blob: 22ed97ef7da3ed05a66b0efac83347eec1794eeb [file] [log] [blame]
Sean Hefty75216632006-11-30 16:53:41 -08001/*
2 * Copyright (c) 2005-2006 Intel Corporation. All rights reserved.
3 *
4 * This software is available to you under a choice of one of two
5 * licenses. You may choose to be licensed under the terms of the GNU
6 * General Public License (GPL) Version 2, available from the file
7 * COPYING in the main directory of this source tree, or the
8 * OpenIB.org BSD license below:
9 *
10 * Redistribution and use in source and binary forms, with or
11 * without modification, are permitted provided that the following
12 * conditions are met:
13 *
14 * - Redistributions of source code must retain the above
15 * copyright notice, this list of conditions and the following
16 * disclaimer.
17 *
18 * - Redistributions in binary form must reproduce the above
19 * copyright notice, this list of conditions and the following
20 * disclaimer in the documentation and/or other materials
21 * provided with the distribution.
22 *
23 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
24 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
25 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
26 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
27 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
28 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
29 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
30 * SOFTWARE.
31 */
32
33#include <linux/completion.h>
Sean Hefty88314e42007-11-14 00:29:50 -080034#include <linux/file.h>
Sean Hefty75216632006-11-30 16:53:41 -080035#include <linux/mutex.h>
36#include <linux/poll.h>
Alexey Dobriyand43c36d2009-10-07 17:09:06 +040037#include <linux/sched.h>
Sean Hefty75216632006-11-30 16:53:41 -080038#include <linux/idr.h>
39#include <linux/in.h>
40#include <linux/in6.h>
41#include <linux/miscdevice.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090042#include <linux/slab.h>
Steve Wise97cb7e42010-08-13 20:56:34 +000043#include <linux/sysctl.h>
Paul Gortmakere4dd23d2011-05-27 15:35:46 -040044#include <linux/module.h>
Sean Hefty75216632006-11-30 16:53:41 -080045
46#include <rdma/rdma_user_cm.h>
47#include <rdma/ib_marshall.h>
48#include <rdma/rdma_cm.h>
Sean Heftya7ca1f02009-11-16 09:30:33 -080049#include <rdma/rdma_cm_ib.h>
Sean Heftyee7aed42013-05-29 10:09:25 -070050#include <rdma/ib_addr.h>
Sean Heftyedaa7a52013-05-29 10:09:29 -070051#include <rdma/ib.h>
Sean Hefty75216632006-11-30 16:53:41 -080052
53MODULE_AUTHOR("Sean Hefty");
54MODULE_DESCRIPTION("RDMA Userspace Connection Manager Access");
55MODULE_LICENSE("Dual BSD/GPL");
56
Steve Wise97cb7e42010-08-13 20:56:34 +000057static unsigned int max_backlog = 1024;
58
59static struct ctl_table_header *ucma_ctl_table_hdr;
60static ctl_table ucma_ctl_table[] = {
61 {
62 .procname = "max_backlog",
63 .data = &max_backlog,
64 .maxlen = sizeof max_backlog,
65 .mode = 0644,
66 .proc_handler = proc_dointvec,
67 },
68 { }
69};
70
Sean Hefty75216632006-11-30 16:53:41 -080071struct ucma_file {
72 struct mutex mut;
73 struct file *filp;
74 struct list_head ctx_list;
75 struct list_head event_list;
76 wait_queue_head_t poll_wait;
77};
78
79struct ucma_context {
80 int id;
81 struct completion comp;
82 atomic_t ref;
83 int events_reported;
84 int backlog;
85
86 struct ucma_file *file;
87 struct rdma_cm_id *cm_id;
88 u64 uid;
89
90 struct list_head list;
Sean Heftyc8f6a362007-02-15 17:00:18 -080091 struct list_head mc_list;
92};
93
94struct ucma_multicast {
95 struct ucma_context *ctx;
96 int id;
97 int events_reported;
98
99 u64 uid;
100 struct list_head list;
Roland Dreier3f446752008-08-04 11:02:14 -0700101 struct sockaddr_storage addr;
Sean Hefty75216632006-11-30 16:53:41 -0800102};
103
104struct ucma_event {
105 struct ucma_context *ctx;
Sean Heftyc8f6a362007-02-15 17:00:18 -0800106 struct ucma_multicast *mc;
Sean Hefty75216632006-11-30 16:53:41 -0800107 struct list_head list;
108 struct rdma_cm_id *cm_id;
109 struct rdma_ucm_event_resp resp;
110};
111
112static DEFINE_MUTEX(mut);
113static DEFINE_IDR(ctx_idr);
Sean Heftyc8f6a362007-02-15 17:00:18 -0800114static DEFINE_IDR(multicast_idr);
Sean Hefty75216632006-11-30 16:53:41 -0800115
116static inline struct ucma_context *_ucma_find_context(int id,
117 struct ucma_file *file)
118{
119 struct ucma_context *ctx;
120
121 ctx = idr_find(&ctx_idr, id);
122 if (!ctx)
123 ctx = ERR_PTR(-ENOENT);
124 else if (ctx->file != file)
125 ctx = ERR_PTR(-EINVAL);
126 return ctx;
127}
128
129static struct ucma_context *ucma_get_ctx(struct ucma_file *file, int id)
130{
131 struct ucma_context *ctx;
132
133 mutex_lock(&mut);
134 ctx = _ucma_find_context(id, file);
135 if (!IS_ERR(ctx))
136 atomic_inc(&ctx->ref);
137 mutex_unlock(&mut);
138 return ctx;
139}
140
141static void ucma_put_ctx(struct ucma_context *ctx)
142{
143 if (atomic_dec_and_test(&ctx->ref))
144 complete(&ctx->comp);
145}
146
147static struct ucma_context *ucma_alloc_ctx(struct ucma_file *file)
148{
149 struct ucma_context *ctx;
Sean Hefty75216632006-11-30 16:53:41 -0800150
151 ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
152 if (!ctx)
153 return NULL;
154
155 atomic_set(&ctx->ref, 1);
156 init_completion(&ctx->comp);
Sean Heftyc8f6a362007-02-15 17:00:18 -0800157 INIT_LIST_HEAD(&ctx->mc_list);
Sean Hefty75216632006-11-30 16:53:41 -0800158 ctx->file = file;
159
Tejun Heo3b069c52013-02-27 17:04:16 -0800160 mutex_lock(&mut);
161 ctx->id = idr_alloc(&ctx_idr, ctx, 0, 0, GFP_KERNEL);
162 mutex_unlock(&mut);
163 if (ctx->id < 0)
Sean Hefty75216632006-11-30 16:53:41 -0800164 goto error;
165
166 list_add_tail(&ctx->list, &file->ctx_list);
167 return ctx;
168
169error:
170 kfree(ctx);
171 return NULL;
172}
173
Sean Heftyc8f6a362007-02-15 17:00:18 -0800174static struct ucma_multicast* ucma_alloc_multicast(struct ucma_context *ctx)
175{
176 struct ucma_multicast *mc;
Sean Heftyc8f6a362007-02-15 17:00:18 -0800177
178 mc = kzalloc(sizeof(*mc), GFP_KERNEL);
179 if (!mc)
180 return NULL;
181
Tejun Heo3b069c52013-02-27 17:04:16 -0800182 mutex_lock(&mut);
183 mc->id = idr_alloc(&multicast_idr, mc, 0, 0, GFP_KERNEL);
184 mutex_unlock(&mut);
185 if (mc->id < 0)
Sean Heftyc8f6a362007-02-15 17:00:18 -0800186 goto error;
187
188 mc->ctx = ctx;
189 list_add_tail(&mc->list, &ctx->mc_list);
190 return mc;
191
192error:
193 kfree(mc);
194 return NULL;
195}
196
Sean Hefty75216632006-11-30 16:53:41 -0800197static void ucma_copy_conn_event(struct rdma_ucm_conn_param *dst,
198 struct rdma_conn_param *src)
199{
200 if (src->private_data_len)
201 memcpy(dst->private_data, src->private_data,
202 src->private_data_len);
203 dst->private_data_len = src->private_data_len;
204 dst->responder_resources =src->responder_resources;
205 dst->initiator_depth = src->initiator_depth;
206 dst->flow_control = src->flow_control;
207 dst->retry_count = src->retry_count;
208 dst->rnr_retry_count = src->rnr_retry_count;
209 dst->srq = src->srq;
210 dst->qp_num = src->qp_num;
211}
212
213static void ucma_copy_ud_event(struct rdma_ucm_ud_param *dst,
214 struct rdma_ud_param *src)
215{
216 if (src->private_data_len)
217 memcpy(dst->private_data, src->private_data,
218 src->private_data_len);
219 dst->private_data_len = src->private_data_len;
