2006-06-18 11:37:29 +08:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2005 Voltaire Inc. All rights reserved.
|
|
|
|
* Copyright (c) 2002-2005, Network Appliance, Inc. All rights reserved.
|
|
|
|
* Copyright (c) 1999-2005, Mellanox Technologies, Inc. All rights reserved.
|
|
|
|
* Copyright (c) 2005-2006 Intel Corporation. All rights reserved.
|
|
|
|
*
|
2008-07-15 14:48:43 +08:00
|
|
|
* This software is available to you under a choice of one of two
|
|
|
|
* licenses. You may choose to be licensed under the terms of the GNU
|
|
|
|
* General Public License (GPL) Version 2, available from the file
|
|
|
|
* COPYING in the main directory of this source tree, or the
|
|
|
|
* OpenIB.org BSD license below:
|
2006-06-18 11:37:29 +08:00
|
|
|
*
|
2008-07-15 14:48:43 +08:00
|
|
|
* Redistribution and use in source and binary forms, with or
|
|
|
|
* without modification, are permitted provided that the following
|
|
|
|
* conditions are met:
|
2006-06-18 11:37:29 +08:00
|
|
|
*
|
2008-07-15 14:48:43 +08:00
|
|
|
* - Redistributions of source code must retain the above
|
|
|
|
* copyright notice, this list of conditions and the following
|
|
|
|
* disclaimer.
|
2006-06-18 11:37:29 +08:00
|
|
|
*
|
2008-07-15 14:48:43 +08:00
|
|
|
* - Redistributions in binary form must reproduce the above
|
|
|
|
* copyright notice, this list of conditions and the following
|
|
|
|
* disclaimer in the documentation and/or other materials
|
|
|
|
* provided with the distribution.
|
2006-06-18 11:37:29 +08:00
|
|
|
*
|
2008-07-15 14:48:43 +08:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
|
|
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
* SOFTWARE.
|
2006-06-18 11:37:29 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/completion.h>
|
|
|
|
#include <linux/in.h>
|
|
|
|
#include <linux/in6.h>
|
|
|
|
#include <linux/mutex.h>
|
|
|
|
#include <linux/random.h>
|
2015-12-23 20:56:57 +08:00
|
|
|
#include <linux/igmp.h>
|
2006-06-18 11:37:29 +08:00
|
|
|
#include <linux/idr.h>
|
2006-08-04 05:02:42 +08:00
|
|
|
#include <linux/inetdevice.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2011-05-28 03:35:46 +08:00
|
|
|
#include <linux/module.h>
|
2012-04-05 05:33:29 +08:00
|
|
|
#include <net/route.h>
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-10-22 20:20:09 +08:00
|
|
|
#include <net/net_namespace.h>
|
|
|
|
#include <net/netns/generic.h>
|
2006-06-18 11:37:29 +08:00
|
|
|
#include <net/tcp.h>
|
2008-12-25 02:16:45 +08:00
|
|
|
#include <net/ipv6.h>
|
2015-07-30 22:50:23 +08:00
|
|
|
#include <net/ip_fib.h>
|
|
|
|
#include <net/ip6_route.h>
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
#include <rdma/rdma_cm.h>
|
|
|
|
#include <rdma/rdma_cm_ib.h>
|
2011-01-03 23:33:53 +08:00
|
|
|
#include <rdma/rdma_netlink.h>
|
2013-05-30 01:09:09 +08:00
|
|
|
#include <rdma/ib.h>
|
2006-06-18 11:37:29 +08:00
|
|
|
#include <rdma/ib_cache.h>
|
|
|
|
#include <rdma/ib_cm.h>
|
|
|
|
#include <rdma/ib_sa.h>
|
2006-08-04 05:02:42 +08:00
|
|
|
#include <rdma/iw_cm.h>
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-12-23 20:56:54 +08:00
|
|
|
#include "core_priv.h"
|
2018-03-02 05:57:36 +08:00
|
|
|
#include "cma_priv.h"
|
2015-12-23 20:56:54 +08:00
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
MODULE_AUTHOR("Sean Hefty");
|
|
|
|
MODULE_DESCRIPTION("Generic RDMA CM Agent");
|
|
|
|
MODULE_LICENSE("Dual BSD/GPL");
|
|
|
|
|
|
|
|
#define CMA_CM_RESPONSE_TIMEOUT 20
|
2016-07-06 21:36:35 +08:00
|
|
|
#define CMA_QUERY_CLASSPORT_INFO_TIMEOUT 3000
|
2006-09-13 20:01:54 +08:00
|
|
|
#define CMA_MAX_CM_RETRIES 15
|
2007-08-02 05:47:16 +08:00
|
|
|
#define CMA_CM_MRA_SETTING (IB_CM_MRA_FLAG_DELAY | 24)
|
2010-10-14 03:26:51 +08:00
|
|
|
#define CMA_IBOE_PACKET_LIFETIME 18
|
2017-08-17 20:50:32 +08:00
|
|
|
#define CMA_PREFERRED_ROCE_GID_TYPE IB_GID_TYPE_ROCE_UDP_ENCAP
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-05-18 18:40:28 +08:00
|
|
|
static const char * const cma_events[] = {
|
|
|
|
[RDMA_CM_EVENT_ADDR_RESOLVED] = "address resolved",
|
|
|
|
[RDMA_CM_EVENT_ADDR_ERROR] = "address error",
|
|
|
|
[RDMA_CM_EVENT_ROUTE_RESOLVED] = "route resolved ",
|
|
|
|
[RDMA_CM_EVENT_ROUTE_ERROR] = "route error",
|
|
|
|
[RDMA_CM_EVENT_CONNECT_REQUEST] = "connect request",
|
|
|
|
[RDMA_CM_EVENT_CONNECT_RESPONSE] = "connect response",
|
|
|
|
[RDMA_CM_EVENT_CONNECT_ERROR] = "connect error",
|
|
|
|
[RDMA_CM_EVENT_UNREACHABLE] = "unreachable",
|
|
|
|
[RDMA_CM_EVENT_REJECTED] = "rejected",
|
|
|
|
[RDMA_CM_EVENT_ESTABLISHED] = "established",
|
|
|
|
[RDMA_CM_EVENT_DISCONNECTED] = "disconnected",
|
|
|
|
[RDMA_CM_EVENT_DEVICE_REMOVAL] = "device removal",
|
|
|
|
[RDMA_CM_EVENT_MULTICAST_JOIN] = "multicast join",
|
|
|
|
[RDMA_CM_EVENT_MULTICAST_ERROR] = "multicast error",
|
|
|
|
[RDMA_CM_EVENT_ADDR_CHANGE] = "address change",
|
|
|
|
[RDMA_CM_EVENT_TIMEWAIT_EXIT] = "timewait exit",
|
|
|
|
};
|
|
|
|
|
2015-08-04 01:01:52 +08:00
|
|
|
const char *__attribute_const__ rdma_event_msg(enum rdma_cm_event_type event)
|
2015-05-18 18:40:28 +08:00
|
|
|
{
|
|
|
|
size_t index = event;
|
|
|
|
|
|
|
|
return (index < ARRAY_SIZE(cma_events) && cma_events[index]) ?
|
|
|
|
cma_events[index] : "unrecognized event";
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_event_msg);
|
|
|
|
|
2016-10-27 03:36:40 +08:00
|
|
|
const char *__attribute_const__ rdma_reject_msg(struct rdma_cm_id *id,
|
|
|
|
int reason)
|
|
|
|
{
|
|
|
|
if (rdma_ib_or_roce(id->device, id->port_num))
|
|
|
|
return ibcm_reject_msg(reason);
|
|
|
|
|
|
|
|
if (rdma_protocol_iwarp(id->device, id->port_num))
|
|
|
|
return iwcm_reject_msg(reason);
|
|
|
|
|
|
|
|
WARN_ON_ONCE(1);
|
|
|
|
return "unrecognized transport";
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_reject_msg);
|
|
|
|
|
2016-10-27 03:36:47 +08:00
|
|
|
bool rdma_is_consumer_reject(struct rdma_cm_id *id, int reason)
|
|
|
|
{
|
|
|
|
if (rdma_ib_or_roce(id->device, id->port_num))
|
|
|
|
return reason == IB_CM_REJ_CONSUMER_DEFINED;
|
|
|
|
|
|
|
|
if (rdma_protocol_iwarp(id->device, id->port_num))
|
|
|
|
return reason == -ECONNREFUSED;
|
|
|
|
|
|
|
|
WARN_ON_ONCE(1);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_is_consumer_reject);
|
|
|
|
|
2016-10-27 03:36:47 +08:00
|
|
|
const void *rdma_consumer_reject_data(struct rdma_cm_id *id,
|
|
|
|
struct rdma_cm_event *ev, u8 *data_len)
|
|
|
|
{
|
|
|
|
const void *p;
|
|
|
|
|
|
|
|
if (rdma_is_consumer_reject(id, ev->status)) {
|
|
|
|
*data_len = ev->param.conn.private_data_len;
|
|
|
|
p = ev->param.conn.private_data;
|
|
|
|
} else {
|
|
|
|
*data_len = 0;
|
|
|
|
p = NULL;
|
|
|
|
}
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_consumer_reject_data);
|
|
|
|
|
2018-05-10 22:31:36 +08:00
|
|
|
/**
|
|
|
|
* rdma_iw_cm_id() - return the iw_cm_id pointer for this cm_id.
|
|
|
|
* @id: Communication Identifier
|
|
|
|
*/
|
|
|
|
struct iw_cm_id *rdma_iw_cm_id(struct rdma_cm_id *id)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
|
|
|
if (id->device->node_type == RDMA_NODE_RNIC)
|
|
|
|
return id_priv->cm_id.iw;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_iw_cm_id);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rdma_res_to_id() - return the rdma_cm_id pointer for this restrack.
|
|
|
|
* @res: rdma resource tracking entry pointer
|
|
|
|
*/
|
|
|
|
struct rdma_cm_id *rdma_res_to_id(struct rdma_restrack_entry *res)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv =
|
|
|
|
container_of(res, struct rdma_id_private, res);
|
|
|
|
|
|
|
|
return &id_priv->id;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_res_to_id);
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static void cma_add_one(struct ib_device *device);
|
2015-07-30 22:50:14 +08:00
|
|
|
static void cma_remove_one(struct ib_device *device, void *client_data);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
static struct ib_client cma_client = {
|
|
|
|
.name = "cma",
|
|
|
|
.add = cma_add_one,
|
|
|
|
.remove = cma_remove_one
|
|
|
|
};
|
|
|
|
|
2006-08-22 07:40:12 +08:00
|
|
|
static struct ib_sa_client sa_client;
|
2006-06-18 11:37:29 +08:00
|
|
|
static LIST_HEAD(dev_list);
|
|
|
|
static LIST_HEAD(listen_any_list);
|
|
|
|
static DEFINE_MUTEX(lock);
|
|
|
|
static struct workqueue_struct *cma_wq;
|
netns: make struct pernet_operations::id unsigned int
Make struct pernet_operations::id unsigned.
There are 2 reasons to do so:
1)
This field is really an index into an zero based array and
thus is unsigned entity. Using negative value is out-of-bound
access by definition.
2)
On x86_64 unsigned 32-bit data which are mixed with pointers
via array indexing or offsets added or subtracted to pointers
are preffered to signed 32-bit data.
"int" being used as an array index needs to be sign-extended
to 64-bit before being used.
void f(long *p, int i)
{
g(p[i]);
}
roughly translates to
movsx rsi, esi
mov rdi, [rsi+...]
call g
MOVSX is 3 byte instruction which isn't necessary if the variable is
unsigned because x86_64 is zero extending by default.
Now, there is net_generic() function which, you guessed it right, uses
"int" as an array index:
static inline void *net_generic(const struct net *net, int id)
{
...
ptr = ng->ptr[id - 1];
...
}
And this function is used a lot, so those sign extensions add up.
Patch snipes ~1730 bytes on allyesconfig kernel (without all junk
messing with code generation):
add/remove: 0/0 grow/shrink: 70/598 up/down: 396/-2126 (-1730)
Unfortunately some functions actually grow bigger.
This is a semmingly random artefact of code generation with register
allocator being used differently. gcc decides that some variable
needs to live in new r8+ registers and every access now requires REX
prefix. Or it is shifted into r12, so [r12+0] addressing mode has to be
used which is longer than [r8]
However, overall balance is in negative direction:
add/remove: 0/0 grow/shrink: 70/598 up/down: 396/-2126 (-1730)
function old new delta
nfsd4_lock 3886 3959 +73
tipc_link_build_proto_msg 1096 1140 +44
mac80211_hwsim_new_radio 2776 2808 +32
tipc_mon_rcv 1032 1058 +26
svcauth_gss_legacy_init 1413 1429 +16
tipc_bcbase_select_primary 379 392 +13
nfsd4_exchange_id 1247 1260 +13
nfsd4_setclientid_confirm 782 793 +11
...
put_client_renew_locked 494 480 -14
ip_set_sockfn_get 730 716 -14
geneve_sock_add 829 813 -16
nfsd4_sequence_done 721 703 -18
nlmclnt_lookup_host 708 686 -22
nfsd4_lockt 1085 1063 -22
nfs_get_client 1077 1050 -27
tcf_bpf_init 1106 1076 -30
nfsd4_encode_fattr 5997 5930 -67
Total: Before=154856051, After=154854321, chg -0.00%
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-11-17 09:58:21 +08:00
|
|
|
static unsigned int cma_pernet_id;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-10-22 20:20:09 +08:00
|
|
|
struct cma_pernet {
|
|
|
|
struct idr tcp_ps;
|
|
|
|
struct idr udp_ps;
|
|
|
|
struct idr ipoib_ps;
|
|
|
|
struct idr ib_ps;
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct cma_pernet *cma_pernet(struct net *net)
|
|
|
|
{
|
|
|
|
return net_generic(net, cma_pernet_id);
|
|
|
|
}
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static struct idr *cma_pernet_idr(struct net *net, enum rdma_ucm_port_space ps)
|
2015-07-30 22:50:20 +08:00
|
|
|
{
|
2015-10-22 20:20:09 +08:00
|
|
|
struct cma_pernet *pernet = cma_pernet(net);
|
|
|
|
|
2015-07-30 22:50:20 +08:00
|
|
|
switch (ps) {
|
|
|
|
case RDMA_PS_TCP:
|
2015-10-22 20:20:09 +08:00
|
|
|
return &pernet->tcp_ps;
|
2015-07-30 22:50:20 +08:00
|
|
|
case RDMA_PS_UDP:
|
2015-10-22 20:20:09 +08:00
|
|
|
return &pernet->udp_ps;
|
2015-07-30 22:50:20 +08:00
|
|
|
case RDMA_PS_IPOIB:
|
2015-10-22 20:20:09 +08:00
|
|
|
return &pernet->ipoib_ps;
|
2015-07-30 22:50:20 +08:00
|
|
|
case RDMA_PS_IB:
|
2015-10-22 20:20:09 +08:00
|
|
|
return &pernet->ib_ps;
|
2015-07-30 22:50:20 +08:00
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
struct cma_device {
|
|
|
|
struct list_head list;
|
|
|
|
struct ib_device *device;
|
|
|
|
struct completion comp;
|
|
|
|
atomic_t refcount;
|
|
|
|
struct list_head id_list;
|
2015-12-23 20:56:55 +08:00
|
|
|
enum ib_gid_type *default_gid_type;
|
2017-02-14 13:21:52 +08:00
|
|
|
u8 *default_roce_tos;
|
2006-06-18 11:37:29 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct rdma_bind_list {
|
2018-03-27 23:38:07 +08:00
|
|
|
enum rdma_ucm_port_space ps;
|
2006-06-18 11:37:29 +08:00
|
|
|
struct hlist_head owners;
|
|
|
|
unsigned short port;
|
|
|
|
};
|
|
|
|
|
2016-07-06 21:36:35 +08:00
|
|
|
struct class_port_info_context {
|
|
|
|
struct ib_class_port_info *class_port_info;
|
|
|
|
struct ib_device *device;
|
|
|
|
struct completion done;
|
|
|
|
struct ib_sa_query *sa_query;
|
|
|
|
u8 port_num;
|
|
|
|
};
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static int cma_ps_alloc(struct net *net, enum rdma_ucm_port_space ps,
|
2015-07-30 22:50:20 +08:00
|
|
|
struct rdma_bind_list *bind_list, int snum)
|
|
|
|
{
|
2015-10-22 20:20:09 +08:00
|
|
|
struct idr *idr = cma_pernet_idr(net, ps);
|
2015-07-30 22:50:20 +08:00
|
|
|
|
|
|
|
return idr_alloc(idr, bind_list, snum, snum + 1, GFP_KERNEL);
|
|
|
|
}
|
|
|
|
|
2015-10-22 20:20:09 +08:00
|
|
|
static struct rdma_bind_list *cma_ps_find(struct net *net,
|
2018-03-27 23:38:07 +08:00
|
|
|
enum rdma_ucm_port_space ps, int snum)
|
2015-07-30 22:50:20 +08:00
|
|
|
{
|
2015-10-22 20:20:09 +08:00
|
|
|
struct idr *idr = cma_pernet_idr(net, ps);
|
2015-07-30 22:50:20 +08:00
|
|
|
|
|
|
|
return idr_find(idr, snum);
|
|
|
|
}
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static void cma_ps_remove(struct net *net, enum rdma_ucm_port_space ps,
|
|
|
|
int snum)
|
2015-07-30 22:50:20 +08:00
|
|
|
{
|
2015-10-22 20:20:09 +08:00
|
|
|
struct idr *idr = cma_pernet_idr(net, ps);
|
2015-07-30 22:50:20 +08:00
|
|
|
|
|
|
|
idr_remove(idr, snum);
|
|
|
|
}
|
|
|
|
|
2012-06-15 04:31:39 +08:00
|
|
|
enum {
|
|
|
|
CMA_OPTION_AFONLY,
|
|
|
|
};
|
|
|
|
|
2015-12-23 20:56:54 +08:00
|
|
|
void cma_ref_dev(struct cma_device *cma_dev)
|
|
|
|
{
|
|
|
|
atomic_inc(&cma_dev->refcount);
|
|
|
|
}
|
|
|
|
|
2015-12-23 20:56:55 +08:00
|
|
|
struct cma_device *cma_enum_devices_by_ibdev(cma_device_filter filter,
|
|
|
|
void *cookie)
|
|
|
|
{
|
|
|
|
struct cma_device *cma_dev;
|
|
|
|
struct cma_device *found_cma_dev = NULL;
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
|
|
|
|
list_for_each_entry(cma_dev, &dev_list, list)
|
|
|
|
if (filter(cma_dev->device, cookie)) {
|
|
|
|
found_cma_dev = cma_dev;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (found_cma_dev)
|
|
|
|
cma_ref_dev(found_cma_dev);
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
return found_cma_dev;
|
|
|
|
}
|
|
|
|
|
|
|
|
int cma_get_default_gid_type(struct cma_device *cma_dev,
|
|
|
|
unsigned int port)
|
|
|
|
{
|
2017-01-26 00:41:37 +08:00
|
|
|
if (!rdma_is_port_valid(cma_dev->device, port))
|
2015-12-23 20:56:55 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
return cma_dev->default_gid_type[port - rdma_start_port(cma_dev->device)];
|
|
|
|
}
|
|
|
|
|
|
|
|
int cma_set_default_gid_type(struct cma_device *cma_dev,
|
|
|
|
unsigned int port,
|
|
|
|
enum ib_gid_type default_gid_type)
|
|
|
|
{
|
|
|
|
unsigned long supported_gids;
|
|
|
|
|
2017-01-26 00:41:37 +08:00
|
|
|
if (!rdma_is_port_valid(cma_dev->device, port))
|
2015-12-23 20:56:55 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
supported_gids = roce_gid_type_mask_support(cma_dev->device, port);
|
|
|
|
|
|
|
|
if (!(supported_gids & 1 << default_gid_type))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
cma_dev->default_gid_type[port - rdma_start_port(cma_dev->device)] =
|
|
|
|
default_gid_type;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-02-14 13:21:52 +08:00
|
|
|
int cma_get_default_roce_tos(struct cma_device *cma_dev, unsigned int port)
|
|
|
|
{
|
|
|
|
if (!rdma_is_port_valid(cma_dev->device, port))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
return cma_dev->default_roce_tos[port - rdma_start_port(cma_dev->device)];
|
|
|
|
}
|
|
|
|
|
|
|
|
int cma_set_default_roce_tos(struct cma_device *cma_dev, unsigned int port,
|
|
|
|
u8 default_roce_tos)
|
|
|
|
{
|
|
|
|
if (!rdma_is_port_valid(cma_dev->device, port))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
cma_dev->default_roce_tos[port - rdma_start_port(cma_dev->device)] =
|
|
|
|
default_roce_tos;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2015-12-23 20:56:55 +08:00
|
|
|
struct ib_device *cma_get_ib_dev(struct cma_device *cma_dev)
|
|
|
|
{
|
|
|
|
return cma_dev->device;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
/*
|
|
|
|
* Device removal can occur at anytime, so we need extra handling to
|
|
|
|
* serialize notifying the user of device removal with other callbacks.
|
|
|
|
* We do this by disabling removal notification while a callback is in process,
|
|
|
|
* and reporting it after the callback completes.
|
|
|
|
*/
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
struct cma_multicast {
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
union {
|
|
|
|
struct ib_sa_multicast *ib;
|
|
|
|
} multicast;
|
|
|
|
struct list_head list;
|
|
|
|
void *context;
|
2008-08-05 02:02:14 +08:00
|
|
|
struct sockaddr_storage addr;
|
2010-10-14 03:26:51 +08:00
|
|
|
struct kref mcref;
|
2016-07-06 21:36:35 +08:00
|
|
|
u8 join_state;
|
2007-02-16 09:00:18 +08:00
|
|
|
};
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
struct cma_work {
|
|
|
|
struct work_struct work;
|
|
|
|
struct rdma_id_private *id;
|
2011-05-21 02:46:11 +08:00
|
|
|
enum rdma_cm_state old_state;
|
|
|
|
enum rdma_cm_state new_state;
|
2006-06-18 11:37:29 +08:00
|
|
|
struct rdma_cm_event event;
|
|
|
|
};
|
|
|
|
|
2008-07-23 05:14:22 +08:00
|
|
|
struct cma_ndev_work {
|
|
|
|
struct work_struct work;
|
|
|
|
struct rdma_id_private *id;
|
|
|
|
struct rdma_cm_event event;
|
|
|
|
};
|
|
|
|
|
2010-10-14 03:26:51 +08:00
|
|
|
struct iboe_mcast_work {
|
|
|
|
struct work_struct work;
|
|
|
|
struct rdma_id_private *id;
|
|
|
|
struct cma_multicast *mc;
|
|
|
|
};
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
union cma_ip_addr {
|
|
|
|
struct in6_addr ip6;
|
|
|
|
struct {
|
2008-03-29 11:10:28 +08:00
|
|
|
__be32 pad[3];
|
|
|
|
__be32 addr;
|
2006-06-18 11:37:29 +08:00
|
|
|
} ip4;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct cma_hdr {
|
|
|
|
u8 cma_version;
|
|
|
|
u8 ip_version; /* IP version: 7:4 */
|
2008-03-29 11:10:28 +08:00
|
|
|
__be16 port;
|
2006-06-18 11:37:29 +08:00
|
|
|
union cma_ip_addr src_addr;
|
|
|
|
union cma_ip_addr dst_addr;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define CMA_VERSION 0x00
|
|
|
|
|
2015-07-30 22:50:22 +08:00
|
|
|
struct cma_req_info {
|
2018-04-25 01:13:45 +08:00
|
|
|
struct sockaddr_storage listen_addr_storage;
|
|
|
|
struct sockaddr_storage src_addr_storage;
|
2015-07-30 22:50:22 +08:00
|
|
|
struct ib_device *device;
|
|
|
|
union ib_gid local_gid;
|
|
|
|
__be64 service_id;
|
2018-07-29 16:53:12 +08:00
|
|
|
int port;
|
|
|
|
bool has_gid;
|
2015-07-30 22:50:22 +08:00
|
|
|
u16 pkey;
|
|
|
|
};
|
|
|
|
|
2011-05-21 02:46:11 +08:00
|
|
|
static int cma_comp(struct rdma_id_private *id_priv, enum rdma_cm_state comp)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&id_priv->lock, flags);
|
|
|
|
ret = (id_priv->state == comp);
|
|
|
|
spin_unlock_irqrestore(&id_priv->lock, flags);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_comp_exch(struct rdma_id_private *id_priv,
|
2011-05-21 02:46:11 +08:00
|
|
|
enum rdma_cm_state comp, enum rdma_cm_state exch)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&id_priv->lock, flags);
|
|
|
|
if ((ret = (id_priv->state == comp)))
|
|
|
|
id_priv->state = exch;
|
|
|
|
spin_unlock_irqrestore(&id_priv->lock, flags);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-05-21 02:46:11 +08:00
|
|
|
static enum rdma_cm_state cma_exch(struct rdma_id_private *id_priv,
|
|
|
|
enum rdma_cm_state exch)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
2011-05-21 02:46:11 +08:00
|
|
|
enum rdma_cm_state old;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
spin_lock_irqsave(&id_priv->lock, flags);
|
|
|
|
old = id_priv->state;
|
|
|
|
id_priv->state = exch;
|
|
|
|
spin_unlock_irqrestore(&id_priv->lock, flags);
|
|
|
|
return old;
|
|
|
|
}
|
|
|
|
|
2015-07-30 22:50:22 +08:00
|
|
|
static inline u8 cma_get_ip_ver(const struct cma_hdr *hdr)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
return hdr->ip_version >> 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void cma_set_ip_ver(struct cma_hdr *hdr, u8 ip_ver)
|
|
|
|
{
|
|
|
|
hdr->ip_version = (ip_ver << 4) | (hdr->ip_version & 0xF);
|
|
|
|
}
|
|
|
|
|
2015-12-23 20:56:57 +08:00
|
|
|
static int cma_igmp_send(struct net_device *ndev, union ib_gid *mgid, bool join)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2015-12-23 20:56:57 +08:00
|
|
|
struct in_device *in_dev = NULL;
|
|
|
|
|
|
|
|
if (ndev) {
|
|
|
|
rtnl_lock();
|
|
|
|
in_dev = __in_dev_get_rtnl(ndev);
|
|
|
|
if (in_dev) {
|
|
|
|
if (join)
|
|
|
|
ip_mc_inc_group(in_dev,
|
|
|
|
*(__be32 *)(mgid->raw + 12));
|
|
|
|
else
|
|
|
|
ip_mc_dec_group(in_dev,
|
|
|
|
*(__be32 *)(mgid->raw + 12));
|
|
|
|
}
|
|
|
|
rtnl_unlock();
|
|
|
|
}
|
|
|
|
return (in_dev) ? 0 : -ENODEV;
|
|
|
|
}
|
|
|
|
|
2015-12-23 20:56:55 +08:00
|
|
|
static void _cma_attach_to_dev(struct rdma_id_private *id_priv,
|
|
|
|
struct cma_device *cma_dev)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2015-12-23 20:56:54 +08:00
|
|
|
cma_ref_dev(cma_dev);
|
2006-06-18 11:37:29 +08:00
|
|
|
id_priv->cma_dev = cma_dev;
|
|
|
|
id_priv->id.device = cma_dev->device;
|
2010-10-14 03:26:51 +08:00
|
|
|
id_priv->id.route.addr.dev_addr.transport =
|
|
|
|
rdma_node_get_transport(cma_dev->device->node_type);
|
2006-06-18 11:37:29 +08:00
|
|
|
list_add_tail(&id_priv->list, &cma_dev->id_list);
|
2018-03-02 05:57:44 +08:00
|
|
|
rdma_restrack_add(&id_priv->res);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2015-12-23 20:56:55 +08:00
|
|
|
static void cma_attach_to_dev(struct rdma_id_private *id_priv,
|
|
|
|
struct cma_device *cma_dev)
|
|
|
|
{
|
|
|
|
_cma_attach_to_dev(id_priv, cma_dev);
|
|
|
|
id_priv->gid_type =
|
|
|
|
cma_dev->default_gid_type[id_priv->id.port_num -
|
|
|
|
rdma_start_port(cma_dev->device)];
|
|
|
|
}
|
|
|
|
|
2015-12-23 20:56:54 +08:00
|
|
|
void cma_deref_dev(struct cma_device *cma_dev)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
if (atomic_dec_and_test(&cma_dev->refcount))
|
|
|
|
complete(&cma_dev->comp);
|
|
|
|
}
|
|
|
|
|
2010-10-14 03:26:51 +08:00
|
|
|
static inline void release_mc(struct kref *kref)
|
|
|
|
{
|
|
|
|
struct cma_multicast *mc = container_of(kref, struct cma_multicast, mcref);
|
|
|
|
|
|
|
|
kfree(mc->multicast.ib);
|
|
|
|
kfree(mc);
|
|
|
|
}
|
|
|
|
|
2011-02-24 01:05:39 +08:00
|
|
|
static void cma_release_dev(struct rdma_id_private *id_priv)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2011-02-24 01:05:39 +08:00
|
|
|
mutex_lock(&lock);
|
2006-06-18 11:37:29 +08:00
|
|
|
list_del(&id_priv->list);
|
|
|
|
cma_deref_dev(id_priv->cma_dev);
|
|
|
|
id_priv->cma_dev = NULL;
|
2011-02-24 01:05:39 +08:00
|
|
|
mutex_unlock(&lock);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
static inline struct sockaddr *cma_src_addr(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
return (struct sockaddr *) &id_priv->id.route.addr.src_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct sockaddr *cma_dst_addr(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
return (struct sockaddr *) &id_priv->id.route.addr.dst_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline unsigned short cma_family(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
return id_priv->id.route.addr.src_addr.ss_family;
|
|
|
|
}
|
|
|
|
|
2013-05-30 01:09:23 +08:00
|
|
|
static int cma_set_qkey(struct rdma_id_private *id_priv, u32 qkey)
|
2007-02-16 09:00:18 +08:00
|
|
|
{
|
|
|
|
struct ib_sa_mcmember_rec rec;
|
|
|
|
int ret = 0;
|
|
|
|
|
2013-05-30 01:09:23 +08:00
|
|
|
if (id_priv->qkey) {
|
|
|
|
if (qkey && id_priv->qkey != qkey)
|
|
|
|
return -EINVAL;
|
2009-04-09 04:42:33 +08:00
|
|
|
return 0;
|
2013-05-30 01:09:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (qkey) {
|
|
|
|
id_priv->qkey = qkey;
|
|
|
|
return 0;
|
|
|
|
}
|
2009-04-09 04:42:33 +08:00
|
|
|
|
|
|
|
switch (id_priv->id.ps) {
|
2007-02-16 09:00:18 +08:00
|
|
|
case RDMA_PS_UDP:
|
2013-05-30 01:09:23 +08:00
|
|
|
case RDMA_PS_IB:
|
2009-04-09 04:42:33 +08:00
|
|
|
id_priv->qkey = RDMA_UDP_QKEY;
|
2007-02-16 09:00:18 +08:00
|
|
|
break;
|
|
|
|
case RDMA_PS_IPOIB:
|
2009-04-09 04:42:33 +08:00
|
|
|
ib_addr_get_mgid(&id_priv->id.route.addr.dev_addr, &rec.mgid);
|
|
|
|
ret = ib_sa_get_mcmember_rec(id_priv->id.device,
|
|
|
|
id_priv->id.port_num, &rec.mgid,
|
|
|
|
&rec);
|
|
|
|
if (!ret)
|
|
|
|
id_priv->qkey = be32_to_cpu(rec.qkey);
|
2007-02-16 09:00:18 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-05-30 01:09:12 +08:00
|
|
|
static void cma_translate_ib(struct sockaddr_ib *sib, struct rdma_dev_addr *dev_addr)
|
|
|
|
{
|
|
|
|
dev_addr->dev_type = ARPHRD_INFINIBAND;
|
|
|
|
rdma_addr_set_sgid(dev_addr, (union ib_gid *) &sib->sib_addr);
|
|
|
|
ib_addr_set_pkey(dev_addr, ntohs(sib->sib_pkey));
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_translate_addr(struct sockaddr *addr, struct rdma_dev_addr *dev_addr)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (addr->sa_family != AF_IB) {
|
2017-11-14 20:52:10 +08:00
|
|
|
ret = rdma_translate_ip(addr, dev_addr);
|
2013-05-30 01:09:12 +08:00
|
|
|
} else {
|
|
|
|
cma_translate_ib((struct sockaddr_ib *) addr, dev_addr);
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-06-19 15:59:17 +08:00
|
|
|
static const struct ib_gid_attr *
|
|
|
|
cma_validate_port(struct ib_device *device, u8 port,
|
|
|
|
enum ib_gid_type gid_type,
|
|
|
|
union ib_gid *gid,
|
|
|
|
struct rdma_id_private *id_priv)
|
2015-05-05 20:50:30 +08:00
|
|
|
{
|
2018-01-09 21:58:55 +08:00
|
|
|
struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
|
|
|
|
int bound_if_index = dev_addr->bound_dev_if;
|
2018-06-19 15:59:17 +08:00
|
|
|
const struct ib_gid_attr *sgid_attr;
|
2018-01-09 21:58:55 +08:00
|
|
|
int dev_type = dev_addr->dev_type;
|
2015-10-15 23:38:49 +08:00
|
|
|
struct net_device *ndev = NULL;
|
2015-05-05 20:50:30 +08:00
|
|
|
|
|
|
|
if ((dev_type == ARPHRD_INFINIBAND) && !rdma_protocol_ib(device, port))
|
2018-06-19 15:59:17 +08:00
|
|
|
return ERR_PTR(-ENODEV);
|
2015-05-05 20:50:30 +08:00
|
|
|
|
|
|
|
if ((dev_type != ARPHRD_INFINIBAND) && rdma_protocol_ib(device, port))
|
2018-06-19 15:59:17 +08:00
|
|
|
return ERR_PTR(-ENODEV);
|
2015-05-05 20:50:30 +08:00
|
|
|
|
2018-01-09 21:58:54 +08:00
|
|
|
if (dev_type == ARPHRD_ETHER && rdma_protocol_roce(device, port)) {
|
2018-01-09 21:58:56 +08:00
|
|
|
ndev = dev_get_by_index(dev_addr->net, bound_if_index);
|
2018-01-09 21:58:54 +08:00
|
|
|
if (!ndev)
|
2018-06-19 15:59:17 +08:00
|
|
|
return ERR_PTR(-ENODEV);
|
2018-01-09 21:58:54 +08:00
|
|
|
} else {
|
2015-12-23 20:56:55 +08:00
|
|
|
gid_type = IB_GID_TYPE_IB;
|
2018-01-09 21:58:54 +08:00
|
|
|
}
|
2015-10-15 23:38:49 +08:00
|
|
|
|
2018-06-19 15:59:17 +08:00
|
|
|
sgid_attr = rdma_find_gid_by_port(device, gid, gid_type, port, ndev);
|
2015-10-15 23:38:49 +08:00
|
|
|
if (ndev)
|
|
|
|
dev_put(ndev);
|
2018-06-19 15:59:17 +08:00
|
|
|
return sgid_attr;
|
|
|
|
}
|
2015-05-05 20:50:30 +08:00
|
|
|
|
2018-06-19 15:59:17 +08:00
|
|
|
static void cma_bind_sgid_attr(struct rdma_id_private *id_priv,
|
|
|
|
const struct ib_gid_attr *sgid_attr)
|
|
|
|
{
|
|
|
|
WARN_ON(id_priv->id.route.addr.dev_addr.sgid_attr);
|
|
|
|
id_priv->id.route.addr.dev_addr.sgid_attr = sgid_attr;
|
2015-05-05 20:50:30 +08:00
|
|
|
}
|
|
|
|
|
2013-09-25 05:16:28 +08:00
|
|
|
static int cma_acquire_dev(struct rdma_id_private *id_priv,
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct rdma_id_private *listen_id_priv)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2007-02-16 09:00:18 +08:00
|
|
|
struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
|
2018-06-19 15:59:17 +08:00
|
|
|
const struct ib_gid_attr *sgid_attr;
|
2006-06-18 11:37:29 +08:00
|
|
|
struct cma_device *cma_dev;
|
2015-05-05 20:50:30 +08:00
|
|
|
union ib_gid gid, iboe_gid, *gidp;
|
2018-06-19 15:59:17 +08:00
|
|
|
enum ib_gid_type gid_type;
|
2006-06-18 11:37:29 +08:00
|
|
|
int ret = -ENODEV;
|
2015-05-05 20:50:30 +08:00
|
|
|
u8 port;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-05-05 20:50:30 +08:00
|
|
|
if (dev_addr->dev_type != ARPHRD_INFINIBAND &&
|
2011-07-12 19:23:15 +08:00
|
|
|
id_priv->id.ps == RDMA_PS_IPOIB)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2011-02-24 01:05:39 +08:00
|
|
|
mutex_lock(&lock);
|
2013-12-13 00:03:12 +08:00
|
|
|
rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.src_addr,
|
|
|
|
&iboe_gid);
|
|
|
|
|
2010-10-14 03:26:51 +08:00
|
|
|
memcpy(&gid, dev_addr->src_dev_addr +
|
|
|
|
rdma_addr_gid_offset(dev_addr), sizeof gid);
|
2015-05-05 20:50:30 +08:00
|
|
|
|
|
|
|
if (listen_id_priv) {
|
2013-09-25 05:16:28 +08:00
|
|
|
cma_dev = listen_id_priv->cma_dev;
|
|
|
|
port = listen_id_priv->id.port_num;
|
2015-05-15 03:01:46 +08:00
|
|
|
gidp = rdma_protocol_roce(cma_dev->device, port) ?
