xref: /titanic_52/usr/src/uts/common/rpc/clnt_rdma.c (revision b6c3f7863936abeae522e48a13887dddeb691a45)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 /* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */
27 /* All Rights Reserved */
28 /*
29  * Portions of this source code were derived from Berkeley
30  * 4.3 BSD under license from the Regents of the University of
31  * California.
32  */
33 
34 #pragma ident	"%Z%%M%	%I%	%E% SMI"
35 
36 #include <sys/param.h>
37 #include <sys/types.h>
38 #include <sys/user.h>
39 #include <sys/systm.h>
40 #include <sys/sysmacros.h>
41 #include <sys/errno.h>
42 #include <sys/kmem.h>
43 #include <sys/debug.h>
44 #include <sys/systm.h>
45 #include <sys/kstat.h>
46 #include <sys/t_lock.h>
47 #include <sys/ddi.h>
48 #include <sys/cmn_err.h>
49 #include <sys/time.h>
50 #include <sys/isa_defs.h>
51 #include <sys/zone.h>
52 
53 #include <rpc/types.h>
54 #include <rpc/xdr.h>
55 #include <rpc/auth.h>
56 #include <rpc/clnt.h>
57 #include <rpc/rpc_msg.h>
58 #include <rpc/rpc_rdma.h>
59 
60 
61 static enum clnt_stat clnt_rdma_kcallit(CLIENT *, rpcproc_t, xdrproc_t,
62     caddr_t, xdrproc_t, caddr_t, struct timeval);
63 static void	clnt_rdma_kabort(CLIENT *);
64 static void	clnt_rdma_kerror(CLIENT *, struct rpc_err *);
65 static bool_t	clnt_rdma_kfreeres(CLIENT *, xdrproc_t, caddr_t);
66 static void	clnt_rdma_kdestroy(CLIENT *);
67 static bool_t	clnt_rdma_kcontrol(CLIENT *, int, char *);
68 static int	clnt_rdma_ksettimers(CLIENT *, struct rpc_timers *,
69     struct rpc_timers *, int, void(*)(int, int, caddr_t), caddr_t, uint32_t);
70 
71 /*
72  * Operations vector for RDMA based RPC
73  */
74 static struct clnt_ops rdma_clnt_ops = {
75 	clnt_rdma_kcallit,	/* do rpc call */
76 	clnt_rdma_kabort,	/* abort call */
77 	clnt_rdma_kerror,	/* return error status */
78 	clnt_rdma_kfreeres,	/* free results */
79 	clnt_rdma_kdestroy,	/* destroy rpc handle */
80 	clnt_rdma_kcontrol,	/* the ioctl() of rpc */
81 	clnt_rdma_ksettimers,	/* set retry timers */
82 };
83 
84 /*
85  * The size of the preserialized RPC header information.
86  */
87 #define	CKU_HDRSIZE	20
88 
89 /*
90  * Per RPC RDMA endpoint details
91  */
92 typedef struct cku_private {
93 	CLIENT			cku_client;	/* client handle */
94 	rdma_mod_t		*cku_rd_mod;	/* underlying RDMA mod */
95 	void			*cku_rd_handle;	/* underlying RDMA device */
96 	struct netbuf		cku_addr;	/* remote netbuf address */
97 	int			cku_addrfmly;	/* for finding addr_type */
98 	struct rpc_err		cku_err;	/* error status */
99 	struct cred		*cku_cred;	/* credentials */
100 	XDR			cku_outxdr;	/* xdr stream for output */
101 	uint32_t		cku_outsz;
102 	XDR			cku_inxdr;	/* xdr stream for input */
103 	char			cku_rpchdr[CKU_HDRSIZE+4]; /* rpc header */
104 	uint32_t		cku_xid;	/* current XID */
105 } cku_private_t;
106 
107 #define	CLNT_RDMA_DELAY	10	/* secs to delay after a connection failure */
108 static int clnt_rdma_min_delay = CLNT_RDMA_DELAY;
109 
110 struct {
111 	kstat_named_t	rccalls;
112 	kstat_named_t	rcbadcalls;
113 	kstat_named_t	rcbadxids;
114 	kstat_named_t	rctimeouts;
115 	kstat_named_t	rcnewcreds;
116 	kstat_named_t	rcbadverfs;
117 	kstat_named_t	rctimers;
118 	kstat_named_t	rccantconn;
119 	kstat_named_t	rcnomem;
120 	kstat_named_t	rcintrs;
121 	kstat_named_t	rclongrpcs;
122 } rdmarcstat = {
123 	{ "calls",	KSTAT_DATA_UINT64 },
124 	{ "badcalls",	KSTAT_DATA_UINT64 },
125 	{ "badxids",	KSTAT_DATA_UINT64 },
126 	{ "timeouts",	KSTAT_DATA_UINT64 },
127 	{ "newcreds",	KSTAT_DATA_UINT64 },
128 	{ "badverfs",	KSTAT_DATA_UINT64 },
129 	{ "timers",	KSTAT_DATA_UINT64 },
130 	{ "cantconn",	KSTAT_DATA_UINT64 },
131 	{ "nomem",	KSTAT_DATA_UINT64 },
132 	{ "interrupts", KSTAT_DATA_UINT64 },
133 	{ "longrpc", 	KSTAT_DATA_UINT64 }
134 };
135 
136 kstat_named_t *rdmarcstat_ptr = (kstat_named_t *)&rdmarcstat;
137 uint_t rdmarcstat_ndata = sizeof (rdmarcstat) / sizeof (kstat_named_t);
138 
139 #ifdef DEBUG
140 int rdma_clnt_debug = 0;
141 #endif
142 
143 #ifdef accurate_stats
144 extern kmutex_t rdmarcstat_lock;    /* mutex for rcstat updates */
145 
146 #define	RCSTAT_INCR(x)			\
147 	mutex_enter(&rdmarcstat_lock);	\
148 	rdmarcstat.x.value.ui64++;	\
149 	mutex_exit(&rdmarcstat_lock);
150 #else
151 #define	RCSTAT_INCR(x)			\
152 	rdmarcstat.x.value.ui64++;
153 #endif
154 
155 #define	ptoh(p)		(&((p)->cku_client))
156 #define	htop(h)		((cku_private_t *)((h)->cl_private))
157 
158 int
159 clnt_rdma_kcreate(char *proto, void *handle, struct netbuf *raddr, int family,
