162306a36Sopenharmony_ci/*
262306a36Sopenharmony_ci * Copyright (c) 2012-2016 VMware, Inc.  All rights reserved.
362306a36Sopenharmony_ci *
462306a36Sopenharmony_ci * This program is free software; you can redistribute it and/or
562306a36Sopenharmony_ci * modify it under the terms of EITHER the GNU General Public License
662306a36Sopenharmony_ci * version 2 as published by the Free Software Foundation or the BSD
762306a36Sopenharmony_ci * 2-Clause License. This program is distributed in the hope that it
862306a36Sopenharmony_ci * will be useful, but WITHOUT ANY WARRANTY; WITHOUT EVEN THE IMPLIED
962306a36Sopenharmony_ci * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
1062306a36Sopenharmony_ci * See the GNU General Public License version 2 for more details at
1162306a36Sopenharmony_ci * http://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html.
1262306a36Sopenharmony_ci *
1362306a36Sopenharmony_ci * You should have received a copy of the GNU General Public License
1462306a36Sopenharmony_ci * along with this program available in the file COPYING in the main
1562306a36Sopenharmony_ci * directory of this source tree.
1662306a36Sopenharmony_ci *
1762306a36Sopenharmony_ci * The BSD 2-Clause License
1862306a36Sopenharmony_ci *
1962306a36Sopenharmony_ci *     Redistribution and use in source and binary forms, with or
2062306a36Sopenharmony_ci *     without modification, are permitted provided that the following
2162306a36Sopenharmony_ci *     conditions are met:
2262306a36Sopenharmony_ci *
2362306a36Sopenharmony_ci *      - Redistributions of source code must retain the above
2462306a36Sopenharmony_ci *        copyright notice, this list of conditions and the following
2562306a36Sopenharmony_ci *        disclaimer.
2662306a36Sopenharmony_ci *
2762306a36Sopenharmony_ci *      - Redistributions in binary form must reproduce the above
2862306a36Sopenharmony_ci *        copyright notice, this list of conditions and the following
2962306a36Sopenharmony_ci *        disclaimer in the documentation and/or other materials
3062306a36Sopenharmony_ci *        provided with the distribution.
3162306a36Sopenharmony_ci *
3262306a36Sopenharmony_ci * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
3362306a36Sopenharmony_ci * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
3462306a36Sopenharmony_ci * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
3562306a36Sopenharmony_ci * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
3662306a36Sopenharmony_ci * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
3762306a36Sopenharmony_ci * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
3862306a36Sopenharmony_ci * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
3962306a36Sopenharmony_ci * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
4062306a36Sopenharmony_ci * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
4162306a36Sopenharmony_ci * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
4262306a36Sopenharmony_ci * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
4362306a36Sopenharmony_ci * OF THE POSSIBILITY OF SUCH DAMAGE.
4462306a36Sopenharmony_ci */
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_ci#include <linux/list.h>
4762306a36Sopenharmony_ci#include <linux/slab.h>
4862306a36Sopenharmony_ci
4962306a36Sopenharmony_ci#include "pvrdma.h"
5062306a36Sopenharmony_ci
5162306a36Sopenharmony_ci/**
5262306a36Sopenharmony_ci * pvrdma_get_dma_mr - get a DMA memory region
5362306a36Sopenharmony_ci * @pd: protection domain
5462306a36Sopenharmony_ci * @acc: access flags
5562306a36Sopenharmony_ci *
5662306a36Sopenharmony_ci * @return: ib_mr pointer on success, otherwise returns an errno.
