162306a36Sopenharmony_ci/* 262306a36Sopenharmony_ci * Copyright (c) 2012-2016 VMware, Inc. All rights reserved. 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * This program is free software; you can redistribute it and/or 562306a36Sopenharmony_ci * modify it under the terms of EITHER the GNU General Public License 662306a36Sopenharmony_ci * version 2 as published by the Free Software Foundation or the BSD 762306a36Sopenharmony_ci * 2-Clause License. This program is distributed in the hope that it 862306a36Sopenharmony_ci * will be useful, but WITHOUT ANY WARRANTY; WITHOUT EVEN THE IMPLIED 962306a36Sopenharmony_ci * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 1062306a36Sopenharmony_ci * See the GNU General Public License version 2 for more details at 1162306a36Sopenharmony_ci * http://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html. 1262306a36Sopenharmony_ci * 1362306a36Sopenharmony_ci * You should have received a copy of the GNU General Public License 1462306a36Sopenharmony_ci * along with this program available in the file COPYING in the main 1562306a36Sopenharmony_ci * directory of this source tree. 1662306a36Sopenharmony_ci * 1762306a36Sopenharmony_ci * The BSD 2-Clause License 1862306a36Sopenharmony_ci * 1962306a36Sopenharmony_ci * Redistribution and use in source and binary forms, with or 2062306a36Sopenharmony_ci * without modification, are permitted provided that the following 2162306a36Sopenharmony_ci * conditions are met: 2262306a36Sopenharmony_ci * 2362306a36Sopenharmony_ci * - Redistributions of source code must retain the above 2462306a36Sopenharmony_ci * copyright notice, this list of conditions and the following 2562306a36Sopenharmony_ci * disclaimer. 2662306a36Sopenharmony_ci * 2762306a36Sopenharmony_ci * - Redistributions in binary form must reproduce the above 2862306a36Sopenharmony_ci * copyright notice, this list of conditions and the following 2962306a36Sopenharmony_ci * disclaimer in the documentation and/or other materials 3062306a36Sopenharmony_ci * provided with the distribution. 3162306a36Sopenharmony_ci * 3262306a36Sopenharmony_ci * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 3362306a36Sopenharmony_ci * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 3462306a36Sopenharmony_ci * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 3562306a36Sopenharmony_ci * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 3662306a36Sopenharmony_ci * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, 3762306a36Sopenharmony_ci * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 3862306a36Sopenharmony_ci * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 3962306a36Sopenharmony_ci * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 4062306a36Sopenharmony_ci * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 4162306a36Sopenharmony_ci * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 4262306a36Sopenharmony_ci * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 4362306a36Sopenharmony_ci * OF THE POSSIBILITY OF SUCH DAMAGE. 4462306a36Sopenharmony_ci */ 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_ci#include <linux/list.h> 4762306a36Sopenharmony_ci#include <linux/slab.h> 4862306a36Sopenharmony_ci 4962306a36Sopenharmony_ci#include "pvrdma.h" 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_ci/** 5262306a36Sopenharmony_ci * pvrdma_get_dma_mr - get a DMA memory region 5362306a36Sopenharmony_ci * @pd: protection domain 5462306a36Sopenharmony_ci * @acc: access flags 5562306a36Sopenharmony_ci * 5662306a36Sopenharmony_ci * @return: ib_mr pointer on success, otherwise returns an errno. 