iwpm_util.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757
  1. /*
  2. * Copyright (c) 2014 Chelsio, Inc. All rights reserved.
  3. * Copyright (c) 2014 Intel Corporation. All rights reserved.
  4. *
  5. * This software is available to you under a choice of one of two
  6. * licenses. You may choose to be licensed under the terms of the GNU
  7. * General Public License (GPL) Version 2, available from the file
  8. * COPYING in the main directory of this source tree, or the
  9. * OpenIB.org BSD license below:
  10. *
  11. * Redistribution and use in source and binary forms, with or
  12. * without modification, are permitted provided that the following
  13. * conditions are met:
  14. *
  15. * - Redistributions of source code must retain the above
  16. * copyright notice, this list of conditions and the following
  17. * disclaimer.
  18. *
  19. * - Redistributions in binary form must reproduce the above
  20. * copyright notice, this list of conditions and the following
  21. * disclaimer in the documentation and/or other materials
  22. * provided with the distribution.
  23. *
  24. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  25. * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  26. * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
  27. * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
  28. * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
  29. * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
  30. * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  31. * SOFTWARE.
  32. */
  33. #include "iwpm_util.h"
  34. #define IWPM_MAPINFO_HASH_SIZE 512
  35. #define IWPM_MAPINFO_HASH_MASK (IWPM_MAPINFO_HASH_SIZE - 1)
  36. #define IWPM_REMINFO_HASH_SIZE 64
  37. #define IWPM_REMINFO_HASH_MASK (IWPM_REMINFO_HASH_SIZE - 1)
  38. #define IWPM_MSG_SIZE 512
  39. static LIST_HEAD(iwpm_nlmsg_req_list);
  40. static DEFINE_SPINLOCK(iwpm_nlmsg_req_lock);
  41. static struct hlist_head *iwpm_hash_bucket;
  42. static DEFINE_SPINLOCK(iwpm_mapinfo_lock);
  43. static struct hlist_head *iwpm_reminfo_bucket;
  44. static DEFINE_SPINLOCK(iwpm_reminfo_lock);
  45. static DEFINE_MUTEX(iwpm_admin_lock);
  46. static struct iwpm_admin_data iwpm_admin;
  47. int iwpm_init(u8 nl_client)
  48. {
  49. int ret = 0;
  50. if (iwpm_valid_client(nl_client))
  51. return -EINVAL;
  52. mutex_lock(&iwpm_admin_lock);
  53. if (atomic_read(&iwpm_admin.refcount) == 0) {
  54. iwpm_hash_bucket = kzalloc(IWPM_MAPINFO_HASH_SIZE *
  55. sizeof(struct hlist_head), GFP_KERNEL);
  56. if (!iwpm_hash_bucket) {
  57. ret = -ENOMEM;
  58. goto init_exit;
  59. }
  60. iwpm_reminfo_bucket = kzalloc(IWPM_REMINFO_HASH_SIZE *
  61. sizeof(struct hlist_head), GFP_KERNEL);
  62. if (!iwpm_reminfo_bucket) {
  63. kfree(iwpm_hash_bucket);
  64. ret = -ENOMEM;
  65. goto init_exit;
  66. }
  67. }
  68. atomic_inc(&iwpm_admin.refcount);
  69. init_exit:
  70. mutex_unlock(&iwpm_admin_lock);
  71. if (!ret) {
  72. iwpm_set_valid(nl_client, 1);
  73. iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
  74. pr_debug("%s: Mapinfo and reminfo tables are created\n",
  75. __func__);
  76. }
  77. return ret;
  78. }
  79. EXPORT_SYMBOL(iwpm_init);
  80. static void free_hash_bucket(void);
  81. static void free_reminfo_bucket(void);
  82. int iwpm_exit(u8 nl_client)
  83. {
  84. if (!iwpm_valid_client(nl_client))
  85. return -EINVAL;
  86. mutex_lock(&iwpm_admin_lock);
  87. if (atomic_read(&iwpm_admin.refcount) == 0) {
