2N/A/*
2N/A * CDDL HEADER START
2N/A *
2N/A * The contents of this file are subject to the terms of the
2N/A * Common Development and Distribution License (the "License").
2N/A * You may not use this file except in compliance with the License.
2N/A *
2N/A * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
2N/A * or http://www.opensolaris.org/os/licensing.
2N/A * See the License for the specific language governing permissions
2N/A * and limitations under the License.
2N/A *
2N/A * When distributing Covered Code, include this CDDL HEADER in each
2N/A * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
2N/A * If applicable, add the following below this CDDL HEADER, with the
2N/A * fields enclosed by brackets "[]" replaced with your own identifying
2N/A * information: Portions Copyright [yyyy] [name of copyright owner]
2N/A *
2N/A * CDDL HEADER END
2N/A */
2N/A
2N/A/*
2N/A * Copyright (c) 2002-2003, Network Appliance, Inc. All rights reserved.
2N/A */
2N/A
2N/A/*
2N/A * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
2N/A * Use is subject to license terms.
2N/A */
2N/A
2N/A
2N/A/*
2N/A *
2N/A * MODULE: dapl_lmr_create.c
2N/A *
2N/A * PURPOSE: Memory management
2N/A * Description: Interfaces in this file are completely described in
2N/A * the DAPL 1.1 API, Chapter 6, section 6
2N/A *
2N/A */
2N/A
2N/A#include <dat/udat.h>
2N/A#include <dapl_lmr_util.h>
2N/A#include <dapl_adapter_util.h>
2N/A#include <libdevinfo.h>
2N/A
2N/A/*
2N/A * Function Prototypes
2N/A */
2N/A
2N/Astatic DAT_RETURN
2N/Adapl_lmr_create_virtual(IN DAPL_IA *ia,
2N/A IN DAT_PVOID virt_addr,
2N/A IN DAT_VLEN length,
2N/A IN DAT_LMR_COOKIE shm_cookie,
2N/A IN DAPL_PZ *pz,
2N/A IN DAT_MEM_PRIV_FLAGS privileges,
2N/A OUT DAT_LMR_HANDLE *lmr_handle,
2N/A OUT DAT_LMR_CONTEXT *lmr_context,
2N/A OUT DAT_RMR_CONTEXT *rmr_context,
2N/A OUT DAT_VLEN *registered_length,
2N/A OUT DAT_VADDR *registered_address);
2N/A
2N/Astatic DAT_RETURN
2N/Adapl_lmr_create_lmr(IN DAPL_IA *ia,
2N/A IN DAPL_LMR *original_lmr,
2N/A IN DAPL_PZ *pz,
2N/A IN DAT_MEM_PRIV_FLAGS privileges,
2N/A OUT DAT_LMR_HANDLE *lmr_handle,
2N/A OUT DAT_LMR_CONTEXT *lmr_context,
2N/A OUT DAT_RMR_CONTEXT *rmr_context,
2N/A OUT DAT_VLEN *registered_length,
2N/A OUT DAT_VADDR *registered_address);
2N/A
2N/A/*
2N/A * Function Definitions
2N/A */
2N/A
2N/Astatic DAT_RETURN
2N/Adapl_lmr_create_virtual(IN DAPL_IA *ia,
2N/A IN DAT_PVOID virt_addr,
2N/A IN DAT_VLEN length,
2N/A IN DAT_LMR_COOKIE shm_cookie,
2N/A IN DAPL_PZ *pz,
2N/A IN DAT_MEM_PRIV_FLAGS privileges,
2N/A OUT DAT_LMR_HANDLE *lmr_handle,
2N/A OUT DAT_LMR_CONTEXT *lmr_context,
2N/A OUT DAT_RMR_CONTEXT *rmr_context,
