1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34#include "iwpm_util.h"
35
36#define IWPM_MAPINFO_HASH_SIZE 512
37#define IWPM_MAPINFO_HASH_MASK (IWPM_MAPINFO_HASH_SIZE - 1)
38#define IWPM_REMINFO_HASH_SIZE 64
39#define IWPM_REMINFO_HASH_MASK (IWPM_REMINFO_HASH_SIZE - 1)
40#define IWPM_MSG_SIZE 512
41
42static LIST_HEAD(iwpm_nlmsg_req_list);
43static DEFINE_SPINLOCK(iwpm_nlmsg_req_lock);
44
45static struct hlist_head *iwpm_hash_bucket;
46static DEFINE_SPINLOCK(iwpm_mapinfo_lock);
47
48static struct hlist_head *iwpm_reminfo_bucket;
49static DEFINE_SPINLOCK(iwpm_reminfo_lock);
50
51static DEFINE_MUTEX(iwpm_admin_lock);
52static struct iwpm_admin_data iwpm_admin;
53
54int iwpm_init(u8 nl_client)
55{
56 int ret = 0;
57 mutex_lock(&iwpm_admin_lock);
58 if (atomic_read(&iwpm_admin.refcount) == 0) {
59 iwpm_hash_bucket = kzalloc(IWPM_MAPINFO_HASH_SIZE *
60 sizeof(struct hlist_head), GFP_KERNEL);
61 if (!iwpm_hash_bucket) {
62 ret = -ENOMEM;
63 goto init_exit;
64 }
65 iwpm_reminfo_bucket = kzalloc(IWPM_REMINFO_HASH_SIZE *
66 sizeof(struct hlist_head), GFP_KERNEL);
67 if (!iwpm_reminfo_bucket) {
68 kfree(iwpm_hash_bucket);
69 ret = -ENOMEM;
70 goto init_exit;
71 }
72 }
73 atomic_inc(&iwpm_admin.refcount);
74init_exit:
75 mutex_unlock(&iwpm_admin_lock);
76 if (!ret) {
77 iwpm_set_valid(nl_client, 1);
78 iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
79 pr_debug("%s: Mapinfo and reminfo tables are created\n",
80 __func__);
81 }
82 return ret;
83}
84
85static void free_hash_bucket(void);
86static void free_reminfo_bucket(void);
87
88int iwpm_exit(u8 nl_client)
89{
90
91 if (!iwpm_valid_client(nl_client))
92 return -EINVAL;
93 mutex_lock(&iwpm_admin_lock);
94 if (atomic_read(&iwpm_admin.refcount) == 0) {
95 mutex_unlock(&iwpm_admin_lock);
96 pr_err("%s Incorrect usage - negative refcount\n", __func__);
97 return -EINVAL;
98 }
99 if (atomic_dec_and_test(&iwpm_admin.refcount)) {
100 free_hash_bucket();
101 free_reminfo_bucket();
102 pr_debug("%s: Resources are destroyed\n", __func__);
103 }
104 mutex_unlock(&iwpm_admin_lock);
105 iwpm_set_valid(nl_client, 0);
106 iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
107 return 0;
108}
109
110static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage *,
111 struct sockaddr_storage *);
112
113int iwpm_create_mapinfo(struct sockaddr_storage *local_sockaddr,
114 struct sockaddr_storage *mapped_sockaddr,
115 u8 nl_client)
116{
117 struct hlist_head *hash_bucket_head = NULL;
118 struct iwpm_mapping_info *map_info;
119 unsigned long flags;
120 int ret = -EINVAL;
121
122 if (!iwpm_valid_client(nl_client))
123 return ret;
124 map_info = kzalloc(sizeof(struct iwpm_mapping_info), GFP_KERNEL);
125 if (!map_info)
126 return -ENOMEM;
127
128 memcpy(&map_info->local_sockaddr, local_sockaddr,
129 sizeof(struct sockaddr_storage));
130 memcpy(&map_info->mapped_sockaddr, mapped_sockaddr,
131 sizeof(struct sockaddr_storage));
132 map_info->nl_client = nl_client;
133
134 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
135 if (iwpm_hash_bucket) {
136 hash_bucket_head = get_mapinfo_hash_bucket(
137 &map_info->local_sockaddr,
138 &map_info->mapped_sockaddr);
139 if (hash_bucket_head) {
140 hlist_add_head(&map_info->hlist_node, hash_bucket_head);
141 ret = 0;
142 }
143 }
144 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
145
146 if (!hash_bucket_head)
147 kfree(map_info);
148 return ret;
149}
150
