xref: /openbmc/linux/net/rds/connection.c (revision 3db6e0d172c94bd9953a1347c55ffb64b1d2e74f)
100e0f34cSAndy Grover /*
200e0f34cSAndy Grover  * Copyright (c) 2006 Oracle.  All rights reserved.
300e0f34cSAndy Grover  *
400e0f34cSAndy Grover  * This software is available to you under a choice of one of two
500e0f34cSAndy Grover  * licenses.  You may choose to be licensed under the terms of the GNU
600e0f34cSAndy Grover  * General Public License (GPL) Version 2, available from the file
700e0f34cSAndy Grover  * COPYING in the main directory of this source tree, or the
800e0f34cSAndy Grover  * OpenIB.org BSD license below:
900e0f34cSAndy Grover  *
1000e0f34cSAndy Grover  *     Redistribution and use in source and binary forms, with or
1100e0f34cSAndy Grover  *     without modification, are permitted provided that the following
1200e0f34cSAndy Grover  *     conditions are met:
1300e0f34cSAndy Grover  *
1400e0f34cSAndy Grover  *      - Redistributions of source code must retain the above
1500e0f34cSAndy Grover  *        copyright notice, this list of conditions and the following
1600e0f34cSAndy Grover  *        disclaimer.
1700e0f34cSAndy Grover  *
1800e0f34cSAndy Grover  *      - Redistributions in binary form must reproduce the above
1900e0f34cSAndy Grover  *        copyright notice, this list of conditions and the following
2000e0f34cSAndy Grover  *        disclaimer in the documentation and/or other materials
2100e0f34cSAndy Grover  *        provided with the distribution.
2200e0f34cSAndy Grover  *
2300e0f34cSAndy Grover  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
2400e0f34cSAndy Grover  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
2500e0f34cSAndy Grover  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
2600e0f34cSAndy Grover  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
2700e0f34cSAndy Grover  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
2800e0f34cSAndy Grover  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
2900e0f34cSAndy Grover  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
3000e0f34cSAndy Grover  * SOFTWARE.
3100e0f34cSAndy Grover  *
3200e0f34cSAndy Grover  */
3300e0f34cSAndy Grover #include <linux/kernel.h>
3400e0f34cSAndy Grover #include <linux/list.h>
355a0e3ad6STejun Heo #include <linux/slab.h>
36bc3b2d7fSPaul Gortmaker #include <linux/export.h>
3700e0f34cSAndy Grover #include <net/inet_hashtables.h>
3800e0f34cSAndy Grover 
3900e0f34cSAndy Grover #include "rds.h"
4000e0f34cSAndy Grover #include "loop.h"
4100e0f34cSAndy Grover 
4200e0f34cSAndy Grover #define RDS_CONNECTION_HASH_BITS 12
4300e0f34cSAndy Grover #define RDS_CONNECTION_HASH_ENTRIES (1 << RDS_CONNECTION_HASH_BITS)
4400e0f34cSAndy Grover #define RDS_CONNECTION_HASH_MASK (RDS_CONNECTION_HASH_ENTRIES - 1)
4500e0f34cSAndy Grover 
4600e0f34cSAndy Grover /* converting this to RCU is a chore for another day.. */
4700e0f34cSAndy Grover static DEFINE_SPINLOCK(rds_conn_lock);
4800e0f34cSAndy Grover static unsigned long rds_conn_count;
4900e0f34cSAndy Grover static struct hlist_head rds_conn_hash[RDS_CONNECTION_HASH_ENTRIES];
5000e0f34cSAndy Grover static struct kmem_cache *rds_conn_slab;
5100e0f34cSAndy Grover 
5200e0f34cSAndy Grover static struct hlist_head *rds_conn_bucket(__be32 laddr, __be32 faddr)
5300e0f34cSAndy Grover {
541bbdceefSHannes Frederic Sowa 	static u32 rds_hash_secret __read_mostly;
551bbdceefSHannes Frederic Sowa 
561bbdceefSHannes Frederic Sowa 	unsigned long hash;
571bbdceefSHannes Frederic Sowa 
581bbdceefSHannes Frederic Sowa 	net_get_random_once(&rds_hash_secret, sizeof(rds_hash_secret));
591bbdceefSHannes Frederic Sowa 
6000e0f34cSAndy Grover 	/* Pass NULL, don't need struct net for hash */
611bbdceefSHannes Frederic Sowa 	hash = __inet_ehashfn(be32_to_cpu(laddr), 0,
6265cd8033SHannes Frederic Sowa 			      be32_to_cpu(faddr), 0,
631bbdceefSHannes Frederic Sowa 			      rds_hash_secret);
6400e0f34cSAndy Grover 	return &rds_conn_hash[hash & RDS_CONNECTION_HASH_MASK];
6500e0f34cSAndy Grover }
6600e0f34cSAndy Grover 
6700e0f34cSAndy Grover #define rds_conn_info_set(var, test, suffix) do {		\
6800e0f34cSAndy Grover 	if (test)						\
6900e0f34cSAndy Grover 		var |= RDS_INFO_CONNECTION_FLAG_##suffix;	\
7000e0f34cSAndy Grover } while (0)
7100e0f34cSAndy Grover 
72bcf50ef2SChris Mason /* rcu read lock must be held or the connection spinlock */
738f384c01SSowmini Varadhan static struct rds_connection *rds_conn_lookup(struct net *net,
748f384c01SSowmini Varadhan 					      struct hlist_head *head,
7500e0f34cSAndy Grover 					      __be32 laddr, __be32 faddr,
7600e0f34cSAndy Grover 					      struct rds_transport *trans)
7700e0f34cSAndy Grover {
7800e0f34cSAndy Grover 	struct rds_connection *conn, *ret = NULL;
7900e0f34cSAndy Grover 
80b67bfe0dSSasha Levin 	hlist_for_each_entry_rcu(conn, head, c_hash_node) {
8100e0f34cSAndy Grover 		if (conn->c_faddr == faddr && conn->c_laddr == laddr &&
828f384c01SSowmini Varadhan 		    conn->c_trans == trans && net == rds_conn_net(conn)) {
8300e0f34cSAndy Grover 			ret = conn;
8400e0f34cSAndy Grover 			break;
8500e0f34cSAndy Grover 		}
8600e0f34cSAndy Grover 	}
8700e0f34cSAndy Grover 	rdsdebug("returning conn %p for %pI4 -> %pI4\n", ret,
8800e0f34cSAndy Grover 		 &laddr, &faddr);
8900e0f34cSAndy Grover 	return ret;
9000e0f34cSAndy Grover }
9100e0f34cSAndy Grover 
9200e0f34cSAndy Grover /*
9300e0f34cSAndy Grover  * This is called by transports as they're bringing down a connection.
9400e0f34cSAndy Grover  * It clears partial message state so that the transport can start sending
9500e0f34cSAndy Grover  * and receiving over this connection again in the future.  It is up to
9600e0f34cSAndy Grover  * the transport to have serialized this call with its send and recv.
