]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - drivers/infiniband/core/cma.c
Merge tag 'kvm-x86-docs-6.7' of https://github.com/kvm-x86/linux into HEAD
[thirdparty/kernel/stable.git] / drivers / infiniband / core / cma.c
CommitLineData
24f52149 1// SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB
e51060f0
SH
2/*
3 * Copyright (c) 2005 Voltaire Inc. All rights reserved.
4 * Copyright (c) 2002-2005, Network Appliance, Inc. All rights reserved.
24f52149 5 * Copyright (c) 1999-2019, Mellanox Technologies, Inc. All rights reserved.
e51060f0 6 * Copyright (c) 2005-2006 Intel Corporation. All rights reserved.
e51060f0
SH
7 */
8
9#include <linux/completion.h>
10#include <linux/in.h>
11#include <linux/in6.h>
12#include <linux/mutex.h>
13#include <linux/random.h>
fc008bdb 14#include <linux/rbtree.h>
bee3c3c9 15#include <linux/igmp.h>
63826753 16#include <linux/xarray.h>
07ebafba 17#include <linux/inetdevice.h>
5a0e3ad6 18#include <linux/slab.h>
e4dd23d7 19#include <linux/module.h>
366cddb4 20#include <net/route.h>
e51060f0 21
4be74b42
HE
22#include <net/net_namespace.h>
23#include <net/netns/generic.h>
925d046e 24#include <net/netevent.h>
e51060f0 25#include <net/tcp.h>
1f5175ad 26#include <net/ipv6.h>
f887f2ac
HE
27#include <net/ip_fib.h>
28#include <net/ip6_route.h>
e51060f0
SH
29
30#include <rdma/rdma_cm.h>
31#include <rdma/rdma_cm_ib.h>
753f618a 32#include <rdma/rdma_netlink.h>
2e2d190c 33#include <rdma/ib.h>
e51060f0
SH
34#include <rdma/ib_cache.h>
35#include <rdma/ib_cm.h>
36#include <rdma/ib_sa.h>
07ebafba 37#include <rdma/iw_cm.h>
e51060f0 38
218a773f 39#include "core_priv.h"
a3b641af 40#include "cma_priv.h"
ed999f82 41#include "cma_trace.h"
218a773f 42
e51060f0
SH
43MODULE_AUTHOR("Sean Hefty");
44MODULE_DESCRIPTION("Generic RDMA CM Agent");
45MODULE_LICENSE("Dual BSD/GPL");
46
47#define CMA_CM_RESPONSE_TIMEOUT 20
d5bb7599 48#define CMA_MAX_CM_RETRIES 15
dcb3f974 49#define CMA_CM_MRA_SETTING (IB_CM_MRA_FLAG_DELAY | 24)
fb4907f4 50#define CMA_IBOE_PACKET_LIFETIME 16
5ab2d89b 51#define CMA_PREFERRED_ROCE_GID_TYPE IB_GID_TYPE_ROCE_UDP_ENCAP
e51060f0 52
2b1b5b60
SG
53static const char * const cma_events[] = {
54 [RDMA_CM_EVENT_ADDR_RESOLVED] = "address resolved",
55 [RDMA_CM_EVENT_ADDR_ERROR] = "address error",
56 [RDMA_CM_EVENT_ROUTE_RESOLVED] = "route resolved ",
57 [RDMA_CM_EVENT_ROUTE_ERROR] = "route error",
58 [RDMA_CM_EVENT_CONNECT_REQUEST] = "connect request",
59 [RDMA_CM_EVENT_CONNECT_RESPONSE] = "connect response",
60 [RDMA_CM_EVENT_CONNECT_ERROR] = "connect error",
61 [RDMA_CM_EVENT_UNREACHABLE] = "unreachable",
62 [RDMA_CM_EVENT_REJECTED] = "rejected",
63 [RDMA_CM_EVENT_ESTABLISHED] = "established",
64 [RDMA_CM_EVENT_DISCONNECTED] = "disconnected",
65 [RDMA_CM_EVENT_DEVICE_REMOVAL] = "device removal",
66 [RDMA_CM_EVENT_MULTICAST_JOIN] = "multicast join",
67 [RDMA_CM_EVENT_MULTICAST_ERROR] = "multicast error",
68 [RDMA_CM_EVENT_ADDR_CHANGE] = "address change",
69 [RDMA_CM_EVENT_TIMEWAIT_EXIT] = "timewait exit",
70};
71
d9e410eb
MG
72static void cma_iboe_set_mgid(struct sockaddr *addr, union ib_gid *mgid,
73 enum ib_gid_type gid_type);
b5de0c60 74
db7489e0 75const char *__attribute_const__ rdma_event_msg(enum rdma_cm_event_type event)
2b1b5b60
SG
76{
77 size_t index = event;
78
79 return (index < ARRAY_SIZE(cma_events) && cma_events[index]) ?
80 cma_events[index] : "unrecognized event";
81}
82EXPORT_SYMBOL(rdma_event_msg);
83
77a5db13
SW
84const char *__attribute_const__ rdma_reject_msg(struct rdma_cm_id *id,
85 int reason)
86{
87 if (rdma_ib_or_roce(id->device, id->port_num))
88 return ibcm_reject_msg(reason);
89
90 if (rdma_protocol_iwarp(id->device, id->port_num))
91 return iwcm_reject_msg(reason);
92
93 WARN_ON_ONCE(1);
94 return "unrecognized transport";
95}
96EXPORT_SYMBOL(rdma_reject_msg);
97
dd302ee4
LR
98/**
99 * rdma_is_consumer_reject - return true if the consumer rejected the connect
100 * request.
101 * @id: Communication identifier that received the REJECT event.
102 * @reason: Value returned in the REJECT event status field.
103 */
104static bool rdma_is_consumer_reject(struct rdma_cm_id *id, int reason)
5042a73d
SW
105{
106 if (rdma_ib_or_roce(id->device, id->port_num))
107 return reason == IB_CM_REJ_CONSUMER_DEFINED;
108
109 if (rdma_protocol_iwarp(id->device, id->port_num))
110 return reason == -ECONNREFUSED;
111
112 WARN_ON_ONCE(1);
113 return false;
114}
5042a73d 115
5f244104
SW
116const void *rdma_consumer_reject_data(struct rdma_cm_id *id,
117 struct rdma_cm_event *ev, u8 *data_len)
118{
119 const void *p;
120
121 if (rdma_is_consumer_reject(id, ev->status)) {
122 *data_len = ev->param.conn.private_data_len;
123 p = ev->param.conn.private_data;
124 } else {
125 *data_len = 0;
126 p = NULL;
127 }
128 return p;
129}
130EXPORT_SYMBOL(rdma_consumer_reject_data);
131
fbdb0a91
SW
132/**
133 * rdma_iw_cm_id() - return the iw_cm_id pointer for this cm_id.
134 * @id: Communication Identifier
135 */
136struct iw_cm_id *rdma_iw_cm_id(struct rdma_cm_id *id)
137{
138 struct rdma_id_private *id_priv;
139
140 id_priv = container_of(id, struct rdma_id_private, id);
141 if (id->device->node_type == RDMA_NODE_RNIC)
142 return id_priv->cm_id.iw;
143 return NULL;
144}
145EXPORT_SYMBOL(rdma_iw_cm_id);
146
147/**
148 * rdma_res_to_id() - return the rdma_cm_id pointer for this restrack.
149 * @res: rdma resource tracking entry pointer
150 */
151struct rdma_cm_id *rdma_res_to_id(struct rdma_restrack_entry *res)
152{
153 struct rdma_id_private *id_priv =
154 container_of(res, struct rdma_id_private, res);
155
156 return &id_priv->id;
157}
158EXPORT_SYMBOL(rdma_res_to_id);
159
11a0ae4c 160static int cma_add_one(struct ib_device *device);
7c1eb45a 161static void cma_remove_one(struct ib_device *device, void *client_data);
e51060f0
SH
162
163static struct ib_client cma_client = {
164 .name = "cma",
165 .add = cma_add_one,
166 .remove = cma_remove_one
167};
168
c1a0b23b 169static struct ib_sa_client sa_client;
e51060f0
SH
170static LIST_HEAD(dev_list);
171static LIST_HEAD(listen_any_list);
172static DEFINE_MUTEX(lock);
fc008bdb
PH
173static struct rb_root id_table = RB_ROOT;
174/* Serialize operations of id_table tree */
175static DEFINE_SPINLOCK(id_table_lock);
e51060f0 176static struct workqueue_struct *cma_wq;
c7d03a00 177static unsigned int cma_pernet_id;
e51060f0 178
4be74b42 179struct cma_pernet {
63826753
MW
180 struct xarray tcp_ps;
181 struct xarray udp_ps;
182 struct xarray ipoib_ps;
183 struct xarray ib_ps;
4be74b42
HE
184};
185
186static struct cma_pernet *cma_pernet(struct net *net)
187{
188 return net_generic(net, cma_pernet_id);
189}
190
63826753
MW
191static
192struct xarray *cma_pernet_xa(struct net *net, enum rdma_ucm_port_space ps)
aac978e1 193{
4be74b42
HE
194 struct cma_pernet *pernet = cma_pernet(net);
195
aac978e1
HE
196 switch (ps) {
197 case RDMA_PS_TCP:
4be74b42 198 return &pernet->tcp_ps;
aac978e1 199 case RDMA_PS_UDP:
4be74b42 200 return &pernet->udp_ps;
aac978e1 201 case RDMA_PS_IPOIB:
4be74b42 202 return &pernet->ipoib_ps;
aac978e1 203 case RDMA_PS_IB:
4be74b42 204 return &pernet->ib_ps;
aac978e1
HE
205 default:
206 return NULL;
207 }
208}
209
fc008bdb
PH
210struct id_table_entry {
211 struct list_head id_list;
212 struct rb_node rb_node;
213};
214
e51060f0
SH
215struct cma_device {
216 struct list_head list;
217 struct ib_device *device;
e51060f0 218 struct completion comp;
be439912 219 refcount_t refcount;
e51060f0 220 struct list_head id_list;
045959db 221 enum ib_gid_type *default_gid_type;
89052d78 222 u8 *default_roce_tos;
e51060f0
SH
223};
224
e51060f0 225struct rdma_bind_list {
2253fc0c 226 enum rdma_ucm_port_space ps;
e51060f0
SH
227 struct hlist_head owners;
228 unsigned short port;
229};
230
2253fc0c 231static int cma_ps_alloc(struct net *net, enum rdma_ucm_port_space ps,
aac978e1
HE
232 struct rdma_bind_list *bind_list, int snum)
233{
63826753 234 struct xarray *xa = cma_pernet_xa(net, ps);
aac978e1 235
63826753 236 return xa_insert(xa, snum, bind_list, GFP_KERNEL);
aac978e1
HE
237}
238
4be74b42 239static struct rdma_bind_list *cma_ps_find(struct net *net,
2253fc0c 240 enum rdma_ucm_port_space ps, int snum)
aac978e1 241{
63826753 242 struct xarray *xa = cma_pernet_xa(net, ps);
aac978e1 243
63826753 244 return xa_load(xa, snum);
aac978e1
HE
245}
246
2253fc0c
SW
247static void cma_ps_remove(struct net *net, enum rdma_ucm_port_space ps,
248 int snum)
aac978e1 249{
63826753 250 struct xarray *xa = cma_pernet_xa(net, ps);
aac978e1 251
63826753 252 xa_erase(xa, snum);
aac978e1
HE
253}
254
68602120
SH
255enum {
256 CMA_OPTION_AFONLY,
257};
258
5ff8c8fa 259void cma_dev_get(struct cma_device *cma_dev)
218a773f 260{
be439912 261 refcount_inc(&cma_dev->refcount);
218a773f
MB
262}
263
5ff8c8fa
PP
264void cma_dev_put(struct cma_device *cma_dev)
265{
be439912 266 if (refcount_dec_and_test(&cma_dev->refcount))
5ff8c8fa
PP
267 complete(&cma_dev->comp);
268}
269
045959db
MB
270struct cma_device *cma_enum_devices_by_ibdev(cma_device_filter filter,
271 void *cookie)
272{
273 struct cma_device *cma_dev;
274 struct cma_device *found_cma_dev = NULL;
275
276 mutex_lock(&lock);
277
278 list_for_each_entry(cma_dev, &dev_list, list)
279 if (filter(cma_dev->device, cookie)) {
280 found_cma_dev = cma_dev;
281 break;
282 }
283
284 if (found_cma_dev)
5ff8c8fa 285 cma_dev_get(found_cma_dev);
045959db
MB
286 mutex_unlock(&lock);
287 return found_cma_dev;
288}
289
290int cma_get_default_gid_type(struct cma_device *cma_dev,
1fb7f897 291 u32 port)
045959db 292{
24dc831b 293 if (!rdma_is_port_valid(cma_dev->device, port))
045959db
MB
294 return -EINVAL;
295
296 return cma_dev->default_gid_type[port - rdma_start_port(cma_dev->device)];
297}
298
299int cma_set_default_gid_type(struct cma_device *cma_dev,
1fb7f897 300 u32 port,
045959db
MB
301 enum ib_gid_type default_gid_type)
302{
303 unsigned long supported_gids;
304
24dc831b 305 if (!rdma_is_port_valid(cma_dev->device, port))
045959db
MB
306 return -EINVAL;
307
1c15b4f2
AH
308 if (default_gid_type == IB_GID_TYPE_IB &&
309 rdma_protocol_roce_eth_encap(cma_dev->device, port))
310 default_gid_type = IB_GID_TYPE_ROCE;
311
045959db
MB
312 supported_gids = roce_gid_type_mask_support(cma_dev->device, port);
313
314 if (!(supported_gids & 1 << default_gid_type))
315 return -EINVAL;
316
317 cma_dev->default_gid_type[port - rdma_start_port(cma_dev->device)] =
318 default_gid_type;
319
320 return 0;
321}
322
1fb7f897 323int cma_get_default_roce_tos(struct cma_device *cma_dev, u32 port)
89052d78
MD
324{
325 if (!rdma_is_port_valid(cma_dev->device, port))
326 return -EINVAL;
327
328 return cma_dev->default_roce_tos[port - rdma_start_port(cma_dev->device)];
329}
330
1fb7f897 331int cma_set_default_roce_tos(struct cma_device *cma_dev, u32 port,
89052d78
MD
332 u8 default_roce_tos)
333{
334 if (!rdma_is_port_valid(cma_dev->device, port))
335 return -EINVAL;
336
337 cma_dev->default_roce_tos[port - rdma_start_port(cma_dev->device)] =
338 default_roce_tos;
339
340 return 0;
341}
045959db
MB
342struct ib_device *cma_get_ib_dev(struct cma_device *cma_dev)
343{
344 return cma_dev->device;
345}
346
e51060f0
SH
347/*
348 * Device removal can occur at anytime, so we need extra handling to
349 * serialize notifying the user of device removal with other callbacks.
350 * We do this by disabling removal notification while a callback is in process,
351 * and reporting it after the callback completes.
352 */
e51060f0 353
c8f6a362
SH
354struct cma_multicast {
355 struct rdma_id_private *id_priv;
fe454dc3
AH
356 union {
357 struct ib_sa_multicast *sa_mc;
358 struct {
359 struct work_struct work;
360 struct rdma_cm_event event;
361 } iboe_join;
362 };
c8f6a362
SH
363 struct list_head list;
364 void *context;
3f446754 365 struct sockaddr_storage addr;
ab15c95a 366 u8 join_state;
c8f6a362
SH
367};
368
e51060f0
SH
369struct cma_work {
370 struct work_struct work;
371 struct rdma_id_private *id;
550e5ca7
NM
372 enum rdma_cm_state old_state;
373 enum rdma_cm_state new_state;
e51060f0
SH
374 struct rdma_cm_event event;
375};
376
377union cma_ip_addr {
378 struct in6_addr ip6;
379 struct {
1b90c137
AV
380 __be32 pad[3];
381 __be32 addr;
e51060f0
SH
382 } ip4;
383};
384
385struct cma_hdr {
386 u8 cma_version;
387 u8 ip_version; /* IP version: 7:4 */
1b90c137 388 __be16 port;
e51060f0
SH
389 union cma_ip_addr src_addr;
390 union cma_ip_addr dst_addr;
391};
392
e51060f0 393#define CMA_VERSION 0x00
e51060f0 394
4c21b5bc 395struct cma_req_info {
2918c1a9
PP
396 struct sockaddr_storage listen_addr_storage;
397 struct sockaddr_storage src_addr_storage;
4c21b5bc 398 struct ib_device *device;
4c21b5bc
HE
399 union ib_gid local_gid;
400 __be64 service_id;
05e0b86c
PP
401 int port;
402 bool has_gid;
4c21b5bc 403 u16 pkey;
4c21b5bc
HE
404};
405
e51060f0 406static int cma_comp_exch(struct rdma_id_private *id_priv,
550e5ca7 407 enum rdma_cm_state comp, enum rdma_cm_state exch)
e51060f0
SH
408{
409 unsigned long flags;
410 int ret;
411
2a7cec53
JG
412 /*
413 * The FSM uses a funny double locking where state is protected by both
414 * the handler_mutex and the spinlock. State is not allowed to change
071ba4cc 415 * to/from a handler_mutex protected value without also holding
2a7cec53
JG
416 * handler_mutex.
417 */
071ba4cc 418 if (comp == RDMA_CM_CONNECT || exch == RDMA_CM_CONNECT)
2a7cec53
JG
419 lockdep_assert_held(&id_priv->handler_mutex);
420
e51060f0
SH
421 spin_lock_irqsave(&id_priv->lock, flags);
422 if ((ret = (id_priv->state == comp)))
423 id_priv->state = exch;
424 spin_unlock_irqrestore(&id_priv->lock, flags);
425 return ret;
426}
427
4c21b5bc 428static inline u8 cma_get_ip_ver(const struct cma_hdr *hdr)
e51060f0
SH
429{
430 return hdr->ip_version >> 4;
431}
432
fc008bdb 433static void cma_set_ip_ver(struct cma_hdr *hdr, u8 ip_ver)
e51060f0
SH
434{
435 hdr->ip_version = (ip_ver << 4) | (hdr->ip_version & 0xF);
436}
437
fc008bdb
PH
438static struct sockaddr *cma_src_addr(struct rdma_id_private *id_priv)
439{
440 return (struct sockaddr *)&id_priv->id.route.addr.src_addr;
441}
442
443static inline struct sockaddr *cma_dst_addr(struct rdma_id_private *id_priv)
444{
445 return (struct sockaddr *)&id_priv->id.route.addr.dst_addr;
446}
447
bee3c3c9 448static int cma_igmp_send(struct net_device *ndev, union ib_gid *mgid, bool join)
e51060f0 449{
bee3c3c9
MS
450 struct in_device *in_dev = NULL;
451
452 if (ndev) {
453 rtnl_lock();
454 in_dev = __in_dev_get_rtnl(ndev);
455 if (in_dev) {
456 if (join)
457 ip_mc_inc_group(in_dev,
458 *(__be32 *)(mgid->raw + 12));
459 else
460 ip_mc_dec_group(in_dev,
461 *(__be32 *)(mgid->raw + 12));
462 }
463 rtnl_unlock();
464 }
465 return (in_dev) ? 0 : -ENODEV;
466}
467
fc008bdb
PH
468static int compare_netdev_and_ip(int ifindex_a, struct sockaddr *sa,
469 struct id_table_entry *entry_b)
470{
471 struct rdma_id_private *id_priv = list_first_entry(
472 &entry_b->id_list, struct rdma_id_private, id_list_entry);
473 int ifindex_b = id_priv->id.route.addr.dev_addr.bound_dev_if;
474 struct sockaddr *sb = cma_dst_addr(id_priv);
475
476 if (ifindex_a != ifindex_b)
477 return (ifindex_a > ifindex_b) ? 1 : -1;
478
479 if (sa->sa_family != sb->sa_family)
480 return sa->sa_family - sb->sa_family;
481
876e480d
KC
482 if (sa->sa_family == AF_INET &&
483 __builtin_object_size(sa, 0) >= sizeof(struct sockaddr_in)) {
484 return memcmp(&((struct sockaddr_in *)sa)->sin_addr,
485 &((struct sockaddr_in *)sb)->sin_addr,
fc008bdb 486 sizeof(((struct sockaddr_in *)sa)->sin_addr));
876e480d
KC
487 }
488
489 if (sa->sa_family == AF_INET6 &&
490 __builtin_object_size(sa, 0) >= sizeof(struct sockaddr_in6)) {
491 return ipv6_addr_cmp(&((struct sockaddr_in6 *)sa)->sin6_addr,
492 &((struct sockaddr_in6 *)sb)->sin6_addr);
493 }
fc008bdb 494
876e480d 495 return -1;
fc008bdb
PH
496}
497
498static int cma_add_id_to_tree(struct rdma_id_private *node_id_priv)
499{
500 struct rb_node **new, *parent = NULL;
501 struct id_table_entry *this, *node;
502 unsigned long flags;
503 int result;
504
505 node = kzalloc(sizeof(*node), GFP_KERNEL);
506 if (!node)
507 return -ENOMEM;
508
509 spin_lock_irqsave(&id_table_lock, flags);
510 new = &id_table.rb_node;
511 while (*new) {
512 this = container_of(*new, struct id_table_entry, rb_node);
513 result = compare_netdev_and_ip(
514 node_id_priv->id.route.addr.dev_addr.bound_dev_if,
515 cma_dst_addr(node_id_priv), this);
516
517 parent = *new;
518 if (result < 0)
519 new = &((*new)->rb_left);
520 else if (result > 0)
521 new = &((*new)->rb_right);
522 else {
523 list_add_tail(&node_id_priv->id_list_entry,
524 &this->id_list);
525 kfree(node);
526 goto unlock;
527 }
528 }
529
530 INIT_LIST_HEAD(&node->id_list);
531 list_add_tail(&node_id_priv->id_list_entry, &node->id_list);
532
533 rb_link_node(&node->rb_node, parent, new);
534 rb_insert_color(&node->rb_node, &id_table);
535
536unlock:
537 spin_unlock_irqrestore(&id_table_lock, flags);
538 return 0;
539}
540
541static struct id_table_entry *
542node_from_ndev_ip(struct rb_root *root, int ifindex, struct sockaddr *sa)
543{
544 struct rb_node *node = root->rb_node;
545 struct id_table_entry *data;
546 int result;
547
548 while (node) {
549 data = container_of(node, struct id_table_entry, rb_node);
550 result = compare_netdev_and_ip(ifindex, sa, data);
551 if (result < 0)
552 node = node->rb_left;
553 else if (result > 0)
554 node = node->rb_right;
555 else
556 return data;
557 }
558
559 return NULL;
560}
561
562static void cma_remove_id_from_tree(struct rdma_id_private *id_priv)
563{
564 struct id_table_entry *data;
565 unsigned long flags;
566
567 spin_lock_irqsave(&id_table_lock, flags);
568 if (list_empty(&id_priv->id_list_entry))
569 goto out;
570
571 data = node_from_ndev_ip(&id_table,
572 id_priv->id.route.addr.dev_addr.bound_dev_if,
573 cma_dst_addr(id_priv));
574 if (!data)
575 goto out;
576
577 list_del_init(&id_priv->id_list_entry);
578 if (list_empty(&data->id_list)) {
579 rb_erase(&data->rb_node, &id_table);
580 kfree(data);
581 }
582out:
583 spin_unlock_irqrestore(&id_table_lock, flags);
584}
585
045959db
MB
586static void _cma_attach_to_dev(struct rdma_id_private *id_priv,
587 struct cma_device *cma_dev)
e51060f0 588{
5ff8c8fa 589 cma_dev_get(cma_dev);
e51060f0
SH
590 id_priv->cma_dev = cma_dev;
591 id_priv->id.device = cma_dev->device;
3c86aa70
EC
592 id_priv->id.route.addr.dev_addr.transport =
593 rdma_node_get_transport(cma_dev->device->node_type);
99cfddb8 594 list_add_tail(&id_priv->device_item, &cma_dev->id_list);
b09c4d70 595
278f74b3 596 trace_cm_id_attach(id_priv, cma_dev->device);
e51060f0
SH
597}
598
045959db
MB
599static void cma_attach_to_dev(struct rdma_id_private *id_priv,
600 struct cma_device *cma_dev)
601{
602 _cma_attach_to_dev(id_priv, cma_dev);
603 id_priv->gid_type =
604 cma_dev->default_gid_type[id_priv->id.port_num -
605 rdma_start_port(cma_dev->device)];
606}
607
a396d43a 608static void cma_release_dev(struct rdma_id_private *id_priv)
e51060f0 609{
a396d43a 610 mutex_lock(&lock);
99cfddb8 611 list_del_init(&id_priv->device_item);
5ff8c8fa 612 cma_dev_put(id_priv->cma_dev);
e51060f0 613 id_priv->cma_dev = NULL;
889d916b 614 id_priv->id.device = NULL;
e246b7c0
LR
615 if (id_priv->id.route.addr.dev_addr.sgid_attr) {
616 rdma_put_gid_attr(id_priv->id.route.addr.dev_addr.sgid_attr);
617 id_priv->id.route.addr.dev_addr.sgid_attr = NULL;
618 }
a396d43a 619 mutex_unlock(&lock);
e51060f0
SH
620}
621
f4753834
SH
622static inline unsigned short cma_family(struct rdma_id_private *id_priv)
623{
624 return id_priv->id.route.addr.src_addr.ss_family;
625}
626
58e84f6b 627static int cma_set_default_qkey(struct rdma_id_private *id_priv)
c8f6a362
SH
628{
629 struct ib_sa_mcmember_rec rec;
630 int ret = 0;
631
d2ca39f2 632 switch (id_priv->id.ps) {
c8f6a362 633 case RDMA_PS_UDP:
5c438135 634 case RDMA_PS_IB:
d2ca39f2 635 id_priv->qkey = RDMA_UDP_QKEY;
c8f6a362
SH
636 break;
637 case RDMA_PS_IPOIB:
d2ca39f2
YE
638 ib_addr_get_mgid(&id_priv->id.route.addr.dev_addr, &rec.mgid);
639 ret = ib_sa_get_mcmember_rec(id_priv->id.device,
640 id_priv->id.port_num, &rec.mgid,
641 &rec);
642 if (!ret)
643 id_priv->qkey = be32_to_cpu(rec.qkey);
c8f6a362
SH
644 break;
645 default:
646 break;
647 }
648 return ret;
649}
650
58e84f6b
MZ
651static int cma_set_qkey(struct rdma_id_private *id_priv, u32 qkey)
652{
653 if (!qkey ||
654 (id_priv->qkey && (id_priv->qkey != qkey)))
655 return -EINVAL;
656
657 id_priv->qkey = qkey;
658 return 0;
659}
660
680f920a
SH
661static void cma_translate_ib(struct sockaddr_ib *sib, struct rdma_dev_addr *dev_addr)
662{
663 dev_addr->dev_type = ARPHRD_INFINIBAND;
664 rdma_addr_set_sgid(dev_addr, (union ib_gid *) &sib->sib_addr);
665 ib_addr_set_pkey(dev_addr, ntohs(sib->sib_pkey));
666}
667
668static int cma_translate_addr(struct sockaddr *addr, struct rdma_dev_addr *dev_addr)
669{
670 int ret;
671
672 if (addr->sa_family != AF_IB) {
575c7e58 673 ret = rdma_translate_ip(addr, dev_addr);
680f920a
SH
674 } else {
675 cma_translate_ib((struct sockaddr_ib *) addr, dev_addr);
676 ret = 0;
677 }
678
679 return ret;
680}
681
4ed13a5f 682static const struct ib_gid_attr *
1fb7f897 683cma_validate_port(struct ib_device *device, u32 port,
4ed13a5f
PP
684 enum ib_gid_type gid_type,
685 union ib_gid *gid,
686 struct rdma_id_private *id_priv)
7c11147d 687{
2493a57b 688 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
700c9649 689 const struct ib_gid_attr *sgid_attr = ERR_PTR(-ENODEV);
2493a57b
PP
690 int bound_if_index = dev_addr->bound_dev_if;
691 int dev_type = dev_addr->dev_type;
abae1b71 692 struct net_device *ndev = NULL;
7c11147d 693
41c61401 694 if (!rdma_dev_access_netns(device, id_priv->id.route.addr.dev_addr.net))
700c9649 695 goto out;
41c61401 696
7c11147d 697 if ((dev_type == ARPHRD_INFINIBAND) && !rdma_protocol_ib(device, port))
700c9649 698 goto out;
7c11147d
MW
699
700 if ((dev_type != ARPHRD_INFINIBAND) && rdma_protocol_ib(device, port))
700c9649 701 goto out;
7c11147d 702
f8ef1be8
CL
703 /*
704 * For drivers that do not associate more than one net device with
705 * their gid tables, such as iWARP drivers, it is sufficient to
706 * return the first table entry.
707 *
708 * Other driver classes might be included in the future.
709 */
710 if (rdma_protocol_iwarp(device, port)) {
711 sgid_attr = rdma_get_gid_attr(device, port, 0);
712 if (IS_ERR(sgid_attr))
713 goto out;
714
715 rcu_read_lock();
716 ndev = rcu_dereference(sgid_attr->ndev);
717 if (!net_eq(dev_net(ndev), dev_addr->net) ||
718 ndev->ifindex != bound_if_index)
719 sgid_attr = ERR_PTR(-ENODEV);
720 rcu_read_unlock();
721 goto out;
722 }
7c11147d 723
00db63c1 724 if (dev_type == ARPHRD_ETHER && rdma_protocol_roce(device, port)) {
66c74d74 725 ndev = dev_get_by_index(dev_addr->net, bound_if_index);
00db63c1 726 if (!ndev)
700c9649 727 goto out;
00db63c1 728 } else {
045959db 729 gid_type = IB_GID_TYPE_IB;
00db63c1 730 }
abae1b71 731
4ed13a5f 732 sgid_attr = rdma_find_gid_by_port(device, gid, gid_type, port, ndev);
08ebf57f 733 dev_put(ndev);
700c9649 734out:
4ed13a5f
PP
735 return sgid_attr;
736}
7c11147d 737
4ed13a5f
PP
738static void cma_bind_sgid_attr(struct rdma_id_private *id_priv,
739 const struct ib_gid_attr *sgid_attr)
740{
741 WARN_ON(id_priv->id.route.addr.dev_addr.sgid_attr);
742 id_priv->id.route.addr.dev_addr.sgid_attr = sgid_attr;
7c11147d
MW
743}
744
ff11c6cd
PP
745/**
746 * cma_acquire_dev_by_src_ip - Acquire cma device, port, gid attribute
747 * based on source ip address.
748 * @id_priv: cm_id which should be bound to cma device
749 *
750 * cma_acquire_dev_by_src_ip() binds cm id to cma device, port and GID attribute
751 * based on source IP address. It returns 0 on success or error code otherwise.
752 * It is applicable to active and passive side cm_id.
753 */
754static int cma_acquire_dev_by_src_ip(struct rdma_id_private *id_priv)
755{
756 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
757 const struct ib_gid_attr *sgid_attr;
758 union ib_gid gid, iboe_gid, *gidp;
759 struct cma_device *cma_dev;
760 enum ib_gid_type gid_type;
761 int ret = -ENODEV;
1fb7f897 762 u32 port;
ff11c6cd
PP
763
764 if (dev_addr->dev_type != ARPHRD_INFINIBAND &&
765 id_priv->id.ps == RDMA_PS_IPOIB)
766 return -EINVAL;
767
768 rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.src_addr,
769 &iboe_gid);
770
771 memcpy(&gid, dev_addr->src_dev_addr +
772 rdma_addr_gid_offset(dev_addr), sizeof(gid));
773
774 mutex_lock(&lock);
775 list_for_each_entry(cma_dev, &dev_list, list) {
ea1075ed 776 rdma_for_each_port (cma_dev->device, port) {
ff11c6cd
PP
777 gidp = rdma_protocol_roce(cma_dev->device, port) ?
