|
Packit |
13e616 |
/*
|
|
Packit |
13e616 |
* Copyright (c) 2004-2009 Voltaire, Inc. All rights reserved.
|
|
Packit |
13e616 |
* Copyright (c) 2002-2011 Mellanox Technologies LTD. All rights reserved.
|
|
Packit |
13e616 |
* Copyright (c) 1996-2003 Intel Corporation. All rights reserved.
|
|
Packit |
13e616 |
* Copyright (c) 2013 Oracle and/or its affiliates. All rights reserved.
|
|
Packit |
13e616 |
*
|
|
Packit |
13e616 |
* This software is available to you under a choice of one of two
|
|
Packit |
13e616 |
* licenses. You may choose to be licensed under the terms of the GNU
|
|
Packit |
13e616 |
* General Public License (GPL) Version 2, available from the file
|
|
Packit |
13e616 |
* COPYING in the main directory of this source tree, or the
|
|
Packit |
13e616 |
* OpenIB.org BSD license below:
|
|
Packit |
13e616 |
*
|
|
Packit |
13e616 |
* Redistribution and use in source and binary forms, with or
|
|
Packit |
13e616 |
* without modification, are permitted provided that the following
|
|
Packit |
13e616 |
* conditions are met:
|
|
Packit |
13e616 |
*
|
|
Packit |
13e616 |
* - Redistributions of source code must retain the above
|
|
Packit |
13e616 |
* copyright notice, this list of conditions and the following
|
|
Packit |
13e616 |
* disclaimer.
|
|
Packit |
13e616 |
*
|
|
Packit |
13e616 |
* - Redistributions in binary form must reproduce the above
|
|
Packit |
13e616 |
* copyright notice, this list of conditions and the following
|
|
Packit |
13e616 |
* disclaimer in the documentation and/or other materials
|
|
Packit |
13e616 |
* provided with the distribution.
|
|
Packit |
13e616 |
*
|
|
Packit |
13e616 |
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
Packit |
13e616 |
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
Packit |
13e616 |
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
Packit |
13e616 |
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
Packit |
13e616 |
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
Packit |
13e616 |
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
Packit |
13e616 |
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
Packit |
13e616 |
* SOFTWARE.
|
|
Packit |
13e616 |
*
|
|
Packit |
13e616 |
*/
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/*
|
|
Packit |
13e616 |
* Abstract:
|
|
Packit |
13e616 |
* Implementation of osm_sr_rcv_t.
|
|
Packit |
13e616 |
* This object represents the ServiceRecord Receiver object.
|
|
Packit |
13e616 |
* This object is part of the opensm family of objects.
|
|
Packit |
13e616 |
*/
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
#if HAVE_CONFIG_H
|
|
Packit |
13e616 |
# include <config.h>
|
|
Packit |
13e616 |
#endif /* HAVE_CONFIG_H */
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
#include <string.h>
|
|
Packit |
13e616 |
#include <iba/ib_types.h>
|
|
Packit |
13e616 |
#include <complib/cl_qmap.h>
|
|
Packit |
13e616 |
#include <complib/cl_passivelock.h>
|
|
Packit |
13e616 |
#include <complib/cl_debug.h>
|
|
Packit |
13e616 |
#include <complib/cl_qlist.h>
|
|
Packit |
13e616 |
#include <opensm/osm_file_ids.h>
|
|
Packit |
13e616 |
#define FILE_ID OSM_FILE_SA_SERVICE_RECORD_C
|
|
Packit |
13e616 |
#include <vendor/osm_vendor_api.h>
|
|
Packit |
13e616 |
#include <opensm/osm_port.h>
|
|
Packit |
13e616 |
#include <opensm/osm_node.h>
|
|
Packit |
13e616 |
#include <opensm/osm_switch.h>
|
|
Packit |
13e616 |
#include <opensm/osm_helper.h>
|
|
Packit |
13e616 |
#include <opensm/osm_sa.h>
|
|
Packit |
13e616 |
#include <opensm/osm_service.h>
|
|
Packit |
13e616 |
#include <opensm/osm_pkey.h>
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
#define SA_SR_RESP_SIZE SA_ITEM_RESP_SIZE(service_rec)
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
typedef struct osm_sr_match_item {
|
|
Packit |
13e616 |
cl_qlist_t sr_list;
|
|
Packit |
13e616 |
ib_service_record_t *p_service_rec;
|
|
Packit |
13e616 |
ib_net64_t comp_mask;
|
|
Packit |
13e616 |
osm_sa_t *sa;
|
|
Packit |
13e616 |
} osm_sr_match_item_t;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
typedef struct osm_sr_search_ctxt {
|
|
Packit |
13e616 |
osm_sr_match_item_t *p_sr_item;
|
|
Packit |
13e616 |
const osm_physp_t *p_req_physp;
|
|
Packit |
13e616 |
} osm_sr_search_ctxt_t;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
static boolean_t
|
|
Packit |
13e616 |
match_service_pkey_with_ports_pkey(IN osm_sa_t * sa,
