From patchwork Sat Sep 24 23:21:35 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adit Ranadive X-Patchwork-Id: 9349369 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 63D9B601C2 for ; Sat, 24 Sep 2016 23:23:44 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 54CCE290C3 for ; Sat, 24 Sep 2016 23:23:44 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 49D38290CF; Sat, 24 Sep 2016 23:23:44 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,T_DKIM_INVALID autolearn=unavailable version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 61A76290C3 for ; Sat, 24 Sep 2016 23:23:43 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936226AbcIXXX3 (ORCPT ); Sat, 24 Sep 2016 19:23:29 -0400 Received: from ex13-edg-ou-001.vmware.com ([208.91.0.189]:24765 "EHLO EX13-EDG-OU-001.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1030388AbcIXXWm (ORCPT ); Sat, 24 Sep 2016 19:22:42 -0400 Received: from sc9-mailhost2.vmware.com (10.113.161.72) by EX13-EDG-OU-001.vmware.com (10.113.208.155) with Microsoft SMTP Server id 15.0.1156.6; Sat, 24 Sep 2016 16:22:02 -0700 Received: from EX13-CAS-002.vmware.com (smtp-inbound.vmware.com [10.113.191.52]) by sc9-mailhost2.vmware.com (Postfix) with ESMTP id 613C5B031E; Sat, 24 Sep 2016 16:22:29 -0700 (PDT) Received: from EX13-MBX-033.vmware.com (10.113.191.73) by EX13-MBX-005.vmware.com (10.113.191.25) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Sat, 24 Sep 2016 16:22:29 -0700 Received: from EX13-CAS-003.vmware.com (10.113.191.53) by EX13-MBX-033.vmware.com (10.113.191.73) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Sat, 24 Sep 2016 16:22:28 -0700 Received: from NAM01-BN3-obe.outbound.protection.outlook.com (10.113.170.11) by EX13-CAS-003.vmware.com (10.113.191.53) with Microsoft SMTP Server (TLS) id 15.0.1156.6 via Frontend Transport; Sat, 24 Sep 2016 16:22:28 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=onevmw.onmicrosoft.com; s=selector1-vmware-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Ht9WLsiP8EED0mkjq/GTD+mJdkf9BdmcZiOcaBWa9Xc=; b=s2HnAgN/Tz2eJBMVG872LELCd6mcoToJlAPqhJq3YV4w7bueVnxyxs/S+6B+QM2VS14/bnScVFpfgYn3Kkq6IQuKXCdpddWvq7ZlxwAdVuXyoO9Nw29M63EHgN47Ldo3UKFD6Ds4vrM+foh08aJsb4JZm/flrzgwyhm92lo2UAw= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=aditr@vmware.com; Received: from promb-2s-dhcp95-136.eng.vmware.com (208.91.1.34) by CO2PR0501MB837.namprd05.prod.outlook.com (10.141.244.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.639.2; Sat, 24 Sep 2016 23:22:24 +0000 From: Adit Ranadive To: , , CC: Adit Ranadive , , , , , , Subject: [PATCH v5 11/16] IB/pvrdma: Add support for memory regions Date: Sat, 24 Sep 2016 16:21:35 -0700 Message-ID: X-Mailer: git-send-email 2.7.4 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [208.91.1.34] X-ClientProxiedBy: CY1PR18CA0027.namprd18.prod.outlook.com (10.163.31.37) To CO2PR0501MB837.namprd05.prod.outlook.com (10.141.244.147) X-MS-Office365-Filtering-Correlation-Id: cd0cc1c0-aaad-463b-4d9a-08d3e4d1a534 X-Microsoft-Exchange-Diagnostics: 1; CO2PR0501MB837; 