1 /*- 2 * Copyright (c) 2012 The FreeBSD Foundation 3 * All rights reserved. 4 * 5 * This software was developed by Edward Tomasz Napierala under sponsorship 6 * from the FreeBSD Foundation. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 * 29 */ 30 31 #include <sys/cdefs.h> 32 __FBSDID("$FreeBSD$"); 33 34 #include <sys/param.h> 35 #include <sys/condvar.h> 36 #include <sys/conf.h> 37 #include <sys/endian.h> 38 #include <sys/eventhandler.h> 39 #include <sys/file.h> 40 #include <sys/kernel.h> 41 #include <sys/kthread.h> 42 #include <sys/lock.h> 43 #include <sys/malloc.h> 44 #include <sys/mutex.h> 45 #include <sys/module.h> 46 #include <sys/sysctl.h> 47 #include <sys/systm.h> 48 #include <sys/sx.h> 49 #include <vm/uma.h> 50 51 #include <cam/cam.h> 52 #include <cam/cam_ccb.h> 53 #include <cam/cam_xpt.h> 54 #include <cam/cam_debug.h> 55 #include <cam/cam_sim.h> 56 #include <cam/cam_xpt_sim.h> 57 #include <cam/cam_xpt_periph.h> 58 #include <cam/cam_periph.h> 59 #include <cam/scsi/scsi_all.h> 60 #include <cam/scsi/scsi_message.h> 61 62 #include <dev/iscsi/icl.h> 63 #include <dev/iscsi/icl_wrappers.h> 64 #include <dev/iscsi/iscsi_ioctl.h> 65 #include <dev/iscsi/iscsi_proto.h> 66 #include <dev/iscsi/iscsi.h> 67 68 #ifdef ICL_KERNEL_PROXY 69 #include <sys/socketvar.h> 70 #endif 71 72 #ifdef ICL_KERNEL_PROXY 73 FEATURE(iscsi_kernel_proxy, "iSCSI initiator built with ICL_KERNEL_PROXY"); 74 #endif 75 76 /* 77 * XXX: This is global so the iscsi_unload() can access it. 78 * Think about how to do this properly. 79 */ 80 static struct iscsi_softc *sc; 81 82 SYSCTL_NODE(_kern, OID_AUTO, iscsi, CTLFLAG_RD, 0, "iSCSI initiator"); 83 static int debug = 1; 84 SYSCTL_INT(_kern_iscsi, OID_AUTO, debug, CTLFLAG_RWTUN, 85 &debug, 0, "Enable debug messages"); 86 static int ping_timeout = 5; 87 SYSCTL_INT(_kern_iscsi, OID_AUTO, ping_timeout, CTLFLAG_RWTUN, &ping_timeout, 88 0, "Timeout for ping (NOP-Out) requests, in seconds"); 89 static int iscsid_timeout = 60; 90 SYSCTL_INT(_kern_iscsi, OID_AUTO, iscsid_timeout, CTLFLAG_RWTUN, &iscsid_timeout, 91 0, "Time to wait for iscsid(8) to handle reconnection, in seconds"); 92 static int login_timeout = 60; 93 SYSCTL_INT(_kern_iscsi, OID_AUTO, login_timeout, CTLFLAG_RWTUN, &login_timeout, 94 0, "Time to wait for iscsid(8) to finish Login Phase, in seconds"); 95 static int maxtags = 255; 96 SYSCTL_INT(_kern_iscsi, OID_AUTO, maxtags, CTLFLAG_RWTUN, &maxtags, 97 0, "Max number of IO requests queued"); 98 static int fail_on_disconnection = 0; 99 SYSCTL_INT(_kern_iscsi, OID_AUTO, fail_on_disconnection, CTLFLAG_RWTUN, 100 &fail_on_disconnection, 0, "Destroy CAM SIM on connection failure"); 101 102 static MALLOC_DEFINE(M_ISCSI, "iSCSI", "iSCSI initiator"); 103 static uma_zone_t iscsi_outstanding_zone; 104 105 #define CONN_SESSION(X) ((struct iscsi_session *)X->ic_prv0) 106 #define PDU_SESSION(X) (CONN_SESSION(X->ip_conn)) 107 108 #define ISCSI_DEBUG(X, ...) \ 109 do { \ 110 