2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2004 Topspin Communications. All rights reserved.
|
2005-08-11 13:03:10 +07:00
|
|
|
* Copyright (c) 2005 Sun Microsystems, Inc. All rights reserved.
|
2005-04-17 05:20:36 +07:00
|
|
|
*
|
|
|
|
* This software is available to you under a choice of one of two
|
|
|
|
* licenses. You may choose to be licensed under the terms of the GNU
|
|
|
|
* General Public License (GPL) Version 2, available from the file
|
|
|
|
* COPYING in the main directory of this source tree, or the
|
|
|
|
* OpenIB.org BSD license below:
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or
|
|
|
|
* without modification, are permitted provided that the following
|
|
|
|
* conditions are met:
|
|
|
|
*
|
|
|
|
* - Redistributions of source code must retain the above
|
|
|
|
* copyright notice, this list of conditions and the following
|
|
|
|
* disclaimer.
|
|
|
|
*
|
|
|
|
* - Redistributions in binary form must reproduce the above
|
|
|
|
* copyright notice, this list of conditions and the following
|
|
|
|
* disclaimer in the documentation and/or other materials
|
|
|
|
* provided with the distribution.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
|
|
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
* SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/string.h>
|
|
|
|
#include <linux/errno.h>
|
2007-02-06 23:07:25 +07:00
|
|
|
#include <linux/kernel.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/init.h>
|
2015-07-30 21:50:15 +07:00
|
|
|
#include <linux/netdevice.h>
|
2017-05-19 19:48:53 +07:00
|
|
|
#include <linux/security.h>
|
|
|
|
#include <linux/notifier.h>
|
2011-05-21 01:46:11 +07:00
|
|
|
#include <rdma/rdma_netlink.h>
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
#include <rdma/ib_addr.h>
|
|
|
|
#include <rdma/ib_cache.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
#include "core_priv.h"
|
|
|
|
|
|
|
|
MODULE_AUTHOR("Roland Dreier");
|
|
|
|
MODULE_DESCRIPTION("core kernel InfiniBand API");
|
|
|
|
MODULE_LICENSE("Dual BSD/GPL");
|
|
|
|
|
2015-12-12 02:53:03 +07:00
|
|
|
struct workqueue_struct *ib_comp_wq;
|
2018-08-27 12:35:55 +07:00
|
|
|
struct workqueue_struct *ib_comp_unbound_wq;
|
2010-10-19 22:24:36 +07:00
|
|
|
struct workqueue_struct *ib_wq;
|
|
|
|
EXPORT_SYMBOL_GPL(ib_wq);
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
/*
|
|
|
|
* Each of the three rwsem locks (devices, clients, client_data) protects the
|
|
|
|
* xarray of the same name. Specifically it allows the caller to assert that
|
|
|
|
* the MARK will/will not be changing under the lock, and for devices and
|
|
|
|
* clients, that the value in the xarray is still a valid pointer. Change of
|
|
|
|
* the MARK is linked to the object state, so holding the lock and testing the
|
|
|
|
* MARK also asserts that the contained object is in a certain state.
|
|
|
|
*
|
|
|
|
* This is used to build a two stage register/unregister flow where objects
|
|
|
|
* can continue to be in the xarray even though they are still in progress to
|
|
|
|
* register/unregister.
|
|
|
|
*
|
|
|
|
* The xarray itself provides additional locking, and restartable iteration,
|
|
|
|
* which is also relied on.
|
|
|
|
*
|
|
|
|
* Locks should not be nested, with the exception of client_data, which is
|
|
|
|
* allowed to nest under the read side of the other two locks.
|
|
|
|
*
|
|
|
|
* The devices_rwsem also protects the device name list, any change or
|
|
|
|
* assignment of device name must also hold the write side to guarantee unique
|
|
|
|
* names.
|
|
|
|
*/
|
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
/*
|
|
|
|
* devices contains devices that have had their names assigned. The
|
|
|
|
* devices may not be registered. Users that care about the registration
|
|
|
|
* status need to call ib_device_try_get() on the device to ensure it is
|
|
|
|
* registered, and keep it registered, for the required duration.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static DEFINE_XARRAY_FLAGS(devices, XA_FLAGS_ALLOC);
|
2019-02-07 12:41:54 +07:00
|
|
|
static DECLARE_RWSEM(devices_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
#define DEVICE_REGISTERED XA_MARK_1
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
static LIST_HEAD(client_list);
|
2019-02-07 12:41:52 +07:00
|
|
|
#define CLIENT_REGISTERED XA_MARK_1
|
|
|
|
static DEFINE_XARRAY_FLAGS(clients, XA_FLAGS_ALLOC);
|
2019-02-07 12:41:54 +07:00
|
|
|
static DECLARE_RWSEM(clients_rwsem);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/*
|
2019-02-07 12:41:53 +07:00
|
|
|
* If client_data is registered then the corresponding client must also still
|
|
|
|
* be registered.
|
|
|
|
*/
|
|
|
|
#define CLIENT_DATA_REGISTERED XA_MARK_1
|
|
|
|
/*
|
|
|
|
* xarray has this behavior where it won't iterate over NULL values stored in
|
|
|
|
* allocated arrays. So we need our own iterator to see all values stored in
|
|
|
|
* the array. This does the same thing as xa_for_each except that it also
|
|
|
|
* returns NULL valued entries if the array is allocating. Simplified to only
|
|
|
|
* work on simple xarrays.
|
|
|
|
*/
|
|
|
|
static void *xan_find_marked(struct xarray *xa, unsigned long *indexp,
|
|
|
|
xa_mark_t filter)
|
|
|
|
{
|
|
|
|
XA_STATE(xas, xa, *indexp);
|
|
|
|
void *entry;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
do {
|
|
|
|
entry = xas_find_marked(&xas, ULONG_MAX, filter);
|
|
|
|
if (xa_is_zero(entry))
|
|
|
|
break;
|
|
|
|
} while (xas_retry(&xas, entry));
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
if (entry) {
|
|
|
|
*indexp = xas.xa_index;
|
|
|
|
if (xa_is_zero(entry))
|
|
|
|
return NULL;
|
|
|
|
return entry;
|
|
|
|
}
|
|
|
|
return XA_ERROR(-ENOENT);
|
|
|
|
}
|
|
|
|
#define xan_for_each_marked(xa, index, entry, filter) \
|
|
|
|
for (index = 0, entry = xan_find_marked(xa, &(index), filter); \
|
|
|
|
!xa_is_err(entry); \
|
|
|
|
(index)++, entry = xan_find_marked(xa, &(index), filter))
|
|
|
|
|
2017-05-19 19:48:53 +07:00
|
|
|
static int ib_security_change(struct notifier_block *nb, unsigned long event,
|
|
|
|
void *lsm_data);
|
|
|
|
static void ib_policy_change_task(struct work_struct *work);
|
|
|
|
static DECLARE_WORK(ib_policy_change_work, ib_policy_change_task);
|
|
|
|
|
|
|
|
static struct notifier_block ibdev_lsm_nb = {
|
|
|
|
.notifier_call = ib_security_change,
|
|
|
|
};
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
static int ib_device_check_mandatory(struct ib_device *device)
|
|
|
|
{
|
2018-12-11 02:09:48 +07:00
|
|
|
#define IB_MANDATORY_FUNC(x) { offsetof(struct ib_device_ops, x), #x }
|
2005-04-17 05:20:36 +07:00
|
|
|
static const struct {
|
|
|
|
size_t offset;
|
|
|
|
char *name;
|
|
|
|
} mandatory_table[] = {
|
|
|
|
IB_MANDATORY_FUNC(query_device),
|
|
|
|
IB_MANDATORY_FUNC(query_port),
|
|
|
|
IB_MANDATORY_FUNC(query_pkey),
|
|
|
|
IB_MANDATORY_FUNC(alloc_pd),
|
|
|
|
IB_MANDATORY_FUNC(dealloc_pd),
|
|
|
|
IB_MANDATORY_FUNC(create_qp),
|
|
|
|
IB_MANDATORY_FUNC(modify_qp),
|
|
|
|
IB_MANDATORY_FUNC(destroy_qp),
|
|
|
|
IB_MANDATORY_FUNC(post_send),
|
|
|
|
IB_MANDATORY_FUNC(post_recv),
|
|
|
|
IB_MANDATORY_FUNC(create_cq),
|
|
|
|
IB_MANDATORY_FUNC(destroy_cq),
|
|
|
|
IB_MANDATORY_FUNC(poll_cq),
|
|
|
|
IB_MANDATORY_FUNC(req_notify_cq),
|
|
|
|
IB_MANDATORY_FUNC(get_dma_mr),
|
2015-05-14 07:02:58 +07:00
|
|
|
IB_MANDATORY_FUNC(dereg_mr),
|
|
|
|
IB_MANDATORY_FUNC(get_port_immutable)
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
int i;
|
|
|
|
|
2019-01-22 15:08:22 +07:00
|
|
|
device->kverbs_provider = true;
|
2007-02-06 23:07:25 +07:00
|
|
|
for (i = 0; i < ARRAY_SIZE(mandatory_table); ++i) {
|
2018-12-11 02:09:48 +07:00
|
|
|
if (!*(void **) ((void *) &device->ops +
|
|
|
|
mandatory_table[i].offset)) {
|
2019-01-22 15:08:22 +07:00
|
|
|
device->kverbs_provider = false;
|
|
|
|
break;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-01-01 18:07:15 +07:00
|
|
|
/*
|
RDMA/core: Sync unregistration with netlink commands
When the rdma device is getting removed, get resource info can race with
device removal, as below:
CPU-0 CPU-1
-------- --------
rdma_nl_rcv_msg()
nldev_res_get_cq_dumpit()
mutex_lock(device_lock);
get device reference
mutex_unlock(device_lock); [..]
ib_unregister_device()
/* Valid reference to
* device->dev exists.
*/
ib_dealloc_device()
[..]
provider->fill_res_entry();
Even though device object is not freed, fill_res_entry() can get called on
device which doesn't have a driver anymore. Kernel core device reference
count is not sufficient, as this only keeps the structure valid, and
doesn't guarantee the driver is still loaded.
Similar race can occur with device renaming and device removal, where
device_rename() tries to rename a unregistered device. While this is fine
for devices of a class which are not net namespace aware, but it is
incorrect for net namespace aware class coming in subsequent series. If a
class is net namespace aware, then the below [1] call trace is observed in
above situation.
Therefore, to avoid the race, keep a reference count and let device
unregistration wait until all netlink users drop the reference.
[1] Call trace:
kernfs: ns required in 'infiniband' for 'mlx5_0'
WARNING: CPU: 18 PID: 44270 at fs/kernfs/dir.c:842 kernfs_find_ns+0x104/0x120
libahci i2c_core mlxfw libata dca [last unloaded: devlink]
RIP: 0010:kernfs_find_ns+0x104/0x120
Call Trace:
kernfs_find_and_get_ns+0x2e/0x50
sysfs_rename_link_ns+0x40/0xb0
device_rename+0xb2/0xf0
ib_device_rename+0xb3/0x100 [ib_core]
nldev_set_doit+0x165/0x190 [ib_core]
rdma_nl_rcv_msg+0x249/0x250 [ib_core]
? netlink_deliver_tap+0x8f/0x3e0
rdma_nl_rcv+0xd6/0x120 [ib_core]
netlink_unicast+0x17c/0x230
netlink_sendmsg+0x2f0/0x3e0
sock_sendmsg+0x30/0x40
__sys_sendto+0xdc/0x160
Fixes: da5c85078215 ("RDMA/nldev: add driver-specific resource tracking")
Signed-off-by: Parav Pandit <parav@mellanox.com>
Signed-off-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
2018-11-16 08:50:57 +07:00
|
|
|
* Caller must perform ib_device_put() to return the device reference count
|
|
|
|
* when ib_device_get_by_index() returns valid device pointer.
|
2018-01-01 18:07:15 +07:00
|
|
|
*/
|
|
|
|
struct ib_device *ib_device_get_by_index(u32 index)
|
|
|
|
{
|
|
|
|
struct ib_device *device;
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_read(&devices_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
device = xa_load(&devices, index);
|
RDMA/core: Sync unregistration with netlink commands
When the rdma device is getting removed, get resource info can race with
device removal, as below:
CPU-0 CPU-1
-------- --------
rdma_nl_rcv_msg()
nldev_res_get_cq_dumpit()
mutex_lock(device_lock);
get device reference
mutex_unlock(device_lock); [..]
ib_unregister_device()
/* Valid reference to
* device->dev exists.
*/
ib_dealloc_device()
[..]
provider->fill_res_entry();
Even though device object is not freed, fill_res_entry() can get called on
device which doesn't have a driver anymore. Kernel core device reference
count is not sufficient, as this only keeps the structure valid, and
doesn't guarantee the driver is still loaded.
Similar race can occur with device renaming and device removal, where
device_rename() tries to rename a unregistered device. While this is fine
for devices of a class which are not net namespace aware, but it is
incorrect for net namespace aware class coming in subsequent series. If a
class is net namespace aware, then the below [1] call trace is observed in
above situation.
Therefore, to avoid the race, keep a reference count and let device
unregistration wait until all netlink users drop the reference.