  88. mutex_unlock(&iwpm_admin_lock);
  89. pr_err("%s Incorrect usage - negative refcount\n", __func__);
  90. return -EINVAL;
  91. }
  92. if (atomic_dec_and_test(&iwpm_admin.refcount)) {
  93. free_hash_bucket();
  94. free_reminfo_bucket();
  95. pr_debug("%s: Resources are destroyed\n", __func__);
  96. }
  97. mutex_unlock(&iwpm_admin_lock);
  98. iwpm_set_valid(nl_client, 0);
  99. iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
  100. return 0;
  101. }
  102. EXPORT_SYMBOL(iwpm_exit);
  103. static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage *,
  104. struct sockaddr_storage *);
  105. int iwpm_create_mapinfo(struct sockaddr_storage *local_sockaddr,
  106. struct sockaddr_storage *mapped_sockaddr,
  107. u8 nl_client)
  108. {
  109. struct hlist_head *hash_bucket_head;
  110. struct iwpm_mapping_info *map_info;
  111. unsigned long flags;
  112. int ret = -EINVAL;
  113. if (!iwpm_valid_client(nl_client))
  114. return ret;
  115. map_info = kzalloc(sizeof(struct iwpm_mapping_info), GFP_KERNEL);
  116. if (!map_info)
  117. return -ENOMEM;
  118. memcpy(&map_info->local_sockaddr, local_sockaddr,
  119. sizeof(struct sockaddr_storage));
  120. memcpy(&map_info->mapped_sockaddr, mapped_sockaddr,
  121. sizeof(struct sockaddr_storage));
  122. map_info->nl_client = nl_client;
  123. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  124. if (iwpm_hash_bucket) {
  125. hash_bucket_head = get_mapinfo_hash_bucket(
  126. &map_info->local_sockaddr,
  127. &map_info->mapped_sockaddr);
  128. if (hash_bucket_head) {
  129. hlist_add_head(&map_info->hlist_node, hash_bucket_head);
  130. ret = 0;
  131. }
  132. }
  133. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  134. return ret;
  135. }
  136. EXPORT_SYMBOL(iwpm_create_mapinfo);
  137. int iwpm_remove_mapinfo(struct sockaddr_storage *local_sockaddr,
  138. struct sockaddr_storage *mapped_local_addr)
  139. {
  140. struct hlist_node *tmp_hlist_node;
  141. struct hlist_head *hash_bucket_head;
  142. struct iwpm_mapping_info *map_info = NULL;
  143. unsigned long flags;
  144. int ret = -EINVAL;
  145. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  146. if (iwpm_hash_bucket) {
  147. hash_bucket_head = get_mapinfo_hash_bucket(
  148. local_sockaddr,
  149. mapped_local_addr);
  150. if (!hash_bucket_head)
  151. goto remove_mapinfo_exit;
  152. hlist_for_each_entry_safe(map_info, tmp_hlist_node,
  153. hash_bucket_head, hlist_node) {
  154. if (!iwpm_compare_sockaddr(&map_info->mapped_sockaddr,
  155. mapped_local_addr)) {
  156. hlist_del_init(&map_info->hlist_node);
  157. kfree(map_info);
  158. ret = 0;
  159. break;
  160. }
  161. }
  162. }
  163. remove_mapinfo_exit:
  164. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  165. return ret;
  166. }
  167. EXPORT_SYMBOL(iwpm_remove_mapinfo);
  168. static void free_hash_bucket(void)
  169. {
  170. struct hlist_node *tmp_hlist_node;
  171. struct iwpm_mapping_info *map_info;
  172. unsigned long flags;
  173. int i;
  174. /* remove all the mapinfo data from the list */
  175. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  176. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  177. hlist_for_each_entry_safe(map_info, tmp_hlist_node,
  178. &iwpm_hash_bucket[i], hlist_node) {
  179. hlist_del_init(&map_info->hlist_node);
  180. kfree(map_info);
  181. }
  182. }
  183. /* free the hash list */
  184. kfree(iwpm_hash_bucket);