2:/zx3Hu2N4rB6Fvzwj0cKH0zQWi8g9KMxgxqp3EGxySMggMbNKSxGMx4/e4BL46lDR+/LkAxApvuyXU4+U0EpCAutSuugYdqEmcBZ8zkOW1SwRNKpUhnhdLixkR5n7poJTUy2ktCHYKL8wMk+qwt5juafw1SU9gCWWI2AmVutXIsRLrz3fjlUjqgTvSNqvg44; 3:OZoy+Z/KwaYHJ/opEA9krDtfw2bElvqwkJFzZ99Jc2bIqNTD3XXg05Qb4jlME5USaQL9l4D4KjWbRawAiwCj47YLyHhrChJrntHK/+aIM3p44/eCHHD31SLoSrBYExAo; 25:KlaUzaIi+jImNURdDsJMGJBygwb1hiCxiByxuBMPxiKG8kyWlc42zZ4OTk+d9c+8CLhx1yAMzQC5EgsABcs6fb3KtEJPL6nQrvGYe+InhUgvtBkpXs69g7dhIfUDHZT19UgQPqmqWsA2YBHxV+THdkQLrUkh646/hCXJmlA5/v5GI2DqOlNPeSW55siaw0zZnEfB38mbLJpIGAlwnQetxeDA+w82rn4fe86UOrRYGJ0G92eoQtWASDngM7DSriO0NQXM3UxkCP89sxLk/oQdLZKWb5Ro8qrqQLdX1Dw2HUceCkCIiCS3cSX4HX9k0MVrwqtCY9JbjjF6c4U2K8jKnufsDT53emn+5kQovjKOif0L74RoY72OorQsQuthNQgTpY8v74IsqB01pcx43reBVeE9i2F8rM6OD/NZQHP4z/A= X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CO2PR0501MB837; X-LD-Processed: b39138ca-3cee-4b4a-a4d6-cd83d9dd62f0,ExtAddr X-Microsoft-Exchange-Diagnostics: 1; CO2PR0501MB837; 31:sBKT8MWxetxf8Ssqnel9H6j38grbHdA8pofqe2IGeagGsYr2QPqgLn2I8gUkD1c4GJY9mwYAW8ulWu/hcCwk9xqp/tMhjKhL+xFd9NO9r+bL8P3KZCx+mGzVCu+8rJaCWXEhhFvomdk89d1YgChzMwAKR07OzGi8FIedm1YXvlFtQWpwTfRdIL1XZZuRaA8EgRylEwaS6aP+gdy+xEIrpcyH6NckblsSDjhRO0VkK3M=; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(250305191791016)(61668805478150)(22074186197030)(146099531331640); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040176)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046); SRVR:CO2PR0501MB837; BCL:0; PCL:0; RULEID:; SRVR:CO2PR0501MB837; X-Microsoft-Exchange-Diagnostics: 1; CO2PR0501MB837; 4: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 X-Forefront-PRVS: 0075CB064E X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(7916002)(189002)(199003)(107886002)(77096005)(97736004)(4326007)(106356001)(105586002)(15975445007)(76176999)(586003)(6862003)(118296001)(50986999)(2950100002)(33646002)(6116002)(5001770100001)(19580395003)(5660300001)(19580405001)(92566002)(2906002)(3846002)(47776003)(189998001)(50466002)(86362001)(48376002)(2201001)(81156014)(81166006)(101416001)(8676002)(50226002)(5003940100001)(36756003)(7736002)(7846002)(305945005)(229853001)(42186005)(68736007)(66066001)(4001430100002)(7099028)(2004002); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR0501MB837; H:promb-2s-dhcp95-136.eng.vmware.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; Received-SPF: None (EX13-EDG-OU-001.vmware.com: aditr@vmware.com does not designate permitted sender hosts) Received-SPF: None (protection.outlook.com: vmware.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CO2PR0501MB837; 23:3rnmRAIBUn6T5CrVYbZ5XL5iiZlg+eGRRGpV4HZh?= =?us-ascii?Q?GOLnxXOzodzj/OjIm2T4ehQpcunRDfzc3WT6s1p7IM3bZdxcTb5Al17CtxND?= =?us-ascii?Q?Qsa99eSlBFQagGI8cOtN+7elRlG1v/jx+OWM2Vou1/JxVYttcWC1O+CpVxwR?= =?us-ascii?Q?k34fZzP28fw2ZoT3hBR3wkNVw/YWGtvmyYWUuge0cECnJoAmHp8d03g56zgv?= =?us-ascii?Q?VXVq1MsxwNoDr+ImoYUFygvbuM8D+YIIwIOHshCDoJQedvwebZglzeE+JGri?= =?us-ascii?Q?AaNpPe+s/WTjubneEc0/bYzKAbSNeArGUY+g0h3uu6REnZHPUOdxzyfoeAci?= =?us-ascii?Q?eCDQ4V8aux7Yy7V26J0MLsU6IZ8VIc2uzoqU5dOZ9Fb4FdrGnLK+gbHw9DK5?