Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp2763225ybh; Mon, 5 Aug 2019 06:28:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqx6ExFV1n2aZiu8fV7qdJJs068rHexguNvk0G0QsgMdNxwQsV46RLOPnkUpS4AsgJmN7ALS X-Received: by 2002:a17:90a:bc42:: with SMTP id t2mr18060323pjv.121.1565011699284; Mon, 05 Aug 2019 06:28:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565011699; cv=none; d=google.com; s=arc-20160816; b=pUnf2r/gKK3XNbcduFhZE3DJZfKytAxLK+xntBbYyBHyQ44TQuSAxazJVwHAQaarWV /7GApy+9v06/+rwoqZ6U2IpWW0WYyRFTSGiAM6dTpEiIH25GouKXr1aaC/Q38BbGDyoh D+QQSkIjPRP2UsZXlYhOKjr20U6zssX/zqat+h+jk2iDcPp8pcoTVlEQCyYuIcvtQ0b1 WQvQFcdXE39JW+Gzm+6yPX2iRAr06toMzDklHfYSjPXzrJLVgZuIiqRGQohNqFUVkngt pjLhMi+zPffF8/Rqgj33/E+OY6DWlCzYGnZR0+E6ahwFt6QPyHqj0vQnl5YWLBECubH1 Tmpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Cz/5JF8etBNHZwuhD2HQxKfo80Or2rnuyR3tAmkOh2Y=; b=aszqosenoQ202vyPklyQKxJ9bwdR+HijFrdvzweCvZC2nqgGV/U90LWvoGFAFPOij9 w7Saf3qO2PCX+hllYh0MlN30d1yq2j3CFzakKE65bs7jKO0gFIFUGKOoYrlgNRciAt13 0BJuzMN1mE7e/wTaYLC/npNjfP28l2V4Tn55DWintDinEv7m59mLK7iGqjh78SZVpov3 /PF/5XZva9GZC/fhgVcP/kJtQW/FhbmKaRzmfyD3tHP9IwWMv2j7LQwzMGZnZLvrjrib 2llx+9mFDVkAXChT9qCpoRIhANodRj5Q8DtaMwN8WTHGScvXx8wl4I66zfAVvLI/RBB3 tVBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AHNJtOfi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 44si42072286plb.366.2019.08.05.06.28.03; Mon, 05 Aug 2019 06:28:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AHNJtOfi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731260AbfHENZj (ORCPT + 99 others); Mon, 5 Aug 2019 09:25:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:34120 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731252AbfHENZg (ORCPT ); Mon, 5 Aug 2019 09:25:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8A5B520644; Mon, 5 Aug 2019 13:25:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565011536; bh=ekhNss4NNs7jA0CkrNtgPv+wTkyyfbEcWNDOz7Y7dYU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AHNJtOfiwqy+tQXHB+vFw9L/u2LcB+w9KBWd0w34mqeebFANYNGN36gEZZO+u3f+Y w0RJhyc+PeGBl9F0zrP2dgj8SR9D2hcJlp/peOwKXX0nIF7I1th2SAjF4/FN1RUaW1 c/GnGCrEN90TdBTljqSav51DtnjRA8c/Mkr5oyFE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yishai Hadas , Artemy Kovalyov , Leon Romanovsky , Jason Gunthorpe Subject: [PATCH 5.2 125/131] IB/mlx5: Fix clean_mr() to work in the expected order Date: Mon, 5 Aug 2019 15:03:32 +0200 Message-Id: <20190805125000.342651544@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190805124951.453337465@linuxfoundation.org> References: <20190805124951.453337465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yishai Hadas commit b9332dad987018745a0c0bb718d12dacfa760489 upstream. Any dma map underlying the MR should only be freed once the MR is fenced at the hardware. As of the above we first destroy the MKEY and just after that can safely call to dma_unmap_single(). Link: https://lore.kernel.org/r/20190723065733.4899-6-leon@kernel.org Cc: # 4.3 Fixes: 8a187ee52b04 ("IB/mlx5: Support the new memory registration API") Signed-off-by: Yishai Hadas Reviewed-by: Artemy Kovalyov Signed-off-by: Leon Romanovsky Reviewed-by: Jason Gunthorpe Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/mlx5/mr.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/drivers/infiniband/hw/mlx5/mr.c +++ b/drivers/infiniband/hw/mlx5/mr.c @@ -1583,10 +1583,10 @@ static void clean_mr(struct mlx5_ib_dev mr->sig = NULL; } - mlx5_free_priv_descs(mr); - - if (!allocated_from_cache) + if (!allocated_from_cache) { destroy_mkey(dev, mr); + mlx5_free_priv_descs(mr); + } } static void dereg_mr(struct mlx5_ib_dev *dev, struct mlx5_ib_mr *mr)