diff options
author | Ralph Campbell <ralph.campbell@qlogic.com> | 2007-06-18 14:24:44 -0700 |
---|---|---|
committer | Roland Dreier <rolandd@cisco.com> | 2007-07-09 20:12:26 -0700 |
commit | d781b129f1e8b3e2f369d8035a61a5233832e65c (patch) | |
tree | 7ff0bfbcd2e32a4693fa2007b773a7ca87968464 /crypto/cbc.c | |
parent | 30d149ab58cc3ed8e4bc9c4dc45bebbed0e84b6e (diff) |
IB/ipath: Duplicate RDMA reads can cause responder to NAK inappropriately
A duplicate RDMA read request can fool the responder into NAKing a new
RDMA read request because the responder wasn't keeping track of
whether the queue of RDMA read requests had been sent at least once.
For example, requester sends 4 2K byte RDMA read requests, times out,
and resends the first, then sees the 4 responses, then sends a 5th
RDMA read or atomic operation. The responder sees the 4 requests,
sends 4 responses, sees the resent 1st request, rewinds the queue,
then sees the 5th request but thinks the queue is full and that the
requester is invalidly sending a 5th new request.
Signed-off-by: Ralph Campbell <ralph.campbell@qlogic.com>
Signed-off-by: Roland Dreier <rolandd@cisco.com>
Diffstat (limited to 'crypto/cbc.c')
0 files changed, 0 insertions, 0 deletions