iwpm_util.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755
  1. /*
  2. * Copyright (c) 2014 Chelsio, Inc. All rights reserved.
  3. * Copyright (c) 2014 Intel Corporation. All rights reserved.
  4. *
  5. * This software is available to you under a choice of one of two
  6. * licenses. You may choose to be licensed under the terms of the GNU
  7. * General Public License (GPL) Version 2, available from the file
  8. * COPYING in the main directory of this source tree, or the
  9. * OpenIB.org BSD license below:
  10. *
  11. * Redistribution and use in source and binary forms, with or
  12. * without modification, are permitted provided that the following
  13. * conditions are met:
  14. *
  15. * - Redistributions of source code must retain the above
  16. * copyright notice, this list of conditions and the following
  17. * disclaimer.
  18. *
  19. * - Redistributions in binary form must reproduce the above
  20. * copyright notice, this list of conditions and the following
  21. * disclaimer in the documentation and/or other materials
  22. * provided with the distribution.
  23. *
  24. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  25. * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  26. * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
  27. * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
  28. * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
  29. * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
  30. * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  31. * SOFTWARE.
  32. */
  33. #include "iwpm_util.h"
  34. #define IWPM_MAPINFO_HASH_SIZE 512
  35. #define IWPM_MAPINFO_HASH_MASK (IWPM_MAPINFO_HASH_SIZE - 1)
  36. #define IWPM_REMINFO_HASH_SIZE 64
  37. #define IWPM_REMINFO_HASH_MASK (IWPM_REMINFO_HASH_SIZE - 1)
  38. #define IWPM_MSG_SIZE 512
  39. static LIST_HEAD(iwpm_nlmsg_req_list);
  40. static DEFINE_SPINLOCK(iwpm_nlmsg_req_lock);
  41. static struct hlist_head *iwpm_hash_bucket;
  42. static DEFINE_SPINLOCK(iwpm_mapinfo_lock);
  43. static struct hlist_head *iwpm_reminfo_bucket;
  44. static DEFINE_SPINLOCK(iwpm_reminfo_lock);
  45. static DEFINE_MUTEX(iwpm_admin_lock);
  46. static struct iwpm_admin_data iwpm_admin;
  47. int iwpm_init(u8 nl_client)
  48. {
  49. int ret = 0;
  50. if (iwpm_valid_client(nl_client))
  51. return -EINVAL;
  52. mutex_lock(&iwpm_admin_lock);
  53. if (atomic_read(&iwpm_admin.refcount) == 0) {
  54. iwpm_hash_bucket = kzalloc(IWPM_MAPINFO_HASH_SIZE *
  55. sizeof(struct hlist_head), GFP_KERNEL);
  56. if (!iwpm_hash_bucket) {
  57. ret = -ENOMEM;
  58. goto init_exit;
  59. }
  60. iwpm_reminfo_bucket = kzalloc(IWPM_REMINFO_HASH_SIZE *
  61. sizeof(struct hlist_head), GFP_KERNEL);
  62. if (!iwpm_reminfo_bucket) {
  63. kfree(iwpm_hash_bucket);
  64. ret = -ENOMEM;
  65. goto init_exit;
  66. }
  67. }
  68. atomic_inc(&iwpm_admin.refcount);
  69. init_exit:
  70. mutex_unlock(&iwpm_admin_lock);
  71. if (!ret) {
  72. iwpm_set_valid(nl_client, 1);
  73. iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
  74. pr_debug("%s: Mapinfo and reminfo tables are created\n",
  75. __func__);
  76. }
  77. return ret;
  78. }
  79. EXPORT_SYMBOL(iwpm_init);
  80. static void free_hash_bucket(void);
  81. static void free_reminfo_bucket(void);
  82. int iwpm_exit(u8 nl_client)
  83. {
  84. if (!iwpm_valid_client(nl_client))
  85. return -EINVAL;
  86. mutex_lock(&iwpm_admin_lock);
  87. if (atomic_read(&iwpm_admin.refcount) == 0) {