|
|
Packit |
13e616 |
IN const osm_madw_t * p_madw,
|
|
Packit |
13e616 |
ib_service_record_t * p_service_rec,
|
|
Packit |
13e616 |
ib_net64_t const comp_mask)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
boolean_t valid = TRUE;
|
|
Packit |
13e616 |
osm_physp_t *p_req_physp;
|
|
Packit |
13e616 |
ib_net64_t service_guid;
|
|
Packit |
13e616 |
osm_port_t *service_port;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* update the requester physical port */
|
|
Packit |
13e616 |
p_req_physp = osm_get_physp_by_mad_addr(sa->p_log, sa->p_subn,
|
|
Packit |
13e616 |
osm_madw_get_mad_addr_ptr
|
|
Packit |
13e616 |
(p_madw));
|
|
Packit |
13e616 |
if (p_req_physp == NULL) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_ERROR, "ERR 2404: "
|
|
Packit |
13e616 |
"Cannot find requester physical port\n");
|
|
Packit |
13e616 |
valid = FALSE;
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"Requester port GUID 0x%" PRIx64 "\n",
|
|
Packit |
13e616 |
cl_ntoh64(osm_physp_get_port_guid(p_req_physp)));
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if ((comp_mask & IB_SR_COMPMASK_SPKEY) == IB_SR_COMPMASK_SPKEY) {
|
|
Packit |
13e616 |
/* We have a ServiceP_Key - check matching on requester port,
|
|
Packit |
13e616 |
and ServiceGid port (if such exists) */
|
|
Packit |
13e616 |
/* Make sure it matches the p_req_physp */
|
|
Packit |
13e616 |
if (!osm_physp_has_pkey
|
|
Packit |
13e616 |
(sa->p_log, p_service_rec->service_pkey, p_req_physp)) {
|
|
Packit |
13e616 |
valid = FALSE;
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* If unicast, make sure it matches the port of the ServiceGid */
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SGID &&
|
|
Packit |
13e616 |
!ib_gid_is_multicast(&p_service_rec->service_gid)) {
|
|
Packit |
13e616 |
service_guid =
|
|
Packit |
13e616 |
p_service_rec->service_gid.unicast.interface_id;
|
|
Packit |
13e616 |
service_port =
|
|
Packit |
13e616 |
osm_get_port_by_alias_guid(sa->p_subn, service_guid);
|
|
Packit |
13e616 |
if (!service_port) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_ERROR, "ERR 2405: "
|
|
Packit |
13e616 |
"No port object for port 0x%016" PRIx64
|
|
Packit |
13e616 |
"\n", cl_ntoh64(service_guid));
|
|
Packit |
13e616 |
valid = FALSE;
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
/* check on the table of the default physical port of the service port */
|
|
Packit |
13e616 |
if (!osm_physp_has_pkey(sa->p_log,
|
|
Packit |
13e616 |
p_service_rec->service_pkey,
|
|
Packit |
13e616 |
service_port->p_physp)) {
|
|
Packit |
13e616 |
valid = FALSE;
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
Exit:
|
|
Packit |
13e616 |
return valid;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
static boolean_t
|
|
Packit |
13e616 |
match_name_to_key_association(IN osm_sa_t * sa,
|
|
Packit |
13e616 |
ib_service_record_t * p_service_rec,
|
|
Packit |
13e616 |
ib_net64_t comp_mask)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
UNUSED_PARAM(p_service_rec);
|
|
Packit |
13e616 |
UNUSED_PARAM(sa);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if ((comp_mask & (IB_SR_COMPMASK_SKEY | IB_SR_COMPMASK_SNAME)) ==
|
|
Packit |
13e616 |
(IB_SR_COMPMASK_SKEY | IB_SR_COMPMASK_SNAME)) {
|
|
Packit |
13e616 |
/* For now, we are not maintaining the ServiceAssociation record
|
|
Packit |
13e616 |
* so just return TRUE
|
|
Packit |
13e616 |
*/
|
|
Packit |
13e616 |
return TRUE;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
return TRUE;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
static boolean_t validate_sr(IN osm_sa_t * sa, IN const osm_madw_t * p_madw)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
boolean_t valid = TRUE;
|
|
Packit |
13e616 |
ib_sa_mad_t *p_sa_mad;
|
|
Packit |
13e616 |
ib_service_record_t *p_recvd_service_rec;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
OSM_LOG_ENTER(sa->p_log);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sa_mad = osm_madw_get_sa_mad_ptr(p_madw);
|
|
Packit |
13e616 |
p_recvd_service_rec =
|
|
Packit |
13e616 |
(ib_service_record_t *) ib_sa_mad_get_payload_ptr(p_sa_mad);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
valid = match_service_pkey_with_ports_pkey(sa, p_madw,
|
|
Packit |
13e616 |
p_recvd_service_rec,
|
|
Packit |
13e616 |
p_sa_mad->comp_mask);
|
|
Packit |
13e616 |
if (!valid) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"No Match for Service Pkey\n");