|
2015-05-05 20:50:30 +08:00
|
|
|
&iboe_gid : &gid;
|
2018-07-29 16:53:15 +08:00
|
|
|
gid_type = listen_id_priv->gid_type;
|
2018-06-19 15:59:17 +08:00
|
|
|
sgid_attr = cma_validate_port(cma_dev->device, port,
|
|
|
|
gid_type, gidp, id_priv);
|
|
|
|
if (!IS_ERR(sgid_attr)) {
|
2015-05-05 20:50:30 +08:00
|
|
|
id_priv->id.port_num = port;
|
2018-06-19 15:59:17 +08:00
|
|
|
cma_bind_sgid_attr(id_priv, sgid_attr);
|
|
|
|
ret = 0;
|
2013-09-25 05:16:28 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2015-05-05 20:50:30 +08:00
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
list_for_each_entry(cma_dev, &dev_list, list) {
|
2010-10-14 03:26:51 +08:00
|
|
|
for (port = 1; port <= cma_dev->device->phys_port_cnt; ++port) {
|
2013-09-25 05:16:28 +08:00
|
|
|
if (listen_id_priv &&
|
|
|
|
listen_id_priv->cma_dev == cma_dev &&
|
|
|
|
listen_id_priv->id.port_num == port)
|
|
|
|
continue;
|
2015-05-05 20:50:30 +08:00
|
|
|
|
2015-05-15 03:01:46 +08:00
|
|
|
gidp = rdma_protocol_roce(cma_dev->device, port) ?
|
2015-05-05 20:50:30 +08:00
|
|
|
&iboe_gid : &gid;
|
2018-07-29 16:53:15 +08:00
|
|
|
gid_type = cma_dev->default_gid_type[port - 1];
|
2018-06-19 15:59:17 +08:00
|
|
|
sgid_attr = cma_validate_port(cma_dev->device, port,
|
|
|
|
gid_type, gidp, id_priv);
|
|
|
|
if (!IS_ERR(sgid_attr)) {
|
2015-05-05 20:50:30 +08:00
|
|
|
id_priv->id.port_num = port;
|
2018-06-19 15:59:17 +08:00
|
|
|
cma_bind_sgid_attr(id_priv, sgid_attr);
|
|
|
|
ret = 0;
|
2015-05-05 20:50:30 +08:00
|
|
|
goto out;
|
2010-10-14 03:26:51 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
}
|
2010-10-14 03:26:51 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
if (!ret)
|
|
|
|
cma_attach_to_dev(id_priv, cma_dev);
|
|
|
|
|
2011-02-24 01:05:39 +08:00
|
|
|
mutex_unlock(&lock);
|
2006-06-18 11:37:29 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-05-30 01:09:17 +08:00
|
|
|
/*
|
|
|
|
* Select the source IB device and address to reach the destination IB address.
|
|
|
|
*/
|
|
|
|
static int cma_resolve_ib_dev(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct cma_device *cma_dev, *cur_dev;
|
|
|
|
struct sockaddr_ib *addr;
|
|
|
|
union ib_gid gid, sgid, *dgid;
|
|
|
|
u16 pkey, index;
|
2013-07-25 06:06:07 +08:00
|
|
|
u8 p;
|
2017-01-02 20:20:44 +08:00
|
|
|
enum ib_port_state port_state;
|
2013-05-30 01:09:17 +08:00
|
|
|
int i;
|
|
|
|
|
|
|
|
cma_dev = NULL;
|
|
|
|
addr = (struct sockaddr_ib *) cma_dst_addr(id_priv);
|
|
|
|
dgid = (union ib_gid *) &addr->sib_addr;
|
|
|
|
pkey = ntohs(addr->sib_pkey);
|
|
|
|
|
|
|
|
list_for_each_entry(cur_dev, &dev_list, list) {
|
|
|
|
for (p = 1; p <= cur_dev->device->phys_port_cnt; ++p) {
|
2015-05-05 20:50:39 +08:00
|
|
|
if (!rdma_cap_af_ib(cur_dev->device, p))
|
2015-05-05 20:50:31 +08:00
|
|
|
continue;
|
|
|
|
|
2013-05-30 01:09:17 +08:00
|
|
|
if (ib_find_cached_pkey(cur_dev->device, p, pkey, &index))
|
|
|
|
continue;
|
|
|
|
|
2017-01-02 20:20:44 +08:00
|
|
|
if (ib_get_cached_port_state(cur_dev->device, p, &port_state))
|
|
|
|
continue;
|
2018-06-05 13:40:22 +08:00
|
|
|
for (i = 0; !rdma_query_gid(cur_dev->device,
|
|
|
|
p, i, &gid);
|
2015-10-15 23:38:45 +08:00
|
|
|
i++) {
|
2013-05-30 01:09:17 +08:00
|
|
|
if (!memcmp(&gid, dgid, sizeof(gid))) {
|
|
|
|
cma_dev = cur_dev;
|
|
|
|
sgid = gid;
|
2013-07-25 06:06:07 +08:00
|
|
|
id_priv->id.port_num = p;
|
2013-05-30 01:09:17 +08:00
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!cma_dev && (gid.global.subnet_prefix ==
|
2017-01-02 20:20:44 +08:00
|
|
|
dgid->global.subnet_prefix) &&
|
|
|
|
port_state == IB_PORT_ACTIVE) {
|
2013-05-30 01:09:17 +08:00
|
|
|
cma_dev = cur_dev;
|
|
|
|
sgid = gid;
|
2013-07-25 06:06:07 +08:00
|
|
|
id_priv->id.port_num = p;
|
2013-05-30 01:09:17 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!cma_dev)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
found:
|
|
|
|
cma_attach_to_dev(id_priv, cma_dev);
|
|
|
|
addr = (struct sockaddr_ib *) cma_src_addr(id_priv);
|
|
|
|
memcpy(&addr->sib_addr, &sgid, sizeof sgid);
|
|
|
|
cma_translate_ib(addr, &id_priv->id.route.addr.dev_addr);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static void cma_deref_id(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
if (atomic_dec_and_test(&id_priv->refcount))
|
|
|
|
complete(&id_priv->comp);
|
|
|
|
}
|
|
|
|
|
2018-03-02 05:57:44 +08:00
|
|
|
struct rdma_cm_id *__rdma_create_id(struct net *net,
|
|
|
|
rdma_cm_event_handler event_handler,
|
2018-03-27 23:38:07 +08:00
|
|
|
void *context, enum rdma_ucm_port_space ps,
|
2018-03-02 05:57:44 +08:00
|
|
|
enum ib_qp_type qp_type, const char *caller)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
|
|
|
|
id_priv = kzalloc(sizeof *id_priv, GFP_KERNEL);
|
|
|
|
if (!id_priv)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
2018-03-02 05:57:44 +08:00
|
|
|
if (caller)
|
|
|
|
id_priv->res.kern_name = caller;
|
|
|
|
else
|
|
|
|
rdma_restrack_set_task(&id_priv->res, current);
|
2018-07-29 16:53:08 +08:00
|
|
|
id_priv->res.type = RDMA_RESTRACK_CM_ID;
|
2011-05-21 02:46:11 +08:00
|
|
|
id_priv->state = RDMA_CM_IDLE;
|
2006-06-18 11:37:29 +08:00
|
|
|
id_priv->id.context = context;
|
|
|
|
id_priv->id.event_handler = event_handler;
|
|
|
|
id_priv->id.ps = ps;
|
2010-04-02 01:08:41 +08:00
|
|
|
id_priv->id.qp_type = qp_type;
|
2017-02-14 13:21:52 +08:00
|
|
|
id_priv->tos_set = false;
|
2018-07-29 16:53:15 +08:00
|
|
|
id_priv->gid_type = IB_GID_TYPE_IB;
|
2006-06-18 11:37:29 +08:00
|
|
|
spin_lock_init(&id_priv->lock);
|
2007-09-25 04:19:09 +08:00
|
|
|
mutex_init(&id_priv->qp_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
init_completion(&id_priv->comp);
|
|
|
|
atomic_set(&id_priv->refcount, 1);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_init(&id_priv->handler_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
INIT_LIST_HEAD(&id_priv->listen_list);
|
2007-02-16 09:00:18 +08:00
|
|
|
INIT_LIST_HEAD(&id_priv->mc_list);
|
2006-06-18 11:37:29 +08:00
|
|
|
get_random_bytes(&id_priv->seq_num, sizeof id_priv->seq_num);
|
2015-10-22 20:20:10 +08:00
|
|
|
id_priv->id.route.addr.dev_addr.net = get_net(net);
|
2017-11-27 02:23:54 +08:00
|
|
|
id_priv->seq_num &= 0x00ffffff;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
return &id_priv->id;
|
|
|
|
}
|
2018-03-02 05:57:44 +08:00
|
|
|
EXPORT_SYMBOL(__rdma_create_id);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
static int cma_init_ud_qp(struct rdma_id_private *id_priv, struct ib_qp *qp)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct ib_qp_attr qp_attr;
|
2007-02-16 09:00:18 +08:00
|
|
|
int qp_attr_mask, ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
qp_attr.qp_state = IB_QPS_INIT;
|
|
|
|
ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
ret = ib_modify_qp(qp, &qp_attr, qp_attr_mask);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
qp_attr.qp_state = IB_QPS_RTR;
|
|
|
|
ret = ib_modify_qp(qp, &qp_attr, IB_QP_STATE);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
qp_attr.qp_state = IB_QPS_RTS;
|
|
|
|
qp_attr.sq_psn = 0;
|
|
|
|
ret = ib_modify_qp(qp, &qp_attr, IB_QP_STATE | IB_QP_SQ_PSN);
|
|
|
|
|
|
|
|
return ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
static int cma_init_conn_qp(struct rdma_id_private *id_priv, struct ib_qp *qp)
|
2006-08-04 05:02:42 +08:00
|
|
|
{
|
|
|
|
struct ib_qp_attr qp_attr;
|
2007-02-16 09:00:18 +08:00
|
|
|
int qp_attr_mask, ret;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
|
|
|
qp_attr.qp_state = IB_QPS_INIT;
|
2007-02-16 09:00:18 +08:00
|
|
|
ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
return ib_modify_qp(qp, &qp_attr, qp_attr_mask);
|
2006-08-04 05:02:42 +08:00
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
int rdma_create_qp(struct rdma_cm_id *id, struct ib_pd *pd,
|
|
|
|
struct ib_qp_init_attr *qp_init_attr)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
struct ib_qp *qp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
|
|
|
if (id->device != pd->device)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2016-05-04 00:01:03 +08:00
|
|
|
qp_init_attr->port_num = id->port_num;
|
2006-06-18 11:37:29 +08:00
|
|
|
qp = ib_create_qp(pd, qp_init_attr);
|
|
|
|
if (IS_ERR(qp))
|
|
|
|
return PTR_ERR(qp);
|
|
|
|
|
2010-04-02 01:08:41 +08:00
|
|
|
if (id->qp_type == IB_QPT_UD)
|
2007-02-16 09:00:18 +08:00
|
|
|
ret = cma_init_ud_qp(id_priv, qp);
|
|
|
|
else
|
|
|
|
ret = cma_init_conn_qp(id_priv, qp);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
id->qp = qp;
|
|
|
|
id_priv->qp_num = qp->qp_num;
|
|
|
|
id_priv->srq = (qp->srq != NULL);
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
ib_destroy_qp(qp);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_create_qp);
|
|
|
|
|
|
|
|
void rdma_destroy_qp(struct rdma_cm_id *id)
|
|
|
|
{
|
2007-09-25 04:19:09 +08:00
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
|
|
|
mutex_lock(&id_priv->qp_mutex);
|
|
|
|
ib_destroy_qp(id_priv->id.qp);
|
|
|
|
id_priv->id.qp = NULL;
|
|
|
|
mutex_unlock(&id_priv->qp_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_destroy_qp);
|
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
static int cma_modify_qp_rtr(struct rdma_id_private *id_priv,
|
|
|
|
struct rdma_conn_param *conn_param)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct ib_qp_attr qp_attr;
|
|
|
|
int qp_attr_mask, ret;
|
|
|
|
|
2007-09-25 04:19:09 +08:00
|
|
|
mutex_lock(&id_priv->qp_mutex);
|
|
|
|
if (!id_priv->id.qp) {
|
|
|
|
ret = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
/* Need to update QP attributes from default values. */
|
|
|
|
qp_attr.qp_state = IB_QPS_INIT;
|
2007-09-25 04:19:09 +08:00
|
|
|
ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
2007-09-25 04:19:09 +08:00
|
|
|
goto out;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2007-09-25 04:19:09 +08:00
|
|
|
ret = ib_modify_qp(id_priv->id.qp, &qp_attr, qp_attr_mask);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
2007-09-25 04:19:09 +08:00
|
|
|
goto out;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
qp_attr.qp_state = IB_QPS_RTR;
|
2007-09-25 04:19:09 +08:00
|
|
|
ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
2007-09-25 04:19:09 +08:00
|
|
|
goto out;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-05-05 20:50:31 +08:00
|
|
|
BUG_ON(id_priv->cma_dev->device != id_priv->id.device);
|
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
if (conn_param)
|
|
|
|
qp_attr.max_dest_rd_atomic = conn_param->responder_resources;
|
2007-09-25 04:19:09 +08:00
|
|
|
ret = ib_modify_qp(id_priv->id.qp, &qp_attr, qp_attr_mask);
|
|
|
|
out:
|
|
|
|
mutex_unlock(&id_priv->qp_mutex);
|
|
|
|
return ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
static int cma_modify_qp_rts(struct rdma_id_private *id_priv,
|
|
|
|
struct rdma_conn_param *conn_param)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct ib_qp_attr qp_attr;
|
|
|
|
int qp_attr_mask, ret;
|
|
|
|
|
2007-09-25 04:19:09 +08:00
|
|
|
mutex_lock(&id_priv->qp_mutex);
|
|
|
|
if (!id_priv->id.qp) {
|
|
|
|
ret = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
qp_attr.qp_state = IB_QPS_RTS;
|
2007-09-25 04:19:09 +08:00
|
|
|
ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
2007-09-25 04:19:09 +08:00
|
|
|
goto out;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
if (conn_param)
|
|
|
|
qp_attr.max_rd_atomic = conn_param->initiator_depth;
|
2007-09-25 04:19:09 +08:00
|
|
|
ret = ib_modify_qp(id_priv->id.qp, &qp_attr, qp_attr_mask);
|
|
|
|
out:
|
|
|
|
mutex_unlock(&id_priv->qp_mutex);
|
|
|
|
return ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2007-09-25 04:19:09 +08:00
|
|
|
static int cma_modify_qp_err(struct rdma_id_private *id_priv)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct ib_qp_attr qp_attr;
|
2007-09-25 04:19:09 +08:00
|
|
|
int ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2007-09-25 04:19:09 +08:00
|
|
|
mutex_lock(&id_priv->qp_mutex);
|
|
|
|
if (!id_priv->id.qp) {
|
|
|
|
ret = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
qp_attr.qp_state = IB_QPS_ERR;
|
2007-09-25 04:19:09 +08:00
|
|
|
ret = ib_modify_qp(id_priv->id.qp, &qp_attr, IB_QP_STATE);
|
|
|
|
out:
|
|
|
|
mutex_unlock(&id_priv->qp_mutex);
|
|
|
|
return ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
static int cma_ib_init_qp_attr(struct rdma_id_private *id_priv,
|
|
|
|
struct ib_qp_attr *qp_attr, int *qp_attr_mask)
|
|
|
|
{
|
|
|
|
struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
|
|
|
|
int ret;
|
2010-10-14 03:26:51 +08:00
|
|
|
u16 pkey;
|
|
|
|
|
2015-05-05 20:50:40 +08:00
|
|
|
if (rdma_cap_eth_ah(id_priv->id.device, id_priv->id.port_num))
|
2010-10-14 03:26:51 +08:00
|
|
|
pkey = 0xffff;
|
2015-05-05 20:50:31 +08:00
|
|
|
else
|
|
|
|
pkey = ib_addr_get_pkey(dev_addr);
|
2007-02-16 09:00:18 +08:00
|
|
|
|
|
|
|
ret = ib_find_cached_pkey(id_priv->id.device, id_priv->id.port_num,
|
2010-10-14 03:26:51 +08:00
|
|
|
pkey, &qp_attr->pkey_index);
|
2007-02-16 09:00:18 +08:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
qp_attr->port_num = id_priv->id.port_num;
|
|
|
|
*qp_attr_mask = IB_QP_STATE | IB_QP_PKEY_INDEX | IB_QP_PORT;
|
|
|
|
|
2010-04-02 01:08:41 +08:00
|
|
|
if (id_priv->id.qp_type == IB_QPT_UD) {
|
2013-05-30 01:09:23 +08:00
|
|
|
ret = cma_set_qkey(id_priv, 0);
|
2009-04-09 04:42:33 +08:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
qp_attr->qkey = id_priv->qkey;
|
|
|
|
*qp_attr_mask |= IB_QP_QKEY;
|
|
|
|
} else {
|
|
|
|
qp_attr->qp_access_flags = 0;
|
|
|
|
*qp_attr_mask |= IB_QP_ACCESS_FLAGS;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
int rdma_init_qp_attr(struct rdma_cm_id *id, struct ib_qp_attr *qp_attr,
|
|
|
|
int *qp_attr_mask)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
2007-02-16 09:00:18 +08:00
|
|
|
int ret = 0;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2015-05-05 20:50:34 +08:00
|
|
|
if (rdma_cap_ib_cm(id->device, id->port_num)) {
|
2010-04-02 01:08:41 +08:00
|
|
|
if (!id_priv->cm_id.ib || (id_priv->id.qp_type == IB_QPT_UD))
|
2007-02-16 09:00:18 +08:00
|
|
|
ret = cma_ib_init_qp_attr(id_priv, qp_attr, qp_attr_mask);
|
|
|
|
else
|
|
|
|
ret = ib_cm_init_qp_attr(id_priv->cm_id.ib, qp_attr,
|
|
|
|
qp_attr_mask);
|
IB/core: Ethernet L2 attributes in verbs/cm structures
This patch add the support for Ethernet L2 attributes in the
verbs/cm/cma structures.
When dealing with L2 Ethernet, we should use smac, dmac, vlan ID and priority
in a similar manner that the IB L2 (and the L4 PKEY) attributes are used.
Thus, those attributes were added to the following structures:
* ib_ah_attr - added dmac
* ib_qp_attr - added smac and vlan_id, (sl remains vlan priority)
* ib_wc - added smac, vlan_id
* ib_sa_path_rec - added smac, dmac, vlan_id
* cm_av - added smac and vlan_id
For the path record structure, extra care was taken to avoid the new
fields when packing it into wire format, so we don't break the IB CM
and SA wire protocol.
On the active side, the CM fills. its internal structures from the
path provided by the ULP. We add there taking the ETH L2 attributes
and placing them into the CM Address Handle (struct cm_av).
On the passive side, the CM fills its internal structures from the WC
associated with the REQ message. We add there taking the ETH L2
attributes from the WC.
When the HW driver provides the required ETH L2 attributes in the WC,
they set the IB_WC_WITH_SMAC and IB_WC_WITH_VLAN flags. The IB core
code checks for the presence of these flags, and in their absence does
address resolution from the ib_init_ah_from_wc() helper function.
ib_modify_qp_is_ok is also updated to consider the link layer. Some
parameters are mandatory for Ethernet link layer, while they are
irrelevant for IB. Vendor drivers are modified to support the new
function signature.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Or Gerlitz <ogerlitz@mellanox.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2013-12-13 00:03:11 +08:00
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
if (qp_attr->qp_state == IB_QPS_RTR)
|
|
|
|
qp_attr->rq_psn = id_priv->seq_num;
|
2015-05-05 20:50:35 +08:00
|
|
|
} else if (rdma_cap_iw_cm(id->device, id->port_num)) {
|
2007-02-16 09:00:18 +08:00
|
|
|
if (!id_priv->cm_id.iw) {
|
2007-07-17 22:58:57 +08:00
|
|
|
qp_attr->qp_access_flags = 0;
|
2007-02-16 09:00:18 +08:00
|
|
|
*qp_attr_mask = IB_QP_STATE | IB_QP_ACCESS_FLAGS;
|
|
|
|
} else
|
|
|
|
ret = iw_cm_init_qp_attr(id_priv->cm_id.iw, qp_attr,
|
|
|
|
qp_attr_mask);
|
2017-07-14 22:41:31 +08:00
|
|
|
qp_attr->port_num = id_priv->id.port_num;
|
|
|
|
*qp_attr_mask |= IB_QP_PORT;
|
2015-05-05 20:50:27 +08:00
|
|
|
} else
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = -ENOSYS;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_init_qp_attr);
|
|
|
|
|
2018-07-29 16:53:13 +08:00
|
|
|
static inline bool cma_zero_addr(const struct sockaddr *addr)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2013-05-30 01:09:09 +08:00
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
return ipv4_is_zeronet(((struct sockaddr_in *)addr)->sin_addr.s_addr);
|
|
|
|
case AF_INET6:
|
2018-07-29 16:53:13 +08:00
|
|
|
return ipv6_addr_any(&((struct sockaddr_in6 *)addr)->sin6_addr);
|
2013-05-30 01:09:09 +08:00
|
|
|
case AF_IB:
|
2018-07-29 16:53:13 +08:00
|
|
|
return ib_addr_any(&((struct sockaddr_ib *)addr)->sib_addr);
|
2013-05-30 01:09:09 +08:00
|
|
|
default:
|
2018-07-29 16:53:13 +08:00
|
|
|
return false;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:13 +08:00
|
|
|
static inline bool cma_loopback_addr(const struct sockaddr *addr)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2013-05-30 01:09:09 +08:00
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
2018-07-29 16:53:13 +08:00
|
|
|
return ipv4_is_loopback(
|
|
|
|
((struct sockaddr_in *)addr)->sin_addr.s_addr);
|
2013-05-30 01:09:09 +08:00
|
|
|
case AF_INET6:
|
2018-07-29 16:53:13 +08:00
|
|
|
return ipv6_addr_loopback(
|
|
|
|
&((struct sockaddr_in6 *)addr)->sin6_addr);
|
2013-05-30 01:09:09 +08:00
|
|
|
case AF_IB:
|
2018-07-29 16:53:13 +08:00
|
|
|
return ib_addr_loopback(
|
|
|
|
&((struct sockaddr_ib *)addr)->sib_addr);
|
2013-05-30 01:09:09 +08:00
|
|
|
default:
|
2018-07-29 16:53:13 +08:00
|
|
|
return false;
|
2013-05-30 01:09:09 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:13 +08:00
|
|
|
static inline bool cma_any_addr(const struct sockaddr *addr)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
return cma_zero_addr(addr) || cma_loopback_addr(addr);
|
|
|
|
}
|
|
|
|
|
2011-05-10 13:06:10 +08:00
|
|
|
static int cma_addr_cmp(struct sockaddr *src, struct sockaddr *dst)
|
|
|
|
{
|
|
|
|
if (src->sa_family != dst->sa_family)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
switch (src->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
return ((struct sockaddr_in *) src)->sin_addr.s_addr !=
|
|
|
|
((struct sockaddr_in *) dst)->sin_addr.s_addr;
|
2013-05-30 01:09:09 +08:00
|
|
|
case AF_INET6:
|
2011-05-10 13:06:10 +08:00
|
|
|
return ipv6_addr_cmp(&((struct sockaddr_in6 *) src)->sin6_addr,
|
|
|
|
&((struct sockaddr_in6 *) dst)->sin6_addr);
|
2013-05-30 01:09:09 +08:00
|
|
|
default:
|
|
|
|
return ib_addr_cmp(&((struct sockaddr_ib *) src)->sib_addr,
|
|
|
|
&((struct sockaddr_ib *) dst)->sib_addr);
|
2011-05-10 13:06:10 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:10 +08:00
|
|
|
static __be16 cma_port(const struct sockaddr *addr)
|
2006-12-01 08:44:16 +08:00
|
|
|
{
|
2013-05-30 01:09:11 +08:00
|
|
|
struct sockaddr_ib *sib;
|
|
|
|
|
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
2006-12-01 08:44:16 +08:00
|
|
|
return ((struct sockaddr_in *) addr)->sin_port;
|
2013-05-30 01:09:11 +08:00
|
|
|
case AF_INET6:
|
2006-12-01 08:44:16 +08:00
|
|
|
return ((struct sockaddr_in6 *) addr)->sin6_port;
|
2013-05-30 01:09:11 +08:00
|
|
|
case AF_IB:
|
|
|
|
sib = (struct sockaddr_ib *) addr;
|
|
|
|
return htons((u16) (be64_to_cpu(sib->sib_sid) &
|
|
|
|
be64_to_cpu(sib->sib_sid_mask)));
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
2006-12-01 08:44:16 +08:00
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:10 +08:00
|
|
|
static inline int cma_any_port(const struct sockaddr *addr)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2006-12-01 08:44:16 +08:00
|
|
|
return !cma_port(addr);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2015-07-30 22:50:19 +08:00
|
|
|
static void cma_save_ib_info(struct sockaddr *src_addr,
|
|
|
|
struct sockaddr *dst_addr,
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct rdma_cm_id *listen_id,
|
|
|
|
const struct sa_path_rec *path)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2013-05-30 01:09:21 +08:00
|
|
|
struct sockaddr_ib *listen_ib, *ib;
|
|
|
|
|
|
|
|
listen_ib = (struct sockaddr_ib *) &listen_id->route.addr.src_addr;
|
2015-07-30 22:50:19 +08:00
|
|
|
if (src_addr) {
|
|
|
|
ib = (struct sockaddr_ib *)src_addr;
|
|
|
|
ib->sib_family = AF_IB;
|
|
|
|
if (path) {
|
|
|
|
ib->sib_pkey = path->pkey;
|
|
|
|
ib->sib_flowinfo = path->flow_label;
|
|
|
|
memcpy(&ib->sib_addr, &path->sgid, 16);
|
2017-05-22 00:09:54 +08:00
|
|
|
ib->sib_sid = path->service_id;
|
2015-07-30 22:50:19 +08:00
|
|
|
ib->sib_scope_id = 0;
|
|
|
|
} else {
|
|
|
|
ib->sib_pkey = listen_ib->sib_pkey;
|
|
|
|
ib->sib_flowinfo = listen_ib->sib_flowinfo;
|
|
|
|
ib->sib_addr = listen_ib->sib_addr;
|
|
|
|
ib->sib_sid = listen_ib->sib_sid;
|
|
|
|
ib->sib_scope_id = listen_ib->sib_scope_id;
|
|
|
|
}
|
|
|
|
ib->sib_sid_mask = cpu_to_be64(0xffffffffffffffffULL);
|
2015-05-19 15:11:48 +08:00
|
|
|
}
|
2015-07-30 22:50:19 +08:00
|
|
|
if (dst_addr) {
|
|
|
|
ib = (struct sockaddr_ib *)dst_addr;
|
|
|
|
ib->sib_family = AF_IB;
|
|
|
|
if (path) {
|
|
|
|
ib->sib_pkey = path->pkey;
|
|
|
|
ib->sib_flowinfo = path->flow_label;
|
|
|
|
memcpy(&ib->sib_addr, &path->dgid, 16);
|
|
|
|
}
|
2015-05-19 15:11:48 +08:00
|
|
|
}
|
2013-05-30 01:09:21 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2016-11-11 00:44:52 +08:00
|
|
|
static void cma_save_ip4_info(struct sockaddr_in *src_addr,
|
|
|
|
struct sockaddr_in *dst_addr,
|
2015-07-30 22:50:19 +08:00
|
|
|
struct cma_hdr *hdr,
|
|
|
|
__be16 local_port)
|
2013-05-30 01:09:21 +08:00
|
|
|
{
|
2015-07-30 22:50:19 +08:00
|
|
|
if (src_addr) {
|
2016-11-11 00:44:52 +08:00
|
|
|
*src_addr = (struct sockaddr_in) {
|
|
|
|
.sin_family = AF_INET,
|
|
|
|
.sin_addr.s_addr = hdr->dst_addr.ip4.addr,
|
|
|
|
.sin_port = local_port,
|
|
|
|
};
|
2015-07-30 22:50:19 +08:00
|
|
|
}
|
2013-05-30 01:09:21 +08:00
|
|
|
|
2015-07-30 22:50:19 +08:00
|
|
|
if (dst_addr) {
|
2016-11-11 00:44:52 +08:00
|
|
|
*dst_addr = (struct sockaddr_in) {
|
|
|
|
.sin_family = AF_INET,
|
|
|
|
.sin_addr.s_addr = hdr->src_addr.ip4.addr,
|
|
|
|
.sin_port = hdr->port,
|
|
|
|
};
|
2015-07-30 22:50:19 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2016-11-11 00:44:52 +08:00
|
|
|
static void cma_save_ip6_info(struct sockaddr_in6 *src_addr,
|
|
|
|
struct sockaddr_in6 *dst_addr,
|
2015-07-30 22:50:19 +08:00
|
|
|
struct cma_hdr *hdr,
|
|
|
|
__be16 local_port)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2015-07-30 22:50:19 +08:00
|
|
|
if (src_addr) {
|
2016-11-11 00:44:52 +08:00
|
|
|
*src_addr = (struct sockaddr_in6) {
|
|
|
|
.sin6_family = AF_INET6,
|
|
|
|
.sin6_addr = hdr->dst_addr.ip6,
|
|
|
|
.sin6_port = local_port,
|
|
|
|
};
|
2015-07-30 22:50:19 +08:00
|
|
|
}
|
2013-05-30 01:09:21 +08:00
|
|
|
|
2015-07-30 22:50:19 +08:00
|
|
|
if (dst_addr) {
|
2016-11-11 00:44:52 +08:00
|
|
|
*dst_addr = (struct sockaddr_in6) {
|
|
|
|
.sin6_family = AF_INET6,
|
|
|
|
.sin6_addr = hdr->src_addr.ip6,
|
|
|
|
.sin6_port = hdr->port,
|
|
|
|
};
|
2015-07-30 22:50:19 +08:00
|
|
|
}
|
2013-05-30 01:09:21 +08:00
|
|
|
}
|
|
|
|
|
2015-07-30 22:50:19 +08:00
|
|
|
static u16 cma_port_from_service_id(__be64 service_id)
|
2013-05-30 01:09:21 +08:00
|
|
|
{
|
2015-07-30 22:50:19 +08:00
|
|
|
return (u16)be64_to_cpu(service_id);
|
|
|
|
}
|
2013-05-30 01:09:21 +08:00
|
|
|
|
2015-07-30 22:50:19 +08:00
|
|
|
static int cma_save_ip_info(struct sockaddr *src_addr,
|
|
|
|
struct sockaddr *dst_addr,
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct ib_cm_event *ib_event,
|
2015-07-30 22:50:19 +08:00
|
|
|
__be64 service_id)
|
|
|
|
{
|
|
|
|
struct cma_hdr *hdr;
|
|
|
|
__be16 port;
|
2013-05-30 01:09:21 +08:00
|
|
|
|
|
|
|
hdr = ib_event->private_data;
|
|
|
|
if (hdr->cma_version != CMA_VERSION)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2015-07-30 22:50:19 +08:00
|
|
|
port = htons(cma_port_from_service_id(service_id));
|
|
|
|
|
2013-05-30 01:09:21 +08:00
|
|
|
switch (cma_get_ip_ver(hdr)) {
|
2006-06-18 11:37:29 +08:00
|
|
|
case 4:
|
2016-11-11 00:44:52 +08:00
|
|
|
cma_save_ip4_info((struct sockaddr_in *)src_addr,
|
|
|
|
(struct sockaddr_in *)dst_addr, hdr, port);
|
2006-06-18 11:37:29 +08:00
|
|
|
break;
|
|
|
|
case 6:
|
2016-11-11 00:44:52 +08:00
|
|
|
cma_save_ip6_info((struct sockaddr_in6 *)src_addr,
|
|
|
|
(struct sockaddr_in6 *)dst_addr, hdr, port);
|
2006-06-18 11:37:29 +08:00
|
|
|
break;
|
|
|
|
default:
|
2015-07-30 22:50:22 +08:00
|
|
|
return -EAFNOSUPPORT;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
2015-07-30 22:50:19 +08:00
|
|
|
|
2013-05-30 01:09:21 +08:00
|
|
|
return 0;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2015-07-30 22:50:19 +08:00
|
|
|
static int cma_save_net_info(struct sockaddr *src_addr,
|
|
|
|
struct sockaddr *dst_addr,
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct rdma_cm_id *listen_id,
|
|
|
|
const struct ib_cm_event *ib_event,
|
2015-07-30 22:50:19 +08:00
|
|
|
sa_family_t sa_family, __be64 service_id)
|
|
|
|
{
|
|
|
|
if (sa_family == AF_IB) {
|
|
|
|
if (ib_event->event == IB_CM_REQ_RECEIVED)
|
|
|
|
cma_save_ib_info(src_addr, dst_addr, listen_id,
|
|
|
|
ib_event->param.req_rcvd.primary_path);
|
|
|
|
else if (ib_event->event == IB_CM_SIDR_REQ_RECEIVED)
|
|
|
|
cma_save_ib_info(src_addr, dst_addr, listen_id, NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return cma_save_ip_info(src_addr, dst_addr, ib_event, service_id);
|
|
|
|
}
|
|
|
|
|
2015-07-30 22:50:22 +08:00
|
|
|
static int cma_save_req_info(const struct ib_cm_event *ib_event,
|
|
|
|
struct cma_req_info *req)
|
|
|
|
{
|
|
|
|
const struct ib_cm_req_event_param *req_param =
|
|
|
|
&ib_event->param.req_rcvd;
|
|
|
|
const struct ib_cm_sidr_req_event_param *sidr_param =
|
|
|
|
&ib_event->param.sidr_req_rcvd;
|
|
|
|
|
|
|
|
switch (ib_event->event) {
|
|
|
|
case IB_CM_REQ_RECEIVED:
|
|
|
|
req->device = req_param->listen_id->device;
|
|
|
|
req->port = req_param->port;
|
|
|
|
memcpy(&req->local_gid, &req_param->primary_path->sgid,
|
|
|
|
sizeof(req->local_gid));
|
|
|
|
req->has_gid = true;
