Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2835554pxv; Mon, 12 Jul 2021 03:07:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxeB3u1aObMbs2nfhtvC4jykGNY3ZZlRsTmHvJvJ5YzHVrKF19X0qnVthbrdKBfAZ5uGXoE X-Received: by 2002:a05:6e02:921:: with SMTP id o1mr39237194ilt.57.1626084467385; Mon, 12 Jul 2021 03:07:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626084467; cv=none; d=google.com; s=arc-20160816; b=pENOeRelYWFQaReV3Sh9lVdbOt7uYA+QUDM3wU/PisQzKX5Sef/Ay91ikCtrOewUM7 OvJyhx4KdKCiefBbIFoh5iVi1FOLVkHehvJ0CA2G6AXEGLSHxTtnfRgJdkI54S4YEKxF jxtsaxOz0t7E0Y12oo+pEzBZtf8Q7SyvigEZpr6kRl5YBIRoLt69HjjQyUjypTKbvrhS trcOEHodHnktfdwDMRQ81ZIhLDpORvCqjwgDh1VOv73jCbeXcGmZ+j5dusH+6TN8wgvp BXytKcipiLRaX2i7mmRtpCKan6LBfpD3ezstjXSrfGVpYs2jDRKMGPUvr04I0n9m+ckD M0pA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=DqWmrHEhpqjvmyqEOLPmxD56B3mmJR2t2ia6zGM5at0=; b=D1Xr3GarZt6XKEM1Psts7wLjpEPLpdXNT2sjMODWJ0XtjH5zUWr2avQm59O5DoudfB oV9Q7sktWmXzbu72g3VXoGYz0ZScuO5rivqNJYfaH7sPM7W3I4I0zcqvL9/ePykzwvHN zUTzdkMDXMTsrIhGSH8CzkW2BmAgAtEPvb1h1Y9RB2GfBpJVVJN6TaD+ese8sRdPjOZj UuutnTumdBv35Va3MZrJzkUC7xnI/qPHpjIO9az6NwPjSyWrpNKNqtoLmab2JEfJ7Rpc koS88gTvHLrFtzBI5KceEL2koRqVKjvlJmsY/kdQyZ/2RIQMDyLRgxl254iZ3UGfJT44 uenw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=q+FSxbop; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c11si16380044iob.102.2021.07.12.03.07.36; Mon, 12 Jul 2021 03:07:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=q+FSxbop; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347101AbhGLHsk (ORCPT + 99 others); Mon, 12 Jul 2021 03:48:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:48498 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240155AbhGLHOj (ORCPT ); Mon, 12 Jul 2021 03:14:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 77FDB61205; Mon, 12 Jul 2021 07:11:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626073873; bh=R+gnsuVLPkqnR5a2NJDRSttCd5SO7UgPTFlJRHvvTnU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=q+FSxbopRjcvtgd3c5u/j8QlBlTBmUY9AGkSOXvxfAxXQeIuCWxg1refEUnY6aG9j CF9FW2UPKZ4Gi+1nmuHiYZQa7oQJk1xNh0Orvu6udbjT4WH48ui5brtaQgNduqQteU 82IQvJpHJxpBw7a8H9tSB8vchzTD1CKpvVb+M5rU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Md Haris Iqbal , Gioh Kim , Jack Wang , Jason Gunthorpe , Sasha Levin Subject: [PATCH 5.12 387/700] RDMA/rtrs-clt: Check if the queue_depth has changed during a reconnection Date: Mon, 12 Jul 2021 08:07:50 +0200 Message-Id: <20210712061017.567081081@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060924.797321836@linuxfoundation.org> References: <20210712060924.797321836@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Md Haris Iqbal [ Upstream commit 5b73b799c25c68a4703cd6c5ac4518006d9865b8 ] The queue_depth is a module parameter for rtrs_server. It is used on the client side to determing the queue_depth of the request queue for the RNBD virtual block device. During a reconnection event for an already mapped device, in case the rtrs_server module queue_depth has changed, fail the reconnect attempt. Also stop further auto reconnection attempts. A manual reconnect via sysfs has to be triggerred. Fixes: 6a98d71daea18 ("RDMA/rtrs: client: main functionality") Link: https://lore.kernel.org/r/20210528113018.52290-20-jinpu.wang@ionos.com Signed-off-by: Md Haris Iqbal Signed-off-by: Gioh Kim Signed-off-by: Jack Wang Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/ulp/rtrs/rtrs-clt.c | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-) diff --git a/drivers/infiniband/ulp/rtrs/rtrs-clt.c b/drivers/infiniband/ulp/rtrs/rtrs-clt.c index cb6f5c7610a0..1c581c4faacd 100644 --- a/drivers/infiniband/ulp/rtrs/rtrs-clt.c +++ b/drivers/infiniband/ulp/rtrs/rtrs-clt.c @@ -1716,7 +1716,19 @@ static int rtrs_rdma_conn_established(struct rtrs_clt_con *con, queue_depth); return -ECONNRESET; } - if (!sess->rbufs || sess->queue_depth < queue_depth) { + if (sess->queue_depth > 0 && queue_depth != sess->queue_depth) { + rtrs_err(clt, "Error: queue depth changed\n"); + + /* + * Stop any more reconnection attempts + */ + sess->reconnect_attempts = -1; + rtrs_err(clt, + "Disabling auto-reconnect. Trigger a manual reconnect after issue is resolved\n"); + return -ECONNRESET; + } + + if (!sess->rbufs) { kfree(sess->rbufs); sess->rbufs = kcalloc(queue_depth, sizeof(*sess->rbufs), GFP_KERNEL); @@ -1730,7 +1742,7 @@ static int rtrs_rdma_conn_established(struct rtrs_clt_con *con, sess->chunk_size = sess->max_io_size + sess->max_hdr_size; /* - * Global queue depth and IO size is always a minimum. + * Global IO size is always a minimum. * If while a reconnection server sends us a value a bit * higher - client does not care and uses cached minimum. * @@ -1738,8 +1750,7 @@ static int rtrs_rdma_conn_established(struct rtrs_clt_con *con, * connections in parallel, use lock. */ mutex_lock(&clt->paths_mutex); - clt->queue_depth = min_not_zero(sess->queue_depth, - clt->queue_depth); + clt->queue_depth = sess->queue_depth; clt->max_io_size = min_not_zero(sess->max_io_size, clt->max_io_size); mutex_unlock(&clt->paths_mutex); -- 2.30.2