  185. iwpm_hash_bucket = NULL;
  186. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  187. }
  188. static void free_reminfo_bucket(void)
  189. {
  190. struct hlist_node *tmp_hlist_node;
  191. struct iwpm_remote_info *rem_info;
  192. unsigned long flags;
  193. int i;
  194. /* remove all the remote info from the list */
  195. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  196. for (i = 0; i < IWPM_REMINFO_HASH_SIZE; i++) {
  197. hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
  198. &iwpm_reminfo_bucket[i], hlist_node) {
  199. hlist_del_init(&rem_info->hlist_node);
  200. kfree(rem_info);
  201. }
  202. }
  203. /* free the hash list */
  204. kfree(iwpm_reminfo_bucket);
  205. iwpm_reminfo_bucket = NULL;
  206. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  207. }
  208. static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage *,
  209. struct sockaddr_storage *);
  210. void iwpm_add_remote_info(struct iwpm_remote_info *rem_info)
  211. {
  212. struct hlist_head *hash_bucket_head;
  213. unsigned long flags;
  214. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  215. if (iwpm_reminfo_bucket) {
  216. hash_bucket_head = get_reminfo_hash_bucket(
  217. &rem_info->mapped_loc_sockaddr,
  218. &rem_info->mapped_rem_sockaddr);
  219. if (hash_bucket_head)
  220. hlist_add_head(&rem_info->hlist_node, hash_bucket_head);
  221. }
  222. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  223. }
  224. int iwpm_get_remote_info(struct sockaddr_storage *mapped_loc_addr,
  225. struct sockaddr_storage *mapped_rem_addr,
  226. struct sockaddr_storage *remote_addr,
  227. u8 nl_client)
  228. {
  229. struct hlist_node *tmp_hlist_node;
  230. struct hlist_head *hash_bucket_head;
  231. struct iwpm_remote_info *rem_info = NULL;
  232. unsigned long flags;
  233. int ret = -EINVAL;
  234. if (!iwpm_valid_client(nl_client)) {
  235. pr_info("%s: Invalid client = %d\n", __func__, nl_client);
  236. return ret;
  237. }
  238. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  239. if (iwpm_reminfo_bucket) {
  240. hash_bucket_head = get_reminfo_hash_bucket(
  241. mapped_loc_addr,
  242. mapped_rem_addr);
  243. if (!hash_bucket_head)
  244. goto get_remote_info_exit;
  245. hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
  246. hash_bucket_head, hlist_node) {
  247. if (!iwpm_compare_sockaddr(&rem_info->mapped_loc_sockaddr,
  248. mapped_loc_addr) &&
  249. !iwpm_compare_sockaddr(&rem_info->mapped_rem_sockaddr,
  250. mapped_rem_addr)) {
  251. memcpy(remote_addr, &rem_info->remote_sockaddr,
  252. sizeof(struct sockaddr_storage));
  253. iwpm_print_sockaddr(remote_addr,
  254. "get_remote_info: Remote sockaddr:");
  255. hlist_del_init(&rem_info->hlist_node);
  256. kfree(rem_info);
  257. ret = 0;
  258. break;
  259. }
  260. }
  261. }
  262. get_remote_info_exit:
  263. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  264. return ret;
  265. }
  266. EXPORT_SYMBOL(iwpm_get_remote_info);
  267. struct iwpm_nlmsg_request *iwpm_get_nlmsg_request(__u32 nlmsg_seq,
  268. u8 nl_client, gfp_t gfp)
  269. {
  270. struct iwpm_nlmsg_request *nlmsg_request = NULL;
  271. unsigned long flags;
  272. nlmsg_request = kzalloc(sizeof(struct iwpm_nlmsg_request), gfp);
  273. if (!nlmsg_request)
  274. return NULL;
  275. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  276. list_add_tail(&nlmsg_request->inprocess_list, &iwpm_nlmsg_req_list);