|
2017-05-22 00:09:54 +08:00
|
|
|
req->service_id = req_param->primary_path->service_id;
|
2015-10-20 14:53:01 +08:00
|
|
|
req->pkey = be16_to_cpu(req_param->primary_path->pkey);
|
2016-02-29 21:45:12 +08:00
|
|
|
if (req->pkey != req_param->bth_pkey)
|
|
|
|
pr_warn_ratelimited("RDMA CMA: got different BTH P_Key (0x%x) and primary path P_Key (0x%x)\n"
|
|
|
|
"RDMA CMA: in the future this may cause the request to be dropped\n",
|
|
|
|
req_param->bth_pkey, req->pkey);
|
2015-07-30 22:50:22 +08:00
|
|
|
break;
|
|
|
|
case IB_CM_SIDR_REQ_RECEIVED:
|
|
|
|
req->device = sidr_param->listen_id->device;
|
|
|
|
req->port = sidr_param->port;
|
|
|
|
req->has_gid = false;
|
|
|
|
req->service_id = sidr_param->service_id;
|
2015-10-20 14:53:01 +08:00
|
|
|
req->pkey = sidr_param->pkey;
|
2016-02-29 21:45:12 +08:00
|
|
|
if (req->pkey != sidr_param->bth_pkey)
|
|
|
|
pr_warn_ratelimited("RDMA CMA: got different BTH P_Key (0x%x) and SIDR request payload P_Key (0x%x)\n"
|
|
|
|
"RDMA CMA: in the future this may cause the request to be dropped\n",
|
|
|
|
sidr_param->bth_pkey, req->pkey);
|
2015-07-30 22:50:22 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-07-30 22:50:23 +08:00
|
|
|
static bool validate_ipv4_net_dev(struct net_device *net_dev,
|
|
|
|
const struct sockaddr_in *dst_addr,
|
|
|
|
const struct sockaddr_in *src_addr)
|
|
|
|
{
|
|
|
|
__be32 daddr = dst_addr->sin_addr.s_addr,
|
|
|
|
saddr = src_addr->sin_addr.s_addr;
|
|
|
|
struct fib_result res;
|
|
|
|
struct flowi4 fl4;
|
|
|
|
int err;
|
|
|
|
bool ret;
|
|
|
|
|
|
|
|
if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr) ||
|
|
|
|
ipv4_is_lbcast(daddr) || ipv4_is_zeronet(saddr) ||
|
|
|
|
ipv4_is_zeronet(daddr) || ipv4_is_loopback(daddr) ||
|
|
|
|
ipv4_is_loopback(saddr))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
memset(&fl4, 0, sizeof(fl4));
|
|
|
|
fl4.flowi4_iif = net_dev->ifindex;
|
|
|
|
fl4.daddr = daddr;
|
|
|
|
fl4.saddr = saddr;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
err = fib_lookup(dev_net(net_dev), &fl4, &res, 0);
|
2015-11-21 03:04:12 +08:00
|
|
|
ret = err == 0 && FIB_RES_DEV(res) == net_dev;
|
2015-07-30 22:50:23 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool validate_ipv6_net_dev(struct net_device *net_dev,
|
|
|
|
const struct sockaddr_in6 *dst_addr,
|
|
|
|
const struct sockaddr_in6 *src_addr)
|
|
|
|
{
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
const int strict = ipv6_addr_type(&dst_addr->sin6_addr) &
|
|
|
|
IPV6_ADDR_LINKLOCAL;
|
|
|
|
struct rt6_info *rt = rt6_lookup(dev_net(net_dev), &dst_addr->sin6_addr,
|
|
|
|
&src_addr->sin6_addr, net_dev->ifindex,
|
2018-03-03 00:32:17 +08:00
|
|
|
NULL, strict);
|
2015-07-30 22:50:23 +08:00
|
|
|
bool ret;
|
|
|
|
|
|
|
|
if (!rt)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
ret = rt->rt6i_idev->dev == net_dev;
|
|
|
|
ip6_rt_put(rt);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool validate_net_dev(struct net_device *net_dev,
|
|
|
|
const struct sockaddr *daddr,
|
|
|
|
const struct sockaddr *saddr)
|
|
|
|
{
|
|
|
|
const struct sockaddr_in *daddr4 = (const struct sockaddr_in *)daddr;
|
|
|
|
const struct sockaddr_in *saddr4 = (const struct sockaddr_in *)saddr;
|
|
|
|
const struct sockaddr_in6 *daddr6 = (const struct sockaddr_in6 *)daddr;
|
|
|
|
const struct sockaddr_in6 *saddr6 = (const struct sockaddr_in6 *)saddr;
|
|
|
|
|
|
|
|
switch (daddr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
return saddr->sa_family == AF_INET &&
|
|
|
|
validate_ipv4_net_dev(net_dev, daddr4, saddr4);
|
|
|
|
|
|
|
|
case AF_INET6:
|
|
|
|
return saddr->sa_family == AF_INET6 &&
|
|
|
|
validate_ipv6_net_dev(net_dev, daddr6, saddr6);
|
|
|
|
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-16 16:50:11 +08:00
|
|
|
static struct net_device *
|
|
|
|
roce_get_net_dev_by_cm_event(const struct ib_cm_event *ib_event)
|
|
|
|
{
|
|
|
|
const struct ib_gid_attr *sgid_attr = NULL;
|
|
|
|
|
|
|
|
if (ib_event->event == IB_CM_REQ_RECEIVED)
|
|
|
|
sgid_attr = ib_event->param.req_rcvd.ppath_sgid_attr;
|
|
|
|
else if (ib_event->event == IB_CM_SIDR_REQ_RECEIVED)
|
|
|
|
sgid_attr = ib_event->param.sidr_req_rcvd.sgid_attr;
|
|
|
|
|
|
|
|
if (!sgid_attr)
|
|
|
|
return NULL;
|
|
|
|
dev_hold(sgid_attr->ndev);
|
|
|
|
return sgid_attr->ndev;
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:11 +08:00
|
|
|
static struct net_device *cma_get_net_dev(const struct ib_cm_event *ib_event,
|
2018-04-25 01:13:45 +08:00
|
|
|
struct cma_req_info *req)
|
2015-07-30 22:50:22 +08:00
|
|
|
{
|
2018-04-25 01:13:45 +08:00
|
|
|
struct sockaddr *listen_addr =
|
|
|
|
(struct sockaddr *)&req->listen_addr_storage;
|
|
|
|
struct sockaddr *src_addr = (struct sockaddr *)&req->src_addr_storage;
|
2015-07-30 22:50:22 +08:00
|
|
|
struct net_device *net_dev;
|
|
|
|
const union ib_gid *gid = req->has_gid ? &req->local_gid : NULL;
|
|
|
|
int err;
|
|
|
|
|
2015-07-30 22:50:23 +08:00
|
|
|
err = cma_save_ip_info(listen_addr, src_addr, ib_event,
|
|
|
|
req->service_id);
|
2015-07-30 22:50:22 +08:00
|
|
|
if (err)
|
|
|
|
return ERR_PTR(err);
|
|
|
|
|
2018-07-16 16:50:11 +08:00
|
|
|
if (rdma_protocol_roce(req->device, req->port))
|
|
|
|
net_dev = roce_get_net_dev_by_cm_event(ib_event);
|
|
|
|
else
|
|
|
|
net_dev = ib_get_net_dev_by_params(req->device, req->port,
|
|
|
|
req->pkey,
|
|
|
|
gid, listen_addr);
|
2015-07-30 22:50:22 +08:00
|
|
|
if (!net_dev)
|
|
|
|
return ERR_PTR(-ENODEV);
|
|
|
|
|
|
|
|
return net_dev;
|
|
|
|
}
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static enum rdma_ucm_port_space rdma_ps_from_service_id(__be64 service_id)
|
2015-07-30 22:50:22 +08:00
|
|
|
{
|
|
|
|
return (be64_to_cpu(service_id) >> 16) & 0xffff;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool cma_match_private_data(struct rdma_id_private *id_priv,
|
|
|
|
const struct cma_hdr *hdr)
|
|
|
|
{
|
|
|
|
struct sockaddr *addr = cma_src_addr(id_priv);
|
|
|
|
__be32 ip4_addr;
|
|
|
|
struct in6_addr ip6_addr;
|
|
|
|
|
|
|
|
if (cma_any_addr(addr) && !id_priv->afonly)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
ip4_addr = ((struct sockaddr_in *)addr)->sin_addr.s_addr;
|
|
|
|
if (cma_get_ip_ver(hdr) != 4)
|
|
|
|
return false;
|
|
|
|
if (!cma_any_addr(addr) &&
|
|
|
|
hdr->dst_addr.ip4.addr != ip4_addr)
|
|
|
|
return false;
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
ip6_addr = ((struct sockaddr_in6 *)addr)->sin6_addr;
|
|
|
|
if (cma_get_ip_ver(hdr) != 6)
|
|
|
|
return false;
|
|
|
|
if (!cma_any_addr(addr) &&
|
|
|
|
memcmp(&hdr->dst_addr.ip6, &ip6_addr, sizeof(ip6_addr)))
|
|
|
|
return false;
|
|
|
|
break;
|
|
|
|
case AF_IB:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-10-06 22:56:00 +08:00
|
|
|
static bool cma_protocol_roce(const struct rdma_cm_id *id)
|
|
|
|
{
|
|
|
|
struct ib_device *device = id->device;
|
|
|
|
const int port_num = id->port_num ?: rdma_start_port(device);
|
|
|
|
|
2018-03-13 22:06:15 +08:00
|
|
|
return rdma_protocol_roce(device, port_num);
|
2015-10-06 22:56:00 +08:00
|
|
|
}
|
|
|
|
|
2015-12-21 23:01:24 +08:00
|
|
|
static bool cma_match_net_dev(const struct rdma_cm_id *id,
|
|
|
|
const struct net_device *net_dev,
|
|
|
|
u8 port_num)
|
2015-07-30 22:50:22 +08:00
|
|
|
{
|
2015-12-21 23:01:24 +08:00
|
|
|
const struct rdma_addr *addr = &id->route.addr;
|
2015-07-30 22:50:22 +08:00
|
|
|
|
|
|
|
if (!net_dev)
|
2018-07-16 16:50:12 +08:00
|
|
|
/* This request is an AF_IB request */
|
2015-12-21 23:01:24 +08:00
|
|
|
return (!id->port_num || id->port_num == port_num) &&
|
2018-07-16 16:50:12 +08:00
|
|
|
(addr->src_addr.ss_family == AF_IB);
|
2015-07-30 22:50:22 +08:00
|
|
|
|
2018-07-16 16:50:13 +08:00
|
|
|
/*
|
|
|
|
* Net namespaces must match, and if the listner is listening
|
|
|
|
* on a specific netdevice than netdevice must match as well.
|
|
|
|
*/
|
|
|
|
if (net_eq(dev_net(net_dev), addr->dev_addr.net) &&
|
|
|
|
(!!addr->dev_addr.bound_dev_if ==
|
|
|
|
(addr->dev_addr.bound_dev_if == net_dev->ifindex)))
|
|
|
|
return true;
|
|
|
|
else
|
|
|
|
return false;
|
2015-07-30 22:50:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct rdma_id_private *cma_find_listener(
|
|
|
|
const struct rdma_bind_list *bind_list,
|
|
|
|
const struct ib_cm_id *cm_id,
|
|
|
|
const struct ib_cm_event *ib_event,
|
|
|
|
const struct cma_req_info *req,
|
|
|
|
const struct net_device *net_dev)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv, *id_priv_dev;
|
|
|
|
|
|
|
|
if (!bind_list)
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
|
|
|
|
hlist_for_each_entry(id_priv, &bind_list->owners, node) {
|
|
|
|
if (cma_match_private_data(id_priv, ib_event->private_data)) {
|
|
|
|
if (id_priv->id.device == cm_id->device &&
|
2015-12-21 23:01:24 +08:00
|
|
|
cma_match_net_dev(&id_priv->id, net_dev, req->port))
|
2015-07-30 22:50:22 +08:00
|
|
|
return id_priv;
|
|
|
|
list_for_each_entry(id_priv_dev,
|
|
|
|
&id_priv->listen_list,
|
|
|
|
listen_list) {
|
|
|
|
if (id_priv_dev->id.device == cm_id->device &&
|
2015-12-21 23:01:24 +08:00
|
|
|
cma_match_net_dev(&id_priv_dev->id, net_dev, req->port))
|
2015-07-30 22:50:22 +08:00
|
|
|
return id_priv_dev;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:11 +08:00
|
|
|
static struct rdma_id_private *
|
2018-07-29 16:53:16 +08:00
|
|
|
cma_ib_id_from_event(struct ib_cm_id *cm_id,
|
|
|
|
const struct ib_cm_event *ib_event,
|
|
|
|
struct net_device **net_dev)
|
2015-07-30 22:50:22 +08:00
|
|
|
{
|
|
|
|
struct cma_req_info req;
|
|
|
|
struct rdma_bind_list *bind_list;
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = cma_save_req_info(ib_event, &req);
|
|
|
|
if (err)
|
|
|
|
return ERR_PTR(err);
|
|
|
|
|
2015-07-30 22:50:24 +08:00
|
|
|
*net_dev = cma_get_net_dev(ib_event, &req);
|
|
|
|
if (IS_ERR(*net_dev)) {
|
|
|
|
if (PTR_ERR(*net_dev) == -EAFNOSUPPORT) {
|
2015-07-30 22:50:22 +08:00
|
|
|
/* Assuming the protocol is AF_IB */
|
2015-07-30 22:50:24 +08:00
|
|
|
*net_dev = NULL;
|
2015-07-30 22:50:22 +08:00
|
|
|
} else {
|
2015-07-30 22:50:24 +08:00
|
|
|
return ERR_CAST(*net_dev);
|
2015-07-30 22:50:22 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-25 01:13:45 +08:00
|
|
|
/*
|
|
|
|
* Net namespace might be getting deleted while route lookup,
|
|
|
|
* cm_id lookup is in progress. Therefore, perform netdevice
|
|
|
|
* validation, cm_id lookup under rcu lock.
|
|
|
|
* RCU lock along with netdevice state check, synchronizes with
|
|
|
|
* netdevice migrating to different net namespace and also avoids
|
|
|
|
* case where net namespace doesn't get deleted while lookup is in
|
|
|
|
* progress.
|
|
|
|
* If the device state is not IFF_UP, its properties such as ifindex
|
|
|
|
* and nd_net cannot be trusted to remain valid without rcu lock.
|
|
|
|
* net/core/dev.c change_net_namespace() ensures to synchronize with
|
|
|
|
* ongoing operations on net device after device is closed using
|
|
|
|
* synchronize_net().
|
|
|
|
*/
|
|
|
|
rcu_read_lock();
|
|
|
|
if (*net_dev) {
|
|
|
|
/*
|
|
|
|
* If netdevice is down, it is likely that it is administratively
|
|
|
|
* down or it might be migrating to different namespace.
|
|
|
|
* In that case avoid further processing, as the net namespace
|
|
|
|
* or ifindex may change.
|
|
|
|
*/
|
|
|
|
if (((*net_dev)->flags & IFF_UP) == 0) {
|
|
|
|
id_priv = ERR_PTR(-EHOSTUNREACH);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!validate_net_dev(*net_dev,
|
|
|
|
(struct sockaddr *)&req.listen_addr_storage,
|
|
|
|
(struct sockaddr *)&req.src_addr_storage)) {
|
|
|
|
id_priv = ERR_PTR(-EHOSTUNREACH);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-22 20:20:10 +08:00
|
|
|
bind_list = cma_ps_find(*net_dev ? dev_net(*net_dev) : &init_net,
|
2015-10-22 20:20:09 +08:00
|
|
|
rdma_ps_from_service_id(req.service_id),
|
2015-07-30 22:50:22 +08:00
|
|
|
cma_port_from_service_id(req.service_id));
|
2015-07-30 22:50:24 +08:00
|
|
|
id_priv = cma_find_listener(bind_list, cm_id, ib_event, &req, *net_dev);
|
2018-04-25 01:13:45 +08:00
|
|
|
err:
|
|
|
|
rcu_read_unlock();
|
2015-09-21 21:02:02 +08:00
|
|
|
if (IS_ERR(id_priv) && *net_dev) {
|
2015-08-27 20:55:15 +08:00
|
|
|
dev_put(*net_dev);
|
|
|
|
*net_dev = NULL;
|
|
|
|
}
|
2015-07-30 22:50:22 +08:00
|
|
|
return id_priv;
|
|
|
|
}
|
|
|
|
|
2017-10-12 01:48:45 +08:00
|
|
|
static inline u8 cma_user_data_offset(struct rdma_id_private *id_priv)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2013-05-30 01:09:22 +08:00
|
|
|
return cma_family(id_priv) == AF_IB ? 0 : sizeof(struct cma_hdr);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_cancel_route(struct rdma_id_private *id_priv)
|
|
|
|
{
|
2015-05-05 20:50:36 +08:00
|
|
|
if (rdma_cap_ib_sa(id_priv->id.device, id_priv->id.port_num)) {
|
2006-06-18 11:37:29 +08:00
|
|
|
if (id_priv->query)
|
|
|
|
ib_sa_cancel_query(id_priv->query_id, id_priv->query);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_cancel_listens(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *dev_id_priv;
|
|
|
|
|
2007-10-10 02:12:34 +08:00
|
|
|
/*
|
|
|
|
* Remove from listen_any_list to prevent added devices from spawning
|
|
|
|
* additional listen requests.
|
|
|
|
*/
|
2006-06-18 11:37:29 +08:00
|
|
|
mutex_lock(&lock);
|
|
|
|
list_del(&id_priv->list);
|
|
|
|
|
|
|
|
while (!list_empty(&id_priv->listen_list)) {
|
|
|
|
dev_id_priv = list_entry(id_priv->listen_list.next,
|
|
|
|
struct rdma_id_private, listen_list);
|
2007-10-10 02:12:34 +08:00
|
|
|
/* sync with device removal to avoid duplicate destruction */
|
|
|
|
list_del_init(&dev_id_priv->list);
|
|
|
|
list_del(&dev_id_priv->listen_list);
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
|
|
|
|
rdma_destroy_id(&dev_id_priv->id);
|
|
|
|
mutex_lock(&lock);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_cancel_operation(struct rdma_id_private *id_priv,
|
2011-05-21 02:46:11 +08:00
|
|
|
enum rdma_cm_state state)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
switch (state) {
|
2011-05-21 02:46:11 +08:00
|
|
|
case RDMA_CM_ADDR_QUERY:
|
2006-06-18 11:37:29 +08:00
|
|
|
rdma_addr_cancel(&id_priv->id.route.addr.dev_addr);
|
|
|
|
break;
|
2011-05-21 02:46:11 +08:00
|
|
|
case RDMA_CM_ROUTE_QUERY:
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_cancel_route(id_priv);
|
|
|
|
break;
|
2011-05-21 02:46:11 +08:00
|
|
|
case RDMA_CM_LISTEN:
|
2013-05-30 01:09:14 +08:00
|
|
|
if (cma_any_addr(cma_src_addr(id_priv)) && !id_priv->cma_dev)
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_cancel_listens(id_priv);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_release_port(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct rdma_bind_list *bind_list = id_priv->bind_list;
|
2015-10-22 20:20:10 +08:00
|
|
|
struct net *net = id_priv->id.route.addr.dev_addr.net;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
if (!bind_list)
|
|
|
|
return;
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
hlist_del(&id_priv->node);
|
|
|
|
if (hlist_empty(&bind_list->owners)) {
|
2015-10-22 20:20:10 +08:00
|
|
|
cma_ps_remove(net, bind_list->ps, bind_list->port);
|
2006-06-18 11:37:29 +08:00
|
|
|
kfree(bind_list);
|
|
|
|
}
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
}
|
|
|
|
|
2018-06-21 20:31:24 +08:00
|
|
|
static void cma_leave_roce_mc_group(struct rdma_id_private *id_priv,
|
|
|
|
struct cma_multicast *mc)
|
|
|
|
{
|
2018-07-11 16:20:29 +08:00
|
|
|
struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
|
|
|
|
struct net_device *ndev = NULL;
|
|
|
|
|
|
|
|
if (dev_addr->bound_dev_if)
|
|
|
|
ndev = dev_get_by_index(dev_addr->net, dev_addr->bound_dev_if);
|
|
|
|
if (ndev) {
|
|
|
|
cma_igmp_send(ndev, &mc->multicast.ib->rec.mgid, false);
|
|
|
|
dev_put(ndev);
|
2018-06-21 20:31:24 +08:00
|
|
|
}
|
|
|
|
kref_put(&mc->mcref, release_mc);
|
|
|
|
}
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
static void cma_leave_mc_groups(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct cma_multicast *mc;
|
|
|
|
|
|
|
|
while (!list_empty(&id_priv->mc_list)) {
|
|
|
|
mc = container_of(id_priv->mc_list.next,
|
|
|
|
struct cma_multicast, list);
|
|
|
|
list_del(&mc->list);
|
2015-05-05 20:50:37 +08:00
|
|
|
if (rdma_cap_ib_mcast(id_priv->cma_dev->device,
|
2015-05-05 20:50:29 +08:00
|
|
|
id_priv->id.port_num)) {
|
2010-10-14 03:26:51 +08:00
|
|
|
ib_sa_free_multicast(mc->multicast.ib);
|
|
|
|
kfree(mc);
|
2015-12-23 20:56:57 +08:00
|
|
|
} else {
|
2018-06-21 20:31:24 +08:00
|
|
|
cma_leave_roce_mc_group(id_priv, mc);
|
2015-12-23 20:56:57 +08:00
|
|
|
}
|
2007-02-16 09:00:18 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
void rdma_destroy_id(struct rdma_cm_id *id)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
2011-05-21 02:46:11 +08:00
|
|
|
enum rdma_cm_state state;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-05-21 02:46:11 +08:00
|
|
|
state = cma_exch(id_priv, RDMA_CM_DESTROYING);
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_cancel_operation(id_priv, state);
|
|
|
|
|
2011-02-24 01:05:39 +08:00
|
|
|
/*
|
|
|
|
* Wait for any active callback to finish. New callbacks will find
|
|
|
|
* the id_priv state set to destroying and abort.
|
|
|
|
*/
|
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
if (id_priv->cma_dev) {
|
2018-03-02 05:57:44 +08:00
|
|
|
rdma_restrack_del(&id_priv->res);
|
2015-05-05 20:50:34 +08:00
|
|
|
if (rdma_cap_ib_cm(id_priv->id.device, 1)) {
|
2011-07-17 18:46:47 +08:00
|
|
|
if (id_priv->cm_id.ib)
|
2006-06-18 11:37:29 +08:00
|
|
|
ib_destroy_cm_id(id_priv->cm_id.ib);
|
2015-05-05 20:50:35 +08:00
|
|
|
} else if (rdma_cap_iw_cm(id_priv->id.device, 1)) {
|
2011-07-17 18:46:47 +08:00
|
|
|
if (id_priv->cm_id.iw)
|
2006-08-04 05:02:42 +08:00
|
|
|
iw_destroy_cm_id(id_priv->cm_id.iw);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
2007-02-16 09:00:18 +08:00
|
|
|
cma_leave_mc_groups(id_priv);
|
2011-02-24 01:05:39 +08:00
|
|
|
cma_release_dev(id_priv);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
cma_release_port(id_priv);
|
|
|
|
cma_deref_id(id_priv);
|
|
|
|
wait_for_completion(&id_priv->comp);
|
|
|
|
|
2007-10-10 02:12:34 +08:00
|
|
|
if (id_priv->internal_id)
|
|
|
|
cma_deref_id(id_priv->id.context);
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
kfree(id_priv->id.route.path_rec);
|
2018-06-19 15:59:17 +08:00
|
|
|
|
|
|
|
if (id_priv->id.route.addr.dev_addr.sgid_attr)
|
|
|
|
rdma_put_gid_attr(id_priv->id.route.addr.dev_addr.sgid_attr);
|
|
|
|
|
2015-10-22 20:20:10 +08:00
|
|
|
put_net(id_priv->id.route.addr.dev_addr.net);
|
2006-06-18 11:37:29 +08:00
|
|
|
kfree(id_priv);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_destroy_id);
|
|
|
|
|
|
|
|
static int cma_rep_recv(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
ret = cma_modify_qp_rtr(id_priv, NULL);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
|
|
|
goto reject;
|
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
ret = cma_modify_qp_rts(id_priv, NULL);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
|
|
|
goto reject;
|
|
|
|
|
|
|
|
ret = ib_send_cm_rtu(id_priv->cm_id.ib, NULL, 0);
|
|
|
|
if (ret)
|
|
|
|
goto reject;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
reject:
|
2017-01-05 22:16:35 +08:00
|
|
|
pr_debug_ratelimited("RDMA CM: CONNECT_ERROR: failed to handle reply. status %d\n", ret);
|
2007-09-25 04:19:09 +08:00
|
|
|
cma_modify_qp_err(id_priv);
|
2006-06-18 11:37:29 +08:00
|
|
|
ib_send_cm_rej(id_priv->cm_id.ib, IB_CM_REJ_CONSUMER_DEFINED,
|
|
|
|
NULL, 0, NULL, 0);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-12-01 08:33:14 +08:00
|
|
|
static void cma_set_rep_event_data(struct rdma_cm_event *event,
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct ib_cm_rep_event_param *rep_data,
|
2006-12-01 08:33:14 +08:00
|
|
|
void *private_data)
|
|
|
|
{
|
|
|
|
event->param.conn.private_data = private_data;
|
|
|
|
event->param.conn.private_data_len = IB_CM_REP_PRIVATE_DATA_SIZE;
|
|
|
|
event->param.conn.responder_resources = rep_data->responder_resources;
|
|
|
|
event->param.conn.initiator_depth = rep_data->initiator_depth;
|
|
|
|
event->param.conn.flow_control = rep_data->flow_control;
|
|
|
|
event->param.conn.rnr_retry_count = rep_data->rnr_retry_count;
|
|
|
|
event->param.conn.srq = rep_data->srq;
|
|
|
|
event->param.conn.qp_num = rep_data->remote_qpn;
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:11 +08:00
|
|
|
static int cma_ib_handler(struct ib_cm_id *cm_id,
|
|
|
|
const struct ib_cm_event *ib_event)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv = cm_id->context;
|
2018-07-29 16:53:14 +08:00
|
|
|
struct rdma_cm_event event = {};
|
2006-12-01 08:33:14 +08:00
|
|
|
int ret = 0;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2016-06-11 02:08:25 +08:00
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
2008-07-23 05:14:23 +08:00
|
|
|
if ((ib_event->event != IB_CM_TIMEWAIT_EXIT &&
|
2016-06-11 02:08:25 +08:00
|
|
|
id_priv->state != RDMA_CM_CONNECT) ||
|
2008-07-23 05:14:23 +08:00
|
|
|
(ib_event->event == IB_CM_TIMEWAIT_EXIT &&
|
2016-06-11 02:08:25 +08:00
|
|
|
id_priv->state != RDMA_CM_DISCONNECT))
|
|
|
|
goto out;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
switch (ib_event->event) {
|
|
|
|
case IB_CM_REQ_ERROR:
|
|
|
|
case IB_CM_REP_ERROR:
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_UNREACHABLE;
|
|
|
|
event.status = -ETIMEDOUT;
|
2006-06-18 11:37:29 +08:00
|
|
|
break;
|
|
|
|
case IB_CM_REP_RECEIVED:
|
2017-04-16 12:31:34 +08:00
|
|
|
if (cma_comp(id_priv, RDMA_CM_CONNECT) &&
|
|
|
|
(id_priv->id.qp_type != IB_QPT_UD))
|
|
|
|
ib_send_cm_mra(cm_id, CMA_CM_MRA_SETTING, NULL, 0);
|
2013-05-30 01:09:20 +08:00
|
|
|
if (id_priv->id.qp) {
|
2006-12-01 08:33:14 +08:00
|
|
|
event.status = cma_rep_recv(id_priv);
|
|
|
|
event.event = event.status ? RDMA_CM_EVENT_CONNECT_ERROR :
|
|
|
|
RDMA_CM_EVENT_ESTABLISHED;
|
2013-05-30 01:09:20 +08:00
|
|
|
} else {
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_CONNECT_RESPONSE;
|
2013-05-30 01:09:20 +08:00
|
|
|
}
|
2006-12-01 08:33:14 +08:00
|
|
|
cma_set_rep_event_data(&event, &ib_event->param.rep_rcvd,
|
|
|
|
ib_event->private_data);
|
2006-06-18 11:37:29 +08:00
|
|
|
break;
|
|
|
|
case IB_CM_RTU_RECEIVED:
|
2006-12-01 08:37:15 +08:00
|
|
|
case IB_CM_USER_ESTABLISHED:
|
|
|
|
event.event = RDMA_CM_EVENT_ESTABLISHED;
|
2006-06-18 11:37:29 +08:00
|
|
|
break;
|
|
|
|
case IB_CM_DREQ_ERROR:
|
2006-12-01 08:33:14 +08:00
|
|
|
event.status = -ETIMEDOUT; /* fall through */
|
2006-06-18 11:37:29 +08:00
|
|
|
case IB_CM_DREQ_RECEIVED:
|
|
|
|
case IB_CM_DREP_RECEIVED:
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_CONNECT,
|
|
|
|
RDMA_CM_DISCONNECT))
|
2006-06-18 11:37:29 +08:00
|
|
|
goto out;
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_DISCONNECTED;
|
2006-06-18 11:37:29 +08:00
|
|
|
break;
|
|
|
|
case IB_CM_TIMEWAIT_EXIT:
|
2008-07-23 05:14:23 +08:00
|
|
|
event.event = RDMA_CM_EVENT_TIMEWAIT_EXIT;
|
|
|
|
break;
|
2006-06-18 11:37:29 +08:00
|
|
|
case IB_CM_MRA_RECEIVED:
|
|
|
|
/* ignore event */
|
|
|
|
goto out;
|
|
|
|
case IB_CM_REJ_RECEIVED:
|
2017-01-05 22:16:35 +08:00
|
|
|
pr_debug_ratelimited("RDMA CM: REJECTED: %s\n", rdma_reject_msg(&id_priv->id,
|
|
|
|
ib_event->param.rej_rcvd.reason));
|
2007-09-25 04:19:09 +08:00
|
|
|
cma_modify_qp_err(id_priv);
|
2006-12-01 08:33:14 +08:00
|
|
|
event.status = ib_event->param.rej_rcvd.reason;
|
|
|
|
event.event = RDMA_CM_EVENT_REJECTED;
|
|
|
|
event.param.conn.private_data = ib_event->private_data;
|
|
|
|
event.param.conn.private_data_len = IB_CM_REJ_PRIVATE_DATA_SIZE;
|
2006-06-18 11:37:29 +08:00
|
|
|
break;
|
|
|
|
default:
|
2016-03-02 03:20:29 +08:00
|
|
|
pr_err("RDMA CMA: unexpected IB CM event: %d\n",
|
2006-06-18 11:37:29 +08:00
|
|
|
ib_event->event);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2006-12-01 08:33:14 +08:00
|
|
|
ret = id_priv->id.event_handler(&id_priv->id, &event);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret) {
|
|
|
|
/* Destroy the CM ID by returning a non-zero value. */
|
|
|
|
id_priv->cm_id.ib = NULL;
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(id_priv, RDMA_CM_DESTROYING);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
rdma_destroy_id(&id_priv->id);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
out:
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:11 +08:00
|
|
|
static struct rdma_id_private *
|
2018-07-29 16:53:16 +08:00
|
|
|
cma_ib_new_conn_id(const struct rdma_cm_id *listen_id,
|
|
|
|
const struct ib_cm_event *ib_event,
|
|
|
|
struct net_device *net_dev)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2018-03-02 05:57:44 +08:00
|
|
|
struct rdma_id_private *listen_id_priv;
|
2006-06-18 11:37:29 +08:00
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
struct rdma_cm_id *id;
|
|
|
|
struct rdma_route *rt;
|
2015-07-30 22:50:19 +08:00
|
|
|
const sa_family_t ss_family = listen_id->route.addr.src_addr.ss_family;
|
2017-04-28 07:06:00 +08:00
|
|
|
struct sa_path_rec *path = ib_event->param.req_rcvd.primary_path;
|
2017-05-22 00:09:54 +08:00
|
|
|
const __be64 service_id =
|
|
|
|
ib_event->param.req_rcvd.primary_path->service_id;
|
2008-07-15 14:48:53 +08:00
|
|
|
int ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2018-03-02 05:57:44 +08:00
|
|
|
listen_id_priv = container_of(listen_id, struct rdma_id_private, id);
|
|
|
|
id = __rdma_create_id(listen_id->route.addr.dev_addr.net,
|
2015-10-22 20:20:10 +08:00
|
|
|
listen_id->event_handler, listen_id->context,
|
2018-03-02 05:57:44 +08:00
|
|
|
listen_id->ps, ib_event->param.req_rcvd.qp_type,
|
|
|
|
listen_id_priv->res.kern_name);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (IS_ERR(id))
|
2011-07-17 18:46:47 +08:00
|
|
|
return NULL;
|
2006-09-30 03:09:51 +08:00
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2015-07-30 22:50:19 +08:00
|
|
|
if (cma_save_net_info((struct sockaddr *)&id->route.addr.src_addr,
|
|
|
|
(struct sockaddr *)&id->route.addr.dst_addr,
|
|
|
|
listen_id, ib_event, ss_family, service_id))
|
2013-05-30 01:09:21 +08:00
|
|
|
goto err;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
rt = &id->route;
|
|
|
|
rt->num_paths = ib_event->param.req_rcvd.alternate_path ? 2 : 1;
|
treewide: kmalloc() -> kmalloc_array()
The kmalloc() function has a 2-factor argument form, kmalloc_array(). This
patch replaces cases of:
kmalloc(a * b, gfp)
with:
kmalloc_array(a * b, gfp)
as well as handling cases of:
kmalloc(a * b * c, gfp)
with:
kmalloc(array3_size(a, b, c), gfp)
as it's slightly less ugly than:
kmalloc_array(array_size(a, b), c, gfp)
This does, however, attempt to ignore constant size factors like:
kmalloc(4 * 1024, gfp)
though any constants defined via macros get caught up in the conversion.
