2017-08-24 21:20:12 +00:00
|
|
|
/*-
|
|
|
|
* BSD LICENSE
|
|
|
|
*
|
|
|
|
* Copyright (c) Intel Corporation.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* * Neither the name of Intel Corporation nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived
|
|
|
|
* from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "spdk/stdinc.h"
|
|
|
|
|
|
|
|
#include "env_internal.h"
|
|
|
|
|
|
|
|
#include <rte_config.h>
|
2019-07-09 06:36:18 +00:00
|
|
|
#include <rte_memory.h>
|
2017-08-24 21:20:12 +00:00
|
|
|
#include <rte_eal_memconfig.h>
|
|
|
|
|
|
|
|
#include "spdk_internal/assert.h"
|
|
|
|
|
|
|
|
#include "spdk/assert.h"
|
|
|
|
#include "spdk/likely.h"
|
|
|
|
#include "spdk/queue.h"
|
|
|
|
#include "spdk/util.h"
|
2020-02-27 13:38:02 +00:00
|
|
|
#include "spdk/memory.h"
|
2019-02-27 17:50:06 +00:00
|
|
|
#include "spdk/env_dpdk.h"
|
2020-04-20 19:47:03 +00:00
|
|
|
#include "spdk/log.h"
|
2017-08-24 21:20:12 +00:00
|
|
|
|
2020-11-17 16:49:41 +00:00
|
|
|
#ifndef __linux__
|
2020-05-10 22:57:07 +00:00
|
|
|
#define VFIO_ENABLED 0
|
2019-02-15 22:55:05 +00:00
|
|
|
#else
|
|
|
|
#include <linux/version.h>
|
2019-03-11 12:45:19 +00:00
|
|
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 6, 0)
|
2020-05-10 22:57:07 +00:00
|
|
|
#define VFIO_ENABLED 1
|
2019-02-15 22:55:05 +00:00
|
|
|
#include <linux/vfio.h>
|
|
|
|
#include <rte_vfio.h>
|
|
|
|
|
|
|
|
struct spdk_vfio_dma_map {
|
|
|
|
struct vfio_iommu_type1_dma_map map;
|
|
|
|
TAILQ_ENTRY(spdk_vfio_dma_map) tailq;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct vfio_cfg {
|
|
|
|
int fd;
|
|
|
|
bool enabled;
|
|
|
|
bool noiommu_enabled;
|
|
|
|
unsigned device_ref;
|
|
|
|
TAILQ_HEAD(, spdk_vfio_dma_map) maps;
|
|
|
|
pthread_mutex_t mutex;
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct vfio_cfg g_vfio = {
|
|
|
|
.fd = -1,
|
|
|
|
.enabled = false,
|
|
|
|
.noiommu_enabled = false,
|
|
|
|
.device_ref = 0,
|
|
|
|
.maps = TAILQ_HEAD_INITIALIZER(g_vfio.maps),
|
|
|
|
.mutex = PTHREAD_MUTEX_INITIALIZER
|
|
|
|
};
|
|
|
|
|
|
|
|
#else
|
2020-05-10 22:57:07 +00:00
|
|
|
#define VFIO_ENABLED 0
|
2019-02-15 22:55:05 +00:00
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
#if DEBUG
|
2020-04-20 19:47:03 +00:00
|
|
|
#define DEBUG_PRINT(...) SPDK_ERRLOG(__VA_ARGS__)
|
2017-08-24 21:20:12 +00:00
|
|
|
#else
|
|
|
|
#define DEBUG_PRINT(...)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define FN_2MB_TO_4KB(fn) (fn << (SHIFT_2MB - SHIFT_4KB))
|
|
|
|
#define FN_4KB_TO_2MB(fn) (fn >> (SHIFT_2MB - SHIFT_4KB))
|
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
#define MAP_256TB_IDX(vfn_2mb) ((vfn_2mb) >> (SHIFT_1GB - SHIFT_2MB))
|
2018-07-05 18:03:42 +00:00
|
|
|
#define MAP_1GB_IDX(vfn_2mb) ((vfn_2mb) & ((1ULL << (SHIFT_1GB - SHIFT_2MB)) - 1))
|
2017-08-24 21:20:12 +00:00
|
|
|
|
2018-09-19 11:36:22 +00:00
|
|
|
/* Page is registered */
|
|
|
|
#define REG_MAP_REGISTERED (1ULL << 62)
|
2018-09-12 15:20:38 +00:00
|
|
|
|
|
|
|
/* A notification region barrier. The 2MB translation entry that's marked
|
|
|
|
* with this flag must be unregistered separately. This allows contiguous
|
|
|
|
* regions to be unregistered in the same chunks they were registered.
|
|
|
|
*/
|
|
|
|
#define REG_MAP_NOTIFY_START (1ULL << 63)
|
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
/* Translation of a single 2MB page. */
|
|
|
|
struct map_2mb {
|
|
|
|
uint64_t translation_2mb;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Second-level map table indexed by bits [21..29] of the virtual address.
|
|
|
|
* Each entry contains the address translation or error for entries that haven't
|
|
|
|
* been retrieved yet.
|
|
|
|
*/
|
|
|
|
struct map_1gb {
|
2018-07-05 18:03:42 +00:00
|
|
|
struct map_2mb map[1ULL << (SHIFT_1GB - SHIFT_2MB)];
|
2017-08-24 21:20:12 +00:00
|
|
|
};
|
|
|
|
|
2018-09-18 22:53:25 +00:00
|
|
|
/* Top-level map table indexed by bits [30..47] of the virtual address.
|
2017-08-24 21:20:12 +00:00
|
|
|
* Each entry points to a second-level map table or NULL.
|
|
|
|
*/
|
2018-01-25 03:36:50 +00:00
|
|
|
struct map_256tb {
|
2018-07-05 18:03:42 +00:00
|
|
|
struct map_1gb *map[1ULL << (SHIFT_256TB - SHIFT_1GB)];
|
2017-08-24 21:20:12 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/* Page-granularity memory address translation */
|
|
|
|
struct spdk_mem_map {
|
2018-01-25 03:36:50 +00:00
|
|
|
struct map_256tb map_256tb;
|
2017-08-24 21:20:12 +00:00
|
|
|
pthread_mutex_t mutex;
|
|
|
|
uint64_t default_translation;
|
2018-09-11 21:32:54 +00:00
|
|
|
struct spdk_mem_map_ops ops;
|
2017-08-24 21:20:12 +00:00
|
|
|
void *cb_ctx;
|
|
|
|
TAILQ_ENTRY(spdk_mem_map) tailq;
|
|
|
|
};
|
|
|
|
|
2018-09-12 15:20:38 +00:00
|
|
|
/* Registrations map. The 64 bit translations are bit fields with the
|
|
|
|
* following layout (starting with the low bits):
|
2018-09-19 11:36:22 +00:00
|
|
|
* 0 - 61 : reserved
|
|
|
|
* 62 - 63 : flags
|
2018-09-12 15:20:38 +00:00
|
|
|
*/
|
2017-08-24 21:20:12 +00:00
|
|
|
static struct spdk_mem_map *g_mem_reg_map;
|
2020-02-12 12:05:42 +00:00
|
|
|
static TAILQ_HEAD(spdk_mem_map_head, spdk_mem_map) g_spdk_mem_maps =
|
|
|
|
TAILQ_HEAD_INITIALIZER(g_spdk_mem_maps);
|
2017-08-24 21:20:12 +00:00
|
|
|
static pthread_mutex_t g_spdk_mem_map_mutex = PTHREAD_MUTEX_INITIALIZER;
|
|
|
|
|
2019-12-06 23:26:49 +00:00
|
|
|
static bool g_legacy_mem;
|
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
/*
|
|
|
|
* Walk the currently registered memory via the main memory registration map
|
|
|
|
* and call the new map's notify callback for each virtually contiguous region.
