Received: by 2002:a4a:311b:0:0:0:0:0 with SMTP id k27-v6csp4805166ooa; Tue, 14 Aug 2018 10:47:34 -0700 (PDT) X-Google-Smtp-Source: AA+uWPw1RbPtBVu/Jg5ldBiyPgn5PjOQmQIZyUFrUhpuI/dDWuhKpDqdtQjN/GWsNwhPT6pd0jiW X-Received: by 2002:a17:902:bc41:: with SMTP id t1-v6mr21615844plz.26.1534268854764; Tue, 14 Aug 2018 10:47:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534268854; cv=none; d=google.com; s=arc-20160816; b=MtTpxlrnqO72jAnoOviJK47640KvtjpBdiehEu2sPIZkRQb7axXhWXPk8ujbXqSTLM dHjZi8qy8lEYIunvQti7p+q1jwoGDmczuZ4zzY14SQtd8PRuobkcyr3i84A+xRschT9B P7IxrkyvW3gTgJpZaxKdHw07X4bRFs9X6TBnyJuea3J921iL+MJa1XhCLvRLGjuZopK8 hzS2mOZofagbPSP3EMfZNlRWXADZNFs3DZ8M4DGmfzuf6VRFpDpMjqM0NXOwYXXLbSi2 y1BAWPhuiaoY4QfGWMQZDuNyx4mAtasM4pVNbZAauBiK6AAhzEQSA4uFw4cdWjdUf1sd ZswA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=h1iWedFiXHAtJNlMOwITEO42kbLe30BeM8P5IZ+gOyw=; b=TgT+8+ah9etLqtz/dXRnFmRtW9Mx8v0C7y/UryZwm1DwbZMI5U1rNsk8cW+hJbRcAN Z7iL+/bGez9SrRanBHCGcM0BMGsjbtwZ4Ng+4K3bUmoQchwFDeey+0a0RjhVHw6pIVGH s357k1E+yYO66vU3JWGDaWDwsI6RiAQAgsVW/0CzioHwjGPulRzkB9xJCkH68ybWO93B Tq/qvaZOoKTrQ0ab+E1KFtuVrIxfldUncF32Nu1F++VoDw8WN9Adpk2RelADcwjCDoYf rkdh/xkTyEolFzOT/DGDSIpQ6hENeB2SmD+wQ5zIXs0k9olR3gEjfGrJduEDvDMDgQZF G2PA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z13-v6si20185497pgk.127.2018.08.14.10.47.19; Tue, 14 Aug 2018 10:47:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391013AbeHNUeT (ORCPT + 99 others); Tue, 14 Aug 2018 16:34:19 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:60334 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390473AbeHNUeT (ORCPT ); Tue, 14 Aug 2018 16:34:19 -0400 Received: from localhost (unknown [194.244.16.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id CF226CAE; Tue, 14 Aug 2018 17:46:06 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jason Gunthorpe , Jack Morgenstein , Leon Romanovsky , Sudip Mukherjee Subject: [PATCH 4.4 13/43] IB/core: Make testing MR flags for writability a static inline function Date: Tue, 14 Aug 2018 19:17:49 +0200 Message-Id: <20180814171517.962689861@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180814171517.014285600@linuxfoundation.org> References: <20180814171517.014285600@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jack Morgenstein commit 08bb558ac11ab944e0539e78619d7b4c356278bd upstream. Make the MR writability flags check, which is performed in umem.c, a static inline function in file ib_verbs.h This allows the function to be used by low-level infiniband drivers. Cc: Signed-off-by: Jason Gunthorpe Signed-off-by: Jack Morgenstein Signed-off-by: Leon Romanovsky Signed-off-by: Sudip Mukherjee Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/core/umem.c | 11 +---------- include/rdma/ib_verbs.h | 14 ++++++++++++++ 2 files changed, 15 insertions(+), 10 deletions(-) --- a/drivers/infiniband/core/umem.c +++ b/drivers/infiniband/core/umem.c @@ -122,16 +122,7 @@ struct ib_umem *ib_umem_get(struct ib_uc umem->address = addr; umem->page_size = PAGE_SIZE; umem->pid = get_task_pid(current, PIDTYPE_PID); - /* - * We ask for writable memory if any of the following - * access flags are set. "Local write" and "remote write" - * obviously require write access. "Remote atomic" can do - * things like fetch and add, which will modify memory, and - * "MW bind" can change permissions by binding a window. - */ - umem->writable = !!(access & - (IB_ACCESS_LOCAL_WRITE | IB_ACCESS_REMOTE_WRITE | - IB_ACCESS_REMOTE_ATOMIC | IB_ACCESS_MW_BIND)); + umem->writable = ib_access_writable(access); if (access & IB_ACCESS_ON_DEMAND) { put_pid(umem->pid); --- a/include/rdma/ib_verbs.h +++ b/include/rdma/ib_verbs.h @@ -3007,6 +3007,20 @@ static inline int ib_check_mr_access(int return 0; } +static inline bool ib_access_writable(int access_flags) +{ + /* + * We have writable memory backing the MR if any of the following + * access flags are set. "Local write" and "remote write" obviously + * require write access. "Remote atomic" can do things like fetch and + * add, which will modify memory, and "MW bind" can change permissions + * by binding a window. + */ + return access_flags & + (IB_ACCESS_LOCAL_WRITE | IB_ACCESS_REMOTE_WRITE | + IB_ACCESS_REMOTE_ATOMIC | IB_ACCESS_MW_BIND); +} + /** * ib_check_mr_status: lightweight check of MR status. * This routine may provide status checks on a selected