162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Copyright (c) 2016 Mellanox Technologies Ltd. All rights reserved.
462306a36Sopenharmony_ci * Copyright (c) 2015 System Fabric Works, Inc. All rights reserved.
562306a36Sopenharmony_ci */
662306a36Sopenharmony_ci
762306a36Sopenharmony_ci#include <linux/libnvdimm.h>
862306a36Sopenharmony_ci
962306a36Sopenharmony_ci#include "rxe.h"
1062306a36Sopenharmony_ci#include "rxe_loc.h"
1162306a36Sopenharmony_ci
1262306a36Sopenharmony_ci/* Return a random 8 bit key value that is
1362306a36Sopenharmony_ci * different than the last_key. Set last_key to -1
1462306a36Sopenharmony_ci * if this is the first key for an MR or MW
1562306a36Sopenharmony_ci */
1662306a36Sopenharmony_ciu8 rxe_get_next_key(u32 last_key)
1762306a36Sopenharmony_ci{
1862306a36Sopenharmony_ci	u8 key;
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci	do {
2162306a36Sopenharmony_ci		get_random_bytes(&key, 1);
2262306a36Sopenharmony_ci	} while (key == last_key);
2362306a36Sopenharmony_ci
2462306a36Sopenharmony_ci	return key;
2562306a36Sopenharmony_ci}
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_ciint mr_check_range(struct rxe_mr *mr, u64 iova, size_t length)
2862306a36Sopenharmony_ci{
2962306a36Sopenharmony_ci	switch (mr->ibmr.type) {
3062306a36Sopenharmony_ci	case IB_MR_TYPE_DMA:
3162306a36Sopenharmony_ci		return 0;
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_ci	case IB_MR_TYPE_USER:
3462306a36Sopenharmony_ci	case IB_MR_TYPE_MEM_REG:
3562306a36Sopenharmony_ci		if (iova < mr->ibmr.iova ||
3662306a36Sopenharmony_ci		    iova + length > mr->ibmr.iova + mr->ibmr.length) {
3762306a36Sopenharmony_ci			rxe_dbg_mr(mr, "iova/length out of range");
3862306a36Sopenharmony_ci			return -EINVAL;
3962306a36Sopenharmony_ci		}
4062306a36Sopenharmony_ci		return 0;
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_ci	default:
4362306a36Sopenharmony_ci		rxe_dbg_mr(mr, "mr type not supported\n");
4462306a36Sopenharmony_ci		return -EINVAL;
4562306a36Sopenharmony_ci	}
4662306a36Sopenharmony_ci}
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_cistatic void rxe_mr_init(int access, struct rxe_mr *mr)
4962306a36Sopenharmony_ci{
5062306a36Sopenharmony_ci	u32 key = mr->elem.index << 8 | rxe_get_next_key(-1);
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci	/* set ibmr->l/rkey and also copy into private l/rkey
5362306a36Sopenharmony_ci	 * for user MRs these will always be the same
5462306a36Sopenharmony_ci	 * for cases where caller 'owns' the key portion
5562306a36Sopenharmony_ci	 * they may be different until REG_MR WQE is executed.
5662306a36Sopenharmony_ci	 */
5762306a36Sopenharmony_ci	mr->lkey = mr->ibmr.lkey = key;
5862306a36Sopenharmony_ci	mr->rkey = mr->ibmr.rkey = key;
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_ci	mr->access = access;
6162306a36Sopenharmony_ci	mr->ibmr.page_size = PAGE_SIZE;
6262306a36Sopenharmony_ci	mr->page_mask = PAGE_MASK;
6362306a36Sopenharmony_ci	mr->page_shift = PAGE_SHIFT;
6462306a36Sopenharmony_ci	mr->state = RXE_MR_STATE_INVALID;
6562306a36Sopenharmony_ci}
6662306a36Sopenharmony_ci
6762306a36Sopenharmony_civoid rxe_mr_init_dma(int access, struct rxe_mr *mr)
6862306a36Sopenharmony_ci{
6962306a36Sopenharmony_ci	rxe_mr_init(access, mr);
7062306a36Sopenharmony_ci
7162306a36Sopenharmony_ci	mr->state = RXE_MR_STATE_VALID;
7262306a36Sopenharmony_ci	mr->ibmr.type = IB_MR_TYPE_DMA;
7362306a36Sopenharmony_ci}
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_cistatic unsigned long rxe_mr_iova_to_index(struct rxe_mr *mr, u64 iova)
7662306a36Sopenharmony_ci{
7762306a36Sopenharmony_ci	return (iova >> mr->page_shift) - (mr->ibmr.iova >> mr->page_shift);
7862306a36Sopenharmony_ci}
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_cistatic unsigned long rxe_mr_iova_to_page_offset(struct rxe_mr *mr, u64 iova)
8162306a36Sopenharmony_ci{
8262306a36Sopenharmony_ci	return iova & (mr_page_size(mr) - 1);
8362306a36Sopenharmony_ci}
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_cistatic bool is_pmem_page(struct page *pg)
8662306a36Sopenharmony_ci{
8762306a36Sopenharmony_ci	unsigned long paddr = page_to_phys(pg);
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci	return REGION_INTERSECTS ==
9062306a36Sopenharmony_ci	       region_intersects(paddr, PAGE_SIZE, IORESOURCE_MEM,
