xref: /openbmc/linux/drivers/infiniband/sw/rdmavt/mr.c (revision 68198dca)
1 /*
2  * Copyright(c) 2016 Intel Corporation.
3  *
4  * This file is provided under a dual BSD/GPLv2 license.  When using or
5  * redistributing this file, you may do so under either license.
6  *
7  * GPL LICENSE SUMMARY
8  *
9  * This program is free software; you can redistribute it and/or modify
10  * it under the terms of version 2 of the GNU General Public License as
11  * published by the Free Software Foundation.
12  *
13  * This program is distributed in the hope that it will be useful, but
14  * WITHOUT ANY WARRANTY; without even the implied warranty of
15  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
16  * General Public License for more details.
17  *
18  * BSD LICENSE
19  *
20  * Redistribution and use in source and binary forms, with or without
21  * modification, are permitted provided that the following conditions
22  * are met:
23  *
24  *  - Redistributions of source code must retain the above copyright
25  *    notice, this list of conditions and the following disclaimer.
26  *  - Redistributions in binary form must reproduce the above copyright
27  *    notice, this list of conditions and the following disclaimer in
28  *    the documentation and/or other materials provided with the
29  *    distribution.
30  *  - Neither the name of Intel Corporation nor the names of its
31  *    contributors may be used to endorse or promote products derived
32  *    from this software without specific prior written permission.
33  *
34  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
35  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
36  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
37  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
38  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
39  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
40  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
41  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
42  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
43  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
44  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
45  *
46  */
47 
48 #include <linux/slab.h>
49 #include <linux/vmalloc.h>
50 #include <rdma/ib_umem.h>
51 #include <rdma/rdma_vt.h>
52 #include "vt.h"
53 #include "mr.h"
54 #include "trace.h"
55 
56 /**
57  * rvt_driver_mr_init - Init MR resources per driver
58  * @rdi: rvt dev struct
59  *
60  * Do any intilization needed when a driver registers with rdmavt.
61  *
62  * Return: 0 on success or errno on failure
63  */
64 int rvt_driver_mr_init(struct rvt_dev_info *rdi)
65 {
66 	unsigned int lkey_table_size = rdi->dparms.lkey_table_size;
67 	unsigned lk_tab_size;
68 	int i;
69 
70 	/*
71 	 * The top hfi1_lkey_table_size bits are used to index the
72 	 * table.  The lower 8 bits can be owned by the user (copied from
73 	 * the LKEY).  The remaining bits act as a generation number or tag.
74 	 */
75 	if (!lkey_table_size)
76 		return -EINVAL;
77 
78 	spin_lock_init(&rdi->lkey_table.lock);
79 
80 	/* ensure generation is at least 4 bits */
81 	if (lkey_table_size > RVT_MAX_LKEY_TABLE_BITS) {
82 		rvt_pr_warn(rdi, "lkey bits %u too large, reduced to %u\n",
83 			    lkey_table_size, RVT_MAX_LKEY_TABLE_BITS);
84 		rdi->dparms.lkey_table_size = RVT_MAX_LKEY_TABLE_BITS;
85 		lkey_table_size = rdi->dparms.lkey_table_size;
86 	}
87 	rdi->lkey_table.max = 1 << lkey_table_size;
88 	rdi->lkey_table.shift = 32 - lkey_table_size;
89 	lk_tab_size = rdi->lkey_table.max * sizeof(*rdi->lkey_table.table);
90 	rdi->lkey_table.table = (struct rvt_mregion __rcu **)
91 			       vmalloc_node(lk_tab_size, rdi->dparms.node);
92 	if (!rdi->lkey_table.table)
93 		return -ENOMEM;
94 
95 	RCU_INIT_POINTER(rdi->dma_mr, NULL);
96 	for (i = 0; i < rdi->lkey_table.max; i++)
97 		RCU_INIT_POINTER(rdi->lkey_table.table[i], NULL);
98 
99 	return 0;
100 }
101 
102 /**
103  *rvt_mr_exit: clean up MR
104  *@rdi: rvt dev structure
105  *
106  * called when drivers have unregistered or perhaps failed to register with us
107  */
108 void rvt_mr_exit(struct rvt_dev_info *rdi)
109 {
110 	if (rdi->dma_mr)
111 		rvt_pr_err(rdi, "DMA MR not null!\n");
112 
113 	vfree(rdi->lkey_table.table);
114 }
115 
116 static void rvt_deinit_mregion(struct rvt_mregion *mr)
117 {
118 	int i = mr->mapsz;
119 
120 	mr->mapsz = 0;
121 	while (i)
122 		kfree(mr->map[--i]);
123 	percpu_ref_exit(&mr->refcount);
124 }
125 
126 static void __rvt_mregion_complete(struct percpu_ref *ref)
127 {
128 	struct rvt_mregion *mr = container_of(ref, struct rvt_mregion,
129 					      refcount);
130 
131 	complete(&mr->comp);
132 }
133 
134 static int rvt_init_mregion(struct rvt_mregion *mr, struct ib_pd *pd,
135 			    int count, unsigned int percpu_flags)
136 {
137 	int m, i = 0;
138 	struct rvt_dev_info *dev = ib_to_rvt(pd->device);
139 
140 	mr->mapsz = 0;
141 	m = (count + RVT_SEGSZ - 1) / RVT_SEGSZ;
142 	for (; i < m; i++) {
143 		mr->map[i] = kzalloc_node(sizeof(*mr->map[0]), GFP_KERNEL,
144 					  dev->dparms.node);
145 		if (!mr->map[i])
146 			goto bail;
147 		mr->mapsz++;
148 	}
149 	init_completion(&mr->comp);
150 	/* count returning the ptr to user */
151 	if (percpu_ref_init(&mr->refcount, &__rvt_mregion_complete,
152 			    percpu_flags, GFP_KERNEL))
153 		goto bail;
154 
155 	atomic_set(&mr->lkey_invalid, 0);
156 	mr->pd = pd;
157 	mr->max_segs = count;
158 	return 0;
159 bail:
160 	rvt_deinit_mregion(mr);
161 	return -ENOMEM;
162 }
163 
164 /**
165  * rvt_alloc_lkey - allocate an lkey
166  * @mr: memory region that this lkey protects
167  * @dma_region: 0->normal key, 1->restricted DMA key
168  *
169  * Returns 0 if successful, otherwise returns -errno.