Any factors with a sizeof() of "unsigned char", "char", and "u8" were
dropped, since they're redundant.
The tools/ directory was manually excluded, since it has its own
implementation of kmalloc().
The Coccinelle script used for this was:
// Fix redundant parens around sizeof().
@@
type TYPE;
expression THING, E;
@@
(
kmalloc(
- (sizeof(TYPE)) * E
+ sizeof(TYPE) * E
, ...)
|
kmalloc(
- (sizeof(THING)) * E
+ sizeof(THING) * E
, ...)
)
// Drop single-byte sizes and redundant parens.
@@
expression COUNT;
typedef u8;
typedef __u8;
@@
(
kmalloc(
- sizeof(u8) * (COUNT)
+ COUNT
, ...)
|
kmalloc(
- sizeof(__u8) * (COUNT)
+ COUNT
, ...)
|
kmalloc(
- sizeof(char) * (COUNT)
+ COUNT
, ...)
|
kmalloc(
- sizeof(unsigned char) * (COUNT)
+ COUNT
, ...)
|
kmalloc(
- sizeof(u8) * COUNT
+ COUNT
, ...)
|
kmalloc(
- sizeof(__u8) * COUNT
+ COUNT
, ...)
|
kmalloc(
- sizeof(char) * COUNT
+ COUNT
, ...)
|
kmalloc(
- sizeof(unsigned char) * COUNT
+ COUNT
, ...)
)
// 2-factor product with sizeof(type/expression) and identifier or constant.
@@
type TYPE;
expression THING;
identifier COUNT_ID;
constant COUNT_CONST;
@@
(
- kmalloc
+ kmalloc_array
(
- sizeof(TYPE) * (COUNT_ID)
+ COUNT_ID, sizeof(TYPE)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(TYPE) * COUNT_ID
+ COUNT_ID, sizeof(TYPE)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(TYPE) * (COUNT_CONST)
+ COUNT_CONST, sizeof(TYPE)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(TYPE) * COUNT_CONST
+ COUNT_CONST, sizeof(TYPE)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(THING) * (COUNT_ID)
+ COUNT_ID, sizeof(THING)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(THING) * COUNT_ID
+ COUNT_ID, sizeof(THING)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(THING) * (COUNT_CONST)
+ COUNT_CONST, sizeof(THING)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(THING) * COUNT_CONST
+ COUNT_CONST, sizeof(THING)
, ...)
)
// 2-factor product, only identifiers.
@@
identifier SIZE, COUNT;
@@
- kmalloc
+ kmalloc_array
(
- SIZE * COUNT
+ COUNT, SIZE
, ...)
// 3-factor product with 1 sizeof(type) or sizeof(expression), with
// redundant parens removed.
@@
expression THING;
identifier STRIDE, COUNT;
type TYPE;
@@
(
kmalloc(
- sizeof(TYPE) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kmalloc(
- sizeof(TYPE) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kmalloc(
- sizeof(TYPE) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kmalloc(
- sizeof(TYPE) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kmalloc(
- sizeof(THING) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kmalloc(
- sizeof(THING) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kmalloc(
- sizeof(THING) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kmalloc(
- sizeof(THING) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
)
// 3-factor product with 2 sizeof(variable), with redundant parens removed.
@@
expression THING1, THING2;
identifier COUNT;
type TYPE1, TYPE2;
@@
(
kmalloc(
- sizeof(TYPE1) * sizeof(TYPE2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
kmalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
kmalloc(
- sizeof(THING1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
kmalloc(
- sizeof(THING1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
kmalloc(
- sizeof(TYPE1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
|
kmalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
)
// 3-factor product, only identifiers, with redundant parens removed.
@@
identifier STRIDE, SIZE, COUNT;
@@
(
kmalloc(
- (COUNT) * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kmalloc(
- COUNT * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kmalloc(
- COUNT * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kmalloc(
- (COUNT) * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kmalloc(
- COUNT * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kmalloc(
- (COUNT) * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kmalloc(
- (COUNT) * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kmalloc(
- COUNT * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
)
// Any remaining multi-factor products, first at least 3-factor products,
// when they're not all constants...
@@
expression E1, E2, E3;
constant C1, C2, C3;
@@
(
kmalloc(C1 * C2 * C3, ...)
|
kmalloc(
- (E1) * E2 * E3
+ array3_size(E1, E2, E3)
, ...)
|
kmalloc(
- (E1) * (E2) * E3
+ array3_size(E1, E2, E3)
, ...)
|
kmalloc(
- (E1) * (E2) * (E3)
+ array3_size(E1, E2, E3)
, ...)
|
kmalloc(
- E1 * E2 * E3
+ array3_size(E1, E2, E3)
, ...)
)
// And then all remaining 2 factors products when they're not all constants,
// keeping sizeof() as the second factor argument.
@@
expression THING, E1, E2;
type TYPE;
constant C1, C2, C3;
@@
(
kmalloc(sizeof(THING) * C2, ...)
|
kmalloc(sizeof(TYPE) * C2, ...)
|
kmalloc(C1 * C2 * C3, ...)
|
kmalloc(C1 * C2, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(TYPE) * (E2)
+ E2, sizeof(TYPE)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(TYPE) * E2
+ E2, sizeof(TYPE)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(THING) * (E2)
+ E2, sizeof(THING)
, ...)
|
- kmalloc
+ kmalloc_array
(
- sizeof(THING) * E2
+ E2, sizeof(THING)
, ...)
|
- kmalloc
+ kmalloc_array
(
- (E1) * E2
+ E1, E2
, ...)
|
- kmalloc
+ kmalloc_array
(
- (E1) * (E2)
+ E1, E2
, ...)
|
- kmalloc
+ kmalloc_array
(
- E1 * E2
+ E1, E2
, ...)
)
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-06-13 04:55:00 +08:00
|
|
|
rt->path_rec = kmalloc_array(rt->num_paths, sizeof(*rt->path_rec),
|
|
|
|
GFP_KERNEL);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (!rt->path_rec)
|
2011-07-17 18:46:47 +08:00
|
|
|
goto err;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2017-04-28 07:06:00 +08:00
|
|
|
rt->path_rec[0] = *path;
|
2006-06-18 11:37:29 +08:00
|
|
|
if (rt->num_paths == 2)
|
|
|
|
rt->path_rec[1] = *ib_event->param.req_rcvd.alternate_path;
|
|
|
|
|
2015-07-30 22:50:24 +08:00
|
|
|
if (net_dev) {
|
2017-11-07 16:49:09 +08:00
|
|
|
rdma_copy_addr(&rt->addr.dev_addr, net_dev, NULL);
|
2015-07-30 22:50:24 +08:00
|
|
|
} else {
|
2015-10-06 22:56:00 +08:00
|
|
|
if (!cma_protocol_roce(listen_id) &&
|
|
|
|
cma_any_addr(cma_src_addr(id_priv))) {
|
|
|
|
rt->addr.dev_addr.dev_type = ARPHRD_INFINIBAND;
|
|
|
|
rdma_addr_set_sgid(&rt->addr.dev_addr, &rt->path_rec[0].sgid);
|
|
|
|
ib_addr_set_pkey(&rt->addr.dev_addr, be16_to_cpu(rt->path_rec[0].pkey));
|
|
|
|
} else if (!cma_any_addr(cma_src_addr(id_priv))) {
|
|
|
|
ret = cma_translate_addr(cma_src_addr(id_priv), &rt->addr.dev_addr);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
RDMA/cm: fix loopback address support
The RDMA CM is intended to support the use of a loopback address
when establishing a connection; however, the behavior of the CM
when loopback addresses are used is confusing and does not always
work, depending on whether loopback was specified by the server,
the client, or both.
The defined behavior of rdma_bind_addr is to associate an RDMA
device with an rdma_cm_id, as long as the user specified a non-
zero address. (ie they weren't just trying to reserve a port)
Currently, if the loopback address is passed to rdam_bind_addr,
no device is associated with the rdma_cm_id. Fix this.
If a loopback address is specified by the client as the destination
address for a connection, it will fail to establish a connection.
This is true even if the server is listing across all addresses or
on the loopback address itself. The issue is that the server tries
to translate the IP address carried in the REQ message to a local
net_device address, which fails. The translation is not needed in
this case, since the REQ carries the actual HW address that should
be used.
Finally, cleanup loopback support to be more transport neutral.
Replace separate calls to get/set the sgid and dgid from the
device address to a single call that behaves correctly depending
on the format of the device address. And support both IPv4 and
IPv6 address formats.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
[ Fixed RDS build by s/ib_addr_get/rdma_addr_get/ - Roland ]
Signed-off-by: Roland Dreier <rolandd@cisco.com>
2009-11-20 05:26:06 +08:00
|
|
|
}
|
|
|
|
rdma_addr_set_dgid(&rt->addr.dev_addr, &rt->path_rec[0].dgid);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2011-05-21 02:46:11 +08:00
|
|
|
id_priv->state = RDMA_CM_CONNECT;
|
2006-06-18 11:37:29 +08:00
|
|
|
return id_priv;
|
2006-09-30 03:09:51 +08:00
|
|
|
|
|
|
|
err:
|
2011-07-17 18:46:47 +08:00
|
|
|
rdma_destroy_id(id);
|
2006-06-18 11:37:29 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:11 +08:00
|
|
|
static struct rdma_id_private *
|
2018-07-29 16:53:16 +08:00
|
|
|
cma_ib_new_udp_id(const struct rdma_cm_id *listen_id,
|
|
|
|
const struct ib_cm_event *ib_event,
|
|
|
|
struct net_device *net_dev)
|
2006-12-01 08:44:16 +08:00
|
|
|
{
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct rdma_id_private *listen_id_priv;
|
2006-12-01 08:44:16 +08:00
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
struct rdma_cm_id *id;
|
2015-07-30 22:50:19 +08:00
|
|
|
const sa_family_t ss_family = listen_id->route.addr.src_addr.ss_family;
|
2015-10-22 20:20:10 +08:00
|
|
|
struct net *net = listen_id->route.addr.dev_addr.net;
|
2006-12-01 08:44:16 +08:00
|
|
|
int ret;
|
|
|
|
|
2018-03-02 05:57:44 +08:00
|
|
|
listen_id_priv = container_of(listen_id, struct rdma_id_private, id);
|
|
|
|
id = __rdma_create_id(net, listen_id->event_handler, listen_id->context,
|
|
|
|
listen_id->ps, IB_QPT_UD,
|
|
|
|
listen_id_priv->res.kern_name);
|
2006-12-01 08:44:16 +08:00
|
|
|
if (IS_ERR(id))
|
|
|
|
return NULL;
|
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2015-07-30 22:50:19 +08:00
|
|
|
if (cma_save_net_info((struct sockaddr *)&id->route.addr.src_addr,
|
|
|
|
(struct sockaddr *)&id->route.addr.dst_addr,
|
|
|
|
listen_id, ib_event, ss_family,
|
|
|
|
ib_event->param.sidr_req_rcvd.service_id))
|
2006-12-01 08:44:16 +08:00
|
|
|
goto err;
|
|
|
|
|
2015-07-30 22:50:24 +08:00
|
|
|
if (net_dev) {
|
2017-11-07 16:49:09 +08:00
|
|
|
rdma_copy_addr(&id->route.addr.dev_addr, net_dev, NULL);
|
2015-07-30 22:50:24 +08:00
|
|
|
} else {
|
2015-10-06 22:56:00 +08:00
|
|
|
if (!cma_any_addr(cma_src_addr(id_priv))) {
|
|
|
|
ret = cma_translate_addr(cma_src_addr(id_priv),
|
|
|
|
&id->route.addr.dev_addr);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
RDMA/cm: fix loopback address support
The RDMA CM is intended to support the use of a loopback address
when establishing a connection; however, the behavior of the CM
when loopback addresses are used is confusing and does not always
work, depending on whether loopback was specified by the server,
the client, or both.
The defined behavior of rdma_bind_addr is to associate an RDMA
device with an rdma_cm_id, as long as the user specified a non-
zero address. (ie they weren't just trying to reserve a port)
Currently, if the loopback address is passed to rdam_bind_addr,
no device is associated with the rdma_cm_id. Fix this.
If a loopback address is specified by the client as the destination
address for a connection, it will fail to establish a connection.
This is true even if the server is listing across all addresses or
on the loopback address itself. The issue is that the server tries
to translate the IP address carried in the REQ message to a local
net_device address, which fails. The translation is not needed in
this case, since the REQ carries the actual HW address that should
be used.
Finally, cleanup loopback support to be more transport neutral.
Replace separate calls to get/set the sgid and dgid from the
device address to a single call that behaves correctly depending
on the format of the device address. And support both IPv4 and
IPv6 address formats.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
[ Fixed RDS build by s/ib_addr_get/rdma_addr_get/ - Roland ]
Signed-off-by: Roland Dreier <rolandd@cisco.com>
2009-11-20 05:26:06 +08:00
|
|
|
}
|
2006-12-01 08:44:16 +08:00
|
|
|
|
2011-05-21 02:46:11 +08:00
|
|
|
id_priv->state = RDMA_CM_CONNECT;
|
2006-12-01 08:44:16 +08:00
|
|
|
return id_priv;
|
|
|
|
err:
|
|
|
|
rdma_destroy_id(id);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2006-12-01 08:33:14 +08:00
|
|
|
static void cma_set_req_event_data(struct rdma_cm_event *event,
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct ib_cm_req_event_param *req_data,
|
2006-12-01 08:33:14 +08:00
|
|
|
void *private_data, int offset)
|
|
|
|
{
|
|
|
|
event->param.conn.private_data = private_data + offset;
|
|
|
|
event->param.conn.private_data_len = IB_CM_REQ_PRIVATE_DATA_SIZE - offset;
|
|
|
|
event->param.conn.responder_resources = req_data->responder_resources;
|
|
|
|
event->param.conn.initiator_depth = req_data->initiator_depth;
|
|
|
|
event->param.conn.flow_control = req_data->flow_control;
|
|
|
|
event->param.conn.retry_count = req_data->retry_count;
|
|
|
|
event->param.conn.rnr_retry_count = req_data->rnr_retry_count;
|
|
|
|
event->param.conn.srq = req_data->srq;
|
|
|
|
event->param.conn.qp_num = req_data->remote_qpn;
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:16 +08:00
|
|
|
static int cma_ib_check_req_qp_type(const struct rdma_cm_id *id,
|
|
|
|
const struct ib_cm_event *ib_event)
|
2011-10-07 00:32:33 +08:00
|
|
|
{
|
2012-06-15 04:49:09 +08:00
|
|
|
return (((ib_event->event == IB_CM_REQ_RECEIVED) &&
|
2011-10-07 00:32:33 +08:00
|
|
|
(ib_event->param.req_rcvd.qp_type == id->qp_type)) ||
|
|
|
|
((ib_event->event == IB_CM_SIDR_REQ_RECEIVED) &&
|
|
|
|
(id->qp_type == IB_QPT_UD)) ||
|
|
|
|
(!id->qp_type));
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:16 +08:00
|
|
|
static int cma_ib_req_handler(struct ib_cm_id *cm_id,
|
|
|
|
const struct ib_cm_event *ib_event)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2016-06-11 02:08:25 +08:00
|
|
|
struct rdma_id_private *listen_id, *conn_id = NULL;
|
2018-07-29 16:53:14 +08:00
|
|
|
struct rdma_cm_event event = {};
|
2015-07-30 22:50:24 +08:00
|
|
|
struct net_device *net_dev;
|
2017-10-12 01:48:45 +08:00
|
|
|
u8 offset;
|
|
|
|
int ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2018-07-29 16:53:16 +08:00
|
|
|
listen_id = cma_ib_id_from_event(cm_id, ib_event, &net_dev);
|
2015-07-30 22:50:22 +08:00
|
|
|
if (IS_ERR(listen_id))
|
|
|
|
return PTR_ERR(listen_id);
|
|
|
|
|
2018-07-29 16:53:16 +08:00
|
|
|
if (!cma_ib_check_req_qp_type(&listen_id->id, ib_event)) {
|
2015-07-30 22:50:24 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto net_dev_put;
|
|
|
|
}
|
2011-10-07 00:32:33 +08:00
|
|
|
|
2016-06-11 02:08:25 +08:00
|
|
|
mutex_lock(&listen_id->handler_mutex);
|
|
|
|
if (listen_id->state != RDMA_CM_LISTEN) {
|
2015-07-30 22:50:24 +08:00
|
|
|
ret = -ECONNABORTED;
|
2016-06-11 02:08:25 +08:00
|
|
|
goto err1;
|
2015-07-30 22:50:24 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2013-05-30 01:09:22 +08:00
|
|
|
offset = cma_user_data_offset(listen_id);
|
2006-12-01 08:44:16 +08:00
|
|
|
event.event = RDMA_CM_EVENT_CONNECT_REQUEST;
|
2011-10-07 00:32:33 +08:00
|
|
|
if (ib_event->event == IB_CM_SIDR_REQ_RECEIVED) {
|
2018-07-29 16:53:16 +08:00
|
|
|
conn_id = cma_ib_new_udp_id(&listen_id->id, ib_event, net_dev);
|
2006-12-01 08:44:16 +08:00
|
|
|
event.param.ud.private_data = ib_event->private_data + offset;
|
|
|
|
event.param.ud.private_data_len =
|
|
|
|
IB_CM_SIDR_REQ_PRIVATE_DATA_SIZE - offset;
|
|
|
|
} else {
|
2018-07-29 16:53:16 +08:00
|
|
|
conn_id = cma_ib_new_conn_id(&listen_id->id, ib_event, net_dev);
|
2006-12-01 08:44:16 +08:00
|
|
|
cma_set_req_event_data(&event, &ib_event->param.req_rcvd,
|
|
|
|
ib_event->private_data, offset);
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
if (!conn_id) {
|
|
|
|
ret = -ENOMEM;
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
goto err1;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_lock_nested(&conn_id->handler_mutex, SINGLE_DEPTH_NESTING);
|
2013-09-25 05:16:28 +08:00
|
|
|
ret = cma_acquire_dev(conn_id, listen_id);
|
2006-10-17 12:39:11 +08:00
|
|
|
if (ret)
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
goto err2;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
conn_id->cm_id.ib = cm_id;
|
|
|
|
cm_id->context = conn_id;
|
|
|
|
cm_id->cm_handler = cma_ib_handler;
|
|
|
|
|
2011-02-24 00:11:32 +08:00
|
|
|
/*
|
|
|
|
* Protect against the user destroying conn_id from another thread
|
|
|
|
* until we're done accessing it.
|
|
|
|
*/
|
|
|
|
atomic_inc(&conn_id->refcount);
|
2006-12-01 08:33:14 +08:00
|
|
|
ret = conn_id->id.event_handler(&conn_id->id, &event);
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
if (ret)
|
|
|
|
goto err3;
|
|
|
|
/*
|
|
|
|
* Acquire mutex to prevent user executing rdma_destroy_id()
|
|
|
|
* while we're accessing the cm_id.
|
|
|
|
*/
|
|
|
|
mutex_lock(&lock);
|
IB/core: Ethernet L2 attributes in verbs/cm structures
This patch add the support for Ethernet L2 attributes in the
verbs/cm/cma structures.
When dealing with L2 Ethernet, we should use smac, dmac, vlan ID and priority
in a similar manner that the IB L2 (and the L4 PKEY) attributes are used.
Thus, those attributes were added to the following structures:
* ib_ah_attr - added dmac
* ib_qp_attr - added smac and vlan_id, (sl remains vlan priority)
* ib_wc - added smac, vlan_id
* ib_sa_path_rec - added smac, dmac, vlan_id
* cm_av - added smac and vlan_id
For the path record structure, extra care was taken to avoid the new
fields when packing it into wire format, so we don't break the IB CM
and SA wire protocol.
On the active side, the CM fills. its internal structures from the
path provided by the ULP. We add there taking the ETH L2 attributes
and placing them into the CM Address Handle (struct cm_av).
On the passive side, the CM fills its internal structures from the WC
associated with the REQ message. We add there taking the ETH L2
attributes from the WC.
When the HW driver provides the required ETH L2 attributes in the WC,
they set the IB_WC_WITH_SMAC and IB_WC_WITH_VLAN flags. The IB core
code checks for the presence of these flags, and in their absence does
address resolution from the ib_init_ah_from_wc() helper function.
ib_modify_qp_is_ok is also updated to consider the link layer. Some
parameters are mandatory for Ethernet link layer, while they are
irrelevant for IB. Vendor drivers are modified to support the new
function signature.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Or Gerlitz <ogerlitz@mellanox.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2013-12-13 00:03:11 +08:00
|
|
|
if (cma_comp(conn_id, RDMA_CM_CONNECT) &&
|
|
|
|
(conn_id->id.qp_type != IB_QPT_UD))
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
ib_send_cm_mra(cm_id, CMA_CM_MRA_SETTING, NULL, 0);
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
mutex_unlock(&conn_id->handler_mutex);
|
|
|
|
mutex_unlock(&listen_id->handler_mutex);
|
2011-02-24 00:11:32 +08:00
|
|
|
cma_deref_id(conn_id);
|
2015-07-30 22:50:24 +08:00
|
|
|
if (net_dev)
|
|
|
|
dev_put(net_dev);
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
return 0;
|
2006-10-17 12:39:11 +08:00
|
|
|
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
err3:
|
|
|
|
cma_deref_id(conn_id);
|
2006-10-17 12:39:11 +08:00
|
|
|
/* Destroy the CM ID by returning a non-zero value. */
|
|
|
|
conn_id->cm_id.ib = NULL;
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
err2:
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(conn_id, RDMA_CM_DESTROYING);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&conn_id->handler_mutex);
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
err1:
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&listen_id->handler_mutex);
|
RDMA/cma: Fix lockdep false positive recursive locking
The following lockdep problem was reported by Or Gerlitz <ogerlitz@mellanox.com>:
[ INFO: possible recursive locking detected ]
3.3.0-32035-g1b2649e-dirty #4 Not tainted
---------------------------------------------
kworker/5:1/418 is trying to acquire lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0138a41>] rdma_destroy_i d+0x33/0x1f0 [rdma_cm]
but task is already holding lock:
(&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disable_ca llback+0x24/0x45 [rdma_cm]
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&id_priv->handler_mutex);
lock(&id_priv->handler_mutex);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by kworker/5:1/418:
#0: (ib_cm){.+.+.+}, at: [<ffffffff81042ac1>] process_one_work+0x210/0x4a 6
#1: ((&(&work->work)->work)){+.+.+.}, at: [<ffffffff81042ac1>] process_on e_work+0x210/0x4a6
#2: (&id_priv->handler_mutex){+.+.+.}, at: [<ffffffffa0135130>] cma_disab le_callback+0x24/0x45 [rdma_cm]
stack backtrace:
Pid: 418, comm: kworker/5:1 Not tainted 3.3.0-32035-g1b2649e-dirty #4
Call Trace:
[<ffffffff8102b0fb>] ? console_unlock+0x1f4/0x204
[<ffffffff81068771>] __lock_acquire+0x16b5/0x174e
[<ffffffff8106461f>] ? save_trace+0x3f/0xb3
[<ffffffff810688fa>] lock_acquire+0xf0/0x116
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81364351>] mutex_lock_nested+0x64/0x2ce
[<ffffffffa0138a41>] ? rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffff81065abc>] ? trace_hardirqs_on+0xd/0xf
[<ffffffffa0138a41>] rdma_destroy_id+0x33/0x1f0 [rdma_cm]
[<ffffffffa0139c02>] cma_req_handler+0x418/0x644 [rdma_cm]
[<ffffffffa012ee88>] cm_process_work+0x32/0x119 [ib_cm]
[<ffffffffa0130299>] cm_req_handler+0x928/0x982 [ib_cm]
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffffa0130326>] cm_work_handler+0x33/0xfe5 [ib_cm]
[<ffffffff81065a78>] ? trace_hardirqs_on_caller+0x11e/0x155
[<ffffffffa01302f3>] ? cm_req_handler+0x982/0x982 [ib_cm]
[<ffffffff81042b6e>] process_one_work+0x2bd/0x4a6
[<ffffffff81042ac1>] ? process_one_work+0x210/0x4a6
[<ffffffff813669f3>] ? _raw_spin_unlock_irq+0x2b/0x40
[<ffffffff8104316e>] worker_thread+0x1d6/0x350
[<ffffffff81042f98>] ? rescuer_thread+0x241/0x241
[<ffffffff81046a32>] kthread+0x84/0x8c
[<ffffffff8136e854>] kernel_thread_helper+0x4/0x10
[<ffffffff81366d59>] ? retint_restore_args+0xe/0xe
[<ffffffff810469ae>] ? __init_kthread_worker+0x56/0x56
[<ffffffff8136e850>] ? gs_change+0xb/0xb
The actual locking is fine, since we're dealing with different locks,
but from the same lock class. cma_disable_callback() acquires the
listening id mutex, whereas rdma_destroy_id() acquires the mutex for
the new connection id. To fix this, delay the call to
rdma_destroy_id() until we've released the listening id mutex.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2012-04-26 01:42:35 +08:00
|
|
|
if (conn_id)
|
|
|
|
rdma_destroy_id(&conn_id->id);
|
2015-07-30 22:50:24 +08:00
|
|
|
|
|
|
|
net_dev_put:
|
|
|
|
if (net_dev)
|
|
|
|
dev_put(net_dev);
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-05-30 01:09:28 +08:00
|
|
|
__be64 rdma_get_service_id(struct rdma_cm_id *id, struct sockaddr *addr)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2013-05-30 01:09:19 +08:00
|
|
|
if (addr->sa_family == AF_IB)
|
|
|
|
return ((struct sockaddr_ib *) addr)->sib_sid;
|
|
|
|
|
2013-05-30 01:09:28 +08:00
|
|
|
return cpu_to_be64(((u64)id->ps << 16) + be16_to_cpu(cma_port(addr)));
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
2013-05-30 01:09:28 +08:00
|
|
|
EXPORT_SYMBOL(rdma_get_service_id);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2018-01-18 16:11:16 +08:00
|
|
|
void rdma_read_gids(struct rdma_cm_id *cm_id, union ib_gid *sgid,
|
|
|
|
union ib_gid *dgid)
|
|
|
|
{
|
|
|
|
struct rdma_addr *addr = &cm_id->route.addr;
|
|
|
|
|
|
|
|
if (!cm_id->device) {
|
|
|
|
if (sgid)
|
|
|
|
memset(sgid, 0, sizeof(*sgid));
|
|
|
|
if (dgid)
|
|
|
|
memset(dgid, 0, sizeof(*dgid));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rdma_protocol_roce(cm_id->device, cm_id->port_num)) {
|
|
|
|
if (sgid)
|
|
|
|
rdma_ip2gid((struct sockaddr *)&addr->src_addr, sgid);
|
|
|
|
if (dgid)
|
|
|
|
rdma_ip2gid((struct sockaddr *)&addr->dst_addr, dgid);
|
|
|
|
} else {
|
|
|
|
if (sgid)
|
|
|
|
rdma_addr_get_sgid(&addr->dev_addr, sgid);
|
|
|
|
if (dgid)
|
|
|
|
rdma_addr_get_dgid(&addr->dev_addr, dgid);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_read_gids);
|
|
|
|
|
2006-08-04 05:02:42 +08:00
|
|
|
static int cma_iw_handler(struct iw_cm_id *iw_id, struct iw_cm_event *iw_event)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv = iw_id->context;
|
2018-07-29 16:53:14 +08:00
|
|
|
struct rdma_cm_event event = {};
|
2006-08-04 05:02:42 +08:00
|
|
|
int ret = 0;
|
2013-07-04 18:40:44 +08:00
|
|
|
struct sockaddr *laddr = (struct sockaddr *)&iw_event->local_addr;
|
|
|
|
struct sockaddr *raddr = (struct sockaddr *)&iw_event->remote_addr;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2016-06-11 02:08:25 +08:00
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
|
|
|
if (id_priv->state != RDMA_CM_CONNECT)
|
|
|
|
goto out;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
|
|
|
switch (iw_event->event) {
|
|
|
|
case IW_CM_EVENT_CLOSE:
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_DISCONNECTED;
|
2006-08-04 05:02:42 +08:00
|
|
|
break;
|
|
|
|
case IW_CM_EVENT_CONNECT_REPLY:
|
2013-07-04 18:40:44 +08:00
|
|
|
memcpy(cma_src_addr(id_priv), laddr,
|
|
|
|
rdma_addr_size(laddr));
|
|
|
|
memcpy(cma_dst_addr(id_priv), raddr,
|
|
|
|
rdma_addr_size(raddr));
|
2006-12-16 06:50:17 +08:00
|
|
|
switch (iw_event->status) {
|
|
|
|
case 0:
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_ESTABLISHED;
|
2011-09-25 22:47:43 +08:00
|
|
|
event.param.conn.initiator_depth = iw_event->ird;
|
|
|
|
event.param.conn.responder_resources = iw_event->ord;
|
2006-12-16 06:50:17 +08:00
|
|
|
break;
|
|
|
|
case -ECONNRESET:
|
|
|
|
case -ECONNREFUSED:
|
|
|
|
event.event = RDMA_CM_EVENT_REJECTED;
|
|
|
|
break;
|
|
|
|
case -ETIMEDOUT:
|
|
|
|
event.event = RDMA_CM_EVENT_UNREACHABLE;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
event.event = RDMA_CM_EVENT_CONNECT_ERROR;
|
|
|
|
break;
|
|
|
|
}
|
2006-08-04 05:02:42 +08:00
|
|
|
break;
|
|
|
|
case IW_CM_EVENT_ESTABLISHED:
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_ESTABLISHED;
|
2011-09-25 22:47:43 +08:00
|
|
|
event.param.conn.initiator_depth = iw_event->ird;
|
|
|
|
event.param.conn.responder_resources = iw_event->ord;
|
2006-08-04 05:02:42 +08:00
|
|
|
break;
|
|
|
|
default:
|
2018-05-29 19:56:17 +08:00
|
|
|
goto out;
|
2006-08-04 05:02:42 +08:00
|
|
|
}
|
|
|
|
|
2006-12-01 08:33:14 +08:00
|
|
|
event.status = iw_event->status;
|
|
|
|
event.param.conn.private_data = iw_event->private_data;
|
|
|
|
event.param.conn.private_data_len = iw_event->private_data_len;
|
|
|
|
ret = id_priv->id.event_handler(&id_priv->id, &event);
|
2006-08-04 05:02:42 +08:00
|
|
|
if (ret) {
|
|
|
|
/* Destroy the CM ID by returning a non-zero value. */
|
|
|
|
id_priv->cm_id.iw = NULL;
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(id_priv, RDMA_CM_DESTROYING);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-08-04 05:02:42 +08:00
|
|
|
rdma_destroy_id(&id_priv->id);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-06-11 02:08:25 +08:00
|
|
|
out:
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-08-04 05:02:42 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iw_conn_req_handler(struct iw_cm_id *cm_id,
|
|
|
|
struct iw_cm_event *iw_event)
|
|
|
|
{
|
|
|
|
struct rdma_cm_id *new_cm_id;
|
|
|
|
struct rdma_id_private *listen_id, *conn_id;
|
2018-07-29 16:53:14 +08:00
|
|
|
struct rdma_cm_event event = {};
|
2016-06-11 02:08:25 +08:00
|
|
|
int ret = -ECONNABORTED;
|
2013-07-04 18:40:44 +08:00
|
|
|
struct sockaddr *laddr = (struct sockaddr *)&iw_event->local_addr;
|
|
|
|
struct sockaddr *raddr = (struct sockaddr *)&iw_event->remote_addr;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2018-07-29 16:53:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_CONNECT_REQUEST;
|
|
|
|
event.param.conn.private_data = iw_event->private_data;
|
|
|
|
event.param.conn.private_data_len = iw_event->private_data_len;
|
|
|
|
event.param.conn.initiator_depth = iw_event->ird;
|
|
|
|
event.param.conn.responder_resources = iw_event->ord;
|
|
|
|
|
2006-08-04 05:02:42 +08:00
|
|
|
listen_id = cm_id->context;
|
2016-06-11 02:08:25 +08:00
|
|
|
|
|
|
|
mutex_lock(&listen_id->handler_mutex);
|
|
|
|
if (listen_id->state != RDMA_CM_LISTEN)
|
|
|
|
goto out;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
|
|
|
/* Create a new RDMA id for the new IW CM ID */
|
2018-03-02 05:57:44 +08:00
|
|
|
new_cm_id = __rdma_create_id(listen_id->id.route.addr.dev_addr.net,
|
|
|
|
listen_id->id.event_handler,
|
|
|
|
listen_id->id.context,
|
|
|
|
RDMA_PS_TCP, IB_QPT_RC,
|
|
|
|
listen_id->res.kern_name);
|
2008-04-17 12:09:25 +08:00
|
|
|
if (IS_ERR(new_cm_id)) {
|
2006-08-04 05:02:42 +08:00
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
conn_id = container_of(new_cm_id, struct rdma_id_private, id);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_lock_nested(&conn_id->handler_mutex, SINGLE_DEPTH_NESTING);
|
2011-05-21 02:46:11 +08:00
|
|
|
conn_id->state = RDMA_CM_CONNECT;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2017-11-14 20:52:10 +08:00
|
|
|
ret = rdma_translate_ip(laddr, &conn_id->id.route.addr.dev_addr);
|
2006-08-04 05:02:42 +08:00
|
|
|
if (ret) {
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&conn_id->handler_mutex);
|
2006-08-04 05:02:42 +08:00
|
|
|
rdma_destroy_id(new_cm_id);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-09-25 05:16:28 +08:00
|
|
|
ret = cma_acquire_dev(conn_id, listen_id);
|
2006-08-04 05:02:42 +08:00
|
|
|
if (ret) {
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&conn_id->handler_mutex);
|
2006-08-04 05:02:42 +08:00
|
|
|
rdma_destroy_id(new_cm_id);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
conn_id->cm_id.iw = cm_id;
|
|
|
|
cm_id->context = conn_id;
|
|
|
|
cm_id->cm_handler = cma_iw_handler;
|
|
|
|
|
2013-07-04 18:40:44 +08:00
|
|
|
memcpy(cma_src_addr(conn_id), laddr, rdma_addr_size(laddr));
|
|
|
|
memcpy(cma_dst_addr(conn_id), raddr, rdma_addr_size(raddr));
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2011-02-24 00:11:32 +08:00
|
|
|
/*
|
|
|
|
* Protect against the user destroying conn_id from another thread
|
|
|
|
* until we're done accessing it.
