iwpm_util.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756
  1. /*
  2. * Copyright (c) 2014 Chelsio, Inc. All rights reserved.
  3. * Copyright (c) 2014 Intel Corporation. All rights reserved.
  4. *
  5. * This software is available to you under a choice of one of two
  6. * licenses. You may choose to be licensed under the terms of the GNU
  7. * General Public License (GPL) Version 2, available from the file
  8. * COPYING in the main directory of this source tree, or the
  9. * OpenIB.org BSD license below:
  10. *
  11. * Redistribution and use in source and binary forms, with or
  12. * without modification, are permitted provided that the following
  13. * conditions are met:
  14. *
  15. * - Redistributions of source code must retain the above
  16. * copyright notice, this list of conditions and the following
  17. * disclaimer.
  18. *
  19. * - Redistributions in binary form must reproduce the above
  20. * copyright notice, this list of conditions and the following
  21. * disclaimer in the documentation and/or other materials
  22. * provided with the distribution.
  23. *
  24. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  25. * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  26. * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
  27. * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
  28. * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
  29. * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
  30. * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  31. * SOFTWARE.
  32. */
  33. #include "iwpm_util.h"
  34. #define IWPM_MAPINFO_HASH_SIZE 512
  35. #define IWPM_MAPINFO_HASH_MASK (IWPM_MAPINFO_HASH_SIZE - 1)
  36. #define IWPM_REMINFO_HASH_SIZE 64
  37. #define IWPM_REMINFO_HASH_MASK (IWPM_REMINFO_HASH_SIZE - 1)
  38. #define IWPM_MSG_SIZE 512
  39. static LIST_HEAD(iwpm_nlmsg_req_list);
  40. static DEFINE_SPINLOCK(iwpm_nlmsg_req_lock);
  41. static struct hlist_head *iwpm_hash_bucket;
  42. static DEFINE_SPINLOCK(iwpm_mapinfo_lock);
  43. static struct hlist_head *iwpm_reminfo_bucket;
  44. static DEFINE_SPINLOCK(iwpm_reminfo_lock);
  45. static DEFINE_MUTEX(iwpm_admin_lock);
  46. static struct iwpm_admin_data iwpm_admin;
  47. int iwpm_init(u8 nl_client)
  48. {
  49. int ret = 0;
  50. mutex_lock(&iwpm_admin_lock);
  51. if (atomic_read(&iwpm_admin.refcount) == 0) {
  52. iwpm_hash_bucket = kzalloc(IWPM_MAPINFO_HASH_SIZE *
  53. sizeof(struct hlist_head), GFP_KERNEL);
  54. if (!iwpm_hash_bucket) {
  55. ret = -ENOMEM;
  56. goto init_exit;
  57. }
  58. iwpm_reminfo_bucket = kzalloc(IWPM_REMINFO_HASH_SIZE *
  59. sizeof(struct hlist_head), GFP_KERNEL);
  60. if (!iwpm_reminfo_bucket) {
  61. kfree(iwpm_hash_bucket);
  62. ret = -ENOMEM;
  63. goto init_exit;
  64. }
  65. }
  66. atomic_inc(&iwpm_admin.refcount);
  67. init_exit:
  68. mutex_unlock(&iwpm_admin_lock);
  69. if (!ret) {
  70. iwpm_set_valid(nl_client, 1);
  71. iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
  72. pr_debug("%s: Mapinfo and reminfo tables are created\n",
  73. __func__);
  74. }
  75. return ret;
  76. }
  77. static void free_hash_bucket(void);
  78. static void free_reminfo_bucket(void);
  79. int iwpm_exit(u8 nl_client)
  80. {
  81. if (!iwpm_valid_client(nl_client))
  82. return -EINVAL;
  83. mutex_lock(&iwpm_admin_lock);
  84. if (atomic_read(&iwpm_admin.refcount) == 0) {
  85. mutex_unlock(&iwpm_admin_lock);