778 &iboe_gid : &gid;
779 gid_type = cma_dev->default_gid_type[port - 1];
780 sgid_attr = cma_validate_port(cma_dev->device, port,
781 gid_type, gidp, id_priv);
782 if (!IS_ERR(sgid_attr)) {
783 id_priv->id.port_num = port;
784 cma_bind_sgid_attr(id_priv, sgid_attr);
785 cma_attach_to_dev(id_priv, cma_dev);
786 ret = 0;
787 goto out;
788 }
789 }
790 }
791out:
792 mutex_unlock(&lock);
793 return ret;
794}
795
41ab1cb7
PP
796/**
797 * cma_ib_acquire_dev - Acquire cma device, port and SGID attribute
798 * @id_priv: cm id to bind to cma device
799 * @listen_id_priv: listener cm id to match against
800 * @req: Pointer to req structure containaining incoming
801 * request information
802 * cma_ib_acquire_dev() acquires cma device, port and SGID attribute when
803 * rdma device matches for listen_id and incoming request. It also verifies
804 * that a GID table entry is present for the source address.
805 * Returns 0 on success, or returns error code otherwise.
806 */
807static int cma_ib_acquire_dev(struct rdma_id_private *id_priv,
808 const struct rdma_id_private *listen_id_priv,
809 struct cma_req_info *req)
810{
811 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
812 const struct ib_gid_attr *sgid_attr;
813 enum ib_gid_type gid_type;
814 union ib_gid gid;
815
816 if (dev_addr->dev_type != ARPHRD_INFINIBAND &&
817 id_priv->id.ps == RDMA_PS_IPOIB)
818 return -EINVAL;
819
820 if (rdma_protocol_roce(req->device, req->port))
821 rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.src_addr,
822 &gid);
823 else
824 memcpy(&gid, dev_addr->src_dev_addr +
825 rdma_addr_gid_offset(dev_addr), sizeof(gid));
826
827 gid_type = listen_id_priv->cma_dev->default_gid_type[req->port - 1];
828 sgid_attr = cma_validate_port(req->device, req->port,
829 gid_type, &gid, id_priv);
830 if (IS_ERR(sgid_attr))
831 return PTR_ERR(sgid_attr);
832
833 id_priv->id.port_num = req->port;
834 cma_bind_sgid_attr(id_priv, sgid_attr);
835 /* Need to acquire lock to protect against reader
836 * of cma_dev->id_list such as cma_netdev_callback() and
837 * cma_process_remove().
838 */
839 mutex_lock(&lock);
840 cma_attach_to_dev(id_priv, listen_id_priv->cma_dev);
841 mutex_unlock(&lock);
cb5cd0ea 842 rdma_restrack_add(&id_priv->res);
41ab1cb7
PP
843 return 0;
844}
845
846static int cma_iw_acquire_dev(struct rdma_id_private *id_priv,
847 const struct rdma_id_private *listen_id_priv)
e51060f0 848{
c8f6a362 849 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
4ed13a5f 850 const struct ib_gid_attr *sgid_attr;
e51060f0 851 struct cma_device *cma_dev;
4ed13a5f 852 enum ib_gid_type gid_type;
e51060f0 853 int ret = -ENODEV;
41ab1cb7 854 union ib_gid gid;
1fb7f897 855 u32 port;
e51060f0 856
7c11147d 857 if (dev_addr->dev_type != ARPHRD_INFINIBAND &&
2efdd6a0
MS
858 id_priv->id.ps == RDMA_PS_IPOIB)
859 return -EINVAL;
860
3c86aa70 861 memcpy(&gid, dev_addr->src_dev_addr +
41ab1cb7
PP
862 rdma_addr_gid_offset(dev_addr), sizeof(gid));
863
864 mutex_lock(&lock);
7c11147d 865
ff11c6cd
PP
866 cma_dev = listen_id_priv->cma_dev;
867 port = listen_id_priv->id.port_num;
ff11c6cd
PP
868 gid_type = listen_id_priv->gid_type;
869 sgid_attr = cma_validate_port(cma_dev->device, port,
41ab1cb7 870 gid_type, &gid, id_priv);
ff11c6cd
PP
871 if (!IS_ERR(sgid_attr)) {
872 id_priv->id.port_num = port;
873 cma_bind_sgid_attr(id_priv, sgid_attr);
874 ret = 0;
875 goto out;
be9130cc 876 }
7c11147d 877
e51060f0 878 list_for_each_entry(cma_dev, &dev_list, list) {
cc055dd3 879 rdma_for_each_port (cma_dev->device, port) {
ff11c6cd 880 if (listen_id_priv->cma_dev == cma_dev &&
be9130cc
DL
881 listen_id_priv->id.port_num == port)
882 continue;
7c11147d 883
79d684f0 884 gid_type = cma_dev->default_gid_type[port - 1];
4ed13a5f 885 sgid_attr = cma_validate_port(cma_dev->device, port,
41ab1cb7 886 gid_type, &gid, id_priv);
4ed13a5f 887 if (!IS_ERR(sgid_attr)) {
7c11147d 888 id_priv->id.port_num = port;
4ed13a5f
PP
889 cma_bind_sgid_attr(id_priv, sgid_attr);
890 ret = 0;
7c11147d 891 goto out;
3c86aa70 892 }
e51060f0
SH
893 }
894 }
3c86aa70
EC
895
896out:
cb5cd0ea 897 if (!ret) {
3c86aa70 898 cma_attach_to_dev(id_priv, cma_dev);
cb5cd0ea
SD
899 rdma_restrack_add(&id_priv->res);
900 }
3c86aa70 901
a396d43a 902 mutex_unlock(&lock);
e51060f0
SH
903 return ret;
904}
905
f17df3b0
SH
906/*
907 * Select the source IB device and address to reach the destination IB address.
908 */
909static int cma_resolve_ib_dev(struct rdma_id_private *id_priv)
910{
911 struct cma_device *cma_dev, *cur_dev;
912 struct sockaddr_ib *addr;
913 union ib_gid gid, sgid, *dgid;
cc055dd3 914 unsigned int p;
f17df3b0 915 u16 pkey, index;
93b1f29d 916 enum ib_port_state port_state;
20679094 917 int ret;
f17df3b0
SH
918 int i;
919
920 cma_dev = NULL;
921 addr = (struct sockaddr_ib *) cma_dst_addr(id_priv);
922 dgid = (union ib_gid *) &addr->sib_addr;
923 pkey = ntohs(addr->sib_pkey);
924
954a8e3a 925 mutex_lock(&lock);
f17df3b0 926 list_for_each_entry(cur_dev, &dev_list, list) {
cc055dd3 927 rdma_for_each_port (cur_dev->device, p) {
30a74ef4 928 if (!rdma_cap_af_ib(cur_dev->device, p))
fef60902
MW
929 continue;
930
f17df3b0
SH
931 if (ib_find_cached_pkey(cur_dev->device, p, pkey, &index))
932 continue;
933
93b1f29d
JW
934 if (ib_get_cached_port_state(cur_dev->device, p, &port_state))
935 continue;
20679094
AH
936
937 for (i = 0; i < cur_dev->device->port_data[p].immutable.gid_tbl_len;
938 ++i) {
939 ret = rdma_query_gid(cur_dev->device, p, i,
940 &gid);
941 if (ret)
942 continue;
943
f17df3b0
SH
944 if (!memcmp(&gid, dgid, sizeof(gid))) {
945 cma_dev = cur_dev;
946 sgid = gid;
8fb488d7 947 id_priv->id.port_num = p;
f17df3b0
SH
948 goto found;
949 }
950
951 if (!cma_dev && (gid.global.subnet_prefix ==
93b1f29d
JW
952 dgid->global.subnet_prefix) &&
953 port_state == IB_PORT_ACTIVE) {
f17df3b0
SH
954 cma_dev = cur_dev;
955 sgid = gid;
8fb488d7 956 id_priv->id.port_num = p;
954a8e3a 957 goto found;
f17df3b0
SH
958 }
959 }
960 }
961 }
954a8e3a
PP
962 mutex_unlock(&lock);
963 return -ENODEV;
f17df3b0
SH
964
965found:
966 cma_attach_to_dev(id_priv, cma_dev);
cb5cd0ea 967 rdma_restrack_add(&id_priv->res);
954a8e3a
PP
968 mutex_unlock(&lock);
969 addr = (struct sockaddr_ib *)cma_src_addr(id_priv);
970 memcpy(&addr->sib_addr, &sgid, sizeof(sgid));
f17df3b0
SH
971 cma_translate_ib(addr, &id_priv->id.route.addr.dev_addr);
972 return 0;
973}
974
e368d23f
PP
975static void cma_id_get(struct rdma_id_private *id_priv)
976{
43fb5892 977 refcount_inc(&id_priv->refcount);
e368d23f
PP
978}
979
980static void cma_id_put(struct rdma_id_private *id_priv)
e51060f0 981{
43fb5892 982 if (refcount_dec_and_test(&id_priv->refcount))
e51060f0
SH
983 complete(&id_priv->comp);
984}
985
b09c4d70
LR
986static struct rdma_id_private *
987__rdma_create_id(struct net *net, rdma_cm_event_handler event_handler,
988 void *context, enum rdma_ucm_port_space ps,
989 enum ib_qp_type qp_type, const struct rdma_id_private *parent)
e51060f0
SH
990{
991 struct rdma_id_private *id_priv;
992
993 id_priv = kzalloc(sizeof *id_priv, GFP_KERNEL);
994 if (!id_priv)
995 return ERR_PTR(-ENOMEM);
996
550e5ca7 997 id_priv->state = RDMA_CM_IDLE;
e51060f0
SH
998 id_priv->id.context = context;
999 id_priv->id.event_handler = event_handler;
1000 id_priv->id.ps = ps;
b26f9b99 1001 id_priv->id.qp_type = qp_type;
89052d78 1002 id_priv->tos_set = false;
2c1619ed 1003 id_priv->timeout_set = false;
3aeffc46 1004 id_priv->min_rnr_timer_set = false;
79d684f0 1005 id_priv->gid_type = IB_GID_TYPE_IB;
e51060f0 1006 spin_lock_init(&id_priv->lock);
c5483388 1007 mutex_init(&id_priv->qp_mutex);
e51060f0 1008 init_completion(&id_priv->comp);
43fb5892 1009 refcount_set(&id_priv->refcount, 1);
de910bd9 1010 mutex_init(&id_priv->handler_mutex);
99cfddb8 1011 INIT_LIST_HEAD(&id_priv->device_item);
fc008bdb 1012 INIT_LIST_HEAD(&id_priv->id_list_entry);
e51060f0 1013 INIT_LIST_HEAD(&id_priv->listen_list);
c8f6a362 1014 INIT_LIST_HEAD(&id_priv->mc_list);
e51060f0 1015 get_random_bytes(&id_priv->seq_num, sizeof id_priv->seq_num);
fa20105e 1016 id_priv->id.route.addr.dev_addr.net = get_net(net);
23a9cd2a 1017 id_priv->seq_num &= 0x00ffffff;
e51060f0 1018
13ef5539 1019 rdma_restrack_new(&id_priv->res, RDMA_RESTRACK_CM_ID);
b09c4d70
LR
1020 if (parent)
1021 rdma_restrack_parent_name(&id_priv->res, &parent->res);
13ef5539 1022
b09c4d70
LR
1023 return id_priv;
1024}
1025
1026struct rdma_cm_id *
1027__rdma_create_kernel_id(struct net *net, rdma_cm_event_handler event_handler,
1028 void *context, enum rdma_ucm_port_space ps,
1029 enum ib_qp_type qp_type, const char *caller)
1030{
1031 struct rdma_id_private *ret;
1032
1033 ret = __rdma_create_id(net, event_handler, context, ps, qp_type, NULL);
1034 if (IS_ERR(ret))
1035 return ERR_CAST(ret);
1036
1037 rdma_restrack_set_name(&ret->res, caller);
1038 return &ret->id;
e51060f0 1039}
b09c4d70
LR
1040EXPORT_SYMBOL(__rdma_create_kernel_id);
1041
1042struct rdma_cm_id *rdma_create_user_id(rdma_cm_event_handler event_handler,
1043 void *context,
1044 enum rdma_ucm_port_space ps,
1045 enum ib_qp_type qp_type)
1046{
1047 struct rdma_id_private *ret;
1048
1049 ret = __rdma_create_id(current->nsproxy->net_ns, event_handler, context,
1050 ps, qp_type, NULL);
1051 if (IS_ERR(ret))
1052 return ERR_CAST(ret);
1053
1054 rdma_restrack_set_name(&ret->res, NULL);
1055 return &ret->id;
e51060f0 1056}
b09c4d70 1057EXPORT_SYMBOL(rdma_create_user_id);
e51060f0 1058
c8f6a362 1059static int cma_init_ud_qp(struct rdma_id_private *id_priv, struct ib_qp *qp)
e51060f0
SH
1060{
1061 struct ib_qp_attr qp_attr;
c8f6a362 1062 int qp_attr_mask, ret;
e51060f0 1063
c8f6a362
SH
1064 qp_attr.qp_state = IB_QPS_INIT;
1065 ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
e51060f0
SH
1066 if (ret)
1067 return ret;
1068
c8f6a362
SH
1069 ret = ib_modify_qp(qp, &qp_attr, qp_attr_mask);
1070 if (ret)
1071 return ret;
1072
1073 qp_attr.qp_state = IB_QPS_RTR;
1074 ret = ib_modify_qp(qp, &qp_attr, IB_QP_STATE);
1075 if (ret)
1076 return ret;
1077
1078 qp_attr.qp_state = IB_QPS_RTS;
1079 qp_attr.sq_psn = 0;
1080 ret = ib_modify_qp(qp, &qp_attr, IB_QP_STATE | IB_QP_SQ_PSN);
1081
1082 return ret;
e51060f0
SH
1083}
1084
db4657af
MM
1085static int cma_init_conn_qp(struct rdma_id_private *id_priv, struct ib_qp *qp)
1086{
1087 struct ib_qp_attr qp_attr;
1088 int qp_attr_mask, ret;
1089
1090 qp_attr.qp_state = IB_QPS_INIT;
1091 ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
1092 if (ret)
1093 return ret;
1094
1095 return ib_modify_qp(qp, &qp_attr, qp_attr_mask);
1096}
1097
e51060f0
SH
1098int rdma_create_qp(struct rdma_cm_id *id, struct ib_pd *pd,
1099 struct ib_qp_init_attr *qp_init_attr)
1100{
1101 struct rdma_id_private *id_priv;
1102 struct ib_qp *qp;
db4657af 1103 int ret;
e51060f0
SH
1104
1105 id_priv = container_of(id, struct rdma_id_private, id);
ed999f82
CL
1106 if (id->device != pd->device) {
1107 ret = -EINVAL;
1108 goto out_err;
1109 }
e51060f0 1110
0691a286 1111 qp_init_attr->port_num = id->port_num;
e51060f0 1112 qp = ib_create_qp(pd, qp_init_attr);
ed999f82
CL
1113 if (IS_ERR(qp)) {
1114 ret = PTR_ERR(qp);
1115 goto out_err;
1116 }
e51060f0 1117
b26f9b99 1118 if (id->qp_type == IB_QPT_UD)
c8f6a362 1119 ret = cma_init_ud_qp(id_priv, qp);
db4657af
MM
1120 else
1121 ret = cma_init_conn_qp(id_priv, qp);
e51060f0 1122 if (ret)
ed999f82 1123 goto out_destroy;
e51060f0
SH
1124
1125 id->qp = qp;
1126 id_priv->qp_num = qp->qp_num;
e51060f0 1127 id_priv->srq = (qp->srq != NULL);
ed999f82 1128 trace_cm_qp_create(id_priv, pd, qp_init_attr, 0);
e51060f0 1129 return 0;
ed999f82 1130out_destroy:
e51060f0 1131 ib_destroy_qp(qp);
ed999f82
CL
1132out_err:
1133 trace_cm_qp_create(id_priv, pd, qp_init_attr, ret);
e51060f0
SH
1134 return ret;
1135}
1136EXPORT_SYMBOL(rdma_create_qp);
1137
1138void rdma_destroy_qp(struct rdma_cm_id *id)
1139{
c5483388
SH
1140 struct rdma_id_private *id_priv;
1141
1142 id_priv = container_of(id, struct rdma_id_private, id);
ed999f82 1143 trace_cm_qp_destroy(id_priv);
c5483388
SH
1144 mutex_lock(&id_priv->qp_mutex);
1145 ib_destroy_qp(id_priv->id.qp);
1146 id_priv->id.qp = NULL;
1147 mutex_unlock(&id_priv->qp_mutex);
e51060f0
SH
1148}
1149EXPORT_SYMBOL(rdma_destroy_qp);
1150
5851bb89
SH
1151static int cma_modify_qp_rtr(struct rdma_id_private *id_priv,
1152 struct rdma_conn_param *conn_param)
e51060f0
SH
1153{
1154 struct ib_qp_attr qp_attr;
1155 int qp_attr_mask, ret;
1156
c5483388
SH
1157 mutex_lock(&id_priv->qp_mutex);
1158 if (!id_priv->id.qp) {
1159 ret = 0;
1160 goto out;
1161 }
e51060f0
SH
1162
1163 /* Need to update QP attributes from default values. */
1164 qp_attr.qp_state = IB_QPS_INIT;
c5483388 1165 ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
e51060f0 1166 if (ret)
c5483388 1167 goto out;
e51060f0 1168
c5483388 1169 ret = ib_modify_qp(id_priv->id.qp, &qp_attr, qp_attr_mask);
e51060f0 1170 if (ret)
c5483388 1171 goto out;
e51060f0
SH
1172
1173 qp_attr.qp_state = IB_QPS_RTR;
c5483388 1174 ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
e51060f0 1175 if (ret)
c5483388 1176 goto out;
e51060f0 1177
fef60902
MW
1178 BUG_ON(id_priv->cma_dev->device != id_priv->id.device);
1179
5851bb89
SH
1180 if (conn_param)
1181 qp_attr.max_dest_rd_atomic = conn_param->responder_resources;
c5483388
SH
1182 ret = ib_modify_qp(id_priv->id.qp, &qp_attr, qp_attr_mask);
1183out:
1184 mutex_unlock(&id_priv->qp_mutex);
1185 return ret;
e51060f0
SH
1186}
1187
5851bb89
SH
1188static int cma_modify_qp_rts(struct rdma_id_private *id_priv,
1189 struct rdma_conn_param *conn_param)
e51060f0
SH
1190{
1191 struct ib_qp_attr qp_attr;
1192 int qp_attr_mask, ret;
1193
c5483388
SH
1194 mutex_lock(&id_priv->qp_mutex);
1195 if (!id_priv->id.qp) {
1196 ret = 0;
1197 goto out;
1198 }
e51060f0
SH
1199
1200 qp_attr.qp_state = IB_QPS_RTS;
c5483388 1201 ret = rdma_init_qp_attr(&id_priv->id, &qp_attr, &qp_attr_mask);
e51060f0 1202 if (ret)
c5483388 1203 goto out;
e51060f0 1204
5851bb89
SH
1205 if (conn_param)
1206 qp_attr.max_rd_atomic = conn_param->initiator_depth;
c5483388
SH
1207 ret = ib_modify_qp(id_priv->id.qp, &qp_attr, qp_attr_mask);
1208out:
1209 mutex_unlock(&id_priv->qp_mutex);
1210 return ret;
e51060f0
SH
1211}
1212
c5483388 1213static int cma_modify_qp_err(struct rdma_id_private *id_priv)
e51060f0
SH
1214{
1215 struct ib_qp_attr qp_attr;
c5483388 1216 int ret;
e51060f0 1217
c5483388
SH
1218 mutex_lock(&id_priv->qp_mutex);
1219 if (!id_priv->id.qp) {
1220 ret = 0;
1221 goto out;
1222 }
e51060f0
SH
1223
1224 qp_attr.qp_state = IB_QPS_ERR;
c5483388
SH
1225 ret = ib_modify_qp(id_priv->id.qp, &qp_attr, IB_QP_STATE);
1226out:
1227 mutex_unlock(&id_priv->qp_mutex);
1228 return ret;
e51060f0
SH
1229}
1230
c8f6a362
SH
1231static int cma_ib_init_qp_attr(struct rdma_id_private *id_priv,
1232 struct ib_qp_attr *qp_attr, int *qp_attr_mask)
1233{
1234 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
1235 int ret;
3c86aa70
EC
1236 u16 pkey;
1237
227128fc 1238 if (rdma_cap_eth_ah(id_priv->id.device, id_priv->id.port_num))
3c86aa70 1239 pkey = 0xffff;
fef60902
MW
1240 else
1241 pkey = ib_addr_get_pkey(dev_addr);
c8f6a362
SH
1242
1243 ret = ib_find_cached_pkey(id_priv->id.device, id_priv->id.port_num,
3c86aa70 1244 pkey, &qp_attr->pkey_index);
c8f6a362
SH
1245 if (ret)
1246 return ret;
1247
1248 qp_attr->port_num = id_priv->id.port_num;
1249 *qp_attr_mask = IB_QP_STATE | IB_QP_PKEY_INDEX | IB_QP_PORT;
1250
b26f9b99 1251 if (id_priv->id.qp_type == IB_QPT_UD) {
58e84f6b 1252 ret = cma_set_default_qkey(id_priv);
d2ca39f2
YE
1253 if (ret)
1254 return ret;
1255
c8f6a362
SH
1256 qp_attr->qkey = id_priv->qkey;
1257 *qp_attr_mask |= IB_QP_QKEY;
1258 } else {
1259 qp_attr->qp_access_flags = 0;
1260 *qp_attr_mask |= IB_QP_ACCESS_FLAGS;
1261 }
1262 return 0;
1263}
1264
e51060f0
SH
1265int rdma_init_qp_attr(struct rdma_cm_id *id, struct ib_qp_attr *qp_attr,
1266 int *qp_attr_mask)
1267{
1268 struct rdma_id_private *id_priv;
c8f6a362 1269 int ret = 0;
e51060f0
SH
1270
1271 id_priv = container_of(id, struct rdma_id_private, id);
72219cea 1272 if (rdma_cap_ib_cm(id->device, id->port_num)) {
b26f9b99 1273 if (!id_priv->cm_id.ib || (id_priv->id.qp_type == IB_QPT_UD))
c8f6a362
SH
1274 ret = cma_ib_init_qp_attr(id_priv, qp_attr, qp_attr_mask);
1275 else
1276 ret = ib_cm_init_qp_attr(id_priv->cm_id.ib, qp_attr,
1277 qp_attr_mask);
dd5f03be 1278
e51060f0
SH
1279 if (qp_attr->qp_state == IB_QPS_RTR)
1280 qp_attr->rq_psn = id_priv->seq_num;
04215330 1281 } else if (rdma_cap_iw_cm(id->device, id->port_num)) {
c8f6a362 1282 if (!id_priv->cm_id.iw) {
8f076531 1283 qp_attr->qp_access_flags = 0;
c8f6a362
SH
1284 *qp_attr_mask = IB_QP_STATE | IB_QP_ACCESS_FLAGS;
1285 } else
1286 ret = iw_cm_init_qp_attr(id_priv->cm_id.iw, qp_attr,
1287 qp_attr_mask);
a62ab66b
IM
1288 qp_attr->port_num = id_priv->id.port_num;
1289 *qp_attr_mask |= IB_QP_PORT;
b6eb7011 1290 } else {
e51060f0 1291 ret = -ENOSYS;
b6eb7011 1292 }
e51060f0 1293
2c1619ed
DG
1294 if ((*qp_attr_mask & IB_QP_TIMEOUT) && id_priv->timeout_set)
1295 qp_attr->timeout = id_priv->timeout;
1296
3aeffc46
HB
1297 if ((*qp_attr_mask & IB_QP_MIN_RNR_TIMER) && id_priv->min_rnr_timer_set)
1298 qp_attr->min_rnr_timer = id_priv->min_rnr_timer;
1299
e51060f0
SH
1300 return ret;
1301}
1302EXPORT_SYMBOL(rdma_init_qp_attr);
1303
ca3a8ace 1304static inline bool cma_zero_addr(const struct sockaddr *addr)
e51060f0 1305{
2e2d190c
SH
1306 switch (addr->sa_family) {
1307 case AF_INET:
1308 return ipv4_is_zeronet(((struct sockaddr_in *)addr)->sin_addr.s_addr);
1309 case AF_INET6:
ca3a8ace 1310 return ipv6_addr_any(&((struct sockaddr_in6 *)addr)->sin6_addr);
2e2d190c 1311 case AF_IB:
ca3a8ace 1312 return ib_addr_any(&((struct sockaddr_ib *)addr)->sib_addr);
2e2d190c 1313 default:
ca3a8ace 1314 return false;
e51060f0
SH
1315 }
1316}
1317
ca3a8ace 1318static inline bool cma_loopback_addr(const struct sockaddr *addr)
e51060f0 1319{
2e2d190c
SH
1320 switch (addr->sa_family) {
1321 case AF_INET:
ca3a8ace
PP
1322 return ipv4_is_loopback(
1323 ((struct sockaddr_in *)addr)->sin_addr.s_addr);
2e2d190c 1324 case AF_INET6:
ca3a8ace
PP
1325 return ipv6_addr_loopback(
1326 &((struct sockaddr_in6 *)addr)->sin6_addr);
2e2d190c 1327 case AF_IB:
ca3a8ace
PP
1328 return ib_addr_loopback(
1329 &((struct sockaddr_ib *)addr)->sib_addr);
2e2d190c 1330 default:
ca3a8ace 1331 return false;
2e2d190c 1332 }
e51060f0
SH
1333}
1334
ca3a8ace 1335static inline bool cma_any_addr(const struct sockaddr *addr)
e51060f0
SH
1336{
1337 return cma_zero_addr(addr) || cma_loopback_addr(addr);
1338}
1339
5d7ed2f2 1340static int cma_addr_cmp(const struct sockaddr *src, const struct sockaddr *dst)
43b752da
HS
1341{
1342 if (src->sa_family != dst->sa_family)
1343 return -1;
1344
1345 switch (src->sa_family) {
1346 case AF_INET:
5d7ed2f2
PP
1347 return ((struct sockaddr_in *)src)->sin_addr.s_addr !=
1348 ((struct sockaddr_in *)dst)->sin_addr.s_addr;
1349 case AF_INET6: {
1350 struct sockaddr_in6 *src_addr6 = (struct sockaddr_in6 *)src;
1351 struct sockaddr_in6 *dst_addr6 = (struct sockaddr_in6 *)dst;
1352 bool link_local;
1353
1354 if (ipv6_addr_cmp(&src_addr6->sin6_addr,
1355 &dst_addr6->sin6_addr))
1356 return 1;
1357 link_local = ipv6_addr_type(&dst_addr6->sin6_addr) &
1358 IPV6_ADDR_LINKLOCAL;
1359 /* Link local must match their scope_ids */
1360 return link_local ? (src_addr6->sin6_scope_id !=
1361 dst_addr6->sin6_scope_id) :
1362 0;
1363 }
1364
2e2d190c
SH
1365 default:
1366 return ib_addr_cmp(&((struct sockaddr_ib *) src)->sib_addr,
1367 &((struct sockaddr_ib *) dst)->sib_addr);
43b752da
HS
1368 }
1369}
1370
2df7dba8 1371static __be16 cma_port(const struct sockaddr *addr)
628e5f6d 1372{
58afdcb7
SH
1373 struct sockaddr_ib *sib;
1374
1375 switch (addr->sa_family) {
1376 case AF_INET:
628e5f6d 1377 return ((struct sockaddr_in *) addr)->sin_port;
58afdcb7 1378 case AF_INET6:
628e5f6d 1379 return ((struct sockaddr_in6 *) addr)->sin6_port;
58afdcb7
SH
1380 case AF_IB:
1381 sib = (struct sockaddr_ib *) addr;
1382 return htons((u16) (be64_to_cpu(sib->sib_sid) &
1383 be64_to_cpu(sib->sib_sid_mask)));
1384 default:
1385 return 0;
1386 }
628e5f6d
SH
1387}
1388
2df7dba8 1389static inline int cma_any_port(const struct sockaddr *addr)
e51060f0 1390{
628e5f6d 1391 return !cma_port(addr);
e51060f0
SH
1392}
1393
0c505f70
HE
1394static void cma_save_ib_info(struct sockaddr *src_addr,
1395 struct sockaddr *dst_addr,
e7ff98ae
PP
1396 const struct rdma_cm_id *listen_id,
1397 const struct sa_path_rec *path)
e51060f0 1398{
fbaa1a6d
SH
1399 struct sockaddr_ib *listen_ib, *ib;
1400
1401 listen_ib = (struct sockaddr_ib *) &listen_id->route.addr.src_addr;
0c505f70
HE
1402 if (src_addr) {
1403 ib = (struct sockaddr_ib *)src_addr;
1404 ib->sib_family = AF_IB;
1405 if (path) {
1406 ib->sib_pkey = path->pkey;
1407 ib->sib_flowinfo = path->flow_label;
1408 memcpy(&ib->sib_addr, &path->sgid, 16);
d3957b86 1409 ib->sib_sid = path->service_id;
0c505f70
HE
1410 ib->sib_scope_id = 0;
1411 } else {
1412 ib->sib_pkey = listen_ib->sib_pkey;
1413 ib->sib_flowinfo = listen_ib->sib_flowinfo;
1414 ib->sib_addr = listen_ib->sib_addr;
1415 ib->sib_sid = listen_ib->sib_sid;
1416 ib->sib_scope_id = listen_ib->sib_scope_id;
1417 }
1418 ib->sib_sid_mask = cpu_to_be64(0xffffffffffffffffULL);
c07678bb 1419 }
0c505f70
HE
1420 if (dst_addr) {
1421 ib = (struct sockaddr_ib *)dst_addr;
1422 ib->sib_family = AF_IB;
1423 if (path) {
1424 ib->sib_pkey = path->pkey;
1425 ib->sib_flowinfo = path->flow_label;
1426 memcpy(&ib->sib_addr, &path->dgid, 16);
1427 }
c07678bb 1428 }
fbaa1a6d 1429}
e51060f0 1430
c50e90d0
AB
1431static void cma_save_ip4_info(struct sockaddr_in *src_addr,
1432 struct sockaddr_in *dst_addr,
0c505f70
HE
1433 struct cma_hdr *hdr,
1434 __be16 local_port)