  88. mutex_unlock(&iwpm_admin_lock);
  89. pr_err("%s Incorrect usage - negative refcount\n", __func__);
  90. return -EINVAL;
  91. }
  92. if (atomic_dec_and_test(&iwpm_admin.refcount)) {
  93. free_hash_bucket();
  94. free_reminfo_bucket();
  95. pr_debug("%s: Resources are destroyed\n", __func__);
  96. }
  97. mutex_unlock(&iwpm_admin_lock);
  98. iwpm_set_valid(nl_client, 0);
  99. iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
  100. return 0;
  101. }
  102. EXPORT_SYMBOL(iwpm_exit);
  103. static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage *,
  104. struct sockaddr_storage *);
  105. int iwpm_create_mapinfo(struct sockaddr_storage *local_sockaddr,
  106. struct sockaddr_storage *mapped_sockaddr,
  107. u8 nl_client)
  108. {
  109. struct hlist_head *hash_bucket_head;
  110. struct iwpm_mapping_info *map_info;
  111. unsigned long flags;
  112. int ret = -EINVAL;
  113. if (!iwpm_valid_client(nl_client))
  114. return ret;
  115. map_info = kzalloc(sizeof(struct iwpm_mapping_info), GFP_KERNEL);
  116. if (!map_info)
  117. return -ENOMEM;
  118. memcpy(&map_info->local_sockaddr, local_sockaddr,
  119. sizeof(struct sockaddr_storage));
  120. memcpy(&map_info->mapped_sockaddr, mapped_sockaddr,
  121. sizeof(struct sockaddr_storage));
  122. map_info->nl_client = nl_client;
  123. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  124. if (iwpm_hash_bucket) {
  125. hash_bucket_head = get_mapinfo_hash_bucket(
  126. &map_info->local_sockaddr,
  127. &map_info->mapped_sockaddr);
  128. if (hash_bucket_head) {
  129. hlist_add_head(&map_info->hlist_node, hash_bucket_head);
  130. ret = 0;
  131. }
  132. }
  133. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  134. return ret;
  135. }
  136. EXPORT_SYMBOL(iwpm_create_mapinfo);
  137. int iwpm_remove_mapinfo(struct sockaddr_storage *local_sockaddr,
  138. struct sockaddr_storage *mapped_local_addr)
  139. {
  140. struct hlist_node *tmp_hlist_node;
  141. struct hlist_head *hash_bucket_head;
  142. struct iwpm_mapping_info *map_info = NULL;
  143. unsigned long flags;
  144. int ret = -EINVAL;
  145. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  146. if (iwpm_hash_bucket) {
  147. hash_bucket_head = get_mapinfo_hash_bucket(
  148. local_sockaddr,
  149. mapped_local_addr);
  150. if (!hash_bucket_head)
  151. goto remove_mapinfo_exit;
  152. hlist_for_each_entry_safe(map_info, tmp_hlist_node,
  153. hash_bucket_head, hlist_node) {
  154. if (!iwpm_compare_sockaddr(&map_info->mapped_sockaddr,
  155. mapped_local_addr)) {
  156. hlist_del_init(&map_info->hlist_node);
  157. kfree(map_info);
  158. ret = 0;
  159. break;
  160. }
  161. }
  162. }
  163. remove_mapinfo_exit:
  164. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  165. return ret;
  166. }
  167. EXPORT_SYMBOL(iwpm_remove_mapinfo);
  168. static void free_hash_bucket(void)
  169. {
  170. struct hlist_node *tmp_hlist_node;
  171. struct iwpm_mapping_info *map_info;
  172. unsigned long flags;
  173. int i;
  174. /* remove all the mapinfo data from the list */
  175. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  176. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  177. hlist_for_each_entry_safe(map_info, tmp_hlist_node,
  178. &iwpm_hash_bucket[i], hlist_node) {
  179. hlist_del_init(&map_info->hlist_node);
  180. kfree(map_info);
  181. }
  182. }
  183. /* free the hash list */
  184. kfree(iwpm_hash_bucket);
