1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #include <sys/cpuvar.h> 27 #include <sys/types.h> 28 #include <sys/conf.h> 29 #include <sys/stat.h> 30 #include <sys/file.h> 31 #include <sys/ddi.h> 32 #include <sys/sunddi.h> 33 #include <sys/modctl.h> 34 #include <sys/sysmacros.h> 35 #include <sys/socket.h> 36 #include <sys/strsubr.h> 37 #include <sys/nvpair.h> 38 39 #include <sys/stmf.h> 40 #include <sys/stmf_ioctl.h> 41 #include <sys/portif.h> 42 #include <sys/idm/idm.h> 43 #include <sys/idm/idm_conn_sm.h> 44 #include <iscsit_isns.h> 45 #include <iscsit.h> 46 47 #define ISCSIT_VERSION BUILD_DATE "-1.18dev" 48 #define ISCSIT_NAME_VERSION "COMSTAR ISCSIT v" ISCSIT_VERSION 49 50 /* 51 * DDI entry points. 52 */ 53 static int iscsit_drv_attach(dev_info_t *, ddi_attach_cmd_t); 54 static int iscsit_drv_detach(dev_info_t *, ddi_detach_cmd_t); 55 static int iscsit_drv_getinfo(dev_info_t *, ddi_info_cmd_t, void *, void **); 56 static int iscsit_drv_open(dev_t *, int, int, cred_t *); 57 static int iscsit_drv_close(dev_t, int, int, cred_t *); 58 static boolean_t iscsit_drv_busy(void); 59 static int iscsit_drv_ioctl(dev_t, int, intptr_t, int, cred_t *, int *); 60 61 extern struct mod_ops mod_miscops; 62 63 64 static struct cb_ops iscsit_cb_ops = { 65 iscsit_drv_open, /* cb_open */ 66 iscsit_drv_close, /* cb_close */ 67 nodev, /* cb_strategy */ 68 nodev, /* cb_print */ 69 nodev, /* cb_dump */ 70 nodev, /* cb_read */ 71 nodev, /* cb_write */ 72 iscsit_drv_ioctl, /* cb_ioctl */ 73 nodev, /* cb_devmap */ 74 nodev, /* cb_mmap */ 75 nodev, /* cb_segmap */ 76 nochpoll, /* cb_chpoll */ 77 ddi_prop_op, /* cb_prop_op */ 78 NULL, /* cb_streamtab */ 79 D_MP, /* cb_flag */ 80 CB_REV, /* cb_rev */ 81 nodev, /* cb_aread */ 82 nodev, /* cb_awrite */ 83 }; 84 85 static struct dev_ops iscsit_dev_ops = { 86 DEVO_REV, /* devo_rev */ 87 0, /* devo_refcnt */ 88 iscsit_drv_getinfo, /* devo_getinfo */ 89 nulldev, /* devo_identify */ 90 nulldev, /* devo_probe */ 91 iscsit_drv_attach, /* devo_attach */ 92 iscsit_drv_detach, /* devo_detach */ 93 nodev, /* devo_reset */ 94 &iscsit_cb_ops, /* devo_cb_ops */ 95 NULL, /* devo_bus_ops */ 96 NULL, /* devo_power */ 97 ddi_quiesce_not_needed, /* quiesce */ 98 }; 99 100 static struct modldrv modldrv = { 101 &mod_driverops, 102 "iSCSI Target", 103 &iscsit_dev_ops, 104 }; 105 106 static struct modlinkage modlinkage = { 107 MODREV_1, 108 &modldrv, 109 NULL, 110 }; 111 112 113 iscsit_global_t iscsit_global; 114 115 kmem_cache_t *iscsit_status_pdu_cache; 116 117 boolean_t iscsit_sm_logging = B_FALSE; 118 119 static idm_status_t iscsit_init(dev_info_t *dip); 120 static idm_status_t iscsit_enable_svc(iscsit_hostinfo_t *hostinfo); 121 static void iscsit_disable_svc(void); 122 123 static void 124 iscsit_op_scsi_task_mgmt(iscsit_conn_t *ict, idm_pdu_t *rx_pdu); 125 126 static void 127 iscsit_pdu_op_noop(iscsit_conn_t *ict, idm_pdu_t *rx_pdu); 128 129 static void 130 iscsit_pdu_op_login_cmd(iscsit_conn_t *ict, idm_pdu_t *rx_pdu); 131 132 void 133 iscsit_pdu_op_text_cmd(iscsit_conn_t *ict, idm_pdu_t *rx_pdu); 134 135 static void 136 iscsit_pdu_op_logout_cmd(iscsit_conn_t *ict, idm_pdu_t *rx_pdu); 137 138 int iscsit_cmd_window(); 139 140 void 141 iscsit_set_cmdsn(iscsit_conn_t *ict, idm_pdu_t *rx_pdu); 142 143 static void 144 iscsit_deferred_dispatch(idm_pdu_t *rx_pdu); 145 146 static void 147 iscsit_deferred(void *rx_pdu_void); 148 149 static idm_status_t 150 iscsit_conn_accept(idm_conn_t *ic); 151 152 static idm_status_t 153 iscsit_ffp_enabled(idm_conn_t *ic); 154 155 static idm_status_t 156 iscsit_ffp_disabled(idm_conn_t *ic, idm_ffp_disable_t disable_class); 157 158 static idm_status_t 159 iscsit_conn_lost(idm_conn_t *ic); 160 161 static idm_status_t 162 iscsit_conn_destroy(idm_conn_t *ic); 163 164 static stmf_data_buf_t * 165 iscsit_dbuf_alloc(scsi_task_t *task, uint32_t size, uint32_t *pminsize, 166 uint32_t flags); 167 168 static void 169 iscsit_dbuf_free(stmf_dbuf_store_t *ds, stmf_data_buf_t *dbuf); 170 171 static void 172 iscsit_buf_xfer_cb(idm_buf_t *idb, idm_status_t status); 173 174 static void 175 iscsit_send_good_status_done(idm_pdu_t *pdu, idm_status_t status); 176 177 static void 178 iscsit_send_status_done(idm_pdu_t *pdu, idm_status_t status); 179 180 static stmf_status_t 181 iscsit_idm_to_stmf(idm_status_t idmrc); 182 183 static iscsit_task_t * 184 iscsit_task_alloc(iscsit_conn_t *ict); 185 186 static void 187 iscsit_task_free(iscsit_task_t *itask); 188 189 static iscsit_task_t * 190 iscsit_tm_task_alloc(iscsit_conn_t *ict); 191 192 static void 193 iscsit_tm_task_free(iscsit_task_t *itask); 194 195 static idm_status_t 196 iscsit_task_start(iscsit_task_t *itask); 197 198 static void 199 iscsit_task_done(iscsit_task_t *itask); 200 201 static int 202 iscsit_status_pdu_constructor(void *pdu_void, void *arg, int flags); 203 204 static void 205 iscsit_pp_cb(struct stmf_port_provider *pp, int cmd, void *arg, uint32_t flags); 206 207 static it_cfg_status_t 208 iscsit_config_merge(it_config_t *cfg); 209 210 static idm_status_t 211 iscsit_login_fail(idm_conn_t *ic); 212 213 static boolean_t iscsit_cmdsn_in_window(iscsit_conn_t *ict, uint32_t cmdsn); 214 static void iscsit_send_direct_scsi_resp(iscsit_conn_t *ict, idm_pdu_t *rx_pdu, 215 uint8_t response, uint8_t cmd_status); 216 static void iscsit_send_task_mgmt_resp(idm_pdu_t *tm_resp_pdu, 217 uint8_t tm_status); 218 219 int 220 _init(void) 221 { 222 int rc; 223 224 rw_init(&iscsit_global.global_rwlock, NULL, RW_DRIVER, NULL); 225 iscsit_global.global_svc_state = ISE_DETACHED; 226 227 if ((rc = mod_install(&modlinkage)) != 0) { 228 rw_destroy(&iscsit_global.global_rwlock); 229 return (rc); 230 } 231 232 return (rc); 233 } 234 235 int 236 _info(struct modinfo *modinfop) 237 { 238 return (mod_info(&modlinkage, modinfop)); 239 } 240 241 int 242 _fini(void) 243 { 244 int rc; 245 246 rc = mod_remove(&modlinkage); 247 248 if (rc == 0) { 249 rw_destroy(&iscsit_global.global_rwlock); 250 } 251 252 return (rc); 253 } 254 255 /* 256 * DDI entry points. 257 */ 258 259 /* ARGSUSED */ 260 static int 261 iscsit_drv_getinfo(dev_info_t *dip, ddi_info_cmd_t cmd, void *arg, 262 void **result) 263 { 264 ulong_t instance = getminor((dev_t)arg); 265 266 switch (cmd) { 267 case DDI_INFO_DEVT2DEVINFO: 268 *result = iscsit_global.global_dip; 269 return (DDI_SUCCESS); 270 271 case DDI_INFO_DEVT2INSTANCE: 272 *result = (void *)instance; 273 return (DDI_SUCCESS); 274 275 default: 276 break; 277 } 278 279 return (DDI_FAILURE); 280 } 281 282 static int 283 iscsit_drv_attach(dev_info_t *dip, ddi_attach_cmd_t cmd) 284 { 285 if (cmd != DDI_ATTACH) { 286 return (DDI_FAILURE); 287 } 288 289 if (ddi_get_instance(dip) != 0) { 290 /* we only allow instance 0 to attach */ 291 return (DDI_FAILURE); 292 } 293 294 /* create the minor node */ 295 if (ddi_create_minor_node(dip, ISCSIT_MODNAME, S_IFCHR, 0, 296 DDI_PSEUDO, 0) != DDI_SUCCESS) { 297 cmn_err(CE_WARN, "iscsit_drv_attach: " 298 "failed creating minor node"); 299 return (DDI_FAILURE); 300 } 301 302 if (iscsit_init(dip) != IDM_STATUS_SUCCESS) { 303 cmn_err(CE_WARN, "iscsit_drv_attach: " 304 "failed to initialize"); 305 ddi_remove_minor_node(dip, NULL); 306 return (DDI_FAILURE); 307 } 308 309 iscsit_global.global_svc_state = ISE_DISABLED; 310 iscsit_global.global_dip = dip; 311 312 return (DDI_SUCCESS); 313 } 314 315 /*ARGSUSED*/ 316 static int 317 iscsit_drv_detach(dev_info_t *dip, ddi_detach_cmd_t cmd) 318 { 319 if (cmd != DDI_DETACH) 320 return (DDI_FAILURE); 321 322 ISCSIT_GLOBAL_LOCK(RW_WRITER); 323 if (iscsit_drv_busy()) { 324 ISCSIT_GLOBAL_UNLOCK(); 325 return (EBUSY); 326 } 327 328 iscsit_global.global_dip = NULL; 329 ddi_remove_minor_node(dip, NULL); 330 331 ldi_ident_release(iscsit_global.global_li); 332 iscsit_global.global_svc_state = ISE_DETACHED; 333 334 ISCSIT_GLOBAL_UNLOCK(); 335 336 return (DDI_SUCCESS); 337 } 338 339 /*ARGSUSED*/ 340 static int 341 iscsit_drv_open(dev_t *devp, int flag, int otyp, cred_t *credp) 342 { 343 return (0); 344 } 345 346 /* ARGSUSED */ 347 static int 348 iscsit_drv_close(dev_t dev, int flag, int otyp, cred_t *credp) 349 { 350 return (0); 351 } 352 353 static boolean_t 354 iscsit_drv_busy(void) 355 { 356 switch (iscsit_global.global_svc_state) { 357 case ISE_DISABLED: 358 case ISE_DETACHED: 359 return (B_FALSE); 360 default: 361 return (B_TRUE); 362 } 363 /* NOTREACHED */ 364 } 365 366 /* ARGSUSED */ 367 static int 368 iscsit_drv_ioctl(dev_t drv, int cmd, intptr_t argp, int flag, cred_t *cred, 369 int *retval) 370 { 371 iscsit_ioc_set_config_t setcfg; 372 iscsit_ioc_set_config32_t setcfg32; 373 char *cfg_pnvlist = NULL; 374 nvlist_t *cfg_nvlist = NULL; 375 it_config_t *cfg = NULL; 376 idm_status_t idmrc; 377 int rc = 0; 378 379 if (drv_priv(cred) != 0) { 380 return (EPERM); 381 } 382 383 ISCSIT_GLOBAL_LOCK(RW_WRITER); 384 385 /* 386 * Validate ioctl requests against global service state 387 */ 388 switch (iscsit_global.global_svc_state) { 389 case ISE_ENABLED: 390 if (cmd == ISCSIT_IOC_DISABLE_SVC) { 391 iscsit_global.global_svc_state = ISE_DISABLING; 392 } else if (cmd == ISCSIT_IOC_ENABLE_SVC) { 393 /* Already enabled */ 394 ISCSIT_GLOBAL_UNLOCK(); 395 return (0); 396 } else { 397 iscsit_global.global_svc_state = ISE_BUSY; 398 } 399 break; 400 case ISE_DISABLED: 401 if (cmd == ISCSIT_IOC_ENABLE_SVC) { 402 iscsit_global.global_svc_state = ISE_ENABLING; 403 } else if (cmd == ISCSIT_IOC_DISABLE_SVC) { 404 /* Already disabled */ 405 ISCSIT_GLOBAL_UNLOCK(); 406 return (0); 407 } else { 408 rc = EFAULT; 409 } 410 break; 411 case ISE_ENABLING: 412 case ISE_DISABLING: 413 rc = EAGAIN; 414 break; 415 case ISE_DETACHED: 416 default: 417 rc = EFAULT; 418 break; 419 } 420 421 ISCSIT_GLOBAL_UNLOCK(); 422 if (rc != 0) 423 return (rc); 424 425 /* Handle ioctl request (enable/disable have already been handled) */ 426 switch (cmd) { 427 case ISCSIT_IOC_SET_CONFIG: 428 /* Any errors must set state back to ISE_ENABLED */ 429 switch (ddi_model_convert_from(flag & FMODELS)) { 430 case DDI_MODEL_ILP32: 431 if (ddi_copyin((void *)argp, &setcfg32, 432 sizeof (iscsit_ioc_set_config32_t), flag) != 0) { 433 rc = EFAULT; 434 goto cleanup; 435 } 436 437 setcfg.set_cfg_pnvlist = 438 (char *)((uintptr_t)setcfg32.set_cfg_pnvlist); 439 setcfg.set_cfg_vers = setcfg32.set_cfg_vers; 440 setcfg.set_cfg_pnvlist_len = 441 setcfg32.set_cfg_pnvlist_len; 442 break; 443 case DDI_MODEL_NONE: 444 if (ddi_copyin((void *)argp, &setcfg, 445 sizeof (iscsit_ioc_set_config_t), flag) != 0) { 446 rc = EFAULT; 447 goto cleanup; 448 } 449 break; 450 default: 451 rc = EFAULT; 452 goto cleanup; 453 } 454 455 /* Check API version */ 456 if (setcfg.set_cfg_vers != ISCSIT_API_VERS0) { 457 rc = EINVAL; 458 goto cleanup; 459 } 460 461 /* Config is in packed nvlist format so unpack it */ 462 cfg_pnvlist = kmem_alloc(setcfg.set_cfg_pnvlist_len, 463 KM_SLEEP); 464 ASSERT(cfg_pnvlist != NULL); 465 466 if (ddi_copyin(setcfg.set_cfg_pnvlist, cfg_pnvlist, 467 setcfg.set_cfg_pnvlist_len, flag) != 0) { 468 rc = EFAULT; 469 goto cleanup; 470 } 471 472 rc = nvlist_unpack(cfg_pnvlist, setcfg.set_cfg_pnvlist_len, 473 &cfg_nvlist, KM_SLEEP); 474 if (rc != 0) { 475 goto cleanup; 476 } 477 478 /* Translate nvlist */ 479 rc = it_nv_to_config(cfg_nvlist, &cfg); 480 if (rc != 0) { 481 cmn_err(CE_WARN, "Configuration is invalid"); 482 goto cleanup; 483 } 484 485 /* Update config */ 486 rc = iscsit_config_merge(cfg); 487 /* FALLTHROUGH */ 488 489 cleanup: 490 if (cfg) 491 it_config_free_cmn(cfg); 492 if (cfg_pnvlist) 493 kmem_free(cfg_pnvlist, setcfg.set_cfg_pnvlist_len); 494 if (cfg_nvlist) 495 nvlist_free(cfg_nvlist); 496 497 /* 498 * Now that the reconfig is complete set our state back to 499 * enabled. 