fbaa1a6d 1435{
0c505f70 1436 if (src_addr) {
c50e90d0
AB
1437 *src_addr = (struct sockaddr_in) {
1438 .sin_family = AF_INET,
1439 .sin_addr.s_addr = hdr->dst_addr.ip4.addr,
1440 .sin_port = local_port,
1441 };
0c505f70 1442 }
fbaa1a6d 1443
0c505f70 1444 if (dst_addr) {
c50e90d0
AB
1445 *dst_addr = (struct sockaddr_in) {
1446 .sin_family = AF_INET,
1447 .sin_addr.s_addr = hdr->src_addr.ip4.addr,
1448 .sin_port = hdr->port,
1449 };
0c505f70 1450 }
e51060f0
SH
1451}
1452
c50e90d0
AB
1453static void cma_save_ip6_info(struct sockaddr_in6 *src_addr,
1454 struct sockaddr_in6 *dst_addr,
0c505f70
HE
1455 struct cma_hdr *hdr,
1456 __be16 local_port)
e51060f0 1457{
0c505f70 1458 if (src_addr) {
c50e90d0
AB
1459 *src_addr = (struct sockaddr_in6) {
1460 .sin6_family = AF_INET6,
1461 .sin6_addr = hdr->dst_addr.ip6,
1462 .sin6_port = local_port,
1463 };
0c505f70 1464 }
fbaa1a6d 1465
0c505f70 1466 if (dst_addr) {
c50e90d0
AB
1467 *dst_addr = (struct sockaddr_in6) {
1468 .sin6_family = AF_INET6,
1469 .sin6_addr = hdr->src_addr.ip6,
1470 .sin6_port = hdr->port,
1471 };
0c505f70 1472 }
fbaa1a6d
SH
1473}
1474
0c505f70 1475static u16 cma_port_from_service_id(__be64 service_id)
fbaa1a6d 1476{
0c505f70
HE
1477 return (u16)be64_to_cpu(service_id);
1478}
fbaa1a6d 1479
0c505f70
HE
1480static int cma_save_ip_info(struct sockaddr *src_addr,
1481 struct sockaddr *dst_addr,
e7ff98ae 1482 const struct ib_cm_event *ib_event,
0c505f70
HE
1483 __be64 service_id)
1484{
1485 struct cma_hdr *hdr;
1486 __be16 port;
fbaa1a6d
SH
1487
1488 hdr = ib_event->private_data;
1489 if (hdr->cma_version != CMA_VERSION)
1490 return -EINVAL;
1491
0c505f70
HE
1492 port = htons(cma_port_from_service_id(service_id));
1493
fbaa1a6d 1494 switch (cma_get_ip_ver(hdr)) {
e51060f0 1495 case 4:
c50e90d0
AB
1496 cma_save_ip4_info((struct sockaddr_in *)src_addr,
1497 (struct sockaddr_in *)dst_addr, hdr, port);
e51060f0
SH
1498 break;
1499 case 6:
c50e90d0
AB
1500 cma_save_ip6_info((struct sockaddr_in6 *)src_addr,
1501 (struct sockaddr_in6 *)dst_addr, hdr, port);
e51060f0
SH
1502 break;
1503 default:
4c21b5bc 1504 return -EAFNOSUPPORT;
e51060f0 1505 }
0c505f70 1506
fbaa1a6d 1507 return 0;
e51060f0
SH
1508}
1509
0c505f70
HE
1510static int cma_save_net_info(struct sockaddr *src_addr,
1511 struct sockaddr *dst_addr,
e7ff98ae
PP
1512 const struct rdma_cm_id *listen_id,
1513 const struct ib_cm_event *ib_event,
0c505f70
HE
1514 sa_family_t sa_family, __be64 service_id)
1515{
1516 if (sa_family == AF_IB) {
1517 if (ib_event->event == IB_CM_REQ_RECEIVED)
1518 cma_save_ib_info(src_addr, dst_addr, listen_id,
1519 ib_event->param.req_rcvd.primary_path);
1520 else if (ib_event->event == IB_CM_SIDR_REQ_RECEIVED)
1521 cma_save_ib_info(src_addr, dst_addr, listen_id, NULL);
1522 return 0;
1523 }
1524
1525 return cma_save_ip_info(src_addr, dst_addr, ib_event, service_id);
1526}
1527
4c21b5bc
HE
1528static int cma_save_req_info(const struct ib_cm_event *ib_event,
1529 struct cma_req_info *req)
1530{
1531 const struct ib_cm_req_event_param *req_param =
1532 &ib_event->param.req_rcvd;
1533 const struct ib_cm_sidr_req_event_param *sidr_param =
1534 &ib_event->param.sidr_req_rcvd;
1535
1536 switch (ib_event->event) {
1537 case IB_CM_REQ_RECEIVED:
1538 req->device = req_param->listen_id->device;
1539 req->port = req_param->port;
1540 memcpy(&req->local_gid, &req_param->primary_path->sgid,
1541 sizeof(req->local_gid));
1542 req->has_gid = true;
d3957b86 1543 req->service_id = req_param->primary_path->service_id;
ab3964ad 1544 req->pkey = be16_to_cpu(req_param->primary_path->pkey);
84424a7f
HE
1545 if (req->pkey != req_param->bth_pkey)
1546 pr_warn_ratelimited("RDMA CMA: got different BTH P_Key (0x%x) and primary path P_Key (0x%x)\n"
1547 "RDMA CMA: in the future this may cause the request to be dropped\n",
1548 req_param->bth_pkey, req->pkey);
4c21b5bc
HE
1549 break;
1550 case IB_CM_SIDR_REQ_RECEIVED:
1551 req->device = sidr_param->listen_id->device;
1552 req->port = sidr_param->port;
1553 req->has_gid = false;
1554 req->service_id = sidr_param->service_id;
ab3964ad 1555 req->pkey = sidr_param->pkey;
84424a7f
HE
1556 if (req->pkey != sidr_param->bth_pkey)
1557 pr_warn_ratelimited("RDMA CMA: got different BTH P_Key (0x%x) and SIDR request payload P_Key (0x%x)\n"
1558 "RDMA CMA: in the future this may cause the request to be dropped\n",
1559 sidr_param->bth_pkey, req->pkey);
4c21b5bc
HE
1560 break;
1561 default:
1562 return -EINVAL;
1563 }
1564
1565 return 0;
1566}
1567
f887f2ac
HE
1568static bool validate_ipv4_net_dev(struct net_device *net_dev,
1569 const struct sockaddr_in *dst_addr,
1570 const struct sockaddr_in *src_addr)
1571{
1572 __be32 daddr = dst_addr->sin_addr.s_addr,
1573 saddr = src_addr->sin_addr.s_addr;
1574 struct fib_result res;
1575 struct flowi4 fl4;
1576 int err;
1577 bool ret;
1578
1579 if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr) ||
1580 ipv4_is_lbcast(daddr) || ipv4_is_zeronet(saddr) ||
1581 ipv4_is_zeronet(daddr) || ipv4_is_loopback(daddr) ||
1582 ipv4_is_loopback(saddr))
1583 return false;
1584
1585 memset(&fl4, 0, sizeof(fl4));
eb83f502 1586 fl4.flowi4_oif = net_dev->ifindex;
f887f2ac
HE
1587 fl4.daddr = daddr;
1588 fl4.saddr = saddr;
1589
1590 rcu_read_lock();
1591 err = fib_lookup(dev_net(net_dev), &fl4, &res, 0);
d3632493 1592 ret = err == 0 && FIB_RES_DEV(res) == net_dev;
f887f2ac
HE
1593 rcu_read_unlock();
1594
1595 return ret;
1596}
1597
1598static bool validate_ipv6_net_dev(struct net_device *net_dev,
1599 const struct sockaddr_in6 *dst_addr,
1600 const struct sockaddr_in6 *src_addr)
1601{
1602#if IS_ENABLED(CONFIG_IPV6)
1603 const int strict = ipv6_addr_type(&dst_addr->sin6_addr) &
1604 IPV6_ADDR_LINKLOCAL;
1605 struct rt6_info *rt = rt6_lookup(dev_net(net_dev), &dst_addr->sin6_addr,
1606 &src_addr->sin6_addr, net_dev->ifindex,
b75cc8f9 1607 NULL, strict);
f887f2ac
HE
1608 bool ret;
1609
1610 if (!rt)
1611 return false;
1612
1613 ret = rt->rt6i_idev->dev == net_dev;
1614 ip6_rt_put(rt);
1615
1616 return ret;
1617#else
1618 return false;
1619#endif
1620}
1621
1622static bool validate_net_dev(struct net_device *net_dev,
1623 const struct sockaddr *daddr,
1624 const struct sockaddr *saddr)
1625{
1626 const struct sockaddr_in *daddr4 = (const struct sockaddr_in *)daddr;
1627 const struct sockaddr_in *saddr4 = (const struct sockaddr_in *)saddr;
1628 const struct sockaddr_in6 *daddr6 = (const struct sockaddr_in6 *)daddr;
1629 const struct sockaddr_in6 *saddr6 = (const struct sockaddr_in6 *)saddr;
1630
1631 switch (daddr->sa_family) {
1632 case AF_INET:
1633 return saddr->sa_family == AF_INET &&
1634 validate_ipv4_net_dev(net_dev, daddr4, saddr4);
1635
1636 case AF_INET6:
1637 return saddr->sa_family == AF_INET6 &&
1638 validate_ipv6_net_dev(net_dev, daddr6, saddr6);
1639
1640 default:
1641 return false;
1642 }
1643}
1644
cee10433
PP
1645static struct net_device *
1646roce_get_net_dev_by_cm_event(const struct ib_cm_event *ib_event)
1647{
1648 const struct ib_gid_attr *sgid_attr = NULL;
adb4a57a 1649 struct net_device *ndev;
cee10433
PP
1650
1651 if (ib_event->event == IB_CM_REQ_RECEIVED)
1652 sgid_attr = ib_event->param.req_rcvd.ppath_sgid_attr;
1653 else if (ib_event->event == IB_CM_SIDR_REQ_RECEIVED)
1654 sgid_attr = ib_event->param.sidr_req_rcvd.sgid_attr;
1655
1656 if (!sgid_attr)
1657 return NULL;
adb4a57a
PP
1658
1659 rcu_read_lock();
1660 ndev = rdma_read_gid_attr_ndev_rcu(sgid_attr);
1661 if (IS_ERR(ndev))
1662 ndev = NULL;
1663 else
1664 dev_hold(ndev);
1665 rcu_read_unlock();
1666 return ndev;
cee10433
PP
1667}
1668
e7ff98ae 1669static struct net_device *cma_get_net_dev(const struct ib_cm_event *ib_event,
2918c1a9 1670 struct cma_req_info *req)
4c21b5bc 1671{
2918c1a9
PP
1672 struct sockaddr *listen_addr =
1673 (struct sockaddr *)&req->listen_addr_storage;
1674 struct sockaddr *src_addr = (struct sockaddr *)&req->src_addr_storage;
4c21b5bc
HE
1675 struct net_device *net_dev;
1676 const union ib_gid *gid = req->has_gid ? &req->local_gid : NULL;
1677 int err;
1678
f887f2ac
HE
1679 err = cma_save_ip_info(listen_addr, src_addr, ib_event,
1680 req->service_id);
4c21b5bc
HE
1681 if (err)
1682 return ERR_PTR(err);
1683
cee10433
PP
1684 if (rdma_protocol_roce(req->device, req->port))
1685 net_dev = roce_get_net_dev_by_cm_event(ib_event);
1686 else
1687 net_dev = ib_get_net_dev_by_params(req->device, req->port,
1688 req->pkey,
1689 gid, listen_addr);
4c21b5bc
HE
1690 if (!net_dev)
1691 return ERR_PTR(-ENODEV);
1692
1693 return net_dev;
1694}
1695
2253fc0c 1696static enum rdma_ucm_port_space rdma_ps_from_service_id(__be64 service_id)
4c21b5bc
HE
1697{
1698 return (be64_to_cpu(service_id) >> 16) & 0xffff;
1699}
1700
1701static bool cma_match_private_data(struct rdma_id_private *id_priv,
1702 const struct cma_hdr *hdr)
1703{
1704 struct sockaddr *addr = cma_src_addr(id_priv);
1705 __be32 ip4_addr;
1706 struct in6_addr ip6_addr;
1707
1708 if (cma_any_addr(addr) && !id_priv->afonly)
1709 return true;
1710
1711 switch (addr->sa_family) {
1712 case AF_INET:
1713 ip4_addr = ((struct sockaddr_in *)addr)->sin_addr.s_addr;
1714 if (cma_get_ip_ver(hdr) != 4)
1715 return false;
1716 if (!cma_any_addr(addr) &&
1717 hdr->dst_addr.ip4.addr != ip4_addr)
1718 return false;
1719 break;
1720 case AF_INET6:
1721 ip6_addr = ((struct sockaddr_in6 *)addr)->sin6_addr;
1722 if (cma_get_ip_ver(hdr) != 6)
1723 return false;
1724 if (!cma_any_addr(addr) &&
1725 memcmp(&hdr->dst_addr.ip6, &ip6_addr, sizeof(ip6_addr)))
1726 return false;
1727 break;
1728 case AF_IB:
1729 return true;
1730 default:
1731 return false;
1732 }
1733
1734 return true;
1735}
1736
b8cab5da
HE
1737static bool cma_protocol_roce(const struct rdma_cm_id *id)
1738{
1739 struct ib_device *device = id->device;
1fb7f897 1740 const u32 port_num = id->port_num ?: rdma_start_port(device);
b8cab5da 1741
5ac08a34 1742 return rdma_protocol_roce(device, port_num);
b8cab5da
HE
1743}
1744
78fb282b
PP
1745static bool cma_is_req_ipv6_ll(const struct cma_req_info *req)
1746{
1747 const struct sockaddr *daddr =
1748 (const struct sockaddr *)&req->listen_addr_storage;
1749 const struct sockaddr_in6 *daddr6 = (const struct sockaddr_in6 *)daddr;
1750
1751 /* Returns true if the req is for IPv6 link local */
1752 return (daddr->sa_family == AF_INET6 &&
1753 (ipv6_addr_type(&daddr6->sin6_addr) & IPV6_ADDR_LINKLOCAL));
1754}
1755
fac51590
MB
1756static bool cma_match_net_dev(const struct rdma_cm_id *id,
1757 const struct net_device *net_dev,
78fb282b 1758 const struct cma_req_info *req)
4c21b5bc 1759{
fac51590 1760 const struct rdma_addr *addr = &id->route.addr;
4c21b5bc
HE
1761
1762 if (!net_dev)
d274e45c 1763 /* This request is an AF_IB request */
78fb282b 1764 return (!id->port_num || id->port_num == req->port) &&
d274e45c 1765 (addr->src_addr.ss_family == AF_IB);
4c21b5bc 1766
78fb282b
PP
1767 /*
1768 * If the request is not for IPv6 link local, allow matching
1769 * request to any netdevice of the one or multiport rdma device.
1770 */
1771 if (!cma_is_req_ipv6_ll(req))
1772 return true;
643d213a
PP
1773 /*
1774 * Net namespaces must match, and if the listner is listening
1775 * on a specific netdevice than netdevice must match as well.
1776 */
1777 if (net_eq(dev_net(net_dev), addr->dev_addr.net) &&
1778 (!!addr->dev_addr.bound_dev_if ==
1779 (addr->dev_addr.bound_dev_if == net_dev->ifindex)))
1780 return true;
1781 else
1782 return false;
4c21b5bc
HE
1783}
1784
1785static struct rdma_id_private *cma_find_listener(
1786 const struct rdma_bind_list *bind_list,
1787 const struct ib_cm_id *cm_id,
1788 const struct ib_cm_event *ib_event,
1789 const struct cma_req_info *req,
1790 const struct net_device *net_dev)
1791{
1792 struct rdma_id_private *id_priv, *id_priv_dev;
1793
730c8912
MZ
1794 lockdep_assert_held(&lock);
1795
4c21b5bc
HE
1796 if (!bind_list)
1797 return ERR_PTR(-EINVAL);
1798
1799 hlist_for_each_entry(id_priv, &bind_list->owners, node) {
1800 if (cma_match_private_data(id_priv, ib_event->private_data)) {
1801 if (id_priv->id.device == cm_id->device &&
78fb282b 1802 cma_match_net_dev(&id_priv->id, net_dev, req))
4c21b5bc
HE
1803 return id_priv;
1804 list_for_each_entry(id_priv_dev,
1805 &id_priv->listen_list,
99cfddb8 1806 listen_item) {
4c21b5bc 1807 if (id_priv_dev->id.device == cm_id->device &&
78fb282b
PP
1808 cma_match_net_dev(&id_priv_dev->id,
1809 net_dev, req))
4c21b5bc
HE
1810 return id_priv_dev;
1811 }
1812 }
1813 }
1814
1815 return ERR_PTR(-EINVAL);
1816}
1817
e7ff98ae 1818static struct rdma_id_private *
85463316
PP
1819cma_ib_id_from_event(struct ib_cm_id *cm_id,
1820 const struct ib_cm_event *ib_event,
41ab1cb7 1821 struct cma_req_info *req,
85463316 1822 struct net_device **net_dev)
4c21b5bc 1823{
4c21b5bc
HE
1824 struct rdma_bind_list *bind_list;
1825 struct rdma_id_private *id_priv;
4c21b5bc
HE
1826 int err;
1827
41ab1cb7 1828 err = cma_save_req_info(ib_event, req);
4c21b5bc
HE
1829 if (err)
1830 return ERR_PTR(err);
1831
41ab1cb7 1832 *net_dev = cma_get_net_dev(ib_event, req);
0b3ca768
HE
1833 if (IS_ERR(*net_dev)) {
1834 if (PTR_ERR(*net_dev) == -EAFNOSUPPORT) {
4c21b5bc 1835 /* Assuming the protocol is AF_IB */
0b3ca768 1836 *net_dev = NULL;
4c21b5bc 1837 } else {
0b3ca768 1838 return ERR_CAST(*net_dev);
4c21b5bc
HE
1839 }
1840 }
1841
730c8912 1842 mutex_lock(&lock);
2918c1a9
PP
1843 /*
1844 * Net namespace might be getting deleted while route lookup,
1845 * cm_id lookup is in progress. Therefore, perform netdevice
1846 * validation, cm_id lookup under rcu lock.
1847 * RCU lock along with netdevice state check, synchronizes with
1848 * netdevice migrating to different net namespace and also avoids
1849 * case where net namespace doesn't get deleted while lookup is in
1850 * progress.
1851 * If the device state is not IFF_UP, its properties such as ifindex
1852 * and nd_net cannot be trusted to remain valid without rcu lock.
1853 * net/core/dev.c change_net_namespace() ensures to synchronize with
1854 * ongoing operations on net device after device is closed using
1855 * synchronize_net().
1856 */
1857 rcu_read_lock();
1858 if (*net_dev) {
1859 /*
1860 * If netdevice is down, it is likely that it is administratively
1861 * down or it might be migrating to different namespace.
1862 * In that case avoid further processing, as the net namespace
1863 * or ifindex may change.
1864 */
1865 if (((*net_dev)->flags & IFF_UP) == 0) {
1866 id_priv = ERR_PTR(-EHOSTUNREACH);
1867 goto err;
1868 }
1869
1870 if (!validate_net_dev(*net_dev,
27cfde79
MG
1871 (struct sockaddr *)&req->src_addr_storage,
1872 (struct sockaddr *)&req->listen_addr_storage)) {
2918c1a9
PP
1873 id_priv = ERR_PTR(-EHOSTUNREACH);
1874 goto err;
1875 }
1876 }
1877
fa20105e 1878 bind_list = cma_ps_find(*net_dev ? dev_net(*net_dev) : &init_net,
41ab1cb7
PP
1879 rdma_ps_from_service_id(req->service_id),
1880 cma_port_from_service_id(req->service_id));
1881 id_priv = cma_find_listener(bind_list, cm_id, ib_event, req, *net_dev);
2918c1a9
PP
1882err:
1883 rcu_read_unlock();
730c8912 1884 mutex_unlock(&lock);
b3b51f9f 1885 if (IS_ERR(id_priv) && *net_dev) {
be688195
HE
1886 dev_put(*net_dev);
1887 *net_dev = NULL;
1888 }
4c21b5bc
HE
1889 return id_priv;
1890}
1891
c0b64f58 1892static inline u8 cma_user_data_offset(struct rdma_id_private *id_priv)
e51060f0 1893{
e8160e15 1894 return cma_family(id_priv) == AF_IB ? 0 : sizeof(struct cma_hdr);
e51060f0
SH
1895}
1896
e51060f0
SH
1897static void cma_cancel_route(struct rdma_id_private *id_priv)
1898{
fe53ba2f 1899 if (rdma_cap_ib_sa(id_priv->id.device, id_priv->id.port_num)) {
e51060f0
SH
1900 if (id_priv->query)
1901 ib_sa_cancel_query(id_priv->query_id, id_priv->query);
e51060f0
SH
1902 }
1903}
1904
ca465e1f 1905static void _cma_cancel_listens(struct rdma_id_private *id_priv)
e51060f0
SH
1906{
1907 struct rdma_id_private *dev_id_priv;
1908
ca465e1f
TL
1909 lockdep_assert_held(&lock);
1910
d02d1f53
SH
1911 /*
1912 * Remove from listen_any_list to prevent added devices from spawning
1913 * additional listen requests.
1914 */
99cfddb8 1915 list_del_init(&id_priv->listen_any_item);
e51060f0
SH
1916
1917 while (!list_empty(&id_priv->listen_list)) {
99cfddb8
JG
1918 dev_id_priv =
1919 list_first_entry(&id_priv->listen_list,
1920 struct rdma_id_private, listen_item);
d02d1f53 1921 /* sync with device removal to avoid duplicate destruction */
99cfddb8
JG
1922 list_del_init(&dev_id_priv->device_item);
1923 list_del_init(&dev_id_priv->listen_item);
d02d1f53
SH
1924 mutex_unlock(&lock);
1925
1926 rdma_destroy_id(&dev_id_priv->id);
1927 mutex_lock(&lock);
e51060f0 1928 }
ca465e1f
TL
1929}
1930
1931static void cma_cancel_listens(struct rdma_id_private *id_priv)
1932{
1933 mutex_lock(&lock);
1934 _cma_cancel_listens(id_priv);
e51060f0
SH
1935 mutex_unlock(&lock);
1936}
1937
1938static void cma_cancel_operation(struct rdma_id_private *id_priv,
550e5ca7 1939 enum rdma_cm_state state)
e51060f0
SH
1940{
1941 switch (state) {
550e5ca7 1942 case RDMA_CM_ADDR_QUERY:
305d568b
JG
1943 /*
1944 * We can avoid doing the rdma_addr_cancel() based on state,
1945 * only RDMA_CM_ADDR_QUERY has a work that could still execute.
1946 * Notice that the addr_handler work could still be exiting
1947 * outside this state, however due to the interaction with the
1948 * handler_mutex the work is guaranteed not to touch id_priv
1949 * during exit.
1950 */
e51060f0
SH
1951 rdma_addr_cancel(&id_priv->id.route.addr.dev_addr);
1952 break;
550e5ca7 1953 case RDMA_CM_ROUTE_QUERY:
e51060f0
SH
1954 cma_cancel_route(id_priv);
1955 break;
550e5ca7 1956 case RDMA_CM_LISTEN:
f4753834 1957 if (cma_any_addr(cma_src_addr(id_priv)) && !id_priv->cma_dev)
e51060f0
SH
1958 cma_cancel_listens(id_priv);
1959 break;
1960 default:
1961 break;
1962 }
1963}
1964
1965static void cma_release_port(struct rdma_id_private *id_priv)
1966{
1967 struct rdma_bind_list *bind_list = id_priv->bind_list;
fa20105e 1968 struct net *net = id_priv->id.route.addr.dev_addr.net;
e51060f0
SH
1969
1970 if (!bind_list)
1971 return;
1972
1973 mutex_lock(&lock);
1974 hlist_del(&id_priv->node);
1975 if (hlist_empty(&bind_list->owners)) {
fa20105e 1976 cma_ps_remove(net, bind_list->ps, bind_list->port);
e51060f0
SH
1977 kfree(bind_list);
1978 }
1979 mutex_unlock(&lock);
1980}
1981
3788d299
JG
1982static void destroy_mc(struct rdma_id_private *id_priv,
1983 struct cma_multicast *mc)
88145678 1984{
2cc74e1e
CL
1985 bool send_only = mc->join_state == BIT(SENDONLY_FULLMEMBER_JOIN);
1986
b5de0c60
JG
1987 if (rdma_cap_ib_mcast(id_priv->id.device, id_priv->id.port_num))
1988 ib_sa_free_multicast(mc->sa_mc);
c0126915 1989
b5de0c60 1990 if (rdma_protocol_roce(id_priv->id.device, id_priv->id.port_num)) {
3788d299
JG
1991 struct rdma_dev_addr *dev_addr =
1992 &id_priv->id.route.addr.dev_addr;
1993 struct net_device *ndev = NULL;
1994
1995 if (dev_addr->bound_dev_if)
1996 ndev = dev_get_by_index(dev_addr->net,
1997 dev_addr->bound_dev_if);
d9e410eb
MG
1998 if (ndev && !send_only) {
1999 enum ib_gid_type gid_type;
b5de0c60
JG
2000 union ib_gid mgid;
2001
d9e410eb
MG
2002 gid_type = id_priv->cma_dev->default_gid_type
2003 [id_priv->id.port_num -
2004 rdma_start_port(
2005 id_priv->cma_dev->device)];
2006 cma_iboe_set_mgid((struct sockaddr *)&mc->addr, &mgid,
2007 gid_type);
2008 cma_igmp_send(ndev, &mgid, false);
3788d299 2009 }
d9e410eb 2010 dev_put(ndev);
fe454dc3
AH
2011
2012 cancel_work_sync(&mc->iboe_join.work);
88145678 2013 }
b5de0c60 2014 kfree(mc);
88145678
PP
2015}
2016
c8f6a362
SH
2017static void cma_leave_mc_groups(struct rdma_id_private *id_priv)
2018{
2019 struct cma_multicast *mc;
2020
2021 while (!list_empty(&id_priv->mc_list)) {
3788d299
JG
2022 mc = list_first_entry(&id_priv->mc_list, struct cma_multicast,
2023 list);
c8f6a362 2024 list_del(&mc->list);
3788d299 2025 destroy_mc(id_priv, mc);
c8f6a362
SH
2026 }
2027}
2028
f6a9d47a
JG
2029static void _destroy_id(struct rdma_id_private *id_priv,
2030 enum rdma_cm_state state)
e51060f0 2031{
e51060f0
SH
2032 cma_cancel_operation(id_priv, state);
2033
3d828754 2034 rdma_restrack_del(&id_priv->res);
fc008bdb 2035 cma_remove_id_from_tree(id_priv);
e51060f0 2036 if (id_priv->cma_dev) {
72219cea 2037 if (rdma_cap_ib_cm(id_priv->id.device, 1)) {
0c9361fc 2038 if (id_priv->cm_id.ib)
e51060f0 2039 ib_destroy_cm_id(id_priv->cm_id.ib);
04215330 2040 } else if (rdma_cap_iw_cm(id_priv->id.device, 1)) {
0c9361fc 2041 if (id_priv->cm_id.iw)
07ebafba 2042 iw_destroy_cm_id(id_priv->cm_id.iw);
e51060f0 2043 }
c8f6a362 2044 cma_leave_mc_groups(id_priv);
a396d43a 2045 cma_release_dev(id_priv);
e51060f0
SH
2046 }
2047
2048 cma_release_port(id_priv);
e368d23f 2049 cma_id_put(id_priv);
e51060f0
SH
2050 wait_for_completion(&id_priv->comp);
2051
d02d1f53 2052 if (id_priv->internal_id)
e368d23f 2053 cma_id_put(id_priv->id.context);
d02d1f53 2054
e51060f0 2055 kfree(id_priv->id.route.path_rec);
5a374949
MZ
2056 kfree(id_priv->id.route.path_rec_inbound);
2057 kfree(id_priv->id.route.path_rec_outbound);
4ed13a5f 2058
fa20105e 2059 put_net(id_priv->id.route.addr.dev_addr.net);
e51060f0
SH
2060 kfree(id_priv);
2061}
f6a9d47a
JG
2062
2063/*
2064 * destroy an ID from within the handler_mutex. This ensures that no other
2065 * handlers can start running concurrently.
2066 */
2067static void destroy_id_handler_unlock(struct rdma_id_private *id_priv)
2068 __releases(&idprv->handler_mutex)
2069{
2070 enum rdma_cm_state state;
2071 unsigned long flags;
2072
2073 trace_cm_id_destroy(id_priv);
2074
2075 /*
2076 * Setting the state to destroyed under the handler mutex provides a
2077 * fence against calling handler callbacks. If this is invoked due to
2078 * the failure of a handler callback then it guarentees that no future
2079 * handlers will be called.