220 ib_copy_ah_attr_to_user(&dst->ah_attr, &src->ah_attr);
221 dst->qp_num = src->qp_num;
222 dst->qkey = src->qkey;
223}
224
225static void ucma_set_event_context(struct ucma_context *ctx,
226 struct rdma_cm_event *event,
227 struct ucma_event *uevent)
228{
229 uevent->ctx = ctx;
Sean Heftyc8f6a362007-02-15 17:00:18 -0800230 switch (event->event) {
231 case RDMA_CM_EVENT_MULTICAST_JOIN:
232 case RDMA_CM_EVENT_MULTICAST_ERROR:
233 uevent->mc = (struct ucma_multicast *)
234 event->param.ud.private_data;
235 uevent->resp.uid = uevent->mc->uid;
236 uevent->resp.id = uevent->mc->id;
237 break;
238 default:
239 uevent->resp.uid = ctx->uid;
240 uevent->resp.id = ctx->id;
241 break;
242 }
Sean Hefty75216632006-11-30 16:53:41 -0800243}
244
245static int ucma_event_handler(struct rdma_cm_id *cm_id,
246 struct rdma_cm_event *event)
247{
248 struct ucma_event *uevent;
249 struct ucma_context *ctx = cm_id->context;
250 int ret = 0;
251
252 uevent = kzalloc(sizeof(*uevent), GFP_KERNEL);
253 if (!uevent)
254 return event->event == RDMA_CM_EVENT_CONNECT_REQUEST;
255
Tatyana Nikolova418edaa2012-08-03 23:59:41 +0000256 mutex_lock(&ctx->file->mut);
Sean Hefty75216632006-11-30 16:53:41 -0800257 uevent->cm_id = cm_id;
258 ucma_set_event_context(ctx, event, uevent);
259 uevent->resp.event = event->event;
260 uevent->resp.status = event->status;
Sean Hefty638ef7a2011-06-14 16:31:53 -0700261 if (cm_id->qp_type == IB_QPT_UD)
Sean Hefty75216632006-11-30 16:53:41 -0800262 ucma_copy_ud_event(&uevent->resp.param.ud, &event->param.ud);
263 else
264 ucma_copy_conn_event(&uevent->resp.param.conn,
265 &event->param.conn);
266
Sean Hefty75216632006-11-30 16:53:41 -0800267 if (event->event == RDMA_CM_EVENT_CONNECT_REQUEST) {
268 if (!ctx->backlog) {
Sean Hefty34928562007-03-06 11:58:32 -0800269 ret = -ENOMEM;
Sean Hefty30a5ec92006-12-14 11:22:19 -0800270 kfree(uevent);
Sean Hefty75216632006-11-30 16:53:41 -0800271 goto out;
272 }
273 ctx->backlog--;
Sean Hefty0cefcf02007-01-05 12:35:15 -0800274 } else if (!ctx->uid) {
275 /*
276 * We ignore events for new connections until userspace has set
277 * their context. This can only happen if an error occurs on a
278 * new connection before the user accepts it. This is okay,
279 * since the accept will just fail later.
280 */
281 kfree(uevent);
282 goto out;
Sean Hefty75216632006-11-30 16:53:41 -0800283 }
Sean Hefty0cefcf02007-01-05 12:35:15 -0800284
Sean Hefty75216632006-11-30 16:53:41 -0800285 list_add_tail(&uevent->list, &ctx->file->event_list);
286 wake_up_interruptible(&ctx->file->poll_wait);
287out:
288 mutex_unlock(&ctx->file->mut);
289 return ret;
290}
291
292static ssize_t ucma_get_event(struct ucma_file *file, const char __user *inbuf,
293 int in_len, int out_len)
294{
295 struct ucma_context *ctx;
296 struct rdma_ucm_get_event cmd;
297 struct ucma_event *uevent;
298 int ret = 0;
Sean Hefty75216632006-11-30 16:53:41 -0800299
300 if (out_len < sizeof uevent->resp)
301 return -ENOSPC;
302
303 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
304 return -EFAULT;
305
306 mutex_lock(&file->mut);
307 while (list_empty(&file->event_list)) {
Sean Hefty75216632006-11-30 16:53:41 -0800308 mutex_unlock(&file->mut);
Sean Hefty75216632006-11-30 16:53:41 -0800309
Sean Heftyd92f7642007-04-05 10:49:51 -0700310 if (file->filp->f_flags & O_NONBLOCK)
311 return -EAGAIN;
312
313 if (wait_event_interruptible(file->poll_wait,
314 !list_empty(&file->event_list)))
315 return -ERESTARTSYS;
316
317 mutex_lock(&file->mut);
318 }
Sean Hefty75216632006-11-30 16:53:41 -0800319
320 uevent = list_entry(file->event_list.next, struct ucma_event, list);
321
322 if (uevent->resp.event == RDMA_CM_EVENT_CONNECT_REQUEST) {
323 ctx = ucma_alloc_ctx(file);
324 if (!ctx) {
325 ret = -ENOMEM;
326 goto done;
327 }
328 uevent->ctx->backlog++;
329 ctx->cm_id = uevent->cm_id;
330 ctx->cm_id->context = ctx;
331 uevent->resp.id = ctx->id;
332 }
333
334 if (copy_to_user((void __user *)(unsigned long)cmd.response,
335 &uevent->resp, sizeof uevent->resp)) {
336 ret = -EFAULT;
337 goto done;
338 }
339
340 list_del(&uevent->list);
341 uevent->ctx->events_reported++;
Sean Heftyc8f6a362007-02-15 17:00:18 -0800342 if (uevent->mc)
343 uevent->mc->events_reported++;
Sean Hefty75216632006-11-30 16:53:41 -0800344 kfree(uevent);
345done:
346 mutex_unlock(&file->mut);
347 return ret;
348}
349
Sean Heftyb26f9b92010-04-01 17:08:41 +0000350static int ucma_get_qp_type(struct rdma_ucm_create_id *cmd, enum ib_qp_type *qp_type)
351{
352 switch (cmd->ps) {
353 case RDMA_PS_TCP:
354 *qp_type = IB_QPT_RC;
355 return 0;
356 case RDMA_PS_UDP:
357 case RDMA_PS_IPOIB:
358 *qp_type = IB_QPT_UD;
359 return 0;
Sean Hefty638ef7a2011-06-14 16:31:53 -0700360 case RDMA_PS_IB:
361 *qp_type = cmd->qp_type;
362 return 0;
Sean Heftyb26f9b92010-04-01 17:08:41 +0000363 default:
364 return -EINVAL;
365 }
366}
367
368static ssize_t ucma_create_id(struct ucma_file *file, const char __user *inbuf,
369 int in_len, int out_len)
Sean Hefty75216632006-11-30 16:53:41 -0800370{
371 struct rdma_ucm_create_id cmd;
372 struct rdma_ucm_create_id_resp resp;
373 struct ucma_context *ctx;
Sean Heftyb26f9b92010-04-01 17:08:41 +0000374 enum ib_qp_type qp_type;
Sean Hefty75216632006-11-30 16:53:41 -0800375 int ret;
376
377 if (out_len < sizeof(resp))
378 return -ENOSPC;
379
380 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
381 return -EFAULT;
382
Sean Heftyb26f9b92010-04-01 17:08:41 +0000383 ret = ucma_get_qp_type(&cmd, &qp_type);
384 if (ret)
385 return ret;
386
Sean Hefty75216632006-11-30 16:53:41 -0800387 mutex_lock(&file->mut);
388 ctx = ucma_alloc_ctx(file);
389 mutex_unlock(&file->mut);
390 if (!ctx)
391 return -ENOMEM;
392
393 ctx->uid = cmd.uid;
Sean Heftyb26f9b92010-04-01 17:08:41 +0000394 ctx->cm_id = rdma_create_id(ucma_event_handler, ctx, cmd.ps, qp_type);
Sean Hefty75216632006-11-30 16:53:41 -0800395 if (IS_ERR(ctx->cm_id)) {
396 ret = PTR_ERR(ctx->cm_id);
397 goto err1;
398 }
399
400 resp.id = ctx->id;
401 if (copy_to_user((void __user *)(unsigned long)cmd.response,
402 &resp, sizeof(resp))) {
403 ret = -EFAULT;
404 goto err2;
405 }
406 return 0;
407
408err2:
409 rdma_destroy_id(ctx->cm_id);
410err1:
411 mutex_lock(&mut);
412 idr_remove(&ctx_idr, ctx->id);
413 mutex_unlock(&mut);
414 kfree(ctx);
415 return ret;
416}
417
Sean Heftyc8f6a362007-02-15 17:00:18 -0800418static void ucma_cleanup_multicast(struct ucma_context *ctx)
419{
420 struct ucma_multicast *mc, *tmp;
421
422 mutex_lock(&mut);
423 list_for_each_entry_safe(mc, tmp, &ctx->mc_list, list) {
424 list_del(&mc->list);
425 idr_remove(&multicast_idr, mc->id);
426 kfree(mc);
427 }
428 mutex_unlock(&mut);
429}
430
Sean Heftyc8f6a362007-02-15 17:00:18 -0800431static void ucma_cleanup_mc_events(struct ucma_multicast *mc)
432{
433 struct ucma_event *uevent, *tmp;
434
435 list_for_each_entry_safe(uevent, tmp, &mc->ctx->file->event_list, list) {
436 if (uevent->mc != mc)
437 continue;
438
439 list_del(&uevent->list);
440 kfree(uevent);
441 }
442}
443
Hefty, Sean186834b2012-03-02 00:01:19 +0000444/*
445 * We cannot hold file->mut when calling rdma_destroy_id() or we can
446 * deadlock. We also acquire file->mut in ucma_event_handler(), and
447 * rdma_destroy_id() will wait until all callbacks have completed.