500 */ 501 ISCSIT_GLOBAL_LOCK(RW_WRITER); 502 iscsit_global.global_svc_state = ISE_ENABLED; 503 ISCSIT_GLOBAL_UNLOCK(); 504 break; 505 case ISCSIT_IOC_ENABLE_SVC: { 506 iscsit_hostinfo_t hostinfo; 507 508 if (ddi_copyin((void *)argp, &hostinfo.length, 509 sizeof (hostinfo.length), flag) != 0) { 510 iscsit_global.global_svc_state = ISE_DISABLED; 511 return (EFAULT); 512 } 513 514 if (hostinfo.length > sizeof (hostinfo.fqhn)) 515 hostinfo.length = sizeof (hostinfo.fqhn); 516 517 if (ddi_copyin((void *)((caddr_t)argp + 518 sizeof (hostinfo.length)), &hostinfo.fqhn, 519 hostinfo.length, flag) != 0) { 520 iscsit_global.global_svc_state = ISE_DISABLED; 521 return (EFAULT); 522 } 523 524 idmrc = iscsit_enable_svc(&hostinfo); 525 ISCSIT_GLOBAL_LOCK(RW_WRITER); 526 if (idmrc == IDM_STATUS_SUCCESS) { 527 iscsit_global.global_svc_state = ISE_ENABLED; 528 } else { 529 rc = EIO; 530 iscsit_global.global_svc_state = ISE_DISABLED; 531 } 532 ISCSIT_GLOBAL_UNLOCK(); 533 break; 534 } 535 case ISCSIT_IOC_DISABLE_SVC: 536 iscsit_disable_svc(); 537 ISCSIT_GLOBAL_LOCK(RW_WRITER); 538 iscsit_global.global_svc_state = ISE_DISABLED; 539 ISCSIT_GLOBAL_UNLOCK(); 540 break; 541 542 default: 543 rc = EINVAL; 544 ISCSIT_GLOBAL_LOCK(RW_WRITER); 545 iscsit_global.global_svc_state = ISE_ENABLED; 546 ISCSIT_GLOBAL_UNLOCK(); 547 } 548 549 return (rc); 550 } 551 552 static idm_status_t 553 iscsit_init(dev_info_t *dip) 554 { 555 int rc; 556 557 rc = ldi_ident_from_dip(dip, &iscsit_global.global_li); 558 ASSERT(rc == 0); /* Failure indicates invalid argument */ 559 560 iscsit_global.global_svc_state = ISE_DISABLED; 561 562 return (IDM_STATUS_SUCCESS); 563 } 564 565 /* 566 * iscsit_enable_svc 567 * 568 * registers all the configured targets and target portals with STMF 569 */ 570 static idm_status_t 571 iscsit_enable_svc(iscsit_hostinfo_t *hostinfo) 572 { 573 stmf_port_provider_t *pp; 574 stmf_dbuf_store_t *dbuf_store; 575 boolean_t did_iscsit_isns_init; 576 idm_status_t retval = IDM_STATUS_SUCCESS; 577 578 ASSERT(iscsit_global.global_svc_state == ISE_ENABLING); 579 580 /* 581 * Make sure that can tell if we have partially allocated 582 * in case we need to exit and tear down anything allocated. 583 */ 584 iscsit_global.global_tsih_pool = NULL; 585 iscsit_global.global_dbuf_store = NULL; 586 iscsit_status_pdu_cache = NULL; 587 pp = NULL; 588 iscsit_global.global_pp = NULL; 589 iscsit_global.global_default_tpg = NULL; 590 did_iscsit_isns_init = B_FALSE; 591 iscsit_global.global_dispatch_taskq = NULL; 592 593 /* Setup remaining fields in iscsit_global_t */ 594 idm_refcnt_init(&iscsit_global.global_refcnt, 595 &iscsit_global); 596 597 avl_create(&iscsit_global.global_discovery_sessions, 598 iscsit_sess_avl_compare, sizeof (iscsit_sess_t), 599 offsetof(iscsit_sess_t, ist_tgt_ln)); 600 601 avl_create(&iscsit_global.global_target_list, 602 iscsit_tgt_avl_compare, sizeof (iscsit_tgt_t), 603 offsetof(iscsit_tgt_t, target_global_ln)); 604 605 list_create(&iscsit_global.global_deleted_target_list, 606 sizeof (iscsit_tgt_t), 607 offsetof(iscsit_tgt_t, target_global_deleted_ln)); 608 609 avl_create(&iscsit_global.global_tpg_list, 610 iscsit_tpg_avl_compare, sizeof (iscsit_tpg_t), 611 offsetof(iscsit_tpg_t, tpg_global_ln)); 612 613 avl_create(&iscsit_global.global_ini_list, 614 iscsit_ini_avl_compare, sizeof (iscsit_ini_t), 615 offsetof(iscsit_ini_t, ini_global_ln)); 616 617 iscsit_global.global_tsih_pool = vmem_create("iscsit_tsih_pool", 618 (void *)1, ISCSI_MAX_TSIH, 1, NULL, NULL, NULL, 0, 619 VM_SLEEP | VMC_IDENTIFIER); 620 621 /* 622 * Setup STMF dbuf store. Our buffers are bound to a specific 623 * connection so we really can't let STMF cache buffers for us. 624 * Consequently we'll just allocate one global buffer store. 625 */ 626 dbuf_store = stmf_alloc(STMF_STRUCT_DBUF_STORE, 0, 0); 627 if (dbuf_store == NULL) { 628 retval = IDM_STATUS_FAIL; 629 goto tear_down_and_return; 630 } 631 dbuf_store->ds_alloc_data_buf = iscsit_dbuf_alloc; 632 dbuf_store->ds_free_data_buf = iscsit_dbuf_free; 633 dbuf_store->ds_port_private = NULL; 634 iscsit_global.global_dbuf_store = dbuf_store; 635 636 /* Status PDU cache */ 637 iscsit_status_pdu_cache = kmem_cache_create("iscsit_status_pdu_cache", 638 sizeof (idm_pdu_t) + sizeof (iscsi_scsi_rsp_hdr_t), 8, 639 &iscsit_status_pdu_constructor, 640 NULL, NULL, NULL, NULL, KM_SLEEP); 641 642 /* Default TPG and portal */ 643 iscsit_global.global_default_tpg = iscsit_tpg_createdefault(); 644 if (iscsit_global.global_default_tpg == NULL) { 645 retval = IDM_STATUS_FAIL; 646 goto tear_down_and_return; 647 } 648 649 /* initialize isns client */ 650 (void) iscsit_isns_init(hostinfo); 651 did_iscsit_isns_init = B_TRUE; 652 653 /* Register port provider */ 654 pp = stmf_alloc(STMF_STRUCT_PORT_PROVIDER, 0, 0); 655 if (pp == NULL) { 656 retval = IDM_STATUS_FAIL; 657 goto tear_down_and_return; 658 } 659 660 pp->pp_portif_rev = PORTIF_REV_1; 661 pp->pp_instance = 0; 662 pp->pp_name = ISCSIT_MODNAME; 663 pp->pp_cb = iscsit_pp_cb; 664 665 iscsit_global.global_pp = pp; 666 667 668 if (stmf_register_port_provider(pp) != STMF_SUCCESS) { 669 retval = IDM_STATUS_FAIL; 670 goto tear_down_and_return; 671 } 672 673 iscsit_global.global_dispatch_taskq = taskq_create("iscsit_dispatch", 674 1, minclsyspri, 16, 16, TASKQ_PREPOPULATE); 675 676 return (IDM_STATUS_SUCCESS); 677 678 tear_down_and_return: 679 680 if (iscsit_global.global_dispatch_taskq) { 681 taskq_destroy(iscsit_global.global_dispatch_taskq); 682 iscsit_global.global_dispatch_taskq = NULL; 683 } 684 685 if (did_iscsit_isns_init) 686 iscsit_isns_fini(); 687 688 if (iscsit_global.global_default_tpg) { 689 iscsit_tpg_destroydefault(iscsit_global.global_default_tpg); 690 iscsit_global.global_default_tpg = NULL; 691 } 692 693 if (iscsit_global.global_pp) 694 iscsit_global.global_pp = NULL; 695 696 if (pp) 697 stmf_free(pp); 698 699 if (iscsit_status_pdu_cache) { 700 kmem_cache_destroy(iscsit_status_pdu_cache); 701 iscsit_status_pdu_cache = NULL; 702 } 703 704 if (iscsit_global.global_dbuf_store) { 705 stmf_free(iscsit_global.global_dbuf_store); 706 iscsit_global.global_dbuf_store = NULL; 707 } 708 709 if (iscsit_global.global_tsih_pool) { 710 vmem_destroy(iscsit_global.global_tsih_pool); 711 iscsit_global.global_tsih_pool = NULL; 712 } 713 714 avl_destroy(&iscsit_global.global_ini_list); 715 avl_destroy(&iscsit_global.global_tpg_list); 716 list_destroy(&iscsit_global.global_deleted_target_list); 717 avl_destroy(&iscsit_global.global_target_list); 718 avl_destroy(&iscsit_global.global_discovery_sessions); 719 720 idm_refcnt_destroy(&iscsit_global.global_refcnt); 721 722 return (retval); 723 } 724 725 /* 726 * iscsit_disable_svc 727 * 728 * clean up all existing connections and deregister targets from STMF 729 */ 730 static void 731 iscsit_disable_svc(void) 732 { 733 iscsit_sess_t *sess; 734 735 ASSERT(iscsit_global.global_svc_state == ISE_DISABLING); 736 737 /* tear down discovery sessions */ 738 for (sess = avl_first(&iscsit_global.global_discovery_sessions); 739 sess != NULL; 740 sess = AVL_NEXT(&iscsit_global.global_discovery_sessions, sess)) 741 iscsit_sess_close(sess); 742 743 /* 744 * Passing NULL to iscsit_config_merge tells it to go to an empty 745 * config. 746 */ 747 (void) iscsit_config_merge(NULL); 748 749 /* 750 * Wait until there are no more global references 751 */ 752 idm_refcnt_wait_ref(&iscsit_global.global_refcnt); 753 idm_refcnt_destroy(&iscsit_global.global_refcnt); 754 755 /* 756 * Default TPG must be destroyed after global_refcnt is 0. 757 */ 758 iscsit_tpg_destroydefault(iscsit_global.global_default_tpg); 759 760 avl_destroy(&iscsit_global.global_discovery_sessions); 761 list_destroy(&iscsit_global.global_deleted_target_list); 762 avl_destroy(&iscsit_global.global_target_list); 763 avl_destroy(&iscsit_global.global_tpg_list); 764 avl_destroy(&iscsit_global.global_ini_list); 765 766 taskq_destroy(iscsit_global.global_dispatch_taskq); 767 768 iscsit_isns_fini(); 769 770 stmf_free(iscsit_global.global_dbuf_store); 771 iscsit_global.global_dbuf_store = NULL; 772 773 (void) stmf_deregister_port_provider(iscsit_global.global_pp); 774 stmf_free(iscsit_global.global_pp); 775 iscsit_global.global_pp = NULL; 776 777 kmem_cache_destroy(iscsit_status_pdu_cache); 778 iscsit_status_pdu_cache = NULL; 779 780 vmem_destroy(iscsit_global.global_tsih_pool); 781 iscsit_global.global_tsih_pool = NULL; 782 } 783 784 void 785 iscsit_global_hold() 786 { 787 idm_refcnt_hold(&iscsit_global.global_refcnt); 788 } 789 790 void 791 iscsit_global_rele() 792 { 793 idm_refcnt_rele(&iscsit_global.global_refcnt); 794 } 795 796 void 797 iscsit_global_wait_ref() 798 { 799 idm_refcnt_wait_ref(&iscsit_global.global_refcnt); 800 } 801 802 /* 803 * IDM callbacks 804 */ 805 806 /*ARGSUSED*/ 807 void 808 iscsit_rx_pdu(idm_conn_t *ic, idm_pdu_t *rx_pdu) 809 { 810 iscsit_conn_t *ict = ic->ic_handle; 811 switch (IDM_PDU_OPCODE(rx_pdu)) { 812 case ISCSI_OP_SCSI_CMD: 813 ASSERT(0); /* Shouldn't happen */ 814 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 815 break; 816 case ISCSI_OP_SNACK_CMD: 817 /* 818 * We'll need to handle this when we support ERL1/2. For 819 * now we treat it as a protocol error. 