2 * Copyright (c) 2014 Chelsio, Inc. All rights reserved.
3 * Copyright (c) 2014 Intel Corporation. All rights reserved.
5 * This software is available to you under a choice of one of two
6 * licenses. You may choose to be licensed under the terms of the GNU
7 * General Public License (GPL) Version 2, available from the file
8 * COPYING in the main directory of this source tree, or the
9 * OpenIB.org BSD license below:
11 * Redistribution and use in source and binary forms, with or
12 * without modification, are permitted provided that the following
15 * - Redistributions of source code must retain the above
16 * copyright notice, this list of conditions and the following
19 * - Redistributions in binary form must reproduce the above
20 * copyright notice, this list of conditions and the following
21 * disclaimer in the documentation and/or other materials
22 * provided with the distribution.
24 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
25 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
26 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
27 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
28 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
29 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
30 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
34 #include "iwpm_util.h"
36 #define IWPM_MAPINFO_HASH_SIZE 512
37 #define IWPM_MAPINFO_HASH_MASK (IWPM_MAPINFO_HASH_SIZE - 1)
38 #define IWPM_REMINFO_HASH_SIZE 64
39 #define IWPM_REMINFO_HASH_MASK (IWPM_REMINFO_HASH_SIZE - 1)
40 #define IWPM_MSG_SIZE 512
42 static LIST_HEAD(iwpm_nlmsg_req_list);
43 static DEFINE_SPINLOCK(iwpm_nlmsg_req_lock);
45 static struct hlist_head *iwpm_hash_bucket;
46 static DEFINE_SPINLOCK(iwpm_mapinfo_lock);
48 static struct hlist_head *iwpm_reminfo_bucket;
49 static DEFINE_SPINLOCK(iwpm_reminfo_lock);
51 static DEFINE_MUTEX(iwpm_admin_lock);
52 static struct iwpm_admin_data iwpm_admin;
54 int iwpm_init(u8 nl_client)
57 if (iwpm_valid_client(nl_client))
59 mutex_lock(&iwpm_admin_lock);
60 if (atomic_read(&iwpm_admin.refcount) == 0) {
61 iwpm_hash_bucket = kzalloc(IWPM_MAPINFO_HASH_SIZE *
62 sizeof(struct hlist_head), GFP_KERNEL);
63 if (!iwpm_hash_bucket) {
67 iwpm_reminfo_bucket = kzalloc(IWPM_REMINFO_HASH_SIZE *
68 sizeof(struct hlist_head), GFP_KERNEL);
69 if (!iwpm_reminfo_bucket) {
70 kfree(iwpm_hash_bucket);
75 atomic_inc(&iwpm_admin.refcount);
77 mutex_unlock(&iwpm_admin_lock);
79 iwpm_set_valid(nl_client, 1);
80 iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
81 pr_debug("%s: Mapinfo and reminfo tables are created\n",
86 EXPORT_SYMBOL(iwpm_init);
88 static void free_hash_bucket(void);
89 static void free_reminfo_bucket(void);
91 int iwpm_exit(u8 nl_client)
94 if (!iwpm_valid_client(nl_client))
96 mutex_lock(&iwpm_admin_lock);
97 if (atomic_read(&iwpm_admin.refcount) == 0) {
98 mutex_unlock(&iwpm_admin_lock);
99 pr_err("%s Incorrect usage - negative refcount\n", __func__);
102 if (atomic_dec_and_test(&iwpm_admin.refcount)) {
104 free_reminfo_bucket();
105 pr_debug("%s: Resources are destroyed\n", __func__);
107 mutex_unlock(&iwpm_admin_lock);