2080 */
2081 lockdep_assert_held(&id_priv->handler_mutex);
2082 spin_lock_irqsave(&id_priv->lock, flags);
2083 state = id_priv->state;
2084 id_priv->state = RDMA_CM_DESTROYING;
2085 spin_unlock_irqrestore(&id_priv->lock, flags);
2086 mutex_unlock(&id_priv->handler_mutex);
2087 _destroy_id(id_priv, state);
2088}
2089
2090void rdma_destroy_id(struct rdma_cm_id *id)
2091{
2092 struct rdma_id_private *id_priv =
2093 container_of(id, struct rdma_id_private, id);
2094
2095 mutex_lock(&id_priv->handler_mutex);
2096 destroy_id_handler_unlock(id_priv);
2097}
e51060f0
SH
2098EXPORT_SYMBOL(rdma_destroy_id);
2099
2100static int cma_rep_recv(struct rdma_id_private *id_priv)
2101{
2102 int ret;
2103
5851bb89 2104 ret = cma_modify_qp_rtr(id_priv, NULL);
e51060f0
SH
2105 if (ret)
2106 goto reject;
2107
5851bb89 2108 ret = cma_modify_qp_rts(id_priv, NULL);
e51060f0
SH
2109 if (ret)
2110 goto reject;
2111
ed999f82 2112 trace_cm_send_rtu(id_priv);
e51060f0
SH
2113 ret = ib_send_cm_rtu(id_priv->cm_id.ib, NULL, 0);
2114 if (ret)
2115 goto reject;
2116
2117 return 0;
2118reject:
498683c6 2119 pr_debug_ratelimited("RDMA CM: CONNECT_ERROR: failed to handle reply. status %d\n", ret);
c5483388 2120 cma_modify_qp_err(id_priv);
ed999f82 2121 trace_cm_send_rej(id_priv);
e51060f0
SH
2122 ib_send_cm_rej(id_priv->cm_id.ib, IB_CM_REJ_CONSUMER_DEFINED,
2123 NULL, 0, NULL, 0);
2124 return ret;
2125}
2126
a1b1b61f 2127static void cma_set_rep_event_data(struct rdma_cm_event *event,
e7ff98ae 2128 const struct ib_cm_rep_event_param *rep_data,
a1b1b61f
SH
2129 void *private_data)
2130{
2131 event->param.conn.private_data = private_data;
2132 event->param.conn.private_data_len = IB_CM_REP_PRIVATE_DATA_SIZE;
2133 event->param.conn.responder_resources = rep_data->responder_resources;
2134 event->param.conn.initiator_depth = rep_data->initiator_depth;
2135 event->param.conn.flow_control = rep_data->flow_control;
2136 event->param.conn.rnr_retry_count = rep_data->rnr_retry_count;
2137 event->param.conn.srq = rep_data->srq;
2138 event->param.conn.qp_num = rep_data->remote_qpn;
a20652e1
LR
2139
2140 event->ece.vendor_id = rep_data->ece.vendor_id;
2141 event->ece.attr_mod = rep_data->ece.attr_mod;
a1b1b61f
SH
2142}
2143
ed999f82
CL
2144static int cma_cm_event_handler(struct rdma_id_private *id_priv,
2145 struct rdma_cm_event *event)
2146{
2147 int ret;
2148
3647a28d
JG
2149 lockdep_assert_held(&id_priv->handler_mutex);
2150
ed999f82
CL
2151 trace_cm_event_handler(id_priv, event);
2152 ret = id_priv->id.event_handler(&id_priv->id, event);
2153 trace_cm_event_done(id_priv, event, ret);
2154 return ret;
2155}
2156
e7ff98ae
PP
2157static int cma_ib_handler(struct ib_cm_id *cm_id,
2158 const struct ib_cm_event *ib_event)
e51060f0
SH
2159{
2160 struct rdma_id_private *id_priv = cm_id->context;
7582df82 2161 struct rdma_cm_event event = {};
2a7cec53 2162 enum rdma_cm_state state;
f6a9d47a 2163 int ret;
e51060f0 2164
37e07cda 2165 mutex_lock(&id_priv->handler_mutex);
2a7cec53 2166 state = READ_ONCE(id_priv->state);
38ca83a5 2167 if ((ib_event->event != IB_CM_TIMEWAIT_EXIT &&
2a7cec53 2168 state != RDMA_CM_CONNECT) ||
38ca83a5 2169 (ib_event->event == IB_CM_TIMEWAIT_EXIT &&
2a7cec53 2170 state != RDMA_CM_DISCONNECT))
37e07cda 2171 goto out;
e51060f0
SH
2172
2173 switch (ib_event->event) {
2174 case IB_CM_REQ_ERROR:
2175 case IB_CM_REP_ERROR:
a1b1b61f
SH
2176 event.event = RDMA_CM_EVENT_UNREACHABLE;
2177 event.status = -ETIMEDOUT;
e51060f0
SH
2178 break;
2179 case IB_CM_REP_RECEIVED:
2a7cec53 2180 if (state == RDMA_CM_CONNECT &&
ed999f82
CL
2181 (id_priv->id.qp_type != IB_QPT_UD)) {
2182 trace_cm_send_mra(id_priv);
61c0ddbe 2183 ib_send_cm_mra(cm_id, CMA_CM_MRA_SETTING, NULL, 0);
ed999f82 2184 }
01602f11 2185 if (id_priv->id.qp) {
a1b1b61f
SH
2186 event.status = cma_rep_recv(id_priv);
2187 event.event = event.status ? RDMA_CM_EVENT_CONNECT_ERROR :
2188 RDMA_CM_EVENT_ESTABLISHED;
01602f11 2189 } else {
a1b1b61f 2190 event.event = RDMA_CM_EVENT_CONNECT_RESPONSE;
01602f11 2191 }
a1b1b61f
SH
2192 cma_set_rep_event_data(&event, &ib_event->param.rep_rcvd,
2193 ib_event->private_data);
e51060f0
SH
2194 break;
2195 case IB_CM_RTU_RECEIVED:
0fe313b0
SH
2196 case IB_CM_USER_ESTABLISHED:
2197 event.event = RDMA_CM_EVENT_ESTABLISHED;
e51060f0
SH
2198 break;
2199 case IB_CM_DREQ_ERROR:
df561f66
GS
2200 event.status = -ETIMEDOUT;
2201 fallthrough;
e51060f0
SH
2202 case IB_CM_DREQ_RECEIVED:
2203 case IB_CM_DREP_RECEIVED:
550e5ca7
NM
2204 if (!cma_comp_exch(id_priv, RDMA_CM_CONNECT,
2205 RDMA_CM_DISCONNECT))
e51060f0 2206 goto out;
a1b1b61f 2207 event.event = RDMA_CM_EVENT_DISCONNECTED;
e51060f0
SH
2208 break;
2209 case IB_CM_TIMEWAIT_EXIT:
38ca83a5
AV
2210 event.event = RDMA_CM_EVENT_TIMEWAIT_EXIT;
2211 break;
e51060f0
SH
2212 case IB_CM_MRA_RECEIVED:
2213 /* ignore event */
2214 goto out;
2215 case IB_CM_REJ_RECEIVED:
498683c6
MS
2216 pr_debug_ratelimited("RDMA CM: REJECTED: %s\n", rdma_reject_msg(&id_priv->id,
2217 ib_event->param.rej_rcvd.reason));
c5483388 2218 cma_modify_qp_err(id_priv);
a1b1b61f
SH
2219 event.status = ib_event->param.rej_rcvd.reason;
2220 event.event = RDMA_CM_EVENT_REJECTED;
2221 event.param.conn.private_data = ib_event->private_data;
2222 event.param.conn.private_data_len = IB_CM_REJ_PRIVATE_DATA_SIZE;
e51060f0
SH
2223 break;
2224 default:
aba25a3e 2225 pr_err("RDMA CMA: unexpected IB CM event: %d\n",
e51060f0
SH
2226 ib_event->event);
2227 goto out;
2228 }
2229
ed999f82 2230 ret = cma_cm_event_handler(id_priv, &event);
e51060f0
SH
2231 if (ret) {
2232 /* Destroy the CM ID by returning a non-zero value. */
2233 id_priv->cm_id.ib = NULL;
f6a9d47a 2234 destroy_id_handler_unlock(id_priv);
e51060f0
SH
2235 return ret;
2236 }
2237out:
de910bd9 2238 mutex_unlock(&id_priv->handler_mutex);
f6a9d47a 2239 return 0;
e51060f0
SH
2240}
2241
e7ff98ae 2242static struct rdma_id_private *
85463316
PP
2243cma_ib_new_conn_id(const struct rdma_cm_id *listen_id,
2244 const struct ib_cm_event *ib_event,
2245 struct net_device *net_dev)
e51060f0 2246{
00313983 2247 struct rdma_id_private *listen_id_priv;
e51060f0
SH
2248 struct rdma_id_private *id_priv;
2249 struct rdma_cm_id *id;
2250 struct rdma_route *rt;
0c505f70 2251 const sa_family_t ss_family = listen_id->route.addr.src_addr.ss_family;
9fdca4da 2252 struct sa_path_rec *path = ib_event->param.req_rcvd.primary_path;
d3957b86
MD
2253 const __be64 service_id =
2254 ib_event->param.req_rcvd.primary_path->service_id;
64c5e613 2255 int ret;
e51060f0 2256
00313983 2257 listen_id_priv = container_of(listen_id, struct rdma_id_private, id);
b09c4d70
LR
2258 id_priv = __rdma_create_id(listen_id->route.addr.dev_addr.net,
2259 listen_id->event_handler, listen_id->context,
2260 listen_id->ps,
2261 ib_event->param.req_rcvd.qp_type,
2262 listen_id_priv);
2263 if (IS_ERR(id_priv))
0c9361fc 2264 return NULL;
3f168d2b 2265
b09c4d70 2266 id = &id_priv->id;
0c505f70
HE
2267 if (cma_save_net_info((struct sockaddr *)&id->route.addr.src_addr,
2268 (struct sockaddr *)&id->route.addr.dst_addr,
2269 listen_id, ib_event, ss_family, service_id))
fbaa1a6d 2270 goto err;
e51060f0
SH
2271
2272 rt = &id->route;
bf9a9928
MZ
2273 rt->num_pri_alt_paths = ib_event->param.req_rcvd.alternate_path ? 2 : 1;
2274 rt->path_rec = kmalloc_array(rt->num_pri_alt_paths,
2275 sizeof(*rt->path_rec), GFP_KERNEL);
e51060f0 2276 if (!rt->path_rec)
0c9361fc 2277 goto err;
e51060f0 2278
9fdca4da 2279 rt->path_rec[0] = *path;
bf9a9928 2280 if (rt->num_pri_alt_paths == 2)
e51060f0
SH
2281 rt->path_rec[1] = *ib_event->param.req_rcvd.alternate_path;
2282
0b3ca768 2283 if (net_dev) {
77addc52 2284 rdma_copy_src_l2_addr(&rt->addr.dev_addr, net_dev);
0b3ca768 2285 } else {
b8cab5da
HE
2286 if (!cma_protocol_roce(listen_id) &&
2287 cma_any_addr(cma_src_addr(id_priv))) {
2288 rt->addr.dev_addr.dev_type = ARPHRD_INFINIBAND;
2289 rdma_addr_set_sgid(&rt->addr.dev_addr, &rt->path_rec[0].sgid);
2290 ib_addr_set_pkey(&rt->addr.dev_addr, be16_to_cpu(rt->path_rec[0].pkey));
2291 } else if (!cma_any_addr(cma_src_addr(id_priv))) {
2292 ret = cma_translate_addr(cma_src_addr(id_priv), &rt->addr.dev_addr);
2293 if (ret)
2294 goto err;
2295 }
6f8372b6
SH
2296 }
2297 rdma_addr_set_dgid(&rt->addr.dev_addr, &rt->path_rec[0].dgid);
e51060f0 2298
550e5ca7 2299 id_priv->state = RDMA_CM_CONNECT;
e51060f0 2300 return id_priv;
3f168d2b 2301
3f168d2b 2302err:
0c9361fc 2303 rdma_destroy_id(id);
e51060f0
SH
2304 return NULL;
2305}
2306
e7ff98ae 2307static struct rdma_id_private *
85463316
PP
2308cma_ib_new_udp_id(const struct rdma_cm_id *listen_id,
2309 const struct ib_cm_event *ib_event,
2310 struct net_device *net_dev)
628e5f6d 2311{
e7ff98ae 2312 const struct rdma_id_private *listen_id_priv;
628e5f6d
SH
2313 struct rdma_id_private *id_priv;
2314 struct rdma_cm_id *id;
0c505f70 2315 const sa_family_t ss_family = listen_id->route.addr.src_addr.ss_family;
fa20105e 2316 struct net *net = listen_id->route.addr.dev_addr.net;
628e5f6d
SH
2317 int ret;
2318
00313983 2319 listen_id_priv = container_of(listen_id, struct rdma_id_private, id);
b09c4d70
LR
2320 id_priv = __rdma_create_id(net, listen_id->event_handler,
2321 listen_id->context, listen_id->ps, IB_QPT_UD,
2322 listen_id_priv);
2323 if (IS_ERR(id_priv))
628e5f6d
SH
2324 return NULL;
2325
b09c4d70 2326 id = &id_priv->id;
0c505f70
HE
2327 if (cma_save_net_info((struct sockaddr *)&id->route.addr.src_addr,
2328 (struct sockaddr *)&id->route.addr.dst_addr,
2329 listen_id, ib_event, ss_family,
2330 ib_event->param.sidr_req_rcvd.service_id))
628e5f6d
SH
2331 goto err;
2332
0b3ca768 2333 if (net_dev) {
77addc52 2334 rdma_copy_src_l2_addr(&id->route.addr.dev_addr, net_dev);
0b3ca768 2335 } else {
b8cab5da
HE
2336 if (!cma_any_addr(cma_src_addr(id_priv))) {
2337 ret = cma_translate_addr(cma_src_addr(id_priv),
2338 &id->route.addr.dev_addr);
2339 if (ret)
2340 goto err;
2341 }
6f8372b6 2342 }
628e5f6d 2343
550e5ca7 2344 id_priv->state = RDMA_CM_CONNECT;
628e5f6d
SH
2345 return id_priv;
2346err:
2347 rdma_destroy_id(id);
2348 return NULL;
2349}
2350
a1b1b61f 2351static void cma_set_req_event_data(struct rdma_cm_event *event,
e7ff98ae 2352 const struct ib_cm_req_event_param *req_data,
a1b1b61f
SH
2353 void *private_data, int offset)
2354{
2355 event->param.conn.private_data = private_data + offset;
2356 event->param.conn.private_data_len = IB_CM_REQ_PRIVATE_DATA_SIZE - offset;
2357 event->param.conn.responder_resources = req_data->responder_resources;
2358 event->param.conn.initiator_depth = req_data->initiator_depth;
2359 event->param.conn.flow_control = req_data->flow_control;
2360 event->param.conn.retry_count = req_data->retry_count;
2361 event->param.conn.rnr_retry_count = req_data->rnr_retry_count;
2362 event->param.conn.srq = req_data->srq;
2363 event->param.conn.qp_num = req_data->remote_qpn;
a20652e1
LR
2364
2365 event->ece.vendor_id = req_data->ece.vendor_id;
2366 event->ece.attr_mod = req_data->ece.attr_mod;
a1b1b61f
SH
2367}
2368
85463316
PP
2369static int cma_ib_check_req_qp_type(const struct rdma_cm_id *id,
2370 const struct ib_cm_event *ib_event)
9595480c 2371{
4dd81e89 2372 return (((ib_event->event == IB_CM_REQ_RECEIVED) &&
9595480c
HS
2373 (ib_event->param.req_rcvd.qp_type == id->qp_type)) ||
2374 ((ib_event->event == IB_CM_SIDR_REQ_RECEIVED) &&
2375 (id->qp_type == IB_QPT_UD)) ||
2376 (!id->qp_type));
2377}
2378
85463316
PP
2379static int cma_ib_req_handler(struct ib_cm_id *cm_id,
2380 const struct ib_cm_event *ib_event)
e51060f0 2381{
37e07cda 2382 struct rdma_id_private *listen_id, *conn_id = NULL;
7582df82 2383 struct rdma_cm_event event = {};
41ab1cb7 2384 struct cma_req_info req = {};
0b3ca768 2385 struct net_device *net_dev;
c0b64f58
BVA
2386 u8 offset;
2387 int ret;
e51060f0 2388
41ab1cb7 2389 listen_id = cma_ib_id_from_event(cm_id, ib_event, &req, &net_dev);
4c21b5bc
HE
2390 if (IS_ERR(listen_id))
2391 return PTR_ERR(listen_id);
2392
ed999f82 2393 trace_cm_req_handler(listen_id, ib_event->event);
85463316 2394 if (!cma_ib_check_req_qp_type(&listen_id->id, ib_event)) {
0b3ca768
HE
2395 ret = -EINVAL;
2396 goto net_dev_put;
2397 }
9595480c 2398
37e07cda 2399 mutex_lock(&listen_id->handler_mutex);
d490ee52 2400 if (READ_ONCE(listen_id->state) != RDMA_CM_LISTEN) {
0b3ca768 2401 ret = -ECONNABORTED;
f6a9d47a 2402 goto err_unlock;
0b3ca768 2403 }
e51060f0 2404
e8160e15 2405 offset = cma_user_data_offset(listen_id);
628e5f6d 2406 event.event = RDMA_CM_EVENT_CONNECT_REQUEST;
9595480c 2407 if (ib_event->event == IB_CM_SIDR_REQ_RECEIVED) {
85463316 2408 conn_id = cma_ib_new_udp_id(&listen_id->id, ib_event, net_dev);
628e5f6d
SH
2409 event.param.ud.private_data = ib_event->private_data + offset;
2410 event.param.ud.private_data_len =
2411 IB_CM_SIDR_REQ_PRIVATE_DATA_SIZE - offset;
2412 } else {
85463316 2413 conn_id = cma_ib_new_conn_id(&listen_id->id, ib_event, net_dev);
628e5f6d
SH
2414 cma_set_req_event_data(&event, &ib_event->param.req_rcvd,
2415 ib_event->private_data, offset);
2416 }
e51060f0
SH
2417 if (!conn_id) {
2418 ret = -ENOMEM;
f6a9d47a 2419 goto err_unlock;
e51060f0
SH
2420 }
2421
de910bd9 2422 mutex_lock_nested(&conn_id->handler_mutex, SINGLE_DEPTH_NESTING);
41ab1cb7 2423 ret = cma_ib_acquire_dev(conn_id, listen_id, &req);
f6a9d47a
JG
2424 if (ret) {
2425 destroy_id_handler_unlock(conn_id);
2426 goto err_unlock;
2427 }
e51060f0
SH
2428
2429 conn_id->cm_id.ib = cm_id;
2430 cm_id->context = conn_id;
2431 cm_id->cm_handler = cma_ib_handler;
2432
ed999f82 2433 ret = cma_cm_event_handler(conn_id, &event);
f6a9d47a
JG
2434 if (ret) {
2435 /* Destroy the CM ID by returning a non-zero value. */
2436 conn_id->cm_id.ib = NULL;
2437 mutex_unlock(&listen_id->handler_mutex);
2438 destroy_id_handler_unlock(conn_id);
2439 goto net_dev_put;
2440 }
2441
2a7cec53
JG
2442 if (READ_ONCE(conn_id->state) == RDMA_CM_CONNECT &&
2443 conn_id->id.qp_type != IB_QPT_UD) {
ed999f82 2444 trace_cm_send_mra(cm_id->context);
b6cec8aa 2445 ib_send_cm_mra(cm_id, CMA_CM_MRA_SETTING, NULL, 0);
ed999f82 2446 }
b6cec8aa 2447 mutex_unlock(&conn_id->handler_mutex);
a1a733f6 2448
f6a9d47a 2449err_unlock:
de910bd9 2450 mutex_unlock(&listen_id->handler_mutex);
0b3ca768
HE
2451
2452net_dev_put:
08ebf57f 2453 dev_put(net_dev);
0b3ca768 2454
e51060f0
SH
2455 return ret;
2456}
2457
cf53936f 2458__be64 rdma_get_service_id(struct rdma_cm_id *id, struct sockaddr *addr)
e51060f0 2459{
496ce3ce
SH
2460 if (addr->sa_family == AF_IB)
2461 return ((struct sockaddr_ib *) addr)->sib_sid;
2462
cf53936f 2463 return cpu_to_be64(((u64)id->ps << 16) + be16_to_cpu(cma_port(addr)));
e51060f0 2464}
cf53936f 2465EXPORT_SYMBOL(rdma_get_service_id);
e51060f0 2466
411460ac
PP
2467void rdma_read_gids(struct rdma_cm_id *cm_id, union ib_gid *sgid,
2468 union ib_gid *dgid)
2469{
2470 struct rdma_addr *addr = &cm_id->route.addr;
2471
2472 if (!cm_id->device) {
2473 if (sgid)
2474 memset(sgid, 0, sizeof(*sgid));
2475 if (dgid)
2476 memset(dgid, 0, sizeof(*dgid));
2477 return;
2478 }
2479
2480 if (rdma_protocol_roce(cm_id->device, cm_id->port_num)) {
2481 if (sgid)
2482 rdma_ip2gid((struct sockaddr *)&addr->src_addr, sgid);
2483 if (dgid)
2484 rdma_ip2gid((struct sockaddr *)&addr->dst_addr, dgid);
2485 } else {
2486 if (sgid)
2487 rdma_addr_get_sgid(&addr->dev_addr, sgid);
2488 if (dgid)
2489 rdma_addr_get_dgid(&addr->dev_addr, dgid);
2490 }
2491}
2492EXPORT_SYMBOL(rdma_read_gids);
2493
07ebafba
TT
2494static int cma_iw_handler(struct iw_cm_id *iw_id, struct iw_cm_event *iw_event)
2495{
2496 struct rdma_id_private *id_priv = iw_id->context;
7582df82 2497 struct rdma_cm_event event = {};
07ebafba 2498 int ret = 0;
24d44a39
SW
2499 struct sockaddr *laddr = (struct sockaddr *)&iw_event->local_addr;
2500 struct sockaddr *raddr = (struct sockaddr *)&iw_event->remote_addr;
07ebafba 2501
37e07cda 2502 mutex_lock(&id_priv->handler_mutex);
2a7cec53 2503 if (READ_ONCE(id_priv->state) != RDMA_CM_CONNECT)
37e07cda 2504 goto out;
07ebafba
TT
2505
2506 switch (iw_event->event) {
2507 case IW_CM_EVENT_CLOSE:
a1b1b61f 2508 event.event = RDMA_CM_EVENT_DISCONNECTED;
07ebafba
TT
2509 break;
2510 case IW_CM_EVENT_CONNECT_REPLY:
24d44a39
SW
2511 memcpy(cma_src_addr(id_priv), laddr,
2512 rdma_addr_size(laddr));
2513 memcpy(cma_dst_addr(id_priv), raddr,
2514 rdma_addr_size(raddr));
881a045f
SW
2515 switch (iw_event->status) {
2516 case 0:
a1b1b61f 2517 event.event = RDMA_CM_EVENT_ESTABLISHED;
3ebeebc3
KS
2518 event.param.conn.initiator_depth = iw_event->ird;
2519 event.param.conn.responder_resources = iw_event->ord;
881a045f
SW
2520 break;
2521 case -ECONNRESET:
2522 case -ECONNREFUSED:
2523 event.event = RDMA_CM_EVENT_REJECTED;
2524 break;
2525 case -ETIMEDOUT:
2526 event.event = RDMA_CM_EVENT_UNREACHABLE;
2527 break;
2528 default:
2529 event.event = RDMA_CM_EVENT_CONNECT_ERROR;
2530 break;
2531 }
07ebafba
TT
2532 break;
2533 case IW_CM_EVENT_ESTABLISHED:
a1b1b61f 2534 event.event = RDMA_CM_EVENT_ESTABLISHED;
3ebeebc3
KS
2535 event.param.conn.initiator_depth = iw_event->ird;
2536 event.param.conn.responder_resources = iw_event->ord;
07ebafba
TT
2537 break;
2538 default:
671a6cc2 2539 goto out;
07ebafba
TT
2540 }
2541
a1b1b61f
SH
2542 event.status = iw_event->status;
2543 event.param.conn.private_data = iw_event->private_data;
2544 event.param.conn.private_data_len = iw_event->private_data_len;
ed999f82 2545 ret = cma_cm_event_handler(id_priv, &event);
07ebafba
TT
2546 if (ret) {
2547 /* Destroy the CM ID by returning a non-zero value. */
2548 id_priv->cm_id.iw = NULL;
f6a9d47a 2549 destroy_id_handler_unlock(id_priv);
07ebafba
TT
2550 return ret;
2551 }
2552
37e07cda 2553out:
de910bd9 2554 mutex_unlock(&id_priv->handler_mutex);
07ebafba
TT
2555 return ret;
2556}
2557
2558static int iw_conn_req_handler(struct iw_cm_id *cm_id,
2559 struct iw_cm_event *iw_event)
2560{
07ebafba 2561 struct rdma_id_private *listen_id, *conn_id;
7582df82 2562 struct rdma_cm_event event = {};
37e07cda 2563 int ret = -ECONNABORTED;
24d44a39
SW
2564 struct sockaddr *laddr = (struct sockaddr *)&iw_event->local_addr;
2565 struct sockaddr *raddr = (struct sockaddr *)&iw_event->remote_addr;
07ebafba 2566
7582df82
PP
2567 event.event = RDMA_CM_EVENT_CONNECT_REQUEST;
2568 event.param.conn.private_data = iw_event->private_data;
2569 event.param.conn.private_data_len = iw_event->private_data_len;
2570 event.param.conn.initiator_depth = iw_event->ird;
2571 event.param.conn.responder_resources = iw_event->ord;
2572
07ebafba 2573 listen_id = cm_id->context;
37e07cda
BVA
2574
2575 mutex_lock(&listen_id->handler_mutex);
d490ee52 2576 if (READ_ONCE(listen_id->state) != RDMA_CM_LISTEN)
37e07cda 2577 goto out;
07ebafba
TT
2578
2579 /* Create a new RDMA id for the new IW CM ID */
b09c4d70
LR
2580 conn_id = __rdma_create_id(listen_id->id.route.addr.dev_addr.net,
2581 listen_id->id.event_handler,
2582 listen_id->id.context, RDMA_PS_TCP,
2583 IB_QPT_RC, listen_id);
2584 if (IS_ERR(conn_id)) {
07ebafba
TT
2585 ret = -ENOMEM;
2586 goto out;
2587 }
de910bd9 2588 mutex_lock_nested(&conn_id->handler_mutex, SINGLE_DEPTH_NESTING);
550e5ca7 2589 conn_id->state = RDMA_CM_CONNECT;
07ebafba 2590
575c7e58 2591 ret = rdma_translate_ip(laddr, &conn_id->id.route.addr.dev_addr);
07ebafba 2592 if (ret) {
f6a9d47a
JG
2593 mutex_unlock(&listen_id->handler_mutex);
2594 destroy_id_handler_unlock(conn_id);
2595 return ret;
07ebafba
TT
2596 }
2597
41ab1cb7 2598 ret = cma_iw_acquire_dev(conn_id, listen_id);
07ebafba 2599 if (ret) {
f6a9d47a
JG
2600 mutex_unlock(&listen_id->handler_mutex);
2601 destroy_id_handler_unlock(conn_id);
2602 return ret;
07ebafba
TT
2603 }
2604
2605 conn_id->cm_id.iw = cm_id;
2606 cm_id->context = conn_id;
2607 cm_id->cm_handler = cma_iw_handler;
2608
24d44a39
SW
2609 memcpy(cma_src_addr(conn_id), laddr, rdma_addr_size(laddr));
2610 memcpy(cma_dst_addr(conn_id), raddr, rdma_addr_size(raddr));
07ebafba 2611
ed999f82 2612 ret = cma_cm_event_handler(conn_id, &event);
07ebafba
TT
2613 if (ret) {
2614 /* User wants to destroy the CM ID */
2615 conn_id->cm_id.iw = NULL;
b66f31ef 2616 mutex_unlock(&listen_id->handler_mutex);
f6a9d47a 2617 destroy_id_handler_unlock(conn_id);
b66f31ef 2618 return ret;
07ebafba
TT
2619 }
2620
de910bd9
OG
2621 mutex_unlock(&conn_id->handler_mutex);
2622
07ebafba 2623out:
de910bd9 2624 mutex_unlock(&listen_id->handler_mutex);
07ebafba
TT
2625 return ret;
2626}
2627
e51060f0
SH
2628static int cma_ib_listen(struct rdma_id_private *id_priv)
2629{
e51060f0 2630 struct sockaddr *addr;
0c9361fc 2631 struct ib_cm_id *id;
e51060f0 2632 __be64 svc_id;
e51060f0 2633
51efe394
HE
2634 addr = cma_src_addr(id_priv);
2635 svc_id = rdma_get_service_id(&id_priv->id, addr);
85463316
PP
2636 id = ib_cm_insert_listen(id_priv->id.device,
2637 cma_ib_req_handler, svc_id);
0c9361fc
JM
2638 if (IS_ERR(id))
2639 return PTR_ERR(id);
0c9361fc 2640 id_priv->cm_id.ib = id;
e51060f0 2641
51efe394 2642 return 0;
e51060f0
SH
2643}
2644
07ebafba
TT
2645static int cma_iw_listen(struct rdma_id_private *id_priv, int backlog)
2646{
2647 int ret;
0c9361fc
JM
2648 struct iw_cm_id *id;
2649
2650 id = iw_create_cm_id(id_priv->id.device,
2651 iw_conn_req_handler,
2652 id_priv);
2653 if (IS_ERR(id))
2654 return PTR_ERR(id);
07ebafba 2655
ca0c448d 2656 mutex_lock(&id_priv->qp_mutex);
68cdba06 2657 id->tos = id_priv->tos;
926ba19b 2658 id->tos_set = id_priv->tos_set;
ca0c448d 2659 mutex_unlock(&id_priv->qp_mutex);
e35ecb46 2660 id->afonly = id_priv->afonly;
0c9361fc 2661 id_priv->cm_id.iw = id;
07ebafba 2662
24d44a39
SW
2663 memcpy(&id_priv->cm_id.iw->local_addr, cma_src_addr(id_priv),
2664 rdma_addr_size(cma_src_addr(id_priv)));
07ebafba
TT
2665
2666 ret = iw_cm_listen(id_priv->cm_id.iw, backlog);
2667
2668 if (ret) {
2669 iw_destroy_cm_id(id_priv->cm_id.iw);
2670 id_priv->cm_id.iw = NULL;
2671 }
2672
2673 return ret;
2674}
2675
e51060f0
SH
2676static int cma_listen_handler(struct rdma_cm_id *id,
2677 struct rdma_cm_event *event)
2678{
2679 struct rdma_id_private *id_priv = id->context;
2680
d54f23c0
JG
2681 /* Listening IDs are always destroyed on removal */
2682 if (event->event == RDMA_CM_EVENT_DEVICE_REMOVAL)
2683 return -1;
2684
e51060f0
SH
2685 id->context = id_priv->id.context;
2686 id->event_handler = id_priv->id.event_handler;
ed999f82 2687 trace_cm_event_handler(id_priv, event);
e51060f0
SH
2688 return id_priv->id.event_handler(id, event);
2689}
2690
c80a0c52 2691static int cma_listen_on_dev(struct rdma_id_private *id_priv,
dd37d2f5
JG
2692 struct cma_device *cma_dev,
2693 struct rdma_id_private **to_destroy)
e51060f0
SH
2694{
2695 struct rdma_id_private *dev_id_priv;
fa20105e 2696 struct net *net = id_priv->id.route.addr.dev_addr.net;
e51060f0
SH
2697 int ret;
2698
730c8912
MZ
2699 lockdep_assert_held(&lock);
2700
dd37d2f5 2701 *to_destroy = NULL;
72219cea 2702 if (cma_family(id_priv) == AF_IB && !rdma_cap_ib_cm(cma_dev->device, 1))
c80a0c52 2703 return 0;
94d0c939 2704
b09c4d70
LR
2705 dev_id_priv =
2706 __rdma_create_id(net, cma_listen_handler, id_priv,
2707 id_priv->id.ps, id_priv->id.qp_type, id_priv);
2708 if (IS_ERR(dev_id_priv))
c80a0c52 2709 return PTR_ERR(dev_id_priv);
e51060f0 2710
550e5ca7 2711 dev_id_priv->state = RDMA_CM_ADDR_BOUND;
f4753834
SH
2712 memcpy(cma_src_addr(dev_id_priv), cma_src_addr(id_priv),
2713 rdma_addr_size(cma_src_addr(id_priv)));
e51060f0 2714
045959db 2715 _cma_attach_to_dev(dev_id_priv, cma_dev);
cb5cd0ea 2716 rdma_restrack_add(&dev_id_priv->res);
e368d23f 2717 cma_id_get(id_priv);
d02d1f53 2718 dev_id_priv->internal_id = 1;
5b0ec991 2719 dev_id_priv->afonly = id_priv->afonly;
ca0c448d 2720 mutex_lock(&id_priv->qp_mutex);
9491128f
SW
2721 dev_id_priv->tos_set = id_priv->tos_set;
2722 dev_id_priv->tos = id_priv->tos;
ca0c448d 2723 mutex_unlock(&id_priv->qp_mutex);
e51060f0 2724
b09c4d70 2725 ret = rdma_listen(&dev_id_priv->id, id_priv->backlog);
e51060f0 2726 if (ret)
c80a0c52 2727 goto err_listen;
99cfddb8 2728 list_add_tail(&dev_id_priv->listen_item, &id_priv->listen_list);
c80a0c52
LR
2729 return 0;
2730err_listen:
dd37d2f5
JG
2731 /* Caller must destroy this after releasing lock */
2732 *to_destroy = dev_id_priv;
c80a0c52 2733 dev_warn(&cma_dev->device->dev, "RDMA CMA: %s, error %d\n", __func__, ret);
c80a0c52 2734 return ret;
e51060f0
SH
2735}
2736
c80a0c52 2737static int cma_listen_on_all(struct rdma_id_private *id_priv)
e51060f0 2738{
dd37d2f5 2739 struct rdma_id_private *to_destroy;
e51060f0 2740 struct cma_device *cma_dev;
c80a0c52 2741 int ret;
e51060f0
SH
2742
2743 mutex_lock(&lock);
99cfddb8 2744 list_add_tail(&id_priv->listen_any_item, &listen_any_list);
c80a0c52 2745 list_for_each_entry(cma_dev, &dev_list, list) {
dd37d2f5
JG
2746 ret = cma_listen_on_dev(id_priv, cma_dev, &to_destroy);
2747 if (ret) {
2748 /* Prevent racing with cma_process_remove() */
2749 if (to_destroy)
99cfddb8 2750 list_del_init(&to_destroy->device_item);
c80a0c52 2751 goto err_listen;
dd37d2f5 2752 }
c80a0c52
LR
2753 }
2754 mutex_unlock(&lock);
2755 return 0;
2756
2757err_listen:
ca465e1f 2758 _cma_cancel_listens(id_priv);
e51060f0 2759 mutex_unlock(&lock);
dd37d2f5
JG
2760 if (to_destroy)
2761 rdma_destroy_id(&to_destroy->id);
c80a0c52 2762 return ret;
e51060f0
SH
2763}
2764
a81c994d
SH
2765void rdma_set_service_type(struct rdma_cm_id *id, int tos)
2766{
2767 struct rdma_id_private *id_priv;
2768
2769 id_priv = container_of(id, struct rdma_id_private, id);
ca0c448d 2770 mutex_lock(&id_priv->qp_mutex);
a81c994d 2771 id_priv->tos = (u8) tos;
89052d78 2772 id_priv->tos_set = true;
ca0c448d 2773 mutex_unlock(&id_priv->qp_mutex);
a81c994d
SH
2774}
2775EXPORT_SYMBOL(rdma_set_service_type);
2776
2c1619ed
DG
2777/**
2778 * rdma_set_ack_timeout() - Set the ack timeout of QP associated
2779 * with a connection identifier.