9162306a36Sopenharmony_ci				 IORES_DESC_PERSISTENT_MEMORY);
9262306a36Sopenharmony_ci}
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_cistatic int rxe_mr_fill_pages_from_sgt(struct rxe_mr *mr, struct sg_table *sgt)
9562306a36Sopenharmony_ci{
9662306a36Sopenharmony_ci	XA_STATE(xas, &mr->page_list, 0);
9762306a36Sopenharmony_ci	struct sg_page_iter sg_iter;
9862306a36Sopenharmony_ci	struct page *page;
9962306a36Sopenharmony_ci	bool persistent = !!(mr->access & IB_ACCESS_FLUSH_PERSISTENT);
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ci	__sg_page_iter_start(&sg_iter, sgt->sgl, sgt->orig_nents, 0);
10262306a36Sopenharmony_ci	if (!__sg_page_iter_next(&sg_iter))
10362306a36Sopenharmony_ci		return 0;
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_ci	do {
10662306a36Sopenharmony_ci		xas_lock(&xas);
10762306a36Sopenharmony_ci		while (true) {
10862306a36Sopenharmony_ci			page = sg_page_iter_page(&sg_iter);
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_ci			if (persistent && !is_pmem_page(page)) {
11162306a36Sopenharmony_ci				rxe_dbg_mr(mr, "Page can't be persistent\n");
11262306a36Sopenharmony_ci				xas_set_err(&xas, -EINVAL);
11362306a36Sopenharmony_ci				break;
11462306a36Sopenharmony_ci			}
11562306a36Sopenharmony_ci
11662306a36Sopenharmony_ci			xas_store(&xas, page);
11762306a36Sopenharmony_ci			if (xas_error(&xas))
11862306a36Sopenharmony_ci				break;
11962306a36Sopenharmony_ci			xas_next(&xas);
12062306a36Sopenharmony_ci			if (!__sg_page_iter_next(&sg_iter))
12162306a36Sopenharmony_ci				break;
12262306a36Sopenharmony_ci		}
12362306a36Sopenharmony_ci		xas_unlock(&xas);
12462306a36Sopenharmony_ci	} while (xas_nomem(&xas, GFP_KERNEL));
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci	return xas_error(&xas);
12762306a36Sopenharmony_ci}
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ciint rxe_mr_init_user(struct rxe_dev *rxe, u64 start, u64 length, u64 iova,
13062306a36Sopenharmony_ci		     int access, struct rxe_mr *mr)
13162306a36Sopenharmony_ci{
13262306a36Sopenharmony_ci	struct ib_umem *umem;
13362306a36Sopenharmony_ci	int err;
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci	rxe_mr_init(access, mr);
13662306a36Sopenharmony_ci
13762306a36Sopenharmony_ci	xa_init(&mr->page_list);
13862306a36Sopenharmony_ci
13962306a36Sopenharmony_ci	umem = ib_umem_get(&rxe->ib_dev, start, length, access);
14062306a36Sopenharmony_ci	if (IS_ERR(umem)) {
14162306a36Sopenharmony_ci		rxe_dbg_mr(mr, "Unable to pin memory region err = %d\n",
14262306a36Sopenharmony_ci			(int)PTR_ERR(umem));
14362306a36Sopenharmony_ci		return PTR_ERR(umem);
14462306a36Sopenharmony_ci	}
14562306a36Sopenharmony_ci
14662306a36Sopenharmony_ci	err = rxe_mr_fill_pages_from_sgt(mr, &umem->sgt_append.sgt);
14762306a36Sopenharmony_ci	if (err) {
14862306a36Sopenharmony_ci		ib_umem_release(umem);
14962306a36Sopenharmony_ci		return err;
15062306a36Sopenharmony_ci	}
15162306a36Sopenharmony_ci
15262306a36Sopenharmony_ci	mr->umem = umem;
15362306a36Sopenharmony_ci	mr->ibmr.type = IB_MR_TYPE_USER;
15462306a36Sopenharmony_ci	mr->state = RXE_MR_STATE_VALID;
15562306a36Sopenharmony_ci
15662306a36Sopenharmony_ci	return 0;
15762306a36Sopenharmony_ci}
15862306a36Sopenharmony_ci
15962306a36Sopenharmony_cistatic int rxe_mr_alloc(struct rxe_mr *mr, int num_buf)
16062306a36Sopenharmony_ci{
16162306a36Sopenharmony_ci	XA_STATE(xas, &mr->page_list, 0);
16262306a36Sopenharmony_ci	int i = 0;
16362306a36Sopenharmony_ci	int err;
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_ci	xa_init(&mr->page_list);
16662306a36Sopenharmony_ci
16762306a36Sopenharmony_ci	do {
16862306a36Sopenharmony_ci		xas_lock(&xas);
16962306a36Sopenharmony_ci		while (i != num_buf) {
17062306a36Sopenharmony_ci			xas_store(&xas, XA_ZERO_ENTRY);
17162306a36Sopenharmony_ci			if (xas_error(&xas))
17262306a36Sopenharmony_ci				break;
17362306a36Sopenharmony_ci			xas_next(&xas);
17462306a36Sopenharmony_ci			i++;
17562306a36Sopenharmony_ci		}
17662306a36Sopenharmony_ci		xas_unlock(&xas);
17762306a36Sopenharmony_ci	} while (xas_nomem(&xas, GFP_KERNEL));
17862306a36Sopenharmony_ci
17962306a36Sopenharmony_ci	err = xas_error(&xas);
18062306a36Sopenharmony_ci	if (err)
18162306a36Sopenharmony_ci		return err;
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_ci	mr->num_buf = num_buf;
