Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 1 | /* |
Ka-Cheong Poon | e228a5d | 2020-04-08 03:21:01 -0700 | [diff] [blame] | 2 | * Copyright (c) 2006, 2020 Oracle and/or its affiliates. |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 3 | * |
| 4 | * This software is available to you under a choice of one of two |
| 5 | * licenses. You may choose to be licensed under the terms of the GNU |
| 6 | * General Public License (GPL) Version 2, available from the file |
| 7 | * COPYING in the main directory of this source tree, or the |
| 8 | * OpenIB.org BSD license below: |
| 9 | * |
| 10 | * Redistribution and use in source and binary forms, with or |
| 11 | * without modification, are permitted provided that the following |
| 12 | * conditions are met: |
| 13 | * |
| 14 | * - Redistributions of source code must retain the above |
| 15 | * copyright notice, this list of conditions and the following |
| 16 | * disclaimer. |
| 17 | * |
| 18 | * - Redistributions in binary form must reproduce the above |
| 19 | * copyright notice, this list of conditions and the following |
| 20 | * disclaimer in the documentation and/or other materials |
| 21 | * provided with the distribution. |
| 22 | * |
| 23 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, |
| 24 | * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
| 25 | * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND |
| 26 | * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS |
| 27 | * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN |
| 28 | * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN |
| 29 | * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
| 30 | * SOFTWARE. |
| 31 | * |
| 32 | */ |
| 33 | #include <linux/kernel.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 34 | #include <linux/slab.h> |
Paul Gortmaker | bc3b2d7 | 2011-07-15 11:47:34 -0400 | [diff] [blame] | 35 | #include <linux/export.h> |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 36 | #include <linux/skbuff.h> |
| 37 | #include <linux/list.h> |
| 38 | #include <linux/errqueue.h> |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 39 | |
| 40 | #include "rds.h" |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 41 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 42 | static unsigned int rds_exthdr_size[__RDS_EXTHDR_MAX] = { |
| 43 | [RDS_EXTHDR_NONE] = 0, |
| 44 | [RDS_EXTHDR_VERSION] = sizeof(struct rds_ext_header_version), |
| 45 | [RDS_EXTHDR_RDMA] = sizeof(struct rds_ext_header_rdma), |
| 46 | [RDS_EXTHDR_RDMA_DEST] = sizeof(struct rds_ext_header_rdma_dest), |
Sowmini Varadhan | 5916e2c | 2016-07-14 03:51:03 -0700 | [diff] [blame] | 47 | [RDS_EXTHDR_NPATHS] = sizeof(u16), |
Sowmini Varadhan | 905dd41 | 2016-11-16 13:29:49 -0800 | [diff] [blame] | 48 | [RDS_EXTHDR_GEN_NUM] = sizeof(u32), |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 49 | }; |
| 50 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 51 | void rds_message_addref(struct rds_message *rm) |
| 52 | { |
Reshetova, Elena | 6c5a1c4 | 2017-07-04 15:53:18 +0300 | [diff] [blame] | 53 | rdsdebug("addref rm %p ref %d\n", rm, refcount_read(&rm->m_refcount)); |
| 54 | refcount_inc(&rm->m_refcount); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 55 | } |
Andy Grover | 616b757 | 2009-08-21 12:28:32 +0000 | [diff] [blame] | 56 | EXPORT_SYMBOL_GPL(rds_message_addref); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 57 | |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 58 | static inline bool rds_zcookie_add(struct rds_msg_zcopy_info *info, u32 cookie) |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 59 | { |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 60 | struct rds_zcopy_cookies *ck = &info->zcookies; |