170  *
171  * Increments mr reference count as required.
172  *
173  * Sets the lkey field mr for non-dma regions.
174  *
175  */
176 static int rvt_alloc_lkey(struct rvt_mregion *mr, int dma_region)
177 {
178 	unsigned long flags;
179 	u32 r;
180 	u32 n;
181 	int ret = 0;
182 	struct rvt_dev_info *dev = ib_to_rvt(mr->pd->device);
183 	struct rvt_lkey_table *rkt = &dev->lkey_table;
184 
185 	rvt_get_mr(mr);
186 	spin_lock_irqsave(&rkt->lock, flags);
187 
188 	/* special case for dma_mr lkey == 0 */
189 	if (dma_region) {
190 		struct rvt_mregion *tmr;
191 
192 		tmr = rcu_access_pointer(dev->dma_mr);
193 		if (!tmr) {
194 			mr->lkey_published = 1;
195 			/* Insure published written first */
196 			rcu_assign_pointer(dev->dma_mr, mr);
197 			rvt_get_mr(mr);
198 		}
199 		goto success;
200 	}
201 
202 	/* Find the next available LKEY */
203 	r = rkt->next;
204 	n = r;
205 	for (;;) {
206 		if (!rcu_access_pointer(rkt->table[r]))
207 			break;
208 		r = (r + 1) & (rkt->max - 1);
209 		if (r == n)
210 			goto bail;
211 	}
212 	rkt->next = (r + 1) & (rkt->max - 1);
213 	/*
214 	 * Make sure lkey is never zero which is reserved to indicate an
215 	 * unrestricted LKEY.
216 	 */
217 	rkt->gen++;
218 	/*
219 	 * bits are capped to ensure enough bits for generation number
220 	 */
221 	mr->lkey = (r << (32 - dev->dparms.lkey_table_size)) |
222 		((((1 << (24 - dev->dparms.lkey_table_size)) - 1) & rkt->gen)
223 		 << 8);
224 	if (mr->lkey == 0) {
225 		mr->lkey |= 1 << 8;
226 		rkt->gen++;
227 	}
228 	mr->lkey_published = 1;
229 	/* Insure published written first */
230 	rcu_assign_pointer(rkt->table[r], mr);
231 success:
232 	spin_unlock_irqrestore(&rkt->lock, flags);
233 out:
234 	return ret;
235 bail:
236 	rvt_put_mr(mr);
237 	spin_unlock_irqrestore(&rkt->lock, flags);
238 	ret = -ENOMEM;
239 	goto out;
240 }
241 
242 /**
243  * rvt_free_lkey - free an lkey
244  * @mr: mr to free from tables
245  */
246 static void rvt_free_lkey(struct rvt_mregion *mr)
247 {
248 	unsigned long flags;
249 	u32 lkey = mr->lkey;
250 	u32 r;
251 	struct rvt_dev_info *dev = ib_to_rvt(mr->pd->device);
252 	struct rvt_lkey_table *rkt = &dev->lkey_table;
253 	int freed = 0;
254 
255 	spin_lock_irqsave(&rkt->lock, flags);
256 	if (!lkey) {
257 		if (mr->lkey_published) {
258 			mr->lkey_published = 0;
259 			/* insure published is written before pointer */
260 			rcu_assign_pointer(dev->dma_mr, NULL);
261 			rvt_put_mr(mr);
262 		}
263 	} else {
264 		if (!mr->lkey_published)
265 			goto out;
266 		r = lkey >> (32 - dev->dparms.lkey_table_size);
267 		mr->lkey_published = 0;
268 		/* insure published is written before pointer */
269 		rcu_assign_pointer(rkt->table[r], NULL);
270 	}
271 	freed++;
272 out:
273 	spin_unlock_irqrestore(&rkt->lock, flags);
274 	if (freed)
275 		percpu_ref_kill(&mr->refcount);
276 }
277 
278 static struct rvt_mr *__rvt_alloc_mr(int count, struct ib_pd *pd)
279 {
280 	struct rvt_mr *mr;
281 	int rval = -ENOMEM;
282 	int m;
283 
284 	/* Allocate struct plus pointers to first level page tables. */
285 	m = (count + RVT_SEGSZ - 1) / RVT_SEGSZ;
286 	mr = kzalloc(sizeof(*mr) + m * sizeof(mr->mr.map[0]), GFP_KERNEL);
287 	if (!mr)
288 		goto bail;
289 
290 	rval = rvt_init_mregion(&mr->mr, pd, count, 0);
291 	if (rval)
292 		goto bail;
293 	/*
294 	 * ib_reg_phys_mr() will initialize mr->ibmr except for
295 	 * lkey and rkey.
