109938b21SHans Petter Selasky /*-
209938b21SHans Petter Selasky  * SPDX-License-Identifier: BSD-2-Clause OR GPL-2.0
309938b21SHans Petter Selasky  *
4478d3005SHans Petter Selasky  * Copyright (c) 2014 Mellanox Technologies. All rights reserved.
5478d3005SHans Petter Selasky  *
6478d3005SHans Petter Selasky  * This software is available to you under a choice of one of two
7478d3005SHans Petter Selasky  * licenses.  You may choose to be licensed under the terms of the GNU
8478d3005SHans Petter Selasky  * General Public License (GPL) Version 2, available from the file
9478d3005SHans Petter Selasky  * COPYING in the main directory of this source tree, or the
10478d3005SHans Petter Selasky  * OpenIB.org BSD license below:
11478d3005SHans Petter Selasky  *
12478d3005SHans Petter Selasky  *     Redistribution and use in source and binary forms, with or
13478d3005SHans Petter Selasky  *     without modification, are permitted provided that the following
14478d3005SHans Petter Selasky  *     conditions are met:
15478d3005SHans Petter Selasky  *
16478d3005SHans Petter Selasky  *      - Redistributions of source code must retain the above
17478d3005SHans Petter Selasky  *        copyright notice, this list of conditions and the following
18478d3005SHans Petter Selasky  *        disclaimer.
19478d3005SHans Petter Selasky  *
20478d3005SHans Petter Selasky  *      - Redistributions in binary form must reproduce the above
21478d3005SHans Petter Selasky  *        copyright notice, this list of conditions and the following
22478d3005SHans Petter Selasky  *        disclaimer in the documentation and/or other materials
23478d3005SHans Petter Selasky  *        provided with the distribution.
24478d3005SHans Petter Selasky  *
25478d3005SHans Petter Selasky  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
26478d3005SHans Petter Selasky  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
27478d3005SHans Petter Selasky  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
28478d3005SHans Petter Selasky  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
29478d3005SHans Petter Selasky  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
30478d3005SHans Petter Selasky  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
31478d3005SHans Petter Selasky  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
32478d3005SHans Petter Selasky  * SOFTWARE.
33478d3005SHans Petter Selasky  */
34478d3005SHans Petter Selasky 
35cda1e10cSHans Petter Selasky #include <sys/cdefs.h>
36478d3005SHans Petter Selasky #include <linux/types.h>
37478d3005SHans Petter Selasky #include <linux/sched.h>
38478d3005SHans Petter Selasky #include <linux/slab.h>
39478d3005SHans Petter Selasky #include <linux/vmalloc.h>
40478d3005SHans Petter Selasky 
41478d3005SHans Petter Selasky #include <rdma/ib_verbs.h>
42478d3005SHans Petter Selasky #include <rdma/ib_umem.h>
43478d3005SHans Petter Selasky #include <rdma/ib_umem_odp.h>
44478d3005SHans Petter Selasky 
ib_umem_notifier_start_account(struct ib_umem * item)45478d3005SHans Petter Selasky static void ib_umem_notifier_start_account(struct ib_umem *item)
46478d3005SHans Petter Selasky {
47478d3005SHans Petter Selasky 	mutex_lock(&item->odp_data->umem_mutex);
48478d3005SHans Petter Selasky 
49478d3005SHans Petter Selasky 	/* Only update private counters for this umem if it has them.
50478d3005SHans Petter Selasky 	 * Otherwise skip it. All page faults will be delayed for this umem. */
51478d3005SHans Petter Selasky 	if (item->odp_data->mn_counters_active) {
52478d3005SHans Petter Selasky 		int notifiers_count = item->odp_data->notifiers_count++;
53478d3005SHans Petter Selasky 
54478d3005SHans Petter Selasky 		if (notifiers_count == 0)
55478d3005SHans Petter Selasky 			/* Initialize the completion object for waiting on
56478d3005SHans Petter Selasky 			 * notifiers. Since notifier_count is zero, no one
57478d3005SHans Petter Selasky 			 * should be waiting right now. */
58478d3005SHans Petter Selasky 			reinit_completion(&item->odp_data->notifier_completion);
59478d3005SHans Petter Selasky 	}
60478d3005SHans Petter Selasky 	mutex_unlock(&item->odp_data->umem_mutex);
61478d3005SHans Petter Selasky }
62478d3005SHans Petter Selasky 
ib_umem_notifier_end_account(struct ib_umem * item)63478d3005SHans Petter Selasky static void ib_umem_notifier_end_account(struct ib_umem *item)
64478d3005SHans Petter Selasky {
65478d3005SHans Petter Selasky 	mutex_lock(&item->odp_data->umem_mutex);
66478d3005SHans Petter Selasky 
67478d3005SHans Petter Selasky 	/* Only update private counters for this umem if it has them.
68478d3005SHans Petter Selasky 	 * Otherwise skip it. All page faults will be delayed for this umem. */
69478d3005SHans Petter Selasky 	if (item->odp_data->mn_counters_active) {
70478d3005SHans Petter Selasky 		/*
71478d3005SHans Petter Selasky 		 * This sequence increase will notify the QP page fault that
72478d3005SHans Petter Selasky 		 * the page that is going to be mapped in the spte could have
73478d3005SHans Petter Selasky 		 * been freed.
74478d3005SHans Petter Selasky 		 */
75478d3005SHans Petter Selasky 		++item->odp_data->notifiers_seq;
76478d3005SHans Petter Selasky 		if (--item->odp_data->notifiers_count == 0)
77478d3005SHans Petter Selasky 			complete_all(&item->odp_data->notifier_completion);
78478d3005SHans Petter Selasky 	}
79478d3005SHans Petter Selasky 	mutex_unlock(&item->odp_data->umem_mutex);
80478d3005SHans Petter Selasky }
81478d3005SHans Petter Selasky 
82478d3005SHans Petter Selasky /* Account for a new mmu notifier in an ib_ucontext. */
ib_ucontext_notifier_start_account(struct ib_ucontext * context)83478d3005SHans Petter Selasky static void ib_ucontext_notifier_start_account(struct ib_ucontext *context)
84478d3005SHans Petter Selasky {
85478d3005SHans Petter Selasky 	atomic_inc(&context->notifier_count);
86478d3005SHans Petter Selasky }
87478d3005SHans Petter Selasky 
88478d3005SHans Petter Selasky /* Account for a terminating mmu notifier in an ib_ucontext.