[1] Call trace:
kernfs: ns required in 'infiniband' for 'mlx5_0'
WARNING: CPU: 18 PID: 44270 at fs/kernfs/dir.c:842 kernfs_find_ns+0x104/0x120
libahci i2c_core mlxfw libata dca [last unloaded: devlink]
RIP: 0010:kernfs_find_ns+0x104/0x120
Call Trace:
kernfs_find_and_get_ns+0x2e/0x50
sysfs_rename_link_ns+0x40/0xb0
device_rename+0xb2/0xf0
ib_device_rename+0xb3/0x100 [ib_core]
nldev_set_doit+0x165/0x190 [ib_core]
rdma_nl_rcv_msg+0x249/0x250 [ib_core]
? netlink_deliver_tap+0x8f/0x3e0
rdma_nl_rcv+0xd6/0x120 [ib_core]
netlink_unicast+0x17c/0x230
netlink_sendmsg+0x2f0/0x3e0
sock_sendmsg+0x30/0x40
__sys_sendto+0xdc/0x160
Fixes: da5c85078215 ("RDMA/nldev: add driver-specific resource tracking")
Signed-off-by: Parav Pandit <parav@mellanox.com>
Signed-off-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
2018-11-16 08:50:57 +07:00
|
|
|
if (device) {
|
2019-01-11 04:02:24 +07:00
|
|
|
if (!ib_device_try_get(device))
|
RDMA/core: Sync unregistration with netlink commands
When the rdma device is getting removed, get resource info can race with
device removal, as below:
CPU-0 CPU-1
-------- --------
rdma_nl_rcv_msg()
nldev_res_get_cq_dumpit()
mutex_lock(device_lock);
get device reference
mutex_unlock(device_lock); [..]
ib_unregister_device()
/* Valid reference to
* device->dev exists.
*/
ib_dealloc_device()
[..]
provider->fill_res_entry();
Even though device object is not freed, fill_res_entry() can get called on
device which doesn't have a driver anymore. Kernel core device reference
count is not sufficient, as this only keeps the structure valid, and
doesn't guarantee the driver is still loaded.
Similar race can occur with device renaming and device removal, where
device_rename() tries to rename a unregistered device. While this is fine
for devices of a class which are not net namespace aware, but it is
incorrect for net namespace aware class coming in subsequent series. If a
class is net namespace aware, then the below [1] call trace is observed in
above situation.
Therefore, to avoid the race, keep a reference count and let device
unregistration wait until all netlink users drop the reference.
[1] Call trace:
kernfs: ns required in 'infiniband' for 'mlx5_0'
WARNING: CPU: 18 PID: 44270 at fs/kernfs/dir.c:842 kernfs_find_ns+0x104/0x120
libahci i2c_core mlxfw libata dca [last unloaded: devlink]
RIP: 0010:kernfs_find_ns+0x104/0x120
Call Trace:
kernfs_find_and_get_ns+0x2e/0x50
sysfs_rename_link_ns+0x40/0xb0
device_rename+0xb2/0xf0
ib_device_rename+0xb3/0x100 [ib_core]
nldev_set_doit+0x165/0x190 [ib_core]
rdma_nl_rcv_msg+0x249/0x250 [ib_core]
? netlink_deliver_tap+0x8f/0x3e0
rdma_nl_rcv+0xd6/0x120 [ib_core]
netlink_unicast+0x17c/0x230
netlink_sendmsg+0x2f0/0x3e0
sock_sendmsg+0x30/0x40
__sys_sendto+0xdc/0x160
Fixes: da5c85078215 ("RDMA/nldev: add driver-specific resource tracking")
Signed-off-by: Parav Pandit <parav@mellanox.com>
Signed-off-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
2018-11-16 08:50:57 +07:00
|
|
|
device = NULL;
|
|
|
|
}
|
2019-02-07 12:41:54 +07:00
|
|
|
up_read(&devices_rwsem);
|
2018-01-01 18:07:15 +07:00
|
|
|
return device;
|
|
|
|
}
|
|
|
|
|
2019-01-11 04:02:24 +07:00
|
|
|
/**
|
|
|
|
* ib_device_put - Release IB device reference
|
|
|
|
* @device: device whose reference to be released
|
|
|
|
*
|
|
|
|
* ib_device_put() releases reference to the IB device to allow it to be
|
|
|
|
* unregistered and eventually free.
|
|
|
|
*/
|
RDMA/core: Sync unregistration with netlink commands
When the rdma device is getting removed, get resource info can race with
device removal, as below:
CPU-0 CPU-1
-------- --------
rdma_nl_rcv_msg()
nldev_res_get_cq_dumpit()
mutex_lock(device_lock);
get device reference
mutex_unlock(device_lock); [..]
ib_unregister_device()
/* Valid reference to
* device->dev exists.
*/
ib_dealloc_device()
[..]
provider->fill_res_entry();
Even though device object is not freed, fill_res_entry() can get called on
device which doesn't have a driver anymore. Kernel core device reference
count is not sufficient, as this only keeps the structure valid, and
doesn't guarantee the driver is still loaded.
Similar race can occur with device renaming and device removal, where
device_rename() tries to rename a unregistered device. While this is fine
for devices of a class which are not net namespace aware, but it is
incorrect for net namespace aware class coming in subsequent series. If a
class is net namespace aware, then the below [1] call trace is observed in
above situation.
Therefore, to avoid the race, keep a reference count and let device
unregistration wait until all netlink users drop the reference.
[1] Call trace:
kernfs: ns required in 'infiniband' for 'mlx5_0'
WARNING: CPU: 18 PID: 44270 at fs/kernfs/dir.c:842 kernfs_find_ns+0x104/0x120
libahci i2c_core mlxfw libata dca [last unloaded: devlink]
RIP: 0010:kernfs_find_ns+0x104/0x120
Call Trace:
kernfs_find_and_get_ns+0x2e/0x50
sysfs_rename_link_ns+0x40/0xb0
device_rename+0xb2/0xf0
ib_device_rename+0xb3/0x100 [ib_core]
nldev_set_doit+0x165/0x190 [ib_core]
rdma_nl_rcv_msg+0x249/0x250 [ib_core]
? netlink_deliver_tap+0x8f/0x3e0
rdma_nl_rcv+0xd6/0x120 [ib_core]
netlink_unicast+0x17c/0x230
netlink_sendmsg+0x2f0/0x3e0
sock_sendmsg+0x30/0x40
__sys_sendto+0xdc/0x160
Fixes: da5c85078215 ("RDMA/nldev: add driver-specific resource tracking")
Signed-off-by: Parav Pandit <parav@mellanox.com>
Signed-off-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
2018-11-16 08:50:57 +07:00
|
|
|
void ib_device_put(struct ib_device *device)
|
|
|
|
{
|
|
|
|
if (refcount_dec_and_test(&device->refcount))
|
|
|
|
complete(&device->unreg_completion);
|
|
|
|
}
|
2019-01-11 04:02:24 +07:00
|
|
|
EXPORT_SYMBOL(ib_device_put);
|
RDMA/core: Sync unregistration with netlink commands
When the rdma device is getting removed, get resource info can race with
device removal, as below:
CPU-0 CPU-1
-------- --------
rdma_nl_rcv_msg()
nldev_res_get_cq_dumpit()
mutex_lock(device_lock);
get device reference
mutex_unlock(device_lock); [..]
ib_unregister_device()
/* Valid reference to
* device->dev exists.
*/
ib_dealloc_device()
[..]
provider->fill_res_entry();
Even though device object is not freed, fill_res_entry() can get called on
device which doesn't have a driver anymore. Kernel core device reference
count is not sufficient, as this only keeps the structure valid, and
doesn't guarantee the driver is still loaded.
Similar race can occur with device renaming and device removal, where
device_rename() tries to rename a unregistered device. While this is fine
for devices of a class which are not net namespace aware, but it is
incorrect for net namespace aware class coming in subsequent series. If a
class is net namespace aware, then the below [1] call trace is observed in
above situation.
Therefore, to avoid the race, keep a reference count and let device
unregistration wait until all netlink users drop the reference.
[1] Call trace:
kernfs: ns required in 'infiniband' for 'mlx5_0'
WARNING: CPU: 18 PID: 44270 at fs/kernfs/dir.c:842 kernfs_find_ns+0x104/0x120
libahci i2c_core mlxfw libata dca [last unloaded: devlink]
RIP: 0010:kernfs_find_ns+0x104/0x120
Call Trace:
kernfs_find_and_get_ns+0x2e/0x50
sysfs_rename_link_ns+0x40/0xb0
device_rename+0xb2/0xf0
ib_device_rename+0xb3/0x100 [ib_core]
nldev_set_doit+0x165/0x190 [ib_core]
rdma_nl_rcv_msg+0x249/0x250 [ib_core]
? netlink_deliver_tap+0x8f/0x3e0
rdma_nl_rcv+0xd6/0x120 [ib_core]
netlink_unicast+0x17c/0x230
netlink_sendmsg+0x2f0/0x3e0
sock_sendmsg+0x30/0x40
__sys_sendto+0xdc/0x160
Fixes: da5c85078215 ("RDMA/nldev: add driver-specific resource tracking")
Signed-off-by: Parav Pandit <parav@mellanox.com>
Signed-off-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
2018-11-16 08:50:57 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
static struct ib_device *__ib_device_get_by_name(const char *name)
|
|
|
|
{
|
|
|
|
struct ib_device *device;
|
2019-02-07 12:41:53 +07:00
|
|
|
unsigned long index;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
xa_for_each (&devices, index, device)
|
2018-09-21 05:42:25 +07:00
|
|
|
if (!strcmp(name, dev_name(&device->dev)))
|
2005-04-17 05:20:36 +07:00
|
|
|
return device;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-10-10 13:19:11 +07:00
|
|
|
int ib_device_rename(struct ib_device *ibdev, const char *name)
|
|
|
|
{
|
2019-02-07 12:41:47 +07:00
|
|
|
int ret;
|
2018-10-10 13:19:11 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_write(&devices_rwsem);
|
2019-02-07 12:41:47 +07:00
|
|
|
if (!strcmp(name, dev_name(&ibdev->dev))) {
|
|
|
|
ret = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-01-12 09:42:42 +07:00
|
|
|
if (__ib_device_get_by_name(name)) {
|
|
|
|
ret = -EEXIST;
|
|
|
|
goto out;
|
2018-10-10 13:19:11 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
ret = device_rename(&ibdev->dev, name);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
strlcpy(ibdev->name, name, IB_DEVICE_NAME_MAX);
|
|
|
|
out:
|
2019-02-07 12:41:54 +07:00
|
|
|
up_write(&devices_rwsem);
|
2018-10-10 13:19:11 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-09-26 05:58:09 +07:00
|
|
|
static int alloc_name(struct ib_device *ibdev, const char *name)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct ib_device *device;
|
2019-02-07 12:41:53 +07:00
|
|
|
unsigned long index;
|
2019-02-07 12:41:51 +07:00
|
|
|
struct ida inuse;
|
|
|
|
int rc;
|
2005-04-17 05:20:36 +07:00
|
|
|
int i;
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
lockdep_assert_held_exclusive(&devices_rwsem);
|
2019-02-07 12:41:51 +07:00
|
|
|
ida_init(&inuse);
|
2019-02-07 12:41:53 +07:00
|
|
|
xa_for_each (&devices, index, device) {
|
2018-09-26 05:58:09 +07:00
|
|
|
char buf[IB_DEVICE_NAME_MAX];
|
|
|
|
|
2018-09-21 05:42:25 +07:00
|
|
|
if (sscanf(dev_name(&device->dev), name, &i) != 1)
|
2005-04-17 05:20:36 +07:00
|
|
|
continue;
|
2019-02-07 12:41:51 +07:00
|
|
|
if (i < 0 || i >= INT_MAX)
|
2005-04-17 05:20:36 +07:00
|
|
|
continue;
|
|
|
|
snprintf(buf, sizeof buf, name, i);
|
2019-02-07 12:41:51 +07:00
|
|
|
if (strcmp(buf, dev_name(&device->dev)) != 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
rc = ida_alloc_range(&inuse, i, i, GFP_KERNEL);
|
|
|
|
if (rc < 0)
|
|
|
|
goto out;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2019-02-07 12:41:51 +07:00
|
|
|
rc = ida_alloc(&inuse, GFP_KERNEL);
|
|
|
|
if (rc < 0)
|
|
|
|
goto out;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:51 +07:00
|
|
|
rc = dev_set_name(&ibdev->dev, name, rc);
|
|
|
|
out:
|
|
|
|
ida_destroy(&inuse);
|
|
|
|
return rc;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2015-08-05 04:23:34 +07:00
|
|
|
static void ib_device_release(struct device *device)
|
|
|
|
{
|
|
|
|
struct ib_device *dev = container_of(device, struct ib_device, dev);
|
|
|
|
|
2019-02-07 12:41:50 +07:00
|
|
|
WARN_ON(refcount_read(&dev->refcount));
|
2019-02-07 12:41:49 +07:00
|
|
|
ib_cache_release_one(dev);
|
2019-02-07 12:41:48 +07:00
|
|
|
ib_security_release_port_pkey_list(dev);
|
|
|
|
kfree(dev->port_pkey_list);
|
2019-02-07 12:41:49 +07:00
|
|
|
kfree(dev->port_immutable);
|
2019-02-07 12:41:53 +07:00
|
|
|
xa_destroy(&dev->client_data);
|
2015-08-05 04:23:34 +07:00
|
|
|
kfree(dev);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ib_device_uevent(struct device *device,
|
|
|
|
struct kobj_uevent_env *env)
|
|
|
|
{
|
2018-09-21 05:42:25 +07:00
|
|
|
if (add_uevent_var(env, "NAME=%s", dev_name(device)))
|
2015-08-05 04:23:34 +07:00
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* It would be nice to pass the node GUID with the event...