|
|
Packit |
13e616 |
valid = FALSE;
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
valid = match_name_to_key_association(sa, p_recvd_service_rec,
|
|
Packit |
13e616 |
p_sa_mad->comp_mask);
|
|
Packit |
13e616 |
if (!valid) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"Service Record Name to key matching failed\n");
|
|
Packit |
13e616 |
valid = FALSE;
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
Exit:
|
|
Packit |
13e616 |
OSM_LOG_EXIT(sa->p_log);
|
|
Packit |
13e616 |
return valid;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
static void sr_rcv_respond(IN osm_sa_t * sa, IN osm_madw_t * p_madw,
|
|
Packit |
13e616 |
IN cl_qlist_t * p_list)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
/* p923 - The ServiceKey shall be set to 0, except in the case of
|
|
Packit |
13e616 |
a trusted request.
|
|
Packit |
13e616 |
Note: In the mad controller we check that the SM_Key received on
|
|
Packit |
13e616 |
the mad is valid. Meaning - is either zero or equal to the local
|
|
Packit |
13e616 |
sm_key.
|
|
Packit |
13e616 |
*/
|
|
Packit |
13e616 |
if (!osm_madw_get_sa_mad_ptr(p_madw)->sm_key) {
|
|
Packit |
13e616 |
osm_sa_item_t *item;
|
|
Packit |
13e616 |
for (item = (osm_sa_item_t *) cl_qlist_head(p_list);
|
|
Packit |
13e616 |
item != (osm_sa_item_t *) cl_qlist_end(p_list);
|
|
Packit |
13e616 |
item = (osm_sa_item_t *) cl_qlist_next(&item->list_item))
|
|
Packit |
13e616 |
memset(item->resp.service_rec.service_key, 0,
|
|
Packit |
13e616 |
sizeof(item->resp.service_rec.service_key));
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
osm_sa_respond(sa, p_madw, sizeof(ib_service_record_t), p_list);
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
static void get_matching_sr(IN cl_list_item_t * p_list_item, IN void *context)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
osm_sr_search_ctxt_t *p_ctxt = context;
|
|
Packit |
13e616 |
osm_svcr_t *p_svcr = (osm_svcr_t *) p_list_item;
|
|
Packit |
13e616 |
osm_sa_item_t *p_sr_pool_item;
|
|
Packit |
13e616 |
osm_sr_match_item_t *p_sr_item = p_ctxt->p_sr_item;
|
|
Packit |
13e616 |
ib_net64_t comp_mask = p_sr_item->comp_mask;
|
|
Packit |
13e616 |
const osm_physp_t *p_req_physp = p_ctxt->p_req_physp;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SID) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_id !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_id)
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SGID) {
|
|
Packit |
13e616 |
if (memcmp(&p_sr_item->p_service_rec->service_gid,
|
|
Packit |
13e616 |
&p_svcr->service_record.service_gid,
|
|
Packit |
13e616 |
sizeof(p_svcr->service_record.service_gid)) != 0)
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SPKEY) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_pkey !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_pkey)
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SKEY) {
|
|
Packit |
13e616 |
if (memcmp(p_sr_item->p_service_rec->service_key,
|
|
Packit |
13e616 |
p_svcr->service_record.service_key,
|
|
Packit |
13e616 |
16 * sizeof(uint8_t)))
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SNAME) {
|
|
Packit |
13e616 |
if (memcmp(p_sr_item->p_service_rec->service_name,
|
|
Packit |
13e616 |
p_svcr->service_record.service_name,
|
|
Packit |
13e616 |
sizeof(p_svcr->service_record.service_name)) != 0)
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_0) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[0] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[0])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_1) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[1] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[1])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_2) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[2] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[2])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_3) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[3] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[3])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_4) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[4] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[4])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_5) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[5] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[5])