296 	 */
297 	rval = rvt_alloc_lkey(&mr->mr, 0);
298 	if (rval)
299 		goto bail_mregion;
300 	mr->ibmr.lkey = mr->mr.lkey;
301 	mr->ibmr.rkey = mr->mr.lkey;
302 done:
303 	return mr;
304 
305 bail_mregion:
306 	rvt_deinit_mregion(&mr->mr);
307 bail:
308 	kfree(mr);
309 	mr = ERR_PTR(rval);
310 	goto done;
311 }
312 
313 static void __rvt_free_mr(struct rvt_mr *mr)
314 {
315 	rvt_free_lkey(&mr->mr);
316 	rvt_deinit_mregion(&mr->mr);
317 	kfree(mr);
318 }
319 
320 /**
321  * rvt_get_dma_mr - get a DMA memory region
322  * @pd: protection domain for this memory region
323  * @acc: access flags
324  *
325  * Return: the memory region on success, otherwise returns an errno.
326  * Note that all DMA addresses should be created via the functions in
327  * struct dma_virt_ops.
328  */
329 struct ib_mr *rvt_get_dma_mr(struct ib_pd *pd, int acc)
330 {
331 	struct rvt_mr *mr;
332 	struct ib_mr *ret;
333 	int rval;
334 
335 	if (ibpd_to_rvtpd(pd)->user)
336 		return ERR_PTR(-EPERM);
337 
338 	mr = kzalloc(sizeof(*mr), GFP_KERNEL);
339 	if (!mr) {
340 		ret = ERR_PTR(-ENOMEM);
341 		goto bail;
342 	}
343 
344 	rval = rvt_init_mregion(&mr->mr, pd, 0, 0);
345 	if (rval) {
346 		ret = ERR_PTR(rval);
347 		goto bail;
348 	}
349 
350 	rval = rvt_alloc_lkey(&mr->mr, 1);
351 	if (rval) {
352 		ret = ERR_PTR(rval);
353 		goto bail_mregion;
354 	}
355 
356 	mr->mr.access_flags = acc;
357 	ret = &mr->ibmr;
358 done:
359 	return ret;
360 
361 bail_mregion:
362 	rvt_deinit_mregion(&mr->mr);
363 bail:
364 	kfree(mr);
365 	goto done;
366 }
367 
368 /**
369  * rvt_reg_user_mr - register a userspace memory region
370  * @pd: protection domain for this memory region
371  * @start: starting userspace address
372  * @length: length of region to register
373  * @mr_access_flags: access flags for this memory region
374  * @udata: unused by the driver
375  *
376  * Return: the memory region on success, otherwise returns an errno.
377  */
378 struct ib_mr *rvt_reg_user_mr(struct ib_pd *pd, u64 start, u64 length,
379 			      u64 virt_addr, int mr_access_flags,
380 			      struct ib_udata *udata)
381 {
382 	struct rvt_mr *mr;
383 	struct ib_umem *umem;
384 	struct scatterlist *sg;
385 	int n, m, entry;
386 	struct ib_mr *ret;
387 
388 	if (length == 0)
389 		return ERR_PTR(-EINVAL);
390 
391 	umem = ib_umem_get(pd->uobject->context, start, length,
392 			   mr_access_flags, 0);
393 	if (IS_ERR(umem))
394 		return (void *)umem;
395 
396 	n = umem->nmap;
397 
398 	mr = __rvt_alloc_mr(n, pd);
399 	if (IS_ERR(mr)) {
400 		ret = (struct ib_mr *)mr;
401 		goto bail_umem;
402 	}
403 
404 	mr->mr.user_base = start;
405 	mr->mr.iova = virt_addr;
406 	mr->mr.length = length;
407 	mr->mr.offset = ib_umem_offset(umem);
408 	mr->mr.access_flags = mr_access_flags;
409 	mr->umem = umem;
410 
411 	mr->mr.page_shift = umem->page_shift;
412 	m = 0;
413 	n = 0;
414 	for_each_sg(umem->sg_head.sgl, sg, umem->nmap, entry) {
415 		void *vaddr;
416 
417 		vaddr = page_address(sg_page(sg));
418 		if (!vaddr) {
419 			ret = ERR_PTR(-EINVAL);
420 			goto bail_inval;
421 		}
422 		mr->mr.map[m]->segs[n].vaddr = vaddr;
423 		mr->mr.map[m]->segs[n].length = BIT(umem->page_shift);
424 		trace_rvt_mr_user_seg(&mr->mr, m, n, vaddr,
425 				      BIT(umem->page_shift));
426 		n++;
427 		if (n == RVT_SEGSZ) {
428 			m++;
429 			n = 0;
430 		}
431 	}
432 	return &mr->ibmr;
433 
434 bail_inval:
435 	__rvt_free_mr(mr);
436 
437 bail_umem:
438 	ib_umem_release(umem);
439 
440 	return ret;
441 }
442 
443 /**
444  * rvt_dereg_clean_qp_cb - callback from iterator
445  * @qp - the qp
446  * @v - the mregion (as u64)
447  *
448  * This routine fields the callback for all QPs and
449  * for QPs in the same PD as the MR will call the
450  * rvt_qp_mr_clean() to potentially cleanup references.