108 iwpm_set_valid(nl_client, 0);
109 iwpm_set_registration(nl_client, IWPM_REG_UNDEF);
112 EXPORT_SYMBOL(iwpm_exit);
114 static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage *,
115 struct sockaddr_storage *);
117 int iwpm_create_mapinfo(struct sockaddr_storage *local_sockaddr,
118 struct sockaddr_storage *mapped_sockaddr,
121 struct hlist_head *hash_bucket_head;
122 struct iwpm_mapping_info *map_info;
126 if (!iwpm_valid_client(nl_client))
128 map_info = kzalloc(sizeof(struct iwpm_mapping_info), GFP_KERNEL);
132 memcpy(&map_info->local_sockaddr, local_sockaddr,
133 sizeof(struct sockaddr_storage));
134 memcpy(&map_info->mapped_sockaddr, mapped_sockaddr,
135 sizeof(struct sockaddr_storage));
136 map_info->nl_client = nl_client;
138 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
139 if (iwpm_hash_bucket) {
140 hash_bucket_head = get_mapinfo_hash_bucket(
141 &map_info->local_sockaddr,
142 &map_info->mapped_sockaddr);
143 if (hash_bucket_head) {
144 hlist_add_head(&map_info->hlist_node, hash_bucket_head);
148 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
151 EXPORT_SYMBOL(iwpm_create_mapinfo);
153 int iwpm_remove_mapinfo(struct sockaddr_storage *local_sockaddr,
154 struct sockaddr_storage *mapped_local_addr)
156 struct hlist_node *tmp_hlist_node;
157 struct hlist_head *hash_bucket_head;
158 struct iwpm_mapping_info *map_info = NULL;
162 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
163 if (iwpm_hash_bucket) {
164 hash_bucket_head = get_mapinfo_hash_bucket(
167 if (!hash_bucket_head)
168 goto remove_mapinfo_exit;
170 hlist_for_each_entry_safe(map_info, tmp_hlist_node,
171 hash_bucket_head, hlist_node) {
173 if (!iwpm_compare_sockaddr(&map_info->mapped_sockaddr,
174 mapped_local_addr)) {
176 hlist_del_init(&map_info->hlist_node);
184 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
187 EXPORT_SYMBOL(iwpm_remove_mapinfo);
189 static void free_hash_bucket(void)
191 struct hlist_node *tmp_hlist_node;
192 struct iwpm_mapping_info *map_info;
196 /* remove all the mapinfo data from the list */
197 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
198 for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
199 hlist_for_each_entry_safe(map_info, tmp_hlist_node,
200 &iwpm_hash_bucket[i], hlist_node) {
202 hlist_del_init(&map_info->hlist_node);
206 /* free the hash list */
207 kfree(iwpm_hash_bucket);
208 iwpm_hash_bucket = NULL;
209 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
212 static void free_reminfo_bucket(void)
214 struct hlist_node *tmp_hlist_node;
215 struct iwpm_remote_info *rem_info;
219 /* remove all the remote info from the list */
220 spin_lock_irqsave(&iwpm_reminfo_lock, flags);
221 for (i = 0; i < IWPM_REMINFO_HASH_SIZE; i++) {
222 hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
223 &iwpm_reminfo_bucket[i], hlist_node) {
225 hlist_del_init(&rem_info->hlist_node);
229 /* free the hash list */
230 kfree(iwpm_reminfo_bucket);
231 iwpm_reminfo_bucket = NULL;
232 spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
235 static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage *,