if (debug > 1) \ 111 printf("%s: " X "\n", __func__, ## __VA_ARGS__);\ 112 } while (0) 113 114 #define ISCSI_WARN(X, ...) \ 115 do { \ 116 if (debug > 0) { \ 117 printf("WARNING: %s: " X "\n", \ 118 __func__, ## __VA_ARGS__); \ 119 } \ 120 } while (0) 121 122 #define ISCSI_SESSION_DEBUG(S, X, ...) \ 123 do { \ 124 if (debug > 1) { \ 125 printf("%s: %s (%s): " X "\n", \ 126 __func__, S->is_conf.isc_target_addr, \ 127 S->is_conf.isc_target, ## __VA_ARGS__); \ 128 } \ 129 } while (0) 130 131 #define ISCSI_SESSION_WARN(S, X, ...) \ 132 do { \ 133 if (debug > 0) { \ 134 printf("WARNING: %s (%s): " X "\n", \ 135 S->is_conf.isc_target_addr, \ 136 S->is_conf.isc_target, ## __VA_ARGS__); \ 137 } \ 138 } while (0) 139 140 #define ISCSI_SESSION_LOCK(X) mtx_lock(&X->is_lock) 141 #define ISCSI_SESSION_UNLOCK(X) mtx_unlock(&X->is_lock) 142 #define ISCSI_SESSION_LOCK_ASSERT(X) mtx_assert(&X->is_lock, MA_OWNED) 143 #define ISCSI_SESSION_LOCK_ASSERT_NOT(X) mtx_assert(&X->is_lock, MA_NOTOWNED) 144 145 static int iscsi_ioctl(struct cdev *dev, u_long cmd, caddr_t arg, 146 int mode, struct thread *td); 147 148 static struct cdevsw iscsi_cdevsw = { 149 .d_version = D_VERSION, 150 .d_ioctl = iscsi_ioctl, 151 .d_name = "iscsi", 152 }; 153 154 static void iscsi_pdu_queue_locked(struct icl_pdu *request); 155 static void iscsi_pdu_queue(struct icl_pdu *request); 156 static void iscsi_pdu_update_statsn(const struct icl_pdu *response); 157 static void iscsi_pdu_handle_nop_in(struct icl_pdu *response); 158 static void iscsi_pdu_handle_scsi_response(struct icl_pdu *response); 159 static void iscsi_pdu_handle_task_response(struct icl_pdu *response); 160 static void iscsi_pdu_handle_data_in(struct icl_pdu *response); 161 static void iscsi_pdu_handle_logout_response(struct icl_pdu *response); 162 static void iscsi_pdu_handle_r2t(struct icl_pdu *response); 163 static void iscsi_pdu_handle_async_message(struct icl_pdu *response); 164 static void iscsi_pdu_handle_reject(struct icl_pdu *response); 165 static void iscsi_session_reconnect(struct iscsi_session *is); 166 static void iscsi_session_terminate(struct iscsi_session *is); 167 static void iscsi_action(struct cam_sim *sim, union ccb *ccb); 168 static void iscsi_poll(struct cam_sim *sim); 169 static struct iscsi_outstanding *iscsi_outstanding_find(struct iscsi_session *is, 170 uint32_t initiator_task_tag); 171 static struct iscsi_outstanding *iscsi_outstanding_add(struct iscsi_session *is, 172 union ccb *ccb, uint32_t *initiator_task_tagp); 173 static void iscsi_outstanding_remove(struct iscsi_session *is, 174 struct iscsi_outstanding *io); 175 176 static bool 177 iscsi_pdu_prepare(struct icl_pdu *request) 178 { 179 struct iscsi_session *is; 180 struct iscsi_bhs_scsi_command *bhssc; 181 182 is = PDU_SESSION(request); 183 184 ISCSI_SESSION_LOCK_ASSERT(is); 185 186 /* 187 * We're only using fields common for all the request 188 * (initiator -> target) PDUs. 189 */ 190 bhssc = (struct iscsi_bhs_scsi_command *)request->ip_bhs; 191 192 /* 193 * Data-Out PDU does not contain CmdSN. 