451  */
452 static void rvt_dereg_clean_qp_cb(struct rvt_qp *qp, u64 v)
453 {
454 	struct rvt_mregion *mr = (struct rvt_mregion *)v;
455 
456 	/* skip PDs that are not ours */
457 	if (mr->pd != qp->ibqp.pd)
458 		return;
459 	rvt_qp_mr_clean(qp, mr->lkey);
460 }
461 
462 /**
463  * rvt_dereg_clean_qps - find QPs for reference cleanup
464  * @mr - the MR that is being deregistered
465  *
466  * This routine iterates RC QPs looking for references
467  * to the lkey noted in mr.
468  */
469 static void rvt_dereg_clean_qps(struct rvt_mregion *mr)
470 {
471 	struct rvt_dev_info *rdi = ib_to_rvt(mr->pd->device);
472 
473 	rvt_qp_iter(rdi, (u64)mr, rvt_dereg_clean_qp_cb);
474 }
475 
476 /**
477  * rvt_check_refs - check references
478  * @mr - the megion
479  * @t - the caller identification
480  *
481  * This routine checks MRs holding a reference during
482  * when being de-registered.
483  *
484  * If the count is non-zero, the code calls a clean routine then
485  * waits for the timeout for the count to zero.
486  */
487 static int rvt_check_refs(struct rvt_mregion *mr, const char *t)
488 {
489 	unsigned long timeout;
490 	struct rvt_dev_info *rdi = ib_to_rvt(mr->pd->device);
491 
492 	if (percpu_ref_is_zero(&mr->refcount))
493 		return 0;
494 	/* avoid dma mr */
495 	if (mr->lkey)
496 		rvt_dereg_clean_qps(mr);
497 	timeout = wait_for_completion_timeout(&mr->comp, 5 * HZ);
498 	if (!timeout) {
499 		rvt_pr_err(rdi,
500 			   "%s timeout mr %p pd %p lkey %x refcount %ld\n",
501 			   t, mr, mr->pd, mr->lkey,
502 			   atomic_long_read(&mr->refcount.count));
503 		rvt_get_mr(mr);
504 		return -EBUSY;
505 	}
506 	return 0;
507 }
508 
509 /**
510  * rvt_mr_has_lkey - is MR
511  * @mr - the mregion
512  * @lkey - the lkey
513  */
514 bool rvt_mr_has_lkey(struct rvt_mregion *mr, u32 lkey)
515 {
516 	return mr && lkey == mr->lkey;
517 }
518 
519 /**
520  * rvt_ss_has_lkey - is mr in sge tests
521  * @ss - the sge state
522  * @lkey
523  *
524  * This code tests for an MR in the indicated
525  * sge state.
526  */
527 bool rvt_ss_has_lkey(struct rvt_sge_state *ss, u32 lkey)
528 {
529 	int i;
530 	bool rval = false;
531 
532 	if (!ss->num_sge)
533 		return rval;
534 	/* first one */
535 	rval = rvt_mr_has_lkey(ss->sge.mr, lkey);
536 	/* any others */
537 	for (i = 0; !rval && i < ss->num_sge - 1; i++)
538 		rval = rvt_mr_has_lkey(ss->sg_list[i].mr, lkey);
539 	return rval;
540 }
541 
542 /**
543  * rvt_dereg_mr - unregister and free a memory region
544  * @ibmr: the memory region to free
545  *
546  *
547  * Note that this is called to free MRs created by rvt_get_dma_mr()
548  * or rvt_reg_user_mr().
549  *
550  * Returns 0 on success.
551  */
552 int rvt_dereg_mr(struct ib_mr *ibmr)
553 {
554 	struct rvt_mr *mr = to_imr(ibmr);
555 	int ret;
556 
557 	rvt_free_lkey(&mr->mr);
558 
559 	rvt_put_mr(&mr->mr); /* will set completion if last */
560 	ret = rvt_check_refs(&mr->mr, __func__);
561 	if (ret)
562 		goto out;
563 	rvt_deinit_mregion(&mr->mr);
564 	if (mr->umem)
565 		ib_umem_release(mr->umem);
566 	kfree(mr);
567 out:
568 	return ret;
569 }
570 
571 /**
572  * rvt_alloc_mr - Allocate a memory region usable with the
573  * @pd: protection domain for this memory region
574  * @mr_type: mem region type
575  * @max_num_sg: Max number of segments allowed
576  *
577  * Return: the memory region on success, otherwise return an errno.
