diff mbox series

RDMA/rxe: For invalidate compare keys according to the MR access

Message ID 20220629164946.521293-1-haris.phnx@gmail.com (mailing list archive)
State Superseded
Headers show
Series RDMA/rxe: For invalidate compare keys according to the MR access | expand

Commit Message

Md Haris Iqbal June 29, 2022, 4:49 p.m. UTC
In rxe, the access permissions decide which of the lkey/rkey would be set
during an MR registration. For an MR with only LOCAL access, only lkey is
set and rkey stays 0. For an MR with REMOTE access, both lkey and rkey are
set, such that rkey=lkey.

Hence, for MR invalidate, do the comparison for keys according to the MR
access. Since the invalidate wr can contain only a single key
(ex.invalidate_rkey), it should match MR->rkey if the MR being invalidated
has REMOTE access. If the MR has only LOCAL access, then that key should
match MR->lkey.

Fixes: 3902b429ca14 ("RDMA/rxe: Implement invalidate MW operations")
Cc: rpearsonhpe@gmail.com
Signed-off-by: Md Haris Iqbal <haris.phnx@gmail.com>
---
 drivers/infiniband/sw/rxe/rxe_loc.h |  2 +-
 drivers/infiniband/sw/rxe/rxe_mr.c  | 17 +++++++++++------
 2 files changed, 12 insertions(+), 7 deletions(-)

Comments

Md Haris Iqbal June 29, 2022, 5:20 p.m. UTC | #1
On Wed, Jun 29, 2022 at 6:49 PM Md Haris Iqbal <haris.phnx@gmail.com> wrote:
>
> In rxe, the access permissions decide which of the lkey/rkey would be set
> during an MR registration. For an MR with only LOCAL access, only lkey is
> set and rkey stays 0. For an MR with REMOTE access, both lkey and rkey are
> set, such that rkey=lkey.
>
> Hence, for MR invalidate, do the comparison for keys according to the MR
> access. Since the invalidate wr can contain only a single key
> (ex.invalidate_rkey), it should match MR->rkey if the MR being invalidated
> has REMOTE access. If the MR has only LOCAL access, then that key should
> match MR->lkey.
>
> Fixes: 3902b429ca14 ("RDMA/rxe: Implement invalidate MW operations")

I think I messed up the Fixes line. It should be,

Fixes: 001345339f4c ("RDMA/rxe: Separate HW and SW l/rkeys")