  86. pr_err("%s Incorrect usage - negative refcount\n", __func__);
  87. return -EINVAL;
  88. }
  89. if (atomic_dec_and_test(&iwpm_admin.refcount)) {
  90. free_hash_bucket();
  91. free_reminfo_bucket();
  92. pr_debug("%s: Resources are destroyed\n", __func__);
  93. }
  94. mutex_unlock(&iwpm_admin_lock);
  95. iwpm_set_valid(nl_client, 0);
  96. iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
  97. return 0;
  98. }
  99. static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage *,
  100. struct sockaddr_storage *);
  101. int iwpm_create_mapinfo(struct sockaddr_storage *local_sockaddr,
  102. struct sockaddr_storage *mapped_sockaddr,
  103. u8 nl_client)
  104. {
  105. struct hlist_head *hash_bucket_head = NULL;
  106. struct iwpm_mapping_info *map_info;
  107. unsigned long flags;
  108. int ret = -EINVAL;
  109. if (!iwpm_valid_client(nl_client))
  110. return ret;
  111. map_info = kzalloc(sizeof(struct iwpm_mapping_info), GFP_KERNEL);
  112. if (!map_info)
  113. return -ENOMEM;
  114. memcpy(&map_info->local_sockaddr, local_sockaddr,
  115. sizeof(struct sockaddr_storage));
  116. memcpy(&map_info->mapped_sockaddr, mapped_sockaddr,
  117. sizeof(struct sockaddr_storage));
  118. map_info->nl_client = nl_client;
  119. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  120. if (iwpm_hash_bucket) {
  121. hash_bucket_head = get_mapinfo_hash_bucket(
  122. &map_info->local_sockaddr,
  123. &map_info->mapped_sockaddr);
  124. if (hash_bucket_head) {
  125. hlist_add_head(&map_info->hlist_node, hash_bucket_head);
  126. ret = 0;
  127. }
  128. }
  129. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  130. if (!hash_bucket_head)
  131. kfree(map_info);
  132. return ret;
  133. }
  134. int iwpm_remove_mapinfo(struct sockaddr_storage *local_sockaddr,
  135. struct sockaddr_storage *mapped_local_addr)
  136. {
  137. struct hlist_node *tmp_hlist_node;
  138. struct hlist_head *hash_bucket_head;
  139. struct iwpm_mapping_info *map_info = NULL;
  140. unsigned long flags;
  141. int ret = -EINVAL;
  142. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  143. if (iwpm_hash_bucket) {
  144. hash_bucket_head = get_mapinfo_hash_bucket(
  145. local_sockaddr,
  146. mapped_local_addr);
  147. if (!hash_bucket_head)
  148. goto remove_mapinfo_exit;
  149. hlist_for_each_entry_safe(map_info, tmp_hlist_node,
  150. hash_bucket_head, hlist_node) {
  151. if (!iwpm_compare_sockaddr(&map_info->mapped_sockaddr,
  152. mapped_local_addr)) {
  153. hlist_del_init(&map_info->hlist_node);
  154. kfree(map_info);
  155. ret = 0;
  156. break;
  157. }
  158. }
  159. }
  160. remove_mapinfo_exit:
  161. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  162. return ret;
  163. }
  164. static void free_hash_bucket(void)
  165. {
  166. struct hlist_node *tmp_hlist_node;
  167. struct iwpm_mapping_info *map_info;
  168. unsigned long flags;
  169. int i;
  170. /* remove all the mapinfo data from the list */
  171. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  172. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  173. hlist_for_each_entry_safe(map_info, tmp_hlist_node,
  174. &iwpm_hash_bucket[i], hlist_node) {
  175. hlist_del_init(&map_info->hlist_node);
  176. kfree(map_info);
  177. }
  178. }
  179. /* free the hash list */
  180. kfree(iwpm_hash_bucket);
  181. iwpm_hash_bucket = NULL;
  182. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  183. }