89478d3005SHans Petter Selasky  *
90478d3005SHans Petter Selasky  * Must be called with the ib_ucontext->umem_rwsem semaphore unlocked, since
91478d3005SHans Petter Selasky  * the function takes the semaphore itself. */
ib_ucontext_notifier_end_account(struct ib_ucontext * context)92478d3005SHans Petter Selasky static void ib_ucontext_notifier_end_account(struct ib_ucontext *context)
93478d3005SHans Petter Selasky {
94478d3005SHans Petter Selasky 	int zero_notifiers = atomic_dec_and_test(&context->notifier_count);
95478d3005SHans Petter Selasky 
96478d3005SHans Petter Selasky 	if (zero_notifiers &&
97478d3005SHans Petter Selasky 	    !list_empty(&context->no_private_counters)) {
98478d3005SHans Petter Selasky 		/* No currently running mmu notifiers. Now is the chance to
99478d3005SHans Petter Selasky 		 * add private accounting to all previously added umems. */
100478d3005SHans Petter Selasky 		struct ib_umem_odp *odp_data, *next;
101478d3005SHans Petter Selasky 
102478d3005SHans Petter Selasky 		/* Prevent concurrent mmu notifiers from working on the
103478d3005SHans Petter Selasky 		 * no_private_counters list. */
104478d3005SHans Petter Selasky 		down_write(&context->umem_rwsem);
105478d3005SHans Petter Selasky 
106478d3005SHans Petter Selasky 		/* Read the notifier_count again, with the umem_rwsem
107478d3005SHans Petter Selasky 		 * semaphore taken for write. */
108478d3005SHans Petter Selasky 		if (!atomic_read(&context->notifier_count)) {
109478d3005SHans Petter Selasky 			list_for_each_entry_safe(odp_data, next,
110478d3005SHans Petter Selasky 						 &context->no_private_counters,
111478d3005SHans Petter Selasky 						 no_private_counters) {
112478d3005SHans Petter Selasky 				mutex_lock(&odp_data->umem_mutex);
113478d3005SHans Petter Selasky 				odp_data->mn_counters_active = true;
114478d3005SHans Petter Selasky 				list_del(&odp_data->no_private_counters);
115478d3005SHans Petter Selasky 				complete_all(&odp_data->notifier_completion);
116478d3005SHans Petter Selasky 				mutex_unlock(&odp_data->umem_mutex);
117478d3005SHans Petter Selasky 			}
118478d3005SHans Petter Selasky 		}
119478d3005SHans Petter Selasky 
120478d3005SHans Petter Selasky 		up_write(&context->umem_rwsem);
121478d3005SHans Petter Selasky 	}
122478d3005SHans Petter Selasky }
123478d3005SHans Petter Selasky 
ib_umem_notifier_release_trampoline(struct ib_umem * item,u64 start,u64 end,void * cookie)124478d3005SHans Petter Selasky static int ib_umem_notifier_release_trampoline(struct ib_umem *item, u64 start,
125478d3005SHans Petter Selasky 					       u64 end, void *cookie) {
126478d3005SHans Petter Selasky 	/*
127478d3005SHans Petter Selasky 	 * Increase the number of notifiers running, to
128478d3005SHans Petter Selasky 	 * prevent any further fault handling on this MR.
129478d3005SHans Petter Selasky 	 */
130478d3005SHans Petter Selasky 	ib_umem_notifier_start_account(item);
131478d3005SHans Petter Selasky 	item->odp_data->dying = 1;
132478d3005SHans Petter Selasky 	/* Make sure that the fact the umem is dying is out before we release
133478d3005SHans Petter Selasky 	 * all pending page faults. */
134478d3005SHans Petter Selasky 	smp_wmb();
135478d3005SHans Petter Selasky 	complete_all(&item->odp_data->notifier_completion);
136478d3005SHans Petter Selasky 	item->context->invalidate_range(item, ib_umem_start(item),
137478d3005SHans Petter Selasky 					ib_umem_end(item));
138478d3005SHans Petter Selasky 	return 0;
139478d3005SHans Petter Selasky }
140478d3005SHans Petter Selasky 
ib_umem_notifier_release(struct mmu_notifier * mn,struct mm_struct * mm)141478d3005SHans Petter Selasky static void ib_umem_notifier_release(struct mmu_notifier *mn,
142478d3005SHans Petter Selasky 				     struct mm_struct *mm)
143478d3005SHans Petter Selasky {
144478d3005SHans Petter Selasky 	struct ib_ucontext *context = container_of(mn, struct ib_ucontext, mn);
145478d3005SHans Petter Selasky 
146478d3005SHans Petter Selasky 	if (!context->invalidate_range)
147478d3005SHans Petter Selasky 		return;
148478d3005SHans Petter Selasky 
149478d3005SHans Petter Selasky 	ib_ucontext_notifier_start_account(context);
150478d3005SHans Petter Selasky 	down_read(&context->umem_rwsem);
151478d3005SHans Petter Selasky 	rbt_ib_umem_for_each_in_range(&context->umem_tree, 0,
152478d3005SHans Petter Selasky 				      ULLONG_MAX,
153478d3005SHans Petter Selasky 				      ib_umem_notifier_release_trampoline,
154478d3005SHans Petter Selasky 				      NULL);
155478d3005SHans Petter Selasky 	up_read(&context->umem_rwsem);
156478d3005SHans Petter Selasky }
157478d3005SHans Petter Selasky 
invalidate_page_trampoline(struct ib_umem * item,u64 start,u64 end,void * cookie)158478d3005SHans Petter Selasky static int invalidate_page_trampoline(struct ib_umem *item, u64 start,
159478d3005SHans Petter Selasky 				      u64 end, void *cookie)
160478d3005SHans Petter Selasky {
161478d3005SHans Petter Selasky 	ib_umem_notifier_start_account(item);
162478d3005SHans Petter Selasky 	item->context->invalidate_range(item, start, start + PAGE_SIZE);
163478d3005SHans Petter Selasky 	ib_umem_notifier_end_account(item);
164478d3005SHans Petter Selasky 	return 0;
165478d3005SHans Petter Selasky }
166478d3005SHans Petter Selasky 
