Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp386391pxx; Wed, 28 Oct 2020 07:13:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwJf6i7gB0iC3+VUdk99FUBm3eQGCyc7vRo4UNiP+b238E4S15Q0inwnLQrapf0RceAG8qL X-Received: by 2002:a17:907:7244:: with SMTP id ds4mr3037087ejc.172.1603894426944; Wed, 28 Oct 2020 07:13:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603894426; cv=none; d=google.com; s=arc-20160816; b=JWhU3zioBU/8wKqY/OEJwDkDkBW6jhUdNDkQC8x5DsbBrc7LyiLL8/605j9hFgzos4 b9g3tsZZJdQZmhGb0ILReZJOBTLjwz7bzPQ1++3w7AnaGT2EOs8gUYeGWHJ6ye1sO8R1 U9kwyJw7RUSrwqCLmnidJ2QYu7vka2N7rnyL3DuQRbNJcvsE6uqVm2vJrEtU+mnx2HB+ dJDbdVoym1xgblQGap3htxkwzWqN/O6CBNwIhuvvf3MuZQ7udc/vI7klXB97quuzGmIW 0MEuuYGrPy+MoCkcSOu744lUwo7ts7RV5vKqhmF+Nnsu+ZFn8Ku5chr2lJiSWXZIODEX 7/yQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ErR3n5wcU8Er0dOsBQcqPs6mpyf/qCR2WbwSUQsk+vw=; b=YJMGJR7hYl2iwAiWJ4HfLR7jX7TbkDzkqWAPSZTIGrzH8Jl4Q8G7p9osi7AcUJhfMz k3aojzLJcc81YrI8aN+aS5pxFIBKvd4cv6S5porRJ21idhy+wQxxfKAGYXjY2Ta8hGA4 3e+fCYLBG8J9+6X0xkSlXT2CH3gKSBIaYHppjzTNBb9yBIcT7+bHVy2z8tSp6LjIJx87 Murt2rKY4UV7iuyZvZ0KuF3SDj1Er1o87kF6VFXSGaNNozyqQIzreaHSDOdGGQhef8Vv vmlUg/6UsNyiF6s2saf4pcuaB8g7gu/O2viVR8gA6A6fXWU2qKHBvIO0XJ3rquczktax l/GA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="P/PSF/5O"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l12si2820211edk.163.2020.10.28.07.13.23; Wed, 28 Oct 2020 07:13:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="P/PSF/5O"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1804847AbgJ0P6F (ORCPT + 99 others); Tue, 27 Oct 2020 11:58:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:59040 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1801315AbgJ0Pjg (ORCPT ); Tue, 27 Oct 2020 11:39:36 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C6CB022281; Tue, 27 Oct 2020 15:39:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603813175; bh=YdvScQsR157pTTJSQj57hAPA7QdCriJ/VXHzt6iKt/s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=P/PSF/5ObbTTAcuvE9z57iz8aOBvGMvA21NTzkaZockxNd3PGZMi6p8RIwOsU4MYD RRLXnMkJUpWiAmVhvyPejC2SUH03K4d6GFHoE4YzEn8LiXCoXRZfUu0uqTcApJwyuD 7KVPLavNc2f/VmDGeX085p9D/TywDt75MlyCkUXs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Leon Romanovsky , Jason Gunthorpe , Sasha Levin Subject: [PATCH 5.9 462/757] RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR cant work Date: Tue, 27 Oct 2020 14:51:52 +0100 Message-Id: <20201027135512.188716844@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason Gunthorpe [ Upstream commit 0ec52f0194638e2d284ad55eba5a7aff753de1b9 ] set_reg_wr() always fails if !umr_modify_entity_size_disabled because mlx5_ib_can_use_umr() always fails. Without set_reg_wr() IB_WR_REG_MR doesn't work and that means the device should not advertise IB_DEVICE_MEM_MGT_EXTENSIONS. Fixes: 841b07f99a47 ("IB/mlx5: Block MR WR if UMR is not possible") Link: https://lore.kernel.org/r/20200914112653.345244-5-leon@kernel.org Signed-off-by: Leon Romanovsky Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/hw/mlx5/main.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/infiniband/hw/mlx5/main.c b/drivers/infiniband/hw/mlx5/main.c index d60d63221b14d..b805cc8124657 100644 --- a/drivers/infiniband/hw/mlx5/main.c +++ b/drivers/infiniband/hw/mlx5/main.c @@ -840,7 +840,9 @@ static int mlx5_ib_query_device(struct ib_device *ibdev, /* We support 'Gappy' memory registration too */ props->device_cap_flags |= IB_DEVICE_SG_GAPS_REG; } - props->device_cap_flags |= IB_DEVICE_MEM_MGT_EXTENSIONS; + /* IB_WR_REG_MR always requires changing the entity size with UMR */ + if (!MLX5_CAP_GEN(dev->mdev, umr_modify_entity_size_disabled)) + props->device_cap_flags |= IB_DEVICE_MEM_MGT_EXTENSIONS; if (MLX5_CAP_GEN(mdev, sho)) { props->device_cap_flags |= IB_DEVICE_INTEGRITY_HANDOVER; /* At this stage no support for signature handover */ -- 2.25.1