  185. iwpm_hash_bucket = NULL;
  186. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  187. }
  188. static void free_reminfo_bucket(void)
  189. {
  190. struct hlist_node *tmp_hlist_node;
  191. struct iwpm_remote_info *rem_info;
  192. unsigned long flags;
  193. int i;
  194. /* remove all the remote info from the list */
  195. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  196. for (i = 0; i < IWPM_REMINFO_HASH_SIZE; i++) {
  197. hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
  198. &iwpm_reminfo_bucket[i], hlist_node) {
  199. hlist_del_init(&rem_info->hlist_node);
  200. kfree(rem_info);
  201. }
  202. }
  203. /* free the hash list */
  204. kfree(iwpm_reminfo_bucket);
  205. iwpm_reminfo_bucket = NULL;
  206. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  207. }
  208. static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage *,
  209. struct sockaddr_storage *);
  210. void iwpm_add_remote_info(struct iwpm_remote_info *rem_info)
  211. {
  212. struct hlist_head *hash_bucket_head;
  213. unsigned long flags;
  214. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  215. if (iwpm_reminfo_bucket) {
  216. hash_bucket_head = get_reminfo_hash_bucket(
  217. &rem_info->mapped_loc_sockaddr,
  218. &rem_info->mapped_rem_sockaddr);
  219. if (hash_bucket_head)
  220. hlist_add_head(&rem_info->hlist_node, hash_bucket_head);
  221. }
  222. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  223. }
  224. int iwpm_get_remote_info(struct sockaddr_storage *mapped_loc_addr,
  225. struct sockaddr_storage *mapped_rem_addr,
  226. struct sockaddr_storage *remote_addr,
  227. u8 nl_client)
  228. {
  229. struct hlist_node *tmp_hlist_node;
  230. struct hlist_head *hash_bucket_head;
  231. struct iwpm_remote_info *rem_info = NULL;
  232. unsigned long flags;
  233. int ret = -EINVAL;
  234. if (!iwpm_valid_client(nl_client)) {
  235. pr_info("%s: Invalid client = %d\n", __func__, nl_client);
  236. return ret;
  237. }
  238. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  239. if (iwpm_reminfo_bucket) {
  240. hash_bucket_head = get_reminfo_hash_bucket(
  241. mapped_loc_addr,
  242. mapped_rem_addr);
  243. if (!hash_bucket_head)
  244. goto get_remote_info_exit;
  245. hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
  246. hash_bucket_head, hlist_node) {
  247. if (!iwpm_compare_sockaddr(&rem_info->mapped_loc_sockaddr,
  248. mapped_loc_addr) &&
  249. !iwpm_compare_sockaddr(&rem_info->mapped_rem_sockaddr,
  250. mapped_rem_addr)) {
  251. memcpy(remote_addr, &rem_info->remote_sockaddr,
  252. sizeof(struct sockaddr_storage));
  253. iwpm_print_sockaddr(remote_addr,
  254. "get_remote_info: Remote sockaddr:");
  255. hlist_del_init(&rem_info->hlist_node);
  256. kfree(rem_info);
  257. ret = 0;
  258. break;
  259. }
  260. }
  261. }
  262. get_remote_info_exit:
  263. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  264. return ret;
  265. }
  266. EXPORT_SYMBOL(iwpm_get_remote_info);
  267. struct iwpm_nlmsg_request *iwpm_get_nlmsg_request(__u32 nlmsg_seq,
  268. u8 nl_client, gfp_t gfp)
  269. {
  270. struct iwpm_nlmsg_request *nlmsg_request = NULL;
  271. unsigned long flags;
  272. nlmsg_request = kzalloc(sizeof(struct iwpm_nlmsg_request), gfp);
  273. if (!nlmsg_request)
  274. return NULL;
  275. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  276. list_add_tail(&nlmsg_request->inprocess_list, &iwpm_nlmsg_req_list);
