diff options
author | D. Wythe <alibuda@linux.alibaba.com> | 2022-03-02 21:25:12 +0800 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2022-03-03 10:34:18 +0000 |
commit | 4940a1fdf31c39f0806ac831cde333134862030b (patch) | |
tree | 6db678f595f933650aba423b27ccdcf0a010810e /net | |
parent | 0537f0a2151375dcf90c1bbfda6a0aaf57164e89 (diff) | |
download | linux-stable-4940a1fdf31c39f0806ac831cde333134862030b.tar.gz linux-stable-4940a1fdf31c39f0806ac831cde333134862030b.tar.bz2 linux-stable-4940a1fdf31c39f0806ac831cde333134862030b.zip |
net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
The problem of SMC_CLC_DECL_ERR_REGRMB on the server is very clear.
Based on the fact that whether a new SMC connection can be accepted or
not depends on not only the limit of conn nums, but also the available
entries of rtoken. Since the rtoken release is trigger by peer, while
the conn nums is decrease by local, tons of thing can happen in this
time difference.
This only thing that needs to be mentioned is that now all connection
creations are completely protected by smc_server_lgr_pending lock, it's
enough to check only the available entries in rtokens_used_mask.
Fixes: cd6851f30386 ("smc: remote memory buffers (RMBs)")
Signed-off-by: D. Wythe <alibuda@linux.alibaba.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/smc/smc_core.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/net/smc/smc_core.c b/net/smc/smc_core.c index f8c9675f4af3..be7d704976ff 100644 --- a/net/smc/smc_core.c +++ b/net/smc/smc_core.c @@ -1864,7 +1864,8 @@ int smc_conn_create(struct smc_sock *smc, struct smc_init_info *ini) (ini->smcd_version == SMC_V2 || lgr->vlan_id == ini->vlan_id) && (role == SMC_CLNT || ini->is_smcd || - lgr->conns_num < SMC_RMBS_PER_LGR_MAX)) { + (lgr->conns_num < SMC_RMBS_PER_LGR_MAX && + !bitmap_full(lgr->rtokens_used_mask, SMC_RMBS_PER_LGR_MAX)))) { /* link group found */ ini->first_contact_local = 0; conn->lgr = lgr; |