> Cc: rpearsonhpe@gmail.com
> Signed-off-by: Md Haris Iqbal <haris.phnx@gmail.com>
> ---
>  drivers/infiniband/sw/rxe/rxe_loc.h |  2 +-
>  drivers/infiniband/sw/rxe/rxe_mr.c  | 17 +++++++++++------
>  2 files changed, 12 insertions(+), 7 deletions(-)
>
> diff --git a/drivers/infiniband/sw/rxe/rxe_loc.h b/drivers/infiniband/sw/rxe/rxe_loc.h
> index 0e022ae1b8a5..37484a559d20 100644
> --- a/drivers/infiniband/sw/rxe/rxe_loc.h
> +++ b/drivers/infiniband/sw/rxe/rxe_loc.h
> @@ -77,7 +77,7 @@ struct rxe_mr *lookup_mr(struct rxe_pd *pd, int access, u32 key,
>                          enum rxe_mr_lookup_type type);
>  int mr_check_range(struct rxe_mr *mr, u64 iova, size_t length);
>  int advance_dma_data(struct rxe_dma_info *dma, unsigned int length);
> -int rxe_invalidate_mr(struct rxe_qp *qp, u32 rkey);
> +int rxe_invalidate_mr(struct rxe_qp *qp, u32 key);
>  int rxe_reg_fast_mr(struct rxe_qp *qp, struct rxe_send_wqe *wqe);
>  int rxe_mr_set_page(struct ib_mr *ibmr, u64 addr);
>  int rxe_dereg_mr(struct ib_mr *ibmr, struct ib_udata *udata);
> diff --git a/drivers/infiniband/sw/rxe/rxe_mr.c b/drivers/infiniband/sw/rxe/rxe_mr.c
> index fc3942e04a1f..790cff7077fd 100644
> --- a/drivers/infiniband/sw/rxe/rxe_mr.c
> +++ b/drivers/infiniband/sw/rxe/rxe_mr.c
> @@ -576,22 +576,27 @@ struct rxe_mr *lookup_mr(struct rxe_pd *pd, int access, u32 key,
>         return mr;
>  }
>
> -int rxe_invalidate_mr(struct rxe_qp *qp, u32 rkey)
> +int rxe_invalidate_mr(struct rxe_qp *qp, u32 key)
>  {
>         struct rxe_dev *rxe = to_rdev(qp->ibqp.device);
>         struct rxe_mr *mr;
>         int ret;
>
> -       mr = rxe_pool_get_index(&rxe->mr_pool, rkey >> 8);
> +       mr = rxe_pool_get_index(&rxe->mr_pool, key >> 8);
>         if (!mr) {
> -               pr_err("%s: No MR for rkey %#x\n", __func__, rkey);
> +               pr_err("%s: No MR for key %#x\n", __func__, key);
>                 ret = -EINVAL;
>                 goto err;
>         }
>
> -       if (rkey != mr->rkey) {
> -               pr_err("%s: rkey (%#x) doesn't match mr->rkey (%#x)\n",
> -                       __func__, rkey, mr->rkey);
> +       if ((mr->access & IB_ACCESS_REMOTE) && key != mr->rkey) {
> +               pr_err("%s: key (%#x) doesn't match mr->rkey (%#x)\n",
> +                       __func__, key, mr->rkey);
> +               ret = -EINVAL;
> +               goto err_drop_ref;
> +       } else if ((mr->access & IB_ACCESS_LOCAL_WRITE) && key != mr->lkey) {
> +               pr_err("%s: key (%#x) doesn't match mr->lkey (%#x)\n",
> +                       __func__, key, mr->lkey);
>                 ret = -EINVAL;
>                 goto err_drop_ref;
>         }
> --
> 2.25.1
>
Jason Gunthorpe June 29, 2022, 6:34 p.m. UTC | #2
On Wed, Jun 29, 2022 at 06:49:46PM +0200, Md Haris Iqbal wrote:
> In rxe, the access permissions decide which of the lkey/rkey would be set
> during an MR registration. For an MR with only LOCAL access, only lkey is
> set and rkey stays 0. For an MR with REMOTE access, both lkey and rkey are
> set, such that rkey=lkey.
> 
> Hence, for MR invalidate, do the comparison for keys according to the MR
> access. Since the invalidate wr can contain only a single key
> (ex.invalidate_rkey), it should match MR->rkey if the MR being invalidated
> has REMOTE access. If the MR has only LOCAL access, then that key should
> match MR->lkey.
> 
> Fixes: 3902b429ca14 ("RDMA/rxe: Implement invalidate MW operations")
> Cc: rpearsonhpe@gmail.com
> Signed-off-by: Md Haris Iqbal <haris.phnx@gmail.com>
> ---
>  drivers/infiniband/sw/rxe/rxe_loc.h |  2 +-
>  drivers/infiniband/sw/rxe/rxe_mr.c  | 17 +++++++++++------
>  2 files changed, 12 insertions(+), 7 deletions(-)

If the rkey's and lkeys are always the same why do we store them
twice in the mr ?