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_6) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[6] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[6])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_7) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[7] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[7])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_8) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[8] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[8])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_9) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[9] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[9])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_10) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[10] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[10])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_11) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[11] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[11])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_12) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[12] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[12])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_13) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[13] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[13])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_14) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[14] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[14])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA8_15) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data8[15] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data8[15])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA16_0) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data16[0] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data16[0])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA16_1) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data16[1] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data16[1])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA16_2) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data16[2] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data16[2])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA16_3) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data16[3] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data16[3])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA16_4) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data16[4] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data16[4])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA16_5) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data16[5] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data16[5])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA16_6) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data16[6] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data16[6])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA16_7) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data16[7] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data16[7])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA32_0) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data32[0] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data32[0])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA32_1) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data32[1] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data32[1])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA32_2) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data32[2] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data32[2])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA32_3) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data32[3] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data32[3])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA64_0) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data64[0] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data64[0])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
if (comp_mask & IB_SR_COMPMASK_SDATA64_1) {
|
|
Packit |
13e616 |
if (p_sr_item->p_service_rec->service_data64[1] !=
|
|
Packit |
13e616 |
p_svcr->service_record.service_data64[1])
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* Check that the requester port has the pkey which is the service_pkey.
|
|
Packit |
13e616 |
If not - then it cannot receive this ServiceRecord. */
|
|
Packit |
13e616 |
/* The check is relevant only if the service_pkey is valid */
|
|
Packit |
13e616 |
if (!ib_pkey_is_invalid(p_svcr->service_record.service_pkey)) {
|
|
Packit |
13e616 |
if (!osm_physp_has_pkey(p_sr_item->sa->p_log,
|
|
Packit |
13e616 |
p_svcr->service_record.service_pkey,
|
|
Packit |
13e616 |
p_req_physp)) {
|
|
Packit |
13e616 |
OSM_LOG(p_sr_item->sa->p_log, OSM_LOG_VERBOSE,
|
|
Packit |
13e616 |
"requester port doesn't have the service_pkey: 0x%X\n",
|
|
Packit |
13e616 |
cl_ntoh16(p_svcr->service_record.service_pkey));
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sr_pool_item = malloc(SA_SR_RESP_SIZE);
|
|
Packit |
13e616 |
if (p_sr_pool_item == NULL) {
|
|
Packit |
13e616 |
OSM_LOG(p_sr_item->sa->p_log, OSM_LOG_ERROR, "ERR 2408: "
|
|
Packit |
13e616 |
"Unable to acquire Service Record from pool\n");
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sr_pool_item->resp.service_rec = p_svcr->service_record;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
cl_qlist_insert_tail(&p_sr_item->sr_list, &p_sr_pool_item->list_item);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
Exit:
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
static void sr_rcv_process_get_method(osm_sa_t * sa, IN osm_madw_t * p_madw)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
ib_sa_mad_t *p_sa_mad;
|
|
Packit |
13e616 |
ib_service_record_t *p_recvd_service_rec;
|
|
Packit |
13e616 |
osm_sr_match_item_t sr_match_item;
|
|
Packit |
13e616 |
osm_sr_search_ctxt_t context;
|
|
Packit |
13e616 |
osm_physp_t *p_req_physp;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
OSM_LOG_ENTER(sa->p_log);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
CL_ASSERT(p_madw);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* Grab the lock */
|
|
Packit |
13e616 |
cl_plock_acquire(sa->p_lock);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* update the requester physical port */
|
|
Packit |
13e616 |
p_req_physp = osm_get_physp_by_mad_addr(sa->p_log, sa->p_subn,
|
|
Packit |
13e616 |
osm_madw_get_mad_addr_ptr
|
|
Packit |
13e616 |
(p_madw));
|
|
Packit |
13e616 |
if (p_req_physp == NULL) {
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_ERROR, "ERR 2409: "
|
|
Packit |
13e616 |
"Cannot find requester physical port\n");
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sa_mad = osm_madw_get_sa_mad_ptr(p_madw);
|
|
Packit |
13e616 |
p_recvd_service_rec =
|
|
Packit |
13e616 |
(ib_service_record_t *) ib_sa_mad_get_payload_ptr(p_sa_mad);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (OSM_LOG_IS_ACTIVE_V2(sa->p_log, OSM_LOG_DEBUG)) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"Requester port GUID 0x%" PRIx64 "\n",
|
|
Packit |
13e616 |
cl_ntoh64(osm_physp_get_port_guid(p_req_physp)));
|
|
Packit |
13e616 |
osm_dump_service_record_v2(sa->p_log, p_recvd_service_rec,
|
|
Packit |
13e616 |
FILE_ID, OSM_LOG_DEBUG);
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
cl_qlist_init(&sr_match_item.sr_list);
|
|
Packit |
13e616 |
sr_match_item.p_service_rec = p_recvd_service_rec;
|
|
Packit |
13e616 |
sr_match_item.comp_mask = p_sa_mad->comp_mask;
|
|
Packit |
13e616 |
sr_match_item.sa = sa;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
context.p_sr_item = &sr_match_item;
|
|
Packit |
13e616 |
context.p_req_physp = p_req_physp;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
cl_qlist_apply_func(&sa->p_subn->sa_sr_list, get_matching_sr, &context);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (p_sa_mad->method == IB_MAD_METHOD_GET &&
|
|
Packit |
13e616 |
cl_qlist_count(&sr_match_item.sr_list) == 0) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"No records matched the Service Record query\n");
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw, IB_SA_MAD_STATUS_NO_RECORDS);
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
sr_rcv_respond(sa, p_madw, &sr_match_item.sr_list);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
Exit:
|
|
Packit |
13e616 |
OSM_LOG_EXIT(sa->p_log);
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
static void sr_rcv_process_set_method(osm_sa_t * sa, IN osm_madw_t * p_madw)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
ib_sa_mad_t *p_sa_mad;
|
|
Packit |