820 */ 821 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 822 idm_conn_event(ic, CE_TRANSPORT_FAIL, NULL); 823 break; 824 case ISCSI_OP_SCSI_TASK_MGT_MSG: 825 iscsit_set_cmdsn(ict, rx_pdu); 826 iscsit_op_scsi_task_mgmt(ict, rx_pdu); 827 break; 828 case ISCSI_OP_NOOP_OUT: 829 case ISCSI_OP_LOGIN_CMD: 830 case ISCSI_OP_TEXT_CMD: 831 case ISCSI_OP_LOGOUT_CMD: 832 /* 833 * If/when we switch to userland processing these PDU's 834 * will be handled by iscsitd. 835 */ 836 iscsit_deferred_dispatch(rx_pdu); 837 break; 838 default: 839 /* Protocol error */ 840 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 841 idm_conn_event(ic, CE_TRANSPORT_FAIL, NULL); 842 break; 843 } 844 } 845 846 /*ARGSUSED*/ 847 void 848 iscsit_rx_pdu_error(idm_conn_t *ic, idm_pdu_t *rx_pdu, idm_status_t status) 849 { 850 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 851 } 852 853 void 854 iscsit_task_aborted(idm_task_t *idt, idm_status_t status) 855 { 856 iscsit_task_t *itask = idt->idt_private; 857 858 switch (status) { 859 case IDM_STATUS_SUSPENDED: 860 break; 861 case IDM_STATUS_ABORTED: 862 mutex_enter(&itask->it_mutex); 863 itask->it_aborted = B_TRUE; 864 /* 865 * We rely on the fact that STMF tracks outstanding 866 * buffer transfers and will free all of our buffers 867 * before freeing the task so we don't need to 868 * explicitly free the buffers from iscsit/idm 869 */ 870 if (itask->it_stmf_abort) { 871 mutex_exit(&itask->it_mutex); 872 /* 873 * Task is no longer active 874 */ 875 iscsit_task_done(itask); 876 877 /* 878 * STMF has already asked for this task to be aborted 879 * 880 * STMF specification is wrong... says to return 881 * STMF_ABORTED, the code actually looks for 882 * STMF_ABORT_SUCCESS. 883 */ 884 stmf_task_lport_aborted(itask->it_stmf_task, 885 STMF_ABORT_SUCCESS, STMF_IOF_LPORT_DONE); 886 return; 887 } else { 888 mutex_exit(&itask->it_mutex); 889 /* 890 * Tell STMF to stop processing the task. 891 */ 892 stmf_abort(STMF_QUEUE_TASK_ABORT, itask->it_stmf_task, 893 STMF_ABORTED, NULL); 894 return; 895 } 896 /*NOTREACHED*/ 897 default: 898 ASSERT(0); 899 } 900 } 901 902 /*ARGSUSED*/ 903 idm_status_t 904 iscsit_client_notify(idm_conn_t *ic, idm_client_notify_t icn, 905 uintptr_t data) 906 { 907 idm_status_t rc = IDM_STATUS_SUCCESS; 908 909 /* 910 * IDM client notifications will never occur at interrupt level 911 * since they are generated from the connection state machine which 912 * running on taskq threads. 913 * 914 */ 915 switch (icn) { 916 case CN_CONNECT_ACCEPT: 917 rc = iscsit_conn_accept(ic); /* No data */ 918 break; 919 case CN_FFP_ENABLED: 920 rc = iscsit_ffp_enabled(ic); /* No data */ 921 break; 922 case CN_FFP_DISABLED: 923 /* 924 * Data indicates whether this was the result of an 925 * explicit logout request. 926 */ 927 rc = iscsit_ffp_disabled(ic, (idm_ffp_disable_t)data); 928 break; 929 case CN_CONNECT_LOST: 930 rc = iscsit_conn_lost(ic); 931 break; 932 case CN_CONNECT_DESTROY: 933 rc = iscsit_conn_destroy(ic); 934 break; 935 case CN_LOGIN_FAIL: 936 /* 937 * Force the login state machine to completion 938 */ 939 rc = iscsit_login_fail(ic); 940 break; 941 default: 942 rc = IDM_STATUS_REJECT; 943 break; 944 } 945 946 return (rc); 947 } 948 949 /* 950 * iscsit_update_statsn is invoked for all the PDUs which have the StatSN 951 * field in the header. The StatSN is incremented if the IDM_PDU_ADVANCE_STATSN 952 * flag is set in the pdu flags field. The StatSN is connection-wide and is 953 * protected by the mutex ict_statsn_mutex. For Data-In PDUs, if the flag 954 * IDM_TASK_PHASECOLLAPSE_REQ is set, the status (phase-collapse) is also filled 955 */ 956 void 957 iscsit_update_statsn(idm_task_t *idm_task, idm_pdu_t *pdu) 958 { 959 iscsi_scsi_rsp_hdr_t *rsp = (iscsi_scsi_rsp_hdr_t *)pdu->isp_hdr; 960 iscsit_conn_t *ict = (iscsit_conn_t *)pdu->isp_ic->ic_handle; 961 iscsit_task_t *itask = NULL; 962 scsi_task_t *task = NULL; 963 964 mutex_enter(&ict->ict_statsn_mutex); 965 rsp->statsn = htonl(ict->ict_statsn); 966 if (pdu->isp_flags & IDM_PDU_ADVANCE_STATSN) 967 ict->ict_statsn++; 968 mutex_exit(&ict->ict_statsn_mutex); 969 970 /* 971 * The last SCSI Data PDU passed for a command may also contain the 972 * status if the status indicates termination with no expections, i.e. 973 * no sense data or response involved. If the command completes with 974 * an error, then the response and sense data will be sent in a 975 * separate iSCSI Response PDU. 976 */ 977 if ((idm_task) && (idm_task->idt_flags & IDM_TASK_PHASECOLLAPSE_REQ)) { 978 itask = idm_task->idt_private; 979 task = itask->it_stmf_task; 980 981 rsp->cmd_status = task->task_scsi_status; 982 rsp->flags |= ISCSI_FLAG_DATA_STATUS; 983 if (task->task_status_ctrl & TASK_SCTRL_OVER) { 984 rsp->flags |= ISCSI_FLAG_CMD_OVERFLOW; 985 } else if (task->task_status_ctrl & TASK_SCTRL_UNDER) { 986 rsp->flags |= ISCSI_FLAG_CMD_UNDERFLOW; 987 } 988 rsp->residual_count = htonl(task->task_resid); 989 } 990 } 991 992 void 993 iscsit_build_hdr(idm_task_t *idm_task, idm_pdu_t *pdu, uint8_t opcode) 994 { 995 iscsit_task_t *itask = idm_task->idt_private; 996 iscsi_data_rsp_hdr_t *dh = (iscsi_data_rsp_hdr_t *)pdu->isp_hdr; 997 998 /* 999 * We acquired iscsit_sess_t.ist_sn_rwlock in iscsit_xfer_scsi_data 1000 * in reader mode so we expect to be locked here 1001 */ 1002 1003 /* 1004 * Lun is only required if the opcode == ISCSI_OP_SCSI_DATA_RSP 1005 * and the 'A' bit is to be set 1006 */ 1007 dh->opcode = opcode; 1008 dh->itt = itask->it_itt; 1009 dh->ttt = itask->it_ttt; 1010 /* Maintain current statsn for RTT responses */ 1011 dh->statsn = (opcode == ISCSI_OP_RTT_RSP) ? 1012 htonl(itask->it_ict->ict_statsn) : 0; 1013 1014 dh->expcmdsn = htonl(itask->it_ict->ict_sess->ist_expcmdsn); 1015 dh->maxcmdsn = htonl(itask->it_ict->ict_sess->ist_maxcmdsn); 1016 1017 /* 1018 * IDM must set: 1019 * 1020 * data.flags and rtt.flags 1021 * data.dlength 1022 * data.datasn 1023 * data.offset 1024 * statsn, residual_count and cmd_status (for phase collapse) 1025 * rtt.rttsn 1026 * rtt.data_offset 1027 * rtt.data_length 1028 */ 1029 } 1030 1031 void 1032 iscsit_keepalive(idm_conn_t *ic) 1033 { 1034 idm_pdu_t *nop_in_pdu; 1035 iscsi_nop_in_hdr_t *nop_in; 1036 iscsit_conn_t *ict = ic->ic_handle; 1037 1038 /* 1039 * IDM noticed the connection has been idle for too long so it's 1040 * time to provoke some activity. Build and transmit an iSCSI 1041 * nop-in PDU -- when the initiator responds it will be counted 1042 * as "activity" and keep the connection alive. 1043 * 1044 * We don't actually care about the response here at the iscsit level 1045 * so we will just throw it away without looking at it when it arrives. 1046 */ 1047 nop_in_pdu = idm_pdu_alloc(sizeof (*nop_in), 0); 1048 idm_pdu_init(nop_in_pdu, ic, NULL, NULL); 1049 nop_in = (iscsi_nop_in_hdr_t *)nop_in_pdu->isp_hdr; 1050 bzero(nop_in, sizeof (*nop_in)); 1051 nop_in->opcode = ISCSI_OP_NOOP_IN; 1052 nop_in->flags = ISCSI_FLAG_FINAL; 1053 nop_in->itt = ISCSI_RSVD_TASK_TAG; 1054 /* 1055 * When the target sends a NOP-In as a Ping, the target transfer tag 1056 * is set to a valid (not reserved) value and the initiator task tag 1057 * is set to ISCSI_RSVD_TASK_TAG (0xffffffff). In this case the StatSN 1058 * will always contain the next sequence number but the StatSN for the 1059 * connection is not advanced after this PDU is sent. 1060 */ 1061 nop_in_pdu->isp_flags |= IDM_PDU_SET_STATSN; 1062 /* 1063 * This works because we don't currently allocate ttt's anywhere else 1064 * in iscsit so as long as we stay out of IDM's range we are safe. 1065 * If we need to allocate ttt's for other PDU's in the future this will 1066 * need to be improved. 1067 */ 1068 mutex_enter(&ict->ict_mutex); 1069 nop_in->ttt = ict->ict_keepalive_ttt; 1070 ict->ict_keepalive_ttt++; 1071 if (ict->ict_keepalive_ttt == ISCSI_RSVD_TASK_TAG) 1072 ict->ict_keepalive_ttt = IDM_TASKIDS_MAX; 1073 mutex_exit(&ict->ict_mutex); 1074 1075 iscsit_pdu_tx(nop_in_pdu); 1076 } 1077 1078 static idm_status_t 1079 iscsit_conn_accept(idm_conn_t *ic) 1080 { 1081 iscsit_conn_t *ict; 1082 1083 /* 1084 * We need to get a global hold here to ensure that the service 1085 * doesn't get shutdown prior to establishing a session. This 1086 * gets released in iscsit_conn_destroy(). 1087 */ 1088 ISCSIT_GLOBAL_LOCK(RW_READER); 1089 if (iscsit_global.global_svc_state != ISE_ENABLED) { 1090 ISCSIT_GLOBAL_UNLOCK(); 1091 return (IDM_STATUS_FAIL); 1092 } 1093 iscsit_global_hold(); 1094 ISCSIT_GLOBAL_UNLOCK(); 1095 1096 /* 1097 * Allocate an associated iscsit structure to represent this 1098 * connection. We shouldn't really create a session until we 1099 * get the first login PDU. 1100 */ 1101 ict = kmem_zalloc(sizeof (*ict), KM_SLEEP); 1102 1103 ict->ict_ic = ic; 1104 ict->ict_statsn = 1; 1105 ict->ict_keepalive_ttt = IDM_TASKIDS_MAX; /* Avoid IDM TT range */ 1106 ic->ic_handle = ict; 1107 mutex_init(&ict->ict_mutex, NULL, MUTEX_DRIVER, NULL); 1108 mutex_init(&ict->ict_statsn_mutex, NULL, MUTEX_DRIVER, NULL); 1109 idm_refcnt_init(&ict->ict_refcnt, ict); 1110 1111 /* 1112 * Initialize login state machine 1113 */ 1114 if (iscsit_login_sm_init(ict) != IDM_STATUS_SUCCESS) { 1115 iscsit_global_rele(); 1116 /* 1117 * Cleanup the ict after idm notifies us about this failure 1118 */ 1119 return (IDM_STATUS_FAIL); 1120 } 1121 1122 return (IDM_STATUS_SUCCESS); 1123 } 1124 1125 idm_status_t 1126 iscsit_conn_reinstate(iscsit_conn_t *reinstate_ict, iscsit_conn_t *new_ict) 1127 { 1128 idm_status_t result; 1129 1130 /* 1131 * Note in new connection state that this connection is 1132 * reinstating an existing connection. 1133 */ 1134 new_ict->ict_reinstating = B_TRUE; 1135 new_ict->ict_reinstate_conn = reinstate_ict; 1136 new_ict->ict_statsn = reinstate_ict->ict_statsn; 1137 1138 /* 1139 * Now generate connection state machine event to existing connection 1140 * so that it starts the cleanup process. 