160     rpcprog_t pgm, rpcvers_t vers, struct cred *cred, CLIENT **cl)
161 {
162 	CLIENT *h;
163 	struct cku_private *p;
164 	struct rpc_msg call_msg;
165 	rdma_registry_t *rp;
166 
167 	ASSERT(INGLOBALZONE(curproc));
168 
169 	if (cl == NULL)
170 		return (EINVAL);
171 	*cl = NULL;
172 
173 	p = kmem_zalloc(sizeof (*p), KM_SLEEP);
174 
175 	/*
176 	 * Find underlying RDMATF plugin
177 	 */
178 	rw_enter(&rdma_lock, RW_READER);
179 	rp = rdma_mod_head;
180 	while (rp != NULL) {
181 		if (strcmp(rp->r_mod->rdma_api, proto))
182 			rp = rp->r_next;
183 		else {
184 			p->cku_rd_mod = rp->r_mod;
185 			p->cku_rd_handle = handle;
186 			break;
187 		}
188 	}
189 	rw_exit(&rdma_lock);
190 
191 	if (p->cku_rd_mod == NULL) {
192 		/*
193 		 * Should not happen.
194 		 * No matching RDMATF plugin.
195 		 */
196 		kmem_free(p, sizeof (struct cku_private));
197 		return (EINVAL);
198 	}
199 
200 	h = ptoh(p);
201 	h->cl_ops = &rdma_clnt_ops;
202 	h->cl_private = (caddr_t)p;
203 	h->cl_auth = authkern_create();
204 
205 	/* call message, just used to pre-serialize below */
206 	call_msg.rm_xid = 0;
207 	call_msg.rm_direction = CALL;
208 	call_msg.rm_call.cb_rpcvers = RPC_MSG_VERSION;
209 	call_msg.rm_call.cb_prog = pgm;
210 	call_msg.rm_call.cb_vers = vers;
211 
212 	xdrmem_create(&p->cku_outxdr, p->cku_rpchdr, CKU_HDRSIZE, XDR_ENCODE);
213 	/* pre-serialize call message header */
214 	if (!xdr_callhdr(&p->cku_outxdr, &call_msg)) {
215 		XDR_DESTROY(&p->cku_outxdr);
216 		auth_destroy(h->cl_auth);
217 		kmem_free(p, sizeof (struct cku_private));
218 		return (EINVAL);
219 	}
220 
221 	/*
222 	 * Set up the rpc information
223 	 */
224 	p->cku_cred = cred;
225 	p->cku_addr.buf = kmem_zalloc(raddr->maxlen, KM_SLEEP);
226 	p->cku_addr.maxlen = raddr->maxlen;
227 	p->cku_addr.len = raddr->len;
228 	bcopy(raddr->buf, p->cku_addr.buf, raddr->len);
229 	p->cku_addrfmly = family;
230 
231 	*cl = h;
232 	return (0);
233 }
234 
235 static void
236 clnt_rdma_kdestroy(CLIENT *h)
237 {
238 	struct cku_private *p = htop(h);
239 
240 	kmem_free(p->cku_addr.buf, p->cku_addr.maxlen);
241 	kmem_free(p, sizeof (*p));
242 }
243 
244 void
245 clnt_rdma_kinit(CLIENT *h, char *proto, void *handle, struct netbuf *raddr,
246     struct cred *cred)
247 {
248 	struct cku_private *p = htop(h);
249 	rdma_registry_t *rp;
250 
251 	ASSERT(INGLOBALZONE(curproc));
252 	/*
253 	 * Find underlying RDMATF plugin
254 	 */
255 	p->cku_rd_mod = NULL;
256 	rw_enter(&rdma_lock, RW_READER);
257 	rp = rdma_mod_head;
258 	while (rp != NULL) {
259 		if (strcmp(rp->r_mod->rdma_api, proto))
260 			rp = rp->r_next;
261 		else {
262 			p->cku_rd_mod = rp->r_mod;
263 			p->cku_rd_handle = handle;
264 			break;
265 		}
266 
267 	}
268 	rw_exit(&rdma_lock);
269 
270 	/*
271 	 * Set up the rpc information
272 	 */
273 	p->cku_cred = cred;
274 	p->cku_xid = 0;
275 
276 	if (p->cku_addr.maxlen < raddr->len) {
277 		if (p->cku_addr.maxlen != 0 && p->cku_addr.buf != NULL)
278 			kmem_free(p->cku_addr.buf, p->cku_addr.maxlen);
279 		p->cku_addr.buf = kmem_zalloc(raddr->maxlen, KM_SLEEP);
280 		p->cku_addr.maxlen = raddr->maxlen;
281 	}
282 
283 	p->cku_addr.len = raddr->len;
284 	bcopy(raddr->buf, p->cku_addr.buf, raddr->len);
285 	h->cl_ops = &rdma_clnt_ops;
286 }
287 
288 /* ARGSUSED */
289 static enum clnt_stat
290 clnt_rdma_kcallit(CLIENT *h, rpcproc_t procnum, xdrproc_t xdr_args,
291     caddr_t argsp, xdrproc_t xdr_results, caddr_t resultsp, struct timeval wait)
292 {
293 	cku_private_t *p = htop(h);
294 	int 	status;
295 	XDR 	*xdrs;
296 	XDR	*cxdrp = NULL, callxdr;	/* for xdrrdma encoding the RPC call */
297 	XDR	*rxdrp = NULL, replxdr;	/* for xdrrdma decoding the RPC reply */
298 	struct rpc_msg 	reply_msg;
299 	struct clist *sendlist, *recvlist = NULL;
300 	struct clist *cl = NULL, *cle = NULL;
301 	uint_t vers, op;
302 	uint_t off;
303 	uint32_t xid;
304 	CONN *conn = NULL;
305 	rdma_buf_t clmsg, rpcmsg, longmsg, rpcreply;
306 	int msglen;
307 	clock_t	ticks;
308 
309 	RCSTAT_INCR(rccalls);
310 	/*
311 	 * Get unique xid
312 	 */
313 	if (p->cku_xid == 0)
314 		p->cku_xid = alloc_xid();
315 
316 	status = RDMA_GET_CONN(p->cku_rd_mod->rdma_ops, &p->cku_addr,
317 	    p->cku_addrfmly, p->cku_rd_handle, &conn);
318 
319 	if (conn == NULL) {
320 		/*
321 		 * Connect failed to server. Could be because of one
322 		 * of several things. In some cases we don't want
323 		 * the caller to retry immediately - delay before
324 		 * returning to caller.