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	return 0;
18662306a36Sopenharmony_ci}
18762306a36Sopenharmony_ci
18862306a36Sopenharmony_ciint rxe_mr_init_fast(int max_pages, struct rxe_mr *mr)
18962306a36Sopenharmony_ci{
19062306a36Sopenharmony_ci	int err;
19162306a36Sopenharmony_ci
19262306a36Sopenharmony_ci	/* always allow remote access for FMRs */
19362306a36Sopenharmony_ci	rxe_mr_init(RXE_ACCESS_REMOTE, mr);
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci	err = rxe_mr_alloc(mr, max_pages);
19662306a36Sopenharmony_ci	if (err)
19762306a36Sopenharmony_ci		goto err1;
19862306a36Sopenharmony_ci
19962306a36Sopenharmony_ci	mr->state = RXE_MR_STATE_FREE;
20062306a36Sopenharmony_ci	mr->ibmr.type = IB_MR_TYPE_MEM_REG;
20162306a36Sopenharmony_ci
20262306a36Sopenharmony_ci	return 0;
20362306a36Sopenharmony_ci
20462306a36Sopenharmony_cierr1:
20562306a36Sopenharmony_ci	return err;
20662306a36Sopenharmony_ci}
20762306a36Sopenharmony_ci
20862306a36Sopenharmony_cistatic int rxe_set_page(struct ib_mr *ibmr, u64 dma_addr)
20962306a36Sopenharmony_ci{
21062306a36Sopenharmony_ci	struct rxe_mr *mr = to_rmr(ibmr);
21162306a36Sopenharmony_ci	struct page *page = ib_virt_dma_to_page(dma_addr);
21262306a36Sopenharmony_ci	bool persistent = !!(mr->access & IB_ACCESS_FLUSH_PERSISTENT);
21362306a36Sopenharmony_ci	int err;
21462306a36Sopenharmony_ci
21562306a36Sopenharmony_ci	if (persistent && !is_pmem_page(page)) {
21662306a36Sopenharmony_ci		rxe_dbg_mr(mr, "Page cannot be persistent\n");
21762306a36Sopenharmony_ci		return -EINVAL;
21862306a36Sopenharmony_ci	}
21962306a36Sopenharmony_ci
22062306a36Sopenharmony_ci	if (unlikely(mr->nbuf == mr->num_buf))
22162306a36Sopenharmony_ci		return -ENOMEM;
22262306a36Sopenharmony_ci
22362306a36Sopenharmony_ci	err = xa_err(xa_store(&mr->page_list, mr->nbuf, page, GFP_KERNEL));
22462306a36Sopenharmony_ci	if (err)
22562306a36Sopenharmony_ci		return err;
22662306a36Sopenharmony_ci
22762306a36Sopenharmony_ci	mr->nbuf++;
22862306a36Sopenharmony_ci	return 0;
22962306a36Sopenharmony_ci}
23062306a36Sopenharmony_ci
23162306a36Sopenharmony_ciint rxe_map_mr_sg(struct ib_mr *ibmr, struct scatterlist *sgl,
23262306a36Sopenharmony_ci		  int sg_nents, unsigned int *sg_offset)
23362306a36Sopenharmony_ci{
23462306a36Sopenharmony_ci	struct rxe_mr *mr = to_rmr(ibmr);
23562306a36Sopenharmony_ci	unsigned int page_size = mr_page_size(mr);
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_ci	mr->nbuf = 0;
23862306a36Sopenharmony_ci	mr->page_shift = ilog2(page_size);
23962306a36Sopenharmony_ci	mr->page_mask = ~((u64)page_size - 1);
24062306a36Sopenharmony_ci	mr->page_offset = mr->ibmr.iova & (page_size - 1);
24162306a36Sopenharmony_ci
24262306a36Sopenharmony_ci	return ib_sg_to_pages(ibmr, sgl, sg_nents, sg_offset, rxe_set_page);
24362306a36Sopenharmony_ci}
24462306a36Sopenharmony_ci
24562306a36Sopenharmony_cistatic int rxe_mr_copy_xarray(struct rxe_mr *mr, u64 iova, void *addr,
24662306a36Sopenharmony_ci			      unsigned int length, enum rxe_mr_copy_dir dir)
24762306a36Sopenharmony_ci{
24862306a36Sopenharmony_ci	unsigned int page_offset = rxe_mr_iova_to_page_offset(mr, iova);
24962306a36Sopenharmony_ci	unsigned long index = rxe_mr_iova_to_index(mr, iova);
25062306a36Sopenharmony_ci	unsigned int bytes;
25162306a36Sopenharmony_ci	struct page *page;
25262306a36Sopenharmony_ci	void *va;
25362306a36Sopenharmony_ci
25462306a36Sopenharmony_ci	while (length) {
25562306a36Sopenharmony_ci		page = xa_load(&mr->page_list, index);
25662306a36Sopenharmony_ci		if (!page)
25762306a36Sopenharmony_ci			return -EFAULT;
25862306a36Sopenharmony_ci
25962306a36Sopenharmony_ci		bytes = min_t(unsigned int, length,
26062306a36Sopenharmony_ci				mr_page_size(mr) - page_offset);
26162306a36Sopenharmony_ci		va = kmap_local_page(page);
26262306a36Sopenharmony_ci		if (dir == RXE_FROM_MR_OBJ)
26362306a36Sopenharmony_ci			memcpy(addr, va + page_offset, bytes);
26462306a36Sopenharmony_ci		else
26562306a36Sopenharmony_ci			memcpy(va + page_offset, addr, bytes);
26662306a36Sopenharmony_ci		kunmap_local(va);
26762306a36Sopenharmony_ci
26862306a36Sopenharmony_ci		page_offset = 0;
26962306a36Sopenharmony_ci		addr += bytes;
27062306a36Sopenharmony_ci		length -= bytes;
27162306a36Sopenharmony_ci		index++;
27262306a36Sopenharmony_ci	}
27362306a36Sopenharmony_ci
27462306a36Sopenharmony_ci	return 0;