448 */
Sean Hefty75216632006-11-30 16:53:41 -0800449static int ucma_free_ctx(struct ucma_context *ctx)
450{
451 int events_reported;
Hefty, Sean186834b2012-03-02 00:01:19 +0000452 struct ucma_event *uevent, *tmp;
453 LIST_HEAD(list);
Sean Hefty75216632006-11-30 16:53:41 -0800454
455 /* No new events will be generated after destroying the id. */
456 rdma_destroy_id(ctx->cm_id);
457
Sean Heftyc8f6a362007-02-15 17:00:18 -0800458 ucma_cleanup_multicast(ctx);
459
Sean Hefty75216632006-11-30 16:53:41 -0800460 /* Cleanup events not yet reported to the user. */
461 mutex_lock(&ctx->file->mut);
Hefty, Sean186834b2012-03-02 00:01:19 +0000462 list_for_each_entry_safe(uevent, tmp, &ctx->file->event_list, list) {
463 if (uevent->ctx == ctx)
464 list_move_tail(&uevent->list, &list);
465 }
Sean Hefty75216632006-11-30 16:53:41 -0800466 list_del(&ctx->list);
467 mutex_unlock(&ctx->file->mut);
468
Hefty, Sean186834b2012-03-02 00:01:19 +0000469 list_for_each_entry_safe(uevent, tmp, &list, list) {
470 list_del(&uevent->list);
471 if (uevent->resp.event == RDMA_CM_EVENT_CONNECT_REQUEST)
472 rdma_destroy_id(uevent->cm_id);
473 kfree(uevent);
474 }
475
Sean Hefty75216632006-11-30 16:53:41 -0800476 events_reported = ctx->events_reported;
477 kfree(ctx);
478 return events_reported;
479}
480
481static ssize_t ucma_destroy_id(struct ucma_file *file, const char __user *inbuf,
482 int in_len, int out_len)
483{
484 struct rdma_ucm_destroy_id cmd;
485 struct rdma_ucm_destroy_id_resp resp;
486 struct ucma_context *ctx;
487 int ret = 0;
488
489 if (out_len < sizeof(resp))
490 return -ENOSPC;
491
492 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
493 return -EFAULT;
494
495 mutex_lock(&mut);
496 ctx = _ucma_find_context(cmd.id, file);
497 if (!IS_ERR(ctx))
498 idr_remove(&ctx_idr, ctx->id);
499 mutex_unlock(&mut);
500
501 if (IS_ERR(ctx))
502 return PTR_ERR(ctx);
503
504 ucma_put_ctx(ctx);
505 wait_for_completion(&ctx->comp);
506 resp.events_reported = ucma_free_ctx(ctx);
507
508 if (copy_to_user((void __user *)(unsigned long)cmd.response,
509 &resp, sizeof(resp)))
510 ret = -EFAULT;
511
512 return ret;
513}
514
Sean Hefty05ad9452013-05-29 10:09:30 -0700515static ssize_t ucma_bind_ip(struct ucma_file *file, const char __user *inbuf,
Sean Hefty75216632006-11-30 16:53:41 -0800516 int in_len, int out_len)
517{
Sean Hefty05ad9452013-05-29 10:09:30 -0700518 struct rdma_ucm_bind_ip cmd;
Sean Hefty75216632006-11-30 16:53:41 -0800519 struct ucma_context *ctx;
520 int ret;
521
522 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
523 return -EFAULT;
524
525 ctx = ucma_get_ctx(file, cmd.id);
526 if (IS_ERR(ctx))
527 return PTR_ERR(ctx);
528
529 ret = rdma_bind_addr(ctx->cm_id, (struct sockaddr *) &cmd.addr);
530 ucma_put_ctx(ctx);
531 return ret;
532}
533
Sean Heftyeebe4c32013-05-29 10:09:31 -0700534static ssize_t ucma_bind(struct ucma_file *file, const char __user *inbuf,
535 int in_len, int out_len)
536{
537 struct rdma_ucm_bind cmd;
538 struct sockaddr *addr;
539 struct ucma_context *ctx;
540 int ret;
541
542 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
543 return -EFAULT;
544
545 addr = (struct sockaddr *) &cmd.addr;
546 if (cmd.reserved || !cmd.addr_size || (cmd.addr_size != rdma_addr_size(addr)))
547 return -EINVAL;
548
549 ctx = ucma_get_ctx(file, cmd.id);
550 if (IS_ERR(ctx))
551 return PTR_ERR(ctx);
552
553 ret = rdma_bind_addr(ctx->cm_id, addr);
554 ucma_put_ctx(ctx);
555 return ret;
556}
557
Sean Hefty05ad9452013-05-29 10:09:30 -0700558static ssize_t ucma_resolve_ip(struct ucma_file *file,
559 const char __user *inbuf,
560 int in_len, int out_len)
Sean Hefty75216632006-11-30 16:53:41 -0800561{
Sean Hefty05ad9452013-05-29 10:09:30 -0700562 struct rdma_ucm_resolve_ip cmd;
Sean Hefty75216632006-11-30 16:53:41 -0800563 struct ucma_context *ctx;
564 int ret;
565
566 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
567 return -EFAULT;
568
569 ctx = ucma_get_ctx(file, cmd.id);
570 if (IS_ERR(ctx))
571 return PTR_ERR(ctx);
572
573 ret = rdma_resolve_addr(ctx->cm_id, (struct sockaddr *) &cmd.src_addr,
574 (struct sockaddr *) &cmd.dst_addr,
575 cmd.timeout_ms);
576 ucma_put_ctx(ctx);
577 return ret;
578}
579
580static ssize_t ucma_resolve_route(struct ucma_file *file,
581 const char __user *inbuf,
582 int in_len, int out_len)
583{
584 struct rdma_ucm_resolve_route cmd;
585 struct ucma_context *ctx;
586 int ret;
587
588 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
589 return -EFAULT;
590
591 ctx = ucma_get_ctx(file, cmd.id);
592 if (IS_ERR(ctx))
593 return PTR_ERR(ctx);
594
595 ret = rdma_resolve_route(ctx->cm_id, cmd.timeout_ms);
596 ucma_put_ctx(ctx);
597 return ret;
598}
599
600static void ucma_copy_ib_route(struct rdma_ucm_query_route_resp *resp,
601 struct rdma_route *route)
602{
603 struct rdma_dev_addr *dev_addr;
604
605 resp->num_paths = route->num_paths;
606 switch (route->num_paths) {
607 case 0:
608 dev_addr = &route->addr.dev_addr;
Sean Hefty6f8372b2009-11-19 13:26:06 -0800609 rdma_addr_get_dgid(dev_addr,
610 (union ib_gid *) &resp->ib_route[0].dgid);
611 rdma_addr_get_sgid(dev_addr,
612 (union ib_gid *) &resp->ib_route[0].sgid);
Sean Hefty75216632006-11-30 16:53:41 -0800613 resp->ib_route[0].pkey = cpu_to_be16(ib_addr_get_pkey(dev_addr));
614 break;
615 case 2:
616 ib_copy_path_rec_to_user(&resp->ib_route[1],
617 &route->path_rec[1]);