325 		 */
326 		switch (status) {
327 		case RDMA_TIMEDOUT:
328 			/*
329 			 * Already timed out. No need to delay
330 			 * some more.
331 			 */
332 			p->cku_err.re_status = RPC_TIMEDOUT;
333 			p->cku_err.re_errno = ETIMEDOUT;
334 			break;
335 		case RDMA_INTR:
336 			/*
337 			 * Failed because of an signal. Very likely
338 			 * the caller will not retry.
339 			 */
340 			p->cku_err.re_status = RPC_INTR;
341 			p->cku_err.re_errno = EINTR;
342 			break;
343 		default:
344 			/*
345 			 * All other failures - server down or service
346 			 * down or temporary resource failure. Delay before
347 			 * returning to caller.
348 			 */
349 			ticks = clnt_rdma_min_delay * drv_usectohz(1000000);
350 			p->cku_err.re_status = RPC_CANTCONNECT;
351 			p->cku_err.re_errno = EIO;
352 
353 			if (h->cl_nosignal == TRUE) {
354 				delay(ticks);
355 			} else {
356 				if (delay_sig(ticks) == EINTR) {
357 					p->cku_err.re_status = RPC_INTR;
358 					p->cku_err.re_errno = EINTR;
359 				}
360 			}
361 			break;
362 		}
363 
364 		return (p->cku_err.re_status);
365 	}
366 	/*
367 	 * Get the size of the rpc call message. Need this
368 	 * to determine if the rpc call message will fit in
369 	 * the pre-allocated RDMA buffers. If the rpc call
370 	 * message length is greater that the pre-allocated
371 	 * buffers then, it is a Long RPC. A one time use
372 	 * buffer is allocated and registered for the Long
373 	 * RPC call.
374 	 */
375 	xdrs = &callxdr;
376 	msglen = CKU_HDRSIZE + BYTES_PER_XDR_UNIT;
377 	if (h->cl_auth->ah_cred.oa_flavor != RPCSEC_GSS) {
378 		msglen += xdrrdma_authsize(h->cl_auth, p->cku_cred,
379 				rdma_minchunk);
380 		msglen += xdrrdma_sizeof(xdr_args, argsp, rdma_minchunk);
381 
382 		if (msglen > RPC_MSG_SZ) {
383 
384 			/*
385 			 * Long RPC. Allocate one time use custom buffer.
386 			 */
387 			rpcmsg.type = CHUNK_BUFFER;
388 			rpcmsg.addr = kmem_zalloc(msglen, KM_SLEEP);
389 			cle = kmem_zalloc(sizeof (*cle), KM_SLEEP);
390 			cle->c_xdroff = 0;
391 			cle->c_len  = rpcmsg.len = msglen;
392 			cle->c_saddr = (uint64)(uintptr_t)rpcmsg.addr;
393 			cle->c_next = NULL;
394 			xdrrdma_create(xdrs, rpcmsg.addr, msglen,
395 			    rdma_minchunk, cle, XDR_ENCODE, NULL);
396 			cxdrp = xdrs;
397 			op = RDMA_NOMSG;
398 		} else {
399 			/*
400 			 * Get a pre-allocated buffer for rpc call
401 			 */
402 			rpcmsg.type = SEND_BUFFER;
403 			if (RDMA_BUF_ALLOC(conn, &rpcmsg)) {
404 				p->cku_err.re_status = RPC_CANTSEND;
405 				p->cku_err.re_errno = EIO;
406 				RCSTAT_INCR(rcnomem);
407 				cmn_err(CE_WARN,
408 				    "clnt_rdma_kcallit: no buffers!");
409 				goto done;
410 			}
411 			xdrrdma_create(xdrs, rpcmsg.addr, rpcmsg.len,
412 			    rdma_minchunk, NULL, XDR_ENCODE, NULL);
413 			cxdrp = xdrs;
414 			op = RDMA_MSG;
415 		}
416 	} else {
417 		/*
418 		 * For RPCSEC_GSS since we cannot accurately presize the
419 		 * buffer required for encoding, we assume that its going
420 		 * to be a Long RPC to start with. We also create the
421 		 * the XDR stream with min_chunk set to 0 which instructs
422 		 * the XDR layer to not chunk the incoming byte stream.