1141 */ 1142 result = idm_conn_reinstate_event(reinstate_ict->ict_ic, 1143 new_ict->ict_ic); 1144 1145 return (result); 1146 } 1147 1148 void 1149 iscsit_conn_hold(iscsit_conn_t *ict) 1150 { 1151 idm_refcnt_hold(&ict->ict_refcnt); 1152 } 1153 1154 void 1155 iscsit_conn_rele(iscsit_conn_t *ict) 1156 { 1157 idm_refcnt_rele(&ict->ict_refcnt); 1158 } 1159 1160 void 1161 iscsit_conn_dispatch_hold(iscsit_conn_t *ict) 1162 { 1163 idm_refcnt_hold(&ict->ict_dispatch_refcnt); 1164 } 1165 1166 void 1167 iscsit_conn_dispatch_rele(iscsit_conn_t *ict) 1168 { 1169 idm_refcnt_rele(&ict->ict_dispatch_refcnt); 1170 } 1171 1172 static idm_status_t 1173 iscsit_login_fail(idm_conn_t *ic) 1174 { 1175 iscsit_conn_t *ict = ic->ic_handle; 1176 1177 /* Generate login state machine event */ 1178 iscsit_login_sm_event(ict, ILE_LOGIN_CONN_ERROR, NULL); 1179 1180 return (IDM_STATUS_SUCCESS); 1181 } 1182 1183 static idm_status_t 1184 iscsit_ffp_enabled(idm_conn_t *ic) 1185 { 1186 iscsit_conn_t *ict = ic->ic_handle; 1187 1188 /* Generate session state machine event */ 1189 iscsit_sess_sm_event(ict->ict_sess, SE_CONN_LOGGED_IN, ict); 1190 1191 return (IDM_STATUS_SUCCESS); 1192 } 1193 1194 static idm_status_t 1195 iscsit_ffp_disabled(idm_conn_t *ic, idm_ffp_disable_t disable_class) 1196 { 1197 iscsit_conn_t *ict = ic->ic_handle; 1198 1199 /* Generate session state machine event */ 1200 switch (disable_class) { 1201 case FD_CONN_FAIL: 1202 iscsit_sess_sm_event(ict->ict_sess, SE_CONN_FFP_FAIL, ict); 1203 break; 1204 case FD_CONN_LOGOUT: 1205 iscsit_sess_sm_event(ict->ict_sess, SE_CONN_FFP_DISABLE, ict); 1206 break; 1207 case FD_SESS_LOGOUT: 1208 iscsit_sess_sm_event(ict->ict_sess, SE_SESSION_CLOSE, ict); 1209 break; 1210 default: 1211 ASSERT(0); 1212 } 1213 1214 return (IDM_STATUS_SUCCESS); 1215 } 1216 1217 static idm_status_t 1218 iscsit_conn_lost(idm_conn_t *ic) 1219 { 1220 iscsit_conn_t *ict = ic->ic_handle; 1221 1222 mutex_enter(&ict->ict_mutex); 1223 ict->ict_lost = B_TRUE; 1224 mutex_exit(&ict->ict_mutex); 1225 1226 /* 1227 * Make sure there aren't any PDU's transitioning from the receive 1228 * handler to the dispatch taskq. 1229 */ 1230 idm_refcnt_wait_ref(&ict->ict_dispatch_refcnt); 1231 1232 return (IDM_STATUS_SUCCESS); 1233 } 1234 1235 static idm_status_t 1236 iscsit_conn_destroy(idm_conn_t *ic) 1237 { 1238 iscsit_conn_t *ict = ic->ic_handle; 1239 1240 mutex_enter(&ict->ict_mutex); 1241 ict->ict_destroyed = B_TRUE; 1242 mutex_exit(&ict->ict_mutex); 1243 1244 /* Generate session state machine event */ 1245 if (ict->ict_sess != NULL) { 1246 /* 1247 * Session state machine will call iscsit_conn_destroy_done() 1248 * when it has removed references to this connection. 1249 */ 1250 iscsit_sess_sm_event(ict->ict_sess, SE_CONN_FAIL, ict); 1251 } 1252 1253 ict->ict_ic = NULL; 1254 1255 idm_refcnt_wait_ref(&ict->ict_refcnt); 1256 1257 /* Reap the login state machine */ 1258 iscsit_login_sm_fini(ict); 1259 1260 /* Clean up any text command remnants */ 1261 iscsit_text_cmd_fini(ict); 1262 1263 mutex_destroy(&ict->ict_mutex); 1264 idm_refcnt_destroy(&ict->ict_refcnt); 1265 kmem_free(ict, sizeof (*ict)); 1266 1267 iscsit_global_rele(); 1268 1269 return (IDM_STATUS_SUCCESS); 1270 } 1271 1272 /* 1273 * STMF-related functions 1274 * 1275 * iSCSI to STMF mapping 1276 * 1277 * Session == ? 1278 * Connection == bound to local port but not itself a local port 1279 * Target 1280 * Target portal (group?) == local port (really but we're not going to do this) 1281 * iscsit needs to map connections to local ports (whatever we decide 1282 * they are) 1283 * Target == ? 1284 */ 1285 1286 /*ARGSUSED*/ 1287 static stmf_data_buf_t * 1288 iscsit_dbuf_alloc(scsi_task_t *task, uint32_t size, uint32_t *pminsize, 1289 uint32_t flags) 1290 { 1291 iscsit_task_t *itask = task->task_port_private; 1292 idm_buf_t *idm_buffer; 1293 iscsit_buf_t *ibuf; 1294 stmf_data_buf_t *result; 1295 uint32_t bsize; 1296 1297 /* 1298 * If the requested size is larger than MaxBurstLength and the 1299 * given pminsize is also larger than MaxBurstLength, then the 1300 * allocation fails (dbuf = NULL) and pminsize is modified to 1301 * be equal to MaxBurstLength. stmf/sbd then should re-invoke 1302 * this function with the corrected values for transfer. 1303 */ 1304 ASSERT(pminsize); 1305 if (size <= itask->it_ict->ict_op.op_max_burst_length) { 1306 bsize = size; 1307 } else if (*pminsize <= itask->it_ict->ict_op.op_max_burst_length) { 1308 bsize = itask->it_ict->ict_op.op_max_burst_length; 1309 } else { 1310 *pminsize = itask->it_ict->ict_op.op_max_burst_length; 1311 return (NULL); 1312 } 1313 1314 /* Alloc buffer */ 1315 idm_buffer = idm_buf_alloc(itask->it_ict->ict_ic, NULL, bsize); 1316 if (idm_buffer != NULL) { 1317 result = stmf_alloc(STMF_STRUCT_DATA_BUF, 1318 sizeof (iscsit_buf_t), 0); 1319 if (result != NULL) { 1320 /* Fill in stmf_data_buf_t */ 1321 ibuf = result->db_port_private; 1322 ibuf->ibuf_idm_buf = idm_buffer; 1323 ibuf->ibuf_stmf_buf = result; 1324 ibuf->ibuf_is_immed = B_FALSE; 1325 result->db_flags = DB_DONT_CACHE; 1326 result->db_buf_size = bsize; 1327 result->db_data_size = bsize; 1328 result->db_sglist_length = 1; 1329 result->db_sglist[0].seg_addr = idm_buffer->idb_buf; 1330 result->db_sglist[0].seg_length = 1331 idm_buffer->idb_buflen; 1332 return (result); 1333 } 1334 1335 /* Couldn't get the stmf_data_buf_t so free the buffer */ 1336 idm_buf_free(idm_buffer); 1337 } 1338 1339 return (NULL); 1340 } 1341 1342 /*ARGSUSED*/ 1343 static void 1344 iscsit_dbuf_free(stmf_dbuf_store_t *ds, stmf_data_buf_t *dbuf) 1345 { 1346 iscsit_buf_t *ibuf = dbuf->db_port_private; 1347 1348 if (ibuf->ibuf_is_immed) { 1349 /* 1350 * The iscsit_buf_t structure itself will be freed with its 1351 * associated task. Here we just need to free the PDU that 1352 * held the immediate data. 1353 */ 1354 idm_pdu_complete(ibuf->ibuf_immed_data_pdu, IDM_STATUS_SUCCESS); 1355 ibuf->ibuf_immed_data_pdu = 0; 1356 } else { 1357 idm_buf_free(ibuf->ibuf_idm_buf); 1358 stmf_free(dbuf); 1359 } 1360 } 1361 1362 /*ARGSUSED*/ 1363 stmf_status_t 1364 iscsit_xfer_scsi_data(scsi_task_t *task, stmf_data_buf_t *dbuf, 1365 uint32_t ioflags) 1366 { 1367 iscsit_task_t *iscsit_task = task->task_port_private; 1368 iscsit_sess_t *ict_sess = iscsit_task->it_ict->ict_sess; 1369 iscsit_buf_t *ibuf = dbuf->db_port_private; 1370 int idm_rc; 1371 1372 /* 1373 * If we are aborting then we can ignore this request 1374 */ 1375 if (iscsit_task->it_stmf_abort) { 1376 return (STMF_SUCCESS); 1377 } 1378 1379 /* 1380 * If it's not immediate data then start the transfer 1381 */ 1382 ASSERT(ibuf->ibuf_is_immed == B_FALSE); 1383 if (dbuf->db_flags & DB_DIRECTION_TO_RPORT) { 1384 /* 1385 * The DB_SEND_STATUS_GOOD flag in the STMF data buffer allows 1386 * the port provider to phase-collapse, i.e. send the status 1387 * along with the final data PDU for the command. The port 1388 * provider passes this request to the transport layer by 1389 * setting a flag IDM_TASK_PHASECOLLAPSE_REQ in the task. 1390 */ 1391 if (dbuf->db_flags & DB_SEND_STATUS_GOOD) 1392 iscsit_task->it_idm_task->idt_flags |= 1393 IDM_TASK_PHASECOLLAPSE_REQ; 1394 /* 1395 * IDM will call iscsit_build_hdr so lock now to serialize 1396 * access to the SN values. We need to lock here to enforce 1397 * lock ordering 1398 */ 1399 rw_enter(&ict_sess->ist_sn_rwlock, RW_READER); 1400 idm_rc = idm_buf_tx_to_ini(iscsit_task->it_idm_task, 1401 ibuf->ibuf_idm_buf, dbuf->db_relative_offset, 1402 dbuf->db_data_size, &iscsit_buf_xfer_cb, dbuf); 1403 rw_exit(&ict_sess->ist_sn_rwlock); 1404 1405 return (iscsit_idm_to_stmf(idm_rc)); 1406 } else if (dbuf->db_flags & DB_DIRECTION_FROM_RPORT) { 1407 /* Grab the SN lock (see comment above) */ 1408 rw_enter(&ict_sess->ist_sn_rwlock, RW_READER); 1409 idm_rc = idm_buf_rx_from_ini(iscsit_task->it_idm_task, 1410 ibuf->ibuf_idm_buf, dbuf->db_relative_offset, 1411 dbuf->db_data_size, &iscsit_buf_xfer_cb, dbuf); 1412 rw_exit(&ict_sess->ist_sn_rwlock); 1413 1414 return (iscsit_idm_to_stmf(idm_rc)); 1415 } 1416 1417 /* What are we supposed to do if there is no direction? */ 1418 return (STMF_INVALID_ARG); 1419 } 1420 1421 static void 1422 iscsit_buf_xfer_cb(idm_buf_t *idb, idm_status_t status) 1423 { 1424 iscsit_task_t *itask = idb->idb_task_binding->idt_private; 1425 stmf_data_buf_t *dbuf = idb->idb_cb_arg; 1426 1427 dbuf->db_xfer_status = iscsit_idm_to_stmf(status); 1428 1429 /* 1430 * If the task has been aborted then we don't need to call STMF 1431 */ 1432 if (itask->it_stmf_abort) { 1433 return; 1434 } 1435 1436 /* 1437 * For ISCSI over TCP (not iSER), the last SCSI Data PDU passed 1438 * for a successful command contains the status as requested by 1439 * by COMSTAR (via the DB_SEND_STATUS_GOOD flag). But the iSER 1440 * transport does not support phase-collapse. So pretend we are 1441 * COMSTAR and send the status in a separate PDU now. 1442 */ 1443 if (idb->idb_task_binding->idt_flags & IDM_TASK_PHASECOLLAPSE_SUCCESS) { 1444 /* 1445 * Mark task complete, remove task from the session task 1446 * list and notify COMSTAR that the status has been sent. 1447 */ 1448 iscsit_task_done(itask); 1449 itask->it_idm_task->idt_state = TASK_COMPLETE; 1450 stmf_send_status_done(itask->it_stmf_task, 1451 iscsit_idm_to_stmf(status), STMF_IOF_LPORT_DONE); 1452 } else if ((dbuf->db_flags & DB_SEND_STATUS_GOOD) && 1453 status == IDM_STATUS_SUCCESS) { 1454 1455 /* 1456 * If iscsit_send_scsi_status succeeds then the TX PDU 1457 * callback will call stmf_send_status_done and set 1458 * STMF_IOF_LPORT_DONE. Consequently we don't need 1459 * to call stmf_data_xfer_done in that case. We 1460 * still need to call it if we get a failure. 1461 * 1462 * To elaborate on this some more, upon successful 1463 * return from iscsit_send_scsi_status it's possible 1464 * that itask and idb have been freed and are no 1465 * longer valid. 1466 */ 1467 if (iscsit_send_scsi_status(itask->it_stmf_task, 0) 1468 != STMF_SUCCESS) { 1469 /* Failed to send status */ 1470 dbuf->db_xfer_status = STMF_FAILURE; 1471 stmf_data_xfer_done(itask->it_stmf_task, dbuf, 1472 STMF_IOF_LPORT_DONE); 1473 } 1474 } else { 1475 stmf_data_xfer_done(itask->it_stmf_task, dbuf, 0); 1476 } 1477 } 1478 1479 1480 /*ARGSUSED*/ 1481 stmf_status_t 1482 iscsit_send_scsi_status(scsi_task_t *task, uint32_t ioflags) 1483 { 1484 iscsit_task_t *itask = task->task_port_private; 1485 iscsi_scsi_rsp_hdr_t *rsp; 1486 idm_pdu_t *pdu; 1487 int resp_datalen; 1488 1489 /* 1490 * If this task is aborted then we don't need to respond. 1491 */ 1492 if (itask->it_stmf_abort) { 1493 return (STMF_SUCCESS); 1494 } 1495 1496 /* 1497 * If this is a task management status, handle it elsewhere. 