Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5035164pxj; Tue, 22 Jun 2021 13:38:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxohxU65YLQjK6CvbMTg4AvfmV3N8NvanpLL1kY1BHuBt3uHE6ND08zYJn+fF5cWKNIYWPj X-Received: by 2002:a17:906:d1d1:: with SMTP id bs17mr6054985ejb.492.1624394298592; Tue, 22 Jun 2021 13:38:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624394298; cv=none; d=google.com; s=arc-20160816; b=bHjZombjezhwfyr0Q14uao6+Zv6+PxElk5JmuLsRhQ6Od4f2frjzaA7RBaeNK0dyoZ vEcELu6XsTAKot53IL6WHlTSh0lFfIr/dgsKGgUeqGbwtQm7P48DPr8RXDU4dnvL9Hfz CYSEOASKan/WzvKOvcNOY5vS4EmoDteh/0Em3P3i6M2DpFhEk1wDPZSyboTVOGE473FW BkA17QOGdP8FrmEOdtiMnWwV0RoRC7o/i58R+hlRJfxmELPVJlAaF5eqaeYWsUg1Bow4 zAbvAMyglM5cbTU5fQaa8NlqAGYk1jkKW2Jgd6OMr7gtMIxfDRC7IAUAiSvpEkG4Ph0h RUXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=v3OVIas1yj6mBFrope9YchaxogCuznjSCzvHZ+cAEC4=; b=XdPbCJMVfzSJg4tTav18Yk0t9bwzx7gm1np4p7fMnR5nf3RNegU8Ai9bXhZairO4tq wKi5bfSX0pqrpDiC07mHwqShIFAvjS621TeJvwJ2HUpSPgrHTW/fWqqHHkdxN+TP5pUs k/SLz7TnvCURCzvuqhbs0+PM/lSRBhmjV79KBDPUV9XQ5EAdgYtG6K8PJm75qvwygG7R hgkAmxQ+/YYEl2C4nI/hcVYOj7RQ4AeSBcIcPOJ7+OQOZb2FzzbXVYvdjOKIt8NR0E1J yhRxsyVQnjO9st8vp/ZgwhwE+peakC6h9ajWfaob/pSSJT9T4v9hZmPorDVWn17CGu91 eoMA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cf25si5353758ejb.212.2021.06.22.13.37.55; Tue, 22 Jun 2021 13:38:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229833AbhFVUhZ (ORCPT + 99 others); Tue, 22 Jun 2021 16:37:25 -0400 Received: from mga11.intel.com ([192.55.52.93]:61783 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229629AbhFVUhY (ORCPT ); Tue, 22 Jun 2021 16:37:24 -0400 IronPort-SDR: CiZ9BbnrK6a5oVRJ1e3Lg25OI7j0zNMF1e8zLLG0LyuC+Z4naguZ8lATRBVO2MEamt1d3+5FUB fZMj9kI65NxA== X-IronPort-AV: E=McAfee;i="6200,9189,10023"; a="204132892" X-IronPort-AV: E=Sophos;i="5.83,292,1616482800"; d="scan'208";a="204132892" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Jun 2021 13:35:08 -0700 IronPort-SDR: M91XCzOWymILaqCpwRHmQB/7JiAvq3JdfGO4DlwBVLIQNfRaeHrvk1cMIHWuJ2X6zHGouHTMBc 9BgThSdgDyCw== X-IronPort-AV: E=Sophos;i="5.83,292,1616482800"; d="scan'208";a="423458801" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Jun 2021 13:35:07 -0700 From: ira.weiny@intel.com To: Jason Gunthorpe Cc: Ira Weiny , Mike Marciniszyn , Dennis Dalessandro , Doug Ledford , Faisal Latif , Shiraz Saleem , Bernard Metzler , Kamal Heib , linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V2] RDMA/siw: Convert siw_tx_hdt() to kmap_local_page() Date: Tue, 22 Jun 2021 13:34:32 -0700 Message-Id: <20210622203432.2715659-1-ira.weiny@intel.com> X-Mailer: git-send-email 2.28.0.rc0.12.gb6a658bd00c9 In-Reply-To: <20210622061422.2633501-5-ira.weiny@intel.com> References: <20210622061422.2633501-5-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ira Weiny kmap() is being deprecated and will break uses of device dax after PKS protection is introduced.