1/*
2 * Copyright (c) 2014 Chelsio, Inc. All rights reserved.
3 * Copyright (c) 2014 Intel Corporation. All rights reserved.
4 *
5 * This software is available to you under a choice of one of two
6 * licenses.  You may choose to be licensed under the terms of the GNU
7 * General Public License (GPL) Version 2, available from the file
8 * COPYING in the main directory of this source tree, or the
9 * OpenIB.org BSD license below:
10 *
11 *     Redistribution and use in source and binary forms, with or
12 *     without modification, are permitted provided that the following
13 *     conditions are met:
14 *
15 *      - Redistributions of source code must retain the above
16 *	  copyright notice, this list of conditions and the following
17 *	  disclaimer.
18 *
19 *      - Redistributions in binary form must reproduce the above
20 *	  copyright notice, this list of conditions and the following
21 *	  disclaimer in the documentation and/or other materials
22 *	  provided with the distribution.
23 *
24 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
25 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
26 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
27 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
28 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
29 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
30 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31 * SOFTWARE.
32 */
33
34#include "iwpm_util.h"
35
36#define IWPM_MAPINFO_HASH_SIZE	512
37#define IWPM_MAPINFO_HASH_MASK	(IWPM_MAPINFO_HASH_SIZE - 1)
38#define IWPM_REMINFO_HASH_SIZE	64
39#define IWPM_REMINFO_HASH_MASK	(IWPM_REMINFO_HASH_SIZE - 1)
40
41static LIST_HEAD(iwpm_nlmsg_req_list);
42static DEFINE_SPINLOCK(iwpm_nlmsg_req_lock);
43
44static struct hlist_head *iwpm_hash_bucket;
45static DEFINE_SPINLOCK(iwpm_mapinfo_lock);
46
47static struct hlist_head *iwpm_reminfo_bucket;
48static DEFINE_SPINLOCK(iwpm_reminfo_lock);
49
50static DEFINE_MUTEX(iwpm_admin_lock);
51static struct iwpm_admin_data iwpm_admin;
52
53int iwpm_init(u8 nl_client)
54{
55	int ret = 0;
56	if (iwpm_valid_client(nl_client))
57		return -EINVAL;
58	mutex_lock(&iwpm_admin_lock);
59	if (atomic_read(&iwpm_admin.refcount) == 0) {
60		iwpm_hash_bucket = kzalloc(IWPM_MAPINFO_HASH_SIZE *
61					sizeof(struct hlist_head), GFP_KERNEL);
62		if (!iwpm_hash_bucket) {
63			ret = -ENOMEM;
64			pr_err("%s Unable to create mapinfo hash table\n", __func__);
65			goto init_exit;
66		}
67		iwpm_reminfo_bucket = kzalloc(IWPM_REMINFO_HASH_SIZE *
68					sizeof(struct hlist_head), GFP_KERNEL);
69		if (!iwpm_reminfo_bucket) {
70			kfree(iwpm_hash_bucket);
71			ret = -ENOMEM;
72			pr_err("%s Unable to create reminfo hash table\n", __func__);
73			goto init_exit;
74		}
75	}
76	atomic_inc(&iwpm_admin.refcount);
77init_exit:
78	mutex_unlock(&iwpm_admin_lock);
79	if (!ret) {
80		iwpm_set_valid(nl_client, 1);
81		iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
82		pr_debug("%s: Mapinfo and reminfo tables are created\n",
83				__func__);
84	}
85	return ret;
86}
87EXPORT_SYMBOL(iwpm_init);
88
89static void free_hash_bucket(void);
90static void free_reminfo_bucket(void);
91
92int iwpm_exit(u8 nl_client)
93{
94
95	if (!iwpm_valid_client(nl_client))
96		return -EINVAL;
97	mutex_lock(&iwpm_admin_lock);
98	if (atomic_read(&iwpm_admin.refcount) == 0) {