27562306a36Sopenharmony_ci}
27662306a36Sopenharmony_ci
27762306a36Sopenharmony_cistatic void rxe_mr_copy_dma(struct rxe_mr *mr, u64 dma_addr, void *addr,
27862306a36Sopenharmony_ci			    unsigned int length, enum rxe_mr_copy_dir dir)
27962306a36Sopenharmony_ci{
28062306a36Sopenharmony_ci	unsigned int page_offset = dma_addr & (PAGE_SIZE - 1);
28162306a36Sopenharmony_ci	unsigned int bytes;
28262306a36Sopenharmony_ci	struct page *page;
28362306a36Sopenharmony_ci	u8 *va;
28462306a36Sopenharmony_ci
28562306a36Sopenharmony_ci	while (length) {
28662306a36Sopenharmony_ci		page = ib_virt_dma_to_page(dma_addr);
28762306a36Sopenharmony_ci		bytes = min_t(unsigned int, length,
28862306a36Sopenharmony_ci				PAGE_SIZE - page_offset);
28962306a36Sopenharmony_ci		va = kmap_local_page(page);
29062306a36Sopenharmony_ci
29162306a36Sopenharmony_ci		if (dir == RXE_TO_MR_OBJ)
29262306a36Sopenharmony_ci			memcpy(va + page_offset, addr, bytes);
29362306a36Sopenharmony_ci		else
29462306a36Sopenharmony_ci			memcpy(addr, va + page_offset, bytes);
29562306a36Sopenharmony_ci
29662306a36Sopenharmony_ci		kunmap_local(va);
29762306a36Sopenharmony_ci		page_offset = 0;
29862306a36Sopenharmony_ci		dma_addr += bytes;
29962306a36Sopenharmony_ci		addr += bytes;
30062306a36Sopenharmony_ci		length -= bytes;
30162306a36Sopenharmony_ci	}
30262306a36Sopenharmony_ci}
30362306a36Sopenharmony_ci
30462306a36Sopenharmony_ciint rxe_mr_copy(struct rxe_mr *mr, u64 iova, void *addr,
30562306a36Sopenharmony_ci		unsigned int length, enum rxe_mr_copy_dir dir)
30662306a36Sopenharmony_ci{
30762306a36Sopenharmony_ci	int err;
30862306a36Sopenharmony_ci
30962306a36Sopenharmony_ci	if (length == 0)
31062306a36Sopenharmony_ci		return 0;
31162306a36Sopenharmony_ci
31262306a36Sopenharmony_ci	if (WARN_ON(!mr))
31362306a36Sopenharmony_ci		return -EINVAL;
31462306a36Sopenharmony_ci
31562306a36Sopenharmony_ci	if (mr->ibmr.type == IB_MR_TYPE_DMA) {
31662306a36Sopenharmony_ci		rxe_mr_copy_dma(mr, iova, addr, length, dir);
31762306a36Sopenharmony_ci		return 0;
31862306a36Sopenharmony_ci	}
31962306a36Sopenharmony_ci
32062306a36Sopenharmony_ci	err = mr_check_range(mr, iova, length);
32162306a36Sopenharmony_ci	if (unlikely(err)) {
32262306a36Sopenharmony_ci		rxe_dbg_mr(mr, "iova out of range");
32362306a36Sopenharmony_ci		return err;
32462306a36Sopenharmony_ci	}
32562306a36Sopenharmony_ci
32662306a36Sopenharmony_ci	return rxe_mr_copy_xarray(mr, iova, addr, length, dir);
32762306a36Sopenharmony_ci}
32862306a36Sopenharmony_ci
32962306a36Sopenharmony_ci/* copy data in or out of a wqe, i.e. sg list
33062306a36Sopenharmony_ci * under the control of a dma descriptor
33162306a36Sopenharmony_ci */
33262306a36Sopenharmony_ciint copy_data(
33362306a36Sopenharmony_ci	struct rxe_pd		*pd,
33462306a36Sopenharmony_ci	int			access,
33562306a36Sopenharmony_ci	struct rxe_dma_info	*dma,
33662306a36Sopenharmony_ci	void			*addr,
33762306a36Sopenharmony_ci	int			length,
33862306a36Sopenharmony_ci	enum rxe_mr_copy_dir	dir)
33962306a36Sopenharmony_ci{
34062306a36Sopenharmony_ci	int			bytes;
34162306a36Sopenharmony_ci	struct rxe_sge		*sge	= &dma->sge[dma->cur_sge];
34262306a36Sopenharmony_ci	int			offset	= dma->sge_offset;
34362306a36Sopenharmony_ci	int			resid	= dma->resid;
34462306a36Sopenharmony_ci	struct rxe_mr		*mr	= NULL;
34562306a36Sopenharmony_ci	u64			iova;
34662306a36Sopenharmony_ci	int			err;
34762306a36Sopenharmony_ci
34862306a36Sopenharmony_ci	if (length == 0)
34962306a36Sopenharmony_ci		return 0;
35062306a36Sopenharmony_ci
35162306a36Sopenharmony_ci	if (length > resid) {
35262306a36Sopenharmony_ci		err = -EINVAL;
35362306a36Sopenharmony_ci		goto err2;
35462306a36Sopenharmony_ci	}
35562306a36Sopenharmony_ci
35662306a36Sopenharmony_ci	if (sge->length && (offset < sge->length)) {
35762306a36Sopenharmony_ci		mr = lookup_mr(pd, access, sge->lkey, RXE_LOOKUP_LOCAL);
35862306a36Sopenharmony_ci		if (!mr) {
35962306a36Sopenharmony_ci			err = -EINVAL;
36062306a36Sopenharmony_ci			goto err1;
36162306a36Sopenharmony_ci		}
36262306a36Sopenharmony_ci	}
36362306a36Sopenharmony_ci
36462306a36Sopenharmony_ci	while (length > 0) {
36562306a36Sopenharmony_ci		bytes = length;
36662306a36Sopenharmony_ci
36762306a36Sopenharmony_ci		if (offset >= sge->length) {
36862306a36Sopenharmony_ci			if (mr) {
36962306a36Sopenharmony_ci				rxe_put(mr);