236 struct sockaddr_storage *);
238 void iwpm_add_remote_info(struct iwpm_remote_info *rem_info)
240 struct hlist_head *hash_bucket_head;
243 spin_lock_irqsave(&iwpm_reminfo_lock, flags);
244 if (iwpm_reminfo_bucket) {
245 hash_bucket_head = get_reminfo_hash_bucket(
246 &rem_info->mapped_loc_sockaddr,
247 &rem_info->mapped_rem_sockaddr);
248 if (hash_bucket_head)
249 hlist_add_head(&rem_info->hlist_node, hash_bucket_head);
251 spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
254 int iwpm_get_remote_info(struct sockaddr_storage *mapped_loc_addr,
255 struct sockaddr_storage *mapped_rem_addr,
256 struct sockaddr_storage *remote_addr,
259 struct hlist_node *tmp_hlist_node;
260 struct hlist_head *hash_bucket_head;
261 struct iwpm_remote_info *rem_info = NULL;
265 if (!iwpm_valid_client(nl_client)) {
266 pr_info("%s: Invalid client = %d\n", __func__, nl_client);
269 spin_lock_irqsave(&iwpm_reminfo_lock, flags);
270 if (iwpm_reminfo_bucket) {
271 hash_bucket_head = get_reminfo_hash_bucket(
274 if (!hash_bucket_head)
275 goto get_remote_info_exit;
276 hlist_for_each_entry_safe(rem_info, tmp_hlist_node,
277 hash_bucket_head, hlist_node) {
279 if (!iwpm_compare_sockaddr(&rem_info->mapped_loc_sockaddr,
281 !iwpm_compare_sockaddr(&rem_info->mapped_rem_sockaddr,
284 memcpy(remote_addr, &rem_info->remote_sockaddr,
285 sizeof(struct sockaddr_storage));
286 iwpm_print_sockaddr(remote_addr,
287 "get_remote_info: Remote sockaddr:");
289 hlist_del_init(&rem_info->hlist_node);
296 get_remote_info_exit:
297 spin_unlock_irqrestore(&iwpm_reminfo_lock, flags);
300 EXPORT_SYMBOL(iwpm_get_remote_info);
302 struct iwpm_nlmsg_request *iwpm_get_nlmsg_request(__u32 nlmsg_seq,
303 u8 nl_client, gfp_t gfp)
305 struct iwpm_nlmsg_request *nlmsg_request = NULL;
308 nlmsg_request = kzalloc(sizeof(struct iwpm_nlmsg_request), gfp);
312 spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
313 list_add_tail(&nlmsg_request->inprocess_list, &iwpm_nlmsg_req_list);
314 spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
316 kref_init(&nlmsg_request->kref);
317 kref_get(&nlmsg_request->kref);
318 nlmsg_request->nlmsg_seq = nlmsg_seq;
319 nlmsg_request->nl_client = nl_client;
320 nlmsg_request->request_done = 0;
321 nlmsg_request->err_code = 0;
322 sema_init(&nlmsg_request->sem, 1);
323 down(&nlmsg_request->sem);
324 return nlmsg_request;
327 void iwpm_free_nlmsg_request(struct kref *kref)
329 struct iwpm_nlmsg_request *nlmsg_request;
332 nlmsg_request = container_of(kref, struct iwpm_nlmsg_request, kref);
334 spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
335 list_del_init(&nlmsg_request->inprocess_list);
336 spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
338 if (!nlmsg_request->request_done)
339 pr_debug("%s Freeing incomplete nlmsg request (seq = %u).\n",
340 __func__, nlmsg_request->nlmsg_seq);
341 kfree(nlmsg_request);
344 struct iwpm_nlmsg_request *iwpm_find_nlmsg_request(__u32 echo_seq)
346 struct iwpm_nlmsg_request *nlmsg_request;
347 struct iwpm_nlmsg_request *found_request = NULL;
350 spin_lock_irqsave(&iwpm_nlmsg_req_lock, flags);
351 list_for_each_entry(nlmsg_request, &iwpm_nlmsg_req_list,
