void osm_send_req_mad(IN osm_sm_t * sm, IN osm_madw_t *p_madw) { CL_ASSERT(p_madw); CL_ASSERT(sm); osm_vl15_post(sm->p_vl15, p_madw); }
ib_api_status_t osm_resp_send(IN osm_sm_t * sm, IN const osm_madw_t * const p_req_madw, IN const ib_net16_t mad_status, IN const uint8_t * const p_payload) { const ib_smp_t *p_req_smp; ib_smp_t *p_smp; osm_madw_t *p_madw; ib_api_status_t status = IB_SUCCESS; OSM_LOG_ENTER(sm->p_log); CL_ASSERT(p_req_madw); CL_ASSERT(p_payload); /* do nothing if we are exiting ... */ if (osm_exit_flag) goto Exit; p_madw = osm_mad_pool_get(sm->p_mad_pool, osm_madw_get_bind_handle(p_req_madw), MAD_BLOCK_SIZE, NULL); if (p_madw == NULL) { OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 1301: Unable to acquire MAD\n"); status = IB_INSUFFICIENT_RESOURCES; goto Exit; } /* Copy the request smp to the response smp, then just update the necessary fields. */ p_smp = osm_madw_get_smp_ptr(p_madw); p_req_smp = osm_madw_get_smp_ptr(p_req_madw); osm_resp_make_resp_smp(sm, p_req_smp, mad_status, p_payload, p_smp); p_madw->mad_addr.dest_lid = p_req_madw->mad_addr.addr_type.smi.source_lid; p_madw->mad_addr.addr_type.smi.source_lid = p_req_madw->mad_addr.dest_lid; p_madw->resp_expected = FALSE; p_madw->fail_msg = CL_DISP_MSGID_NONE; OSM_LOG(sm->p_log, OSM_LOG_DEBUG, "Responding to %s (0x%X)" "\n\t\t\t\tattribute modifier 0x%X, TID 0x%" PRIx64 "\n", ib_get_sm_attr_str(p_smp->attr_id), cl_ntoh16(p_smp->attr_id), cl_ntoh32(p_smp->attr_mod), cl_ntoh64(p_smp->trans_id)); osm_vl15_post(sm->p_vl15, p_madw); Exit: OSM_LOG_EXIT(sm->p_log); return (status); }
int osm_send_trap144(osm_sm_t * sm, ib_net16_t local) { osm_madw_t *madw; ib_smp_t *smp; ib_mad_notice_attr_t *ntc; osm_port_t *port, *smport; ib_port_info_t *pi; port = osm_get_port_by_guid(sm->p_subn, sm->p_subn->sm_port_guid); if (!port) { OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 1104: cannot find SM port by guid 0x%" PRIx64 "\n", cl_ntoh64(sm->p_subn->sm_port_guid)); return -1; } pi = &port->p_physp->port_info; /* don't bother with sending trap when SMA supports this */ if (!local && pi->capability_mask&(IB_PORT_CAP_HAS_TRAP|IB_PORT_CAP_HAS_CAP_NTC)) return 0; smport = osm_get_port_by_guid(sm->p_subn, sm->master_sm_guid); if (!smport) { OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 1106: cannot find master SM port by guid 0x%" PRIx64 "\n", cl_ntoh64(sm->master_sm_guid)); return -1; } madw = osm_mad_pool_get(sm->p_mad_pool, osm_sm_mad_ctrl_get_bind_handle(&sm->mad_ctrl), MAD_BLOCK_SIZE, NULL); if (madw == NULL) { OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 1105: Unable to acquire MAD\n"); return -1; } madw->mad_addr.dest_lid = smport->p_physp->port_info.base_lid; madw->mad_addr.addr_type.smi.source_lid = pi->base_lid; madw->resp_expected = TRUE; madw->fail_msg = CL_DISP_MSGID_NONE; smp = osm_madw_get_smp_ptr(madw); memset(smp, 0, sizeof(*smp)); smp->base_ver = 1; smp->mgmt_class = IB_MCLASS_SUBN_LID; smp->class_ver = 1; smp->method = IB_MAD_METHOD_TRAP; smp->trans_id = cl_hton64((uint64_t) cl_atomic_inc(&sm->sm_trans_id) & (uint64_t)(0xFFFFFFFF)); if (smp->trans_id == 0) smp->trans_id = cl_hton64((uint64_t) cl_atomic_inc(&sm->sm_trans_id) & (uint64_t)(0xFFFFFFFF)); smp->attr_id = IB_MAD_ATTR_NOTICE; ntc = (ib_mad_notice_attr_t *) smp->data; ntc->generic_type = 0x80 | IB_NOTICE_TYPE_INFO; ib_notice_set_prod_type_ho(ntc, osm_node_get_type(port->p_node)); ntc->g_or_v.generic.trap_num = cl_hton16(SM_LOCAL_CHANGES_TRAP); /* 144 */ ntc->issuer_lid = pi->base_lid; ntc->data_details.ntc_144.lid = pi->base_lid; ntc->data_details.ntc_144.local_changes = local ? TRAP_144_MASK_OTHER_LOCAL_CHANGES : 0; ntc->data_details.ntc_144.new_cap_mask = pi->capability_mask; ntc->data_details.ntc_144.change_flgs = local; OSM_LOG(sm->p_log, OSM_LOG_DEBUG, "Sending Trap 144, TID 0x%" PRIx64 " to SM lid %u\n", cl_ntoh64(smp->trans_id), cl_ntoh16(madw->mad_addr.dest_lid)); osm_vl15_post(sm->p_vl15, madw); return 0; }
/********************************************************************** The plock must be held before calling this function. **********************************************************************/ ib_api_status_t osm_req_get(IN osm_sm_t * sm, IN const osm_dr_path_t * p_path, IN ib_net16_t attr_id, IN ib_net32_t attr_mod, IN boolean_t find_mkey, ib_net64_t m_key, IN cl_disp_msgid_t err_msg, IN const osm_madw_context_t * p_context) { osm_madw_t *p_madw; ib_api_status_t status = IB_SUCCESS; ib_net64_t m_key_calc; ib_net64_t tid; CL_ASSERT(sm); OSM_LOG_ENTER(sm->p_log); CL_ASSERT(p_path); CL_ASSERT(attr_id); /* do nothing if we are exiting ... */ if (osm_exit_flag) goto Exit; /* p_context may be NULL. */ p_madw = osm_mad_pool_get(sm->p_mad_pool, sm->mad_ctrl.h_bind, MAD_BLOCK_SIZE, NULL); if (p_madw == NULL) { OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 1101: Unable to acquire MAD\n"); status = IB_INSUFFICIENT_RESOURCES; goto Exit; } tid = cl_hton64((uint64_t) cl_atomic_inc(&sm->sm_trans_id) & (uint64_t)(0xFFFFFFFF)); if (tid == 0) tid = cl_hton64((uint64_t) cl_atomic_inc(&sm->sm_trans_id) & (uint64_t)(0xFFFFFFFF)); if (sm->p_subn->opt.m_key_lookup == TRUE) { if (find_mkey == TRUE) m_key_calc = req_determine_mkey(sm, p_path); else m_key_calc = m_key; } else m_key_calc = sm->p_subn->opt.m_key; OSM_LOG(sm->p_log, OSM_LOG_DEBUG, "Getting %s (0x%X), modifier 0x%X, TID 0x%" PRIx64 ", MKey 0x%016" PRIx64 "\n", ib_get_sm_attr_str(attr_id), cl_ntoh16(attr_id), cl_ntoh32(attr_mod), cl_ntoh64(tid), cl_ntoh64(m_key_calc)); ib_smp_init_new(osm_madw_get_smp_ptr(p_madw), IB_MAD_METHOD_GET, tid, attr_id, attr_mod, p_path->hop_count, m_key_calc, p_path->path, IB_LID_PERMISSIVE, IB_LID_PERMISSIVE); p_madw->mad_addr.dest_lid = IB_LID_PERMISSIVE; p_madw->mad_addr.addr_type.smi.source_lid = IB_LID_PERMISSIVE; p_madw->resp_expected = TRUE; p_madw->fail_msg = err_msg; /* Fill in the mad wrapper context for the recipient. In this case, the only thing the recipient needs is the guid value. */ if (p_context) p_madw->context = *p_context; osm_vl15_post(sm->p_vl15, p_madw); Exit: OSM_LOG_EXIT(sm->p_log); return status; }