|
|
|
|
*/
|
2018-10-04 07:46:25 +00:00
|
|
|
static int
|
2020-05-10 22:57:07 +00:00
|
|
|
mem_map_notify_walk(struct spdk_mem_map *map, enum spdk_mem_map_notify_action action)
|
2017-08-24 21:20:12 +00:00
|
|
|
{
|
2018-01-25 03:36:50 +00:00
|
|
|
size_t idx_256tb;
|
2018-10-04 07:46:25 +00:00
|
|
|
uint64_t idx_1gb;
|
2018-10-10 14:35:08 +00:00
|
|
|
uint64_t contig_start = UINT64_MAX;
|
|
|
|
uint64_t contig_end = UINT64_MAX;
|
2018-10-04 07:46:25 +00:00
|
|
|
struct map_1gb *map_1gb;
|
|
|
|
int rc;
|
2017-08-24 21:20:12 +00:00
|
|
|
|
|
|
|
if (!g_mem_reg_map) {
|
2018-10-04 07:46:25 +00:00
|
|
|
return -EINVAL;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Hold the memory registration map mutex so no new registrations can be added while we are looping. */
|
|
|
|
pthread_mutex_lock(&g_mem_reg_map->mutex);
|
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
for (idx_256tb = 0;
|
|
|
|
idx_256tb < sizeof(g_mem_reg_map->map_256tb.map) / sizeof(g_mem_reg_map->map_256tb.map[0]);
|
|
|
|
idx_256tb++) {
|
2018-10-04 07:46:25 +00:00
|
|
|
map_1gb = g_mem_reg_map->map_256tb.map[idx_256tb];
|
2017-08-24 21:20:12 +00:00
|
|
|
|
|
|
|
if (!map_1gb) {
|
2018-10-10 14:35:08 +00:00
|
|
|
if (contig_start != UINT64_MAX) {
|
2018-10-04 07:46:25 +00:00
|
|
|
/* End of of a virtually contiguous range */
|
|
|
|
rc = map->ops.notify_cb(map->cb_ctx, map, action,
|
|
|
|
(void *)contig_start,
|
|
|
|
contig_end - contig_start + VALUE_2MB);
|
|
|
|
/* Don't bother handling unregister failures. It can't be any worse */
|
|
|
|
if (rc != 0 && action == SPDK_MEM_MAP_NOTIFY_REGISTER) {
|
|
|
|
goto err_unregister;
|
|
|
|
}
|
|
|
|
}
|
2018-10-10 14:35:08 +00:00
|
|
|
contig_start = UINT64_MAX;
|
2017-08-24 21:20:12 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (idx_1gb = 0; idx_1gb < sizeof(map_1gb->map) / sizeof(map_1gb->map[0]); idx_1gb++) {
|
2018-09-19 11:36:22 +00:00
|
|
|
if ((map_1gb->map[idx_1gb].translation_2mb & REG_MAP_REGISTERED) &&
|
2018-09-12 15:20:38 +00:00
|
|
|
(contig_start == UINT64_MAX ||
|
|
|
|
(map_1gb->map[idx_1gb].translation_2mb & REG_MAP_NOTIFY_START) == 0)) {
|
2017-08-24 21:20:12 +00:00
|
|
|
/* Rebuild the virtual address from the indexes */
|
2018-01-25 03:36:50 +00:00
|
|
|
uint64_t vaddr = (idx_256tb << SHIFT_1GB) | (idx_1gb << SHIFT_2MB);
|
2017-08-24 21:20:12 +00:00
|
|
|
|
2018-10-10 14:35:08 +00:00
|
|
|
if (contig_start == UINT64_MAX) {
|
2017-08-24 21:20:12 +00:00
|
|
|
contig_start = vaddr;
|
|
|
|
}
|
2018-10-04 07:46:25 +00:00
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
contig_end = vaddr;
|
|
|
|
} else {
|
2018-10-10 14:35:08 +00:00
|
|
|
if (contig_start != UINT64_MAX) {
|
2018-10-04 07:46:25 +00:00
|
|
|
/* End of of a virtually contiguous range */
|
|
|
|
rc = map->ops.notify_cb(map->cb_ctx, map, action,
|
|
|
|
(void *)contig_start,
|
|
|
|
contig_end - contig_start + VALUE_2MB);
|
|
|
|
/* Don't bother handling unregister failures. It can't be any worse */
|
|
|
|
if (rc != 0 && action == SPDK_MEM_MAP_NOTIFY_REGISTER) {
|
|
|
|
goto err_unregister;
|
|
|
|
}
|
2018-09-12 15:20:38 +00:00
|
|
|
|
|
|
|
/* This page might be a part of a neighbour region, so process
|
|
|
|
* it again. The idx_1gb will be incremented immediately.
|
|
|
|
*/
|
|
|
|
idx_1gb--;
|
2018-10-04 07:46:25 +00:00
|
|
|
}
|
2018-10-10 14:35:08 +00:00
|
|
|
contig_start = UINT64_MAX;
|
2018-10-04 07:46:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&g_mem_reg_map->mutex);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
err_unregister:
|
|
|
|
/* Unwind to the first empty translation so we don't unregister
|
|
|
|
* a region that just failed to register.
|
|
|
|
*/
|
|
|
|
idx_256tb = MAP_256TB_IDX((contig_start >> SHIFT_2MB) - 1);
|
|
|
|
idx_1gb = MAP_1GB_IDX((contig_start >> SHIFT_2MB) - 1);
|
2018-10-10 14:35:08 +00:00
|
|
|
contig_start = UINT64_MAX;
|
|
|
|
contig_end = UINT64_MAX;
|
2018-10-04 07:46:25 +00:00
|
|
|
|
|
|
|
/* Unregister any memory we managed to register before the failure */
|
|
|
|
for (; idx_256tb < SIZE_MAX; idx_256tb--) {
|
|
|
|
map_1gb = g_mem_reg_map->map_256tb.map[idx_256tb];
|
|
|
|
|
|
|
|
if (!map_1gb) {
|
2018-10-10 14:35:08 +00:00
|
|
|
if (contig_end != UINT64_MAX) {
|
2018-10-04 07:46:25 +00:00
|
|
|
/* End of of a virtually contiguous range */
|
|
|
|
map->ops.notify_cb(map->cb_ctx, map,
|
|
|
|
SPDK_MEM_MAP_NOTIFY_UNREGISTER,
|
|
|
|
(void *)contig_start,
|
|
|
|
contig_end - contig_start + VALUE_2MB);
|
|
|
|
}
|
2018-10-10 14:35:08 +00:00
|
|
|
contig_end = UINT64_MAX;
|
2018-10-04 07:46:25 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (; idx_1gb < UINT64_MAX; idx_1gb--) {
|
2018-09-19 11:36:22 +00:00
|
|
|
if ((map_1gb->map[idx_1gb].translation_2mb & REG_MAP_REGISTERED) &&
|
2018-09-12 15:20:38 +00:00
|
|
|
(contig_end == UINT64_MAX || (map_1gb->map[idx_1gb].translation_2mb & REG_MAP_NOTIFY_START) == 0)) {
|
2018-10-04 07:46:25 +00:00
|
|
|
/* Rebuild the virtual address from the indexes */
|
|
|
|
uint64_t vaddr = (idx_256tb << SHIFT_1GB) | (idx_1gb << SHIFT_2MB);
|
|
|
|
|
2018-10-10 14:35:08 +00:00
|
|
|
if (contig_end == UINT64_MAX) {
|
2018-10-04 07:46:25 +00:00
|
|
|
contig_end = vaddr;
|
|
|
|
}
|
|
|
|
contig_start = vaddr;
|
|
|
|
} else {
|
2018-10-10 14:35:08 +00:00
|
|
|
if (contig_end != UINT64_MAX) {
|
2018-10-04 07:46:25 +00:00
|
|
|
/* End of of a virtually contiguous range */
|
|
|
|
map->ops.notify_cb(map->cb_ctx, map,
|
|
|
|
SPDK_MEM_MAP_NOTIFY_UNREGISTER,
|
|
|
|
(void *)contig_start,
|
|
|
|
contig_end - contig_start + VALUE_2MB);
|
2018-09-12 15:20:38 +00:00
|
|
|
idx_1gb++;
|
2018-10-04 07:46:25 +00:00
|
|
|
}
|
2018-10-10 14:35:08 +00:00
|
|
|
contig_end = UINT64_MAX;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
}
|
2018-10-04 07:46:25 +00:00
|
|
|
idx_1gb = sizeof(map_1gb->map) / sizeof(map_1gb->map[0]) - 1;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&g_mem_reg_map->mutex);
|
2018-10-04 07:46:25 +00:00
|
|
|
return rc;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct spdk_mem_map *
|
2018-09-11 22:03:31 +00:00
|
|
|
spdk_mem_map_alloc(uint64_t default_translation, const struct spdk_mem_map_ops *ops, void *cb_ctx)
|
2017-08-24 21:20:12 +00:00
|
|
|
{
|
|
|
|
struct spdk_mem_map *map;
|
2018-10-04 07:46:25 +00:00
|
|
|
int rc;
|
2017-08-24 21:20:12 +00:00
|
|
|
|
|
|
|
map = calloc(1, sizeof(*map));
|
|
|
|
if (map == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pthread_mutex_init(&map->mutex, NULL)) {
|
|
|
|
free(map);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
map->default_translation = default_translation;
|
|
|
|
map->cb_ctx = cb_ctx;
|
2018-09-11 22:03:31 +00:00
|
|
|
if (ops) {
|
|
|
|
map->ops = *ops;
|
|
|
|
}
|
2017-08-24 21:20:12 +00:00
|
|
|
|
2018-09-11 22:03:31 +00:00
|
|
|
if (ops && ops->notify_cb) {
|
2018-10-11 07:49:41 +00:00
|
|
|
pthread_mutex_lock(&g_spdk_mem_map_mutex);
|
2020-05-10 22:57:07 +00:00
|
|
|
rc = mem_map_notify_walk(map, SPDK_MEM_MAP_NOTIFY_REGISTER);
|
2018-10-04 07:46:25 +00:00
|
|
|
if (rc != 0) {
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
DEBUG_PRINT("Initial mem_map notify failed\n");
|
|
|
|
pthread_mutex_destroy(&map->mutex);
|
|
|
|
free(map);
|
|
|
|
return NULL;
|
|
|
|
}
|
2017-08-24 21:20:12 +00:00
|
|
|
TAILQ_INSERT_TAIL(&g_spdk_mem_maps, map, tailq);
|
2018-10-11 07:49:41 +00:00