151int iwpm_remove_mapinfo(struct sockaddr_storage *local_sockaddr,
152 struct sockaddr_storage *mapped_local_addr)
153{
154 struct hlist_node *tmp_hlist_node;
155 struct hlist_head *hash_bucket_head;
156 struct iwpm_mapping_info *map_info = NULL;
157 unsigned long flags;
158 int ret = -EINVAL;
159
160 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
161 if (iwpm_hash_bucket) {
162 hash_bucket_head = get_mapinfo_hash_bucket(
163 local_sockaddr,
164 mapped_local_addr);
165 if (!hash_bucket_head)
166 goto remove_mapinfo_exit;
167
168 hlist_for_each_entry_safe(map_info, tmp_hlist_node,
169 hash_bucket_head, hlist_node) {
170
171 if (!iwpm_compare_sockaddr(&map_info->mapped_sockaddr,
172 mapped_local_addr)) {
173
174 hlist_del_init(&map_info->hlist_node);
175 kfree(map_info);
176 ret = 0;
177 break;
178 }
179 }
180 }
181remove_mapinfo_exit:
182 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
183 return ret;
184}
185
186static void free_hash_bucket(void)
187{
188 struct hlist_node *tmp_hlist_node;
189 struct iwpm_mapping_info *map_info;
190 unsigned long flags;
191 int i;
192
193
194 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
195 for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
196 hlist_for_each_entry_safe(map_info, tmp_hlist_node,
197 &iwpm_hash_bucket[i], hlist_node) {
198
199 hlist_del_init(&map_info->hlist_node);
200 kfree(map_info);
201 }
202 }
203
204 kfree(iwpm_hash_bucket);
205 iwpm_hash_bucket = NULL;
206 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
207}
208
209static void free_reminfo_bucket(void)
210{
211 struct hlist_node *tmp_hlist_node;
212 struct iwpm_remote_info *rem_info;
213 unsigned long flags;
214 int i;
215
216
217 spin_lock_irqsave(&iwpm_reminfo_lock, flags);
218 for (i = 0; i < IWPM_REMINFO_HASH_SIZE; i++) {
219 hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
220 &iwpm_reminfo_bucket[i], hlist_node) {
221
222 hlist_del_init(&rem_info->hlist_node);
223 kfree(rem_info);
224 }
225 }
226
227 kfree(iwpm_reminfo_bucket);
228 iwpm_reminfo_bucket = NULL;
229 spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
230}
231
232static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage *,
233 struct sockaddr_storage *);
234
235void iwpm_add_remote_info(struct iwpm_remote_info *rem_info)
236{
237 struct hlist_head *hash_bucket_head;
238 unsigned long flags;
239
240 spin_lock_irqsave(&iwpm_reminfo_lock, flags);
241 if (iwpm_reminfo_bucket) {
242 hash_bucket_head = get_reminfo_hash_bucket(
243 &rem_info->mapped_loc_sockaddr,
244 &rem_info->mapped_rem_sockaddr);
245 if (hash_bucket_head)
246 hlist_add_head(&rem_info->hlist_node, hash_bucket_head);
247 }
248 spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
249}
250
251int iwpm_get_remote_info(struct sockaddr_storage *mapped_loc_addr,
252 struct sockaddr_storage *mapped_rem_addr,
253 struct sockaddr_storage *remote_addr,
254 u8 nl_client)
255{
256 struct hlist_node *tmp_hlist_node;
257 struct hlist_head *hash_bucket_head;
258 struct iwpm_remote_info *rem_info = NULL;
259 unsigned long flags;
260 int ret = -EINVAL;
261
262 if (!iwpm_valid_client(nl_client)) {
263 pr_info("%s: Invalid client = %d\n", __func__, nl_client);
264 return ret;
265 }
266 spin_lock_irqsave(&iwpm_reminfo_lock, flags);
267 if (iwpm_reminfo_bucket) {
268 hash_bucket_head = get_reminfo_hash_bucket(
269 mapped_loc_addr,
270 mapped_rem_addr);
271 if (!hash_bucket_head)
272 goto get_remote_info_exit;
