Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4479540ybx; Mon, 4 Nov 2019 14:07:08 -0800 (PST) X-Google-Smtp-Source: APXvYqw6jt4+IvCpkWZ8978vKQoTXivrib/HQTEjAEJ02iscUgCWGhc8IsL0IODoLPvYu/BE1gEo X-Received: by 2002:a17:906:13d5:: with SMTP id g21mr5884417ejc.72.1572905227949; Mon, 04 Nov 2019 14:07:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572905227; cv=none; d=google.com; s=arc-20160816; b=T56latnoMW6XDePzn3/qSndi/v5LQPqljSJjpv/dTaa4r6kSsmUYFKDmcIMuHTHHC+ 4f5vIq+2nwU+v1z5aRW+p/Br8Es37alA9rAyrt9G5xFI4Pm6e43MrnCaNPPh700mRivu IPXxUk99yLCjPlwNXk2DIyXNPi3vkwPhJtfs2rnxcxKZzOkK0t3RHrMSGLgSGAN3WntA J8+xEsLGUk0INk75hCyb4QtcpQDruj3oSAFVdHsFnExUHgk2LabjtmxuVrn8hvJl2n1m s99Z9gs91zHSXYwTmZLvcpNkrawIxw1xrVZwTybXRzVMOUew+KGPVn8ipdURXOrm7mSO 05kQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fUSD3ikAHdaZ+eyp+1wjnpFkgk9+VB11/uKUg4tPTdU=; b=p5LXZPmDqlzWzgJlHCpFb2u/72bxVR+Zc/hd26+Iw8ah3QisgiMnZUXro/Fq5ddqxu TwZcuJjXDQhrX6bMdKZbpC6Yq84NNOF59RfeFvyfyRYoFjmARshweSY86fGQqgsHyHiv W3EhtRWciFRgR/AbT9Idto0w3z4ra5hw1EN/O+hdh7CMsFfyWf0aJzTfye+Ee960r2/F 4QP4HPgLIxGT+PQQTjMXeFqY1Anh+9tOGMxAaq9yREFsNr+4209oLJg4lG1/rhuv25p9 ejvkfQ0z/MEymN0rM5e8M2kITFB6Vd/hCbNb6+Cs90C0MxnRtrqM5VuL1tKnviM3pjeS kRkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X9OAwlNP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c36si9081134edf.165.2019.11.04.14.06.44; Mon, 04 Nov 2019 14:07:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X9OAwlNP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389397AbfKDWFq (ORCPT + 99 others); Mon, 4 Nov 2019 17:05:46 -0500 Received: from mail.kernel.org ([198.145.29.99]:37084 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389855AbfKDWFi (ORCPT ); Mon, 4 Nov 2019 17:05:38 -0500 Received: from localhost (6.204-14-84.ripe.coltfrance.com [84.14.204.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 275202084D; Mon, 4 Nov 2019 22:05:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572905137; bh=ZsYsQjET2eBXHpj8p6+4hCJCBPZ/9D9ILF5vWY4Tb/w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X9OAwlNPp6tIZbR5D+cXiUTUqmdCsic4LPGruLKkLsmSU4aA4nFSJzF+NmHyq3n95 dyVvIhztNu6s+/bZOaTr15WYnRq2qxxhf+FQ3khkEhZ9C/wjl+3Qt+iNs2eZ9PS1Ba tifMUKM1xqdQHCRJ0bEUu/hAWcS4ljBA6Z28v48k= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Artemy Kovalyov , Jason Gunthorpe , Sasha Levin Subject: [PATCH 5.3 040/163] RDMA/mlx5: Do not allow rereg of a ODP MR Date: Mon, 4 Nov 2019 22:43:50 +0100 Message-Id: <20191104212143.191554020@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191104212140.046021995@linuxfoundation.org> References: <20191104212140.046021995@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason Gunthorpe [ Upstream commit 880505cfef1d086d18b59d2920eb2160429ffa1f ] This code is completely broken, the umem of a ODP MR simply cannot be discarded without a lot more locking, nor can an ODP mkey be blithely destroyed via destroy_mkey(). Fixes: 6aec21f6a832 ("IB/mlx5: Page faults handling infrastructure") Link: https://lore.kernel.org/r/20191001153821.23621-2-jgg@ziepe.ca Reviewed-by: Artemy Kovalyov Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/hw/mlx5/mr.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/infiniband/hw/mlx5/mr.c b/drivers/infiniband/hw/mlx5/mr.c index 3401f5f6792e6..c4ba8838d2c46 100644 --- a/drivers/infiniband/hw/mlx5/mr.c +++ b/drivers/infiniband/hw/mlx5/mr.c @@ -1423,6 +1423,9 @@ int mlx5_ib_rereg_user_mr(struct ib_mr *ib_mr, int flags, u64 start, if (!mr->umem) return -EINVAL; + if (is_odp_mr(mr)) + return -EOPNOTSUPP; + if (flags & IB_MR_REREG_TRANS) { addr = virt_addr; len = length; @@ -1468,8 +1471,6 @@ int mlx5_ib_rereg_user_mr(struct ib_mr *ib_mr, int flags, u64 start, } mr->allocated_from_cache = 0; - if (IS_ENABLED(CONFIG_INFINIBAND_ON_DEMAND_PAGING)) - mr->live = 1; } else { /* * Send a UMR WQE @@ -1498,7 +1499,6 @@ int mlx5_ib_rereg_user_mr(struct ib_mr *ib_mr, int flags, u64 start, set_mr_fields(dev, mr, npages, len, access_flags); - update_odp_mr(mr); return 0; err: -- 2.20.1