Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp1355319ybm; Sat, 30 May 2020 06:30:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyQcx8QsjxF5srD3V6MNQtkp4sEcxDyizP1xbFzSJnhFIOFdAhE6TKs2xmdh88bjHmkdRIC X-Received: by 2002:aa7:c6d5:: with SMTP id b21mr12698108eds.97.1590845435159; Sat, 30 May 2020 06:30:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590845435; cv=none; d=google.com; s=arc-20160816; b=V1T9hqakYt1NgJLYEm7erCbbOlop6NTkXauMEx/kHUPhvxa3I91WElHUFlMxkSjcnC 1SfjfqiR8CSI0/GetYKDCHCSuNslN6pzG81CsZ2Ez2foUR57aXu9FwaDQwiJmjRGZQOM Sk/i2/FauSbQ9ksiK7N2rN8LKIk46ObX+4wqzlucUr9Y9SH5Sh3ricEWo1fPOmQR+GOO 7YFcsoA9Ik5buyYTM85NaNFzzpJlu5u/9iA4I1SpWGZ9p0Wf8LDZxfODT55BS/XDVeJ6 L/MaCQ1EhoDJcW0e0jOQI6TGJ5QTYmMrjwjtnONlVcrZGe/7IoKyu78X17Vs/FWvxCLX s9cQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:dkim-signature; bh=MV0EoO+8yVK6ghDt30lbfGE+CAEo1PY+DasnmJYde9U=; b=A/cRQacIlzZdawZvauEzhOUZOAAlZxX8voLA67O99oNXNzXfmX7QTJka3QtS4GEUzZ C8xg2WWOPwsm1xdvAYF8QHBttVMTOzgzGNHAUcUe5Blj3eaittq7KaNMTKliuyLAr/N4 aRJjkySt0c5TAOHYDJgUvXgSzuJp6JZyPjA8uZYDkATN9oQpWkQUDoxrBLo5Z1uzpfO4 xmkVslE0M3ka6U6npIa+6kem9rrA7jl2tyyi7vdAdcBjRfkvevhpulxqEZQNS7nQLYtV VuE14BCPNhj9bF5itGGHnDTHAhd4pLXNd8SUBcwHz86UDswlGC8HQPmo7LeuFEodKxSx FFPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=UOgxHdv9; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c22si7467699eds.427.2020.05.30.06.30.12; Sat, 30 May 2020 06:30:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=UOgxHdv9; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729058AbgE3N3K (ORCPT + 99 others); Sat, 30 May 2020 09:29:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57740 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729055AbgE3N3J (ORCPT ); Sat, 30 May 2020 09:29:09 -0400 Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 99257C03E969; Sat, 30 May 2020 06:29:09 -0700 (PDT) Received: by mail-io1-xd43.google.com with SMTP id y18so2318263iow.3; Sat, 30 May 2020 06:29:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:from:to:cc:date:message-id:in-reply-to:references :user-agent:mime-version:content-transfer-encoding; bh=MV0EoO+8yVK6ghDt30lbfGE+CAEo1PY+DasnmJYde9U=; b=UOgxHdv9pNKPdUe5btXcCMUGyoD54DCq6O6Lw5LL+OEw3cAx+oCSNk7wJlogz1poHD BXh+/TytMxA/o3MYskeqbbp9cB82wb/FjLjd9Eb81+Vb4c/7c91bSsVCdUwRKbfxNl0c qSwMxYXIlI/Sq/4SlVX09KdpBnm5qdBKaWoMytENi+99R/x+R3SR70o2gAQ13ffAoKzo fFRAjaeerieHxZZT7CJgEsKikX5GlB5WBB7UdkDzjk/ZurYm2wWtAdQ0BNcDk0/g1aDF trE6lw+C6r89JHzfuMS+at3ATdjFEDxL0Xj+n0zHuXHj1rs+K/YjpGiN77oGzv1LtGyd aoyg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:from:to:cc:date:message-id :in-reply-to:references:user-agent:mime-version :content-transfer-encoding; bh=MV0EoO+8yVK6ghDt30lbfGE+CAEo1PY+DasnmJYde9U=; b=NAbYNP5zejYLpbuYuLtfUm5FOtfKQ41JmEh7gtGiHdbuToWUPq7hrUSGcMRh/MskYa rTXHDVHhE2Ma4oT08+VNwiqvHBVt/oT28NcLaptTO2aG/D35NHkoV4mW8yWhoGj8Ct4F 0cAjD2XQQY3LC7JdqMvmgS7L4iMZYNS/dedWjp08LuxPCKVOAiGfu2FOEoJCOHUO4/3P iVQiyyp3CVUa9b5zF1Hz0b5leeX0v4iotmtpbSX1jDxAmzx8QnQMsVlIPLcVZelZlYvT