162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (c) 2016 Mellanox Technologies Ltd. All rights reserved. 462306a36Sopenharmony_ci * Copyright (c) 2015 System Fabric Works, Inc. All rights reserved. 562306a36Sopenharmony_ci */ 662306a36Sopenharmony_ci 762306a36Sopenharmony_ci#include <linux/libnvdimm.h> 862306a36Sopenharmony_ci 962306a36Sopenharmony_ci#include "rxe.h" 1062306a36Sopenharmony_ci#include "rxe_loc.h" 1162306a36Sopenharmony_ci 1262306a36Sopenharmony_ci/* Return a random 8 bit key value that is 1362306a36Sopenharmony_ci * different than the last_key. Set last_key to -1 1462306a36Sopenharmony_ci * if this is the first key for an MR or MW 1562306a36Sopenharmony_ci */ 1662306a36Sopenharmony_ciu8 rxe_get_next_key(u32 last_key) 1762306a36Sopenharmony_ci{ 1862306a36Sopenharmony_ci u8 key; 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci do { 2162306a36Sopenharmony_ci get_random_bytes(&key, 1); 2262306a36Sopenharmony_ci } while (key == last_key); 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ci return key; 2562306a36Sopenharmony_ci} 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_ciint mr_check_range(struct rxe_mr *mr, u64 iova, size_t length) 2862306a36Sopenharmony_ci{ 2962306a36Sopenharmony_ci switch (mr->ibmr.type) { 3062306a36Sopenharmony_ci case IB_MR_TYPE_DMA: 3162306a36Sopenharmony_ci return 0; 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_ci case IB_MR_TYPE_USER: 3462306a36Sopenharmony_ci case IB_MR_TYPE_MEM_REG: 3562306a36Sopenharmony_ci if (iova < mr->ibmr.iova || 3662306a36Sopenharmony_ci iova + length > mr->ibmr.iova + mr->ibmr.length) { 3762306a36Sopenharmony_ci rxe_dbg_mr(mr, "iova/length out of range"); 3862306a36Sopenharmony_ci return -EINVAL; 3962306a36Sopenharmony_ci } 4062306a36Sopenharmony_ci return 0; 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_ci default: 4362306a36Sopenharmony_ci rxe_dbg_mr(mr, "mr type not supported\n"); 4462306a36Sopenharmony_ci return -EINVAL; 4562306a36Sopenharmony_ci } 4662306a36Sopenharmony_ci} 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_cistatic void rxe_mr_init(int access, struct rxe_mr *mr) 4962306a36Sopenharmony_ci{ 5062306a36Sopenharmony_ci u32 key = mr->elem.index << 8 | rxe_get_next_key(-1); 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci /* set ibmr->l/rkey and also copy into private l/rkey 5362306a36Sopenharmony_ci * for user MRs these will always be the same 5462306a36Sopenharmony_ci * for cases where caller 'owns' the key portion 5562306a36Sopenharmony_ci * they may be different until REG_MR WQE is executed. 5662306a36Sopenharmony_ci */ 5762306a36Sopenharmony_ci mr->lkey = mr->ibmr.lkey = key; 5862306a36Sopenharmony_ci mr->rkey = mr->ibmr.rkey = key; 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_ci mr->access = access; 6162306a36Sopenharmony_ci mr->ibmr.page_size = PAGE_SIZE; 6262306a36Sopenharmony_ci mr->page_mask = PAGE_MASK; 6362306a36Sopenharmony_ci mr->page_shift = PAGE_SHIFT; 6462306a36Sopenharmony_ci mr->state = RXE_MR_STATE_INVALID; 6562306a36Sopenharmony_ci} 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_civoid rxe_mr_init_dma(int access, struct rxe_mr *mr) 6862306a36Sopenharmony_ci{ 6962306a36Sopenharmony_ci rxe_mr_init(access, mr); 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci mr->state = RXE_MR_STATE_VALID; 7262306a36Sopenharmony_ci mr->ibmr.type = IB_MR_TYPE_DMA; 7362306a36Sopenharmony_ci} 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_cistatic unsigned long rxe_mr_iova_to_index(struct rxe_mr *mr, u64 iova) 7662306a36Sopenharmony_ci{ 7762306a36Sopenharmony_ci return (iova >> mr->page_shift) - (mr->ibmr.iova >> mr->page_shift); 7862306a36Sopenharmony_ci} 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_cistatic unsigned long rxe_mr_iova_to_page_offset(struct rxe_mr *mr, u64 iova) 8162306a36Sopenharmony_ci{ 8262306a36Sopenharmony_ci return iova & (mr_page_size(mr) - 1); 8362306a36Sopenharmony_ci} 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_cistatic bool is_pmem_page(struct page *pg) 8662306a36Sopenharmony_ci{ 8762306a36Sopenharmony_ci unsigned long paddr = page_to_phys(pg); 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci return REGION_INTERSECTS == 9062306a36Sopenharmony_ci region_intersects(paddr, PAGE_SIZE, IORESOURCE_MEM, 9162306a36Sopenharmony_ci IORES_DESC_PERSISTENT_MEMORY); 9262306a36Sopenharmony_ci} 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_cistatic int rxe_mr_fill_pages_from_sgt(struct rxe_mr *mr, struct sg_table *sgt) 9562306a36Sopenharmony_ci{ 9662306a36Sopenharmony_ci XA_STATE(xas, &mr->page_list, 0); 9762306a36Sopenharmony_ci struct sg_page_iter sg_iter; 9862306a36Sopenharmony_ci struct page *page; 9962306a36Sopenharmony_ci bool persistent = !!