  184. static void free_reminfo_bucket(void)
  185. {
  186. struct hlist_node *tmp_hlist_node;
  187. struct iwpm_remote_info *rem_info;
  188. unsigned long flags;
  189. int i;
  190. /* remove all the remote info from the list */
  191. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  192. for (i = 0; i < IWPM_REMINFO_HASH_SIZE; i++) {
  193. hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
  194. &iwpm_reminfo_bucket[i], hlist_node) {
  195. hlist_del_init(&rem_info->hlist_node);
  196. kfree(rem_info);
  197. }
  198. }
  199. /* free the hash list */
  200. kfree(iwpm_reminfo_bucket);
  201. iwpm_reminfo_bucket = NULL;
  202. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  203. }
  204. static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage *,
  205. struct sockaddr_storage *);
  206. void iwpm_add_remote_info(struct iwpm_remote_info *rem_info)
  207. {
  208. struct hlist_head *hash_bucket_head;
  209. unsigned long flags;
  210. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  211. if (iwpm_reminfo_bucket) {
  212. hash_bucket_head = get_reminfo_hash_bucket(
  213. &rem_info->mapped_loc_sockaddr,
  214. &rem_info->mapped_rem_sockaddr);
  215. if (hash_bucket_head)
  216. hlist_add_head(&rem_info->hlist_node, hash_bucket_head);
  217. }
  218. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  219. }
  220. int iwpm_get_remote_info(struct sockaddr_storage *mapped_loc_addr,
  221. struct sockaddr_storage *mapped_rem_addr,
  222. struct sockaddr_storage *remote_addr,
  223. u8 nl_client)
  224. {
  225. struct hlist_node *tmp_hlist_node;
  226. struct hlist_head *hash_bucket_head;
  227. struct iwpm_remote_info *rem_info = NULL;
  228. unsigned long flags;
  229. int ret = -EINVAL;
  230. if (!iwpm_valid_client(nl_client)) {
  231. pr_info("%s: Invalid client = %d\n", __func__, nl_client);
  232. return ret;
  233. }
  234. spin_lock_irqsave(&iwpm_reminfo_lock, flags);
  235. if (iwpm_reminfo_bucket) {
  236. hash_bucket_head = get_reminfo_hash_bucket(
  237. mapped_loc_addr,
  238. mapped_rem_addr);
  239. if (!hash_bucket_head)
  240. goto get_remote_info_exit;
  241. hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
  242. hash_bucket_head, hlist_node) {
  243. if (!iwpm_compare_sockaddr(&rem_info->mapped_loc_sockaddr,
  244. mapped_loc_addr) &&
  245. !iwpm_compare_sockaddr(&rem_info->mapped_rem_sockaddr,
  246. mapped_rem_addr)) {
  247. memcpy(remote_addr, &rem_info->remote_sockaddr,
  248. sizeof(struct sockaddr_storage));
  249. iwpm_print_sockaddr(remote_addr,
  250. "get_remote_info: Remote sockaddr:");
  251. hlist_del_init(&rem_info->hlist_node);
  252. kfree(rem_info);
  253. ret = 0;
  254. break;
  255. }
  256. }
  257. }
  258. get_remote_info_exit:
  259. spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
  260. return ret;
  261. }
  262. struct iwpm_nlmsg_request *iwpm_get_nlmsg_request(__u32 nlmsg_seq,
  263. u8 nl_client, gfp_t gfp)
  264. {
  265. struct iwpm_nlmsg_request *nlmsg_request = NULL;
  266. unsigned long flags;
  267. nlmsg_request = kzalloc(sizeof(struct iwpm_nlmsg_request), gfp);
  268. if (!nlmsg_request)
  269. return NULL;
  270. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  271. list_add_tail(&nlmsg_request->inprocess_list, &iwpm_nlmsg_req_list);
  272. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  273. kref_init(&nlmsg_request->kref);
  274. kref_get(&nlmsg_request->kref);