194 */ 195 if (bhssc->bhssc_opcode != ISCSI_BHS_OPCODE_SCSI_DATA_OUT) { 196 if (ISCSI_SNGT(is->is_cmdsn, is->is_maxcmdsn) && 197 (bhssc->bhssc_opcode & ISCSI_BHS_OPCODE_IMMEDIATE) == 0) { 198 /* 199 * Current MaxCmdSN prevents us from sending any more 200 * SCSI Command PDUs to the target; postpone the PDU. 201 * It will get resent by either iscsi_pdu_queue(), 202 * or by maintenance thread. 203 */ 204 #if 0 205 ISCSI_SESSION_DEBUG(is, "postponing send, CmdSN %u, " 206 "ExpCmdSN %u, MaxCmdSN %u, opcode 0x%x", 207 is->is_cmdsn, is->is_expcmdsn, is->is_maxcmdsn, 208 bhssc->bhssc_opcode); 209 #endif 210 return (true); 211 } 212 bhssc->bhssc_cmdsn = htonl(is->is_cmdsn); 213 if ((bhssc->bhssc_opcode & ISCSI_BHS_OPCODE_IMMEDIATE) == 0) 214 is->is_cmdsn++; 215 } 216 bhssc->bhssc_expstatsn = htonl(is->is_statsn + 1); 217 218 return (false); 219 } 220 221 static void 222 iscsi_session_send_postponed(struct iscsi_session *is) 223 { 224 struct icl_pdu *request; 225 bool postpone; 226 227 ISCSI_SESSION_LOCK_ASSERT(is); 228 229 while (!STAILQ_EMPTY(&is->is_postponed)) { 230 request = STAILQ_FIRST(&is->is_postponed); 231 postpone = iscsi_pdu_prepare(request); 232 if (postpone) 233 break; 234 STAILQ_REMOVE_HEAD(&is->is_postponed, ip_next); 235 icl_pdu_queue(request); 236 } 237 } 238 239 static void 240 iscsi_pdu_queue_locked(struct icl_pdu *request) 241 { 242 struct iscsi_session *is; 243 bool postpone; 244 245 is = PDU_SESSION(request); 246 ISCSI_SESSION_LOCK_ASSERT(is); 247 iscsi_session_send_postponed(is); 248 postpone = iscsi_pdu_prepare(request); 249 if (postpone) { 250 STAILQ_INSERT_TAIL(&is->is_postponed, request, ip_next); 251 return; 252 } 253 icl_pdu_queue(request); 254 } 255 256 static void 257 iscsi_pdu_queue(struct icl_pdu *request) 258 { 259 struct iscsi_session *is; 260 261 is = PDU_SESSION(request); 262 ISCSI_SESSION_LOCK(is); 263 iscsi_pdu_queue_locked(request); 264 ISCSI_SESSION_UNLOCK(is); 265 } 266 267 static void 268 iscsi_session_logout(struct iscsi_session *is) 269 { 270 struct icl_pdu *request; 271 struct iscsi_bhs_logout_request *bhslr; 272 273 request = icl_pdu_new(is->is_conn, M_NOWAIT); 274 if (request == NULL) 275 return; 276 277 bhslr = (struct iscsi_bhs_logout_request *)request->ip_bhs; 278 bhslr->bhslr_opcode = ISCSI_BHS_OPCODE_LOGOUT_REQUEST; 279 bhslr->bhslr_reason = BHSLR_REASON_CLOSE_SESSION; 280 iscsi_pdu_queue_locked(request); 281 } 282 283 static void 284 iscsi_session_terminate_task(struct iscsi_session *is, 285 struct iscsi_outstanding *io, bool requeue) 286 { 287 288 if (io->io_ccb != NULL) { 289 io->io_ccb->ccb_h.status &= ~(CAM_SIM_QUEUED | CAM_STATUS_MASK); 290 if (requeue) 291 io->io_ccb->ccb_h.status |= CAM_REQUEUE_REQ; 292 else 293 io->io_ccb->ccb_h.status |= CAM_REQ_ABORTED; 294 if ((io->io_ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 295 