(mr->access & IB_ACCESS_FLUSH_PERSISTENT); 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci __sg_page_iter_start(&sg_iter, sgt->sgl, sgt->orig_nents, 0); 10262306a36Sopenharmony_ci if (!__sg_page_iter_next(&sg_iter)) 10362306a36Sopenharmony_ci return 0; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci do { 10662306a36Sopenharmony_ci xas_lock(&xas); 10762306a36Sopenharmony_ci while (true) { 10862306a36Sopenharmony_ci page = sg_page_iter_page(&sg_iter); 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_ci if (persistent && !is_pmem_page(page)) { 11162306a36Sopenharmony_ci rxe_dbg_mr(mr, "Page can't be persistent\n"); 11262306a36Sopenharmony_ci xas_set_err(&xas, -EINVAL); 11362306a36Sopenharmony_ci break; 11462306a36Sopenharmony_ci } 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci xas_store(&xas, page); 11762306a36Sopenharmony_ci if (xas_error(&xas)) 11862306a36Sopenharmony_ci break; 11962306a36Sopenharmony_ci xas_next(&xas); 12062306a36Sopenharmony_ci if (!__sg_page_iter_next(&sg_iter)) 12162306a36Sopenharmony_ci break; 12262306a36Sopenharmony_ci } 12362306a36Sopenharmony_ci xas_unlock(&xas); 12462306a36Sopenharmony_ci } while (xas_nomem(&xas, GFP_KERNEL)); 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_ci return xas_error(&xas); 12762306a36Sopenharmony_ci} 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_ciint rxe_mr_init_user(struct rxe_dev *rxe, u64 start, u64 length, u64 iova, 13062306a36Sopenharmony_ci int access, struct rxe_mr *mr) 13162306a36Sopenharmony_ci{ 13262306a36Sopenharmony_ci struct ib_umem *umem; 13362306a36Sopenharmony_ci int err; 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_ci rxe_mr_init(access, mr); 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci xa_init(&mr->page_list); 13862306a36Sopenharmony_ci 13962306a36Sopenharmony_ci umem = ib_umem_get(&rxe->ib_dev, start, length, access); 14062306a36Sopenharmony_ci if (IS_ERR(umem)) { 14162306a36Sopenharmony_ci rxe_dbg_mr(mr, "Unable to pin memory region err = %d\n", 14262306a36Sopenharmony_ci (int)PTR_ERR(umem)); 14362306a36Sopenharmony_ci return PTR_ERR(umem); 14462306a36Sopenharmony_ci } 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci err = rxe_mr_fill_pages_from_sgt(mr, &umem->sgt_append.sgt); 14762306a36Sopenharmony_ci if (err) { 14862306a36Sopenharmony_ci ib_umem_release(umem); 14962306a36Sopenharmony_ci return err; 15062306a36Sopenharmony_ci } 15162306a36Sopenharmony_ci 15262306a36Sopenharmony_ci mr->umem = umem; 15362306a36Sopenharmony_ci mr->ibmr.type = IB_MR_TYPE_USER; 15462306a36Sopenharmony_ci mr->state = RXE_MR_STATE_VALID; 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci return 0; 15762306a36Sopenharmony_ci} 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_cistatic int rxe_mr_alloc(struct rxe_mr *mr, int num_buf) 16062306a36Sopenharmony_ci{ 16162306a36Sopenharmony_ci XA_STATE(xas, &mr->page_list, 0); 16262306a36Sopenharmony_ci int i = 0; 16362306a36Sopenharmony_ci int err; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci xa_init(&mr->page_list); 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_ci do { 16862306a36Sopenharmony_ci xas_lock(&xas); 16962306a36Sopenharmony_ci while (i != num_buf) { 17062306a36Sopenharmony_ci xas_store(&xas, XA_ZERO_ENTRY); 17162306a36Sopenharmony_ci if (xas_error(&xas)) 17262306a36Sopenharmony_ci break; 17362306a36Sopenharmony_ci xas_next(&xas); 17462306a36Sopenharmony_ci i++; 17562306a36Sopenharmony_ci } 17662306a36Sopenharmony_ci xas_unlock(&xas); 17762306a36Sopenharmony_ci } while (xas_nomem(&xas, GFP_KERNEL)); 17862306a36Sopenharmony_ci 17962306a36Sopenharmony_ci err = xas_error(&xas); 18062306a36Sopenharmony_ci if (err) 18162306a36Sopenharmony_ci return err; 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_ci mr->num_buf = num_buf; 