1498 */ 1499 if (task->task_mgmt_function != TM_NONE) { 1500 /* 1501 * Don't wait for the PDU completion to tell STMF 1502 * the task is done -- it doesn't really matter and 1503 * it makes life complicated if STMF later asks us to 1504 * abort the request and we don't know whether the 1505 * status has been sent or not. 1506 */ 1507 itask->it_tm_responded = B_TRUE; 1508 iscsit_send_task_mgmt_resp(itask->it_tm_pdu, 1509 (task->task_completion_status == STMF_SUCCESS) ? 1510 SCSI_TCP_TM_RESP_COMPLETE : SCSI_TCP_TM_RESP_FUNC_NOT_SUPP); 1511 stmf_send_status_done(task, STMF_SUCCESS, 1512 STMF_IOF_LPORT_DONE); 1513 return (STMF_SUCCESS); 1514 } 1515 1516 /* 1517 * Remove the task from the session task list 1518 */ 1519 iscsit_task_done(itask); 1520 1521 /* 1522 * Send status 1523 */ 1524 mutex_enter(&itask->it_idm_task->idt_mutex); 1525 if ((itask->it_idm_task->idt_state == TASK_ACTIVE) && 1526 (task->task_completion_status == STMF_SUCCESS) && 1527 (task->task_sense_length == 0) && 1528 (task->task_resid == 0)) { 1529 itask->it_idm_task->idt_state = TASK_COMPLETE; 1530 /* PDU callback releases task hold */ 1531 idm_task_hold(itask->it_idm_task); 1532 mutex_exit(&itask->it_idm_task->idt_mutex); 1533 /* 1534 * Fast path. Cached status PDU's are already 1535 * initialized. We just need to fill in 1536 * connection and task information. StatSN is 1537 * incremented by 1 for every status sent a 1538 * connection. 1539 */ 1540 pdu = kmem_cache_alloc(iscsit_status_pdu_cache, KM_SLEEP); 1541 pdu->isp_ic = itask->it_ict->ict_ic; 1542 pdu->isp_private = itask; 1543 pdu->isp_flags |= IDM_PDU_SET_STATSN | IDM_PDU_ADVANCE_STATSN; 1544 1545 rsp = (iscsi_scsi_rsp_hdr_t *)pdu->isp_hdr; 1546 rsp->itt = itask->it_itt; 1547 rsp->cmd_status = task->task_scsi_status; 1548 iscsit_pdu_tx(pdu); 1549 return (STMF_SUCCESS); 1550 } else { 1551 if (itask->it_idm_task->idt_state != TASK_ACTIVE) { 1552 mutex_exit(&itask->it_idm_task->idt_mutex); 1553 return (STMF_FAILURE); 1554 } 1555 itask->it_idm_task->idt_state = TASK_COMPLETE; 1556 /* PDU callback releases task hold */ 1557 idm_task_hold(itask->it_idm_task); 1558 mutex_exit(&itask->it_idm_task->idt_mutex); 1559 1560 resp_datalen = (task->task_sense_length == 0) ? 0 : 1561 (task->task_sense_length + sizeof (uint16_t)); 1562 1563 pdu = idm_pdu_alloc(sizeof (iscsi_hdr_t), resp_datalen); 1564 idm_pdu_init(pdu, itask->it_ict->ict_ic, itask, 1565 iscsit_send_status_done); 1566 pdu->isp_flags |= IDM_PDU_SET_STATSN | IDM_PDU_ADVANCE_STATSN; 1567 1568 rsp = (iscsi_scsi_rsp_hdr_t *)pdu->isp_hdr; 1569 bzero(rsp, sizeof (*rsp)); 1570 rsp->opcode = ISCSI_OP_SCSI_RSP; 1571 1572 rsp->flags = ISCSI_FLAG_FINAL; 1573 if (task->task_status_ctrl & TASK_SCTRL_OVER) { 1574 rsp->flags |= ISCSI_FLAG_CMD_OVERFLOW; 1575 } else if (task->task_status_ctrl & TASK_SCTRL_UNDER) { 1576 rsp->flags |= ISCSI_FLAG_CMD_UNDERFLOW; 1577 } 1578 1579 rsp->bi_residual_count = 0; 1580 rsp->residual_count = htonl(task->task_resid); 1581 rsp->itt = itask->it_itt; 1582 rsp->response = ISCSI_STATUS_CMD_COMPLETED; 1583 rsp->cmd_status = task->task_scsi_status; 1584 if (task->task_sense_length != 0) { 1585 /* 1586 * Add a byte to provide the sense length in 1587 * the response 1588 */ 1589 *(uint16_t *)((void *)pdu->isp_data) = 1590 htons(task->task_sense_length); 1591 bcopy(task->task_sense_data, 1592 (uint8_t *)pdu->isp_data + 1593 sizeof (uint16_t), 1594 task->task_sense_length); 1595 hton24(rsp->dlength, resp_datalen); 1596 } 1597 1598 DTRACE_PROBE5(iscsi__scsi__response, 1599 iscsit_conn_t *, itask->it_ict, 1600 uint8_t, rsp->response, 1601 uint8_t, rsp->cmd_status, 1602 idm_pdu_t *, pdu, 1603 scsi_task_t *, task); 1604 1605 iscsit_pdu_tx(pdu); 1606 1607 return (STMF_SUCCESS); 1608 } 1609 } 1610 1611 /*ARGSUSED*/ 1612 static void 1613 iscsit_send_good_status_done(idm_pdu_t *pdu, idm_status_t status) 1614 { 1615 iscsit_task_t *itask; 1616 boolean_t aborted; 1617 1618 itask = pdu->isp_private; 1619 aborted = itask->it_stmf_abort; 1620 1621 /* 1622 * After releasing the hold the task may be freed at any time so 1623 * don't touch it. 1624 */ 1625 idm_task_rele(itask->it_idm_task); 1626 if (!aborted) { 1627 stmf_send_status_done(itask->it_stmf_task, 1628 iscsit_idm_to_stmf(pdu->isp_status), STMF_IOF_LPORT_DONE); 1629 } 1630 kmem_cache_free(iscsit_status_pdu_cache, pdu); 1631 } 1632 1633 /*ARGSUSED*/ 1634 static void 1635 iscsit_send_status_done(idm_pdu_t *pdu, idm_status_t status) 1636 { 1637 iscsit_task_t *itask; 1638 boolean_t aborted; 1639 1640 itask = pdu->isp_private; 1641 aborted = itask->it_stmf_abort; 1642 1643 /* 1644 * After releasing the hold the task may be freed at any time so 1645 * don't touch it. 1646 */ 1647 idm_task_rele(itask->it_idm_task); 1648 if (!aborted) { 1649 stmf_send_status_done(itask->it_stmf_task, 1650 iscsit_idm_to_stmf(pdu->isp_status), STMF_IOF_LPORT_DONE); 1651 } 1652 idm_pdu_free(pdu); 1653 } 1654 1655 1656 void 1657 iscsit_lport_task_free(scsi_task_t *task) 1658 { 1659 iscsit_task_t *itask = task->task_port_private; 1660 1661 /* We only call idm_task_start for regular tasks, not task management */ 1662 if (task->task_mgmt_function == TM_NONE) { 1663 idm_task_done(itask->it_idm_task); 1664 iscsit_task_free(itask); 1665 return; 1666 } else { 1667 iscsit_tm_task_free(itask); 1668 } 1669 } 1670 1671 /*ARGSUSED*/ 1672 stmf_status_t 1673 iscsit_abort(stmf_local_port_t *lport, int abort_cmd, void *arg, uint32_t flags) 1674 { 1675 scsi_task_t *st = (scsi_task_t *)arg; 1676 iscsit_task_t *iscsit_task; 1677 idm_task_t *idt; 1678 1679 /* 1680 * If this is a task management request then there's really not much to 1681 * do. 1682 */ 1683 if (st->task_mgmt_function != TM_NONE) { 1684 return (STMF_ABORT_SUCCESS); 1685 } 1686 1687 /* 1688 * Regular task, start cleaning up 1689 */ 1690 iscsit_task = st->task_port_private; 1691 idt = iscsit_task->it_idm_task; 1692 mutex_enter(&iscsit_task->it_mutex); 1693 iscsit_task->it_stmf_abort = B_TRUE; 1694 if (iscsit_task->it_aborted) { 1695 mutex_exit(&iscsit_task->it_mutex); 1696 /* 1697 * Task is no longer active 1698 */ 1699 iscsit_task_done(iscsit_task); 1700 1701 /* 1702 * STMF specification is wrong... says to return 1703 * STMF_ABORTED, the code actually looks for 1704 * STMF_ABORT_SUCCESS. 1705 */ 1706 return (STMF_ABORT_SUCCESS); 1707 } else { 1708 mutex_exit(&iscsit_task->it_mutex); 1709 /* 1710 * Call IDM to abort the task. Due to a variety of 1711 * circumstances the task may already be in the process of 1712 * aborting. 1713 * We'll let IDM worry about rationalizing all that except 1714 * for one particular instance. If the state of the task 1715 * is TASK_COMPLETE, we need to indicate to the framework 1716 * that we are in fact done. This typically happens with 1717 * framework-initiated task management type requests 1718 * (e.g. abort task). 1719 */ 1720 if (idt->idt_state == TASK_COMPLETE) { 1721 idm_refcnt_wait_ref(&idt->idt_refcnt); 1722 return (STMF_ABORT_SUCCESS); 1723 } else { 1724 idm_task_abort(idt->idt_ic, idt, AT_TASK_MGMT_ABORT); 1725 return (STMF_SUCCESS); 1726 } 1727 } 1728 1729 /*NOTREACHED*/ 1730 } 1731 1732 /*ARGSUSED*/ 1733 void 1734 iscsit_ctl(stmf_local_port_t *lport, int cmd, void *arg) 1735 { 1736 iscsit_tgt_t *iscsit_tgt; 1737 1738 ASSERT((cmd == STMF_CMD_LPORT_ONLINE) || 1739 (cmd == STMF_ACK_LPORT_ONLINE_COMPLETE) || 1740 (cmd == STMF_CMD_LPORT_OFFLINE) || 1741 (cmd == STMF_ACK_LPORT_OFFLINE_COMPLETE)); 1742 1743 iscsit_tgt = (iscsit_tgt_t *)lport->lport_port_private; 1744 1745 switch (cmd) { 1746 case STMF_CMD_LPORT_ONLINE: 1747 iscsit_tgt_sm_event(iscsit_tgt, TE_STMF_ONLINE_REQ); 1748 break; 1749 case STMF_CMD_LPORT_OFFLINE: 1750 iscsit_tgt_sm_event(iscsit_tgt, TE_STMF_OFFLINE_REQ); 1751 break; 1752 case STMF_ACK_LPORT_ONLINE_COMPLETE: 1753 iscsit_tgt_sm_event(iscsit_tgt, TE_STMF_ONLINE_COMPLETE_ACK); 1754 break; 1755 case STMF_ACK_LPORT_OFFLINE_COMPLETE: 1756 iscsit_tgt_sm_event(iscsit_tgt, TE_STMF_OFFLINE_COMPLETE_ACK); 1757 break; 1758 1759 default: 1760 break; 1761 } 1762 } 1763 1764 static stmf_status_t 1765 iscsit_idm_to_stmf(idm_status_t idmrc) 1766 { 1767 switch (idmrc) { 1768 case IDM_STATUS_SUCCESS: 1769 return (STMF_SUCCESS); 1770 default: 1771 return (STMF_FAILURE); 1772 } 1773 /*NOTREACHED*/ 1774 } 1775 1776 1777 /* 1778 * ISCSI protocol 1779 */ 1780 1781 void 1782 iscsit_op_scsi_cmd(idm_conn_t *ic, idm_pdu_t *rx_pdu) 1783 { 1784 iscsit_conn_t *ict; 1785 iscsit_task_t *itask; 1786 scsi_task_t *task; 1787 iscsit_buf_t *ibuf; 1788 iscsi_scsi_cmd_hdr_t *iscsi_scsi = 1789 (iscsi_scsi_cmd_hdr_t *)rx_pdu->isp_hdr; 1790 iscsi_addl_hdr_t *ahs_hdr; 1791 uint16_t addl_cdb_len = 0; 1792 1793 ict = ic->ic_handle; 1794 1795 itask = iscsit_task_alloc(ict); 1796 if (itask == NULL) { 1797 /* Finish processing request */ 1798 iscsit_set_cmdsn(ict, rx_pdu); 1799 1800 iscsit_send_direct_scsi_resp(ict, rx_pdu, 1801 ISCSI_STATUS_CMD_COMPLETED, STATUS_BUSY); 1802 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 1803 return; 1804 } 1805 1806 1807 /* 1808 * Note CmdSN and ITT in task. IDM will have already validated this 1809 * request against the connection state so we don't need to check 1810 * that (the connection may have changed state in the meantime but 1811 * we will catch that when we try to send a response) 1812 */ 1813 itask->it_cmdsn = ntohl(iscsi_scsi->cmdsn); 1814 itask->it_itt = iscsi_scsi->itt; 1815 1816 /* 1817 * Check for extended CDB AHS 1818 */ 1819 if (iscsi_scsi->hlength > 0) { 1820 ahs_hdr = (iscsi_addl_hdr_t *)iscsi_scsi; 1821 addl_cdb_len = ((ahs_hdr->ahs_hlen_hi << 8) | 1822 ahs_hdr->ahs_hlen_lo) - 1; /* Adjust for reserved byte */ 1823 if (((addl_cdb_len + 4) / sizeof (uint32_t)) > 1824 iscsi_scsi->hlength) { 1825 /* Mangled header info, drop it */ 1826 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 1827 return; 1828 } 1829 } 1830 1831 ict = rx_pdu->isp_ic->ic_handle; /* IDM client private */ 1832 1833 /* 1834 * Add task to session list. This function will also check to 1835 * ensure that the task does not already exist. 