yquvo/SHGPdh2v5EnfCrpjoklxc10QH2/Ogel+FBcEzy+01RWdMTA7GUhliKCmawqmgb AOOw== X-Gm-Message-State: AOAM5309teIJ2w52InZ/jyg5anV5xClMe1ArPDGfuxF1zC+OsJEt3Nb3 sI3WFb+t7vy1QrH4ebivqSHyog9a X-Received: by 2002:a5e:9b10:: with SMTP id j16mr10980072iok.49.1590845348778; Sat, 30 May 2020 06:29:08 -0700 (PDT) Received: from gateway.1015granger.net (c-68-61-232-219.hsd1.mi.comcast.net. [68.61.232.219]) by smtp.gmail.com with ESMTPSA id v13sm6582895ili.15.2020.05.30.06.29.08 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sat, 30 May 2020 06:29:08 -0700 (PDT) Received: from klimt.1015granger.net (klimt.1015granger.net [192.168.1.55]) by gateway.1015granger.net (8.14.7/8.14.7) with ESMTP id 04UDT7oS001420; Sat, 30 May 2020 13:29:07 GMT Subject: [PATCH v4 12/33] svcrdma: Add tracepoints to report ->xpo_accept failures From: Chuck Lever To: bfields@fieldses.org Cc: linux-nfs@vger.kernel.org, linux-rdma@vger.kernel.org Date: Sat, 30 May 2020 09:29:07 -0400 Message-ID: <20200530132907.10117.21042.stgit@klimt.1015granger.net> In-Reply-To: <20200530131711.10117.74063.stgit@klimt.1015granger.net> References: <20200530131711.10117.74063.stgit@klimt.1015granger.net> User-Agent: StGit/0.22-31-g4b47 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Failure to accept a connection is typically due to a problem specific to a transport type. Also, ->xpo_accept returns NULL on error rather than reporting a specific problem. So, add failure-specific tracepoints in svc_rdma_accept(). Signed-off-by: Chuck Lever --- include/trace/events/rpcrdma.h | 38 +++++++++++++++++++++++++++++- net/sunrpc/xprtrdma/svc_rdma_transport.c | 27 +++++++++------------ 2 files changed, 48 insertions(+), 17 deletions(-) diff --git a/include/trace/events/rpcrdma.h b/include/trace/events/rpcrdma.h index 53b24c8c7860..79ef2ab7743c 100644 --- a/include/trace/events/rpcrdma.h +++ b/include/trace/events/rpcrdma.h @@ -1309,9 +1309,45 @@ DECLARE_EVENT_CLASS(svcrdma_xprt_event, TP_ARGS(xprt)) DEFINE_XPRT_EVENT(accept); -DEFINE_XPRT_EVENT(fail); DEFINE_XPRT_EVENT(free); +DECLARE_EVENT_CLASS(svcrdma_accept_class, + TP_PROTO( + const struct svcxprt_rdma *rdma, + long status + ), + + TP_ARGS(rdma, status), + + TP_STRUCT__entry( + __field(long, status) + __string(addr, rdma->sc_xprt.xpt_remotebuf) + ), + + TP_fast_assign( + __entry->status = status; + __assign_str(addr, rdma->sc_xprt.xpt_remotebuf); + ), + + TP_printk("addr=%s status=%ld", + __get_str(addr), __entry->status + ) +); + +#define DEFINE_ACCEPT_EVENT(name) \ + DEFINE_EVENT(svcrdma_accept_class, svcrdma_##name##_err, \ + TP_PROTO( \ + const struct svcxprt_rdma *rdma, \ + long status \ + ), \ + TP_ARGS(rdma, status)) + +DEFINE_ACCEPT_EVENT(pd); +DEFINE_ACCEPT_EVENT(qp); +DEFINE_ACCEPT_EVENT(fabric); +DEFINE_ACCEPT_EVENT(initdepth); +DEFINE_ACCEPT_EVENT(accept); + TRACE_DEFINE_ENUM(RDMA_MSG); TRACE_DEFINE_ENUM(RDMA_NOMSG); TRACE_DEFINE_ENUM(RDMA_MSGP); diff --git a/net/sunrpc/xprtrdma/svc_rdma_transport.c b/net/sunrpc/xprtrdma/svc_rdma_transport.c index 