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return map;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
spdk_mem_map_free(struct spdk_mem_map **pmap)
|
|
|
|
{
|
|
|
|
struct spdk_mem_map *map;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (!pmap) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
map = *pmap;
|
|
|
|
|
|
|
|
if (!map) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-10-10 17:29:04 +00:00
|
|
|
if (map->ops.notify_cb) {
|
|
|
|
pthread_mutex_lock(&g_spdk_mem_map_mutex);
|
2020-05-10 22:57:07 +00:00
|
|
|
mem_map_notify_walk(map, SPDK_MEM_MAP_NOTIFY_UNREGISTER);
|
2018-10-10 17:29:04 +00:00
|
|
|
TAILQ_REMOVE(&g_spdk_mem_maps, map, tailq);
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
}
|
2017-08-24 21:20:12 +00:00
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
for (i = 0; i < sizeof(map->map_256tb.map) / sizeof(map->map_256tb.map[0]); i++) {
|
2020-05-18 18:07:45 +00:00
|
|
|
free(map->map_256tb.map[i]);
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_destroy(&map->mutex);
|
|
|
|
|
|
|
|
free(map);
|
|
|
|
*pmap = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
spdk_mem_register(void *vaddr, size_t len)
|
|
|
|
{
|
|
|
|
struct spdk_mem_map *map;
|
|
|
|
int rc;
|
|
|
|
void *seg_vaddr;
|
|
|
|
size_t seg_len;
|
2018-09-19 11:36:22 +00:00
|
|
|
uint64_t reg;
|
2017-08-24 21:20:12 +00:00
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
if ((uintptr_t)vaddr & ~MASK_256TB) {
|
2017-08-24 21:20:12 +00:00
|
|
|
DEBUG_PRINT("invalid usermode virtual address %p\n", vaddr);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (((uintptr_t)vaddr & MASK_2MB) || (len & MASK_2MB)) {
|
|
|
|
DEBUG_PRINT("invalid %s parameters, vaddr=%p len=%ju\n",
|
|
|
|
__func__, vaddr, len);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2018-09-19 11:36:22 +00:00
|
|
|
if (len == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
pthread_mutex_lock(&g_spdk_mem_map_mutex);
|
|
|
|
|
2018-09-19 11:36:22 +00:00
|
|
|
seg_vaddr = vaddr;
|
|
|
|
seg_len = len;
|
|
|
|
while (seg_len > 0) {
|
|
|
|
reg = spdk_mem_map_translate(g_mem_reg_map, (uint64_t)seg_vaddr, NULL);
|
|
|
|
if (reg & REG_MAP_REGISTERED) {
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return -EBUSY;
|
|
|
|
}
|
|
|
|
seg_vaddr += VALUE_2MB;
|
|
|
|
seg_len -= VALUE_2MB;
|
|
|
|
}
|
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
seg_vaddr = vaddr;
|
|
|
|
seg_len = 0;
|
|
|
|
while (len > 0) {
|
2018-09-12 15:20:38 +00:00
|
|
|
spdk_mem_map_set_translation(g_mem_reg_map, (uint64_t)vaddr, VALUE_2MB,
|
2018-09-19 11:36:22 +00:00
|
|
|
seg_len == 0 ? REG_MAP_REGISTERED | REG_MAP_NOTIFY_START : REG_MAP_REGISTERED);
|
|
|
|
seg_len += VALUE_2MB;
|
2017-08-24 21:20:12 +00:00
|
|
|
vaddr += VALUE_2MB;
|
|
|
|
len -= VALUE_2MB;
|
|
|
|
}
|
|
|
|
|
2018-09-19 11:36:22 +00:00
|
|
|
TAILQ_FOREACH(map, &g_spdk_mem_maps, tailq) {
|
|
|
|
rc = map->ops.notify_cb(map->cb_ctx, map, SPDK_MEM_MAP_NOTIFY_REGISTER, seg_vaddr, seg_len);
|
|
|
|
if (rc != 0) {
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return rc;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
spdk_mem_unregister(void *vaddr, size_t len)
|
|
|
|
{
|
|
|
|
struct spdk_mem_map *map;
|
|
|
|
int rc;
|
|
|
|
void *seg_vaddr;
|
|
|
|
size_t seg_len;
|
2018-09-13 10:34:14 +00:00
|
|
|
uint64_t reg, newreg;
|
2017-08-24 21:20:12 +00:00
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
if ((uintptr_t)vaddr & ~MASK_256TB) {
|
2017-08-24 21:20:12 +00:00
|
|
|
DEBUG_PRINT("invalid usermode virtual address %p\n", vaddr);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (((uintptr_t)vaddr & MASK_2MB) || (len & MASK_2MB)) {
|
|
|
|
DEBUG_PRINT("invalid %s parameters, vaddr=%p len=%ju\n",
|
|
|
|
__func__, vaddr, len);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_spdk_mem_map_mutex);
|
|
|
|
|
2018-09-13 10:34:14 +00:00
|
|
|
/* The first page must be a start of a region. Also check if it's
|
|
|
|
* registered to make sure we don't return -ERANGE for non-registered
|
|
|
|
* regions.
|
|
|
|
*/
|
|
|
|
reg = spdk_mem_map_translate(g_mem_reg_map, (uint64_t)vaddr, NULL);
|
|
|
|
if ((reg & REG_MAP_REGISTERED) && (reg & REG_MAP_NOTIFY_START) == 0) {
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return -ERANGE;
|
|
|
|
}
|
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
seg_vaddr = vaddr;
|
|
|
|
seg_len = len;
|
|
|
|
while (seg_len > 0) {
|
2018-09-12 15:20:38 +00:00
|
|
|
reg = spdk_mem_map_translate(g_mem_reg_map, (uint64_t)seg_vaddr, NULL);
|
2018-09-19 11:36:22 +00:00
|
|
|
if ((reg & REG_MAP_REGISTERED) == 0) {
|
2017-08-24 21:20:12 +00:00
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
seg_vaddr += VALUE_2MB;
|
|
|
|
seg_len -= VALUE_2MB;
|
|
|
|
}
|
|
|
|
|
2018-09-13 10:34:14 +00:00
|
|
|
newreg = spdk_mem_map_translate(g_mem_reg_map, (uint64_t)seg_vaddr, NULL);
|
|
|
|
/* If the next page is registered, it must be a start of a region as well,
|
|
|
|
* otherwise we'd be unregistering only a part of a region.
|
|
|
|
*/
|
|
|
|
if ((newreg & REG_MAP_NOTIFY_START) == 0 && (newreg & REG_MAP_REGISTERED)) {
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return -ERANGE;
|
|
|
|
}
|
2017-08-24 21:20:12 +00:00
|
|
|
seg_vaddr = vaddr;
|
|
|
|
seg_len = 0;
|
2018-09-13 10:34:14 +00:00
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
while (len > 0) {
|
2018-09-12 15:20:38 +00:00
|
|
|
reg = spdk_mem_map_translate(g_mem_reg_map, (uint64_t)vaddr, NULL);
|
2018-09-19 11:36:22 +00:00
|
|
|
spdk_mem_map_set_translation(g_mem_reg_map, (uint64_t)vaddr, VALUE_2MB, 0);
|
|
|
|
|
|
|
|
if (seg_len > 0 && (reg & REG_MAP_NOTIFY_START)) {
|
2020-02-12 12:05:42 +00:00
|
|
|
TAILQ_FOREACH_REVERSE(map, &g_spdk_mem_maps, spdk_mem_map_head, tailq) {
|
2018-09-19 11:36:22 +00:00
|
|
|
rc = map->ops.notify_cb(map->cb_ctx, map, SPDK_MEM_MAP_NOTIFY_UNREGISTER, seg_vaddr, seg_len);
|
|
|
|
if (rc != 0) {
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return rc;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-10 15:23:24 +00:00
|
|
|
seg_vaddr = vaddr;
|
|
|
|
seg_len = VALUE_2MB;
|
2017-08-24 21:20:12 +00:00
|
|
|
} else {
|
|
|
|
seg_len += VALUE_2MB;
|
|
|
|
}
|
|
|
|
|
|
|
|
vaddr += VALUE_2MB;
|
|
|
|
len -= VALUE_2MB;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (seg_len > 0) {
|
2020-02-12 12:05:42 +00:00
|
|
|
TAILQ_FOREACH_REVERSE(map, &g_spdk_mem_maps, spdk_mem_map_head, tailq) {
|
2018-09-11 21:32:54 +00:00
|
|
|
rc = map->ops.notify_cb(map->cb_ctx, map, SPDK_MEM_MAP_NOTIFY_UNREGISTER, seg_vaddr, seg_len);
|
2017-08-24 21:20:12 +00:00
|
|
|
if (rc != 0) {
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-05-18 18:05:43 +00:00
|
|
|
int
|
|
|
|
spdk_mem_reserve(void *vaddr, size_t len)
|
|
|
|
{
|
|
|
|
struct spdk_mem_map *map;
|
|
|
|
void *seg_vaddr;
|
|
|
|
size_t seg_len;
|
|
|
|
uint64_t reg;
|
|
|
|
|
|
|
|
if ((uintptr_t)vaddr & ~MASK_256TB) {
|
|
|
|
DEBUG_PRINT("invalid usermode virtual address %p\n", vaddr);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (((uintptr_t)vaddr & MASK_2MB) || (len & MASK_2MB)) {
|
|
|
|
DEBUG_PRINT("invalid %s parameters, vaddr=%p len=%ju\n",
|
|
|
|
__func__, vaddr, len);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_spdk_mem_map_mutex);
|
|
|
|
|
|
|
|
/* Check if any part of this range is already registered */
|
|
|
|
seg_vaddr = vaddr;
|
|
|
|
seg_len = len;