37062306a36Sopenharmony_ci				mr = NULL;
37162306a36Sopenharmony_ci			}
37262306a36Sopenharmony_ci			sge++;
37362306a36Sopenharmony_ci			dma->cur_sge++;
37462306a36Sopenharmony_ci			offset = 0;
37562306a36Sopenharmony_ci
37662306a36Sopenharmony_ci			if (dma->cur_sge >= dma->num_sge) {
37762306a36Sopenharmony_ci				err = -ENOSPC;
37862306a36Sopenharmony_ci				goto err2;
37962306a36Sopenharmony_ci			}
38062306a36Sopenharmony_ci
38162306a36Sopenharmony_ci			if (sge->length) {
38262306a36Sopenharmony_ci				mr = lookup_mr(pd, access, sge->lkey,
38362306a36Sopenharmony_ci					       RXE_LOOKUP_LOCAL);
38462306a36Sopenharmony_ci				if (!mr) {
38562306a36Sopenharmony_ci					err = -EINVAL;
38662306a36Sopenharmony_ci					goto err1;
38762306a36Sopenharmony_ci				}
38862306a36Sopenharmony_ci			} else {
38962306a36Sopenharmony_ci				continue;
39062306a36Sopenharmony_ci			}
39162306a36Sopenharmony_ci		}
39262306a36Sopenharmony_ci
39362306a36Sopenharmony_ci		if (bytes > sge->length - offset)
39462306a36Sopenharmony_ci			bytes = sge->length - offset;
39562306a36Sopenharmony_ci
39662306a36Sopenharmony_ci		if (bytes > 0) {
39762306a36Sopenharmony_ci			iova = sge->addr + offset;
39862306a36Sopenharmony_ci			err = rxe_mr_copy(mr, iova, addr, bytes, dir);
39962306a36Sopenharmony_ci			if (err)
40062306a36Sopenharmony_ci				goto err2;
40162306a36Sopenharmony_ci
40262306a36Sopenharmony_ci			offset	+= bytes;
40362306a36Sopenharmony_ci			resid	-= bytes;
40462306a36Sopenharmony_ci			length	-= bytes;
40562306a36Sopenharmony_ci			addr	+= bytes;
40662306a36Sopenharmony_ci		}
40762306a36Sopenharmony_ci	}
40862306a36Sopenharmony_ci
40962306a36Sopenharmony_ci	dma->sge_offset = offset;
41062306a36Sopenharmony_ci	dma->resid	= resid;
41162306a36Sopenharmony_ci
41262306a36Sopenharmony_ci	if (mr)
41362306a36Sopenharmony_ci		rxe_put(mr);
41462306a36Sopenharmony_ci
41562306a36Sopenharmony_ci	return 0;
41662306a36Sopenharmony_ci
41762306a36Sopenharmony_cierr2:
41862306a36Sopenharmony_ci	if (mr)
41962306a36Sopenharmony_ci		rxe_put(mr);
42062306a36Sopenharmony_cierr1:
42162306a36Sopenharmony_ci	return err;
42262306a36Sopenharmony_ci}
42362306a36Sopenharmony_ci
42462306a36Sopenharmony_ciint rxe_flush_pmem_iova(struct rxe_mr *mr, u64 iova, unsigned int length)
42562306a36Sopenharmony_ci{
42662306a36Sopenharmony_ci	unsigned int page_offset;
42762306a36Sopenharmony_ci	unsigned long index;
42862306a36Sopenharmony_ci	struct page *page;
42962306a36Sopenharmony_ci	unsigned int bytes;
43062306a36Sopenharmony_ci	int err;
43162306a36Sopenharmony_ci	u8 *va;
43262306a36Sopenharmony_ci
43362306a36Sopenharmony_ci	/* mr must be valid even if length is zero */
43462306a36Sopenharmony_ci	if (WARN_ON(!mr))
43562306a36Sopenharmony_ci		return -EINVAL;
43662306a36Sopenharmony_ci
43762306a36Sopenharmony_ci	if (length == 0)
43862306a36Sopenharmony_ci		return 0;
43962306a36Sopenharmony_ci
44062306a36Sopenharmony_ci	if (mr->ibmr.type == IB_MR_TYPE_DMA)
44162306a36Sopenharmony_ci		return -EFAULT;
44262306a36Sopenharmony_ci
44362306a36Sopenharmony_ci	err = mr_check_range(mr, iova, length);
44462306a36Sopenharmony_ci	if (err)
44562306a36Sopenharmony_ci		return err;
44662306a36Sopenharmony_ci
44762306a36Sopenharmony_ci	while (length > 0) {
44862306a36Sopenharmony_ci		index = rxe_mr_iova_to_index(mr, iova);
44962306a36Sopenharmony_ci		page = xa_load(&mr->page_list, index);
45062306a36Sopenharmony_ci		page_offset = rxe_mr_iova_to_page_offset(mr, iova);
45162306a36Sopenharmony_ci		if (!page)
45262306a36Sopenharmony_ci			return -EFAULT;
45362306a36Sopenharmony_ci		bytes = min_t(unsigned int, length,
45462306a36Sopenharmony_ci				mr_page_size(mr) - page_offset);
45562306a36Sopenharmony_ci
45662306a36Sopenharmony_ci		va = kmap_local_page(page);
45762306a36Sopenharmony_ci		arch_wb_cache_pmem(va + page_offset, bytes);
45862306a36Sopenharmony_ci		kunmap_local(va);
45962306a36Sopenharmony_ci
46062306a36Sopenharmony_ci		length -= bytes;
46162306a36Sopenharmony_ci		iova += bytes;
46262306a36Sopenharmony_ci		page_offset = 0;
46362306a36Sopenharmony_ci	}
46462306a36Sopenharmony_ci
46562306a36Sopenharmony_ci	return 0;
46662306a36Sopenharmony_ci}
46762306a36Sopenharmony_ci
46862306a36Sopenharmony_ci/* Guarantee atomicity of atomic operations at the machine level. */
46962306a36Sopenharmony_cistatic DEFINE_SPINLOCK(atomic_ops_lock);