9700e0f34cSAndy Grover  */
98d769ef81SSowmini Varadhan static void rds_conn_path_reset(struct rds_conn_path *cp)
9900e0f34cSAndy Grover {
100d769ef81SSowmini Varadhan 	struct rds_connection *conn = cp->cp_conn;
101d769ef81SSowmini Varadhan 
10200e0f34cSAndy Grover 	rdsdebug("connection %pI4 to %pI4 reset\n",
10300e0f34cSAndy Grover 	  &conn->c_laddr, &conn->c_faddr);
10400e0f34cSAndy Grover 
10500e0f34cSAndy Grover 	rds_stats_inc(s_conn_reset);
106d769ef81SSowmini Varadhan 	rds_send_path_reset(cp);
107d769ef81SSowmini Varadhan 	cp->cp_flags = 0;
10800e0f34cSAndy Grover 
10900e0f34cSAndy Grover 	/* Do not clear next_rx_seq here, else we cannot distinguish
11000e0f34cSAndy Grover 	 * retransmitted packets from new packets, and will hand all
11100e0f34cSAndy Grover 	 * of them to the application. That is not consistent with the
11200e0f34cSAndy Grover 	 * reliability guarantees of RDS. */
11300e0f34cSAndy Grover }
11400e0f34cSAndy Grover 
1151c5113cfSSowmini Varadhan static void __rds_conn_path_init(struct rds_connection *conn,
1161c5113cfSSowmini Varadhan 				 struct rds_conn_path *cp, bool is_outgoing)
1171c5113cfSSowmini Varadhan {
1181c5113cfSSowmini Varadhan 	spin_lock_init(&cp->cp_lock);
1191c5113cfSSowmini Varadhan 	cp->cp_next_tx_seq = 1;
1201c5113cfSSowmini Varadhan 	init_waitqueue_head(&cp->cp_waitq);
1211c5113cfSSowmini Varadhan 	INIT_LIST_HEAD(&cp->cp_send_queue);
1221c5113cfSSowmini Varadhan 	INIT_LIST_HEAD(&cp->cp_retrans);
1231c5113cfSSowmini Varadhan 
1241c5113cfSSowmini Varadhan 	cp->cp_conn = conn;
1251c5113cfSSowmini Varadhan 	atomic_set(&cp->cp_state, RDS_CONN_DOWN);
1261c5113cfSSowmini Varadhan 	cp->cp_send_gen = 0;
1271c5113cfSSowmini Varadhan 	cp->cp_reconnect_jiffies = 0;
1281c5113cfSSowmini Varadhan 	INIT_DELAYED_WORK(&cp->cp_send_w, rds_send_worker);
1291c5113cfSSowmini Varadhan 	INIT_DELAYED_WORK(&cp->cp_recv_w, rds_recv_worker);
1301c5113cfSSowmini Varadhan 	INIT_DELAYED_WORK(&cp->cp_conn_w, rds_connect_worker);
1311c5113cfSSowmini Varadhan 	INIT_WORK(&cp->cp_down_w, rds_shutdown_worker);
1321c5113cfSSowmini Varadhan 	mutex_init(&cp->cp_cm_lock);
1331c5113cfSSowmini Varadhan 	cp->cp_flags = 0;
1341c5113cfSSowmini Varadhan }
1351c5113cfSSowmini Varadhan 
13600e0f34cSAndy Grover /*
13700e0f34cSAndy Grover  * There is only every one 'conn' for a given pair of addresses in the
13800e0f34cSAndy Grover  * system at a time.  They contain messages to be retransmitted and so
13900e0f34cSAndy Grover  * span the lifetime of the actual underlying transport connections.
14000e0f34cSAndy Grover  *
14100e0f34cSAndy Grover  * For now they are not garbage collected once they're created.  They
14200e0f34cSAndy Grover  * are torn down as the module is removed, if ever.
14300e0f34cSAndy Grover  */
144d5a8ac28SSowmini Varadhan static struct rds_connection *__rds_conn_create(struct net *net,
145d5a8ac28SSowmini Varadhan 						__be32 laddr, __be32 faddr,
14600e0f34cSAndy Grover 				       struct rds_transport *trans, gfp_t gfp,
14700e0f34cSAndy Grover 				       int is_outgoing)
14800e0f34cSAndy Grover {
149cb24405eSAndy Grover 	struct rds_connection *conn, *parent = NULL;
15000e0f34cSAndy Grover 	struct hlist_head *head = rds_conn_bucket(laddr, faddr);
1515adb5bc6SZach Brown 	struct rds_transport *loop_trans;
15200e0f34cSAndy Grover 	unsigned long flags;
1535916e2c1SSowmini Varadhan 	int ret, i;
154840df162SSowmini Varadhan 	int npaths = (trans->t_mp_capable ? RDS_MPATH_WORKERS : 1);
15500e0f34cSAndy Grover 
156bcf50ef2SChris Mason 	rcu_read_lock();
1578f384c01SSowmini Varadhan 	conn = rds_conn_lookup(net, head, laddr, faddr, trans);
158f64f9e71SJoe Perches 	if (conn && conn->c_loopback && conn->c_trans != &rds_loop_transport &&
1591789b2c0SSowmini Varadhan 	    laddr == faddr && !is_outgoing) {
16000e0f34cSAndy Grover 		/* This is a looped back IB connection, and we're
16100e0f34cSAndy Grover 		 * called by the code handling the incoming connect.
16200e0f34cSAndy Grover 		 * We need a second connection object into which we
16300e0f34cSAndy Grover 		 * can stick the other QP. */
16400e0f34cSAndy Grover 		parent = conn;
16500e0f34cSAndy Grover 		conn = parent->c_passive;
16600e0f34cSAndy Grover 	}
167bcf50ef2SChris Mason 	rcu_read_unlock();
16800e0f34cSAndy Grover 	if (conn)
16900e0f34cSAndy Grover 		goto out;
17000e0f34cSAndy Grover 
17105a178ecSWei Yongjun 	conn = kmem_cache_zalloc(rds_conn_slab, gfp);
1728690bfa1SAndy Grover 	if (!conn) {
17300e0f34cSAndy Grover 		conn = ERR_PTR(-ENOMEM);
17400e0f34cSAndy Grover 		goto out;
17500e0f34cSAndy Grover 	}
176840df162SSowmini Varadhan 	conn->c_path = kcalloc(npaths, sizeof(struct rds_conn_path), gfp);
177840df162SSowmini Varadhan 	if (!conn->c_path) {
178840df162SSowmini Varadhan 		kmem_cache_free(rds_conn_slab, conn);
179840df162SSowmini Varadhan 		conn = ERR_PTR(-ENOMEM);
180840df162SSowmini Varadhan 		goto out;
181840df162SSowmini Varadhan 	}
18200e0f34cSAndy Grover 
18300e0f34cSAndy Grover 	INIT_HLIST_NODE(&conn->c_hash_node);
18400e0f34cSAndy Grover 	conn->c_laddr = laddr;
18500e0f34cSAndy Grover 	conn->c_faddr = faddr;
18600e0f34cSAndy Grover 
1871c5113cfSSowmini Varadhan 	rds_conn_net_set(conn, net);
18800e0f34cSAndy Grover 
18900e0f34cSAndy Grover 	ret = rds_cong_get_maps(conn);
19000e0f34cSAndy Grover 	if (ret) {
191840df162SSowmini Varadhan 		kfree(conn->c_path);
19200e0f34cSAndy Grover 		kmem_cache_free(rds_conn_slab, conn);
19300e0f34cSAndy Grover 		conn = ERR_PTR(ret);
19400e0f34cSAndy Grover 		goto out;
19500e0f34cSAndy Grover 	}
19600e0f34cSAndy Grover 
19700e0f34cSAndy Grover 	/*
19800e0f34cSAndy Grover 	 * This is where a connection becomes loopback.  If *any* RDS sockets
19900e0f34cSAndy Grover 	 * can bind to the destination address then we'd rather the messages
20000e0f34cSAndy Grover 	 * flow through loopback rather than either transport.