Sowmini Varadhan | 401910d | 2018-02-27 09:52:43 -0800 | [diff] [blame] | 61 | int ncookies = ck->num; |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 62 | |
Sowmini Varadhan | 401910d | 2018-02-27 09:52:43 -0800 | [diff] [blame] | 63 | if (ncookies == RDS_MAX_ZCOOKIES) |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 64 | return false; |
Sowmini Varadhan | 401910d | 2018-02-27 09:52:43 -0800 | [diff] [blame] | 65 | ck->cookies[ncookies] = cookie; |
| 66 | ck->num = ++ncookies; |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 67 | return true; |
| 68 | } |
| 69 | |
kbuild test robot | 571e677 | 2018-03-08 19:37:30 +0800 | [diff] [blame] | 70 | static struct rds_msg_zcopy_info *rds_info_from_znotifier(struct rds_znotifier *znotif) |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 71 | { |
| 72 | return container_of(znotif, struct rds_msg_zcopy_info, znotif); |
| 73 | } |
| 74 | |
| 75 | void rds_notify_msg_zcopy_purge(struct rds_msg_zcopy_queue *q) |
| 76 | { |
| 77 | unsigned long flags; |
| 78 | LIST_HEAD(copy); |
| 79 | struct rds_msg_zcopy_info *info, *tmp; |
| 80 | |
| 81 | spin_lock_irqsave(&q->lock, flags); |
| 82 | list_splice(&q->zcookie_head, ©); |
| 83 | INIT_LIST_HEAD(&q->zcookie_head); |
| 84 | spin_unlock_irqrestore(&q->lock, flags); |
| 85 | |
| 86 | list_for_each_entry_safe(info, tmp, ©, rs_zcookie_next) { |
| 87 | list_del(&info->rs_zcookie_next); |
| 88 | kfree(info); |
| 89 | } |
| 90 | } |
| 91 | |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 92 | static void rds_rm_zerocopy_callback(struct rds_sock *rs, |
| 93 | struct rds_znotifier *znotif) |
| 94 | { |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 95 | struct rds_msg_zcopy_info *info; |
| 96 | struct rds_msg_zcopy_queue *q; |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 97 | u32 cookie = znotif->z_cookie; |
Sowmini Varadhan | 401910d | 2018-02-27 09:52:43 -0800 | [diff] [blame] | 98 | struct rds_zcopy_cookies *ck; |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 99 | struct list_head *head; |
| 100 | unsigned long flags; |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 101 | |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 102 | mm_unaccount_pinned_pages(&znotif->z_mmp); |
Sowmini Varadhan | 401910d | 2018-02-27 09:52:43 -0800 | [diff] [blame] | 103 | q = &rs->rs_zcookie_queue; |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 104 | spin_lock_irqsave(&q->lock, flags); |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 105 | head = &q->zcookie_head; |
| 106 | if (!list_empty(head)) { |
| 107 | info = list_entry(head, struct rds_msg_zcopy_info, |
| 108 | rs_zcookie_next); |
| 109 | if (info && rds_zcookie_add(info, cookie)) { |
| 110 | spin_unlock_irqrestore(&q->lock, flags); |
| 111 | kfree(rds_info_from_znotifier(znotif)); |
| 112 | /* caller invokes rds_wake_sk_sleep() */ |
| 113 | return; |
| 114 | } |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 115 | } |
| 116 | |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 117 | info = rds_info_from_znotifier(znotif); |
| 118 | ck = &info->zcookies; |
Sowmini Varadhan | 401910d | 2018-02-27 09:52:43 -0800 | [diff] [blame] | 119 | memset(ck, 0, sizeof(*ck)); |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 120 | WARN_ON(!rds_zcookie_add(info, cookie)); |