[1] The use of kmap() in siw_tx_hdt() is all thread local therefore kmap_local_page() is a sufficient replacement and will work with pgmap protected pages when those are implemented. siw_tx_hdt() tracks pages used in a page_array. It uses that array to unmap pages which were mapped on function exit. Not all entries in the array are mapped and this is tracked in kmap_mask. kunmap_local() takes a mapped address rather than a page. Alter siw_unmap_pages() to take the iov array to reuse the iov_base address of each mapping. Use PAGE_MASK to get the proper address for kunmap_local(). kmap_local_page() mappings are tracked in a stack and must be unmapped in the opposite order they were mapped in. Because segments are mapped into the page array in increasing index order, modify siw_unmap_pages() to unmap pages in decreasing order. Use kmap_local_page() instead of kmap() to map pages in the page_array. [1] https://lore.kernel.org/lkml/20201009195033.3208459-59-ira.weiny@intel.com/ Signed-off-by: Ira Weiny --- Changes for V2: From Bernard Reuse iov[].iov_base rather than declaring another array of pointers and preserve the use of kmap_mask to know which iov's were kmapped. --- drivers/infiniband/sw/siw/siw_qp_tx.c | 32 +++++++++++++++++---------- 1 file changed, 20 insertions(+), 12 deletions(-) diff --git a/drivers/infiniband/sw/siw/siw_qp_tx.c b/drivers/infiniband/sw/siw/siw_qp_tx.c index db68a10d12cd..fd3b9e6a67d7 100644 --- a/drivers/infiniband/sw/siw/siw_qp_tx.c +++ b/drivers/infiniband/sw/siw/siw_qp_tx.c @@ -396,13 +396,20 @@ static int siw_0copy_tx(struct socket *s, struct page **page, #define MAX_TRAILER (MPA_CRC_SIZE + 4) -static void siw_unmap_pages(struct page **pp, unsigned long kmap_mask) +static void siw_unmap_pages(struct kvec *iov, unsigned long kmap_mask, int len) { - while (kmap_mask) { - if (kmap_mask & BIT(0)) - kunmap(*pp); - pp++; - kmap_mask >>= 1; + int i; + + /* + * Work backwards through the array to honor the kmap_local_page() + * ordering requirements. + */ + for (i = (len-1); i >= 0; i--) { + if (kmap_mask & BIT(i)) { + unsigned long addr = (unsigned long)iov[i].iov_base; + + kunmap_local((void *)(addr & PAGE_MASK)); + } } } @@ -498,7 +505,7 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) p = siw_get_upage(mem->umem, sge->laddr + sge_off); if (unlikely(!p)) { - siw_unmap_pages(page_array, kmap_mask); + siw_unmap_pages(iov, kmap_mask, MAX_ARRAY); wqe->processed -= c_tx->bytes_unsent; rv = -EFAULT; goto done_crc; @@ -506,11 +513,12 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) page_array[seg] = p; if (!c_tx->use_sendpage) { - iov[seg].iov_base = kmap(p) + fp_off; - iov[seg].iov_len = plen; + void *kaddr = kmap_local_page(page_array[seg]); /* Remember for later kunmap() */ kmap_mask |= BIT(seg); + iov[seg].iov_base = kaddr + fp_off; + iov[seg].iov_len = plen; if (do_crc) crypto_shash_update( @@ -518,7 +526,7 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) iov[seg].iov_base, plen); } else if (do_crc) { - kaddr = kmap_local_page(p); + kaddr = kmap_local_page(page_array[seg]); crypto_shash_update(c_tx->mpa_crc_hd, kaddr + fp_off, plen); @@ -542,7 +550,7 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) if (++seg > (int)MAX_ARRAY) { siw_dbg_qp(tx_qp(c_tx), "to many fragments\n"); - siw_unmap_pages(page_array, kmap_mask); + siw_unmap_pages(iov, kmap_mask, MAX_ARRAY); wqe->processed -= c_tx->bytes_unsent; rv = -EMSGSIZE; goto done_crc; @@ -593,7 +601,7 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) } else { rv = kernel_sendmsg(s, &msg, iov, seg + 1, hdr_len + data_len + trl_len); - siw_unmap_pages(page_array, kmap_mask); + siw_unmap_pages(iov, kmap_mask, MAX_ARRAY); } if (rv < (int)hdr_len) { /* Not even complete hdr pushed or negative rv */ -- 2.28.0.rc0.12.gb6a658bd00c9