  277. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  278. kref_init(&nlmsg_request->kref);
  279. kref_get(&nlmsg_request->kref);
  280. nlmsg_request->nlmsg_seq = nlmsg_seq;
  281. nlmsg_request->nl_client = nl_client;
  282. nlmsg_request->request_done = 0;
  283. nlmsg_request->err_code = 0;
  284. sema_init(&nlmsg_request->sem, 1);
  285. down(&nlmsg_request->sem);
  286. return nlmsg_request;
  287. }
  288. void iwpm_free_nlmsg_request(struct kref *kref)
  289. {
  290. struct iwpm_nlmsg_request *nlmsg_request;
  291. unsigned long flags;
  292. nlmsg_request = container_of(kref, struct iwpm_nlmsg_request, kref);
  293. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  294. list_del_init(&nlmsg_request->inprocess_list);
  295. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  296. if (!nlmsg_request->request_done)
  297. pr_debug("%s Freeing incomplete nlmsg request (seq = %u).\n",
  298. __func__, nlmsg_request->nlmsg_seq);
  299. kfree(nlmsg_request);
  300. }
  301. struct iwpm_nlmsg_request *iwpm_find_nlmsg_request(__u32 echo_seq)
  302. {
  303. struct iwpm_nlmsg_request *nlmsg_request;
  304. struct iwpm_nlmsg_request *found_request = NULL;
  305. unsigned long flags;
  306. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  307. list_for_each_entry(nlmsg_request, &iwpm_nlmsg_req_list,
  308. inprocess_list) {
  309. if (nlmsg_request->nlmsg_seq == echo_seq) {
  310. found_request = nlmsg_request;
  311. kref_get(&nlmsg_request->kref);
  312. break;
  313. }
  314. }
  315. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  316. return found_request;
  317. }
  318. int iwpm_wait_complete_req(struct iwpm_nlmsg_request *nlmsg_request)
  319. {
  320. int ret;
  321. ret = down_timeout(&nlmsg_request->sem, IWPM_NL_TIMEOUT);
  322. if (ret) {
  323. ret = -EINVAL;
  324. pr_info("%s: Timeout %d sec for netlink request (seq = %u)\n",
  325. __func__, (IWPM_NL_TIMEOUT/HZ), nlmsg_request->nlmsg_seq);
  326. } else {
  327. ret = nlmsg_request->err_code;
  328. }
  329. kref_put(&nlmsg_request->kref, iwpm_free_nlmsg_request);
  330. return ret;
  331. }
  332. int iwpm_get_nlmsg_seq(void)
  333. {
  334. return atomic_inc_return(&iwpm_admin.nlmsg_seq);
  335. }
  336. int iwpm_valid_client(u8 nl_client)
  337. {
  338. if (nl_client >= RDMA_NL_NUM_CLIENTS)
  339. return 0;
  340. return iwpm_admin.client_list[nl_client];
  341. }
  342. void iwpm_set_valid(u8 nl_client, int valid)
  343. {
  344. if (nl_client >= RDMA_NL_NUM_CLIENTS)
  345. return;
  346. iwpm_admin.client_list[nl_client] = valid;
  347. }
  348. /* valid client */
  349. u32 iwpm_get_registration(u8 nl_client)
  350. {
  351. return iwpm_admin.reg_list[nl_client];
  352. }
  353. /* valid client */
  354. void iwpm_set_registration(u8 nl_client, u32 reg)
  355. {
  356. iwpm_admin.reg_list[nl_client] = reg;
  357. }
  358. /* valid client */
  359. u32 iwpm_check_registration(u8 nl_client, u32 reg)
  360. {
  361. return (iwpm_get_registration(nl_client) & reg);
  362. }
  363. int iwpm_compare_sockaddr(struct sockaddr_storage *a_sockaddr,
  364. struct sockaddr_storage *b_sockaddr)
  365. {
  366. if (a_sockaddr->ss_family != b_sockaddr->ss_family)
  367. return 1;
  368. if (a_sockaddr->ss_family == AF_INET) {
  369. struct sockaddr_in *a4_sockaddr =
  370. (struct sockaddr_in *)a_sockaddr;
  371. struct sockaddr_in *b4_sockaddr =
  372. (struct sockaddr_in *)b_sockaddr;
  373. if (!memcmp(&a4_sockaddr->sin_addr,