423 		 */
424 
425 		msglen += 2 * MAX_AUTH_BYTES + 2 * sizeof (struct opaque_auth);
426 		msglen += xdr_sizeof(xdr_args, argsp);
427 
428 		/*
429 		 * Long RPC. Allocate one time use custom buffer.
430 		 */
431 		longmsg.type = CHUNK_BUFFER;
432 		longmsg.addr = kmem_zalloc(msglen, KM_SLEEP);
433 		cle = kmem_zalloc(sizeof (*cle), KM_SLEEP);
434 		cle->c_xdroff = 0;
435 		cle->c_len  = longmsg.len = msglen;
436 		cle->c_saddr = (uint64)(uintptr_t)longmsg.addr;
437 		cle->c_next = NULL;
438 		xdrrdma_create(xdrs, longmsg.addr, msglen, 0, cle,
439 		    XDR_ENCODE, NULL);
440 		cxdrp = xdrs;
441 		op = RDMA_NOMSG;
442 	}
443 
444 	if (h->cl_auth->ah_cred.oa_flavor != RPCSEC_GSS) {
445 		/*
446 		 * Copy in the preserialized RPC header
447 		 * information.
448 		 */
449 		bcopy(p->cku_rpchdr, rpcmsg.addr, CKU_HDRSIZE);
450 
451 		/*
452 		 * transaction id is the 1st thing in the output
453 		 * buffer.
454 		 */
455 		/* LINTED pointer alignment */
456 		(*(uint32_t *)(rpcmsg.addr)) = p->cku_xid;
457 
458 		/* Skip the preserialized stuff. */
459 		XDR_SETPOS(xdrs, CKU_HDRSIZE);
460 
461 		/* Serialize dynamic stuff into the output buffer. */
462 		if ((!XDR_PUTINT32(xdrs, (int32_t *)&procnum)) ||
463 		    (!AUTH_MARSHALL(h->cl_auth, xdrs, p->cku_cred)) ||
464 		    (!(*xdr_args)(xdrs, argsp))) {
465 			rdma_buf_free(conn, &rpcmsg);
466 			if (cle)
467 				clist_free(cle);
468 			p->cku_err.re_status = RPC_CANTENCODEARGS;
469 			p->cku_err.re_errno = EIO;
470 			cmn_err(CE_WARN,
471 	"clnt_rdma_kcallit: XDR_PUTINT32/AUTH_MARSHAL/xdr_args failed");
472 			goto done;
473 		}
474 		p->cku_outsz = XDR_GETPOS(xdrs);
475 	} else {
476 		uint32_t *uproc = (uint32_t *)&p->cku_rpchdr[CKU_HDRSIZE];
477 		IXDR_PUT_U_INT32(uproc, procnum);
478 		(*(uint32_t *)(&p->cku_rpchdr[0])) = p->cku_xid;
479 		XDR_SETPOS(xdrs, 0);
480 
481 		/* Serialize the procedure number and the arguments. */
482 		if (!AUTH_WRAP(h->cl_auth, (caddr_t)p->cku_rpchdr,
483 		    CKU_HDRSIZE+4, xdrs, xdr_args, argsp)) {
484 			if (longmsg.addr != xdrs->x_base) {
485 				longmsg.addr = xdrs->x_base;
486 				longmsg.len = xdr_getbufsize(xdrs);
487 			}
488 			rdma_buf_free(conn, &longmsg);
489 			clist_free(cle);
490 			p->cku_err.re_status = RPC_CANTENCODEARGS;
491 			p->cku_err.re_errno = EIO;
492 			cmn_err(CE_WARN,
493 		"clnt_rdma_kcallit: AUTH_WRAP failed");
494 			goto done;
495 		}
496 		/*
497 		 * If we had to allocate a new buffer while encoding
498 		 * then update the addr and len.
499 		 */
500 		if (longmsg.addr != xdrs->x_base) {
501 			longmsg.addr = xdrs->x_base;
502 			longmsg.len = xdr_getbufsize(xdrs);
503 		}
504 
505 		/*
506 		 * If it so happens that the encoded message is after all
507 		 * not long enough to be a Long RPC then allocate a
508 		 * SEND_BUFFER and copy the encoded message into it.
509 		 */
510 		p->cku_outsz = XDR_GETPOS(xdrs);
511 		if (p->cku_outsz > RPC_MSG_SZ) {
512 			rpcmsg.type = CHUNK_BUFFER;
513 			rpcmsg.addr = longmsg.addr;
514 			rpcmsg.len = longmsg.len;
515 		} else {
516 			clist_free(cle);
517 			XDR_DESTROY(cxdrp);
518 			cxdrp = NULL;
519 			/*
520 			 * Get a pre-allocated buffer for rpc call
521 			 */
522 			rpcmsg.type = SEND_BUFFER;
523 			if (RDMA_BUF_ALLOC(conn, &rpcmsg)) {
524 				p->cku_err.re_status = RPC_CANTSEND;
525 				p->cku_err.re_errno = EIO;
526 				RCSTAT_INCR(rcnomem);
527 				cmn_err(CE_WARN,
528 				    "clnt_rdma_kcallit: no buffers!");
529 				rdma_buf_free(conn, &longmsg);
530 				goto done;
531 			}
532 			bcopy(longmsg.addr, rpcmsg.addr, p->cku_outsz);
533 			xdrrdma_create(xdrs, rpcmsg.addr, p->cku_outsz, 0,
534 			    NULL, XDR_ENCODE, NULL);
535 			cxdrp = xdrs;
536 			rdma_buf_free(conn, &longmsg);
537 			op = RDMA_MSG;
538 		}
539 	}
540 
541 	cl = xdrrdma_clist(xdrs);
542 
543 	/*
544 	 * Update the chunk size information for the Long RPC msg.
