diff options
author | Daisuke Matsuda <[email protected]> | 2022-12-20 17:08:48 +0900 |
---|---|---|
committer | Jason Gunthorpe <[email protected]> | 2023-01-09 10:48:16 -0400 |
commit | 1aefe5c177c1922119afb4ee443ddd6ac3140b37 (patch) | |
tree | d1ad4293330ebec47454a8c6b7f0d6f2582dee01 /tools/testing/selftests/bpf/progs/test_autoload.c | |
parent | 3a73746b267e5c6a87c9ad26f8c6a48e44da609c (diff) |
RDMA/rxe: Prevent faulty rkey generation
If you create MRs more than 0x10000 times after loading the module,
responder starts to reply NAKs for RDMA/Atomic operations because of rkey
violation detected in check_rkey(). The root cause is that rkeys are
incremented each time a new MR is created and the value overflows into the
range reserved for MWs.
This commit also increases the value of RXE_MAX_MW that has been limited
unlike other parameters.
Fixes: 0994a1bcd5f7 ("RDMA/rxe: Bump up default maximum values used via uverbs")
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Daisuke Matsuda <[email protected]>
Tested-by: Li Zhijian <[email protected]>
Reviewed-by: Li Zhijian <[email protected]>
Signed-off-by: Jason Gunthorpe <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/progs/test_autoload.c')
0 files changed, 0 insertions, 0 deletions