5762306a36Sopenharmony_ci */ 5862306a36Sopenharmony_cistruct ib_mr *pvrdma_get_dma_mr(struct ib_pd *pd, int acc) 5962306a36Sopenharmony_ci{ 6062306a36Sopenharmony_ci struct pvrdma_dev *dev = to_vdev(pd->device); 6162306a36Sopenharmony_ci struct pvrdma_user_mr *mr; 6262306a36Sopenharmony_ci union pvrdma_cmd_req req; 6362306a36Sopenharmony_ci union pvrdma_cmd_resp rsp; 6462306a36Sopenharmony_ci struct pvrdma_cmd_create_mr *cmd = &req.create_mr; 6562306a36Sopenharmony_ci struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp; 6662306a36Sopenharmony_ci int ret; 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci /* Support only LOCAL_WRITE flag for DMA MRs */ 6962306a36Sopenharmony_ci if (acc & ~IB_ACCESS_LOCAL_WRITE) { 7062306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, 7162306a36Sopenharmony_ci "unsupported dma mr access flags %#x\n", acc); 7262306a36Sopenharmony_ci return ERR_PTR(-EOPNOTSUPP); 7362306a36Sopenharmony_ci } 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci mr = kzalloc(sizeof(*mr), GFP_KERNEL); 7662306a36Sopenharmony_ci if (!mr) 7762306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci memset(cmd, 0, sizeof(*cmd)); 8062306a36Sopenharmony_ci cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR; 8162306a36Sopenharmony_ci cmd->pd_handle = to_vpd(pd)->pd_handle; 8262306a36Sopenharmony_ci cmd->access_flags = acc; 8362306a36Sopenharmony_ci cmd->flags = PVRDMA_MR_FLAG_DMA; 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_ci ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP); 8662306a36Sopenharmony_ci if (ret < 0) { 8762306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, 8862306a36Sopenharmony_ci "could not get DMA mem region, error: %d\n", ret); 8962306a36Sopenharmony_ci kfree(mr); 9062306a36Sopenharmony_ci return ERR_PTR(ret); 9162306a36Sopenharmony_ci } 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci mr->mmr.mr_handle = resp->mr_handle; 9462306a36Sopenharmony_ci mr->ibmr.lkey = resp->lkey; 9562306a36Sopenharmony_ci mr->ibmr.rkey = resp->rkey; 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_ci return &mr->ibmr; 9862306a36Sopenharmony_ci} 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci/** 10162306a36Sopenharmony_ci * pvrdma_reg_user_mr - register a userspace memory region 10262306a36Sopenharmony_ci * @pd: protection domain 10362306a36Sopenharmony_ci * @start: starting address 10462306a36Sopenharmony_ci * @length: length of region 10562306a36Sopenharmony_ci * @virt_addr: I/O virtual address 10662306a36Sopenharmony_ci * @access_flags: access flags for memory region 10762306a36Sopenharmony_ci * @udata: user data 10862306a36Sopenharmony_ci * 10962306a36Sopenharmony_ci * @return: ib_mr pointer on success, otherwise returns an errno. 11062306a36Sopenharmony_ci */ 11162306a36Sopenharmony_cistruct ib_mr *pvrdma_reg_user_mr(struct ib_pd *pd, u64 start, u64 length, 11262306a36Sopenharmony_ci u64 virt_addr, int access_flags, 11362306a36Sopenharmony_ci struct ib_udata *udata) 11462306a36Sopenharmony_ci{ 11562306a36Sopenharmony_ci struct pvrdma_dev *dev = to_vdev(pd->device); 11662306a36Sopenharmony_ci struct pvrdma_user_mr *mr = NULL; 11762306a36Sopenharmony_ci struct ib_umem *umem; 11862306a36Sopenharmony_ci union pvrdma_cmd_req req; 11962306a36Sopenharmony_ci union pvrdma_cmd_resp