ib_umem_notifier_invalidate_page(struct mmu_notifier * mn,struct mm_struct * mm,unsigned long address)167478d3005SHans Petter Selasky static void ib_umem_notifier_invalidate_page(struct mmu_notifier *mn,
168478d3005SHans Petter Selasky 					     struct mm_struct *mm,
169478d3005SHans Petter Selasky 					     unsigned long address)
170478d3005SHans Petter Selasky {
171478d3005SHans Petter Selasky 	struct ib_ucontext *context = container_of(mn, struct ib_ucontext, mn);
172478d3005SHans Petter Selasky 
173478d3005SHans Petter Selasky 	if (!context->invalidate_range)
174478d3005SHans Petter Selasky 		return;
175478d3005SHans Petter Selasky 
176478d3005SHans Petter Selasky 	ib_ucontext_notifier_start_account(context);
177478d3005SHans Petter Selasky 	down_read(&context->umem_rwsem);
178478d3005SHans Petter Selasky 	rbt_ib_umem_for_each_in_range(&context->umem_tree, address,
179478d3005SHans Petter Selasky 				      address + PAGE_SIZE,
180478d3005SHans Petter Selasky 				      invalidate_page_trampoline, NULL);
181478d3005SHans Petter Selasky 	up_read(&context->umem_rwsem);
182478d3005SHans Petter Selasky 	ib_ucontext_notifier_end_account(context);
183478d3005SHans Petter Selasky }
184478d3005SHans Petter Selasky 
invalidate_range_start_trampoline(struct ib_umem * item,u64 start,u64 end,void * cookie)185478d3005SHans Petter Selasky static int invalidate_range_start_trampoline(struct ib_umem *item, u64 start,
186478d3005SHans Petter Selasky 					     u64 end, void *cookie)
187478d3005SHans Petter Selasky {
188478d3005SHans Petter Selasky 	ib_umem_notifier_start_account(item);
189478d3005SHans Petter Selasky 	item->context->invalidate_range(item, start, end);
190478d3005SHans Petter Selasky 	return 0;
191478d3005SHans Petter Selasky }
192478d3005SHans Petter Selasky 
ib_umem_notifier_invalidate_range_start(struct mmu_notifier * mn,struct mm_struct * mm,unsigned long start,unsigned long end)193478d3005SHans Petter Selasky static void ib_umem_notifier_invalidate_range_start(struct mmu_notifier *mn,
194478d3005SHans Petter Selasky 						    struct mm_struct *mm,
195478d3005SHans Petter Selasky 						    unsigned long start,
196478d3005SHans Petter Selasky 						    unsigned long end)
197478d3005SHans Petter Selasky {
198478d3005SHans Petter Selasky 	struct ib_ucontext *context = container_of(mn, struct ib_ucontext, mn);
199478d3005SHans Petter Selasky 
200478d3005SHans Petter Selasky 	if (!context->invalidate_range)
201478d3005SHans Petter Selasky 		return;
202478d3005SHans Petter Selasky 
203478d3005SHans Petter Selasky 	ib_ucontext_notifier_start_account(context);
204478d3005SHans Petter Selasky 	down_read(&context->umem_rwsem);
205478d3005SHans Petter Selasky 	rbt_ib_umem_for_each_in_range(&context->umem_tree, start,
206478d3005SHans Petter Selasky 				      end,
207478d3005SHans Petter Selasky 				      invalidate_range_start_trampoline, NULL);
208478d3005SHans Petter Selasky 	up_read(&context->umem_rwsem);
209478d3005SHans Petter Selasky }
210478d3005SHans Petter Selasky 
invalidate_range_end_trampoline(struct ib_umem * item,u64 start,u64 end,void * cookie)211478d3005SHans Petter Selasky static int invalidate_range_end_trampoline(struct ib_umem *item, u64 start,
212478d3005SHans Petter Selasky 					   u64 end, void *cookie)
213478d3005SHans Petter Selasky {
214478d3005SHans Petter Selasky 	ib_umem_notifier_end_account(item);
215478d3005SHans Petter Selasky 	return 0;
216478d3005SHans Petter Selasky }
217478d3005SHans Petter Selasky 
ib_umem_notifier_invalidate_range_end(struct mmu_notifier * mn,struct mm_struct * mm,unsigned long start,unsigned long end)218478d3005SHans Petter Selasky static void ib_umem_notifier_invalidate_range_end(struct mmu_notifier *mn,
219478d3005SHans Petter Selasky 						  struct mm_struct *mm,
220478d3005SHans Petter Selasky 						  unsigned long start,
221478d3005SHans Petter Selasky 						  unsigned long end)
222478d3005SHans Petter Selasky {
223478d3005SHans Petter Selasky 	struct ib_ucontext *context = container_of(mn, struct ib_ucontext, mn);
224478d3005SHans Petter Selasky 
225478d3005SHans Petter Selasky 	if (!context->invalidate_range)
226478d3005SHans Petter Selasky 		return;
227478d3005SHans Petter Selasky 
228478d3005SHans Petter Selasky 	down_read(&context->umem_rwsem);
229478d3005SHans Petter Selasky 	rbt_ib_umem_for_each_in_range(&context->umem_tree, start,
230478d3005SHans Petter Selasky 				      end,
231478d3005SHans Petter Selasky 				      invalidate_range_end_trampoline, NULL);
232478d3005SHans Petter Selasky 	up_read(&context->umem_rwsem);
233478d3005SHans Petter Selasky 	ib_ucontext_notifier_end_account(context);
234478d3005SHans Petter Selasky }
235478d3005SHans Petter Selasky 
236478d3005SHans Petter Selasky static const struct mmu_notifier_ops ib_umem_notifiers = {
237478d3005SHans Petter Selasky 	.release                    = ib_umem_notifier_release,
238478d3005SHans Petter Selasky 	.invalidate_page            = ib_umem_notifier_invalidate_page,
239478d3005SHans Petter Selasky 	.invalidate_range_start     = ib_umem_notifier_invalidate_range_start,
240478d3005SHans Petter Selasky 	.invalidate_range_end       = ib_umem_notifier_invalidate_range_end,
241478d3005SHans Petter Selasky };
242478d3005SHans Petter Selasky 
ib_umem_odp_get(struct ib_ucontext * context,struct ib_umem * umem)243478d3005SHans Petter Selasky int ib_umem_odp_get(struct ib_ucontext *context, struct ib_umem *umem)