|
|
|
|
*/
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct class ib_class = {
|
|
|
|
.name = "infiniband",
|
|
|
|
.dev_release = ib_device_release,
|
|
|
|
.dev_uevent = ib_device_uevent,
|
|
|
|
};
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/**
|
2019-01-30 17:49:11 +07:00
|
|
|
* _ib_alloc_device - allocate an IB device struct
|
2005-04-17 05:20:36 +07:00
|
|
|
* @size:size of structure to allocate
|
|
|
|
*
|
|
|
|
* Low-level drivers should use ib_alloc_device() to allocate &struct
|
|
|
|
* ib_device. @size is the size of the structure to be allocated,
|
|
|
|
* including any private data used by the low-level driver.
|
|
|
|
* ib_dealloc_device() must be used to free structures allocated with
|
|
|
|
* ib_alloc_device().
|
|
|
|
*/
|
2019-01-30 17:49:11 +07:00
|
|
|
struct ib_device *_ib_alloc_device(size_t size)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2015-08-05 04:23:34 +07:00
|
|
|
struct ib_device *device;
|
|
|
|
|
|
|
|
if (WARN_ON(size < sizeof(struct ib_device)))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
device = kzalloc(size, GFP_KERNEL);
|
|
|
|
if (!device)
|
|
|
|
return NULL;
|
|
|
|
|
2019-01-30 17:48:58 +07:00
|
|
|
rdma_restrack_init(device);
|
2018-01-28 16:17:20 +07:00
|
|
|
|
2015-08-05 04:23:34 +07:00
|
|
|
device->dev.class = &ib_class;
|
|
|
|
device_initialize(&device->dev);
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&device->event_handler_list);
|
|
|
|
spin_lock_init(&device->event_handler_lock);
|
2019-02-07 12:41:53 +07:00
|
|
|
/*
|
|
|
|
* client_data needs to be alloc because we don't want our mark to be
|
|
|
|
* destroyed if the user stores NULL in the client data.
|
|
|
|
*/
|
|
|
|
xa_init_flags(&device->client_data, XA_FLAGS_ALLOC);
|
2019-02-07 12:41:54 +07:00
|
|
|
init_rwsem(&device->client_data_rwsem);
|
2015-08-05 04:23:34 +07:00
|
|
|
INIT_LIST_HEAD(&device->port_list);
|
RDMA/core: Sync unregistration with netlink commands
When the rdma device is getting removed, get resource info can race with
device removal, as below:
CPU-0 CPU-1
-------- --------
rdma_nl_rcv_msg()
nldev_res_get_cq_dumpit()
mutex_lock(device_lock);
get device reference
mutex_unlock(device_lock); [..]
ib_unregister_device()
/* Valid reference to
* device->dev exists.
*/
ib_dealloc_device()
[..]
provider->fill_res_entry();
Even though device object is not freed, fill_res_entry() can get called on
device which doesn't have a driver anymore. Kernel core device reference
count is not sufficient, as this only keeps the structure valid, and
doesn't guarantee the driver is still loaded.
Similar race can occur with device renaming and device removal, where
device_rename() tries to rename a unregistered device. While this is fine
for devices of a class which are not net namespace aware, but it is
incorrect for net namespace aware class coming in subsequent series. If a
class is net namespace aware, then the below [1] call trace is observed in
above situation.
Therefore, to avoid the race, keep a reference count and let device
unregistration wait until all netlink users drop the reference.
[1] Call trace:
kernfs: ns required in 'infiniband' for 'mlx5_0'
WARNING: CPU: 18 PID: 44270 at fs/kernfs/dir.c:842 kernfs_find_ns+0x104/0x120
libahci i2c_core mlxfw libata dca [last unloaded: devlink]
RIP: 0010:kernfs_find_ns+0x104/0x120
Call Trace:
kernfs_find_and_get_ns+0x2e/0x50
sysfs_rename_link_ns+0x40/0xb0
device_rename+0xb2/0xf0
ib_device_rename+0xb3/0x100 [ib_core]
nldev_set_doit+0x165/0x190 [ib_core]
rdma_nl_rcv_msg+0x249/0x250 [ib_core]
? netlink_deliver_tap+0x8f/0x3e0
rdma_nl_rcv+0xd6/0x120 [ib_core]
netlink_unicast+0x17c/0x230
netlink_sendmsg+0x2f0/0x3e0
sock_sendmsg+0x30/0x40
__sys_sendto+0xdc/0x160
Fixes: da5c85078215 ("RDMA/nldev: add driver-specific resource tracking")
Signed-off-by: Parav Pandit <parav@mellanox.com>
Signed-off-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <jgg@mellanox.com>
2018-11-16 08:50:57 +07:00
|
|
|
init_completion(&device->unreg_completion);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2015-08-05 04:23:34 +07:00
|
|
|
return device;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
2019-01-30 17:49:11 +07:00
|
|
|
EXPORT_SYMBOL(_ib_alloc_device);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_dealloc_device - free an IB device struct
|
|
|
|
* @device:structure to free
|
|
|
|
*
|
|
|
|
* Free a structure allocated with ib_alloc_device().
|
|
|
|
*/
|
|
|
|
void ib_dealloc_device(struct ib_device *device)
|
|
|
|
{
|
2019-02-07 12:41:53 +07:00
|
|
|
WARN_ON(!xa_empty(&device->client_data));
|
2019-02-07 12:41:50 +07:00
|
|
|
WARN_ON(refcount_read(&device->refcount));
|
2019-01-30 17:48:58 +07:00
|
|
|
rdma_restrack_clean(device);
|
2018-01-01 18:07:13 +07:00
|
|
|
put_device(&device->dev);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_dealloc_device);
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
/*
|
|
|
|
* add_client_context() and remove_client_context() must be safe against
|
|
|
|
* parallel calls on the same device - registration/unregistration of both the
|
|
|
|
* device and client can be occurring in parallel.
|
|
|
|
*
|
|
|
|
* The routines need to be a fence, any caller must not return until the add
|
|
|
|
* or remove is fully completed.
|
|
|
|
*/
|
|
|
|
static int add_client_context(struct ib_device *device,
|
|
|
|
struct ib_client *client)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2019-02-07 12:41:54 +07:00
|
|
|
int ret = 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-01-22 15:08:22 +07:00
|
|
|
if (!device->kverbs_provider && !client->no_kverbs_req)
|
2019-02-07 12:41:54 +07:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
down_write(&device->client_data_rwsem);
|
|
|
|
/*
|
|
|
|
* Another caller to add_client_context got here first and has already
|
|
|
|
* completely initialized context.
|
|
|
|
*/
|
|
|
|
if (xa_get_mark(&device->client_data, client->client_id,
|
|
|
|
CLIENT_DATA_REGISTERED))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = xa_err(xa_store(&device->client_data, client->client_id, NULL,
|
|
|
|
GFP_KERNEL));
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
downgrade_write(&device->client_data_rwsem);
|
|
|
|
if (client->add)
|
|
|
|
client->add(device);
|
|
|
|
|
|
|
|
/* Readers shall not see a client until add has been completed */
|
|
|
|
xa_set_mark(&device->client_data, client->client_id,
|
|
|
|
CLIENT_DATA_REGISTERED);
|
|
|
|
up_read(&device->client_data_rwsem);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out:
|
|
|
|
up_write(&device->client_data_rwsem);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void remove_client_context(struct ib_device *device,
|
|
|
|
unsigned int client_id)
|
|
|
|
{
|
|
|
|
struct ib_client *client;
|
|
|
|
void *client_data;
|
2019-01-22 15:08:22 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_write(&device->client_data_rwsem);
|
|
|
|
if (!xa_get_mark(&device->client_data, client_id,
|
|
|
|
CLIENT_DATA_REGISTERED)) {
|
|
|
|
up_write(&device->client_data_rwsem);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
client_data = xa_load(&device->client_data, client_id);
|
|
|
|
xa_clear_mark(&device->client_data, client_id, CLIENT_DATA_REGISTERED);
|
|
|
|
client = xa_load(&clients, client_id);
|
|
|
|
downgrade_write(&device->client_data_rwsem);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
/*
|
|
|
|
* Notice we cannot be holding any exclusive locks when calling the
|
|
|
|
* remove callback as the remove callback can recurse back into any
|
|
|
|
* public functions in this module and thus try for any locks those
|
|
|
|
* functions take.
|
|
|
|
*
|
|
|
|
* For this reason clients and drivers should not call the
|
|
|
|
* unregistration functions will holdling any locks.
|
|
|
|
*
|
|
|
|
* It tempting to drop the client_data_rwsem too, but this is required
|
|
|
|
* to ensure that unregister_client does not return until all clients
|
|
|
|
* are completely unregistered, which is required to avoid module
|
|
|
|
* unloading races.
|
|
|
|
*/
|
|
|
|
if (client->remove)
|
|
|
|
client->remove(device, client_data);
|
|
|
|
|
|
|
|
xa_erase(&device->client_data, client_id);
|
|
|
|
up_read(&device->client_data_rwsem);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2015-06-07 01:38:29 +07:00
|
|
|
static int verify_immutable(const struct ib_device *dev, u8 port)
|
|
|
|
{
|
|
|
|
return WARN_ON(!rdma_cap_ib_mad(dev, port) &&
|
|
|
|
rdma_max_mad_size(dev, port) != 0);
|
|
|
|
}
|
|
|
|
|
2015-05-14 07:02:58 +07:00
|
|
|
static int read_port_immutable(struct ib_device *device)
|
2007-05-14 11:26:51 +07:00
|
|
|
{
|
2015-08-05 04:23:34 +07:00
|
|
|
int ret;
|
2015-05-14 07:02:58 +07:00
|
|
|
u8 start_port = rdma_start_port(device);
|
|
|
|
u8 end_port = rdma_end_port(device);
|
|
|
|
u8 port;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* device->port_immutable is indexed directly by the port number to make
|
|
|
|
* access to this data as efficient as possible.
|
|
|
|
*
|
|
|
|
* Therefore port_immutable is declared as a 1 based array with
|
|
|
|
* potential empty slots at the beginning.
|
|
|
|
*/
|
treewide: kzalloc() -> kcalloc()
The kzalloc() function has a 2-factor argument form, kcalloc(). This
patch replaces cases of:
kzalloc(a * b, gfp)
with:
kcalloc(a * b, gfp)
as well as handling cases of:
kzalloc(a * b * c, gfp)
with:
kzalloc(array3_size(a, b, c), gfp)
as it's slightly less ugly than:
kzalloc_array(array_size(a, b), c, gfp)
This does, however, attempt to ignore constant size factors like:
kzalloc(4 * 1024, gfp)
though any constants defined via macros get caught up in the conversion.
Any factors with a sizeof() of "unsigned char", "char", and "u8" were
dropped, since they're redundant.
The Coccinelle script used for this was:
// Fix redundant parens around sizeof().
@@
type TYPE;
expression THING, E;
@@
(
kzalloc(
- (sizeof(TYPE)) * E
+ sizeof(TYPE) * E
, ...)
|
kzalloc(
- (sizeof(THING)) * E
+ sizeof(THING) * E
, ...)
)
// Drop single-byte sizes and redundant parens.
@@
expression COUNT;
typedef u8;
typedef __u8;
@@
(
kzalloc(
- sizeof(u8) * (COUNT)
+ COUNT
, ...)
|
kzalloc(
- sizeof(__u8) * (COUNT)
+ COUNT
, ...)
|
kzalloc(
- sizeof(char) * (COUNT)
+ COUNT
, ...)
|
kzalloc(
- sizeof(unsigned char) * (COUNT)
+ COUNT
, ...)
|
kzalloc(
- sizeof(u8) * COUNT
+ COUNT
, ...)
|
kzalloc(
- sizeof(__u8) * COUNT
+ COUNT
, ...)
|
kzalloc(
- sizeof(char) * COUNT
+ COUNT
, ...)
|
kzalloc(
- sizeof(unsigned char) * COUNT
+ COUNT
, ...)
)
// 2-factor product with sizeof(type/expression) and identifier or constant.
@@
type TYPE;
expression THING;
identifier COUNT_ID;
constant COUNT_CONST;
@@
(
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * (COUNT_ID)
+ COUNT_ID, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * COUNT_ID
+ COUNT_ID, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * (COUNT_CONST)
+ COUNT_CONST, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * COUNT_CONST
+ COUNT_CONST, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * (COUNT_ID)
+ COUNT_ID, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * COUNT_ID
+ COUNT_ID, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * (COUNT_CONST)
+ COUNT_CONST, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * COUNT_CONST
+ COUNT_CONST, sizeof(THING)
, ...)
)
// 2-factor product, only identifiers.
@@
identifier SIZE, COUNT;
@@
- kzalloc
+ kcalloc
(
- SIZE * COUNT
+ COUNT, SIZE
, ...)