  275. nlmsg_request->nlmsg_seq = nlmsg_seq;
  276. nlmsg_request->nl_client = nl_client;
  277. nlmsg_request->request_done = 0;
  278. nlmsg_request->err_code = 0;
  279. sema_init(&nlmsg_request->sem, 1);
  280. down(&nlmsg_request->sem);
  281. return nlmsg_request;
  282. }
  283. void iwpm_free_nlmsg_request(struct kref *kref)
  284. {
  285. struct iwpm_nlmsg_request *nlmsg_request;
  286. unsigned long flags;
  287. nlmsg_request = container_of(kref, struct iwpm_nlmsg_request, kref);
  288. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  289. list_del_init(&nlmsg_request->inprocess_list);
  290. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  291. if (!nlmsg_request->request_done)
  292. pr_debug("%s Freeing incomplete nlmsg request (seq = %u).\n",
  293. __func__, nlmsg_request->nlmsg_seq);
  294. kfree(nlmsg_request);
  295. }
  296. struct iwpm_nlmsg_request *iwpm_find_nlmsg_request(__u32 echo_seq)
  297. {
  298. struct iwpm_nlmsg_request *nlmsg_request;
  299. struct iwpm_nlmsg_request *found_request = NULL;
  300. unsigned long flags;
  301. spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
  302. list_for_each_entry(nlmsg_request, &iwpm_nlmsg_req_list,
  303. inprocess_list) {
  304. if (nlmsg_request->nlmsg_seq == echo_seq) {
  305. found_request = nlmsg_request;
  306. kref_get(&nlmsg_request->kref);
  307. break;
  308. }
  309. }
  310. spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
  311. return found_request;
  312. }
  313. int iwpm_wait_complete_req(struct iwpm_nlmsg_request *nlmsg_request)
  314. {
  315. int ret;
  316. ret = down_timeout(&nlmsg_request->sem, IWPM_NL_TIMEOUT);
  317. if (ret) {
  318. ret = -EINVAL;
  319. pr_info("%s: Timeout %d sec for netlink request (seq = %u)\n",
  320. __func__, (IWPM_NL_TIMEOUT/HZ), nlmsg_request->nlmsg_seq);
  321. } else {
  322. ret = nlmsg_request->err_code;
  323. }
  324. kref_put(&nlmsg_request->kref, iwpm_free_nlmsg_request);
  325. return ret;
  326. }
  327. int iwpm_get_nlmsg_seq(void)
  328. {
  329. return atomic_inc_return(&iwpm_admin.nlmsg_seq);
  330. }
  331. int iwpm_valid_client(u8 nl_client)
  332. {
  333. return iwpm_admin.client_list[nl_client];
  334. }
  335. void iwpm_set_valid(u8 nl_client, int valid)
  336. {
  337. iwpm_admin.client_list[nl_client] = valid;
  338. }
  339. /* valid client */
  340. u32 iwpm_get_registration(u8 nl_client)
  341. {
  342. return iwpm_admin.reg_list[nl_client];
  343. }
  344. /* valid client */
  345. void iwpm_set_registration(u8 nl_client, u32 reg)
  346. {
  347. iwpm_admin.reg_list[nl_client] = reg;
  348. }
  349. /* valid client */
  350. u32 iwpm_check_registration(u8 nl_client, u32 reg)
  351. {
  352. return (iwpm_get_registration(nl_client) & reg);
  353. }
  354. int iwpm_compare_sockaddr(struct sockaddr_storage *a_sockaddr,
  355. struct sockaddr_storage *b_sockaddr)
  356. {
  357. if (a_sockaddr->ss_family != b_sockaddr->ss_family)
  358. return 1;
  359. if (a_sockaddr->ss_family == AF_INET) {
  360. struct sockaddr_in *a4_sockaddr =
  361. (struct sockaddr_in *)a_sockaddr;
  362. struct sockaddr_in *b4_sockaddr =
  363. (struct sockaddr_in *)b_sockaddr;
  364. if (!memcmp(&a4_sockaddr->sin_addr,
  365. &b4_sockaddr->sin_addr, sizeof(struct in_addr))
  366. && a4_sockaddr->sin_port == b4_sockaddr->sin_port)
  367. return 0;
  368. } else if (a_sockaddr->ss_family == AF_INET6) {