20100e0f34cSAndy Grover 	 */
202d5a8ac28SSowmini Varadhan 	loop_trans = rds_trans_get_preferred(net, faddr);
2035adb5bc6SZach Brown 	if (loop_trans) {
2045adb5bc6SZach Brown 		rds_trans_put(loop_trans);
20500e0f34cSAndy Grover 		conn->c_loopback = 1;
20600e0f34cSAndy Grover 		if (is_outgoing && trans->t_prefer_loopback) {
20700e0f34cSAndy Grover 			/* "outgoing" connection - and the transport
20800e0f34cSAndy Grover 			 * says it wants the connection handled by the
20900e0f34cSAndy Grover 			 * loopback transport. This is what TCP does.
21000e0f34cSAndy Grover 			 */
21100e0f34cSAndy Grover 			trans = &rds_loop_transport;
21200e0f34cSAndy Grover 		}
21300e0f34cSAndy Grover 	}
21400e0f34cSAndy Grover 
21500e0f34cSAndy Grover 	conn->c_trans = trans;
21600e0f34cSAndy Grover 
2175916e2c1SSowmini Varadhan 	init_waitqueue_head(&conn->c_hs_waitq);
218840df162SSowmini Varadhan 	for (i = 0; i < npaths; i++) {
2195916e2c1SSowmini Varadhan 		__rds_conn_path_init(conn, &conn->c_path[i],
2205916e2c1SSowmini Varadhan 				     is_outgoing);
2215916e2c1SSowmini Varadhan 		conn->c_path[i].cp_index = i;
2225916e2c1SSowmini Varadhan 	}
22300e0f34cSAndy Grover 	ret = trans->conn_alloc(conn, gfp);
22400e0f34cSAndy Grover 	if (ret) {
225840df162SSowmini Varadhan 		kfree(conn->c_path);
22600e0f34cSAndy Grover 		kmem_cache_free(rds_conn_slab, conn);
22700e0f34cSAndy Grover 		conn = ERR_PTR(ret);
22800e0f34cSAndy Grover 		goto out;
22900e0f34cSAndy Grover 	}
23000e0f34cSAndy Grover 
23100e0f34cSAndy Grover 	rdsdebug("allocated conn %p for %pI4 -> %pI4 over %s %s\n",
23200e0f34cSAndy Grover 	  conn, &laddr, &faddr,
233d9b86937SPrashant Bhole 	  strnlen(trans->t_name, sizeof(trans->t_name)) ? trans->t_name :
234d9b86937SPrashant Bhole 	  "[unknown]", is_outgoing ? "(outgoing)" : "");
23500e0f34cSAndy Grover 
236cb24405eSAndy Grover 	/*
237cb24405eSAndy Grover 	 * Since we ran without holding the conn lock, someone could
238cb24405eSAndy Grover 	 * have created the same conn (either normal or passive) in the
239cb24405eSAndy Grover 	 * interim. We check while holding the lock. If we won, we complete
240cb24405eSAndy Grover 	 * init and return our conn. If we lost, we rollback and return the
241cb24405eSAndy Grover 	 * other one.
242cb24405eSAndy Grover 	 */
24300e0f34cSAndy Grover 	spin_lock_irqsave(&rds_conn_lock, flags);
244cb24405eSAndy Grover 	if (parent) {
245cb24405eSAndy Grover 		/* Creating passive conn */
246cb24405eSAndy Grover 		if (parent->c_passive) {
2471c5113cfSSowmini Varadhan 			trans->conn_free(conn->c_path[0].cp_transport_data);
248840df162SSowmini Varadhan 			kfree(conn->c_path);
24900e0f34cSAndy Grover 			kmem_cache_free(rds_conn_slab, conn);
250cb24405eSAndy Grover 			conn = parent->c_passive;
25100e0f34cSAndy Grover 		} else {
252cb24405eSAndy Grover 			parent->c_passive = conn;
25300e0f34cSAndy Grover 			rds_cong_add_conn(conn);
25400e0f34cSAndy Grover 			rds_conn_count++;
25500e0f34cSAndy Grover 		}
256cb24405eSAndy Grover 	} else {
257cb24405eSAndy Grover 		/* Creating normal conn */
258cb24405eSAndy Grover 		struct rds_connection *found;
25900e0f34cSAndy Grover 
2608f384c01SSowmini Varadhan 		found = rds_conn_lookup(net, head, laddr, faddr, trans);
261cb24405eSAndy Grover 		if (found) {
2621c5113cfSSowmini Varadhan 			struct rds_conn_path *cp;
2631c5113cfSSowmini Varadhan 			int i;
2641c5113cfSSowmini Varadhan 
265840df162SSowmini Varadhan 			for (i = 0; i < npaths; i++) {
2661c5113cfSSowmini Varadhan 				cp = &conn->c_path[i];
26702105b2cSSowmini Varadhan 				/* The ->conn_alloc invocation may have
26802105b2cSSowmini Varadhan 				 * allocated resource for all paths, so all
26902105b2cSSowmini Varadhan 				 * of them may have to be freed here.