// 3-factor product with 1 sizeof(type) or sizeof(expression), with
// redundant parens removed.
@@
expression THING;
identifier STRIDE, COUNT;
type TYPE;
@@
(
kzalloc(
- sizeof(TYPE) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kzalloc(
- sizeof(TYPE) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kzalloc(
- sizeof(TYPE) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kzalloc(
- sizeof(TYPE) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kzalloc(
- sizeof(THING) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kzalloc(
- sizeof(THING) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kzalloc(
- sizeof(THING) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kzalloc(
- sizeof(THING) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
)
// 3-factor product with 2 sizeof(variable), with redundant parens removed.
@@
expression THING1, THING2;
identifier COUNT;
type TYPE1, TYPE2;
@@
(
kzalloc(
- sizeof(TYPE1) * sizeof(TYPE2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
kzalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
kzalloc(
- sizeof(THING1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
kzalloc(
- sizeof(THING1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
kzalloc(
- sizeof(TYPE1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
|
kzalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
)
// 3-factor product, only identifiers, with redundant parens removed.
@@
identifier STRIDE, SIZE, COUNT;
@@
(
kzalloc(
- (COUNT) * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- COUNT * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- COUNT * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- (COUNT) * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- COUNT * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- (COUNT) * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- (COUNT) * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- COUNT * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
)
// Any remaining multi-factor products, first at least 3-factor products,
// when they're not all constants...
@@
expression E1, E2, E3;
constant C1, C2, C3;
@@
(
kzalloc(C1 * C2 * C3, ...)
|
kzalloc(
- (E1) * E2 * E3
+ array3_size(E1, E2, E3)
, ...)
|
kzalloc(
- (E1) * (E2) * E3
+ array3_size(E1, E2, E3)
, ...)
|
kzalloc(
- (E1) * (E2) * (E3)
+ array3_size(E1, E2, E3)
, ...)
|
kzalloc(
- E1 * E2 * E3
+ array3_size(E1, E2, E3)
, ...)
)
// And then all remaining 2 factors products when they're not all constants,
// keeping sizeof() as the second factor argument.
@@
expression THING, E1, E2;
type TYPE;
constant C1, C2, C3;
@@
(
kzalloc(sizeof(THING) * C2, ...)
|
kzalloc(sizeof(TYPE) * C2, ...)
|
kzalloc(C1 * C2 * C3, ...)
|
kzalloc(C1 * C2, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * (E2)
+ E2, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * E2
+ E2, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * (E2)
+ E2, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * E2
+ E2, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- (E1) * E2
+ E1, E2
, ...)
|
- kzalloc
+ kcalloc
(
- (E1) * (E2)
+ E1, E2
, ...)
|
- kzalloc
+ kcalloc
(
- E1 * E2
+ E1, E2
, ...)
)
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-06-13 04:03:40 +07:00
|
|
|
device->port_immutable = kcalloc(end_port + 1,
|
|
|
|
sizeof(*device->port_immutable),
|
2015-05-14 07:02:58 +07:00
|
|
|
GFP_KERNEL);
|
|
|
|
if (!device->port_immutable)
|
2015-08-05 04:23:34 +07:00
|
|
|
return -ENOMEM;
|
2007-05-14 11:26:51 +07:00
|
|
|
|
2015-05-14 07:02:58 +07:00
|
|
|
for (port = start_port; port <= end_port; ++port) {
|
2018-12-11 02:09:48 +07:00
|
|
|
ret = device->ops.get_port_immutable(
|
|
|
|
device, port, &device->port_immutable[port]);
|
2007-05-14 11:26:51 +07:00
|
|
|
if (ret)
|
2015-08-05 04:23:34 +07:00
|
|
|
return ret;
|
2015-06-07 01:38:29 +07:00
|
|
|
|
2015-08-05 04:23:34 +07:00
|
|
|
if (verify_immutable(device, port))
|
|
|
|
return -EINVAL;
|
2007-05-14 11:26:51 +07:00
|
|
|
}
|
2015-08-05 04:23:34 +07:00
|
|
|
return 0;
|
2007-05-14 11:26:51 +07:00
|
|
|
}
|
|
|
|
|
2017-06-27 20:49:53 +07:00
|
|
|
void ib_get_device_fw_str(struct ib_device *dev, char *str)
|
2016-06-15 13:21:56 +07:00
|
|
|
{
|
2018-12-11 02:09:48 +07:00
|
|
|
if (dev->ops.get_dev_fw_str)
|
|
|
|
dev->ops.get_dev_fw_str(dev, str);
|
2016-06-15 13:21:56 +07:00
|
|
|
else
|
|
|
|
str[0] = '\0';
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_get_device_fw_str);
|
|
|
|
|
IB/core: Enforce PKey security on QPs
Add new LSM hooks to allocate and free security contexts and check for
permission to access a PKey.
Allocate and free a security context when creating and destroying a QP.
This context is used for controlling access to PKeys.
When a request is made to modify a QP that changes the port, PKey index,
or alternate path, check that the QP has permission for the PKey in the
PKey table index on the subnet prefix of the port. If the QP is shared
make sure all handles to the QP also have access.
Store which port and PKey index a QP is using. After the reset to init
transition the user can modify the port, PKey index and alternate path
independently. So port and PKey settings changes can be a merge of the
previous settings and the new ones.
In order to maintain access control if there are PKey table or subnet
prefix change keep a list of all QPs are using each PKey index on
each port. If a change occurs all QPs using that device and port must
have access enforced for the new cache settings.
These changes add a transaction to the QP modify process. Association
with the old port and PKey index must be maintained if the modify fails,
and must be removed if it succeeds. Association with the new port and
PKey index must be established prior to the modify and removed if the
modify fails.
1. When a QP is modified to a particular Port, PKey index or alternate
path insert that QP into the appropriate lists.
2. Check permission to access the new settings.
3. If step 2 grants access attempt to modify the QP.
4a. If steps 2 and 3 succeed remove any prior associations.
4b. If ether fails remove the new setting associations.
If a PKey table or subnet prefix changes walk the list of QPs and
check that they have permission. If not send the QP to the error state
and raise a fatal error event. If it's a shared QP make sure all the
QPs that share the real_qp have permission as well. If the QP that
owns a security structure is denied access the security structure is
marked as such and the QP is added to an error_list. Once the moving
the QP to error is complete the security structure mark is cleared.
Maintaining the lists correctly turns QP destroy into a transaction.
The hardware driver for the device frees the ib_qp structure, so while
the destroy is in progress the ib_qp pointer in the ib_qp_security
struct is undefined. When the destroy process begins the ib_qp_security
structure is marked as destroying. This prevents any action from being
taken on the QP pointer. After the QP is destroyed successfully it
could still listed on an error_list wait for it to be processed by that
flow before cleaning up the structure.
If the destroy fails the QPs port and PKey settings are reinserted into
the appropriate lists, the destroying flag is cleared, and access control
is enforced, in case there were any cache changes during the destroy
flow.
To keep the security changes isolated a new file is used to hold security
related functionality.
Signed-off-by: Daniel Jurgens <danielj@mellanox.com>
Acked-by: Doug Ledford <dledford@redhat.com>
[PM: merge fixup in ib_verbs.h and uverbs_cmd.c]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2017-05-19 19:48:52 +07:00
|
|
|
static int setup_port_pkey_list(struct ib_device *device)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* device->port_pkey_list is indexed directly by the port number,
|
|
|
|
* Therefore it is declared as a 1 based array with potential empty
|
|
|
|
* slots at the beginning.
|
|
|
|
*/
|
|
|
|
device->port_pkey_list = kcalloc(rdma_end_port(device) + 1,
|
|
|
|
sizeof(*device->port_pkey_list),
|
|
|
|
GFP_KERNEL);
|
|
|
|
|
|
|
|
if (!device->port_pkey_list)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
for (i = 0; i < (rdma_end_port(device) + 1); i++) {
|
|
|
|
spin_lock_init(&device->port_pkey_list[i].list_lock);
|
|
|
|
INIT_LIST_HEAD(&device->port_pkey_list[i].pkey_list);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-05-19 19:48:53 +07:00
|
|
|
static void ib_policy_change_task(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct ib_device *dev;
|
2019-02-07 12:41:53 +07:00
|
|
|
unsigned long index;
|
2017-05-19 19:48:53 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_read(&devices_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
xa_for_each_marked (&devices, index, dev, DEVICE_REGISTERED) {
|
2017-05-19 19:48:53 +07:00
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = rdma_start_port(dev); i <= rdma_end_port(dev); i++) {
|
|
|
|
u64 sp;
|
|
|
|
int ret = ib_get_cached_subnet_prefix(dev,
|
|
|
|
i,
|
|
|
|
&sp);
|
|
|
|
|
|
|
|
WARN_ONCE(ret,
|
|
|
|
"ib_get_cached_subnet_prefix err: %d, this should never happen here\n",
|
|
|
|
ret);
|
2017-07-05 20:15:21 +07:00
|
|
|
if (!ret)
|
|
|
|
ib_security_cache_change(dev, i, sp);
|
2017-05-19 19:48:53 +07:00
|
|
|
}
|
|
|
|
}
|
2019-02-07 12:41:54 +07:00
|
|
|
up_read(&devices_rwsem);
|
2017-05-19 19:48:53 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ib_security_change(struct notifier_block *nb, unsigned long event,
|
|
|
|
void *lsm_data)
|
|
|
|
{
|
|
|
|
if (event != LSM_POLICY_CHANGE)
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
|
|
|
|
schedule_work(&ib_policy_change_work);
|
2019-02-02 16:09:45 +07:00
|
|
|
ib_mad_agent_security_change();
|
2017-05-19 19:48:53 +07:00
|
|
|
|
|
|
|
return NOTIFY_OK;
|
|
|
|
}
|
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
/*
|
|
|
|
* Assign the unique string device name and the unique device index.
|
2017-06-18 18:39:59 +07:00
|
|
|
*/
|
2019-02-07 12:41:53 +07:00
|
|
|
static int assign_name(struct ib_device *device, const char *name)
|
2017-06-18 18:39:59 +07:00
|
|
|
{
|
2019-02-07 12:41:53 +07:00
|
|
|
static u32 last_id;
|
|
|
|
int ret;
|
2017-06-18 18:39:59 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_write(&devices_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
/* Assign a unique name to the device */
|
|
|
|
if (strchr(name, '%'))
|
|
|
|
ret = alloc_name(device, name);
|
|
|
|
else
|
|
|
|
ret = dev_set_name(&device->dev, name);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (__ib_device_get_by_name(dev_name(&device->dev))) {
|
|
|
|
ret = -ENFILE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
strlcpy(device->name, dev_name(&device->dev), IB_DEVICE_NAME_MAX);
|
2017-06-18 18:39:59 +07:00
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
/* Cyclically allocate a user visible ID for the device */
|
|
|
|
device->index = last_id;
|
|
|
|
ret = xa_alloc(&devices, &device->index, INT_MAX, device, GFP_KERNEL);
|
|
|
|
if (ret == -ENOSPC) {
|
|
|
|
device->index = 0;
|
|
|
|
ret = xa_alloc(&devices, &device->index, INT_MAX, device,
|
|
|
|
GFP_KERNEL);
|
2017-06-18 18:39:59 +07:00
|
|
|
}
|
2019-02-07 12:41:53 +07:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
last_id = device->index + 1;
|
|
|
|
|
|
|
|
ret = 0;
|
2019-02-07 12:41:54 +07:00
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
out:
|
2019-02-07 12:41:54 +07:00
|
|
|
up_write(&devices_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void release_name(struct ib_device *device)
|
|
|
|
{
|
2019-02-07 12:41:54 +07:00
|
|
|
down_write(&devices_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
xa_erase(&devices, device->index);
|
2019-02-07 12:41:54 +07:00
|
|
|
up_write(&devices_rwsem);
|
2017-06-18 18:39:59 +07:00
|
|
|
}
|
|
|
|
|
2018-10-17 17:20:20 +07:00
|
|
|
static void setup_dma_device(struct ib_device *device)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2017-01-21 04:04:36 +07:00
|
|
|
struct device *parent = device->dev.parent;
|
|
|
|
|
2017-03-08 05:56:53 +07:00
|
|
|
WARN_ON_ONCE(device->dma_device);
|
|
|
|
if (device->dev.dma_ops) {
|
|
|
|
/*
|
|
|
|
* The caller provided custom DMA operations. Copy the
|
|
|
|
* DMA-related fields that are used by e.g. dma_alloc_coherent()
|
|
|
|
* into device->dev.
|
|
|
|
*/
|
|
|
|
device->dma_device = &device->dev;
|
2018-01-04 04:28:18 +07:00
|
|
|
if (!device->dev.dma_mask) {
|
|
|
|
if (parent)
|
|
|
|
device->dev.dma_mask = parent->dma_mask;
|
|
|
|
else
|
|
|
|
WARN_ON_ONCE(true);
|
|
|
|
}
|
|
|
|
if (!device->dev.coherent_dma_mask) {
|
|
|
|
if (parent)
|
|
|
|
device->dev.coherent_dma_mask =
|
|
|
|
parent->coherent_dma_mask;
|
|
|
|
else
|
|
|
|
WARN_ON_ONCE(true);
|
|
|
|
}
|
2017-03-08 05:56:53 +07:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* The caller did not provide custom DMA operations. Use the
|
|
|
|
* DMA mapping operations of the parent device.