273 hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
274 hash_bucket_head, hlist_node) {
275
276 if (!iwpm_compare_sockaddr(&rem_info->mapped_loc_sockaddr,
277 mapped_loc_addr) &&
278 !iwpm_compare_sockaddr(&rem_info->mapped_rem_sockaddr,
279 mapped_rem_addr)) {
280
281 memcpy(remote_addr, &rem_info->remote_sockaddr,
282 sizeof(struct sockaddr_storage));
283 iwpm_print_sockaddr(remote_addr,
284 "get_remote_info: Remote sockaddr:");
285
286 hlist_del_init(&rem_info->hlist_node);
287 kfree(rem_info);
288 ret = 0;
289 break;
290 }
291 }
292 }
293get_remote_info_exit:
294 spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
295 return ret;
296}
297
298struct iwpm_nlmsg_request *iwpm_get_nlmsg_request(__u32 nlmsg_seq,
299 u8 nl_client, gfp_t gfp)
300{
301 struct iwpm_nlmsg_request *nlmsg_request = NULL;
302 unsigned long flags;
303
304 nlmsg_request = kzalloc(sizeof(struct iwpm_nlmsg_request), gfp);
305 if (!nlmsg_request)
306 return NULL;
307
308 spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
309 list_add_tail(&nlmsg_request->inprocess_list, &iwpm_nlmsg_req_list);
310 spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
311
312 kref_init(&nlmsg_request->kref);
313 kref_get(&nlmsg_request->kref);
314 nlmsg_request->nlmsg_seq = nlmsg_seq;
315 nlmsg_request->nl_client = nl_client;
316 nlmsg_request->request_done = 0;
317 nlmsg_request->err_code = 0;
318 sema_init(&nlmsg_request->sem, 1);
319 down(&nlmsg_request->sem);
320 return nlmsg_request;
321}
322
323void iwpm_free_nlmsg_request(struct kref *kref)
324{
325 struct iwpm_nlmsg_request *nlmsg_request;
326 unsigned long flags;
327
328 nlmsg_request = container_of(kref, struct iwpm_nlmsg_request, kref);
329
330 spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
331 list_del_init(&nlmsg_request->inprocess_list);
332 spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
333
334 if (!nlmsg_request->request_done)
335 pr_debug("%s Freeing incomplete nlmsg request (seq = %u).\n",
336 __func__, nlmsg_request->nlmsg_seq);
337 kfree(nlmsg_request);
338}
339
340struct iwpm_nlmsg_request *iwpm_find_nlmsg_request(__u32 echo_seq)
341{
342 struct iwpm_nlmsg_request *nlmsg_request;
343 struct iwpm_nlmsg_request *found_request = NULL;
344 unsigned long flags;
345
346 spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
347 list_for_each_entry(nlmsg_request, &iwpm_nlmsg_req_list,
348 inprocess_list) {
349 if (nlmsg_request->nlmsg_seq == echo_seq) {
350 found_request = nlmsg_request;
351 kref_get(&nlmsg_request->kref);
352 break;
353 }
354 }
355 spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
356 return found_request;
357}
358
359int iwpm_wait_complete_req(struct iwpm_nlmsg_request *nlmsg_request)
360{
361 int ret;
362
363 ret = down_timeout(&nlmsg_request->sem, IWPM_NL_TIMEOUT);
364 if (ret) {
365 ret = -EINVAL;
366 pr_info("%s: Timeout %d sec for netlink request (seq = %u)\n",
367 __func__, (IWPM_NL_TIMEOUT/HZ), nlmsg_request->nlmsg_seq);
368 } else {
369 ret = nlmsg_request->err_code;
370 }
371 kref_put(&nlmsg_request->kref, iwpm_free_nlmsg_request);
372 return ret;
373}
374
375int iwpm_get_nlmsg_seq(void)
376{
377 return atomic_inc_return(&iwpm_admin.nlmsg_seq);
378}
379
380int iwpm_valid_client(u8 nl_client)
381{
382 return iwpm_admin.client_list[nl_client];
383}
384
385void iwpm_set_valid(u8 nl_client, int valid)
386{
387 iwpm_admin.client_list[nl_client] = valid;
388}
389
390