| 121 | list_add_tail(&q->zcookie_head, &info->rs_zcookie_next); |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 122 | |
| 123 | spin_unlock_irqrestore(&q->lock, flags); |
Sowmini Varadhan | 401910d | 2018-02-27 09:52:43 -0800 | [diff] [blame] | 124 | /* caller invokes rds_wake_sk_sleep() */ |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 125 | } |
| 126 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 127 | /* |
| 128 | * This relies on dma_map_sg() not touching sg[].page during merging. |
| 129 | */ |
| 130 | static void rds_message_purge(struct rds_message *rm) |
| 131 | { |
Sowmini Varadhan | ea8994c | 2018-02-15 10:49:33 -0800 | [diff] [blame] | 132 | unsigned long i, flags; |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 133 | bool zcopy = false; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 134 | |
| 135 | if (unlikely(test_bit(RDS_MSG_PAGEVEC, &rm->m_flags))) |
| 136 | return; |
| 137 | |
Sowmini Varadhan | ea8994c | 2018-02-15 10:49:33 -0800 | [diff] [blame] | 138 | spin_lock_irqsave(&rm->m_rs_lock, flags); |
| 139 | if (rm->m_rs) { |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 140 | struct rds_sock *rs = rm->m_rs; |
| 141 | |
| 142 | if (rm->data.op_mmp_znotifier) { |
| 143 | zcopy = true; |
| 144 | rds_rm_zerocopy_callback(rs, rm->data.op_mmp_znotifier); |
Sowmini Varadhan | 401910d | 2018-02-27 09:52:43 -0800 | [diff] [blame] | 145 | rds_wake_sk_sleep(rs); |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 146 | rm->data.op_mmp_znotifier = NULL; |
| 147 | } |
| 148 | sock_put(rds_rs_to_sk(rs)); |
Sowmini Varadhan | ea8994c | 2018-02-15 10:49:33 -0800 | [diff] [blame] | 149 | rm->m_rs = NULL; |
| 150 | } |
| 151 | spin_unlock_irqrestore(&rm->m_rs_lock, flags); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 152 | |
Sowmini Varadhan | 01883ed | 2018-02-15 10:49:35 -0800 | [diff] [blame] | 153 | for (i = 0; i < rm->data.op_nents; i++) { |
| 154 | /* XXX will have to put_page for page refs */ |
| 155 | if (!zcopy) |
| 156 | __free_page(sg_page(&rm->data.op_sg[i])); |
| 157 | else |
| 158 | put_page(sg_page(&rm->data.op_sg[i])); |
| 159 | } |
| 160 | rm->data.op_nents = 0; |
| 161 | |
Andy Grover | f8b3aaf | 2010-03-01 14:11:53 -0800 | [diff] [blame] | 162 | if (rm->rdma.op_active) |
| 163 | rds_rdma_free_op(&rm->rdma); |
| 164 | if (rm->rdma.op_rdma_mr) |
Ka-Cheong Poon | e228a5d | 2020-04-08 03:21:01 -0700 | [diff] [blame] | 165 | kref_put(&rm->rdma.op_rdma_mr->r_kref, __rds_put_mr_final); |
Andy Grover | d0ab25a | 2010-01-27 16:15:48 -0800 | [diff] [blame] | 166 | |
| 167 | if (rm->atomic.op_active) |
| 168 | rds_atomic_free_op(&rm->atomic); |
| 169 | if (rm->atomic.op_rdma_mr) |
Ka-Cheong Poon | e228a5d | 2020-04-08 03:21:01 -0700 | [diff] [blame] | 170 | kref_put(&rm->atomic.op_rdma_mr->r_kref, __rds_put_mr_final); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 171 | } |
| 172 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 173 | void rds_message_put(struct rds_message *rm) |
| 174 | { |
Reshetova, Elena | 6c5a1c4 | 2017-07-04 15:53:18 +0300 | [diff] [blame] | 175 | rdsdebug("put rm %p ref %d\n", rm, refcount_read(&rm->m_refcount)); |
| 176 | WARN(!refcount_read(&rm->m_refcount), "danger refcount zero on %p\n", rm); |
| 177 | if (refcount_dec_and_test(&rm->m_refcount)) { |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 178 | BUG_ON(!list_empty(&rm->m_sock_item)); |
| 179 | BUG_ON(!list_empty(&rm->m_conn_item)); |
| 180 | rds_message_purge(rm); |
| 181 | |
| 182 | kfree(rm); |
