aboutsummaryrefslogtreecommitdiff
path: root/crypto/twofish.c
diff options
context:
space:
mode:
authorRalph Campbell <ralph.campbell@qlogic.com>2007-06-18 14:24:44 -0700
committerRoland Dreier <rolandd@cisco.com>2007-07-09 20:12:26 -0700
commitd781b129f1e8b3e2f369d8035a61a5233832e65c (patch)
tree7ff0bfbcd2e32a4693fa2007b773a7ca87968464 /crypto/twofish.c
parent30d149ab58cc3ed8e4bc9c4dc45bebbed0e84b6e (diff)
IB/ipath: Duplicate RDMA reads can cause responder to NAK inappropriately
A duplicate RDMA read request can fool the responder into NAKing a new RDMA read request because the responder wasn't keeping track of whether the queue of RDMA read requests had been sent at least once. For example, requester sends 4 2K byte RDMA read requests, times out, and resends the first, then sees the 4 responses, then sends a 5th RDMA read or atomic operation. The responder sees the 4 requests, sends 4 responses, sees the resent 1st request, rewinds the queue, then sees the 5th request but thinks the queue is full and that the requester is invalidly sending a 5th new request. Signed-off-by: Ralph Campbell <ralph.campbell@qlogic.com> Signed-off-by: Roland Dreier <rolandd@cisco.com>
Diffstat (limited to 'crypto/twofish.c')
0 files changed, 0 insertions, 0 deletions