618 /* fall through */
619 case 1:
620 ib_copy_path_rec_to_user(&resp->ib_route[0],
621 &route->path_rec[0]);
622 break;
623 default:
624 break;
625 }
626}
627
Eli Cohen3c86aa72010-10-13 21:26:51 +0200628static void ucma_copy_iboe_route(struct rdma_ucm_query_route_resp *resp,
629 struct rdma_route *route)
630{
631 struct rdma_dev_addr *dev_addr;
Eli Cohenaf7bd462010-08-26 17:18:59 +0300632 struct net_device *dev;
633 u16 vid = 0;
Eli Cohen3c86aa72010-10-13 21:26:51 +0200634
635 resp->num_paths = route->num_paths;
636 switch (route->num_paths) {
637 case 0:
638 dev_addr = &route->addr.dev_addr;
Eli Cohenaf7bd462010-08-26 17:18:59 +0300639 dev = dev_get_by_index(&init_net, dev_addr->bound_dev_if);
640 if (dev) {
641 vid = rdma_vlan_dev_vlan_id(dev);
642 dev_put(dev);
643 }
644
645 iboe_mac_vlan_to_ll((union ib_gid *) &resp->ib_route[0].dgid,
646 dev_addr->dst_dev_addr, vid);
Eli Cohen3c86aa72010-10-13 21:26:51 +0200647 iboe_addr_get_sgid(dev_addr,
648 (union ib_gid *) &resp->ib_route[0].sgid);
649 resp->ib_route[0].pkey = cpu_to_be16(0xffff);
650 break;
651 case 2:
652 ib_copy_path_rec_to_user(&resp->ib_route[1],
653 &route->path_rec[1]);
654 /* fall through */
655 case 1:
656 ib_copy_path_rec_to_user(&resp->ib_route[0],
657 &route->path_rec[0]);
658 break;
659 default:
660 break;
661 }
662}
663
Steve Wisee86f8b02011-01-21 03:40:46 +0000664static void ucma_copy_iw_route(struct rdma_ucm_query_route_resp *resp,
665 struct rdma_route *route)
666{
667 struct rdma_dev_addr *dev_addr;
668
669 dev_addr = &route->addr.dev_addr;
670 rdma_addr_get_dgid(dev_addr, (union ib_gid *) &resp->ib_route[0].dgid);
671 rdma_addr_get_sgid(dev_addr, (union ib_gid *) &resp->ib_route[0].sgid);
672}
673
Sean Hefty75216632006-11-30 16:53:41 -0800674static ssize_t ucma_query_route(struct ucma_file *file,
675 const char __user *inbuf,
676 int in_len, int out_len)
677{
Sean Heftyee7aed42013-05-29 10:09:25 -0700678 struct rdma_ucm_query cmd;
Sean Hefty75216632006-11-30 16:53:41 -0800679 struct rdma_ucm_query_route_resp resp;
680 struct ucma_context *ctx;
681 struct sockaddr *addr;
682 int ret = 0;
683
684 if (out_len < sizeof(resp))
685 return -ENOSPC;
686
687 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
688 return -EFAULT;
689
690 ctx = ucma_get_ctx(file, cmd.id);
691 if (IS_ERR(ctx))
692 return PTR_ERR(ctx);
693
694 memset(&resp, 0, sizeof resp);
Roland Dreier3f446752008-08-04 11:02:14 -0700695 addr = (struct sockaddr *) &ctx->cm_id->route.addr.src_addr;
Sean Hefty75216632006-11-30 16:53:41 -0800696 memcpy(&resp.src_addr, addr, addr->sa_family == AF_INET ?
697 sizeof(struct sockaddr_in) :
698 sizeof(struct sockaddr_in6));
Roland Dreier3f446752008-08-04 11:02:14 -0700699 addr = (struct sockaddr *) &ctx->cm_id->route.addr.dst_addr;
Sean Hefty75216632006-11-30 16:53:41 -0800700 memcpy(&resp.dst_addr, addr, addr->sa_family == AF_INET ?
701 sizeof(struct sockaddr_in) :
702 sizeof(struct sockaddr_in6));
703 if (!ctx->cm_id->device)
704 goto out;
705
Roland Dreier9cda7792008-04-16 21:01:07 -0700706 resp.node_guid = (__force __u64) ctx->cm_id->device->node_guid;
Sean Hefty75216632006-11-30 16:53:41 -0800707 resp.port_num = ctx->cm_id->port_num;
Steve Wisee86f8b02011-01-21 03:40:46 +0000708 switch (rdma_node_get_transport(ctx->cm_id->device->node_type)) {
709 case RDMA_TRANSPORT_IB:
710 switch (rdma_port_get_link_layer(ctx->cm_id->device,
711 ctx->cm_id->port_num)) {
Eli Cohen3c86aa72010-10-13 21:26:51 +0200712 case IB_LINK_LAYER_INFINIBAND:
713 ucma_copy_ib_route(&resp, &ctx->cm_id->route);
714 break;
715 case IB_LINK_LAYER_ETHERNET:
716 ucma_copy_iboe_route(&resp, &ctx->cm_id->route);
717 break;
718 default:
719 break;
720 }
Steve Wisee86f8b02011-01-21 03:40:46 +0000721 break;
722 case RDMA_TRANSPORT_IWARP:
723 ucma_copy_iw_route(&resp, &ctx->cm_id->route);
724 break;
725 default:
726 break;
Sean Hefty75216632006-11-30 16:53:41 -0800727 }
728
729out:
730 if (copy_to_user((void __user *)(unsigned long)cmd.response,
731 &resp, sizeof(resp)))
732 ret = -EFAULT;
733
734 ucma_put_ctx(ctx);
735 return ret;
736}
737
Sean Heftyee7aed42013-05-29 10:09:25 -0700738static void ucma_query_device_addr(struct rdma_cm_id *cm_id,
739 struct rdma_ucm_query_addr_resp *resp)
740{
741 if (!cm_id->device)
742 return;
743
744 resp->node_guid = (__force __u64) cm_id->device->node_guid;
745 resp->port_num = cm_id->port_num;
746 resp->pkey = (__force __u16) cpu_to_be16(
747 ib_addr_get_pkey(&cm_id->route.addr.dev_addr));
748}
749
750static ssize_t ucma_query_addr(struct ucma_context *ctx,
751 void __user *response, int out_len)
752{
753 struct rdma_ucm_query_addr_resp resp;
754 struct sockaddr *addr;
755 int ret = 0;
756
757 if (out_len < sizeof(resp))
758 return -ENOSPC;
759
760 memset(&resp, 0, sizeof resp);
761
762 addr = (struct sockaddr *) &ctx->cm_id->route.addr.src_addr;
763 resp.src_size = rdma_addr_size(addr);
764 memcpy(&resp.src_addr, addr, resp.src_size);
765
766 addr = (struct sockaddr *) &ctx->cm_id->route.addr.dst_addr;
767 resp.dst_size = rdma_addr_size(addr);
768 memcpy(&resp.dst_addr, addr, resp.dst_size);
769
770 ucma_query_device_addr(ctx->cm_id, &resp);
771
772 if (copy_to_user(response, &resp, sizeof(resp)))
773 ret = -EFAULT;
774
775 return ret;
776}
777
Sean Heftyac53b262013-05-29 10:09:27 -0700778static ssize_t ucma_query_path(struct ucma_context *ctx,