47062306a36Sopenharmony_ci
47162306a36Sopenharmony_ciint rxe_mr_do_atomic_op(struct rxe_mr *mr, u64 iova, int opcode,
47262306a36Sopenharmony_ci			u64 compare, u64 swap_add, u64 *orig_val)
47362306a36Sopenharmony_ci{
47462306a36Sopenharmony_ci	unsigned int page_offset;
47562306a36Sopenharmony_ci	struct page *page;
47662306a36Sopenharmony_ci	u64 value;
47762306a36Sopenharmony_ci	u64 *va;
47862306a36Sopenharmony_ci
47962306a36Sopenharmony_ci	if (unlikely(mr->state != RXE_MR_STATE_VALID)) {
48062306a36Sopenharmony_ci		rxe_dbg_mr(mr, "mr not in valid state");
48162306a36Sopenharmony_ci		return RESPST_ERR_RKEY_VIOLATION;
48262306a36Sopenharmony_ci	}
48362306a36Sopenharmony_ci
48462306a36Sopenharmony_ci	if (mr->ibmr.type == IB_MR_TYPE_DMA) {
48562306a36Sopenharmony_ci		page_offset = iova & (PAGE_SIZE - 1);
48662306a36Sopenharmony_ci		page = ib_virt_dma_to_page(iova);
48762306a36Sopenharmony_ci	} else {
48862306a36Sopenharmony_ci		unsigned long index;
48962306a36Sopenharmony_ci		int err;
49062306a36Sopenharmony_ci
49162306a36Sopenharmony_ci		err = mr_check_range(mr, iova, sizeof(value));
49262306a36Sopenharmony_ci		if (err) {
49362306a36Sopenharmony_ci			rxe_dbg_mr(mr, "iova out of range");
49462306a36Sopenharmony_ci			return RESPST_ERR_RKEY_VIOLATION;
49562306a36Sopenharmony_ci		}
49662306a36Sopenharmony_ci		page_offset = rxe_mr_iova_to_page_offset(mr, iova);
49762306a36Sopenharmony_ci		index = rxe_mr_iova_to_index(mr, iova);
49862306a36Sopenharmony_ci		page = xa_load(&mr->page_list, index);
49962306a36Sopenharmony_ci		if (!page)
50062306a36Sopenharmony_ci			return RESPST_ERR_RKEY_VIOLATION;
50162306a36Sopenharmony_ci	}
50262306a36Sopenharmony_ci
50362306a36Sopenharmony_ci	if (unlikely(page_offset & 0x7)) {
50462306a36Sopenharmony_ci		rxe_dbg_mr(mr, "iova not aligned");
50562306a36Sopenharmony_ci		return RESPST_ERR_MISALIGNED_ATOMIC;
50662306a36Sopenharmony_ci	}
50762306a36Sopenharmony_ci
50862306a36Sopenharmony_ci	va = kmap_local_page(page);
50962306a36Sopenharmony_ci
51062306a36Sopenharmony_ci	spin_lock_bh(&atomic_ops_lock);
51162306a36Sopenharmony_ci	value = *orig_val = va[page_offset >> 3];
51262306a36Sopenharmony_ci
51362306a36Sopenharmony_ci	if (opcode == IB_OPCODE_RC_COMPARE_SWAP) {
51462306a36Sopenharmony_ci		if (value == compare)
51562306a36Sopenharmony_ci			va[page_offset >> 3] = swap_add;
51662306a36Sopenharmony_ci	} else {
51762306a36Sopenharmony_ci		value += swap_add;
51862306a36Sopenharmony_ci		va[page_offset >> 3] = value;
51962306a36Sopenharmony_ci	}
52062306a36Sopenharmony_ci	spin_unlock_bh(&atomic_ops_lock);
52162306a36Sopenharmony_ci
52262306a36Sopenharmony_ci	kunmap_local(va);
52362306a36Sopenharmony_ci
52462306a36Sopenharmony_ci	return 0;
52562306a36Sopenharmony_ci}
52662306a36Sopenharmony_ci
52762306a36Sopenharmony_ci#if defined CONFIG_64BIT
52862306a36Sopenharmony_ci/* only implemented or called for 64 bit architectures */
52962306a36Sopenharmony_ciint rxe_mr_do_atomic_write(struct rxe_mr *mr, u64 iova, u64 value)
53062306a36Sopenharmony_ci{
53162306a36Sopenharmony_ci	unsigned int page_offset;
53262306a36Sopenharmony_ci	struct page *page;
53362306a36Sopenharmony_ci	u64 *va;
53462306a36Sopenharmony_ci
53562306a36Sopenharmony_ci	/* See IBA oA19-28 */
53662306a36Sopenharmony_ci	if (unlikely(mr->state != RXE_MR_STATE_VALID)) {
53762306a36Sopenharmony_ci		rxe_dbg_mr(mr, "mr not in valid state");
53862306a36Sopenharmony_ci		return RESPST_ERR_RKEY_VIOLATION;
53962306a36Sopenharmony_ci	}
54062306a36Sopenharmony_ci
54162306a36Sopenharmony_ci	if (mr->ibmr.type == IB_MR_TYPE_DMA) {
54262306a36Sopenharmony_ci		page_offset = iova & (PAGE_SIZE - 1);
54362306a36Sopenharmony_ci		page = ib_virt_dma_to_page(iova);
54462306a36Sopenharmony_ci	} else {
54562306a36Sopenharmony_ci		unsigned long index;
54662306a36Sopenharmony_ci		int err;
54762306a36Sopenharmony_ci
54862306a36Sopenharmony_ci		/* See IBA oA19-28 */
54962306a36Sopenharmony_ci		err = mr_check_range(mr, iova, sizeof(value));
55062306a36Sopenharmony_ci		if (unlikely(err)) {
55162306a36Sopenharmony_ci			rxe_dbg_mr(mr, "iova out of range");
55262306a36Sopenharmony_ci			return RESPST_ERR_RKEY_VIOLATION;
55362306a36Sopenharmony_ci		}
55462306a36Sopenharmony_ci		page_offset = rxe_mr_iova_to_page_offset(mr, iova);
55562306a36Sopenharmony_ci		index = rxe_mr_iova_to_index(mr, iova);
