From patchwork Thu Sep 12 11:15:44 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Leon Romanovsky X-Patchwork-Id: 13801931 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2E248EEB591 for ; Thu, 12 Sep 2024 11:16:41 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id AD17C6B009C; Thu, 12 Sep 2024 07:16:40 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A324B6B009D; Thu, 12 Sep 2024 07:16:40 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8AB6C6B009E; Thu, 12 Sep 2024 07:16:40 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 622876B009C for ; Thu, 12 Sep 2024 07:16:40 -0400 (EDT) Received: from smtpin10.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 0027481787 for ; Thu, 12 Sep 2024 11:16:39 +0000 (UTC) X-FDA: 82555833318.10.05221CF Received: from nyc.source.kernel.org (nyc.source.kernel.org [147.75.193.91]) by imf05.hostedemail.com (Postfix) with ESMTP id 5D7D6100011 for ; Thu, 12 Sep 2024 11:16:38 +0000 (UTC) Authentication-Results: imf05.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=utilRRP5; spf=pass (imf05.hostedemail.com: domain of leon@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=leon@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1726139694; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=B5PPeoNX25dL6J7bffwKTP3lf8mz/H4D8kNjbdmoKTw=; b=XxBS0LCT+b5jT5eohEZTzKQfTkjeWyP8AKeZzbahyDxfySN00Vfu7JVNpuWwJW2YgOzmLf nEXod2SGbUtntZIomCUzMk3hssZhnysrwQed+D9ItUtwEDa34y22BIjAnGwcyBRJnrf3av w1dz65JL1IKvUcQkza+FJb0uQuEwN04= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1726139694; a=rsa-sha256; cv=none; b=wNa/f2T1hDt4K3UgIIlQ/z6VuH4/VXhcc2bMlTxvjex8zvdAc922T1xO2mJy6dYQgbXTsO iK/hDhefw43XNud3LuT93Zb/eudYmK8SdA6YYG+aEwXQA3KRNqFsKg5AQ2OltAYJDT/dKk Rsu5ow7pxvNta+qnZrf5EDRvN66xnWM= ARC-Authentication-Results: i=1; imf05.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=utilRRP5; spf=pass (imf05.hostedemail.com: domain of leon@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=leon@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by nyc.source.kernel.org (Postfix) with ESMTP id 21049A4527C; Thu, 12 Sep 2024 11:16:30 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 95168C4CEC5; Thu, 12 Sep 2024 11:16:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1726139797; bh=HCbYGqX249833/tdiRDBvFBjeuSolO9rH8wFEsCHmuw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=utilRRP5yDc5niZQdTcTGnzCnlrPS0S4L3Hb9vq/XwpoQFI0AVDbejOe0Qo42RRZR KkYQDJw1ZBH1+GhREn9IO3Aft1IbL0WfEet5f0emPRe8iuqT8w2AFuYT9rawGzAivh cQxvsrrXrX2aswijqPZVgD9EpT7cf20gG1iWYXmqsE07Ej+8c8FKOF4tQuWco24nd1 2lGYnudAW1yc+NprinXcSsQXcnqPmKubTJyZY5LKaiOnVKB5gOk1fdSCFyV62ullq/ IqZxh1M1CLXFDX8nzGm4+Sy2BP2yjU9370wTj3+xV+5K9S+8gyJXtfhxEhlqM50c+P tzPreaeQDm/dA== From: Leon Romanovsky To: Jens Axboe , Jason Gunthorpe , Robin Murphy , Joerg Roedel , Will Deacon , Keith Busch , Christoph Hellwig , "Zeng, Oak" , Chaitanya Kulkarni Cc: Leon Romanovsky , Sagi Grimberg , Bjorn Helgaas , Logan Gunthorpe , Yishai Hadas , Shameer Kolothum , Kevin Tian , Alex Williamson , Marek Szyprowski , =?utf-8?b?SsOpcsO0bWUgR2xpc3Nl?= , Andrew Morton , linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-rdma@vger.kernel.org, iommu@lists.linux.dev, linux-nvme@lists.infradead.org, linux-pci@vger.kernel.org, kvm@vger.kernel.org, linux-mm@kvack.org Subject: [RFC v2 09/21] dma-mapping: provide callbacks to link/unlink HMM PFNs to specific IOVA Date: Thu, 12 Sep 2024 14:15:44 +0300 Message-ID: X-Mailer: git-send-email 2.46.0 In-Reply-To: References: MIME-Version: 1.0 X-Rspamd-Queue-Id: 5D7D6100011 X-Stat-Signature: irhgg9kydppeufaeabu9m1kzzsbh78hz X-Rspamd-Server: rspam09 X-Rspam-User: X-HE-Tag: 1726139798-556240 X-HE-Meta: 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 /dnOMKw7 LdBzLp4ZaSqfQWT9I7PWE/LCApxPwopUG19rkAMPAjyReNNDEGBKNa/nU7CzxBu6hrRGQRe1JpLnfvYb23KKFgWUuXzzSN93NfS+8FA+SH/gHJxZOFbYEWZQUVpLUzBSHOn73CYUfSIFjHSotjd+6XmJgyQrDc7N+6JFN5xjwmw0c/OlwShO1OnoT93/ZyJ+a1vAIH0BAPaQt5dG1PXFToZUmMx0PzbEwpBHrihJRJvq0j5s= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Leon Romanovsky Introduce new DMA link/unlink API to provide a way for HMM users to link pages to already preallocated IOVA. Signed-off-by: Leon Romanovsky --- include/linux/dma-mapping.h | 15 ++++++ kernel/dma/mapping.c | 102 ++++++++++++++++++++++++++++++++++++ 2 files changed, 117 insertions(+) diff --git a/include/linux/dma-mapping.h b/include/linux/dma-mapping.h index bb541f8944e5..8c2a468c5420 100644 --- a/include/linux/dma-mapping.h +++ b/include/linux/dma-mapping.h @@ -123,6 +123,10 @@ static inline int dma_mapping_error(struct