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci return 0; 18662306a36Sopenharmony_ci} 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ciint rxe_mr_init_fast(int max_pages, struct rxe_mr *mr) 18962306a36Sopenharmony_ci{ 19062306a36Sopenharmony_ci int err; 19162306a36Sopenharmony_ci 19262306a36Sopenharmony_ci /* always allow remote access for FMRs */ 19362306a36Sopenharmony_ci rxe_mr_init(RXE_ACCESS_REMOTE, mr); 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci err = rxe_mr_alloc(mr, max_pages); 19662306a36Sopenharmony_ci if (err) 19762306a36Sopenharmony_ci goto err1; 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_ci mr->state = RXE_MR_STATE_FREE; 20062306a36Sopenharmony_ci mr->ibmr.type = IB_MR_TYPE_MEM_REG; 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_ci return 0; 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_cierr1: 20562306a36Sopenharmony_ci return err; 20662306a36Sopenharmony_ci} 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_cistatic int rxe_set_page(struct ib_mr *ibmr, u64 dma_addr) 20962306a36Sopenharmony_ci{ 21062306a36Sopenharmony_ci struct rxe_mr *mr = to_rmr(ibmr); 21162306a36Sopenharmony_ci struct page *page = ib_virt_dma_to_page(dma_addr); 21262306a36Sopenharmony_ci bool persistent = !!(mr->access & IB_ACCESS_FLUSH_PERSISTENT); 21362306a36Sopenharmony_ci int err; 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_ci if (persistent && !is_pmem_page(page)) { 21662306a36Sopenharmony_ci rxe_dbg_mr(mr, "Page cannot be persistent\n"); 21762306a36Sopenharmony_ci return -EINVAL; 21862306a36Sopenharmony_ci } 21962306a36Sopenharmony_ci 22062306a36Sopenharmony_ci if (unlikely(mr->nbuf == mr->num_buf)) 22162306a36Sopenharmony_ci return -ENOMEM; 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci err = xa_err(xa_store(&mr->page_list, mr->nbuf, page, GFP_KERNEL)); 22462306a36Sopenharmony_ci if (err) 22562306a36Sopenharmony_ci return err; 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ci mr->nbuf++; 22862306a36Sopenharmony_ci return 0; 22962306a36Sopenharmony_ci} 23062306a36Sopenharmony_ci 23162306a36Sopenharmony_ciint rxe_map_mr_sg(struct ib_mr *ibmr, struct scatterlist *sgl, 23262306a36Sopenharmony_ci int sg_nents, unsigned int *sg_offset) 23362306a36Sopenharmony_ci{ 23462306a36Sopenharmony_ci struct rxe_mr *mr = to_rmr(ibmr); 23562306a36Sopenharmony_ci unsigned int page_size = mr_page_size(mr); 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_ci mr->nbuf = 0; 23862306a36Sopenharmony_ci mr->page_shift = ilog2(page_size); 23962306a36Sopenharmony_ci mr->page_mask = ~((u64)page_size - 1); 24062306a36Sopenharmony_ci mr->page_offset = mr->ibmr.iova & (page_size - 1); 24162306a36Sopenharmony_ci 24262306a36Sopenharmony_ci return ib_sg_to_pages(ibmr, sgl, sg_nents, sg_offset, rxe_set_page); 24362306a36Sopenharmony_ci} 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_cistatic int rxe_mr_copy_xarray(struct rxe_mr *mr, u64 iova, void *addr, 24662306a36Sopenharmony_ci unsigned int length, enum rxe_mr_copy_dir dir) 24762306a36Sopenharmony_ci{ 24862306a36Sopenharmony_ci unsigned int page_offset = rxe_mr_iova_to_page_offset(mr, iova); 24962306a36Sopenharmony_ci unsigned long index = rxe_mr_iova_to_index(mr, iova); 25062306a36Sopenharmony_ci unsigned int bytes; 25162306a36Sopenharmony_ci struct page *page; 25262306a36Sopenharmony_ci void *va; 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ci while (length) { 25562306a36Sopenharmony_ci page = xa_load(&mr->page_list, index); 25662306a36Sopenharmony_ci if (!page) 25762306a36Sopenharmony_ci return -EFAULT; 25862306a36Sopenharmony_ci 25962306a36Sopenharmony_ci bytes = min_t(unsigned int, length, 26062306a36Sopenharmony_ci mr_page_size(mr) - page_offset); 26162306a36Sopenharmony_ci va = kmap_local_page(page); 26262306a36Sopenharmony_ci if (dir == RXE_FROM_MR_OBJ) 26362306a36Sopenharmony_ci memcpy(addr, va + page_offset, bytes); 26462306a36Sopenharmony_ci else 26562306a36Sopenharmony_ci memcpy(va + page_offset, addr, bytes); 26662306a36Sopenharmony_ci kunmap_local(va); 26762306a36Sopenharmony_ci 26862306a36Sopenharmony_ci page_offset = 0; 26962306a36Sopenharmony_ci addr += bytes; 27062306a36Sopenharmony_ci length -= bytes; 27162306a36Sopenharmony_ci index++; 27262306a36Sopenharmony_ci } 