io->io_ccb->ccb_h.status |= CAM_DEV_QFRZN; 296 xpt_freeze_devq(io->io_ccb->ccb_h.path, 1); 297 ISCSI_SESSION_DEBUG(is, "freezing devq"); 298 } 299 xpt_done(io->io_ccb); 300 } 301 iscsi_outstanding_remove(is, io); 302 } 303 304 static void 305 iscsi_session_terminate_tasks(struct iscsi_session *is, bool requeue) 306 { 307 struct iscsi_outstanding *io, *tmp; 308 309 ISCSI_SESSION_LOCK_ASSERT(is); 310 311 TAILQ_FOREACH_SAFE(io, &is->is_outstanding, io_next, tmp) { 312 iscsi_session_terminate_task(is, io, requeue); 313 } 314 } 315 316 static void 317 iscsi_session_cleanup(struct iscsi_session *is, bool destroy_sim) 318 { 319 struct icl_pdu *pdu; 320 321 ISCSI_SESSION_LOCK_ASSERT(is); 322 323 /* 324 * Don't queue any new PDUs. 325 */ 326 if (is->is_sim != NULL && is->is_simq_frozen == false) { 327 ISCSI_SESSION_DEBUG(is, "freezing"); 328 xpt_freeze_simq(is->is_sim, 1); 329 is->is_simq_frozen = true; 330 } 331 332 /* 333 * Remove postponed PDUs. 334 */ 335 while (!STAILQ_EMPTY(&is->is_postponed)) { 336 pdu = STAILQ_FIRST(&is->is_postponed); 337 STAILQ_REMOVE_HEAD(&is->is_postponed, ip_next); 338 icl_pdu_free(pdu); 339 } 340 341 if (destroy_sim == false) { 342 /* 343 * Terminate SCSI tasks, asking CAM to requeue them. 344 */ 345 iscsi_session_terminate_tasks(is, true); 346 return; 347 } 348 349 iscsi_session_terminate_tasks(is, false); 350 351 if (is->is_sim == NULL) 352 return; 353 354 ISCSI_SESSION_DEBUG(is, "deregistering SIM"); 355 xpt_async(AC_LOST_DEVICE, is->is_path, NULL); 356 357 if (is->is_simq_frozen) { 358 xpt_release_simq(is->is_sim, 1); 359 is->is_simq_frozen = false; 360 } 361 362 xpt_free_path(is->is_path); 363 is->is_path = NULL; 364 xpt_bus_deregister(cam_sim_path(is->is_sim)); 365 cam_sim_free(is->is_sim, TRUE /*free_devq*/); 366 is->is_sim = NULL; 367 is->is_devq = NULL; 368 } 369 370 static void 371 iscsi_maintenance_thread_reconnect(struct iscsi_session *is) 372 { 373 374 icl_conn_close(is->is_conn); 375 376 ISCSI_SESSION_LOCK(is); 377 378 is->is_connected = false; 379 is->is_reconnecting = false; 380 is->is_login_phase = false; 381 382 #ifdef ICL_KERNEL_PROXY 383 if (is->is_login_pdu != NULL) { 384 icl_pdu_free(is->is_login_pdu); 385 is->is_login_pdu = NULL; 386 } 387 cv_signal(&is->is_login_cv); 388 #endif 389 390 if (fail_on_disconnection) { 391 ISCSI_SESSION_DEBUG(is, "connection failed, destroying devices"); 392 iscsi_session_cleanup(is, true); 393 } else { 394 iscsi_session_cleanup(is, false); 395 } 396 397 KASSERT(TAILQ_EMPTY(&is->is_outstanding), 398 ("destroying session with active tasks")); 399 KASSERT(STAILQ_EMPTY(&is->is_postponed), 400 ("destroying session with postponed PDUs")); 401 402 /* 403 * Request immediate reconnection from iscsid(8). 