  374. &b4_sockaddr->sin_addr, sizeof(struct in_addr))
  375. && a4_sockaddr->sin_port == b4_sockaddr->sin_port)
  376. return 0;
  377. } else if (a_sockaddr->ss_family == AF_INET6) {
  378. struct sockaddr_in6 *a6_sockaddr =
  379. (struct sockaddr_in6 *)a_sockaddr;
  380. struct sockaddr_in6 *b6_sockaddr =
  381. (struct sockaddr_in6 *)b_sockaddr;
  382. if (!memcmp(&a6_sockaddr->sin6_addr,
  383. &b6_sockaddr->sin6_addr, sizeof(struct in6_addr))
  384. && a6_sockaddr->sin6_port == b6_sockaddr->sin6_port)
  385. return 0;
  386. } else {
  387. pr_err("%s: Invalid sockaddr family\n", __func__);
  388. }
  389. return 1;
  390. }
  391. struct sk_buff *iwpm_create_nlmsg(u32 nl_op, struct nlmsghdr **nlh,
  392. int nl_client)
  393. {
  394. struct sk_buff *skb = NULL;
  395. skb = dev_alloc_skb(IWPM_MSG_SIZE);
  396. if (!skb) {
  397. pr_err("%s Unable to allocate skb\n", __func__);
  398. goto create_nlmsg_exit;
  399. }
  400. if (!(ibnl_put_msg(skb, nlh, 0, 0, nl_client, nl_op,
  401. NLM_F_REQUEST))) {
  402. pr_warn("%s: Unable to put the nlmsg header\n", __func__);
  403. dev_kfree_skb(skb);
  404. skb = NULL;
  405. }
  406. create_nlmsg_exit:
  407. return skb;
  408. }
  409. int iwpm_parse_nlmsg(struct netlink_callback *cb, int policy_max,
  410. const struct nla_policy *nlmsg_policy,
  411. struct nlattr *nltb[], const char *msg_type)
  412. {
  413. int nlh_len = 0;
  414. int ret;
  415. const char *err_str = "";
  416. ret = nlmsg_validate(cb->nlh, nlh_len, policy_max-1, nlmsg_policy);
  417. if (ret) {
  418. err_str = "Invalid attribute";
  419. goto parse_nlmsg_error;
  420. }
  421. ret = nlmsg_parse(cb->nlh, nlh_len, nltb, policy_max-1, nlmsg_policy);
  422. if (ret) {
  423. err_str = "Unable to parse the nlmsg";
  424. goto parse_nlmsg_error;
  425. }
  426. ret = iwpm_validate_nlmsg_attr(nltb, policy_max);
  427. if (ret) {
  428. err_str = "Invalid NULL attribute";
  429. goto parse_nlmsg_error;
  430. }
  431. return 0;
  432. parse_nlmsg_error:
  433. pr_warn("%s: %s (msg type %s ret = %d)\n",
  434. __func__, err_str, msg_type, ret);
  435. return ret;
  436. }
  437. void iwpm_print_sockaddr(struct sockaddr_storage *sockaddr, char *msg)
  438. {
  439. struct sockaddr_in6 *sockaddr_v6;
  440. struct sockaddr_in *sockaddr_v4;
  441. switch (sockaddr->ss_family) {
  442. case AF_INET:
  443. sockaddr_v4 = (struct sockaddr_in *)sockaddr;
  444. pr_debug("%s IPV4 %pI4: %u(0x%04X)\n",
  445. msg, &sockaddr_v4->sin_addr,
  446. ntohs(sockaddr_v4->sin_port),
  447. ntohs(sockaddr_v4->sin_port));
  448. break;
  449. case AF_INET6:
  450. sockaddr_v6 = (struct sockaddr_in6 *)sockaddr;
  451. pr_debug("%s IPV6 %pI6: %u(0x%04X)\n",
  452. msg, &sockaddr_v6->sin6_addr,
  453. ntohs(sockaddr_v6->sin6_port),
  454. ntohs(sockaddr_v6->sin6_port));
  455. break;
  456. default:
  457. break;
  458. }
  459. }
  460. static u32 iwpm_ipv6_jhash(struct sockaddr_in6 *ipv6_sockaddr)
  461. {
  462. u32 ipv6_hash = jhash(&ipv6_sockaddr->sin6_addr, sizeof(struct in6_addr), 0);
  463. u32 hash = jhash_2words(ipv6_hash, (__force u32) ipv6_sockaddr->sin6_port, 0);
  464. return hash;
  465. }
  466. static u32 iwpm_ipv4_jhash(struct sockaddr_in *ipv4_sockaddr)
  467. {
  468. u32 ipv4_hash = jhash(&ipv4_sockaddr->sin_addr, sizeof(struct in_addr), 0);
  469. u32 hash = jhash_2words(ipv4_hash, (__force u32) ipv4_sockaddr->sin_port, 0);
  470. return hash;
  471. }
  472. static int get_hash_bucket(struct sockaddr_storage *a_sockaddr,