353 if (nlmsg_request->nlmsg_seq == echo_seq) {
354 found_request = nlmsg_request;
355 kref_get(&nlmsg_request->kref);
359 spin_unlock_irqrestore(&iwpm_nlmsg_req_lock, flags);
360 return found_request;
363 int iwpm_wait_complete_req(struct iwpm_nlmsg_request *nlmsg_request)
367 ret = down_timeout(&nlmsg_request->sem, IWPM_NL_TIMEOUT);
370 pr_info("%s: Timeout %d sec for netlink request (seq = %u)\n",
371 __func__, (IWPM_NL_TIMEOUT/HZ), nlmsg_request->nlmsg_seq);
373 ret = nlmsg_request->err_code;
375 kref_put(&nlmsg_request->kref, iwpm_free_nlmsg_request);
379 int iwpm_get_nlmsg_seq(void)
381 return atomic_inc_return(&iwpm_admin.nlmsg_seq);
384 int iwpm_valid_client(u8 nl_client)
386 if (nl_client >= RDMA_NL_NUM_CLIENTS)
388 return iwpm_admin.client_list[nl_client];
391 void iwpm_set_valid(u8 nl_client, int valid)
393 if (nl_client >= RDMA_NL_NUM_CLIENTS)
395 iwpm_admin.client_list[nl_client] = valid;
399 u32 iwpm_get_registration(u8 nl_client)
401 return iwpm_admin.reg_list[nl_client];
405 void iwpm_set_registration(u8 nl_client, u32 reg)
407 iwpm_admin.reg_list[nl_client] = reg;
411 u32 iwpm_check_registration(u8 nl_client, u32 reg)
413 return (iwpm_get_registration(nl_client) & reg);
416 int iwpm_compare_sockaddr(struct sockaddr_storage *a_sockaddr,
417 struct sockaddr_storage *b_sockaddr)
419 if (a_sockaddr->ss_family != b_sockaddr->ss_family)
421 if (a_sockaddr->ss_family == AF_INET) {
422 struct sockaddr_in *a4_sockaddr =
423 (struct sockaddr_in *)a_sockaddr;
424 struct sockaddr_in *b4_sockaddr =
425 (struct sockaddr_in *)b_sockaddr;
426 if (!memcmp(&a4_sockaddr->sin_addr,
427 &b4_sockaddr->sin_addr, sizeof(struct in_addr))
428 && a4_sockaddr->sin_port == b4_sockaddr->sin_port)
431 } else if (a_sockaddr->ss_family == AF_INET6) {
432 struct sockaddr_in6 *a6_sockaddr =
433 (struct sockaddr_in6 *)a_sockaddr;
434 struct sockaddr_in6 *b6_sockaddr =
435 (struct sockaddr_in6 *)b_sockaddr;
436 if (!memcmp(&a6_sockaddr->sin6_addr,
437 &b6_sockaddr->sin6_addr, sizeof(struct in6_addr))
438 && a6_sockaddr->sin6_port == b6_sockaddr->sin6_port)
442 pr_err("%s: Invalid sockaddr family\n", __func__);
447 struct sk_buff *iwpm_create_nlmsg(u32 nl_op, struct nlmsghdr **nlh,
450 struct sk_buff *skb = NULL;
452 skb = dev_alloc_skb(IWPM_MSG_SIZE);
454 pr_err("%s Unable to allocate skb\n", __func__);
455 goto create_nlmsg_exit;
457 if (!(ibnl_put_msg(skb, nlh, 0, 0, nl_client, nl_op,
459 pr_warn("%s: Unable to put the nlmsg header\n", __func__);
467 int iwpm_parse_nlmsg(struct netlink_callback *cb, int policy_max,
468 const struct nla_policy *nlmsg_policy,
469 struct nlattr *nltb[], const char *msg_type)
473 const char *err_str = "";
475 ret = nlmsg_validate(cb->nlh, nlh_len, policy_max-1, nlmsg_policy);
477 err_str = "Invalid attribute";
478 goto parse_nlmsg_error;
480 ret = nlmsg_parse(cb->nlh, nlh_len, nltb, policy_max-1, nlmsg_policy);
482 err_str = "Unable to parse the nlmsg";
483 goto parse_nlmsg_error;
485 ret = iwpm_validate_nlmsg_attr(nltb, policy_max);
487 err_str = "Invalid NULL attribute";
488 goto parse_nlmsg_error;