27002105b2cSSowmini Varadhan 				 */
27102105b2cSSowmini Varadhan 				if (cp->cp_transport_data)
2721c5113cfSSowmini Varadhan 					trans->conn_free(cp->cp_transport_data);
2731c5113cfSSowmini Varadhan 			}
274840df162SSowmini Varadhan 			kfree(conn->c_path);
275cb24405eSAndy Grover 			kmem_cache_free(rds_conn_slab, conn);
276cb24405eSAndy Grover 			conn = found;
277cb24405eSAndy Grover 		} else {
278905dd418SSowmini Varadhan 			conn->c_my_gen_num = rds_gen_num;
279905dd418SSowmini Varadhan 			conn->c_peer_gen_num = 0;
280bcf50ef2SChris Mason 			hlist_add_head_rcu(&conn->c_hash_node, head);
281cb24405eSAndy Grover 			rds_cong_add_conn(conn);
282cb24405eSAndy Grover 			rds_conn_count++;
283cb24405eSAndy Grover 		}
284cb24405eSAndy Grover 	}
28500e0f34cSAndy Grover 	spin_unlock_irqrestore(&rds_conn_lock, flags);
28600e0f34cSAndy Grover 
28700e0f34cSAndy Grover out:
28800e0f34cSAndy Grover 	return conn;
28900e0f34cSAndy Grover }
29000e0f34cSAndy Grover 
291d5a8ac28SSowmini Varadhan struct rds_connection *rds_conn_create(struct net *net,
292d5a8ac28SSowmini Varadhan 				       __be32 laddr, __be32 faddr,
29300e0f34cSAndy Grover 				       struct rds_transport *trans, gfp_t gfp)
29400e0f34cSAndy Grover {
295d5a8ac28SSowmini Varadhan 	return __rds_conn_create(net, laddr, faddr, trans, gfp, 0);
29600e0f34cSAndy Grover }
297616b757aSAndy Grover EXPORT_SYMBOL_GPL(rds_conn_create);
29800e0f34cSAndy Grover 
299d5a8ac28SSowmini Varadhan struct rds_connection *rds_conn_create_outgoing(struct net *net,
300d5a8ac28SSowmini Varadhan 						__be32 laddr, __be32 faddr,
30100e0f34cSAndy Grover 				       struct rds_transport *trans, gfp_t gfp)
30200e0f34cSAndy Grover {
303d5a8ac28SSowmini Varadhan 	return __rds_conn_create(net, laddr, faddr, trans, gfp, 1);
30400e0f34cSAndy Grover }
305616b757aSAndy Grover EXPORT_SYMBOL_GPL(rds_conn_create_outgoing);
30600e0f34cSAndy Grover 
307d769ef81SSowmini Varadhan void rds_conn_shutdown(struct rds_conn_path *cp)
3082dc39357SAndy Grover {
309d769ef81SSowmini Varadhan 	struct rds_connection *conn = cp->cp_conn;
310d769ef81SSowmini Varadhan 
3112dc39357SAndy Grover 	/* shut it down unless it's down already */
312d769ef81SSowmini Varadhan 	if (!rds_conn_path_transition(cp, RDS_CONN_DOWN, RDS_CONN_DOWN)) {
3132dc39357SAndy Grover 		/*
3142dc39357SAndy Grover 		 * Quiesce the connection mgmt handlers before we start tearing
3152dc39357SAndy Grover 		 * things down. We don't hold the mutex for the entire
3162dc39357SAndy Grover 		 * duration of the shutdown operation, else we may be
3172dc39357SAndy Grover 		 * deadlocking with the CM handler. Instead, the CM event
3182dc39357SAndy Grover 		 * handler is supposed to check for state DISCONNECTING
3192dc39357SAndy Grover 		 */
320d769ef81SSowmini Varadhan 		mutex_lock(&cp->cp_cm_lock);
321d769ef81SSowmini Varadhan 		if (!rds_conn_path_transition(cp, RDS_CONN_UP,
322d769ef81SSowmini Varadhan 					      RDS_CONN_DISCONNECTING) &&
323d769ef81SSowmini Varadhan 		    !rds_conn_path_transition(cp, RDS_CONN_ERROR,
324d769ef81SSowmini Varadhan 					      RDS_CONN_DISCONNECTING)) {
325d769ef81SSowmini Varadhan 			rds_conn_path_error(cp,
326d769ef81SSowmini Varadhan 					    "shutdown called in state %d\n",
327d769ef81SSowmini Varadhan 					    atomic_read(&cp->cp_state));
328d769ef81SSowmini Varadhan 			mutex_unlock(&cp->cp_cm_lock);
3292dc39357SAndy Grover 			return;
3302dc39357SAndy Grover 		}
331d769ef81SSowmini Varadhan 		mutex_unlock(&cp->cp_cm_lock);
3322dc39357SAndy Grover 
333d769ef81SSowmini Varadhan 		wait_event(cp->cp_waitq,
334d769ef81SSowmini Varadhan 			   !test_bit(RDS_IN_XMIT, &cp->cp_flags));
335d769ef81SSowmini Varadhan 		wait_event(cp->cp_waitq,
336d769ef81SSowmini Varadhan 			   !test_bit(RDS_RECV_REFILL, &cp->cp_flags));
3377e3f2952SChris Mason 
338d769ef81SSowmini Varadhan 		conn->c_trans->conn_path_shutdown(cp);
339d769ef81SSowmini Varadhan 		rds_conn_path_reset(cp);
3402dc39357SAndy Grover 
341d769ef81SSowmini Varadhan 		if (!rds_conn_path_transition(cp, RDS_CONN_DISCONNECTING,
342e97656d0SSowmini Varadhan 					      RDS_CONN_DOWN) &&
343e97656d0SSowmini Varadhan 		    !rds_conn_path_transition(cp, RDS_CONN_ERROR,
344d769ef81SSowmini Varadhan 					      RDS_CONN_DOWN)) {
3452dc39357SAndy Grover 			/* This can happen - eg when we're in the middle of tearing
3462dc39357SAndy Grover 			 * down the connection, and someone unloads the rds module.
347e97656d0SSowmini Varadhan 			 * Quite reproducible with loopback connections.
3482dc39357SAndy Grover 			 * Mostly harmless.
349e97656d0SSowmini Varadhan 			 *
350e97656d0SSowmini Varadhan 			 * Note that this also happens with rds-tcp because
351e97656d0SSowmini Varadhan 			 * we could have triggered rds_conn_path_drop in irq
352e97656d0SSowmini Varadhan 			 * mode from rds_tcp_state change on the receipt of
353e97656d0SSowmini Varadhan 			 * a FIN, thus we need to recheck for RDS_CONN_ERROR
354e97656d0SSowmini Varadhan 			 * here.
3552dc39357SAndy Grover 			 */
356d769ef81SSowmini Varadhan 			rds_conn_path_error(cp, "%s: failed to transition "
357d769ef81SSowmini Varadhan 					    "to state DOWN, current state "
358d769ef81SSowmini Varadhan 					    "is %d\n", __func__,
359d769ef81SSowmini Varadhan 					    atomic_read(&cp->cp_state));
3602dc39357SAndy Grover 			return;
3612dc39357SAndy Grover 		}
3622dc39357SAndy Grover 	}
3632dc39357SAndy Grover 
3642dc39357SAndy Grover 	/* Then reconnect if it's still live.