  369. struct sockaddr_in6 *a6_sockaddr =
  370. (struct sockaddr_in6 *)a_sockaddr;
  371. struct sockaddr_in6 *b6_sockaddr =
  372. (struct sockaddr_in6 *)b_sockaddr;
  373. if (!memcmp(&a6_sockaddr->sin6_addr,
  374. &b6_sockaddr->sin6_addr, sizeof(struct in6_addr))
  375. && a6_sockaddr->sin6_port == b6_sockaddr->sin6_port)
  376. return 0;
  377. } else {
  378. pr_err("%s: Invalid sockaddr family\n", __func__);
  379. }
  380. return 1;
  381. }
  382. struct sk_buff *iwpm_create_nlmsg(u32 nl_op, struct nlmsghdr **nlh,
  383. int nl_client)
  384. {
  385. struct sk_buff *skb = NULL;
  386. skb = dev_alloc_skb(IWPM_MSG_SIZE);
  387. if (!skb) {
  388. pr_err("%s Unable to allocate skb\n", __func__);
  389. goto create_nlmsg_exit;
  390. }
  391. if (!(ibnl_put_msg(skb, nlh, 0, 0, nl_client, nl_op,
  392. NLM_F_REQUEST))) {
  393. pr_warn("%s: Unable to put the nlmsg header\n", __func__);
  394. dev_kfree_skb(skb);
  395. skb = NULL;
  396. }
  397. create_nlmsg_exit:
  398. return skb;
  399. }
  400. int iwpm_parse_nlmsg(struct netlink_callback *cb, int policy_max,
  401. const struct nla_policy *nlmsg_policy,
  402. struct nlattr *nltb[], const char *msg_type)
  403. {
  404. int nlh_len = 0;
  405. int ret;
  406. const char *err_str = "";
  407. ret = nlmsg_validate(cb->nlh, nlh_len, policy_max - 1, nlmsg_policy,
  408. NULL);
  409. if (ret) {
  410. err_str = "Invalid attribute";
  411. goto parse_nlmsg_error;
  412. }
  413. ret = nlmsg_parse(cb->nlh, nlh_len, nltb, policy_max - 1,
  414. nlmsg_policy, NULL);
  415. if (ret) {
  416. err_str = "Unable to parse the nlmsg";
  417. goto parse_nlmsg_error;
  418. }
  419. ret = iwpm_validate_nlmsg_attr(nltb, policy_max);
  420. if (ret) {
  421. err_str = "Invalid NULL attribute";
  422. goto parse_nlmsg_error;
  423. }
  424. return 0;
  425. parse_nlmsg_error:
  426. pr_warn("%s: %s (msg type %s ret = %d)\n",
  427. __func__, err_str, msg_type, ret);
  428. return ret;
  429. }
  430. void iwpm_print_sockaddr(struct sockaddr_storage *sockaddr, char *msg)
  431. {
  432. struct sockaddr_in6 *sockaddr_v6;
  433. struct sockaddr_in *sockaddr_v4;
  434. switch (sockaddr->ss_family) {
  435. case AF_INET:
  436. sockaddr_v4 = (struct sockaddr_in *)sockaddr;
  437. pr_debug("%s IPV4 %pI4: %u(0x%04X)\n",
  438. msg, &sockaddr_v4->sin_addr,
  439. ntohs(sockaddr_v4->sin_port),
  440. ntohs(sockaddr_v4->sin_port));
  441. break;
  442. case AF_INET6:
  443. sockaddr_v6 = (struct sockaddr_in6 *)sockaddr;
  444. pr_debug("%s IPV6 %pI6: %u(0x%04X)\n",
  445. msg, &sockaddr_v6->sin6_addr,
  446. ntohs(sockaddr_v6->sin6_port),
  447. ntohs(sockaddr_v6->sin6_port));
  448. break;
  449. default:
  450. break;
  451. }
  452. }
  453. static u32 iwpm_ipv6_jhash(struct sockaddr_in6 *ipv6_sockaddr)
  454. {
  455. u32 ipv6_hash = jhash(&ipv6_sockaddr->sin6_addr, sizeof(struct in6_addr), 0);
  456. u32 hash = jhash_2words(ipv6_hash, (__force u32) ipv6_sockaddr->sin6_port, 0);
  457. return hash;
  458. }
  459. static u32 iwpm_ipv4_jhash(struct sockaddr_in *ipv4_sockaddr)
  460. {
  461. u32 ipv4_hash = jhash(&ipv4_sockaddr->sin_addr, sizeof(struct in_addr), 0);
  462. u32 hash = jhash_2words(ipv4_hash, (__force u32) ipv4_sockaddr->sin_port, 0);
  463. return hash;
  464. }
  465. static int get_hash_bucket(struct sockaddr_storage *a_sockaddr,
  466. struct sockaddr_storage *b_sockaddr, u32 *hash)
  467. {
  468. u32 a_hash, b_hash;