2N/A OUT DAT_VLEN *registered_length,
2N/A OUT DAT_VADDR *registered_address)
2N/A{
2N/A DAPL_LMR *lmr;
2N/A DAT_REGION_DESCRIPTION reg_desc;
2N/A DAT_RETURN dat_status;
2N/A
2N/A reg_desc.for_va = virt_addr;
2N/A dat_status = DAT_SUCCESS;
2N/A
2N/A lmr = dapl_lmr_alloc(ia, DAT_MEM_TYPE_VIRTUAL,
2N/A reg_desc, length, (DAT_PZ_HANDLE) pz, privileges);
2N/A
2N/A if (NULL == lmr) {
2N/A dat_status = DAT_ERROR(DAT_INSUFFICIENT_RESOURCES,
2N/A DAT_RESOURCE_MEMORY);
2N/A goto bail;
2N/A }
2N/A
2N/A if (shm_cookie == NULL) {
2N/A dat_status = dapls_ib_mr_register(ia, lmr, virt_addr,
2N/A length, privileges);
2N/A } else {
2N/A dat_status = dapls_ib_mr_register_shared(ia, lmr, virt_addr,
2N/A length, shm_cookie, privileges);
2N/A }
2N/A
2N/A if (DAT_SUCCESS != dat_status) {
2N/A dapl_lmr_dealloc(lmr);
2N/A goto bail;
2N/A }
2N/A
2N/A /* if the LMR context is already in the hash table */
2N/A dat_status = dapls_hash_search(ia->hca_ptr->lmr_hash_table,
2N/A lmr->param.lmr_context, NULL);
2N/A if (dat_status == DAT_SUCCESS) {
2N/A (void) dapls_ib_mr_deregister(lmr);
2N/A dapl_lmr_dealloc(lmr);
2N/A
2N/A dat_status = DAT_ERROR(DAT_INVALID_STATE,
2N/A DAT_INVALID_STATE_LMR_IN_USE);
2N/A goto bail;
2N/A }
2N/A
2N/A dat_status = dapls_hash_insert(ia->hca_ptr->lmr_hash_table,
2N/A lmr->param.lmr_context, lmr);
2N/A if (dat_status != DAT_SUCCESS) {
2N/A (void) dapls_ib_mr_deregister(lmr);
2N/A dapl_lmr_dealloc(lmr);
2N/A /*
2N/A * The value returned by dapls_hash_insert(.) is not
2N/A * returned to the consumer because the spec. requires
2N/A * that dat_lmr_create(.) return only certain values.
2N/A */
2N/A dat_status = DAT_ERROR(DAT_INSUFFICIENT_RESOURCES,
2N/A DAT_RESOURCE_MEMORY);
2N/A goto bail;
2N/A }
2N/A
2N/A (void) dapl_os_atomic_inc(&pz->pz_ref_count);
2N/A
2N/A if (NULL != lmr_handle) {
2N/A *lmr_handle = (DAT_LMR_HANDLE) lmr;
2N/A }
2N/A if (NULL != lmr_context) {
2N/A *lmr_context = lmr->param.lmr_context;
2N/A }
2N/A if (NULL != rmr_context) {
2N/A *rmr_context = lmr->param.rmr_context;
2N/A }
2N/A if (NULL != registered_length) {
2N/A *registered_length = lmr->param.registered_size;
2N/A }
2N/A if (NULL != registered_address) {
2N/A *registered_address = lmr->param.registered_address;
2N/A }
2N/A
2N/Abail:
2N/A return (dat_status);
2N/A}
2N/A
2N/A
2N/Astatic DAT_RETURN
2N/Adapl_lmr_create_lmr(IN DAPL_IA *ia,
2N/A IN DAPL_LMR *original_lmr,
2N/A IN DAPL_PZ *pz,
2N/A IN DAT_MEM_PRIV_FLAGS privileges,
2N/A OUT DAT_LMR_HANDLE *lmr_handle,
2N/A OUT DAT_LMR_CONTEXT *lmr_context,
2N/A OUT DAT_RMR_CONTEXT *rmr_context,
2N/A OUT DAT_VLEN *registered_length,
2N/A OUT DAT_VADDR *registered_address)
2N/A{
2N/A DAPL_LMR *lmr;
