|
|
|
|
}
|
|
|
|
} while (tcp_req->state != prev_state);
|
|
|
|
|
|
|
|
return progress;
|
|
|
|
}
|
2019-08-08 14:56:08 +00:00
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_sock_cb(void *arg, struct spdk_sock_group *group, struct spdk_sock *sock)
|
|
|
|
{
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair = arg;
|
2018-08-02 02:21:45 +00:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
assert(tqpair != NULL);
|
|
|
|
rc = spdk_nvmf_tcp_sock_process(tqpair);
|
2019-01-24 14:29:18 +00:00
|
|
|
|
|
|
|
/* check the following two factors:
|
|
|
|
* rc: The socket is closed
|
|
|
|
* State of tqpair: The tqpair is in EXITING state due to internal error
|
|
|
|
*/
|
|
|
|
if ((rc < 0) || (tqpair->state == NVME_TCP_QPAIR_STATE_EXITING)) {
|
2019-10-04 16:58:18 +00:00
|
|
|
spdk_nvmf_tcp_qpair_disconnect(tqpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_poll_group_add(struct spdk_nvmf_transport_poll_group *group,
|
|
|
|
struct spdk_nvmf_qpair *qpair)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_poll_group *tgroup;
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
tgroup = SPDK_CONTAINEROF(group, struct spdk_nvmf_tcp_poll_group, group);
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = SPDK_CONTAINEROF(qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
rc = spdk_sock_group_add_sock(tgroup->sock_group, tqpair->sock,
|
|
|
|
spdk_nvmf_tcp_sock_cb, tqpair);
|
|
|
|
if (rc != 0) {
|
|
|
|
SPDK_ERRLOG("Could not add sock to sock_group: %s (%d)\n",
|
|
|
|
spdk_strerror(errno), errno);
|
|
|
|
spdk_nvmf_tcp_qpair_destroy(tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = spdk_nvmf_tcp_qpair_sock_init(tqpair);
|
|
|
|
if (rc != 0) {
|
|
|
|
SPDK_ERRLOG("Cannot set sock opt for tqpair=%p\n", tqpair);
|
|
|
|
spdk_nvmf_tcp_qpair_destroy(tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = spdk_nvmf_tcp_qpair_init(&tqpair->qpair);
|
|
|
|
if (rc < 0) {
|
|
|
|
SPDK_ERRLOG("Cannot init tqpair=%p\n", tqpair);
|
|
|
|
spdk_nvmf_tcp_qpair_destroy(tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = spdk_nvmf_tcp_qpair_init_mem_resource(tqpair, 1);
|
|
|
|
if (rc < 0) {
|
|
|
|
SPDK_ERRLOG("Cannot init memory resource info for tqpair=%p\n", tqpair);
|
|
|
|
spdk_nvmf_tcp_qpair_destroy(tqpair);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-01-28 21:02:47 +00:00
|
|
|
tqpair->group = tgroup;
|
2018-08-02 02:21:45 +00:00
|
|
|
tqpair->state = NVME_TCP_QPAIR_STATE_INVALID;
|
|
|
|
TAILQ_INSERT_TAIL(&tgroup->qpairs, tqpair, link);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-11-21 02:11:25 +00:00
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_poll_group_remove(struct spdk_nvmf_transport_poll_group *group,
|
|
|
|
struct spdk_nvmf_qpair *qpair)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_poll_group *tgroup;
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
2018-11-21 02:11:25 +00:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
tgroup = SPDK_CONTAINEROF(group, struct spdk_nvmf_tcp_poll_group, group);