3652dc39357SAndy Grover 	 * The passive side of an IB loopback connection is never added
3662dc39357SAndy Grover 	 * to the conn hash, so we never trigger a reconnect on this
3672dc39357SAndy Grover 	 * conn - the reconnect is always triggered by the active peer. */
368d769ef81SSowmini Varadhan 	cancel_delayed_work_sync(&cp->cp_conn_w);
369bcf50ef2SChris Mason 	rcu_read_lock();
370bcf50ef2SChris Mason 	if (!hlist_unhashed(&conn->c_hash_node)) {
371bcf50ef2SChris Mason 		rcu_read_unlock();
372d769ef81SSowmini Varadhan 		rds_queue_reconnect(cp);
373bcf50ef2SChris Mason 	} else {
374bcf50ef2SChris Mason 		rcu_read_unlock();
375bcf50ef2SChris Mason 	}
3762dc39357SAndy Grover }
3772dc39357SAndy Grover 
3783ecc5693SSowmini Varadhan /* destroy a single rds_conn_path. rds_conn_destroy() iterates over
3793ecc5693SSowmini Varadhan  * all paths using rds_conn_path_destroy()
3803ecc5693SSowmini Varadhan  */
3813ecc5693SSowmini Varadhan static void rds_conn_path_destroy(struct rds_conn_path *cp)
3823ecc5693SSowmini Varadhan {
3833ecc5693SSowmini Varadhan 	struct rds_message *rm, *rtmp;
3843ecc5693SSowmini Varadhan 
385c90ecbfaSSowmini Varadhan 	set_bit(RDS_DESTROY_PENDING, &cp->cp_flags);
386c90ecbfaSSowmini Varadhan 
38702105b2cSSowmini Varadhan 	if (!cp->cp_transport_data)
38802105b2cSSowmini Varadhan 		return;
38902105b2cSSowmini Varadhan 
3903ecc5693SSowmini Varadhan 	/* make sure lingering queued work won't try to ref the conn */
391*3db6e0d1SSowmini Varadhan 	synchronize_rcu();
3923ecc5693SSowmini Varadhan 	cancel_delayed_work_sync(&cp->cp_send_w);
3933ecc5693SSowmini Varadhan 	cancel_delayed_work_sync(&cp->cp_recv_w);
3943ecc5693SSowmini Varadhan 
395aed20a53SSowmini Varadhan 	rds_conn_path_drop(cp, true);
396aed20a53SSowmini Varadhan 	flush_work(&cp->cp_down_w);
397aed20a53SSowmini Varadhan 
3983ecc5693SSowmini Varadhan 	/* tear down queued messages */
3993ecc5693SSowmini Varadhan 	list_for_each_entry_safe(rm, rtmp,
4003ecc5693SSowmini Varadhan 				 &cp->cp_send_queue,
4013ecc5693SSowmini Varadhan 				 m_conn_item) {
4023ecc5693SSowmini Varadhan 		list_del_init(&rm->m_conn_item);
4033ecc5693SSowmini Varadhan 		BUG_ON(!list_empty(&rm->m_sock_item));
4043ecc5693SSowmini Varadhan 		rds_message_put(rm);
4053ecc5693SSowmini Varadhan 	}
4063ecc5693SSowmini Varadhan 	if (cp->cp_xmit_rm)
4073ecc5693SSowmini Varadhan 		rds_message_put(cp->cp_xmit_rm);
4083ecc5693SSowmini Varadhan 
409*3db6e0d1SSowmini Varadhan 	WARN_ON(delayed_work_pending(&cp->cp_send_w));
410*3db6e0d1SSowmini Varadhan 	WARN_ON(delayed_work_pending(&cp->cp_recv_w));
411*3db6e0d1SSowmini Varadhan 	WARN_ON(delayed_work_pending(&cp->cp_conn_w));
412*3db6e0d1SSowmini Varadhan 	WARN_ON(work_pending(&cp->cp_down_w));
413*3db6e0d1SSowmini Varadhan 
4143ecc5693SSowmini Varadhan 	cp->cp_conn->c_trans->conn_free(cp->cp_transport_data);
4153ecc5693SSowmini Varadhan }
4163ecc5693SSowmini Varadhan 
4172dc39357SAndy Grover /*
4182dc39357SAndy Grover  * Stop and free a connection.
419ffcec0e1SZach Brown  *
420ffcec0e1SZach Brown  * This can only be used in very limited circumstances.  It assumes that once
421ffcec0e1SZach Brown  * the conn has been shutdown that no one else is referencing the connection.
422ffcec0e1SZach Brown  * We can only ensure this in the rmmod path in the current code.
4232dc39357SAndy Grover  */
42400e0f34cSAndy Grover void rds_conn_destroy(struct rds_connection *conn)
42500e0f34cSAndy Grover {
426fe8ff6b5SZach Brown 	unsigned long flags;
42702105b2cSSowmini Varadhan 	int i;
42802105b2cSSowmini Varadhan 	struct rds_conn_path *cp;
429840df162SSowmini Varadhan 	int npaths = (conn->c_trans->t_mp_capable ? RDS_MPATH_WORKERS : 1);
43000e0f34cSAndy Grover 
43100e0f34cSAndy Grover 	rdsdebug("freeing conn %p for %pI4 -> "
43200e0f34cSAndy Grover 		 "%pI4\n", conn, &conn->c_laddr,
43300e0f34cSAndy Grover 		 &conn->c_faddr);
43400e0f34cSAndy Grover 
435abf45439SChris Mason 	/* Ensure conn will not be scheduled for reconnect */
436abf45439SChris Mason 	spin_lock_irq(&rds_conn_lock);
437bcf50ef2SChris Mason 	hlist_del_init_rcu(&conn->c_hash_node);
438abf45439SChris Mason 	spin_unlock_irq(&rds_conn_lock);
439bcf50ef2SChris Mason 	synchronize_rcu();
440bcf50ef2SChris Mason 
441ffcec0e1SZach Brown 	/* shut the connection down */
442840df162SSowmini Varadhan 	for (i = 0; i < npaths; i++) {
4433ecc5693SSowmini Varadhan 		cp = &conn->c_path[i];
4443ecc5693SSowmini Varadhan 		rds_conn_path_destroy(cp);
4453ecc5693SSowmini Varadhan 		BUG_ON(!list_empty(&cp->cp_retrans));
44600e0f34cSAndy Grover 	}
44700e0f34cSAndy Grover 
44800e0f34cSAndy Grover 	/*
44900e0f34cSAndy Grover 	 * The congestion maps aren't freed up here.  They're
45000e0f34cSAndy Grover 	 * freed by rds_cong_exit() after all the connections
45100e0f34cSAndy Grover 	 * have been freed.