244478d3005SHans Petter Selasky {
245478d3005SHans Petter Selasky 	int ret_val;
246478d3005SHans Petter Selasky 	pid_t our_pid;
247478d3005SHans Petter Selasky 	struct mm_struct *mm = get_task_mm(current);
248478d3005SHans Petter Selasky 
249478d3005SHans Petter Selasky 	if (!mm)
250478d3005SHans Petter Selasky 		return -EINVAL;
251478d3005SHans Petter Selasky 
252478d3005SHans Petter Selasky 	/* Prevent creating ODP MRs in child processes */
253478d3005SHans Petter Selasky 	rcu_read_lock();
254478d3005SHans Petter Selasky 	our_pid = get_pid(task_pid_group_leader(current));
255478d3005SHans Petter Selasky 	rcu_read_unlock();
256478d3005SHans Petter Selasky 	put_pid(our_pid);
257478d3005SHans Petter Selasky 	if (context->tgid != our_pid) {
258478d3005SHans Petter Selasky 		ret_val = -EINVAL;
259478d3005SHans Petter Selasky 		goto out_mm;
260478d3005SHans Petter Selasky 	}
261478d3005SHans Petter Selasky 
262478d3005SHans Petter Selasky 	umem->odp_data = kzalloc(sizeof(*umem->odp_data), GFP_KERNEL);
263478d3005SHans Petter Selasky 	if (!umem->odp_data) {
264478d3005SHans Petter Selasky 		ret_val = -ENOMEM;
265478d3005SHans Petter Selasky 		goto out_mm;
266478d3005SHans Petter Selasky 	}
267478d3005SHans Petter Selasky 	umem->odp_data->umem = umem;
268478d3005SHans Petter Selasky 
269478d3005SHans Petter Selasky 	mutex_init(&umem->odp_data->umem_mutex);
270478d3005SHans Petter Selasky 
271478d3005SHans Petter Selasky 	init_completion(&umem->odp_data->notifier_completion);
272478d3005SHans Petter Selasky 
273478d3005SHans Petter Selasky 	umem->odp_data->page_list = vzalloc(ib_umem_num_pages(umem) *
274478d3005SHans Petter Selasky 					    sizeof(*umem->odp_data->page_list));
275478d3005SHans Petter Selasky 	if (!umem->odp_data->page_list) {
276478d3005SHans Petter Selasky 		ret_val = -ENOMEM;
277478d3005SHans Petter Selasky 		goto out_odp_data;
278478d3005SHans Petter Selasky 	}
279478d3005SHans Petter Selasky 
280478d3005SHans Petter Selasky 	umem->odp_data->dma_list = vzalloc(ib_umem_num_pages(umem) *
281478d3005SHans Petter Selasky 					  sizeof(*umem->odp_data->dma_list));
282478d3005SHans Petter Selasky 	if (!umem->odp_data->dma_list) {
283478d3005SHans Petter Selasky 		ret_val = -ENOMEM;
284478d3005SHans Petter Selasky 		goto out_page_list;
285478d3005SHans Petter Selasky 	}
286478d3005SHans Petter Selasky 
287478d3005SHans Petter Selasky 	/*
288478d3005SHans Petter Selasky 	 * When using MMU notifiers, we will get a
289478d3005SHans Petter Selasky 	 * notification before the "current" task (and MM) is
290478d3005SHans Petter Selasky 	 * destroyed. We use the umem_rwsem semaphore to synchronize.
291478d3005SHans Petter Selasky 	 */
292478d3005SHans Petter Selasky 	down_write(&context->umem_rwsem);
293478d3005SHans Petter Selasky 	context->odp_mrs_count++;
294478d3005SHans Petter Selasky 	if (likely(ib_umem_start(umem) != ib_umem_end(umem)))
295478d3005SHans Petter Selasky 		rbt_ib_umem_insert(&umem->odp_data->interval_tree,
296478d3005SHans Petter Selasky 				   &context->umem_tree);
297478d3005SHans Petter Selasky 	if (likely(!atomic_read(&context->notifier_count)) ||
298478d3005SHans Petter Selasky 	    context->odp_mrs_count == 1)
299478d3005SHans Petter Selasky 		umem->odp_data->mn_counters_active = true;
300478d3005SHans Petter Selasky 	else
301478d3005SHans Petter Selasky 		list_add(&umem->odp_data->no_private_counters,
302478d3005SHans Petter Selasky 			 &context->no_private_counters);
303478d3005SHans Petter Selasky 	downgrade_write(&context->umem_rwsem);
304478d3005SHans Petter Selasky 
305478d3005SHans Petter Selasky 	if (context->odp_mrs_count == 1) {
306478d3005SHans Petter Selasky 		/*
307478d3005SHans Petter Selasky 		 * Note that at this point, no MMU notifier is running
308478d3005SHans Petter Selasky 		 * for this context!
309478d3005SHans Petter Selasky 		 */
310478d3005SHans Petter Selasky 		atomic_set(&context->notifier_count, 0);
311478d3005SHans Petter Selasky 		INIT_HLIST_NODE(&context->mn.hlist);
312478d3005SHans Petter Selasky 		context->mn.ops = &ib_umem_notifiers;
313478d3005SHans Petter Selasky 		/*
314478d3005SHans Petter Selasky 		 * Lock-dep detects a false positive for mmap_sem vs.
315478d3005SHans Petter Selasky 		 * umem_rwsem, due to not grasping downgrade_write correctly.
316478d3005SHans Petter Selasky 		 */
317478d3005SHans Petter Selasky 		ret_val = mmu_notifier_register(&context->mn, mm);
318478d3005SHans Petter Selasky 		if (ret_val) {
319478d3005SHans Petter Selasky 			pr_err("Failed to register mmu_notifier %d\n", ret_val);
320478d3005SHans Petter Selasky 			ret_val = -EBUSY;
321478d3005SHans Petter Selasky 			goto out_mutex;
322478d3005SHans Petter Selasky 		}
323478d3005SHans Petter Selasky 	}
324478d3005SHans Petter Selasky 
325478d3005SHans Petter Selasky 	up_read(&context->umem_rwsem);
326478d3005SHans Petter Selasky 
327478d3005SHans Petter Selasky 	/*
328478d3005SHans Petter Selasky 	 * Note that doing an mmput can cause a notifier for the relevant mm.
329478d3005SHans Petter Selasky 	 * If the notifier is called while we hold the umem_rwsem, this will
330478d3005SHans Petter Selasky 	 * cause a deadlock. Therefore, we release the reference only after we
331478d3005SHans Petter Selasky 	 * released the semaphore.