0a1125277a48..f3b5ad2bec2f 100644 --- a/net/sunrpc/xprtrdma/svc_rdma_transport.c +++ b/net/sunrpc/xprtrdma/svc_rdma_transport.c @@ -410,9 +410,6 @@ static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt) if (!newxprt) return NULL; - dprintk("svcrdma: newxprt from accept queue = %p, cm_id=%p\n", - newxprt, newxprt->sc_cm_id); - dev = newxprt->sc_cm_id->device; newxprt->sc_port_num = newxprt->sc_cm_id->port_num; @@ -448,21 +445,17 @@ static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt) newxprt->sc_pd = ib_alloc_pd(dev, 0); if (IS_ERR(newxprt->sc_pd)) { - dprintk("svcrdma: error creating PD for connect request\n"); + trace_svcrdma_pd_err(newxprt, PTR_ERR(newxprt->sc_pd)); goto errout; } newxprt->sc_sq_cq = ib_alloc_cq_any(dev, newxprt, newxprt->sc_sq_depth, IB_POLL_WORKQUEUE); - if (IS_ERR(newxprt->sc_sq_cq)) { - dprintk("svcrdma: error creating SQ CQ for connect request\n"); + if (IS_ERR(newxprt->sc_sq_cq)) goto errout; - } newxprt->sc_rq_cq = ib_alloc_cq_any(dev, newxprt, rq_depth, IB_POLL_WORKQUEUE); - if (IS_ERR(newxprt->sc_rq_cq)) { - dprintk("svcrdma: error creating RQ CQ for connect request\n"); + if (IS_ERR(newxprt->sc_rq_cq)) goto errout; - } memset(&qp_attr, 0, sizeof qp_attr); qp_attr.event_handler = qp_event_handler; @@ -486,7 +479,7 @@ static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt) ret = rdma_create_qp(newxprt->sc_cm_id, newxprt->sc_pd, &qp_attr); if (ret) { - dprintk("svcrdma: failed to create QP, ret=%d\n", ret); + trace_svcrdma_qp_err(newxprt, ret); goto errout; } newxprt->sc_qp = newxprt->sc_cm_id->qp; @@ -494,8 +487,10 @@ static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt) if (!(dev->attrs.device_cap_flags & IB_DEVICE_MEM_MGT_EXTENSIONS)) newxprt->sc_snd_w_inv = false; if (!rdma_protocol_iwarp(dev, newxprt->sc_port_num) && - !rdma_ib_or_roce(dev, newxprt->sc_port_num)) + !rdma_ib_or_roce(dev, newxprt->sc_port_num)) { + trace_svcrdma_fabric_err(newxprt, -EINVAL); goto errout; + } if (!svc_rdma_post_recvs(newxprt)) goto errout; @@ -517,15 +512,17 @@ static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt) conn_param.initiator_depth = min_t(int, newxprt->sc_ord, dev->attrs.max_qp_init_rd_atom); if (!conn_param.initiator_depth) { - dprintk("svcrdma: invalid ORD setting\n"); ret = -EINVAL; + trace_svcrdma_initdepth_err(newxprt, ret); goto errout; } conn_param.private_data = &pmsg; conn_param.private_data_len = sizeof(pmsg); ret = rdma_accept(newxprt->sc_cm_id, &conn_param); - if (ret) + if (ret) { + trace_svcrdma_accept_err(newxprt, ret); goto errout; + } #if IS_ENABLED(CONFIG_SUNRPC_DEBUG) dprintk("svcrdma: new connection %p accepted:\n", newxprt); @@ -544,8 +541,6 @@ static struct svc_xprt *svc_rdma_accept(struct svc_xprt *xprt) return &newxprt->sc_xprt; errout: - dprintk("svcrdma: failure accepting new connection rc=%d.\n", ret); - trace_svcrdma_xprt_fail(&newxprt->sc_xprt); /* Take a reference in case the DTO handler runs */ svc_xprt_get(&newxprt->sc_xprt); if (newxprt->sc_qp && !IS_ERR(newxprt->sc_qp))