2N/A DAT_REGION_DESCRIPTION reg_desc;
2N/A DAT_RETURN dat_status;
2N/A
2N/A dapl_dbg_log(DAPL_DBG_TYPE_API,
2N/A "dapl_lmr_create_lmr (%p, %p, %p, %x, %p, %p, %p, %p)\n",
2N/A ia,
2N/A original_lmr,
2N/A pz, privileges,
2N/A lmr_handle,
2N/A lmr_context, registered_length, registered_address);
2N/A
2N/A dat_status = dapls_hash_search(ia->hca_ptr->lmr_hash_table,
2N/A original_lmr->param.lmr_context,
2N/A (DAPL_HASH_DATA *) & lmr);
2N/A if (dat_status != DAT_SUCCESS) {
2N/A dat_status = DAT_ERROR(DAT_INVALID_PARAMETER,
2N/A DAT_INVALID_ARG2);
2N/A goto bail;
2N/A }
2N/A
2N/A reg_desc.for_lmr_handle = (DAT_LMR_HANDLE) original_lmr;
2N/A
2N/A lmr = dapl_lmr_alloc(ia, DAT_MEM_TYPE_LMR, reg_desc, 0,
2N/A (DAT_PZ_HANDLE) pz, privileges);
2N/A
2N/A if (NULL == lmr) {
2N/A dat_status = DAT_ERROR(DAT_INSUFFICIENT_RESOURCES,
2N/A DAT_RESOURCE_MEMORY);
2N/A goto bail;
2N/A }
2N/A
2N/A dat_status = dapls_ib_mr_register_lmr(ia, lmr, privileges);
2N/A
2N/A if (DAT_SUCCESS != dat_status) {
2N/A dapl_lmr_dealloc(lmr);
2N/A goto bail;
2N/A }
2N/A
2N/A /* if the LMR context is already in the hash table */
2N/A dat_status = dapls_hash_search(ia->hca_ptr->lmr_hash_table,
2N/A lmr->param.lmr_context, NULL);
2N/A if (dat_status == DAT_SUCCESS) {
2N/A (void) dapls_ib_mr_deregister(lmr);
2N/A dapl_lmr_dealloc(lmr);
2N/A
2N/A dat_status = DAT_ERROR(DAT_INVALID_STATE,
2N/A DAT_INVALID_STATE_LMR_IN_USE);
2N/A goto bail;
2N/A }
2N/A
2N/A dat_status = dapls_hash_insert(ia->hca_ptr->lmr_hash_table,
2N/A lmr->param.lmr_context, lmr);
2N/A if (dat_status != DAT_SUCCESS) {
2N/A (void) dapls_ib_mr_deregister(lmr);
2N/A dapl_lmr_dealloc(lmr);
2N/A
2N/A /*
2N/A * The value returned by dapls_hash_insert(.) is not
2N/A * returned to the consumer because the spec. requires
2N/A * that dat_lmr_create(.) return only certain values.
2N/A */
2N/A dat_status = DAT_ERROR(DAT_INSUFFICIENT_RESOURCES,
2N/A DAT_RESOURCE_MEMORY);
2N/A goto bail;
2N/A }
2N/A
2N/A (void) dapl_os_atomic_inc(&pz->pz_ref_count);
2N/A
2N/A if (NULL != lmr_handle) {
2N/A *lmr_handle = (DAT_LMR_HANDLE)lmr;
2N/A }
2N/A if (NULL != lmr_context) {
2N/A *lmr_context = lmr->param.lmr_context;
2N/A }
2N/A if (NULL != rmr_context) {
2N/A *rmr_context = lmr->param.rmr_context;
2N/A }
2N/A if (NULL != registered_length) {
2N/A *registered_length = original_lmr->param.registered_size;
2N/A }
2N/A if (NULL != registered_address) {
2N/A *registered_address = original_lmr->param.registered_address;
2N/A }
2N/A
2N/Abail:
2N/A return (dat_status);
2N/A}
2N/A
2N/A
2N/A/*
2N/A * dapl_lmr_create
2N/A *
2N/A * DAPL Requirements Version xxx, 6.6.3.1
2N/A *
2N/A * Register a memory region with an Interface Adaptor.