332478d3005SHans Petter Selasky 	 */
333478d3005SHans Petter Selasky 	mmput(mm);
334478d3005SHans Petter Selasky 	return 0;
335478d3005SHans Petter Selasky 
336478d3005SHans Petter Selasky out_mutex:
337478d3005SHans Petter Selasky 	up_read(&context->umem_rwsem);
338478d3005SHans Petter Selasky 	vfree(umem->odp_data->dma_list);
339478d3005SHans Petter Selasky out_page_list:
340478d3005SHans Petter Selasky 	vfree(umem->odp_data->page_list);
341478d3005SHans Petter Selasky out_odp_data:
342478d3005SHans Petter Selasky 	kfree(umem->odp_data);
343478d3005SHans Petter Selasky out_mm:
344478d3005SHans Petter Selasky 	mmput(mm);
345478d3005SHans Petter Selasky 	return ret_val;
346478d3005SHans Petter Selasky }
347478d3005SHans Petter Selasky 
ib_umem_odp_release(struct ib_umem * umem)348478d3005SHans Petter Selasky void ib_umem_odp_release(struct ib_umem *umem)
349478d3005SHans Petter Selasky {
350478d3005SHans Petter Selasky 	struct ib_ucontext *context = umem->context;
351478d3005SHans Petter Selasky 
352478d3005SHans Petter Selasky 	/*
353478d3005SHans Petter Selasky 	 * Ensure that no more pages are mapped in the umem.
354478d3005SHans Petter Selasky 	 *
355478d3005SHans Petter Selasky 	 * It is the driver's responsibility to ensure, before calling us,
356478d3005SHans Petter Selasky 	 * that the hardware will not attempt to access the MR any more.
357478d3005SHans Petter Selasky 	 */
358478d3005SHans Petter Selasky 	ib_umem_odp_unmap_dma_pages(umem, ib_umem_start(umem),
359478d3005SHans Petter Selasky 				    ib_umem_end(umem));
360478d3005SHans Petter Selasky 
361478d3005SHans Petter Selasky 	down_write(&context->umem_rwsem);
362478d3005SHans Petter Selasky 	if (likely(ib_umem_start(umem) != ib_umem_end(umem)))
363478d3005SHans Petter Selasky 		rbt_ib_umem_remove(&umem->odp_data->interval_tree,
364478d3005SHans Petter Selasky 				   &context->umem_tree);
365478d3005SHans Petter Selasky 	context->odp_mrs_count--;
366478d3005SHans Petter Selasky 	if (!umem->odp_data->mn_counters_active) {
367478d3005SHans Petter Selasky 		list_del(&umem->odp_data->no_private_counters);
368478d3005SHans Petter Selasky 		complete_all(&umem->odp_data->notifier_completion);
369478d3005SHans Petter Selasky 	}
370478d3005SHans Petter Selasky 
371478d3005SHans Petter Selasky 	/*
372478d3005SHans Petter Selasky 	 * Downgrade the lock to a read lock. This ensures that the notifiers
373478d3005SHans Petter Selasky 	 * (who lock the mutex for reading) will be able to finish, and we
374478d3005SHans Petter Selasky 	 * will be able to enventually obtain the mmu notifiers SRCU. Note
375478d3005SHans Petter Selasky 	 * that since we are doing it atomically, no other user could register
376478d3005SHans Petter Selasky 	 * and unregister while we do the check.
377478d3005SHans Petter Selasky 	 */
378478d3005SHans Petter Selasky 	downgrade_write(&context->umem_rwsem);
379478d3005SHans Petter Selasky 	if (!context->odp_mrs_count) {
380478d3005SHans Petter Selasky 		struct task_struct *owning_process = NULL;
381478d3005SHans Petter Selasky 		struct mm_struct *owning_mm        = NULL;
382478d3005SHans Petter Selasky 
383478d3005SHans Petter Selasky 		owning_process = get_pid_task(context->tgid,
384478d3005SHans Petter Selasky 					      PIDTYPE_PID);
385478d3005SHans Petter Selasky 		if (owning_process == NULL)
386478d3005SHans Petter Selasky 			/*
387478d3005SHans Petter Selasky 			 * The process is already dead, notifier were removed
388478d3005SHans Petter Selasky 			 * already.
389478d3005SHans Petter Selasky 			 */
390478d3005SHans Petter Selasky 			goto out;
391478d3005SHans Petter Selasky 
392478d3005SHans Petter Selasky 		owning_mm = get_task_mm(owning_process);
393478d3005SHans Petter Selasky 		if (owning_mm == NULL)
394478d3005SHans Petter Selasky 			/*
395478d3005SHans Petter Selasky 			 * The process' mm is already dead, notifier were
396478d3005SHans Petter Selasky 			 * removed already.
397478d3005SHans Petter Selasky 			 */
398478d3005SHans Petter Selasky 			goto out_put_task;
399478d3005SHans Petter Selasky 		mmu_notifier_unregister(&context->mn, owning_mm);
400478d3005SHans Petter Selasky 
401478d3005SHans Petter Selasky 		mmput(owning_mm);
402478d3005SHans Petter Selasky 
403478d3005SHans Petter Selasky out_put_task:
404478d3005SHans Petter Selasky 		put_task_struct(owning_process);
405478d3005SHans Petter Selasky 	}
406478d3005SHans Petter Selasky out:
407478d3005SHans Petter Selasky 	up_read(&context->umem_rwsem);
408478d3005SHans Petter Selasky 
409478d3005SHans Petter Selasky 	vfree(umem->odp_data->dma_list);
410478d3005SHans Petter Selasky 	vfree(umem->odp_data->page_list);
411478d3005SHans Petter Selasky 	kfree(umem->odp_data);
412478d3005SHans Petter Selasky 	kfree(umem);
413478d3005SHans Petter Selasky }
414478d3005SHans Petter Selasky 
415478d3005SHans Petter Selasky /*
416478d3005SHans Petter Selasky  * Map for DMA and insert a single page into the on-demand paging page tables.
417478d3005SHans Petter Selasky  *
418478d3005SHans Petter Selasky  * @umem: the umem to insert the page to.
419478d3005SHans Petter Selasky  * @page_index: index in the umem to add the page to.
420478d3005SHans Petter Selasky  * @page: the page struct to map and add.
421478d3005SHans Petter Selasky  * @access_mask: access permissions needed for this page.
422478d3005SHans Petter Selasky  * @current_seq: sequence number for synchronization with invalidations.
