]>
Commit | Line | Data |
---|---|---|
30dc5e63 TN |
1 | /* |
2 | * Copyright (c) 2014 Chelsio, Inc. All rights reserved. | |
3 | * Copyright (c) 2014 Intel Corporation. All rights reserved. | |
4 | * | |
5 | * This software is available to you under a choice of one of two | |
6 | * licenses. You may choose to be licensed under the terms of the GNU | |
7 | * General Public License (GPL) Version 2, available from the file | |
8 | * COPYING in the main directory of this source tree, or the | |
9 | * OpenIB.org BSD license below: | |
10 | * | |
11 | * Redistribution and use in source and binary forms, with or | |
12 | * without modification, are permitted provided that the following | |
13 | * conditions are met: | |
14 | * | |
15 | * - Redistributions of source code must retain the above | |
16 | * copyright notice, this list of conditions and the following | |
17 | * disclaimer. | |
18 | * | |
19 | * - Redistributions in binary form must reproduce the above | |
20 | * copyright notice, this list of conditions and the following | |
21 | * disclaimer in the documentation and/or other materials | |
22 | * provided with the distribution. | |
23 | * | |
24 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, | |
25 | * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF | |
26 | * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND | |
27 | * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS | |
28 | * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN | |
29 | * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN | |
30 | * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | |
31 | * SOFTWARE. | |
32 | */ | |
33 | ||
34 | #include "iwpm_util.h" | |
35 | ||
6eec1774 TN |
36 | #define IWPM_MAPINFO_HASH_SIZE 512 |
37 | #define IWPM_MAPINFO_HASH_MASK (IWPM_MAPINFO_HASH_SIZE - 1) | |
38 | #define IWPM_REMINFO_HASH_SIZE 64 | |
39 | #define IWPM_REMINFO_HASH_MASK (IWPM_REMINFO_HASH_SIZE - 1) | |
e972dabf | 40 | #define IWPM_MSG_SIZE 512 |
30dc5e63 TN |
41 | |
42 | static LIST_HEAD(iwpm_nlmsg_req_list); | |
43 | static DEFINE_SPINLOCK(iwpm_nlmsg_req_lock); | |
44 | ||
45 | static struct hlist_head *iwpm_hash_bucket; | |
46 | static DEFINE_SPINLOCK(iwpm_mapinfo_lock); | |
47 | ||
6eec1774 TN |
48 | static struct hlist_head *iwpm_reminfo_bucket; |
49 | static DEFINE_SPINLOCK(iwpm_reminfo_lock); | |
50 | ||
30dc5e63 TN |
51 | static DEFINE_MUTEX(iwpm_admin_lock); |
52 | static struct iwpm_admin_data iwpm_admin; | |
53 | ||
a2bfd708 SW |
54 | /** |
55 | * iwpm_init - Allocate resources for the iwarp port mapper | |
56 | * @nl_client: The index of the netlink client | |
57 | * | |
58 | * Should be called when network interface goes up. | |
59 | */ | |
30dc5e63 TN |
60 | int iwpm_init(u8 nl_client) |
61 | { | |
6eec1774 | 62 | int ret = 0; |
30dc5e63 TN |
63 | mutex_lock(&iwpm_admin_lock); |
64 | if (atomic_read(&iwpm_admin.refcount) == 0) { | |
6396bb22 KC |
65 | iwpm_hash_bucket = kcalloc(IWPM_MAPINFO_HASH_SIZE, |
66 | sizeof(struct hlist_head), | |
67 | GFP_KERNEL); | |
30dc5e63 | 68 | if (!iwpm_hash_bucket) { |
6eec1774 | 69 | ret = -ENOMEM; |
6eec1774 TN |
70 | goto init_exit; |
71 | } | |
6396bb22 KC |
72 | iwpm_reminfo_bucket = kcalloc(IWPM_REMINFO_HASH_SIZE, |
73 | sizeof(struct hlist_head), | |
74 | GFP_KERNEL); | |
6eec1774 TN |
75 | if (!iwpm_reminfo_bucket) { |
76 | kfree(iwpm_hash_bucket); | |
77 | ret = -ENOMEM; | |
6eec1774 | 78 | goto init_exit; |
30dc5e63 TN |
79 | } |
80 | } | |
81 | atomic_inc(&iwpm_admin.refcount); | |
6eec1774 | 82 | init_exit: |
30dc5e63 | 83 | mutex_unlock(&iwpm_admin_lock); |
6eec1774 TN |
84 | if (!ret) { |
85 | iwpm_set_valid(nl_client, 1); | |
a7f2f24c | 86 | iwpm_set_registration(nl_client, IWPM_REG_UNDEF); |
6eec1774 TN |
87 | pr_debug("%s: Mapinfo and reminfo tables are created\n", |
88 | __func__); | |
89 | } | |
90 | return ret; | |
30dc5e63 | 91 | } |
30dc5e63 TN |
92 | |
93 | static void free_hash_bucket(void); | |