13e616 |
ib_service_record_t *p_recvd_service_rec;
|
|
Packit |
13e616 |
ib_net64_t comp_mask;
|
|
Packit |
13e616 |
osm_svcr_t *p_svcr;
|
|
Packit |
13e616 |
osm_sa_item_t *p_sr_item;
|
|
Packit |
13e616 |
cl_qlist_t sr_list;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
OSM_LOG_ENTER(sa->p_log);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
CL_ASSERT(p_madw);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sa_mad = osm_madw_get_sa_mad_ptr(p_madw);
|
|
Packit |
13e616 |
p_recvd_service_rec =
|
|
Packit |
13e616 |
(ib_service_record_t *) ib_sa_mad_get_payload_ptr(p_sa_mad);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
comp_mask = p_sa_mad->comp_mask;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (OSM_LOG_IS_ACTIVE_V2(sa->p_log, OSM_LOG_DEBUG))
|
|
Packit |
13e616 |
osm_dump_service_record_v2(sa->p_log, p_recvd_service_rec,
|
|
Packit |
13e616 |
FILE_ID, OSM_LOG_DEBUG);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if ((comp_mask & (IB_SR_COMPMASK_SID | IB_SR_COMPMASK_SGID)) !=
|
|
Packit |
13e616 |
(IB_SR_COMPMASK_SID | IB_SR_COMPMASK_SGID)) {
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_VERBOSE,
|
|
Packit |
13e616 |
"Component Mask RID check failed for METHOD_SET\n");
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw, IB_SA_MAD_STATUS_REQ_INVALID);
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* if we were not provided with a service lease make it infinite */
|
|
Packit |
13e616 |
if (!(comp_mask & IB_SR_COMPMASK_SLEASE)) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"ServiceLease Component Mask not set - using infinite lease\n");
|
|
Packit |
13e616 |
p_recvd_service_rec->service_lease = 0xFFFFFFFF;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* If Record exists with matching RID */
|
|
Packit |
13e616 |
p_svcr = osm_svcr_get_by_rid(sa->p_subn, sa->p_log,
|
|
Packit |
13e616 |
p_recvd_service_rec);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (p_svcr == NULL) {
|
|
Packit |
13e616 |
/* Create the instance of the osm_svcr_t object */
|
|
Packit |
13e616 |
p_svcr = osm_svcr_new(p_recvd_service_rec);
|
|
Packit |
13e616 |
if (p_svcr == NULL) {
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_ERROR, "ERR 2411: "
|
|
Packit |
13e616 |
"Failed to create new service record\n");
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw,
|
|
Packit |
13e616 |
IB_SA_MAD_STATUS_NO_RESOURCES);
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* Add this new osm_svcr_t object to subnet object */
|
|
Packit |
13e616 |
osm_svcr_insert_to_db(sa->p_subn, sa->p_log, p_svcr);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
} else /* Update the old instance of the osm_svcr_t object */
|
|
Packit |
13e616 |
osm_svcr_init(p_svcr, p_recvd_service_rec);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (p_recvd_service_rec->service_lease != 0xFFFFFFFF) {
|
|
Packit |
13e616 |
#if 0
|
|
Packit |
13e616 |
cl_timer_trim(&sa->sr_timer,
|
|
Packit |
13e616 |
p_recvd_service_rec->service_lease * 1000);
|
|
Packit |
13e616 |
#endif
|
|
Packit |
13e616 |
/* This was a bug since no check was made to see if too long */
|
|
Packit |
13e616 |
/* just make sure the timer works - get a call back within a second */
|
|
Packit |
13e616 |
cl_timer_trim(&sa->sr_timer, 1000);
|
|
Packit |
13e616 |
p_svcr->modified_time = cl_get_time_stamp_sec();
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sr_item = malloc(SA_SR_RESP_SIZE);
|
|
Packit |
13e616 |
if (p_sr_item == NULL) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_ERROR, "ERR 2412: "
|
|
Packit |
13e616 |
"Unable to acquire Service record\n");
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw, IB_SA_MAD_STATUS_NO_RESOURCES);
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if ((comp_mask & IB_SR_COMPMASK_SPKEY) != IB_SR_COMPMASK_SPKEY)
|
|
Packit |
13e616 |
/* Set the Default Service P_Key in the response */
|
|
Packit |
13e616 |
p_recvd_service_rec->service_pkey = IB_DEFAULT_PKEY;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sr_item->resp.service_rec = *p_recvd_service_rec;
|
|
Packit |
13e616 |
cl_qlist_init(&sr_list);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
cl_qlist_insert_tail(&sr_list, &p_sr_item->list_item);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
sr_rcv_respond(sa, p_madw, &sr_list);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
Exit:
|
|