45200e0f34cSAndy Grover 	 */
45300e0f34cSAndy Grover 	rds_cong_remove_conn(conn);
45400e0f34cSAndy Grover 
455840df162SSowmini Varadhan 	kfree(conn->c_path);
45600e0f34cSAndy Grover 	kmem_cache_free(rds_conn_slab, conn);
45700e0f34cSAndy Grover 
458fe8ff6b5SZach Brown 	spin_lock_irqsave(&rds_conn_lock, flags);
45900e0f34cSAndy Grover 	rds_conn_count--;
460fe8ff6b5SZach Brown 	spin_unlock_irqrestore(&rds_conn_lock, flags);
46100e0f34cSAndy Grover }
462616b757aSAndy Grover EXPORT_SYMBOL_GPL(rds_conn_destroy);
46300e0f34cSAndy Grover 
46400e0f34cSAndy Grover static void rds_conn_message_info(struct socket *sock, unsigned int len,
46500e0f34cSAndy Grover 				  struct rds_info_iterator *iter,
46600e0f34cSAndy Grover 				  struct rds_info_lengths *lens,
46700e0f34cSAndy Grover 				  int want_send)
46800e0f34cSAndy Grover {
46900e0f34cSAndy Grover 	struct hlist_head *head;
47000e0f34cSAndy Grover 	struct list_head *list;
47100e0f34cSAndy Grover 	struct rds_connection *conn;
47200e0f34cSAndy Grover 	struct rds_message *rm;
47300e0f34cSAndy Grover 	unsigned int total = 0;
474501dcccdSZach Brown 	unsigned long flags;
47500e0f34cSAndy Grover 	size_t i;
476992c9ec5SSowmini Varadhan 	int j;
47700e0f34cSAndy Grover 
47800e0f34cSAndy Grover 	len /= sizeof(struct rds_info_message);
47900e0f34cSAndy Grover 
480bcf50ef2SChris Mason 	rcu_read_lock();
48100e0f34cSAndy Grover 
48200e0f34cSAndy Grover 	for (i = 0, head = rds_conn_hash; i < ARRAY_SIZE(rds_conn_hash);
48300e0f34cSAndy Grover 	     i++, head++) {
484b67bfe0dSSasha Levin 		hlist_for_each_entry_rcu(conn, head, c_hash_node) {
485992c9ec5SSowmini Varadhan 			struct rds_conn_path *cp;
486840df162SSowmini Varadhan 			int npaths;
48700e0f34cSAndy Grover 
488840df162SSowmini Varadhan 			npaths = (conn->c_trans->t_mp_capable ?
489840df162SSowmini Varadhan 				 RDS_MPATH_WORKERS : 1);
490840df162SSowmini Varadhan 
491840df162SSowmini Varadhan 			for (j = 0; j < npaths; j++) {
492992c9ec5SSowmini Varadhan 				cp = &conn->c_path[j];
493992c9ec5SSowmini Varadhan 				if (want_send)
494992c9ec5SSowmini Varadhan 					list = &cp->cp_send_queue;
495992c9ec5SSowmini Varadhan 				else
496992c9ec5SSowmini Varadhan 					list = &cp->cp_retrans;
497992c9ec5SSowmini Varadhan 
498992c9ec5SSowmini Varadhan 				spin_lock_irqsave(&cp->cp_lock, flags);
49900e0f34cSAndy Grover 
50000e0f34cSAndy Grover 				/* XXX too lazy to maintain counts.. */
50100e0f34cSAndy Grover 				list_for_each_entry(rm, list, m_conn_item) {
50200e0f34cSAndy Grover 					total++;
50300e0f34cSAndy Grover 					if (total <= len)
504992c9ec5SSowmini Varadhan 						rds_inc_info_copy(&rm->m_inc,
505992c9ec5SSowmini Varadhan 								  iter,
50600e0f34cSAndy Grover 								  conn->c_laddr,
507992c9ec5SSowmini Varadhan 								  conn->c_faddr,
508992c9ec5SSowmini Varadhan 								  0);
50900e0f34cSAndy Grover 				}
51000e0f34cSAndy Grover 
511992c9ec5SSowmini Varadhan 				spin_unlock_irqrestore(&cp->cp_lock, flags);
512992c9ec5SSowmini Varadhan 			}
51300e0f34cSAndy Grover 		}
51400e0f34cSAndy Grover 	}
515bcf50ef2SChris Mason 	rcu_read_unlock();
51600e0f34cSAndy Grover 
51700e0f34cSAndy Grover 	lens->nr = total;
51800e0f34cSAndy Grover 	lens->each = sizeof(struct rds_info_message);
51900e0f34cSAndy Grover }
52000e0f34cSAndy Grover 
52100e0f34cSAndy Grover static void rds_conn_message_info_send(struct socket *sock, unsigned int len,
52200e0f34cSAndy Grover 				       struct rds_info_iterator *iter,
52300e0f34cSAndy Grover 				       struct rds_info_lengths *lens)
52400e0f34cSAndy Grover {
52500e0f34cSAndy Grover 	rds_conn_message_info(sock, len, iter, lens, 1);
52600e0f34cSAndy Grover }
52700e0f34cSAndy Grover 
52800e0f34cSAndy Grover static void rds_conn_message_info_retrans(struct socket *sock,
52900e0f34cSAndy Grover 					  unsigned int len,
53000e0f34cSAndy Grover 					  struct rds_info_iterator *iter,
53100e0f34cSAndy Grover 					  struct rds_info_lengths *lens)
53200e0f34cSAndy Grover {
53300e0f34cSAndy Grover 	rds_conn_message_info(sock, len, iter, lens, 0);
53400e0f34cSAndy Grover }
53500e0f34cSAndy Grover 
53600e0f34cSAndy Grover void rds_for_each_conn_info(struct socket *sock, unsigned int len,
53700e0f34cSAndy Grover 			  struct rds_info_iterator *iter,
53800e0f34cSAndy Grover 			  struct rds_info_lengths *lens,
53900e0f34cSAndy Grover 			  int (*visitor)(struct rds_connection *, void *),
54000e0f34cSAndy Grover 			  size_t item_len)
54100e0f34cSAndy Grover {
54200e0f34cSAndy Grover 	uint64_t buffer[(item_len + 7) / 8];
54300e0f34cSAndy Grover 	struct hlist_head *head;
54400e0f34cSAndy Grover 	struct rds_connection *conn;
54500e0f34cSAndy Grover 	size_t i;
54600e0f34cSAndy Grover 
547bcf50ef2SChris Mason 	rcu_read_lock();
54800e0f34cSAndy Grover 
54900e0f34cSAndy Grover 	lens->nr = 0;
55000e0f34cSAndy Grover 	lens->each = item_len;
55100e0f34cSAndy Grover 
55200e0f34cSAndy Grover 	for (i = 0, head = rds_conn_hash; i < ARRAY_SIZE(rds_conn_hash);
55300e0f34cSAndy Grover 	     i++, head++) {