6eec1774 | 94 | static void free_reminfo_bucket(void); |
30dc5e63 | 95 | |
a2bfd708 SW |
96 | /** |
97 | * iwpm_exit - Deallocate resources for the iwarp port mapper | |
98 | * @nl_client: The index of the netlink client | |
99 | * | |
100 | * Should be called when network interface goes down. | |
101 | */ | |
30dc5e63 TN |
102 | int iwpm_exit(u8 nl_client) |
103 | { | |
104 | ||
105 | if (!iwpm_valid_client(nl_client)) | |
106 | return -EINVAL; | |
107 | mutex_lock(&iwpm_admin_lock); | |
108 | if (atomic_read(&iwpm_admin.refcount) == 0) { | |
109 | mutex_unlock(&iwpm_admin_lock); | |
110 | pr_err("%s Incorrect usage - negative refcount\n", __func__); | |
111 | return -EINVAL; | |
112 | } | |
113 | if (atomic_dec_and_test(&iwpm_admin.refcount)) { | |
114 | free_hash_bucket(); | |
6eec1774 TN |
115 | free_reminfo_bucket(); |
116 | pr_debug("%s: Resources are destroyed\n", __func__); | |
30dc5e63 TN |
117 | } |
118 | mutex_unlock(&iwpm_admin_lock); | |
119 | iwpm_set_valid(nl_client, 0); | |
a7f2f24c | 120 | iwpm_set_registration(nl_client, IWPM_REG_UNDEF); |
30dc5e63 TN |
121 | return 0; |
122 | } | |
30dc5e63 | 123 | |
6eec1774 | 124 | static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage *, |
30dc5e63 TN |
125 | struct sockaddr_storage *); |
126 | ||
a2bfd708 SW |
127 | /** |
128 | * iwpm_create_mapinfo - Store local and mapped IPv4/IPv6 address | |
129 | * info in a hash table | |
130 | * @local_addr: Local ip/tcp address | |
131 | * @mapped_addr: Mapped local ip/tcp address | |
132 | * @nl_client: The index of the netlink client | |
133 | * @map_flags: IWPM mapping flags | |
134 | */ | |
30dc5e63 TN |
135 | int iwpm_create_mapinfo(struct sockaddr_storage *local_sockaddr, |
136 | struct sockaddr_storage *mapped_sockaddr, | |
b0bad9ad | 137 | u8 nl_client, u32 map_flags) |
30dc5e63 | 138 | { |
f96416ce | 139 | struct hlist_head *hash_bucket_head = NULL; |
30dc5e63 TN |
140 | struct iwpm_mapping_info *map_info; |
141 | unsigned long flags; | |
6eec1774 | 142 | int ret = -EINVAL; |
30dc5e63 TN |
143 | |
144 | if (!iwpm_valid_client(nl_client)) | |
6eec1774 | 145 | return ret; |
30dc5e63 | 146 | map_info = kzalloc(sizeof(struct iwpm_mapping_info), GFP_KERNEL); |
a0b3455f | 147 | if (!map_info) |
30dc5e63 | 148 | return -ENOMEM; |
a0b3455f | 149 | |
30dc5e63 TN |
150 | memcpy(&map_info->local_sockaddr, local_sockaddr, |
151 | sizeof(struct sockaddr_storage)); | |
152 | memcpy(&map_info->mapped_sockaddr, mapped_sockaddr, | |
153 | sizeof(struct sockaddr_storage)); | |
154 | map_info->nl_client = nl_client; | |
b0bad9ad | 155 | map_info->map_flags = map_flags; |
30dc5e63 TN |
156 | |
157 | spin_lock_irqsave(&iwpm_mapinfo_lock, flags); | |
158 | if (iwpm_hash_bucket) { | |
6eec1774 | 159 | hash_bucket_head = get_mapinfo_hash_bucket( |
30dc5e63 TN |
160 | &map_info->local_sockaddr, |
161 | &map_info->mapped_sockaddr); | |
6eec1774 TN |
162 | if (hash_bucket_head) { |
163 | hlist_add_head(&map_info->hlist_node, hash_bucket_head); | |
164 | ret = 0; | |
165 | } | |
30dc5e63 TN |
166 | } |
167 | spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags); | |
f96416ce CIK |
168 | |
169 | if (!hash_bucket_head) | |
170 | kfree(map_info); | |
6eec1774 | 171 | return ret; |
30dc5e63 | 172 | } |
30dc5e63 | 173 | |
a2bfd708 SW |
174 | /** |
175 | * iwpm_remove_mapinfo - Remove local and mapped IPv4/IPv6 address | |
176 | * info from the hash table | |
177 | * @local_addr: Local ip/tcp address | |
178 | * @mapped_local_addr: Mapped local ip/tcp address | |
179 | * | |
180 | * Returns err code if mapping info is not found in the hash table, | |
181 | * otherwise returns 0 | |
182 | */ | |
30dc5e63 TN |
183 | int iwpm_remove_mapinfo(struct sockaddr_storage *local_sockaddr, |
184 | struct sockaddr_storage *mapped_local_addr) | |
185 | { | |
186 | struct hlist_node *tmp_hlist_node; | |
187 | struct hlist_head *hash_bucket_head; | |
188 | struct iwpm_mapping_info *map_info = NULL; | |