779 void __user *response, int out_len)
780{
781 struct rdma_ucm_query_path_resp *resp;
782 int i, ret = 0;
783
784 if (out_len < sizeof(*resp))
785 return -ENOSPC;
786
787 resp = kzalloc(out_len, GFP_KERNEL);
788 if (!resp)
789 return -ENOMEM;
790
791 resp->num_paths = ctx->cm_id->route.num_paths;
792 for (i = 0, out_len -= sizeof(*resp);
793 i < resp->num_paths && out_len > sizeof(struct ib_path_rec_data);
794 i++, out_len -= sizeof(struct ib_path_rec_data)) {
795
796 resp->path_data[i].flags = IB_PATH_GMP | IB_PATH_PRIMARY |
797 IB_PATH_BIDIRECTIONAL;
798 ib_sa_pack_path(&ctx->cm_id->route.path_rec[i],
799 &resp->path_data[i].path_rec);
800 }
801
802 if (copy_to_user(response, resp,
803 sizeof(*resp) + (i * sizeof(struct ib_path_rec_data))))
804 ret = -EFAULT;
805
806 kfree(resp);
807 return ret;
808}
809
Sean Heftyedaa7a52013-05-29 10:09:29 -0700810static ssize_t ucma_query_gid(struct ucma_context *ctx,
811 void __user *response, int out_len)
812{
813 struct rdma_ucm_query_addr_resp resp;
814 struct sockaddr_ib *addr;
815 int ret = 0;
816
817 if (out_len < sizeof(resp))
818 return -ENOSPC;
819
820 memset(&resp, 0, sizeof resp);
821
822 ucma_query_device_addr(ctx->cm_id, &resp);
823
824 addr = (struct sockaddr_ib *) &resp.src_addr;
825 resp.src_size = sizeof(*addr);
826 if (ctx->cm_id->route.addr.src_addr.ss_family == AF_IB) {
827 memcpy(addr, &ctx->cm_id->route.addr.src_addr, resp.src_size);
828 } else {
829 addr->sib_family = AF_IB;
830 addr->sib_pkey = (__force __be16) resp.pkey;
831 rdma_addr_get_sgid(&ctx->cm_id->route.addr.dev_addr,
832 (union ib_gid *) &addr->sib_addr);
833 addr->sib_sid = rdma_get_service_id(ctx->cm_id, (struct sockaddr *)
834 &ctx->cm_id->route.addr.src_addr);
835 }
836
837 addr = (struct sockaddr_ib *) &resp.dst_addr;
838 resp.dst_size = sizeof(*addr);
839 if (ctx->cm_id->route.addr.dst_addr.ss_family == AF_IB) {
840 memcpy(addr, &ctx->cm_id->route.addr.dst_addr, resp.dst_size);
841 } else {
842 addr->sib_family = AF_IB;
843 addr->sib_pkey = (__force __be16) resp.pkey;
844 rdma_addr_get_dgid(&ctx->cm_id->route.addr.dev_addr,
845 (union ib_gid *) &addr->sib_addr);
846 addr->sib_sid = rdma_get_service_id(ctx->cm_id, (struct sockaddr *)
847 &ctx->cm_id->route.addr.dst_addr);
848 }
849
850 if (copy_to_user(response, &resp, sizeof(resp)))
851 ret = -EFAULT;
852
853 return ret;
854}
855
Sean Heftyee7aed42013-05-29 10:09:25 -0700856static ssize_t ucma_query(struct ucma_file *file,
857 const char __user *inbuf,
858 int in_len, int out_len)
859{
860 struct rdma_ucm_query cmd;
861 struct ucma_context *ctx;
862 void __user *response;
863 int ret;
864
865 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
866 return -EFAULT;
867
868 response = (void __user *)(unsigned long) cmd.response;
869 ctx = ucma_get_ctx(file, cmd.id);
870 if (IS_ERR(ctx))
871 return PTR_ERR(ctx);
872
873 switch (cmd.option) {
874 case RDMA_USER_CM_QUERY_ADDR:
875 ret = ucma_query_addr(ctx, response, out_len);
876 break;
Sean Heftyac53b262013-05-29 10:09:27 -0700877 case RDMA_USER_CM_QUERY_PATH:
878 ret = ucma_query_path(ctx, response, out_len);
879 break;
Sean Heftyedaa7a52013-05-29 10:09:29 -0700880 case RDMA_USER_CM_QUERY_GID:
881 ret = ucma_query_gid(ctx, response, out_len);
882 break;
Sean Heftyee7aed42013-05-29 10:09:25 -0700883 default:
884 ret = -ENOSYS;
885 break;
886 }
887
888 ucma_put_ctx(ctx);
889 return ret;
890}
891
Sean Hefty5c438132013-05-29 10:09:23 -0700892static void ucma_copy_conn_param(struct rdma_cm_id *id,
893 struct rdma_conn_param *dst,
Sean Hefty75216632006-11-30 16:53:41 -0800894 struct rdma_ucm_conn_param *src)
895{
896 dst->private_data = src->private_data;
897 dst->private_data_len = src->private_data_len;
898 dst->responder_resources =src->responder_resources;
899 dst->initiator_depth = src->initiator_depth;
900 dst->flow_control = src->flow_control;
901 dst->retry_count = src->retry_count;
902 dst->rnr_retry_count = src->rnr_retry_count;
903 dst->srq = src->srq;
904 dst->qp_num = src->qp_num;
Sean Hefty5c438132013-05-29 10:09:23 -0700905 dst->qkey = (id->route.addr.src_addr.ss_family == AF_IB) ? src->qkey : 0;
Sean Hefty75216632006-11-30 16:53:41 -0800906}
907
908static ssize_t ucma_connect(struct ucma_file *file, const char __user *inbuf,
909 int in_len, int out_len)
910{
911 struct rdma_ucm_connect cmd;
912 struct rdma_conn_param conn_param;
913 struct ucma_context *ctx;
914 int ret;
915
916 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
917 return -EFAULT;
918
919 if (!cmd.conn_param.valid)
920 return -EINVAL;
921
922 ctx = ucma_get_ctx(file, cmd.id);
923 if (IS_ERR(ctx))
924 return PTR_ERR(ctx);
925
Sean Hefty5c438132013-05-29 10:09:23 -0700926 ucma_copy_conn_param(ctx->cm_id, &conn_param, &cmd.conn_param);
Sean Hefty75216632006-11-30 16:53:41 -0800927 ret = rdma_connect(ctx->cm_id, &conn_param);
928 ucma_put_ctx(ctx);
929 return ret;
930}
931
932static ssize_t ucma_listen(struct ucma_file *file, const char __user *inbuf,
933 int in_len, int out_len)
934{
935 struct rdma_ucm_listen cmd;
936 struct ucma_context *ctx;
937 int ret;
938
939 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
940 return -EFAULT;
941
942 ctx = ucma_get_ctx(file, cmd.id);
943 if (IS_ERR(ctx))
944 return PTR_ERR(ctx);
945
Steve Wise97cb7e42010-08-13 20:56:34 +0000946 ctx->backlog = cmd.backlog > 0 && cmd.backlog < max_backlog ?