Packit |
13e616 |
OSM_LOG_EXIT(sa->p_log);
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
static void sr_rcv_process_delete_method(osm_sa_t * sa, IN osm_madw_t * p_madw)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
ib_sa_mad_t *p_sa_mad;
|
|
Packit |
13e616 |
ib_service_record_t *p_recvd_service_rec;
|
|
Packit |
13e616 |
osm_svcr_t *p_svcr;
|
|
Packit |
13e616 |
osm_sa_item_t *p_sr_item;
|
|
Packit |
13e616 |
cl_qlist_t sr_list;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
OSM_LOG_ENTER(sa->p_log);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
CL_ASSERT(p_madw);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sa_mad = osm_madw_get_sa_mad_ptr(p_madw);
|
|
Packit |
13e616 |
p_recvd_service_rec =
|
|
Packit |
13e616 |
(ib_service_record_t *) ib_sa_mad_get_payload_ptr(p_sa_mad);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (OSM_LOG_IS_ACTIVE_V2(sa->p_log, OSM_LOG_DEBUG))
|
|
Packit |
13e616 |
osm_dump_service_record_v2(sa->p_log, p_recvd_service_rec,
|
|
Packit |
13e616 |
FILE_ID, OSM_LOG_DEBUG);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* If Record exists with matching RID */
|
|
Packit |
13e616 |
p_svcr = osm_svcr_get_by_rid(sa->p_subn, sa->p_log,
|
|
Packit |
13e616 |
p_recvd_service_rec);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (p_svcr == NULL) {
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"No records matched the RID\n");
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw, IB_SA_MAD_STATUS_NO_RECORDS);
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
osm_svcr_remove_from_db(sa->p_subn, sa->p_log, p_svcr);
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sr_item = malloc(SA_SR_RESP_SIZE);
|
|
Packit |
13e616 |
if (p_sr_item == NULL) {
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_ERROR, "ERR 2413: "
|
|
Packit |
13e616 |
"Unable to acquire Service record\n");
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw, IB_SA_MAD_STATUS_NO_RESOURCES);
|
|
Packit |
13e616 |
osm_svcr_delete(p_svcr);
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* provide back the copy of the record */
|
|
Packit |
13e616 |
p_sr_item->resp.service_rec = p_svcr->service_record;
|
|
Packit |
13e616 |
cl_qlist_init(&sr_list);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
cl_qlist_insert_tail(&sr_list, &p_sr_item->list_item);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
osm_svcr_delete(p_svcr);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
sr_rcv_respond(sa, p_madw, &sr_list);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
Exit:
|
|
Packit |
13e616 |
OSM_LOG_EXIT(sa->p_log);
|
|
Packit |
13e616 |
return;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
void osm_sr_rcv_process(IN void *context, IN void *data)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
osm_sa_t *sa = context;
|
|
Packit |
13e616 |
osm_madw_t *p_madw = data;
|
|
Packit |
13e616 |
ib_sa_mad_t *p_sa_mad;
|
|
Packit |
13e616 |
boolean_t valid;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
OSM_LOG_ENTER(sa->p_log);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
CL_ASSERT(p_madw);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_sa_mad = osm_madw_get_sa_mad_ptr(p_madw);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
CL_ASSERT(p_sa_mad->attr_id == IB_MAD_ATTR_SERVICE_RECORD);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
switch (p_sa_mad->method) {
|
|
Packit |
13e616 |
case IB_MAD_METHOD_SET:
|
|
Packit |
13e616 |
cl_plock_excl_acquire(sa->p_lock);
|
|
Packit |
13e616 |
valid = validate_sr(sa, p_madw);
|
|
Packit |
13e616 |
if (!valid) {
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_VERBOSE,
|
|
Packit |
13e616 |
"Component Mask check failed for set request\n");
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw,
|
|
Packit |
13e616 |
IB_SA_MAD_STATUS_REQ_INVALID);
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
sr_rcv_process_set_method(sa, p_madw);
|
|
Packit |
13e616 |
break;
|
|
Packit |
13e616 |
case IB_MAD_METHOD_DELETE:
|
|
Packit |
13e616 |
cl_plock_excl_acquire(sa->p_lock);
|
|
Packit |
13e616 |
valid = validate_sr(sa, p_madw);
|
|
Packit |
13e616 |
if (!valid) {
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"Component Mask check failed for delete request\n");
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw,
|
|
Packit |
13e616 |
IB_SA_MAD_STATUS_REQ_INVALID);
|
|
Packit |