2780 * @id: Communication identifier to associated with service type.
2781 * @timeout: Ack timeout to set a QP, expressed as 4.096 * 2^(timeout) usec.
2782 *
2783 * This function should be called before rdma_connect() on active side,
2784 * and on passive side before rdma_accept(). It is applicable to primary
2785 * path only. The timeout will affect the local side of the QP, it is not
e1ee1e62
DM
2786 * negotiated with remote side and zero disables the timer. In case it is
2787 * set before rdma_resolve_route, the value will also be used to determine
2788 * PacketLifeTime for RoCE.
2c1619ed
DG
2789 *
2790 * Return: 0 for success
2791 */
2792int rdma_set_ack_timeout(struct rdma_cm_id *id, u8 timeout)
2793{
2794 struct rdma_id_private *id_priv;
2795
748663c8 2796 if (id->qp_type != IB_QPT_RC && id->qp_type != IB_QPT_XRC_INI)
2c1619ed
DG
2797 return -EINVAL;
2798
2799 id_priv = container_of(id, struct rdma_id_private, id);
ca0c448d 2800 mutex_lock(&id_priv->qp_mutex);
2c1619ed
DG
2801 id_priv->timeout = timeout;
2802 id_priv->timeout_set = true;
ca0c448d 2803 mutex_unlock(&id_priv->qp_mutex);
2c1619ed
DG
2804
2805 return 0;
2806}
2807EXPORT_SYMBOL(rdma_set_ack_timeout);
2808
3aeffc46
HB
2809/**
2810 * rdma_set_min_rnr_timer() - Set the minimum RNR Retry timer of the
2811 * QP associated with a connection identifier.
2812 * @id: Communication identifier to associated with service type.
2813 * @min_rnr_timer: 5-bit value encoded as Table 45: "Encoding for RNR NAK
2814 * Timer Field" in the IBTA specification.
2815 *
2816 * This function should be called before rdma_connect() on active
2817 * side, and on passive side before rdma_accept(). The timer value
2818 * will be associated with the local QP. When it receives a send it is
2819 * not read to handle, typically if the receive queue is empty, an RNR
2820 * Retry NAK is returned to the requester with the min_rnr_timer
2821 * encoded. The requester will then wait at least the time specified
2822 * in the NAK before retrying. The default is zero, which translates
2823 * to a minimum RNR Timer value of 655 ms.
2824 *
2825 * Return: 0 for success
2826 */
2827int rdma_set_min_rnr_timer(struct rdma_cm_id *id, u8 min_rnr_timer)
2828{
2829 struct rdma_id_private *id_priv;
2830
2831 /* It is a five-bit value */
2832 if (min_rnr_timer & 0xe0)
2833 return -EINVAL;
2834
2835 if (WARN_ON(id->qp_type != IB_QPT_RC && id->qp_type != IB_QPT_XRC_TGT))
2836 return -EINVAL;
2837
2838 id_priv = container_of(id, struct rdma_id_private, id);
ca0c448d 2839 mutex_lock(&id_priv->qp_mutex);
3aeffc46
HB
2840 id_priv->min_rnr_timer = min_rnr_timer;
2841 id_priv->min_rnr_timer_set = true;
ca0c448d 2842 mutex_unlock(&id_priv->qp_mutex);
3aeffc46
HB
2843
2844 return 0;
2845}
2846EXPORT_SYMBOL(rdma_set_min_rnr_timer);
2847
ccae0447
MZ
2848static int route_set_path_rec_inbound(struct cma_work *work,
2849 struct sa_path_rec *path_rec)
5a374949
MZ
2850{
2851 struct rdma_route *route = &work->id->id.route;
2852
2853 if (!route->path_rec_inbound) {
2854 route->path_rec_inbound =
2855 kzalloc(sizeof(*route->path_rec_inbound), GFP_KERNEL);
2856 if (!route->path_rec_inbound)
ccae0447 2857 return -ENOMEM;
5a374949
MZ
2858 }
2859
2860 *route->path_rec_inbound = *path_rec;
ccae0447 2861 return 0;
5a374949
MZ
2862}
2863
ccae0447
MZ
2864static int route_set_path_rec_outbound(struct cma_work *work,
2865 struct sa_path_rec *path_rec)
5a374949
MZ
2866{
2867 struct rdma_route *route = &work->id->id.route;
2868
2869 if (!route->path_rec_outbound) {
2870 route->path_rec_outbound =
2871 kzalloc(sizeof(*route->path_rec_outbound), GFP_KERNEL);
2872 if (!route->path_rec_outbound)
ccae0447 2873 return -ENOMEM;
5a374949
MZ
2874 }
2875
2876 *route->path_rec_outbound = *path_rec;
ccae0447 2877 return 0;
5a374949
MZ
2878}
2879
c2f8fc4e 2880static void cma_query_handler(int status, struct sa_path_rec *path_rec,
ccae0447 2881 unsigned int num_prs, void *context)
e51060f0
SH
2882{
2883 struct cma_work *work = context;
2884 struct rdma_route *route;
5a374949 2885 int i;
e51060f0
SH
2886
2887 route = &work->id->id.route;
2888
5a374949
MZ
2889 if (status)
2890 goto fail;
2891
2892 for (i = 0; i < num_prs; i++) {
2893 if (!path_rec[i].flags || (path_rec[i].flags & IB_PATH_GMP))
2894 *route->path_rec = path_rec[i];
2895 else if (path_rec[i].flags & IB_PATH_INBOUND)
ccae0447 2896 status = route_set_path_rec_inbound(work, &path_rec[i]);
5a374949 2897 else if (path_rec[i].flags & IB_PATH_OUTBOUND)
ccae0447
MZ
2898 status = route_set_path_rec_outbound(work,
2899 &path_rec[i]);
2900 else
2901 status = -EINVAL;
2902
2903 if (status)
2904 goto fail;
e51060f0
SH
2905 }
2906
5a374949
MZ
2907 route->num_pri_alt_paths = 1;
2908 queue_work(cma_wq, &work->work);
2909 return;
2910
2911fail:
2912 work->old_state = RDMA_CM_ROUTE_QUERY;
2913 work->new_state = RDMA_CM_ADDR_RESOLVED;
2914 work->event.event = RDMA_CM_EVENT_ROUTE_ERROR;
2915 work->event.status = status;
2916 pr_debug_ratelimited("RDMA CM: ROUTE_ERROR: failed to query path. status %d\n",
2917 status);
e51060f0
SH
2918 queue_work(cma_wq, &work->work);
2919}
2920
dbace111
LR
2921static int cma_query_ib_route(struct rdma_id_private *id_priv,
2922 unsigned long timeout_ms, struct cma_work *work)
e51060f0 2923{
f4753834 2924 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
c2f8fc4e 2925 struct sa_path_rec path_rec;
a81c994d
SH
2926 ib_sa_comp_mask comp_mask;
2927 struct sockaddr_in6 *sin6;
f68194ca 2928 struct sockaddr_ib *sib;
e51060f0
SH
2929
2930 memset(&path_rec, 0, sizeof path_rec);
4c33bd19
DC
2931
2932 if (rdma_cap_opa_ah(id_priv->id.device, id_priv->id.port_num))
2933 path_rec.rec_type = SA_PATH_REC_TYPE_OPA;
2934 else
2935 path_rec.rec_type = SA_PATH_REC_TYPE_IB;
f4753834
SH
2936 rdma_addr_get_sgid(dev_addr, &path_rec.sgid);
2937 rdma_addr_get_dgid(dev_addr, &path_rec.dgid);
2938 path_rec.pkey = cpu_to_be16(ib_addr_get_pkey(dev_addr));
e51060f0 2939 path_rec.numb_path = 1;
962063e6 2940 path_rec.reversible = 1;
d3957b86
MD
2941 path_rec.service_id = rdma_get_service_id(&id_priv->id,
2942 cma_dst_addr(id_priv));
a81c994d
SH
2943
2944 comp_mask = IB_SA_PATH_REC_DGID | IB_SA_PATH_REC_SGID |
2945 IB_SA_PATH_REC_PKEY | IB_SA_PATH_REC_NUMB_PATH |
2946 IB_SA_PATH_REC_REVERSIBLE | IB_SA_PATH_REC_SERVICE_ID;
2947
f68194ca
SH
2948 switch (cma_family(id_priv)) {
2949 case AF_INET:
a81c994d
SH
2950 path_rec.qos_class = cpu_to_be16((u16) id_priv->tos);
2951 comp_mask |= IB_SA_PATH_REC_QOS_CLASS;
f68194ca
SH
2952 break;
2953 case AF_INET6:
f4753834 2954 sin6 = (struct sockaddr_in6 *) cma_src_addr(id_priv);
a81c994d
SH
2955 path_rec.traffic_class = (u8) (be32_to_cpu(sin6->sin6_flowinfo) >> 20);
2956 comp_mask |= IB_SA_PATH_REC_TRAFFIC_CLASS;
f68194ca
SH
2957 break;
2958 case AF_IB:
2959 sib = (struct sockaddr_ib *) cma_src_addr(id_priv);
2960 path_rec.traffic_class = (u8) (be32_to_cpu(sib->sib_flowinfo) >> 20);
2961 comp_mask |= IB_SA_PATH_REC_TRAFFIC_CLASS;
2962 break;
a81c994d 2963 }
e51060f0 2964
c1a0b23b 2965 id_priv->query_id = ib_sa_path_rec_get(&sa_client, id_priv->id.device,
a81c994d
SH
2966 id_priv->id.port_num, &path_rec,
2967 comp_mask, timeout_ms,
2968 GFP_KERNEL, cma_query_handler,
2969 work, &id_priv->query);
e51060f0
SH
2970
2971 return (id_priv->query_id < 0) ? id_priv->query_id : 0;
2972}
2973
fe454dc3
AH
2974static void cma_iboe_join_work_handler(struct work_struct *work)
2975{
2976 struct cma_multicast *mc =
2977 container_of(work, struct cma_multicast, iboe_join.work);
2978 struct rdma_cm_event *event = &mc->iboe_join.event;
2979 struct rdma_id_private *id_priv = mc->id_priv;
2980 int ret;
2981
2982 mutex_lock(&id_priv->handler_mutex);
2983 if (READ_ONCE(id_priv->state) == RDMA_CM_DESTROYING ||
2984 READ_ONCE(id_priv->state) == RDMA_CM_DEVICE_REMOVAL)
2985 goto out_unlock;
2986
2987 ret = cma_cm_event_handler(id_priv, event);
2988 WARN_ON(ret);
2989
2990out_unlock:
2991 mutex_unlock(&id_priv->handler_mutex);
2992 if (event->event == RDMA_CM_EVENT_MULTICAST_JOIN)
2993 rdma_destroy_ah_attr(&event->param.ud.ah_attr);
2994}
2995
c4028958 2996static void cma_work_handler(struct work_struct *_work)
e51060f0 2997{
c4028958 2998 struct cma_work *work = container_of(_work, struct cma_work, work);
e51060f0 2999 struct rdma_id_private *id_priv = work->id;
e51060f0 3000
de910bd9 3001 mutex_lock(&id_priv->handler_mutex);
7e85bcda
JG
3002 if (READ_ONCE(id_priv->state) == RDMA_CM_DESTROYING ||
3003 READ_ONCE(id_priv->state) == RDMA_CM_DEVICE_REMOVAL)
f6a9d47a 3004 goto out_unlock;
7e85bcda
JG
3005 if (work->old_state != 0 || work->new_state != 0) {
3006 if (!cma_comp_exch(id_priv, work->old_state, work->new_state))
3007 goto out_unlock;
e51060f0 3008 }
f6a9d47a 3009
ed999f82 3010 if (cma_cm_event_handler(id_priv, &work->event)) {
f6a9d47a
JG
3011 cma_id_put(id_priv);
3012 destroy_id_handler_unlock(id_priv);
3013 goto out_free;
dd5bdff8
OG
3014 }
3015
f6a9d47a 3016out_unlock:
dd5bdff8 3017 mutex_unlock(&id_priv->handler_mutex);
e368d23f 3018 cma_id_put(id_priv);
f6a9d47a 3019out_free:
b5de0c60
JG
3020 if (work->event.event == RDMA_CM_EVENT_MULTICAST_JOIN)
3021 rdma_destroy_ah_attr(&work->event.param.ud.ah_attr);
dd5bdff8
OG
3022 kfree(work);
3023}
3024
981b5a23
PP
3025static void cma_init_resolve_route_work(struct cma_work *work,
3026 struct rdma_id_private *id_priv)
3027{
3028 work->id = id_priv;
3029 INIT_WORK(&work->work, cma_work_handler);
3030 work->old_state = RDMA_CM_ROUTE_QUERY;
3031 work->new_state = RDMA_CM_ROUTE_RESOLVED;
3032 work->event.event = RDMA_CM_EVENT_ROUTE_RESOLVED;
3033}
3034
081ea519
PP
3035static void enqueue_resolve_addr_work(struct cma_work *work,
3036 struct rdma_id_private *id_priv)
981b5a23 3037{
e368d23f
PP
3038 /* Balances with cma_id_put() in cma_work_handler */
3039 cma_id_get(id_priv);
081ea519 3040
981b5a23
PP
3041 work->id = id_priv;
3042 INIT_WORK(&work->work, cma_work_handler);
3043 work->old_state = RDMA_CM_ADDR_QUERY;
3044 work->new_state = RDMA_CM_ADDR_RESOLVED;
3045 work->event.event = RDMA_CM_EVENT_ADDR_RESOLVED;
081ea519
PP
3046
3047 queue_work(cma_wq, &work->work);
981b5a23
PP
3048}
3049
dbace111
LR
3050static int cma_resolve_ib_route(struct rdma_id_private *id_priv,
3051 unsigned long timeout_ms)
e51060f0
SH
3052{
3053 struct rdma_route *route = &id_priv->id.route;
3054 struct cma_work *work;
3055 int ret;
3056
3057 work = kzalloc(sizeof *work, GFP_KERNEL);
3058 if (!work)
3059 return -ENOMEM;
3060
981b5a23 3061 cma_init_resolve_route_work(work, id_priv);
e51060f0 3062
74f160ea
GR
3063 if (!route->path_rec)
3064 route->path_rec = kmalloc(sizeof *route->path_rec, GFP_KERNEL);
e51060f0
SH
3065 if (!route->path_rec) {
3066 ret = -ENOMEM;
3067 goto err1;
3068 }
3069
3070 ret = cma_query_ib_route(id_priv, timeout_ms, work);
3071 if (ret)
3072 goto err2;
3073
3074 return 0;
3075err2:
3076 kfree(route->path_rec);
3077 route->path_rec = NULL;
3078err1:
3079 kfree(work);
3080 return ret;
3081}
3082
9327c7af
PP
3083static enum ib_gid_type cma_route_gid_type(enum rdma_network_type network_type,
3084 unsigned long supported_gids,
3085 enum ib_gid_type default_gid)
3086{
3087 if ((network_type == RDMA_NETWORK_IPV4 ||
3088 network_type == RDMA_NETWORK_IPV6) &&
3089 test_bit(IB_GID_TYPE_ROCE_UDP_ENCAP, &supported_gids))
3090 return IB_GID_TYPE_ROCE_UDP_ENCAP;
3091
3092 return default_gid;
3093}
3094
3095/*
3096 * cma_iboe_set_path_rec_l2_fields() is helper function which sets
3097 * path record type based on GID type.
3098 * It also sets up other L2 fields which includes destination mac address
3099 * netdev ifindex, of the path record.
3100 * It returns the netdev of the bound interface for this path record entry.
3101 */
3102static struct net_device *
3103cma_iboe_set_path_rec_l2_fields(struct rdma_id_private *id_priv)
3104{
3105 struct rdma_route *route = &id_priv->id.route;
3106 enum ib_gid_type gid_type = IB_GID_TYPE_ROCE;
3107 struct rdma_addr *addr = &route->addr;
3108 unsigned long supported_gids;
3109 struct net_device *ndev;
3110
3111 if (!addr->dev_addr.bound_dev_if)
3112 return NULL;
3113
3114 ndev = dev_get_by_index(addr->dev_addr.net,
3115 addr->dev_addr.bound_dev_if);
3116 if (!ndev)
3117 return NULL;
3118
3119 supported_gids = roce_gid_type_mask_support(id_priv->id.device,
3120 id_priv->id.port_num);
3121 gid_type = cma_route_gid_type(addr->dev_addr.network,
3122 supported_gids,
3123 id_priv->gid_type);
3124 /* Use the hint from IP Stack to select GID Type */
3125 if (gid_type < ib_network_to_gid_type(addr->dev_addr.network))
3126 gid_type = ib_network_to_gid_type(addr->dev_addr.network);
3127 route->path_rec->rec_type = sa_conv_gid_to_pathrec_type(gid_type);
3128
114cc9c4 3129 route->path_rec->roce.route_resolved = true;
9327c7af
PP
3130 sa_path_set_dmac(route->path_rec, addr->dev_addr.dst_dev_addr);
3131 return ndev;
3132}
3133
fe75889f
PP
3134int rdma_set_ib_path(struct rdma_cm_id *id,
3135 struct sa_path_rec *path_rec)
e51060f0
SH
3136{
3137 struct rdma_id_private *id_priv;
8d20a1f0 3138 struct net_device *ndev;
e51060f0
SH
3139 int ret;
3140
3141 id_priv = container_of(id, struct rdma_id_private, id);
550e5ca7
NM
3142 if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_RESOLVED,
3143 RDMA_CM_ROUTE_RESOLVED))
e51060f0
SH
3144 return -EINVAL;
3145
fe75889f 3146 id->route.path_rec = kmemdup(path_rec, sizeof(*path_rec),
9893e742 3147 GFP_KERNEL);
e51060f0
SH
3148 if (!id->route.path_rec) {
3149 ret = -ENOMEM;
3150 goto err;
3151 }
3152
8d20a1f0
PP
3153 if (rdma_protocol_roce(id->device, id->port_num)) {
3154 ndev = cma_iboe_set_path_rec_l2_fields(id_priv);
3155 if (!ndev) {
3156 ret = -ENODEV;
3157 goto err_free;
3158 }
3159 dev_put(ndev);
3160 }
3161
bf9a9928 3162 id->route.num_pri_alt_paths = 1;
e51060f0 3163 return 0;
8d20a1f0
PP
3164
3165err_free:
3166 kfree(id->route.path_rec);
3167 id->route.path_rec = NULL;
e51060f0 3168err:
550e5ca7 3169 cma_comp_exch(id_priv, RDMA_CM_ROUTE_RESOLVED, RDMA_CM_ADDR_RESOLVED);
e51060f0
SH
3170 return ret;
3171}
fe75889f 3172EXPORT_SYMBOL(rdma_set_ib_path);
e51060f0 3173
d6f91252 3174static int cma_resolve_iw_route(struct rdma_id_private *id_priv)
07ebafba
TT
3175{
3176 struct cma_work *work;
3177
3178 work = kzalloc(sizeof *work, GFP_KERNEL);
3179 if (!work)
3180 return -ENOMEM;
3181
981b5a23 3182 cma_init_resolve_route_work(work, id_priv);
07ebafba
TT
3183 queue_work(cma_wq, &work->work);
3184 return 0;
3185}
3186
d3bd9396 3187static int get_vlan_ndev_tc(struct net_device *vlan_ndev, int prio)
eb072c4b 3188{
eb072c4b
EP
3189 struct net_device *dev;
3190
d3bd9396 3191 dev = vlan_dev_real_dev(vlan_ndev);
eb072c4b
EP
3192 if (dev->num_tc)
3193 return netdev_get_prio_tc_map(dev, prio);
3194
d3bd9396
PP
3195 return (vlan_dev_get_egress_qos_mask(vlan_ndev, prio) &
3196 VLAN_PRIO_MASK) >> VLAN_PRIO_SHIFT;
3197}
3198
3199struct iboe_prio_tc_map {
3200 int input_prio;
3201 int output_tc;
3202 bool found;
3203};
3204
eff74233
TY
3205static int get_lower_vlan_dev_tc(struct net_device *dev,
3206 struct netdev_nested_priv *priv)
d3bd9396 3207{
eff74233 3208 struct iboe_prio_tc_map *map = (struct iboe_prio_tc_map *)priv->data;
d3bd9396
PP
3209
3210 if (is_vlan_dev(dev))
3211 map->output_tc = get_vlan_ndev_tc(dev, map->input_prio);
3212 else if (dev->num_tc)
3213 map->output_tc = netdev_get_prio_tc_map(dev, map->input_prio);
3214 else
3215 map->output_tc = 0;
3216 /* We are interested only in first level VLAN device, so always
3217 * return 1 to stop iterating over next level devices.
3218 */
3219 map->found = true;
3220 return 1;
3221}
3222
3223static int iboe_tos_to_sl(struct net_device *ndev, int tos)
3224{
3225 struct iboe_prio_tc_map prio_tc_map = {};
3226 int prio = rt_tos2priority(tos);
eff74233 3227 struct netdev_nested_priv priv;
d3bd9396
PP
3228
3229 /* If VLAN device, get it directly from the VLAN netdev */
d0d7b10b 3230 if (is_vlan_dev(ndev))
d3bd9396
PP
3231 return get_vlan_ndev_tc(ndev, prio);
3232
3233 prio_tc_map.input_prio = prio;
eff74233 3234 priv.data = (void *)&prio_tc_map;
d3bd9396
PP
3235 rcu_read_lock();
3236 netdev_walk_all_lower_dev_rcu(ndev,
3237 get_lower_vlan_dev_tc,
eff74233 3238 &priv);
d3bd9396
PP
3239 rcu_read_unlock();
3240 /* If map is found from lower device, use it; Otherwise
3241 * continue with the current netdevice to get priority to tc map.
3242 */
3243 if (prio_tc_map.found)
3244 return prio_tc_map.output_tc;
3245 else if (ndev->num_tc)
3246 return netdev_get_prio_tc_map(ndev, prio);
3247 else
3248 return 0;
eb072c4b
EP
3249}
3250
f6653405
MZ
3251static __be32 cma_get_roce_udp_flow_label(struct rdma_id_private *id_priv)
3252{
3253 struct sockaddr_in6 *addr6;
3254 u16 dport, sport;
3255 u32 hash, fl;
3256
3257 addr6 = (struct sockaddr_in6 *)cma_src_addr(id_priv);
3258 fl = be32_to_cpu(addr6->sin6_flowinfo) & IB_GRH_FLOWLABEL_MASK;
3259 if ((cma_family(id_priv) != AF_INET6) || !fl) {
3260 dport = be16_to_cpu(cma_port(cma_dst_addr(id_priv)));
3261 sport = be16_to_cpu(cma_port(cma_src_addr(id_priv)));
3262 hash = (u32)sport * 31 + dport;
3263 fl = hash & IB_GRH_FLOWLABEL_MASK;
3264 }
3265
3266 return cpu_to_be32(fl);
3267}
3268
3c86aa70
EC
3269static int cma_resolve_iboe_route(struct rdma_id_private *id_priv)
3270{
3271 struct rdma_route *route = &id_priv->id.route;
3272 struct rdma_addr *addr = &route->addr;
3273 struct cma_work *work;
3274 int ret;
4367ec7f 3275 struct net_device *ndev;
4367ec7f 3276
89052d78
MD
3277 u8 default_roce_tos = id_priv->cma_dev->default_roce_tos[id_priv->id.port_num -
3278 rdma_start_port(id_priv->cma_dev->device)];
ca0c448d 3279 u8 tos;
dd5f03be 3280
ca0c448d
HB
3281 mutex_lock(&id_priv->qp_mutex);
3282 tos = id_priv->tos_set ? id_priv->tos : default_roce_tos;
3283 mutex_unlock(&id_priv->qp_mutex);
3c86aa70 3284
3c86aa70
EC
3285 work = kzalloc(sizeof *work, GFP_KERNEL);
3286 if (!work)
3287 return -ENOMEM;
3288
3c86aa70
EC
3289 route->path_rec = kzalloc(sizeof *route->path_rec, GFP_KERNEL);
3290 if (!route->path_rec) {
3291 ret = -ENOMEM;
3292 goto err1;
3293 }
3294
bf9a9928 3295 route->num_pri_alt_paths = 1;
3c86aa70 3296
9327c7af 3297 ndev = cma_iboe_set_path_rec_l2_fields(id_priv);
3c86aa70
EC
3298 if (!ndev) {
3299 ret = -ENODEV;
3300 goto err2;
3301 }
3302
7b85627b
MS
3303 rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.src_addr,
3304 &route->path_rec->sgid);
3305 rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.dst_addr,
3306 &route->path_rec->dgid);
af7bd463 3307
c3efe750 3308 if (((struct sockaddr *)&id_priv->id.route.addr.dst_addr)->sa_family != AF_IB)
c865f246 3309 /* TODO: get the hoplimit from the inet/inet6 device */
c3efe750
MB
3310 route->path_rec->hop_limit = addr->dev_addr.hoplimit;
3311 else
c865f246 3312 route->path_rec->hop_limit = 1;
af7bd463
EC
3313 route->path_rec->reversible = 1;
3314 route->path_rec->pkey = cpu_to_be16(0xffff);
3315 route->path_rec->mtu_selector = IB_SA_EQ;
89052d78
MD
3316 route->path_rec->sl = iboe_tos_to_sl(ndev, tos);
3317 route->path_rec->traffic_class = tos;
3c86aa70
EC
3318 route->path_rec->mtu = iboe_get_mtu(ndev->mtu);
3319 route->path_rec->rate_selector = IB_SA_EQ;
58030c76 3320 route->path_rec->rate = IB_RATE_PORT_CURRENT;
3c86aa70
EC
3321 dev_put(ndev);
3322 route->path_rec->packet_life_time_selector = IB_SA_EQ;
e1ee1e62
DM
3323 /* In case ACK timeout is set, use this value to calculate
3324 * PacketLifeTime. As per IBTA 12.7.34,
3325 * local ACK timeout = (2 * PacketLifeTime + Local CA’s ACK delay).
3326 * Assuming a negligible local ACK delay, we can use
3327 * PacketLifeTime = local ACK timeout/2
3328 * as a reasonable approximation for RoCE networks.
3329 */
ca0c448d 3330 mutex_lock(&id_priv->qp_mutex);
e84045ea
HB
3331 if (id_priv->timeout_set && id_priv->timeout)
3332 route->path_rec->packet_life_time = id_priv->timeout - 1;
3333 else
3334 route->path_rec->packet_life_time = CMA_IBOE_PACKET_LIFETIME;
ca0c448d 3335 mutex_unlock(&id_priv->qp_mutex);
e1ee1e62 3336
3c86aa70
EC
3337 if (!route->path_rec->mtu) {
3338 ret = -EINVAL;
3339 goto err2;
3340 }
3341
f6653405
MZ
3342 if (rdma_protocol_roce_udp_encap(id_priv->id.device,
3343 id_priv->id.port_num))
3344 route->path_rec->flow_label =
3345 cma_get_roce_udp_flow_label(id_priv);
3346
981b5a23 3347 cma_init_resolve_route_work(work, id_priv);
3c86aa70
EC
3348 queue_work(cma_wq, &work->work);
3349
3350 return 0;
3351
3352err2:
3353 kfree(route->path_rec);
3354 route->path_rec = NULL;
bf9a9928 3355 route->num_pri_alt_paths = 0;
3c86aa70
EC
3356err1:
3357 kfree(work);
3358 return ret;
3359}
3360
dbace111 3361int rdma_resolve_route(struct rdma_cm_id *id, unsigned long timeout_ms)
e51060f0
SH
3362{
3363 struct rdma_id_private *id_priv;
3364 int ret;
3365
5f5a6509
HB
3366 if (!timeout_ms)
3367 return -EINVAL;
3368
e51060f0 3369 id_priv = container_of(id, struct rdma_id_private, id);
550e5ca7 3370 if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_RESOLVED, RDMA_CM_ROUTE_QUERY))
e51060f0
SH
3371 return -EINVAL;
3372
e368d23f 3373 cma_id_get(id_priv);
fe53ba2f 3374 if (rdma_cap_ib_sa(id->device, id->port_num))
c72f2189 3375 ret = cma_resolve_ib_route(id_priv, timeout_ms);
fc008bdb 3376 else if (rdma_protocol_roce(id->device, id->port_num)) {
c72f2189 3377 ret = cma_resolve_iboe_route(id_priv);
fc008bdb
PH
3378 if (!ret)
3379 cma_add_id_to_tree(id_priv);
3380 }
c72f2189 3381 else if (rdma_protocol_iwarp(id->device, id->port_num))
d6f91252 3382 ret = cma_resolve_iw_route(id_priv);
c72f2189 3383 else
e51060f0 3384 ret = -ENOSYS;
c72f2189 3385
e51060f0
SH
3386 if (ret)
3387 goto err;
3388
3389 return 0;
3390err:
550e5ca7 3391 cma_comp_exch(id_priv, RDMA_CM_ROUTE_QUERY, RDMA_CM_ADDR_RESOLVED);
e368d23f 3392 cma_id_put(id_priv);
e51060f0
SH
3393 return ret;
3394}
3395EXPORT_SYMBOL(rdma_resolve_route);
3396
6a3e362d
SH
3397static void cma_set_loopback(struct sockaddr *addr)
3398{
3399 switch (addr->sa_family) {
3400 case AF_INET:
3401 ((struct sockaddr_in *) addr)->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
3402 break;
3403 case AF_INET6:
3404 ipv6_addr_set(&((struct sockaddr_in6 *) addr)->sin6_addr,
3405 0, 0, 0, htonl(1));
3406 break;
3407 default:
3408 ib_addr_set(&((struct sockaddr_ib *) addr)->sib_addr,
3409 0, 0, 0, htonl(1));
3410 break;
3411 }
3412}
3413
e51060f0
SH
3414static int cma_bind_loopback(struct rdma_id_private *id_priv)
3415{
b0569e40 3416 struct cma_device *cma_dev, *cur_dev;
f0ee3404 3417 union ib_gid gid;
102c5ce0 3418 enum ib_port_state port_state;
cc055dd3 3419 unsigned int p;
e51060f0
SH
3420 u16 pkey;
3421 int ret;
e51060f0 3422
b0569e40 3423 cma_dev = NULL;
e51060f0 3424 mutex_lock(&lock);
b0569e40
SH
3425 list_for_each_entry(cur_dev, &dev_list, list) {
3426 if (cma_family(id_priv) == AF_IB &&
72219cea 3427 !rdma_cap_ib_cm(cur_dev->device, 1))
b0569e40
SH
3428 continue;
3429
3430 if (!cma_dev)
3431 cma_dev = cur_dev;
3432
cc055dd3 3433 rdma_for_each_port (cur_dev->device, p) {
102c5ce0
JW
3434 if (!ib_get_cached_port_state(cur_dev->device, p, &port_state) &&
3435 port_state == IB_PORT_ACTIVE) {
b0569e40
SH
3436 cma_dev = cur_dev;
3437 goto port_found;
3438 }
3439 }
3440 }
3441
3442 if (!cma_dev) {
e82153b5
KK
3443 ret = -ENODEV;
3444 goto out;
3445 }
e51060f0 3446
e82153b5 3447 p = 1;
e51060f0
SH
3448
3449port_found:
1dfce294 3450 ret = rdma_query_gid(cma_dev->device, p, 0, &gid);
e51060f0
SH
3451 if (ret)
3452 goto out;
3453
3454 ret = ib_get_cached_pkey(cma_dev->device, p, 0, &pkey);
3455 if (ret)
3456 goto out;
3457
6f8372b6 3458 id_priv->id.route.addr.dev_addr.dev_type =
21655afc 3459 (rdma_protocol_ib(cma_dev->device, p)) ?