391u32 iwpm_get_registration(u8 nl_client)
392{
393 return iwpm_admin.reg_list[nl_client];
394}
395
396
397void iwpm_set_registration(u8 nl_client, u32 reg)
398{
399 iwpm_admin.reg_list[nl_client] = reg;
400}
401
402
403u32 iwpm_check_registration(u8 nl_client, u32 reg)
404{
405 return (iwpm_get_registration(nl_client) & reg);
406}
407
408int iwpm_compare_sockaddr(struct sockaddr_storage *a_sockaddr,
409 struct sockaddr_storage *b_sockaddr)
410{
411 if (a_sockaddr->ss_family != b_sockaddr->ss_family)
412 return 1;
413 if (a_sockaddr->ss_family == AF_INET) {
414 struct sockaddr_in *a4_sockaddr =
415 (struct sockaddr_in *)a_sockaddr;
416 struct sockaddr_in *b4_sockaddr =
417 (struct sockaddr_in *)b_sockaddr;
418 if (!memcmp(&a4_sockaddr->sin_addr,
419 &b4_sockaddr->sin_addr, sizeof(struct in_addr))
420 && a4_sockaddr->sin_port == b4_sockaddr->sin_port)
421 return 0;
422
423 } else if (a_sockaddr->ss_family == AF_INET6) {
424 struct sockaddr_in6 *a6_sockaddr =
425 (struct sockaddr_in6 *)a_sockaddr;
426 struct sockaddr_in6 *b6_sockaddr =
427 (struct sockaddr_in6 *)b_sockaddr;
428 if (!memcmp(&a6_sockaddr->sin6_addr,
429 &b6_sockaddr->sin6_addr, sizeof(struct in6_addr))
430 && a6_sockaddr->sin6_port == b6_sockaddr->sin6_port)
431 return 0;
432
433 } else {
434 pr_err("%s: Invalid sockaddr family\n", __func__);
435 }
436 return 1;
437}
438
439struct sk_buff *iwpm_create_nlmsg(u32 nl_op, struct nlmsghdr **nlh,
440 int nl_client)
441{
442 struct sk_buff *skb = NULL;
443
444 skb = dev_alloc_skb(IWPM_MSG_SIZE);
445 if (!skb) {
446 pr_err("%s Unable to allocate skb\n", __func__);
447 goto create_nlmsg_exit;
448 }
449 if (!(ibnl_put_msg(skb, nlh, 0, 0, nl_client, nl_op,
450 NLM_F_REQUEST))) {
451 pr_warn("%s: Unable to put the nlmsg header\n", __func__);
452 dev_kfree_skb(skb);
453 skb = NULL;
454 }
455create_nlmsg_exit:
456 return skb;
457}
458
459int iwpm_parse_nlmsg(struct netlink_callback *cb, int policy_max,
460 const struct nla_policy *nlmsg_policy,
461 struct nlattr *nltb[], const char *msg_type)
462{
463 int nlh_len = 0;
464 int ret;
465 const char *err_str = "";
466
467 ret = nlmsg_validate(cb->nlh, nlh_len, policy_max-1, nlmsg_policy);
468 if (ret) {
469 err_str = "Invalid attribute";
470 goto parse_nlmsg_error;
471 }
472 ret = nlmsg_parse(cb->nlh, nlh_len, nltb, policy_max-1, nlmsg_policy);
473 if (ret) {
474 err_str = "Unable to parse the nlmsg";
475 goto parse_nlmsg_error;
476 }
477 ret = iwpm_validate_nlmsg_attr(nltb, policy_max);
478 if (ret) {
479 err_str = "Invalid NULL attribute";
480 goto parse_nlmsg_error;
481 }
482 return 0;
483parse_nlmsg_error:
484 pr_warn("%s: %s (msg type %s ret = %d)\n",
485 __func__, err_str, msg_type, ret);
486 return ret;
487}
488
489void iwpm_print_sockaddr(struct sockaddr_storage *sockaddr, char *msg)
490{
491 struct sockaddr_in6 *sockaddr_v6;
492 struct sockaddr_in *sockaddr_v4;
493
494 switch (sockaddr->ss_family) {
495 case AF_INET:
496 sockaddr_v4 = (struct sockaddr_in *)sockaddr;
497 pr_debug("%s IPV4 %pI4: %u(0x%04X)\n",
498 msg, &sockaddr_v4->sin_addr,
499 ntohs(sockaddr_v4->sin_port),
500 ntohs(sockaddr_v4->sin_port));
501 break;
502 case AF_INET6:
503 sockaddr_v6 = (struct sockaddr_in6 *)sockaddr;
504 pr_debug("%s IPV6 %pI6: %u(0x%04X)\n",
505 msg, &sockaddr_v6->sin6_addr,
506 ntohs(sockaddr_v6->sin6_port),
507 ntohs(sockaddr_v6->sin6_port));
508 break;
509 default:
510 break;
511 }
512}
513
514static u32 iwpm_ipv6_jhash(struct sockaddr_in6 *ipv6_sockaddr)