  277. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  278. kref_init(&nlmsg_request->kref);
  279. kref_get(&nlmsg_request->kref);
  280. nlmsg_request->nlmsg_seq = nlmsg_seq;
  281. nlmsg_request->nl_client = nl_client;
  282. nlmsg_request->request_done = 0;
  283. nlmsg_request->err_code = 0;
  284. sema_init(&nlmsg_request->sem, 1);
  285. down(&nlmsg_request->sem);
  286. return nlmsg_request;
  287. }
  288. void iwpm_free_nlmsg_request(struct kref *kref)
  289. {
  290. struct iwpm_nlmsg_request *nlmsg_request;
  291. unsigned long flags;
  292. nlmsg_request = container_of(kref, struct iwpm_nlmsg_request, kref);
  293. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  294. list_del_init(&nlmsg_request->inprocess_list);
  295. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  296. if (!nlmsg_request->request_done)
  297. pr_debug("%s Freeing incomplete nlmsg request (seq = %u).\n",
  298. __func__, nlmsg_request->nlmsg_seq);
  299. kfree(nlmsg_request);
  300. }
  301. struct iwpm_nlmsg_request *iwpm_find_nlmsg_request(__u32 echo_seq)
  302. {
  303. struct iwpm_nlmsg_request *nlmsg_request;
  304. struct iwpm_nlmsg_request *found_request = NULL;
  305. unsigned long flags;
  306. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  307. list_for_each_entry(nlmsg_request, &iwpm_nlmsg_req_list,
  308. inprocess_list) {
  309. if (nlmsg_request->nlmsg_seq == echo_seq) {
  310. found_request = nlmsg_request;
  311. kref_get(&nlmsg_request->kref);
  312. break;
  313. }
  314. }
  315. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  316. return found_request;
  317. }
  318. int iwpm_wait_complete_req(struct iwpm_nlmsg_request *nlmsg_request)
  319. {
  320. int ret;
  321. ret = down_timeout(&nlmsg_request->sem, IWPM_NL_TIMEOUT);
  322. if (ret) {
  323. ret = -EINVAL;
  324. pr_info("%s: Timeout %d sec for netlink request (seq = %u)\n",
  325. __func__, (IWPM_NL_TIMEOUT/HZ), nlmsg_request->nlmsg_seq);
  326. } else {
  327. ret = nlmsg_request->err_code;
  328. }
  329. kref_put(&nlmsg_request->kref, iwpm_free_nlmsg_request);
  330. return ret;
  331. }
  332. int iwpm_get_nlmsg_seq(void)
  333. {
  334. return atomic_inc_return(&iwpm_admin.nlmsg_seq);
  335. }
  336. int iwpm_valid_client(u8 nl_client)
  337. {
  338. if (nl_client >= RDMA_NL_NUM_CLIENTS)
  339. return 0;
  340. return iwpm_admin.client_list[nl_client];
  341. }
  342. void iwpm_set_valid(u8 nl_client, int valid)
  343. {
  344. if (nl_client >= RDMA_NL_NUM_CLIENTS)
  345. return;
  346. iwpm_admin.client_list[nl_client] = valid;
  347. }
  348. /* valid client */
  349. u32 iwpm_get_registration(u8 nl_client)
  350. {
  351. return iwpm_admin.reg_list[nl_client];
  352. }
  353. /* valid client */
  354. void iwpm_set_registration(u8 nl_client, u32 reg)
  355. {
  356. iwpm_admin.reg_list[nl_client] = reg;
  357. }
  358. /* valid client */
  359. u32 iwpm_check_registration(u8 nl_client, u32 reg)
  360. {
  361. return (iwpm_get_registration(nl_client) & reg);
  362. }
  363. int iwpm_compare_sockaddr(struct sockaddr_storage *a_sockaddr,
  364. struct sockaddr_storage *b_sockaddr)
  365. {
  366. if (a_sockaddr->ss_family != b_sockaddr->ss_family)
  367. return 1;
  368. if (a_sockaddr->ss_family == AF_INET) {
  369. struct sockaddr_in *a4_sockaddr =
  370. (struct sockaddr_in *)a_sockaddr;
  371. struct sockaddr_in *b4_sockaddr =
  372. (struct sockaddr_in *)b_sockaddr;
  373. if (!memcmp(&a4_sockaddr->sin_addr,
  374. &b4_sockaddr->sin_addr, sizeof(struct in_addr))