27362306a36Sopenharmony_ci 27462306a36Sopenharmony_ci return 0; 27562306a36Sopenharmony_ci} 27662306a36Sopenharmony_ci 27762306a36Sopenharmony_cistatic void rxe_mr_copy_dma(struct rxe_mr *mr, u64 dma_addr, void *addr, 27862306a36Sopenharmony_ci unsigned int length, enum rxe_mr_copy_dir dir) 27962306a36Sopenharmony_ci{ 28062306a36Sopenharmony_ci unsigned int page_offset = dma_addr & (PAGE_SIZE - 1); 28162306a36Sopenharmony_ci unsigned int bytes; 28262306a36Sopenharmony_ci struct page *page; 28362306a36Sopenharmony_ci u8 *va; 28462306a36Sopenharmony_ci 28562306a36Sopenharmony_ci while (length) { 28662306a36Sopenharmony_ci page = ib_virt_dma_to_page(dma_addr); 28762306a36Sopenharmony_ci bytes = min_t(unsigned int, length, 28862306a36Sopenharmony_ci PAGE_SIZE - page_offset); 28962306a36Sopenharmony_ci va = kmap_local_page(page); 29062306a36Sopenharmony_ci 29162306a36Sopenharmony_ci if (dir == RXE_TO_MR_OBJ) 29262306a36Sopenharmony_ci memcpy(va + page_offset, addr, bytes); 29362306a36Sopenharmony_ci else 29462306a36Sopenharmony_ci memcpy(addr, va + page_offset, bytes); 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci kunmap_local(va); 29762306a36Sopenharmony_ci page_offset = 0; 29862306a36Sopenharmony_ci dma_addr += bytes; 29962306a36Sopenharmony_ci addr += bytes; 30062306a36Sopenharmony_ci length -= bytes; 30162306a36Sopenharmony_ci } 30262306a36Sopenharmony_ci} 30362306a36Sopenharmony_ci 30462306a36Sopenharmony_ciint rxe_mr_copy(struct rxe_mr *mr, u64 iova, void *addr, 30562306a36Sopenharmony_ci unsigned int length, enum rxe_mr_copy_dir dir) 30662306a36Sopenharmony_ci{ 30762306a36Sopenharmony_ci int err; 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci if (length == 0) 31062306a36Sopenharmony_ci return 0; 31162306a36Sopenharmony_ci 31262306a36Sopenharmony_ci if (WARN_ON(!mr)) 31362306a36Sopenharmony_ci return -EINVAL; 31462306a36Sopenharmony_ci 31562306a36Sopenharmony_ci if (mr->ibmr.type == IB_MR_TYPE_DMA) { 31662306a36Sopenharmony_ci rxe_mr_copy_dma(mr, iova, addr, length, dir); 31762306a36Sopenharmony_ci return 0; 31862306a36Sopenharmony_ci } 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci err = mr_check_range(mr, iova, length); 32162306a36Sopenharmony_ci if (unlikely(err)) { 32262306a36Sopenharmony_ci rxe_dbg_mr(mr, "iova out of range"); 32362306a36Sopenharmony_ci return err; 32462306a36Sopenharmony_ci } 32562306a36Sopenharmony_ci 32662306a36Sopenharmony_ci return rxe_mr_copy_xarray(mr, iova, addr, length, dir); 32762306a36Sopenharmony_ci} 32862306a36Sopenharmony_ci 32962306a36Sopenharmony_ci/* copy data in or out of a wqe, i.e. sg list 33062306a36Sopenharmony_ci * under the control of a dma descriptor 33162306a36Sopenharmony_ci */ 33262306a36Sopenharmony_ciint copy_data( 33362306a36Sopenharmony_ci struct rxe_pd *pd, 33462306a36Sopenharmony_ci int access, 33562306a36Sopenharmony_ci struct rxe_dma_info *dma, 33662306a36Sopenharmony_ci void *addr, 33762306a36Sopenharmony_ci int length, 33862306a36Sopenharmony_ci enum rxe_mr_copy_dir dir) 33962306a36Sopenharmony_ci{ 34062306a36Sopenharmony_ci int bytes; 34162306a36Sopenharmony_ci struct rxe_sge *sge = &dma->sge[dma->cur_sge]; 34262306a36Sopenharmony_ci int offset = dma->sge_offset; 34362306a36Sopenharmony_ci int resid = dma->resid; 34462306a36Sopenharmony_ci struct rxe_mr *mr = NULL; 34562306a36Sopenharmony_ci u64 iova; 34662306a36Sopenharmony_ci int err; 34762306a36Sopenharmony_ci 34862306a36Sopenharmony_ci if (length == 0) 34962306a36Sopenharmony_ci return 0; 35062306a36Sopenharmony_ci 35162306a36Sopenharmony_ci if (length > resid) { 35262306a36Sopenharmony_ci err = -EINVAL; 35362306a36Sopenharmony_ci goto err2; 35462306a36Sopenharmony_ci } 35562306a36Sopenharmony_ci 35662306a36Sopenharmony_ci if (sge->length && (offset < sge->length)) { 35762306a36Sopenharmony_ci mr = lookup_mr(pd, access, sge->lkey, RXE_LOOKUP_LOCAL); 35862306a36Sopenharmony_ci if (!mr) { 35962306a36Sopenharmony_ci err = -EINVAL; 36062306a36Sopenharmony_ci goto err1; 36162306a36Sopenharmony_ci } 36262306a36Sopenharmony_ci } 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_ci while (length > 0) { 36562306a36Sopenharmony_ci bytes = length; 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci if (offset >= sge->length) { 36862306a36Sopenharmony_ci