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = SPDK_CONTAINEROF(qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
2018-11-21 02:11:25 +00:00
|
|
|
|
2019-01-28 21:02:47 +00:00
|
|
|
assert(tqpair->group == tgroup);
|
|
|
|
|
2018-11-21 02:11:25 +00:00
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "remove tqpair=%p from the tgroup=%p\n", tqpair, tgroup);
|
|
|
|
TAILQ_REMOVE(&tgroup->qpairs, tqpair, link);
|
|
|
|
rc = spdk_sock_group_remove_sock(tgroup->sock_group, tqpair->sock);
|
|
|
|
if (rc != 0) {
|
|
|
|
SPDK_ERRLOG("Could not remove sock from sock_group: %s (%d)\n",
|
|
|
|
spdk_strerror(errno), errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_req_complete(struct spdk_nvmf_request *req)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_transport *ttransport;
|
2019-01-28 22:25:22 +00:00
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
ttransport = SPDK_CONTAINEROF(req->qpair->transport, struct spdk_nvmf_tcp_transport, transport);
|
2019-01-28 22:25:22 +00:00
|
|
|
tcp_req = SPDK_CONTAINEROF(req, struct spdk_nvmf_tcp_req, req);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
spdk_nvmf_tcp_req_set_state(tcp_req, TCP_REQUEST_STATE_EXECUTED);
|
|
|
|
spdk_nvmf_tcp_req_process(ttransport, tcp_req);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_close_qpair(struct spdk_nvmf_qpair *qpair)
|
|
|
|
{
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "enter\n");
|
|
|
|
|
2019-01-28 22:32:30 +00:00
|
|
|
spdk_nvmf_tcp_qpair_destroy(SPDK_CONTAINEROF(qpair, struct spdk_nvmf_tcp_qpair, qpair));
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_poll_group_poll(struct spdk_nvmf_transport_poll_group *group)
|
|
|
|
{
|
|
|
|
struct spdk_nvmf_tcp_poll_group *tgroup;
|
|
|
|
int rc;
|
2019-09-02 06:00:58 +00:00
|
|
|
struct spdk_nvmf_request *req, *req_tmp;
|
|
|
|
struct spdk_nvmf_tcp_req *tcp_req;
|
2019-07-20 13:06:23 +00:00
|
|
|
struct spdk_nvmf_tcp_transport *ttransport = SPDK_CONTAINEROF(group->transport,
|
|
|
|
struct spdk_nvmf_tcp_transport, transport);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
tgroup = SPDK_CONTAINEROF(group, struct spdk_nvmf_tcp_poll_group, group);
|
|
|
|
|
|
|
|
if (spdk_unlikely(TAILQ_EMPTY(&tgroup->qpairs))) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-09-02 06:00:58 +00:00
|
|
|
STAILQ_FOREACH_SAFE(req, &group->pending_buf_queue, buf_link, req_tmp) {
|
|
|
|
tcp_req = SPDK_CONTAINEROF(req, struct spdk_nvmf_tcp_req, req);
|
2019-07-20 13:06:23 +00:00
|
|
|
if (spdk_nvmf_tcp_req_process(ttransport, tcp_req) == false) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-02 02:21:45 +00:00
|
|
|
rc = spdk_sock_group_poll(tgroup->sock_group);
|
|
|
|
if (rc < 0) {
|
|
|
|
SPDK_ERRLOG("Failed to poll sock_group=%p\n", tgroup->sock_group);
|
|
|
|
}
|
|
|
|
|
2019-07-31 02:08:30 +00:00
|
|
|
return rc;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_qpair_get_trid(struct spdk_nvmf_qpair *qpair,
|
|
|
|