|
|
|
|
*/
|
|
|
|
atomic_inc(&conn_id->refcount);
|
2006-12-01 08:33:14 +08:00
|
|
|
ret = conn_id->id.event_handler(&conn_id->id, &event);
|
2006-08-04 05:02:42 +08:00
|
|
|
if (ret) {
|
|
|
|
/* User wants to destroy the CM ID */
|
|
|
|
conn_id->cm_id.iw = NULL;
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(conn_id, RDMA_CM_DESTROYING);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&conn_id->handler_mutex);
|
2011-02-24 00:11:32 +08:00
|
|
|
cma_deref_id(conn_id);
|
2006-08-04 05:02:42 +08:00
|
|
|
rdma_destroy_id(&conn_id->id);
|
2008-07-15 14:48:53 +08:00
|
|
|
goto out;
|
2006-08-04 05:02:42 +08:00
|
|
|
}
|
|
|
|
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&conn_id->handler_mutex);
|
2011-02-24 00:11:32 +08:00
|
|
|
cma_deref_id(conn_id);
|
2008-07-15 14:48:53 +08:00
|
|
|
|
2006-08-04 05:02:42 +08:00
|
|
|
out:
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&listen_id->handler_mutex);
|
2006-08-04 05:02:42 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static int cma_ib_listen(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct sockaddr *addr;
|
2011-07-17 18:46:47 +08:00
|
|
|
struct ib_cm_id *id;
|
2006-06-18 11:37:29 +08:00
|
|
|
__be64 svc_id;
|
|
|
|
|
2015-07-30 22:50:25 +08:00
|
|
|
addr = cma_src_addr(id_priv);
|
|
|
|
svc_id = rdma_get_service_id(&id_priv->id, addr);
|
2018-07-29 16:53:16 +08:00
|
|
|
id = ib_cm_insert_listen(id_priv->id.device,
|
|
|
|
cma_ib_req_handler, svc_id);
|
2011-07-17 18:46:47 +08:00
|
|
|
if (IS_ERR(id))
|
|
|
|
return PTR_ERR(id);
|
|
|
|
id_priv->cm_id.ib = id;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-07-30 22:50:25 +08:00
|
|
|
return 0;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2006-08-04 05:02:42 +08:00
|
|
|
static int cma_iw_listen(struct rdma_id_private *id_priv, int backlog)
|
|
|
|
{
|
|
|
|
int ret;
|
2011-07-17 18:46:47 +08:00
|
|
|
struct iw_cm_id *id;
|
|
|
|
|
|
|
|
id = iw_create_cm_id(id_priv->id.device,
|
|
|
|
iw_conn_req_handler,
|
|
|
|
id_priv);
|
|
|
|
if (IS_ERR(id))
|
|
|
|
return PTR_ERR(id);
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2015-05-19 04:27:10 +08:00
|
|
|
id->tos = id_priv->tos;
|
2011-07-17 18:46:47 +08:00
|
|
|
id_priv->cm_id.iw = id;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2013-07-04 18:40:44 +08:00
|
|
|
memcpy(&id_priv->cm_id.iw->local_addr, cma_src_addr(id_priv),
|
|
|
|
rdma_addr_size(cma_src_addr(id_priv)));
|
2006-08-04 05:02:42 +08:00
|
|
|
|
|
|
|
ret = iw_cm_listen(id_priv->cm_id.iw, backlog);
|
|
|
|
|
|
|
|
if (ret) {
|
|
|
|
iw_destroy_cm_id(id_priv->cm_id.iw);
|
|
|
|
id_priv->cm_id.iw = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static int cma_listen_handler(struct rdma_cm_id *id,
|
|
|
|
struct rdma_cm_event *event)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv = id->context;
|
|
|
|
|
|
|
|
id->context = id_priv->id.context;
|
|
|
|
id->event_handler = id_priv->id.event_handler;
|
|
|
|
return id_priv->id.event_handler(id, event);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_listen_on_dev(struct rdma_id_private *id_priv,
|
|
|
|
struct cma_device *cma_dev)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *dev_id_priv;
|
|
|
|
struct rdma_cm_id *id;
|
2015-10-22 20:20:10 +08:00
|
|
|
struct net *net = id_priv->id.route.addr.dev_addr.net;
|
2006-06-18 11:37:29 +08:00
|
|
|
int ret;
|
|
|
|
|
2015-05-05 20:50:34 +08:00
|
|
|
if (cma_family(id_priv) == AF_IB && !rdma_cap_ib_cm(cma_dev->device, 1))
|
2013-05-30 01:09:24 +08:00
|
|
|
return;
|
|
|
|
|
2018-03-02 05:57:44 +08:00
|
|
|
id = __rdma_create_id(net, cma_listen_handler, id_priv, id_priv->id.ps,
|
|
|
|
id_priv->id.qp_type, id_priv->res.kern_name);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (IS_ERR(id))
|
|
|
|
return;
|
|
|
|
|
|
|
|
dev_id_priv = container_of(id, struct rdma_id_private, id);
|
|
|
|
|
2011-05-21 02:46:11 +08:00
|
|
|
dev_id_priv->state = RDMA_CM_ADDR_BOUND;
|
2013-05-30 01:09:14 +08:00
|
|
|
memcpy(cma_src_addr(dev_id_priv), cma_src_addr(id_priv),
|
|
|
|
rdma_addr_size(cma_src_addr(id_priv)));
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-12-23 20:56:55 +08:00
|
|
|
_cma_attach_to_dev(dev_id_priv, cma_dev);
|
2006-06-18 11:37:29 +08:00
|
|
|
list_add_tail(&dev_id_priv->listen_list, &id_priv->listen_list);
|
2007-10-10 02:12:34 +08:00
|
|
|
atomic_inc(&id_priv->refcount);
|
|
|
|
dev_id_priv->internal_id = 1;
|
2012-06-15 04:31:39 +08:00
|
|
|
dev_id_priv->afonly = id_priv->afonly;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
ret = rdma_listen(id, id_priv->backlog);
|
|
|
|
if (ret)
|
2016-03-02 03:20:29 +08:00
|
|
|
pr_warn("RDMA CMA: cma_listen_on_dev, error %d, listening on device %s\n",
|
|
|
|
ret, cma_dev->device->name);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_listen_on_all(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct cma_device *cma_dev;
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
list_add_tail(&id_priv->list, &listen_any_list);
|
|
|
|
list_for_each_entry(cma_dev, &dev_list, list)
|
|
|
|
cma_listen_on_dev(id_priv, cma_dev);
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
}
|
|
|
|
|
2007-08-09 06:51:06 +08:00
|
|
|
void rdma_set_service_type(struct rdma_cm_id *id, int tos)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
|
|
|
id_priv->tos = (u8) tos;
|
2017-02-14 13:21:52 +08:00
|
|
|
id_priv->tos_set = true;
|
2007-08-09 06:51:06 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_set_service_type);
|
|
|
|
|
2017-04-28 07:05:58 +08:00
|
|
|
static void cma_query_handler(int status, struct sa_path_rec *path_rec,
|
2006-06-18 11:37:29 +08:00
|
|
|
void *context)
|
|
|
|
{
|
|
|
|
struct cma_work *work = context;
|
|
|
|
struct rdma_route *route;
|
|
|
|
|
|
|
|
route = &work->id->id.route;
|
|
|
|
|
|
|
|
if (!status) {
|
|
|
|
route->num_paths = 1;
|
|
|
|
*route->path_rec = *path_rec;
|
|
|
|
} else {
|
2011-05-21 02:46:11 +08:00
|
|
|
work->old_state = RDMA_CM_ROUTE_QUERY;
|
|
|
|
work->new_state = RDMA_CM_ADDR_RESOLVED;
|
2006-06-18 11:37:29 +08:00
|
|
|
work->event.event = RDMA_CM_EVENT_ROUTE_ERROR;
|
2006-09-30 02:57:09 +08:00
|
|
|
work->event.status = status;
|
2017-01-05 22:16:35 +08:00
|
|
|
pr_debug_ratelimited("RDMA CM: ROUTE_ERROR: failed to query path. status %d\n",
|
|
|
|
status);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
queue_work(cma_wq, &work->work);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_query_ib_route(struct rdma_id_private *id_priv, int timeout_ms,
|
|
|
|
struct cma_work *work)
|
|
|
|
{
|
2013-05-30 01:09:14 +08:00
|
|
|
struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
|
2017-04-28 07:05:58 +08:00
|
|
|
struct sa_path_rec path_rec;
|
2007-08-09 06:51:06 +08:00
|
|
|
ib_sa_comp_mask comp_mask;
|
|
|
|
struct sockaddr_in6 *sin6;
|
2013-05-30 01:09:18 +08:00
|
|
|
struct sockaddr_ib *sib;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
memset(&path_rec, 0, sizeof path_rec);
|
2017-04-28 07:06:02 +08:00
|
|
|
|
|
|
|
if (rdma_cap_opa_ah(id_priv->id.device, id_priv->id.port_num))
|
|
|
|
path_rec.rec_type = SA_PATH_REC_TYPE_OPA;
|
|
|
|
else
|
|
|
|
path_rec.rec_type = SA_PATH_REC_TYPE_IB;
|
2013-05-30 01:09:14 +08:00
|
|
|
rdma_addr_get_sgid(dev_addr, &path_rec.sgid);
|
|
|
|
rdma_addr_get_dgid(dev_addr, &path_rec.dgid);
|
|
|
|
path_rec.pkey = cpu_to_be16(ib_addr_get_pkey(dev_addr));
|
2006-06-18 11:37:29 +08:00
|
|
|
path_rec.numb_path = 1;
|
2007-02-22 08:40:44 +08:00
|
|
|
path_rec.reversible = 1;
|
2017-05-22 00:09:54 +08:00
|
|
|
path_rec.service_id = rdma_get_service_id(&id_priv->id,
|
|
|
|
cma_dst_addr(id_priv));
|
2007-08-09 06:51:06 +08:00
|
|
|
|
|
|
|
comp_mask = IB_SA_PATH_REC_DGID | IB_SA_PATH_REC_SGID |
|
|
|
|
IB_SA_PATH_REC_PKEY | IB_SA_PATH_REC_NUMB_PATH |
|
|
|
|
IB_SA_PATH_REC_REVERSIBLE | IB_SA_PATH_REC_SERVICE_ID;
|
|
|
|
|
2013-05-30 01:09:18 +08:00
|
|
|
switch (cma_family(id_priv)) {
|
|
|
|
case AF_INET:
|
2007-08-09 06:51:06 +08:00
|
|
|
path_rec.qos_class = cpu_to_be16((u16) id_priv->tos);
|
|
|
|
comp_mask |= IB_SA_PATH_REC_QOS_CLASS;
|
2013-05-30 01:09:18 +08:00
|
|
|
break;
|
|
|
|
case AF_INET6:
|
2013-05-30 01:09:14 +08:00
|
|
|
sin6 = (struct sockaddr_in6 *) cma_src_addr(id_priv);
|
2007-08-09 06:51:06 +08:00
|
|
|
path_rec.traffic_class = (u8) (be32_to_cpu(sin6->sin6_flowinfo) >> 20);
|
|
|
|
comp_mask |= IB_SA_PATH_REC_TRAFFIC_CLASS;
|
2013-05-30 01:09:18 +08:00
|
|
|
break;
|
|
|
|
case AF_IB:
|
|
|
|
sib = (struct sockaddr_ib *) cma_src_addr(id_priv);
|
|
|
|
path_rec.traffic_class = (u8) (be32_to_cpu(sib->sib_flowinfo) >> 20);
|
|
|
|
comp_mask |= IB_SA_PATH_REC_TRAFFIC_CLASS;
|
|
|
|
break;
|
2007-08-09 06:51:06 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2006-08-22 07:40:12 +08:00
|
|
|
id_priv->query_id = ib_sa_path_rec_get(&sa_client, id_priv->id.device,
|
2007-08-09 06:51:06 +08:00
|
|
|
id_priv->id.port_num, &path_rec,
|
|
|
|
comp_mask, timeout_ms,
|
|
|
|
GFP_KERNEL, cma_query_handler,
|
|
|
|
work, &id_priv->query);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
return (id_priv->query_id < 0) ? id_priv->query_id : 0;
|
|
|
|
}
|
|
|
|
|
2006-11-22 22:57:56 +08:00
|
|
|
static void cma_work_handler(struct work_struct *_work)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2006-11-22 22:57:56 +08:00
|
|
|
struct cma_work *work = container_of(_work, struct cma_work, work);
|
2006-06-18 11:37:29 +08:00
|
|
|
struct rdma_id_private *id_priv = work->id;
|
|
|
|
int destroy = 0;
|
|
|
|
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (!cma_comp_exch(id_priv, work->old_state, work->new_state))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (id_priv->id.event_handler(&id_priv->id, &work->event)) {
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(id_priv, RDMA_CM_DESTROYING);
|
2006-06-18 11:37:29 +08:00
|
|
|
destroy = 1;
|
|
|
|
}
|
|
|
|
out:
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_deref_id(id_priv);
|
|
|
|
if (destroy)
|
|
|
|
rdma_destroy_id(&id_priv->id);
|
|
|
|
kfree(work);
|
|
|
|
}
|
|
|
|
|
2008-07-23 05:14:22 +08:00
|
|
|
static void cma_ndev_work_handler(struct work_struct *_work)
|
|
|
|
{
|
|
|
|
struct cma_ndev_work *work = container_of(_work, struct cma_ndev_work, work);
|
|
|
|
struct rdma_id_private *id_priv = work->id;
|
|
|
|
int destroy = 0;
|
|
|
|
|
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (id_priv->state == RDMA_CM_DESTROYING ||
|
|
|
|
id_priv->state == RDMA_CM_DEVICE_REMOVAL)
|
2008-07-23 05:14:22 +08:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (id_priv->id.event_handler(&id_priv->id, &work->event)) {
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(id_priv, RDMA_CM_DESTROYING);
|
2008-07-23 05:14:22 +08:00
|
|
|
destroy = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
|
|
|
cma_deref_id(id_priv);
|
|
|
|
if (destroy)
|
|
|
|
rdma_destroy_id(&id_priv->id);
|
|
|
|
kfree(work);
|
|
|
|
}
|
|
|
|
|
2017-11-14 20:52:03 +08:00
|
|
|
static void cma_init_resolve_route_work(struct cma_work *work,
|
|
|
|
struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
work->id = id_priv;
|
|
|
|
INIT_WORK(&work->work, cma_work_handler);
|
|
|
|
work->old_state = RDMA_CM_ROUTE_QUERY;
|
|
|
|
work->new_state = RDMA_CM_ROUTE_RESOLVED;
|
|
|
|
work->event.event = RDMA_CM_EVENT_ROUTE_RESOLVED;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_init_resolve_addr_work(struct cma_work *work,
|
|
|
|
struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
work->id = id_priv;
|
|
|
|
INIT_WORK(&work->work, cma_work_handler);
|
|
|
|
work->old_state = RDMA_CM_ADDR_QUERY;
|
|
|
|
work->new_state = RDMA_CM_ADDR_RESOLVED;
|
|
|
|
work->event.event = RDMA_CM_EVENT_ADDR_RESOLVED;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static int cma_resolve_ib_route(struct rdma_id_private *id_priv, int timeout_ms)
|
|
|
|
{
|
|
|
|
struct rdma_route *route = &id_priv->id.route;
|
|
|
|
struct cma_work *work;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
work = kzalloc(sizeof *work, GFP_KERNEL);
|
|
|
|
if (!work)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-11-14 20:52:03 +08:00
|
|
|
cma_init_resolve_route_work(work, id_priv);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
route->path_rec = kmalloc(sizeof *route->path_rec, GFP_KERNEL);
|
|
|
|
if (!route->path_rec) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto err1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = cma_query_ib_route(id_priv, timeout_ms, work);
|
|
|
|
if (ret)
|
|
|
|
goto err2;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err2:
|
|
|
|
kfree(route->path_rec);
|
|
|
|
route->path_rec = NULL;
|
|
|
|
err1:
|
|
|
|
kfree(work);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-01-08 23:04:44 +08:00
|
|
|
static enum ib_gid_type cma_route_gid_type(enum rdma_network_type network_type,
|
|
|
|
unsigned long supported_gids,
|
|
|
|
enum ib_gid_type default_gid)
|
|
|
|
{
|
|
|
|
if ((network_type == RDMA_NETWORK_IPV4 ||
|
|
|
|
network_type == RDMA_NETWORK_IPV6) &&
|
|
|
|
test_bit(IB_GID_TYPE_ROCE_UDP_ENCAP, &supported_gids))
|
|
|
|
return IB_GID_TYPE_ROCE_UDP_ENCAP;
|
|
|
|
|
|
|
|
return default_gid;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* cma_iboe_set_path_rec_l2_fields() is helper function which sets
|
|
|
|
* path record type based on GID type.
|
|
|
|
* It also sets up other L2 fields which includes destination mac address
|
|
|
|
* netdev ifindex, of the path record.
|
|
|
|
* It returns the netdev of the bound interface for this path record entry.
|
|
|
|
*/
|
|
|
|
static struct net_device *
|
|
|
|
cma_iboe_set_path_rec_l2_fields(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct rdma_route *route = &id_priv->id.route;
|
|
|
|
enum ib_gid_type gid_type = IB_GID_TYPE_ROCE;
|
|
|
|
struct rdma_addr *addr = &route->addr;
|
|
|
|
unsigned long supported_gids;
|
|
|
|
struct net_device *ndev;
|
|
|
|
|
|
|
|
if (!addr->dev_addr.bound_dev_if)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ndev = dev_get_by_index(addr->dev_addr.net,
|
|
|
|
addr->dev_addr.bound_dev_if);
|
|
|
|
if (!ndev)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
supported_gids = roce_gid_type_mask_support(id_priv->id.device,
|
|
|
|
id_priv->id.port_num);
|
|
|
|
gid_type = cma_route_gid_type(addr->dev_addr.network,
|
|
|
|
supported_gids,
|
|
|
|
id_priv->gid_type);
|
|
|
|
/* Use the hint from IP Stack to select GID Type */
|
|
|
|
if (gid_type < ib_network_to_gid_type(addr->dev_addr.network))
|
|
|
|
gid_type = ib_network_to_gid_type(addr->dev_addr.network);
|
|
|
|
route->path_rec->rec_type = sa_conv_gid_to_pathrec_type(gid_type);
|
|
|
|
|
2018-03-21 23:16:35 +08:00
|
|
|
route->path_rec->roce.route_resolved = true;
|
2018-01-08 23:04:44 +08:00
|
|
|
sa_path_set_dmac(route->path_rec, addr->dev_addr.dst_dev_addr);
|
|
|
|
return ndev;
|
|
|
|
}
|
|
|
|
|
2018-01-08 23:04:45 +08:00
|
|
|
int rdma_set_ib_path(struct rdma_cm_id *id,
|
|
|
|
struct sa_path_rec *path_rec)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
2018-01-08 23:04:47 +08:00
|
|
|
struct net_device *ndev;
|
2006-06-18 11:37:29 +08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_RESOLVED,
|
|
|
|
RDMA_CM_ROUTE_RESOLVED))
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2018-01-08 23:04:45 +08:00
|
|
|
id->route.path_rec = kmemdup(path_rec, sizeof(*path_rec),
|
2010-05-16 05:22:38 +08:00
|
|
|
GFP_KERNEL);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (!id->route.path_rec) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2018-01-08 23:04:47 +08:00
|
|
|
if (rdma_protocol_roce(id->device, id->port_num)) {
|
|
|
|
ndev = cma_iboe_set_path_rec_l2_fields(id_priv);
|
|
|
|
if (!ndev) {
|
|
|
|
ret = -ENODEV;
|
|
|
|
goto err_free;
|
|
|
|
}
|
|
|
|
dev_put(ndev);
|
|
|
|
}
|
|
|
|
|
2018-01-08 23:04:45 +08:00
|
|
|
id->route.num_paths = 1;
|
2006-06-18 11:37:29 +08:00
|
|
|
return 0;
|
2018-01-08 23:04:47 +08:00
|
|
|
|
|
|
|
err_free:
|
|
|
|
kfree(id->route.path_rec);
|
|
|
|
id->route.path_rec = NULL;
|
2006-06-18 11:37:29 +08:00
|
|
|
err:
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_comp_exch(id_priv, RDMA_CM_ROUTE_RESOLVED, RDMA_CM_ADDR_RESOLVED);
|
2006-06-18 11:37:29 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2018-01-08 23:04:45 +08:00
|
|
|
EXPORT_SYMBOL(rdma_set_ib_path);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2006-08-04 05:02:42 +08:00
|
|
|
static int cma_resolve_iw_route(struct rdma_id_private *id_priv, int timeout_ms)
|
|
|
|
{
|
|
|
|
struct cma_work *work;
|
|
|
|
|
|
|
|
work = kzalloc(sizeof *work, GFP_KERNEL);
|
|
|
|
if (!work)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-11-14 20:52:03 +08:00
|
|
|
cma_init_resolve_route_work(work, id_priv);
|
2006-08-04 05:02:42 +08:00
|
|
|
queue_work(cma_wq, &work->work);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-11-06 21:37:24 +08:00
|
|
|
static int iboe_tos_to_sl(struct net_device *ndev, int tos)
|
|
|
|
{
|
|
|
|
int prio;
|
|
|
|
struct net_device *dev;
|
|
|
|
|
|
|
|
prio = rt_tos2priority(tos);
|
2017-02-05 01:00:49 +08:00
|
|
|
dev = is_vlan_dev(ndev) ? vlan_dev_real_dev(ndev) : ndev;
|
2013-11-06 21:37:24 +08:00
|
|
|
if (dev->num_tc)
|
|
|
|
return netdev_get_prio_tc_map(dev, prio);
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_VLAN_8021Q)
|
2017-02-05 01:00:49 +08:00
|
|
|
if (is_vlan_dev(ndev))
|
2013-11-06 21:37:24 +08:00
|
|
|
return (vlan_dev_get_egress_qos_mask(ndev, prio) &
|
|
|
|
VLAN_PRIO_MASK) >> VLAN_PRIO_SHIFT;
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-10-14 03:26:51 +08:00
|
|
|
static int cma_resolve_iboe_route(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct rdma_route *route = &id_priv->id.route;
|
|
|
|
struct rdma_addr *addr = &route->addr;
|
|
|
|
struct cma_work *work;
|
|
|
|
int ret;
|
2017-11-14 20:52:01 +08:00
|
|
|
struct net_device *ndev;
|
|
|
|
|
2017-02-14 13:21:52 +08:00
|
|
|
u8 default_roce_tos = id_priv->cma_dev->default_roce_tos[id_priv->id.port_num -
|
|
|
|
rdma_start_port(id_priv->cma_dev->device)];
|
|
|
|
u8 tos = id_priv->tos_set ? id_priv->tos : default_roce_tos;
|
IB/core: Ethernet L2 attributes in verbs/cm structures
This patch add the support for Ethernet L2 attributes in the
verbs/cm/cma structures.
When dealing with L2 Ethernet, we should use smac, dmac, vlan ID and priority
in a similar manner that the IB L2 (and the L4 PKEY) attributes are used.
Thus, those attributes were added to the following structures:
* ib_ah_attr - added dmac
* ib_qp_attr - added smac and vlan_id, (sl remains vlan priority)
* ib_wc - added smac, vlan_id
* ib_sa_path_rec - added smac, dmac, vlan_id
* cm_av - added smac and vlan_id
For the path record structure, extra care was taken to avoid the new
fields when packing it into wire format, so we don't break the IB CM
and SA wire protocol.
On the active side, the CM fills. its internal structures from the
path provided by the ULP. We add there taking the ETH L2 attributes
and placing them into the CM Address Handle (struct cm_av).
On the passive side, the CM fills its internal structures from the WC
associated with the REQ message. We add there taking the ETH L2
attributes from the WC.
When the HW driver provides the required ETH L2 attributes in the WC,
they set the IB_WC_WITH_SMAC and IB_WC_WITH_VLAN flags. The IB core
code checks for the presence of these flags, and in their absence does
address resolution from the ib_init_ah_from_wc() helper function.
ib_modify_qp_is_ok is also updated to consider the link layer. Some
parameters are mandatory for Ethernet link layer, while they are
irrelevant for IB. Vendor drivers are modified to support the new
function signature.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Or Gerlitz <ogerlitz@mellanox.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
2013-12-13 00:03:11 +08:00
|
|
|
|
2010-10-14 03:26:51 +08:00
|
|
|
|
|
|
|
work = kzalloc(sizeof *work, GFP_KERNEL);
|
|
|
|
if (!work)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
route->path_rec = kzalloc(sizeof *route->path_rec, GFP_KERNEL);
|
|
|
|
if (!route->path_rec) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto err1;
|
|
|
|
}
|
|
|
|
|
|
|
|
route->num_paths = 1;
|
|
|
|
|
2018-01-08 23:04:44 +08:00
|
|
|
ndev = cma_iboe_set_path_rec_l2_fields(id_priv);
|
2010-10-14 03:26:51 +08:00
|
|
|
if (!ndev) {
|
|
|
|
ret = -ENODEV;
|
|
|
|
goto err2;
|
|
|
|
}
|
|
|
|
|
2013-12-13 00:03:12 +08:00
|
|
|
rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.src_addr,
|
|
|
|
&route->path_rec->sgid);
|
|
|
|
rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.dst_addr,
|
|
|
|
&route->path_rec->dgid);
|
2010-08-26 22:18:59 +08:00
|
|
|
|
2016-01-04 16:49:54 +08:00
|
|
|
if (((struct sockaddr *)&id_priv->id.route.addr.dst_addr)->sa_family != AF_IB)
|
2015-12-23 20:56:51 +08:00
|
|
|
/* TODO: get the hoplimit from the inet/inet6 device */
|
2016-01-04 16:49:54 +08:00
|
|
|
route->path_rec->hop_limit = addr->dev_addr.hoplimit;
|
|
|
|
else
|
2015-12-23 20:56:51 +08:00
|
|
|
route->path_rec->hop_limit = 1;
|
2010-08-26 22:18:59 +08:00
|
|
|
route->path_rec->reversible = 1;
|
|
|
|
route->path_rec->pkey = cpu_to_be16(0xffff);
|
|
|
|
route->path_rec->mtu_selector = IB_SA_EQ;
|
2017-02-14 13:21:52 +08:00
|
|
|
route->path_rec->sl = iboe_tos_to_sl(ndev, tos);
|
|
|
|
route->path_rec->traffic_class = tos;
|
2010-10-14 03:26:51 +08:00
|
|
|
route->path_rec->mtu = iboe_get_mtu(ndev->mtu);
|
|
|
|
route->path_rec->rate_selector = IB_SA_EQ;
|
|
|
|
route->path_rec->rate = iboe_get_rate(ndev);
|
|
|
|
dev_put(ndev);
|
|
|
|
route->path_rec->packet_life_time_selector = IB_SA_EQ;
|
|
|
|
route->path_rec->packet_life_time = CMA_IBOE_PACKET_LIFETIME;
|
|
|
|
if (!route->path_rec->mtu) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto err2;
|
|
|
|
}
|
|
|
|
|
2017-11-14 20:52:03 +08:00
|
|
|
cma_init_resolve_route_work(work, id_priv);
|
2010-10-14 03:26:51 +08:00
|
|
|
queue_work(cma_wq, &work->work);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
err2:
|
|
|
|
kfree(route->path_rec);
|
|
|
|
route->path_rec = NULL;
|
|
|
|
err1:
|
|
|
|
kfree(work);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
int rdma_resolve_route(struct rdma_cm_id *id, int timeout_ms)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_RESOLVED, RDMA_CM_ROUTE_QUERY))
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
atomic_inc(&id_priv->refcount);
|
2015-05-05 20:50:36 +08:00
|
|
|
if (rdma_cap_ib_sa(id->device, id->port_num))
|
2015-05-05 20:50:28 +08:00
|
|
|
ret = cma_resolve_ib_route(id_priv, timeout_ms);
|
2015-05-15 03:01:46 +08:00
|
|
|
else if (rdma_protocol_roce(id->device, id->port_num))
|
2015-05-05 20:50:28 +08:00
|
|
|
ret = cma_resolve_iboe_route(id_priv);
|
|
|
|
else if (rdma_protocol_iwarp(id->device, id->port_num))
|
2006-08-04 05:02:42 +08:00
|
|
|
ret = cma_resolve_iw_route(id_priv, timeout_ms);
|
2015-05-05 20:50:28 +08:00
|
|
|
else
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = -ENOSYS;
|
2015-05-05 20:50:28 +08:00
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err:
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_comp_exch(id_priv, RDMA_CM_ROUTE_QUERY, RDMA_CM_ADDR_RESOLVED);
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_deref_id(id_priv);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_resolve_route);
|
|
|
|
|
2013-05-30 01:09:13 +08:00
|
|
|
static void cma_set_loopback(struct sockaddr *addr)
|
|
|
|
{
|
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
((struct sockaddr_in *) addr)->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
ipv6_addr_set(&((struct sockaddr_in6 *) addr)->sin6_addr,
|
|
|
|
0, 0, 0, htonl(1));
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ib_addr_set(&((struct sockaddr_ib *) addr)->sib_addr,
|
|
|
|
0, 0, 0, htonl(1));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static int cma_bind_loopback(struct rdma_id_private *id_priv)
|
|
|
|
{
|
2013-05-30 01:09:15 +08:00
|
|
|
struct cma_device *cma_dev, *cur_dev;
|
2006-07-14 15:23:52 +08:00
|
|
|
union ib_gid gid;
|
2017-01-02 20:22:05 +08:00
|
|
|
enum ib_port_state port_state;
|
2006-06-18 11:37:29 +08:00
|
|
|
u16 pkey;
|
|
|
|
int ret;
|
|
|
|
u8 p;
|
|
|
|
|
2013-05-30 01:09:15 +08:00
|
|
|
cma_dev = NULL;
|
2006-06-18 11:37:29 +08:00
|
|
|
mutex_lock(&lock);
|
2013-05-30 01:09:15 +08:00
|
|
|
list_for_each_entry(cur_dev, &dev_list, list) {
|
|
|
|
if (cma_family(id_priv) == AF_IB &&
|
2015-05-05 20:50:34 +08:00
|
|
|
!rdma_cap_ib_cm(cur_dev->device, 1))
|
2013-05-30 01:09:15 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!cma_dev)
|
|
|
|
cma_dev = cur_dev;
|
|
|
|
|
|
|
|
for (p = 1; p <= cur_dev->device->phys_port_cnt; ++p) {
|
2017-01-02 20:22:05 +08:00
|
|
|
if (!ib_get_cached_port_state(cur_dev->device, p, &port_state) &&
|
|
|
|
port_state == IB_PORT_ACTIVE) {
|
2013-05-30 01:09:15 +08:00
|
|
|
cma_dev = cur_dev;
|
|
|
|
goto port_found;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!cma_dev) {
|
2006-10-16 12:39:01 +08:00
|
|
|
ret = -ENODEV;
|
|
|
|
goto out;
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2006-10-16 12:39:01 +08:00
|
|
|
p = 1;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
port_found:
|
2018-06-05 13:40:22 +08:00
|
|
|
ret = rdma_query_gid(cma_dev->device, p, 0, &gid);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = ib_get_cached_pkey(cma_dev->device, p, 0, &pkey);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
RDMA/cm: fix loopback address support
The RDMA CM is intended to support the use of a loopback address
when establishing a connection; however, the behavior of the CM
when loopback addresses are used is confusing and does not always
work, depending on whether loopback was specified by the server,
the client, or both.