|
|
|
|
while (seg_len > 0) {
|
|
|
|
reg = spdk_mem_map_translate(g_mem_reg_map, (uint64_t)seg_vaddr, NULL);
|
|
|
|
if (reg & REG_MAP_REGISTERED) {
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return -EBUSY;
|
|
|
|
}
|
|
|
|
seg_vaddr += VALUE_2MB;
|
|
|
|
seg_len -= VALUE_2MB;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Simply set the translation to the memory map's default. This allocates the space in the
|
|
|
|
* map but does not provide a valid translation. */
|
|
|
|
spdk_mem_map_set_translation(g_mem_reg_map, (uint64_t)vaddr, len,
|
|
|
|
g_mem_reg_map->default_translation);
|
|
|
|
|
|
|
|
TAILQ_FOREACH(map, &g_spdk_mem_maps, tailq) {
|
|
|
|
spdk_mem_map_set_translation(map, (uint64_t)vaddr, len, map->default_translation);
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&g_spdk_mem_map_mutex);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
static struct map_1gb *
|
2020-05-10 22:57:07 +00:00
|
|
|
mem_map_get_map_1gb(struct spdk_mem_map *map, uint64_t vfn_2mb)
|
2017-08-24 21:20:12 +00:00
|
|
|
{
|
|
|
|
struct map_1gb *map_1gb;
|
2018-01-25 03:36:50 +00:00
|
|
|
uint64_t idx_256tb = MAP_256TB_IDX(vfn_2mb);
|
2017-08-24 21:20:12 +00:00
|
|
|
size_t i;
|
|
|
|
|
2018-07-05 18:23:55 +00:00
|
|
|
if (spdk_unlikely(idx_256tb >= SPDK_COUNTOF(map->map_256tb.map))) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
map_1gb = map->map_256tb.map[idx_256tb];
|
2017-08-24 21:20:12 +00:00
|
|
|
|
|
|
|
if (!map_1gb) {
|
|
|
|
pthread_mutex_lock(&map->mutex);
|
|
|
|
|
|
|
|
/* Recheck to make sure nobody else got the mutex first. */
|
2018-01-25 03:36:50 +00:00
|
|
|
map_1gb = map->map_256tb.map[idx_256tb];
|
2017-08-24 21:20:12 +00:00
|
|
|
if (!map_1gb) {
|
2020-05-18 18:07:45 +00:00
|
|
|
map_1gb = malloc(sizeof(struct map_1gb));
|
2017-08-24 21:20:12 +00:00
|
|
|
if (map_1gb) {
|
|
|
|
/* initialize all entries to default translation */
|
|
|
|
for (i = 0; i < SPDK_COUNTOF(map_1gb->map); i++) {
|
|
|
|
map_1gb->map[i].translation_2mb = map->default_translation;
|
|
|
|
}
|
2018-01-25 03:36:50 +00:00
|
|
|
map->map_256tb.map[idx_256tb] = map_1gb;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&map->mutex);
|
|
|
|
|
|
|
|
if (!map_1gb) {
|
|
|
|
DEBUG_PRINT("allocation failed\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return map_1gb;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
spdk_mem_map_set_translation(struct spdk_mem_map *map, uint64_t vaddr, uint64_t size,
|
|
|
|
uint64_t translation)
|
|
|
|
{
|
|
|
|
uint64_t vfn_2mb;
|
|
|
|
struct map_1gb *map_1gb;
|
|
|
|
uint64_t idx_1gb;
|
|
|
|
struct map_2mb *map_2mb;
|
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
if ((uintptr_t)vaddr & ~MASK_256TB) {
|
2020-11-17 16:49:41 +00:00
|
|
|
DEBUG_PRINT("invalid usermode virtual address %" PRIu64 "\n", vaddr);
|
2017-08-24 21:20:12 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2018-07-05 11:46:23 +00:00
|
|
|
/* For now, only 2 MB-aligned registrations are supported */
|
2017-08-24 21:20:12 +00:00
|
|
|
if (((uintptr_t)vaddr & MASK_2MB) || (size & MASK_2MB)) {
|
2020-11-17 16:49:41 +00:00
|
|
|
DEBUG_PRINT("invalid %s parameters, vaddr=%" PRIu64 " len=%" PRIu64 "\n",
|
2017-08-24 21:20:12 +00:00
|
|
|
__func__, vaddr, size);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
vfn_2mb = vaddr >> SHIFT_2MB;
|
|
|
|
|
|
|
|
while (size) {
|
2020-05-10 22:57:07 +00:00
|
|
|
map_1gb = mem_map_get_map_1gb(map, vfn_2mb);
|
2017-08-24 21:20:12 +00:00
|
|
|
if (!map_1gb) {
|
|
|
|
DEBUG_PRINT("could not get %p map\n", (void *)vaddr);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
idx_1gb = MAP_1GB_IDX(vfn_2mb);
|
|
|
|
map_2mb = &map_1gb->map[idx_1gb];
|
|
|
|
map_2mb->translation_2mb = translation;
|
|
|
|
|
|
|
|
size -= VALUE_2MB;
|
|
|
|
vfn_2mb++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
spdk_mem_map_clear_translation(struct spdk_mem_map *map, uint64_t vaddr, uint64_t size)
|
|
|
|
{
|
2019-12-03 00:01:07 +00:00
|
|
|
return spdk_mem_map_set_translation(map, vaddr, size, map->default_translation);
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
|
2019-02-19 20:06:43 +00:00
|
|
|
inline uint64_t
|
2018-09-06 20:07:42 +00:00
|
|
|
spdk_mem_map_translate(const struct spdk_mem_map *map, uint64_t vaddr, uint64_t *size)
|
2017-08-24 21:20:12 +00:00
|
|
|
{
|
|
|
|
const struct map_1gb *map_1gb;
|
|
|
|
const struct map_2mb *map_2mb;
|
2018-01-25 03:36:50 +00:00
|
|
|
uint64_t idx_256tb;
|
2017-08-24 21:20:12 +00:00
|
|
|
uint64_t idx_1gb;
|
|
|
|
uint64_t vfn_2mb;
|
2018-09-11 23:05:50 +00:00
|
|
|
uint64_t cur_size;
|
|
|
|
uint64_t prev_translation;
|
2018-12-07 22:33:38 +00:00
|
|
|
uint64_t orig_translation;
|
2017-08-24 21:20:12 +00:00
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
if (spdk_unlikely(vaddr & ~MASK_256TB)) {
|
2017-08-24 21:20:12 +00:00
|
|
|
DEBUG_PRINT("invalid usermode virtual address %p\n", (void *)vaddr);
|
|
|
|
return map->default_translation;
|
|
|
|
}
|
|
|
|
|
|
|
|
vfn_2mb = vaddr >> SHIFT_2MB;
|
2018-01-25 03:36:50 +00:00
|
|
|
idx_256tb = MAP_256TB_IDX(vfn_2mb);
|
2017-08-24 21:20:12 +00:00
|
|
|
idx_1gb = MAP_1GB_IDX(vfn_2mb);
|
|
|
|
|
2018-01-25 03:36:50 +00:00
|
|
|
map_1gb = map->map_256tb.map[idx_256tb];
|
2017-08-24 21:20:12 +00:00
|
|
|
if (spdk_unlikely(!map_1gb)) {
|
|
|
|
return map->default_translation;
|
|
|
|
}
|
|
|
|
|
2018-11-13 16:43:46 +00:00
|
|
|
cur_size = VALUE_2MB - _2MB_OFFSET(vaddr);
|
2018-09-11 23:05:50 +00:00
|
|
|
map_2mb = &map_1gb->map[idx_1gb];
|
|
|
|
if (size == NULL || map->ops.are_contiguous == NULL ||
|
|
|
|
map_2mb->translation_2mb == map->default_translation) {
|
2018-12-28 09:29:42 +00:00
|
|
|
if (size != NULL) {
|
2018-12-28 10:15:29 +00:00
|
|
|
*size = spdk_min(*size, cur_size);
|
2018-12-28 09:29:42 +00:00
|
|
|
}
|
2018-09-11 23:05:50 +00:00
|
|
|
return map_2mb->translation_2mb;
|
|
|
|
}
|
|
|
|
|
2018-12-07 22:33:38 +00:00
|
|
|
orig_translation = map_2mb->translation_2mb;
|
|
|
|
prev_translation = orig_translation;
|
2018-12-28 09:29:42 +00:00
|
|
|
while (cur_size < *size) {
|
2018-09-11 23:05:50 +00:00
|
|
|
vfn_2mb++;
|
|
|
|
idx_256tb = MAP_256TB_IDX(vfn_2mb);
|
|
|
|
idx_1gb = MAP_1GB_IDX(vfn_2mb);
|
|
|
|
|
|
|
|
map_1gb = map->map_256tb.map[idx_256tb];
|
|
|
|
if (spdk_unlikely(!map_1gb)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
map_2mb = &map_1gb->map[idx_1gb];
|
|
|
|
if (!map->ops.are_contiguous(prev_translation, map_2mb->translation_2mb)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
cur_size += VALUE_2MB;
|
|
|
|
prev_translation = map_2mb->translation_2mb;
|
|
|
|
}
|
|
|
|
|
2018-12-28 10:15:29 +00:00
|
|
|
*size = spdk_min(*size, cur_size);
|
2018-12-07 22:33:38 +00:00
|
|
|
return orig_translation;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
|
2018-05-09 05:28:38 +00:00
|
|
|
static void
|
|
|
|
memory_hotplug_cb(enum rte_mem_event event_type,
|
|
|
|
const void *addr, size_t len, void *arg)
|
|
|
|
{
|
|
|
|
if (event_type == RTE_MEM_EVENT_ALLOC) {
|
2018-11-17 12:49:21 +00:00
|
|
|
spdk_mem_register((void *)addr, len);
|
|
|
|
|
2019-02-27 17:50:06 +00:00
|
|
|
if (!spdk_env_dpdk_external_init()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-11-30 12:51:35 +00:00
|
|
|
/* When the user initialized DPDK separately, we can't
|
|
|
|
* be sure that --match-allocations RTE flag was specified.