554b67bfe0dSSasha Levin 		hlist_for_each_entry_rcu(conn, head, c_hash_node) {
55500e0f34cSAndy Grover 
55600e0f34cSAndy Grover 			/* XXX no c_lock usage.. */
55700e0f34cSAndy Grover 			if (!visitor(conn, buffer))
55800e0f34cSAndy Grover 				continue;
55900e0f34cSAndy Grover 
56000e0f34cSAndy Grover 			/* We copy as much as we can fit in the buffer,
56100e0f34cSAndy Grover 			 * but we count all items so that the caller
56200e0f34cSAndy Grover 			 * can resize the buffer. */
56300e0f34cSAndy Grover 			if (len >= item_len) {
56400e0f34cSAndy Grover 				rds_info_copy(iter, buffer, item_len);
56500e0f34cSAndy Grover 				len -= item_len;
56600e0f34cSAndy Grover 			}
56700e0f34cSAndy Grover 			lens->nr++;
56800e0f34cSAndy Grover 		}
56900e0f34cSAndy Grover 	}
570bcf50ef2SChris Mason 	rcu_read_unlock();
57100e0f34cSAndy Grover }
572616b757aSAndy Grover EXPORT_SYMBOL_GPL(rds_for_each_conn_info);
57300e0f34cSAndy Grover 
574bb789763SSantosh Shilimkar static void rds_walk_conn_path_info(struct socket *sock, unsigned int len,
575992c9ec5SSowmini Varadhan 				    struct rds_info_iterator *iter,
576992c9ec5SSowmini Varadhan 				    struct rds_info_lengths *lens,
577992c9ec5SSowmini Varadhan 				    int (*visitor)(struct rds_conn_path *, void *),
578992c9ec5SSowmini Varadhan 				    size_t item_len)
579992c9ec5SSowmini Varadhan {
580992c9ec5SSowmini Varadhan 	u64  buffer[(item_len + 7) / 8];
581992c9ec5SSowmini Varadhan 	struct hlist_head *head;
582992c9ec5SSowmini Varadhan 	struct rds_connection *conn;
583992c9ec5SSowmini Varadhan 	size_t i;
584992c9ec5SSowmini Varadhan 	int j;
585992c9ec5SSowmini Varadhan 
586992c9ec5SSowmini Varadhan 	rcu_read_lock();
587992c9ec5SSowmini Varadhan 
588992c9ec5SSowmini Varadhan 	lens->nr = 0;
589992c9ec5SSowmini Varadhan 	lens->each = item_len;
590992c9ec5SSowmini Varadhan 
591992c9ec5SSowmini Varadhan 	for (i = 0, head = rds_conn_hash; i < ARRAY_SIZE(rds_conn_hash);
592992c9ec5SSowmini Varadhan 	     i++, head++) {
593992c9ec5SSowmini Varadhan 		hlist_for_each_entry_rcu(conn, head, c_hash_node) {
594992c9ec5SSowmini Varadhan 			struct rds_conn_path *cp;
595840df162SSowmini Varadhan 			int npaths;
596992c9ec5SSowmini Varadhan 
597840df162SSowmini Varadhan 			npaths = (conn->c_trans->t_mp_capable ?
598840df162SSowmini Varadhan 				 RDS_MPATH_WORKERS : 1);
599840df162SSowmini Varadhan 			for (j = 0; j < npaths; j++) {
600992c9ec5SSowmini Varadhan 				cp = &conn->c_path[j];
601992c9ec5SSowmini Varadhan 
602992c9ec5SSowmini Varadhan 				/* XXX no cp_lock usage.. */
603992c9ec5SSowmini Varadhan 				if (!visitor(cp, buffer))
604992c9ec5SSowmini Varadhan 					continue;
605992c9ec5SSowmini Varadhan 			}
606992c9ec5SSowmini Varadhan 
607992c9ec5SSowmini Varadhan 			/* We copy as much as we can fit in the buffer,
608992c9ec5SSowmini Varadhan 			 * but we count all items so that the caller
609992c9ec5SSowmini Varadhan 			 * can resize the buffer.
610992c9ec5SSowmini Varadhan 			 */
611992c9ec5SSowmini Varadhan 			if (len >= item_len) {
612992c9ec5SSowmini Varadhan 				rds_info_copy(iter, buffer, item_len);
613992c9ec5SSowmini Varadhan 				len -= item_len;
614992c9ec5SSowmini Varadhan 			}
615992c9ec5SSowmini Varadhan 			lens->nr++;
616992c9ec5SSowmini Varadhan 		}
617992c9ec5SSowmini Varadhan 	}
618992c9ec5SSowmini Varadhan 	rcu_read_unlock();
619992c9ec5SSowmini Varadhan }
620992c9ec5SSowmini Varadhan 
621992c9ec5SSowmini Varadhan static int rds_conn_info_visitor(struct rds_conn_path *cp, void *buffer)
62200e0f34cSAndy Grover {
62300e0f34cSAndy Grover 	struct rds_info_connection *cinfo = buffer;
62400e0f34cSAndy Grover 
625992c9ec5SSowmini Varadhan 	cinfo->next_tx_seq = cp->cp_next_tx_seq;
626992c9ec5SSowmini Varadhan 	cinfo->next_rx_seq = cp->cp_next_rx_seq;
627992c9ec5SSowmini Varadhan 	cinfo->laddr = cp->cp_conn->c_laddr;
628992c9ec5SSowmini Varadhan 	cinfo->faddr = cp->cp_conn->c_faddr;
629992c9ec5SSowmini Varadhan 	strncpy(cinfo->transport, cp->cp_conn->c_trans->t_name,
63000e0f34cSAndy Grover 		sizeof(cinfo->transport));
63100e0f34cSAndy Grover 	cinfo->flags = 0;
63200e0f34cSAndy Grover 
633992c9ec5SSowmini Varadhan 	rds_conn_info_set(cinfo->flags, test_bit(RDS_IN_XMIT, &cp->cp_flags),
6340f4b1c7eSZach Brown 			  SENDING);
63500e0f34cSAndy Grover 	/* XXX Future: return the state rather than these funky bits */
63600e0f34cSAndy Grover 	rds_conn_info_set(cinfo->flags,
637992c9ec5SSowmini Varadhan 			  atomic_read(&cp->cp_state) == RDS_CONN_CONNECTING,
63800e0f34cSAndy Grover 			  CONNECTING);
63900e0f34cSAndy Grover 	rds_conn_info_set(cinfo->flags,
640992c9ec5SSowmini Varadhan 			  atomic_read(&cp->cp_state) == RDS_CONN_UP,
64100e0f34cSAndy Grover 			  CONNECTED);
64200e0f34cSAndy Grover 	return 1;
64300e0f34cSAndy Grover }
64400e0f34cSAndy Grover 
64500e0f34cSAndy Grover static void rds_conn_info(struct socket *sock, unsigned int len,
64600e0f34cSAndy Grover 			  struct rds_info_iterator *iter,
64700e0f34cSAndy Grover 			  struct rds_info_lengths *lens)