> diff --git a/drivers/infiniband/sw/rxe/rxe_loc.h b/drivers/infiniband/sw/rxe/rxe_loc.h
> index 0e022ae1b8a5..37484a559d20 100644
> --- a/drivers/infiniband/sw/rxe/rxe_loc.h
> +++ b/drivers/infiniband/sw/rxe/rxe_loc.h
> @@ -77,7 +77,7 @@ struct rxe_mr *lookup_mr(struct rxe_pd *pd, int access, u32 key,
>  			 enum rxe_mr_lookup_type type);
>  int mr_check_range(struct rxe_mr *mr, u64 iova, size_t length);
>  int advance_dma_data(struct rxe_dma_info *dma, unsigned int length);
> -int rxe_invalidate_mr(struct rxe_qp *qp, u32 rkey);
> +int rxe_invalidate_mr(struct rxe_qp *qp, u32 key);
>  int rxe_reg_fast_mr(struct rxe_qp *qp, struct rxe_send_wqe *wqe);
>  int rxe_mr_set_page(struct ib_mr *ibmr, u64 addr);
>  int rxe_dereg_mr(struct ib_mr *ibmr, struct ib_udata *udata);
> diff --git a/drivers/infiniband/sw/rxe/rxe_mr.c b/drivers/infiniband/sw/rxe/rxe_mr.c
> index fc3942e04a1f..790cff7077fd 100644
> --- a/drivers/infiniband/sw/rxe/rxe_mr.c
> +++ b/drivers/infiniband/sw/rxe/rxe_mr.c
> @@ -576,22 +576,27 @@ struct rxe_mr *lookup_mr(struct rxe_pd *pd, int access, u32 key,
>  	return mr;
>  }
>  
> -int rxe_invalidate_mr(struct rxe_qp *qp, u32 rkey)
> +int rxe_invalidate_mr(struct rxe_qp *qp, u32 key)
>  {
>  	struct rxe_dev *rxe = to_rdev(qp->ibqp.device);
>  	struct rxe_mr *mr;
>  	int ret;
>  
> -	mr = rxe_pool_get_index(&rxe->mr_pool, rkey >> 8);
> +	mr = rxe_pool_get_index(&rxe->mr_pool, key >> 8);
>  	if (!mr) {
> -		pr_err("%s: No MR for rkey %#x\n", __func__, rkey);
> +		pr_err("%s: No MR for key %#x\n", __func__, key);
>  		ret = -EINVAL;
>  		goto err;
>  	}
>  
> -	if (rkey != mr->rkey) {
> -		pr_err("%s: rkey (%#x) doesn't match mr->rkey (%#x)\n",
> -			__func__, rkey, mr->rkey);
> +	if ((mr->access & IB_ACCESS_REMOTE) && key != mr->rkey) {
> +		pr_err("%s: key (%#x) doesn't match mr->rkey (%#x)\n",
> +			__func__, key, mr->rkey);
> +		ret = -EINVAL;
> +		goto err_drop_ref;
> +	} else if ((mr->access & IB_ACCESS_LOCAL_WRITE) && key != mr->lkey) {
> +		pr_err("%s: key (%#x) doesn't match mr->lkey (%#x)\n",
> +			__func__, key, mr->lkey);
>  		ret = -EINVAL;
>  		goto err_drop_ref;
>  	}

Hurm, I think rxe still has problems here.

By my reading of the spec a FRWR on a l_key should set the variant
bits on the l_key as well, but rxe only updates variant bits on rkeys?

I don't understand why it is trying to keep lkey and rkey seperated..

Are you actually using !IB_ACCESS_REMOTE with FRWR? If so how does it
behave on mlx5 devices with regard to the variant bits?

Jason
Pearson, Robert B June 29, 2022, 6:40 p.m. UTC | #3
> If the rkey's and lkeys are always the same why do we store them twice in the mr ?

They are not always the same currently. If you request remote access they are the same if you don't rkey is set to zero.
You could, of course, check both the keys and the access bits but that is not the way it is written currently.

Bob
Jason Gunthorpe June 29, 2022, 6:44 p.m. UTC | #4
On Wed, Jun 29, 2022 at 06:40:07PM +0000, Pearson, Robert B wrote:
> 
> > If the rkey's and lkeys are always the same why do we store them twice in the mr ?
> 
> They are not always the same currently. If you request remote access they are the same if you don't rkey is set to zero.
> You could, of course, check both the keys and the access bits but that is not the way it is written currently.

Storing the rkey instead of checking the flags seems like a weird
obfuscation to me..

Jason
Pearson, Robert B June 29, 2022, 6:47 p.m. UTC | #5
> > > If the rkey's and lkeys are always the same why do we store them twice in the mr ?
> > 
> > They are not always the same currently. If you request remote access they are the same if you don't rkey is set to zero.
> > You could, of course, check both the keys and the access bits but that is not the way it is written currently.

> Storing the rkey instead of checking the flags seems like a weird obfuscation to me..