189 | unsigned long flags; | |
190 | int ret = -EINVAL; | |
191 | ||
192 | spin_lock_irqsave(&iwpm_mapinfo_lock, flags); | |
193 | if (iwpm_hash_bucket) { | |
6eec1774 | 194 | hash_bucket_head = get_mapinfo_hash_bucket( |
30dc5e63 TN |
195 | local_sockaddr, |
196 | mapped_local_addr); | |
6eec1774 TN |
197 | if (!hash_bucket_head) |
198 | goto remove_mapinfo_exit; | |
199 | ||
30dc5e63 TN |
200 | hlist_for_each_entry_safe(map_info, tmp_hlist_node, |
201 | hash_bucket_head, hlist_node) { | |
202 | ||
203 | if (!iwpm_compare_sockaddr(&map_info->mapped_sockaddr, | |
204 | mapped_local_addr)) { | |
205 | ||
206 | hlist_del_init(&map_info->hlist_node); | |
207 | kfree(map_info); | |
208 | ret = 0; | |
209 | break; | |
210 | } | |
211 | } | |
212 | } | |
6eec1774 | 213 | remove_mapinfo_exit: |
30dc5e63 TN |
214 | spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags); |
215 | return ret; | |
216 | } | |
30dc5e63 TN |
217 | |
218 | static void free_hash_bucket(void) | |
219 | { | |
220 | struct hlist_node *tmp_hlist_node; | |
221 | struct iwpm_mapping_info *map_info; | |
222 | unsigned long flags; | |
223 | int i; | |
224 | ||
225 | /* remove all the mapinfo data from the list */ | |
226 | spin_lock_irqsave(&iwpm_mapinfo_lock, flags); | |
6eec1774 | 227 | for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) { |
30dc5e63 TN |
228 | hlist_for_each_entry_safe(map_info, tmp_hlist_node, |
229 | &iwpm_hash_bucket[i], hlist_node) { | |
230 | ||
231 | hlist_del_init(&map_info->hlist_node); | |
232 | kfree(map_info); | |
233 | } | |
234 | } | |
235 | /* free the hash list */ | |
236 | kfree(iwpm_hash_bucket); | |
237 | iwpm_hash_bucket = NULL; | |
238 | spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags); | |
239 | } | |
240 | ||
6eec1774 TN |
241 | static void free_reminfo_bucket(void) |
242 | { | |
243 | struct hlist_node *tmp_hlist_node; | |
244 | struct iwpm_remote_info *rem_info; | |
245 | unsigned long flags; | |
246 | int i; | |
247 | ||
248 | /* remove all the remote info from the list */ | |
249 | spin_lock_irqsave(&iwpm_reminfo_lock, flags); | |
250 | for (i = 0; i < IWPM_REMINFO_HASH_SIZE; i++) { | |
251 | hlist_for_each_entry_safe(rem_info, tmp_hlist_node, | |
252 | &iwpm_reminfo_bucket[i], hlist_node) { | |
253 | ||
254 | hlist_del_init(&rem_info->hlist_node); | |
255 | kfree(rem_info); | |
256 | } | |
257 | } | |
258 | /* free the hash list */ | |
259 | kfree(iwpm_reminfo_bucket); | |
260 | iwpm_reminfo_bucket = NULL; | |
261 | spin_unlock_irqrestore(&iwpm_reminfo_lock, flags); | |
262 | } | |
263 | ||
264 | static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage *, | |
265 | struct sockaddr_storage *); | |
266 | ||
267 | void iwpm_add_remote_info(struct iwpm_remote_info *rem_info) | |
268 | { | |
269 | struct hlist_head *hash_bucket_head; | |
270 | unsigned long flags; | |
271 | ||
272 | spin_lock_irqsave(&iwpm_reminfo_lock, flags); | |
273 | if (iwpm_reminfo_bucket) { | |
274 | hash_bucket_head = get_reminfo_hash_bucket( | |
275 | &rem_info->mapped_loc_sockaddr, | |
276 | &rem_info->mapped_rem_sockaddr); | |
277 | if (hash_bucket_head) | |
278 | hlist_add_head(&rem_info->hlist_node, hash_bucket_head); | |
279 | } | |
280 | spin_unlock_irqrestore(&iwpm_reminfo_lock, flags); | |
281 | } | |
282 | ||
a2bfd708 SW |
283 | /** |
284 | * iwpm_get_remote_info - Get the remote connecting peer address info | |
285 | * | |
286 | * @mapped_loc_addr: Mapped local address of the listening peer | |
287 | * @mapped_rem_addr: Mapped remote address of the connecting peer | |
288 | * @remote_addr: To store the remote address of the connecting peer | |
289 | * @nl_client: The index of the netlink client | |
290 | * | |
291 | * The remote address info is retrieved and provided to the client in | |
292 | * the remote_addr. After that it is removed from the hash table | |
293 | */ | |
6eec1774 | 294 | int iwpm_get_remote_info(struct sockaddr_storage *mapped_loc_addr, |