578  */
579 struct ib_mr *rvt_alloc_mr(struct ib_pd *pd,
580 			   enum ib_mr_type mr_type,
581 			   u32 max_num_sg)
582 {
583 	struct rvt_mr *mr;
584 
585 	if (mr_type != IB_MR_TYPE_MEM_REG)
586 		return ERR_PTR(-EINVAL);
587 
588 	mr = __rvt_alloc_mr(max_num_sg, pd);
589 	if (IS_ERR(mr))
590 		return (struct ib_mr *)mr;
591 
592 	return &mr->ibmr;
593 }
594 
595 /**
596  * rvt_set_page - page assignment function called by ib_sg_to_pages
597  * @ibmr: memory region
598  * @addr: dma address of mapped page
599  *
600  * Return: 0 on success
601  */
602 static int rvt_set_page(struct ib_mr *ibmr, u64 addr)
603 {
604 	struct rvt_mr *mr = to_imr(ibmr);
605 	u32 ps = 1 << mr->mr.page_shift;
606 	u32 mapped_segs = mr->mr.length >> mr->mr.page_shift;
607 	int m, n;
608 
609 	if (unlikely(mapped_segs == mr->mr.max_segs))
610 		return -ENOMEM;
611 
612 	if (mr->mr.length == 0) {
613 		mr->mr.user_base = addr;
614 		mr->mr.iova = addr;
615 	}
616 
617 	m = mapped_segs / RVT_SEGSZ;
618 	n = mapped_segs % RVT_SEGSZ;
619 	mr->mr.map[m]->segs[n].vaddr = (void *)addr;
620 	mr->mr.map[m]->segs[n].length = ps;
621 	trace_rvt_mr_page_seg(&mr->mr, m, n, (void *)addr, ps);
622 	mr->mr.length += ps;
623 
624 	return 0;
625 }
626 
627 /**
628  * rvt_map_mr_sg - map sg list and set it the memory region
629  * @ibmr: memory region
630  * @sg: dma mapped scatterlist
631  * @sg_nents: number of entries in sg
632  * @sg_offset: offset in bytes into sg
633  *
634  * Return: number of sg elements mapped to the memory region
635  */
636 int rvt_map_mr_sg(struct ib_mr *ibmr, struct scatterlist *sg,
637 		  int sg_nents, unsigned int *sg_offset)
638 {
639 	struct rvt_mr *mr = to_imr(ibmr);
640 
641 	mr->mr.length = 0;
642 	mr->mr.page_shift = PAGE_SHIFT;
643 	return ib_sg_to_pages(ibmr, sg, sg_nents, sg_offset,
644 			      rvt_set_page);
645 }
646 
647 /**
648  * rvt_fast_reg_mr - fast register physical MR
649  * @qp: the queue pair where the work request comes from
650  * @ibmr: the memory region to be registered
651  * @key: updated key for this memory region
652  * @access: access flags for this memory region
653  *
654  * Returns 0 on success.
655  */
656 int rvt_fast_reg_mr(struct rvt_qp *qp, struct ib_mr *ibmr, u32 key,
657 		    int access)
658 {
659 	struct rvt_mr *mr = to_imr(ibmr);
660 
661 	if (qp->ibqp.pd != mr->mr.pd)
662 		return -EACCES;
663 
664 	/* not applicable to dma MR or user MR */
665 	if (!mr->mr.lkey || mr->umem)
666 		return -EINVAL;
667 
668 	if ((key & 0xFFFFFF00) != (mr->mr.lkey & 0xFFFFFF00))
669 		return -EINVAL;
670 
671 	ibmr->lkey = key;
672 	ibmr->rkey = key;
673 	mr->mr.lkey = key;
674 	mr->mr.access_flags = access;
675 	atomic_set(&mr->mr.lkey_invalid, 0);
676 
677 	return 0;
678 }
679 EXPORT_SYMBOL(rvt_fast_reg_mr);
680 
681 /**
682  * rvt_invalidate_rkey - invalidate an MR rkey
683  * @qp: queue pair associated with the invalidate op
684  * @rkey: rkey to invalidate
685  *
686  * Returns 0 on success.
687  */
688 int rvt_invalidate_rkey(struct rvt_qp *qp, u32 rkey)
689 {
690 	struct rvt_dev_info *dev = ib_to_rvt(qp->ibqp.device);
691 	struct rvt_lkey_table *rkt = &dev->lkey_table;
692 	struct rvt_mregion *mr;
693 
694 	if (rkey == 0)
695 		return -EINVAL;
696 
697 	rcu_read_lock();
698 	mr = rcu_dereference(
699 		rkt->table[(rkey >> (32 - dev->dparms.lkey_table_size))]);
700 	if (unlikely(!mr || mr->lkey != rkey || qp->ibqp.pd != mr->pd))
701 		goto bail;
702 
703 	atomic_set(&mr->lkey_invalid, 1);
704 	rcu_read_unlock();
705 	return 0;
706 
707 bail:
708 	rcu_read_unlock();
709 	return -EINVAL;
710 }
711 EXPORT_SYMBOL(rvt_invalidate_rkey);
712 
713 /**
714  * rvt_alloc_fmr - allocate a fast memory region
715  * @pd: the protection domain for this memory region
716  * @mr_access_flags: access flags for this memory region
717  * @fmr_attr: fast memory region attributes
718  *
719  * Return: the memory region on success, otherwise returns an errno.