99		mutex_unlock(&iwpm_admin_lock);
100		pr_err("%s Incorrect usage - negative refcount\n", __func__);
101		return -EINVAL;
102	}
103	if (atomic_dec_and_test(&iwpm_admin.refcount)) {
104		free_hash_bucket();
105		free_reminfo_bucket();
106		pr_debug("%s: Resources are destroyed\n", __func__);
107	}
108	mutex_unlock(&iwpm_admin_lock);
109	iwpm_set_valid(nl_client, 0);
110	iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
111	return 0;
112}
113EXPORT_SYMBOL(iwpm_exit);
114
115static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage *,
116					       struct sockaddr_storage *);
117
118int iwpm_create_mapinfo(struct sockaddr_storage *local_sockaddr,
119			struct sockaddr_storage *mapped_sockaddr,
120			u8 nl_client)
121{
122	struct hlist_head *hash_bucket_head;
123	struct iwpm_mapping_info *map_info;
124	unsigned long flags;
125	int ret = -EINVAL;
126
127	if (!iwpm_valid_client(nl_client))
128		return ret;
129	map_info = kzalloc(sizeof(struct iwpm_mapping_info), GFP_KERNEL);
130	if (!map_info) {
131		pr_err("%s: Unable to allocate a mapping info\n", __func__);
132		return -ENOMEM;
133	}
134	memcpy(&map_info->local_sockaddr, local_sockaddr,
135	       sizeof(struct sockaddr_storage));
136	memcpy(&map_info->mapped_sockaddr, mapped_sockaddr,
137	       sizeof(struct sockaddr_storage));
138	map_info->nl_client = nl_client;
139
140	spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
141	if (iwpm_hash_bucket) {
142		hash_bucket_head = get_mapinfo_hash_bucket(
143					&map_info->local_sockaddr,
144					&map_info->mapped_sockaddr);
145		if (hash_bucket_head) {
146			hlist_add_head(&map_info->hlist_node, hash_bucket_head);
147			ret = 0;
148		}
149	}
150	spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
151	return ret;
152}
153EXPORT_SYMBOL(iwpm_create_mapinfo);
154
155int iwpm_remove_mapinfo(struct sockaddr_storage *local_sockaddr,
156			struct sockaddr_storage *mapped_local_addr)
157{
158	struct hlist_node *tmp_hlist_node;
159	struct hlist_head *hash_bucket_head;
160	struct iwpm_mapping_info *map_info = NULL;
161	unsigned long flags;
162	int ret = -EINVAL;
163
164	spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
165	if (iwpm_hash_bucket) {
166		hash_bucket_head = get_mapinfo_hash_bucket(
167					local_sockaddr,
168					mapped_local_addr);
169		if (!hash_bucket_head)
170			goto remove_mapinfo_exit;
171
172		hlist_for_each_entry_safe(map_info, tmp_hlist_node,
173					hash_bucket_head, hlist_node) {
174
175			if (!iwpm_compare_sockaddr(&map_info->mapped_sockaddr,
176						mapped_local_addr)) {
177
178				hlist_del_init(&map_info->hlist_node);
179				kfree(map_info);
180				ret = 0;
181				break;
182			}
183		}
184	}
185remove_mapinfo_exit:
186	spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
187	return ret;
188}
189EXPORT_SYMBOL(iwpm_remove_mapinfo);
190
191static void free_hash_bucket(void)
192{
193	struct hlist_node *tmp_hlist_node;
194	struct iwpm_mapping_info *map_info;
195	unsigned long flags;
196	int i;
197
198	/* remove all the mapinfo data from the list */
199	spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
200	for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
201		hlist_for_each_entry_safe(map_info, tmp_hlist_node,
202			&iwpm_hash_bucket[i], hlist_node) {
203
204				hlist_del_init(&map_info->hlist_node);
205				kfree(map_info);