dafb5587 FL |
295 | struct sockaddr_storage *mapped_rem_addr, |
296 | struct sockaddr_storage *remote_addr, | |
297 | u8 nl_client) | |
6eec1774 TN |
298 | { |
299 | struct hlist_node *tmp_hlist_node; | |
300 | struct hlist_head *hash_bucket_head; | |
301 | struct iwpm_remote_info *rem_info = NULL; | |
302 | unsigned long flags; | |
303 | int ret = -EINVAL; | |
304 | ||
305 | if (!iwpm_valid_client(nl_client)) { | |
306 | pr_info("%s: Invalid client = %d\n", __func__, nl_client); | |
307 | return ret; | |
308 | } | |
309 | spin_lock_irqsave(&iwpm_reminfo_lock, flags); | |
310 | if (iwpm_reminfo_bucket) { | |
311 | hash_bucket_head = get_reminfo_hash_bucket( | |
312 | mapped_loc_addr, | |
313 | mapped_rem_addr); | |
314 | if (!hash_bucket_head) | |
315 | goto get_remote_info_exit; | |
316 | hlist_for_each_entry_safe(rem_info, tmp_hlist_node, | |
317 | hash_bucket_head, hlist_node) { | |
318 | ||
319 | if (!iwpm_compare_sockaddr(&rem_info->mapped_loc_sockaddr, | |
320 | mapped_loc_addr) && | |
321 | !iwpm_compare_sockaddr(&rem_info->mapped_rem_sockaddr, | |
322 | mapped_rem_addr)) { | |
323 | ||
324 | memcpy(remote_addr, &rem_info->remote_sockaddr, | |
325 | sizeof(struct sockaddr_storage)); | |
326 | iwpm_print_sockaddr(remote_addr, | |
327 | "get_remote_info: Remote sockaddr:"); | |
328 | ||
329 | hlist_del_init(&rem_info->hlist_node); | |
330 | kfree(rem_info); | |
331 | ret = 0; | |
332 | break; | |
333 | } | |
334 | } | |
335 | } | |
336 | get_remote_info_exit: | |
337 | spin_unlock_irqrestore(&iwpm_reminfo_lock, flags); | |
338 | return ret; | |
339 | } | |
6eec1774 | 340 | |
30dc5e63 TN |
341 | struct iwpm_nlmsg_request *iwpm_get_nlmsg_request(__u32 nlmsg_seq, |
342 | u8 nl_client, gfp_t gfp) | |
343 | { | |
344 | struct iwpm_nlmsg_request *nlmsg_request = NULL; | |
345 | unsigned long flags; | |
346 | ||
347 | nlmsg_request = kzalloc(sizeof(struct iwpm_nlmsg_request), gfp); | |
a0b3455f | 348 | if (!nlmsg_request) |
30dc5e63 | 349 | return NULL; |
a0b3455f | 350 | |
30dc5e63 TN |
351 | spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags); |
352 | list_add_tail(&nlmsg_request->inprocess_list, &iwpm_nlmsg_req_list); | |
353 | spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags); | |
354 | ||
355 | kref_init(&nlmsg_request->kref); | |
356 | kref_get(&nlmsg_request->kref); | |
357 | nlmsg_request->nlmsg_seq = nlmsg_seq; | |
358 | nlmsg_request->nl_client = nl_client; | |
359 | nlmsg_request->request_done = 0; | |
360 | nlmsg_request->err_code = 0; | |
dafb5587 FL |
361 | sema_init(&nlmsg_request->sem, 1); |
362 | down(&nlmsg_request->sem); | |
30dc5e63 TN |
363 | return nlmsg_request; |
364 | } | |
365 | ||
366 | void iwpm_free_nlmsg_request(struct kref *kref) | |
367 | { | |
368 | struct iwpm_nlmsg_request *nlmsg_request; | |
369 | unsigned long flags; | |
370 | ||
371 | nlmsg_request = container_of(kref, struct iwpm_nlmsg_request, kref); | |
372 | ||
373 | spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags); | |
374 | list_del_init(&nlmsg_request->inprocess_list); | |
375 | spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags); | |
376 | ||
377 | if (!nlmsg_request->request_done) | |
378 | pr_debug("%s Freeing incomplete nlmsg request (seq = %u).\n", | |
379 | __func__, nlmsg_request->nlmsg_seq); | |
380 | kfree(nlmsg_request); | |
381 | } | |
382 | ||
383 | struct iwpm_nlmsg_request *iwpm_find_nlmsg_request(__u32 echo_seq) | |
384 | { | |
385 | struct iwpm_nlmsg_request *nlmsg_request; | |
386 | struct iwpm_nlmsg_request *found_request = NULL; | |
387 | unsigned long flags; | |
388 | ||
389 | spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags); | |
390 | list_for_each_entry(nlmsg_request, &iwpm_nlmsg_req_list, | |
391 | inprocess_list) { | |
392 | if (nlmsg_request->nlmsg_seq == echo_seq) { | |
393 | found_request = nlmsg_request; | |
394 | kref_get(&nlmsg_request->kref); | |
395 | break; | |
396 | } | |
397 | } | |