720  */
721 struct ib_fmr *rvt_alloc_fmr(struct ib_pd *pd, int mr_access_flags,
722 			     struct ib_fmr_attr *fmr_attr)
723 {
724 	struct rvt_fmr *fmr;
725 	int m;
726 	struct ib_fmr *ret;
727 	int rval = -ENOMEM;
728 
729 	/* Allocate struct plus pointers to first level page tables. */
730 	m = (fmr_attr->max_pages + RVT_SEGSZ - 1) / RVT_SEGSZ;
731 	fmr = kzalloc(sizeof(*fmr) + m * sizeof(fmr->mr.map[0]), GFP_KERNEL);
732 	if (!fmr)
733 		goto bail;
734 
735 	rval = rvt_init_mregion(&fmr->mr, pd, fmr_attr->max_pages,
736 				PERCPU_REF_INIT_ATOMIC);
737 	if (rval)
738 		goto bail;
739 
740 	/*
741 	 * ib_alloc_fmr() will initialize fmr->ibfmr except for lkey &
742 	 * rkey.
743 	 */
744 	rval = rvt_alloc_lkey(&fmr->mr, 0);
745 	if (rval)
746 		goto bail_mregion;
747 	fmr->ibfmr.rkey = fmr->mr.lkey;
748 	fmr->ibfmr.lkey = fmr->mr.lkey;
749 	/*
750 	 * Resources are allocated but no valid mapping (RKEY can't be
751 	 * used).
752 	 */
753 	fmr->mr.access_flags = mr_access_flags;
754 	fmr->mr.max_segs = fmr_attr->max_pages;
755 	fmr->mr.page_shift = fmr_attr->page_shift;
756 
757 	ret = &fmr->ibfmr;
758 done:
759 	return ret;
760 
761 bail_mregion:
762 	rvt_deinit_mregion(&fmr->mr);
763 bail:
764 	kfree(fmr);
765 	ret = ERR_PTR(rval);
766 	goto done;
767 }
768 
769 /**
770  * rvt_map_phys_fmr - set up a fast memory region
771  * @ibmfr: the fast memory region to set up
772  * @page_list: the list of pages to associate with the fast memory region
773  * @list_len: the number of pages to associate with the fast memory region
774  * @iova: the virtual address of the start of the fast memory region
775  *
776  * This may be called from interrupt context.
777  *
778  * Return: 0 on success
779  */
780 
781 int rvt_map_phys_fmr(struct ib_fmr *ibfmr, u64 *page_list,
782 		     int list_len, u64 iova)
783 {
784 	struct rvt_fmr *fmr = to_ifmr(ibfmr);
785 	struct rvt_lkey_table *rkt;
786 	unsigned long flags;
787 	int m, n;
788 	unsigned long i;
789 	u32 ps;
790 	struct rvt_dev_info *rdi = ib_to_rvt(ibfmr->device);
791 
792 	i = atomic_long_read(&fmr->mr.refcount.count);
793 	if (i > 2)
794 		return -EBUSY;
795 
796 	if (list_len > fmr->mr.max_segs)
797 		return -EINVAL;
798 
799 	rkt = &rdi->lkey_table;
800 	spin_lock_irqsave(&rkt->lock, flags);
801 	fmr->mr.user_base = iova;
802 	fmr->mr.iova = iova;
803 	ps = 1 << fmr->mr.page_shift;
804 	fmr->mr.length = list_len * ps;
805 	m = 0;
806 	n = 0;
807 	for (i = 0; i < list_len; i++) {
808 		fmr->mr.map[m]->segs[n].vaddr = (void *)page_list[i];
809 		fmr->mr.map[m]->segs[n].length = ps;
810 		trace_rvt_mr_fmr_seg(&fmr->mr, m, n, (void *)page_list[i], ps);
811 		if (++n == RVT_SEGSZ) {
812 			m++;
813 			n = 0;
814 		}
815 	}
816 	spin_unlock_irqrestore(&rkt->lock, flags);
817 	return 0;
818 }
819 
820 /**
821  * rvt_unmap_fmr - unmap fast memory regions
822  * @fmr_list: the list of fast memory regions to unmap
823  *
824  * Return: 0 on success.
825  */
826 int rvt_unmap_fmr(struct list_head *fmr_list)
827 {
828 	struct rvt_fmr *fmr;
829 	struct rvt_lkey_table *rkt;
830 	unsigned long flags;
831 	struct rvt_dev_info *rdi;
832 
833 	list_for_each_entry(fmr, fmr_list, ibfmr.list) {
834 		rdi = ib_to_rvt(fmr->ibfmr.device);
835 		rkt = &rdi->lkey_table;
836 		spin_lock_irqsave(&rkt->lock, flags);
837 		fmr->mr.user_base = 0;
838 		fmr->mr.iova = 0;
839 		fmr->mr.length = 0;
840 		spin_unlock_irqrestore(&rkt->lock, flags);
841 	}
842 	return 0;
843 }
844 
845 /**
846  * rvt_dealloc_fmr - deallocate a fast memory region
847  * @ibfmr: the fast memory region to deallocate
848  *
849  * Return: 0 on success.