515{
516 u32 ipv6_hash = jhash(&ipv6_sockaddr->sin6_addr, sizeof(struct in6_addr), 0);
517 u32 hash = jhash_2words(ipv6_hash, (__force u32) ipv6_sockaddr->sin6_port, 0);
518 return hash;
519}
520
521static u32 iwpm_ipv4_jhash(struct sockaddr_in *ipv4_sockaddr)
522{
523 u32 ipv4_hash = jhash(&ipv4_sockaddr->sin_addr, sizeof(struct in_addr), 0);
524 u32 hash = jhash_2words(ipv4_hash, (__force u32) ipv4_sockaddr->sin_port, 0);
525 return hash;
526}
527
528static int get_hash_bucket(struct sockaddr_storage *a_sockaddr,
529 struct sockaddr_storage *b_sockaddr, u32 *hash)
530{
531 u32 a_hash, b_hash;
532
533 if (a_sockaddr->ss_family == AF_INET) {
534 a_hash = iwpm_ipv4_jhash((struct sockaddr_in *) a_sockaddr);
535 b_hash = iwpm_ipv4_jhash((struct sockaddr_in *) b_sockaddr);
536
537 } else if (a_sockaddr->ss_family == AF_INET6) {
538 a_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) a_sockaddr);
539 b_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) b_sockaddr);
540 } else {
541 pr_err("%s: Invalid sockaddr family\n", __func__);
542 return -EINVAL;
543 }
544
545 if (a_hash == b_hash)
546 *hash = a_hash;
547 else
548 *hash = jhash_2words(a_hash, b_hash, 0);
549 return 0;
550}
551
552static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage
553 *local_sockaddr, struct sockaddr_storage
554 *mapped_sockaddr)
555{
556 u32 hash;
557 int ret;
558
559 ret = get_hash_bucket(local_sockaddr, mapped_sockaddr, &hash);
560 if (ret)
561 return NULL;
562 return &iwpm_hash_bucket[hash & IWPM_MAPINFO_HASH_MASK];
563}
564
565static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage
566 *mapped_loc_sockaddr, struct sockaddr_storage
567 *mapped_rem_sockaddr)
568{
569 u32 hash;
570 int ret;
571
572 ret = get_hash_bucket(mapped_loc_sockaddr, mapped_rem_sockaddr, &hash);
573 if (ret)
574 return NULL;
575 return &iwpm_reminfo_bucket[hash & IWPM_REMINFO_HASH_MASK];
576}
577
578static int send_mapinfo_num(u32 mapping_num, u8 nl_client, int iwpm_pid)
579{
580 struct sk_buff *skb = NULL;
581 struct nlmsghdr *nlh;
582 u32 msg_seq;
583 const char *err_str = "";
584 int ret = -EINVAL;
585
586 skb = iwpm_create_nlmsg(RDMA_NL_IWPM_MAPINFO_NUM, &nlh, nl_client);
587 if (!skb) {
588 err_str = "Unable to create a nlmsg";
589 goto mapinfo_num_error;
590 }
591 nlh->nlmsg_seq = iwpm_get_nlmsg_seq();
592 msg_seq = 0;
593 err_str = "Unable to put attribute of mapinfo number nlmsg";
594 ret = ibnl_put_attr(skb, nlh, sizeof(u32), &msg_seq, IWPM_NLA_MAPINFO_SEQ);
595 if (ret)
596 goto mapinfo_num_error;
597 ret = ibnl_put_attr(skb, nlh, sizeof(u32),
598 &mapping_num, IWPM_NLA_MAPINFO_SEND_NUM);
599 if (ret)
600 goto mapinfo_num_error;
601
602 nlmsg_end(skb, nlh);
603
604 ret = rdma_nl_unicast(skb, iwpm_pid);
605 if (ret) {
606 skb = NULL;
607 err_str = "Unable to send a nlmsg";
608 goto mapinfo_num_error;
609 }
610 pr_debug("%s: Sent mapping number = %d\n", __func__, mapping_num);
611 return 0;
612mapinfo_num_error:
613 pr_info("%s: %s\n", __func__, err_str);
614 if (skb)
615 dev_kfree_skb(skb);
616 return ret;
617}
618
619static int send_nlmsg_done(struct sk_buff *skb, u8 nl_client, int iwpm_pid)
620{
621 struct nlmsghdr *nlh = NULL;
622 int ret = 0;
623
624 if (!skb)
625 return ret;
626 if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
627 RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
628 pr_warn("%s Unable to put NLMSG_DONE\n", __func__);