|
|
|
|
*/
|
2018-01-04 04:28:18 +07:00
|
|
|
WARN_ON_ONCE(!parent);
|
2017-03-08 05:56:53 +07:00
|
|
|
device->dma_device = parent;
|
|
|
|
}
|
2018-10-17 17:20:20 +07:00
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
/*
|
|
|
|
* setup_device() allocates memory and sets up data that requires calling the
|
|
|
|
* device ops, this is the only reason these actions are not done during
|
|
|
|
* ib_alloc_device. It is undone by ib_dealloc_device().
|
|
|
|
*/
|
2018-10-17 17:20:20 +07:00
|
|
|
static int setup_device(struct ib_device *device)
|
|
|
|
{
|
|
|
|
struct ib_udata uhw = {.outlen = 0, .inlen = 0};
|
|
|
|
int ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
setup_dma_device(device);
|
|
|
|
|
2018-10-17 17:20:20 +07:00
|
|
|
ret = ib_device_check_mandatory(device);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2015-05-14 07:02:58 +07:00
|
|
|
ret = read_port_immutable(device);
|
2007-05-14 11:26:51 +07:00
|
|
|
if (ret) {
|
2018-09-21 05:42:23 +07:00
|
|
|
dev_warn(&device->dev,
|
|
|
|
"Couldn't create per port immutable data\n");
|
2018-10-17 17:20:20 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&device->attrs, 0, sizeof(device->attrs));
|
2018-12-11 02:09:48 +07:00
|
|
|
ret = device->ops.query_device(device, &device->attrs, &uhw);
|
2018-10-17 17:20:20 +07:00
|
|
|
if (ret) {
|
|
|
|
dev_warn(&device->dev,
|
|
|
|
"Couldn't query the device attributes\n");
|
2019-02-07 12:41:49 +07:00
|
|
|
return ret;
|
2007-05-14 11:26:51 +07:00
|
|
|
}
|
|
|
|
|
IB/core: Enforce PKey security on QPs
Add new LSM hooks to allocate and free security contexts and check for
permission to access a PKey.
Allocate and free a security context when creating and destroying a QP.
This context is used for controlling access to PKeys.
When a request is made to modify a QP that changes the port, PKey index,
or alternate path, check that the QP has permission for the PKey in the
PKey table index on the subnet prefix of the port. If the QP is shared
make sure all handles to the QP also have access.
Store which port and PKey index a QP is using. After the reset to init
transition the user can modify the port, PKey index and alternate path
independently. So port and PKey settings changes can be a merge of the
previous settings and the new ones.
In order to maintain access control if there are PKey table or subnet
prefix change keep a list of all QPs are using each PKey index on
each port. If a change occurs all QPs using that device and port must
have access enforced for the new cache settings.
These changes add a transaction to the QP modify process. Association
with the old port and PKey index must be maintained if the modify fails,
and must be removed if it succeeds. Association with the new port and
PKey index must be established prior to the modify and removed if the
modify fails.
1. When a QP is modified to a particular Port, PKey index or alternate
path insert that QP into the appropriate lists.
2. Check permission to access the new settings.
3. If step 2 grants access attempt to modify the QP.
4a. If steps 2 and 3 succeed remove any prior associations.
4b. If ether fails remove the new setting associations.
If a PKey table or subnet prefix changes walk the list of QPs and
check that they have permission. If not send the QP to the error state
and raise a fatal error event. If it's a shared QP make sure all the
QPs that share the real_qp have permission as well. If the QP that
owns a security structure is denied access the security structure is
marked as such and the QP is added to an error_list. Once the moving
the QP to error is complete the security structure mark is cleared.
Maintaining the lists correctly turns QP destroy into a transaction.
The hardware driver for the device frees the ib_qp structure, so while
the destroy is in progress the ib_qp pointer in the ib_qp_security
struct is undefined. When the destroy process begins the ib_qp_security
structure is marked as destroying. This prevents any action from being
taken on the QP pointer. After the QP is destroyed successfully it
could still listed on an error_list wait for it to be processed by that
flow before cleaning up the structure.
If the destroy fails the QPs port and PKey settings are reinserted into
the appropriate lists, the destroying flag is cleared, and access control
is enforced, in case there were any cache changes during the destroy
flow.
To keep the security changes isolated a new file is used to hold security
related functionality.
Signed-off-by: Daniel Jurgens <danielj@mellanox.com>
Acked-by: Doug Ledford <dledford@redhat.com>
[PM: merge fixup in ib_verbs.h and uverbs_cmd.c]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2017-05-19 19:48:52 +07:00
|
|
|
ret = setup_port_pkey_list(device);
|
|
|
|
if (ret) {
|
2018-09-21 05:42:23 +07:00
|
|
|
dev_warn(&device->dev, "Couldn't create per port_pkey_list\n");
|
2019-02-07 12:41:48 +07:00
|
|
|
return ret;
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
}
|
2018-10-17 17:20:20 +07:00
|
|
|
|
2019-02-07 12:41:49 +07:00
|
|
|
return 0;
|
2018-10-17 17:20:20 +07:00
|
|
|
}
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
static void disable_device(struct ib_device *device)
|
|
|
|
{
|
|
|
|
struct ib_client *client;
|
|
|
|
|
|
|
|
WARN_ON(!refcount_read(&device->refcount));
|
|
|
|
|
|
|
|
down_write(&devices_rwsem);
|
|
|
|
xa_clear_mark(&devices, device->index, DEVICE_REGISTERED);
|
|
|
|
up_write(&devices_rwsem);
|
|
|
|
|
|
|
|
down_read(&clients_rwsem);
|
|
|
|
list_for_each_entry_reverse(client, &client_list, list)
|
|
|
|
remove_client_context(device, client->client_id);
|
|
|
|
up_read(&clients_rwsem);
|
|
|
|
|
|
|
|
/* Pairs with refcount_set in enable_device */
|
|
|
|
ib_device_put(device);
|
|
|
|
wait_for_completion(&device->unreg_completion);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* An enabled device is visible to all clients and to all the public facing
|
|
|
|
* APIs that return a device pointer.
|
|
|
|
*/
|
|
|
|
static int enable_device(struct ib_device *device)
|
|
|
|
{
|
|
|
|
struct ib_client *client;
|
|
|
|
unsigned long index;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
refcount_set(&device->refcount, 1);
|
|
|
|
down_write(&devices_rwsem);
|
|
|
|
xa_set_mark(&devices, device->index, DEVICE_REGISTERED);
|
|
|
|
up_write(&devices_rwsem);
|
|
|
|
|
|
|
|
down_read(&clients_rwsem);
|
|
|
|
xa_for_each_marked (&clients, index, client, CLIENT_REGISTERED) {
|
|
|
|
ret = add_client_context(device, client);
|
|
|
|
if (ret) {
|
|
|
|
up_read(&clients_rwsem);
|
|
|
|
disable_device(device);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
up_read(&clients_rwsem);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-10-17 17:20:20 +07:00
|
|
|
/**
|
|
|
|
* ib_register_device - Register an IB device with IB core
|
|
|
|
* @device:Device to register
|
|
|
|
*
|
|
|
|
* Low-level drivers use ib_register_device() to register their
|
|
|
|
* devices with the IB core. All registered clients will receive a
|
|
|
|
* callback for each device that is added. @device must be allocated
|
|
|
|
* with ib_alloc_device().
|
|
|
|
*/
|
2018-12-18 19:28:30 +07:00
|
|
|
int ib_register_device(struct ib_device *device, const char *name)
|
2018-10-17 17:20:20 +07:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
ret = assign_name(device, name);
|
|
|
|
if (ret)
|
2019-02-07 12:41:54 +07:00
|
|
|
return ret;
|
2018-10-17 17:20:20 +07:00
|
|
|
|
|
|
|
ret = setup_device(device);
|
|
|
|
if (ret)
|
2019-02-07 12:41:54 +07:00
|
|
|
goto out;
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
|
2019-02-07 12:41:49 +07:00
|
|
|
ret = ib_cache_setup_one(device);
|
|
|
|
if (ret) {
|
|
|
|
dev_warn(&device->dev,
|
|
|
|
"Couldn't set up InfiniBand P_Key/GID cache\n");
|
2019-02-07 12:41:54 +07:00
|
|
|
goto out;
|
2019-02-07 12:41:49 +07:00
|
|
|
}
|
|
|
|
|
2019-01-18 01:14:15 +07:00
|
|
|
ib_device_register_rdmacg(device);
|
2015-12-18 15:59:44 +07:00
|
|
|
|
2018-12-18 19:28:30 +07:00
|
|
|
ret = ib_device_register_sysfs(device);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (ret) {
|
2018-09-21 05:42:23 +07:00
|
|
|
dev_warn(&device->dev,
|
|
|
|
"Couldn't register device with driver model\n");
|
2018-02-25 18:39:56 +07:00
|
|
|
goto cg_cleanup;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
ret = enable_device(device);
|
|
|
|
if (ret)
|
|
|
|
goto sysfs_cleanup;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2017-03-19 15:55:55 +07:00
|
|
|
return 0;
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
sysfs_cleanup:
|
|
|
|
ib_device_unregister_sysfs(device);
|
2018-02-25 18:39:56 +07:00
|
|
|
cg_cleanup:
|
|
|
|
ib_device_unregister_rdmacg(device);
|
2019-02-07 12:41:49 +07:00
|
|
|
ib_cache_cleanup_one(device);
|
2015-07-30 21:50:13 +07:00
|
|
|
out:
|
2019-02-07 12:41:54 +07:00
|
|
|
release_name(device);
|
2005-04-17 05:20:36 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_register_device);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_unregister_device - Unregister an IB device
|
|
|
|
* @device:Device to unregister
|
|
|
|
*
|
|
|
|
* Unregister an IB device. All clients will receive a remove callback.
|
|
|
|
*/
|
|
|
|
void ib_unregister_device(struct ib_device *device)
|
|
|
|
{
|
2019-02-07 12:41:54 +07:00
|
|
|
disable_device(device);
|
2009-02-26 04:27:46 +07:00
|
|
|
ib_device_unregister_sysfs(device);
|
2018-09-06 14:55:31 +07:00
|
|
|
ib_device_unregister_rdmacg(device);
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
ib_cache_cleanup_one(device);
|
2019-02-07 12:41:54 +07:00
|
|
|
release_name(device);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_unregister_device);
|
|
|
|
|
2019-02-07 12:41:52 +07:00
|
|
|
static int assign_client_id(struct ib_client *client)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_write(&clients_rwsem);
|
2019-02-07 12:41:52 +07:00
|
|
|
/*
|
|
|
|
* The add/remove callbacks must be called in FIFO/LIFO order. To
|
|
|
|
* achieve this we assign client_ids so they are sorted in
|
|
|
|
* registration order, and retain a linked list we can reverse iterate
|
|
|
|
* to get the LIFO order. The extra linked list can go away if xarray
|
|
|
|
* learns to reverse iterate.
|
|
|
|
*/
|
|
|
|
if (list_empty(&client_list))
|
|
|
|
client->client_id = 0;
|
|
|
|
else
|
|
|
|
client->client_id =
|
|
|
|
list_last_entry(&client_list, struct ib_client, list)
|
|
|
|
->client_id;
|
|
|
|
ret = xa_alloc(&clients, &client->client_id, INT_MAX, client,
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
xa_set_mark(&clients, client->client_id, CLIENT_REGISTERED);
|
|
|
|
list_add_tail(&client->list, &client_list);
|
|
|
|
|
2019-02-07 12:41:52 +07:00
|
|
|
out:
|
2019-02-07 12:41:54 +07:00
|
|
|
up_write(&clients_rwsem);
|
2019-02-07 12:41:52 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/**
|
|
|
|
* ib_register_client - Register an IB client
|
|
|
|
* @client:Client to register
|
|
|
|
*
|
|
|
|
* Upper level users of the IB drivers can use ib_register_client() to
|
|
|
|
* register callbacks for IB device addition and removal. When an IB
|
|
|
|
* device is added, each registered client's add method will be called
|
|
|
|
* (in the order the clients were registered), and when a device is
|
|
|
|
* removed, each client's remove method will be called (in the reverse
|
|
|
|
* order that clients were registered). In addition, when
|
|
|
|
* ib_register_client() is called, the client will receive an add
|
|
|
|
* callback for all devices already registered.
|
|
|
|
*/
|
|
|
|
int ib_register_client(struct ib_client *client)
|
|
|
|
{
|
|
|
|
struct ib_device *device;
|
2019-02-07 12:41:53 +07:00
|
|
|
unsigned long index;
|
2019-02-07 12:41:52 +07:00
|
|
|
int ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:52 +07:00
|
|
|
ret = assign_client_id(client);
|
2019-02-07 12:41:54 +07:00
|
|
|
if (ret)
|
2019-02-07 12:41:52 +07:00
|
|
|
return ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_read(&devices_rwsem);
|
|
|
|
xa_for_each_marked (&devices, index, device, DEVICE_REGISTERED) {
|
|
|
|
ret = add_client_context(device, client);
|
|
|
|
if (ret) {
|
|
|
|
up_read(&devices_rwsem);
|
|
|
|
ib_unregister_client(client);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
up_read(&devices_rwsem);
|
2005-04-17 05:20:36 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_register_client);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_unregister_client - Unregister an IB client
|
|
|
|
* @client:Client to unregister
|
|
|
|
*
|
|
|
|
* Upper level users use ib_unregister_client() to remove their client
|
|
|
|
* registration. When ib_unregister_client() is called, the client
|
|
|
|
* will receive a remove callback for each IB device still registered.