492 pr_warn("%s: %s (msg type %s ret = %d)\n",
493 __func__, err_str, msg_type, ret);
497 void iwpm_print_sockaddr(struct sockaddr_storage *sockaddr, char *msg)
499 struct sockaddr_in6 *sockaddr_v6;
500 struct sockaddr_in *sockaddr_v4;
502 switch (sockaddr->ss_family) {
504 sockaddr_v4 = (struct sockaddr_in *)sockaddr;
505 pr_debug("%s IPV4 %pI4: %u(0x%04X)\n",
506 msg, &sockaddr_v4->sin_addr,
507 ntohs(sockaddr_v4->sin_port),
508 ntohs(sockaddr_v4->sin_port));
511 sockaddr_v6 = (struct sockaddr_in6 *)sockaddr;
512 pr_debug("%s IPV6 %pI6: %u(0x%04X)\n",
513 msg, &sockaddr_v6->sin6_addr,
514 ntohs(sockaddr_v6->sin6_port),
515 ntohs(sockaddr_v6->sin6_port));
522 static u32 iwpm_ipv6_jhash(struct sockaddr_in6 *ipv6_sockaddr)
524 u32 ipv6_hash = jhash(&ipv6_sockaddr->sin6_addr, sizeof(struct in6_addr), 0);
525 u32 hash = jhash_2words(ipv6_hash, (__force u32) ipv6_sockaddr->sin6_port, 0);
529 static u32 iwpm_ipv4_jhash(struct sockaddr_in *ipv4_sockaddr)
531 u32 ipv4_hash = jhash(&ipv4_sockaddr->sin_addr, sizeof(struct in_addr), 0);
532 u32 hash = jhash_2words(ipv4_hash, (__force u32) ipv4_sockaddr->sin_port, 0);
536 static int get_hash_bucket(struct sockaddr_storage *a_sockaddr,
537 struct sockaddr_storage *b_sockaddr, u32 *hash)
541 if (a_sockaddr->ss_family == AF_INET) {
542 a_hash = iwpm_ipv4_jhash((struct sockaddr_in *) a_sockaddr);
543 b_hash = iwpm_ipv4_jhash((struct sockaddr_in *) b_sockaddr);
545 } else if (a_sockaddr->ss_family == AF_INET6) {
546 a_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) a_sockaddr);
547 b_hash = iwpm_ipv6_jhash((struct sockaddr_in6 *) b_sockaddr);
549 pr_err("%s: Invalid sockaddr family\n", __func__);
553 if (a_hash == b_hash) /* if port mapper isn't available */
556 *hash = jhash_2words(a_hash, b_hash, 0);
560 static struct hlist_head *get_mapinfo_hash_bucket(struct sockaddr_storage
561 *local_sockaddr, struct sockaddr_storage
567 ret = get_hash_bucket(local_sockaddr, mapped_sockaddr, &hash);
570 return &iwpm_hash_bucket[hash & IWPM_MAPINFO_HASH_MASK];
573 static struct hlist_head *get_reminfo_hash_bucket(struct sockaddr_storage
574 *mapped_loc_sockaddr, struct sockaddr_storage
575 *mapped_rem_sockaddr)
580 ret = get_hash_bucket(mapped_loc_sockaddr, mapped_rem_sockaddr, &hash);
583 return &iwpm_reminfo_bucket[hash & IWPM_REMINFO_HASH_MASK];
586 static int send_mapinfo_num(u32 mapping_num, u8 nl_client, int iwpm_pid)
588 struct sk_buff *skb = NULL;
589 struct nlmsghdr *nlh;
591 const char *err_str = "";
594 skb = iwpm_create_nlmsg(RDMA_NL_IWPM_MAPINFO_NUM, &nlh, nl_client);
596 err_str = "Unable to create a nlmsg";
597 goto mapinfo_num_error;
599 nlh->nlmsg_seq = iwpm_get_nlmsg_seq();
601 err_str = "Unable to put attribute of mapinfo number nlmsg";
602 ret = ibnl_put_attr(skb, nlh, sizeof(u32), &msg_seq, IWPM_NLA_MAPINFO_SEQ);
604 goto mapinfo_num_error;
605 ret = ibnl_put_attr(skb, nlh, sizeof(u32),
606 &mapping_num, IWPM_NLA_MAPINFO_SEND_NUM);
608 goto mapinfo_num_error;
609 ret = ibnl_unicast(skb, nlh, iwpm_pid);
612 err_str = "Unable to send a nlmsg";
613 goto mapinfo_num_error;
615 pr_debug("%s: Sent mapping number = %d\n", __func__, mapping_num);