398 | spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags); | |
399 | return found_request; | |
400 | } | |
401 | ||
402 | int iwpm_wait_complete_req(struct iwpm_nlmsg_request *nlmsg_request) | |
403 | { | |
404 | int ret; | |
30dc5e63 | 405 | |
dafb5587 FL |
406 | ret = down_timeout(&nlmsg_request->sem, IWPM_NL_TIMEOUT); |
407 | if (ret) { | |
30dc5e63 TN |
408 | ret = -EINVAL; |
409 | pr_info("%s: Timeout %d sec for netlink request (seq = %u)\n", | |
410 | __func__, (IWPM_NL_TIMEOUT/HZ), nlmsg_request->nlmsg_seq); | |
411 | } else { | |
412 | ret = nlmsg_request->err_code; | |
413 | } | |
414 | kref_put(&nlmsg_request->kref, iwpm_free_nlmsg_request); | |
415 | return ret; | |
416 | } | |
417 | ||
418 | int iwpm_get_nlmsg_seq(void) | |
419 | { | |
420 | return atomic_inc_return(&iwpm_admin.nlmsg_seq); | |
421 | } | |
422 | ||
423 | int iwpm_valid_client(u8 nl_client) | |
424 | { | |
30dc5e63 TN |
425 | return iwpm_admin.client_list[nl_client]; |
426 | } | |
427 | ||
428 | void iwpm_set_valid(u8 nl_client, int valid) | |
429 | { | |
30dc5e63 TN |
430 | iwpm_admin.client_list[nl_client] = valid; |
431 | } | |
432 | ||
433 | /* valid client */ | |
a7f2f24c | 434 | u32 iwpm_get_registration(u8 nl_client) |
30dc5e63 TN |
435 | { |
436 | return iwpm_admin.reg_list[nl_client]; | |
437 | } | |
438 | ||
439 | /* valid client */ | |
a7f2f24c | 440 | void iwpm_set_registration(u8 nl_client, u32 reg) |
30dc5e63 TN |
441 | { |
442 | iwpm_admin.reg_list[nl_client] = reg; | |
443 | } | |
444 | ||
a7f2f24c TN |
445 | /* valid client */ |
446 | u32 iwpm_check_registration(u8 nl_client, u32 reg) | |
447 | { | |
448 | return (iwpm_get_registration(nl_client) & reg); | |
449 | } | |
450 | ||
30dc5e63 TN |
451 | int iwpm_compare_sockaddr(struct sockaddr_storage *a_sockaddr, |
452 | struct sockaddr_storage *b_sockaddr) | |
453 | { | |
454 | if (a_sockaddr->ss_family != b_sockaddr->ss_family) | |
455 | return 1; | |
456 | if (a_sockaddr->ss_family == AF_INET) { | |
457 | struct sockaddr_in *a4_sockaddr = | |
458 | (struct sockaddr_in *)a_sockaddr; | |
459 | struct sockaddr_in *b4_sockaddr = | |
460 | (struct sockaddr_in *)b_sockaddr; | |
461 | if (!memcmp(&a4_sockaddr->sin_addr, | |
462 | &b4_sockaddr->sin_addr, sizeof(struct in_addr)) | |
463 | && a4_sockaddr->sin_port == b4_sockaddr->sin_port) | |
464 | return 0; | |
465 | ||
466 | } else if (a_sockaddr->ss_family == AF_INET6) { | |
467 | struct sockaddr_in6 *a6_sockaddr = | |
468 | (struct sockaddr_in6 *)a_sockaddr; | |
469 | struct sockaddr_in6 *b6_sockaddr = | |
470 | (struct sockaddr_in6 *)b_sockaddr; | |
471 | if (!memcmp(&a6_sockaddr->sin6_addr, | |
472 | &b6_sockaddr->sin6_addr, sizeof(struct in6_addr)) | |
473 | && a6_sockaddr->sin6_port == b6_sockaddr->sin6_port) | |
474 | return 0; | |
475 | ||
476 | } else { | |
477 | pr_err("%s: Invalid sockaddr family\n", __func__); | |
478 | } | |
479 | return 1; | |
480 | } | |
481 | ||
482 | struct sk_buff *iwpm_create_nlmsg(u32 nl_op, struct nlmsghdr **nlh, | |
483 | int nl_client) | |
484 | { | |
485 | struct sk_buff *skb = NULL; | |
486 | ||
e972dabf | 487 | skb = dev_alloc_skb(IWPM_MSG_SIZE); |
c7ec8377 | 488 | if (!skb) |
30dc5e63 | 489 | goto create_nlmsg_exit; |
c7ec8377 | 490 | |
30dc5e63 TN |
491 | if (!(ibnl_put_msg(skb, nlh, 0, 0, nl_client, nl_op, |
492 | NLM_F_REQUEST))) { | |
493 | pr_warn("%s: Unable to put the nlmsg header\n", __func__); | |
494 | dev_kfree_skb(skb); | |
495 | skb = NULL; | |
496 | } | |
497 | create_nlmsg_exit: | |
498 | return skb; | |
499 | } | |
500 | ||
501 | int iwpm_parse_nlmsg(struct netlink_callback *cb, int policy_max, | |
502 | const struct nla_policy *nlmsg_policy, | |
503 | struct nlattr *nltb[], const char *msg_type) | |
504 | { | |
505 | int nlh_len = 0; | |
506 | int ret; | |
507 | const char *err_str = ""; | |
508 | ||
fceb6435 JB |
509 | ret = nlmsg_validate(cb->nlh, nlh_len, policy_max - 1, nlmsg_policy, |
510 | NULL); | |
30dc5e63 TN |
511 | if (ret) { |