The defined behavior of rdma_bind_addr is to associate an RDMA
device with an rdma_cm_id, as long as the user specified a non-
zero address. (ie they weren't just trying to reserve a port)
Currently, if the loopback address is passed to rdam_bind_addr,
no device is associated with the rdma_cm_id. Fix this.
If a loopback address is specified by the client as the destination
address for a connection, it will fail to establish a connection.
This is true even if the server is listing across all addresses or
on the loopback address itself. The issue is that the server tries
to translate the IP address carried in the REQ message to a local
net_device address, which fails. The translation is not needed in
this case, since the REQ carries the actual HW address that should
be used.
Finally, cleanup loopback support to be more transport neutral.
Replace separate calls to get/set the sgid and dgid from the
device address to a single call that behaves correctly depending
on the format of the device address. And support both IPv4 and
IPv6 address formats.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
[ Fixed RDS build by s/ib_addr_get/rdma_addr_get/ - Roland ]
Signed-off-by: Roland Dreier <rolandd@cisco.com>
2009-11-20 05:26:06 +08:00
|
|
|
id_priv->id.route.addr.dev_addr.dev_type =
|
2015-05-05 20:50:27 +08:00
|
|
|
(rdma_protocol_ib(cma_dev->device, p)) ?
|
RDMA/cm: fix loopback address support
The RDMA CM is intended to support the use of a loopback address
when establishing a connection; however, the behavior of the CM
when loopback addresses are used is confusing and does not always
work, depending on whether loopback was specified by the server,
the client, or both.
The defined behavior of rdma_bind_addr is to associate an RDMA
device with an rdma_cm_id, as long as the user specified a non-
zero address. (ie they weren't just trying to reserve a port)
Currently, if the loopback address is passed to rdam_bind_addr,
no device is associated with the rdma_cm_id. Fix this.
If a loopback address is specified by the client as the destination
address for a connection, it will fail to establish a connection.
This is true even if the server is listing across all addresses or
on the loopback address itself. The issue is that the server tries
to translate the IP address carried in the REQ message to a local
net_device address, which fails. The translation is not needed in
this case, since the REQ carries the actual HW address that should
be used.
Finally, cleanup loopback support to be more transport neutral.
Replace separate calls to get/set the sgid and dgid from the
device address to a single call that behaves correctly depending
on the format of the device address. And support both IPv4 and
IPv6 address formats.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
[ Fixed RDS build by s/ib_addr_get/rdma_addr_get/ - Roland ]
Signed-off-by: Roland Dreier <rolandd@cisco.com>
2009-11-20 05:26:06 +08:00
|
|
|
ARPHRD_INFINIBAND : ARPHRD_ETHER;
|
|
|
|
|
|
|
|
rdma_addr_set_sgid(&id_priv->id.route.addr.dev_addr, &gid);
|
2006-06-18 11:37:29 +08:00
|
|
|
ib_addr_set_pkey(&id_priv->id.route.addr.dev_addr, pkey);
|
|
|
|
id_priv->id.port_num = p;
|
|
|
|
cma_attach_to_dev(id_priv, cma_dev);
|
2013-05-30 01:09:14 +08:00
|
|
|
cma_set_loopback(cma_src_addr(id_priv));
|
2006-06-18 11:37:29 +08:00
|
|
|
out:
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void addr_handler(int status, struct sockaddr *src_addr,
|
|
|
|
struct rdma_dev_addr *dev_addr, void *context)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv = context;
|
2018-07-29 16:53:14 +08:00
|
|
|
struct rdma_cm_event event = {};
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_QUERY,
|
|
|
|
RDMA_CM_ADDR_RESOLVED))
|
2006-09-02 06:33:55 +08:00
|
|
|
goto out;
|
|
|
|
|
2013-12-13 00:03:12 +08:00
|
|
|
memcpy(cma_src_addr(id_priv), src_addr, rdma_addr_size(src_addr));
|
2017-01-05 22:16:35 +08:00
|
|
|
if (!status && !id_priv->cma_dev) {
|
2013-09-25 05:16:28 +08:00
|
|
|
status = cma_acquire_dev(id_priv, NULL);
|
2017-01-05 22:16:35 +08:00
|
|
|
if (status)
|
|
|
|
pr_debug_ratelimited("RDMA CM: ADDR_ERROR: failed to acquire device. status %d\n",
|
|
|
|
status);
|
|
|
|
} else {
|
|
|
|
pr_debug_ratelimited("RDMA CM: ADDR_ERROR: failed to resolve IP. status %d\n", status);
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
if (status) {
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_RESOLVED,
|
|
|
|
RDMA_CM_ADDR_BOUND))
|
2006-06-18 11:37:29 +08:00
|
|
|
goto out;
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_ADDR_ERROR;
|
|
|
|
event.status = status;
|
2013-12-13 00:03:12 +08:00
|
|
|
} else
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_ADDR_RESOLVED;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2006-12-01 08:33:14 +08:00
|
|
|
if (id_priv->id.event_handler(&id_priv->id, &event)) {
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(id_priv, RDMA_CM_DESTROYING);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_deref_id(id_priv);
|
|
|
|
rdma_destroy_id(&id_priv->id);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
out:
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_deref_id(id_priv);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_resolve_loopback(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct cma_work *work;
|
2006-07-14 15:23:52 +08:00
|
|
|
union ib_gid gid;
|
2006-06-18 11:37:29 +08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
work = kzalloc(sizeof *work, GFP_KERNEL);
|
|
|
|
if (!work)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
if (!id_priv->cma_dev) {
|
|
|
|
ret = cma_bind_loopback(id_priv);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
RDMA/cm: fix loopback address support
The RDMA CM is intended to support the use of a loopback address
when establishing a connection; however, the behavior of the CM
when loopback addresses are used is confusing and does not always
work, depending on whether loopback was specified by the server,
the client, or both.
The defined behavior of rdma_bind_addr is to associate an RDMA
device with an rdma_cm_id, as long as the user specified a non-
zero address. (ie they weren't just trying to reserve a port)
Currently, if the loopback address is passed to rdam_bind_addr,
no device is associated with the rdma_cm_id. Fix this.
If a loopback address is specified by the client as the destination
address for a connection, it will fail to establish a connection.
This is true even if the server is listing across all addresses or
on the loopback address itself. The issue is that the server tries
to translate the IP address carried in the REQ message to a local
net_device address, which fails. The translation is not needed in
this case, since the REQ carries the actual HW address that should
be used.
Finally, cleanup loopback support to be more transport neutral.
Replace separate calls to get/set the sgid and dgid from the
device address to a single call that behaves correctly depending
on the format of the device address. And support both IPv4 and
IPv6 address formats.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
[ Fixed RDS build by s/ib_addr_get/rdma_addr_get/ - Roland ]
Signed-off-by: Roland Dreier <rolandd@cisco.com>
2009-11-20 05:26:06 +08:00
|
|
|
rdma_addr_get_sgid(&id_priv->id.route.addr.dev_addr, &gid);
|
|
|
|
rdma_addr_set_dgid(&id_priv->id.route.addr.dev_addr, &gid);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2017-11-14 20:52:03 +08:00
|
|
|
cma_init_resolve_addr_work(work, id_priv);
|
2006-06-18 11:37:29 +08:00
|
|
|
queue_work(cma_wq, &work->work);
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
kfree(work);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-05-30 01:09:17 +08:00
|
|
|
static int cma_resolve_ib_addr(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct cma_work *work;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
work = kzalloc(sizeof *work, GFP_KERNEL);
|
|
|
|
if (!work)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
if (!id_priv->cma_dev) {
|
|
|
|
ret = cma_resolve_ib_dev(id_priv);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
rdma_addr_set_dgid(&id_priv->id.route.addr.dev_addr, (union ib_gid *)
|
|
|
|
&(((struct sockaddr_ib *) &id_priv->id.route.addr.dst_addr)->sib_addr));
|
|
|
|
|
2017-11-14 20:52:03 +08:00
|
|
|
cma_init_resolve_addr_work(work, id_priv);
|
2013-05-30 01:09:17 +08:00
|
|
|
queue_work(cma_wq, &work->work);
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
kfree(work);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static int cma_bind_addr(struct rdma_cm_id *id, struct sockaddr *src_addr,
|
2018-07-29 16:53:10 +08:00
|
|
|
const struct sockaddr *dst_addr)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2009-11-20 08:46:25 +08:00
|
|
|
if (!src_addr || !src_addr->sa_family) {
|
|
|
|
src_addr = (struct sockaddr *) &id->route.addr.src_addr;
|
2013-05-30 01:09:17 +08:00
|
|
|
src_addr->sa_family = dst_addr->sa_family;
|
2017-01-16 02:15:00 +08:00
|
|
|
if (IS_ENABLED(CONFIG_IPV6) &&
|
|
|
|
dst_addr->sa_family == AF_INET6) {
|
RDMA/cma: fix IPv6 address resolution
Resolving a link-local IPv6 address with an unspecified source address
was broken by commit 5462eddd7a, which prevented the IPv6 stack from
learning the scope id of the link-local IPv6 address, causing random
failures as the IP stack chose a random link to resolve the address on.
This commit 5462eddd7a made us bail out of cma_check_linklocal early if
the address passed in was not an IPv6 link-local address. On the address
resolution path, the address passed in is the source address; if the
source address is the unspecified address, which is not link-local, we
will bail out early.
This is mostly correct, but if the destination address is a link-local
address, then we will be following a link-local route, and we'll need to
tell the IPv6 stack what the scope id of the destination address is.
This used to be done by last line of cma_check_linklocal, which is
skipped when bailing out early:
dev_addr->bound_dev_if = sin6->sin6_scope_id;
(In cma_bind_addr, the sin6_scope_id of the source address is set to the
sin6_scope_id of the destination address, so this is correct)
This line is required in turn for the following line, L279 of
addr6_resolve, to actually inform the IPv6 stack of the scope id:
fl6.flowi6_oif = addr->bound_dev_if;
Since we can only know we are in this failure case when we have access
to both the source IPv6 address and destination IPv6 address, we have to
deal with this further up the stack. So detect this failure case in
cma_bind_addr, and set bound_dev_if to the destination address scope id
to correct it.
Signed-off-by: Spencer Baugh <sbaugh@catern.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-08-14 03:19:10 +08:00
|
|
|
struct sockaddr_in6 *src_addr6 = (struct sockaddr_in6 *) src_addr;
|
|
|
|
struct sockaddr_in6 *dst_addr6 = (struct sockaddr_in6 *) dst_addr;
|
|
|
|
src_addr6->sin6_scope_id = dst_addr6->sin6_scope_id;
|
|
|
|
if (ipv6_addr_type(&dst_addr6->sin6_addr) & IPV6_ADDR_LINKLOCAL)
|
|
|
|
id->route.addr.dev_addr.bound_dev_if = dst_addr6->sin6_scope_id;
|
2013-05-30 01:09:17 +08:00
|
|
|
} else if (dst_addr->sa_family == AF_IB) {
|
|
|
|
((struct sockaddr_ib *) src_addr)->sib_pkey =
|
|
|
|
((struct sockaddr_ib *) dst_addr)->sib_pkey;
|
2009-11-20 08:46:25 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return rdma_bind_addr(id, src_addr);
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int rdma_resolve_addr(struct rdma_cm_id *id, struct sockaddr *src_addr,
|
2018-07-29 16:53:10 +08:00
|
|
|
const struct sockaddr *dst_addr, int timeout_ms)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (id_priv->state == RDMA_CM_IDLE) {
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = cma_bind_addr(id, src_addr, dst_addr);
|
2018-07-29 16:53:09 +08:00
|
|
|
if (ret)
|
2006-06-18 11:37:29 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-07-29 16:53:09 +08:00
|
|
|
if (cma_family(id_priv) != dst_addr->sa_family)
|
2013-05-30 01:09:16 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2018-07-29 16:53:09 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_BOUND, RDMA_CM_ADDR_QUERY))
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2018-07-29 16:53:09 +08:00
|
|
|
memcpy(cma_dst_addr(id_priv), dst_addr, rdma_addr_size(dst_addr));
|
2006-06-18 11:37:29 +08:00
|
|
|
atomic_inc(&id_priv->refcount);
|
2013-05-30 01:09:17 +08:00
|
|
|
if (cma_any_addr(dst_addr)) {
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = cma_resolve_loopback(id_priv);
|
2013-05-30 01:09:17 +08:00
|
|
|
} else {
|
|
|
|
if (dst_addr->sa_family == AF_IB) {
|
|
|
|
ret = cma_resolve_ib_addr(id_priv);
|
|
|
|
} else {
|
2018-04-03 12:52:04 +08:00
|
|
|
ret = rdma_resolve_ip(cma_src_addr(id_priv),
|
2013-05-30 01:09:17 +08:00
|
|
|
dst_addr, &id->route.addr.dev_addr,
|
|
|
|
timeout_ms, addr_handler, id_priv);
|
|
|
|
}
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err:
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_comp_exch(id_priv, RDMA_CM_ADDR_QUERY, RDMA_CM_ADDR_BOUND);
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_deref_id(id_priv);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_resolve_addr);
|
|
|
|
|
2011-05-10 13:06:10 +08:00
|
|
|
int rdma_set_reuseaddr(struct rdma_cm_id *id, int reuse)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
unsigned long flags;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
|
|
|
spin_lock_irqsave(&id_priv->lock, flags);
|
2013-05-30 01:09:08 +08:00
|
|
|
if (reuse || id_priv->state == RDMA_CM_IDLE) {
|
2011-05-10 13:06:10 +08:00
|
|
|
id_priv->reuseaddr = reuse;
|
|
|
|
ret = 0;
|
|
|
|
} else {
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&id_priv->lock, flags);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_set_reuseaddr);
|
|
|
|
|
2012-06-15 04:31:39 +08:00
|
|
|
int rdma_set_afonly(struct rdma_cm_id *id, int afonly)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
unsigned long flags;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
|
|
|
spin_lock_irqsave(&id_priv->lock, flags);
|
|
|
|
if (id_priv->state == RDMA_CM_IDLE || id_priv->state == RDMA_CM_ADDR_BOUND) {
|
|
|
|
id_priv->options |= (1 << CMA_OPTION_AFONLY);
|
|
|
|
id_priv->afonly = afonly;
|
|
|
|
ret = 0;
|
|
|
|
} else {
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&id_priv->lock, flags);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_set_afonly);
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static void cma_bind_port(struct rdma_bind_list *bind_list,
|
|
|
|
struct rdma_id_private *id_priv)
|
|
|
|
{
|
2013-05-30 01:09:11 +08:00
|
|
|
struct sockaddr *addr;
|
|
|
|
struct sockaddr_ib *sib;
|
|
|
|
u64 sid, mask;
|
|
|
|
__be16 port;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
addr = cma_src_addr(id_priv);
|
2013-05-30 01:09:11 +08:00
|
|
|
port = htons(bind_list->port);
|
|
|
|
|
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
((struct sockaddr_in *) addr)->sin_port = port;
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
((struct sockaddr_in6 *) addr)->sin6_port = port;
|
|
|
|
break;
|
|
|
|
case AF_IB:
|
|
|
|
sib = (struct sockaddr_ib *) addr;
|
|
|
|
sid = be64_to_cpu(sib->sib_sid);
|
|
|
|
mask = be64_to_cpu(sib->sib_sid_mask);
|
|
|
|
sib->sib_sid = cpu_to_be64((sid & mask) | (u64) ntohs(port));
|
|
|
|
sib->sib_sid_mask = cpu_to_be64(~0ULL);
|
|
|
|
break;
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
id_priv->bind_list = bind_list;
|
|
|
|
hlist_add_head(&id_priv->node, &bind_list->owners);
|
|
|
|
}
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static int cma_alloc_port(enum rdma_ucm_port_space ps,
|
2015-07-30 22:50:20 +08:00
|
|
|
struct rdma_id_private *id_priv, unsigned short snum)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct rdma_bind_list *bind_list;
|
2013-02-28 09:04:16 +08:00
|
|
|
int ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2007-03-06 04:50:17 +08:00
|
|
|
bind_list = kzalloc(sizeof *bind_list, GFP_KERNEL);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (!bind_list)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2015-10-22 20:20:10 +08:00
|
|
|
ret = cma_ps_alloc(id_priv->id.route.addr.dev_addr.net, ps, bind_list,
|
|
|
|
snum);
|
2013-02-28 09:04:16 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto err;
|
2007-01-30 08:41:23 +08:00
|
|
|
|
|
|
|
bind_list->ps = ps;
|
2013-02-28 09:04:16 +08:00
|
|
|
bind_list->port = (unsigned short)ret;
|
2007-01-30 08:41:23 +08:00
|
|
|
cma_bind_port(bind_list, id_priv);
|
|
|
|
return 0;
|
2013-02-28 09:04:16 +08:00
|
|
|
err:
|
2007-01-30 08:41:23 +08:00
|
|
|
kfree(bind_list);
|
2013-02-28 09:04:16 +08:00
|
|
|
return ret == -ENOSPC ? -EADDRNOTAVAIL : ret;
|
2007-01-30 08:41:23 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2017-01-05 22:16:36 +08:00
|
|
|
static int cma_port_is_unique(struct rdma_bind_list *bind_list,
|
|
|
|
struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *cur_id;
|
|
|
|
struct sockaddr *daddr = cma_dst_addr(id_priv);
|
|
|
|
struct sockaddr *saddr = cma_src_addr(id_priv);
|
|
|
|
__be16 dport = cma_port(daddr);
|
|
|
|
|
|
|
|
hlist_for_each_entry(cur_id, &bind_list->owners, node) {
|
|
|
|
struct sockaddr *cur_daddr = cma_dst_addr(cur_id);
|
|
|
|
struct sockaddr *cur_saddr = cma_src_addr(cur_id);
|
|
|
|
__be16 cur_dport = cma_port(cur_daddr);
|
|
|
|
|
|
|
|
if (id_priv == cur_id)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* different dest port -> unique */
|
2018-03-13 06:14:02 +08:00
|
|
|
if (!cma_any_port(daddr) &&
|
|
|
|
!cma_any_port(cur_daddr) &&
|
2017-01-05 22:16:36 +08:00
|
|
|
(dport != cur_dport))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* different src address -> unique */
|
|
|
|
if (!cma_any_addr(saddr) &&
|
|
|
|
!cma_any_addr(cur_saddr) &&
|
|
|
|
cma_addr_cmp(saddr, cur_saddr))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* different dst address -> unique */
|
2018-03-13 06:14:02 +08:00
|
|
|
if (!cma_any_addr(daddr) &&
|
|
|
|
!cma_any_addr(cur_daddr) &&
|
2017-01-05 22:16:36 +08:00
|
|
|
cma_addr_cmp(daddr, cur_daddr))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
return -EADDRNOTAVAIL;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static int cma_alloc_any_port(enum rdma_ucm_port_space ps,
|
2015-07-30 22:50:20 +08:00
|
|
|
struct rdma_id_private *id_priv)
|
2007-01-30 08:41:23 +08:00
|
|
|
{
|
2010-04-15 10:29:04 +08:00
|
|
|
static unsigned int last_used_port;
|
|
|
|
int low, high, remaining;
|
|
|
|
unsigned int rover;
|
2015-10-22 20:20:10 +08:00
|
|
|
struct net *net = id_priv->id.route.addr.dev_addr.net;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2015-10-22 20:20:10 +08:00
|
|
|
inet_get_local_port_range(net, &low, &high);
|
2010-04-15 10:29:04 +08:00
|
|
|
remaining = (high - low) + 1;
|
2014-01-11 20:15:59 +08:00
|
|
|
rover = prandom_u32() % remaining + low;
|
2010-04-15 10:29:04 +08:00
|
|
|
retry:
|
2017-01-05 22:16:36 +08:00
|
|
|
if (last_used_port != rover) {
|
|
|
|
struct rdma_bind_list *bind_list;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
bind_list = cma_ps_find(net, ps, (unsigned short)rover);
|
|
|
|
|
|
|
|
if (!bind_list) {
|
|
|
|
ret = cma_alloc_port(ps, id_priv, rover);
|
|
|
|
} else {
|
|
|
|
ret = cma_port_is_unique(bind_list, id_priv);
|
|
|
|
if (!ret)
|
|
|
|
cma_bind_port(bind_list, id_priv);
|
|
|
|
}
|
2010-04-15 10:29:04 +08:00
|
|
|
/*
|
|
|
|
* Remember previously used port number in order to avoid
|
|
|
|
* re-using same port immediately after it is closed.
|
|
|
|
*/
|
|
|
|
if (!ret)
|
|
|
|
last_used_port = rover;
|
|
|
|
if (ret != -EADDRNOTAVAIL)
|
|
|
|
return ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
2010-04-15 10:29:04 +08:00
|
|
|
if (--remaining) {
|
|
|
|
rover++;
|
|
|
|
if ((rover < low) || (rover > high))
|
|
|
|
rover = low;
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
return -EADDRNOTAVAIL;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2011-05-10 13:06:10 +08:00
|
|
|
/*
|
|
|
|
* Check that the requested port is available. This is called when trying to
|
|
|
|
* bind to a specific port, or when trying to listen on a bound port. In
|
|
|
|
* the latter case, the provided id_priv may already be on the bind_list, but
|
|
|
|
* we still need to check that it's okay to start listening.
|
|
|
|
*/
|
|
|
|
static int cma_check_port(struct rdma_bind_list *bind_list,
|
|
|
|
struct rdma_id_private *id_priv, uint8_t reuseaddr)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct rdma_id_private *cur_id;
|
2011-05-10 13:06:10 +08:00
|
|
|
struct sockaddr *addr, *cur_addr;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
addr = cma_src_addr(id_priv);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry(cur_id, &bind_list->owners, node) {
|
2011-05-10 13:06:10 +08:00
|
|
|
if (id_priv == cur_id)
|
|
|
|
continue;
|
2006-09-23 06:22:46 +08:00
|
|
|
|
2012-06-15 04:31:39 +08:00
|
|
|
if ((cur_id->state != RDMA_CM_LISTEN) && reuseaddr &&
|
|
|
|
cur_id->reuseaddr)
|
|
|
|
continue;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
cur_addr = cma_src_addr(cur_id);
|
2012-06-15 04:31:39 +08:00
|
|
|
if (id_priv->afonly && cur_id->afonly &&
|
|
|
|
(addr->sa_family != cur_addr->sa_family))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (cma_any_addr(addr) || cma_any_addr(cur_addr))
|
|
|
|
return -EADDRNOTAVAIL;
|
|
|
|
|
|
|
|
if (!cma_addr_cmp(addr, cur_addr))
|
|
|
|
return -EADDRINUSE;
|
2011-05-10 13:06:10 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static int cma_use_port(enum rdma_ucm_port_space ps,
|
2015-07-30 22:50:20 +08:00
|
|
|
struct rdma_id_private *id_priv)
|
2011-05-10 13:06:10 +08:00
|
|
|
{
|
|
|
|
struct rdma_bind_list *bind_list;
|
|
|
|
unsigned short snum;
|
|
|
|
int ret;
|
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
snum = ntohs(cma_port(cma_src_addr(id_priv)));
|
2011-05-10 13:06:10 +08:00
|
|
|
if (snum < PROT_SOCK && !capable(CAP_NET_BIND_SERVICE))
|
|
|
|
return -EACCES;
|
|
|
|
|
2015-10-22 20:20:10 +08:00
|
|
|
bind_list = cma_ps_find(id_priv->id.route.addr.dev_addr.net, ps, snum);
|
2011-05-10 13:06:10 +08:00
|
|
|
if (!bind_list) {
|
|
|
|
ret = cma_alloc_port(ps, id_priv, snum);
|
|
|
|
} else {
|
|
|
|
ret = cma_check_port(bind_list, id_priv, id_priv->reuseaddr);
|
|
|
|
if (!ret)
|
|
|
|
cma_bind_port(bind_list, id_priv);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_bind_listen(struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct rdma_bind_list *bind_list = id_priv->bind_list;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
if (bind_list->owners.first->next)
|
|
|
|
ret = cma_check_port(bind_list, id_priv, 0);
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static enum rdma_ucm_port_space
|
|
|
|
cma_select_inet_ps(struct rdma_id_private *id_priv)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
switch (id_priv->id.ps) {
|
|
|
|
case RDMA_PS_TCP:
|
2006-12-01 08:44:16 +08:00
|
|
|
case RDMA_PS_UDP:
|
2007-02-16 09:00:18 +08:00
|
|
|
case RDMA_PS_IPOIB:
|
2011-05-29 12:56:39 +08:00
|
|
|
case RDMA_PS_IB:
|
2015-07-30 22:50:20 +08:00
|
|
|
return id_priv->id.ps;
|
2006-06-18 11:37:29 +08:00
|
|
|
default:
|
2015-07-30 22:50:20 +08:00
|
|
|
|
|
|
|
return 0;
|
2013-05-30 01:09:11 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-27 23:38:07 +08:00
|
|
|
static enum rdma_ucm_port_space
|
|
|
|
cma_select_ib_ps(struct rdma_id_private *id_priv)
|
2013-05-30 01:09:11 +08:00
|
|
|
{
|
2018-03-27 23:38:07 +08:00
|
|
|
enum rdma_ucm_port_space ps = 0;
|
2013-05-30 01:09:11 +08:00
|
|
|
struct sockaddr_ib *sib;
|
|
|
|
u64 sid_ps, mask, sid;
|
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
sib = (struct sockaddr_ib *) cma_src_addr(id_priv);
|
2013-05-30 01:09:11 +08:00
|
|
|
mask = be64_to_cpu(sib->sib_sid_mask) & RDMA_IB_IP_PS_MASK;
|
|
|
|
sid = be64_to_cpu(sib->sib_sid) & mask;
|
|
|
|
|
|
|
|
if ((id_priv->id.ps == RDMA_PS_IB) && (sid == (RDMA_IB_IP_PS_IB & mask))) {
|
|
|
|
sid_ps = RDMA_IB_IP_PS_IB;
|
2015-07-30 22:50:20 +08:00
|
|
|
ps = RDMA_PS_IB;
|
2013-05-30 01:09:11 +08:00
|
|
|
} else if (((id_priv->id.ps == RDMA_PS_IB) || (id_priv->id.ps == RDMA_PS_TCP)) &&
|
|
|
|
(sid == (RDMA_IB_IP_PS_TCP & mask))) {
|
|
|
|
sid_ps = RDMA_IB_IP_PS_TCP;
|
2015-07-30 22:50:20 +08:00
|
|
|
ps = RDMA_PS_TCP;
|
2013-05-30 01:09:11 +08:00
|
|
|
} else if (((id_priv->id.ps == RDMA_PS_IB) || (id_priv->id.ps == RDMA_PS_UDP)) &&
|
|
|
|
(sid == (RDMA_IB_IP_PS_UDP & mask))) {
|
|
|
|
sid_ps = RDMA_IB_IP_PS_UDP;
|
2015-07-30 22:50:20 +08:00
|
|
|
ps = RDMA_PS_UDP;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2013-05-30 01:09:11 +08:00
|
|
|
if (ps) {
|
|
|
|
sib->sib_sid = cpu_to_be64(sid_ps | ntohs(cma_port((struct sockaddr *) sib)));
|
|
|
|
sib->sib_sid_mask = cpu_to_be64(RDMA_IB_IP_PS_MASK |
|
|
|
|
be64_to_cpu(sib->sib_sid_mask));
|
|
|
|
}
|
|
|
|
return ps;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_get_port(struct rdma_id_private *id_priv)
|
|
|
|
{
|
2018-03-27 23:38:07 +08:00
|
|
|
enum rdma_ucm_port_space ps;
|
2013-05-30 01:09:11 +08:00
|
|
|
int ret;
|
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
if (cma_family(id_priv) != AF_IB)
|
2013-05-30 01:09:11 +08:00
|
|
|
ps = cma_select_inet_ps(id_priv);
|
|
|
|
else
|
|
|
|
ps = cma_select_ib_ps(id_priv);
|
|
|
|
if (!ps)
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
mutex_lock(&lock);
|
2013-05-30 01:09:14 +08:00
|
|
|
if (cma_any_port(cma_src_addr(id_priv)))
|
2007-01-30 08:41:23 +08:00
|
|
|
ret = cma_alloc_any_port(ps, id_priv);
|
2006-06-18 11:37:29 +08:00
|
|
|
else
|
|
|
|
ret = cma_use_port(ps, id_priv);
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-11-20 08:46:25 +08:00
|
|
|
static int cma_check_linklocal(struct rdma_dev_addr *dev_addr,
|
|
|
|
struct sockaddr *addr)
|
|
|
|
{
|
2012-07-06 13:39:34 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2009-11-20 08:46:25 +08:00
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
|
|
|
|
if (addr->sa_family != AF_INET6)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
sin6 = (struct sockaddr_in6 *) addr;
|
2013-11-16 12:00:01 +08:00
|
|
|
|
|
|
|
if (!(ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_LINKLOCAL))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!sin6->sin6_scope_id)
|
2009-11-20 08:46:25 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
dev_addr->bound_dev_if = sin6->sin6_scope_id;
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-05-10 13:06:10 +08:00
|
|
|
int rdma_listen(struct rdma_cm_id *id, int backlog)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (id_priv->state == RDMA_CM_IDLE) {
|
2013-05-30 01:09:14 +08:00
|
|
|
id->route.addr.src_addr.ss_family = AF_INET;
|
|
|
|
ret = rdma_bind_addr(id, cma_src_addr(id_priv));
|
2011-05-10 13:06:10 +08:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_BOUND, RDMA_CM_LISTEN))
|
2011-05-10 13:06:10 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (id_priv->reuseaddr) {
|
|
|
|
ret = cma_bind_listen(id_priv);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
id_priv->backlog = backlog;
|
|
|
|
if (id->device) {
|
2015-05-05 20:50:34 +08:00
|
|
|
if (rdma_cap_ib_cm(id->device, 1)) {
|
2011-05-10 13:06:10 +08:00
|
|
|
ret = cma_ib_listen(id_priv);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2015-05-05 20:50:35 +08:00
|
|
|
} else if (rdma_cap_iw_cm(id->device, 1)) {
|
2011-05-10 13:06:10 +08:00
|
|
|
ret = cma_iw_listen(id_priv, backlog);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2015-05-05 20:50:27 +08:00
|
|
|
} else {
|
2011-05-10 13:06:10 +08:00
|
|
|
ret = -ENOSYS;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
cma_listen_on_all(id_priv);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
id_priv->backlog = 0;
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_comp_exch(id_priv, RDMA_CM_LISTEN, RDMA_CM_ADDR_BOUND);
|
2011-05-10 13:06:10 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_listen);
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
int rdma_bind_addr(struct rdma_cm_id *id, struct sockaddr *addr)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
2017-02-14 13:24:08 +08:00
|
|
|
struct sockaddr *daddr;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2013-05-30 01:09:12 +08:00
|
|
|
if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6 &&
|
|
|
|
addr->sa_family != AF_IB)
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_IDLE, RDMA_CM_ADDR_BOUND))
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2009-11-20 08:46:25 +08:00
|
|
|
ret = cma_check_linklocal(&id->route.addr.dev_addr, addr);
|
|
|
|
if (ret)
|
|
|
|
goto err1;
|
|
|
|
|
2013-12-13 00:03:12 +08:00
|
|
|
memcpy(cma_src_addr(id_priv), addr, rdma_addr_size(addr));
|
2010-02-09 08:41:15 +08:00
|
|
|
if (!cma_any_addr(addr)) {
|
2013-05-30 01:09:12 +08:00
|
|
|
ret = cma_translate_addr(addr, &id->route.addr.dev_addr);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (ret)
|
2006-10-25 04:22:28 +08:00
|
|
|
goto err1;
|
|
|
|
|
2013-09-25 05:16:28 +08:00
|
|
|
ret = cma_acquire_dev(id_priv, NULL);
