Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp48973pxj; Wed, 23 Jun 2021 15:20:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxocdN6UiJEJh0fq0QMvDHK2+/KQETNBCYJL0hH9/npJRqIX8AV4D8/1GVgpJ93ZBZ/GENc X-Received: by 2002:a05:6402:1a:: with SMTP id d26mr2646776edu.105.1624486810861; Wed, 23 Jun 2021 15:20:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624486810; cv=none; d=google.com; s=arc-20160816; b=erfxMr81JZF3To3jao5XehYu+YMWif2Uup1Ha+TAl//gHfU5R/D85lW3aOxzaxOIwJ jo0EKHzR6IBpMWe8eQs/+5/QsJMNMJN0qsFsrF4Jf98bkwT76NHtoqBvNqcOI2eXrtjN FXxInzRmHMh3wjmtAePLQhyhue5j+WuzQGSFDIfuNcouCyUvYJVAzSSg7Pp/b8TIuQCW /ZMZJkEmPjajZbqIssNL6/b9EiYUkefSrN9xYqHqU3cdKa3CmcChARmLSiwG0nwsN4i+ GW5hsrFVa0o8u979dli2byuwCCLKJMF2fdPXaMle7LGKEx5DKJw0tee094vXl4DEde8C uJsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=T387+WvH95fPdRiK/O6DZ5Kt7YuxA/sXQt/VdqjPw8w=; b=p6QxAN4F3J/Y4weVU+HCuzTzvGE/ZcoEQtP1aDM5PTgQy6AsEsfAIowR5iTf+NWMwy /xNIhgE7i+2/RImJFaGVj5TjO8RIiOiB8iVqpJ7CT6I/ye3mOQSkWxalYX27cmHgzWMO SKG9GyL3hmCXIiPLw+WewZdA1AyLwP/tvTvhjNMoEd9ETGf0GJj7p2BB9IEY/5oWbIwt BoH6gV8XZI7wO3gukTokZT8BVecepB/+APsM0JO3UVBmbUTmBcnl71vaR23AigJdmodz 9+RQfovfUWNzPPk1ThkVCwPT0u4rNU/GXP7hfSsHlnAg0M330FmZsIW2huuOfmRxjLIH y4Wg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v7si1122309edj.328.2021.06.23.15.19.48; Wed, 23 Jun 2021 15:20:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229812AbhFWWTC (ORCPT + 99 others); Wed, 23 Jun 2021 18:19:02 -0400 Received: from mga18.intel.com ([134.134.136.126]:45531 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229688AbhFWWTB (ORCPT ); Wed, 23 Jun 2021 18:19:01 -0400 IronPort-SDR: ET4x9hI7mfaAm2EiHfoPltY7fWHMmFZJl9t4jI0JPLp4r+Ho2y77cv/G0vVZBVg87lx/nHWe7g 5yM2KMutqR1Q== X-IronPort-AV: E=McAfee;i="6200,9189,10024"; a="194657904" X-IronPort-AV: E=Sophos;i="5.83,295,1616482800"; d="scan'208";a="194657904" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jun 2021 15:16:43 -0700 IronPort-SDR: HOwd+5ObPbk+XhFgaOP/qvRO8xp0WBxCnEEkowkx03KuZN1h8OAxroqP65zTOdbMkOBYs54ca2 tmXWaNjYOOOA== X-IronPort-AV: E=Sophos;i="5.83,295,1616482800"; d="scan'208";a="487507153" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jun 2021 15:16:42 -0700 From: ira.weiny@intel.com To: Jason Gunthorpe Cc: Ira Weiny , Mike Marciniszyn , Dennis Dalessandro , Doug Ledford , Faisal Latif , Shiraz Saleem , Bernard Metzler , Kamal Heib , linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V3] RDMA/siw: Convert siw_tx_hdt() to kmap_local_page() Date: Wed, 23 Jun 2021 15:15:44 -0700 Message-Id: <20210623221543.2799198-1-ira.weiny@intel.com> X-Mailer: git-send-email 2.28.0.rc0.12.gb6a658bd00c9 In-Reply-To: <20210622203432.2715659-1-ira.weiny@intel.com> References: <20210622203432.2715659-1-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ira Weiny kmap() is being deprecated and will break uses of device dax after PKS protection is introduced.