> Jason

One always has the choice to always just use the lkey and check the flags. But referring the rkey just uses one memory reference 
Md Haris Iqbal July 5, 2022, 9:28 a.m. UTC | #6
On Wed, Jun 29, 2022 at 8:48 PM Pearson, Robert B
<robert.pearson2@hpe.com> wrote:
>
> > > > If the rkey's and lkeys are always the same why do we store them twice in the mr ?
> > >
> > > They are not always the same currently. If you request remote access they are the same if you don't rkey is set to zero.
> > > You could, of course, check both the keys and the access bits but that is not the way it is written currently.
>
> > Storing the rkey instead of checking the flags seems like a weird obfuscation to me..
>
> > Jason
>
> One always has the choice to always just use the lkey and check the flags. But referring the rkey just uses one memory reference 
Jason Gunthorpe July 5, 2022, 1:59 p.m. UTC | #7
On Tue, Jul 05, 2022 at 11:28:59AM +0200, haris iqbal wrote:
> On Wed, Jun 29, 2022 at 8:48 PM Pearson, Robert B
> <robert.pearson2@hpe.com> wrote:
> >
> > > > > If the rkey's and lkeys are always the same why do we store them twice in the mr ?
> > > >
> > > > They are not always the same currently. If you request remote access they are the same if you don't rkey is set to zero.
> > > > You could, of course, check both the keys and the access bits but that is not the way it is written currently.
> >
> > > Storing the rkey instead of checking the flags seems like a weird obfuscation to me..
> >
> > > Jason
> >
> > One always has the choice to always just use the lkey and check the flags. But referring the rkey just uses one memory reference 
Md Haris Iqbal July 6, 2022, 3:41 a.m. UTC | #8
On Tue, Jul 5, 2022 at 4:00 PM Jason Gunthorpe <jgg@ziepe.ca> wrote:
>
> On Tue, Jul 05, 2022 at 11:28:59AM +0200, haris iqbal wrote:
> > On Wed, Jun 29, 2022 at 8:48 PM Pearson, Robert B
> > <robert.pearson2@hpe.com> wrote:
> > >
> > > > > > If the rkey's and lkeys are always the same why do we store them twice in the mr ?
> > > > >
> > > > > They are not always the same currently. If you request remote access they are the same if you don't rkey is set to zero.
> > > > > You could, of course, check both the keys and the access bits but that is not the way it is written currently.
> > >
> > > > Storing the rkey instead of checking the flags seems like a weird obfuscation to me..
> > >
> > > > Jason
> > >
> > > One always has the choice to always just use the lkey and check the flags. But referring the rkey just uses one memory reference 
Jason Gunthorpe July 6, 2022, 4:39 p.m. UTC | #9
On Wed, Jul 06, 2022 at 05:41:08AM +0200, haris iqbal wrote:
> On Tue, Jul 5, 2022 at 4:00 PM Jason Gunthorpe <jgg@ziepe.ca> wrote:
> >
> > On Tue, Jul 05, 2022 at 11:28:59AM +0200, haris iqbal wrote:
> > > On Wed, Jun 29, 2022 at 8:48 PM Pearson, Robert B
> > > <robert.pearson2@hpe.com> wrote:
> > > >
> > > > > > > If the rkey's and lkeys are always the same why do we store them twice in the mr ?
> > > > > >
> > > > > > They are not always the same currently. If you request remote access they are the same if you don't rkey is set to zero.
> > > > > > You could, of course, check both the keys and the access bits but that is not the way it is written currently.
> > > >
> > > > > Storing the rkey instead of checking the flags seems like a weird obfuscation to me..
> > > >
> > > > > Jason
> > > >
> > > > One always has the choice to always just use the lkey and check the flags. But referring the rkey just uses one memory reference 
Md Haris Iqbal July 7, 2022, 7:32 a.m. UTC | #10
On Wed, Jul 6, 2022 at 6:39 PM Jason Gunthorpe <jgg@ziepe.ca> wrote:
>
> On Wed, Jul 06, 2022 at 05:41:08AM +0200, haris iqbal wrote:
> > On Tue, Jul 5, 2022 at 4:00 PM Jason Gunthorpe <jgg@ziepe.ca> wrote:
> > >
> > > On Tue, Jul 05, 2022 at 11:28:59AM +0200, haris iqbal wrote:
> > > > On Wed, Jun 29, 2022 at 8:48 PM Pearson, Robert B
> > > > <robert.pearson2@hpe.com> wrote:
> > > > >
> > > > > > > > If the rkey's and lkeys are always the same why do we store them twice in the mr ?
> > > > > > >
> > > > > > > They are not always the same currently. If you request remote access they are the same if you don't rkey is set to zero.
> > > > > > > You could, of course, check both the keys and the access bits but that is not the way it is written currently.
> > > > >
> > > > > > Storing the rkey instead of checking the flags seems like a weird obfuscation to me..
> > > > >
> > > > > > Jason
> > > > >
> > > > > One always has the choice to always just use the lkey and check the flags. But referring the rkey just uses one memory reference 
diff mbox series