|
2006-10-25 04:22:28 +08:00
|
|
|
if (ret)
|
|
|
|
goto err1;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2012-06-15 04:31:39 +08:00
|
|
|
if (!(id_priv->options & (1 << CMA_OPTION_AFONLY))) {
|
|
|
|
if (addr->sa_family == AF_INET)
|
|
|
|
id_priv->afonly = 1;
|
2012-06-15 04:31:39 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2015-10-22 20:20:10 +08:00
|
|
|
else if (addr->sa_family == AF_INET6) {
|
|
|
|
struct net *net = id_priv->id.route.addr.dev_addr.net;
|
|
|
|
|
|
|
|
id_priv->afonly = net->ipv6.sysctl.bindv6only;
|
|
|
|
}
|
2012-06-15 04:31:39 +08:00
|
|
|
#endif
|
2012-06-15 04:31:39 +08:00
|
|
|
}
|
2018-03-13 06:14:02 +08:00
|
|
|
daddr = cma_dst_addr(id_priv);
|
|
|
|
daddr->sa_family = addr->sa_family;
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = cma_get_port(id_priv);
|
|
|
|
if (ret)
|
2006-10-25 04:22:28 +08:00
|
|
|
goto err2;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
return 0;
|
2006-10-25 04:22:28 +08:00
|
|
|
err2:
|
2018-03-02 05:57:44 +08:00
|
|
|
if (id_priv->cma_dev) {
|
|
|
|
rdma_restrack_del(&id_priv->res);
|
2011-02-24 01:05:39 +08:00
|
|
|
cma_release_dev(id_priv);
|
2018-03-02 05:57:44 +08:00
|
|
|
}
|
2006-10-25 04:22:28 +08:00
|
|
|
err1:
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_comp_exch(id_priv, RDMA_CM_ADDR_BOUND, RDMA_CM_IDLE);
|
2006-06-18 11:37:29 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_bind_addr);
|
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
static int cma_format_hdr(void *hdr, struct rdma_id_private *id_priv)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct cma_hdr *cma_hdr;
|
|
|
|
|
2013-05-30 01:09:20 +08:00
|
|
|
cma_hdr = hdr;
|
|
|
|
cma_hdr->cma_version = CMA_VERSION;
|
2013-05-30 01:09:14 +08:00
|
|
|
if (cma_family(id_priv) == AF_INET) {
|
2008-12-25 02:16:45 +08:00
|
|
|
struct sockaddr_in *src4, *dst4;
|
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
src4 = (struct sockaddr_in *) cma_src_addr(id_priv);
|
|
|
|
dst4 = (struct sockaddr_in *) cma_dst_addr(id_priv);
|
2008-12-25 02:16:45 +08:00
|
|
|
|
2013-05-30 01:09:20 +08:00
|
|
|
cma_set_ip_ver(cma_hdr, 4);
|
|
|
|
cma_hdr->src_addr.ip4.addr = src4->sin_addr.s_addr;
|
|
|
|
cma_hdr->dst_addr.ip4.addr = dst4->sin_addr.s_addr;
|
|
|
|
cma_hdr->port = src4->sin_port;
|
2013-05-30 01:09:22 +08:00
|
|
|
} else if (cma_family(id_priv) == AF_INET6) {
|
2008-12-25 02:16:45 +08:00
|
|
|
struct sockaddr_in6 *src6, *dst6;
|
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
src6 = (struct sockaddr_in6 *) cma_src_addr(id_priv);
|
|
|
|
dst6 = (struct sockaddr_in6 *) cma_dst_addr(id_priv);
|
2008-12-25 02:16:45 +08:00
|
|
|
|
2013-05-30 01:09:20 +08:00
|
|
|
cma_set_ip_ver(cma_hdr, 6);
|
|
|
|
cma_hdr->src_addr.ip6 = src6->sin6_addr;
|
|
|
|
cma_hdr->dst_addr.ip6 = dst6->sin6_addr;
|
|
|
|
cma_hdr->port = src6->sin6_port;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-12-01 08:44:16 +08:00
|
|
|
static int cma_sidr_rep_handler(struct ib_cm_id *cm_id,
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct ib_cm_event *ib_event)
|
2006-12-01 08:44:16 +08:00
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv = cm_id->context;
|
2018-07-29 16:53:14 +08:00
|
|
|
struct rdma_cm_event event = {};
|
2018-07-29 16:53:11 +08:00
|
|
|
const struct ib_cm_sidr_rep_event_param *rep =
|
|
|
|
&ib_event->param.sidr_rep_rcvd;
|
2006-12-01 08:44:16 +08:00
|
|
|
int ret = 0;
|
|
|
|
|
2016-06-11 02:08:25 +08:00
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
|
|
|
if (id_priv->state != RDMA_CM_CONNECT)
|
|
|
|
goto out;
|
2006-12-01 08:44:16 +08:00
|
|
|
|
|
|
|
switch (ib_event->event) {
|
|
|
|
case IB_CM_SIDR_REQ_ERROR:
|
|
|
|
event.event = RDMA_CM_EVENT_UNREACHABLE;
|
|
|
|
event.status = -ETIMEDOUT;
|
|
|
|
break;
|
|
|
|
case IB_CM_SIDR_REP_RECEIVED:
|
|
|
|
event.param.ud.private_data = ib_event->private_data;
|
|
|
|
event.param.ud.private_data_len = IB_CM_SIDR_REP_PRIVATE_DATA_SIZE;
|
|
|
|
if (rep->status != IB_SIDR_SUCCESS) {
|
|
|
|
event.event = RDMA_CM_EVENT_UNREACHABLE;
|
|
|
|
event.status = ib_event->param.sidr_rep_rcvd.status;
|
2017-01-05 22:16:35 +08:00
|
|
|
pr_debug_ratelimited("RDMA CM: UNREACHABLE: bad SIDR reply. status %d\n",
|
|
|
|
event.status);
|
2006-12-01 08:44:16 +08:00
|
|
|
break;
|
|
|
|
}
|
2013-05-30 01:09:23 +08:00
|
|
|
ret = cma_set_qkey(id_priv, rep->qkey);
|
2009-04-09 04:42:33 +08:00
|
|
|
if (ret) {
|
2017-01-05 22:16:35 +08:00
|
|
|
pr_debug_ratelimited("RDMA CM: ADDR_ERROR: failed to set qkey. status %d\n", ret);
|
2009-04-09 04:42:33 +08:00
|
|
|
event.event = RDMA_CM_EVENT_ADDR_ERROR;
|
2013-05-30 01:09:23 +08:00
|
|
|
event.status = ret;
|
2006-12-01 08:44:16 +08:00
|
|
|
break;
|
|
|
|
}
|
2017-11-14 20:52:16 +08:00
|
|
|
ib_init_ah_attr_from_path(id_priv->id.device,
|
|
|
|
id_priv->id.port_num,
|
|
|
|
id_priv->id.route.path_rec,
|
2018-06-19 15:59:19 +08:00
|
|
|
&event.param.ud.ah_attr,
|
|
|
|
rep->sgid_attr);
|
2006-12-01 08:44:16 +08:00
|
|
|
event.param.ud.qp_num = rep->qpn;
|
|
|
|
event.param.ud.qkey = rep->qkey;
|
|
|
|
event.event = RDMA_CM_EVENT_ESTABLISHED;
|
|
|
|
event.status = 0;
|
|
|
|
break;
|
|
|
|
default:
|
2016-03-02 03:20:29 +08:00
|
|
|
pr_err("RDMA CMA: unexpected IB CM event: %d\n",
|
2006-12-01 08:44:16 +08:00
|
|
|
ib_event->event);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = id_priv->id.event_handler(&id_priv->id, &event);
|
2018-06-19 15:59:16 +08:00
|
|
|
|
|
|
|
rdma_destroy_ah_attr(&event.param.ud.ah_attr);
|
2006-12-01 08:44:16 +08:00
|
|
|
if (ret) {
|
|
|
|
/* Destroy the CM ID by returning a non-zero value. */
|
|
|
|
id_priv->cm_id.ib = NULL;
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(id_priv, RDMA_CM_DESTROYING);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-12-01 08:44:16 +08:00
|
|
|
rdma_destroy_id(&id_priv->id);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
out:
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2006-12-01 08:44:16 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_resolve_ib_udp(struct rdma_id_private *id_priv,
|
|
|
|
struct rdma_conn_param *conn_param)
|
|
|
|
{
|
|
|
|
struct ib_cm_sidr_req_param req;
|
2011-07-17 18:46:47 +08:00
|
|
|
struct ib_cm_id *id;
|
2013-07-25 06:06:08 +08:00
|
|
|
void *private_data;
|
2017-10-12 01:48:45 +08:00
|
|
|
u8 offset;
|
|
|
|
int ret;
|
2006-12-01 08:44:16 +08:00
|
|
|
|
2013-07-25 06:06:08 +08:00
|
|
|
memset(&req, 0, sizeof req);
|
2013-05-30 01:09:22 +08:00
|
|
|
offset = cma_user_data_offset(id_priv);
|
|
|
|
req.private_data_len = offset + conn_param->private_data_len;
|
2011-12-07 05:17:11 +08:00
|
|
|
if (req.private_data_len < conn_param->private_data_len)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2013-05-30 01:09:22 +08:00
|
|
|
if (req.private_data_len) {
|
2013-07-25 06:06:08 +08:00
|
|
|
private_data = kzalloc(req.private_data_len, GFP_ATOMIC);
|
|
|
|
if (!private_data)
|
2013-05-30 01:09:22 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
} else {
|
2013-07-25 06:06:08 +08:00
|
|
|
private_data = NULL;
|
2013-05-30 01:09:22 +08:00
|
|
|
}
|
2006-12-01 08:44:16 +08:00
|
|
|
|
|
|
|
if (conn_param->private_data && conn_param->private_data_len)
|
2013-07-25 06:06:08 +08:00
|
|
|
memcpy(private_data + offset, conn_param->private_data,
|
|
|
|
conn_param->private_data_len);
|
2006-12-01 08:44:16 +08:00
|
|
|
|
2013-07-25 06:06:08 +08:00
|
|
|
if (private_data) {
|
|
|
|
ret = cma_format_hdr(private_data, id_priv);
|
2013-05-30 01:09:22 +08:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
2013-07-25 06:06:08 +08:00
|
|
|
req.private_data = private_data;
|
2013-05-30 01:09:22 +08:00
|
|
|
}
|
2006-12-01 08:44:16 +08:00
|
|
|
|
2011-07-17 18:46:47 +08:00
|
|
|
id = ib_create_cm_id(id_priv->id.device, cma_sidr_rep_handler,
|
|
|
|
id_priv);
|
|
|
|
if (IS_ERR(id)) {
|
|
|
|
ret = PTR_ERR(id);
|
2006-12-01 08:44:16 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2011-07-17 18:46:47 +08:00
|
|
|
id_priv->cm_id.ib = id;
|
2006-12-01 08:44:16 +08:00
|
|
|
|
2013-05-30 01:09:14 +08:00
|
|
|
req.path = id_priv->id.route.path_rec;
|
2018-06-19 15:59:18 +08:00
|
|
|
req.sgid_attr = id_priv->id.route.addr.dev_addr.sgid_attr;
|
2013-05-30 01:09:28 +08:00
|
|
|
req.service_id = rdma_get_service_id(&id_priv->id, cma_dst_addr(id_priv));
|
2006-12-01 08:44:16 +08:00
|
|
|
req.timeout_ms = 1 << (CMA_CM_RESPONSE_TIMEOUT - 8);
|
|
|
|
req.max_cm_retries = CMA_MAX_CM_RETRIES;
|
|
|
|
|
|
|
|
ret = ib_send_cm_sidr_req(id_priv->cm_id.ib, &req);
|
|
|
|
if (ret) {
|
|
|
|
ib_destroy_cm_id(id_priv->cm_id.ib);
|
|
|
|
id_priv->cm_id.ib = NULL;
|
|
|
|
}
|
|
|
|
out:
|
2013-07-25 06:06:08 +08:00
|
|
|
kfree(private_data);
|
2006-12-01 08:44:16 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static int cma_connect_ib(struct rdma_id_private *id_priv,
|
|
|
|
struct rdma_conn_param *conn_param)
|
|
|
|
{
|
|
|
|
struct ib_cm_req_param req;
|
|
|
|
struct rdma_route *route;
|
|
|
|
void *private_data;
|
2011-07-17 18:46:47 +08:00
|
|
|
struct ib_cm_id *id;
|
2017-10-12 01:48:45 +08:00
|
|
|
u8 offset;
|
|
|
|
int ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
memset(&req, 0, sizeof req);
|
2013-05-30 01:09:22 +08:00
|
|
|
offset = cma_user_data_offset(id_priv);
|
2006-06-18 11:37:29 +08:00
|
|
|
req.private_data_len = offset + conn_param->private_data_len;
|
2011-12-07 05:17:11 +08:00
|
|
|
if (req.private_data_len < conn_param->private_data_len)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2013-05-30 01:09:22 +08:00
|
|
|
if (req.private_data_len) {
|
|
|
|
private_data = kzalloc(req.private_data_len, GFP_ATOMIC);
|
|
|
|
if (!private_data)
|
|
|
|
return -ENOMEM;
|
|
|
|
} else {
|
|
|
|
private_data = NULL;
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
if (conn_param->private_data && conn_param->private_data_len)
|
|
|
|
memcpy(private_data + offset, conn_param->private_data,
|
|
|
|
conn_param->private_data_len);
|
|
|
|
|
2011-07-17 18:46:47 +08:00
|
|
|
id = ib_create_cm_id(id_priv->id.device, cma_ib_handler, id_priv);
|
|
|
|
if (IS_ERR(id)) {
|
|
|
|
ret = PTR_ERR(id);
|
2006-06-18 11:37:29 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2011-07-17 18:46:47 +08:00
|
|
|
id_priv->cm_id.ib = id;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
route = &id_priv->id.route;
|
2013-05-30 01:09:22 +08:00
|
|
|
if (private_data) {
|
|
|
|
ret = cma_format_hdr(private_data, id_priv);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
req.private_data = private_data;
|
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
req.primary_path = &route->path_rec[0];
|
|
|
|
if (route->num_paths == 2)
|
|
|
|
req.alternate_path = &route->path_rec[1];
|
|
|
|
|
2018-06-19 15:59:18 +08:00
|
|
|
req.ppath_sgid_attr = id_priv->id.route.addr.dev_addr.sgid_attr;
|
|
|
|
/* Alternate path SGID attribute currently unsupported */
|
2013-05-30 01:09:28 +08:00
|
|
|
req.service_id = rdma_get_service_id(&id_priv->id, cma_dst_addr(id_priv));
|
2006-06-18 11:37:29 +08:00
|
|
|
req.qp_num = id_priv->qp_num;
|
2011-05-29 14:26:06 +08:00
|
|
|
req.qp_type = id_priv->id.qp_type;
|
2006-06-18 11:37:29 +08:00
|
|
|
req.starting_psn = id_priv->seq_num;
|
|
|
|
req.responder_resources = conn_param->responder_resources;
|
|
|
|
req.initiator_depth = conn_param->initiator_depth;
|
|
|
|
req.flow_control = conn_param->flow_control;
|
2012-10-04 07:42:31 +08:00
|
|
|
req.retry_count = min_t(u8, 7, conn_param->retry_count);
|
|
|
|
req.rnr_retry_count = min_t(u8, 7, conn_param->rnr_retry_count);
|
2006-06-18 11:37:29 +08:00
|
|
|
req.remote_cm_response_timeout = CMA_CM_RESPONSE_TIMEOUT;
|
|
|
|
req.local_cm_response_timeout = CMA_CM_RESPONSE_TIMEOUT;
|
|
|
|
req.max_cm_retries = CMA_MAX_CM_RETRIES;
|
|
|
|
req.srq = id_priv->srq ? 1 : 0;
|
|
|
|
|
|
|
|
ret = ib_send_cm_req(id_priv->cm_id.ib, &req);
|
|
|
|
out:
|
2011-07-17 18:46:47 +08:00
|
|
|
if (ret && !IS_ERR(id)) {
|
|
|
|
ib_destroy_cm_id(id);
|
2006-09-30 02:47:06 +08:00
|
|
|
id_priv->cm_id.ib = NULL;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
kfree(private_data);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-08-04 05:02:42 +08:00
|
|
|
static int cma_connect_iw(struct rdma_id_private *id_priv,
|
|
|
|
struct rdma_conn_param *conn_param)
|
|
|
|
{
|
|
|
|
struct iw_cm_id *cm_id;
|
|
|
|
int ret;
|
|
|
|
struct iw_cm_conn_param iw_param;
|
|
|
|
|
|
|
|
cm_id = iw_create_cm_id(id_priv->id.device, cma_iw_handler, id_priv);
|
2011-07-17 18:46:47 +08:00
|
|
|
if (IS_ERR(cm_id))
|
|
|
|
return PTR_ERR(cm_id);
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2015-05-19 04:27:10 +08:00
|
|
|
cm_id->tos = id_priv->tos;
|
2006-08-04 05:02:42 +08:00
|
|
|
id_priv->cm_id.iw = cm_id;
|
|
|
|
|
2013-07-04 18:40:44 +08:00
|
|
|
memcpy(&cm_id->local_addr, cma_src_addr(id_priv),
|
|
|
|
rdma_addr_size(cma_src_addr(id_priv)));
|
|
|
|
memcpy(&cm_id->remote_addr, cma_dst_addr(id_priv),
|
|
|
|
rdma_addr_size(cma_dst_addr(id_priv)));
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
ret = cma_modify_qp_rtr(id_priv, conn_param);
|
2006-09-30 02:47:06 +08:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
2006-08-04 05:02:42 +08:00
|
|
|
|
2011-10-07 00:33:04 +08:00
|
|
|
if (conn_param) {
|
|
|
|
iw_param.ord = conn_param->initiator_depth;
|
|
|
|
iw_param.ird = conn_param->responder_resources;
|
|
|
|
iw_param.private_data = conn_param->private_data;
|
|
|
|
iw_param.private_data_len = conn_param->private_data_len;
|
|
|
|
iw_param.qpn = id_priv->id.qp ? id_priv->qp_num : conn_param->qp_num;
|
|
|
|
} else {
|
|
|
|
memset(&iw_param, 0, sizeof iw_param);
|
2006-08-04 05:02:42 +08:00
|
|
|
iw_param.qpn = id_priv->qp_num;
|
2011-10-07 00:33:04 +08:00
|
|
|
}
|
2006-08-04 05:02:42 +08:00
|
|
|
ret = iw_cm_connect(cm_id, &iw_param);
|
|
|
|
out:
|
2011-07-17 18:46:47 +08:00
|
|
|
if (ret) {
|
2006-09-30 02:47:06 +08:00
|
|
|
iw_destroy_cm_id(cm_id);
|
|
|
|
id_priv->cm_id.iw = NULL;
|
|
|
|
}
|
2006-08-04 05:02:42 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
int rdma_connect(struct rdma_cm_id *id, struct rdma_conn_param *conn_param)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp_exch(id_priv, RDMA_CM_ROUTE_RESOLVED, RDMA_CM_CONNECT))
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (!id->qp) {
|
|
|
|
id_priv->qp_num = conn_param->qp_num;
|
|
|
|
id_priv->srq = conn_param->srq;
|
|
|
|
}
|
|
|
|
|
2015-05-05 20:50:34 +08:00
|
|
|
if (rdma_cap_ib_cm(id->device, id->port_num)) {
|
2010-04-02 01:08:41 +08:00
|
|
|
if (id->qp_type == IB_QPT_UD)
|
2006-12-01 08:44:16 +08:00
|
|
|
ret = cma_resolve_ib_udp(id_priv, conn_param);
|
|
|
|
else
|
|
|
|
ret = cma_connect_ib(id_priv, conn_param);
|
2015-05-05 20:50:35 +08:00
|
|
|
} else if (rdma_cap_iw_cm(id->device, id->port_num))
|
2006-08-04 05:02:42 +08:00
|
|
|
ret = cma_connect_iw(id_priv, conn_param);
|
2015-05-05 20:50:27 +08:00
|
|
|
else
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = -ENOSYS;
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err:
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_comp_exch(id_priv, RDMA_CM_CONNECT, RDMA_CM_ROUTE_RESOLVED);
|
2006-06-18 11:37:29 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_connect);
|
|
|
|
|
|
|
|
static int cma_accept_ib(struct rdma_id_private *id_priv,
|
|
|
|
struct rdma_conn_param *conn_param)
|
|
|
|
{
|
|
|
|
struct ib_cm_rep_param rep;
|
2008-01-05 02:47:12 +08:00
|
|
|
int ret;
|
2006-12-01 08:37:15 +08:00
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
ret = cma_modify_qp_rtr(id_priv, conn_param);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2006-12-01 08:37:15 +08:00
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
ret = cma_modify_qp_rts(id_priv, conn_param);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
memset(&rep, 0, sizeof rep);
|
|
|
|
rep.qp_num = id_priv->qp_num;
|
|
|
|
rep.starting_psn = id_priv->seq_num;
|
|
|
|
rep.private_data = conn_param->private_data;
|
|
|
|
rep.private_data_len = conn_param->private_data_len;
|
|
|
|
rep.responder_resources = conn_param->responder_resources;
|
|
|
|
rep.initiator_depth = conn_param->initiator_depth;
|
|
|
|
rep.failover_accepted = 0;
|
|
|
|
rep.flow_control = conn_param->flow_control;
|
2012-10-04 07:42:31 +08:00
|
|
|
rep.rnr_retry_count = min_t(u8, 7, conn_param->rnr_retry_count);
|
2006-06-18 11:37:29 +08:00
|
|
|
rep.srq = id_priv->srq ? 1 : 0;
|
|
|
|
|
2006-12-01 08:37:15 +08:00
|
|
|
ret = ib_send_cm_rep(id_priv->cm_id.ib, &rep);
|
|
|
|
out:
|
|
|
|
return ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
2006-08-04 05:02:42 +08:00
|
|
|
static int cma_accept_iw(struct rdma_id_private *id_priv,
|
|
|
|
struct rdma_conn_param *conn_param)
|
|
|
|
{
|
|
|
|
struct iw_cm_conn_param iw_param;
|
|
|
|
int ret;
|
|
|
|
|
2017-02-22 03:21:57 +08:00
|
|
|
if (!conn_param)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2008-01-05 02:47:12 +08:00
|
|
|
ret = cma_modify_qp_rtr(id_priv, conn_param);
|
2006-08-04 05:02:42 +08:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
iw_param.ord = conn_param->initiator_depth;
|
|
|
|
iw_param.ird = conn_param->responder_resources;
|
|
|
|
iw_param.private_data = conn_param->private_data;
|
|
|
|
iw_param.private_data_len = conn_param->private_data_len;
|
|
|
|
if (id_priv->id.qp) {
|
|
|
|
iw_param.qpn = id_priv->qp_num;
|
|
|
|
} else
|
|
|
|
iw_param.qpn = conn_param->qp_num;
|
|
|
|
|
|
|
|
return iw_cm_accept(id_priv->cm_id.iw, &iw_param);
|
|
|
|
}
|
|
|
|
|
2006-12-01 08:44:16 +08:00
|
|
|
static int cma_send_sidr_rep(struct rdma_id_private *id_priv,
|
2013-05-30 01:09:23 +08:00
|
|
|
enum ib_cm_sidr_status status, u32 qkey,
|
2006-12-01 08:44:16 +08:00
|
|
|
const void *private_data, int private_data_len)
|
|
|
|
{
|
|
|
|
struct ib_cm_sidr_rep_param rep;
|
2009-04-09 04:42:33 +08:00
|
|
|
int ret;
|
2006-12-01 08:44:16 +08:00
|
|
|
|
|
|
|
memset(&rep, 0, sizeof rep);
|
|
|
|
rep.status = status;
|
|
|
|
if (status == IB_SIDR_SUCCESS) {
|
2013-05-30 01:09:23 +08:00
|
|
|
ret = cma_set_qkey(id_priv, qkey);
|
2009-04-09 04:42:33 +08:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
2006-12-01 08:44:16 +08:00
|
|
|
rep.qp_num = id_priv->qp_num;
|
2007-02-16 09:00:18 +08:00
|
|
|
rep.qkey = id_priv->qkey;
|
2006-12-01 08:44:16 +08:00
|
|
|
}
|
|
|
|
rep.private_data = private_data;
|
|
|
|
rep.private_data_len = private_data_len;
|
|
|
|
|
|
|
|
return ib_send_cm_sidr_rep(id_priv->cm_id.ib, &rep);
|
|
|
|
}
|
|
|
|
|
2018-03-02 05:57:44 +08:00
|
|
|
int __rdma_accept(struct rdma_cm_id *id, struct rdma_conn_param *conn_param,
|
|
|
|
const char *caller)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-01-13 21:56:04 +08:00
|
|
|
|
2018-03-02 05:57:44 +08:00
|
|
|
if (caller)
|
|
|
|
id_priv->res.kern_name = caller;
|
|
|
|
else
|
|
|
|
rdma_restrack_set_task(&id_priv->res, current);
|
2011-01-13 21:56:04 +08:00
|
|
|
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp(id_priv, RDMA_CM_CONNECT))
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (!id->qp && conn_param) {
|
|
|
|
id_priv->qp_num = conn_param->qp_num;
|
|
|
|
id_priv->srq = conn_param->srq;
|
|
|
|
}
|
|
|
|
|
2015-05-05 20:50:34 +08:00
|
|
|
if (rdma_cap_ib_cm(id->device, id->port_num)) {
|
2011-10-07 00:33:04 +08:00
|
|
|
if (id->qp_type == IB_QPT_UD) {
|
|
|
|
if (conn_param)
|
|
|
|
ret = cma_send_sidr_rep(id_priv, IB_SIDR_SUCCESS,
|
2013-05-30 01:09:23 +08:00
|
|
|
conn_param->qkey,
|
2011-10-07 00:33:04 +08:00
|
|
|
conn_param->private_data,
|
|
|
|
conn_param->private_data_len);
|
|
|
|
else
|
|
|
|
ret = cma_send_sidr_rep(id_priv, IB_SIDR_SUCCESS,
|
2013-05-30 01:09:23 +08:00
|
|
|
0, NULL, 0);
|
2011-10-07 00:33:04 +08:00
|
|
|
} else {
|
|
|
|
if (conn_param)
|
|
|
|
ret = cma_accept_ib(id_priv, conn_param);
|
|
|
|
else
|
|
|
|
ret = cma_rep_recv(id_priv);
|
|
|
|
}
|
2015-05-05 20:50:35 +08:00
|
|
|
} else if (rdma_cap_iw_cm(id->device, id->port_num))
|
2006-08-04 05:02:42 +08:00
|
|
|
ret = cma_accept_iw(id_priv, conn_param);
|
2015-05-05 20:50:27 +08:00
|
|
|
else
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = -ENOSYS;
|
|
|
|
|
|
|
|
if (ret)
|
|
|
|
goto reject;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
reject:
|
2007-09-25 04:19:09 +08:00
|
|
|
cma_modify_qp_err(id_priv);
|
2006-06-18 11:37:29 +08:00
|
|
|
rdma_reject(id, NULL, 0);
|
|
|
|
return ret;
|
|
|
|
}
|
2018-03-02 05:57:44 +08:00
|
|
|
EXPORT_SYMBOL(__rdma_accept);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2006-12-01 08:37:15 +08:00
|
|
|
int rdma_notify(struct rdma_cm_id *id, enum ib_event_type event)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-07-17 18:46:47 +08:00
|
|
|
if (!id_priv->cm_id.ib)
|
2006-12-01 08:37:15 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
switch (id->device->node_type) {
|
|
|
|
case RDMA_NODE_IB_CA:
|
|
|
|
ret = ib_cm_notify(id_priv->cm_id.ib, event);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_notify);
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
int rdma_reject(struct rdma_cm_id *id, const void *private_data,
|
|
|
|
u8 private_data_len)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-07-17 18:46:47 +08:00
|
|
|
if (!id_priv->cm_id.ib)
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2015-05-05 20:50:34 +08:00
|
|
|
if (rdma_cap_ib_cm(id->device, id->port_num)) {
|
2010-04-02 01:08:41 +08:00
|
|
|
if (id->qp_type == IB_QPT_UD)
|
2013-05-30 01:09:23 +08:00
|
|
|
ret = cma_send_sidr_rep(id_priv, IB_SIDR_REJECT, 0,
|
2006-12-01 08:44:16 +08:00
|
|
|
private_data, private_data_len);
|
|
|
|
else
|
|
|
|
ret = ib_send_cm_rej(id_priv->cm_id.ib,
|
|
|
|
IB_CM_REJ_CONSUMER_DEFINED, NULL,
|
|
|
|
0, private_data, private_data_len);
|
2015-05-05 20:50:35 +08:00
|
|
|
} else if (rdma_cap_iw_cm(id->device, id->port_num)) {
|
2006-08-04 05:02:42 +08:00
|
|
|
ret = iw_cm_reject(id_priv->cm_id.iw,
|
|
|
|
private_data, private_data_len);
|
2015-05-05 20:50:27 +08:00
|
|
|
} else
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = -ENOSYS;
|
2015-05-05 20:50:27 +08:00
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_reject);
|
|
|
|
|
|
|
|
int rdma_disconnect(struct rdma_cm_id *id)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-07-17 18:46:47 +08:00
|
|
|
if (!id_priv->cm_id.ib)
|
2006-06-18 11:37:29 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2015-05-05 20:50:34 +08:00
|
|
|
if (rdma_cap_ib_cm(id->device, id->port_num)) {
|
2007-09-25 04:19:09 +08:00
|
|
|
ret = cma_modify_qp_err(id_priv);
|
2006-08-04 05:02:42 +08:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
2006-06-18 11:37:29 +08:00
|
|
|
/* Initiate or respond to a disconnect. */
|
|
|
|
if (ib_send_cm_dreq(id_priv->cm_id.ib, NULL, 0))
|
|
|
|
ib_send_cm_drep(id_priv->cm_id.ib, NULL, 0);
|
2015-05-05 20:50:35 +08:00
|
|
|
} else if (rdma_cap_iw_cm(id->device, id->port_num)) {
|
2006-08-04 05:02:42 +08:00
|
|
|
ret = iw_cm_disconnect(id_priv->cm_id.iw, 0);
|
2015-05-05 20:50:27 +08:00
|
|
|
} else
|
2006-08-04 05:02:42 +08:00
|
|
|
ret = -EINVAL;
|
2015-05-05 20:50:27 +08:00
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_disconnect);
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
static int cma_ib_mc_handler(int status, struct ib_sa_multicast *multicast)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
struct cma_multicast *mc = multicast->context;
|
2018-07-29 16:53:14 +08:00
|
|
|
struct rdma_cm_event event = {};
|
2016-06-11 02:08:25 +08:00
|
|
|
int ret = 0;
|
2007-02-16 09:00:18 +08:00
|
|
|
|
|
|
|
id_priv = mc->id_priv;
|
2016-06-11 02:08:25 +08:00
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
|
|
|
if (id_priv->state != RDMA_CM_ADDR_BOUND &&
|
|
|
|
id_priv->state != RDMA_CM_ADDR_RESOLVED)
|
|
|
|
goto out;
|
2007-02-16 09:00:18 +08:00
|
|
|
|
2013-05-30 01:09:23 +08:00
|
|
|
if (!status)
|
|
|
|
status = cma_set_qkey(id_priv, be32_to_cpu(multicast->rec.qkey));
|
2017-01-05 22:16:35 +08:00
|
|
|
else
|
|
|
|
pr_debug_ratelimited("RDMA CM: MULTICAST_ERROR: failed to join multicast. status %d\n",
|
|
|
|
status);
|
2007-09-25 04:19:09 +08:00
|
|
|
mutex_lock(&id_priv->qp_mutex);
|
2017-01-05 22:16:35 +08:00
|
|
|
if (!status && id_priv->id.qp) {
|
2007-02-16 09:00:18 +08:00
|
|
|
status = ib_attach_mcast(id_priv->id.qp, &multicast->rec.mgid,
|
2011-12-07 05:15:18 +08:00
|
|
|
be16_to_cpu(multicast->rec.mlid));
|
2017-01-27 21:15:35 +08:00
|
|
|
if (status)
|
2017-01-05 22:16:35 +08:00
|
|
|
pr_debug_ratelimited("RDMA CM: MULTICAST_ERROR: failed to attach QP. status %d\n",
|
|
|
|
status);
|
|
|
|
}
|
2007-09-25 04:19:09 +08:00
|
|
|
mutex_unlock(&id_priv->qp_mutex);
|
2007-02-16 09:00:18 +08:00
|
|
|
|
|
|
|
event.status = status;
|
|
|
|
event.param.ud.private_data = mc->context;
|
|
|
|
if (!status) {
|
2015-12-23 20:56:57 +08:00
|
|
|
struct rdma_dev_addr *dev_addr =
|
|
|
|
&id_priv->id.route.addr.dev_addr;
|
|
|
|
struct net_device *ndev =
|
2018-01-09 21:58:57 +08:00
|
|
|
dev_get_by_index(dev_addr->net, dev_addr->bound_dev_if);
|
2015-12-23 20:56:57 +08:00
|
|
|
enum ib_gid_type gid_type =
|
|
|
|
id_priv->cma_dev->default_gid_type[id_priv->id.port_num -
|
|
|
|
rdma_start_port(id_priv->cma_dev->device)];
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
event.event = RDMA_CM_EVENT_MULTICAST_JOIN;
|
2018-03-13 22:06:13 +08:00
|
|
|
ret = ib_init_ah_from_mcmember(id_priv->id.device,
|
|
|
|
id_priv->id.port_num,
|
|
|
|
&multicast->rec,
|
|
|
|
ndev, gid_type,
|
|
|
|
&event.param.ud.ah_attr);
|
|
|
|
if (ret)
|
|
|
|
event.event = RDMA_CM_EVENT_MULTICAST_ERROR;
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
event.param.ud.qp_num = 0xFFFFFF;
|
|
|
|
event.param.ud.qkey = be32_to_cpu(multicast->rec.qkey);
|
2015-12-23 20:56:57 +08:00
|
|
|
if (ndev)
|
|
|
|
dev_put(ndev);
|
2007-02-16 09:00:18 +08:00
|
|
|
} else
|
|
|
|
event.event = RDMA_CM_EVENT_MULTICAST_ERROR;
|
|
|
|
|
|
|
|
ret = id_priv->id.event_handler(&id_priv->id, &event);
|
2018-06-19 15:59:15 +08:00
|
|
|
|
|
|
|
rdma_destroy_ah_attr(&event.param.ud.ah_attr);
|
2007-02-16 09:00:18 +08:00
|
|
|
if (ret) {
|
2011-05-21 02:46:11 +08:00
|
|
|
cma_exch(id_priv, RDMA_CM_DESTROYING);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2007-02-16 09:00:18 +08:00
|
|
|
rdma_destroy_id(&id_priv->id);
|
|
|
|
return 0;
|
|
|
|
}
|
2007-05-08 02:49:00 +08:00
|
|
|
|
2016-06-11 02:08:25 +08:00
|
|
|
out:
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
2007-02-16 09:00:18 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_set_mgid(struct rdma_id_private *id_priv,
|
|
|
|
struct sockaddr *addr, union ib_gid *mgid)
|
|
|
|
{
|
|
|
|
unsigned char mc_map[MAX_ADDR_LEN];
|
|
|
|
struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
|
|
|
|
struct sockaddr_in *sin = (struct sockaddr_in *) addr;
|
|
|
|
struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) addr;
|
|
|
|
|
|
|
|
if (cma_any_addr(addr)) {
|
|
|
|
memset(mgid, 0, sizeof *mgid);
|
|
|
|
} else if ((addr->sa_family == AF_INET6) &&
|
2009-11-20 04:55:21 +08:00
|
|
|
((be32_to_cpu(sin6->sin6_addr.s6_addr32[0]) & 0xFFF0FFFF) ==
|
2007-02-16 09:00:18 +08:00
|
|
|
0xFF10A01B)) {
|
|
|
|
/* IPv6 address is an SA assigned MGID. */
|
|
|
|
memcpy(mgid, &sin6->sin6_addr, sizeof *mgid);
|
2013-05-30 01:09:33 +08:00
|
|
|
} else if (addr->sa_family == AF_IB) {
|
|
|
|
memcpy(mgid, &((struct sockaddr_ib *) addr)->sib_addr, sizeof *mgid);
|
2018-07-26 02:43:56 +08:00
|
|
|
} else if (addr->sa_family == AF_INET6) {
|
2009-11-20 04:55:22 +08:00
|
|
|
ipv6_ib_mc_map(&sin6->sin6_addr, dev_addr->broadcast, mc_map);
|
|
|
|
if (id_priv->id.ps == RDMA_PS_UDP)
|
|
|
|
mc_map[7] = 0x01; /* Use RDMA CM signature */
|
|
|
|
*mgid = *(union ib_gid *) (mc_map + 4);
|
2007-02-16 09:00:18 +08:00
|
|
|
} else {
|
2007-12-11 04:38:41 +08:00
|
|
|
ip_ib_mc_map(sin->sin_addr.s_addr, dev_addr->broadcast, mc_map);
|
2007-02-16 09:00:18 +08:00
|
|
|
if (id_priv->id.ps == RDMA_PS_UDP)
|
|
|
|
mc_map[7] = 0x01; /* Use RDMA CM signature */
|
|
|
|
*mgid = *(union ib_gid *) (mc_map + 4);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_join_ib_multicast(struct rdma_id_private *id_priv,
|
|
|
|
struct cma_multicast *mc)
|
|
|
|
{
|
|
|
|
struct ib_sa_mcmember_rec rec;
|
|
|
|
struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
|
|
|
|
ib_sa_comp_mask comp_mask;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ib_addr_get_mgid(dev_addr, &rec.mgid);
|
|
|
|
ret = ib_sa_get_mcmember_rec(id_priv->id.device, id_priv->id.port_num,
|
|
|
|
&rec.mgid, &rec);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2013-05-30 01:09:33 +08:00
|
|
|
ret = cma_set_qkey(id_priv, 0);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2008-08-05 02:02:14 +08:00
|
|
|
cma_set_mgid(id_priv, (struct sockaddr *) &mc->addr, &rec.mgid);
|
2013-05-30 01:09:33 +08:00
|
|
|
rec.qkey = cpu_to_be32(id_priv->qkey);
|
RDMA/cm: fix loopback address support
The RDMA CM is intended to support the use of a loopback address
when establishing a connection; however, the behavior of the CM
when loopback addresses are used is confusing and does not always
work, depending on whether loopback was specified by the server,
the client, or both.