  469. if (a_sockaddr->ss_family == AF_INET) {
  470. a_hash = iwpm_ipv4_jhash((struct sockaddr_in *) a_sockaddr);
  471. b_hash = iwpm_ipv4_jhash((struct sockaddr_in *) b_sockaddr);
  472. } else if (a_sockaddr->ss_family == AF_INET6) {
  473. a_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) a_sockaddr);
  474. b_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) b_sockaddr);
  475. } else {
  476. pr_err("%s: Invalid sockaddr family\n", __func__);
  477. return -EINVAL;
  478. }
  479. if (a_hash == b_hash) /* if port mapper isn't available */
  480. *hash = a_hash;
  481. else
  482. *hash = jhash_2words(a_hash, b_hash, 0);
  483. return 0;
  484. }
  485. static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage
  486. *local_sockaddr, struct sockaddr_storage
  487. *mapped_sockaddr)
  488. {
  489. u32 hash;
  490. int ret;
  491. ret = get_hash_bucket(local_sockaddr, mapped_sockaddr, &hash);
  492. if (ret)
  493. return NULL;
  494. return &iwpm_hash_bucket[hash & IWPM_MAPINFO_HASH_MASK];
  495. }
  496. static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage
  497. *mapped_loc_sockaddr, struct sockaddr_storage
  498. *mapped_rem_sockaddr)
  499. {
  500. u32 hash;
  501. int ret;
  502. ret = get_hash_bucket(mapped_loc_sockaddr, mapped_rem_sockaddr, &hash);
  503. if (ret)
  504. return NULL;
  505. return &iwpm_reminfo_bucket[hash & IWPM_REMINFO_HASH_MASK];
  506. }
  507. static int send_mapinfo_num(u32 mapping_num, u8 nl_client, int iwpm_pid)
  508. {
  509. struct sk_buff *skb = NULL;
  510. struct nlmsghdr *nlh;
  511. u32 msg_seq;
  512. const char *err_str = "";
  513. int ret = -EINVAL;
  514. skb = iwpm_create_nlmsg(RDMA_NL_IWPM_MAPINFO_NUM, &nlh, nl_client);
  515. if (!skb) {
  516. err_str = "Unable to create a nlmsg";
  517. goto mapinfo_num_error;
  518. }
  519. nlh->nlmsg_seq = iwpm_get_nlmsg_seq();
  520. msg_seq = 0;
  521. err_str = "Unable to put attribute of mapinfo number nlmsg";
  522. ret = ibnl_put_attr(skb, nlh, sizeof(u32), &msg_seq, IWPM_NLA_MAPINFO_SEQ);
  523. if (ret)
  524. goto mapinfo_num_error;
  525. ret = ibnl_put_attr(skb, nlh, sizeof(u32),
  526. &mapping_num, IWPM_NLA_MAPINFO_SEND_NUM);
  527. if (ret)
  528. goto mapinfo_num_error;
  529. nlmsg_end(skb, nlh);
  530. ret = rdma_nl_unicast(skb, iwpm_pid);
  531. if (ret) {
  532. skb = NULL;
  533. err_str = "Unable to send a nlmsg";
  534. goto mapinfo_num_error;
  535. }
  536. pr_debug("%s: Sent mapping number = %d\n", __func__, mapping_num);
  537. return 0;
  538. mapinfo_num_error:
  539. pr_info("%s: %s\n", __func__, err_str);
  540. if (skb)
  541. dev_kfree_skb(skb);
  542. return ret;
  543. }
  544. static int send_nlmsg_done(struct sk_buff *skb, u8 nl_client, int iwpm_pid)
  545. {
  546. struct nlmsghdr *nlh = NULL;
  547. int ret = 0;
  548. if (!skb)
  549. return ret;
  550. if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
  551. RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
  552. pr_warn("%s Unable to put NLMSG_DONE\n", __func__);
  553. dev_kfree_skb(skb);
  554. return -ENOMEM;
  555. }
  556. nlh->nlmsg_type = NLMSG_DONE;
  557. ret = rdma_nl_unicast(skb, iwpm_pid);
  558. if (ret)
  559. pr_warn("%s Unable to send a nlmsg\n", __func__);
  560. return ret;
  561. }
  562. int iwpm_send_mapinfo(u8 nl_client, int iwpm_pid)
  563. {
  564. struct iwpm_mapping_info *map_info;
  565. struct sk_buff *skb = NULL;
  566. struct nlmsghdr *nlh;