545 	 */
546 	if (cl && op == RDMA_NOMSG)
547 		cl->c_len = p->cku_outsz;
548 
549 	/*
550 	 * Set up the RDMA chunk message
551 	 */
552 	vers = RPCRDMA_VERS;
553 	clmsg.type = SEND_BUFFER;
554 	if (RDMA_BUF_ALLOC(conn, &clmsg)) {
555 		p->cku_err.re_status = RPC_CANTSEND;
556 		p->cku_err.re_errno = EIO;
557 		rdma_buf_free(conn, &rpcmsg);
558 		RCSTAT_INCR(rcnomem);
559 		cmn_err(CE_WARN, "clnt_rdma_kcallit: no free buffers!!");
560 		goto done;
561 	}
562 	xdrs = &p->cku_outxdr;
563 	xdrmem_create(xdrs, clmsg.addr, clmsg.len, XDR_ENCODE);
564 	/*
565 	 * Treat xid as opaque (xid is the first entity
566 	 * in the rpc rdma message).
567 	 */
568 	(*(uint32_t *)clmsg.addr) = p->cku_xid;
569 	/* Skip xid and set the xdr position accordingly. */
570 	XDR_SETPOS(xdrs, sizeof (uint32_t));
571 	(void) xdr_u_int(xdrs, &vers);
572 	(void) xdr_u_int(xdrs, &op);
573 
574 	/*
575 	 * Now XDR the chunk list
576 	 */
577 	if (cl != NULL) {
578 
579 		/*
580 		 * Register the chunks in the list
581 		 */
582 		status = clist_register(conn, cl, 1);
583 		if (status != RDMA_SUCCESS) {
584 			cmn_err(CE_WARN,
585 		"clnt_rdma_kcallit: clist register failed");
586 			rdma_buf_free(conn, &clmsg);
587 			rdma_buf_free(conn, &rpcmsg);
588 			clist_free(cl);
589 			p->cku_err.re_status = RPC_CANTSEND;
590 			p->cku_err.re_errno = EIO;
591 			goto done;
592 		}
593 
594 	}
595 	(void) xdr_do_clist(xdrs, &cl);
596 
597 	/*
598 	 * Start with the RDMA header and clist (if any)
599 	 */
600 	sendlist = NULL;
601 	clist_add(&sendlist, 0, XDR_GETPOS(xdrs), &clmsg.handle,
602 		clmsg.addr, NULL, NULL);
603 
604 	/*
605 	 * Put the RPC call message in the send list if small RPC
606 	 */
607 	if (op == RDMA_MSG) {
608 		clist_add(&sendlist, 0, p->cku_outsz, &rpcmsg.handle,
609 			rpcmsg.addr, NULL, NULL);
610 	} else {
611 		/* Long RPC already in chunk list */
612 		RCSTAT_INCR(rclongrpcs);
613 	}
614 
615 	/*
616 	 * Set up a reply buffer ready for the reply
617 	 */
618 	status = rdma_clnt_postrecv(conn, p->cku_xid);
619 	if (status != RDMA_SUCCESS) {
620 		rdma_buf_free(conn, &clmsg);
621 		rdma_buf_free(conn, &rpcmsg);
622 		if (cl) {
623 			(void) clist_deregister(conn, cl, 1);
624 			clist_free(cl);
625 		}
626 		clist_free(sendlist);
627 		p->cku_err.re_status = RPC_CANTSEND;
628 		p->cku_err.re_errno = EIO;
629 		goto done;
630 	}
631 	/*
632 	 * sync the memory for dma
633 	 */
634 	if (cl != NULL) {
635 		status = clist_syncmem(conn, cl, 1);
636 		if (status != RDMA_SUCCESS) {
637 			rdma_buf_free(conn, &clmsg);
638 			rdma_buf_free(conn, &rpcmsg);
639 			(void) clist_deregister(conn, cl, 1);
640 			clist_free(cl);
641 			clist_free(sendlist);
642 			p->cku_err.re_status = RPC_CANTSEND;
643 			p->cku_err.re_errno = EIO;
644 			goto done;
645 		}
646 	}
647 
648 	/*
649 	 * Send the call message to the server
650 	 */
651 	status = RDMA_SEND(conn, sendlist, p->cku_xid);
652 	if (status != RDMA_SUCCESS) {
653 		if (cl) {
654 			(void) clist_deregister(conn, cl, 1);
655 			clist_free(cl);
656 			/*
657 			 * If this was a long RPC message, need
658 			 * to free that buffer.
659 			 */
660 			if (rpcmsg.type == CHUNK_BUFFER)
661 				rdma_buf_free(conn, &rpcmsg);
662 		}
663 		clist_free(sendlist);
664 		p->cku_err.re_status = RPC_CANTSEND;
665 		p->cku_err.re_errno = EIO;
666 		goto done;
667 	} else {
668 		/*
669 		 * RDMA plugin now owns the send msg buffers.
670 		 * Clear them out and don't free them here.
671 		 */
672 		clmsg.addr = NULL;
673 		if (rpcmsg.type == SEND_BUFFER)
674 			rpcmsg.addr = NULL;
675 	}
676 	clist_free(sendlist);
677 #ifdef DEBUG
678 if (rdma_clnt_debug) {
679 		printf("clnt_rdma_kcallit: send request xid %u\n", p->cku_xid);
680 	}
681 #endif
682 
683 	/*
684 	 * Recv rpc reply
685 	 */
686 	status = RDMA_RECV(conn, &recvlist, p->cku_xid);
687 
688 	/*
689 	 * Deregister chunks sent. Do this only after the reply
690 	 * is received as that is a sure indication that the
691 	 * remote end has completed RDMA of the chunks.