13e616 |
goto Exit;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
sr_rcv_process_delete_method(sa, p_madw);
|
|
Packit |
13e616 |
break;
|
|
Packit |
13e616 |
case IB_MAD_METHOD_GET:
|
|
Packit |
13e616 |
case IB_MAD_METHOD_GETTABLE:
|
|
Packit |
13e616 |
sr_rcv_process_get_method(sa, p_madw);
|
|
Packit |
13e616 |
break;
|
|
Packit |
13e616 |
default:
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"Unsupported Method (%s) for ServiceRecord request\n",
|
|
Packit |
13e616 |
ib_get_sa_method_str(p_sa_mad->method));
|
|
Packit |
13e616 |
osm_sa_send_error(sa, p_madw, IB_MAD_STATUS_UNSUP_METHOD_ATTR);
|
|
Packit |
13e616 |
break;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
Exit:
|
|
Packit |
13e616 |
OSM_LOG_EXIT(sa->p_log);
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
void osm_sr_rcv_lease_cb(IN void *context)
|
|
Packit |
13e616 |
{
|
|
Packit |
13e616 |
osm_sa_t *sa = context;
|
|
Packit |
13e616 |
cl_list_item_t *p_list_item;
|
|
Packit |
13e616 |
cl_list_item_t *p_next_list_item;
|
|
Packit |
13e616 |
osm_svcr_t *p_svcr;
|
|
Packit |
13e616 |
uint32_t curr_time;
|
|
Packit |
13e616 |
uint32_t elapsed_time;
|
|
Packit |
13e616 |
uint32_t trim_time = 20; /* maxiaml timer refresh is 20 seconds */
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
OSM_LOG_ENTER(sa->p_log);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
cl_plock_excl_acquire(sa->p_lock);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_list_item = cl_qlist_head(&sa->p_subn->sa_sr_list);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
while (p_list_item != cl_qlist_end(&sa->p_subn->sa_sr_list)) {
|
|
Packit |
13e616 |
p_svcr = (osm_svcr_t *) p_list_item;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (p_svcr->service_record.service_lease == 0xFFFFFFFF) {
|
|
Packit |
13e616 |
p_list_item = cl_qlist_next(p_list_item);
|
|
Packit |
13e616 |
continue;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* current time in seconds */
|
|
Packit |
13e616 |
curr_time = cl_get_time_stamp_sec();
|
|
Packit |
13e616 |
/* elapsed time from last modify */
|
|
Packit |
13e616 |
elapsed_time = curr_time - p_svcr->modified_time;
|
|
Packit |
13e616 |
/* but it can not be less then 1 */
|
|
Packit |
13e616 |
if (elapsed_time < 1)
|
|
Packit |
13e616 |
elapsed_time = 1;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (elapsed_time < p_svcr->lease_period) {
|
|
Packit |
13e616 |
/*
|
|
Packit |
13e616 |
Just update the service lease period
|
|
Packit |
13e616 |
note: for simplicity we work with a uint32_t field
|
|
Packit |
13e616 |
external to the network order lease_period of the MAD
|
|
Packit |
13e616 |
*/
|
|
Packit |
13e616 |
p_svcr->lease_period -= elapsed_time;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
OSM_LOG(sa->p_log, OSM_LOG_DEBUG,
|
|
Packit |
13e616 |
"Remaining time for Service Name:%s is:0x%X\n",
|
|
Packit |
13e616 |
p_svcr->service_record.service_name,
|
|
Packit |
13e616 |
p_svcr->lease_period);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_svcr->modified_time = curr_time;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* Update the trim timer */
|
|
Packit |
13e616 |
if (trim_time > p_svcr->lease_period) {
|
|
Packit |
13e616 |
trim_time = p_svcr->lease_period;
|
|
Packit |
13e616 |
if (trim_time < 1)
|
|
Packit |
13e616 |
trim_time = 1;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_list_item = cl_qlist_next(p_list_item);
|
|
Packit |
13e616 |
continue;
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
} else {
|
|
Packit |
13e616 |
p_next_list_item = cl_qlist_next(p_list_item);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* Remove the service Record */
|
|
Packit |
13e616 |
osm_svcr_remove_from_db(sa->p_subn, sa->p_log, p_svcr);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
osm_svcr_delete(p_svcr);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
p_list_item = p_next_list_item;
|
|
Packit |
13e616 |
continue;
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
/* Release the Lock */
|
|
Packit |
13e616 |
cl_plock_release(sa->p_lock);
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
if (trim_time != 0xFFFFFFFF) {
|
|
Packit |
13e616 |
cl_timer_trim(&sa->sr_timer, trim_time * 1000); /* Convert to milli seconds */
|
|
Packit |
13e616 |
}
|
|
Packit |
13e616 |
|
|
Packit |
13e616 |
OSM_LOG_EXIT(sa->p_log);
|
|
Packit |
13e616 |
}
|