rsp; 12062306a36Sopenharmony_ci struct pvrdma_cmd_create_mr *cmd = &req.create_mr; 12162306a36Sopenharmony_ci struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp; 12262306a36Sopenharmony_ci int ret, npages; 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_ci if (length == 0 || length > dev->dsr->caps.max_mr_size) { 12562306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, "invalid mem region length\n"); 12662306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 12762306a36Sopenharmony_ci } 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_ci umem = ib_umem_get(pd->device, start, length, access_flags); 13062306a36Sopenharmony_ci if (IS_ERR(umem)) { 13162306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, 13262306a36Sopenharmony_ci "could not get umem for mem region\n"); 13362306a36Sopenharmony_ci return ERR_CAST(umem); 13462306a36Sopenharmony_ci } 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci npages = ib_umem_num_dma_blocks(umem, PAGE_SIZE); 13762306a36Sopenharmony_ci if (npages < 0 || npages > PVRDMA_PAGE_DIR_MAX_PAGES) { 13862306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, "overflow %d pages in mem region\n", 13962306a36Sopenharmony_ci npages); 14062306a36Sopenharmony_ci ret = -EINVAL; 14162306a36Sopenharmony_ci goto err_umem; 14262306a36Sopenharmony_ci } 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_ci mr = kzalloc(sizeof(*mr), GFP_KERNEL); 14562306a36Sopenharmony_ci if (!mr) { 14662306a36Sopenharmony_ci ret = -ENOMEM; 14762306a36Sopenharmony_ci goto err_umem; 14862306a36Sopenharmony_ci } 14962306a36Sopenharmony_ci 15062306a36Sopenharmony_ci mr->mmr.iova = virt_addr; 15162306a36Sopenharmony_ci mr->mmr.size = length; 15262306a36Sopenharmony_ci mr->umem = umem; 15362306a36Sopenharmony_ci 15462306a36Sopenharmony_ci ret = pvrdma_page_dir_init(dev, &mr->pdir, npages, false); 15562306a36Sopenharmony_ci if (ret) { 15662306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, 15762306a36Sopenharmony_ci "could not allocate page directory\n"); 15862306a36Sopenharmony_ci goto err_umem; 15962306a36Sopenharmony_ci } 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci ret = pvrdma_page_dir_insert_umem(&mr->pdir, mr->umem, 0); 16262306a36Sopenharmony_ci if (ret) 16362306a36Sopenharmony_ci goto err_pdir; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci memset(cmd, 0, sizeof(*cmd)); 16662306a36Sopenharmony_ci cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR; 16762306a36Sopenharmony_ci cmd->start = start; 16862306a36Sopenharmony_ci cmd->length = length; 16962306a36Sopenharmony_ci cmd->pd_handle = to_vpd(pd)->pd_handle; 17062306a36Sopenharmony_ci cmd->access_flags = access_flags; 17162306a36Sopenharmony_ci cmd->nchunks = npages; 17262306a36Sopenharmony_ci cmd->pdir_dma = mr->pdir.dir_dma; 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP); 17562306a36Sopenharmony_ci if (ret < 0) { 17662306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, 17762306a36Sopenharmony_ci "could not register mem region, error: %d\n", ret); 17862306a36Sopenharmony_ci goto err_pdir; 17962306a36Sopenharmony_ci } 18062306a36Sopenharmony_ci 18162306a36Sopenharmony_ci mr->mmr.mr_handle = resp->mr_handle; 18262306a36Sopenharmony_ci mr->ibmr.lkey = resp->lkey; 18362306a36Sopenharmony_ci mr->ibmr.rkey = resp->rkey; 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci return &mr->ibmr; 18662306a36Sopenharmony_ci 18762306a36Sopenharmony_cierr_pdir: 18862306a36Sopenharmony_ci