struct spdk_nvme_transport_id *trid, bool peer)
|
|
|
|
{
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
uint16_t port;
|
|
|
|
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = SPDK_CONTAINEROF(qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
trid->trtype = SPDK_NVME_TRANSPORT_TCP;
|
|
|
|
|
|
|
|
if (peer) {
|
|
|
|
snprintf(trid->traddr, sizeof(trid->traddr), "%s", tqpair->initiator_addr);
|
|
|
|
port = tqpair->initiator_port;
|
|
|
|
} else {
|
|
|
|
snprintf(trid->traddr, sizeof(trid->traddr), "%s", tqpair->target_addr);
|
|
|
|
port = tqpair->target_port;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (spdk_sock_is_ipv4(tqpair->sock)) {
|
|
|
|
trid->adrfam = SPDK_NVMF_ADRFAM_IPV4;
|
|
|
|
} else if (spdk_sock_is_ipv4(tqpair->sock)) {
|
|
|
|
trid->adrfam = SPDK_NVMF_ADRFAM_IPV6;
|
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
snprintf(trid->trsvcid, sizeof(trid->trsvcid), "%d", port);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_qpair_get_local_trid(struct spdk_nvmf_qpair *qpair,
|
|
|
|
struct spdk_nvme_transport_id *trid)
|
|
|
|
{
|
|
|
|
return spdk_nvmf_tcp_qpair_get_trid(qpair, trid, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_qpair_get_peer_trid(struct spdk_nvmf_qpair *qpair,
|
|
|
|
struct spdk_nvme_transport_id *trid)
|
|
|
|
{
|
|
|
|
return spdk_nvmf_tcp_qpair_get_trid(qpair, trid, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_qpair_get_listen_trid(struct spdk_nvmf_qpair *qpair,
|
|
|
|
struct spdk_nvme_transport_id *trid)
|
|
|
|
{
|
|
|
|
return spdk_nvmf_tcp_qpair_get_trid(qpair, trid, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
spdk_nvmf_tcp_qpair_set_sq_size(struct spdk_nvmf_qpair *qpair)
|
|
|
|
{
|
2019-01-28 22:32:30 +00:00
|
|
|
struct spdk_nvmf_tcp_qpair *tqpair;
|
2018-08-02 02:21:45 +00:00
|
|
|
int rc;
|
2019-01-28 22:32:30 +00:00
|
|
|
tqpair = SPDK_CONTAINEROF(qpair, struct spdk_nvmf_tcp_qpair, qpair);
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
rc = spdk_nvmf_tcp_qpair_init_mem_resource(tqpair, tqpair->qpair.sq_head_max);
|
|
|
|
if (!rc) {
|
|
|
|
tqpair->max_queue_depth += tqpair->qpair.sq_head_max;
|
|
|
|
tqpair->free_pdu_num += tqpair->qpair.sq_head_max;
|
|
|
|
tqpair->state_cntr[TCP_REQUEST_STATE_FREE] += tqpair->qpair.sq_head_max;
|
|
|
|
SPDK_DEBUGLOG(SPDK_LOG_NVMF_TCP, "The queue depth=%u for tqpair=%p\n",
|
|
|
|
tqpair->max_queue_depth, tqpair);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_MAX_QUEUE_DEPTH 128
|
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_AQ_DEPTH 128
|
2019-05-16 22:30:13 +00:00
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_MAX_QPAIRS_PER_CTRLR 128
|
2018-08-02 02:21:45 +00:00
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_IN_CAPSULE_DATA_SIZE 4096
|
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_MAX_IO_SIZE 131072
|
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_IO_UNIT_SIZE 131072
|
2019-03-22 18:46:31 +00:00
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_NUM_SHARED_BUFFERS 511