= =?us-ascii?Q?NBcGpVURs7pXEst9rbjX3sgmpnEf42Gh2v/3SpnboyKXl+4bsULiSAOQ6Kvo?= =?us-ascii?Q?O3j2841iPICzP6h3TWBkFmD06D73W97ScpkC8Njb1t1Cx1sH15Fx+TJzxQrs?= =?us-ascii?Q?n/D6HXXhfdjKktfiNO6bRFMybHSF6a/QHmwck9jfXvB3f1XO0fiX+K6UoHBU?= =?us-ascii?Q?NHe+VukDJla/0+tPaLtklpS6BZb48IRU/noyjIPWwtSIE0ZSJ4vrdqpC3PBz?= =?us-ascii?Q?o2mUuiYm9uV+A87t7jQ1GJ0vc1qNwqU4Zr23Rbduux6dnKfKhF3wb3cDdvaL?= =?us-ascii?Q?l3P8NN7jM7lhlYXymM8/b90VTtcRH85q+7qDZbL3qTdPcsbpwv95wP4n8Swq?= =?us-ascii?Q?QGCIErR+36697aZuH0tQzmXkM3BWI1iYGwI0BOO7/hEoMFCNxdKhSBCaB12P?= =?us-ascii?Q?VwjfMSgE54jQzz/pmcx/VOB/gY33uHmjqGKdiiOZoL9kKBLuqat4sKNQVYm2?= =?us-ascii?Q?9co7FNedLuD71K6Q0S6EuB2o8Z2zIKPLTiC0sUpFVBUruKfExDM5qSNIcvel?= =?us-ascii?Q?lFjJnIrw0JPVO9BB0avWsQlTvlNmClVWXkSw/dGyXe6ECu4OSmOYP10xizQ9?= =?us-ascii?Q?xmDdvk0HTJKtFGXAvkWrLEpEmRfNAzZtTErhMx2wn7oTbkaJsEFjfnS72MBg?= =?us-ascii?Q?DrIYSlFPIoB9cbphdHAd69ZU3QR+K5r2LDZIJpM1ipyDJzP3IcHXcKtqTDW8?= =?us-ascii?Q?X1rmrwDHkMB2MVbKg3ClA6lLbqOV0u2qTGcgVhWlx/MFQ0Sdu5NajgR6ez7y?= =?us-ascii?Q?SzpiehUvwSI+ovtyZJLI6KdZh4RuNaM2kJkavcf5sC1br/jeB15orV4+ew?= =?us-ascii?Q?=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; CO2PR0501MB837; 6:K+QzV9dbYfmIF/fgt+dQDoZNPmHtYUha5YvfGBwBRedcXuRzQT2WwjnngcvRPvdriOza9q9jhvytdTZBircyEtFmhn+kvVCrSE2e7xRUIhDIFrB74nG4Jr9eaunnu8Lt9A2Fj8JsrregEi/o1WzSsWjZgOJEruLiMH07cyPdsntXWXNWm6/Vwapn8VXoYVi6GOsh34VbCcQCFzqflEkCcVDT+D/XzbuMpktw4h9wB7ee1Dn+7igVoaj+eHaFCJbJ7Ntlq8Nxoay25tZ8iUyv8CNR+8ClgTpqcjX8340mZj0=; 5:KPF11qGPIg9WhsXkaXilxD/Q0GMjLz4jjP1q78aq/15Z6TaimHxhv76Bu12bDNAEJjZYvn2ah4gOuPqsjwZxRveHZVF1pHlyntynjoXHUubsWskKmeJuE4HdWSVzlH5hwDiYJMmpjjWN8bFQYjh/0A==; 24:ZT9HjYb61YJFMJHLoNQzkLSIVk8Gxnoah63Qq5jzkRBWVVd2DWCIyDWBhR+q4v32MozJvgOZp3Y6bpOr+fydrTF2FWQd/MsNmuZRTrC6d+c=; 7:1drQBLCv957hc0dJrTmdNZVyQ1i6tlqcCLv0FxuNM8XIeThaiBXTFeZVbT1mAff1kGvjxrF5iblwFg+nioD8LifKRLtXr3DAUNXAGX7sDq3Pn7PU+FG1JShvkovBr4o4Y0okx43AqS28pUSUpn+5wa+6DaiQKU7cHT2Zx4pfb7Q+KM71aYqfo3lxL5SgIz/HSBzCfz9GZdu54O2mSDo65pLL8NjU0gaREwHyZuGaDt3m31iZO3qGkNrmvNjvr54/P9SaVydFjyHa9saRydzLfX+GghE5vcP1mvV9euXL/kZapMHnad+b4I1JebOdI40/ SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CO2PR0501MB837; 20:gTNVn7Kkskp6SV0+ND4ljfTRHuFg0daBMETTfBdKyUdpdiIgdnGiYf1GRWjHl3Obtfdq2pJicoIJvAAAc1kBlz1hvVndWDs/ITrFu3BZjaRPsnKxKS610psov+uUuCKcVjloeiRwfmvcWUQlBwpywSiwDA/akhGN6X1x/oe1TEE= X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Sep 2016 23:22:24.8018 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR0501MB837 Sender: linux-rdma-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-rdma@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP This patch adds support for creating and destroying memory regions. The PVRDMA device supports User MRs, DMA MRs (no Remote Read/Write support), Fast Register MRs. Reviewed-by: Yuval Shaia Reviewed-by: Jorgen Hansen Reviewed-by: George Zhang Reviewed-by: Aditya Sarwade Reviewed-by: Bryan Tan Signed-off-by: Adit Ranadive --- Changes v4->v5: - Check the access flags correctly for DMA MR. - Update to pvrdma_cmd_post for creating/destroying MRs. Changes v3->v4: - Changed