5762306a36Sopenharmony_ci */
5862306a36Sopenharmony_cistruct ib_mr *pvrdma_get_dma_mr(struct ib_pd *pd, int acc)
5962306a36Sopenharmony_ci{
6062306a36Sopenharmony_ci	struct pvrdma_dev *dev = to_vdev(pd->device);
6162306a36Sopenharmony_ci	struct pvrdma_user_mr *mr;
6262306a36Sopenharmony_ci	union pvrdma_cmd_req req;
6362306a36Sopenharmony_ci	union pvrdma_cmd_resp rsp;
6462306a36Sopenharmony_ci	struct pvrdma_cmd_create_mr *cmd = &req.create_mr;
6562306a36Sopenharmony_ci	struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp;
6662306a36Sopenharmony_ci	int ret;
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci	/* Support only LOCAL_WRITE flag for DMA MRs */
6962306a36Sopenharmony_ci	if (acc & ~IB_ACCESS_LOCAL_WRITE) {
7062306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev,
7162306a36Sopenharmony_ci			 "unsupported dma mr access flags %#x\n", acc);
7262306a36Sopenharmony_ci		return ERR_PTR(-EOPNOTSUPP);
7362306a36Sopenharmony_ci	}
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	mr = kzalloc(sizeof(*mr), GFP_KERNEL);
7662306a36Sopenharmony_ci	if (!mr)
7762306a36Sopenharmony_ci		return ERR_PTR(-ENOMEM);
7862306a36Sopenharmony_ci
7962306a36Sopenharmony_ci	memset(cmd, 0, sizeof(*cmd));
8062306a36Sopenharmony_ci	cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR;
8162306a36Sopenharmony_ci	cmd->pd_handle = to_vpd(pd)->pd_handle;
8262306a36Sopenharmony_ci	cmd->access_flags = acc;
8362306a36Sopenharmony_ci	cmd->flags = PVRDMA_MR_FLAG_DMA;
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_ci	ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP);
8662306a36Sopenharmony_ci	if (ret < 0) {
8762306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev,
8862306a36Sopenharmony_ci			 "could not get DMA mem region, error: %d\n", ret);
8962306a36Sopenharmony_ci		kfree(mr);
9062306a36Sopenharmony_ci		return ERR_PTR(ret);
9162306a36Sopenharmony_ci	}
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci	mr->mmr.mr_handle = resp->mr_handle;
9462306a36Sopenharmony_ci	mr->ibmr.lkey = resp->lkey;
9562306a36Sopenharmony_ci	mr->ibmr.rkey = resp->rkey;
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_ci	return &mr->ibmr;
9862306a36Sopenharmony_ci}
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_ci/**
10162306a36Sopenharmony_ci * pvrdma_reg_user_mr - register a userspace memory region
10262306a36Sopenharmony_ci * @pd: protection domain
10362306a36Sopenharmony_ci * @start: starting address
10462306a36Sopenharmony_ci * @length: length of region
10562306a36Sopenharmony_ci * @virt_addr: I/O virtual address
10662306a36Sopenharmony_ci * @access_flags: access flags for memory region
10762306a36Sopenharmony_ci * @udata: user data
10862306a36Sopenharmony_ci *
10962306a36Sopenharmony_ci * @return: ib_mr pointer on success, otherwise returns an errno.
11062306a36Sopenharmony_ci */
11162306a36Sopenharmony_cistruct ib_mr *pvrdma_reg_user_mr(struct ib_pd *pd, u64 start, u64 length,
11262306a36Sopenharmony_ci				 u64 virt_addr, int access_flags,
11362306a36Sopenharmony_ci				 struct ib_udata *udata)
11462306a36Sopenharmony_ci{
11562306a36Sopenharmony_ci	struct pvrdma_dev *dev = to_vdev(pd->device);
11662306a36Sopenharmony_ci	struct pvrdma_user_mr *mr = NULL;
11762306a36Sopenharmony_ci	struct ib_umem *umem;
11862306a36Sopenharmony_ci	union pvrdma_cmd_req req;
11962306a36Sopenharmony_ci	union pvrdma_cmd_resp rsp;
12062306a36Sopenharmony_ci	struct pvrdma_cmd_create_mr *cmd = &req.create_mr;
12162306a36Sopenharmony_ci	struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp;
12262306a36Sopenharmony_ci	int ret, npages;
12362306a36Sopenharmony_ci
12462306a36Sopenharmony_ci	if (length == 0 || length > dev->dsr->caps.max_mr_size) {
12562306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev, "invalid mem region length\n");