| 183 | } |
| 184 | } |
Andy Grover | 616b757 | 2009-08-21 12:28:32 +0000 | [diff] [blame] | 185 | EXPORT_SYMBOL_GPL(rds_message_put); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 186 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 187 | void rds_message_populate_header(struct rds_header *hdr, __be16 sport, |
| 188 | __be16 dport, u64 seq) |
| 189 | { |
| 190 | hdr->h_flags = 0; |
| 191 | hdr->h_sport = sport; |
| 192 | hdr->h_dport = dport; |
| 193 | hdr->h_sequence = cpu_to_be64(seq); |
| 194 | hdr->h_exthdr[0] = RDS_EXTHDR_NONE; |
| 195 | } |
Andy Grover | 616b757 | 2009-08-21 12:28:32 +0000 | [diff] [blame] | 196 | EXPORT_SYMBOL_GPL(rds_message_populate_header); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 197 | |
stephen hemminger | ff51bf8 | 2010-10-19 08:08:33 +0000 | [diff] [blame] | 198 | int rds_message_add_extension(struct rds_header *hdr, unsigned int type, |
| 199 | const void *data, unsigned int len) |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 200 | { |
| 201 | unsigned int ext_len = sizeof(u8) + len; |
| 202 | unsigned char *dst; |
| 203 | |
| 204 | /* For now, refuse to add more than one extension header */ |
| 205 | if (hdr->h_exthdr[0] != RDS_EXTHDR_NONE) |
| 206 | return 0; |
| 207 | |
Joe Perches | f64f9e7 | 2009-11-29 16:55:45 -0800 | [diff] [blame] | 208 | if (type >= __RDS_EXTHDR_MAX || len != rds_exthdr_size[type]) |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 209 | return 0; |
| 210 | |
| 211 | if (ext_len >= RDS_HEADER_EXT_SPACE) |
| 212 | return 0; |
| 213 | dst = hdr->h_exthdr; |
| 214 | |
| 215 | *dst++ = type; |
| 216 | memcpy(dst, data, len); |
| 217 | |
| 218 | dst[len] = RDS_EXTHDR_NONE; |
| 219 | return 1; |
| 220 | } |
Andy Grover | 616b757 | 2009-08-21 12:28:32 +0000 | [diff] [blame] | 221 | EXPORT_SYMBOL_GPL(rds_message_add_extension); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 222 | |
| 223 | /* |
| 224 | * If a message has extension headers, retrieve them here. |
| 225 | * Call like this: |
| 226 | * |
| 227 | * unsigned int pos = 0; |
| 228 | * |
| 229 | * while (1) { |
| 230 | * buflen = sizeof(buffer); |
| 231 | * type = rds_message_next_extension(hdr, &pos, buffer, &buflen); |
| 232 | * if (type == RDS_EXTHDR_NONE) |
| 233 | * break; |
| 234 | * ... |
| 235 | * } |
| 236 | */ |
| 237 | int rds_message_next_extension(struct rds_header *hdr, |
| 238 | unsigned int *pos, void *buf, unsigned int *buflen) |
| 239 | { |
| 240 | unsigned int offset, ext_type, ext_len; |
| 241 | u8 *src = hdr->h_exthdr; |
| 242 | |
| 243 | offset = *pos; |
| 244 | if (offset >= RDS_HEADER_EXT_SPACE) |
| 245 | goto none; |
| 246 | |
| 247 | /* Get the extension type and length. For now, the |
| 248 | * length is implied by the extension type. */ |
| 249 | ext_type = src[offset++]; |
| 250 | |
| 251 | if (ext_type == RDS_EXTHDR_NONE || ext_type >= __RDS_EXTHDR_MAX) |
| 252 | goto none; |
| 253 | ext_len = rds_exthdr_size[ext_type]; |
| 254 | if (offset + ext_len > RDS_HEADER_EXT_SPACE) |
| 255 | goto none; |
| 256 | |
| 257 | *pos = offset + ext_len; |
| 258 | if (ext_len < *buflen) |
| 259 | *buflen = ext_len; |
| 260 | memcpy(buf, src + offset, *buflen); |
| 261 | return ext_type; |
| 262 | |
| 263 | none: |
| 264 | *pos = RDS_HEADER_EXT_SPACE; |
| 265 | *buflen = 0; |
| 266 | return RDS_EXTHDR_NONE; |
| 267 | } |
| 268 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 269 | int rds_message_add_rdma_dest_extension(struct rds_header *hdr, u32 r_key, u32 offset) |
| 270 | { |