206			}
207	}
208	/* free the hash list */
209	kfree(iwpm_hash_bucket);
210	iwpm_hash_bucket = NULL;
211	spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
212}
213
214static void free_reminfo_bucket(void)
215{
216	struct hlist_node *tmp_hlist_node;
217	struct iwpm_remote_info *rem_info;
218	unsigned long flags;
219	int i;
220
221	/* remove all the remote info from the list */
222	spin_lock_irqsave(&iwpm_reminfo_lock, flags);
223	for (i = 0; i < IWPM_REMINFO_HASH_SIZE; i++) {
224		hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
225			&iwpm_reminfo_bucket[i], hlist_node) {
226
227				hlist_del_init(&rem_info->hlist_node);
228				kfree(rem_info);
229			}
230	}
231	/* free the hash list */
232	kfree(iwpm_reminfo_bucket);
233	iwpm_reminfo_bucket = NULL;
234	spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
235}
236
237static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage *,
238						struct sockaddr_storage *);
239
240void iwpm_add_remote_info(struct iwpm_remote_info *rem_info)
241{
242	struct hlist_head *hash_bucket_head;
243	unsigned long flags;
244
245	spin_lock_irqsave(&iwpm_reminfo_lock, flags);
246	if (iwpm_reminfo_bucket) {
247		hash_bucket_head = get_reminfo_hash_bucket(
248					&rem_info->mapped_loc_sockaddr,
249					&rem_info->mapped_rem_sockaddr);
250		if (hash_bucket_head)
251			hlist_add_head(&rem_info->hlist_node, hash_bucket_head);
252	}
253	spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
254}
255
256int iwpm_get_remote_info(struct sockaddr_storage *mapped_loc_addr,
257				struct sockaddr_storage *mapped_rem_addr,
258				struct sockaddr_storage *remote_addr,
259				u8 nl_client)
260{
261	struct hlist_node *tmp_hlist_node;
262	struct hlist_head *hash_bucket_head;
263	struct iwpm_remote_info *rem_info = NULL;
264	unsigned long flags;
265	int ret = -EINVAL;
266
267	if (!iwpm_valid_client(nl_client)) {
268		pr_info("%s: Invalid client = %d\n", __func__, nl_client);
269		return ret;
270	}
271	spin_lock_irqsave(&iwpm_reminfo_lock, flags);
272	if (iwpm_reminfo_bucket) {
273		hash_bucket_head = get_reminfo_hash_bucket(
274					mapped_loc_addr,
275					mapped_rem_addr);
276		if (!hash_bucket_head)
277			goto get_remote_info_exit;
278		hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
279					hash_bucket_head, hlist_node) {
280
281			if (!iwpm_compare_sockaddr(&rem_info->mapped_loc_sockaddr,
282				mapped_loc_addr) &&
283				!iwpm_compare_sockaddr(&rem_info->mapped_rem_sockaddr,
284				mapped_rem_addr)) {
285
286				memcpy(remote_addr, &rem_info->remote_sockaddr,
287					sizeof(struct sockaddr_storage));
288				iwpm_print_sockaddr(remote_addr,
289						"get_remote_info: Remote sockaddr:");
290
291				hlist_del_init(&rem_info->hlist_node);
292				kfree(rem_info);
293				ret = 0;
294				break;
295			}
296		}
297	}
298get_remote_info_exit:
299	spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
300	return ret;
301}
302EXPORT_SYMBOL(iwpm_get_remote_info);
303
304struct iwpm_nlmsg_request *iwpm_get_nlmsg_request(__u32 nlmsg_seq,
305					u8 nl_client, gfp_t gfp)
306{
307	struct iwpm_nlmsg_request *nlmsg_request = NULL;
308	unsigned long flags;
309
310	nlmsg_request = kzalloc(sizeof(struct iwpm_nlmsg_request), gfp);
311	if (!nlmsg_request) {
312		pr_err("%s Unable to allocate a nlmsg_request\n", __func__);
313		return NULL;
314	}