pvrdma_page_dir_cleanup(dev, &mr->pdir); 18962306a36Sopenharmony_cierr_umem: 19062306a36Sopenharmony_ci ib_umem_release(umem); 19162306a36Sopenharmony_ci kfree(mr); 19262306a36Sopenharmony_ci 19362306a36Sopenharmony_ci return ERR_PTR(ret); 19462306a36Sopenharmony_ci} 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci/** 19762306a36Sopenharmony_ci * pvrdma_alloc_mr - allocate a memory region 19862306a36Sopenharmony_ci * @pd: protection domain 19962306a36Sopenharmony_ci * @mr_type: type of memory region 20062306a36Sopenharmony_ci * @max_num_sg: maximum number of pages 20162306a36Sopenharmony_ci * 20262306a36Sopenharmony_ci * @return: ib_mr pointer on success, otherwise returns an errno. 20362306a36Sopenharmony_ci */ 20462306a36Sopenharmony_cistruct ib_mr *pvrdma_alloc_mr(struct ib_pd *pd, enum ib_mr_type mr_type, 20562306a36Sopenharmony_ci u32 max_num_sg) 20662306a36Sopenharmony_ci{ 20762306a36Sopenharmony_ci struct pvrdma_dev *dev = to_vdev(pd->device); 20862306a36Sopenharmony_ci struct pvrdma_user_mr *mr; 20962306a36Sopenharmony_ci union pvrdma_cmd_req req; 21062306a36Sopenharmony_ci union pvrdma_cmd_resp rsp; 21162306a36Sopenharmony_ci struct pvrdma_cmd_create_mr *cmd = &req.create_mr; 21262306a36Sopenharmony_ci struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp; 21362306a36Sopenharmony_ci int size = max_num_sg * sizeof(u64); 21462306a36Sopenharmony_ci int ret; 21562306a36Sopenharmony_ci 21662306a36Sopenharmony_ci if (mr_type != IB_MR_TYPE_MEM_REG || 21762306a36Sopenharmony_ci max_num_sg > PVRDMA_MAX_FAST_REG_PAGES) 21862306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 21962306a36Sopenharmony_ci 22062306a36Sopenharmony_ci mr = kzalloc(sizeof(*mr), GFP_KERNEL); 22162306a36Sopenharmony_ci if (!mr) 22262306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 22362306a36Sopenharmony_ci 22462306a36Sopenharmony_ci mr->pages = kzalloc(size, GFP_KERNEL); 22562306a36Sopenharmony_ci if (!mr->pages) { 22662306a36Sopenharmony_ci ret = -ENOMEM; 22762306a36Sopenharmony_ci goto freemr; 22862306a36Sopenharmony_ci } 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci ret = pvrdma_page_dir_init(dev, &mr->pdir, max_num_sg, false); 23162306a36Sopenharmony_ci if (ret) { 23262306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, 23362306a36Sopenharmony_ci "failed to allocate page dir for mr\n"); 23462306a36Sopenharmony_ci ret = -ENOMEM; 23562306a36Sopenharmony_ci goto freepages; 23662306a36Sopenharmony_ci } 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_ci memset(cmd, 0, sizeof(*cmd)); 23962306a36Sopenharmony_ci cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR; 24062306a36Sopenharmony_ci cmd->pd_handle = to_vpd(pd)->pd_handle; 24162306a36Sopenharmony_ci cmd->access_flags = 0; 24262306a36Sopenharmony_ci cmd->flags = PVRDMA_MR_FLAG_FRMR; 24362306a36Sopenharmony_ci cmd->nchunks = max_num_sg; 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_ci ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP); 24662306a36Sopenharmony_ci if (ret < 0) { 24762306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, 24862306a36Sopenharmony_ci "could not create FR mem region, error: %d\n", ret); 24962306a36Sopenharmony_ci goto freepdir; 25062306a36Sopenharmony_ci } 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ci mr->max_pages = max_num_sg; 25362306a36Sopenharmony_ci mr->mmr.mr_handle = resp->mr_handle; 25462306a36Sopenharmony_ci mr->ibmr.lkey = resp->lkey; 25562306a36Sopenharmony_ci