  375. && a4_sockaddr->sin_port == b4_sockaddr->sin_port)
  376. return 0;
  377. } else if (a_sockaddr->ss_family == AF_INET6) {
  378. struct sockaddr_in6 *a6_sockaddr =
  379. (struct sockaddr_in6 *)a_sockaddr;
  380. struct sockaddr_in6 *b6_sockaddr =
  381. (struct sockaddr_in6 *)b_sockaddr;
  382. if (!memcmp(&a6_sockaddr->sin6_addr,
  383. &b6_sockaddr->sin6_addr, sizeof(struct in6_addr))
  384. && a6_sockaddr->sin6_port == b6_sockaddr->sin6_port)
  385. return 0;
  386. } else {
  387. pr_err("%s: Invalid sockaddr family\n", __func__);
  388. }
  389. return 1;
  390. }
  391. struct sk_buff *iwpm_create_nlmsg(u32 nl_op, struct nlmsghdr **nlh,
  392. int nl_client)
  393. {
  394. struct sk_buff *skb = NULL;
  395. skb = dev_alloc_skb(IWPM_MSG_SIZE);
  396. if (!skb) {
  397. pr_err("%s Unable to allocate skb\n", __func__);
  398. goto create_nlmsg_exit;
  399. }
  400. if (!(ibnl_put_msg(skb, nlh, 0, 0, nl_client, nl_op,
  401. NLM_F_REQUEST))) {
  402. pr_warn("%s: Unable to put the nlmsg header\n", __func__);
  403. dev_kfree_skb(skb);
  404. skb = NULL;
  405. }
  406. create_nlmsg_exit:
  407. return skb;
  408. }
  409. int iwpm_parse_nlmsg(struct netlink_callback *cb, int policy_max,
  410. const struct nla_policy *nlmsg_policy,
  411. struct nlattr *nltb[], const char *msg_type)
  412. {
  413. int nlh_len = 0;
  414. int ret;
  415. const char *err_str = "";
  416. ret = nlmsg_validate(cb->nlh, nlh_len, policy_max - 1, nlmsg_policy,
  417. NULL);
  418. if (ret) {
  419. err_str = "Invalid attribute";
  420. goto parse_nlmsg_error;
  421. }
  422. ret = nlmsg_parse(cb->nlh, nlh_len, nltb, policy_max - 1,
  423. nlmsg_policy, NULL);
  424. if (ret) {
  425. err_str = "Unable to parse the nlmsg";
  426. goto parse_nlmsg_error;
  427. }
  428. ret = iwpm_validate_nlmsg_attr(nltb, policy_max);
  429. if (ret) {
  430. err_str = "Invalid NULL attribute";
  431. goto parse_nlmsg_error;
  432. }
  433. return 0;
  434. parse_nlmsg_error:
  435. pr_warn("%s: %s (msg type %s ret = %d)\n",
  436. __func__, err_str, msg_type, ret);
  437. return ret;
  438. }
  439. void iwpm_print_sockaddr(struct sockaddr_storage *sockaddr, char *msg)
  440. {
  441. struct sockaddr_in6 *sockaddr_v6;
  442. struct sockaddr_in *sockaddr_v4;
  443. switch (sockaddr->ss_family) {
  444. case AF_INET:
  445. sockaddr_v4 = (struct sockaddr_in *)sockaddr;
  446. pr_debug("%s IPV4 %pI4: %u(0x%04X)\n",
  447. msg, &sockaddr_v4->sin_addr,
  448. ntohs(sockaddr_v4->sin_port),
  449. ntohs(sockaddr_v4->sin_port));
  450. break;
  451. case AF_INET6:
  452. sockaddr_v6 = (struct sockaddr_in6 *)sockaddr;
  453. pr_debug("%s IPV6 %pI6: %u(0x%04X)\n",
  454. msg, &sockaddr_v6->sin6_addr,
  455. ntohs(sockaddr_v6->sin6_port),
  456. ntohs(sockaddr_v6->sin6_port));
  457. break;
  458. default:
  459. break;
  460. }
  461. }
  462. static u32 iwpm_ipv6_jhash(struct sockaddr_in6 *ipv6_sockaddr)
  463. {
  464. u32 ipv6_hash = jhash(&ipv6_sockaddr->sin6_addr, sizeof(struct in6_addr), 0);
  465. u32 hash = jhash_2words(ipv6_hash, (__force u32) ipv6_sockaddr->sin6_port, 0);
  466. return hash;
  467. }
  468. static u32 iwpm_ipv4_jhash(struct sockaddr_in *ipv4_sockaddr)
  469. {
  470. u32 ipv4_hash = jhash(&ipv4_sockaddr->sin_addr, sizeof(struct in_addr), 0);
  471. u32 hash = jhash_2words(ipv4_hash, (__force u32) ipv4_sockaddr->sin_port, 0);
  472. return hash;
  473. }
  474. static int get_hash_bucket(struct sockaddr_storage *a_sockaddr,