12662306a36Sopenharmony_ci		return ERR_PTR(-EINVAL);
12762306a36Sopenharmony_ci	}
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ci	umem = ib_umem_get(pd->device, start, length, access_flags);
13062306a36Sopenharmony_ci	if (IS_ERR(umem)) {
13162306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev,
13262306a36Sopenharmony_ci			 "could not get umem for mem region\n");
13362306a36Sopenharmony_ci		return ERR_CAST(umem);
13462306a36Sopenharmony_ci	}
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	npages = ib_umem_num_dma_blocks(umem, PAGE_SIZE);
13762306a36Sopenharmony_ci	if (npages < 0 || npages > PVRDMA_PAGE_DIR_MAX_PAGES) {
13862306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev, "overflow %d pages in mem region\n",
13962306a36Sopenharmony_ci			 npages);
14062306a36Sopenharmony_ci		ret = -EINVAL;
14162306a36Sopenharmony_ci		goto err_umem;
14262306a36Sopenharmony_ci	}
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_ci	mr = kzalloc(sizeof(*mr), GFP_KERNEL);
14562306a36Sopenharmony_ci	if (!mr) {
14662306a36Sopenharmony_ci		ret = -ENOMEM;
14762306a36Sopenharmony_ci		goto err_umem;
14862306a36Sopenharmony_ci	}
14962306a36Sopenharmony_ci
15062306a36Sopenharmony_ci	mr->mmr.iova = virt_addr;
15162306a36Sopenharmony_ci	mr->mmr.size = length;
15262306a36Sopenharmony_ci	mr->umem = umem;
15362306a36Sopenharmony_ci
15462306a36Sopenharmony_ci	ret = pvrdma_page_dir_init(dev, &mr->pdir, npages, false);
15562306a36Sopenharmony_ci	if (ret) {
15662306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev,
15762306a36Sopenharmony_ci			 "could not allocate page directory\n");
15862306a36Sopenharmony_ci		goto err_umem;
15962306a36Sopenharmony_ci	}
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci	ret = pvrdma_page_dir_insert_umem(&mr->pdir, mr->umem, 0);
16262306a36Sopenharmony_ci	if (ret)
16362306a36Sopenharmony_ci		goto err_pdir;
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_ci	memset(cmd, 0, sizeof(*cmd));
16662306a36Sopenharmony_ci	cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR;
16762306a36Sopenharmony_ci	cmd->start = start;
16862306a36Sopenharmony_ci	cmd->length = length;
16962306a36Sopenharmony_ci	cmd->pd_handle = to_vpd(pd)->pd_handle;
17062306a36Sopenharmony_ci	cmd->access_flags = access_flags;
17162306a36Sopenharmony_ci	cmd->nchunks = npages;
17262306a36Sopenharmony_ci	cmd->pdir_dma = mr->pdir.dir_dma;
17362306a36Sopenharmony_ci
17462306a36Sopenharmony_ci	ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP);
17562306a36Sopenharmony_ci	if (ret < 0) {
17662306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev,
17762306a36Sopenharmony_ci			 "could not register mem region, error: %d\n", ret);
17862306a36Sopenharmony_ci		goto err_pdir;
17962306a36Sopenharmony_ci	}
18062306a36Sopenharmony_ci
18162306a36Sopenharmony_ci	mr->mmr.mr_handle = resp->mr_handle;
18262306a36Sopenharmony_ci	mr->ibmr.lkey = resp->lkey;
18362306a36Sopenharmony_ci	mr->ibmr.rkey = resp->rkey;
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	return &mr->ibmr;
18662306a36Sopenharmony_ci
18762306a36Sopenharmony_cierr_pdir:
18862306a36Sopenharmony_ci	pvrdma_page_dir_cleanup(dev, &mr->pdir);
18962306a36Sopenharmony_cierr_umem:
19062306a36Sopenharmony_ci	ib_umem_release(umem);
19162306a36Sopenharmony_ci	kfree(mr);
19262306a36Sopenharmony_ci
19362306a36Sopenharmony_ci	return ERR_PTR(ret);
19462306a36Sopenharmony_ci}
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci/**
19762306a36Sopenharmony_ci * pvrdma_alloc_mr - allocate a memory region
19862306a36Sopenharmony_ci * @pd: protection domain
19962306a36Sopenharmony_ci * @mr_type: type of memory region
20062306a36Sopenharmony_ci * @max_num_sg: maximum number of pages
20162306a36Sopenharmony_ci *
20262306a36Sopenharmony_ci * @return: ib_mr pointer on success, otherwise returns an errno.