  473. struct sockaddr_storage *b_sockaddr, u32 *hash)
  474. {
  475. u32 a_hash, b_hash;
  476. if (a_sockaddr->ss_family == AF_INET) {
  477. a_hash = iwpm_ipv4_jhash((struct sockaddr_in *) a_sockaddr);
  478. b_hash = iwpm_ipv4_jhash((struct sockaddr_in *) b_sockaddr);
  479. } else if (a_sockaddr->ss_family == AF_INET6) {
  480. a_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) a_sockaddr);
  481. b_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) b_sockaddr);
  482. } else {
  483. pr_err("%s: Invalid sockaddr family\n", __func__);
  484. return -EINVAL;
  485. }
  486. if (a_hash == b_hash) /* if port mapper isn't available */
  487. *hash = a_hash;
  488. else
  489. *hash = jhash_2words(a_hash, b_hash, 0);
  490. return 0;
  491. }
  492. static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage
  493. *local_sockaddr, struct sockaddr_storage
  494. *mapped_sockaddr)
  495. {
  496. u32 hash;
  497. int ret;
  498. ret = get_hash_bucket(local_sockaddr, mapped_sockaddr, &hash);
  499. if (ret)
  500. return NULL;
  501. return &iwpm_hash_bucket[hash & IWPM_MAPINFO_HASH_MASK];
  502. }
  503. static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage
  504. *mapped_loc_sockaddr, struct sockaddr_storage
  505. *mapped_rem_sockaddr)
  506. {
  507. u32 hash;
  508. int ret;
  509. ret = get_hash_bucket(mapped_loc_sockaddr, mapped_rem_sockaddr, &hash);
  510. if (ret)
  511. return NULL;
  512. return &iwpm_reminfo_bucket[hash & IWPM_REMINFO_HASH_MASK];
  513. }
  514. static int send_mapinfo_num(u32 mapping_num, u8 nl_client, int iwpm_pid)
  515. {
  516. struct sk_buff *skb = NULL;
  517. struct nlmsghdr *nlh;
  518. u32 msg_seq;
  519. const char *err_str = "";
  520. int ret = -EINVAL;
  521. skb = iwpm_create_nlmsg(RDMA_NL_IWPM_MAPINFO_NUM, &nlh, nl_client);
  522. if (!skb) {
  523. err_str = "Unable to create a nlmsg";
  524. goto mapinfo_num_error;
  525. }
  526. nlh->nlmsg_seq = iwpm_get_nlmsg_seq();
  527. msg_seq = 0;
  528. err_str = "Unable to put attribute of mapinfo number nlmsg";
  529. ret = ibnl_put_attr(skb, nlh, sizeof(u32), &msg_seq, IWPM_NLA_MAPINFO_SEQ);
  530. if (ret)
  531. goto mapinfo_num_error;
  532. ret = ibnl_put_attr(skb, nlh, sizeof(u32),
  533. &mapping_num, IWPM_NLA_MAPINFO_SEND_NUM);
  534. if (ret)
  535. goto mapinfo_num_error;
  536. ret = ibnl_unicast(skb, nlh, iwpm_pid);
  537. if (ret) {
  538. skb = NULL;
  539. err_str = "Unable to send a nlmsg";
  540. goto mapinfo_num_error;
  541. }
  542. pr_debug("%s: Sent mapping number = %d\n", __func__, mapping_num);
  543. return 0;
  544. mapinfo_num_error:
  545. pr_info("%s: %s\n", __func__, err_str);
  546. if (skb)
  547. dev_kfree_skb(skb);
  548. return ret;
  549. }
  550. static int send_nlmsg_done(struct sk_buff *skb, u8 nl_client, int iwpm_pid)
  551. {
  552. struct nlmsghdr *nlh = NULL;
  553. int ret = 0;
  554. if (!skb)
  555. return ret;
  556. if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
  557. RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
  558. pr_warn("%s Unable to put NLMSG_DONE\n", __func__);
  559. dev_kfree_skb(skb);
  560. return -ENOMEM;
  561. }
  562. nlh->nlmsg_type = NLMSG_DONE;
  563. ret = ibnl_unicast(skb, (struct nlmsghdr *)skb->data, iwpm_pid);
  564. if (ret)
  565. pr_warn("%s Unable to send a nlmsg\n", __func__);
  566. return ret;
  567. }
  568. int iwpm_send_mapinfo(u8 nl_client, int iwpm_pid)
  569. {