|
2019-02-07 12:41:54 +07:00
|
|
|
*
|
|
|
|
* This is a full fence, once it returns no client callbacks will be called,
|
|
|
|
* or are running in another thread.
|
2005-04-17 05:20:36 +07:00
|
|
|
*/
|
|
|
|
void ib_unregister_client(struct ib_client *client)
|
|
|
|
{
|
|
|
|
struct ib_device *device;
|
2019-02-07 12:41:53 +07:00
|
|
|
unsigned long index;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_write(&clients_rwsem);
|
2019-02-07 12:41:52 +07:00
|
|
|
xa_clear_mark(&clients, client->client_id, CLIENT_REGISTERED);
|
2019-02-07 12:41:54 +07:00
|
|
|
up_write(&clients_rwsem);
|
|
|
|
/*
|
|
|
|
* Every device still known must be serialized to make sure we are
|
|
|
|
* done with the client callbacks before we return.
|
|
|
|
*/
|
|
|
|
down_read(&devices_rwsem);
|
|
|
|
xa_for_each (&devices, index, device)
|
|
|
|
remove_client_context(device, client->client_id);
|
|
|
|
up_read(&devices_rwsem);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_write(&clients_rwsem);
|
2019-02-07 12:41:52 +07:00
|
|
|
list_del(&client->list);
|
|
|
|
xa_erase(&clients, client->client_id);
|
2019-02-07 12:41:54 +07:00
|
|
|
up_write(&clients_rwsem);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_unregister_client);
|
|
|
|
|
|
|
|
/**
|
2006-09-23 05:22:58 +07:00
|
|
|
* ib_set_client_data - Set IB client context
|
2005-04-17 05:20:36 +07:00
|
|
|
* @device:Device to set context for
|
|
|
|
* @client:Client to set context for
|
|
|
|
* @data:Context to set
|
|
|
|
*
|
2019-02-07 12:41:53 +07:00
|
|
|
* ib_set_client_data() sets client context data that can be retrieved with
|
|
|
|
* ib_get_client_data(). This can only be called while the client is
|
|
|
|
* registered to the device, once the ib_client remove() callback returns this
|
|
|
|
* cannot be called.
|
2005-04-17 05:20:36 +07:00
|
|
|
*/
|
|
|
|
void ib_set_client_data(struct ib_device *device, struct ib_client *client,
|
|
|
|
void *data)
|
|
|
|
{
|
2019-02-07 12:41:53 +07:00
|
|
|
void *rc;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
if (WARN_ON(IS_ERR(data)))
|
|
|
|
data = NULL;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
rc = xa_store(&device->client_data, client->client_id, data,
|
|
|
|
GFP_KERNEL);
|
|
|
|
WARN_ON(xa_is_err(rc));
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_set_client_data);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_register_event_handler - Register an IB event handler
|
|
|
|
* @event_handler:Handler to register
|
|
|
|
*
|
|
|
|
* ib_register_event_handler() registers an event handler that will be
|
|
|
|
* called back when asynchronous IB events occur (as defined in
|
|
|
|
* chapter 11 of the InfiniBand Architecture Specification). This
|
|
|
|
* callback may occur in interrupt context.
|
|
|
|
*/
|
2017-08-17 19:50:36 +07:00
|
|
|
void ib_register_event_handler(struct ib_event_handler *event_handler)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&event_handler->device->event_handler_lock, flags);
|
|
|
|
list_add_tail(&event_handler->list,
|
|
|
|
&event_handler->device->event_handler_list);
|
|
|
|
spin_unlock_irqrestore(&event_handler->device->event_handler_lock, flags);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_register_event_handler);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_unregister_event_handler - Unregister an event handler
|
|
|
|
* @event_handler:Handler to unregister
|
|
|
|
*
|
|
|
|
* Unregister an event handler registered with
|
|
|
|
* ib_register_event_handler().
|
|
|
|
*/
|
2017-08-17 19:50:36 +07:00
|
|
|
void ib_unregister_event_handler(struct ib_event_handler *event_handler)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&event_handler->device->event_handler_lock, flags);
|
|
|
|
list_del(&event_handler->list);
|
|
|
|
spin_unlock_irqrestore(&event_handler->device->event_handler_lock, flags);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_unregister_event_handler);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_dispatch_event - Dispatch an asynchronous event
|
|
|
|
* @event:Event to dispatch
|
|
|
|
*
|
|
|
|
* Low-level drivers must call ib_dispatch_event() to dispatch the
|
|
|
|
* event to all registered event handlers when an asynchronous event
|
|
|
|
* occurs.
|
|
|
|
*/
|
|
|
|
void ib_dispatch_event(struct ib_event *event)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
struct ib_event_handler *handler;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&event->device->event_handler_lock, flags);
|
|
|
|
|
|
|
|
list_for_each_entry(handler, &event->device->event_handler_list, list)
|
|
|
|
handler->handler(handler, event);
|
|
|
|
|
|
|
|
spin_unlock_irqrestore(&event->device->event_handler_lock, flags);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_dispatch_event);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_query_port - Query IB port attributes
|
|
|
|
* @device:Device to query
|
|
|
|
* @port_num:Port number to query
|
|
|
|
* @port_attr:Port attributes
|
|
|
|
*
|
|
|
|
* ib_query_port() returns the attributes of a port through the
|
|
|
|
* @port_attr pointer.
|
|
|
|
*/
|
|
|
|
int ib_query_port(struct ib_device *device,
|
|
|
|
u8 port_num,
|
|
|
|
struct ib_port_attr *port_attr)
|
|
|
|
{
|
2016-03-12 03:58:36 +07:00
|
|
|
union ib_gid gid;
|
|
|
|
int err;
|
|
|
|
|
2017-01-25 23:41:37 +07:00
|
|
|
if (!rdma_is_port_valid(device, port_num))
|
2005-10-03 23:32:33 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
2016-03-12 03:58:36 +07:00
|
|
|
memset(port_attr, 0, sizeof(*port_attr));
|
2018-12-11 02:09:48 +07:00
|
|
|
err = device->ops.query_port(device, port_num, port_attr);
|
2016-03-12 03:58:36 +07:00
|
|
|
if (err || port_attr->subnet_prefix)
|
|
|
|
return err;
|
|
|
|
|
2016-06-04 19:15:18 +07:00
|
|
|
if (rdma_port_get_link_layer(device, port_num) != IB_LINK_LAYER_INFINIBAND)
|
|
|
|
return 0;
|
|
|
|
|
2018-12-11 02:09:48 +07:00
|
|
|
err = device->ops.query_gid(device, port_num, 0, &gid);
|
2016-03-12 03:58:36 +07:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
port_attr->subnet_prefix = be64_to_cpu(gid.global.subnet_prefix);
|
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_query_port);
|
|
|
|
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
/**
|
|
|
|
* ib_enum_roce_netdev - enumerate all RoCE ports
|
|
|
|
* @ib_dev : IB device we want to query
|
|
|
|
* @filter: Should we call the callback?
|
|
|
|
* @filter_cookie: Cookie passed to filter
|
|
|
|
* @cb: Callback to call for each found RoCE ports
|
|
|
|
* @cookie: Cookie passed back to the callback
|
|
|
|
*
|
|
|
|
* Enumerates all of the physical RoCE ports of ib_dev
|
|
|
|
* which are related to netdevice and calls callback() on each
|
|
|
|
* device for which filter() function returns non zero.
|
|
|
|
*/
|
|
|
|
void ib_enum_roce_netdev(struct ib_device *ib_dev,
|
|
|
|
roce_netdev_filter filter,
|
|
|
|
void *filter_cookie,
|
|
|
|
roce_netdev_callback cb,
|
|
|
|
void *cookie)
|
|
|
|
{
|
|
|
|
u8 port;
|
|
|
|
|
|
|
|
for (port = rdma_start_port(ib_dev); port <= rdma_end_port(ib_dev);
|
|
|
|
port++)
|
|
|
|
if (rdma_protocol_roce(ib_dev, port)) {
|
|
|
|
struct net_device *idev = NULL;
|
|
|
|
|
2018-12-11 02:09:48 +07:00
|
|
|
if (ib_dev->ops.get_netdev)
|
|
|
|
idev = ib_dev->ops.get_netdev(ib_dev, port);
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
|
|
|
|
if (idev &&
|
|
|
|
idev->reg_state >= NETREG_UNREGISTERED) {
|
|
|
|
dev_put(idev);
|
|
|
|
idev = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (filter(ib_dev, port, idev, filter_cookie))
|
|
|
|
cb(ib_dev, port, idev, cookie);
|
|
|
|
|
|
|
|
if (idev)
|
|
|
|
dev_put(idev);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_enum_all_roce_netdevs - enumerate all RoCE devices
|
|
|
|
* @filter: Should we call the callback?
|
|
|
|
* @filter_cookie: Cookie passed to filter
|
|
|
|
* @cb: Callback to call for each found RoCE ports
|
|
|
|
* @cookie: Cookie passed back to the callback
|
|
|
|
*
|
|
|
|
* Enumerates all RoCE devices' physical ports which are related
|
|
|
|
* to netdevices and calls callback() on each device for which
|
|
|
|
* filter() function returns non zero.
|
|
|
|
*/
|
|
|
|
void ib_enum_all_roce_netdevs(roce_netdev_filter filter,
|
|
|
|
void *filter_cookie,
|
|
|
|
roce_netdev_callback cb,
|
|
|
|
void *cookie)
|
|
|
|
{
|
|
|
|
struct ib_device *dev;
|
2019-02-07 12:41:53 +07:00
|
|
|
unsigned long index;
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_read(&devices_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
xa_for_each_marked (&devices, index, dev, DEVICE_REGISTERED)
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
ib_enum_roce_netdev(dev, filter, filter_cookie, cb, cookie);
|
2019-02-07 12:41:54 +07:00
|
|
|
up_read(&devices_rwsem);
|
2017-06-19 18:04:56 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_enum_all_devs - enumerate all ib_devices
|
|
|
|
* @cb: Callback to call for each found ib_device
|
|
|
|
*
|
|
|
|
* Enumerates all ib_devices and calls callback() on each device.
|
|
|
|
*/
|
|
|
|
int ib_enum_all_devs(nldev_callback nldev_cb, struct sk_buff *skb,
|
|
|
|
struct netlink_callback *cb)
|
|
|
|
{
|
2019-02-07 12:41:53 +07:00
|
|
|
unsigned long index;
|
2017-06-19 18:04:56 +07:00
|
|
|
struct ib_device *dev;
|
|
|
|
unsigned int idx = 0;
|
|
|
|
int ret = 0;
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
down_read(&devices_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
xa_for_each_marked (&devices, index, dev, DEVICE_REGISTERED) {
|
2017-06-19 18:04:56 +07:00
|
|
|
ret = nldev_cb(dev, skb, cb, idx);
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
idx++;
|
|
|
|
}
|
2019-02-07 12:41:54 +07:00
|
|
|
up_read(&devices_rwsem);
|
2017-06-19 18:04:56 +07:00
|
|
|
return ret;
|
IB/core: Add RoCE GID table management
RoCE GIDs are based on IP addresses configured on Ethernet net-devices
which relate to the RDMA (RoCE) device port.
Currently, each of the low-level drivers that support RoCE (ocrdma,
mlx4) manages its own RoCE port GID table. As there's nothing which is
essentially vendor specific, we generalize that, and enhance the RDMA
core GID cache to do this job.
In order to populate the GID table, we listen for events:
(a) netdev up/down/change_addr events - if a netdev is built onto
our RoCE device, we need to add/delete its IPs. This involves
adding all GIDs related to this ndev, add default GIDs, etc.
(b) inet events - add new GIDs (according to the IP addresses)
to the table.
For programming the port RoCE GID table, providers must implement
the add_gid and del_gid callbacks.
RoCE GID management requires us to state the associated net_device
alongside the GID. This information is necessary in order to manage
the GID table. For example, when a net_device is removed, its
associated GIDs need to be removed as well.
RoCE mandates generating a default GID for each port, based on the
related net-device's IPv6 link local. In contrast to the GID based on
the regular IPv6 link-local (as we generate GID per IP address),
the default GID is also available when the net device is down (in
order to support loopback).
Locking is done as follows:
The patch modify the GID table code both for new RoCE drivers
implementing the add_gid/del_gid callbacks and for current RoCE and
IB drivers that do not. The flows for updating the table are
different, so the locking requirements are too.
While updating RoCE GID table, protection against multiple writers is
achieved via mutex_lock(&table->lock). Since writing to a table
requires us to find an entry (possible a free entry) in the table and
then modify it, this mutex protects both the find_gid and write_gid
ensuring the atomicity of the action.
Each entry in the GID cache is protected by rwlock. In RoCE, writing
(usually results from netdev notifier) involves invoking the vendor's
add_gid and del_gid callbacks, which could sleep.