20362306a36Sopenharmony_ci */
20462306a36Sopenharmony_cistruct ib_mr *pvrdma_alloc_mr(struct ib_pd *pd, enum ib_mr_type mr_type,
20562306a36Sopenharmony_ci			      u32 max_num_sg)
20662306a36Sopenharmony_ci{
20762306a36Sopenharmony_ci	struct pvrdma_dev *dev = to_vdev(pd->device);
20862306a36Sopenharmony_ci	struct pvrdma_user_mr *mr;
20962306a36Sopenharmony_ci	union pvrdma_cmd_req req;
21062306a36Sopenharmony_ci	union pvrdma_cmd_resp rsp;
21162306a36Sopenharmony_ci	struct pvrdma_cmd_create_mr *cmd = &req.create_mr;
21262306a36Sopenharmony_ci	struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp;
21362306a36Sopenharmony_ci	int size = max_num_sg * sizeof(u64);
21462306a36Sopenharmony_ci	int ret;
21562306a36Sopenharmony_ci
21662306a36Sopenharmony_ci	if (mr_type != IB_MR_TYPE_MEM_REG ||
21762306a36Sopenharmony_ci	    max_num_sg > PVRDMA_MAX_FAST_REG_PAGES)
21862306a36Sopenharmony_ci		return ERR_PTR(-EINVAL);
21962306a36Sopenharmony_ci
22062306a36Sopenharmony_ci	mr = kzalloc(sizeof(*mr), GFP_KERNEL);
22162306a36Sopenharmony_ci	if (!mr)
22262306a36Sopenharmony_ci		return ERR_PTR(-ENOMEM);
22362306a36Sopenharmony_ci
22462306a36Sopenharmony_ci	mr->pages = kzalloc(size, GFP_KERNEL);
22562306a36Sopenharmony_ci	if (!mr->pages) {
22662306a36Sopenharmony_ci		ret = -ENOMEM;
22762306a36Sopenharmony_ci		goto freemr;
22862306a36Sopenharmony_ci	}
22962306a36Sopenharmony_ci
23062306a36Sopenharmony_ci	ret = pvrdma_page_dir_init(dev, &mr->pdir, max_num_sg, false);
23162306a36Sopenharmony_ci	if (ret) {
23262306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev,
23362306a36Sopenharmony_ci			 "failed to allocate page dir for mr\n");
23462306a36Sopenharmony_ci		ret = -ENOMEM;
23562306a36Sopenharmony_ci		goto freepages;
23662306a36Sopenharmony_ci	}
23762306a36Sopenharmony_ci
23862306a36Sopenharmony_ci	memset(cmd, 0, sizeof(*cmd));
23962306a36Sopenharmony_ci	cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR;
24062306a36Sopenharmony_ci	cmd->pd_handle = to_vpd(pd)->pd_handle;
24162306a36Sopenharmony_ci	cmd->access_flags = 0;
24262306a36Sopenharmony_ci	cmd->flags = PVRDMA_MR_FLAG_FRMR;
24362306a36Sopenharmony_ci	cmd->nchunks = max_num_sg;
24462306a36Sopenharmony_ci
24562306a36Sopenharmony_ci	ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP);
24662306a36Sopenharmony_ci	if (ret < 0) {
24762306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev,
24862306a36Sopenharmony_ci			 "could not create FR mem region, error: %d\n", ret);
24962306a36Sopenharmony_ci		goto freepdir;
25062306a36Sopenharmony_ci	}
25162306a36Sopenharmony_ci
25262306a36Sopenharmony_ci	mr->max_pages = max_num_sg;
25362306a36Sopenharmony_ci	mr->mmr.mr_handle = resp->mr_handle;
25462306a36Sopenharmony_ci	mr->ibmr.lkey = resp->lkey;
25562306a36Sopenharmony_ci	mr->ibmr.rkey = resp->rkey;
25662306a36Sopenharmony_ci	mr->page_shift = PAGE_SHIFT;
25762306a36Sopenharmony_ci	mr->umem = NULL;
25862306a36Sopenharmony_ci
25962306a36Sopenharmony_ci	return &mr->ibmr;
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_cifreepdir:
26262306a36Sopenharmony_ci	pvrdma_page_dir_cleanup(dev, &mr->pdir);
26362306a36Sopenharmony_cifreepages:
26462306a36Sopenharmony_ci	kfree(mr->pages);
26562306a36Sopenharmony_cifreemr:
26662306a36Sopenharmony_ci	kfree(mr);
26762306a36Sopenharmony_ci	return ERR_PTR(ret);
26862306a36Sopenharmony_ci}
26962306a36Sopenharmony_ci
27062306a36Sopenharmony_ci/**
27162306a36Sopenharmony_ci * pvrdma_dereg_mr - deregister a memory region
27262306a36Sopenharmony_ci * @ibmr: memory region
27362306a36Sopenharmony_ci * @udata: pointer to user data
27462306a36Sopenharmony_ci *
27562306a36Sopenharmony_ci * @return: 0 on success.