The defined behavior of rdma_bind_addr is to associate an RDMA
device with an rdma_cm_id, as long as the user specified a non-
zero address. (ie they weren't just trying to reserve a port)
Currently, if the loopback address is passed to rdam_bind_addr,
no device is associated with the rdma_cm_id. Fix this.
If a loopback address is specified by the client as the destination
address for a connection, it will fail to establish a connection.
This is true even if the server is listing across all addresses or
on the loopback address itself. The issue is that the server tries
to translate the IP address carried in the REQ message to a local
net_device address, which fails. The translation is not needed in
this case, since the REQ carries the actual HW address that should
be used.
Finally, cleanup loopback support to be more transport neutral.
Replace separate calls to get/set the sgid and dgid from the
device address to a single call that behaves correctly depending
on the format of the device address. And support both IPv4 and
IPv6 address formats.
Signed-off-by: Sean Hefty <sean.hefty@intel.com>
[ Fixed RDS build by s/ib_addr_get/rdma_addr_get/ - Roland ]
Signed-off-by: Roland Dreier <rolandd@cisco.com>
2009-11-20 05:26:06 +08:00
|
|
|
rdma_addr_get_sgid(dev_addr, &rec.port_gid);
|
2007-02-16 09:00:18 +08:00
|
|
|
rec.pkey = cpu_to_be16(ib_addr_get_pkey(dev_addr));
|
2016-07-06 21:36:35 +08:00
|
|
|
rec.join_state = mc->join_state;
|
|
|
|
|
2017-03-21 07:38:08 +08:00
|
|
|
if ((rec.join_state == BIT(SENDONLY_FULLMEMBER_JOIN)) &&
|
|
|
|
(!ib_sa_sendonly_fullmem_support(&sa_client,
|
|
|
|
id_priv->id.device,
|
|
|
|
id_priv->id.port_num))) {
|
|
|
|
pr_warn("RDMA CM: %s port %u Unable to multicast join\n"
|
|
|
|
"RDMA CM: SM doesn't support Send Only Full Member option\n",
|
|
|
|
id_priv->id.device->name, id_priv->id.port_num);
|
|
|
|
return -EOPNOTSUPP;
|
2016-07-06 21:36:35 +08:00
|
|
|
}
|
2007-02-16 09:00:18 +08:00
|
|
|
|
|
|
|
comp_mask = IB_SA_MCMEMBER_REC_MGID | IB_SA_MCMEMBER_REC_PORT_GID |
|
|
|
|
IB_SA_MCMEMBER_REC_PKEY | IB_SA_MCMEMBER_REC_JOIN_STATE |
|
|
|
|
IB_SA_MCMEMBER_REC_QKEY | IB_SA_MCMEMBER_REC_SL |
|
|
|
|
IB_SA_MCMEMBER_REC_FLOW_LABEL |
|
|
|
|
IB_SA_MCMEMBER_REC_TRAFFIC_CLASS;
|
|
|
|
|
2009-04-02 04:55:32 +08:00
|
|
|
if (id_priv->id.ps == RDMA_PS_IPOIB)
|
|
|
|
comp_mask |= IB_SA_MCMEMBER_REC_RATE |
|
2012-08-30 17:09:55 +08:00
|
|
|
IB_SA_MCMEMBER_REC_RATE_SELECTOR |
|
|
|
|
IB_SA_MCMEMBER_REC_MTU_SELECTOR |
|
|
|
|
IB_SA_MCMEMBER_REC_MTU |
|
|
|
|
IB_SA_MCMEMBER_REC_HOP_LIMIT;
|
2009-04-02 04:55:32 +08:00
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
mc->multicast.ib = ib_sa_join_multicast(&sa_client, id_priv->id.device,
|
|
|
|
id_priv->id.port_num, &rec,
|
|
|
|
comp_mask, GFP_KERNEL,
|
|
|
|
cma_ib_mc_handler, mc);
|
2013-07-15 09:50:32 +08:00
|
|
|
return PTR_ERR_OR_ZERO(mc->multicast.ib);
|
2007-02-16 09:00:18 +08:00
|
|
|
}
|
|
|
|
|
2010-10-14 03:26:51 +08:00
|
|
|
static void iboe_mcast_work_handler(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct iboe_mcast_work *mw = container_of(work, struct iboe_mcast_work, work);
|
|
|
|
struct cma_multicast *mc = mw->mc;
|
|
|
|
struct ib_sa_multicast *m = mc->multicast.ib;
|
|
|
|
|
|
|
|
mc->multicast.ib->context = mc;
|
|
|
|
cma_ib_mc_handler(0, m);
|
|
|
|
kref_put(&mc->mcref, release_mc);
|
|
|
|
kfree(mw);
|
|
|
|
}
|
|
|
|
|
2017-06-12 16:14:03 +08:00
|
|
|
static void cma_iboe_set_mgid(struct sockaddr *addr, union ib_gid *mgid,
|
|
|
|
enum ib_gid_type gid_type)
|
2010-10-14 03:26:51 +08:00
|
|
|
{
|
|
|
|
struct sockaddr_in *sin = (struct sockaddr_in *)addr;
|
|
|
|
struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)addr;
|
|
|
|
|
|
|
|
if (cma_any_addr(addr)) {
|
|
|
|
memset(mgid, 0, sizeof *mgid);
|
|
|
|
} else if (addr->sa_family == AF_INET6) {
|
|
|
|
memcpy(mgid, &sin6->sin6_addr, sizeof *mgid);
|
|
|
|
} else {
|
2017-11-14 20:52:00 +08:00
|
|
|
mgid->raw[0] =
|
|
|
|
(gid_type == IB_GID_TYPE_ROCE_UDP_ENCAP) ? 0 : 0xff;
|
|
|
|
mgid->raw[1] =
|
|
|
|
(gid_type == IB_GID_TYPE_ROCE_UDP_ENCAP) ? 0 : 0x0e;
|
2010-10-14 03:26:51 +08:00
|
|
|
mgid->raw[2] = 0;
|
|
|
|
mgid->raw[3] = 0;
|
|
|
|
mgid->raw[4] = 0;
|
|
|
|
mgid->raw[5] = 0;
|
|
|
|
mgid->raw[6] = 0;
|
|
|
|
mgid->raw[7] = 0;
|
|
|
|
mgid->raw[8] = 0;
|
|
|
|
mgid->raw[9] = 0;
|
|
|
|
mgid->raw[10] = 0xff;
|
|
|
|
mgid->raw[11] = 0xff;
|
|
|
|
*(__be32 *)(&mgid->raw[12]) = sin->sin_addr.s_addr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_iboe_join_multicast(struct rdma_id_private *id_priv,
|
|
|
|
struct cma_multicast *mc)
|
|
|
|
{
|
|
|
|
struct iboe_mcast_work *work;
|
|
|
|
struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
|
2015-12-23 20:56:57 +08:00
|
|
|
int err = 0;
|
2010-10-14 03:26:51 +08:00
|
|
|
struct sockaddr *addr = (struct sockaddr *)&mc->addr;
|
|
|
|
struct net_device *ndev = NULL;
|
2015-12-23 20:56:57 +08:00
|
|
|
enum ib_gid_type gid_type;
|
2016-07-06 21:36:35 +08:00
|
|
|
bool send_only;
|
|
|
|
|
|
|
|
send_only = mc->join_state == BIT(SENDONLY_FULLMEMBER_JOIN);
|
2010-10-14 03:26:51 +08:00
|
|
|
|
|
|
|
if (cma_zero_addr((struct sockaddr *)&mc->addr))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
work = kzalloc(sizeof *work, GFP_KERNEL);
|
|
|
|
if (!work)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
mc->multicast.ib = kzalloc(sizeof(struct ib_sa_multicast), GFP_KERNEL);
|
|
|
|
if (!mc->multicast.ib) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out1;
|
|
|
|
}
|
|
|
|
|
2017-06-12 16:14:03 +08:00
|
|
|
gid_type = id_priv->cma_dev->default_gid_type[id_priv->id.port_num -
|
|
|
|
rdma_start_port(id_priv->cma_dev->device)];
|
|
|
|
cma_iboe_set_mgid(addr, &mc->multicast.ib->rec.mgid, gid_type);
|
2010-10-14 03:26:51 +08:00
|
|
|
|
|
|
|
mc->multicast.ib->rec.pkey = cpu_to_be16(0xffff);
|
|
|
|
if (id_priv->id.ps == RDMA_PS_UDP)
|
|
|
|
mc->multicast.ib->rec.qkey = cpu_to_be32(RDMA_UDP_QKEY);
|
|
|
|
|
|
|
|
if (dev_addr->bound_dev_if)
|
2018-01-09 21:58:57 +08:00
|
|
|
ndev = dev_get_by_index(dev_addr->net, dev_addr->bound_dev_if);
|
2010-10-14 03:26:51 +08:00
|
|
|
if (!ndev) {
|
|
|
|
err = -ENODEV;
|
|
|
|
goto out2;
|
|
|
|
}
|
|
|
|
mc->multicast.ib->rec.rate = iboe_get_rate(ndev);
|
|
|
|
mc->multicast.ib->rec.hop_limit = 1;
|
|
|
|
mc->multicast.ib->rec.mtu = iboe_get_mtu(ndev->mtu);
|
2015-12-23 20:56:57 +08:00
|
|
|
|
|
|
|
if (addr->sa_family == AF_INET) {
|
2016-06-22 22:27:23 +08:00
|
|
|
if (gid_type == IB_GID_TYPE_ROCE_UDP_ENCAP) {
|
|
|
|
mc->multicast.ib->rec.hop_limit = IPV6_DEFAULT_HOPLIMIT;
|
2016-07-06 21:36:35 +08:00
|
|
|
if (!send_only) {
|
|
|
|
err = cma_igmp_send(ndev, &mc->multicast.ib->rec.mgid,
|
|
|
|
true);
|
|
|
|
}
|
2015-12-23 20:56:57 +08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (gid_type == IB_GID_TYPE_ROCE_UDP_ENCAP)
|
|
|
|
err = -ENOTSUPP;
|
|
|
|
}
|
2010-10-14 03:26:51 +08:00
|
|
|
dev_put(ndev);
|
2015-12-23 20:56:57 +08:00
|
|
|
if (err || !mc->multicast.ib->rec.mtu) {
|
|
|
|
if (!err)
|
|
|
|
err = -EINVAL;
|
2010-10-14 03:26:51 +08:00
|
|
|
goto out2;
|
|
|
|
}
|
2013-12-13 00:03:12 +08:00
|
|
|
rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.src_addr,
|
|
|
|
&mc->multicast.ib->rec.port_gid);
|
2010-10-14 03:26:51 +08:00
|
|
|
work->id = id_priv;
|
|
|
|
work->mc = mc;
|
|
|
|
INIT_WORK(&work->work, iboe_mcast_work_handler);
|
|
|
|
kref_get(&mc->mcref);
|
|
|
|
queue_work(cma_wq, &work->work);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out2:
|
|
|
|
kfree(mc->multicast.ib);
|
|
|
|
out1:
|
|
|
|
kfree(work);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
int rdma_join_multicast(struct rdma_cm_id *id, struct sockaddr *addr,
|
2016-07-06 21:36:35 +08:00
|
|
|
u8 join_state, void *context)
|
2007-02-16 09:00:18 +08:00
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
struct cma_multicast *mc;
|
|
|
|
int ret;
|
|
|
|
|
2018-03-13 17:43:23 +08:00
|
|
|
if (!id->device)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2007-02-16 09:00:18 +08:00
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp(id_priv, RDMA_CM_ADDR_BOUND) &&
|
|
|
|
!cma_comp(id_priv, RDMA_CM_ADDR_RESOLVED))
|
2007-02-16 09:00:18 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
mc = kmalloc(sizeof *mc, GFP_KERNEL);
|
|
|
|
if (!mc)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-05-30 01:09:10 +08:00
|
|
|
memcpy(&mc->addr, addr, rdma_addr_size(addr));
|
2007-02-16 09:00:18 +08:00
|
|
|
mc->context = context;
|
|
|
|
mc->id_priv = id_priv;
|
2016-07-06 21:36:35 +08:00
|
|
|
mc->join_state = join_state;
|
2007-02-16 09:00:18 +08:00
|
|
|
|
2015-05-15 03:01:46 +08:00
|
|
|
if (rdma_protocol_roce(id->device, id->port_num)) {
|
2015-05-05 20:50:29 +08:00
|
|
|
kref_init(&mc->mcref);
|
|
|
|
ret = cma_iboe_join_multicast(id_priv, mc);
|
2018-07-11 16:20:29 +08:00
|
|
|
if (ret)
|
|
|
|
goto out_err;
|
|
|
|
} else if (rdma_cap_ib_mcast(id->device, id->port_num)) {
|
2015-05-05 20:50:29 +08:00
|
|
|
ret = cma_join_ib_multicast(id_priv, mc);
|
2018-07-11 16:20:29 +08:00
|
|
|
if (ret)
|
|
|
|
goto out_err;
|
|
|
|
} else {
|
2007-02-16 09:00:18 +08:00
|
|
|
ret = -ENOSYS;
|
2018-07-11 16:20:29 +08:00
|
|
|
goto out_err;
|
2007-02-16 09:00:18 +08:00
|
|
|
}
|
2018-07-11 16:20:29 +08:00
|
|
|
|
|
|
|
spin_lock(&id_priv->lock);
|
|
|
|
list_add(&mc->list, &id_priv->mc_list);
|
|
|
|
spin_unlock(&id_priv->lock);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
out_err:
|
|
|
|
kfree(mc);
|
2007-02-16 09:00:18 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_join_multicast);
|
|
|
|
|
|
|
|
void rdma_leave_multicast(struct rdma_cm_id *id, struct sockaddr *addr)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
struct cma_multicast *mc;
|
|
|
|
|
|
|
|
id_priv = container_of(id, struct rdma_id_private, id);
|
|
|
|
spin_lock_irq(&id_priv->lock);
|
|
|
|
list_for_each_entry(mc, &id_priv->mc_list, list) {
|
2013-05-30 01:09:10 +08:00
|
|
|
if (!memcmp(&mc->addr, addr, rdma_addr_size(addr))) {
|
2007-02-16 09:00:18 +08:00
|
|
|
list_del(&mc->list);
|
|
|
|
spin_unlock_irq(&id_priv->lock);
|
|
|
|
|
|
|
|
if (id->qp)
|
|
|
|
ib_detach_mcast(id->qp,
|
|
|
|
&mc->multicast.ib->rec.mgid,
|
2011-12-07 05:15:18 +08:00
|
|
|
be16_to_cpu(mc->multicast.ib->rec.mlid));
|
2015-05-05 20:50:29 +08:00
|
|
|
|
|
|
|
BUG_ON(id_priv->cma_dev->device != id->device);
|
|
|
|
|
2015-05-05 20:50:37 +08:00
|
|
|
if (rdma_cap_ib_mcast(id->device, id->port_num)) {
|
2015-05-05 20:50:29 +08:00
|
|
|
ib_sa_free_multicast(mc->multicast.ib);
|
|
|
|
kfree(mc);
|
2015-12-23 20:56:57 +08:00
|
|
|
} else if (rdma_protocol_roce(id->device, id->port_num)) {
|
2018-06-21 20:31:24 +08:00
|
|
|
cma_leave_roce_mc_group(id_priv, mc);
|
2015-12-23 20:56:57 +08:00
|
|
|
}
|
2007-02-16 09:00:18 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_irq(&id_priv->lock);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(rdma_leave_multicast);
|
|
|
|
|
2008-07-23 05:14:22 +08:00
|
|
|
static int cma_netdev_change(struct net_device *ndev, struct rdma_id_private *id_priv)
|
|
|
|
{
|
|
|
|
struct rdma_dev_addr *dev_addr;
|
|
|
|
struct cma_ndev_work *work;
|
|
|
|
|
|
|
|
dev_addr = &id_priv->id.route.addr.dev_addr;
|
|
|
|
|
2009-11-20 04:55:22 +08:00
|
|
|
if ((dev_addr->bound_dev_if == ndev->ifindex) &&
|
2015-10-22 20:20:10 +08:00
|
|
|
(net_eq(dev_net(ndev), dev_addr->net)) &&
|
2008-07-23 05:14:22 +08:00
|
|
|
memcmp(dev_addr->src_dev_addr, ndev->dev_addr, ndev->addr_len)) {
|
2016-03-02 03:20:29 +08:00
|
|
|
pr_info("RDMA CM addr change for ndev %s used by id %p\n",
|
|
|
|
ndev->name, &id_priv->id);
|
2008-07-23 05:14:22 +08:00
|
|
|
work = kzalloc(sizeof *work, GFP_KERNEL);
|
|
|
|
if (!work)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
INIT_WORK(&work->work, cma_ndev_work_handler);
|
|
|
|
work->id = id_priv;
|
|
|
|
work->event.event = RDMA_CM_EVENT_ADDR_CHANGE;
|
|
|
|
atomic_inc(&id_priv->refcount);
|
|
|
|
queue_work(cma_wq, &work->work);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_netdev_callback(struct notifier_block *self, unsigned long event,
|
2013-05-28 09:30:21 +08:00
|
|
|
void *ptr)
|
2008-07-23 05:14:22 +08:00
|
|
|
{
|
2013-05-28 09:30:21 +08:00
|
|
|
struct net_device *ndev = netdev_notifier_info_to_dev(ptr);
|
2008-07-23 05:14:22 +08:00
|
|
|
struct cma_device *cma_dev;
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret = NOTIFY_DONE;
|
|
|
|
|
|
|
|
if (event != NETDEV_BONDING_FAILOVER)
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
|
2018-01-28 17:25:32 +08:00
|
|
|
if (!netif_is_bond_master(ndev))
|
2008-07-23 05:14:22 +08:00
|
|
|
return NOTIFY_DONE;
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
list_for_each_entry(cma_dev, &dev_list, list)
|
|
|
|
list_for_each_entry(id_priv, &cma_dev->id_list, list) {
|
|
|
|
ret = cma_netdev_change(ndev, id_priv);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct notifier_block cma_nb = {
|
|
|
|
.notifier_call = cma_netdev_callback
|
|
|
|
};
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
static void cma_add_one(struct ib_device *device)
|
|
|
|
{
|
|
|
|
struct cma_device *cma_dev;
|
|
|
|
struct rdma_id_private *id_priv;
|
2015-12-23 20:56:55 +08:00
|
|
|
unsigned int i;
|
|
|
|
unsigned long supported_gids = 0;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
cma_dev = kmalloc(sizeof *cma_dev, GFP_KERNEL);
|
|
|
|
if (!cma_dev)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cma_dev->device = device;
|
2015-12-23 20:56:55 +08:00
|
|
|
cma_dev->default_gid_type = kcalloc(device->phys_port_cnt,
|
|
|
|
sizeof(*cma_dev->default_gid_type),
|
|
|
|
GFP_KERNEL);
|
2017-02-14 13:21:52 +08:00
|
|
|
if (!cma_dev->default_gid_type)
|
|
|
|
goto free_cma_dev;
|
|
|
|
|
|
|
|
cma_dev->default_roce_tos = kcalloc(device->phys_port_cnt,
|
|
|
|
sizeof(*cma_dev->default_roce_tos),
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!cma_dev->default_roce_tos)
|
|
|
|
goto free_gid_type;
|
|
|
|
|
2015-12-23 20:56:55 +08:00
|
|
|
for (i = rdma_start_port(device); i <= rdma_end_port(device); i++) {
|
|
|
|
supported_gids = roce_gid_type_mask_support(device, i);
|
|
|
|
WARN_ON(!supported_gids);
|
2017-08-17 20:50:32 +08:00
|
|
|
if (supported_gids & (1 << CMA_PREFERRED_ROCE_GID_TYPE))
|
2017-05-30 14:47:34 +08:00
|
|
|
cma_dev->default_gid_type[i - rdma_start_port(device)] =
|
|
|
|
CMA_PREFERRED_ROCE_GID_TYPE;
|
|
|
|
else
|
|
|
|
cma_dev->default_gid_type[i - rdma_start_port(device)] =
|
|
|
|
find_first_bit(&supported_gids, BITS_PER_LONG);
|
2017-02-14 13:21:52 +08:00
|
|
|
cma_dev->default_roce_tos[i - rdma_start_port(device)] = 0;
|
2015-12-23 20:56:55 +08:00
|
|
|
}
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
init_completion(&cma_dev->comp);
|
|
|
|
atomic_set(&cma_dev->refcount, 1);
|
|
|
|
INIT_LIST_HEAD(&cma_dev->id_list);
|
|
|
|
ib_set_client_data(device, &cma_client, cma_dev);
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
list_add_tail(&cma_dev->list, &dev_list);
|
|
|
|
list_for_each_entry(id_priv, &listen_any_list, list)
|
|
|
|
cma_listen_on_dev(id_priv, cma_dev);
|
|
|
|
mutex_unlock(&lock);
|
2017-02-14 13:21:52 +08:00
|
|
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
free_gid_type:
|
|
|
|
kfree(cma_dev->default_gid_type);
|
|
|
|
|
|
|
|
free_cma_dev:
|
|
|
|
kfree(cma_dev);
|
|
|
|
|
|
|
|
return;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int cma_remove_id_dev(struct rdma_id_private *id_priv)
|
|
|
|
{
|
2018-07-29 16:53:14 +08:00
|
|
|
struct rdma_cm_event event = {};
|
2011-05-21 02:46:11 +08:00
|
|
|
enum rdma_cm_state state;
|
2008-07-15 14:48:53 +08:00
|
|
|
int ret = 0;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
/* Record that we want to remove the device */
|
2011-05-21 02:46:11 +08:00
|
|
|
state = cma_exch(id_priv, RDMA_CM_DEVICE_REMOVAL);
|
|
|
|
if (state == RDMA_CM_DESTROYING)
|
2006-06-18 11:37:29 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
cma_cancel_operation(id_priv, state);
|
2008-07-15 14:48:53 +08:00
|
|
|
mutex_lock(&id_priv->handler_mutex);
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
/* Check for destruction from another callback. */
|
2011-05-21 02:46:11 +08:00
|
|
|
if (!cma_comp(id_priv, RDMA_CM_DEVICE_REMOVAL))
|
2008-07-15 14:48:53 +08:00
|
|
|
goto out;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
2006-12-01 08:33:14 +08:00
|
|
|
event.event = RDMA_CM_EVENT_DEVICE_REMOVAL;
|
2008-07-15 14:48:53 +08:00
|
|
|
ret = id_priv->id.event_handler(&id_priv->id, &event);
|
|
|
|
out:
|
|
|
|
mutex_unlock(&id_priv->handler_mutex);
|
|
|
|
return ret;
|
2006-06-18 11:37:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_process_remove(struct cma_device *cma_dev)
|
|
|
|
{
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
while (!list_empty(&cma_dev->id_list)) {
|
|
|
|
id_priv = list_entry(cma_dev->id_list.next,
|
|
|
|
struct rdma_id_private, list);
|
|
|
|
|
2007-10-10 02:12:34 +08:00
|
|
|
list_del(&id_priv->listen_list);
|
2006-09-30 03:03:35 +08:00
|
|
|
list_del_init(&id_priv->list);
|
2006-06-18 11:37:29 +08:00
|
|
|
atomic_inc(&id_priv->refcount);
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
|
2007-10-10 02:12:34 +08:00
|
|
|
ret = id_priv->internal_id ? 1 : cma_remove_id_dev(id_priv);
|
2006-06-18 11:37:29 +08:00
|
|
|
cma_deref_id(id_priv);
|
|
|
|
if (ret)
|
|
|
|
rdma_destroy_id(&id_priv->id);
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
}
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
|
|
|
|
cma_deref_dev(cma_dev);
|
|
|
|
wait_for_completion(&cma_dev->comp);
|
|
|
|
}
|
|
|
|
|
2015-07-30 22:50:14 +08:00
|
|
|
static void cma_remove_one(struct ib_device *device, void *client_data)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2015-07-30 22:50:14 +08:00
|
|
|
struct cma_device *cma_dev = client_data;
|
2006-06-18 11:37:29 +08:00
|
|
|
|
|
|
|
if (!cma_dev)
|
|
|
|
return;
|
|
|
|
|
|
|
|
mutex_lock(&lock);
|
|
|
|
list_del(&cma_dev->list);
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
|
|
|
|
cma_process_remove(cma_dev);
|
2017-02-14 13:21:52 +08:00
|
|
|
kfree(cma_dev->default_roce_tos);
|
2015-12-23 20:56:55 +08:00
|
|
|
kfree(cma_dev->default_gid_type);
|
2006-06-18 11:37:29 +08:00
|
|
|
kfree(cma_dev);
|
|
|
|
}
|
|
|
|
|
2011-01-03 23:33:53 +08:00
|
|
|
static int cma_get_id_stats(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct rdma_cm_id_stats *id_stats;
|
|
|
|
struct rdma_id_private *id_priv;
|
|
|
|
struct rdma_cm_id *id = NULL;
|
|
|
|
struct cma_device *cma_dev;
|
|
|
|
int i_dev = 0, i_id = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We export all of the IDs as a sequence of messages. Each
|
|
|
|
* ID gets its own netlink message.
|
|
|
|
*/
|
|
|
|
mutex_lock(&lock);
|
|
|
|
|
|
|
|
list_for_each_entry(cma_dev, &dev_list, list) {
|
|
|
|
if (i_dev < cb->args[0]) {
|
|
|
|
i_dev++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
i_id = 0;
|
|
|
|
list_for_each_entry(id_priv, &cma_dev->id_list, list) {
|
|
|
|
if (i_id < cb->args[1]) {
|
|
|
|
i_id++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
id_stats = ibnl_put_msg(skb, &nlh, cb->nlh->nlmsg_seq,
|
|
|
|
sizeof *id_stats, RDMA_NL_RDMA_CM,
|
2014-03-27 06:07:35 +08:00
|
|
|
RDMA_NL_RDMA_CM_ID_STATS,
|
|
|
|
NLM_F_MULTI);
|
2011-01-03 23:33:53 +08:00
|
|
|
if (!id_stats)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
memset(id_stats, 0, sizeof *id_stats);
|
|
|
|
id = &id_priv->id;
|
|
|
|
id_stats->node_type = id->route.addr.dev_addr.dev_type;
|
|
|
|
id_stats->port_num = id->port_num;
|
|
|
|
id_stats->bound_dev_if =
|
|
|
|
id->route.addr.dev_addr.bound_dev_if;
|
|
|
|
|
2013-05-30 01:09:34 +08:00
|
|
|
if (ibnl_put_attr(skb, nlh,
|
|
|
|
rdma_addr_size(cma_src_addr(id_priv)),
|
|
|
|
cma_src_addr(id_priv),
|
|
|
|
RDMA_NL_RDMA_CM_ATTR_SRC_ADDR))
|
|
|
|
goto out;
|
|
|
|
if (ibnl_put_attr(skb, nlh,
|
2017-11-14 20:51:55 +08:00
|
|
|
rdma_addr_size(cma_dst_addr(id_priv)),
|
2013-05-30 01:09:34 +08:00
|
|
|
cma_dst_addr(id_priv),
|
|
|
|
RDMA_NL_RDMA_CM_ATTR_DST_ADDR))
|
|
|
|
goto out;
|
2011-01-03 23:33:53 +08:00
|
|
|
|
2018-03-02 05:57:44 +08:00
|
|
|
id_stats->pid = task_pid_vnr(id_priv->res.task);
|
2011-01-03 23:33:53 +08:00
|
|
|
id_stats->port_space = id->ps;
|
|
|
|
id_stats->cm_state = id_priv->state;
|
|
|
|
id_stats->qp_num = id_priv->qp_num;
|
|
|
|
id_stats->qp_type = id->qp_type;
|
|
|
|
|
|
|
|
i_id++;
|
2018-01-01 19:07:17 +08:00
|
|
|
nlmsg_end(skb, nlh);
|
2011-01-03 23:33:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
cb->args[1] = 0;
|
|
|
|
i_dev++;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&lock);
|
|
|
|
cb->args[0] = i_dev;
|
|
|
|
cb->args[1] = i_id;
|
|
|
|
|
|
|
|
return skb->len;
|
|
|
|
}
|
|
|
|
|
2017-12-06 04:30:04 +08:00
|
|
|
static const struct rdma_nl_cbs cma_cb_table[RDMA_NL_RDMA_CM_NUM_OPS] = {
|
2017-05-30 16:29:56 +08:00
|
|
|
[RDMA_NL_RDMA_CM_ID_STATS] = { .dump = cma_get_id_stats},
|
2011-01-03 23:33:53 +08:00
|
|
|
};
|
|
|
|
|
2015-10-22 20:20:09 +08:00
|
|
|
static int cma_init_net(struct net *net)
|
|
|
|
{
|
|
|
|
struct cma_pernet *pernet = cma_pernet(net);
|
|
|
|
|
|
|
|
idr_init(&pernet->tcp_ps);
|
|
|
|
idr_init(&pernet->udp_ps);
|
|
|
|
idr_init(&pernet->ipoib_ps);
|
|
|
|
idr_init(&pernet->ib_ps);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cma_exit_net(struct net *net)
|
|
|
|
{
|
|
|
|
struct cma_pernet *pernet = cma_pernet(net);
|
|
|
|
|
|
|
|
idr_destroy(&pernet->tcp_ps);
|
|
|
|
idr_destroy(&pernet->udp_ps);
|
|
|
|
idr_destroy(&pernet->ipoib_ps);
|
|
|
|
idr_destroy(&pernet->ib_ps);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct pernet_operations cma_pernet_operations = {
|
|
|
|
.init = cma_init_net,
|
|
|
|
.exit = cma_exit_net,
|
|
|
|
.id = &cma_pernet_id,
|
|
|
|
.size = sizeof(struct cma_pernet),
|
|
|
|
};
|
|
|
|
|
2009-06-24 01:38:42 +08:00
|
|
|
static int __init cma_init(void)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2010-04-15 10:29:04 +08:00
|
|
|
int ret;
|
2007-10-11 08:30:46 +08:00
|
|
|
|
2016-08-16 01:59:35 +08:00
|
|
|
cma_wq = alloc_ordered_workqueue("rdma_cm", WQ_MEM_RECLAIM);
|
2006-06-18 11:37:29 +08:00
|
|
|
if (!cma_wq)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2015-10-22 20:20:09 +08:00
|
|
|
ret = register_pernet_subsys(&cma_pernet_operations);
|
|
|
|
if (ret)
|
|
|
|
goto err_wq;
|
|
|
|
|
2006-08-22 07:40:12 +08:00
|
|
|
ib_sa_register_client(&sa_client);
|
2008-07-23 05:14:22 +08:00
|
|
|
register_netdevice_notifier(&cma_nb);
|
2006-08-22 07:40:12 +08:00
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
ret = ib_register_client(&cma_client);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2011-01-03 23:33:53 +08:00
|
|
|
|
2017-06-05 15:20:11 +08:00
|
|
|
rdma_nl_register(RDMA_NL_RDMA_CM, cma_cb_table);
|
2015-12-23 20:56:55 +08:00
|
|
|
cma_configfs_init();
|
2011-01-03 23:33:53 +08:00
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
err:
|
2008-07-23 05:14:22 +08:00
|
|
|
unregister_netdevice_notifier(&cma_nb);
|
2006-08-22 07:40:12 +08:00
|
|
|
ib_sa_unregister_client(&sa_client);
|
2015-10-22 20:20:09 +08:00
|
|
|
err_wq:
|
2006-06-18 11:37:29 +08:00
|
|
|
destroy_workqueue(cma_wq);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-06-24 01:38:42 +08:00
|
|
|
static void __exit cma_cleanup(void)
|
2006-06-18 11:37:29 +08:00
|
|
|
{
|
2015-12-23 20:56:55 +08:00
|
|
|
cma_configfs_exit();
|
2017-06-05 15:20:11 +08:00
|
|
|
rdma_nl_unregister(RDMA_NL_RDMA_CM);
|
2006-06-18 11:37:29 +08:00
|
|
|
ib_unregister_client(&cma_client);
|
2008-07-23 05:14:22 +08:00
|
|
|
unregister_netdevice_notifier(&cma_nb);
|
2006-08-22 07:40:12 +08:00
|
|
|
ib_sa_unregister_client(&sa_client);
|
2015-10-22 20:20:09 +08:00
|
|
|
unregister_pernet_subsys(&cma_pernet_operations);
|
2006-06-18 11:37:29 +08:00
|
|
|
destroy_workqueue(cma_wq);
|
|
|
|
}
|
|
|
|
|
2017-08-15 04:57:39 +08:00
|
|
|
MODULE_ALIAS_RDMA_NETLINK(RDMA_NL_RDMA_CM, 1);
|
|
|
|
|
2006-06-18 11:37:29 +08:00
|
|
|
module_init(cma_init);
|
|
|
|
module_exit(cma_cleanup);
|