Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp2755329ybh; Mon, 5 Aug 2019 06:20:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqz8urz0nFCoaTY5+Lst8pZPOaDWqKDYuNQViSwzLiodqtvhmU5IWLqnCy0sn4cwIYi9Kqv1 X-Received: by 2002:a65:6891:: with SMTP id e17mr14596432pgt.305.1565011229245; Mon, 05 Aug 2019 06:20:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565011229; cv=none; d=google.com; s=arc-20160816; b=w3wDO3PH0hK6fNRzgNAlwpm+Wjgwc9acA5ZRYrZ8Fv2cXAMEPlmlM+eHNXc+Fy7+Gh IK+nrEgW9+SbM6WJ2570+27b8eBD5/7UwPsY4dySgZUFuH2rnUtsUI0oLJc4czcnk7WT qs+4ugPsxK9FIU8oWYeBPHrdMa0nKOAXPzPIO/Lz8dw4SSiHsZpVxzahPAu9UWUub8QX amoDKHcMEfsygJ7bUO0H/YcnFWs0kSvp6Vdh1KWy4cHZUEuHtB2x//QXdSLxuzPAMtF5 VeFNKMlNg89rLM/8ii9XuNXpxVL5gNfCNChjbas7AOMQb97l/vxGR4cAsCpTjoEhAT0T JFSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NYsEBv8VskuPtLc766MuFsDLCzX1NmLqXe5C9dxOlnM=; b=b1PNTDz3qXfZ0vBYp1yMMwB+v5n9dfQnKh/pACXBjI+uZP2wnvD9QEn94h8je0x0j0 fcfiYT+uzkMvLSifsumSb69JXIU8nbmL9lVa1Jkdfii4lk48h1Le2vi6ApbM7uzH1nqo w2ifc6Qu4iFSRUX8ZuK32TvHkth3Ka1oU5dmiFi7iTgGgqi4+viZINk94oA1E7kEVthh W97E9fz4vm7S3Z/l8QPO/Sw/v2m+1GjFWWiKMxd6unii+7GvSM0m5B3FzPvhJfCT/mKo uoz3i+WBzs1oOrBSVxuy1rLSMPXauiqV9spa8hm9YgPrW3/cHoJlJE2cY52LmIhmHxvr lMxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OkkyQQ8j; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u38si44441248pgn.79.2019.08.05.06.20.14; Mon, 05 Aug 2019 06:20:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OkkyQQ8j; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729298AbfHENTR (ORCPT + 99 others); Mon, 5 Aug 2019 09:19:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:55234 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726779AbfHENTQ (ORCPT ); Mon, 5 Aug 2019 09:19:16 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D8CBF2067D; Mon, 5 Aug 2019 13:19:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565011155; bh=5Fvmeto4Q4TETBnbb6tYOnCTlGCuLXZav0d5e9FSikw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OkkyQQ8jR1O/Zwcy9B+3vhyvjawAwIxoMhewmFiuIlg8W7cAFOyAX6xIs+J7TmhqS U3h8VL5B+gkNtxsgi+KFMwpGRIk+cB/wevUHQfde3fdkhVnLRVkGakLuci79sGcQi/ ofhBsL/HOOIA8HVJHRl0WkOwEYvv8M8dkyMIXhUY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yishai Hadas , Artemy Kovalyov , Leon Romanovsky , Jason Gunthorpe Subject: [PATCH 4.19 65/74] IB/mlx5: Fix clean_mr() to work in the expected order Date: Mon, 5 Aug 2019 15:03:18 +0200 Message-Id: <20190805124941.066916939@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190805124935.819068648@linuxfoundation.org> References: <20190805124935.819068648@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yishai Hadas commit b9332dad987018745a0c0bb718d12dacfa760489 upstream. Any dma map underlying the MR should only be freed once the MR is fenced at the hardware. As of the above we first destroy the MKEY and just after that can safely call to dma_unmap_single(). Link: https://lore.kernel.org/r/20190723065733.4899-6-leon@kernel.org Cc: # 4.3 Fixes: 8a187ee52b04 ("IB/mlx5: Support the new memory registration API") Signed-off-by: Yishai Hadas Reviewed-by: Artemy Kovalyov Signed-off-by: Leon Romanovsky Reviewed-by: Jason Gunthorpe Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/mlx5/mr.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/drivers/infiniband/hw/mlx5/mr.c +++ b/drivers/infiniband/hw/mlx5/mr.c @@ -1620,10 +1620,10 @@ static void clean_mr(struct mlx5_ib_dev mr->sig = NULL; } - mlx5_free_priv_descs(mr); - - if (!allocated_from_cache) + if (!allocated_from_cache) { destroy_mkey(dev, mr); + mlx5_free_priv_descs(mr); + } } static void dereg_mr(struct mlx5_ib_dev *dev, struct mlx5_ib_mr *mr)