device *dev, dma_addr_t dma_addr) int dma_alloc_iova_unaligned(struct dma_iova_state *state, phys_addr_t phys, size_t size); void dma_free_iova(struct dma_iova_state *state); +dma_addr_t dma_hmm_link_page(struct dma_iova_state *state, unsigned long *pfn, + dma_addr_t dma_offset); +void dma_hmm_unlink_page(struct dma_iova_state *state, unsigned long *pfn, + dma_addr_t dma_offset); dma_addr_t dma_map_page_attrs(struct device *dev, struct page *page, size_t offset, size_t size, enum dma_data_direction dir, @@ -189,6 +193,17 @@ static inline int dma_alloc_iova_unaligned(struct dma_iova_state *state, static inline void dma_free_iova(struct dma_iova_state *state) { } +static inline dma_addr_t dma_hmm_link_page(struct dma_iova_state *state, + unsigned long *pfn, + dma_addr_t dma_offset) +{ + return DMA_MAPPING_ERROR; +} +static inline void dma_hmm_unlink_page(struct dma_iova_state *state, + unsigned long *pfn, + dma_addr_t dma_offset) +{ +} static inline dma_addr_t dma_map_page_attrs(struct device *dev, struct page *page, size_t offset, size_t size, enum dma_data_direction dir, unsigned long attrs) diff --git a/kernel/dma/mapping.c b/kernel/dma/mapping.c index 39fac8c21643..5354ddc3ac03 100644 --- a/kernel/dma/mapping.c +++ b/kernel/dma/mapping.c @@ -17,6 +17,7 @@ #include #include #include +#include #include "debug.h" #include "direct.h" @@ -1084,3 +1085,104 @@ void dma_unlink_range_attrs(struct dma_iova_state *state, unsigned long attrs) state->dir, attrs); } EXPORT_SYMBOL_GPL(dma_unlink_range_attrs); + +/** + * dma_hmm_link_page - Link a physical HMM page to DMA address + * @state: IOVA state + * @pfn: HMM PFN + * @dma_offset: DMA offset form which this page needs to be linked + * + * dma_alloc_iova() allocates IOVA based on the size specified by their use in + * iova->size. Call this function after IOVA allocation to link whole @page + * to get the DMA address. Note that very first call to this function + * will have @dma_offset set to 0 in the IOVA space allocated from + * dma_alloc_iova(). For subsequent calls to this function on same @iova, + * @dma_offset needs to be advanced by the caller with the size of previous + * page that was linked + DMA address returned for the previous page that was + * linked by this function. + */ +dma_addr_t dma_hmm_link_page(struct dma_iova_state *state, unsigned long *pfn, + dma_addr_t dma_offset) +{ + struct device *dev = state->dev; + struct page *page = hmm_pfn_to_page(*pfn); + phys_addr_t phys = page_to_phys(page); + bool coherent = dev_is_dma_coherent(dev); + dma_addr_t addr; + int ret; + + if (*pfn & HMM_PFN_DMA_MAPPED) + /* + * We are in this flow when there is a need to resync flags, + * for example when page was already linked in prefetch call + * with READ flag and now we need to add WRITE flag + * + * This page was already programmed to HW and we don't want/need + * to unlink and link it again just to resync flags. + * + * The DMA address calculation below is based on the fact that + * HMM doesn't work with swiotlb. + */ + return (state->addr) ? state->addr + dma_offset : + phys_to_dma(dev, phys); + + state->range_size = dma_offset; + + /* + * The below check is based on assumption that HMM range users + * don't work with swiotlb and hence can be or in direct mode + * or in IOMMU mode. + */ + if (!use_dma_iommu(dev)) { + if (!coherent) + arch_sync_dma_for_device(phys, PAGE_SIZE, state->dir); + + addr = phys_to_dma(dev, phys); + goto done; + } + + ret = dma_start_range(state); + if (ret) + return DMA_MAPPING_ERROR; + + addr = dma_link_range(state, phys, PAGE_SIZE); + dma_end_range(state); + if (dma_mapping_error(state->dev, addr)) + return addr; + +done: + kmsan_handle_dma(page, 0, PAGE_SIZE, state->dir); + *pfn |= HMM_PFN_DMA_MAPPED; + return addr; +} +EXPORT_SYMBOL_GPL(dma_hmm_link_page); + +/** + * dma_hmm_unlink_page - Unlink a physical HMM page from DMA address + * @state: IOVA state + * @pfn: HMM PFN + * @dma_offset: DMA offset form which this page needs to be unlinked + * from the IOVA space + */ +void dma_hmm_unlink_page(struct dma_iova_state *state, unsigned long *pfn, + dma_addr_t dma_offset) +{ + struct device *dev = state->dev; + struct page *page; + phys_addr_t phys; + + *pfn &= ~HMM_PFN_DMA_MAPPED; + + if (!use_dma_iommu(dev)) { + page = hmm_pfn_to_page(*pfn); + phys = page_to_phys(page); + + dma_direct_sync_single_for_cpu(dev, phys_to_dma(dev, phys), + PAGE_SIZE, state->dir); + return; + } + + iommu_dma_unlink_range(dev, state->addr + dma_offset, PAGE_SIZE, + state->dir, 0); +} +EXPORT_SYMBOL_GPL(dma_hmm_unlink_page);