if (mr) { 36962306a36Sopenharmony_ci rxe_put(mr); 37062306a36Sopenharmony_ci mr = NULL; 37162306a36Sopenharmony_ci } 37262306a36Sopenharmony_ci sge++; 37362306a36Sopenharmony_ci dma->cur_sge++; 37462306a36Sopenharmony_ci offset = 0; 37562306a36Sopenharmony_ci 37662306a36Sopenharmony_ci if (dma->cur_sge >= dma->num_sge) { 37762306a36Sopenharmony_ci err = -ENOSPC; 37862306a36Sopenharmony_ci goto err2; 37962306a36Sopenharmony_ci } 38062306a36Sopenharmony_ci 38162306a36Sopenharmony_ci if (sge->length) { 38262306a36Sopenharmony_ci mr = lookup_mr(pd, access, sge->lkey, 38362306a36Sopenharmony_ci RXE_LOOKUP_LOCAL); 38462306a36Sopenharmony_ci if (!mr) { 38562306a36Sopenharmony_ci err = -EINVAL; 38662306a36Sopenharmony_ci goto err1; 38762306a36Sopenharmony_ci } 38862306a36Sopenharmony_ci } else { 38962306a36Sopenharmony_ci continue; 39062306a36Sopenharmony_ci } 39162306a36Sopenharmony_ci } 39262306a36Sopenharmony_ci 39362306a36Sopenharmony_ci if (bytes > sge->length - offset) 39462306a36Sopenharmony_ci bytes = sge->length - offset; 39562306a36Sopenharmony_ci 39662306a36Sopenharmony_ci if (bytes > 0) { 39762306a36Sopenharmony_ci iova = sge->addr + offset; 39862306a36Sopenharmony_ci err = rxe_mr_copy(mr, iova, addr, bytes, dir); 39962306a36Sopenharmony_ci if (err) 40062306a36Sopenharmony_ci goto err2; 40162306a36Sopenharmony_ci 40262306a36Sopenharmony_ci offset += bytes; 40362306a36Sopenharmony_ci resid -= bytes; 40462306a36Sopenharmony_ci length -= bytes; 40562306a36Sopenharmony_ci addr += bytes; 40662306a36Sopenharmony_ci } 40762306a36Sopenharmony_ci } 40862306a36Sopenharmony_ci 40962306a36Sopenharmony_ci dma->sge_offset = offset; 41062306a36Sopenharmony_ci dma->resid = resid; 41162306a36Sopenharmony_ci 41262306a36Sopenharmony_ci if (mr) 41362306a36Sopenharmony_ci rxe_put(mr); 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_ci return 0; 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_cierr2: 41862306a36Sopenharmony_ci if (mr) 41962306a36Sopenharmony_ci rxe_put(mr); 42062306a36Sopenharmony_cierr1: 42162306a36Sopenharmony_ci return err; 42262306a36Sopenharmony_ci} 42362306a36Sopenharmony_ci 42462306a36Sopenharmony_ciint rxe_flush_pmem_iova(struct rxe_mr *mr, u64 iova, unsigned int length) 42562306a36Sopenharmony_ci{ 42662306a36Sopenharmony_ci unsigned int page_offset; 42762306a36Sopenharmony_ci unsigned long index; 42862306a36Sopenharmony_ci struct page *page; 42962306a36Sopenharmony_ci unsigned int bytes; 43062306a36Sopenharmony_ci int err; 43162306a36Sopenharmony_ci u8 *va; 43262306a36Sopenharmony_ci 43362306a36Sopenharmony_ci /* mr must be valid even if length is zero */ 43462306a36Sopenharmony_ci if (WARN_ON(!mr)) 43562306a36Sopenharmony_ci return -EINVAL; 43662306a36Sopenharmony_ci 43762306a36Sopenharmony_ci if (length == 0) 43862306a36Sopenharmony_ci return 0; 43962306a36Sopenharmony_ci 44062306a36Sopenharmony_ci if (mr->ibmr.type == IB_MR_TYPE_DMA) 44162306a36Sopenharmony_ci return -EFAULT; 44262306a36Sopenharmony_ci 44362306a36Sopenharmony_ci err = mr_check_range(mr, iova, length); 44462306a36Sopenharmony_ci if (err) 44562306a36Sopenharmony_ci return err; 44662306a36Sopenharmony_ci 44762306a36Sopenharmony_ci while (length > 0) { 44862306a36Sopenharmony_ci index = rxe_mr_iova_to_index(mr, iova); 44962306a36Sopenharmony_ci page = xa_load(&mr->page_list, index); 45062306a36Sopenharmony_ci page_offset = rxe_mr_iova_to_page_offset(mr, iova); 45162306a36Sopenharmony_ci if (!page) 45262306a36Sopenharmony_ci return -EFAULT; 45362306a36Sopenharmony_ci bytes = min_t(unsigned int, length, 45462306a36Sopenharmony_ci mr_page_size(mr) - page_offset); 45562306a36Sopenharmony_ci 45662306a36Sopenharmony_ci va = kmap_local_page(page); 45762306a36Sopenharmony_ci arch_wb_cache_pmem(va + page_offset, bytes); 45862306a36Sopenharmony_ci kunmap_local(va); 45962306a36Sopenharmony_ci 46062306a36Sopenharmony_ci length -= bytes; 46162306a36Sopenharmony_ci iova += bytes; 46262306a36Sopenharmony_ci page_offset = 0; 46362306a36Sopenharmony_ci } 46462306a36Sopenharmony_ci 46562306a36Sopenharmony_ci return 0; 46662306a36Sopenharmony_ci} 46762306a36Sopenharmony_ci 46862306a36Sopenharmony_ci/* Guarantee atomicity of atomic operations at the machine level. */ 46962306a36Sopenharmony_cistatic DEFINE_SPINLOCK(atomic_ops_lock); 