618 pr_info("%s: %s\n", __func__, err_str);
624 static int send_nlmsg_done(struct sk_buff *skb, u8 nl_client, int iwpm_pid)
626 struct nlmsghdr *nlh = NULL;
631 if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
632 RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
633 pr_warn("%s Unable to put NLMSG_DONE\n", __func__);
637 nlh->nlmsg_type = NLMSG_DONE;
638 ret = ibnl_unicast(skb, (struct nlmsghdr *)skb->data, iwpm_pid);
640 pr_warn("%s Unable to send a nlmsg\n", __func__);
644 int iwpm_send_mapinfo(u8 nl_client, int iwpm_pid)
646 struct iwpm_mapping_info *map_info;
647 struct sk_buff *skb = NULL;
648 struct nlmsghdr *nlh;
649 int skb_num = 0, mapping_num = 0;
650 int i = 0, nlmsg_bytes = 0;
652 const char *err_str = "";
655 skb = dev_alloc_skb(NLMSG_GOODSIZE);
658 err_str = "Unable to allocate skb";
659 goto send_mapping_info_exit;
662 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
663 for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
664 hlist_for_each_entry(map_info, &iwpm_hash_bucket[i],
666 if (map_info->nl_client != nl_client)
669 if (!(ibnl_put_msg(skb, &nlh, 0, 0, nl_client,
670 RDMA_NL_IWPM_MAPINFO, NLM_F_MULTI))) {
672 err_str = "Unable to put the nlmsg header";
673 goto send_mapping_info_unlock;
675 err_str = "Unable to put attribute of the nlmsg";
676 ret = ibnl_put_attr(skb, nlh,
677 sizeof(struct sockaddr_storage),
678 &map_info->local_sockaddr,
679 IWPM_NLA_MAPINFO_LOCAL_ADDR);
681 goto send_mapping_info_unlock;
683 ret = ibnl_put_attr(skb, nlh,
684 sizeof(struct sockaddr_storage),
685 &map_info->mapped_sockaddr,
686 IWPM_NLA_MAPINFO_MAPPED_ADDR);
688 goto send_mapping_info_unlock;
690 iwpm_print_sockaddr(&map_info->local_sockaddr,
691 "send_mapping_info: Local sockaddr:");
692 iwpm_print_sockaddr(&map_info->mapped_sockaddr,
693 "send_mapping_info: Mapped local sockaddr:");
695 nlmsg_bytes += nlh->nlmsg_len;
697 /* check if all mappings can fit in one skb */
698 if (NLMSG_GOODSIZE - nlmsg_bytes < nlh->nlmsg_len * 2) {
699 /* and leave room for NLMSG_DONE */
702 spin_unlock_irqrestore(&iwpm_mapinfo_lock,
705 ret = send_nlmsg_done(skb, nl_client, iwpm_pid);
708 err_str = "Unable to send map info";
709 goto send_mapping_info_exit;
711 if (skb_num == IWPM_MAPINFO_SKB_COUNT) {
713 err_str = "Insufficient skbs for map info";
714 goto send_mapping_info_exit;
716 skb = dev_alloc_skb(NLMSG_GOODSIZE);
719 err_str = "Unable to allocate skb";
720 goto send_mapping_info_exit;
722 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
726 send_mapping_info_unlock:
727 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);
728 send_mapping_info_exit:
730 pr_warn("%s: %s (ret = %d)\n", __func__, err_str, ret);
735 send_nlmsg_done(skb, nl_client, iwpm_pid);
736 return send_mapinfo_num(mapping_num, nl_client, iwpm_pid);
739 int iwpm_mapinfo_available(void)
742 int full_bucket = 0, i = 0;
744 spin_lock_irqsave(&iwpm_mapinfo_lock, flags);
745 if (iwpm_hash_bucket) {
746 for (i = 0; i < IWPM_MAPINFO_HASH_SIZE; i++) {
747 if (!hlist_empty(&iwpm_hash_bucket[i])) {
753 spin_unlock_irqrestore(&iwpm_mapinfo_lock, flags);