|
|
|
|
* Without this flag, DPDK can free memory in different units
|
|
|
|
* than it was allocated. It doesn't work with things like RDMA MRs.
|
2019-02-27 17:50:06 +00:00
|
|
|
*
|
2020-11-30 12:51:35 +00:00
|
|
|
* For such cases, we mark segments so they aren't freed.
|
2018-11-17 12:49:21 +00:00
|
|
|
*/
|
2018-10-10 15:52:33 +00:00
|
|
|
while (len > 0) {
|
|
|
|
struct rte_memseg *seg;
|
|
|
|
|
|
|
|
seg = rte_mem_virt2memseg(addr, NULL);
|
|
|
|
assert(seg != NULL);
|
2018-11-17 12:49:21 +00:00
|
|
|
seg->flags |= RTE_MEMSEG_FLAG_DO_NOT_FREE;
|
2018-10-10 15:52:33 +00:00
|
|
|
addr = (void *)((uintptr_t)addr + seg->hugepage_sz);
|
|
|
|
len -= seg->hugepage_sz;
|
|
|
|
}
|
2018-05-09 05:28:38 +00:00
|
|
|
} else if (event_type == RTE_MEM_EVENT_FREE) {
|
2021-04-15 15:46:03 +00:00
|
|
|
spdk_mem_unregister((void *)addr, len);
|
2018-05-09 05:28:38 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
memory_iter_cb(const struct rte_memseg_list *msl,
|
|
|
|
const struct rte_memseg *ms, size_t len, void *arg)
|
|
|
|
{
|
|
|
|
return spdk_mem_register(ms->addr, len);
|
|
|
|
}
|
|
|
|
|
2017-12-18 19:57:01 +00:00
|
|
|
int
|
2020-04-07 07:32:40 +00:00
|
|
|
mem_map_init(bool legacy_mem)
|
2017-08-24 21:20:12 +00:00
|
|
|
{
|
2019-12-06 23:26:49 +00:00
|
|
|
g_legacy_mem = legacy_mem;
|
|
|
|
|
2017-08-24 21:20:12 +00:00
|
|
|
g_mem_reg_map = spdk_mem_map_alloc(0, NULL, NULL);
|
|
|
|
if (g_mem_reg_map == NULL) {
|
|
|
|
DEBUG_PRINT("memory registration map allocation failed\n");
|
2019-10-15 14:36:04 +00:00
|
|
|
return -ENOMEM;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Walk all DPDK memory segments and register them
|
2020-11-30 19:44:19 +00:00
|
|
|
* with the main memory map
|
2017-08-24 21:20:12 +00:00
|
|
|
*/
|
2018-05-09 05:28:38 +00:00
|
|
|
rte_mem_event_callback_register("spdk", memory_hotplug_cb, NULL);
|
|
|
|
rte_memseg_contig_walk(memory_iter_cb, NULL);
|
2017-12-18 19:57:01 +00:00
|
|
|
return 0;
|
2017-08-24 21:20:12 +00:00
|
|
|
}
|
2019-02-15 22:55:05 +00:00
|
|
|
|
2019-02-28 23:57:03 +00:00
|
|
|
bool
|
|
|
|
spdk_iommu_is_enabled(void)
|
|
|
|
{
|
2020-05-10 22:57:07 +00:00
|
|
|
#if VFIO_ENABLED
|
2019-02-28 23:57:03 +00:00
|
|
|
return g_vfio.enabled && !g_vfio.noiommu_enabled;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2019-02-15 22:55:05 +00:00
|
|
|
struct spdk_vtophys_pci_device {
|
|
|
|
struct rte_pci_device *pci_device;
|
|
|
|
TAILQ_ENTRY(spdk_vtophys_pci_device) tailq;
|
|
|
|
};
|
|
|
|
|
|
|
|
static pthread_mutex_t g_vtophys_pci_devices_mutex = PTHREAD_MUTEX_INITIALIZER;
|
|
|
|
static TAILQ_HEAD(, spdk_vtophys_pci_device) g_vtophys_pci_devices =
|
|
|
|
TAILQ_HEAD_INITIALIZER(g_vtophys_pci_devices);
|
|
|
|
|
|
|
|
static struct spdk_mem_map *g_vtophys_map;
|
2020-01-28 17:27:40 +00:00
|
|
|
static struct spdk_mem_map *g_phys_ref_map;
|
2019-02-15 22:55:05 +00:00
|
|
|
|
2021-04-15 15:46:03 +00:00
|
|
|
#if VFIO_ENABLED
|
|
|
|
static int
|
|
|
|
vtophys_iommu_map_dma(uint64_t vaddr, uint64_t iova, uint64_t size)
|
|
|
|
{
|
|
|
|
struct spdk_vfio_dma_map *dma_map;
|
|
|
|
uint64_t refcount;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
refcount = spdk_mem_map_translate(g_phys_ref_map, iova, NULL);
|
|
|
|
assert(refcount < UINT64_MAX);
|
|
|
|
if (refcount > 0) {
|
|
|
|
spdk_mem_map_set_translation(g_phys_ref_map, iova, size, refcount + 1);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
dma_map = calloc(1, sizeof(*dma_map));
|
|
|
|
if (dma_map == NULL) {
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
dma_map->map.argsz = sizeof(dma_map->map);
|
|
|
|
dma_map->map.flags = VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE;
|
|
|
|
dma_map->map.vaddr = vaddr;
|
|
|
|
dma_map->map.iova = iova;
|
|
|
|
dma_map->map.size = size;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_vfio.mutex);
|
|
|
|
if (g_vfio.device_ref == 0) {
|
|
|
|
/* VFIO requires at least one device (IOMMU group) to be added to
|
|
|
|
* a VFIO container before it is possible to perform any IOMMU
|
|
|
|
* operations on that container. This memory will be mapped once
|
|
|
|
* the first device (IOMMU group) is hotplugged.
|
|
|
|
*
|
|
|
|
* Since the vfio container is managed internally by DPDK, it is
|
|
|
|
* also possible that some device is already in that container, but
|
|
|
|
* it's not managed by SPDK - e.g. an NIC attached internally
|
|
|
|
* inside DPDK. We could map the memory straight away in such
|
|
|
|
* scenario, but there's no need to do it. DPDK devices clearly
|
|
|
|
* don't need our mappings and hence we defer the mapping
|
|
|
|
* unconditionally until the first SPDK-managed device is
|
|
|
|
* hotplugged.
|
|
|
|
*/
|
|
|
|
goto out_insert;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = ioctl(g_vfio.fd, VFIO_IOMMU_MAP_DMA, &dma_map->map);
|
|
|
|
if (ret) {
|
2021-04-19 13:58:04 +00:00
|
|
|
/* There are cases the vfio container doesn't have IOMMU group, it's safe for this case */
|
|
|
|
SPDK_NOTICELOG("Cannot set up DMA mapping, error %d, ignored\n", errno);
|
2021-04-15 15:46:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
out_insert:
|
|
|
|
TAILQ_INSERT_TAIL(&g_vfio.maps, dma_map, tailq);
|
|
|
|
pthread_mutex_unlock(&g_vfio.mutex);
|
|
|
|
spdk_mem_map_set_translation(g_phys_ref_map, iova, size, refcount + 1);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
vtophys_iommu_unmap_dma(uint64_t iova, uint64_t size)
|
|
|
|
{
|
|
|
|
struct spdk_vfio_dma_map *dma_map;
|
|
|
|
uint64_t refcount;
|
|
|
|
int ret;
|
|
|
|
struct vfio_iommu_type1_dma_unmap unmap = {};
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_vfio.mutex);
|
|
|
|
TAILQ_FOREACH(dma_map, &g_vfio.maps, tailq) {
|
|
|
|
if (dma_map->map.iova == iova) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dma_map == NULL) {
|
|
|
|
DEBUG_PRINT("Cannot clear DMA mapping for IOVA %"PRIx64" - it's not mapped\n", iova);
|
|
|
|
pthread_mutex_unlock(&g_vfio.mutex);
|
|
|
|
return -ENXIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
refcount = spdk_mem_map_translate(g_phys_ref_map, iova, NULL);
|
|
|
|
assert(refcount < UINT64_MAX);
|
|
|
|
if (refcount > 0) {
|
|
|
|
spdk_mem_map_set_translation(g_phys_ref_map, iova, size, refcount - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We still have outstanding references, don't clear it. */
|
|
|
|
if (refcount > 1) {
|
|
|
|
pthread_mutex_unlock(&g_vfio.mutex);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** don't support partial or multiple-page unmap for now */
|
|
|
|
assert(dma_map->map.size == size);
|
|
|
|
|
|
|
|
if (g_vfio.device_ref == 0) {
|
|
|
|
/* Memory is not mapped anymore, just remove it's references */
|
|
|
|
goto out_remove;
|
|
|
|
}
|
|
|
|
|
|
|
|
unmap.argsz = sizeof(unmap);
|
|
|
|
unmap.flags = 0;
|
|
|
|
unmap.iova = dma_map->map.iova;
|
|
|
|
unmap.size = dma_map->map.size;
|
|
|
|
ret = ioctl(g_vfio.fd, VFIO_IOMMU_UNMAP_DMA, &unmap);
|
|
|
|
if (ret) {
|
2021-04-19 13:58:04 +00:00
|
|
|
SPDK_NOTICELOG("Cannot clear DMA mapping, error %d, ignored\n", errno);
|
2021-04-15 15:46:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
out_remove:
|
|
|
|
TAILQ_REMOVE(&g_vfio.maps, dma_map, tailq);
|
|
|
|
pthread_mutex_unlock(&g_vfio.mutex);
|
|
|
|
free(dma_map);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-02-15 22:55:05 +00:00
|
|
|
static uint64_t
|
|
|
|
vtophys_get_paddr_memseg(uint64_t vaddr)
|
|
|
|
{
|
|
|
|
uintptr_t paddr;
|
|
|
|
struct rte_memseg *seg;
|
|
|
|
|
|
|
|
seg = rte_mem_virt2memseg((void *)(uintptr_t)vaddr, NULL);
|
|
|
|
if (seg != NULL) {
|
2020-09-25 15:45:23 +00:00
|
|
|
paddr = seg->iova;
|
2019-02-15 22:55:05 +00:00
|
|
|
if (paddr == RTE_BAD_IOVA) {
|
|
|
|
return SPDK_VTOPHYS_ERROR;
|
|
|
|
}
|
|
|
|
paddr += (vaddr - (uintptr_t)seg->addr);
|
|
|
|
return paddr;
|
|
|
|
}
|
|
|
|
|
|
|
|
return SPDK_VTOPHYS_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try to get the paddr from /proc/self/pagemap */
|
|
|
|
static uint64_t
|
|
|
|
vtophys_get_paddr_pagemap(uint64_t vaddr)
|
|
|
|
{
|
|
|
|
uintptr_t paddr;
|
|
|
|
|
2019-07-22 13:17:03 +00:00
|
|
|
/* Silence static analyzers */
|
|
|
|
assert(vaddr != 0);
|
2019-03-11 12:45:19 +00:00
|
|
|
paddr = rte_mem_virt2iova((void *)vaddr);
|
|
|
|
if (paddr == RTE_BAD_IOVA) {
|
2019-02-15 22:55:05 +00:00
|
|
|
/*
|
|
|
|
* The vaddr may be valid but doesn't have a backing page
|
|
|
|
* assigned yet. Touch the page to ensure a backing page
|
|
|
|
* gets assigned, then try to translate again.