850  */
851 int rvt_dealloc_fmr(struct ib_fmr *ibfmr)
852 {
853 	struct rvt_fmr *fmr = to_ifmr(ibfmr);
854 	int ret = 0;
855 
856 	rvt_free_lkey(&fmr->mr);
857 	rvt_put_mr(&fmr->mr); /* will set completion if last */
858 	ret = rvt_check_refs(&fmr->mr, __func__);
859 	if (ret)
860 		goto out;
861 	rvt_deinit_mregion(&fmr->mr);
862 	kfree(fmr);
863 out:
864 	return ret;
865 }
866 
867 /**
868  * rvt_sge_adjacent - is isge compressible
869  * @last_sge: last outgoing SGE written
870  * @sge: SGE to check
871  *
872  * If adjacent will update last_sge to add length.
873  *
874  * Return: true if isge is adjacent to last sge
875  */
876 static inline bool rvt_sge_adjacent(struct rvt_sge *last_sge,
877 				    struct ib_sge *sge)
878 {
879 	if (last_sge && sge->lkey == last_sge->mr->lkey &&
880 	    ((uint64_t)(last_sge->vaddr + last_sge->length) == sge->addr)) {
881 		if (sge->lkey) {
882 			if (unlikely((sge->addr - last_sge->mr->user_base +
883 			      sge->length > last_sge->mr->length)))
884 				return false; /* overrun, caller will catch */
885 		} else {
886 			last_sge->length += sge->length;
887 		}
888 		last_sge->sge_length += sge->length;
889 		trace_rvt_sge_adjacent(last_sge, sge);
890 		return true;
891 	}
892 	return false;
893 }
894 
895 /**
896  * rvt_lkey_ok - check IB SGE for validity and initialize
897  * @rkt: table containing lkey to check SGE against
898  * @pd: protection domain
899  * @isge: outgoing internal SGE
900  * @last_sge: last outgoing SGE written
901  * @sge: SGE to check
902  * @acc: access flags
903  *
904  * Check the IB SGE for validity and initialize our internal version
905  * of it.
906  *
907  * Increments the reference count when a new sge is stored.
908  *
909  * Return: 0 if compressed, 1 if added , otherwise returns -errno.
910  */
911 int rvt_lkey_ok(struct rvt_lkey_table *rkt, struct rvt_pd *pd,
912 		struct rvt_sge *isge, struct rvt_sge *last_sge,
913 		struct ib_sge *sge, int acc)
914 {
915 	struct rvt_mregion *mr;
916 	unsigned n, m;
917 	size_t off;
918 
919 	/*
920 	 * We use LKEY == zero for kernel virtual addresses
921 	 * (see rvt_get_dma_mr() and dma_virt_ops).
922 	 */
923 	if (sge->lkey == 0) {
924 		struct rvt_dev_info *dev = ib_to_rvt(pd->ibpd.device);
925 
926 		if (pd->user)
927 			return -EINVAL;
928 		if (rvt_sge_adjacent(last_sge, sge))
929 			return 0;
930 		rcu_read_lock();
931 		mr = rcu_dereference(dev->dma_mr);
932 		if (!mr)
933 			goto bail;
934 		rvt_get_mr(mr);
935 		rcu_read_unlock();
936 
937 		isge->mr = mr;
938 		isge->vaddr = (void *)sge->addr;
939 		isge->length = sge->length;
940 		isge->sge_length = sge->length;
941 		isge->m = 0;
942 		isge->n = 0;
943 		goto ok;
944 	}
945 	if (rvt_sge_adjacent(last_sge, sge))
946 		return 0;
947 	rcu_read_lock();
948 	mr = rcu_dereference(rkt->table[sge->lkey >> rkt->shift]);
949 	if (!mr)
950 		goto bail;
951 	rvt_get_mr(mr);
952 	if (!READ_ONCE(mr->lkey_published))
953 		goto bail_unref;
954 
955 	if (unlikely(atomic_read(&mr->lkey_invalid) ||
956 		     mr->lkey != sge->lkey || mr->pd != &pd->ibpd))
957 		goto bail_unref;
958 
959 	off = sge->addr - mr->user_base;
960 	if (unlikely(sge->addr < mr->user_base ||
961 		     off + sge->length > mr->length ||
962 		     (mr->access_flags & acc) != acc))
963 		goto bail_unref;
964 	rcu_read_unlock();
965 
966 	off += mr->offset;
967 	if (mr->page_shift) {
968 		/*
969 		 * page sizes are uniform power of 2 so no loop is necessary
970 		 * entries_spanned_by_off is the number of times the loop below
971 		 * would have executed.