692 	 */
693 	if (cl != NULL) {
694 		/*
695 		 * Deregister the chunks
696 		 */
697 		(void) clist_deregister(conn, cl, 1);
698 		clist_free(cl);
699 		/*
700 		 * If long RPC free chunk
701 		 */
702 		rdma_buf_free(conn, &rpcmsg);
703 	}
704 
705 	/*
706 	 * Now check recv status
707 	 */
708 	if (status != 0) {
709 #ifdef DEBUG
710 		if (rdma_clnt_debug)
711 			cmn_err(CE_NOTE,
712 			    "clnt_rdma_kcallit: reply failed %u status %d",
713 			    p->cku_xid, status);
714 #endif
715 		if (status == RDMA_INTR) {
716 			p->cku_err.re_status = RPC_INTR;
717 			p->cku_err.re_errno = EINTR;
718 			RCSTAT_INCR(rcintrs);
719 		} else if (status == RPC_TIMEDOUT) {
720 			p->cku_err.re_status = RPC_TIMEDOUT;
721 			p->cku_err.re_errno = ETIMEDOUT;
722 			RCSTAT_INCR(rctimeouts);
723 		} else {
724 			p->cku_err.re_status = RPC_CANTRECV;
725 			p->cku_err.re_errno = EIO;
726 		}
727 		goto done;
728 	}
729 #ifdef DEBUG
730 	if (rdma_clnt_debug)
731 		printf("clnt_rdma_kcallit: got response xid %u\n", p->cku_xid);
732 #endif
733 	/*
734 	 * Process the reply message.
735 	 *
736 	 * First the chunk list (if any)
737 	 */
738 	xdrs = &(p->cku_inxdr);
739 	xdrmem_create(xdrs, (caddr_t)(uintptr_t)recvlist->c_saddr,
740 	    recvlist->c_len, XDR_DECODE);
741 	/*
742 	 * Treat xid as opaque (xid is the first entity
743 	 * in the rpc rdma message).
744 	 */
745 	xid = *(uint32_t *)(uintptr_t)recvlist->c_saddr;
746 	/* Skip xid and set the xdr position accordingly. */
747 	XDR_SETPOS(xdrs, sizeof (uint32_t));
748 	(void) xdr_u_int(xdrs, &vers);
749 	(void) xdr_u_int(xdrs, &op);
750 	(void) xdr_do_clist(xdrs, &cl);
751 	off = xdr_getpos(xdrs);
752 
753 	/*
754 	 * Now the RPC reply message itself. If the reply
755 	 * came as a chunk item, then RDMA the reply over.
756 	 */
757 	xdrs = &replxdr;
758 	if (cl && op == RDMA_NOMSG) {
759 		struct clist		*cle = cl;
760 
761 		rpcreply.type = CHUNK_BUFFER;
762 		rpcreply.addr = kmem_alloc(cle->c_len, KM_SLEEP);
763 		rpcreply.len = cle->c_len;
764 		cle->c_daddr = (uint64)(uintptr_t)rpcreply.addr;
765 		cl = cl->c_next;
766 		cle->c_next = NULL;
767 
768 		/*
769 		 * Register the rpc reply chunk destination
770 		 */
771 		status = clist_register(conn, cle, 0);
772 		if (status) {
773 			rdma_buf_free(conn, &rpcreply);
774 			clist_free(cle);
775 			p->cku_err.re_status = RPC_CANTDECODERES;
776 			p->cku_err.re_errno = EIO;
777 			cmn_err(CE_WARN,
778 			    "clnt_rdma_kcallit: clist_register failed");
779 			goto rdma_done;
780 		}
781 
782 		/*
783 		 * Now read rpc reply in
784 		 */
785 #ifdef DEBUG
786 	if (rdma_clnt_debug)
787 		printf("clnt_rdma_kcallit: read chunk, len %d, xid %u, \
788 			reply xid %u\n", cle->c_len, p->cku_xid, xid);
789 #endif
790 		status = RDMA_READ(conn, cle, WAIT);
791 		if (status) {
792 			(void) clist_deregister(conn, cle, 0);
793 			rdma_buf_free(conn, &rpcreply);
794 			clist_free(cle);
795 			p->cku_err.re_status = RPC_CANTDECODERES;
796 			p->cku_err.re_errno = EIO;
797 			cmn_err(CE_WARN,
798 				"clnt_rdma_kcallit: RDMA_READ failed");
799 			goto rdma_done;
800 		}
801 
802 		/*
803 		 * sync the memory for dma
804 		 */
805 		status = clist_syncmem(conn, cle, 0);
806 		if (status != RDMA_SUCCESS) {
807 			(void) clist_deregister(conn, cle, 0);
808 			rdma_buf_free(conn, &rpcreply);
809 			clist_free(cle);
810 			p->cku_err.re_status = RPC_CANTDECODERES;
811 			p->cku_err.re_errno = EIO;
812 			goto rdma_done;
813 		}
814 
815 		/*
816 		 * Deregister the Long RPC chunk
817 		 */
818 		(void) clist_deregister(conn, cle, 0);
819 		clist_free(cle);
820 		xdrrdma_create(xdrs, rpcreply.addr, rpcreply.len, 0, cl,
821 			XDR_DECODE, conn);
822 		rxdrp = xdrs;
823 	} else {
824 		rpcreply.addr = NULL;
825 		xdrrdma_create(xdrs,
826 		    (caddr_t)(uintptr_t)(recvlist->c_saddr + off),
827 		    recvlist->c_len - off, 0, cl, XDR_DECODE, conn);
828 		rxdrp = xdrs;
829 	}
830 
831 	reply_msg.rm_direction = REPLY;
832 	reply_msg.rm_reply.rp_stat = MSG_ACCEPTED;
833 	reply_msg.acpted_rply.ar_stat = SUCCESS;
834 	reply_msg.acpted_rply.ar_verf = _null_auth;
835 	/*
836 	 *  xdr_results will be done in AUTH_UNWRAP.