[1] The use of kmap() in siw_tx_hdt() is all thread local therefore kmap_local_page() is a sufficient replacement and will work with pgmap protected pages when those are implemented. siw_tx_hdt() tracks pages used in a page_array. It uses that array to unmap pages which were mapped on function exit. Not all entries in the array are mapped and this is tracked in kmap_mask. kunmap_local() takes a mapped address rather than a page. Alter siw_unmap_pages() to take the iov array to reuse the iov_base address of each mapping. Use PAGE_MASK to get the proper address for kunmap_local(). kmap_local_page() mappings are tracked in a stack and must be unmapped in the opposite order they were mapped in. Because segments are mapped into the page array in increasing index order, modify siw_unmap_pages() to unmap pages in decreasing order. Use kmap_local_page() instead of kmap() to map pages in the page_array. [1] https://lore.kernel.org/lkml/20201009195033.3208459-59-ira.weiny@intel.com/ Signed-off-by: Ira Weiny --- Jason, I went ahead and left this a separate patch. Let me know if you really want this and the other siw squashed. Changes for V3: From Bernard Use 'p' in kmap_local_page() Use seg as length to siw_unmap_pages() Changes for V2: From Bernard Reuse iov[].iov_base rather than declaring another array of pointers and preserve the use of kmap_mask to know which iov's were kmapped. --- drivers/infiniband/sw/siw/siw_qp_tx.c | 30 +++++++++++++++++---------- 1 file changed, 19 insertions(+), 11 deletions(-) diff --git a/drivers/infiniband/sw/siw/siw_qp_tx.c b/drivers/infiniband/sw/siw/siw_qp_tx.c index db68a10d12cd..89a5b75f7254 100644 --- a/drivers/infiniband/sw/siw/siw_qp_tx.c +++ b/drivers/infiniband/sw/siw/siw_qp_tx.c @@ -396,13 +396,20 @@ static int siw_0copy_tx(struct socket *s, struct page **page, #define MAX_TRAILER (MPA_CRC_SIZE + 4) -static void siw_unmap_pages(struct page **pp, unsigned long kmap_mask) +static void siw_unmap_pages(struct kvec *iov, unsigned long kmap_mask, int len) { - while (kmap_mask) { - if (kmap_mask & BIT(0)) - kunmap(*pp); - pp++; - kmap_mask >>= 1; + int i; + + /* + * Work backwards through the array to honor the kmap_local_page() + * ordering requirements. + */ + for (i = (len-1); i >= 0; i--) { + if (kmap_mask & BIT(i)) { + unsigned long addr = (unsigned long)iov[i].iov_base; + + kunmap_local((void *)(addr & PAGE_MASK)); + } } } @@ -498,7 +505,7 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) p = siw_get_upage(mem->umem, sge->laddr + sge_off); if (unlikely(!p)) { - siw_unmap_pages(page_array, kmap_mask); + siw_unmap_pages(iov, kmap_mask, seg); wqe->processed -= c_tx->bytes_unsent; rv = -EFAULT; goto done_crc; @@ -506,11 +513,12 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) page_array[seg] = p; if (!c_tx->use_sendpage) { - iov[seg].iov_base = kmap(p) + fp_off; - iov[seg].iov_len = plen; + void *kaddr = kmap_local_page(p); /* Remember for later kunmap() */ kmap_mask |= BIT(seg); + iov[seg].iov_base = kaddr + fp_off; + iov[seg].iov_len = plen; if (do_crc) crypto_shash_update( @@ -542,7 +550,7 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) if (++seg > (int)MAX_ARRAY) { siw_dbg_qp(tx_qp(c_tx), "to many fragments\n"); - siw_unmap_pages(page_array, kmap_mask); + siw_unmap_pages(iov, kmap_mask, seg-1); wqe->processed -= c_tx->bytes_unsent; rv = -EMSGSIZE; goto done_crc; @@ -593,7 +601,7 @@ static int siw_tx_hdt(struct siw_iwarp_tx *c_tx, struct socket *s) } else { rv = kernel_sendmsg(s, &msg, iov, seg + 1, hdr_len + data_len + trl_len); - siw_unmap_pages(page_array, kmap_mask); + siw_unmap_pages(iov, kmap_mask, seg+1); } if (rv < (int)hdr_len) { /* Not even complete hdr pushed or negative rv */ -- 2.28.0.rc0.12.gb6a658bd00c9