947 cmd.backlog : max_backlog;
Sean Hefty75216632006-11-30 16:53:41 -0800948 ret = rdma_listen(ctx->cm_id, ctx->backlog);
949 ucma_put_ctx(ctx);
950 return ret;
951}
952
953static ssize_t ucma_accept(struct ucma_file *file, const char __user *inbuf,
954 int in_len, int out_len)
955{
956 struct rdma_ucm_accept cmd;
957 struct rdma_conn_param conn_param;
958 struct ucma_context *ctx;
959 int ret;
960
961 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
962 return -EFAULT;
963
964 ctx = ucma_get_ctx(file, cmd.id);
965 if (IS_ERR(ctx))
966 return PTR_ERR(ctx);
967
968 if (cmd.conn_param.valid) {
Sean Hefty5c438132013-05-29 10:09:23 -0700969 ucma_copy_conn_param(ctx->cm_id, &conn_param, &cmd.conn_param);
Sean Hefty9ced69c2012-01-10 23:53:41 +0000970 mutex_lock(&file->mut);
Sean Hefty75216632006-11-30 16:53:41 -0800971 ret = rdma_accept(ctx->cm_id, &conn_param);
Sean Hefty9ced69c2012-01-10 23:53:41 +0000972 if (!ret)
973 ctx->uid = cmd.uid;
974 mutex_unlock(&file->mut);
Sean Hefty75216632006-11-30 16:53:41 -0800975 } else
976 ret = rdma_accept(ctx->cm_id, NULL);
977
978 ucma_put_ctx(ctx);
979 return ret;
980}
981
982static ssize_t ucma_reject(struct ucma_file *file, const char __user *inbuf,
983 int in_len, int out_len)
984{
985 struct rdma_ucm_reject cmd;
986 struct ucma_context *ctx;
987 int ret;
988
989 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
990 return -EFAULT;
991
992 ctx = ucma_get_ctx(file, cmd.id);
993 if (IS_ERR(ctx))
994 return PTR_ERR(ctx);
995
996 ret = rdma_reject(ctx->cm_id, cmd.private_data, cmd.private_data_len);
997 ucma_put_ctx(ctx);
998 return ret;
999}
1000
1001static ssize_t ucma_disconnect(struct ucma_file *file, const char __user *inbuf,
1002 int in_len, int out_len)
1003{
1004 struct rdma_ucm_disconnect cmd;
1005 struct ucma_context *ctx;
1006 int ret;
1007
1008 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
1009 return -EFAULT;
1010
1011 ctx = ucma_get_ctx(file, cmd.id);
1012 if (IS_ERR(ctx))
1013 return PTR_ERR(ctx);
1014
1015 ret = rdma_disconnect(ctx->cm_id);
1016 ucma_put_ctx(ctx);
1017 return ret;
1018}
1019
1020static ssize_t ucma_init_qp_attr(struct ucma_file *file,
1021 const char __user *inbuf,
1022 int in_len, int out_len)
1023{
1024 struct rdma_ucm_init_qp_attr cmd;
1025 struct ib_uverbs_qp_attr resp;
1026 struct ucma_context *ctx;
1027 struct ib_qp_attr qp_attr;
1028 int ret;
1029
1030 if (out_len < sizeof(resp))
1031 return -ENOSPC;
1032
1033 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
1034 return -EFAULT;
1035
1036 ctx = ucma_get_ctx(file, cmd.id);
1037 if (IS_ERR(ctx))
1038 return PTR_ERR(ctx);
1039
1040 resp.qp_attr_mask = 0;
1041 memset(&qp_attr, 0, sizeof qp_attr);
1042 qp_attr.qp_state = cmd.qp_state;
1043 ret = rdma_init_qp_attr(ctx->cm_id, &qp_attr, &resp.qp_attr_mask);
1044 if (ret)
1045 goto out;
1046
1047 ib_copy_qp_attr_to_user(&resp, &qp_attr);
1048 if (copy_to_user((void __user *)(unsigned long)cmd.response,
1049 &resp, sizeof(resp)))
1050 ret = -EFAULT;
1051
1052out:
1053 ucma_put_ctx(ctx);
1054 return ret;
1055}
1056
Sean Hefty7ce86402007-08-08 15:51:13 -07001057static int ucma_set_option_id(struct ucma_context *ctx, int optname,
1058 void *optval, size_t optlen)
1059{
1060 int ret = 0;
1061
1062 switch (optname) {
1063 case RDMA_OPTION_ID_TOS:
1064 if (optlen != sizeof(u8)) {
1065 ret = -EINVAL;
1066 break;
1067 }
1068 rdma_set_service_type(ctx->cm_id, *((u8 *) optval));
1069 break;
Hefty, Seana9bb7912011-05-09 22:06:10 -07001070 case RDMA_OPTION_ID_REUSEADDR:
1071 if (optlen != sizeof(int)) {
1072 ret = -EINVAL;
1073 break;
1074 }
1075 ret = rdma_set_reuseaddr(ctx->cm_id, *((int *) optval) ? 1 : 0);
1076 break;
Sean Hefty68602122012-06-14 20:31:39 +00001077 case RDMA_OPTION_ID_AFONLY:
1078 if (optlen != sizeof(int)) {
1079 ret = -EINVAL;
1080 break;
1081 }
1082 ret = rdma_set_afonly(ctx->cm_id, *((int *) optval) ? 1 : 0);
1083 break;
Sean Hefty7ce86402007-08-08 15:51:13 -07001084 default:
1085 ret = -ENOSYS;
1086 }
1087
1088 return ret;
1089}
1090
Sean Heftya7ca1f02009-11-16 09:30:33 -08001091static int ucma_set_ib_path(struct ucma_context *ctx,
1092 struct ib_path_rec_data *path_data, size_t optlen)
1093{
1094 struct ib_sa_path_rec sa_path;
1095 struct rdma_cm_event event;
1096 int ret;
1097
1098 if (optlen % sizeof(*path_data))
1099 return -EINVAL;
1100
1101 for (; optlen; optlen -= sizeof(*path_data), path_data++) {
1102 if (path_data->flags == (IB_PATH_GMP | IB_PATH_PRIMARY |
1103 IB_PATH_BIDIRECTIONAL))
1104 break;
1105 }
1106
1107 if (!optlen)
1108 return -EINVAL;
1109
1110 ib_sa_unpack_path(path_data->path_rec, &sa_path);
1111 ret = rdma_set_ib_paths(ctx->cm_id, &sa_path, 1);
1112 if (ret)
1113 return ret;
1114
1115 memset(&event, 0, sizeof event);
1116 event.event = RDMA_CM_EVENT_ROUTE_RESOLVED;
1117 return ucma_event_handler(ctx->cm_id, &event);
1118}
1119
1120static int ucma_set_option_ib(struct ucma_context *ctx, int optname,
1121 void *optval, size_t optlen)
1122{
1123 int ret;
1124
1125 switch (optname) {
1126 case RDMA_OPTION_IB_PATH:
1127 ret = ucma_set_ib_path(ctx, optval, optlen);
1128 break;
1129 default:
1130 ret = -ENOSYS;
1131 }
1132
1133 return ret;
1134}
1135
Sean Hefty7ce86402007-08-08 15:51:13 -07001136static int ucma_set_option_level(struct ucma_context *ctx, int level,
1137 int optname, void *optval, size_t optlen)
1138{
1139 int ret;
1140
1141 switch (level) {
1142 case RDMA_OPTION_ID:
1143 ret = ucma_set_option_id(ctx, optname, optval, optlen);
1144 break;
Sean Heftya7ca1f02009-11-16 09:30:33 -08001145 case RDMA_OPTION_IB:
1146 ret = ucma_set_option_ib(ctx, optname, optval, optlen);
1147 break;
Sean Hefty7ce86402007-08-08 15:51:13 -07001148 default:
1149 ret = -ENOSYS;
1150 }
1151
1152 return ret;
1153}
1154
1155static ssize_t ucma_set_option(struct ucma_file *file, const char __user *inbuf,
1156 int in_len, int out_len)
1157{
1158 struct rdma_ucm_set_option cmd;
1159 struct ucma_context *ctx;
1160 void *optval;
1161 int ret;
1162
1163 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
1164 return -EFAULT;
1165
1166 ctx = ucma_get_ctx(file, cmd.id);
1167 if (IS_ERR(ctx))
1168 return PTR_ERR(ctx);
1169
Roland Dreier0764c762012-07-27 13:27:45 -07001170 optval = memdup_user((void __user *) (unsigned long) cmd.optval,
1171 cmd.optlen);
1172 if (IS_ERR(optval)) {
1173 ret = PTR_ERR(optval);