|
|
|
|
*/
|
|
|
|
rte_atomic64_read((rte_atomic64_t *)vaddr);
|
2019-03-11 12:45:19 +00:00
|
|
|
paddr = rte_mem_virt2iova((void *)vaddr);
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
2019-03-11 12:45:19 +00:00
|
|
|
if (paddr == RTE_BAD_IOVA) {
|
2019-02-15 22:55:05 +00:00
|
|
|
/* Unable to get to the physical address. */
|
|
|
|
return SPDK_VTOPHYS_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return paddr;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try to get the paddr from pci devices */
|
|
|
|
static uint64_t
|
|
|
|
vtophys_get_paddr_pci(uint64_t vaddr)
|
|
|
|
{
|
|
|
|
struct spdk_vtophys_pci_device *vtophys_dev;
|
|
|
|
uintptr_t paddr;
|
|
|
|
struct rte_pci_device *dev;
|
|
|
|
struct rte_mem_resource *res;
|
|
|
|
unsigned r;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_vtophys_pci_devices_mutex);
|
|
|
|
TAILQ_FOREACH(vtophys_dev, &g_vtophys_pci_devices, tailq) {
|
|
|
|
dev = vtophys_dev->pci_device;
|
|
|
|
|
|
|
|
for (r = 0; r < PCI_MAX_RESOURCE; r++) {
|
|
|
|
res = &dev->mem_resource[r];
|
|
|
|
if (res->phys_addr && vaddr >= (uint64_t)res->addr &&
|
|
|
|
vaddr < (uint64_t)res->addr + res->len) {
|
|
|
|
paddr = res->phys_addr + (vaddr - (uint64_t)res->addr);
|
|
|
|
DEBUG_PRINT("%s: %p -> %p\n", __func__, (void *)vaddr,
|
|
|
|
(void *)paddr);
|
|
|
|
pthread_mutex_unlock(&g_vtophys_pci_devices_mutex);
|
|
|
|
return paddr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pthread_mutex_unlock(&g_vtophys_pci_devices_mutex);
|
|
|
|
|
|
|
|
return SPDK_VTOPHYS_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-05-10 22:57:07 +00:00
|
|
|
vtophys_notify(void *cb_ctx, struct spdk_mem_map *map,
|
|
|
|
enum spdk_mem_map_notify_action action,
|
|
|
|
void *vaddr, size_t len)
|
2019-02-15 22:55:05 +00:00
|
|
|
{
|
|
|
|
int rc = 0, pci_phys = 0;
|
|
|
|
uint64_t paddr;
|
|
|
|
|
|
|
|
if ((uintptr_t)vaddr & ~MASK_256TB) {
|
|
|
|
DEBUG_PRINT("invalid usermode virtual address %p\n", vaddr);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (((uintptr_t)vaddr & MASK_2MB) || (len & MASK_2MB)) {
|
2019-09-25 23:18:08 +00:00
|
|
|
DEBUG_PRINT("invalid parameters, vaddr=%p len=%ju\n",
|
|
|
|
vaddr, len);
|
2019-02-15 22:55:05 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2019-08-22 14:40:54 +00:00
|
|
|
/* Get the physical address from the DPDK memsegs */
|
|
|
|
paddr = vtophys_get_paddr_memseg((uint64_t)vaddr);
|
2019-02-15 22:55:05 +00:00
|
|
|
|
2019-08-22 14:40:54 +00:00
|
|
|
switch (action) {
|
|
|
|
case SPDK_MEM_MAP_NOTIFY_REGISTER:
|
|
|
|
if (paddr == SPDK_VTOPHYS_ERROR) {
|
2021-04-15 15:46:03 +00:00
|
|
|
/* This is not an address that DPDK is managing. */
|
2020-05-10 22:57:07 +00:00
|
|
|
#if VFIO_ENABLED
|
2019-12-09 21:33:09 +00:00
|
|
|
enum rte_iova_mode iova_mode;
|
|
|
|
|
|
|
|
iova_mode = rte_eal_iova_mode();
|
|
|
|
|
|
|
|
if (spdk_iommu_is_enabled() && iova_mode == RTE_IOVA_VA) {
|
|
|
|
/* We'll use the virtual address as the iova to match DPDK. */
|
2019-08-22 14:40:54 +00:00
|
|
|
paddr = (uint64_t)vaddr;
|
2021-04-15 15:46:03 +00:00
|
|
|
rc = vtophys_iommu_map_dma((uint64_t)vaddr, paddr, len);
|
|
|
|
if (rc) {
|
|
|
|
return -EFAULT;
|
2020-10-02 10:23:46 +00:00
|
|
|
}
|
2021-04-15 15:46:03 +00:00
|
|
|
while (len > 0) {
|
|
|
|
rc = spdk_mem_map_set_translation(map, (uint64_t)vaddr, VALUE_2MB, paddr);
|
2019-08-22 14:40:54 +00:00
|
|
|
if (rc != 0) {
|
2021-04-15 15:46:03 +00:00
|
|
|
return rc;
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
2019-08-22 14:40:54 +00:00
|
|
|
vaddr += VALUE_2MB;
|
2021-04-15 15:46:03 +00:00
|
|
|
paddr += VALUE_2MB;
|
|
|
|
len -= VALUE_2MB;
|
2019-08-22 14:40:54 +00:00
|
|
|
}
|
|
|
|
} else
|
2019-02-15 22:55:05 +00:00
|
|
|
#endif
|
2019-08-22 14:40:54 +00:00
|
|
|
{
|
|
|
|
/* Get the physical address from /proc/self/pagemap. */
|
|
|
|
paddr = vtophys_get_paddr_pagemap((uint64_t)vaddr);
|
|
|
|
if (paddr == SPDK_VTOPHYS_ERROR) {
|
|
|
|
/* Get the physical address from PCI devices */
|
|
|
|
paddr = vtophys_get_paddr_pci((uint64_t)vaddr);
|
2019-02-15 22:55:05 +00:00
|
|
|
if (paddr == SPDK_VTOPHYS_ERROR) {
|
2019-08-22 14:40:54 +00:00
|
|
|
DEBUG_PRINT("could not get phys addr for %p\n", vaddr);
|
2021-04-15 15:46:03 +00:00
|
|
|
return -EFAULT;
|
2019-08-22 14:40:54 +00:00
|
|
|
}
|
|
|
|
/* The beginning of this address range points to a PCI resource,
|
|
|
|
* so the rest must point to a PCI resource as well.