423478d3005SHans Petter Selasky  *               the sequence number is taken from
424478d3005SHans Petter Selasky  *               umem->odp_data->notifiers_seq.
425478d3005SHans Petter Selasky  *
426478d3005SHans Petter Selasky  * The function returns -EFAULT if the DMA mapping operation fails. It returns
427478d3005SHans Petter Selasky  * -EAGAIN if a concurrent invalidation prevents us from updating the page.
428478d3005SHans Petter Selasky  *
429478d3005SHans Petter Selasky  * The page is released via put_page even if the operation failed. For
430478d3005SHans Petter Selasky  * on-demand pinning, the page is released whenever it isn't stored in the
431478d3005SHans Petter Selasky  * umem.
432478d3005SHans Petter Selasky  */
ib_umem_odp_map_dma_single_page(struct ib_umem * umem,int page_index,u64 base_virt_addr,struct page * page,u64 access_mask,unsigned long current_seq)433478d3005SHans Petter Selasky static int ib_umem_odp_map_dma_single_page(
434478d3005SHans Petter Selasky 		struct ib_umem *umem,
435478d3005SHans Petter Selasky 		int page_index,
436478d3005SHans Petter Selasky 		u64 base_virt_addr,
437478d3005SHans Petter Selasky 		struct page *page,
438478d3005SHans Petter Selasky 		u64 access_mask,
439478d3005SHans Petter Selasky 		unsigned long current_seq)
440478d3005SHans Petter Selasky {
441478d3005SHans Petter Selasky 	struct ib_device *dev = umem->context->device;
442478d3005SHans Petter Selasky 	dma_addr_t dma_addr;
443478d3005SHans Petter Selasky 	int stored_page = 0;
444478d3005SHans Petter Selasky 	int remove_existing_mapping = 0;
445478d3005SHans Petter Selasky 	int ret = 0;
446478d3005SHans Petter Selasky 
447478d3005SHans Petter Selasky 	/*
448478d3005SHans Petter Selasky 	 * Note: we avoid writing if seq is different from the initial seq, to
449478d3005SHans Petter Selasky 	 * handle case of a racing notifier. This check also allows us to bail
450478d3005SHans Petter Selasky 	 * early if we have a notifier running in parallel with us.
451478d3005SHans Petter Selasky 	 */
452478d3005SHans Petter Selasky 	if (ib_umem_mmu_notifier_retry(umem, current_seq)) {
453478d3005SHans Petter Selasky 		ret = -EAGAIN;
454478d3005SHans Petter Selasky 		goto out;
455478d3005SHans Petter Selasky 	}
456478d3005SHans Petter Selasky 	if (!(umem->odp_data->dma_list[page_index])) {
457478d3005SHans Petter Selasky 		dma_addr = ib_dma_map_page(dev,
458478d3005SHans Petter Selasky 					   page,
459478d3005SHans Petter Selasky 					   0, PAGE_SIZE,
460478d3005SHans Petter Selasky 					   DMA_BIDIRECTIONAL);
461478d3005SHans Petter Selasky 		if (ib_dma_mapping_error(dev, dma_addr)) {
462478d3005SHans Petter Selasky 			ret = -EFAULT;
463478d3005SHans Petter Selasky 			goto out;
464478d3005SHans Petter Selasky 		}
465478d3005SHans Petter Selasky 		umem->odp_data->dma_list[page_index] = dma_addr | access_mask;
466478d3005SHans Petter Selasky 		umem->odp_data->page_list[page_index] = page;
467478d3005SHans Petter Selasky 		stored_page = 1;
468478d3005SHans Petter Selasky 	} else if (umem->odp_data->page_list[page_index] == page) {
469478d3005SHans Petter Selasky 		umem->odp_data->dma_list[page_index] |= access_mask;
470478d3005SHans Petter Selasky 	} else {
471478d3005SHans Petter Selasky 		pr_err("error: got different pages in IB device and from get_user_pages. IB device page: %p, gup page: %p\n",
472478d3005SHans Petter Selasky 		       umem->odp_data->page_list[page_index], page);
473478d3005SHans Petter Selasky 		/* Better remove the mapping now, to prevent any further
474478d3005SHans Petter Selasky 		 * damage. */
475478d3005SHans Petter Selasky 		remove_existing_mapping = 1;
476478d3005SHans Petter Selasky 	}
477478d3005SHans Petter Selasky 
478478d3005SHans Petter Selasky out:
479478d3005SHans Petter Selasky 	/* On Demand Paging - avoid pinning the page */
480478d3005SHans Petter Selasky 	if (umem->context->invalidate_range || !stored_page)
481478d3005SHans Petter Selasky 		put_page(page);
482478d3005SHans Petter Selasky 
483478d3005SHans Petter Selasky 	if (remove_existing_mapping && umem->context->invalidate_range) {
484478d3005SHans Petter Selasky 		invalidate_page_trampoline(
485478d3005SHans Petter Selasky 			umem,
486478d3005SHans Petter Selasky 			base_virt_addr + (page_index * PAGE_SIZE),
487478d3005SHans Petter Selasky 			base_virt_addr + ((page_index+1)*PAGE_SIZE),
488478d3005SHans Petter Selasky 			NULL);
489478d3005SHans Petter Selasky 		ret = -EAGAIN;
490478d3005SHans Petter Selasky 	}
491478d3005SHans Petter Selasky 
492478d3005SHans Petter Selasky 	return ret;
493478d3005SHans Petter Selasky }
494478d3005SHans Petter Selasky 
495478d3005SHans Petter Selasky /**
496478d3005SHans Petter Selasky  * ib_umem_odp_map_dma_pages - Pin and DMA map userspace memory in an ODP MR.
497478d3005SHans Petter Selasky  *
498478d3005SHans Petter Selasky  * Pins the range of pages passed in the argument, and maps them to
499478d3005SHans Petter Selasky  * DMA addresses. The DMA addresses of the mapped pages is updated in
500478d3005SHans Petter Selasky  * umem->odp_data->dma_list.
501478d3005SHans Petter Selasky  *
502478d3005SHans Petter Selasky  * Returns the number of pages mapped in success, negative error code
503478d3005SHans Petter Selasky  * for failure.
504478d3005SHans Petter Selasky  * An -EAGAIN error code is returned when a concurrent mmu notifier prevents
505478d3005SHans Petter Selasky  * the function from completing its task.