  567. int skb_num = 0, mapping_num = 0;
  568. int i = 0, nlmsg_bytes = 0;
  569. unsigned long flags;
  570. const char *err_str = "";
  571. int ret;
  572. skb = dev_alloc_skb(NLMSG_GOODSIZE);
  573. if (!skb) {
  574. ret = -ENOMEM;
  575. err_str = "Unable to allocate skb";
  576. goto send_mapping_info_exit;
  577. }
  578. skb_num++;
  579. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  580. ret = -EINVAL;
  581. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  582. hlist_for_each_entry(map_info, &iwpm_hash_bucket[i],
  583. hlist_node) {
  584. if (map_info->nl_client != nl_client)
  585. continue;
  586. nlh = NULL;
  587. if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
  588. RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
  589. ret = -ENOMEM;
  590. err_str = "Unable to put the nlmsg header";
  591. goto send_mapping_info_unlock;
  592. }
  593. err_str = "Unable to put attribute of the nlmsg";
  594. ret = ibnl_put_attr(skb, nlh,
  595. sizeof(struct sockaddr_storage),
  596. &map_info->local_sockaddr,
  597. IWPM_NLA_MAPINFO_LOCAL_ADDR);
  598. if (ret)
  599. goto send_mapping_info_unlock;
  600. ret = ibnl_put_attr(skb, nlh,
  601. sizeof(struct sockaddr_storage),
  602. &map_info->mapped_sockaddr,
  603. IWPM_NLA_MAPINFO_MAPPED_ADDR);
  604. if (ret)
  605. goto send_mapping_info_unlock;
  606. nlmsg_end(skb, nlh);
  607. iwpm_print_sockaddr(&map_info->local_sockaddr,
  608. "send_mapping_info: Local sockaddr:");
  609. iwpm_print_sockaddr(&map_info->mapped_sockaddr,
  610. "send_mapping_info: Mapped local sockaddr:");
  611. mapping_num++;
  612. nlmsg_bytes += nlh->nlmsg_len;
  613. /* check if all mappings can fit in one skb */
  614. if (NLMSG_GOODSIZE - nlmsg_bytes < nlh->nlmsg_len * 2) {
  615. /* and leave room for NLMSG_DONE */
  616. nlmsg_bytes = 0;
  617. skb_num++;
  618. spin_unlock_irqrestore(&iwpm_mapinfo_lock,
  619. flags);
  620. /* send the skb */
  621. ret = send_nlmsg_done(skb, nl_client, iwpm_pid);
  622. skb = NULL;
  623. if (ret) {
  624. err_str = "Unable to send map info";
  625. goto send_mapping_info_exit;
  626. }
  627. if (skb_num == IWPM_MAPINFO_SKB_COUNT) {
  628. ret = -ENOMEM;
  629. err_str = "Insufficient skbs for map info";
  630. goto send_mapping_info_exit;
  631. }
  632. skb = dev_alloc_skb(NLMSG_GOODSIZE);
  633. if (!skb) {
  634. ret = -ENOMEM;
  635. err_str = "Unable to allocate skb";
  636. goto send_mapping_info_exit;
  637. }
  638. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  639. }
  640. }
  641. }
  642. send_mapping_info_unlock:
  643. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  644. send_mapping_info_exit:
  645. if (ret) {
  646. pr_warn("%s: %s (ret = %d)\n", __func__, err_str, ret);
  647. if (skb)
  648. dev_kfree_skb(skb);
  649. return ret;
  650. }
  651. send_nlmsg_done(skb, nl_client, iwpm_pid);
  652. return send_mapinfo_num(mapping_num, nl_client, iwpm_pid);
  653. }
  654. int iwpm_mapinfo_available(void)
  655. {
  656. unsigned long flags;
  657. int full_bucket = 0, i = 0;
  658. spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
  659. if (iwpm_hash_bucket) {
  660. for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
  661. if (!hlist_empty(&iwpm_hash_bucket[i])) {
  662. full_bucket = 1;
  663. break;
  664. }
  665. }
  666. }
  667. spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
  668. return full_bucket;
  669. }