55662306a36Sopenharmony_ci		page = xa_load(&mr->page_list, index);
55762306a36Sopenharmony_ci		if (!page)
55862306a36Sopenharmony_ci			return RESPST_ERR_RKEY_VIOLATION;
55962306a36Sopenharmony_ci	}
56062306a36Sopenharmony_ci
56162306a36Sopenharmony_ci	/* See IBA A19.4.2 */
56262306a36Sopenharmony_ci	if (unlikely(page_offset & 0x7)) {
56362306a36Sopenharmony_ci		rxe_dbg_mr(mr, "misaligned address");
56462306a36Sopenharmony_ci		return RESPST_ERR_MISALIGNED_ATOMIC;
56562306a36Sopenharmony_ci	}
56662306a36Sopenharmony_ci
56762306a36Sopenharmony_ci	va = kmap_local_page(page);
56862306a36Sopenharmony_ci
56962306a36Sopenharmony_ci	/* Do atomic write after all prior operations have completed */
57062306a36Sopenharmony_ci	smp_store_release(&va[page_offset >> 3], value);
57162306a36Sopenharmony_ci
57262306a36Sopenharmony_ci	kunmap_local(va);
57362306a36Sopenharmony_ci
57462306a36Sopenharmony_ci	return 0;
57562306a36Sopenharmony_ci}
57662306a36Sopenharmony_ci#else
57762306a36Sopenharmony_ciint rxe_mr_do_atomic_write(struct rxe_mr *mr, u64 iova, u64 value)
57862306a36Sopenharmony_ci{
57962306a36Sopenharmony_ci	return RESPST_ERR_UNSUPPORTED_OPCODE;
58062306a36Sopenharmony_ci}
58162306a36Sopenharmony_ci#endif
58262306a36Sopenharmony_ci
58362306a36Sopenharmony_ciint advance_dma_data(struct rxe_dma_info *dma, unsigned int length)
58462306a36Sopenharmony_ci{
58562306a36Sopenharmony_ci	struct rxe_sge		*sge	= &dma->sge[dma->cur_sge];
58662306a36Sopenharmony_ci	int			offset	= dma->sge_offset;
58762306a36Sopenharmony_ci	int			resid	= dma->resid;
58862306a36Sopenharmony_ci
58962306a36Sopenharmony_ci	while (length) {
59062306a36Sopenharmony_ci		unsigned int bytes;
59162306a36Sopenharmony_ci
59262306a36Sopenharmony_ci		if (offset >= sge->length) {
59362306a36Sopenharmony_ci			sge++;
59462306a36Sopenharmony_ci			dma->cur_sge++;
59562306a36Sopenharmony_ci			offset = 0;
59662306a36Sopenharmony_ci			if (dma->cur_sge >= dma->num_sge)
59762306a36Sopenharmony_ci				return -ENOSPC;
59862306a36Sopenharmony_ci		}
59962306a36Sopenharmony_ci
60062306a36Sopenharmony_ci		bytes = length;
60162306a36Sopenharmony_ci
60262306a36Sopenharmony_ci		if (bytes > sge->length - offset)
60362306a36Sopenharmony_ci			bytes = sge->length - offset;
60462306a36Sopenharmony_ci
60562306a36Sopenharmony_ci		offset	+= bytes;
60662306a36Sopenharmony_ci		resid	-= bytes;
60762306a36Sopenharmony_ci		length	-= bytes;
60862306a36Sopenharmony_ci	}
60962306a36Sopenharmony_ci
61062306a36Sopenharmony_ci	dma->sge_offset = offset;
61162306a36Sopenharmony_ci	dma->resid	= resid;
61262306a36Sopenharmony_ci
61362306a36Sopenharmony_ci	return 0;
61462306a36Sopenharmony_ci}
61562306a36Sopenharmony_ci
61662306a36Sopenharmony_cistruct rxe_mr *lookup_mr(struct rxe_pd *pd, int access, u32 key,
61762306a36Sopenharmony_ci			 enum rxe_mr_lookup_type type)
61862306a36Sopenharmony_ci{
61962306a36Sopenharmony_ci	struct rxe_mr *mr;
62062306a36Sopenharmony_ci	struct rxe_dev *rxe = to_rdev(pd->ibpd.device);
62162306a36Sopenharmony_ci	int index = key >> 8;
62262306a36Sopenharmony_ci
62362306a36Sopenharmony_ci	mr = rxe_pool_get_index(&rxe->mr_pool, index);
62462306a36Sopenharmony_ci	if (!mr)
62562306a36Sopenharmony_ci		return NULL;
62662306a36Sopenharmony_ci
62762306a36Sopenharmony_ci	if (unlikely((type == RXE_LOOKUP_LOCAL && mr->lkey != key) ||
62862306a36Sopenharmony_ci		     (type == RXE_LOOKUP_REMOTE && mr->rkey != key) ||
62962306a36Sopenharmony_ci		     mr_pd(mr) != pd || ((access & mr->access) != access) ||
63062306a36Sopenharmony_ci		     mr->state != RXE_MR_STATE_VALID)) {
63162306a36Sopenharmony_ci		rxe_put(mr);
63262306a36Sopenharmony_ci		mr = NULL;
63362306a36Sopenharmony_ci	}
63462306a36Sopenharmony_ci
63562306a36Sopenharmony_ci	return mr;
63662306a36Sopenharmony_ci}
63762306a36Sopenharmony_ci
63862306a36Sopenharmony_ciint rxe_invalidate_mr(struct rxe_qp *qp, u32 key)
63962306a36Sopenharmony_ci{
64062306a36Sopenharmony_ci	struct rxe_dev *rxe = to_rdev(qp->ibqp.device);
64162306a36Sopenharmony_ci	struct rxe_mr *mr;
64262306a36Sopenharmony_ci	int remote;
64362306a36Sopenharmony_ci	int ret;
64462306a36Sopenharmony_ci
64562306a36Sopenharmony_ci	mr = rxe_pool_get_index(&rxe->mr_pool, key >> 8);
64662306a36Sopenharmony_ci	if (!mr) {
64762306a36Sopenharmony_ci		rxe_dbg_qp(qp, "No MR for key %#x\n", key);