| 271 | struct rds_ext_header_rdma_dest ext_hdr; |
| 272 | |
| 273 | ext_hdr.h_rdma_rkey = cpu_to_be32(r_key); |
| 274 | ext_hdr.h_rdma_offset = cpu_to_be32(offset); |
| 275 | return rds_message_add_extension(hdr, RDS_EXTHDR_RDMA_DEST, &ext_hdr, sizeof(ext_hdr)); |
| 276 | } |
Andy Grover | 616b757 | 2009-08-21 12:28:32 +0000 | [diff] [blame] | 277 | EXPORT_SYMBOL_GPL(rds_message_add_rdma_dest_extension); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 278 | |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 279 | /* |
| 280 | * Each rds_message is allocated with extra space for the scatterlist entries |
| 281 | * rds ops will need. This is to minimize memory allocation count. Then, each rds op |
| 282 | * can grab SGs when initializing its part of the rds_message. |
| 283 | */ |
| 284 | struct rds_message *rds_message_alloc(unsigned int extra_len, gfp_t gfp) |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 285 | { |
| 286 | struct rds_message *rm; |
| 287 | |
Cong Wang | ece6b0a | 2013-03-03 16:18:11 +0000 | [diff] [blame] | 288 | if (extra_len > KMALLOC_MAX_SIZE - sizeof(struct rds_message)) |
| 289 | return NULL; |
| 290 | |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 291 | rm = kzalloc(sizeof(struct rds_message) + extra_len, gfp); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 292 | if (!rm) |
| 293 | goto out; |
| 294 | |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 295 | rm->m_used_sgs = 0; |
| 296 | rm->m_total_sgs = extra_len / sizeof(struct scatterlist); |
| 297 | |
Reshetova, Elena | 6c5a1c4 | 2017-07-04 15:53:18 +0300 | [diff] [blame] | 298 | refcount_set(&rm->m_refcount, 1); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 299 | INIT_LIST_HEAD(&rm->m_sock_item); |
| 300 | INIT_LIST_HEAD(&rm->m_conn_item); |
| 301 | spin_lock_init(&rm->m_rs_lock); |
Chris Mason | c83188d | 2010-04-21 13:09:28 -0700 | [diff] [blame] | 302 | init_waitqueue_head(&rm->m_flush_wait); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 303 | |
| 304 | out: |
| 305 | return rm; |
| 306 | } |
| 307 | |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 308 | /* |
| 309 | * RDS ops use this to grab SG entries from the rm's sg pool. |
| 310 | */ |
Jason Gunthorpe | 7dba920 | 2020-04-14 20:02:07 -0300 | [diff] [blame] | 311 | struct scatterlist *rds_message_alloc_sgs(struct rds_message *rm, int nents) |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 312 | { |
| 313 | struct scatterlist *sg_first = (struct scatterlist *) &rm[1]; |
| 314 | struct scatterlist *sg_ret; |
| 315 | |
shamir rabinovitch | c75ab8a | 2018-12-16 09:01:09 +0200 | [diff] [blame] | 316 | if (nents <= 0) { |
| 317 | pr_warn("rds: alloc sgs failed! nents <= 0\n"); |
Jason Gunthorpe | 7dba920 | 2020-04-14 20:02:07 -0300 | [diff] [blame] | 318 | return ERR_PTR(-EINVAL); |
shamir rabinovitch | c75ab8a | 2018-12-16 09:01:09 +0200 | [diff] [blame] | 319 | } |
| 320 | |
| 321 | if (rm->m_used_sgs + nents > rm->m_total_sgs) { |
| 322 | pr_warn("rds: alloc sgs failed! total %d used %d nents %d\n", |
| 323 | rm->m_total_sgs, rm->m_used_sgs, nents); |
Jason Gunthorpe | 7dba920 | 2020-04-14 20:02:07 -0300 | [diff] [blame] | 324 | return ERR_PTR(-ENOMEM); |
shamir rabinovitch | c75ab8a | 2018-12-16 09:01:09 +0200 | [diff] [blame] | 325 | } |
| 326 | |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 327 | sg_ret = &sg_first[rm->m_used_sgs]; |
Andy Grover | f4dd96f7 | 2010-01-12 14:17:31 -0800 | [diff] [blame] | 328 | sg_init_table(sg_ret, nents); |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 329 | rm->m_used_sgs += nents; |