837 	 */
838 	reply_msg.acpted_rply.ar_results.where = NULL;
839 	reply_msg.acpted_rply.ar_results.proc = xdr_void;
840 
841 	/*
842 	 * Decode and validate the response.
843 	 */
844 	if (xdr_replymsg(xdrs, &reply_msg)) {
845 		enum clnt_stat re_status;
846 
847 		_seterr_reply(&reply_msg, &(p->cku_err));
848 
849 		re_status = p->cku_err.re_status;
850 		if (re_status == RPC_SUCCESS) {
851 			/*
852 			 * Reply is good, check auth.
853 			 */
854 			if (!AUTH_VALIDATE(h->cl_auth,
855 			    &reply_msg.acpted_rply.ar_verf)) {
856 				p->cku_err.re_status = RPC_AUTHERROR;
857 				p->cku_err.re_why = AUTH_INVALIDRESP;
858 				RCSTAT_INCR(rcbadverfs);
859 				cmn_err(CE_WARN,
860 			    "clnt_rdma_kcallit: AUTH_VALIDATE failed");
861 			} else if (!AUTH_UNWRAP(h->cl_auth, xdrs,
862 			    xdr_results, resultsp)) {
863 				p->cku_err.re_status = RPC_CANTDECODERES;
864 				p->cku_err.re_errno = EIO;
865 				cmn_err(CE_WARN,
866 				    "clnt_rdma_kcallit: AUTH_UNWRAP failed");
867 			}
868 		} else {
869 			/* set errno in case we can't recover */
870 			if (re_status != RPC_VERSMISMATCH &&
871 			    re_status != RPC_AUTHERROR &&
872 			    re_status != RPC_PROGVERSMISMATCH)
873 				p->cku_err.re_errno = EIO;
874 
875 			if (re_status == RPC_AUTHERROR) {
876 				/*
877 				 * Map recoverable and unrecoverable
878 				 * authentication errors to appropriate
879 				 * errno
880 				 */
881 				switch (p->cku_err.re_why) {
882 				case AUTH_BADCRED:
883 				case AUTH_BADVERF:
884 				case AUTH_INVALIDRESP:
885 				case AUTH_TOOWEAK:
886 				case AUTH_FAILED:
887 				case RPCSEC_GSS_NOCRED:
888 				case RPCSEC_GSS_FAILED:
889 					p->cku_err.re_errno = EACCES;
890 					break;
891 				case AUTH_REJECTEDCRED:
892 				case AUTH_REJECTEDVERF:
893 				default:
894 					p->cku_err.re_errno = EIO;
895 					break;
896 				}
897 				RPCLOG(1, "clnt_rdma_kcallit : "
898 				    "authentication failed with "
899 				    "RPC_AUTHERROR of type %d\n",
900 				    p->cku_err.re_why);
901 			}
902 			cmn_err(CE_WARN,
903 				    "clnt_rdma_kcallit: RPC failed");
904 
905 		}
906 	} else {
907 		p->cku_err.re_status = RPC_CANTDECODERES;
908 		p->cku_err.re_errno = EIO;
909 		cmn_err(CE_WARN, "clnt_rdma_kcallit: xdr_replymsg failed");
910 	}
911 
912 	/*
913 	 * If rpc reply is in a chunk, free it now.
914 	 */
915 	if (rpcreply.addr != NULL)
916 		rdma_buf_free(conn, &rpcreply);
917 
918 rdma_done:
919 	if ((cl != NULL) || (op == RDMA_NOMSG)) {
920 		rdma_buf_t	donemsg;
921 
922 		/*
923 		 * Free the list holding the chunk info
924 		 */
925 		if (cl) {
926 			clist_free(cl);
927 			cl = NULL;
928 		}
929 
930 		/*
931 		 * Tell the server that the reads are done
932 		 */
933 		donemsg.type = SEND_BUFFER;
934 		if (RDMA_BUF_ALLOC(conn, &donemsg)) {
935 			p->cku_err.re_status = RPC_CANTSEND;
936 			p->cku_err.re_errno = EIO;
937 			RCSTAT_INCR(rcnomem);
938 			cmn_err(CE_WARN, "clnt_rdma_kcallit: no free buffer");
939 			goto done;
940 		}
941 		xdrs = &p->cku_outxdr;
942 		xdrmem_create(xdrs, donemsg.addr, donemsg.len, XDR_ENCODE);
943 		vers = RPCRDMA_VERS;
944 		op = RDMA_DONE;
945 
946 		/*
947 		 * Treat xid as opaque (xid is the first entity
948 		 * in the rpc rdma message).