  570. struct iwpm_mapping_info *map_info;
  571. struct sk_buff *skb = NULL;
  572. struct nlmsghdr *nlh;
  573. int skb_num = 0, mapping_num = 0;
  574. int i = 0, nlmsg_bytes = 0;
  575. unsigned long flags;
  576. const char *err_str = "";
  577. int ret;
  578. skb = dev_alloc_skb(NLMSG_GOODSIZE);
  579. if (!skb) {
  580. ret = -ENOMEM;
  581. err_str = "Unable to allocate skb";
  582. goto send_mapping_info_exit;
  583. }
  584. skb_num++;
  585. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  586. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  587. hlist_for_each_entry(map_info, &iwpm_hash_bucket[i],
  588. hlist_node) {
  589. if (map_info->nl_client != nl_client)
  590. continue;
  591. nlh = NULL;
  592. if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
  593. RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
  594. ret = -ENOMEM;
  595. err_str = "Unable to put the nlmsg header";
  596. goto send_mapping_info_unlock;
  597. }
  598. err_str = "Unable to put attribute of the nlmsg";
  599. ret = ibnl_put_attr(skb, nlh,
  600. sizeof(struct sockaddr_storage),
  601. &map_info->local_sockaddr,
  602. IWPM_NLA_MAPINFO_LOCAL_ADDR);
  603. if (ret)
  604. goto send_mapping_info_unlock;
  605. ret = ibnl_put_attr(skb, nlh,
  606. sizeof(struct sockaddr_storage),
  607. &map_info->mapped_sockaddr,
  608. IWPM_NLA_MAPINFO_MAPPED_ADDR);
  609. if (ret)
  610. goto send_mapping_info_unlock;
  611. iwpm_print_sockaddr(&map_info->local_sockaddr,
  612. "send_mapping_info: Local sockaddr:");
  613. iwpm_print_sockaddr(&map_info->mapped_sockaddr,
  614. "send_mapping_info: Mapped local sockaddr:");
  615. mapping_num++;
  616. nlmsg_bytes += nlh->nlmsg_len;
  617. /* check if all mappings can fit in one skb */
  618. if (NLMSG_GOODSIZE - nlmsg_bytes < nlh->nlmsg_len * 2) {
  619. /* and leave room for NLMSG_DONE */
  620. nlmsg_bytes = 0;
  621. skb_num++;
  622. spin_unlock_irqrestore(&iwpm_mapinfo_lock,
  623. flags);
  624. /* send the skb */
  625. ret = send_nlmsg_done(skb, nl_client, iwpm_pid);
  626. skb = NULL;
  627. if (ret) {
  628. err_str = "Unable to send map info";
  629. goto send_mapping_info_exit;
  630. }
  631. if (skb_num == IWPM_MAPINFO_SKB_COUNT) {
  632. ret = -ENOMEM;
  633. err_str = "Insufficient skbs for map info";
  634. goto send_mapping_info_exit;
  635. }
  636. skb = dev_alloc_skb(NLMSG_GOODSIZE);
  637. if (!skb) {
  638. ret = -ENOMEM;
  639. err_str = "Unable to allocate skb";
  640. goto send_mapping_info_exit;
  641. }
  642. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  643. }
  644. }
  645. }
  646. send_mapping_info_unlock:
  647. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  648. send_mapping_info_exit:
  649. if (ret) {
  650. pr_warn("%s: %s (ret = %d)\n", __func__, err_str, ret);
  651. if (skb)
  652. dev_kfree_skb(skb);
  653. return ret;
  654. }
  655. send_nlmsg_done(skb, nl_client, iwpm_pid);
  656. return send_mapinfo_num(mapping_num, nl_client, iwpm_pid);
  657. }
  658. int iwpm_mapinfo_available(void)
  659. {
  660. unsigned long flags;
  661. int full_bucket = 0, i = 0;
  662. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  663. if (iwpm_hash_bucket) {
  664. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  665. if (!hlist_empty(&iwpm_hash_bucket[i])) {
  666. full_bucket = 1;
  667. break;
  668. }
  669. }
  670. }
  671. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  672. return full_bucket;
  673. }