1836 */ 1837 if (iscsit_task_start(itask) != IDM_STATUS_SUCCESS) { 1838 /* 1839 * Task exists, free all resources and reject. Don't 1840 * update expcmdsn in this case because RFC 3720 says 1841 * "The CmdSN of the rejected command PDU (if it is a 1842 * non-immediate command) MUST NOT be considered received 1843 * by the target (i.e., a command sequence gap must be 1844 * assumed for the CmdSN), even though the CmdSN of the 1845 * rejected command PDU may be reliably ascertained. Upon 1846 * receiving the Reject, the initiator MUST plug the CmdSN 1847 * gap in order to continue to use the session. The gap 1848 * may be plugged either by transmitting a command PDU 1849 * with the same CmdSN, or by aborting the task (see section 1850 * 6.9 on how an abort may plug a CmdSN gap)." (Section 6.3) 1851 */ 1852 iscsit_task_free(itask); 1853 iscsit_send_reject(ict, rx_pdu, ISCSI_REJECT_TASK_IN_PROGRESS); 1854 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 1855 return; 1856 } 1857 1858 /* Update sequence numbers */ 1859 iscsit_set_cmdsn(ict, rx_pdu); 1860 1861 /* 1862 * Allocate STMF task 1863 */ 1864 itask->it_stmf_task = stmf_task_alloc( 1865 itask->it_ict->ict_sess->ist_lport, 1866 itask->it_ict->ict_sess->ist_stmf_sess, iscsi_scsi->lun, 1867 16 + addl_cdb_len, 0); 1868 if (itask->it_stmf_task == NULL) { 1869 /* 1870 * Either stmf really couldn't get memory for a task or, 1871 * more likely, the LU is currently in reset. Either way 1872 * we have no choice but to fail the request. 1873 */ 1874 iscsit_task_done(itask); 1875 iscsit_task_free(itask); 1876 iscsit_send_direct_scsi_resp(ict, rx_pdu, 1877 ISCSI_STATUS_CMD_COMPLETED, STATUS_BUSY); 1878 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 1879 return; 1880 } 1881 1882 task = itask->it_stmf_task; 1883 task->task_port_private = itask; 1884 1885 bcopy(iscsi_scsi->lun, task->task_lun_no, sizeof (task->task_lun_no)); 1886 1887 /* 1888 * iSCSI and Comstar use the same values. Should we rely on this 1889 * or translate them bit-wise? 1890 */ 1891 1892 task->task_flags = 1893 (((iscsi_scsi->flags & ISCSI_FLAG_CMD_READ) ? TF_READ_DATA : 0) | 1894 ((iscsi_scsi->flags & ISCSI_FLAG_CMD_WRITE) ? TF_WRITE_DATA : 0) | 1895 ((rx_pdu->isp_datalen == 0) ? 0 : TF_INITIAL_BURST)); 1896 1897 switch (iscsi_scsi->flags & ISCSI_FLAG_CMD_ATTR_MASK) { 1898 case ISCSI_ATTR_UNTAGGED: 1899 break; 1900 case ISCSI_ATTR_SIMPLE: 1901 task->task_additional_flags |= TF_ATTR_SIMPLE_QUEUE; 1902 break; 1903 case ISCSI_ATTR_ORDERED: 1904 task->task_additional_flags |= TF_ATTR_ORDERED_QUEUE; 1905 break; 1906 case ISCSI_ATTR_HEAD_OF_QUEUE: 1907 task->task_additional_flags |= TF_ATTR_HEAD_OF_QUEUE; 1908 break; 1909 case ISCSI_ATTR_ACA: 1910 task->task_additional_flags |= TF_ATTR_ACA; 1911 break; 1912 default: 1913 /* Protocol error but just take it, treat as untagged */ 1914 break; 1915 } 1916 1917 1918 task->task_additional_flags = 0; 1919 task->task_priority = 0; 1920 task->task_mgmt_function = TM_NONE; 1921 1922 /* 1923 * This "task_max_nbufs" doesn't map well to BIDI. We probably need 1924 * parameter for each direction. "MaxOutstandingR2T" may very well 1925 * be set to one which could prevent us from doing simultaneous 1926 * transfers in each direction. 1927 */ 1928 task->task_max_nbufs = (iscsi_scsi->flags & ISCSI_FLAG_CMD_WRITE) ? 1929 ict->ict_op.op_max_outstanding_r2t : STMF_BUFS_MAX; 1930 task->task_cmd_seq_no = ntohl(iscsi_scsi->itt); 1931 task->task_expected_xfer_length = ntohl(iscsi_scsi->data_length); 1932 1933 /* Copy CDB */ 1934 bcopy(iscsi_scsi->scb, task->task_cdb, 16); 1935 if (addl_cdb_len > 0) { 1936 bcopy(ahs_hdr->ahs_extscb, task->task_cdb + 16, addl_cdb_len); 1937 } 1938 1939 DTRACE_ISCSI_3(scsi__command, idm_conn_t *, ic, 1940 iscsi_scsi_cmd_hdr_t *, (iscsi_scsi_cmd_hdr_t *)rx_pdu->isp_hdr, 1941 scsi_task_t *, task); 1942 1943 /* 1944 * Copy the transport header into the task handle from the PDU 1945 * handle. The transport header describes this task's remote tagged 1946 * buffer. 1947 */ 1948 if (rx_pdu->isp_transport_hdrlen != 0) { 1949 bcopy(rx_pdu->isp_transport_hdr, 1950 itask->it_idm_task->idt_transport_hdr, 1951 rx_pdu->isp_transport_hdrlen); 1952 } 1953 1954 /* 1955 * Tell IDM about our new active task 1956 */ 1957 idm_task_start(itask->it_idm_task, (uintptr_t)itask->it_itt); 1958 1959 /* 1960 * If we have any immediate data then setup the immediate buffer 1961 * context that comes with the task 1962 */ 1963 if (rx_pdu->isp_datalen) { 1964 ibuf = itask->it_immed_data; 1965 ibuf->ibuf_immed_data_pdu = rx_pdu; 1966 ibuf->ibuf_stmf_buf->db_data_size = rx_pdu->isp_datalen; 1967 ibuf->ibuf_stmf_buf->db_buf_size = rx_pdu->isp_datalen; 1968 ibuf->ibuf_stmf_buf->db_relative_offset = 0; 1969 ibuf->ibuf_stmf_buf->db_sglist[0].seg_length = 1970 rx_pdu->isp_datalen; 1971 ibuf->ibuf_stmf_buf->db_sglist[0].seg_addr = rx_pdu->isp_data; 1972 1973 DTRACE_ISCSI_8(xfer__start, idm_conn_t *, ic, 1974 uintptr_t, ibuf->ibuf_stmf_buf->db_sglist[0].seg_addr, 1975 uint32_t, ibuf->ibuf_stmf_buf->db_relative_offset, 1976 uint64_t, 0, uint32_t, 0, uint32_t, 0, /* no raddr */ 1977 uint32_t, rx_pdu->isp_datalen, int, XFER_BUF_TX_TO_INI); 1978 1979 /* 1980 * For immediate data transfer, there is no callback from 1981 * stmf to indicate that the initial burst of data is 1982 * transferred successfully. In some cases, the task can 1983 * get freed before execution returns from stmf_post_task. 1984 * Although this xfer-start/done probe accurately tracks 1985 * the size of the transfer, it does only provide a best 1986 * effort on the timing of the transfer. 1987 */ 1988 DTRACE_ISCSI_8(xfer__done, idm_conn_t *, ic, 1989 uintptr_t, ibuf->ibuf_stmf_buf->db_sglist[0].seg_addr, 1990 uint32_t, ibuf->ibuf_stmf_buf->db_relative_offset, 1991 uint64_t, 0, uint32_t, 0, uint32_t, 0, /* no raddr */ 1992 uint32_t, rx_pdu->isp_datalen, int, XFER_BUF_TX_TO_INI); 1993 1994 stmf_post_task(task, ibuf->ibuf_stmf_buf); 1995 } else { 1996 1997 stmf_post_task(task, NULL); 1998 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 1999 } 2000 } 2001 2002 /*ARGSUSED*/ 2003 void 2004 iscsit_deferred_dispatch(idm_pdu_t *rx_pdu) 2005 { 2006 iscsit_conn_t *ict = rx_pdu->isp_ic->ic_handle; 2007 2008 /* 2009 * If the connection has been lost then ignore new PDU's 2010 */ 2011 mutex_enter(&ict->ict_mutex); 2012 if (ict->ict_lost) { 2013 mutex_exit(&ict->ict_mutex); 2014 idm_pdu_complete(rx_pdu, IDM_STATUS_FAIL); 2015 return; 2016 } 2017 2018 /* 2019 * Grab a hold on the connection to prevent it from going away 2020 * between now and when the taskq function is called. 2021 */ 2022 iscsit_conn_dispatch_hold(ict); 2023 mutex_exit(&ict->ict_mutex); 2024 2025 if (taskq_dispatch(iscsit_global.global_dispatch_taskq, 2026 iscsit_deferred, rx_pdu, DDI_NOSLEEP) == NULL) { 2027 /* 2028 * In the unlikely scenario that we couldn't get the resources 2029 * to dispatch the PDU then just drop it. 2030 */ 2031 idm_pdu_complete(rx_pdu, IDM_STATUS_FAIL); 2032 idm_conn_event(ict->ict_ic, CE_TRANSPORT_FAIL, NULL); 2033 iscsit_conn_dispatch_rele(ict); 2034 } 2035 } 2036 2037 static void 2038 iscsit_deferred(void *rx_pdu_void) 2039 { 2040 idm_pdu_t *rx_pdu = rx_pdu_void; 2041 idm_conn_t *ic = rx_pdu->isp_ic; 2042 iscsit_conn_t *ict = ic->ic_handle; 2043 2044 switch (IDM_PDU_OPCODE(rx_pdu)) { 2045 case ISCSI_OP_NOOP_OUT: 2046 iscsit_set_cmdsn(ict, rx_pdu); 2047 iscsit_pdu_op_noop(ict, rx_pdu); 2048 break; 2049 case ISCSI_OP_LOGIN_CMD: 2050 iscsit_pdu_op_login_cmd(ict, rx_pdu); 2051 break; 2052 case ISCSI_OP_TEXT_CMD: 2053 iscsit_set_cmdsn(ict, rx_pdu); 2054 iscsit_pdu_op_text_cmd(ict, rx_pdu); 2055 break; 2056 case ISCSI_OP_LOGOUT_CMD: 2057 iscsit_set_cmdsn(ict, rx_pdu); 2058 iscsit_pdu_op_logout_cmd(ict, rx_pdu); 2059 break; 2060 default: 2061 /* Protocol error. IDM should have caught this */ 2062 idm_pdu_complete(rx_pdu, IDM_STATUS_FAIL); 2063 ASSERT(0); 2064 break; 2065 } 2066 2067 iscsit_conn_dispatch_rele(ict); 2068 } 2069 2070 static void 2071 iscsit_send_direct_scsi_resp(iscsit_conn_t *ict, idm_pdu_t *rx_pdu, 2072 uint8_t response, uint8_t cmd_status) 2073 { 2074 idm_pdu_t *rsp_pdu; 2075 idm_conn_t *ic; 2076 iscsi_scsi_rsp_hdr_t *resp; 2077 iscsi_scsi_cmd_hdr_t *req = 2078 (iscsi_scsi_cmd_hdr_t *)rx_pdu->isp_hdr; 2079 2080 ic = ict->ict_ic; 2081 2082 rsp_pdu = idm_pdu_alloc(sizeof (iscsi_scsi_rsp_hdr_t), 0); 2083 idm_pdu_init(rsp_pdu, ic, NULL, NULL); 2084 /* 2085 * StatSN is incremented by 1 for every response sent on 2086 * a connection except for responses sent as a result of 2087 * a retry or SNACK 2088 */ 2089 rsp_pdu->isp_flags |= IDM_PDU_SET_STATSN | IDM_PDU_ADVANCE_STATSN; 2090 2091 resp = (iscsi_scsi_rsp_hdr_t *)rsp_pdu->isp_hdr; 2092 2093 resp->opcode = ISCSI_OP_SCSI_RSP; 2094 resp->flags = ISCSI_FLAG_FINAL; 2095 resp->response = response; 2096 resp->cmd_status = cmd_status; 2097 resp->itt = req->itt; 2098 if ((response == ISCSI_STATUS_CMD_COMPLETED) && 2099 (req->data_length != 0) && 2100 ((req->flags & ISCSI_FLAG_CMD_READ) || 2101 (req->flags & ISCSI_FLAG_CMD_WRITE))) { 2102 resp->flags |= ISCSI_FLAG_CMD_UNDERFLOW; 2103 resp->residual_count = req->data_length; 2104 } 2105 2106 DTRACE_PROBE4(iscsi__scsi__direct__response, 2107 iscsit_conn_t *, ict, 2108 uint8_t, resp->response, 2109 uint8_t, resp->cmd_status, 2110 idm_pdu_t *, rsp_pdu); 2111 2112 iscsit_pdu_tx(rsp_pdu); 2113 } 2114 2115 void 2116 iscsit_send_task_mgmt_resp(idm_pdu_t *tm_resp_pdu, uint8_t tm_status) 2117 { 2118 iscsi_scsi_task_mgt_rsp_hdr_t *tm_resp; 2119 2120 /* 2121 * The target must take note of the last-sent StatSN. 2122 * The StatSN is to be incremented after sending a 2123 * task management response. Digest recovery can only 2124 * work if StatSN is incremented. 2125 */ 2126 tm_resp_pdu->isp_flags |= IDM_PDU_SET_STATSN | IDM_PDU_ADVANCE_STATSN; 2127 tm_resp = (iscsi_scsi_task_mgt_rsp_hdr_t *)tm_resp_pdu->isp_hdr; 2128 tm_resp->response = tm_status; 2129 2130 DTRACE_PROBE3(iscsi__scsi__tm__response, 2131 iscsit_conn_t *, tm_resp_pdu->isp_ic->ic_handle, 2132 uint8_t, tm_resp->response, 2133 idm_pdu_t *, tm_resp_pdu); 2134 iscsit_pdu_tx(tm_resp_pdu); 2135 } 2136 2137 void 2138 iscsit_op_scsi_task_mgmt(iscsit_conn_t *ict, idm_pdu_t *rx_pdu) 2139 { 2140 idm_pdu_t *tm_resp_pdu; 2141 iscsit_task_t *itask; 2142 iscsit_task_t *tm_itask; 2143 scsi_task_t *task; 2144 iscsi_scsi_task_mgt_hdr_t *iscsi_tm = 2145 (iscsi_scsi_task_mgt_hdr_t *)rx_pdu->isp_hdr; 2146 iscsi_scsi_task_mgt_rsp_hdr_t *iscsi_tm_rsp = 2147 (iscsi_scsi_task_mgt_rsp_hdr_t *)rx_pdu->isp_hdr; 2148 uint32_t rtt, cmdsn, refcmdsn; 2149 uint8_t tm_func; 2150 2151 /* 2152 * Setup response PDU (response field will get filled in later) 2153 */ 2154 tm_resp_pdu = idm_pdu_alloc(sizeof (iscsi_scsi_task_mgt_rsp_hdr_t), 0); 2155 if (tm_resp_pdu == NULL) { 2156 /* Can't respond, just drop it */ 2157 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2158 return; 2159 } 2160 idm_pdu_init(tm_resp_pdu, ict->ict_ic, NULL, NULL); 2161 iscsi_tm_rsp = (iscsi_scsi_task_mgt_rsp_hdr_t *)tm_resp_pdu->isp_hdr; 2162 bzero(iscsi_tm_rsp, sizeof (iscsi_scsi_task_mgt_rsp_hdr_t)); 2163 iscsi_tm_rsp->opcode = ISCSI_OP_SCSI_TASK_MGT_RSP; 2164 iscsi_tm_rsp->flags = ISCSI_FLAG_FINAL; 2165 iscsi_tm_rsp->itt = rx_pdu->isp_hdr->itt; 2166 2167 /* 2168 * Figure out what we're being asked to do. 2169 */ 2170 DTRACE_PROBE4(iscsi__scsi__tm__request, 2171 iscsit_conn_t *, ict, 2172 uint8_t, (iscsi_tm->function & ISCSI_FLAG_TASK_MGMT_FUNCTION_MASK), 2173 uint32_t, iscsi_tm->rtt, 2174 idm_pdu_t *, rx_pdu); 2175 switch (iscsi_tm->function & ISCSI_FLAG_TASK_MGMT_FUNCTION_MASK) { 2176 case ISCSI_TM_FUNC_ABORT_TASK: 2177 /* 2178 * STMF doesn't currently support the "abort task" task 2179 * management command although it does support aborting 2180 * an individual task. We'll get STMF to abort the task 2181 * for us but handle the details of the task management 2182 * command ourselves. 