315	spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
316	list_add_tail(&nlmsg_request->inprocess_list, &iwpm_nlmsg_req_list);
317	spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
318
319	kref_init(&nlmsg_request->kref);
320	kref_get(&nlmsg_request->kref);
321	nlmsg_request->nlmsg_seq = nlmsg_seq;
322	nlmsg_request->nl_client = nl_client;
323	nlmsg_request->request_done = 0;
324	nlmsg_request->err_code = 0;
325	return nlmsg_request;
326}
327
328void iwpm_free_nlmsg_request(struct kref *kref)
329{
330	struct iwpm_nlmsg_request *nlmsg_request;
331	unsigned long flags;
332
333	nlmsg_request = container_of(kref, struct iwpm_nlmsg_request, kref);
334
335	spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
336	list_del_init(&nlmsg_request->inprocess_list);
337	spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
338
339	if (!nlmsg_request->request_done)
340		pr_debug("%s Freeing incomplete nlmsg request (seq = %u).\n",
341			__func__, nlmsg_request->nlmsg_seq);
342	kfree(nlmsg_request);
343}
344
345struct iwpm_nlmsg_request *iwpm_find_nlmsg_request(__u32 echo_seq)
346{
347	struct iwpm_nlmsg_request *nlmsg_request;
348	struct iwpm_nlmsg_request *found_request = NULL;
349	unsigned long flags;
350
351	spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
352	list_for_each_entry(nlmsg_request, &iwpm_nlmsg_req_list,
353			    inprocess_list) {
354		if (nlmsg_request->nlmsg_seq == echo_seq) {
355			found_request = nlmsg_request;
356			kref_get(&nlmsg_request->kref);
357			break;
358		}
359	}
360	spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
361	return found_request;
362}
363
364int iwpm_wait_complete_req(struct iwpm_nlmsg_request *nlmsg_request)
365{
366	int ret;
367	init_waitqueue_head(&nlmsg_request->waitq);
368
369	ret = wait_event_timeout(nlmsg_request->waitq,
370			(nlmsg_request->request_done != 0), IWPM_NL_TIMEOUT);
371	if (!ret) {
372		ret = -EINVAL;
373		pr_info("%s: Timeout %d sec for netlink request (seq = %u)\n",
374			__func__, (IWPM_NL_TIMEOUT/HZ), nlmsg_request->nlmsg_seq);
375	} else {
376		ret = nlmsg_request->err_code;
377	}
378	kref_put(&nlmsg_request->kref, iwpm_free_nlmsg_request);
379	return ret;
380}
381
382int iwpm_get_nlmsg_seq(void)
383{
384	return atomic_inc_return(&iwpm_admin.nlmsg_seq);
385}
386
387int iwpm_valid_client(u8 nl_client)
388{
389	if (nl_client >= RDMA_NL_NUM_CLIENTS)
390		return 0;
391	return iwpm_admin.client_list[nl_client];
392}
393
394void iwpm_set_valid(u8 nl_client, int valid)
395{
396	if (nl_client >= RDMA_NL_NUM_CLIENTS)
397		return;
398	iwpm_admin.client_list[nl_client] = valid;
399}
400
401/* valid client */
402u32 iwpm_get_registration(u8 nl_client)
403{
404	return iwpm_admin.reg_list[nl_client];
405}
406
407/* valid client */
408void iwpm_set_registration(u8 nl_client, u32 reg)
409{
410	iwpm_admin.reg_list[nl_client] = reg;
411}
412
413/* valid client */
414u32 iwpm_check_registration(u8 nl_client, u32 reg)
415{
416	return (iwpm_get_registration(nl_client) & reg);
417}
418
419int iwpm_compare_sockaddr(struct sockaddr_storage *a_sockaddr,
420				struct sockaddr_storage *b_sockaddr)
421{
422	if (a_sockaddr->ss_family != b_sockaddr->ss_family)
423		return 1;
424	if (a_sockaddr->ss_family == AF_INET) {
425		struct sockaddr_in *a4_sockaddr =
426			(struct sockaddr_in *)a_sockaddr;
427		struct sockaddr_in *b4_sockaddr =