47062306a36Sopenharmony_ci 47162306a36Sopenharmony_ciint rxe_mr_do_atomic_op(struct rxe_mr *mr, u64 iova, int opcode, 47262306a36Sopenharmony_ci u64 compare, u64 swap_add, u64 *orig_val) 47362306a36Sopenharmony_ci{ 47462306a36Sopenharmony_ci unsigned int page_offset; 47562306a36Sopenharmony_ci struct page *page; 47662306a36Sopenharmony_ci u64 value; 47762306a36Sopenharmony_ci u64 *va; 47862306a36Sopenharmony_ci 47962306a36Sopenharmony_ci if (unlikely(mr->state != RXE_MR_STATE_VALID)) { 48062306a36Sopenharmony_ci rxe_dbg_mr(mr, "mr not in valid state"); 48162306a36Sopenharmony_ci return RESPST_ERR_RKEY_VIOLATION; 48262306a36Sopenharmony_ci } 48362306a36Sopenharmony_ci 48462306a36Sopenharmony_ci if (mr->ibmr.type == IB_MR_TYPE_DMA) { 48562306a36Sopenharmony_ci page_offset = iova & (PAGE_SIZE - 1); 48662306a36Sopenharmony_ci page = ib_virt_dma_to_page(iova); 48762306a36Sopenharmony_ci } else { 48862306a36Sopenharmony_ci unsigned long index; 48962306a36Sopenharmony_ci int err; 49062306a36Sopenharmony_ci 49162306a36Sopenharmony_ci err = mr_check_range(mr, iova, sizeof(value)); 49262306a36Sopenharmony_ci if (err) { 49362306a36Sopenharmony_ci rxe_dbg_mr(mr, "iova out of range"); 49462306a36Sopenharmony_ci return RESPST_ERR_RKEY_VIOLATION; 49562306a36Sopenharmony_ci } 49662306a36Sopenharmony_ci page_offset = rxe_mr_iova_to_page_offset(mr, iova); 49762306a36Sopenharmony_ci index = rxe_mr_iova_to_index(mr, iova); 49862306a36Sopenharmony_ci page = xa_load(&mr->page_list, index); 49962306a36Sopenharmony_ci if (!page) 50062306a36Sopenharmony_ci return RESPST_ERR_RKEY_VIOLATION; 50162306a36Sopenharmony_ci } 50262306a36Sopenharmony_ci 50362306a36Sopenharmony_ci if (unlikely(page_offset & 0x7)) { 50462306a36Sopenharmony_ci rxe_dbg_mr(mr, "iova not aligned"); 50562306a36Sopenharmony_ci return RESPST_ERR_MISALIGNED_ATOMIC; 50662306a36Sopenharmony_ci } 50762306a36Sopenharmony_ci 50862306a36Sopenharmony_ci va = kmap_local_page(page); 50962306a36Sopenharmony_ci 51062306a36Sopenharmony_ci spin_lock_bh(&atomic_ops_lock); 51162306a36Sopenharmony_ci value = *orig_val = va[page_offset >> 3]; 51262306a36Sopenharmony_ci 51362306a36Sopenharmony_ci if (opcode == IB_OPCODE_RC_COMPARE_SWAP) { 51462306a36Sopenharmony_ci if (value == compare) 51562306a36Sopenharmony_ci va[page_offset >> 3] = swap_add; 51662306a36Sopenharmony_ci } else { 51762306a36Sopenharmony_ci value += swap_add; 51862306a36Sopenharmony_ci va[page_offset >> 3] = value; 51962306a36Sopenharmony_ci } 52062306a36Sopenharmony_ci spin_unlock_bh(&atomic_ops_lock); 52162306a36Sopenharmony_ci 52262306a36Sopenharmony_ci kunmap_local(va); 52362306a36Sopenharmony_ci 52462306a36Sopenharmony_ci return 0; 52562306a36Sopenharmony_ci} 52662306a36Sopenharmony_ci 52762306a36Sopenharmony_ci#if defined CONFIG_64BIT 52862306a36Sopenharmony_ci/* only implemented or called for 64 bit architectures */ 52962306a36Sopenharmony_ciint rxe_mr_do_atomic_write(struct rxe_mr *mr, u64 iova, u64 value) 53062306a36Sopenharmony_ci{ 53162306a36Sopenharmony_ci unsigned int page_offset; 53262306a36Sopenharmony_ci struct page *page; 53362306a36Sopenharmony_ci u64 *va; 53462306a36Sopenharmony_ci 53562306a36Sopenharmony_ci /* See IBA oA19-28 */ 53662306a36Sopenharmony_ci if (unlikely(mr->state != RXE_MR_STATE_VALID)) { 53762306a36Sopenharmony_ci rxe_dbg_mr(mr, "mr not in valid state"); 53862306a36Sopenharmony_ci return RESPST_ERR_RKEY_VIOLATION; 53962306a36Sopenharmony_ci } 54062306a36Sopenharmony_ci 54162306a36Sopenharmony_ci if (mr->ibmr.type == IB_MR_TYPE_DMA) { 54262306a36Sopenharmony_ci page_offset = iova & (PAGE_SIZE - 1); 54362306a36Sopenharmony_ci page = ib_virt_dma_to_page(iova); 54462306a36Sopenharmony_ci } else { 54562306a36Sopenharmony_ci unsigned long index; 54662306a36Sopenharmony_ci int err; 54762306a36Sopenharmony_ci 54862306a36Sopenharmony_ci /* See IBA oA19-28 */ 54962306a36Sopenharmony_ci err = mr_check_range(mr, iova, sizeof(value)); 55062306a36Sopenharmony_ci if (unlikely(err)) { 55162306a36Sopenharmony_ci rxe_dbg_mr(mr, "iova out of range"); 55262306a36Sopenharmony_ci return RESPST_ERR_RKEY_VIOLATION; 55362306a36Sopenharmony_ci } 55462306a36Sopenharmony_ci page_offset = rxe_mr_iova_to_page_offset(mr, iova); 55562306a36Sopenharmony_ci index = rxe_mr_iova_to_index(mr, iova); 