1174 goto out;
Sean Hefty7ce86402007-08-08 15:51:13 -07001175 }
1176
1177 ret = ucma_set_option_level(ctx, cmd.level, cmd.optname, optval,
1178 cmd.optlen);
Sean Hefty7ce86402007-08-08 15:51:13 -07001179 kfree(optval);
Roland Dreier0764c762012-07-27 13:27:45 -07001180
1181out:
Sean Hefty7ce86402007-08-08 15:51:13 -07001182 ucma_put_ctx(ctx);
1183 return ret;
1184}
1185
Sean Hefty75216632006-11-30 16:53:41 -08001186static ssize_t ucma_notify(struct ucma_file *file, const char __user *inbuf,
1187 int in_len, int out_len)
1188{
1189 struct rdma_ucm_notify cmd;
1190 struct ucma_context *ctx;
1191 int ret;
1192
1193 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
1194 return -EFAULT;
1195
1196 ctx = ucma_get_ctx(file, cmd.id);
1197 if (IS_ERR(ctx))
1198 return PTR_ERR(ctx);
1199
1200 ret = rdma_notify(ctx->cm_id, (enum ib_event_type) cmd.event);
1201 ucma_put_ctx(ctx);
1202 return ret;
1203}
1204
Sean Hefty05ad9452013-05-29 10:09:30 -07001205static ssize_t ucma_join_ip_multicast(struct ucma_file *file,
1206 const char __user *inbuf,
1207 int in_len, int out_len)
Sean Heftyc8f6a362007-02-15 17:00:18 -08001208{
Sean Hefty05ad9452013-05-29 10:09:30 -07001209 struct rdma_ucm_join_ip_mcast cmd;
Sean Heftyc8f6a362007-02-15 17:00:18 -08001210 struct rdma_ucm_create_id_resp resp;
1211 struct ucma_context *ctx;
1212 struct ucma_multicast *mc;
1213 int ret;
1214
1215 if (out_len < sizeof(resp))
1216 return -ENOSPC;
1217
1218 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
1219 return -EFAULT;
1220
1221 ctx = ucma_get_ctx(file, cmd.id);
1222 if (IS_ERR(ctx))
1223 return PTR_ERR(ctx);
1224
1225 mutex_lock(&file->mut);
1226 mc = ucma_alloc_multicast(ctx);
Julien Brunel6aea9382008-10-10 12:00:19 -07001227 if (!mc) {
1228 ret = -ENOMEM;
Sean Heftyc8f6a362007-02-15 17:00:18 -08001229 goto err1;
1230 }
1231
1232 mc->uid = cmd.uid;
1233 memcpy(&mc->addr, &cmd.addr, sizeof cmd.addr);
Roland Dreier3f446752008-08-04 11:02:14 -07001234 ret = rdma_join_multicast(ctx->cm_id, (struct sockaddr *) &mc->addr, mc);
Sean Heftyc8f6a362007-02-15 17:00:18 -08001235 if (ret)
1236 goto err2;
1237
1238 resp.id = mc->id;
1239 if (copy_to_user((void __user *)(unsigned long)cmd.response,
1240 &resp, sizeof(resp))) {
1241 ret = -EFAULT;
1242 goto err3;
1243 }
1244
1245 mutex_unlock(&file->mut);
1246 ucma_put_ctx(ctx);
1247 return 0;
1248
1249err3:
Roland Dreier3f446752008-08-04 11:02:14 -07001250 rdma_leave_multicast(ctx->cm_id, (struct sockaddr *) &mc->addr);
Sean Heftyc8f6a362007-02-15 17:00:18 -08001251 ucma_cleanup_mc_events(mc);
1252err2:
1253 mutex_lock(&mut);
1254 idr_remove(&multicast_idr, mc->id);
1255 mutex_unlock(&mut);
1256 list_del(&mc->list);
1257 kfree(mc);
1258err1:
1259 mutex_unlock(&file->mut);
1260 ucma_put_ctx(ctx);
1261 return ret;
1262}
1263
1264static ssize_t ucma_leave_multicast(struct ucma_file *file,
1265 const char __user *inbuf,
1266 int in_len, int out_len)
1267{
1268 struct rdma_ucm_destroy_id cmd;
1269 struct rdma_ucm_destroy_id_resp resp;
1270 struct ucma_multicast *mc;
1271 int ret = 0;
1272
1273 if (out_len < sizeof(resp))
1274 return -ENOSPC;
1275
1276 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
1277 return -EFAULT;
1278
1279 mutex_lock(&mut);
1280 mc = idr_find(&multicast_idr, cmd.id);
1281 if (!mc)
1282 mc = ERR_PTR(-ENOENT);
1283 else if (mc->ctx->file != file)
1284 mc = ERR_PTR(-EINVAL);
1285 else {
1286 idr_remove(&multicast_idr, mc->id);
1287 atomic_inc(&mc->ctx->ref);
1288 }
1289 mutex_unlock(&mut);
1290
1291 if (IS_ERR(mc)) {
1292 ret = PTR_ERR(mc);
1293 goto out;
1294 }
1295
Roland Dreier3f446752008-08-04 11:02:14 -07001296 rdma_leave_multicast(mc->ctx->cm_id, (struct sockaddr *) &mc->addr);
Sean Heftyc8f6a362007-02-15 17:00:18 -08001297 mutex_lock(&mc->ctx->file->mut);
1298 ucma_cleanup_mc_events(mc);
1299 list_del(&mc->list);
1300 mutex_unlock(&mc->ctx->file->mut);
1301
1302 ucma_put_ctx(mc->ctx);
1303 resp.events_reported = mc->events_reported;
1304 kfree(mc);
1305
1306 if (copy_to_user((void __user *)(unsigned long)cmd.response,
1307 &resp, sizeof(resp)))
1308 ret = -EFAULT;
1309out:
1310 return ret;
1311}
1312
Sean Hefty88314e42007-11-14 00:29:50 -08001313static void ucma_lock_files(struct ucma_file *file1, struct ucma_file *file2)
1314{
1315 /* Acquire mutex's based on pointer comparison to prevent deadlock. */
1316 if (file1 < file2) {
1317 mutex_lock(&file1->mut);
1318 mutex_lock(&file2->mut);
1319 } else {
1320 mutex_lock(&file2->mut);
1321 mutex_lock(&file1->mut);
1322 }
1323}
1324
1325static void ucma_unlock_files(struct ucma_file *file1, struct ucma_file *file2)
1326{
1327 if (file1 < file2) {
1328 mutex_unlock(&file2->mut);
1329 mutex_unlock(&file1->mut);
1330 } else {
1331 mutex_unlock(&file1->mut);
1332 mutex_unlock(&file2->mut);
1333 }
1334}
1335
1336static void ucma_move_events(struct ucma_context *ctx, struct ucma_file *file)
1337{
1338 struct ucma_event *uevent, *tmp;
1339
1340 list_for_each_entry_safe(uevent, tmp, &ctx->file->event_list, list)
1341 if (uevent->ctx == ctx)
1342 list_move_tail(&uevent->list, &file->event_list);
1343}
1344
1345static ssize_t ucma_migrate_id(struct ucma_file *new_file,
1346 const char __user *inbuf,
1347 int in_len, int out_len)
1348{
1349 struct rdma_ucm_migrate_id cmd;
1350 struct rdma_ucm_migrate_resp resp;
1351 struct ucma_context *ctx;
Al Viro2903ff02012-08-28 12:52:22 -04001352 struct fd f;
Sean Hefty88314e42007-11-14 00:29:50 -08001353 struct ucma_file *cur_file;
1354 int ret = 0;
1355
1356 if (copy_from_user(&cmd, inbuf, sizeof(cmd)))
1357 return -EFAULT;
1358
1359 /* Get current fd to protect against it being closed */
Al Viro2903ff02012-08-28 12:52:22 -04001360 f = fdget(cmd.fd);
1361 if (!f.file)
Sean Hefty88314e42007-11-14 00:29:50 -08001362 return -ENOENT;
1363
1364 /* Validate current fd and prevent destruction of id. */
Al Viro2903ff02012-08-28 12:52:22 -04001365 ctx = ucma_get_ctx(f.file->private_data, cmd.id);
Sean Hefty88314e42007-11-14 00:29:50 -08001366 if (IS_ERR(ctx)) {
1367 ret = PTR_ERR(ctx);
1368 goto file_put;
1369 }
1370
1371 cur_file = ctx->file;
1372 if (cur_file == new_file) {
1373 resp.events_reported = ctx->events_reported;
1374 goto response;
1375 }
1376
1377 /*
1378 * Migrate events between fd's, maintaining order, and avoiding new
1379 * events being added before existing events.