512 | err_str = "Invalid attribute"; | |
513 | goto parse_nlmsg_error; | |
514 | } | |
fceb6435 JB |
515 | ret = nlmsg_parse(cb->nlh, nlh_len, nltb, policy_max - 1, |
516 | nlmsg_policy, NULL); | |
30dc5e63 TN |
517 | if (ret) { |
518 | err_str = "Unable to parse the nlmsg"; | |
519 | goto parse_nlmsg_error; | |
520 | } | |
521 | ret = iwpm_validate_nlmsg_attr(nltb, policy_max); | |
522 | if (ret) { | |
523 | err_str = "Invalid NULL attribute"; | |
524 | goto parse_nlmsg_error; | |
525 | } | |
526 | return 0; | |
527 | parse_nlmsg_error: | |
528 | pr_warn("%s: %s (msg type %s ret = %d)\n", | |
529 | __func__, err_str, msg_type, ret); | |
530 | return ret; | |
531 | } | |
532 | ||
533 | void iwpm_print_sockaddr(struct sockaddr_storage *sockaddr, char *msg) | |
534 | { | |
535 | struct sockaddr_in6 *sockaddr_v6; | |
536 | struct sockaddr_in *sockaddr_v4; | |
537 | ||
538 | switch (sockaddr->ss_family) { | |
539 | case AF_INET: | |
540 | sockaddr_v4 = (struct sockaddr_in *)sockaddr; | |
541 | pr_debug("%s IPV4 %pI4: %u(0x%04X)\n", | |
542 | msg, &sockaddr_v4->sin_addr, | |
543 | ntohs(sockaddr_v4->sin_port), | |
544 | ntohs(sockaddr_v4->sin_port)); | |
545 | break; | |
546 | case AF_INET6: | |
547 | sockaddr_v6 = (struct sockaddr_in6 *)sockaddr; | |
548 | pr_debug("%s IPV6 %pI6: %u(0x%04X)\n", | |
549 | msg, &sockaddr_v6->sin6_addr, | |
550 | ntohs(sockaddr_v6->sin6_port), | |
551 | ntohs(sockaddr_v6->sin6_port)); | |
552 | break; | |
553 | default: | |
554 | break; | |
555 | } | |
556 | } | |
557 | ||
558 | static u32 iwpm_ipv6_jhash(struct sockaddr_in6 *ipv6_sockaddr) | |
559 | { | |
560 | u32 ipv6_hash = jhash(&ipv6_sockaddr->sin6_addr, sizeof(struct in6_addr), 0); | |
561 | u32 hash = jhash_2words(ipv6_hash, (__force u32) ipv6_sockaddr->sin6_port, 0); | |
562 | return hash; | |
563 | } | |
564 | ||
565 | static u32 iwpm_ipv4_jhash(struct sockaddr_in *ipv4_sockaddr) | |
566 | { | |
567 | u32 ipv4_hash = jhash(&ipv4_sockaddr->sin_addr, sizeof(struct in_addr), 0); | |
568 | u32 hash = jhash_2words(ipv4_hash, (__force u32) ipv4_sockaddr->sin_port, 0); | |
569 | return hash; | |
570 | } | |
571 | ||
6eec1774 TN |
572 | static int get_hash_bucket(struct sockaddr_storage *a_sockaddr, |
573 | struct sockaddr_storage *b_sockaddr, u32 *hash) | |
30dc5e63 | 574 | { |
6eec1774 | 575 | u32 a_hash, b_hash; |
30dc5e63 | 576 | |
6eec1774 TN |
577 | if (a_sockaddr->ss_family == AF_INET) { |
578 | a_hash = iwpm_ipv4_jhash((struct sockaddr_in *) a_sockaddr); | |
579 | b_hash = iwpm_ipv4_jhash((struct sockaddr_in *) b_sockaddr); | |
30dc5e63 | 580 | |
6eec1774 TN |
581 | } else if (a_sockaddr->ss_family == AF_INET6) { |
582 | a_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) a_sockaddr); | |
583 | b_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) b_sockaddr); | |
30dc5e63 TN |
584 | } else { |
585 | pr_err("%s: Invalid sockaddr family\n", __func__); | |
6eec1774 | 586 | return -EINVAL; |
30dc5e63 TN |
587 | } |
588 | ||
6eec1774 TN |
589 | if (a_hash == b_hash) /* if port mapper isn't available */ |
590 | *hash = a_hash; | |
30dc5e63 | 591 | else |
6eec1774 TN |
592 | *hash = jhash_2words(a_hash, b_hash, 0); |
593 | return 0; | |
594 | } | |
595 | ||
596 | static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage | |
597 | *local_sockaddr, struct sockaddr_storage | |
598 | *mapped_sockaddr) | |
599 | { | |
600 | u32 hash; | |
601 | int ret; | |
30dc5e63 | 602 | |
6eec1774 TN |
603 | ret = get_hash_bucket(local_sockaddr, mapped_sockaddr, &hash); |
604 | if (ret) | |
605 | return NULL; | |
606 | return &iwpm_hash_bucket[hash & IWPM_MAPINFO_HASH_MASK]; | |
607 | } | |
608 | ||
609 | static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage | |
610 | *mapped_loc_sockaddr, struct sockaddr_storage | |
611 | *mapped_rem_sockaddr) | |
612 | { | |
613 | u32 hash; | |
614 | int ret; | |
615 | ||
616 | ret = get_hash_bucket(mapped_loc_sockaddr, mapped_rem_sockaddr, &hash); | |