64862306a36Sopenharmony_ci		ret = -EINVAL;
64962306a36Sopenharmony_ci		goto err;
65062306a36Sopenharmony_ci	}
65162306a36Sopenharmony_ci
65262306a36Sopenharmony_ci	remote = mr->access & RXE_ACCESS_REMOTE;
65362306a36Sopenharmony_ci	if (remote ? (key != mr->rkey) : (key != mr->lkey)) {
65462306a36Sopenharmony_ci		rxe_dbg_mr(mr, "wr key (%#x) doesn't match mr key (%#x)\n",
65562306a36Sopenharmony_ci			key, (remote ? mr->rkey : mr->lkey));
65662306a36Sopenharmony_ci		ret = -EINVAL;
65762306a36Sopenharmony_ci		goto err_drop_ref;
65862306a36Sopenharmony_ci	}
65962306a36Sopenharmony_ci
66062306a36Sopenharmony_ci	if (atomic_read(&mr->num_mw) > 0) {
66162306a36Sopenharmony_ci		rxe_dbg_mr(mr, "Attempt to invalidate an MR while bound to MWs\n");
66262306a36Sopenharmony_ci		ret = -EINVAL;
66362306a36Sopenharmony_ci		goto err_drop_ref;
66462306a36Sopenharmony_ci	}
66562306a36Sopenharmony_ci
66662306a36Sopenharmony_ci	if (unlikely(mr->ibmr.type != IB_MR_TYPE_MEM_REG)) {
66762306a36Sopenharmony_ci		rxe_dbg_mr(mr, "Type (%d) is wrong\n", mr->ibmr.type);
66862306a36Sopenharmony_ci		ret = -EINVAL;
66962306a36Sopenharmony_ci		goto err_drop_ref;
67062306a36Sopenharmony_ci	}
67162306a36Sopenharmony_ci
67262306a36Sopenharmony_ci	mr->state = RXE_MR_STATE_FREE;
67362306a36Sopenharmony_ci	ret = 0;
67462306a36Sopenharmony_ci
67562306a36Sopenharmony_cierr_drop_ref:
67662306a36Sopenharmony_ci	rxe_put(mr);
67762306a36Sopenharmony_cierr:
67862306a36Sopenharmony_ci	return ret;
67962306a36Sopenharmony_ci}
68062306a36Sopenharmony_ci
68162306a36Sopenharmony_ci/* user can (re)register fast MR by executing a REG_MR WQE.
68262306a36Sopenharmony_ci * user is expected to hold a reference on the ib mr until the
68362306a36Sopenharmony_ci * WQE completes.
68462306a36Sopenharmony_ci * Once a fast MR is created this is the only way to change the
68562306a36Sopenharmony_ci * private keys. It is the responsibility of the user to maintain
68662306a36Sopenharmony_ci * the ib mr keys in sync with rxe mr keys.
68762306a36Sopenharmony_ci */
68862306a36Sopenharmony_ciint rxe_reg_fast_mr(struct rxe_qp *qp, struct rxe_send_wqe *wqe)
68962306a36Sopenharmony_ci{
69062306a36Sopenharmony_ci	struct rxe_mr *mr = to_rmr(wqe->wr.wr.reg.mr);
69162306a36Sopenharmony_ci	u32 key = wqe->wr.wr.reg.key;
69262306a36Sopenharmony_ci	u32 access = wqe->wr.wr.reg.access;
69362306a36Sopenharmony_ci
69462306a36Sopenharmony_ci	/* user can only register MR in free state */
69562306a36Sopenharmony_ci	if (unlikely(mr->state != RXE_MR_STATE_FREE)) {
69662306a36Sopenharmony_ci		rxe_dbg_mr(mr, "mr->lkey = 0x%x not free\n", mr->lkey);
69762306a36Sopenharmony_ci		return -EINVAL;
69862306a36Sopenharmony_ci	}
69962306a36Sopenharmony_ci
70062306a36Sopenharmony_ci	/* user can only register mr with qp in same protection domain */
70162306a36Sopenharmony_ci	if (unlikely(qp->ibqp.pd != mr->ibmr.pd)) {
70262306a36Sopenharmony_ci		rxe_dbg_mr(mr, "qp->pd and mr->pd don't match\n");
70362306a36Sopenharmony_ci		return -EINVAL;
70462306a36Sopenharmony_ci	}
70562306a36Sopenharmony_ci
70662306a36Sopenharmony_ci	/* user is only allowed to change key portion of l/rkey */
70762306a36Sopenharmony_ci	if (unlikely((mr->lkey & ~0xff) != (key & ~0xff))) {
70862306a36Sopenharmony_ci		rxe_dbg_mr(mr, "key = 0x%x has wrong index mr->lkey = 0x%x\n",
70962306a36Sopenharmony_ci			key, mr->lkey);
71062306a36Sopenharmony_ci		return -EINVAL;
71162306a36Sopenharmony_ci	}
71262306a36Sopenharmony_ci
71362306a36Sopenharmony_ci	mr->access = access;
71462306a36Sopenharmony_ci	mr->lkey = key;
71562306a36Sopenharmony_ci	mr->rkey = key;
71662306a36Sopenharmony_ci	mr->ibmr.iova = wqe->wr.wr.reg.mr->iova;
71762306a36Sopenharmony_ci	mr->state = RXE_MR_STATE_VALID;
71862306a36Sopenharmony_ci
71962306a36Sopenharmony_ci	return 0;
72062306a36Sopenharmony_ci}
72162306a36Sopenharmony_ci
72262306a36Sopenharmony_civoid rxe_mr_cleanup(struct rxe_pool_elem *elem)
72362306a36Sopenharmony_ci{
72462306a36Sopenharmony_ci	struct rxe_mr *mr = container_of(elem, typeof(*mr), elem);
72562306a36Sopenharmony_ci
72662306a36Sopenharmony_ci	rxe_put(mr_pd(mr));
72762306a36Sopenharmony_ci	ib_umem_release(mr->umem);
72862306a36Sopenharmony_ci
72962306a36Sopenharmony_ci	if (mr->ibmr.type != IB_MR_TYPE_DMA)
73062306a36Sopenharmony_ci		xa_destroy(&mr->page_list);
73162306a36Sopenharmony_ci}
732