6f8372b6
SH
3460 ARPHRD_INFINIBAND : ARPHRD_ETHER;
3461
3462 rdma_addr_set_sgid(&id_priv->id.route.addr.dev_addr, &gid);
e51060f0
SH
3463 ib_addr_set_pkey(&id_priv->id.route.addr.dev_addr, pkey);
3464 id_priv->id.port_num = p;
3465 cma_attach_to_dev(id_priv, cma_dev);
cb5cd0ea 3466 rdma_restrack_add(&id_priv->res);
f4753834 3467 cma_set_loopback(cma_src_addr(id_priv));
e51060f0
SH
3468out:
3469 mutex_unlock(&lock);
3470 return ret;
3471}
3472
3473static void addr_handler(int status, struct sockaddr *src_addr,
3474 struct rdma_dev_addr *dev_addr, void *context)
3475{
3476 struct rdma_id_private *id_priv = context;
7582df82 3477 struct rdma_cm_event event = {};
5fc01fb8
MJ
3478 struct sockaddr *addr;
3479 struct sockaddr_storage old_addr;
e51060f0 3480
de910bd9 3481 mutex_lock(&id_priv->handler_mutex);
550e5ca7
NM
3482 if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_QUERY,
3483 RDMA_CM_ADDR_RESOLVED))
61a73c70 3484 goto out;
61a73c70 3485
5fc01fb8
MJ
3486 /*
3487 * Store the previous src address, so that if we fail to acquire
3488 * matching rdma device, old address can be restored back, which helps
3489 * to cancel the cma listen operation correctly.
3490 */
3491 addr = cma_src_addr(id_priv);
3492 memcpy(&old_addr, addr, rdma_addr_size(addr));
3493 memcpy(addr, src_addr, rdma_addr_size(src_addr));
498683c6 3494 if (!status && !id_priv->cma_dev) {
ff11c6cd 3495 status = cma_acquire_dev_by_src_ip(id_priv);
498683c6
MS
3496 if (status)
3497 pr_debug_ratelimited("RDMA CM: ADDR_ERROR: failed to acquire device. status %d\n",
3498 status);
cb5cd0ea 3499 rdma_restrack_add(&id_priv->res);
a6e4d254 3500 } else if (status) {
498683c6
MS
3501 pr_debug_ratelimited("RDMA CM: ADDR_ERROR: failed to resolve IP. status %d\n", status);
3502 }
e51060f0
SH
3503
3504 if (status) {
5fc01fb8
MJ
3505 memcpy(addr, &old_addr,
3506 rdma_addr_size((struct sockaddr *)&old_addr));
550e5ca7
NM
3507 if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_RESOLVED,
3508 RDMA_CM_ADDR_BOUND))
e51060f0 3509 goto out;
a1b1b61f
SH
3510 event.event = RDMA_CM_EVENT_ADDR_ERROR;
3511 event.status = status;
7b85627b 3512 } else
a1b1b61f 3513 event.event = RDMA_CM_EVENT_ADDR_RESOLVED;
e51060f0 3514
ed999f82 3515 if (cma_cm_event_handler(id_priv, &event)) {
f6a9d47a 3516 destroy_id_handler_unlock(id_priv);
e51060f0
SH
3517 return;
3518 }
3519out:
de910bd9 3520 mutex_unlock(&id_priv->handler_mutex);
e51060f0
SH
3521}
3522
3523static int cma_resolve_loopback(struct rdma_id_private *id_priv)
3524{
3525 struct cma_work *work;
f0ee3404 3526 union ib_gid gid;
e51060f0
SH
3527 int ret;
3528
3529 work = kzalloc(sizeof *work, GFP_KERNEL);
3530 if (!work)
3531 return -ENOMEM;
3532
3533 if (!id_priv->cma_dev) {
3534 ret = cma_bind_loopback(id_priv);
3535 if (ret)
3536 goto err;
3537 }
3538
6f8372b6
SH
3539 rdma_addr_get_sgid(&id_priv->id.route.addr.dev_addr, &gid);
3540 rdma_addr_set_dgid(&id_priv->id.route.addr.dev_addr, &gid);
e51060f0 3541
081ea519 3542 enqueue_resolve_addr_work(work, id_priv);
e51060f0
SH
3543 return 0;
3544err:
3545 kfree(work);
3546 return ret;
3547}
3548
f17df3b0
SH
3549static int cma_resolve_ib_addr(struct rdma_id_private *id_priv)
3550{
3551 struct cma_work *work;
3552 int ret;
3553
3554 work = kzalloc(sizeof *work, GFP_KERNEL);
3555 if (!work)
3556 return -ENOMEM;
3557
3558 if (!id_priv->cma_dev) {
3559 ret = cma_resolve_ib_dev(id_priv);
3560 if (ret)
3561 goto err;
3562 }
3563
3564 rdma_addr_set_dgid(&id_priv->id.route.addr.dev_addr, (union ib_gid *)
3565 &(((struct sockaddr_ib *) &id_priv->id.route.addr.dst_addr)->sib_addr));
3566
081ea519 3567 enqueue_resolve_addr_work(work, id_priv);
f17df3b0
SH
3568 return 0;
3569err:
3570 kfree(work);
3571 return ret;
3572}
3573
a9bb7912
HS
3574int rdma_set_reuseaddr(struct rdma_cm_id *id, int reuse)
3575{
3576 struct rdma_id_private *id_priv;
3577 unsigned long flags;
3578 int ret;
3579
3580 id_priv = container_of(id, struct rdma_id_private, id);
3581 spin_lock_irqsave(&id_priv->lock, flags);
d490ee52
JG
3582 if ((reuse && id_priv->state != RDMA_CM_LISTEN) ||
3583 id_priv->state == RDMA_CM_IDLE) {
a9bb7912
HS
3584 id_priv->reuseaddr = reuse;
3585 ret = 0;
3586 } else {
3587 ret = -EINVAL;
3588 }
3589 spin_unlock_irqrestore(&id_priv->lock, flags);
3590 return ret;
3591}
3592EXPORT_SYMBOL(rdma_set_reuseaddr);
3593
68602120
SH
3594int rdma_set_afonly(struct rdma_cm_id *id, int afonly)
3595{
3596 struct rdma_id_private *id_priv;
3597 unsigned long flags;
3598 int ret;
3599
3600 id_priv = container_of(id, struct rdma_id_private, id);
3601 spin_lock_irqsave(&id_priv->lock, flags);
3602 if (id_priv->state == RDMA_CM_IDLE || id_priv->state == RDMA_CM_ADDR_BOUND) {
3603 id_priv->options |= (1 << CMA_OPTION_AFONLY);
3604 id_priv->afonly = afonly;
3605 ret = 0;
3606 } else {
3607 ret = -EINVAL;
3608 }
3609 spin_unlock_irqrestore(&id_priv->lock, flags);
3610 return ret;
3611}
3612EXPORT_SYMBOL(rdma_set_afonly);
3613
e51060f0
SH
3614static void cma_bind_port(struct rdma_bind_list *bind_list,
3615 struct rdma_id_private *id_priv)
3616{
58afdcb7
SH
3617 struct sockaddr *addr;
3618 struct sockaddr_ib *sib;
3619 u64 sid, mask;
3620 __be16 port;
e51060f0 3621
730c8912
MZ
3622 lockdep_assert_held(&lock);
3623
f4753834 3624 addr = cma_src_addr(id_priv);
58afdcb7
SH
3625 port = htons(bind_list->port);
3626
3627 switch (addr->sa_family) {
3628 case AF_INET:
3629 ((struct sockaddr_in *) addr)->sin_port = port;
3630 break;
3631 case AF_INET6:
3632 ((struct sockaddr_in6 *) addr)->sin6_port = port;
3633 break;
3634 case AF_IB:
3635 sib = (struct sockaddr_ib *) addr;
3636 sid = be64_to_cpu(sib->sib_sid);
3637 mask = be64_to_cpu(sib->sib_sid_mask);
3638 sib->sib_sid = cpu_to_be64((sid & mask) | (u64) ntohs(port));
3639 sib->sib_sid_mask = cpu_to_be64(~0ULL);
3640 break;
3641 }
e51060f0
SH
3642 id_priv->bind_list = bind_list;
3643 hlist_add_head(&id_priv->node, &bind_list->owners);
3644}
3645
2253fc0c 3646static int cma_alloc_port(enum rdma_ucm_port_space ps,
aac978e1 3647 struct rdma_id_private *id_priv, unsigned short snum)
e51060f0
SH
3648{
3649 struct rdma_bind_list *bind_list;
3b069c5d 3650 int ret;
e51060f0 3651
730c8912
MZ
3652 lockdep_assert_held(&lock);
3653
cb164b8c 3654 bind_list = kzalloc(sizeof *bind_list, GFP_KERNEL);
e51060f0
SH
3655 if (!bind_list)
3656 return -ENOMEM;
3657
fa20105e
GS
3658 ret = cma_ps_alloc(id_priv->id.route.addr.dev_addr.net, ps, bind_list,
3659 snum);
3b069c5d
TH
3660 if (ret < 0)
3661 goto err;
aedec080
SH
3662
3663 bind_list->ps = ps;
061ccb52 3664 bind_list->port = snum;
aedec080
SH
3665 cma_bind_port(bind_list, id_priv);
3666 return 0;
3b069c5d 3667err:
aedec080 3668 kfree(bind_list);
3b069c5d 3669 return ret == -ENOSPC ? -EADDRNOTAVAIL : ret;
aedec080 3670}
e51060f0 3671
19b752a1
MS
3672static int cma_port_is_unique(struct rdma_bind_list *bind_list,
3673 struct rdma_id_private *id_priv)
3674{
3675 struct rdma_id_private *cur_id;
3676 struct sockaddr *daddr = cma_dst_addr(id_priv);
3677 struct sockaddr *saddr = cma_src_addr(id_priv);
3678 __be16 dport = cma_port(daddr);
3679
730c8912
MZ
3680 lockdep_assert_held(&lock);
3681
19b752a1
MS
3682 hlist_for_each_entry(cur_id, &bind_list->owners, node) {
3683 struct sockaddr *cur_daddr = cma_dst_addr(cur_id);
3684 struct sockaddr *cur_saddr = cma_src_addr(cur_id);
3685 __be16 cur_dport = cma_port(cur_daddr);
3686
3687 if (id_priv == cur_id)
3688 continue;
3689
3690 /* different dest port -> unique */
9dea9a2f
TN
3691 if (!cma_any_port(daddr) &&
3692 !cma_any_port(cur_daddr) &&
19b752a1
MS
3693 (dport != cur_dport))
3694 continue;
3695
3696 /* different src address -> unique */
3697 if (!cma_any_addr(saddr) &&
3698 !cma_any_addr(cur_saddr) &&
3699 cma_addr_cmp(saddr, cur_saddr))
3700 continue;
3701
3702 /* different dst address -> unique */
9dea9a2f
TN
3703 if (!cma_any_addr(daddr) &&
3704 !cma_any_addr(cur_daddr) &&
19b752a1
MS
3705 cma_addr_cmp(daddr, cur_daddr))
3706 continue;
3707
3708 return -EADDRNOTAVAIL;
3709 }
3710 return 0;
3711}
3712
2253fc0c 3713static int cma_alloc_any_port(enum rdma_ucm_port_space ps,
aac978e1 3714 struct rdma_id_private *id_priv)
aedec080 3715{
5d7220e8
TH
3716 static unsigned int last_used_port;
3717 int low, high, remaining;
3718 unsigned int rover;
fa20105e 3719 struct net *net = id_priv->id.route.addr.dev_addr.net;
e51060f0 3720
730c8912
MZ
3721 lockdep_assert_held(&lock);
3722
fa20105e 3723 inet_get_local_port_range(net, &low, &high);
5d7220e8 3724 remaining = (high - low) + 1;
e8a533cb 3725 rover = get_random_u32_inclusive(low, remaining + low - 1);
5d7220e8 3726retry:
19b752a1
MS
3727 if (last_used_port != rover) {
3728 struct rdma_bind_list *bind_list;
3729 int ret;
3730
3731 bind_list = cma_ps_find(net, ps, (unsigned short)rover);
3732
3733 if (!bind_list) {
3734 ret = cma_alloc_port(ps, id_priv, rover);
3735 } else {
3736 ret = cma_port_is_unique(bind_list, id_priv);
3737 if (!ret)
3738 cma_bind_port(bind_list, id_priv);
3739 }
5d7220e8
TH
3740 /*
3741 * Remember previously used port number in order to avoid
3742 * re-using same port immediately after it is closed.
3743 */
3744 if (!ret)
3745 last_used_port = rover;
3746 if (ret != -EADDRNOTAVAIL)
3747 return ret;
e51060f0 3748 }
5d7220e8
TH
3749 if (--remaining) {
3750 rover++;
3751 if ((rover < low) || (rover > high))
3752 rover = low;
3753 goto retry;
3754 }
3755 return -EADDRNOTAVAIL;
e51060f0
SH
3756}
3757
a9bb7912
HS
3758/*
3759 * Check that the requested port is available. This is called when trying to
3760 * bind to a specific port, or when trying to listen on a bound port. In
3761 * the latter case, the provided id_priv may already be on the bind_list, but
3762 * we still need to check that it's okay to start listening.
3763 */
3764static int cma_check_port(struct rdma_bind_list *bind_list,
3765 struct rdma_id_private *id_priv, uint8_t reuseaddr)
e51060f0
SH
3766{
3767 struct rdma_id_private *cur_id;
43b752da 3768 struct sockaddr *addr, *cur_addr;
e51060f0 3769
730c8912
MZ
3770 lockdep_assert_held(&lock);
3771
f4753834 3772 addr = cma_src_addr(id_priv);
b67bfe0d 3773 hlist_for_each_entry(cur_id, &bind_list->owners, node) {
a9bb7912
HS
3774 if (id_priv == cur_id)
3775 continue;
3cd96564 3776
d490ee52 3777 if (reuseaddr && cur_id->reuseaddr)
5b0ec991 3778 continue;
e51060f0 3779
f4753834 3780 cur_addr = cma_src_addr(cur_id);
5b0ec991
SH
3781 if (id_priv->afonly && cur_id->afonly &&
3782 (addr->sa_family != cur_addr->sa_family))
3783 continue;
3784
3785 if (cma_any_addr(addr) || cma_any_addr(cur_addr))
3786 return -EADDRNOTAVAIL;
3787
3788 if (!cma_addr_cmp(addr, cur_addr))
3789 return -EADDRINUSE;
a9bb7912 3790 }
e51060f0
SH
3791 return 0;
3792}
3793
2253fc0c 3794static int cma_use_port(enum rdma_ucm_port_space ps,
aac978e1 3795 struct rdma_id_private *id_priv)
a9bb7912
HS
3796{
3797 struct rdma_bind_list *bind_list;
3798 unsigned short snum;
3799 int ret;
3800
730c8912
MZ
3801 lockdep_assert_held(&lock);
3802
f4753834 3803 snum = ntohs(cma_port(cma_src_addr(id_priv)));
a9bb7912
HS
3804 if (snum < PROT_SOCK && !capable(CAP_NET_BIND_SERVICE))
3805 return -EACCES;
3806
fa20105e 3807 bind_list = cma_ps_find(id_priv->id.route.addr.dev_addr.net, ps, snum);
a9bb7912
HS
3808 if (!bind_list) {
3809 ret = cma_alloc_port(ps, id_priv, snum);
3810 } else {
3811 ret = cma_check_port(bind_list, id_priv, id_priv->reuseaddr);
3812 if (!ret)
3813 cma_bind_port(bind_list, id_priv);
3814 }
3815 return ret;
3816}
3817
2253fc0c
SW
3818static enum rdma_ucm_port_space
3819cma_select_inet_ps(struct rdma_id_private *id_priv)
e51060f0 3820{
e51060f0 3821 switch (id_priv->id.ps) {
e51060f0 3822 case RDMA_PS_TCP:
628e5f6d 3823 case RDMA_PS_UDP:
c8f6a362 3824 case RDMA_PS_IPOIB:
2d2e9415 3825 case RDMA_PS_IB:
aac978e1 3826 return id_priv->id.ps;
e51060f0 3827 default:
aac978e1
HE
3828
3829 return 0;
58afdcb7
SH
3830 }
3831}
3832
2253fc0c
SW
3833static enum rdma_ucm_port_space
3834cma_select_ib_ps(struct rdma_id_private *id_priv)
58afdcb7 3835{
2253fc0c 3836 enum rdma_ucm_port_space ps = 0;
58afdcb7
SH
3837 struct sockaddr_ib *sib;
3838 u64 sid_ps, mask, sid;
3839
f4753834 3840 sib = (struct sockaddr_ib *) cma_src_addr(id_priv);
58afdcb7
SH
3841 mask = be64_to_cpu(sib->sib_sid_mask) & RDMA_IB_IP_PS_MASK;
3842 sid = be64_to_cpu(sib->sib_sid) & mask;
3843
3844 if ((id_priv->id.ps == RDMA_PS_IB) && (sid == (RDMA_IB_IP_PS_IB & mask))) {
3845 sid_ps = RDMA_IB_IP_PS_IB;
aac978e1 3846 ps = RDMA_PS_IB;
58afdcb7
SH
3847 } else if (((id_priv->id.ps == RDMA_PS_IB) || (id_priv->id.ps == RDMA_PS_TCP)) &&
3848 (sid == (RDMA_IB_IP_PS_TCP & mask))) {
3849 sid_ps = RDMA_IB_IP_PS_TCP;
aac978e1 3850 ps = RDMA_PS_TCP;
58afdcb7
SH
3851 } else if (((id_priv->id.ps == RDMA_PS_IB) || (id_priv->id.ps == RDMA_PS_UDP)) &&
3852 (sid == (RDMA_IB_IP_PS_UDP & mask))) {
3853 sid_ps = RDMA_IB_IP_PS_UDP;
aac978e1 3854 ps = RDMA_PS_UDP;
e51060f0
SH
3855 }
3856
58afdcb7
SH
3857 if (ps) {
3858 sib->sib_sid = cpu_to_be64(sid_ps | ntohs(cma_port((struct sockaddr *) sib)));
3859 sib->sib_sid_mask = cpu_to_be64(RDMA_IB_IP_PS_MASK |
3860 be64_to_cpu(sib->sib_sid_mask));
3861 }
3862 return ps;
3863}
3864
3865static int cma_get_port(struct rdma_id_private *id_priv)
3866{
2253fc0c 3867 enum rdma_ucm_port_space ps;
58afdcb7
SH
3868 int ret;
3869
f4753834 3870 if (cma_family(id_priv) != AF_IB)
58afdcb7
SH
3871 ps = cma_select_inet_ps(id_priv);
3872 else
3873 ps = cma_select_ib_ps(id_priv);
3874 if (!ps)
3875 return -EPROTONOSUPPORT;
3876
e51060f0 3877 mutex_lock(&lock);
f4753834 3878 if (cma_any_port(cma_src_addr(id_priv)))
aedec080 3879 ret = cma_alloc_any_port(ps, id_priv);
e51060f0
SH
3880 else
3881 ret = cma_use_port(ps, id_priv);
3882 mutex_unlock(&lock);
3883
3884 return ret;
3885}
3886
d14714df
SH
3887static int cma_check_linklocal(struct rdma_dev_addr *dev_addr,
3888 struct sockaddr *addr)
3889{
d90f9b35 3890#if IS_ENABLED(CONFIG_IPV6)
d14714df
SH
3891 struct sockaddr_in6 *sin6;
3892
3893 if (addr->sa_family != AF_INET6)
3894 return 0;
3895
3896 sin6 = (struct sockaddr_in6 *) addr;
5462eddd
SK
3897
3898 if (!(ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_LINKLOCAL))
3899 return 0;
3900
3901 if (!sin6->sin6_scope_id)
d14714df
SH
3902 return -EINVAL;
3903
3904 dev_addr->bound_dev_if = sin6->sin6_scope_id;
3905#endif
3906 return 0;
3907}
3908
a9bb7912
HS
3909int rdma_listen(struct rdma_cm_id *id, int backlog)
3910{
732d41c5
JG
3911 struct rdma_id_private *id_priv =
3912 container_of(id, struct rdma_id_private, id);
a9bb7912
HS
3913 int ret;
3914
732d41c5 3915 if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_BOUND, RDMA_CM_LISTEN)) {
bc0bdc5a
JG
3916 struct sockaddr_in any_in = {
3917 .sin_family = AF_INET,
3918 .sin_addr.s_addr = htonl(INADDR_ANY),
3919 };
3920
732d41c5 3921 /* For a well behaved ULP state will be RDMA_CM_IDLE */
bc0bdc5a 3922 ret = rdma_bind_addr(id, (struct sockaddr *)&any_in);
a9bb7912
HS
3923 if (ret)
3924 return ret;
732d41c5
JG
3925 if (WARN_ON(!cma_comp_exch(id_priv, RDMA_CM_ADDR_BOUND,
3926 RDMA_CM_LISTEN)))
3927 return -EINVAL;
a9bb7912
HS
3928 }
3929
d490ee52
JG
3930 /*
3931 * Once the ID reaches RDMA_CM_LISTEN it is not allowed to be reusable
3932 * any more, and has to be unique in the bind list.
3933 */
a9bb7912 3934 if (id_priv->reuseaddr) {
d490ee52
JG
3935 mutex_lock(&lock);
3936 ret = cma_check_port(id_priv->bind_list, id_priv, 0);
3937 if (!ret)
3938 id_priv->reuseaddr = 0;
3939 mutex_unlock(&lock);
a9bb7912
HS
3940 if (ret)
3941 goto err;
3942 }
3943
3944 id_priv->backlog = backlog;
889d916b 3945 if (id_priv->cma_dev) {
72219cea 3946 if (rdma_cap_ib_cm(id->device, 1)) {
a9bb7912
HS
3947 ret = cma_ib_listen(id_priv);
3948 if (ret)
3949 goto err;
04215330 3950 } else if (rdma_cap_iw_cm(id->device, 1)) {
a9bb7912
HS
3951 ret = cma_iw_listen(id_priv, backlog);
3952 if (ret)
3953 goto err;
21655afc 3954 } else {
a9bb7912
HS
3955 ret = -ENOSYS;
3956 goto err;
3957 }
c80a0c52
LR
3958 } else {
3959 ret = cma_listen_on_all(id_priv);
3960 if (ret)
3961 goto err;
3962 }
a9bb7912
HS
3963
3964 return 0;
3965err:
3966 id_priv->backlog = 0;
d490ee52
JG
3967 /*
3968 * All the failure paths that lead here will not allow the req_handler's
3969 * to have run.
3970 */
550e5ca7 3971 cma_comp_exch(id_priv, RDMA_CM_LISTEN, RDMA_CM_ADDR_BOUND);
a9bb7912
HS
3972 return ret;
3973}
3974EXPORT_SYMBOL(rdma_listen);
3975
8d037973
PH
3976static int rdma_bind_addr_dst(struct rdma_id_private *id_priv,
3977 struct sockaddr *addr, const struct sockaddr *daddr)
e51060f0 3978{
8d037973 3979 struct sockaddr *id_daddr;
e51060f0
SH
3980 int ret;
3981
680f920a
SH
3982 if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6 &&
3983 addr->sa_family != AF_IB)
e51060f0
SH
3984 return -EAFNOSUPPORT;
3985
550e5ca7 3986 if (!cma_comp_exch(id_priv, RDMA_CM_IDLE, RDMA_CM_ADDR_BOUND))
e51060f0
SH
3987 return -EINVAL;
3988
8d037973 3989 ret = cma_check_linklocal(&id_priv->id.route.addr.dev_addr, addr);
d14714df
SH
3990 if (ret)
3991 goto err1;
3992
7b85627b 3993 memcpy(cma_src_addr(id_priv), addr, rdma_addr_size(addr));
8523c048 3994 if (!cma_any_addr(addr)) {
8d037973 3995 ret = cma_translate_addr(addr, &id_priv->id.route.addr.dev_addr);
e51060f0 3996 if (ret)
255d0c14
KK
3997 goto err1;
3998
ff11c6cd 3999 ret = cma_acquire_dev_by_src_ip(id_priv);
255d0c14
KK
4000 if (ret)
4001 goto err1;
e51060f0
SH
4002 }
4003
68602120
SH
4004 if (!(id_priv->options & (1 << CMA_OPTION_AFONLY))) {
4005 if (addr->sa_family == AF_INET)
4006 id_priv->afonly = 1;
5b0ec991 4007#if IS_ENABLED(CONFIG_IPV6)
fa20105e
GS
4008 else if (addr->sa_family == AF_INET6) {
4009 struct net *net = id_priv->id.route.addr.dev_addr.net;
4010
4011 id_priv->afonly = net->ipv6.sysctl.bindv6only;
4012 }
5b0ec991 4013#endif
68602120 4014 }
8d037973
PH
4015 id_daddr = cma_dst_addr(id_priv);
4016 if (daddr != id_daddr)
4017 memcpy(id_daddr, daddr, rdma_addr_size(addr));
4018 id_daddr->sa_family = addr->sa_family;
9dea9a2f 4019
e51060f0
SH
4020 ret = cma_get_port(id_priv);
4021 if (ret)
255d0c14 4022 goto err2;
e51060f0 4023
cb5cd0ea
SD
4024 if (!cma_any_addr(addr))
4025 rdma_restrack_add(&id_priv->res);
e51060f0 4026 return 0;
255d0c14 4027err2:
ed7a01fd 4028 if (id_priv->cma_dev)
a396d43a 4029 cma_release_dev(id_priv);
255d0c14 4030err1:
550e5ca7 4031 cma_comp_exch(id_priv, RDMA_CM_ADDR_BOUND, RDMA_CM_IDLE);
e51060f0
SH
4032 return ret;
4033}
8d037973
PH
4034
4035static int cma_bind_addr(struct rdma_cm_id *id, struct sockaddr *src_addr,
4036 const struct sockaddr *dst_addr)
4037{
4038 struct rdma_id_private *id_priv =
4039 container_of(id, struct rdma_id_private, id);
4040 struct sockaddr_storage zero_sock = {};
4041
4042 if (src_addr && src_addr->sa_family)
4043 return rdma_bind_addr_dst(id_priv, src_addr, dst_addr);
4044
4045 /*
4046 * When the src_addr is not specified, automatically supply an any addr
4047 */
4048 zero_sock.ss_family = dst_addr->sa_family;
4049 if (IS_ENABLED(CONFIG_IPV6) && dst_addr->sa_family == AF_INET6) {
4050 struct sockaddr_in6 *src_addr6 =
4051 (struct sockaddr_in6 *)&zero_sock;
4052 struct sockaddr_in6 *dst_addr6 =
4053 (struct sockaddr_in6 *)dst_addr;
4054
4055 src_addr6->sin6_scope_id = dst_addr6->sin6_scope_id;
4056 if (ipv6_addr_type(&dst_addr6->sin6_addr) & IPV6_ADDR_LINKLOCAL)
4057 id->route.addr.dev_addr.bound_dev_if =
4058 dst_addr6->sin6_scope_id;
4059 } else if (dst_addr->sa_family == AF_IB) {
4060 ((struct sockaddr_ib *)&zero_sock)->sib_pkey =
4061 ((struct sockaddr_ib *)dst_addr)->sib_pkey;
4062 }
4063 return rdma_bind_addr_dst(id_priv, (struct sockaddr *)&zero_sock, dst_addr);
4064}
4065
4066/*
4067 * If required, resolve the source address for bind and leave the id_priv in
4068 * state RDMA_CM_ADDR_BOUND. This oddly uses the state to determine the prior
4069 * calls made by ULP, a previously bound ID will not be re-bound and src_addr is
4070 * ignored.
4071 */
4072static int resolve_prepare_src(struct rdma_id_private *id_priv,
4073 struct sockaddr *src_addr,
4074 const struct sockaddr *dst_addr)
4075{
4076 int ret;
4077
4078 if (!cma_comp_exch(id_priv, RDMA_CM_ADDR_BOUND, RDMA_CM_ADDR_QUERY)) {
4079 /* For a well behaved ULP state will be RDMA_CM_IDLE */
4080 ret = cma_bind_addr(&id_priv->id, src_addr, dst_addr);
4081 if (ret)
4082 return ret;
4083 if (WARN_ON(!cma_comp_exch(id_priv, RDMA_CM_ADDR_BOUND,
4084 RDMA_CM_ADDR_QUERY)))
4085 return -EINVAL;
4086
0e158630
SS
4087 } else {
4088 memcpy(cma_dst_addr(id_priv), dst_addr, rdma_addr_size(dst_addr));
8d037973
PH
4089 }
4090
4091 if (cma_family(id_priv) != dst_addr->sa_family) {
4092 ret = -EINVAL;
4093 goto err_state;
4094 }
4095 return 0;
4096
4097err_state:
4098 cma_comp_exch(id_priv, RDMA_CM_ADDR_QUERY, RDMA_CM_ADDR_BOUND);
4099 return ret;
4100}
4101
4102int rdma_resolve_addr(struct rdma_cm_id *id, struct sockaddr *src_addr,
4103 const struct sockaddr *dst_addr, unsigned long timeout_ms)
4104{
4105 struct rdma_id_private *id_priv =
4106 container_of(id, struct rdma_id_private, id);
4107 int ret;
4108
4109 ret = resolve_prepare_src(id_priv, src_addr, dst_addr);
4110 if (ret)
4111 return ret;
4112
4113 if (cma_any_addr(dst_addr)) {
4114 ret = cma_resolve_loopback(id_priv);
4115 } else {
4116 if (dst_addr->sa_family == AF_IB) {
4117 ret = cma_resolve_ib_addr(id_priv);
4118 } else {
4119 /*
4120 * The FSM can return back to RDMA_CM_ADDR_BOUND after
4121 * rdma_resolve_ip() is called, eg through the error
4122 * path in addr_handler(). If this happens the existing
4123 * request must be canceled before issuing a new one.
4124 * Since canceling a request is a bit slow and this
4125 * oddball path is rare, keep track once a request has
4126 * been issued. The track turns out to be a permanent
4127 * state since this is the only cancel as it is
4128 * immediately before rdma_resolve_ip().
