Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2554691yba; Mon, 6 May 2019 07:57:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqy+vwy20Yb86Xxro5kSuK90QvO/NcnQHUcJdsRliGw+Q5zi+VZomI+s5+FZBHdnqzYOe4rV X-Received: by 2002:aa7:8284:: with SMTP id s4mr29741582pfm.235.1557154655397; Mon, 06 May 2019 07:57:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557154655; cv=none; d=google.com; s=arc-20160816; b=lFjApGKbVaqOAdCg6D4x2pekZ8DK8d/QsxfxRhkUnu7ntjCSzw2oekpak0TGLZcmi/ ZFTYrQb2ruvHq4d4LNX+7sfOhfTF+nItNkI8OfDSXiMl13MbZz5KcJCaLWOLOuJqa1vn Y/BynAIuEMcP3W+hxfcGULfB4N2nC/buiv9mxVpdYKA+NVJlZPfcnyevvwOJMhCi9uX9 SLoky+rOduK/BXeoxJrIi8o7HZHj+47m/YHF1oSBe0ZQmw6jK5Q4L0Uu2uCyheq06LIr bWqtzR5cDUsnc4VYLeRC4Qoypq7LHxeDfX2euAP7PPndAt8PCT7P7TjFuhhHEaGqnpSl pypg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/ySvg5dbXCd2TesFK8n33gRBBku8GpPGUkIvDLOsyuE=; b=kV6ox7IsnRWbEJYrc0WKL8hzv+gBFRunTKn7RnS4K+2c3HznTkshUKCo1eG8EFs477 jzqzwB9jOof0YS8OSSx+NnkyQWRlsHyI3hjq3QOXzQ7qPN1lZ0ZLF4o3oqa/aMiqGktP 3ZKQPPST67LcYKNVrmwMNl9fTglb/+IgZ92Vp2f0G4EzwFm5UHqxIEwBiYzkyHLBtI3W lhAxG44OF4yhrkZscHi+rVTzauFiKa+fh0OHDTPbAzaXKrL54EF5zDw2+AdleMa7mgMi fSNxHPmtz1StruZ2mr5g1cyRQQNJE10cwtv33NNoes8W/ZKHCRBsSFWeq/EcoHyYLPfw VCMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ocXc07/V"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i2si14140987plt.119.2019.05.06.07.57.19; Mon, 06 May 2019 07:57:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ocXc07/V"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729060AbfEFOqI (ORCPT + 99 others); Mon, 6 May 2019 10:46:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:43596 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728489AbfEFOqG (ORCPT ); Mon, 6 May 2019 10:46:06 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6378521479; Mon, 6 May 2019 14:46:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557153965; bh=3Ca6qMXXyzzlbNgKoHpmWEQMnGIcdn4oM83zHpLqnTk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ocXc07/VfoOzXt3yR8KwRrH6LatNMf2k0vwSrBiBLXaDWxLJCJxJzA0gthKqqFkkj uAQbwaJGearQSwpIT1VvecFbemkhyslrxGw7iA+rE+DIIVpcHvDKhlMFykaqWlWwGf v4HSkjP/wXfQ94skTC2ivhaswOQuavsSgfglTquE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Doug Ledford , Jason Gunthorpe , Nicholas Bellinger , Mike Christie , Hannes Reinecke , Christoph Hellwig , Bart Van Assche , "Martin K. Petersen" Subject: [PATCH 4.14 63/75] scsi: RDMA/srpt: Fix a credit leak for aborted commands Date: Mon, 6 May 2019 16:33:11 +0200 Message-Id: <20190506143058.977870720@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190506143053.287515952@linuxfoundation.org> References: <20190506143053.287515952@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Bart Van Assche commit 40ca8757291ca7a8775498112d320205b2a2e571 upstream. Make sure that the next time a response is sent to the initiator that the credit it had allocated for the aborted request gets freed. Cc: Doug Ledford Cc: Jason Gunthorpe Cc: Nicholas Bellinger Cc: Mike Christie Cc: Hannes Reinecke Cc: Christoph Hellwig Fixes: 131e6abc674e ("target: Add TFO->abort_task for aborted task resources release") # v3.15 Signed-off-by: Bart Van Assche Signed-off-by: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/ulp/srpt/ib_srpt.c | 11 +++++++++++ 1 file changed, 11 insertions(+) --- a/drivers/infiniband/ulp/srpt/ib_srpt.c +++ b/drivers/infiniband/ulp/srpt/ib_srpt.c @@ -2381,8 +2381,19 @@ static void srpt_queue_tm_rsp(struct se_ srpt_queue_response(cmd); } +/* + * This function is called for aborted commands if no response is sent to the + * initiator. Make sure that the credits freed by aborting a command are + * returned to the initiator the next time a response is sent by incrementing + * ch->req_lim_delta. + */ static void srpt_aborted_task(struct se_cmd *cmd) { + struct srpt_send_ioctx *ioctx = container_of(cmd, + struct srpt_send_ioctx, cmd); + struct srpt_rdma_ch *ch = ioctx->ch; + + atomic_inc(&ch->req_lim_delta); } static int srpt_queue_status(struct se_cmd *cmd)