2183 * 2184 * Find the task associated with the referenced task tag. 2185 */ 2186 rtt = iscsi_tm->rtt; 2187 itask = (iscsit_task_t *)idm_task_find_by_handle(ict->ict_ic, 2188 (uintptr_t)rtt); 2189 2190 if (itask == NULL) { 2191 cmdsn = ntohl(iscsi_tm->cmdsn); 2192 refcmdsn = ntohl(iscsi_tm->refcmdsn); 2193 2194 /* 2195 * Task was not found. If RefCmdSN is within the CmdSN 2196 * window and less than CmdSN of the TM function, return 2197 * "Function Complete". Otherwise, return 2198 * "Task Does Not Exist". 2199 */ 2200 2201 if (iscsit_cmdsn_in_window(ict, refcmdsn) && 2202 (refcmdsn < cmdsn)) { 2203 iscsit_send_task_mgmt_resp(tm_resp_pdu, 2204 SCSI_TCP_TM_RESP_COMPLETE); 2205 } else { 2206 iscsit_send_task_mgmt_resp(tm_resp_pdu, 2207 SCSI_TCP_TM_RESP_NO_TASK); 2208 } 2209 } else { 2210 2211 /* 2212 * Tell STMF to abort the task. This will do no harm 2213 * if the task is already complete. 2214 */ 2215 stmf_abort(STMF_QUEUE_TASK_ABORT, itask->it_stmf_task, 2216 STMF_ABORTED, NULL); 2217 2218 /* 2219 * Make sure the task hasn't already completed 2220 */ 2221 mutex_enter(&itask->it_idm_task->idt_mutex); 2222 if ((itask->it_idm_task->idt_state == TASK_COMPLETE) || 2223 (itask->it_idm_task->idt_state == TASK_IDLE)) { 2224 /* 2225 * Task is complete, return "Task Does Not 2226 * Exist" 2227 */ 2228 mutex_exit(&itask->it_idm_task->idt_mutex); 2229 iscsit_send_task_mgmt_resp(tm_resp_pdu, 2230 SCSI_TCP_TM_RESP_NO_TASK); 2231 } else { 2232 /* 2233 * STMF is now aborting the task, return 2234 * "Function Complete" 2235 */ 2236 mutex_exit(&itask->it_idm_task->idt_mutex); 2237 iscsit_send_task_mgmt_resp(tm_resp_pdu, 2238 SCSI_TCP_TM_RESP_COMPLETE); 2239 } 2240 idm_task_rele(itask->it_idm_task); 2241 } 2242 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2243 return; 2244 2245 case ISCSI_TM_FUNC_ABORT_TASK_SET: 2246 tm_func = TM_ABORT_TASK_SET; 2247 break; 2248 2249 case ISCSI_TM_FUNC_CLEAR_ACA: 2250 tm_func = TM_CLEAR_ACA; 2251 break; 2252 2253 case ISCSI_TM_FUNC_CLEAR_TASK_SET: 2254 tm_func = TM_CLEAR_TASK_SET; 2255 break; 2256 2257 case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET: 2258 tm_func = TM_LUN_RESET; 2259 break; 2260 2261 case ISCSI_TM_FUNC_TARGET_WARM_RESET: 2262 tm_func = TM_TARGET_WARM_RESET; 2263 break; 2264 2265 case ISCSI_TM_FUNC_TARGET_COLD_RESET: 2266 tm_func = TM_TARGET_COLD_RESET; 2267 break; 2268 2269 case ISCSI_TM_FUNC_TASK_REASSIGN: 2270 /* 2271 * We do not currently support allegiance reassignment. When 2272 * we start supporting ERL1+, we will need to. 2273 */ 2274 iscsit_send_task_mgmt_resp(tm_resp_pdu, 2275 SCSI_TCP_TM_RESP_NO_ALLG_REASSN); 2276 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2277 return; 2278 2279 default: 2280 iscsit_send_task_mgmt_resp(tm_resp_pdu, 2281 SCSI_TCP_TM_RESP_REJECTED); 2282 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2283 return; 2284 } 2285 2286 tm_itask = iscsit_tm_task_alloc(ict); 2287 if (tm_itask == NULL) { 2288 iscsit_send_task_mgmt_resp(tm_resp_pdu, 2289 SCSI_TCP_TM_RESP_REJECTED); 2290 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2291 return; 2292 } 2293 2294 2295 task = stmf_task_alloc(ict->ict_sess->ist_lport, 2296 ict->ict_sess->ist_stmf_sess, iscsi_tm->lun, 2297 0, STMF_TASK_EXT_NONE); 2298 if (task == NULL) { 2299 /* 2300 * If this happens, either the LU is in reset, couldn't 2301 * get memory, or some other condition in which we simply 2302 * can't complete this request. It would be nice to return 2303 * an error code like "busy" but the closest we have is 2304 * "rejected". 2305 */ 2306 iscsit_send_task_mgmt_resp(tm_resp_pdu, 2307 SCSI_TCP_TM_RESP_REJECTED); 2308 iscsit_tm_task_free(tm_itask); 2309 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2310 return; 2311 } 2312 2313 tm_itask->it_tm_pdu = tm_resp_pdu; 2314 tm_itask->it_stmf_task = task; 2315 task->task_port_private = tm_itask; 2316 task->task_mgmt_function = tm_func; 2317 task->task_additional_flags = TASK_AF_NO_EXPECTED_XFER_LENGTH; 2318 task->task_priority = 0; 2319 task->task_max_nbufs = STMF_BUFS_MAX; 2320 task->task_cmd_seq_no = iscsi_tm->itt; 2321 task->task_expected_xfer_length = 0; 2322 2323 stmf_post_task(task, NULL); 2324 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2325 } 2326 2327 static void 2328 iscsit_pdu_op_noop(iscsit_conn_t *ict, idm_pdu_t *rx_pdu) 2329 { 2330 iscsi_nop_out_hdr_t *out = (iscsi_nop_out_hdr_t *)rx_pdu->isp_hdr; 2331 iscsi_nop_in_hdr_t *in; 2332 int resp_datalen; 2333 idm_pdu_t *resp; 2334 2335 /* Ignore the response from initiator */ 2336 if ((out->itt == ISCSI_RSVD_TASK_TAG) || 2337 (out->ttt != ISCSI_RSVD_TASK_TAG)) { 2338 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2339 return; 2340 } 2341 2342 /* Allocate a PDU to respond */ 2343 resp_datalen = ntoh24(out->dlength); 2344 resp = idm_pdu_alloc(sizeof (iscsi_hdr_t), resp_datalen); 2345 idm_pdu_init(resp, ict->ict_ic, NULL, NULL); 2346 if (resp_datalen > 0) { 2347 bcopy(rx_pdu->isp_data, resp->isp_data, resp_datalen); 2348 } 2349 2350 /* 2351 * When sending a NOP-In as a response to a NOP-Out from the initiator, 2352 * the target must respond with the same initiator task tag that was 2353 * provided in the NOP-Out request, the target transfer tag must be 2354 * ISCSI_RSVD_TASK_TAG (0xffffffff) and StatSN will contain the next 2355 * status sequence number. The StatSN for the connection is advanced 2356 * after this PDU is sent. 2357 */ 2358 in = (iscsi_nop_in_hdr_t *)resp->isp_hdr; 2359 bzero(in, sizeof (*in)); 2360 in->opcode = ISCSI_OP_NOOP_IN; 2361 in->flags = ISCSI_FLAG_FINAL; 2362 bcopy(out->lun, in->lun, 8); 2363 in->itt = out->itt; 2364 in->ttt = ISCSI_RSVD_TASK_TAG; 2365 hton24(in->dlength, resp_datalen); 2366 resp->isp_flags |= IDM_PDU_SET_STATSN | IDM_PDU_ADVANCE_STATSN; 2367 /* Any other field in resp to be set? */ 2368 iscsit_pdu_tx(resp); 2369 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2370 } 2371 2372 static void 2373 iscsit_pdu_op_login_cmd(iscsit_conn_t *ict, idm_pdu_t *rx_pdu) 2374 { 2375 2376 /* 2377 * Submit PDU to login state machine. State machine will free the 2378 * PDU. 2379 */ 2380 iscsit_login_sm_event(ict, ILE_LOGIN_RCV, rx_pdu); 2381 } 2382 2383 void 2384 iscsit_pdu_op_logout_cmd(iscsit_conn_t *ict, idm_pdu_t *rx_pdu) 2385 { 2386 iscsi_logout_hdr_t *logout_req = 2387 (iscsi_logout_hdr_t *)rx_pdu->isp_hdr; 2388 iscsi_logout_rsp_hdr_t *logout_rsp; 2389 idm_pdu_t *resp; 2390 2391 /* Allocate a PDU to respond */ 2392 resp = idm_pdu_alloc(sizeof (iscsi_hdr_t), 0); 2393 idm_pdu_init(resp, ict->ict_ic, NULL, NULL); 2394 /* 2395 * The StatSN is to be sent to the initiator, 2396 * it is not required to increment the number 2397 * as the connection is terminating. 2398 */ 2399 resp->isp_flags |= IDM_PDU_SET_STATSN; 2400 /* 2401 * Logout results in the immediate termination of all tasks except 2402 * if the logout reason is ISCSI_LOGOUT_REASON_RECOVERY. The 2403 * connection state machine will drive this task cleanup automatically 2404 * so we don't need to handle that here. 2405 */ 2406 logout_rsp = (iscsi_logout_rsp_hdr_t *)resp->isp_hdr; 2407 bzero(logout_rsp, sizeof (*logout_rsp)); 2408 logout_rsp->opcode = ISCSI_OP_LOGOUT_RSP; 2409 logout_rsp->flags = ISCSI_FLAG_FINAL; 2410 logout_rsp->itt = logout_req->itt; 2411 if ((logout_req->flags & ISCSI_FLAG_LOGOUT_REASON_MASK) > 2412 ISCSI_LOGOUT_REASON_RECOVERY) { 2413 logout_rsp->response = ISCSI_LOGOUT_RECOVERY_UNSUPPORTED; 2414 } else { 2415 logout_rsp->response = ISCSI_LOGOUT_SUCCESS; 2416 } 2417 2418 iscsit_pdu_tx(resp); 2419 idm_pdu_complete(rx_pdu, IDM_STATUS_SUCCESS); 2420 } 2421 2422 /* 2423 * Calculate the number of outstanding commands we can process 2424 */ 2425 int 2426 iscsit_cmd_window() 2427 { 2428 /* Will be better later */ 2429 return (1024); 2430 } 2431 2432 /* 2433 * Set local registers based on incoming PDU 2434 */ 2435 void 2436 iscsit_set_cmdsn(iscsit_conn_t *ict, idm_pdu_t *rx_pdu) 2437 { 2438 iscsit_sess_t *ist; 2439 iscsi_scsi_cmd_hdr_t *req; 2440 2441 ist = ict->ict_sess; 2442 2443 req = (iscsi_scsi_cmd_hdr_t *)rx_pdu->isp_hdr; 2444 2445 rw_enter(&ist->ist_sn_rwlock, RW_WRITER); 2446 ist->ist_expcmdsn = ntohl(req->cmdsn) + 1; 2447 ist->ist_maxcmdsn = ntohl(req->cmdsn) + iscsit_cmd_window(); 2448 rw_exit(&ist->ist_sn_rwlock); 2449 } 2450 2451 /* 2452 * Wrapper funtion, calls iscsi_calc_rspsn and idm_pdu_tx 2453 */ 2454 void 2455 iscsit_pdu_tx(idm_pdu_t *pdu) 2456 { 2457 iscsit_conn_t *ict = pdu->isp_ic->ic_handle; 2458 iscsi_scsi_rsp_hdr_t *rsp = (iscsi_scsi_rsp_hdr_t *)pdu->isp_hdr; 2459 iscsit_sess_t *ist = ict->ict_sess; 2460 2461 /* 2462 * The command sequence numbers are session-wide and must stay 2463 * consistent across the transfer, so protect the cmdsn with a 2464 * reader lock on the session. The status sequence number will 2465 * be updated just before the transport layer transmits the PDU. 2466 */ 2467 2468 rw_enter(&ict->ict_sess->ist_sn_rwlock, RW_READER); 2469 /* Set ExpCmdSN and MaxCmdSN */ 2470 rsp->maxcmdsn = htonl(ist->ist_maxcmdsn); 2471 rsp->expcmdsn = htonl(ist->ist_expcmdsn); 2472 idm_pdu_tx(pdu); 2473 rw_exit(&ict->ict_sess->ist_sn_rwlock); 2474 } 2475 2476 /* 2477 * Internal functions 2478 */ 2479 2480 void 2481 iscsit_send_async_event(iscsit_conn_t *ict, uint8_t event) 2482 { 2483 idm_pdu_t *abt; 2484 iscsi_async_evt_hdr_t *async_abt; 2485 2486 /* 2487 * Get a PDU to build the abort request. 2488 */ 2489 abt = idm_pdu_alloc(sizeof (iscsi_hdr_t), 0); 2490 if (abt == NULL) { 2491 idm_conn_event(ict->ict_ic, CE_TRANSPORT_FAIL, NULL); 2492 return; 2493 } 2494 2495 /* 2496 * A asynchronous message is sent by the target to request a logout. 