4129 */
4130 if (id_priv->used_resolve_ip)
4131 rdma_addr_cancel(&id->route.addr.dev_addr);
4132 else
4133 id_priv->used_resolve_ip = 1;
4134 ret = rdma_resolve_ip(cma_src_addr(id_priv), dst_addr,
4135 &id->route.addr.dev_addr,
4136 timeout_ms, addr_handler,
4137 false, id_priv);
4138 }
4139 }
4140 if (ret)
4141 goto err;
4142
4143 return 0;
4144err:
4145 cma_comp_exch(id_priv, RDMA_CM_ADDR_QUERY, RDMA_CM_ADDR_BOUND);
4146 return ret;
4147}
4148EXPORT_SYMBOL(rdma_resolve_addr);
4149
4150int rdma_bind_addr(struct rdma_cm_id *id, struct sockaddr *addr)
4151{
4152 struct rdma_id_private *id_priv =
4153 container_of(id, struct rdma_id_private, id);
4154
4155 return rdma_bind_addr_dst(id_priv, addr, cma_dst_addr(id_priv));
4156}
e51060f0
SH
4157EXPORT_SYMBOL(rdma_bind_addr);
4158
f4753834 4159static int cma_format_hdr(void *hdr, struct rdma_id_private *id_priv)
e51060f0 4160{
e51060f0 4161 struct cma_hdr *cma_hdr;
e51060f0 4162
01602f11
SH
4163 cma_hdr = hdr;
4164 cma_hdr->cma_version = CMA_VERSION;
f4753834 4165 if (cma_family(id_priv) == AF_INET) {
1f5175ad
AS
4166 struct sockaddr_in *src4, *dst4;
4167
f4753834
SH
4168 src4 = (struct sockaddr_in *) cma_src_addr(id_priv);
4169 dst4 = (struct sockaddr_in *) cma_dst_addr(id_priv);
1f5175ad 4170
01602f11
SH
4171 cma_set_ip_ver(cma_hdr, 4);
4172 cma_hdr->src_addr.ip4.addr = src4->sin_addr.s_addr;
4173 cma_hdr->dst_addr.ip4.addr = dst4->sin_addr.s_addr;
4174 cma_hdr->port = src4->sin_port;
e8160e15 4175 } else if (cma_family(id_priv) == AF_INET6) {
1f5175ad
AS
4176 struct sockaddr_in6 *src6, *dst6;
4177
f4753834
SH
4178 src6 = (struct sockaddr_in6 *) cma_src_addr(id_priv);
4179 dst6 = (struct sockaddr_in6 *) cma_dst_addr(id_priv);
1f5175ad 4180
01602f11
SH
4181 cma_set_ip_ver(cma_hdr, 6);
4182 cma_hdr->src_addr.ip6 = src6->sin6_addr;
4183 cma_hdr->dst_addr.ip6 = dst6->sin6_addr;
4184 cma_hdr->port = src6->sin6_port;
e51060f0
SH
4185 }
4186 return 0;
4187}
4188
628e5f6d 4189static int cma_sidr_rep_handler(struct ib_cm_id *cm_id,
e7ff98ae 4190 const struct ib_cm_event *ib_event)
628e5f6d
SH
4191{
4192 struct rdma_id_private *id_priv = cm_id->context;
7582df82 4193 struct rdma_cm_event event = {};
e7ff98ae
PP
4194 const struct ib_cm_sidr_rep_event_param *rep =
4195 &ib_event->param.sidr_rep_rcvd;
f6a9d47a 4196 int ret;
628e5f6d 4197
37e07cda 4198 mutex_lock(&id_priv->handler_mutex);
2a7cec53 4199 if (READ_ONCE(id_priv->state) != RDMA_CM_CONNECT)
37e07cda 4200 goto out;
628e5f6d
SH
4201
4202 switch (ib_event->event) {
4203 case IB_CM_SIDR_REQ_ERROR:
4204 event.event = RDMA_CM_EVENT_UNREACHABLE;
4205 event.status = -ETIMEDOUT;
4206 break;
4207 case IB_CM_SIDR_REP_RECEIVED:
4208 event.param.ud.private_data = ib_event->private_data;
4209 event.param.ud.private_data_len = IB_CM_SIDR_REP_PRIVATE_DATA_SIZE;
4210 if (rep->status != IB_SIDR_SUCCESS) {
4211 event.event = RDMA_CM_EVENT_UNREACHABLE;
4212 event.status = ib_event->param.sidr_rep_rcvd.status;
498683c6
MS
4213 pr_debug_ratelimited("RDMA CM: UNREACHABLE: bad SIDR reply. status %d\n",
4214 event.status);
628e5f6d
SH
4215 break;
4216 }
5c438135 4217 ret = cma_set_qkey(id_priv, rep->qkey);
d2ca39f2 4218 if (ret) {
498683c6 4219 pr_debug_ratelimited("RDMA CM: ADDR_ERROR: failed to set qkey. status %d\n", ret);
d2ca39f2 4220 event.event = RDMA_CM_EVENT_ADDR_ERROR;
5c438135 4221 event.status = ret;
628e5f6d
SH
4222 break;
4223 }
4ad6a024
PP
4224 ib_init_ah_attr_from_path(id_priv->id.device,
4225 id_priv->id.port_num,
4226 id_priv->id.route.path_rec,
39839107
PP
4227 &event.param.ud.ah_attr,
4228 rep->sgid_attr);
628e5f6d
SH
4229 event.param.ud.qp_num = rep->qpn;
4230 event.param.ud.qkey = rep->qkey;
4231 event.event = RDMA_CM_EVENT_ESTABLISHED;
4232 event.status = 0;
4233 break;
4234 default:
aba25a3e 4235 pr_err("RDMA CMA: unexpected IB CM event: %d\n",
628e5f6d
SH
4236 ib_event->event);
4237 goto out;
4238 }
4239
ed999f82 4240 ret = cma_cm_event_handler(id_priv, &event);
aa74f487
PP
4241
4242 rdma_destroy_ah_attr(&event.param.ud.ah_attr);
628e5f6d
SH
4243 if (ret) {
4244 /* Destroy the CM ID by returning a non-zero value. */
4245 id_priv->cm_id.ib = NULL;
f6a9d47a 4246 destroy_id_handler_unlock(id_priv);
628e5f6d
SH
4247 return ret;
4248 }
4249out:
de910bd9 4250 mutex_unlock(&id_priv->handler_mutex);
f6a9d47a 4251 return 0;
628e5f6d
SH
4252}
4253
4254static int cma_resolve_ib_udp(struct rdma_id_private *id_priv,
4255 struct rdma_conn_param *conn_param)
4256{
4257 struct ib_cm_sidr_req_param req;
0c9361fc 4258 struct ib_cm_id *id;
e511d1ae 4259 void *private_data;
c0b64f58
BVA
4260 u8 offset;
4261 int ret;
628e5f6d 4262
e511d1ae 4263 memset(&req, 0, sizeof req);
e8160e15 4264 offset = cma_user_data_offset(id_priv);
8d0d2b0f 4265 if (check_add_overflow(offset, conn_param->private_data_len, &req.private_data_len))
04ded167
SH
4266 return -EINVAL;
4267
e8160e15 4268 if (req.private_data_len) {
e511d1ae
SH
4269 private_data = kzalloc(req.private_data_len, GFP_ATOMIC);
4270 if (!private_data)
e8160e15
SH
4271 return -ENOMEM;
4272 } else {
e511d1ae 4273 private_data = NULL;
e8160e15 4274 }
628e5f6d
SH
4275
4276 if (conn_param->private_data && conn_param->private_data_len)
e511d1ae
SH
4277 memcpy(private_data + offset, conn_param->private_data,
4278 conn_param->private_data_len);
628e5f6d 4279
e511d1ae
SH
4280 if (private_data) {
4281 ret = cma_format_hdr(private_data, id_priv);
e8160e15
SH
4282 if (ret)
4283 goto out;
e511d1ae 4284 req.private_data = private_data;
e8160e15 4285 }
628e5f6d 4286
0c9361fc
JM
4287 id = ib_create_cm_id(id_priv->id.device, cma_sidr_rep_handler,
4288 id_priv);
4289 if (IS_ERR(id)) {
4290 ret = PTR_ERR(id);
628e5f6d
SH
4291 goto out;
4292 }
0c9361fc 4293 id_priv->cm_id.ib = id;
628e5f6d 4294
f4753834 4295 req.path = id_priv->id.route.path_rec;
815d456e 4296 req.sgid_attr = id_priv->id.route.addr.dev_addr.sgid_attr;
cf53936f 4297 req.service_id = rdma_get_service_id(&id_priv->id, cma_dst_addr(id_priv));
628e5f6d
SH
4298 req.timeout_ms = 1 << (CMA_CM_RESPONSE_TIMEOUT - 8);
4299 req.max_cm_retries = CMA_MAX_CM_RETRIES;
4300
ed999f82 4301 trace_cm_send_sidr_req(id_priv);
628e5f6d
SH
4302 ret = ib_send_cm_sidr_req(id_priv->cm_id.ib, &req);
4303 if (ret) {
4304 ib_destroy_cm_id(id_priv->cm_id.ib);
4305 id_priv->cm_id.ib = NULL;
4306 }
4307out:
e511d1ae 4308 kfree(private_data);
628e5f6d
SH
4309 return ret;
4310}
4311
e51060f0
SH
4312static int cma_connect_ib(struct rdma_id_private *id_priv,
4313 struct rdma_conn_param *conn_param)
4314{
4315 struct ib_cm_req_param req;
4316 struct rdma_route *route;
4317 void *private_data;
0c9361fc 4318 struct ib_cm_id *id;
c0b64f58
BVA
4319 u8 offset;
4320 int ret;
e51060f0
SH
4321
4322 memset(&req, 0, sizeof req);
e8160e15 4323 offset = cma_user_data_offset(id_priv);
8d0d2b0f 4324 if (check_add_overflow(offset, conn_param->private_data_len, &req.private_data_len))
04ded167
SH
4325 return -EINVAL;
4326
e8160e15
SH
4327 if (req.private_data_len) {
4328 private_data = kzalloc(req.private_data_len, GFP_ATOMIC);
4329 if (!private_data)
4330 return -ENOMEM;
4331 } else {
4332 private_data = NULL;
4333 }
e51060f0
SH
4334
4335 if (conn_param->private_data && conn_param->private_data_len)
4336 memcpy(private_data + offset, conn_param->private_data,
4337 conn_param->private_data_len);
4338
0c9361fc
JM
4339 id = ib_create_cm_id(id_priv->id.device, cma_ib_handler, id_priv);
4340 if (IS_ERR(id)) {
4341 ret = PTR_ERR(id);
e51060f0
SH
4342 goto out;
4343 }
0c9361fc 4344 id_priv->cm_id.ib = id;
e51060f0
SH
4345
4346 route = &id_priv->id.route;
e8160e15
SH
4347 if (private_data) {
4348 ret = cma_format_hdr(private_data, id_priv);
4349 if (ret)
4350 goto out;
4351 req.private_data = private_data;
4352 }
e51060f0
SH
4353
4354 req.primary_path = &route->path_rec[0];
eb8336db
MZ
4355 req.primary_path_inbound = route->path_rec_inbound;
4356 req.primary_path_outbound = route->path_rec_outbound;
bf9a9928 4357 if (route->num_pri_alt_paths == 2)
e51060f0
SH
4358 req.alternate_path = &route->path_rec[1];
4359
815d456e
PP
4360 req.ppath_sgid_attr = id_priv->id.route.addr.dev_addr.sgid_attr;
4361 /* Alternate path SGID attribute currently unsupported */
cf53936f 4362 req.service_id = rdma_get_service_id(&id_priv->id, cma_dst_addr(id_priv));
e51060f0 4363 req.qp_num = id_priv->qp_num;
18c441a6 4364 req.qp_type = id_priv->id.qp_type;
e51060f0
SH
4365 req.starting_psn = id_priv->seq_num;
4366 req.responder_resources = conn_param->responder_resources;
4367 req.initiator_depth = conn_param->initiator_depth;
4368 req.flow_control = conn_param->flow_control;
4ede178a
SH
4369 req.retry_count = min_t(u8, 7, conn_param->retry_count);
4370 req.rnr_retry_count = min_t(u8, 7, conn_param->rnr_retry_count);
e51060f0
SH
4371 req.remote_cm_response_timeout = CMA_CM_RESPONSE_TIMEOUT;
4372 req.local_cm_response_timeout = CMA_CM_RESPONSE_TIMEOUT;
4373 req.max_cm_retries = CMA_MAX_CM_RETRIES;
4374 req.srq = id_priv->srq ? 1 : 0;
a20652e1
LR
4375 req.ece.vendor_id = id_priv->ece.vendor_id;
4376 req.ece.attr_mod = id_priv->ece.attr_mod;
e51060f0 4377
ed999f82 4378 trace_cm_send_req(id_priv);
e51060f0
SH
4379 ret = ib_send_cm_req(id_priv->cm_id.ib, &req);
4380out:
0c9361fc
JM
4381 if (ret && !IS_ERR(id)) {
4382 ib_destroy_cm_id(id);
675a027c
KK
4383 id_priv->cm_id.ib = NULL;
4384 }
4385
e51060f0
SH
4386 kfree(private_data);
4387 return ret;
4388}
4389
07ebafba
TT
4390static int cma_connect_iw(struct rdma_id_private *id_priv,
4391 struct rdma_conn_param *conn_param)
4392{
4393 struct iw_cm_id *cm_id;
07ebafba
TT
4394 int ret;
4395 struct iw_cm_conn_param iw_param;
4396
4397 cm_id = iw_create_cm_id(id_priv->id.device, cma_iw_handler, id_priv);
0c9361fc
JM
4398 if (IS_ERR(cm_id))
4399 return PTR_ERR(cm_id);
07ebafba 4400
ca0c448d 4401 mutex_lock(&id_priv->qp_mutex);
68cdba06 4402 cm_id->tos = id_priv->tos;
926ba19b 4403 cm_id->tos_set = id_priv->tos_set;
ca0c448d
HB
4404 mutex_unlock(&id_priv->qp_mutex);
4405
07ebafba
TT
4406 id_priv->cm_id.iw = cm_id;
4407
24d44a39
SW
4408 memcpy(&cm_id->local_addr, cma_src_addr(id_priv),
4409 rdma_addr_size(cma_src_addr(id_priv)));
4410 memcpy(&cm_id->remote_addr, cma_dst_addr(id_priv),
4411 rdma_addr_size(cma_dst_addr(id_priv)));
07ebafba 4412
5851bb89 4413 ret = cma_modify_qp_rtr(id_priv, conn_param);
675a027c
KK
4414 if (ret)
4415 goto out;
07ebafba 4416
f45ee80e
HS
4417 if (conn_param) {
4418 iw_param.ord = conn_param->initiator_depth;
4419 iw_param.ird = conn_param->responder_resources;
4420 iw_param.private_data = conn_param->private_data;
4421 iw_param.private_data_len = conn_param->private_data_len;
4422 iw_param.qpn = id_priv->id.qp ? id_priv->qp_num : conn_param->qp_num;
4423 } else {
4424 memset(&iw_param, 0, sizeof iw_param);
07ebafba 4425 iw_param.qpn = id_priv->qp_num;
f45ee80e 4426 }
07ebafba
TT
4427 ret = iw_cm_connect(cm_id, &iw_param);
4428out:
0c9361fc 4429 if (ret) {
675a027c
KK
4430 iw_destroy_cm_id(cm_id);
4431 id_priv->cm_id.iw = NULL;
4432 }
07ebafba
TT
4433 return ret;
4434}
4435
071ba4cc
JG
4436/**
4437 * rdma_connect_locked - Initiate an active connection request.
4438 * @id: Connection identifier to connect.
4439 * @conn_param: Connection information used for connected QPs.
4440 *
4441 * Same as rdma_connect() but can only be called from the
4442 * RDMA_CM_EVENT_ROUTE_RESOLVED handler callback.
4443 */
4444int rdma_connect_locked(struct rdma_cm_id *id,
4445 struct rdma_conn_param *conn_param)
e51060f0 4446{
2a7cec53
JG
4447 struct rdma_id_private *id_priv =
4448 container_of(id, struct rdma_id_private, id);
e51060f0
SH
4449 int ret;
4450
071ba4cc
JG
4451 if (!cma_comp_exch(id_priv, RDMA_CM_ROUTE_RESOLVED, RDMA_CM_CONNECT))
4452 return -EINVAL;
e51060f0
SH
4453
4454 if (!id->qp) {
4455 id_priv->qp_num = conn_param->qp_num;
e51060f0
SH
4456 id_priv->srq = conn_param->srq;
4457 }
4458
72219cea 4459 if (rdma_cap_ib_cm(id->device, id->port_num)) {
b26f9b99 4460 if (id->qp_type == IB_QPT_UD)
628e5f6d
SH
4461 ret = cma_resolve_ib_udp(id_priv, conn_param);
4462 else
4463 ret = cma_connect_ib(id_priv, conn_param);
b6eb7011 4464 } else if (rdma_cap_iw_cm(id->device, id->port_num)) {
07ebafba 4465 ret = cma_connect_iw(id_priv, conn_param);
b6eb7011 4466 } else {
e51060f0 4467 ret = -ENOSYS;
b6eb7011 4468 }
e51060f0 4469 if (ret)
2a7cec53 4470 goto err_state;
e51060f0 4471 return 0;
2a7cec53 4472err_state:
550e5ca7 4473 cma_comp_exch(id_priv, RDMA_CM_CONNECT, RDMA_CM_ROUTE_RESOLVED);
071ba4cc
JG
4474 return ret;
4475}
4476EXPORT_SYMBOL(rdma_connect_locked);
4477
4478/**
4479 * rdma_connect - Initiate an active connection request.
4480 * @id: Connection identifier to connect.
4481 * @conn_param: Connection information used for connected QPs.
4482 *
4483 * Users must have resolved a route for the rdma_cm_id to connect with by having
4484 * called rdma_resolve_route before calling this routine.
4485 *
4486 * This call will either connect to a remote QP or obtain remote QP information
4487 * for unconnected rdma_cm_id's. The actual operation is based on the
4488 * rdma_cm_id's port space.
4489 */
4490int rdma_connect(struct rdma_cm_id *id, struct rdma_conn_param *conn_param)
4491{
4492 struct rdma_id_private *id_priv =
4493 container_of(id, struct rdma_id_private, id);
4494 int ret;
4495
4496 mutex_lock(&id_priv->handler_mutex);
4497 ret = rdma_connect_locked(id, conn_param);
2a7cec53 4498 mutex_unlock(&id_priv->handler_mutex);
e51060f0
SH
4499 return ret;
4500}
4501EXPORT_SYMBOL(rdma_connect);
4502
34e2ab57
LR
4503/**
4504 * rdma_connect_ece - Initiate an active connection request with ECE data.
4505 * @id: Connection identifier to connect.
4506 * @conn_param: Connection information used for connected QPs.
4507 * @ece: ECE parameters
4508 *
4509 * See rdma_connect() explanation.
4510 */
4511int rdma_connect_ece(struct rdma_cm_id *id, struct rdma_conn_param *conn_param,
4512 struct rdma_ucm_ece *ece)
4513{
4514 struct rdma_id_private *id_priv =
4515 container_of(id, struct rdma_id_private, id);
4516
4517 id_priv->ece.vendor_id = ece->vendor_id;
4518 id_priv->ece.attr_mod = ece->attr_mod;
4519
4520 return rdma_connect(id, conn_param);
4521}
4522EXPORT_SYMBOL(rdma_connect_ece);
4523
e51060f0
SH
4524static int cma_accept_ib(struct rdma_id_private *id_priv,
4525 struct rdma_conn_param *conn_param)
4526{
4527 struct ib_cm_rep_param rep;
5851bb89 4528 int ret;
0fe313b0 4529
5851bb89
SH
4530 ret = cma_modify_qp_rtr(id_priv, conn_param);
4531 if (ret)
4532 goto out;
0fe313b0 4533
5851bb89
SH
4534 ret = cma_modify_qp_rts(id_priv, conn_param);
4535 if (ret)
4536 goto out;
e51060f0
SH
4537
4538 memset(&rep, 0, sizeof rep);
4539 rep.qp_num = id_priv->qp_num;
4540 rep.starting_psn = id_priv->seq_num;
4541 rep.private_data = conn_param->private_data;
4542 rep.private_data_len = conn_param->private_data_len;
4543 rep.responder_resources = conn_param->responder_resources;
4544 rep.initiator_depth = conn_param->initiator_depth;
e51060f0
SH
4545 rep.failover_accepted = 0;
4546 rep.flow_control = conn_param->flow_control;
4ede178a 4547 rep.rnr_retry_count = min_t(u8, 7, conn_param->rnr_retry_count);
e51060f0 4548 rep.srq = id_priv->srq ? 1 : 0;
0cb15372
LR
4549 rep.ece.vendor_id = id_priv->ece.vendor_id;
4550 rep.ece.attr_mod = id_priv->ece.attr_mod;
e51060f0 4551
ed999f82 4552 trace_cm_send_rep(id_priv);
0fe313b0
SH
4553 ret = ib_send_cm_rep(id_priv->cm_id.ib, &rep);
4554out:
4555 return ret;
e51060f0
SH
4556}
4557
07ebafba
TT
4558static int cma_accept_iw(struct rdma_id_private *id_priv,
4559 struct rdma_conn_param *conn_param)
4560{
4561 struct iw_cm_conn_param iw_param;
4562 int ret;
4563
f2625f7d
SW
4564 if (!conn_param)
4565 return -EINVAL;
4566
5851bb89 4567 ret = cma_modify_qp_rtr(id_priv, conn_param);
07ebafba
TT
4568 if (ret)
4569 return ret;
4570
4571 iw_param.ord = conn_param->initiator_depth;
4572 iw_param.ird = conn_param->responder_resources;
4573 iw_param.private_data = conn_param->private_data;
4574 iw_param.private_data_len = conn_param->private_data_len;
b6eb7011 4575 if (id_priv->id.qp)
07ebafba 4576 iw_param.qpn = id_priv->qp_num;
b6eb7011 4577 else
07ebafba
TT
4578 iw_param.qpn = conn_param->qp_num;
4579
4580 return iw_cm_accept(id_priv->cm_id.iw, &iw_param);
4581}
4582
628e5f6d 4583static int cma_send_sidr_rep(struct rdma_id_private *id_priv,
5c438135 4584 enum ib_cm_sidr_status status, u32 qkey,
628e5f6d
SH
4585 const void *private_data, int private_data_len)
4586{
4587 struct ib_cm_sidr_rep_param rep;
d2ca39f2 4588 int ret;
628e5f6d
SH
4589
4590 memset(&rep, 0, sizeof rep);
4591 rep.status = status;
4592 if (status == IB_SIDR_SUCCESS) {
58e84f6b
MZ
4593 if (qkey)
4594 ret = cma_set_qkey(id_priv, qkey);
4595 else
4596 ret = cma_set_default_qkey(id_priv);
d2ca39f2
YE
4597 if (ret)
4598 return ret;
628e5f6d 4599 rep.qp_num = id_priv->qp_num;
c8f6a362 4600 rep.qkey = id_priv->qkey;
0cb15372
LR
4601
4602 rep.ece.vendor_id = id_priv->ece.vendor_id;
4603 rep.ece.attr_mod = id_priv->ece.attr_mod;
628e5f6d 4604 }
0cb15372 4605
628e5f6d
SH
4606 rep.private_data = private_data;
4607 rep.private_data_len = private_data_len;
4608
ed999f82 4609 trace_cm_send_sidr_rep(id_priv);
628e5f6d
SH
4610 return ib_send_cm_sidr_rep(id_priv->cm_id.ib, &rep);
4611}
4612
b09c4d70
LR
4613/**
4614 * rdma_accept - Called to accept a connection request or response.
4615 * @id: Connection identifier associated with the request.
4616 * @conn_param: Information needed to establish the connection. This must be
4617 * provided if accepting a connection request. If accepting a connection
4618 * response, this parameter must be NULL.
4619 *
4620 * Typically, this routine is only called by the listener to accept a connection
4621 * request. It must also be called on the active side of a connection if the
4622 * user is performing their own QP transitions.
4623 *
4624 * In the case of error, a reject message is sent to the remote side and the
4625 * state of the qp associated with the id is modified to error, such that any
4626 * previously posted receive buffers would be flushed.
4627 *
4628 * This function is for use by kernel ULPs and must be called from under the
4629 * handler callback.