| 330 | |
| 331 | return sg_ret; |
| 332 | } |
| 333 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 334 | struct rds_message *rds_message_map_pages(unsigned long *page_addrs, unsigned int total_len) |
| 335 | { |
| 336 | struct rds_message *rm; |
| 337 | unsigned int i; |
Jacob Wen | eeb2c4f | 2019-01-07 09:59:59 +0800 | [diff] [blame] | 338 | int num_sgs = DIV_ROUND_UP(total_len, PAGE_SIZE); |
Andy Grover | ff87e97 | 2010-01-12 14:13:15 -0800 | [diff] [blame] | 339 | int extra_bytes = num_sgs * sizeof(struct scatterlist); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 340 | |
Andy Grover | f2ec76f | 2010-03-29 16:46:46 -0700 | [diff] [blame] | 341 | rm = rds_message_alloc(extra_bytes, GFP_NOWAIT); |
Andy Grover | 8690bfa | 2010-01-12 11:56:44 -0800 | [diff] [blame] | 342 | if (!rm) |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 343 | return ERR_PTR(-ENOMEM); |
| 344 | |
| 345 | set_bit(RDS_MSG_PAGEVEC, &rm->m_flags); |
| 346 | rm->m_inc.i_hdr.h_len = cpu_to_be32(total_len); |
Jacob Wen | eeb2c4f | 2019-01-07 09:59:59 +0800 | [diff] [blame] | 347 | rm->data.op_nents = DIV_ROUND_UP(total_len, PAGE_SIZE); |
Jason Gunthorpe | 7dba920 | 2020-04-14 20:02:07 -0300 | [diff] [blame] | 348 | rm->data.op_sg = rds_message_alloc_sgs(rm, num_sgs); |
| 349 | if (IS_ERR(rm->data.op_sg)) { |
Lv Yunlong | bdc2ab5c | 2021-03-30 18:59:59 -0700 | [diff] [blame] | 350 | void *err = ERR_CAST(rm->data.op_sg); |
Pavel Emelyanov | aa58163 | 2010-11-08 06:20:50 +0000 | [diff] [blame] | 351 | rds_message_put(rm); |
Lv Yunlong | bdc2ab5c | 2021-03-30 18:59:59 -0700 | [diff] [blame] | 352 | return err; |
Pavel Emelyanov | aa58163 | 2010-11-08 06:20:50 +0000 | [diff] [blame] | 353 | } |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 354 | |
Andy Grover | 6c7cc6e | 2010-01-27 18:04:18 -0800 | [diff] [blame] | 355 | for (i = 0; i < rm->data.op_nents; ++i) { |
| 356 | sg_set_page(&rm->data.op_sg[i], |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 357 | virt_to_page(page_addrs[i]), |
| 358 | PAGE_SIZE, 0); |
| 359 | } |
| 360 | |
| 361 | return rm; |
| 362 | } |
| 363 | |
kbuild test robot | 496c7f3 | 2018-03-08 18:56:14 +0800 | [diff] [blame] | 364 | static int rds_message_zcopy_from_user(struct rds_message *rm, struct iov_iter *from) |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 365 | { |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 366 | struct scatterlist *sg; |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 367 | int ret = 0; |
Sowmini Varadhan | 0cebacc | 2018-02-15 10:49:36 -0800 | [diff] [blame] | 368 | int length = iov_iter_count(from); |
Sowmini Varadhan | d40a126b | 2018-03-06 07:22:33 -0800 | [diff] [blame] | 369 | int total_copied = 0; |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 370 | struct rds_msg_zcopy_info *info; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 371 | |
Al Viro | 083735f | 2014-11-20 09:31:08 -0500 | [diff] [blame] | 372 | rm->m_inc.i_hdr.h_len = cpu_to_be32(iov_iter_count(from)); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 373 | |
| 374 | /* |
| 375 | * now allocate and copy in the data payload. |
| 376 | */ |
Andy Grover | 6c7cc6e | 2010-01-27 18:04:18 -0800 | [diff] [blame] | 377 | sg = rm->data.op_sg; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 378 | |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 379 | info = kzalloc(sizeof(*info), GFP_KERNEL); |
| 380 | if (!info) |