|
2019-01-07 18:07:59 +00:00
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_BUFFER_CACHE_SIZE 32
|
2019-06-11 15:07:28 +00:00
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_SUCCESS_OPTIMIZATION true
|
2019-06-26 07:45:25 +00:00
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_DIF_INSERT_OR_STRIP false
|
2019-07-15 12:58:16 +00:00
|
|
|
#define SPDK_NVMF_TCP_DEFAULT_SOCK_PRIORITY 0
|
2018-08-02 02:21:45 +00:00
|
|
|
|
|
|
|
static void
|
|
|
|
spdk_nvmf_tcp_opts_init(struct spdk_nvmf_transport_opts *opts)
|
|
|
|
{
|
2018-12-14 14:29:48 +00:00
|
|
|
opts->max_queue_depth = SPDK_NVMF_TCP_DEFAULT_MAX_QUEUE_DEPTH;
|
|
|
|
opts->max_qpairs_per_ctrlr = SPDK_NVMF_TCP_DEFAULT_MAX_QPAIRS_PER_CTRLR;
|
|
|
|
opts->in_capsule_data_size = SPDK_NVMF_TCP_DEFAULT_IN_CAPSULE_DATA_SIZE;
|
|
|
|
opts->max_io_size = SPDK_NVMF_TCP_DEFAULT_MAX_IO_SIZE;
|
|
|
|
opts->io_unit_size = SPDK_NVMF_TCP_DEFAULT_IO_UNIT_SIZE;
|
|
|
|
opts->max_aq_depth = SPDK_NVMF_TCP_DEFAULT_AQ_DEPTH;
|
|
|
|
opts->num_shared_buffers = SPDK_NVMF_TCP_DEFAULT_NUM_SHARED_BUFFERS;
|
2019-01-07 18:07:59 +00:00
|
|
|
opts->buf_cache_size = SPDK_NVMF_TCP_DEFAULT_BUFFER_CACHE_SIZE;
|
2019-06-11 15:07:28 +00:00
|
|
|
opts->c2h_success = SPDK_NVMF_TCP_DEFAULT_SUCCESS_OPTIMIZATION;
|
2019-06-26 07:45:25 +00:00
|
|
|
opts->dif_insert_or_strip = SPDK_NVMF_TCP_DEFAULT_DIF_INSERT_OR_STRIP;
|
2019-07-15 12:58:16 +00:00
|
|
|
opts->sock_priority = SPDK_NVMF_TCP_DEFAULT_SOCK_PRIORITY;
|
2018-08-02 02:21:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const struct spdk_nvmf_transport_ops spdk_nvmf_transport_tcp = {
|
|
|
|
.type = SPDK_NVME_TRANSPORT_TCP,
|
|
|
|
.opts_init = spdk_nvmf_tcp_opts_init,
|
|
|
|
.create = spdk_nvmf_tcp_create,
|
|
|
|
.destroy = spdk_nvmf_tcp_destroy,
|
|
|
|
|
|
|
|
.listen = spdk_nvmf_tcp_listen,
|
|
|
|
.stop_listen = spdk_nvmf_tcp_stop_listen,
|
|
|
|
.accept = spdk_nvmf_tcp_accept,
|
|
|
|
|
|
|
|
.listener_discover = spdk_nvmf_tcp_discover,
|
|
|
|
|
|
|
|
.poll_group_create = spdk_nvmf_tcp_poll_group_create,
|
2019-05-15 13:53:39 +00:00
|
|
|
.get_optimal_poll_group = spdk_nvmf_tcp_get_optimal_poll_group,
|
2018-08-02 02:21:45 +00:00
|
|
|
.poll_group_destroy = spdk_nvmf_tcp_poll_group_destroy,
|
|
|
|
.poll_group_add = spdk_nvmf_tcp_poll_group_add,
|
2018-11-21 02:11:25 +00:00
|
|
|
.poll_group_remove = spdk_nvmf_tcp_poll_group_remove,
|
2018-08-02 02:21:45 +00:00
|
|
|
.poll_group_poll = spdk_nvmf_tcp_poll_group_poll,
|
|
|
|
|
|
|
|
.req_free = spdk_nvmf_tcp_req_free,
|
|
|
|
.req_complete = spdk_nvmf_tcp_req_complete,
|
|
|
|
|
|
|
|
.qpair_fini = spdk_nvmf_tcp_close_qpair,
|
|
|
|
.qpair_get_local_trid = spdk_nvmf_tcp_qpair_get_local_trid,
|
|
|
|
.qpair_get_peer_trid = spdk_nvmf_tcp_qpair_get_peer_trid,
|
|
|
|
.qpair_get_listen_trid = spdk_nvmf_tcp_qpair_get_listen_trid,
|
|
|
|
.qpair_set_sqsize = spdk_nvmf_tcp_qpair_set_sq_size,
|
|
|
|
};
|
|
|
|
|
|
|
|
SPDK_LOG_REGISTER_COMPONENT("nvmf_tcp", SPDK_LOG_NVMF_TCP)
|