4630 */
4631int rdma_accept(struct rdma_cm_id *id, struct rdma_conn_param *conn_param)
e51060f0 4632{
d114c6fe
JG
4633 struct rdma_id_private *id_priv =
4634 container_of(id, struct rdma_id_private, id);
e51060f0
SH
4635 int ret;
4636
d114c6fe 4637 lockdep_assert_held(&id_priv->handler_mutex);
83e9502d 4638
d114c6fe 4639 if (READ_ONCE(id_priv->state) != RDMA_CM_CONNECT)
e51060f0
SH
4640 return -EINVAL;
4641
4642 if (!id->qp && conn_param) {
4643 id_priv->qp_num = conn_param->qp_num;
e51060f0
SH
4644 id_priv->srq = conn_param->srq;
4645 }
4646
72219cea 4647 if (rdma_cap_ib_cm(id->device, id->port_num)) {
f45ee80e
HS
4648 if (id->qp_type == IB_QPT_UD) {
4649 if (conn_param)
4650 ret = cma_send_sidr_rep(id_priv, IB_SIDR_SUCCESS,
5c438135 4651 conn_param->qkey,
f45ee80e
HS
4652 conn_param->private_data,
4653 conn_param->private_data_len);
4654 else
4655 ret = cma_send_sidr_rep(id_priv, IB_SIDR_SUCCESS,
5c438135 4656 0, NULL, 0);
f45ee80e
HS
4657 } else {
4658 if (conn_param)
4659 ret = cma_accept_ib(id_priv, conn_param);
4660 else
4661 ret = cma_rep_recv(id_priv);
4662 }
b6eb7011 4663 } else if (rdma_cap_iw_cm(id->device, id->port_num)) {
07ebafba 4664 ret = cma_accept_iw(id_priv, conn_param);
b6eb7011 4665 } else {
e51060f0 4666 ret = -ENOSYS;
b6eb7011 4667 }
e51060f0
SH
4668 if (ret)
4669 goto reject;
4670
4671 return 0;
4672reject:
c5483388 4673 cma_modify_qp_err(id_priv);
8094ba0a 4674 rdma_reject(id, NULL, 0, IB_CM_REJ_CONSUMER_DEFINED);
e51060f0
SH
4675 return ret;
4676}
b09c4d70 4677EXPORT_SYMBOL(rdma_accept);
e51060f0 4678
b09c4d70
LR
4679int rdma_accept_ece(struct rdma_cm_id *id, struct rdma_conn_param *conn_param,
4680 struct rdma_ucm_ece *ece)
0cb15372
LR
4681{
4682 struct rdma_id_private *id_priv =
4683 container_of(id, struct rdma_id_private, id);
4684
4685 id_priv->ece.vendor_id = ece->vendor_id;
4686 id_priv->ece.attr_mod = ece->attr_mod;
4687
b09c4d70 4688 return rdma_accept(id, conn_param);
0cb15372 4689}
b09c4d70 4690EXPORT_SYMBOL(rdma_accept_ece);
0cb15372 4691
d114c6fe
JG
4692void rdma_lock_handler(struct rdma_cm_id *id)
4693{
4694 struct rdma_id_private *id_priv =
4695 container_of(id, struct rdma_id_private, id);
4696
4697 mutex_lock(&id_priv->handler_mutex);
0cb15372 4698}
d114c6fe
JG
4699EXPORT_SYMBOL(rdma_lock_handler);
4700
4701void rdma_unlock_handler(struct rdma_cm_id *id)
4702{
4703 struct rdma_id_private *id_priv =
4704 container_of(id, struct rdma_id_private, id);
4705
4706 mutex_unlock(&id_priv->handler_mutex);
4707}
4708EXPORT_SYMBOL(rdma_unlock_handler);
0cb15372 4709
0fe313b0
SH
4710int rdma_notify(struct rdma_cm_id *id, enum ib_event_type event)
4711{
4712 struct rdma_id_private *id_priv;
4713 int ret;
4714
4715 id_priv = container_of(id, struct rdma_id_private, id);
0c9361fc 4716 if (!id_priv->cm_id.ib)
0fe313b0
SH
4717 return -EINVAL;
4718
4719 switch (id->device->node_type) {
4720 case RDMA_NODE_IB_CA:
4721 ret = ib_cm_notify(id_priv->cm_id.ib, event);
4722 break;
4723 default:
4724 ret = 0;
4725 break;
4726 }
4727 return ret;
4728}
4729EXPORT_SYMBOL(rdma_notify);
4730
e51060f0 4731int rdma_reject(struct rdma_cm_id *id, const void *private_data,
8094ba0a 4732 u8 private_data_len, u8 reason)
e51060f0
SH
4733{
4734 struct rdma_id_private *id_priv;
4735 int ret;
4736
4737 id_priv = container_of(id, struct rdma_id_private, id);
0c9361fc 4738 if (!id_priv->cm_id.ib)
e51060f0
SH
4739 return -EINVAL;
4740
72219cea 4741 if (rdma_cap_ib_cm(id->device, id->port_num)) {
ed999f82 4742 if (id->qp_type == IB_QPT_UD) {
5c438135 4743 ret = cma_send_sidr_rep(id_priv, IB_SIDR_REJECT, 0,
628e5f6d 4744 private_data, private_data_len);
ed999f82
CL
4745 } else {
4746 trace_cm_send_rej(id_priv);
8094ba0a
LR
4747 ret = ib_send_cm_rej(id_priv->cm_id.ib, reason, NULL, 0,
4748 private_data, private_data_len);
ed999f82 4749 }
04215330 4750 } else if (rdma_cap_iw_cm(id->device, id->port_num)) {
07ebafba
TT
4751 ret = iw_cm_reject(id_priv->cm_id.iw,
4752 private_data, private_data_len);
b6eb7011 4753 } else {
e51060f0 4754 ret = -ENOSYS;
b6eb7011 4755 }
21655afc 4756
e51060f0
SH
4757 return ret;
4758}
4759EXPORT_SYMBOL(rdma_reject);
4760
4761int rdma_disconnect(struct rdma_cm_id *id)
4762{
4763 struct rdma_id_private *id_priv;
4764 int ret;
4765
4766 id_priv = container_of(id, struct rdma_id_private, id);
0c9361fc 4767 if (!id_priv->cm_id.ib)
e51060f0
SH
4768 return -EINVAL;
4769
72219cea 4770 if (rdma_cap_ib_cm(id->device, id->port_num)) {
c5483388 4771 ret = cma_modify_qp_err(id_priv);
07ebafba
TT
4772 if (ret)
4773 goto out;
e51060f0 4774 /* Initiate or respond to a disconnect. */
ed999f82
CL
4775 trace_cm_disconnect(id_priv);
4776 if (ib_send_cm_dreq(id_priv->cm_id.ib, NULL, 0)) {
4777 if (!ib_send_cm_drep(id_priv->cm_id.ib, NULL, 0))
4778 trace_cm_sent_drep(id_priv);
4779 } else {
4780 trace_cm_sent_dreq(id_priv);
4781 }
04215330 4782 } else if (rdma_cap_iw_cm(id->device, id->port_num)) {
07ebafba 4783 ret = iw_cm_disconnect(id_priv->cm_id.iw, 0);
21655afc 4784 } else
07ebafba 4785 ret = -EINVAL;
21655afc 4786
e51060f0
SH
4787out:
4788 return ret;
4789}
4790EXPORT_SYMBOL(rdma_disconnect);
4791
b5de0c60
JG
4792static void cma_make_mc_event(int status, struct rdma_id_private *id_priv,
4793 struct ib_sa_multicast *multicast,
4794 struct rdma_cm_event *event,
4795 struct cma_multicast *mc)
c8f6a362 4796{
b5de0c60
JG
4797 struct rdma_dev_addr *dev_addr;
4798 enum ib_gid_type gid_type;
4799 struct net_device *ndev;
c8f6a362 4800
58e84f6b 4801 if (status)
498683c6
MS
4802 pr_debug_ratelimited("RDMA CM: MULTICAST_ERROR: failed to join multicast. status %d\n",
4803 status);
b5de0c60
JG
4804
4805 event->status = status;
4806 event->param.ud.private_data = mc->context;
4807 if (status) {
4808 event->event = RDMA_CM_EVENT_MULTICAST_ERROR;
4809 return;
498683c6 4810 }
c8f6a362 4811
b5de0c60
JG
4812 dev_addr = &id_priv->id.route.addr.dev_addr;
4813 ndev = dev_get_by_index(dev_addr->net, dev_addr->bound_dev_if);
4814 gid_type =
4815 id_priv->cma_dev
4816 ->default_gid_type[id_priv->id.port_num -
4817 rdma_start_port(
4818 id_priv->cma_dev->device)];
4819
4820 event->event = RDMA_CM_EVENT_MULTICAST_JOIN;
4821 if (ib_init_ah_from_mcmember(id_priv->id.device, id_priv->id.port_num,
4822 &multicast->rec, ndev, gid_type,
4823 &event->param.ud.ah_attr)) {
4824 event->event = RDMA_CM_EVENT_MULTICAST_ERROR;
4825 goto out;
4826 }
6d337179 4827
b5de0c60 4828 event->param.ud.qp_num = 0xFFFFFF;
58e84f6b 4829 event->param.ud.qkey = id_priv->qkey;
c8f6a362 4830
b5de0c60 4831out:
6735041f 4832 dev_put(ndev);
b5de0c60 4833}
f685c195 4834
c8f6a362
SH
4835static int cma_ib_mc_handler(int status, struct ib_sa_multicast *multicast)
4836{
c8f6a362 4837 struct cma_multicast *mc = multicast->context;
b5de0c60 4838 struct rdma_id_private *id_priv = mc->id_priv;
7582df82 4839 struct rdma_cm_event event = {};
37e07cda 4840 int ret = 0;
c8f6a362 4841
37e07cda 4842 mutex_lock(&id_priv->handler_mutex);
5cfbf929
JG
4843 if (READ_ONCE(id_priv->state) == RDMA_CM_DEVICE_REMOVAL ||
4844 READ_ONCE(id_priv->state) == RDMA_CM_DESTROYING)
37e07cda 4845 goto out;
c8f6a362 4846
58e84f6b
MZ
4847 ret = cma_set_qkey(id_priv, be32_to_cpu(multicast->rec.qkey));
4848 if (!ret) {
4849 cma_make_mc_event(status, id_priv, multicast, &event, mc);
4850 ret = cma_cm_event_handler(id_priv, &event);
4851 }
f685c195 4852 rdma_destroy_ah_attr(&event.param.ud.ah_attr);
fe454dc3 4853 WARN_ON(ret);
8aa08602 4854
37e07cda 4855out:
de910bd9 4856 mutex_unlock(&id_priv->handler_mutex);
c8f6a362
SH
4857 return 0;
4858}
4859
4860static void cma_set_mgid(struct rdma_id_private *id_priv,
4861 struct sockaddr *addr, union ib_gid *mgid)
4862{
4863 unsigned char mc_map[MAX_ADDR_LEN];
4864 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
4865 struct sockaddr_in *sin = (struct sockaddr_in *) addr;
4866 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) addr;
4867
4868 if (cma_any_addr(addr)) {
4869 memset(mgid, 0, sizeof *mgid);
4870 } else if ((addr->sa_family == AF_INET6) &&
1c9b2819 4871 ((be32_to_cpu(sin6->sin6_addr.s6_addr32[0]) & 0xFFF0FFFF) ==
c8f6a362
SH
4872 0xFF10A01B)) {
4873 /* IPv6 address is an SA assigned MGID. */
4874 memcpy(mgid, &sin6->sin6_addr, sizeof *mgid);
5bc2b7b3
SH
4875 } else if (addr->sa_family == AF_IB) {
4876 memcpy(mgid, &((struct sockaddr_ib *) addr)->sib_addr, sizeof *mgid);
076dd53b 4877 } else if (addr->sa_family == AF_INET6) {
e2e62697
JG
4878 ipv6_ib_mc_map(&sin6->sin6_addr, dev_addr->broadcast, mc_map);
4879 if (id_priv->id.ps == RDMA_PS_UDP)
4880 mc_map[7] = 0x01; /* Use RDMA CM signature */
4881 *mgid = *(union ib_gid *) (mc_map + 4);
c8f6a362 4882 } else {
a9e527e3 4883 ip_ib_mc_map(sin->sin_addr.s_addr, dev_addr->broadcast, mc_map);
c8f6a362
SH
4884 if (id_priv->id.ps == RDMA_PS_UDP)
4885 mc_map[7] = 0x01; /* Use RDMA CM signature */
c8f6a362
SH
4886 *mgid = *(union ib_gid *) (mc_map + 4);
4887 }
4888}
4889
4890static int cma_join_ib_multicast(struct rdma_id_private *id_priv,
4891 struct cma_multicast *mc)
4892{
4893 struct ib_sa_mcmember_rec rec;
4894 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
4895 ib_sa_comp_mask comp_mask;
4896 int ret;
4897
4898 ib_addr_get_mgid(dev_addr, &rec.mgid);
4899 ret = ib_sa_get_mcmember_rec(id_priv->id.device, id_priv->id.port_num,
4900 &rec.mgid, &rec);
4901 if (ret)
4902 return ret;
4903
58e84f6b
MZ
4904 if (!id_priv->qkey) {
4905 ret = cma_set_default_qkey(id_priv);
4906 if (ret)
4907 return ret;
4908 }
5bc2b7b3 4909
3f446754 4910 cma_set_mgid(id_priv, (struct sockaddr *) &mc->addr, &rec.mgid);
5bc2b7b3 4911 rec.qkey = cpu_to_be32(id_priv->qkey);
6f8372b6 4912 rdma_addr_get_sgid(dev_addr, &rec.port_gid);
c8f6a362 4913 rec.pkey = cpu_to_be16(ib_addr_get_pkey(dev_addr));
ab15c95a
AV
4914 rec.join_state = mc->join_state;
4915
c8f6a362
SH
4916 comp_mask = IB_SA_MCMEMBER_REC_MGID | IB_SA_MCMEMBER_REC_PORT_GID |
4917 IB_SA_MCMEMBER_REC_PKEY | IB_SA_MCMEMBER_REC_JOIN_STATE |
4918 IB_SA_MCMEMBER_REC_QKEY | IB_SA_MCMEMBER_REC_SL |
4919 IB_SA_MCMEMBER_REC_FLOW_LABEL |
4920 IB_SA_MCMEMBER_REC_TRAFFIC_CLASS;
4921
84adeee9
YE
4922 if (id_priv->id.ps == RDMA_PS_IPOIB)
4923 comp_mask |= IB_SA_MCMEMBER_REC_RATE |
2a22fb8c
DB
4924 IB_SA_MCMEMBER_REC_RATE_SELECTOR |
4925 IB_SA_MCMEMBER_REC_MTU_SELECTOR |
4926 IB_SA_MCMEMBER_REC_MTU |
4927 IB_SA_MCMEMBER_REC_HOP_LIMIT;
84adeee9 4928
b5de0c60
JG
4929 mc->sa_mc = ib_sa_join_multicast(&sa_client, id_priv->id.device,
4930 id_priv->id.port_num, &rec, comp_mask,
4931 GFP_KERNEL, cma_ib_mc_handler, mc);
4932 return PTR_ERR_OR_ZERO(mc->sa_mc);
3c86aa70
EC
4933}
4934
be1d325a
NO
4935static void cma_iboe_set_mgid(struct sockaddr *addr, union ib_gid *mgid,
4936 enum ib_gid_type gid_type)
3c86aa70
EC
4937{
4938 struct sockaddr_in *sin = (struct sockaddr_in *)addr;
4939 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)addr;
4940
4941 if (cma_any_addr(addr)) {
4942 memset(mgid, 0, sizeof *mgid);
4943 } else if (addr->sa_family == AF_INET6) {
4944 memcpy(mgid, &sin6->sin6_addr, sizeof *mgid);
4945 } else {
5c181bda
PP
4946 mgid->raw[0] =
4947 (gid_type == IB_GID_TYPE_ROCE_UDP_ENCAP) ? 0 : 0xff;
4948 mgid->raw[1] =
4949 (gid_type == IB_GID_TYPE_ROCE_UDP_ENCAP) ? 0 : 0x0e;
3c86aa70
EC
4950 mgid->raw[2] = 0;
4951 mgid->raw[3] = 0;
4952 mgid->raw[4] = 0;
4953 mgid->raw[5] = 0;
4954 mgid->raw[6] = 0;
4955 mgid->raw[7] = 0;
4956 mgid->raw[8] = 0;
4957 mgid->raw[9] = 0;
4958 mgid->raw[10] = 0xff;
4959 mgid->raw[11] = 0xff;
4960 *(__be32 *)(&mgid->raw[12]) = sin->sin_addr.s_addr;
4961 }
4962}
4963
4964static int cma_iboe_join_multicast(struct rdma_id_private *id_priv,
4965 struct cma_multicast *mc)
4966{
3c86aa70 4967 struct rdma_dev_addr *dev_addr = &id_priv->id.route.addr.dev_addr;
bee3c3c9 4968 int err = 0;
3c86aa70
EC
4969 struct sockaddr *addr = (struct sockaddr *)&mc->addr;
4970 struct net_device *ndev = NULL;
e0fe97ef 4971 struct ib_sa_multicast ib = {};
bee3c3c9 4972 enum ib_gid_type gid_type;
ab15c95a
AV
4973 bool send_only;
4974
4975 send_only = mc->join_state == BIT(SENDONLY_FULLMEMBER_JOIN);
3c86aa70 4976
b5de0c60 4977 if (cma_zero_addr(addr))
3c86aa70
EC
4978 return -EINVAL;
4979
be1d325a
NO
4980 gid_type = id_priv->cma_dev->default_gid_type[id_priv->id.port_num -
4981 rdma_start_port(id_priv->cma_dev->device)];
b5de0c60 4982 cma_iboe_set_mgid(addr, &ib.rec.mgid, gid_type);
3c86aa70 4983
b5de0c60 4984 ib.rec.pkey = cpu_to_be16(0xffff);
3c86aa70 4985 if (dev_addr->bound_dev_if)
052eac6e 4986 ndev = dev_get_by_index(dev_addr->net, dev_addr->bound_dev_if);
fe454dc3
AH
4987 if (!ndev)
4988 return -ENODEV;
4989
58030c76 4990 ib.rec.rate = IB_RATE_PORT_CURRENT;
b5de0c60
JG
4991 ib.rec.hop_limit = 1;
4992 ib.rec.mtu = iboe_get_mtu(ndev->mtu);
bee3c3c9 4993
bee3c3c9 4994 if (addr->sa_family == AF_INET) {
c65f6c5a 4995 if (gid_type == IB_GID_TYPE_ROCE_UDP_ENCAP) {
b5de0c60 4996 ib.rec.hop_limit = IPV6_DEFAULT_HOPLIMIT;
ab15c95a 4997 if (!send_only) {
b5de0c60 4998 err = cma_igmp_send(ndev, &ib.rec.mgid,
ab15c95a 4999 true);
ab15c95a 5000 }
bee3c3c9
MS
5001 }
5002 } else {
5003 if (gid_type == IB_GID_TYPE_ROCE_UDP_ENCAP)
5004 err = -ENOTSUPP;
5005 }
3c86aa70 5006 dev_put(ndev);
fe454dc3
AH
5007 if (err || !ib.rec.mtu)
5008 return err ?: -EINVAL;
5009
58e84f6b
MZ
5010 if (!id_priv->qkey)
5011 cma_set_default_qkey(id_priv);
5012
7b85627b 5013 rdma_ip2gid((struct sockaddr *)&id_priv->id.route.addr.src_addr,
b5de0c60 5014 &ib.rec.port_gid);
fe454dc3
AH
5015 INIT_WORK(&mc->iboe_join.work, cma_iboe_join_work_handler);
5016 cma_make_mc_event(0, id_priv, &ib, &mc->iboe_join.event, mc);
5017 queue_work(cma_wq, &mc->iboe_join.work);
3c86aa70 5018 return 0;
3c86aa70
EC
5019}
5020
c8f6a362 5021int rdma_join_multicast(struct rdma_cm_id *id, struct sockaddr *addr,
ab15c95a 5022 u8 join_state, void *context)
c8f6a362 5023{
5cfbf929
JG
5024 struct rdma_id_private *id_priv =
5025 container_of(id, struct rdma_id_private, id);
c8f6a362
SH
5026 struct cma_multicast *mc;
5027 int ret;
5028
1bb5091d
JG
5029 /* Not supported for kernel QPs */
5030 if (WARN_ON(id->qp))
7688f2c3
LR
5031 return -EINVAL;
5032
5cfbf929
JG
5033 /* ULP is calling this wrong. */
5034 if (!id->device || (READ_ONCE(id_priv->state) != RDMA_CM_ADDR_BOUND &&
5035 READ_ONCE(id_priv->state) != RDMA_CM_ADDR_RESOLVED))
c8f6a362
SH
5036 return -EINVAL;
5037
58e84f6b
MZ
5038 if (id_priv->id.qp_type != IB_QPT_UD)
5039 return -EINVAL;
5040
b5de0c60 5041 mc = kzalloc(sizeof(*mc), GFP_KERNEL);
c8f6a362
SH
5042 if (!mc)
5043 return -ENOMEM;
5044
ef560861 5045 memcpy(&mc->addr, addr, rdma_addr_size(addr));
c8f6a362
SH
5046 mc->context = context;
5047 mc->id_priv = id_priv;
ab15c95a 5048 mc->join_state = join_state;
c8f6a362 5049
5d9fb044 5050 if (rdma_protocol_roce(id->device, id->port_num)) {
5c9a5282 5051 ret = cma_iboe_join_multicast(id_priv, mc);
c0126915
JG
5052 if (ret)
5053 goto out_err;
5054 } else if (rdma_cap_ib_mcast(id->device, id->port_num)) {
5c9a5282 5055 ret = cma_join_ib_multicast(id_priv, mc);
c0126915
JG
5056 if (ret)
5057 goto out_err;
5058 } else {
c8f6a362 5059 ret = -ENOSYS;
c0126915 5060 goto out_err;
c8f6a362 5061 }
c0126915
JG
5062
5063 spin_lock(&id_priv->lock);
5064 list_add(&mc->list, &id_priv->mc_list);
5065 spin_unlock(&id_priv->lock);
5066
5067 return 0;
5068out_err:
5069 kfree(mc);
c8f6a362
SH
5070 return ret;
5071}
5072EXPORT_SYMBOL(rdma_join_multicast);
5073
5074void rdma_leave_multicast(struct rdma_cm_id *id, struct sockaddr *addr)
5075{
5076 struct rdma_id_private *id_priv;
5077 struct cma_multicast *mc;
5078
5079 id_priv = container_of(id, struct rdma_id_private, id);
5080 spin_lock_irq(&id_priv->lock);
5081 list_for_each_entry(mc, &id_priv->mc_list, list) {
3788d299
JG
5082 if (memcmp(&mc->addr, addr, rdma_addr_size(addr)) != 0)
5083 continue;
5084 list_del(&mc->list);
5085 spin_unlock_irq(&id_priv->lock);
5c9a5282 5086
3788d299
JG
5087 WARN_ON(id_priv->cma_dev->device != id->device);
5088 destroy_mc(id_priv, mc);
5089 return;
c8f6a362
SH
5090 }
5091 spin_unlock_irq(&id_priv->lock);
5092}
5093EXPORT_SYMBOL(rdma_leave_multicast);
5094
dd5bdff8
OG
5095static int cma_netdev_change(struct net_device *ndev, struct rdma_id_private *id_priv)
5096{
5097 struct rdma_dev_addr *dev_addr;
7e85bcda 5098 struct cma_work *work;
dd5bdff8
OG
5099
5100 dev_addr = &id_priv->id.route.addr.dev_addr;
5101
6266ed6e 5102 if ((dev_addr->bound_dev_if == ndev->ifindex) &&
fa20105e 5103 (net_eq(dev_net(ndev), dev_addr->net)) &&
dd5bdff8 5104 memcmp(dev_addr->src_dev_addr, ndev->dev_addr, ndev->addr_len)) {
aba25a3e
PP
5105 pr_info("RDMA CM addr change for ndev %s used by id %p\n",
5106 ndev->name, &id_priv->id);
dd5bdff8
OG
5107 work = kzalloc(sizeof *work, GFP_KERNEL);
5108 if (!work)
5109 return -ENOMEM;
5110
7e85bcda 5111 INIT_WORK(&work->work, cma_work_handler);
dd5bdff8
OG
5112 work->id = id_priv;
5113 work->event.event = RDMA_CM_EVENT_ADDR_CHANGE;
e368d23f 5114 cma_id_get(id_priv);
dd5bdff8
OG
5115 queue_work(cma_wq, &work->work);
5116 }
5117
5118 return 0;
5119}
5120
5121static int cma_netdev_callback(struct notifier_block *self, unsigned long event,
351638e7 5122 void *ptr)
dd5bdff8 5123{
351638e7 5124 struct net_device *ndev = netdev_notifier_info_to_dev(ptr);
dd5bdff8
OG
5125 struct cma_device *cma_dev;
5126 struct rdma_id_private *id_priv;
5127 int ret = NOTIFY_DONE;
5128
dd5bdff8
OG
5129 if (event != NETDEV_BONDING_FAILOVER)
5130 return NOTIFY_DONE;
5131
3cd96fdd 5132 if (!netif_is_bond_master(ndev))
dd5bdff8
OG
5133 return NOTIFY_DONE;
5134
5135 mutex_lock(&lock);
5136 list_for_each_entry(cma_dev, &dev_list, list)
99cfddb8 5137 list_for_each_entry(id_priv, &cma_dev->id_list, device_item) {
dd5bdff8
OG
5138 ret = cma_netdev_change(ndev, id_priv);
5139 if (ret)
5140 goto out;
5141 }
5142
5143out:
5144 mutex_unlock(&lock);
5145 return ret;
5146}
5147
925d046e
PH
5148static void cma_netevent_work_handler(struct work_struct *_work)
5149{
5150 struct rdma_id_private *id_priv =
5151 container_of(_work, struct rdma_id_private, id.net_work);
5152 struct rdma_cm_event event = {};
5153
5154 mutex_lock(&id_priv->handler_mutex);
5155
5156 if (READ_ONCE(id_priv->state) == RDMA_CM_DESTROYING ||
5157 READ_ONCE(id_priv->state) == RDMA_CM_DEVICE_REMOVAL)
5158 goto out_unlock;
5159
5160 event.event = RDMA_CM_EVENT_UNREACHABLE;
5161 event.status = -ETIMEDOUT;
5162
5163 if (cma_cm_event_handler(id_priv, &event)) {
5164 __acquire(&id_priv->handler_mutex);
5165 id_priv->cm_id.ib = NULL;
5166 cma_id_put(id_priv);
5167 destroy_id_handler_unlock(id_priv);
5168 return;
5169 }
5170
5171out_unlock:
5172 mutex_unlock(&id_priv->handler_mutex);
5173 cma_id_put(id_priv);
5174}
5175
5176static int cma_netevent_callback(struct notifier_block *self,
5177 unsigned long event, void *ctx)
5178{
5179 struct id_table_entry *ips_node = NULL;
5180 struct rdma_id_private *current_id;
5181 struct neighbour *neigh = ctx;
5182 unsigned long flags;
5183
5184 if (event != NETEVENT_NEIGH_UPDATE)
5185 return NOTIFY_DONE;
5186
5187 spin_lock_irqsave(&id_table_lock, flags);
5188 if (neigh->tbl->family == AF_INET6) {
5189 struct sockaddr_in6 neigh_sock_6;
5190
5191 neigh_sock_6.sin6_family = AF_INET6;
5192 neigh_sock_6.sin6_addr = *(struct in6_addr *)neigh->primary_key;
5193 ips_node = node_from_ndev_ip(&id_table, neigh->dev->ifindex,
5194 (struct sockaddr *)&neigh_sock_6);
5195 } else if (neigh->tbl->family == AF_INET) {
5196 struct sockaddr_in neigh_sock_4;
5197
5198 neigh_sock_4.sin_family = AF_INET;
5199 neigh_sock_4.sin_addr.s_addr = *(__be32 *)(neigh->primary_key);
5200 ips_node = node_from_ndev_ip(&id_table, neigh->dev->ifindex,
5201 (struct sockaddr *)&neigh_sock_4);
5202 } else
5203 goto out;
5204
5205 if (!ips_node)
5206 goto out;
5207
5208 list_for_each_entry(current_id, &ips_node->id_list, id_list_entry) {
5209 if (!memcmp(current_id->id.route.addr.dev_addr.dst_dev_addr,
5210 neigh->ha, ETH_ALEN))
5211 continue;
5212 INIT_WORK(&current_id->id.net_work, cma_netevent_work_handler);
5213 cma_id_get(current_id);
5214 queue_work(cma_wq, &current_id->id.net_work);
5215 }
5216out:
5217 spin_unlock_irqrestore(&id_table_lock, flags);
5218 return NOTIFY_DONE;
5219}
5220
dd5bdff8
OG
5221static struct notifier_block cma_nb = {
5222 .notifier_call = cma_netdev_callback
5223};
5224
925d046e
PH
5225static struct notifier_block cma_netevent_cb = {
5226 .notifier_call = cma_netevent_callback
5227};
5228
3647a28d 5229static void cma_send_device_removal_put(struct rdma_id_private *id_priv)
e51060f0 5230{
3647a28d 5231 struct rdma_cm_event event = { .event = RDMA_CM_EVENT_DEVICE_REMOVAL };
550e5ca7 5232 enum rdma_cm_state state;
3647a28d 5233 unsigned long flags;
e51060f0 5234
de910bd9 5235 mutex_lock(&id_priv->handler_mutex);
3647a28d
JG
5236 /* Record that we want to remove the device */
5237 spin_lock_irqsave(&id_priv->lock, flags);
5238 state = id_priv->state;
5239 if (state == RDMA_CM_DESTROYING || state == RDMA_CM_DEVICE_REMOVAL) {
5240 spin_unlock_irqrestore(&id_priv->lock, flags);
5241 mutex_unlock(&id_priv->handler_mutex);
5242 cma_id_put(id_priv);
5243 return;
5244 }
5245 id_priv->state = RDMA_CM_DEVICE_REMOVAL;
5246 spin_unlock_irqrestore(&id_priv->lock, flags);
e51060f0 5247
3647a28d
JG
5248 if (cma_cm_event_handler(id_priv, &event)) {
5249 /*
5250 * At this point the ULP promises it won't call
5251 * rdma_destroy_id() concurrently
5252 */
5253 cma_id_put(id_priv);
5254 mutex_unlock(&id_priv->handler_mutex);
f6a9d47a
JG
5255 trace_cm_id_destroy(id_priv);
5256 _destroy_id(id_priv, state);
3647a28d
JG
5257 return;
5258 }
de910bd9 5259 mutex_unlock(&id_priv->handler_mutex);
3647a28d
JG
5260
5261 /*
5262 * If this races with destroy then the thread that first assigns state
5263 * to a destroying does the cancel.
5264 */
5265 cma_cancel_operation(id_priv, state);
5266 cma_id_put(id_priv);
e51060f0
SH
5267}
5268
5269static void cma_process_remove(struct cma_device *cma_dev)
5270{
e51060f0
SH
5271 mutex_lock(&lock);
5272 while (!list_empty(&cma_dev->id_list)) {
3647a28d 5273 struct rdma_id_private *id_priv = list_first_entry(
99cfddb8 5274 &cma_dev->id_list, struct rdma_id_private, device_item);
e51060f0 5275
99cfddb8
JG
5276 list_del_init(&id_priv->listen_item);
5277 list_del_init(&id_priv->device_item);
e368d23f 5278 cma_id_get(id_priv);
e51060f0
SH
5279 mutex_unlock(&lock);
5280
3647a28d 5281 cma_send_device_removal_put(id_priv);
e51060f0
SH
5282
5283 mutex_lock(&lock);
5284 }
5285 mutex_unlock(&lock);
5286
5ff8c8fa 5287 cma_dev_put(cma_dev);
e51060f0
SH
5288 wait_for_completion(&cma_dev->comp);
5289}
5290
4d51c3d9
PP
5291static bool cma_supported(struct ib_device *device)
5292{
5293 u32 i;
5294
5295 rdma_for_each_port(device, i) {
5296 if (rdma_cap_ib_cm(device, i) || rdma_cap_iw_cm(device, i))
5297 return true;
5298 }
5299 return false;
5300}
5301
c80a0c52
LR
5302static int cma_add_one(struct ib_device *device)
5303{
dd37d2f5 5304 struct rdma_id_private *to_destroy;
c80a0c52
LR
5305 struct cma_device *cma_dev;
5306 struct rdma_id_private *id_priv;
c80a0c52
LR
5307 unsigned long supported_gids = 0;
5308 int ret;
1fb7f897 5309 u32 i;
c80a0c52 5310
4d51c3d9
PP
5311 if (!cma_supported(device))
5312 return -EOPNOTSUPP;
5313
c80a0c52
LR
5314 cma_dev = kmalloc(sizeof(*cma_dev), GFP_KERNEL);
5315 if (!cma_dev)
5316 return -ENOMEM;
5317
5318 cma_dev->device = device;
5319 cma_dev->default_gid_type = kcalloc(device->phys_port_cnt,
5320 sizeof(*cma_dev->default_gid_type),
5321 GFP_KERNEL);
5322 if (!cma_dev->default_gid_type) {
5323 ret = -ENOMEM;
5324 goto free_cma_dev;
5325 }
5326
5327 cma_dev->default_roce_tos = kcalloc(device->phys_port_cnt,
5328 sizeof(*cma_dev->default_roce_tos),
5329 GFP_KERNEL);
5330 if (!cma_dev->default_roce_tos) {
5331 ret = -ENOMEM;
5332 goto free_gid_type;
5333 }
5334
5335 rdma_for_each_port (device, i) {
5336 supported_gids = roce_gid_type_mask_support(device, i);
5337 WARN_ON(!supported_gids);
5338 if (supported_gids & (1 << CMA_PREFERRED_ROCE_GID_TYPE))
5339 cma_dev->default_gid_type[i - rdma_start_port(device)] =
5340 CMA_PREFERRED_ROCE_GID_TYPE;
5341 else
5342 cma_dev->default_gid_type[i - rdma_start_port(device)] =
5343 find_first_bit(&supported_gids, BITS_PER_LONG);
5344 cma_dev->default_roce_tos[i - rdma_start_port(device)] = 0;
5345 }
5346
5347 init_completion(&cma_dev->comp);
5348 refcount_set(&cma_dev->refcount, 1);
5349 INIT_LIST_HEAD(&cma_dev->id_list);
5350 ib_set_client_data(device, &cma_client, cma_dev);
5351
5352 mutex_lock(&lock);
5353 list_add_tail(&cma_dev->list, &dev_list);
99cfddb8 5354 list_for_each_entry(id_priv, &listen_any_list, listen_any_item) {
dd37d2f5 5355 ret = cma_listen_on_dev(id_priv, cma_dev, &to_destroy);
c80a0c52
LR
5356 if (ret)
5357 goto free_listen;
5358 }
5359 mutex_unlock(&lock);
5360
5361 trace_cm_add_one(device);
5362 return 0;
5363
5364free_listen:
5365 list_del(&cma_dev->list);
5366 mutex_unlock(&lock);
5367
dd37d2f5 5368 /* cma_process_remove() will delete to_destroy */
c80a0c52
LR
5369 cma_process_remove(cma_dev);
5370 kfree(cma_dev->default_roce_tos);
5371free_gid_type:
5372 kfree(cma_dev->default_gid_type);
5373
5374free_cma_dev:
5375 kfree(cma_dev);
5376 return ret;
5377}
5378
7c1eb45a 5379static void cma_remove_one(struct ib_device *device, void *client_data)
e51060f0 5380{
7c1eb45a 5381 struct cma_device *cma_dev = client_data;
e51060f0 5382
ed999f82
CL
5383 trace_cm_remove_one(device);
5384
e51060f0
SH
5385 mutex_lock(&lock);
5386 list_del(&cma_dev->list);
5387 mutex_unlock(&lock);
5388
5389 cma_process_remove(cma_dev);
89052d78 5390 kfree(cma_dev->default_roce_tos);
045959db 5391 kfree(cma_dev->default_gid_type);
e51060f0
SH
5392 kfree(cma_dev);
5393}
5394
4be74b42
HE
5395static int cma_init_net(struct net *net)
5396{
5397 struct cma_pernet *pernet = cma_pernet(net);
5398
63826753
MW
5399 xa_init(&pernet->tcp_ps);
5400 xa_init(&pernet->udp_ps);
5401 xa_init(&pernet->ipoib_ps);
5402 xa_init(&pernet->ib_ps);
4be74b42
HE
5403
5404 return 0;
5405}
5406
5407static void cma_exit_net(struct net *net)
5408{
5409 struct cma_pernet *pernet = cma_pernet(net);
5410
63826753
MW
5411 WARN_ON(!xa_empty(&pernet->tcp_ps));
5412 WARN_ON(!xa_empty(&pernet->udp_ps));
5413 WARN_ON(!xa_empty(&pernet->ipoib_ps));
5414 WARN_ON(!xa_empty(&pernet->ib_ps));
4be74b42
HE
5415}
5416
5417static struct pernet_operations cma_pernet_operations = {
5418 .init = cma_init_net,
5419 .exit = cma_exit_net,
5420 .id = &cma_pernet_id,
5421 .size = sizeof(struct cma_pernet),
5422};
5423
716abb1f 5424static int __init cma_init(void)
e51060f0 5425{
5d7220e8 5426 int ret;
227b60f5 5427
32ac9e43
JG
5428 /*
5429 * There is a rare lock ordering dependency in cma_netdev_callback()
5430 * that only happens when bonding is enabled. Teach lockdep that rtnl
5431 * must never be nested under lock so it can find these without having
5432 * to test with bonding.
5433 */
5434 if (IS_ENABLED(CONFIG_LOCKDEP)) {
5435 rtnl_lock();
5436 mutex_lock(&lock);
5437 mutex_unlock(&lock);
5438 rtnl_unlock();
5439 }
5440
dee9acbb 5441 cma_wq = alloc_ordered_workqueue("rdma_cm", WQ_MEM_RECLAIM);
e51060f0
SH
5442 if (!cma_wq)
5443 return -ENOMEM;
5444
4be74b42
HE
5445 ret = register_pernet_subsys(&cma_pernet_operations);
5446 if (ret)
5447 goto err_wq;
5448
c1a0b23b 5449 ib_sa_register_client(&sa_client);
dd5bdff8 5450 register_netdevice_notifier(&cma_nb);
925d046e 5451 register_netevent_notifier(&cma_netevent_cb);
c1a0b23b 5452
e51060f0
SH
5453 ret = ib_register_client(&cma_client);
5454 if (ret)
5455 goto err;
753f618a 5456
a7bfb93f 5457 ret = cma_configfs_init();
5458 if (ret)
5459 goto err_ib;
753f618a 5460
e51060f0
SH
5461 return 0;
5462
a7bfb93f 5463err_ib:
5464 ib_unregister_client(&cma_client);
e51060f0 5465err:
925d046e 5466 unregister_netevent_notifier(&cma_netevent_cb);
dd5bdff8 5467 unregister_netdevice_notifier(&cma_nb);
c1a0b23b 5468 ib_sa_unregister_client(&sa_client);
44a7b675 5469 unregister_pernet_subsys(&cma_pernet_operations);
4be74b42 5470err_wq:
e51060f0
SH
5471 destroy_workqueue(cma_wq);
5472 return ret;
5473}
5474
716abb1f 5475static void __exit cma_cleanup(void)
e51060f0 5476{
045959db 5477 cma_configfs_exit();
e51060f0 5478 ib_unregister_client(&cma_client);
925d046e 5479 unregister_netevent_notifier(&cma_netevent_cb);
dd5bdff8 5480 unregister_netdevice_notifier(&cma_nb);
c1a0b23b 5481 ib_sa_unregister_client(&sa_client);
4be74b42 5482 unregister_pernet_subsys(&cma_pernet_operations);
e51060f0 5483 destroy_workqueue(cma_wq);
e51060f0
SH
5484}
5485
5486module_init(cma_init);
5487module_exit(cma_cleanup);