629 dev_kfree_skb(skb);
630 return -ENOMEM;
631 }
632 nlh->nlmsg_type = NLMSG_DONE;
633 ret = rdma_nl_unicast(skb, iwpm_pid);
634 if (ret)
635 pr_warn("%s Unable to send a nlmsg\n", __func__);
636 return ret;
637}
638
639int iwpm_send_mapinfo(u8 nl_client, int iwpm_pid)
640{
641 struct iwpm_mapping_info *map_info;
642 struct sk_buff *skb = NULL;
643 struct nlmsghdr *nlh;
644 int skb_num = 0, mapping_num = 0;
645 int i = 0, nlmsg_bytes = 0;
646 unsigned long flags;
647 const char *err_str = "";
648 int ret;
649
650 skb = dev_alloc_skb(NLMSG_GOODSIZE);
651 if (!skb) {
652 ret = -ENOMEM;
653 err_str = "Unable to allocate skb";
654 goto send_mapping_info_exit;
655 }
656 skb_num++;
657 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
658 ret = -EINVAL;
659 for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
660 hlist_for_each_entry(map_info, &iwpm_hash_bucket[i],
661 hlist_node) {
662 if (map_info->nl_client != nl_client)
663 continue;
664 nlh = NULL;
665 if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
666 RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
667 ret = -ENOMEM;
668 err_str = "Unable to put the nlmsg header";
669 goto send_mapping_info_unlock;
670 }
671 err_str = "Unable to put attribute of the nlmsg";
672 ret = ibnl_put_attr(skb, nlh,
673 sizeof(struct sockaddr_storage),
674 &map_info->local_sockaddr,
675 IWPM_NLA_MAPINFO_LOCAL_ADDR);
676 if (ret)
677 goto send_mapping_info_unlock;
678
679 ret = ibnl_put_attr(skb, nlh,
680 sizeof(struct sockaddr_storage),
681 &map_info->mapped_sockaddr,
682 IWPM_NLA_MAPINFO_MAPPED_ADDR);
683 if (ret)
684 goto send_mapping_info_unlock;
685
686 nlmsg_end(skb, nlh);
687
688 iwpm_print_sockaddr(&map_info->local_sockaddr,
689 "send_mapping_info: Local sockaddr:");
690 iwpm_print_sockaddr(&map_info->mapped_sockaddr,
691 "send_mapping_info: Mapped local sockaddr:");
692 mapping_num++;
693 nlmsg_bytes += nlh->nlmsg_len;
694
695
696 if (NLMSG_GOODSIZE - nlmsg_bytes < nlh->nlmsg_len * 2) {
697
698 nlmsg_bytes = 0;
699 skb_num++;
700 spin_unlock_irqrestore(&iwpm_mapinfo_lock,
701 flags);
702
703 ret = send_nlmsg_done(skb, nl_client, iwpm_pid);
704 skb = NULL;
705 if (ret) {
706 err_str = "Unable to send map info";
707 goto send_mapping_info_exit;
708 }
709 if (skb_num == IWPM_MAPINFO_SKB_COUNT) {
710 ret = -ENOMEM;
711 err_str = "Insufficient skbs for map info";
712 goto send_mapping_info_exit;
713 }
714 skb = dev_alloc_skb(NLMSG_GOODSIZE);
715 if (!skb) {
716 ret = -ENOMEM;
717 err_str = "Unable to allocate skb";
718 goto send_mapping_info_exit;
719 }
720 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
721 }
722 }
723 }
724send_mapping_info_unlock:
725 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
726send_mapping_info_exit:
727 if (ret) {
728 pr_warn("%s: %s (ret = %d)\n", __func__, err_str, ret);
729 if (skb)
730 dev_kfree_skb(skb);
731 return ret;
732 }
733 send_nlmsg_done(skb, nl_client, iwpm_pid);
734 return send_mapinfo_num(mapping_num, nl_client, iwpm_pid);
735}
736
737int iwpm_mapinfo_available(void)
738{
739 unsigned long flags;
740 int full_bucket = 0, i = 0;
741
742 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
743 if (iwpm_hash_bucket) {
744 for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
745 if (!hlist_empty(&iwpm_hash_bucket[i])) {
746 full_bucket = 1;
747 break;
748 }
749 }
750 }
751 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
752 return full_bucket;
753}
754