428			(struct sockaddr_in *)b_sockaddr;
429		if (!memcmp(&a4_sockaddr->sin_addr,
430			&b4_sockaddr->sin_addr, sizeof(struct in_addr))
431			&& a4_sockaddr->sin_port == b4_sockaddr->sin_port)
432				return 0;
433
434	} else if (a_sockaddr->ss_family == AF_INET6) {
435		struct sockaddr_in6 *a6_sockaddr =
436			(struct sockaddr_in6 *)a_sockaddr;
437		struct sockaddr_in6 *b6_sockaddr =
438			(struct sockaddr_in6 *)b_sockaddr;
439		if (!memcmp(&a6_sockaddr->sin6_addr,
440			&b6_sockaddr->sin6_addr, sizeof(struct in6_addr))
441			&& a6_sockaddr->sin6_port == b6_sockaddr->sin6_port)
442				return 0;
443
444	} else {
445		pr_err("%s: Invalid sockaddr family\n", __func__);
446	}
447	return 1;
448}
449
450struct sk_buff *iwpm_create_nlmsg(u32 nl_op, struct nlmsghdr **nlh,
451						int nl_client)
452{
453	struct sk_buff *skb = NULL;
454
455	skb = dev_alloc_skb(NLMSG_GOODSIZE);
456	if (!skb) {
457		pr_err("%s Unable to allocate skb\n", __func__);
458		goto create_nlmsg_exit;
459	}
460	if (!(ibnl_put_msg(skb, nlh, 0, 0, nl_client, nl_op,
461			   NLM_F_REQUEST))) {
462		pr_warn("%s: Unable to put the nlmsg header\n", __func__);
463		dev_kfree_skb(skb);
464		skb = NULL;
465	}
466create_nlmsg_exit:
467	return skb;
468}
469
470int iwpm_parse_nlmsg(struct netlink_callback *cb, int policy_max,
471				   const struct nla_policy *nlmsg_policy,
472				   struct nlattr *nltb[], const char *msg_type)
473{
474	int nlh_len = 0;
475	int ret;
476	const char *err_str = "";
477
478	ret = nlmsg_validate(cb->nlh, nlh_len, policy_max-1, nlmsg_policy);
479	if (ret) {
480		err_str = "Invalid attribute";
481		goto parse_nlmsg_error;
482	}
483	ret = nlmsg_parse(cb->nlh, nlh_len, nltb, policy_max-1, nlmsg_policy);
484	if (ret) {
485		err_str = "Unable to parse the nlmsg";
486		goto parse_nlmsg_error;
487	}
488	ret = iwpm_validate_nlmsg_attr(nltb, policy_max);
489	if (ret) {
490		err_str = "Invalid NULL attribute";
491		goto parse_nlmsg_error;
492	}
493	return 0;
494parse_nlmsg_error:
495	pr_warn("%s: %s (msg type %s ret = %d)\n",
496			__func__, err_str, msg_type, ret);
497	return ret;
498}
499
500void iwpm_print_sockaddr(struct sockaddr_storage *sockaddr, char *msg)
501{
502	struct sockaddr_in6 *sockaddr_v6;
503	struct sockaddr_in *sockaddr_v4;
504
505	switch (sockaddr->ss_family) {
506	case AF_INET:
507		sockaddr_v4 = (struct sockaddr_in *)sockaddr;
508		pr_debug("%s IPV4 %pI4: %u(0x%04X)\n",
509			msg, &sockaddr_v4->sin_addr,
510			ntohs(sockaddr_v4->sin_port),
511			ntohs(sockaddr_v4->sin_port));
512		break;
513	case AF_INET6:
514		sockaddr_v6 = (struct sockaddr_in6 *)sockaddr;
515		pr_debug("%s IPV6 %pI6: %u(0x%04X)\n",
516			msg, &sockaddr_v6->sin6_addr,
517			ntohs(sockaddr_v6->sin6_port),
518			ntohs(sockaddr_v6->sin6_port));
519		break;
520	default:
521		break;
522	}
523}
524
525static u32 iwpm_ipv6_jhash(struct sockaddr_in6 *ipv6_sockaddr)
526{
527	u32 ipv6_hash = jhash(&ipv6_sockaddr->sin6_addr, sizeof(struct in6_addr), 0);
528	u32 hash = jhash_2words(ipv6_hash, (__force u32) ipv6_sockaddr->sin6_port, 0);
529	return hash;
530}
531
532static u32 iwpm_ipv4_jhash(struct sockaddr_in *ipv4_sockaddr)
533{
534	u32 ipv4_hash = jhash(&ipv4_sockaddr->sin_addr, sizeof(struct in_addr), 0);
535	u32 hash = jhash_2words(ipv4_hash, (__force u32) ipv4_sockaddr->sin_port, 0);
536	return hash;
537}
538