506478d3005SHans Petter Selasky  *
507478d3005SHans Petter Selasky  * @umem: the umem to map and pin
508478d3005SHans Petter Selasky  * @user_virt: the address from which we need to map.
509478d3005SHans Petter Selasky  * @bcnt: the minimal number of bytes to pin and map. The mapping might be
510478d3005SHans Petter Selasky  *        bigger due to alignment, and may also be smaller in case of an error
511478d3005SHans Petter Selasky  *        pinning or mapping a page. The actual pages mapped is returned in
512478d3005SHans Petter Selasky  *        the return value.
513478d3005SHans Petter Selasky  * @access_mask: bit mask of the requested access permissions for the given
514478d3005SHans Petter Selasky  *               range.
515478d3005SHans Petter Selasky  * @current_seq: the MMU notifiers sequance value for synchronization with
516478d3005SHans Petter Selasky  *               invalidations. the sequance number is read from
517478d3005SHans Petter Selasky  *               umem->odp_data->notifiers_seq before calling this function
518478d3005SHans Petter Selasky  */
ib_umem_odp_map_dma_pages(struct ib_umem * umem,u64 user_virt,u64 bcnt,u64 access_mask,unsigned long current_seq)519478d3005SHans Petter Selasky int ib_umem_odp_map_dma_pages(struct ib_umem *umem, u64 user_virt, u64 bcnt,
520478d3005SHans Petter Selasky 			      u64 access_mask, unsigned long current_seq)
521478d3005SHans Petter Selasky {
522478d3005SHans Petter Selasky 	struct task_struct *owning_process  = NULL;
523478d3005SHans Petter Selasky 	struct mm_struct   *owning_mm       = NULL;
524478d3005SHans Petter Selasky 	struct page       **local_page_list = NULL;
525478d3005SHans Petter Selasky 	u64 off;
526478d3005SHans Petter Selasky 	int j, k, ret = 0, start_idx, npages = 0;
527478d3005SHans Petter Selasky 	u64 base_virt_addr;
528478d3005SHans Petter Selasky 	unsigned int flags = 0;
529478d3005SHans Petter Selasky 
530478d3005SHans Petter Selasky 	if (access_mask == 0)
531478d3005SHans Petter Selasky 		return -EINVAL;
532478d3005SHans Petter Selasky 
533478d3005SHans Petter Selasky 	if (user_virt < ib_umem_start(umem) ||
534478d3005SHans Petter Selasky 	    user_virt + bcnt > ib_umem_end(umem))
535478d3005SHans Petter Selasky 		return -EFAULT;
536478d3005SHans Petter Selasky 
537478d3005SHans Petter Selasky 	local_page_list = (struct page **)__get_free_page(GFP_KERNEL);
538478d3005SHans Petter Selasky 	if (!local_page_list)
539478d3005SHans Petter Selasky 		return -ENOMEM;
540478d3005SHans Petter Selasky 
541478d3005SHans Petter Selasky 	off = user_virt & (~PAGE_MASK);
542478d3005SHans Petter Selasky 	user_virt = user_virt & PAGE_MASK;
543478d3005SHans Petter Selasky 	base_virt_addr = user_virt;
544478d3005SHans Petter Selasky 	bcnt += off; /* Charge for the first page offset as well. */
545478d3005SHans Petter Selasky 
546478d3005SHans Petter Selasky 	owning_process = get_pid_task(umem->context->tgid, PIDTYPE_PID);
547478d3005SHans Petter Selasky 	if (owning_process == NULL) {
548478d3005SHans Petter Selasky 		ret = -EINVAL;
549478d3005SHans Petter Selasky 		goto out_no_task;
550478d3005SHans Petter Selasky 	}
551478d3005SHans Petter Selasky 
552478d3005SHans Petter Selasky 	owning_mm = get_task_mm(owning_process);
553478d3005SHans Petter Selasky 	if (owning_mm == NULL) {
554478d3005SHans Petter Selasky 		ret = -EINVAL;
555478d3005SHans Petter Selasky 		goto out_put_task;
556478d3005SHans Petter Selasky 	}
557478d3005SHans Petter Selasky 
558478d3005SHans Petter Selasky 	if (access_mask & ODP_WRITE_ALLOWED_BIT)
559478d3005SHans Petter Selasky 		flags |= FOLL_WRITE;
560478d3005SHans Petter Selasky 
561478d3005SHans Petter Selasky 	start_idx = (user_virt - ib_umem_start(umem)) >> PAGE_SHIFT;
562478d3005SHans Petter Selasky 	k = start_idx;
563478d3005SHans Petter Selasky 
564478d3005SHans Petter Selasky 	while (bcnt > 0) {
565478d3005SHans Petter Selasky 		const size_t gup_num_pages =
566478d3005SHans Petter Selasky 			min_t(size_t, ALIGN(bcnt, PAGE_SIZE) / PAGE_SIZE,
567478d3005SHans Petter Selasky 			      PAGE_SIZE / sizeof(struct page *));
568478d3005SHans Petter Selasky 
569478d3005SHans Petter Selasky 		down_read(&owning_mm->mmap_sem);
570478d3005SHans Petter Selasky 		/*
571478d3005SHans Petter Selasky 		 * Note: this might result in redundent page getting. We can
572478d3005SHans Petter Selasky 		 * avoid this by checking dma_list to be 0 before calling
573478d3005SHans Petter Selasky 		 * get_user_pages. However, this make the code much more
574478d3005SHans Petter Selasky 		 * complex (and doesn't gain us much performance in most use
575478d3005SHans Petter Selasky 		 * cases).