  475. struct sockaddr_storage *b_sockaddr, u32 *hash)
  476. {
  477. u32 a_hash, b_hash;
  478. if (a_sockaddr->ss_family == AF_INET) {
  479. a_hash = iwpm_ipv4_jhash((struct sockaddr_in *) a_sockaddr);
  480. b_hash = iwpm_ipv4_jhash((struct sockaddr_in *) b_sockaddr);
  481. } else if (a_sockaddr->ss_family == AF_INET6) {
  482. a_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) a_sockaddr);
  483. b_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) b_sockaddr);
  484. } else {
  485. pr_err("%s: Invalid sockaddr family\n", __func__);
  486. return -EINVAL;
  487. }
  488. if (a_hash == b_hash) /* if port mapper isn't available */
  489. *hash = a_hash;
  490. else
  491. *hash = jhash_2words(a_hash, b_hash, 0);
  492. return 0;
  493. }
  494. static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage
  495. *local_sockaddr, struct sockaddr_storage
  496. *mapped_sockaddr)
  497. {
  498. u32 hash;
  499. int ret;
  500. ret = get_hash_bucket(local_sockaddr, mapped_sockaddr, &hash);
  501. if (ret)
  502. return NULL;
  503. return &iwpm_hash_bucket[hash & IWPM_MAPINFO_HASH_MASK];
  504. }
  505. static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage
  506. *mapped_loc_sockaddr, struct sockaddr_storage
  507. *mapped_rem_sockaddr)
  508. {
  509. u32 hash;
  510. int ret;
  511. ret = get_hash_bucket(mapped_loc_sockaddr, mapped_rem_sockaddr, &hash);
  512. if (ret)
  513. return NULL;
  514. return &iwpm_reminfo_bucket[hash & IWPM_REMINFO_HASH_MASK];
  515. }
  516. static int send_mapinfo_num(u32 mapping_num, u8 nl_client, int iwpm_pid)
  517. {
  518. struct sk_buff *skb = NULL;
  519. struct nlmsghdr *nlh;
  520. u32 msg_seq;
  521. const char *err_str = "";
  522. int ret = -EINVAL;
  523. skb = iwpm_create_nlmsg(RDMA_NL_IWPM_MAPINFO_NUM, &nlh, nl_client);
  524. if (!skb) {
  525. err_str = "Unable to create a nlmsg";
  526. goto mapinfo_num_error;
  527. }
  528. nlh->nlmsg_seq = iwpm_get_nlmsg_seq();
  529. msg_seq = 0;
  530. err_str = "Unable to put attribute of mapinfo number nlmsg";
  531. ret = ibnl_put_attr(skb, nlh, sizeof(u32), &msg_seq, IWPM_NLA_MAPINFO_SEQ);
  532. if (ret)
  533. goto mapinfo_num_error;
  534. ret = ibnl_put_attr(skb, nlh, sizeof(u32),
  535. &mapping_num, IWPM_NLA_MAPINFO_SEND_NUM);
  536. if (ret)
  537. goto mapinfo_num_error;
  538. ret = ibnl_unicast(skb, nlh, iwpm_pid);
  539. if (ret) {
  540. skb = NULL;
  541. err_str = "Unable to send a nlmsg";
  542. goto mapinfo_num_error;
  543. }
  544. pr_debug("%s: Sent mapping number = %d\n", __func__, mapping_num);
  545. return 0;
  546. mapinfo_num_error:
  547. pr_info("%s: %s\n", __func__, err_str);
  548. if (skb)
  549. dev_kfree_skb(skb);
  550. return ret;
  551. }
  552. static int send_nlmsg_done(struct sk_buff *skb, u8 nl_client, int iwpm_pid)
  553. {
  554. struct nlmsghdr *nlh = NULL;
  555. int ret = 0;
  556. if (!skb)
  557. return ret;
  558. if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
  559. RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
  560. pr_warn("%s Unable to put NLMSG_DONE\n", __func__);
  561. dev_kfree_skb(skb);
  562. return -ENOMEM;
  563. }
  564. nlh->nlmsg_type = NLMSG_DONE;
  565. ret = ibnl_unicast(skb, (struct nlmsghdr *)skb->data, iwpm_pid);
  566. if (ret)
  567. pr_warn("%s Unable to send a nlmsg\n", __func__);
  568. return ret;
  569. }
  570. int iwpm_send_mapinfo(u8 nl_client, int iwpm_pid)
  571. {
