Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp669938ybl; Fri, 24 Jan 2020 07:26:25 -0800 (PST) X-Google-Smtp-Source: APXvYqzKWiIM+mWoTgXDPDkZOSSo7N1Ce6U3lkvnzh+Oy/ojRRvle0MyaZ06ZK9czrB1vAQkrNCL X-Received: by 2002:a05:6830:15ca:: with SMTP id j10mr3141627otr.190.1579879585719; Fri, 24 Jan 2020 07:26:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579879585; cv=none; d=google.com; s=arc-20160816; b=wBtOYCTwoMXbbZAwyXBmw/mEgrJZ7Ah+yw5Od43Gxg4sI3nAxtItNlo/JZZdxL50WB baekOfsBgOHZZbBERnVfd+DQ5XOzMZ7PU3rRCRnkc8EiAXCETwEPBgrHmeIKpLSy8yf2 11y2DQGmPqbX7F+WM1yncqtalBzLIRz3nU8aUDBnr4wMOJIDSDlxhk9eQTRGUUzHIZxY qHYTXaZHv0Nsq3hdKesTBaH85A+N04xVCWOlRBpVMZ7+5htlKT9TRNVrfBbOis9nRist ceM2xsB5XgFlv1rSl6/zKNXcXUNO0SONP8f44QGvWQd2agKwLjzZKFi3HdnKiDPysOAS Uq4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/Nrv2uTh6u0pOoqr19USIGHoMEKYixtJqjI8ynJ4yls=; b=mlaLNQnEzY19hzGNAA1s2yCN9cdtYHy3ZbP+EBNKqeBEiDSPYtu2MGq869EfhUIJOX r2e26aLCnWfpYNvnDP7Tc7KL2OJvC1o/6kkAOUwztqTOKTmsUuJ6zjSGOFmJP5j66IDq DgvalttgHAu6HWo8Jrk4wgfUMaDhDyDq+CNtFedxSVdVaMdmIZO2an8wMOEsOWb6YNow EAc3UnF5z0E3koQhFE2ttstk38fv2ba54rBp/BbqNeUMQXuflxAa66CmXbU3MEdgwfKE HS5Vlwqzr3/+pyuzXwNJ8n20VJaLjberxqDp579UEW9cKu4TiHjDxwfEbKmZnfbBi/6/ oVwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="k5HlN0/G"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f190si2490825oig.229.2020.01.24.07.26.11; Fri, 24 Jan 2020 07:26:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="k5HlN0/G"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388481AbgAXKBN (ORCPT + 99 others); Fri, 24 Jan 2020 05:01:13 -0500 Received: from mail.kernel.org ([198.145.29.99]:36602 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727215AbgAXKBM (ORCPT ); Fri, 24 Jan 2020 05:01:12 -0500 Received: from localhost (unknown [145.15.244.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6E364206D5; Fri, 24 Jan 2020 10:01:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579860072; bh=TUJ0KRCeqMmnh+ZN/Rv4Y/URCU1bF2q4D6buvfRgvCc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=k5HlN0/GNCrqrcVIfL15pk6RcmqrBH1aUFK4sdg2qP2Y7uDEARsf7UI8/I3ghBmfg ALqEUvY6njDhvJcYUJNdzNOAItLY0aKtGyypN7KdNjoTppUs7q5T42kAH9mdPUMP3x 27fnOMDolRj9NF30BtRG4fnyi2sGwayRtS+tGoo8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xi Wang , Jason Gunthorpe , Sasha Levin Subject: [PATCH 4.14 252/343] RDMA/hns: Fixs hw access invalid dma memory error Date: Fri, 24 Jan 2020 10:31:10 +0100 Message-Id: <20200124092953.211705914@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124092919.490687572@linuxfoundation.org> References: <20200124092919.490687572@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xi Wang [ Upstream commit ec5bc2cc69b4fc494e04d10fc5226f6f9cf67c56 ] When smmu is enable, if execute the perftest command and then use 'kill -9' to exit, follow this operation repeatedly, the kernel will have a high probability to print the following smmu event: arm-smmu-v3 arm-smmu-v3.1.auto: event 0x10 received: arm-smmu-v3 arm-smmu-v3.1.auto: 0x00007d0000000010 arm-smmu-v3 arm-smmu-v3.1.auto: 0x0000020900000080 arm-smmu-v3 arm-smmu-v3.1.auto: 0x00000000f47cf000 arm-smmu-v3 arm-smmu-v3.1.auto: 0x00000000f47cf000 This is because the hw will periodically refresh the qpc cache until the next reset. This patch fixed it by removing the action that release qpc memory in the 'hns_roce_qp_free' function. Fixes: 9a4435375cd1 ("IB/hns: Add driver files for hns RoCE driver") Signed-off-by: Xi Wang Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/hw/hns/hns_roce_qp.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/infiniband/hw/hns/hns_roce_qp.c b/drivers/infiniband/hw/hns/hns_roce_qp.c index 3a37d26889df1..281e9987ffc83 100644 --- a/drivers/infiniband/hw/hns/hns_roce_qp.c +++ b/drivers/infiniband/hw/hns/hns_roce_qp.c @@ -241,7 +241,6 @@ void hns_roce_qp_free(struct hns_roce_dev *hr_dev, struct hns_roce_qp *hr_qp) if ((hr_qp->ibqp.qp_type) != IB_QPT_GSI) { hns_roce_table_put(hr_dev, &qp_table->irrl_table, hr_qp->qpn); - hns_roce_table_put(hr_dev, &qp_table->qp_table, hr_qp->qpn); } } -- 2.20.1