Therefore, an invalid flag is added for each entry. Updates for RoCE are
done via a workqueue, thus sleeping is permitted.
In IB, updates are done in write_lock_irq(&device->cache.lock), thus
write_gid isn't allowed to sleep and add_gid/del_gid are not called.
When passing net-device into/out-of the GID cache, the device
is always passed held (dev_hold).
The code uses a single work item for updating all RDMA devices,
following a netdev or inet notifier.
The patch moves the cache from being a client (which was incorrect,
as the cache is part of the IB infrastructure) to being explicitly
initialized/freed when a device is registered/removed.
Signed-off-by: Matan Barak <matanb@mellanox.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
2015-07-30 22:33:26 +07:00
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/**
|
|
|
|
* ib_query_pkey - Get P_Key table entry
|
|
|
|
* @device:Device to query
|
|
|
|
* @port_num:Port number to query
|
|
|
|
* @index:P_Key table index to query
|
|
|
|
* @pkey:Returned P_Key
|
|
|
|
*
|
|
|
|
* ib_query_pkey() fetches the specified P_Key table entry.
|
|
|
|
*/
|
|
|
|
int ib_query_pkey(struct ib_device *device,
|
|
|
|
u8 port_num, u16 index, u16 *pkey)
|
|
|
|
{
|
2018-12-06 19:48:18 +07:00
|
|
|
if (!rdma_is_port_valid(device, port_num))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2018-12-11 02:09:48 +07:00
|
|
|
return device->ops.query_pkey(device, port_num, index, pkey);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_query_pkey);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_modify_device - Change IB device attributes
|
|
|
|
* @device:Device to modify
|
|
|
|
* @device_modify_mask:Mask of attributes to change
|
|
|
|
* @device_modify:New attribute values
|
|
|
|
*
|
|
|
|
* ib_modify_device() changes a device's attributes as specified by
|
|
|
|
* the @device_modify_mask and @device_modify structure.
|
|
|
|
*/
|
|
|
|
int ib_modify_device(struct ib_device *device,
|
|
|
|
int device_modify_mask,
|
|
|
|
struct ib_device_modify *device_modify)
|
|
|
|
{
|
2018-12-11 02:09:48 +07:00
|
|
|
if (!device->ops.modify_device)
|
2011-06-18 23:35:42 +07:00
|
|
|
return -ENOSYS;
|
|
|
|
|
2018-12-11 02:09:48 +07:00
|
|
|
return device->ops.modify_device(device, device_modify_mask,
|
|
|
|
device_modify);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_modify_device);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_modify_port - Modifies the attributes for the specified port.
|
|
|
|
* @device: The device to modify.
|
|
|
|
* @port_num: The number of the port to modify.
|
|
|
|
* @port_modify_mask: Mask used to specify which attributes of the port
|
|
|
|
* to change.
|
|
|
|
* @port_modify: New attribute values for the port.
|
|
|
|
*
|
|
|
|
* ib_modify_port() changes a port's attributes as specified by the
|
|
|
|
* @port_modify_mask and @port_modify structure.
|
|
|
|
*/
|
|
|
|
int ib_modify_port(struct ib_device *device,
|
|
|
|
u8 port_num, int port_modify_mask,
|
|
|
|
struct ib_port_modify *port_modify)
|
|
|
|
{
|
2017-08-23 15:08:07 +07:00
|
|
|
int rc;
|
2011-06-18 23:35:42 +07:00
|
|
|
|
2017-01-25 23:41:37 +07:00
|
|
|
if (!rdma_is_port_valid(device, port_num))
|
2005-10-03 23:32:33 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
2018-12-11 02:09:48 +07:00
|
|
|
if (device->ops.modify_port)
|
|
|
|
rc = device->ops.modify_port(device, port_num,
|
|
|
|
port_modify_mask,
|
|
|
|
port_modify);
|
2017-08-23 15:08:07 +07:00
|
|
|
else
|
|
|
|
rc = rdma_protocol_roce(device, port_num) ? 0 : -ENOSYS;
|
|
|
|
return rc;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_modify_port);
|
|
|
|
|
2007-05-14 11:26:51 +07:00
|
|
|
/**
|
|
|
|
* ib_find_gid - Returns the port number and GID table index where
|
2017-11-14 19:52:12 +07:00
|
|
|
* a specified GID value occurs. Its searches only for IB link layer.
|
2007-05-14 11:26:51 +07:00
|
|
|
* @device: The device to query.
|
|
|
|
* @gid: The GID value to search for.
|
|
|
|
* @port_num: The port number of the device where the GID value was found.
|
|
|
|
* @index: The index into the GID table where the GID was found. This
|
|
|
|
* parameter may be NULL.
|
|
|
|
*/
|
|
|
|
int ib_find_gid(struct ib_device *device, union ib_gid *gid,
|
2018-03-13 21:06:12 +07:00
|
|
|
u8 *port_num, u16 *index)
|
2007-05-14 11:26:51 +07:00
|
|
|
{
|
|
|
|
union ib_gid tmp_gid;
|
|
|
|
int ret, port, i;
|
|
|
|
|
2015-05-14 07:02:55 +07:00
|
|
|
for (port = rdma_start_port(device); port <= rdma_end_port(device); ++port) {
|
2018-03-25 17:40:22 +07:00
|
|
|
if (!rdma_protocol_ib(device, port))
|
2015-12-23 19:56:47 +07:00
|
|
|
continue;
|
|
|
|
|
2015-05-14 07:02:58 +07:00
|
|
|
for (i = 0; i < device->port_immutable[port].gid_tbl_len; ++i) {
|
2018-06-05 12:40:22 +07:00
|
|
|
ret = rdma_query_gid(device, port, i, &tmp_gid);
|
2007-05-14 11:26:51 +07:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
if (!memcmp(&tmp_gid, gid, sizeof *gid)) {
|
|
|
|
*port_num = port;
|
|
|
|
if (index)
|
|
|
|
*index = i;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_find_gid);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ib_find_pkey - Returns the PKey table index where a specified
|
|
|
|
* PKey value occurs.
|
|
|
|
* @device: The device to query.
|
|
|
|
* @port_num: The port number of the device to search for the PKey.
|
|
|
|
* @pkey: The PKey value to search for.
|
|
|
|
* @index: The index into the PKey table where the PKey was found.
|
|
|
|
*/
|
|
|
|
int ib_find_pkey(struct ib_device *device,
|
|
|
|
u8 port_num, u16 pkey, u16 *index)
|
|
|
|
{
|
|
|
|
int ret, i;
|
|
|
|
u16 tmp_pkey;
|
2012-08-03 15:40:38 +07:00
|
|
|
int partial_ix = -1;
|
2007-05-14 11:26:51 +07:00
|
|
|
|
2015-05-14 07:02:58 +07:00
|
|
|
for (i = 0; i < device->port_immutable[port_num].pkey_tbl_len; ++i) {
|
2007-05-14 11:26:51 +07:00
|
|
|
ret = ib_query_pkey(device, port_num, i, &tmp_pkey);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2007-07-23 14:07:42 +07:00
|
|
|
if ((pkey & 0x7fff) == (tmp_pkey & 0x7fff)) {
|
2012-08-03 15:40:38 +07:00
|
|
|
/* if there is full-member pkey take it.*/
|
|
|
|
if (tmp_pkey & 0x8000) {
|
|
|
|
*index = i;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (partial_ix < 0)
|
|
|
|
partial_ix = i;
|
2007-05-14 11:26:51 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-03 15:40:38 +07:00
|
|
|
/*no full-member, if exists take the limited*/
|
|
|
|
if (partial_ix >= 0) {
|
|
|
|
*index = partial_ix;
|
|
|
|
return 0;
|
|
|
|
}
|
2007-05-14 11:26:51 +07:00
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_find_pkey);
|
|
|
|
|
2015-07-30 21:50:15 +07:00
|
|
|
/**
|
|
|
|
* ib_get_net_dev_by_params() - Return the appropriate net_dev
|
|
|
|
* for a received CM request
|
|
|
|
* @dev: An RDMA device on which the request has been received.
|
|
|
|
* @port: Port number on the RDMA device.
|
|
|
|
* @pkey: The Pkey the request came on.
|
|
|
|
* @gid: A GID that the net_dev uses to communicate.
|
|
|
|
* @addr: Contains the IP address that the request specified as its
|
|
|
|
* destination.
|
2019-02-07 12:41:54 +07:00
|
|
|
*
|
2015-07-30 21:50:15 +07:00
|
|
|
*/
|
|
|
|
struct net_device *ib_get_net_dev_by_params(struct ib_device *dev,
|
|
|
|
u8 port,
|
|
|
|
u16 pkey,
|
|
|
|
const union ib_gid *gid,
|
|
|
|
const struct sockaddr *addr)
|
|
|
|
{
|
|
|
|
struct net_device *net_dev = NULL;
|
2019-02-07 12:41:53 +07:00
|
|
|
unsigned long index;
|
|
|
|
void *client_data;
|
2015-07-30 21:50:15 +07:00
|
|
|
|
|
|
|
if (!rdma_protocol_ib(dev, port))
|
|
|
|
return NULL;
|
|
|
|
|
2019-02-07 12:41:54 +07:00
|
|
|
/*
|
|
|
|
* Holding the read side guarantees that the client will not become
|
|
|
|
* unregistered while we are calling get_net_dev_by_params()
|
|
|
|
*/
|
|
|
|
down_read(&dev->client_data_rwsem);
|
2019-02-07 12:41:53 +07:00
|
|
|
xan_for_each_marked (&dev->client_data, index, client_data,
|
|
|
|
CLIENT_DATA_REGISTERED) {
|
|
|
|
struct ib_client *client = xa_load(&clients, index);
|
2015-07-30 21:50:15 +07:00
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
if (!client || !client->get_net_dev_by_params)
|
2015-07-30 21:50:15 +07:00
|
|
|
continue;
|
|
|
|
|
2019-02-07 12:41:53 +07:00
|
|
|
net_dev = client->get_net_dev_by_params(dev, port, pkey, gid,
|
|
|
|
addr, client_data);
|
|
|
|
if (net_dev)
|
|
|
|
break;
|
2015-07-30 21:50:15 +07:00
|
|
|
}
|
2019-02-07 12:41:54 +07:00
|
|
|
up_read(&dev->client_data_rwsem);
|
2015-07-30 21:50:15 +07:00
|
|
|
|
|
|
|
return net_dev;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_get_net_dev_by_params);
|
|
|
|
|
2018-12-11 02:09:30 +07:00
|
|
|
void ib_set_device_ops(struct ib_device *dev, const struct ib_device_ops *ops)
|
|
|
|
{
|
2018-12-11 02:09:48 +07:00
|
|
|
struct ib_device_ops *dev_ops = &dev->ops;
|
2018-12-11 02:09:30 +07:00
|
|
|
#define SET_DEVICE_OP(ptr, name) \
|
|
|
|
do { \
|
|
|
|
if (ops->name) \
|
|
|
|
if (!((ptr)->name)) \
|
|
|
|
(ptr)->name = ops->name; \
|
|
|
|
} while (0)
|
|
|
|
|
2019-02-03 19:55:50 +07:00
|
|
|
#define SET_OBJ_SIZE(ptr, name) SET_DEVICE_OP(ptr, size_##name)
|
|
|
|
|
2018-12-11 02:09:48 +07:00
|
|
|
SET_DEVICE_OP(dev_ops, add_gid);
|
2018-12-27 02:42:12 +07:00
|
|
|
SET_DEVICE_OP(dev_ops, advise_mr);
|
2018-12-11 02:09:48 +07:00
|
|
|
SET_DEVICE_OP(dev_ops, alloc_dm);
|
|
|
|
SET_DEVICE_OP(dev_ops, alloc_fmr);
|
|
|
|
SET_DEVICE_OP(dev_ops, alloc_hw_stats);
|
|
|
|
SET_DEVICE_OP(dev_ops, alloc_mr);
|
|
|
|
SET_DEVICE_OP(dev_ops, alloc_mw);
|
|
|
|
SET_DEVICE_OP(dev_ops, alloc_pd);