  572. struct iwpm_mapping_info *map_info;
  573. struct sk_buff *skb = NULL;
  574. struct nlmsghdr *nlh;
  575. int skb_num = 0, mapping_num = 0;
  576. int i = 0, nlmsg_bytes = 0;
  577. unsigned long flags;
  578. const char *err_str = "";
  579. int ret;
  580. skb = dev_alloc_skb(NLMSG_GOODSIZE);
  581. if (!skb) {
  582. ret = -ENOMEM;
  583. err_str = "Unable to allocate skb";
  584. goto send_mapping_info_exit;
  585. }
  586. skb_num++;
  587. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  588. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  589. hlist_for_each_entry(map_info, &iwpm_hash_bucket[i],
  590. hlist_node) {
  591. if (map_info->nl_client != nl_client)
  592. continue;
  593. nlh = NULL;
  594. if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
  595. RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
  596. ret = -ENOMEM;
  597. err_str = "Unable to put the nlmsg header";
  598. goto send_mapping_info_unlock;
  599. }
  600. err_str = "Unable to put attribute of the nlmsg";
  601. ret = ibnl_put_attr(skb, nlh,
  602. sizeof(struct sockaddr_storage),
  603. &map_info->local_sockaddr,
  604. IWPM_NLA_MAPINFO_LOCAL_ADDR);
  605. if (ret)
  606. goto send_mapping_info_unlock;
  607. ret = ibnl_put_attr(skb, nlh,
  608. sizeof(struct sockaddr_storage),
  609. &map_info->mapped_sockaddr,
  610. IWPM_NLA_MAPINFO_MAPPED_ADDR);
  611. if (ret)
  612. goto send_mapping_info_unlock;
  613. iwpm_print_sockaddr(&map_info->local_sockaddr,
  614. "send_mapping_info: Local sockaddr:");
  615. iwpm_print_sockaddr(&map_info->mapped_sockaddr,
  616. "send_mapping_info: Mapped local sockaddr:");
  617. mapping_num++;
  618. nlmsg_bytes += nlh->nlmsg_len;
  619. /* check if all mappings can fit in one skb */
  620. if (NLMSG_GOODSIZE - nlmsg_bytes < nlh->nlmsg_len * 2) {
  621. /* and leave room for NLMSG_DONE */
  622. nlmsg_bytes = 0;
  623. skb_num++;
  624. spin_unlock_irqrestore(&iwpm_mapinfo_lock,
  625. flags);
  626. /* send the skb */
  627. ret = send_nlmsg_done(skb, nl_client, iwpm_pid);
  628. skb = NULL;
  629. if (ret) {
  630. err_str = "Unable to send map info";
  631. goto send_mapping_info_exit;
  632. }
  633. if (skb_num == IWPM_MAPINFO_SKB_COUNT) {
  634. ret = -ENOMEM;
  635. err_str = "Insufficient skbs for map info";
  636. goto send_mapping_info_exit;
  637. }
  638. skb = dev_alloc_skb(NLMSG_GOODSIZE);
  639. if (!skb) {
  640. ret = -ENOMEM;
  641. err_str = "Unable to allocate skb";
  642. goto send_mapping_info_exit;
  643. }
  644. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  645. }
  646. }
  647. }
  648. send_mapping_info_unlock:
  649. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  650. send_mapping_info_exit:
  651. if (ret) {
  652. pr_warn("%s: %s (ret = %d)\n", __func__, err_str, ret);
  653. if (skb)
  654. dev_kfree_skb(skb);
  655. return ret;
  656. }
  657. send_nlmsg_done(skb, nl_client, iwpm_pid);
  658. return send_mapinfo_num(mapping_num, nl_client, iwpm_pid);
  659. }
  660. int iwpm_mapinfo_available(void)
  661. {
  662. unsigned long flags;
  663. int full_bucket = 0, i = 0;
  664. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  665. if (iwpm_hash_bucket) {
  666. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  667. if (!hlist_empty(&iwpm_hash_bucket[i])) {
  668. full_bucket = 1;
  669. break;
  670. }
  671. }
  672. }
  673. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  674. return full_bucket;
  675. }