2497 * The StatSN for the connection is advanced after the PDU is sent 2498 * to allow for initiator and target state synchronization. 2499 */ 2500 idm_pdu_init(abt, ict->ict_ic, NULL, NULL); 2501 abt->isp_datalen = 0; 2502 abt->isp_flags |= IDM_PDU_SET_STATSN | IDM_PDU_ADVANCE_STATSN; 2503 2504 async_abt = (iscsi_async_evt_hdr_t *)abt->isp_hdr; 2505 bzero(async_abt, sizeof (*async_abt)); 2506 async_abt->opcode = ISCSI_OP_ASYNC_EVENT; 2507 async_abt->async_event = event; 2508 async_abt->flags = ISCSI_FLAG_FINAL; 2509 async_abt->rsvd4[0] = 0xff; 2510 async_abt->rsvd4[1] = 0xff; 2511 async_abt->rsvd4[2] = 0xff; 2512 async_abt->rsvd4[3] = 0xff; 2513 2514 switch (event) { 2515 case ISCSI_ASYNC_EVENT_REQUEST_LOGOUT: 2516 async_abt->param3 = htons(IDM_LOGOUT_SECONDS); 2517 break; 2518 case ISCSI_ASYNC_EVENT_SCSI_EVENT: 2519 case ISCSI_ASYNC_EVENT_DROPPING_CONNECTION: 2520 case ISCSI_ASYNC_EVENT_DROPPING_ALL_CONNECTIONS: 2521 case ISCSI_ASYNC_EVENT_PARAM_NEGOTIATION: 2522 default: 2523 ASSERT(0); 2524 } 2525 2526 iscsit_pdu_tx(abt); 2527 } 2528 2529 void 2530 iscsit_send_reject(iscsit_conn_t *ict, idm_pdu_t *rejected_pdu, uint8_t reason) 2531 { 2532 idm_pdu_t *reject_pdu; 2533 iscsi_reject_rsp_hdr_t *reject; 2534 2535 /* 2536 * Get a PDU to build the abort request. 2537 */ 2538 reject_pdu = idm_pdu_alloc(sizeof (iscsi_hdr_t), 2539 rejected_pdu->isp_hdrlen); 2540 if (reject_pdu == NULL) { 2541 idm_conn_event(ict->ict_ic, CE_TRANSPORT_FAIL, NULL); 2542 return; 2543 } 2544 idm_pdu_init(reject_pdu, ict->ict_ic, NULL, NULL); 2545 /* StatSN is advanced after a Reject PDU */ 2546 reject_pdu->isp_flags |= IDM_PDU_SET_STATSN | IDM_PDU_ADVANCE_STATSN; 2547 reject_pdu->isp_datalen = rejected_pdu->isp_hdrlen; 2548 bcopy(rejected_pdu->isp_hdr, reject_pdu->isp_data, 2549 rejected_pdu->isp_hdrlen); 2550 2551 reject = (iscsi_reject_rsp_hdr_t *)reject_pdu->isp_hdr; 2552 bzero(reject, sizeof (*reject)); 2553 reject->opcode = ISCSI_OP_REJECT_MSG; 2554 reject->reason = reason; 2555 reject->flags = ISCSI_FLAG_FINAL; 2556 hton24(reject->dlength, rejected_pdu->isp_hdrlen); 2557 reject->must_be_ff[0] = 0xff; 2558 reject->must_be_ff[1] = 0xff; 2559 reject->must_be_ff[2] = 0xff; 2560 reject->must_be_ff[3] = 0xff; 2561 2562 iscsit_pdu_tx(reject_pdu); 2563 } 2564 2565 2566 static iscsit_task_t * 2567 iscsit_task_alloc(iscsit_conn_t *ict) 2568 { 2569 iscsit_task_t *itask; 2570 iscsit_buf_t *immed_ibuf; 2571 2572 /* 2573 * Possible items to pre-alloc if we cache iscsit_task_t's: 2574 * 2575 * Status PDU w/ sense buffer 2576 * stmf_data_buf_t for immediate data 2577 */ 2578 itask = kmem_alloc(sizeof (iscsit_task_t) + sizeof (iscsit_buf_t) + 2579 sizeof (stmf_data_buf_t), KM_NOSLEEP); 2580 if (itask != NULL) { 2581 mutex_init(&itask->it_mutex, NULL, MUTEX_DRIVER, NULL); 2582 itask->it_aborted = itask->it_stmf_abort = 2583 itask->it_tm_task = 0; 2584 2585 immed_ibuf = (iscsit_buf_t *)(itask + 1); 2586 bzero(immed_ibuf, sizeof (*immed_ibuf)); 2587 immed_ibuf->ibuf_is_immed = B_TRUE; 2588 immed_ibuf->ibuf_stmf_buf = (stmf_data_buf_t *)(immed_ibuf + 1); 2589 2590 bzero(immed_ibuf->ibuf_stmf_buf, sizeof (stmf_data_buf_t)); 2591 immed_ibuf->ibuf_stmf_buf->db_port_private = immed_ibuf; 2592 immed_ibuf->ibuf_stmf_buf->db_sglist_length = 1; 2593 immed_ibuf->ibuf_stmf_buf->db_flags = DB_DIRECTION_FROM_RPORT | 2594 DB_DONT_CACHE; 2595 itask->it_immed_data = immed_ibuf; 2596 itask->it_idm_task = idm_task_alloc(ict->ict_ic); 2597 if (itask->it_idm_task != NULL) { 2598 itask->it_idm_task->idt_private = itask; 2599 itask->it_ict = ict; 2600 itask->it_ttt = itask->it_idm_task->idt_tt; 2601 return (itask); 2602 } else { 2603 kmem_free(itask, sizeof (iscsit_task_t) + 2604 sizeof (iscsit_buf_t) + sizeof (stmf_data_buf_t)); 2605 } 2606 } 2607 2608 return (NULL); 2609 } 2610 2611 static void 2612 iscsit_task_free(iscsit_task_t *itask) 2613 { 2614 idm_task_free(itask->it_idm_task); 2615 mutex_destroy(&itask->it_mutex); 2616 kmem_free(itask, sizeof (iscsit_task_t) + 2617 sizeof (iscsit_buf_t) + sizeof (stmf_data_buf_t)); 2618 } 2619 2620 static iscsit_task_t * 2621 iscsit_tm_task_alloc(iscsit_conn_t *ict) 2622 { 2623 iscsit_task_t *itask; 2624 2625 itask = kmem_zalloc(sizeof (iscsit_task_t), KM_NOSLEEP); 2626 if (itask != NULL) { 2627 idm_conn_hold(ict->ict_ic); 2628 mutex_init(&itask->it_mutex, NULL, MUTEX_DRIVER, NULL); 2629 itask->it_aborted = itask->it_stmf_abort = 2630 itask->it_tm_responded = 0; 2631 itask->it_tm_pdu = NULL; 2632 itask->it_tm_task = 1; 2633 itask->it_ict = ict; 2634 } 2635 2636 return (itask); 2637 } 2638 2639 static void 2640 iscsit_tm_task_free(iscsit_task_t *itask) 2641 { 2642 /* 2643 * If we responded then the call to idm_pdu_complete will free the 2644 * PDU. Otherwise we got aborted before the TM function could 2645 * complete and we need to free the PDU explicitly. 2646 */ 2647 if (itask->it_tm_pdu != NULL && !itask->it_tm_responded) 2648 idm_pdu_free(itask->it_tm_pdu); 2649 idm_conn_rele(itask->it_ict->ict_ic); 2650 mutex_destroy(&itask->it_mutex); 2651 kmem_free(itask, sizeof (iscsit_task_t)); 2652 } 2653 2654 static idm_status_t 2655 iscsit_task_start(iscsit_task_t *itask) 2656 { 2657 iscsit_sess_t *ist = itask->it_ict->ict_sess; 2658 avl_index_t where; 2659 2660 /* 2661 * Sanity check the ITT and ensure that this task does not already 2662 * exist. If not then add the task to the session task list. 2663 */ 2664 mutex_enter(&ist->ist_mutex); 2665 mutex_enter(&itask->it_mutex); 2666 itask->it_active = 1; 2667 if (avl_find(&ist->ist_task_list, itask, &where) == NULL) { 2668 /* New task, add to AVL */ 2669 avl_insert(&ist->ist_task_list, itask, where); 2670 mutex_exit(&itask->it_mutex); 2671 mutex_exit(&ist->ist_mutex); 2672 return (IDM_STATUS_SUCCESS); 2673 } 2674 mutex_exit(&itask->it_mutex); 2675 mutex_exit(&ist->ist_mutex); 2676 2677 return (IDM_STATUS_REJECT); 2678 } 2679 2680 static void 2681 iscsit_task_done(iscsit_task_t *itask) 2682 { 2683 iscsit_sess_t *ist = itask->it_ict->ict_sess; 2684 2685 mutex_enter(&ist->ist_mutex); 2686 mutex_enter(&itask->it_mutex); 2687 if (itask->it_active) { 2688 avl_remove(&ist->ist_task_list, itask); 2689 itask->it_active = 0; 2690 } 2691 mutex_exit(&itask->it_mutex); 2692 mutex_exit(&ist->ist_mutex); 2693 } 2694 2695 /* 2696 * iscsit status PDU cache 2697 */ 2698 2699 /*ARGSUSED*/ 2700 static int 2701 iscsit_status_pdu_constructor(void *pdu_void, void *arg, int flags) 2702 { 2703 idm_pdu_t *pdu = pdu_void; 2704 iscsi_scsi_rsp_hdr_t *rsp; 2705 2706 bzero(pdu, sizeof (idm_pdu_t)); 2707 pdu->isp_callback = iscsit_send_good_status_done; 2708 pdu->isp_magic = IDM_PDU_MAGIC; 2709 pdu->isp_hdr = (iscsi_hdr_t *)(pdu + 1); /* Ptr arithmetic */ 2710 pdu->isp_hdrlen = sizeof (iscsi_hdr_t); 2711 2712 /* Setup status response */ 2713 rsp = (iscsi_scsi_rsp_hdr_t *)pdu->isp_hdr; 2714 bzero(rsp, sizeof (*rsp)); 2715 rsp->opcode = ISCSI_OP_SCSI_RSP; 2716 rsp->flags = ISCSI_FLAG_FINAL; 2717 rsp->response = ISCSI_STATUS_CMD_COMPLETED; 2718 2719 return (0); 2720 } 2721 2722 /* 2723 * iscsit private data handler 2724 */ 2725 2726 /*ARGSUSED*/ 2727 static void 2728 iscsit_pp_cb(struct stmf_port_provider *pp, int cmd, void *arg, uint32_t flags) 2729 { 2730 it_config_t *cfg; 2731 nvlist_t *nvl; 2732 2733 if ((cmd != STMF_PROVIDER_DATA_UPDATED) || (arg == NULL)) { 2734 return; 2735 } 2736 2737 nvl = (nvlist_t *)arg; 2738 2739 /* Translate nvlist */ 2740 if (it_nv_to_config(nvl, &cfg) != 0) { 2741 cmn_err(CE_WARN, "Configuration is invalid"); 2742 return; 2743 } 2744 2745 /* Update config */ 2746 (void) iscsit_config_merge(cfg); 2747 2748 it_config_free_cmn(cfg); 2749 } 2750 2751 2752 static it_cfg_status_t 2753 iscsit_config_merge(it_config_t *in_cfg) 2754 { 2755 it_cfg_status_t status; 2756 it_config_t *cfg; 2757 it_config_t tmp_cfg; 2758 list_t tpg_del_list; 2759 2760 if (in_cfg) { 2761 cfg = in_cfg; 2762 } else { 2763 /* Make empty config */ 2764 bzero(&tmp_cfg, sizeof (tmp_cfg)); 2765 cfg = &tmp_cfg; 2766 } 2767 2768 list_create(&tpg_del_list, sizeof (iscsit_tpg_t), 2769 offsetof(iscsit_tpg_t, tpg_delete_ln)); 2770 2771 /* 2772 * Update targets, initiator contexts, target portal groups, 2773 * and iSNS client 2774 */ 2775 ISCSIT_GLOBAL_LOCK(RW_WRITER); 2776 if (((status = iscsit_config_merge_tpg(cfg, &tpg_del_list)) 2777 != 0) || 2778 ((status = iscsit_config_merge_tgt(cfg)) != 0) || 2779 ((status = iscsit_config_merge_ini(cfg)) != 0) || 2780 ((status = isnst_config_merge(cfg)) != 0)) { 2781 ISCSIT_GLOBAL_UNLOCK(); 2782 return (status); 2783 } 2784 2785 /* Update other global config parameters */ 2786 if (iscsit_global.global_props) { 2787 nvlist_free(iscsit_global.global_props); 2788 iscsit_global.global_props = NULL; 2789 } 2790 if (in_cfg) { 2791 (void) nvlist_dup(cfg->config_global_properties, 2792 &iscsit_global.global_props, KM_SLEEP); 2793 } 2794 ISCSIT_GLOBAL_UNLOCK(); 2795 2796 iscsit_config_destroy_tpgs(&tpg_del_list); 2797 2798 list_destroy(&tpg_del_list); 2799 2800 return (ITCFG_SUCCESS); 2801 } 2802 2803 /* 2804 * iscsit_sna_lt[e] 2805 * 2806 * Compare serial numbers using serial number arithmetic as defined in 2807 * RFC 1982. 2808 * 2809 * NOTE: This code is duplicated in the isns server as well as iscsitgtd. It 2810 * ought to be common. 2811 */ 2812 2813 static int 2814 iscsit_sna_lt(uint32_t sn1, uint32_t sn2) 2815 { 2816 return ((sn1 != sn2) && 2817 (((sn1 < sn2) && ((sn2 - sn1) < ISCSIT_SNA32_CHECK)) || 2818 ((sn1 > sn2) && ((sn1 - sn2) > ISCSIT_SNA32_CHECK)))); 2819 } 2820 2821 static int 2822 iscsit_sna_lte(uint32_t sn1, uint32_t sn2) 2823 { 2824 return ((sn1 == sn2) || 2825 (((sn1 < sn2) && ((sn2 - sn1) < ISCSIT_SNA32_CHECK)) || 2826 ((sn1 > sn2) && ((sn1 - sn2) > ISCSIT_SNA32_CHECK)))); 2827 } 2828 2829 2830 static boolean_t 2831 iscsit_cmdsn_in_window(iscsit_conn_t *ict, uint32_t cmdsn) 2832 { 2833 iscsit_sess_t *ist = ict->ict_sess; 2834 int rval = B_TRUE; 2835 2836 ist = ict->ict_sess; 2837 2838 rw_enter(&ist->ist_sn_rwlock, RW_READER); 2839 2840 /* 2841 * If cmdsn is less than ist_expcmdsn - iscsit_cmd_window() or 2842 * greater than ist_expcmdsn, it's not in the window. 2843 */ 2844 2845 if (iscsit_sna_lt(cmdsn, (ist->ist_expcmdsn - iscsit_cmd_window())) || 2846 !iscsit_sna_lte(cmdsn, ist->ist_expcmdsn)) { 2847 rval = B_FALSE; 2848 } 2849 2850 rw_exit(&ist->ist_sn_rwlock); 2851 2852 return (rval); 2853 } 2854