539static int get_hash_bucket(struct sockaddr_storage *a_sockaddr,
540				struct sockaddr_storage *b_sockaddr, u32 *hash)
541{
542	u32 a_hash, b_hash;
543
544	if (a_sockaddr->ss_family == AF_INET) {
545		a_hash = iwpm_ipv4_jhash((struct sockaddr_in *) a_sockaddr);
546		b_hash = iwpm_ipv4_jhash((struct sockaddr_in *) b_sockaddr);
547
548	} else if (a_sockaddr->ss_family == AF_INET6) {
549		a_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) a_sockaddr);
550		b_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) b_sockaddr);
551	} else {
552		pr_err("%s: Invalid sockaddr family\n", __func__);
553		return -EINVAL;
554	}
555
556	if (a_hash == b_hash) /* if port mapper isn't available */
557		*hash = a_hash;
558	else
559		*hash = jhash_2words(a_hash, b_hash, 0);
560	return 0;
561}
562
563static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage
564				*local_sockaddr, struct sockaddr_storage
565				*mapped_sockaddr)
566{
567	u32 hash;
568	int ret;
569
570	ret = get_hash_bucket(local_sockaddr, mapped_sockaddr, &hash);
571	if (ret)
572		return NULL;
573	return &iwpm_hash_bucket[hash & IWPM_MAPINFO_HASH_MASK];
574}
575
576static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage
577				*mapped_loc_sockaddr, struct sockaddr_storage
578				*mapped_rem_sockaddr)
579{
580	u32 hash;
581	int ret;
582
583	ret = get_hash_bucket(mapped_loc_sockaddr, mapped_rem_sockaddr, &hash);
584	if (ret)
585		return NULL;
586	return &iwpm_reminfo_bucket[hash & IWPM_REMINFO_HASH_MASK];
587}
588
589static int send_mapinfo_num(u32 mapping_num, u8 nl_client, int iwpm_pid)
590{
591	struct sk_buff *skb = NULL;
592	struct nlmsghdr *nlh;
593	u32 msg_seq;
594	const char *err_str = "";
595	int ret = -EINVAL;
596
597	skb = iwpm_create_nlmsg(RDMA_NL_IWPM_MAPINFO_NUM, &nlh, nl_client);
598	if (!skb) {
599		err_str = "Unable to create a nlmsg";
600		goto mapinfo_num_error;
601	}
602	nlh->nlmsg_seq = iwpm_get_nlmsg_seq();
603	msg_seq = 0;
604	err_str = "Unable to put attribute of mapinfo number nlmsg";
605	ret = ibnl_put_attr(skb, nlh, sizeof(u32), &msg_seq, IWPM_NLA_MAPINFO_SEQ);
606	if (ret)
607		goto mapinfo_num_error;
608	ret = ibnl_put_attr(skb, nlh, sizeof(u32),
609				&mapping_num, IWPM_NLA_MAPINFO_SEND_NUM);
610	if (ret)
611		goto mapinfo_num_error;
612	ret = ibnl_unicast(skb, nlh, iwpm_pid);
613	if (ret) {
614		skb = NULL;
615		err_str = "Unable to send a nlmsg";
616		goto mapinfo_num_error;
617	}
618	pr_debug("%s: Sent mapping number = %d\n", __func__, mapping_num);
619	return 0;
620mapinfo_num_error:
621	pr_info("%s: %s\n", __func__, err_str);
622	if (skb)
623		dev_kfree_skb(skb);
624	return ret;
625}
626
627static int send_nlmsg_done(struct sk_buff *skb, u8 nl_client, int iwpm_pid)
628{
629	struct nlmsghdr *nlh = NULL;
630	int ret = 0;
631
632	if (!skb)
633		return ret;
634	if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
635			   RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
636		pr_warn("%s Unable to put NLMSG_DONE\n", __func__);
637		return -ENOMEM;
638	}
639	nlh->nlmsg_type = NLMSG_DONE;
640	ret = ibnl_unicast(skb, (struct nlmsghdr *)skb->data, iwpm_pid);
641	if (ret)
642		pr_warn("%s Unable to send a nlmsg\n", __func__);
643	return ret;
644}
645
646int iwpm_send_mapinfo(u8 nl_client, int iwpm_pid)
647{
648	struct iwpm_mapping_info *map_info;
649	struct sk_buff *skb = NULL;