27662306a36Sopenharmony_ci */
27762306a36Sopenharmony_ciint pvrdma_dereg_mr(struct ib_mr *ibmr, struct ib_udata *udata)
27862306a36Sopenharmony_ci{
27962306a36Sopenharmony_ci	struct pvrdma_user_mr *mr = to_vmr(ibmr);
28062306a36Sopenharmony_ci	struct pvrdma_dev *dev = to_vdev(ibmr->device);
28162306a36Sopenharmony_ci	union pvrdma_cmd_req req;
28262306a36Sopenharmony_ci	struct pvrdma_cmd_destroy_mr *cmd = &req.destroy_mr;
28362306a36Sopenharmony_ci	int ret;
28462306a36Sopenharmony_ci
28562306a36Sopenharmony_ci	memset(cmd, 0, sizeof(*cmd));
28662306a36Sopenharmony_ci	cmd->hdr.cmd = PVRDMA_CMD_DESTROY_MR;
28762306a36Sopenharmony_ci	cmd->mr_handle = mr->mmr.mr_handle;
28862306a36Sopenharmony_ci	ret = pvrdma_cmd_post(dev, &req, NULL, 0);
28962306a36Sopenharmony_ci	if (ret < 0)
29062306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev,
29162306a36Sopenharmony_ci			 "could not deregister mem region, error: %d\n", ret);
29262306a36Sopenharmony_ci
29362306a36Sopenharmony_ci	pvrdma_page_dir_cleanup(dev, &mr->pdir);
29462306a36Sopenharmony_ci	ib_umem_release(mr->umem);
29562306a36Sopenharmony_ci
29662306a36Sopenharmony_ci	kfree(mr->pages);
29762306a36Sopenharmony_ci	kfree(mr);
29862306a36Sopenharmony_ci
29962306a36Sopenharmony_ci	return 0;
30062306a36Sopenharmony_ci}
30162306a36Sopenharmony_ci
30262306a36Sopenharmony_cistatic int pvrdma_set_page(struct ib_mr *ibmr, u64 addr)
30362306a36Sopenharmony_ci{
30462306a36Sopenharmony_ci	struct pvrdma_user_mr *mr = to_vmr(ibmr);
30562306a36Sopenharmony_ci
30662306a36Sopenharmony_ci	if (mr->npages == mr->max_pages)
30762306a36Sopenharmony_ci		return -ENOMEM;
30862306a36Sopenharmony_ci
30962306a36Sopenharmony_ci	mr->pages[mr->npages++] = addr;
31062306a36Sopenharmony_ci	return 0;
31162306a36Sopenharmony_ci}
31262306a36Sopenharmony_ci
31362306a36Sopenharmony_ciint pvrdma_map_mr_sg(struct ib_mr *ibmr, struct scatterlist *sg, int sg_nents,
31462306a36Sopenharmony_ci		     unsigned int *sg_offset)
31562306a36Sopenharmony_ci{
31662306a36Sopenharmony_ci	struct pvrdma_user_mr *mr = to_vmr(ibmr);
31762306a36Sopenharmony_ci	struct pvrdma_dev *dev = to_vdev(ibmr->device);
31862306a36Sopenharmony_ci	int ret;
31962306a36Sopenharmony_ci
32062306a36Sopenharmony_ci	mr->npages = 0;
32162306a36Sopenharmony_ci
32262306a36Sopenharmony_ci	ret = ib_sg_to_pages(ibmr, sg, sg_nents, sg_offset, pvrdma_set_page);
32362306a36Sopenharmony_ci	if (ret < 0)
32462306a36Sopenharmony_ci		dev_warn(&dev->pdev->dev, "could not map sg to pages\n");
32562306a36Sopenharmony_ci
32662306a36Sopenharmony_ci	return ret;
32762306a36Sopenharmony_ci}
328