Sowmini Varadhan | d40a126b | 2018-03-06 07:22:33 -0800 | [diff] [blame] | 381 | return -ENOMEM; |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 382 | INIT_LIST_HEAD(&info->rs_zcookie_next); |
| 383 | rm->data.op_mmp_znotifier = &info->znotif; |
Sowmini Varadhan | d40a126b | 2018-03-06 07:22:33 -0800 | [diff] [blame] | 384 | if (mm_account_pinned_pages(&rm->data.op_mmp_znotifier->z_mmp, |
| 385 | length)) { |
| 386 | ret = -ENOMEM; |
| 387 | goto err; |
| 388 | } |
| 389 | while (iov_iter_count(from)) { |
| 390 | struct page *pages; |
| 391 | size_t start; |
| 392 | ssize_t copied; |
Sowmini Varadhan | 0cebacc | 2018-02-15 10:49:36 -0800 | [diff] [blame] | 393 | |
Sowmini Varadhan | d40a126b | 2018-03-06 07:22:33 -0800 | [diff] [blame] | 394 | copied = iov_iter_get_pages(from, &pages, PAGE_SIZE, |
| 395 | 1, &start); |
| 396 | if (copied < 0) { |
| 397 | struct mmpin *mmp; |
| 398 | int i; |
| 399 | |
| 400 | for (i = 0; i < rm->data.op_nents; i++) |
| 401 | put_page(sg_page(&rm->data.op_sg[i])); |
| 402 | mmp = &rm->data.op_mmp_znotifier->z_mmp; |
| 403 | mm_unaccount_pinned_pages(mmp); |
| 404 | ret = -EFAULT; |
Sowmini Varadhan | 0cebacc | 2018-02-15 10:49:36 -0800 | [diff] [blame] | 405 | goto err; |
| 406 | } |
Sowmini Varadhan | d40a126b | 2018-03-06 07:22:33 -0800 | [diff] [blame] | 407 | total_copied += copied; |
| 408 | iov_iter_advance(from, copied); |
| 409 | length -= copied; |
| 410 | sg_set_page(sg, pages, copied, start); |
| 411 | rm->data.op_nents++; |
| 412 | sg++; |
| 413 | } |
| 414 | WARN_ON_ONCE(length != 0); |
| 415 | return ret; |
Sowmini Varadhan | 0cebacc | 2018-02-15 10:49:36 -0800 | [diff] [blame] | 416 | err: |
Sowmini Varadhan | 9426bbc | 2018-03-06 07:22:34 -0800 | [diff] [blame] | 417 | kfree(info); |
Sowmini Varadhan | d40a126b | 2018-03-06 07:22:33 -0800 | [diff] [blame] | 418 | rm->data.op_mmp_znotifier = NULL; |
| 419 | return ret; |
| 420 | } |
| 421 | |
| 422 | int rds_message_copy_from_user(struct rds_message *rm, struct iov_iter *from, |
| 423 | bool zcopy) |
| 424 | { |
| 425 | unsigned long to_copy, nbytes; |
| 426 | unsigned long sg_off; |
| 427 | struct scatterlist *sg; |
| 428 | int ret = 0; |
| 429 | |
| 430 | rm->m_inc.i_hdr.h_len = cpu_to_be32(iov_iter_count(from)); |
| 431 | |
| 432 | /* now allocate and copy in the data payload. */ |
| 433 | sg = rm->data.op_sg; |
| 434 | sg_off = 0; /* Dear gcc, sg->page will be null from kzalloc. */ |
| 435 | |
| 436 | if (zcopy) |
| 437 | return rds_message_zcopy_from_user(rm, from); |
Sowmini Varadhan | 0cebacc | 2018-02-15 10:49:36 -0800 | [diff] [blame] | 438 | |
Al Viro | 083735f | 2014-11-20 09:31:08 -0500 | [diff] [blame] | 439 | while (iov_iter_count(from)) { |
Andy Grover | 8690bfa | 2010-01-12 11:56:44 -0800 | [diff] [blame] | 440 | if (!sg_page(sg)) { |
Al Viro | 083735f | 2014-11-20 09:31:08 -0500 | [diff] [blame] | 441 | ret = rds_page_remainder_alloc(sg, iov_iter_count(from), |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 442 | GFP_HIGHUSER); |
| 443 | if (ret) |
Al Viro | 083735f | 2014-11-20 09:31:08 -0500 | [diff] [blame] | 444 | return ret; |
Andy Grover | 6c7cc6e | 2010-01-27 18:04:18 -0800 | [diff] [blame] | 445 | rm->data.op_nents++; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 446 | sg_off = 0; |
| 447 | } |
| 448 | |
Al Viro | 083735f | 2014-11-20 09:31:08 -0500 | [diff] [blame] | 449 | to_copy = min_t(unsigned long, iov_iter_count(from), |
| 450 | sg->length - sg_off); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 451 | |