64800e0f34cSAndy Grover {
649992c9ec5SSowmini Varadhan 	rds_walk_conn_path_info(sock, len, iter, lens,
65000e0f34cSAndy Grover 				rds_conn_info_visitor,
65100e0f34cSAndy Grover 				sizeof(struct rds_info_connection));
65200e0f34cSAndy Grover }
65300e0f34cSAndy Grover 
654ef87b7eaSZach Brown int rds_conn_init(void)
65500e0f34cSAndy Grover {
65600e0f34cSAndy Grover 	rds_conn_slab = kmem_cache_create("rds_connection",
65700e0f34cSAndy Grover 					  sizeof(struct rds_connection),
65800e0f34cSAndy Grover 					  0, 0, NULL);
6598690bfa1SAndy Grover 	if (!rds_conn_slab)
66000e0f34cSAndy Grover 		return -ENOMEM;
66100e0f34cSAndy Grover 
66200e0f34cSAndy Grover 	rds_info_register_func(RDS_INFO_CONNECTIONS, rds_conn_info);
66300e0f34cSAndy Grover 	rds_info_register_func(RDS_INFO_SEND_MESSAGES,
66400e0f34cSAndy Grover 			       rds_conn_message_info_send);
66500e0f34cSAndy Grover 	rds_info_register_func(RDS_INFO_RETRANS_MESSAGES,
66600e0f34cSAndy Grover 			       rds_conn_message_info_retrans);
66700e0f34cSAndy Grover 
66800e0f34cSAndy Grover 	return 0;
66900e0f34cSAndy Grover }
67000e0f34cSAndy Grover 
67100e0f34cSAndy Grover void rds_conn_exit(void)
67200e0f34cSAndy Grover {
67300e0f34cSAndy Grover 	rds_loop_exit();
67400e0f34cSAndy Grover 
67500e0f34cSAndy Grover 	WARN_ON(!hlist_empty(rds_conn_hash));
67600e0f34cSAndy Grover 
67700e0f34cSAndy Grover 	kmem_cache_destroy(rds_conn_slab);
67800e0f34cSAndy Grover 
67900e0f34cSAndy Grover 	rds_info_deregister_func(RDS_INFO_CONNECTIONS, rds_conn_info);
68000e0f34cSAndy Grover 	rds_info_deregister_func(RDS_INFO_SEND_MESSAGES,
68100e0f34cSAndy Grover 				 rds_conn_message_info_send);
68200e0f34cSAndy Grover 	rds_info_deregister_func(RDS_INFO_RETRANS_MESSAGES,
68300e0f34cSAndy Grover 				 rds_conn_message_info_retrans);
68400e0f34cSAndy Grover }
68500e0f34cSAndy Grover 
68600e0f34cSAndy Grover /*
68700e0f34cSAndy Grover  * Force a disconnect
68800e0f34cSAndy Grover  */
689aed20a53SSowmini Varadhan void rds_conn_path_drop(struct rds_conn_path *cp, bool destroy)
6900cb43965SSowmini Varadhan {
6910cb43965SSowmini Varadhan 	atomic_set(&cp->cp_state, RDS_CONN_ERROR);
692aed20a53SSowmini Varadhan 
693*3db6e0d1SSowmini Varadhan 	rcu_read_lock();
694*3db6e0d1SSowmini Varadhan 	if (!destroy && test_bit(RDS_DESTROY_PENDING, &cp->cp_flags)) {
695*3db6e0d1SSowmini Varadhan 		rcu_read_unlock();
696aed20a53SSowmini Varadhan 		return;
697*3db6e0d1SSowmini Varadhan 	}
6980cb43965SSowmini Varadhan 	queue_work(rds_wq, &cp->cp_down_w);
699*3db6e0d1SSowmini Varadhan 	rcu_read_unlock();
7000cb43965SSowmini Varadhan }
7010cb43965SSowmini Varadhan EXPORT_SYMBOL_GPL(rds_conn_path_drop);
7020cb43965SSowmini Varadhan 
70300e0f34cSAndy Grover void rds_conn_drop(struct rds_connection *conn)
70400e0f34cSAndy Grover {
7055916e2c1SSowmini Varadhan 	WARN_ON(conn->c_trans->t_mp_capable);
706aed20a53SSowmini Varadhan 	rds_conn_path_drop(&conn->c_path[0], false);
70700e0f34cSAndy Grover }
708616b757aSAndy Grover EXPORT_SYMBOL_GPL(rds_conn_drop);
70900e0f34cSAndy Grover 
71000e0f34cSAndy Grover /*
711f3c6808dSZach Brown  * If the connection is down, trigger a connect. We may have scheduled a
712f3c6808dSZach Brown  * delayed reconnect however - in this case we should not interfere.
713f3c6808dSZach Brown  */
7143c0a5900SSowmini Varadhan void rds_conn_path_connect_if_down(struct rds_conn_path *cp)
7153c0a5900SSowmini Varadhan {
716*3db6e0d1SSowmini Varadhan 	rcu_read_lock();
717*3db6e0d1SSowmini Varadhan 	if (test_bit(RDS_DESTROY_PENDING, &cp->cp_flags)) {
718*3db6e0d1SSowmini Varadhan 		rcu_read_unlock();
719*3db6e0d1SSowmini Varadhan 		return;
720*3db6e0d1SSowmini Varadhan 	}
7213c0a5900SSowmini Varadhan 	if (rds_conn_path_state(cp) == RDS_CONN_DOWN &&
7223c0a5900SSowmini Varadhan 	    !test_and_set_bit(RDS_RECONNECT_PENDING, &cp->cp_flags))
7233c0a5900SSowmini Varadhan 		queue_delayed_work(rds_wq, &cp->cp_conn_w, 0);
724*3db6e0d1SSowmini Varadhan 	rcu_read_unlock();
7253c0a5900SSowmini Varadhan }
7261a0e100fSSowmini Varadhan EXPORT_SYMBOL_GPL(rds_conn_path_connect_if_down);
7273c0a5900SSowmini Varadhan 
728f3c6808dSZach Brown void rds_conn_connect_if_down(struct rds_connection *conn)
729f3c6808dSZach Brown {
7303c0a5900SSowmini Varadhan 	WARN_ON(conn->c_trans->t_mp_capable);
7313c0a5900SSowmini Varadhan 	rds_conn_path_connect_if_down(&conn->c_path[0]);
732f3c6808dSZach Brown }
733f3c6808dSZach Brown EXPORT_SYMBOL_GPL(rds_conn_connect_if_down);
734f3c6808dSZach Brown 
735fb1b3dc4SSowmini Varadhan void
736fb1b3dc4SSowmini Varadhan __rds_conn_path_error(struct rds_conn_path *cp, const char *fmt, ...)
737fb1b3dc4SSowmini Varadhan {
738fb1b3dc4SSowmini Varadhan 	va_list ap;
739fb1b3dc4SSowmini Varadhan 
740fb1b3dc4SSowmini Varadhan 	va_start(ap, fmt);
741fb1b3dc4SSowmini Varadhan 	vprintk(fmt, ap);
742fb1b3dc4SSowmini Varadhan 	va_end(ap);
743fb1b3dc4SSowmini Varadhan 
744aed20a53SSowmini Varadhan 	rds_conn_path_drop(cp, false);
745fb1b3dc4SSowmini Varadhan }
746