]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/commitdiff
RDMA/cxgb4: Make sure flush CQ entries are collected on connection close
authorKumar Sanghvi <kumaras@chelsio.com>
Thu, 13 Oct 2011 08:21:30 +0000 (13:51 +0530)
committerRoland Dreier <roland@purestorage.com>
Fri, 14 Oct 2011 21:23:04 +0000 (14:23 -0700)
At the time when a peer closes the connection, iw_cxgb4 will not send
a cq event if ibqp.uobject exists.  In that case, its possible for a
user application to get blocked in ibv_get_cq_event().

To resolve this, call the cq's comp_handler to unblock any read from
ibv_get_cq_event().  This will trigger userspace to poll the cq and
collect flush status completions for any pending work requests.

Signed-off-by: Kumar Sanghvi <kumaras@chelsio.com>
Acked-by: Steve Wise <swise@opengridcomputing.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
drivers/infiniband/hw/cxgb4/qp.c

index a41578e48c7b0bb366795bfd3da1dd961f3d42d1..892fa7c6d310ad9f34d0ab2c80f5c0cf9f33128c 100644 (file)
@@ -966,8 +966,12 @@ static void flush_qp(struct c4iw_qp *qhp)
        if (qhp->ibqp.uobject) {
                t4_set_wq_in_error(&qhp->wq);
                t4_set_cq_in_error(&rchp->cq);
-               if (schp != rchp)
+               (*rchp->ibcq.comp_handler)(&rchp->ibcq, rchp->ibcq.cq_context);
+               if (schp != rchp) {
                        t4_set_cq_in_error(&schp->cq);
+                       (*schp->ibcq.comp_handler)(&schp->ibcq,
+                                       schp->ibcq.cq_context);
+               }
                return;
        }
        __flush_qp(qhp, rchp, schp);