55662306a36Sopenharmony_ci page = xa_load(&mr->page_list, index); 55762306a36Sopenharmony_ci if (!page) 55862306a36Sopenharmony_ci return RESPST_ERR_RKEY_VIOLATION; 55962306a36Sopenharmony_ci } 56062306a36Sopenharmony_ci 56162306a36Sopenharmony_ci /* See IBA A19.4.2 */ 56262306a36Sopenharmony_ci if (unlikely(page_offset & 0x7)) { 56362306a36Sopenharmony_ci rxe_dbg_mr(mr, "misaligned address"); 56462306a36Sopenharmony_ci return RESPST_ERR_MISALIGNED_ATOMIC; 56562306a36Sopenharmony_ci } 56662306a36Sopenharmony_ci 56762306a36Sopenharmony_ci va = kmap_local_page(page); 56862306a36Sopenharmony_ci 56962306a36Sopenharmony_ci /* Do atomic write after all prior operations have completed */ 57062306a36Sopenharmony_ci smp_store_release(&va[page_offset >> 3], value); 57162306a36Sopenharmony_ci 57262306a36Sopenharmony_ci kunmap_local(va); 57362306a36Sopenharmony_ci 57462306a36Sopenharmony_ci return 0; 57562306a36Sopenharmony_ci} 57662306a36Sopenharmony_ci#else 57762306a36Sopenharmony_ciint rxe_mr_do_atomic_write(struct rxe_mr *mr, u64 iova, u64 value) 57862306a36Sopenharmony_ci{ 57962306a36Sopenharmony_ci return RESPST_ERR_UNSUPPORTED_OPCODE; 58062306a36Sopenharmony_ci} 58162306a36Sopenharmony_ci#endif 58262306a36Sopenharmony_ci 58362306a36Sopenharmony_ciint advance_dma_data(struct rxe_dma_info *dma, unsigned int length) 58462306a36Sopenharmony_ci{ 58562306a36Sopenharmony_ci struct rxe_sge *sge = &dma->sge[dma->cur_sge]; 58662306a36Sopenharmony_ci int offset = dma->sge_offset; 58762306a36Sopenharmony_ci int resid = dma->resid; 58862306a36Sopenharmony_ci 58962306a36Sopenharmony_ci while (length) { 59062306a36Sopenharmony_ci unsigned int bytes; 59162306a36Sopenharmony_ci 59262306a36Sopenharmony_ci if (offset >= sge->length) { 59362306a36Sopenharmony_ci sge++; 59462306a36Sopenharmony_ci dma->cur_sge++; 59562306a36Sopenharmony_ci offset = 0; 59662306a36Sopenharmony_ci if (dma->cur_sge >= dma->num_sge) 59762306a36Sopenharmony_ci return -ENOSPC; 59862306a36Sopenharmony_ci } 59962306a36Sopenharmony_ci 60062306a36Sopenharmony_ci bytes = length; 60162306a36Sopenharmony_ci 60262306a36Sopenharmony_ci if (bytes > sge->length - offset) 60362306a36Sopenharmony_ci bytes = sge->length - offset; 60462306a36Sopenharmony_ci 60562306a36Sopenharmony_ci offset += bytes; 60662306a36Sopenharmony_ci resid -= bytes; 60762306a36Sopenharmony_ci length -= bytes; 60862306a36Sopenharmony_ci } 60962306a36Sopenharmony_ci 61062306a36Sopenharmony_ci dma->sge_offset = offset; 61162306a36Sopenharmony_ci dma->resid = resid; 61262306a36Sopenharmony_ci 61362306a36Sopenharmony_ci return 0; 61462306a36Sopenharmony_ci} 61562306a36Sopenharmony_ci 61662306a36Sopenharmony_cistruct rxe_mr *lookup_mr(struct rxe_pd *pd, int access, u32 key, 61762306a36Sopenharmony_ci enum rxe_mr_lookup_type type) 61862306a36Sopenharmony_ci{ 61962306a36Sopenharmony_ci struct rxe_mr *mr; 62062306a36Sopenharmony_ci struct rxe_dev *rxe = to_rdev(pd->ibpd.device); 62162306a36Sopenharmony_ci int index = key >> 8; 62262306a36Sopenharmony_ci 62362306a36Sopenharmony_ci mr = rxe_pool_get_index(&rxe->mr_pool, index); 62462306a36Sopenharmony_ci if (!mr) 62562306a36Sopenharmony_ci return NULL; 62662306a36Sopenharmony_ci 62762306a36Sopenharmony_ci if (unlikely((type == RXE_LOOKUP_LOCAL && mr->lkey != key) || 62862306a36Sopenharmony_ci (type == RXE_LOOKUP_REMOTE && mr->rkey != key) || 62962306a36Sopenharmony_ci mr_pd(mr) != pd || ((access & mr->access) != access) || 63062306a36Sopenharmony_ci mr->state != RXE_MR_STATE_VALID)) { 63162306a36Sopenharmony_ci rxe_put(mr); 63262306a36Sopenharmony_ci mr = NULL; 63362306a36Sopenharmony_ci } 63462306a36Sopenharmony_ci 63562306a36Sopenharmony_ci return mr; 63662306a36Sopenharmony_ci} 63762306a36Sopenharmony_ci 63862306a36Sopenharmony_ciint rxe_invalidate_mr(struct rxe_qp *qp, u32 key) 63962306a36Sopenharmony_ci{ 64062306a36Sopenharmony_ci struct rxe_dev *rxe = to_rdev(qp->ibqp.device); 64162306a36Sopenharmony_ci struct rxe_mr *mr; 64262306a36Sopenharmony_ci int remote; 64362306a36Sopenharmony_ci int ret; 64462306a36Sopenharmony_ci 64562306a36Sopenharmony_ci mr = rxe_pool_get_index(&rxe->mr_pool, key >> 8); 64662306a36Sopenharmony_ci if (!mr) { 64762306a36Sopenharmony_ci rxe_dbg_qp(qp, "No MR for key %#x\n", key); 64862306a36Sopenharmony_ci