972 		*/
973 		size_t entries_spanned_by_off;
974 
975 		entries_spanned_by_off = off >> mr->page_shift;
976 		off -= (entries_spanned_by_off << mr->page_shift);
977 		m = entries_spanned_by_off / RVT_SEGSZ;
978 		n = entries_spanned_by_off % RVT_SEGSZ;
979 	} else {
980 		m = 0;
981 		n = 0;
982 		while (off >= mr->map[m]->segs[n].length) {
983 			off -= mr->map[m]->segs[n].length;
984 			n++;
985 			if (n >= RVT_SEGSZ) {
986 				m++;
987 				n = 0;
988 			}
989 		}
990 	}
991 	isge->mr = mr;
992 	isge->vaddr = mr->map[m]->segs[n].vaddr + off;
993 	isge->length = mr->map[m]->segs[n].length - off;
994 	isge->sge_length = sge->length;
995 	isge->m = m;
996 	isge->n = n;
997 ok:
998 	trace_rvt_sge_new(isge, sge);
999 	return 1;
1000 bail_unref:
1001 	rvt_put_mr(mr);
1002 bail:
1003 	rcu_read_unlock();
1004 	return -EINVAL;
1005 }
1006 EXPORT_SYMBOL(rvt_lkey_ok);
1007 
1008 /**
1009  * rvt_rkey_ok - check the IB virtual address, length, and RKEY
1010  * @qp: qp for validation
1011  * @sge: SGE state
1012  * @len: length of data
1013  * @vaddr: virtual address to place data
1014  * @rkey: rkey to check
1015  * @acc: access flags
1016  *
1017  * Return: 1 if successful, otherwise 0.
1018  *
1019  * increments the reference count upon success
1020  */
1021 int rvt_rkey_ok(struct rvt_qp *qp, struct rvt_sge *sge,
1022 		u32 len, u64 vaddr, u32 rkey, int acc)
1023 {
1024 	struct rvt_dev_info *dev = ib_to_rvt(qp->ibqp.device);
1025 	struct rvt_lkey_table *rkt = &dev->lkey_table;
1026 	struct rvt_mregion *mr;
1027 	unsigned n, m;
1028 	size_t off;
1029 
1030 	/*
1031 	 * We use RKEY == zero for kernel virtual addresses
1032 	 * (see rvt_get_dma_mr() and dma_virt_ops).
1033 	 */
1034 	rcu_read_lock();
1035 	if (rkey == 0) {
1036 		struct rvt_pd *pd = ibpd_to_rvtpd(qp->ibqp.pd);
1037 		struct rvt_dev_info *rdi = ib_to_rvt(pd->ibpd.device);
1038 
1039 		if (pd->user)
1040 			goto bail;
1041 		mr = rcu_dereference(rdi->dma_mr);
1042 		if (!mr)
1043 			goto bail;
1044 		rvt_get_mr(mr);
1045 		rcu_read_unlock();
1046 
1047 		sge->mr = mr;
1048 		sge->vaddr = (void *)vaddr;
1049 		sge->length = len;
1050 		sge->sge_length = len;
1051 		sge->m = 0;
1052 		sge->n = 0;
1053 		goto ok;
1054 	}
1055 
1056 	mr = rcu_dereference(rkt->table[rkey >> rkt->shift]);
1057 	if (!mr)
1058 		goto bail;
1059 	rvt_get_mr(mr);
1060 	/* insure mr read is before test */
1061 	if (!READ_ONCE(mr->lkey_published))
1062 		goto bail_unref;
1063 	if (unlikely(atomic_read(&mr->lkey_invalid) ||
1064 		     mr->lkey != rkey || qp->ibqp.pd != mr->pd))
1065 		goto bail_unref;
1066 
1067 	off = vaddr - mr->iova;
1068 	if (unlikely(vaddr < mr->iova || off + len > mr->length ||
1069 		     (mr->access_flags & acc) == 0))
1070 		goto bail_unref;
1071 	rcu_read_unlock();
1072 
1073 	off += mr->offset;
1074 	if (mr->page_shift) {
1075 		/*
1076 		 * page sizes are uniform power of 2 so no loop is necessary
1077 		 * entries_spanned_by_off is the number of times the loop below
1078 		 * would have executed.
1079 		*/
1080 		size_t entries_spanned_by_off;
1081 
1082 		entries_spanned_by_off = off >> mr->page_shift;
1083 		off -= (entries_spanned_by_off << mr->page_shift);
1084 		m = entries_spanned_by_off / RVT_SEGSZ;
1085 		n = entries_spanned_by_off % RVT_SEGSZ;
1086 	} else {
1087 		m = 0;
1088 		n = 0;
1089 		while (off >= mr->map[m]->segs[n].length) {
1090 			off -= mr->map[m]->segs[n].length;
1091 			n++;
1092 			if (n >= RVT_SEGSZ) {
1093 				m++;
1094 				n = 0;
1095 			}
1096 		}
1097 	}
1098 	sge->mr = mr;
1099 	sge->vaddr = mr->map[m]->segs[n].vaddr + off;
1100 	sge->length = mr->map[m]->segs[n].length - off;
1101 	sge->sge_length = len;
1102 	sge->m = m;
1103 	sge->n = n;
1104 ok:
1105 	return 1;
1106 bail_unref:
1107 	rvt_put_mr(mr);
1108 bail:
1109 	rcu_read_unlock();
1110 	return 0;
1111 }
1112 EXPORT_SYMBOL(rvt_rkey_ok);
1113