2N/A *
2N/A * Input:
2N/A * ia_handle
2N/A * mem_type
2N/A * region_description
2N/A * length
2N/A * pz_handle
2N/A * privileges
2N/A *
2N/A * Output:
2N/A * lmr_handle
2N/A * lmr_context
2N/A * registered_length
2N/A * registered_address
2N/A *
2N/A * Returns:
2N/A * DAT_SUCCESS
2N/A * DAT_INSUFFICIENT_RESOURCES
2N/A * DAT_INVALID_PARAMETER
2N/A * DAT_INVALID_STATE
2N/A * DAT_MODEL_NOT_SUPPORTED
2N/A *
2N/A */
2N/ADAT_RETURN
2N/Adapl_lmr_create(IN DAT_IA_HANDLE ia_handle,
2N/A IN DAT_MEM_TYPE mem_type,
2N/A IN DAT_REGION_DESCRIPTION region_description,
2N/A IN DAT_VLEN length,
2N/A IN DAT_PZ_HANDLE pz_handle,
2N/A IN DAT_MEM_PRIV_FLAGS privileges,
2N/A OUT DAT_LMR_HANDLE *lmr_handle,
2N/A OUT DAT_LMR_CONTEXT *lmr_context,
2N/A OUT DAT_RMR_CONTEXT *rmr_context,
2N/A OUT DAT_VLEN *registered_length,
2N/A OUT DAT_VADDR *registered_address)
2N/A{
2N/A DAPL_IA *ia;
2N/A DAPL_PZ *pz;
2N/A
2N/A if (DAPL_BAD_HANDLE(ia_handle, DAPL_MAGIC_IA) ||
2N/A DAPL_BAD_HANDLE(pz_handle, DAPL_MAGIC_PZ)) {
2N/A return (DAT_INVALID_HANDLE);
2N/A }
2N/A
2N/A if (length == 0) {
2N/A return (DAT_ERROR(DAT_INVALID_PARAMETER, DAT_INVALID_ARG4));
2N/A }
2N/A
2N/A ia = (DAPL_IA *) ia_handle;
2N/A pz = (DAPL_PZ *) pz_handle;
2N/A
2N/A /* Always ignore this bit as it is passed in */
2N/A privileges &= ~DAT_MEM_PRIV_RO_DISABLE_FLAG;
2N/A
2N/A /*
2N/A * If at open time we determined that RO should not be used,
2N/A * note it here.
2N/A */
2N/A if (ia->dapl_flags & DAPL_DISABLE_RO)
2N/A privileges |= DAT_MEM_PRIV_RO_DISABLE_FLAG;
2N/A
2N/A switch (mem_type) {
2N/A case DAT_MEM_TYPE_SO_VIRTUAL:
2N/A privileges |= DAT_MEM_PRIV_RO_DISABLE_FLAG;
2N/A /* FALLTHROUGH */
2N/A case DAT_MEM_TYPE_VIRTUAL:
2N/A return (dapl_lmr_create_virtual(ia, region_description.for_va,
2N/A length, NULL, pz, privileges,
2N/A lmr_handle, lmr_context,
2N/A rmr_context, registered_length,
2N/A registered_address));
2N/A /* NOTREACHED */
2N/A case DAT_MEM_TYPE_LMR: {
2N/A DAPL_LMR *lmr;
2N/A
2N/A if (DAPL_BAD_HANDLE
2N/A (region_description.for_lmr_handle, DAPL_MAGIC_LMR)) {
2N/A return (DAT_INVALID_HANDLE);
2N/A }
2N/A
2N/A lmr = (DAPL_LMR *)region_description.for_lmr_handle;
2N/A
2N/A return (dapl_lmr_create_lmr(ia, lmr, pz, privileges, lmr_handle,
2N/A lmr_context, rmr_context,
2N/A registered_length, registered_address));
2N/A /* NOTREACHED */
2N/A }
2N/A case DAT_MEM_TYPE_SHARED_VIRTUAL:
2N/A return (dapl_lmr_create_virtual(ia,
2N/A region_description.
2N/A for_shared_memory.virtual_address,
2N/A length,
2N/A region_description.
2N/A for_shared_memory.shared_memory_id,
2N/A pz, privileges, lmr_handle,
2N/A lmr_context, rmr_context,
2N/A registered_length,
2N/A registered_address));
2N/A /* NOTREACHED */
2N/A default:
2N/A return (DAT_INVALID_PARAMETER);
2N/A }
2N/A}