576478d3005SHans Petter Selasky 		 */
577478d3005SHans Petter Selasky 		npages = get_user_pages_remote(owning_process, owning_mm,
578478d3005SHans Petter Selasky 				user_virt, gup_num_pages,
579478d3005SHans Petter Selasky 				flags, local_page_list, NULL);
580478d3005SHans Petter Selasky 		up_read(&owning_mm->mmap_sem);
581478d3005SHans Petter Selasky 
582478d3005SHans Petter Selasky 		if (npages < 0)
583478d3005SHans Petter Selasky 			break;
584478d3005SHans Petter Selasky 
585478d3005SHans Petter Selasky 		bcnt -= min_t(size_t, npages << PAGE_SHIFT, bcnt);
586478d3005SHans Petter Selasky 		user_virt += npages << PAGE_SHIFT;
587478d3005SHans Petter Selasky 		mutex_lock(&umem->odp_data->umem_mutex);
588478d3005SHans Petter Selasky 		for (j = 0; j < npages; ++j) {
589478d3005SHans Petter Selasky 			ret = ib_umem_odp_map_dma_single_page(
590478d3005SHans Petter Selasky 				umem, k, base_virt_addr, local_page_list[j],
591478d3005SHans Petter Selasky 				access_mask, current_seq);
592478d3005SHans Petter Selasky 			if (ret < 0)
593478d3005SHans Petter Selasky 				break;
594478d3005SHans Petter Selasky 			k++;
595478d3005SHans Petter Selasky 		}
596478d3005SHans Petter Selasky 		mutex_unlock(&umem->odp_data->umem_mutex);
597478d3005SHans Petter Selasky 
598478d3005SHans Petter Selasky 		if (ret < 0) {
599478d3005SHans Petter Selasky 			/* Release left over pages when handling errors. */
600478d3005SHans Petter Selasky 			for (++j; j < npages; ++j)
601478d3005SHans Petter Selasky 				put_page(local_page_list[j]);
602478d3005SHans Petter Selasky 			break;
603478d3005SHans Petter Selasky 		}
604478d3005SHans Petter Selasky 	}
605478d3005SHans Petter Selasky 
606478d3005SHans Petter Selasky 	if (ret >= 0) {
607478d3005SHans Petter Selasky 		if (npages < 0 && k == start_idx)
608478d3005SHans Petter Selasky 			ret = npages;
609478d3005SHans Petter Selasky 		else
610478d3005SHans Petter Selasky 			ret = k - start_idx;
611478d3005SHans Petter Selasky 	}
612478d3005SHans Petter Selasky 
613478d3005SHans Petter Selasky 	mmput(owning_mm);
614478d3005SHans Petter Selasky out_put_task:
615478d3005SHans Petter Selasky 	put_task_struct(owning_process);
616478d3005SHans Petter Selasky out_no_task:
617478d3005SHans Petter Selasky 	free_page((unsigned long)local_page_list);
618478d3005SHans Petter Selasky 	return ret;
619478d3005SHans Petter Selasky }
620478d3005SHans Petter Selasky EXPORT_SYMBOL(ib_umem_odp_map_dma_pages);
621478d3005SHans Petter Selasky 
ib_umem_odp_unmap_dma_pages(struct ib_umem * umem,u64 virt,u64 bound)622478d3005SHans Petter Selasky void ib_umem_odp_unmap_dma_pages(struct ib_umem *umem, u64 virt,
623478d3005SHans Petter Selasky 				 u64 bound)
624478d3005SHans Petter Selasky {
625478d3005SHans Petter Selasky 	int idx;
626478d3005SHans Petter Selasky 	u64 addr;
627478d3005SHans Petter Selasky 	struct ib_device *dev = umem->context->device;
628478d3005SHans Petter Selasky 
629478d3005SHans Petter Selasky 	virt  = max_t(u64, virt,  ib_umem_start(umem));
630478d3005SHans Petter Selasky 	bound = min_t(u64, bound, ib_umem_end(umem));
631478d3005SHans Petter Selasky 	/* Note that during the run of this function, the
632478d3005SHans Petter Selasky 	 * notifiers_count of the MR is > 0, preventing any racing
633478d3005SHans Petter Selasky 	 * faults from completion. We might be racing with other
634478d3005SHans Petter Selasky 	 * invalidations, so we must make sure we free each page only
635478d3005SHans Petter Selasky 	 * once. */
636478d3005SHans Petter Selasky 	mutex_lock(&umem->odp_data->umem_mutex);
637478d3005SHans Petter Selasky 	for (addr = virt; addr < bound; addr += (u64)umem->page_size) {
638478d3005SHans Petter Selasky 		idx = (addr - ib_umem_start(umem)) / PAGE_SIZE;
639478d3005SHans Petter Selasky 		if (umem->odp_data->page_list[idx]) {
640478d3005SHans Petter Selasky 			struct page *page = umem->odp_data->page_list[idx];
641478d3005SHans Petter Selasky 			dma_addr_t dma = umem->odp_data->dma_list[idx];
642478d3005SHans Petter Selasky 			dma_addr_t dma_addr = dma & ODP_DMA_ADDR_MASK;
643478d3005SHans Petter Selasky 
644478d3005SHans Petter Selasky 			WARN_ON(!dma_addr);
645478d3005SHans Petter Selasky 
646478d3005SHans Petter Selasky 			ib_dma_unmap_page(dev, dma_addr, PAGE_SIZE,
647478d3005SHans Petter Selasky 					  DMA_BIDIRECTIONAL);
648478d3005SHans Petter Selasky 			if (dma & ODP_WRITE_ALLOWED_BIT) {
649478d3005SHans Petter Selasky 				struct page *head_page = compound_head(page);
650478d3005SHans Petter Selasky 				/*
651478d3005SHans Petter Selasky 				 * set_page_dirty prefers being called with
652478d3005SHans Petter Selasky 				 * the page lock. However, MMU notifiers are
653478d3005SHans Petter Selasky 				 * called sometimes with and sometimes without
654478d3005SHans Petter Selasky 				 * the lock. We rely on the umem_mutex instead
655478d3005SHans Petter Selasky 				 * to prevent other mmu notifiers from
656478d3005SHans Petter Selasky 				 * continuing and allowing the page mapping to
657478d3005SHans Petter Selasky 				 * be removed.
658478d3005SHans Petter Selasky 				 */
659478d3005SHans Petter Selasky 				set_page_dirty(head_page);
660478d3005SHans Petter Selasky 			}
661478d3005SHans Petter Selasky 			/* on demand pinning support */
662478d3005SHans Petter Selasky 			if (!umem->context->invalidate_range)
663478d3005SHans Petter Selasky 				put_page(page);
664478d3005SHans Petter Selasky 			umem->odp_data->page_list[idx] = NULL;
665478d3005SHans Petter Selasky 			umem->odp_data->dma_list[idx] = 0;
666478d3005SHans Petter Selasky 		}
667478d3005SHans Petter Selasky 	}
668478d3005SHans Petter Selasky 	mutex_unlock(&umem->odp_data->umem_mutex);
669478d3005SHans Petter Selasky }
670478d3005SHans Petter Selasky EXPORT_SYMBOL(ib_umem_odp_unmap_dma_pages);
671