617 | if (ret) | |
618 | return NULL; | |
619 | return &iwpm_reminfo_bucket[hash & IWPM_REMINFO_HASH_MASK]; | |
30dc5e63 TN |
620 | } |
621 | ||
622 | static int send_mapinfo_num(u32 mapping_num, u8 nl_client, int iwpm_pid) | |
623 | { | |
624 | struct sk_buff *skb = NULL; | |
625 | struct nlmsghdr *nlh; | |
626 | u32 msg_seq; | |
627 | const char *err_str = ""; | |
628 | int ret = -EINVAL; | |
629 | ||
630 | skb = iwpm_create_nlmsg(RDMA_NL_IWPM_MAPINFO_NUM, &nlh, nl_client); | |
631 | if (!skb) { | |
632 | err_str = "Unable to create a nlmsg"; | |
633 | goto mapinfo_num_error; | |
634 | } | |
635 | nlh->nlmsg_seq = iwpm_get_nlmsg_seq(); | |
636 | msg_seq = 0; | |
637 | err_str = "Unable to put attribute of mapinfo number nlmsg"; | |
638 | ret = ibnl_put_attr(skb, nlh, sizeof(u32), &msg_seq, IWPM_NLA_MAPINFO_SEQ); | |
639 | if (ret) | |
640 | goto mapinfo_num_error; | |
641 | ret = ibnl_put_attr(skb, nlh, sizeof(u32), | |
642 | &mapping_num, IWPM_NLA_MAPINFO_SEND_NUM); | |
643 | if (ret) | |
644 | goto mapinfo_num_error; | |
04eae427 SS |
645 | |
646 | nlmsg_end(skb, nlh); | |
647 | ||
f00e6463 | 648 | ret = rdma_nl_unicast(skb, iwpm_pid); |
30dc5e63 TN |
649 | if (ret) { |
650 | skb = NULL; | |
651 | err_str = "Unable to send a nlmsg"; | |
652 | goto mapinfo_num_error; | |
653 | } | |
654 | pr_debug("%s: Sent mapping number = %d\n", __func__, mapping_num); | |
655 | return 0; | |
656 | mapinfo_num_error: | |
657 | pr_info("%s: %s\n", __func__, err_str); | |
658 | if (skb) | |
659 | dev_kfree_skb(skb); | |
660 | return ret; | |
661 | } | |
662 | ||
663 | static int send_nlmsg_done(struct sk_buff *skb, u8 nl_client, int iwpm_pid) | |
664 | { | |
665 | struct nlmsghdr *nlh = NULL; | |
666 | int ret = 0; | |
667 | ||
668 | if (!skb) | |
669 | return ret; | |
670 | if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client, | |
671 | RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) { | |
672 | pr_warn("%s Unable to put NLMSG_DONE\n", __func__); | |
5ed935e8 | 673 | dev_kfree_skb(skb); |
30dc5e63 TN |
674 | return -ENOMEM; |
675 | } | |
676 | nlh->nlmsg_type = NLMSG_DONE; | |
f00e6463 | 677 | ret = rdma_nl_unicast(skb, iwpm_pid); |
30dc5e63 TN |
678 | if (ret) |
679 | pr_warn("%s Unable to send a nlmsg\n", __func__); | |
680 | return ret; | |
681 | } | |
682 | ||
683 | int iwpm_send_mapinfo(u8 nl_client, int iwpm_pid) | |
684 | { | |
685 | struct iwpm_mapping_info *map_info; | |
686 | struct sk_buff *skb = NULL; | |
687 | struct nlmsghdr *nlh; | |
688 | int skb_num = 0, mapping_num = 0; | |
689 | int i = 0, nlmsg_bytes = 0; | |
690 | unsigned long flags; | |
691 | const char *err_str = ""; | |
692 | int ret; | |
693 | ||
694 | skb = dev_alloc_skb(NLMSG_GOODSIZE); | |
695 | if (!skb) { | |
696 | ret = -ENOMEM; | |
697 | err_str = "Unable to allocate skb"; | |
698 | goto send_mapping_info_exit; | |
699 | } | |
700 | skb_num++; | |
701 | spin_lock_irqsave(&iwpm_mapinfo_lock, flags); | |
302d6424 | 702 | ret = -EINVAL; |
6eec1774 | 703 | for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) { |
30dc5e63 TN |
704 | hlist_for_each_entry(map_info, &iwpm_hash_bucket[i], |
705 | hlist_node) { | |
706 | if (map_info->nl_client != nl_client) | |
707 | continue; | |
708 | nlh = NULL; | |
709 | if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client, | |
710 | RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) { | |
711 | ret = -ENOMEM; | |
712 | err_str = "Unable to put the nlmsg header"; | |
713 | goto send_mapping_info_unlock; | |
714 | } | |
715 | err_str = "Unable to put attribute of the nlmsg"; | |
716 | ret = ibnl_put_attr(skb, nlh, | |
717 | sizeof(struct sockaddr_storage), | |
718 | &map_info->local_sockaddr, | |
719 | IWPM_NLA_MAPINFO_LOCAL_ADDR); | |
720 | if (ret) | |
721 | goto send_mapping_info_unlock; | |
722 | ||
723 | ret = ibnl_put_attr(skb, nlh, | |
724 | sizeof(struct sockaddr_storage), | |
725 | &map_info->mapped_sockaddr, | |