ret = -EINVAL; 64962306a36Sopenharmony_ci goto err; 65062306a36Sopenharmony_ci } 65162306a36Sopenharmony_ci 65262306a36Sopenharmony_ci remote = mr->access & RXE_ACCESS_REMOTE; 65362306a36Sopenharmony_ci if (remote ? (key != mr->rkey) : (key != mr->lkey)) { 65462306a36Sopenharmony_ci rxe_dbg_mr(mr, "wr key (%#x) doesn't match mr key (%#x)\n", 65562306a36Sopenharmony_ci key, (remote ? mr->rkey : mr->lkey)); 65662306a36Sopenharmony_ci ret = -EINVAL; 65762306a36Sopenharmony_ci goto err_drop_ref; 65862306a36Sopenharmony_ci } 65962306a36Sopenharmony_ci 66062306a36Sopenharmony_ci if (atomic_read(&mr->num_mw) > 0) { 66162306a36Sopenharmony_ci rxe_dbg_mr(mr, "Attempt to invalidate an MR while bound to MWs\n"); 66262306a36Sopenharmony_ci ret = -EINVAL; 66362306a36Sopenharmony_ci goto err_drop_ref; 66462306a36Sopenharmony_ci } 66562306a36Sopenharmony_ci 66662306a36Sopenharmony_ci if (unlikely(mr->ibmr.type != IB_MR_TYPE_MEM_REG)) { 66762306a36Sopenharmony_ci rxe_dbg_mr(mr, "Type (%d) is wrong\n", mr->ibmr.type); 66862306a36Sopenharmony_ci ret = -EINVAL; 66962306a36Sopenharmony_ci goto err_drop_ref; 67062306a36Sopenharmony_ci } 67162306a36Sopenharmony_ci 67262306a36Sopenharmony_ci mr->state = RXE_MR_STATE_FREE; 67362306a36Sopenharmony_ci ret = 0; 67462306a36Sopenharmony_ci 67562306a36Sopenharmony_cierr_drop_ref: 67662306a36Sopenharmony_ci rxe_put(mr); 67762306a36Sopenharmony_cierr: 67862306a36Sopenharmony_ci return ret; 67962306a36Sopenharmony_ci} 68062306a36Sopenharmony_ci 68162306a36Sopenharmony_ci/* user can (re)register fast MR by executing a REG_MR WQE. 68262306a36Sopenharmony_ci * user is expected to hold a reference on the ib mr until the 68362306a36Sopenharmony_ci * WQE completes. 68462306a36Sopenharmony_ci * Once a fast MR is created this is the only way to change the 68562306a36Sopenharmony_ci * private keys. It is the responsibility of the user to maintain 68662306a36Sopenharmony_ci * the ib mr keys in sync with rxe mr keys. 68762306a36Sopenharmony_ci */ 68862306a36Sopenharmony_ciint rxe_reg_fast_mr(struct rxe_qp *qp, struct rxe_send_wqe *wqe) 68962306a36Sopenharmony_ci{ 69062306a36Sopenharmony_ci struct rxe_mr *mr = to_rmr(wqe->wr.wr.reg.mr); 69162306a36Sopenharmony_ci u32 key = wqe->wr.wr.reg.key; 69262306a36Sopenharmony_ci u32 access = wqe->wr.wr.reg.access; 69362306a36Sopenharmony_ci 69462306a36Sopenharmony_ci /* user can only register MR in free state */ 69562306a36Sopenharmony_ci if (unlikely(mr->state != RXE_MR_STATE_FREE)) { 69662306a36Sopenharmony_ci rxe_dbg_mr(mr, "mr->lkey = 0x%x not free\n", mr->lkey); 69762306a36Sopenharmony_ci return -EINVAL; 69862306a36Sopenharmony_ci } 69962306a36Sopenharmony_ci 70062306a36Sopenharmony_ci /* user can only register mr with qp in same protection domain */ 70162306a36Sopenharmony_ci if (unlikely(qp->ibqp.pd != mr->ibmr.pd)) { 70262306a36Sopenharmony_ci rxe_dbg_mr(mr, "qp->pd and mr->pd don't match\n"); 70362306a36Sopenharmony_ci return -EINVAL; 70462306a36Sopenharmony_ci } 70562306a36Sopenharmony_ci 70662306a36Sopenharmony_ci /* user is only allowed to change key portion of l/rkey */ 70762306a36Sopenharmony_ci if (unlikely((mr->lkey & ~0xff) != (key & ~0xff))) { 70862306a36Sopenharmony_ci rxe_dbg_mr(mr, "key = 0x%x has wrong index mr->lkey = 0x%x\n", 70962306a36Sopenharmony_ci key, mr->lkey); 71062306a36Sopenharmony_ci return -EINVAL; 71162306a36Sopenharmony_ci } 71262306a36Sopenharmony_ci 71362306a36Sopenharmony_ci mr->access = access; 71462306a36Sopenharmony_ci mr->lkey = key; 71562306a36Sopenharmony_ci mr->rkey = key; 71662306a36Sopenharmony_ci mr->ibmr.iova = wqe->wr.wr.reg.mr->iova; 71762306a36Sopenharmony_ci mr->state = RXE_MR_STATE_VALID; 71862306a36Sopenharmony_ci 71962306a36Sopenharmony_ci return 0; 72062306a36Sopenharmony_ci} 72162306a36Sopenharmony_ci 72262306a36Sopenharmony_civoid rxe_mr_cleanup(struct rxe_pool_elem *elem) 72362306a36Sopenharmony_ci{ 72462306a36Sopenharmony_ci struct rxe_mr *mr = container_of(elem, typeof(*mr), elem); 72562306a36Sopenharmony_ci 72662306a36Sopenharmony_ci rxe_put(mr_pd(mr)); 72762306a36Sopenharmony_ci ib_umem_release(mr->umem); 72862306a36Sopenharmony_ci 72962306a36Sopenharmony_ci if (mr->ibmr.type != IB_MR_TYPE_DMA) 73062306a36Sopenharmony_ci xa_destroy(&mr->page_list); 73162306a36Sopenharmony_ci} 732