access flag check for DMA MR to using bit operation. - Removed some local variables. Changes v2->v3: - Removed boolean in pvrdma_cmd_post. --- drivers/infiniband/hw/pvrdma/pvrdma_mr.c | 334 +++++++++++++++++++++++++++++++ 1 file changed, 334 insertions(+) create mode 100644 drivers/infiniband/hw/pvrdma/pvrdma_mr.c diff --git a/drivers/infiniband/hw/pvrdma/pvrdma_mr.c b/drivers/infiniband/hw/pvrdma/pvrdma_mr.c new file mode 100644 index 0000000..8519f32 --- /dev/null +++ b/drivers/infiniband/hw/pvrdma/pvrdma_mr.c @@ -0,0 +1,334 @@ +/* + * Copyright (c) 2012-2016 VMware, Inc. All rights reserved. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of EITHER the GNU General Public License + * version 2 as published by the Free Software Foundation or the BSD + * 2-Clause License. This program is distributed in the hope that it + * will be useful, but WITHOUT ANY WARRANTY; WITHOUT EVEN THE IMPLIED + * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + * See the GNU General Public License version 2 for more details at + * http://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html. + * + * You should have received a copy of the GNU General Public License + * along with this program available in the file COPYING in the main + * directory of this source tree. + * + * The BSD 2-Clause License + * + * Redistribution and use in source and binary forms, with or + * without modification, are permitted provided that the following + * conditions are met: + * + * - Redistributions of source code must retain the above + * copyright notice, this list of conditions and the following + * disclaimer. + * + * - Redistributions in binary form must reproduce the above + * copyright notice, this list of conditions and the following + * disclaimer in the documentation and/or other materials + * provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, + * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + * OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include +#include + +#include "pvrdma.h" + +/** + * pvrdma_get_dma_mr - get a DMA memory region + * @pd: protection domain + * @acc: access flags + * + * @return: ib_mr pointer on success, otherwise returns an errno. + */ +struct ib_mr *pvrdma_get_dma_mr(struct ib_pd *pd, int acc) +{ + struct pvrdma_dev *dev = to_vdev(pd->device); + struct pvrdma_user_mr *mr; + union pvrdma_cmd_req req; + union pvrdma_cmd_resp rsp; + struct pvrdma_cmd_create_mr *cmd = &req.create_mr; + struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp; + int ret; + + /* Support only LOCAL_WRITE flag for DMA MRs */ + if (acc & ~IB_ACCESS_LOCAL_WRITE) { + dev_warn(&dev->pdev->dev, + "unsupported dma mr access flags %#x\n", acc); + return ERR_PTR(-EOPNOTSUPP); + } + + mr = kzalloc(sizeof(*mr), GFP_KERNEL); + if (!mr) + return ERR_PTR(-ENOMEM); + + memset(cmd, 0, sizeof(*cmd)); + cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR; + cmd->pd_handle = to_vpd(pd)->pd_handle; + cmd->access_flags = acc; + cmd->flags = PVRDMA_MR_FLAG_DMA; + + ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP); + if (ret < 0) { + dev_warn(&dev->pdev->dev, + "could not get DMA mem region, error: %d\n", ret); + kfree(mr); + return ERR_PTR(ret); + } + + mr->mmr.mr_handle = resp->mr_handle; + mr->ibmr.lkey = resp->lkey; + mr->ibmr.rkey = resp->rkey; + + return &mr->ibmr; +} + +/** + * pvrdma_reg_user_mr - register a userspace memory region + * @pd: protection domain + * @start: starting address + * @length: length of region + * @virt_addr: I/O virtual address + * @access_flags: access flags for memory region + * @udata: user data + * + * @return: ib_mr pointer on success, otherwise returns an errno. + */ +struct ib_mr *pvrdma_reg_user_mr(struct ib_pd *pd, u64 start, u64 length, + u64 virt_addr, int access_flags, + struct ib_udata *udata) +{ + struct pvrdma_dev *dev = to_vdev(pd->device); + struct pvrdma_user_mr *mr = NULL; + struct ib_umem *umem; + union pvrdma_cmd_req req; + union pvrdma_cmd_resp rsp; + struct pvrdma_cmd_create_mr *cmd = &req.create_mr; + struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp; + int nchunks; + int ret; + int entry; + struct scatterlist *sg; + + if (length == 0 || length > dev->dsr->caps.max_mr_size) { + dev_warn(&dev->pdev->dev, "invalid mem region length\n"); + return ERR_PTR(-EINVAL); + } + + umem = ib_umem_get(pd->uobject->context, start, + length, access_flags, 0); + if (IS_ERR(umem)) { + dev_warn(&dev->pdev->dev, + "could not get umem for mem region\n"); + return ERR_CAST(umem); + } + + nchunks = 0; + for_each_sg(umem->sg_head.sgl, sg, umem->nmap, entry) + nchunks += sg_dma_len(sg) >> PAGE_SHIFT; + + if (nchunks < 0 || nchunks > PVRDMA_PAGE_DIR_MAX_PAGES) { + dev_warn(&dev->pdev->dev, "overflow %d pages in mem region\n", + nchunks); + ret = -EINVAL; + goto err_umem; + } + + mr = kzalloc(sizeof(*mr), GFP_KERNEL); + if (!mr) { + ret = -ENOMEM; + goto err_umem; + } + + mr->mmr.iova = virt_addr; + mr->mmr.size = length; + mr->umem = umem; + + ret = pvrdma_page_dir_init(dev, &mr->pdir, nchunks, false); + if (ret) { + dev_warn(&dev->pdev->dev, + "could not allocate page directory\n"); + goto err_umem; + } + + ret = pvrdma_page_dir_insert_umem(&mr->pdir, mr->umem, 0); + if (ret) + goto err_pdir; + + memset(cmd, 0, sizeof(*cmd)); + cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR; + cmd->start = start; + cmd->length = length; + cmd->pd_handle = to_vpd(pd)->pd_handle; + cmd->access_flags = access_flags; + cmd->nchunks = nchunks; + cmd->pdir_dma = mr->pdir.dir_dma; + + ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP); + if (ret < 0) { + dev_warn(&dev->pdev->dev, + "could not register mem region, error: %d\n", ret); + goto err_pdir; + } + + mr->mmr.mr_handle = resp->mr_handle; + mr->ibmr.lkey = resp->lkey; + mr->ibmr.rkey = resp->rkey; + + return &mr->ibmr; + +err_pdir: + pvrdma_page_dir_cleanup(dev, &mr->pdir); +err_umem: + ib_umem_release(umem); + kfree(mr); + + return ERR_PTR(ret); +} + +/** + * pvrdma_alloc_mr - allocate a memory region + * @pd: protection domain + * @mr_type: type of memory region + * @max_num_sg: maximum number of pages + * + * @return: ib_mr pointer on success, otherwise returns an errno. + */ +struct ib_mr *pvrdma_alloc_mr(struct ib_pd *pd, enum ib_mr_type mr_type, + u32 max_num_sg) +{ + struct pvrdma_dev *dev = to_vdev(pd->device); + struct pvrdma_user_mr *mr; + union pvrdma_cmd_req req; + union pvrdma_cmd_resp rsp; + struct pvrdma_cmd_create_mr *cmd = &req.create_mr; + struct pvrdma_cmd_create_mr_resp *resp = &rsp.create_mr_resp; + int size = max_num_sg * sizeof(u64); + int ret; + + if (mr_type != IB_MR_TYPE_MEM_REG || + max_num_sg > PVRDMA_MAX_FAST_REG_PAGES) + return ERR_PTR(-EINVAL); + + mr = kzalloc(sizeof(*mr), GFP_KERNEL); + if (!mr) + return ERR_PTR(-ENOMEM); + + mr->pages = kzalloc(size, GFP_KERNEL); + if (!mr->pages) { + ret = -ENOMEM; + goto freemr; + } + + ret = pvrdma_page_dir_init(dev, &mr->pdir, max_num_sg, false); + if (ret) { + dev_warn(&dev->pdev->dev, + "failed to allocate page dir for mr\n"); + ret = -ENOMEM; + goto freepages; + } + + memset(cmd, 0, sizeof(*cmd)); + cmd->hdr.cmd = PVRDMA_CMD_CREATE_MR; + cmd->pd_handle = to_vpd(pd)->pd_handle; + cmd->access_flags = 0; + cmd->flags = PVRDMA_MR_FLAG_FRMR; + cmd->nchunks = max_num_sg; + + ret = pvrdma_cmd_post(dev, &req, &rsp, PVRDMA_CMD_CREATE_MR_RESP); + if (ret < 0) { + dev_warn(&dev->pdev->dev, + "could not create FR mem region, error: %d\n", ret); + goto freepdir; + } + + mr->max_pages = max_num_sg; + mr->mmr.mr_handle = resp->mr_handle; + mr->ibmr.lkey = resp->lkey; + mr->ibmr.rkey = resp->rkey; + mr->page_shift = PAGE_SHIFT; + mr->umem = NULL; + + return &mr->ibmr; + +freepdir: + pvrdma_page_dir_cleanup(dev, &mr->pdir); +freepages: + kfree(mr->pages); +freemr: + kfree(mr); + return ERR_PTR(ret); +} + +/** + * pvrdma_dereg_mr - deregister a memory region + * @ibmr: memory region + * + * @return: 0 on success. + */ +int pvrdma_dereg_mr(struct ib_mr *ibmr) +{ + struct pvrdma_user_mr *mr = to_vmr(ibmr); + struct pvrdma_dev *dev = to_vdev(ibmr->device); + union pvrdma_cmd_req req; + struct pvrdma_cmd_destroy_mr *cmd = &req.destroy_mr; + int ret; + + memset(cmd, 0, sizeof(*cmd)); + cmd->hdr.cmd = PVRDMA_CMD_DESTROY_MR; + cmd->mr_handle = mr->mmr.mr_handle; + ret = pvrdma_cmd_post(dev, &req, NULL, 0); + if (ret < 0) + dev_warn(&dev->pdev->dev, + "could not deregister mem region, error: %d\n", ret); + + pvrdma_page_dir_cleanup(dev, &mr->pdir); + if (mr->umem) + ib_umem_release(mr->umem); + + kfree(mr->pages); + kfree(mr); + + return 0; +} + +static int pvrdma_set_page(struct ib_mr *ibmr, u64 addr) +{ + struct pvrdma_user_mr *mr = to_vmr(ibmr); + + if (mr->npages == mr->max_pages) + return -ENOMEM; + + mr->pages[mr->npages++] = addr; + return 0; +} + +int pvrdma_map_mr_sg(struct ib_mr *ibmr, struct scatterlist *sg, int sg_nents, + unsigned int *sg_offset) +{ + struct pvrdma_user_mr *mr = to_vmr(ibmr); + struct pvrdma_dev *dev = to_vdev(ibmr->device); + int ret; + + mr->npages = 0; + + ret = ib_sg_to_pages(ibmr, sg, sg_nents, sg_offset, pvrdma_set_page); + if (ret < 0) + dev_warn(&dev->pdev->dev, "could not map sg to pages\n"); + + return ret; +}