1380 */
1381 ucma_lock_files(cur_file, new_file);
1382 mutex_lock(&mut);
1383
1384 list_move_tail(&ctx->list, &new_file->ctx_list);
1385 ucma_move_events(ctx, new_file);
1386 ctx->file = new_file;
1387 resp.events_reported = ctx->events_reported;
1388
1389 mutex_unlock(&mut);
1390 ucma_unlock_files(cur_file, new_file);
1391
1392response:
1393 if (copy_to_user((void __user *)(unsigned long)cmd.response,
1394 &resp, sizeof(resp)))
1395 ret = -EFAULT;
1396
1397 ucma_put_ctx(ctx);
1398file_put:
Al Viro2903ff02012-08-28 12:52:22 -04001399 fdput(f);
Sean Hefty88314e42007-11-14 00:29:50 -08001400 return ret;
1401}
1402
Sean Hefty75216632006-11-30 16:53:41 -08001403static ssize_t (*ucma_cmd_table[])(struct ucma_file *file,
1404 const char __user *inbuf,
1405 int in_len, int out_len) = {
Sean Hefty05ad9452013-05-29 10:09:30 -07001406 [RDMA_USER_CM_CMD_CREATE_ID] = ucma_create_id,
1407 [RDMA_USER_CM_CMD_DESTROY_ID] = ucma_destroy_id,
1408 [RDMA_USER_CM_CMD_BIND_IP] = ucma_bind_ip,
1409 [RDMA_USER_CM_CMD_RESOLVE_IP] = ucma_resolve_ip,
1410 [RDMA_USER_CM_CMD_RESOLVE_ROUTE] = ucma_resolve_route,
1411 [RDMA_USER_CM_CMD_QUERY_ROUTE] = ucma_query_route,
1412 [RDMA_USER_CM_CMD_CONNECT] = ucma_connect,
1413 [RDMA_USER_CM_CMD_LISTEN] = ucma_listen,
1414 [RDMA_USER_CM_CMD_ACCEPT] = ucma_accept,
1415 [RDMA_USER_CM_CMD_REJECT] = ucma_reject,
1416 [RDMA_USER_CM_CMD_DISCONNECT] = ucma_disconnect,
1417 [RDMA_USER_CM_CMD_INIT_QP_ATTR] = ucma_init_qp_attr,
1418 [RDMA_USER_CM_CMD_GET_EVENT] = ucma_get_event,
1419 [RDMA_USER_CM_CMD_GET_OPTION] = NULL,
1420 [RDMA_USER_CM_CMD_SET_OPTION] = ucma_set_option,
1421 [RDMA_USER_CM_CMD_NOTIFY] = ucma_notify,
1422 [RDMA_USER_CM_CMD_JOIN_IP_MCAST] = ucma_join_ip_multicast,
1423 [RDMA_USER_CM_CMD_LEAVE_MCAST] = ucma_leave_multicast,
1424 [RDMA_USER_CM_CMD_MIGRATE_ID] = ucma_migrate_id,
Sean Heftyeebe4c32013-05-29 10:09:31 -07001425 [RDMA_USER_CM_CMD_QUERY] = ucma_query,
1426 [RDMA_USER_CM_CMD_BIND] = ucma_bind
Sean Hefty75216632006-11-30 16:53:41 -08001427};
1428
1429static ssize_t ucma_write(struct file *filp, const char __user *buf,
1430 size_t len, loff_t *pos)
1431{
1432 struct ucma_file *file = filp->private_data;
1433 struct rdma_ucm_cmd_hdr hdr;
1434 ssize_t ret;
1435
1436 if (len < sizeof(hdr))
1437 return -EINVAL;
1438
1439 if (copy_from_user(&hdr, buf, sizeof(hdr)))
1440 return -EFAULT;
1441
Hefty, Seancaf6e3f2011-10-06 09:33:05 -07001442 if (hdr.cmd >= ARRAY_SIZE(ucma_cmd_table))
Sean Hefty75216632006-11-30 16:53:41 -08001443 return -EINVAL;
1444
1445 if (hdr.in + sizeof(hdr) > len)
1446 return -EINVAL;
1447
1448 if (!ucma_cmd_table[hdr.cmd])
1449 return -ENOSYS;
1450
1451 ret = ucma_cmd_table[hdr.cmd](file, buf + sizeof(hdr), hdr.in, hdr.out);
1452 if (!ret)
1453 ret = len;
1454
1455 return ret;
1456}
1457
1458static unsigned int ucma_poll(struct file *filp, struct poll_table_struct *wait)
1459{
1460 struct ucma_file *file = filp->private_data;
1461 unsigned int mask = 0;
1462
1463 poll_wait(filp, &file->poll_wait, wait);
1464
1465 if (!list_empty(&file->event_list))
1466 mask = POLLIN | POLLRDNORM;
1467
1468 return mask;
1469}
1470
Roland Dreierf7a6117e2008-07-24 20:36:59 -07001471/*
1472 * ucma_open() does not need the BKL:
1473 *
1474 * - no global state is referred to;
1475 * - there is no ioctl method to race against;
1476 * - no further module initialization is required for open to work
1477 * after the device is registered.
1478 */
Sean Hefty75216632006-11-30 16:53:41 -08001479static int ucma_open(struct inode *inode, struct file *filp)
1480{
1481 struct ucma_file *file;
1482
1483 file = kmalloc(sizeof *file, GFP_KERNEL);
1484 if (!file)
1485 return -ENOMEM;
1486
1487 INIT_LIST_HEAD(&file->event_list);
1488 INIT_LIST_HEAD(&file->ctx_list);
1489 init_waitqueue_head(&file->poll_wait);
1490 mutex_init(&file->mut);
1491
1492 filp->private_data = file;
1493 file->filp = filp;
Roland Dreierbc1db9a2010-04-09 17:13:50 -07001494
1495 return nonseekable_open(inode, filp);
Sean Hefty75216632006-11-30 16:53:41 -08001496}
1497
1498static int ucma_close(struct inode *inode, struct file *filp)
1499{
1500 struct ucma_file *file = filp->private_data;
1501 struct ucma_context *ctx, *tmp;
1502
1503 mutex_lock(&file->mut);
1504 list_for_each_entry_safe(ctx, tmp, &file->ctx_list, list) {
1505 mutex_unlock(&file->mut);
1506
1507 mutex_lock(&mut);
1508 idr_remove(&ctx_idr, ctx->id);
1509 mutex_unlock(&mut);
1510
1511 ucma_free_ctx(ctx);
1512 mutex_lock(&file->mut);
1513 }
1514 mutex_unlock(&file->mut);
1515 kfree(file);
1516 return 0;
1517}
1518
Arjan van de Ven2b8693c2007-02-12 00:55:32 -08001519static const struct file_operations ucma_fops = {
Sean Hefty75216632006-11-30 16:53:41 -08001520 .owner = THIS_MODULE,
1521 .open = ucma_open,
1522 .release = ucma_close,
1523 .write = ucma_write,
1524 .poll = ucma_poll,
Roland Dreierbc1db9a2010-04-09 17:13:50 -07001525 .llseek = no_llseek,
Sean Hefty75216632006-11-30 16:53:41 -08001526};
1527
1528static struct miscdevice ucma_misc = {
Roland Dreier04ea2f82011-05-23 10:48:43 -07001529 .minor = MISC_DYNAMIC_MINOR,
1530 .name = "rdma_cm",
1531 .nodename = "infiniband/rdma_cm",
1532 .mode = 0666,
1533 .fops = &ucma_fops,
Sean Hefty75216632006-11-30 16:53:41 -08001534};
1535
1536static ssize_t show_abi_version(struct device *dev,
1537 struct device_attribute *attr,
1538 char *buf)
1539{
1540 return sprintf(buf, "%d\n", RDMA_USER_CM_ABI_VERSION);
1541}
1542static DEVICE_ATTR(abi_version, S_IRUGO, show_abi_version, NULL);
1543
1544static int __init ucma_init(void)
1545{
1546 int ret;
1547
1548 ret = misc_register(&ucma_misc);
1549 if (ret)
1550 return ret;
1551
1552 ret = device_create_file(ucma_misc.this_device, &dev_attr_abi_version);
1553 if (ret) {
1554 printk(KERN_ERR "rdma_ucm: couldn't create abi_version attr\n");
Steve Wise97cb7e42010-08-13 20:56:34 +00001555 goto err1;
1556 }
1557
Eric W. Biedermanec8f23c2012-04-19 13:44:49 +00001558 ucma_ctl_table_hdr = register_net_sysctl(&init_net, "net/rdma_ucm", ucma_ctl_table);
Steve Wise97cb7e42010-08-13 20:56:34 +00001559 if (!ucma_ctl_table_hdr) {
1560 printk(KERN_ERR "rdma_ucm: couldn't register sysctl paths\n");
1561 ret = -ENOMEM;
1562 goto err2;
Sean Hefty75216632006-11-30 16:53:41 -08001563 }
1564 return 0;
Steve Wise97cb7e42010-08-13 20:56:34 +00001565err2:
1566 device_remove_file(ucma_misc.this_device, &dev_attr_abi_version);
1567err1:
Sean Hefty75216632006-11-30 16:53:41 -08001568 misc_deregister(&ucma_misc);
1569 return ret;
1570}
1571
1572static void __exit ucma_cleanup(void)
1573{
Eric W. Biederman5dd3df12012-04-19 13:24:33 +00001574 unregister_net_sysctl_table(ucma_ctl_table_hdr);
Sean Hefty75216632006-11-30 16:53:41 -08001575 device_remove_file(ucma_misc.this_device, &dev_attr_abi_version);
1576 misc_deregister(&ucma_misc);
1577 idr_destroy(&ctx_idr);
1578}
1579
1580module_init(ucma_init);
1581module_exit(ucma_cleanup);