726 | IWPM_NLA_MAPINFO_MAPPED_ADDR); | |
727 | if (ret) | |
728 | goto send_mapping_info_unlock; | |
729 | ||
b0bad9ad SW |
730 | if (iwpm_ulib_version > IWPM_UABI_VERSION_MIN) { |
731 | ret = ibnl_put_attr(skb, nlh, sizeof(u32), | |
732 | &map_info->map_flags, | |
733 | IWPM_NLA_MAPINFO_FLAGS); | |
734 | if (ret) | |
735 | goto send_mapping_info_unlock; | |
736 | } | |
737 | ||
04eae427 SS |
738 | nlmsg_end(skb, nlh); |
739 | ||
30dc5e63 TN |
740 | iwpm_print_sockaddr(&map_info->local_sockaddr, |
741 | "send_mapping_info: Local sockaddr:"); | |
742 | iwpm_print_sockaddr(&map_info->mapped_sockaddr, | |
743 | "send_mapping_info: Mapped local sockaddr:"); | |
744 | mapping_num++; | |
745 | nlmsg_bytes += nlh->nlmsg_len; | |
746 | ||
747 | /* check if all mappings can fit in one skb */ | |
748 | if (NLMSG_GOODSIZE - nlmsg_bytes < nlh->nlmsg_len * 2) { | |
749 | /* and leave room for NLMSG_DONE */ | |
750 | nlmsg_bytes = 0; | |
751 | skb_num++; | |
752 | spin_unlock_irqrestore(&iwpm_mapinfo_lock, | |
753 | flags); | |
754 | /* send the skb */ | |
755 | ret = send_nlmsg_done(skb, nl_client, iwpm_pid); | |
756 | skb = NULL; | |
757 | if (ret) { | |
758 | err_str = "Unable to send map info"; | |
759 | goto send_mapping_info_exit; | |
760 | } | |
761 | if (skb_num == IWPM_MAPINFO_SKB_COUNT) { | |
762 | ret = -ENOMEM; | |
763 | err_str = "Insufficient skbs for map info"; | |
764 | goto send_mapping_info_exit; | |
765 | } | |
766 | skb = dev_alloc_skb(NLMSG_GOODSIZE); | |
767 | if (!skb) { | |
768 | ret = -ENOMEM; | |
769 | err_str = "Unable to allocate skb"; | |
770 | goto send_mapping_info_exit; | |
771 | } | |
772 | spin_lock_irqsave(&iwpm_mapinfo_lock, flags); | |
773 | } | |
774 | } | |
775 | } | |
776 | send_mapping_info_unlock: | |
777 | spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags); | |
778 | send_mapping_info_exit: | |
779 | if (ret) { | |
780 | pr_warn("%s: %s (ret = %d)\n", __func__, err_str, ret); | |
781 | if (skb) | |
782 | dev_kfree_skb(skb); | |
783 | return ret; | |
784 | } | |
785 | send_nlmsg_done(skb, nl_client, iwpm_pid); | |
786 | return send_mapinfo_num(mapping_num, nl_client, iwpm_pid); | |
787 | } | |
788 | ||
789 | int iwpm_mapinfo_available(void) | |
790 | { | |
791 | unsigned long flags; | |
792 | int full_bucket = 0, i = 0; | |
793 | ||
794 | spin_lock_irqsave(&iwpm_mapinfo_lock, flags); | |
795 | if (iwpm_hash_bucket) { | |
6eec1774 | 796 | for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) { |
30dc5e63 TN |
797 | if (!hlist_empty(&iwpm_hash_bucket[i])) { |
798 | full_bucket = 1; | |
799 | break; | |
800 | } | |
801 | } | |
802 | } | |
803 | spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags); | |
804 | return full_bucket; | |
805 | } | |
b0bad9ad SW |
806 | |
807 | int iwpm_send_hello(u8 nl_client, int iwpm_pid, u16 abi_version) | |
808 | { | |
809 | struct sk_buff *skb = NULL; | |
810 | struct nlmsghdr *nlh; | |
b0bad9ad SW |
811 | const char *err_str = ""; |
812 | int ret = -EINVAL; | |
813 | ||
814 | skb = iwpm_create_nlmsg(RDMA_NL_IWPM_HELLO, &nlh, nl_client); | |
815 | if (!skb) { | |
816 | err_str = "Unable to create a nlmsg"; | |
817 | goto hello_num_error; | |
818 | } | |
819 | nlh->nlmsg_seq = iwpm_get_nlmsg_seq(); | |
b0bad9ad SW |
820 | err_str = "Unable to put attribute of abi_version into nlmsg"; |
821 | ret = ibnl_put_attr(skb, nlh, sizeof(u16), &abi_version, | |
822 | IWPM_NLA_HELLO_ABI_VERSION); | |
823 | if (ret) | |
824 | goto hello_num_error; | |
825 | nlmsg_end(skb, nlh); | |
826 | ||
827 | ret = rdma_nl_unicast(skb, iwpm_pid); | |
828 | if (ret) { | |
829 | skb = NULL; | |
830 | err_str = "Unable to send a nlmsg"; | |
831 | goto hello_num_error; | |
832 | } | |
833 | pr_debug("%s: Sent hello abi_version = %u\n", __func__, abi_version); | |
834 | return 0; | |
835 | hello_num_error: | |
836 | pr_info("%s: %s\n", __func__, err_str); | |
837 | if (skb) | |
838 | dev_kfree_skb(skb); | |
839 | return ret; | |
840 | } |