mr->ibmr.rkey = resp->rkey; 25662306a36Sopenharmony_ci mr->page_shift = PAGE_SHIFT; 25762306a36Sopenharmony_ci mr->umem = NULL; 25862306a36Sopenharmony_ci 25962306a36Sopenharmony_ci return &mr->ibmr; 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_cifreepdir: 26262306a36Sopenharmony_ci pvrdma_page_dir_cleanup(dev, &mr->pdir); 26362306a36Sopenharmony_cifreepages: 26462306a36Sopenharmony_ci kfree(mr->pages); 26562306a36Sopenharmony_cifreemr: 26662306a36Sopenharmony_ci kfree(mr); 26762306a36Sopenharmony_ci return ERR_PTR(ret); 26862306a36Sopenharmony_ci} 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_ci/** 27162306a36Sopenharmony_ci * pvrdma_dereg_mr - deregister a memory region 27262306a36Sopenharmony_ci * @ibmr: memory region 27362306a36Sopenharmony_ci * @udata: pointer to user data 27462306a36Sopenharmony_ci * 27562306a36Sopenharmony_ci * @return: 0 on success. 27662306a36Sopenharmony_ci */ 27762306a36Sopenharmony_ciint pvrdma_dereg_mr(struct ib_mr *ibmr, struct ib_udata *udata) 27862306a36Sopenharmony_ci{ 27962306a36Sopenharmony_ci struct pvrdma_user_mr *mr = to_vmr(ibmr); 28062306a36Sopenharmony_ci struct pvrdma_dev *dev = to_vdev(ibmr->device); 28162306a36Sopenharmony_ci union pvrdma_cmd_req req; 28262306a36Sopenharmony_ci struct pvrdma_cmd_destroy_mr *cmd = &req.destroy_mr; 28362306a36Sopenharmony_ci int ret; 28462306a36Sopenharmony_ci 28562306a36Sopenharmony_ci memset(cmd, 0, sizeof(*cmd)); 28662306a36Sopenharmony_ci cmd->hdr.cmd = PVRDMA_CMD_DESTROY_MR; 28762306a36Sopenharmony_ci cmd->mr_handle = mr->mmr.mr_handle; 28862306a36Sopenharmony_ci ret = pvrdma_cmd_post(dev, &req, NULL, 0); 28962306a36Sopenharmony_ci if (ret < 0) 29062306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, 29162306a36Sopenharmony_ci "could not deregister mem region, error: %d\n", ret); 29262306a36Sopenharmony_ci 29362306a36Sopenharmony_ci pvrdma_page_dir_cleanup(dev, &mr->pdir); 29462306a36Sopenharmony_ci ib_umem_release(mr->umem); 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci kfree(mr->pages); 29762306a36Sopenharmony_ci kfree(mr); 29862306a36Sopenharmony_ci 29962306a36Sopenharmony_ci return 0; 30062306a36Sopenharmony_ci} 30162306a36Sopenharmony_ci 30262306a36Sopenharmony_cistatic int pvrdma_set_page(struct ib_mr *ibmr, u64 addr) 30362306a36Sopenharmony_ci{ 30462306a36Sopenharmony_ci struct pvrdma_user_mr *mr = to_vmr(ibmr); 30562306a36Sopenharmony_ci 30662306a36Sopenharmony_ci if (mr->npages == mr->max_pages) 30762306a36Sopenharmony_ci return -ENOMEM; 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci mr->pages[mr->npages++] = addr; 31062306a36Sopenharmony_ci return 0; 31162306a36Sopenharmony_ci} 31262306a36Sopenharmony_ci 31362306a36Sopenharmony_ciint pvrdma_map_mr_sg(struct ib_mr *ibmr, struct scatterlist *sg, int sg_nents, 31462306a36Sopenharmony_ci unsigned int *sg_offset) 31562306a36Sopenharmony_ci{ 31662306a36Sopenharmony_ci struct pvrdma_user_mr *mr = to_vmr(ibmr); 31762306a36Sopenharmony_ci struct pvrdma_dev *dev = to_vdev(ibmr->device); 31862306a36Sopenharmony_ci int ret; 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci mr->npages = 0; 32162306a36Sopenharmony_ci 32262306a36Sopenharmony_ci ret = ib_sg_to_pages(ibmr, sg, sg_nents, sg_offset, pvrdma_set_page); 32362306a36Sopenharmony_ci if (ret < 0) 32462306a36Sopenharmony_ci dev_warn(&dev->pdev->dev, "could not map sg to pages\n"); 32562306a36Sopenharmony_ci 32662306a36Sopenharmony_ci return ret; 32762306a36Sopenharmony_ci} 328