|
|
|
|
SET_DEVICE_OP(dev_ops, alloc_rdma_netdev);
|
|
|
|
SET_DEVICE_OP(dev_ops, alloc_ucontext);
|
|
|
|
SET_DEVICE_OP(dev_ops, alloc_xrcd);
|
|
|
|
SET_DEVICE_OP(dev_ops, attach_mcast);
|
|
|
|
SET_DEVICE_OP(dev_ops, check_mr_status);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_ah);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_counters);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_cq);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_flow);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_flow_action_esp);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_qp);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_rwq_ind_table);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_srq);
|
|
|
|
SET_DEVICE_OP(dev_ops, create_wq);
|
|
|
|
SET_DEVICE_OP(dev_ops, dealloc_dm);
|
|
|
|
SET_DEVICE_OP(dev_ops, dealloc_fmr);
|
|
|
|
SET_DEVICE_OP(dev_ops, dealloc_mw);
|
|
|
|
SET_DEVICE_OP(dev_ops, dealloc_pd);
|
|
|
|
SET_DEVICE_OP(dev_ops, dealloc_ucontext);
|
|
|
|
SET_DEVICE_OP(dev_ops, dealloc_xrcd);
|
|
|
|
SET_DEVICE_OP(dev_ops, del_gid);
|
|
|
|
SET_DEVICE_OP(dev_ops, dereg_mr);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_ah);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_counters);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_cq);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_flow);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_flow_action);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_qp);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_rwq_ind_table);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_srq);
|
|
|
|
SET_DEVICE_OP(dev_ops, destroy_wq);
|
|
|
|
SET_DEVICE_OP(dev_ops, detach_mcast);
|
|
|
|
SET_DEVICE_OP(dev_ops, disassociate_ucontext);
|
|
|
|
SET_DEVICE_OP(dev_ops, drain_rq);
|
|
|
|
SET_DEVICE_OP(dev_ops, drain_sq);
|
2019-01-30 17:49:02 +07:00
|
|
|
SET_DEVICE_OP(dev_ops, fill_res_entry);
|
2018-12-11 02:09:48 +07:00
|
|
|
SET_DEVICE_OP(dev_ops, get_dev_fw_str);
|
|
|
|
SET_DEVICE_OP(dev_ops, get_dma_mr);
|
|
|
|
SET_DEVICE_OP(dev_ops, get_hw_stats);
|
|
|
|
SET_DEVICE_OP(dev_ops, get_link_layer);
|
|
|
|
SET_DEVICE_OP(dev_ops, get_netdev);
|
|
|
|
SET_DEVICE_OP(dev_ops, get_port_immutable);
|
|
|
|
SET_DEVICE_OP(dev_ops, get_vector_affinity);
|
|
|
|
SET_DEVICE_OP(dev_ops, get_vf_config);
|
|
|
|
SET_DEVICE_OP(dev_ops, get_vf_stats);
|
2018-12-18 19:28:30 +07:00
|
|
|
SET_DEVICE_OP(dev_ops, init_port);
|
2018-12-11 02:09:48 +07:00
|
|
|
SET_DEVICE_OP(dev_ops, map_mr_sg);
|
|
|
|
SET_DEVICE_OP(dev_ops, map_phys_fmr);
|
|
|
|
SET_DEVICE_OP(dev_ops, mmap);
|
|
|
|
SET_DEVICE_OP(dev_ops, modify_ah);
|
|
|
|
SET_DEVICE_OP(dev_ops, modify_cq);
|
|
|
|
SET_DEVICE_OP(dev_ops, modify_device);
|
|
|
|
SET_DEVICE_OP(dev_ops, modify_flow_action_esp);
|
|
|
|
SET_DEVICE_OP(dev_ops, modify_port);
|
|
|
|
SET_DEVICE_OP(dev_ops, modify_qp);
|
|
|
|
SET_DEVICE_OP(dev_ops, modify_srq);
|
|
|
|
SET_DEVICE_OP(dev_ops, modify_wq);
|
|
|
|
SET_DEVICE_OP(dev_ops, peek_cq);
|
|
|
|
SET_DEVICE_OP(dev_ops, poll_cq);
|
|
|
|
SET_DEVICE_OP(dev_ops, post_recv);
|
|
|
|
SET_DEVICE_OP(dev_ops, post_send);
|
|
|
|
SET_DEVICE_OP(dev_ops, post_srq_recv);
|
|
|
|
SET_DEVICE_OP(dev_ops, process_mad);
|
|
|
|
SET_DEVICE_OP(dev_ops, query_ah);
|
|
|
|
SET_DEVICE_OP(dev_ops, query_device);
|
|
|
|
SET_DEVICE_OP(dev_ops, query_gid);
|
|
|
|
SET_DEVICE_OP(dev_ops, query_pkey);
|
|
|
|
SET_DEVICE_OP(dev_ops, query_port);
|
|
|
|
SET_DEVICE_OP(dev_ops, query_qp);
|
|
|
|
SET_DEVICE_OP(dev_ops, query_srq);
|
|
|
|
SET_DEVICE_OP(dev_ops, rdma_netdev_get_params);
|
|
|
|
SET_DEVICE_OP(dev_ops, read_counters);
|
|
|
|
SET_DEVICE_OP(dev_ops, reg_dm_mr);
|
|
|
|
SET_DEVICE_OP(dev_ops, reg_user_mr);
|
|
|
|
SET_DEVICE_OP(dev_ops, req_ncomp_notif);
|
|
|
|
SET_DEVICE_OP(dev_ops, req_notify_cq);
|
|
|
|
SET_DEVICE_OP(dev_ops, rereg_user_mr);
|
|
|
|
SET_DEVICE_OP(dev_ops, resize_cq);
|
|
|
|
SET_DEVICE_OP(dev_ops, set_vf_guid);
|
|
|
|
SET_DEVICE_OP(dev_ops, set_vf_link_state);
|
|
|
|
SET_DEVICE_OP(dev_ops, unmap_fmr);
|
2019-02-03 19:55:51 +07:00
|
|
|
|
|
|
|
SET_OBJ_SIZE(dev_ops, ib_pd);
|
2018-12-11 02:09:30 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ib_set_device_ops);
|
|
|
|
|
2017-12-06 03:30:04 +07:00
|
|
|
static const struct rdma_nl_cbs ibnl_ls_cb_table[RDMA_NL_LS_NUM_OPS] = {
|
2016-05-19 21:12:35 +07:00
|
|
|
[RDMA_NL_LS_OP_RESOLVE] = {
|
2017-06-15 18:20:39 +07:00
|
|
|
.doit = ib_nl_handle_resolve_resp,
|
2017-06-12 20:00:19 +07:00
|
|
|
.flags = RDMA_NL_ADMIN_PERM,
|
|
|
|
},
|
2016-05-19 21:12:35 +07:00
|
|
|
[RDMA_NL_LS_OP_SET_TIMEOUT] = {
|
2017-06-15 18:20:39 +07:00
|
|
|
.doit = ib_nl_handle_set_timeout,
|
2017-06-12 20:00:19 +07:00
|
|
|
.flags = RDMA_NL_ADMIN_PERM,
|
|
|
|
},
|
2016-05-19 21:12:36 +07:00
|
|
|
[RDMA_NL_LS_OP_IP_RESOLVE] = {
|
2017-06-15 18:20:39 +07:00
|
|
|
.doit = ib_nl_handle_ip_res_resp,
|
2017-06-12 20:00:19 +07:00
|
|
|
.flags = RDMA_NL_ADMIN_PERM,
|
|
|
|
},
|
2016-05-19 21:12:35 +07:00
|
|
|
};
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
static int __init ib_core_init(void)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2010-10-19 22:24:36 +07:00
|
|
|
ib_wq = alloc_workqueue("infiniband", 0, 0);
|
|
|
|
if (!ib_wq)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2015-12-12 02:53:03 +07:00
|
|
|
ib_comp_wq = alloc_workqueue("ib-comp-wq",
|
2017-03-09 03:03:17 +07:00
|
|
|
WQ_HIGHPRI | WQ_MEM_RECLAIM | WQ_SYSFS, 0);
|
2015-12-12 02:53:03 +07:00
|
|
|
if (!ib_comp_wq) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2018-08-27 12:35:55 +07:00
|
|
|
ib_comp_unbound_wq =
|
|
|
|
alloc_workqueue("ib-comp-unb-wq",
|
|
|
|
WQ_UNBOUND | WQ_HIGHPRI | WQ_MEM_RECLAIM |
|
|
|
|
WQ_SYSFS, WQ_UNBOUND_MAX_ACTIVE);
|
|
|
|
if (!ib_comp_unbound_wq) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto err_comp;
|
|
|
|
}
|
|
|
|
|
2015-08-05 04:23:34 +07:00
|
|
|
ret = class_register(&ib_class);
|
2011-05-21 01:46:10 +07:00
|
|
|
if (ret) {
|
2016-03-02 02:20:29 +07:00
|
|
|
pr_warn("Couldn't create InfiniBand device class\n");
|
2018-08-27 12:35:55 +07:00
|
|
|
goto err_comp_unbound;
|
2011-05-21 01:46:10 +07:00
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2017-06-05 14:20:11 +07:00
|
|
|
ret = rdma_nl_init();
|
2011-05-21 01:46:11 +07:00
|
|
|
if (ret) {
|
2017-06-05 14:20:11 +07:00
|
|
|
pr_warn("Couldn't init IB netlink interface: err %d\n", ret);
|
2011-05-21 01:46:11 +07:00
|
|
|
goto err_sysfs;
|
|
|
|
}
|
|
|
|
|
2016-05-19 21:12:31 +07:00
|
|
|
ret = addr_init();
|
|
|
|
if (ret) {
|
|
|
|
pr_warn("Could't init IB address resolution\n");
|
|
|
|
goto err_ibnl;
|
|
|
|
}
|
|
|
|
|
2016-05-19 21:12:32 +07:00
|
|
|
ret = ib_mad_init();
|
|
|
|
if (ret) {
|
|
|
|
pr_warn("Couldn't init IB MAD\n");
|
|
|
|
goto err_addr;
|
|
|
|
}
|
|
|
|
|
2016-05-19 21:12:33 +07:00
|
|
|
ret = ib_sa_init();
|
|
|
|
if (ret) {
|
|
|
|
pr_warn("Couldn't init SA\n");
|
|
|
|
goto err_mad;
|
|
|
|
}
|
|
|
|
|
2017-05-19 19:48:53 +07:00
|
|
|
ret = register_lsm_notifier(&ibdev_lsm_nb);
|
|
|
|
if (ret) {
|
|
|
|
pr_warn("Couldn't register LSM notifier. ret %d\n", ret);
|
2017-06-05 14:20:11 +07:00
|
|
|
goto err_sa;
|
2017-05-19 19:48:53 +07:00
|
|
|
}
|
|
|
|
|
2017-06-20 13:14:15 +07:00
|
|
|
nldev_init();
|
2017-06-05 14:20:11 +07:00
|
|
|
rdma_nl_register(RDMA_NL_LS, ibnl_ls_cb_table);
|
2018-05-29 09:32:40 +07:00
|
|
|
roce_gid_mgmt_init();
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2011-05-21 01:46:10 +07:00
|
|
|
return 0;
|
|
|
|
|
2016-05-19 21:12:35 +07:00
|
|
|
err_sa:
|
|
|
|
ib_sa_cleanup();
|
2016-05-19 21:12:33 +07:00
|
|
|
err_mad:
|
|
|
|
ib_mad_cleanup();
|
2016-05-19 21:12:32 +07:00
|
|
|
err_addr:
|
|
|
|
addr_cleanup();
|
2016-05-19 21:12:31 +07:00
|
|
|
err_ibnl:
|
2017-06-05 14:20:11 +07:00
|
|
|
rdma_nl_exit();
|
2011-05-21 01:46:10 +07:00
|
|
|
err_sysfs:
|
2015-08-05 04:23:34 +07:00
|
|
|
class_unregister(&ib_class);
|
2018-08-27 12:35:55 +07:00
|
|
|
err_comp_unbound:
|
|
|
|
destroy_workqueue(ib_comp_unbound_wq);
|
2015-12-12 02:53:03 +07:00
|
|
|
err_comp:
|
|
|
|
destroy_workqueue(ib_comp_wq);
|
2011-05-21 01:46:10 +07:00
|
|
|
err:
|
|
|
|
destroy_workqueue(ib_wq);
|
2005-04-17 05:20:36 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit ib_core_cleanup(void)
|
|
|
|
{
|
2018-05-29 09:32:40 +07:00
|
|
|
roce_gid_mgmt_cleanup();
|
2017-06-20 13:14:15 +07:00
|
|
|
nldev_exit();
|
2017-06-05 14:20:11 +07:00
|
|
|
rdma_nl_unregister(RDMA_NL_LS);
|
|
|
|
unregister_lsm_notifier(&ibdev_lsm_nb);
|
2016-05-19 21:12:33 +07:00
|
|
|
ib_sa_cleanup();
|
2016-05-19 21:12:32 +07:00
|
|
|
ib_mad_cleanup();
|
2016-05-19 21:12:31 +07:00
|
|
|
addr_cleanup();
|
2017-06-05 14:20:11 +07:00
|
|
|
rdma_nl_exit();
|
2015-08-05 04:23:34 +07:00
|
|
|
class_unregister(&ib_class);
|
2018-08-27 12:35:55 +07:00
|
|
|
destroy_workqueue(ib_comp_unbound_wq);
|
2015-12-12 02:53:03 +07:00
|
|
|
destroy_workqueue(ib_comp_wq);
|
2007-03-05 07:15:11 +07:00
|
|
|
/* Make sure that any pending umem accounting work is done. */
|
2010-10-19 22:24:36 +07:00
|
|
|
destroy_workqueue(ib_wq);
|
2019-02-07 12:41:52 +07:00
|
|
|
WARN_ON(!xa_empty(&clients));
|
2019-02-07 12:41:53 +07:00
|
|
|
WARN_ON(!xa_empty(&devices));
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2017-08-15 03:57:39 +07:00
|
|
|
MODULE_ALIAS_RDMA_NETLINK(RDMA_NL_LS, 4);
|
|
|
|
|
2017-11-27 20:39:05 +07:00
|
|
|
subsys_initcall(ib_core_init);
|
2005-04-17 05:20:36 +07:00
|
|
|
module_exit(ib_core_cleanup);
|