650	struct nlmsghdr *nlh;
651	int skb_num = 0, mapping_num = 0;
652	int i = 0, nlmsg_bytes = 0;
653	unsigned long flags;
654	const char *err_str = "";
655	int ret;
656
657	skb = dev_alloc_skb(NLMSG_GOODSIZE);
658	if (!skb) {
659		ret = -ENOMEM;
660		err_str = "Unable to allocate skb";
661		goto send_mapping_info_exit;
662	}
663	skb_num++;
664	spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
665	for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
666		hlist_for_each_entry(map_info, &iwpm_hash_bucket[i],
667				     hlist_node) {
668			if (map_info->nl_client != nl_client)
669				continue;
670			nlh = NULL;
671			if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
672					RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
673				ret = -ENOMEM;
674				err_str = "Unable to put the nlmsg header";
675				goto send_mapping_info_unlock;
676			}
677			err_str = "Unable to put attribute of the nlmsg";
678			ret = ibnl_put_attr(skb, nlh,
679					sizeof(struct sockaddr_storage),
680					&map_info->local_sockaddr,
681					IWPM_NLA_MAPINFO_LOCAL_ADDR);
682			if (ret)
683				goto send_mapping_info_unlock;
684
685			ret = ibnl_put_attr(skb, nlh,
686					sizeof(struct sockaddr_storage),
687					&map_info->mapped_sockaddr,
688					IWPM_NLA_MAPINFO_MAPPED_ADDR);
689			if (ret)
690				goto send_mapping_info_unlock;
691
692			iwpm_print_sockaddr(&map_info->local_sockaddr,
693				"send_mapping_info: Local sockaddr:");
694			iwpm_print_sockaddr(&map_info->mapped_sockaddr,
695				"send_mapping_info: Mapped local sockaddr:");
696			mapping_num++;
697			nlmsg_bytes += nlh->nlmsg_len;
698
699			/* check if all mappings can fit in one skb */
700			if (NLMSG_GOODSIZE - nlmsg_bytes < nlh->nlmsg_len * 2) {
701				/* and leave room for NLMSG_DONE */
702				nlmsg_bytes = 0;
703				skb_num++;
704				spin_unlock_irqrestore(&iwpm_mapinfo_lock,
705						       flags);
706				/* send the skb */
707				ret = send_nlmsg_done(skb, nl_client, iwpm_pid);
708				skb = NULL;
709				if (ret) {
710					err_str = "Unable to send map info";
711					goto send_mapping_info_exit;
712				}
713				if (skb_num == IWPM_MAPINFO_SKB_COUNT) {
714					ret = -ENOMEM;
715					err_str = "Insufficient skbs for map info";
716					goto send_mapping_info_exit;
717				}
718				skb = dev_alloc_skb(NLMSG_GOODSIZE);
719				if (!skb) {
720					ret = -ENOMEM;
721					err_str = "Unable to allocate skb";
722					goto send_mapping_info_exit;
723				}
724				spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
725			}
726		}
727	}
728send_mapping_info_unlock:
729	spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
730send_mapping_info_exit:
731	if (ret) {
732		pr_warn("%s: %s (ret = %d)\n", __func__, err_str, ret);
733		if (skb)
734			dev_kfree_skb(skb);
735		return ret;
736	}
737	send_nlmsg_done(skb, nl_client, iwpm_pid);
738	return send_mapinfo_num(mapping_num, nl_client, iwpm_pid);
739}
740
741int iwpm_mapinfo_available(void)
742{
743	unsigned long flags;
744	int full_bucket = 0, i = 0;
745
746	spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
747	if (iwpm_hash_bucket) {
748		for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
749			if (!hlist_empty(&iwpm_hash_bucket[i])) {
750				full_bucket = 1;
751				break;
752			}
753		}
754	}
755	spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
756	return full_bucket;
757}
758