Patch

diff --git a/drivers/infiniband/sw/rxe/rxe_loc.h b/drivers/infiniband/sw/rxe/rxe_loc.h
index 0e022ae1b8a5..37484a559d20 100644
--- a/drivers/infiniband/sw/rxe/rxe_loc.h
+++ b/drivers/infiniband/sw/rxe/rxe_loc.h
@@ -77,7 +77,7 @@  struct rxe_mr *lookup_mr(struct rxe_pd *pd, int access, u32 key,
 			 enum rxe_mr_lookup_type type);
 int mr_check_range(struct rxe_mr *mr, u64 iova, size_t length);
 int advance_dma_data(struct rxe_dma_info *dma, unsigned int length);
-int rxe_invalidate_mr(struct rxe_qp *qp, u32 rkey);
+int rxe_invalidate_mr(struct rxe_qp *qp, u32 key);
 int rxe_reg_fast_mr(struct rxe_qp *qp, struct rxe_send_wqe *wqe);
 int rxe_mr_set_page(struct ib_mr *ibmr, u64 addr);
 int rxe_dereg_mr(struct ib_mr *ibmr, struct ib_udata *udata);
diff --git a/drivers/infiniband/sw/rxe/rxe_mr.c b/drivers/infiniband/sw/rxe/rxe_mr.c
index fc3942e04a1f..790cff7077fd 100644
--- a/drivers/infiniband/sw/rxe/rxe_mr.c
+++ b/drivers/infiniband/sw/rxe/rxe_mr.c
@@ -576,22 +576,27 @@  struct rxe_mr *lookup_mr(struct rxe_pd *pd, int access, u32 key,
 	return mr;
 }
 
-int rxe_invalidate_mr(struct rxe_qp *qp, u32 rkey)
+int rxe_invalidate_mr(struct rxe_qp *qp, u32 key)
 {
 	struct rxe_dev *rxe = to_rdev(qp->ibqp.device);
 	struct rxe_mr *mr;
 	int ret;
 
-	mr = rxe_pool_get_index(&rxe->mr_pool, rkey >> 8);
+	mr = rxe_pool_get_index(&rxe->mr_pool, key >> 8);
 	if (!mr) {
-		pr_err("%s: No MR for rkey %#x\n", __func__, rkey);
+		pr_err("%s: No MR for key %#x\n", __func__, key);
 		ret = -EINVAL;
 		goto err;
 	}
 
-	if (rkey != mr->rkey) {
-		pr_err("%s: rkey (%#x) doesn't match mr->rkey (%#x)\n",
-			__func__, rkey, mr->rkey);
+	if ((mr->access & IB_ACCESS_REMOTE) && key != mr->rkey) {
+		pr_err("%s: key (%#x) doesn't match mr->rkey (%#x)\n",
+			__func__, key, mr->rkey);
+		ret = -EINVAL;
+		goto err_drop_ref;
+	} else if ((mr->access & IB_ACCESS_LOCAL_WRITE) && key != mr->lkey) {
+		pr_err("%s: key (%#x) doesn't match mr->lkey (%#x)\n",
+			__func__, key, mr->lkey);
 		ret = -EINVAL;
 		goto err_drop_ref;
 	}