|
|
|
|
*/
|
|
|
|
pci_phys = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get paddr for each 2MB chunk in this address range */
|
|
|
|
while (len > 0) {
|
|
|
|
/* Get the physical address from /proc/self/pagemap. */
|
|
|
|
if (pci_phys) {
|
2019-02-15 22:55:05 +00:00
|
|
|
paddr = vtophys_get_paddr_pci((uint64_t)vaddr);
|
2019-08-22 14:40:54 +00:00
|
|
|
} else {
|
|
|
|
paddr = vtophys_get_paddr_pagemap((uint64_t)vaddr);
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
2019-08-22 14:40:54 +00:00
|
|
|
|
|
|
|
if (paddr == SPDK_VTOPHYS_ERROR) {
|
|
|
|
DEBUG_PRINT("could not get phys addr for %p\n", vaddr);
|
2021-04-15 15:46:03 +00:00
|
|
|
return -EFAULT;
|
2019-08-22 14:40:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Since PCI paddr can break the 2MiB physical alignment skip this check for that. */
|
|
|
|
if (!pci_phys && (paddr & MASK_2MB)) {
|
|
|
|
DEBUG_PRINT("invalid paddr 0x%" PRIx64 " - must be 2MB aligned\n", paddr);
|
2021-04-15 15:46:03 +00:00
|
|
|
return -EINVAL;
|
2019-08-22 14:40:54 +00:00
|
|
|
}
|
2020-05-10 22:57:07 +00:00
|
|
|
#if VFIO_ENABLED
|
2019-12-09 21:33:09 +00:00
|
|
|
/* If the IOMMU is on, but DPDK is using iova-mode=pa, we want to register this memory
|
|
|
|
* with the IOMMU using the physical address to match. */
|
|
|
|
if (spdk_iommu_is_enabled()) {
|
2021-04-15 15:46:03 +00:00
|
|
|
rc = vtophys_iommu_map_dma((uint64_t)vaddr, paddr, VALUE_2MB);
|
|
|
|
if (rc) {
|
|
|
|
DEBUG_PRINT("Unable to assign vaddr %p to paddr 0x%" PRIx64 "\n", vaddr, paddr);
|
|
|
|
return -EFAULT;
|
2019-12-09 21:33:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2019-08-22 14:40:54 +00:00
|
|
|
|
|
|
|
rc = spdk_mem_map_set_translation(map, (uint64_t)vaddr, VALUE_2MB, paddr);
|
|
|
|
if (rc != 0) {
|
2021-04-15 15:46:03 +00:00
|
|
|
return rc;
|
2019-08-22 14:40:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
vaddr += VALUE_2MB;
|
|
|
|
len -= VALUE_2MB;
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
|
|
|
}
|
2019-08-22 14:40:54 +00:00
|
|
|
} else {
|
|
|
|
/* This is an address managed by DPDK. Just setup the translations. */
|
|
|
|
while (len > 0) {
|
|
|
|
paddr = vtophys_get_paddr_memseg((uint64_t)vaddr);
|
|
|
|
if (paddr == SPDK_VTOPHYS_ERROR) {
|
|
|
|
DEBUG_PRINT("could not get phys addr for %p\n", vaddr);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = spdk_mem_map_set_translation(map, (uint64_t)vaddr, VALUE_2MB, paddr);
|
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
vaddr += VALUE_2MB;
|
|
|
|
len -= VALUE_2MB;
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
2019-08-22 14:40:54 +00:00
|
|
|
}
|
2019-02-15 22:55:05 +00:00
|
|
|
|
2019-08-22 14:40:54 +00:00
|
|
|
break;
|
|
|
|
case SPDK_MEM_MAP_NOTIFY_UNREGISTER:
|
2020-05-10 22:57:07 +00:00
|
|
|
#if VFIO_ENABLED
|
2021-04-15 15:46:03 +00:00
|
|
|
if (paddr == SPDK_VTOPHYS_ERROR) {
|
|
|
|
/*
|
|
|
|
* This is not an address that DPDK is managing. If vfio is enabled,
|
|
|
|
* we need to unmap the range from the IOMMU
|
|
|
|
*/
|
2019-08-22 14:40:54 +00:00
|
|
|
if (spdk_iommu_is_enabled()) {
|
|
|
|
uint64_t buffer_len = len;
|
2019-12-09 21:33:09 +00:00
|
|
|
uint8_t *va = vaddr;
|
|
|
|
enum rte_iova_mode iova_mode;
|
|
|
|
|
|
|
|
iova_mode = rte_eal_iova_mode();
|
|
|
|
/*
|
|
|
|
* In virtual address mode, the region is contiguous and can be done in
|
|
|
|
* one unmap.
|
|
|
|
*/
|
|
|
|
if (iova_mode == RTE_IOVA_VA) {
|
|
|
|
paddr = spdk_mem_map_translate(map, (uint64_t)va, &buffer_len);
|
|
|
|
if (buffer_len != len || paddr != (uintptr_t)va) {
|
|
|
|
DEBUG_PRINT("Unmapping %p with length %lu failed because "
|
|
|
|
"translation had address 0x%" PRIx64 " and length %lu\n",
|
|
|
|
va, len, paddr, buffer_len);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2021-04-15 15:46:03 +00:00
|
|
|
rc = vtophys_iommu_unmap_dma(paddr, len);
|
|
|
|
if (rc) {
|
|
|
|
DEBUG_PRINT("Failed to iommu unmap paddr 0x%" PRIx64 "\n", paddr);
|
|
|
|
return -EFAULT;
|
2019-12-09 21:33:09 +00:00
|
|
|
}
|
|
|
|
} else if (iova_mode == RTE_IOVA_PA) {
|
|
|
|
/* Get paddr for each 2MB chunk in this address range */
|
2021-04-15 15:46:03 +00:00
|
|
|
while (buffer_len > 0) {
|
|
|
|
paddr = spdk_mem_map_translate(map, (uint64_t)va, NULL);
|
2019-12-09 21:33:09 +00:00
|
|
|
|
2021-04-15 15:46:03 +00:00
|
|
|
if (paddr == SPDK_VTOPHYS_ERROR || buffer_len < VALUE_2MB) {
|
|
|
|
DEBUG_PRINT("could not get phys addr for %p\n", va);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
2019-12-09 21:33:09 +00:00
|
|
|
|
2021-04-15 15:46:03 +00:00
|
|
|
rc = vtophys_iommu_unmap_dma(paddr, VALUE_2MB);
|
|
|
|
if (rc) {
|
|
|
|
DEBUG_PRINT("Failed to iommu unmap paddr 0x%" PRIx64 "\n", paddr);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
2019-12-09 21:33:09 +00:00
|
|
|
|
2021-04-15 15:46:03 +00:00
|
|
|
va += VALUE_2MB;
|
|
|
|
buffer_len -= VALUE_2MB;
|
2019-12-09 21:33:09 +00:00
|
|
|
}
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
|
|
|
}
|
2019-08-22 14:40:54 +00:00
|
|
|
}
|
2019-02-15 22:55:05 +00:00
|
|
|
#endif
|
2019-08-22 14:40:54 +00:00
|
|
|
while (len > 0) {
|
2019-02-15 22:55:05 +00:00
|
|
|
rc = spdk_mem_map_clear_translation(map, (uint64_t)vaddr, VALUE_2MB);
|
2019-08-22 14:40:54 +00:00
|
|
|
if (rc != 0) {
|
|
|
|
return rc;
|
|
|
|
}
|
2019-02-15 22:55:05 +00:00
|
|
|
|
2019-08-22 14:40:54 +00:00
|
|
|
vaddr += VALUE_2MB;
|
|
|
|
len -= VALUE_2MB;
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
2019-08-22 14:40:54 +00:00
|
|
|
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SPDK_UNREACHABLE();
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2019-08-22 19:44:02 +00:00
|
|
|
static int
|
|
|
|
vtophys_check_contiguous_entries(uint64_t paddr1, uint64_t paddr2)
|
|
|
|
{
|
|
|
|
/* This function is always called with paddrs for two subsequent
|
|
|
|
* 2MB chunks in virtual address space, so those chunks will be only
|
|
|
|
* physically contiguous if the physical addresses are 2MB apart
|
|
|
|
* from each other as well.