949 		 */
950 		(*(uint32_t *)donemsg.addr) = p->cku_xid;
951 		/* Skip xid and set the xdr position accordingly. */
952 		XDR_SETPOS(xdrs, sizeof (uint32_t));
953 		if (!xdr_u_int(xdrs, &vers) ||
954 		    !xdr_u_int(xdrs, &op)) {
955 			cmn_err(CE_WARN,
956 				"clnt_rdma_kcallit: xdr_u_int failed");
957 			rdma_buf_free(conn, &donemsg);
958 			goto done;
959 		}
960 
961 		sendlist = NULL;
962 		clist_add(&sendlist, 0, XDR_GETPOS(xdrs), &donemsg.handle,
963 			donemsg.addr, NULL, NULL);
964 
965 		status = RDMA_SEND(conn, sendlist, p->cku_xid);
966 		if (status != RDMA_SUCCESS) {
967 			cmn_err(CE_WARN,
968 				"clnt_rdma_kcallit: RDMA_SEND failed xid %u",
969 					p->cku_xid);
970 		}
971 #ifdef DEBUG
972 		else {
973 		if (rdma_clnt_debug)
974 			printf("clnt_rdma_kcallit: sent RDMA_DONE xid %u\n",
975 				p->cku_xid);
976 		}
977 #endif
978 		clist_free(sendlist);
979 	}
980 
981 done:
982 	if (cxdrp)
983 		XDR_DESTROY(cxdrp);
984 	if (rxdrp) {
985 		(void) xdr_rpc_free_verifier(rxdrp, &reply_msg);
986 		XDR_DESTROY(rxdrp);
987 	}
988 
989 	if (recvlist) {
990 		rdma_buf_t	recvmsg;
991 
992 		recvmsg.addr = (caddr_t)(uintptr_t)recvlist->c_saddr;
993 		recvmsg.type = RECV_BUFFER;
994 		RDMA_BUF_FREE(conn, &recvmsg);
995 		clist_free(recvlist);
996 	}
997 	RDMA_REL_CONN(conn);
998 	if (p->cku_err.re_status != RPC_SUCCESS) {
999 		RCSTAT_INCR(rcbadcalls);
1000 	}
1001 	return (p->cku_err.re_status);
1002 }
1003 
1004 /* ARGSUSED */
1005 static void
1006 clnt_rdma_kabort(CLIENT *h)
1007 {
1008 }
1009 
1010 static void
1011 clnt_rdma_kerror(CLIENT *h, struct rpc_err *err)
1012 {
1013 	struct cku_private *p = htop(h);
1014 
1015 	*err = p->cku_err;
1016 }
1017 
1018 static bool_t
1019 clnt_rdma_kfreeres(CLIENT *h, xdrproc_t xdr_res, caddr_t res_ptr)
1020 {
1021 	struct cku_private *p = htop(h);
1022 	XDR *xdrs;
1023 
1024 	xdrs = &(p->cku_outxdr);
1025 	xdrs->x_op = XDR_FREE;
1026 	return ((*xdr_res)(xdrs, res_ptr));
1027 }
1028 
1029 /* ARGSUSED */
1030 static bool_t
1031 clnt_rdma_kcontrol(CLIENT *h, int cmd, char *arg)
1032 {
1033 	return (TRUE);
1034 }
1035 
1036 /* ARGSUSED */
1037 static int
1038 clnt_rdma_ksettimers(CLIENT *h, struct rpc_timers *t, struct rpc_timers *all,
1039 	int minimum, void(*feedback)(int, int, caddr_t), caddr_t arg,
1040 	uint32_t xid)
1041 {
1042 	RCSTAT_INCR(rctimers);
1043 	return (0);
1044 }
1045 
1046 int
1047 rdma_reachable(int addr_type, struct netbuf *addr, struct knetconfig **knconf)
1048 {
1049 	rdma_registry_t	*rp;
1050 	void *handle = NULL;
1051 	struct knetconfig *knc;
1052 	char *pf, *p;
1053 	rdma_stat status;
1054 	int error = 0;
1055 
1056 	if (!INGLOBALZONE(curproc))
1057 		return (-1);
1058 	/*
1059 	 * modload the RDMA plugins if not already done.
1060 	 */
1061 	if (!rdma_modloaded) {
1062 		mutex_enter(&rdma_modload_lock);
1063 		if (!rdma_modloaded) {
1064 			error = rdma_modload();
1065 		}
1066 		mutex_exit(&rdma_modload_lock);
1067 		if (error)
1068 			return (-1);
1069 	}
1070 
1071 	if (!rdma_dev_available)
1072 		return (-1);
1073 
1074 	rw_enter(&rdma_lock, RW_READER);
1075 	rp = rdma_mod_head;
1076 	while (rp != NULL) {
1077 		status = RDMA_REACHABLE(rp->r_mod->rdma_ops, addr_type, addr,
1078 		    &handle);
1079 		if (status == RDMA_SUCCESS) {
1080 			knc = kmem_zalloc(sizeof (struct knetconfig),
1081 				KM_SLEEP);
1082 			knc->knc_semantics = NC_TPI_RDMA;
1083 			pf = kmem_alloc(KNC_STRSIZE, KM_SLEEP);
1084 			p = kmem_alloc(KNC_STRSIZE, KM_SLEEP);
1085 			if (addr_type == AF_INET)
1086 				(void) strncpy(pf, NC_INET, KNC_STRSIZE);
1087 			else if (addr_type == AF_INET6)
1088 				(void) strncpy(pf, NC_INET6, KNC_STRSIZE);
1089 			pf[KNC_STRSIZE - 1] = '\0';
1090 
1091 			(void) strncpy(p, rp->r_mod->rdma_api, KNC_STRSIZE);
1092 			p[KNC_STRSIZE - 1] = '\0';
1093 
1094 			knc->knc_protofmly = pf;
1095 			knc->knc_proto = p;
1096 			knc->knc_rdev = (dev_t)handle;
1097 			*knconf = knc;
1098 			rw_exit(&rdma_lock);
1099 			return (0);
1100 		}
1101 		rp = rp->r_next;
1102 	}
1103 	rw_exit(&rdma_lock);
1104 	return (-1);
1105 }
1106