Al Viro | 083735f | 2014-11-20 09:31:08 -0500 | [diff] [blame] | 452 | rds_stats_add(s_copy_from_user, to_copy); |
Sowmini Varadhan | d0a47d3 | 2015-02-05 17:41:43 -0500 | [diff] [blame] | 453 | nbytes = copy_page_from_iter(sg_page(sg), sg->offset + sg_off, |
| 454 | to_copy, from); |
| 455 | if (nbytes != to_copy) |
Al Viro | 083735f | 2014-11-20 09:31:08 -0500 | [diff] [blame] | 456 | return -EFAULT; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 457 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 458 | sg_off += to_copy; |
| 459 | |
| 460 | if (sg_off == sg->length) |
| 461 | sg++; |
| 462 | } |
| 463 | |
Andy Grover | fc44508 | 2010-01-12 12:56:06 -0800 | [diff] [blame] | 464 | return ret; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 465 | } |
| 466 | |
Al Viro | c310e72 | 2014-11-20 09:21:14 -0500 | [diff] [blame] | 467 | int rds_message_inc_copy_to_user(struct rds_incoming *inc, struct iov_iter *to) |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 468 | { |
| 469 | struct rds_message *rm; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 470 | struct scatterlist *sg; |
| 471 | unsigned long to_copy; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 472 | unsigned long vec_off; |
| 473 | int copied; |
| 474 | int ret; |
| 475 | u32 len; |
| 476 | |
| 477 | rm = container_of(inc, struct rds_message, m_inc); |
| 478 | len = be32_to_cpu(rm->m_inc.i_hdr.h_len); |
| 479 | |
Andy Grover | 6c7cc6e | 2010-01-27 18:04:18 -0800 | [diff] [blame] | 480 | sg = rm->data.op_sg; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 481 | vec_off = 0; |
| 482 | copied = 0; |
| 483 | |
Al Viro | c310e72 | 2014-11-20 09:21:14 -0500 | [diff] [blame] | 484 | while (iov_iter_count(to) && copied < len) { |
Geert Uytterhoeven | 6ff4a8a | 2014-12-15 13:21:42 +0100 | [diff] [blame] | 485 | to_copy = min_t(unsigned long, iov_iter_count(to), |
| 486 | sg->length - vec_off); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 487 | to_copy = min_t(unsigned long, to_copy, len - copied); |
| 488 | |
Al Viro | c310e72 | 2014-11-20 09:21:14 -0500 | [diff] [blame] | 489 | rds_stats_add(s_copy_to_user, to_copy); |
| 490 | ret = copy_page_to_iter(sg_page(sg), sg->offset + vec_off, |
| 491 | to_copy, to); |
| 492 | if (ret != to_copy) |
| 493 | return -EFAULT; |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 494 | |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 495 | vec_off += to_copy; |
| 496 | copied += to_copy; |
| 497 | |
| 498 | if (vec_off == sg->length) { |
| 499 | vec_off = 0; |
| 500 | sg++; |
| 501 | } |
| 502 | } |
| 503 | |
| 504 | return copied; |
| 505 | } |
| 506 | |
| 507 | /* |
| 508 | * If the message is still on the send queue, wait until the transport |
| 509 | * is done with it. This is particularly important for RDMA operations. |
| 510 | */ |
| 511 | void rds_message_wait(struct rds_message *rm) |
| 512 | { |
Chris Mason | c83188d | 2010-04-21 13:09:28 -0700 | [diff] [blame] | 513 | wait_event_interruptible(rm->m_flush_wait, |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 514 | !test_bit(RDS_MSG_MAPPED, &rm->m_flags)); |
| 515 | } |
| 516 | |
| 517 | void rds_message_unmapped(struct rds_message *rm) |
| 518 | { |
| 519 | clear_bit(RDS_MSG_MAPPED, &rm->m_flags); |
Chris Mason | c83188d | 2010-04-21 13:09:28 -0700 | [diff] [blame] | 520 | wake_up_interruptible(&rm->m_flush_wait); |
Andy Grover | 7875e18 | 2009-02-24 15:30:26 +0000 | [diff] [blame] | 521 | } |
Andy Grover | 616b757 | 2009-08-21 12:28:32 +0000 | [diff] [blame] | 522 | EXPORT_SYMBOL_GPL(rds_message_unmapped); |