|
|
|
|
*/
|
|
|
|
return (paddr2 - paddr1 == VALUE_2MB);
|
|
|
|
}
|
|
|
|
|
2020-05-10 22:57:07 +00:00
|
|
|
#if VFIO_ENABLED
|
2019-02-15 22:55:05 +00:00
|
|
|
|
|
|
|
static bool
|
2020-05-10 22:57:07 +00:00
|
|
|
vfio_enabled(void)
|
2019-02-15 22:55:05 +00:00
|
|
|
{
|
|
|
|
return rte_vfio_is_enabled("vfio_pci");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if IOMMU is enabled on the system */
|
|
|
|
static bool
|
|
|
|
has_iommu_groups(void)
|
|
|
|
{
|
|
|
|
int count = 0;
|
|
|
|
DIR *dir = opendir("/sys/kernel/iommu_groups");
|
|
|
|
|
|
|
|
if (dir == NULL) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-10-22 15:35:17 +00:00
|
|
|
while (count < 3 && readdir(dir) != NULL) {
|
2019-02-15 22:55:05 +00:00
|
|
|
count++;
|
|
|
|
}
|
|
|
|
|
|
|
|
closedir(dir);
|
|
|
|
/* there will always be ./ and ../ entries */
|
|
|
|
return count > 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
2020-05-10 22:57:07 +00:00
|
|
|
vfio_noiommu_enabled(void)
|
2019-02-15 22:55:05 +00:00
|
|
|
{
|
|
|
|
return rte_vfio_noiommu_is_enabled();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-05-10 22:57:07 +00:00
|
|
|
vtophys_iommu_init(void)
|
2019-02-15 22:55:05 +00:00
|
|
|
{
|
|
|
|
char proc_fd_path[PATH_MAX + 1];
|
|
|
|
char link_path[PATH_MAX + 1];
|
|
|
|
const char vfio_path[] = "/dev/vfio/vfio";
|
|
|
|
DIR *dir;
|
|
|
|
struct dirent *d;
|
|
|
|
|
2020-05-10 22:57:07 +00:00
|
|
|
if (!vfio_enabled()) {
|
2019-02-15 22:55:05 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-05-10 22:57:07 +00:00
|
|
|
if (vfio_noiommu_enabled()) {
|
2019-02-15 22:55:05 +00:00
|
|
|
g_vfio.noiommu_enabled = true;
|
|
|
|
} else if (!has_iommu_groups()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
dir = opendir("/proc/self/fd");
|
|
|
|
if (!dir) {
|
|
|
|
DEBUG_PRINT("Failed to open /proc/self/fd (%d)\n", errno);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
while ((d = readdir(dir)) != NULL) {
|
|
|
|
if (d->d_type != DT_LNK) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
snprintf(proc_fd_path, sizeof(proc_fd_path), "/proc/self/fd/%s", d->d_name);
|
|
|
|
if (readlink(proc_fd_path, link_path, sizeof(link_path)) != (sizeof(vfio_path) - 1)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memcmp(link_path, vfio_path, sizeof(vfio_path) - 1) == 0) {
|
|
|
|
sscanf(d->d_name, "%d", &g_vfio.fd);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
closedir(dir);
|
|
|
|
|
|
|
|
if (g_vfio.fd < 0) {
|
|
|
|
DEBUG_PRINT("Failed to discover DPDK VFIO container fd.\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
g_vfio.enabled = true;
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
2020-08-20 19:25:27 +00:00
|
|
|
|
2019-02-15 22:55:05 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
void
|
2020-04-07 07:32:40 +00:00
|
|
|
vtophys_pci_device_added(struct rte_pci_device *pci_device)
|
2019-02-15 22:55:05 +00:00
|
|
|
{
|
|
|
|
struct spdk_vtophys_pci_device *vtophys_dev;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_vtophys_pci_devices_mutex);
|
|
|
|
|
|
|
|
vtophys_dev = calloc(1, sizeof(*vtophys_dev));
|
|
|
|
if (vtophys_dev) {
|
|
|
|
vtophys_dev->pci_device = pci_device;
|
|
|
|
TAILQ_INSERT_TAIL(&g_vtophys_pci_devices, vtophys_dev, tailq);
|
|
|
|
} else {
|
|
|
|
DEBUG_PRINT("Memory allocation error\n");
|
|
|
|
}
|
|
|
|
pthread_mutex_unlock(&g_vtophys_pci_devices_mutex);
|
2021-08-20 09:00:33 +00:00
|
|
|
|
|
|
|
#if VFIO_ENABLED
|
|
|
|
struct spdk_vfio_dma_map *dma_map;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!g_vfio.enabled) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_vfio.mutex);
|
|
|
|
g_vfio.device_ref++;
|
|
|
|
if (g_vfio.device_ref > 1) {
|
|
|
|
pthread_mutex_unlock(&g_vfio.mutex);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This is the first SPDK device using DPDK vfio. This means that the first
|
|
|
|
* IOMMU group might have been just been added to the DPDK vfio container.
|
|
|
|
* From this point it is certain that the memory can be mapped now.
|
|
|
|
*/
|
|
|
|
TAILQ_FOREACH(dma_map, &g_vfio.maps, tailq) {
|
|
|
|
ret = ioctl(g_vfio.fd, VFIO_IOMMU_MAP_DMA, &dma_map->map);
|
|
|
|
if (ret) {
|
|
|
|
DEBUG_PRINT("Cannot update DMA mapping, error %d\n", errno);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pthread_mutex_unlock(&g_vfio.mutex);
|
|
|
|
#endif
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-04-07 07:32:40 +00:00
|
|
|
vtophys_pci_device_removed(struct rte_pci_device *pci_device)
|
2019-02-15 22:55:05 +00:00
|
|
|
{
|
|
|
|
struct spdk_vtophys_pci_device *vtophys_dev;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_vtophys_pci_devices_mutex);
|
|
|
|
TAILQ_FOREACH(vtophys_dev, &g_vtophys_pci_devices, tailq) {
|
|
|
|
if (vtophys_dev->pci_device == pci_device) {
|
|
|
|
TAILQ_REMOVE(&g_vtophys_pci_devices, vtophys_dev, tailq);
|
|
|
|
free(vtophys_dev);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pthread_mutex_unlock(&g_vtophys_pci_devices_mutex);
|
2021-08-20 09:00:33 +00:00
|
|
|
|
|
|
|
#if VFIO_ENABLED
|
|
|
|
struct spdk_vfio_dma_map *dma_map;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!g_vfio.enabled) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_lock(&g_vfio.mutex);
|
|
|
|
assert(g_vfio.device_ref > 0);
|
|
|
|
g_vfio.device_ref--;
|
|
|
|
if (g_vfio.device_ref > 0) {
|
|
|
|
pthread_mutex_unlock(&g_vfio.mutex);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This is the last SPDK device using DPDK vfio. If DPDK doesn't have
|
|
|
|
* any additional devices using it's vfio container, all the mappings
|
|
|
|
* will be automatically removed by the Linux vfio driver. We unmap
|
|
|
|
* the memory manually to be able to easily re-map it later regardless
|
|
|
|
* of other, external factors.
|
|
|
|
*/
|
|
|
|
TAILQ_FOREACH(dma_map, &g_vfio.maps, tailq) {
|
|
|
|
struct vfio_iommu_type1_dma_unmap unmap = {};
|
|
|
|
unmap.argsz = sizeof(unmap);
|
|
|
|
unmap.flags = 0;
|
|
|
|
unmap.iova = dma_map->map.iova;
|
|
|
|
unmap.size = dma_map->map.size;
|
|
|
|
ret = ioctl(g_vfio.fd, VFIO_IOMMU_UNMAP_DMA, &unmap);
|
|
|
|
if (ret) {
|
|
|
|
DEBUG_PRINT("Cannot unmap DMA memory, error %d\n", errno);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pthread_mutex_unlock(&g_vfio.mutex);
|
|
|
|
#endif
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2020-04-07 07:32:40 +00:00
|
|
|
vtophys_init(void)
|
2019-02-15 22:55:05 +00:00
|
|
|
{
|
|
|
|
const struct spdk_mem_map_ops vtophys_map_ops = {
|
2020-05-10 22:57:07 +00:00
|
|
|
.notify_cb = vtophys_notify,
|
2019-08-22 19:44:02 +00:00
|
|
|
.are_contiguous = vtophys_check_contiguous_entries,
|
2019-02-15 22:55:05 +00:00
|
|
|
};
|
|
|
|
|
2020-01-28 17:27:40 +00:00
|
|
|
const struct spdk_mem_map_ops phys_ref_map_ops = {
|
|
|
|
.notify_cb = NULL,
|
|
|
|
.are_contiguous = NULL,
|
|
|
|
};
|
|
|
|
|
2020-05-10 22:57:07 +00:00
|
|
|
#if VFIO_ENABLED
|
|
|
|
vtophys_iommu_init();
|
2019-02-15 22:55:05 +00:00
|
|
|
#endif
|
|
|
|
|
2020-01-28 17:27:40 +00:00
|
|
|
g_phys_ref_map = spdk_mem_map_alloc(0, &phys_ref_map_ops, NULL);
|
|
|
|
if (g_phys_ref_map == NULL) {
|
|
|
|
DEBUG_PRINT("phys_ref map allocation failed.\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2019-02-15 22:55:05 +00:00
|
|
|
g_vtophys_map = spdk_mem_map_alloc(SPDK_VTOPHYS_ERROR, &vtophys_map_ops, NULL);
|
|
|
|
if (g_vtophys_map == NULL) {
|
|
|
|
DEBUG_PRINT("vtophys map allocation failed\n");
|
2021-04-05 17:55:24 +00:00
|
|
|
spdk_mem_map_free(&g_phys_ref_map);
|
2019-10-15 14:36:04 +00:00
|
|
|
return -ENOMEM;
|
2019-02-15 22:55:05 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t
|
2020-10-09 15:50:03 +00:00
|
|
|
spdk_vtophys(const void *buf, uint64_t *size)
|
2019-02-15 22:55:05 +00:00
|
|
|
{
|
|
|
|
uint64_t vaddr, paddr_2mb;
|
|
|
|
|
|
|
|
vaddr = (uint64_t)buf;
|
|
|
|
paddr_2mb = spdk_mem_map_translate(g_vtophys_map, vaddr, size);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* SPDK_VTOPHYS_ERROR has all bits set, so if the lookup returned SPDK_VTOPHYS_ERROR,
|
|
|
|
* we will still bitwise-or it with the buf offset below, but the result will still be
|
|
|
|
* SPDK_VTOPHYS_ERROR. However now that we do + rather than | (due to PCI vtophys being
|
|
|
|
* unaligned) we must now check the return value before addition.
|
|
|
|
*/
|
|
|
|
SPDK_STATIC_ASSERT(SPDK_VTOPHYS_ERROR == UINT64_C(-1), "SPDK_VTOPHYS_ERROR should be all 1s");
|
|
|
|
if (paddr_2mb == SPDK_VTOPHYS_ERROR) {
|
|
|
|
return SPDK_VTOPHYS_ERROR;
|
|
|
|
} else {
|
|
|
|
return paddr_2mb + (vaddr & MASK_2MB);
|
|
|
|
}
|
|
|
|
}
|
2020-09-27 05:46:21 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
spdk_mem_get_fd_and_offset(void *vaddr, uint64_t *offset)
|
|
|
|
{
|
|
|
|
struct rte_memseg *seg;
|
|
|
|
int ret, fd;
|
|
|
|
|
|
|
|
seg = rte_mem_virt2memseg(vaddr, NULL);
|
|
|
|
if (!seg) {
|
|
|
|
SPDK_ERRLOG("memory %p doesn't exist\n", vaddr);
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
fd = rte_memseg_get_fd_thread_unsafe(seg);
|
|
|
|
if (fd < 0) {
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = rte_memseg_get_fd_offset_thread_unsafe(seg, offset);
|
|
|
|
if (ret < 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|