404 */ 405 //ISCSI_SESSION_DEBUG(is, "waking up iscsid(8)"); 406 is->is_waiting_for_iscsid = true; 407 strlcpy(is->is_reason, "Waiting for iscsid(8)", sizeof(is->is_reason)); 408 is->is_timeout = 0; 409 ISCSI_SESSION_UNLOCK(is); 410 cv_signal(&is->is_softc->sc_cv); 411 } 412 413 static void 414 iscsi_maintenance_thread_terminate(struct iscsi_session *is) 415 { 416 struct iscsi_softc *sc; 417 418 sc = is->is_softc; 419 sx_xlock(&sc->sc_lock); 420 TAILQ_REMOVE(&sc->sc_sessions, is, is_next); 421 sx_xunlock(&sc->sc_lock); 422 423 icl_conn_close(is->is_conn); 424 callout_drain(&is->is_callout); 425 426 ISCSI_SESSION_LOCK(is); 427 428 KASSERT(is->is_terminating, ("is_terminating == false")); 429 430 #ifdef ICL_KERNEL_PROXY 431 if (is->is_login_pdu != NULL) { 432 icl_pdu_free(is->is_login_pdu); 433 is->is_login_pdu = NULL; 434 } 435 cv_signal(&is->is_login_cv); 436 #endif 437 438 iscsi_session_cleanup(is, true); 439 440 KASSERT(TAILQ_EMPTY(&is->is_outstanding), 441 ("destroying session with active tasks")); 442 KASSERT(STAILQ_EMPTY(&is->is_postponed), 443 ("destroying session with postponed PDUs")); 444 445 ISCSI_SESSION_UNLOCK(is); 446 447 icl_conn_free(is->is_conn); 448 mtx_destroy(&is->is_lock); 449 cv_destroy(&is->is_maintenance_cv); 450 #ifdef ICL_KERNEL_PROXY 451 cv_destroy(&is->is_login_cv); 452 #endif 453 ISCSI_SESSION_DEBUG(is, "terminated"); 454 free(is, M_ISCSI); 455 456 /* 457 * The iscsi_unload() routine might be waiting. 458 */ 459 cv_signal(&sc->sc_cv); 460 } 461 462 static void 463 iscsi_maintenance_thread(void *arg) 464 { 465 struct iscsi_session *is; 466 467 is = arg; 468 469 for (;;) { 470 ISCSI_SESSION_LOCK(is); 471 if (is->is_reconnecting == false && 472 is->is_terminating == false && 473 STAILQ_EMPTY(&is->is_postponed)) 474 cv_wait(&is->is_maintenance_cv, &is->is_lock); 475 476 if (is->is_reconnecting) { 477 ISCSI_SESSION_UNLOCK(is); 478 iscsi_maintenance_thread_reconnect(is); 479 continue; 480 } 481 482 if (is->is_terminating) { 483 ISCSI_SESSION_UNLOCK(is); 484 iscsi_maintenance_thread_terminate(is); 485 kthread_exit(); 486 return; 487 } 488 489 iscsi_session_send_postponed(is); 490 ISCSI_SESSION_UNLOCK(is); 491 } 492 } 493 494 static void 495 iscsi_session_reconnect(struct iscsi_session *is) 496 { 497 498 /* 499 * XXX: We can't use locking here, because 500 * it's being called from various contexts. 501 * Hope it doesn't break anything. 502 */ 503 if (is->is_reconnecting) 504 return; 505 506 is->is_reconnecting = true; 507 cv_signal(&is->is_maintenance_cv); 508 } 509 510 static void 511 iscsi_session_terminate(struct iscsi_session *is) 512 { 513 514 if (is->is_terminating) 515 return; 516 517 is->is_terminating = true; 518 519 #if 0 520 iscsi_session_logout(is); 521 #endif 522 cv_signal(&is->is_maintenance_cv); 523 } 524 525 static void 526 iscsi_callout(void *context) 527 { 528 struct icl_pdu *request; 529 struct iscsi_bhs_nop_out *bhsno; 530 struct iscsi_session *is; 531 bool reconnect_needed = false; 532 533 is = context; 534 535 ISCSI_SESSION_LOCK(is); 536 if (is->is_terminating) { 537 ISCSI_SESSION_UNLOCK(is); 538 return; 539 } 540 541 callout_schedule(&is->is_callout, 1 * hz); 542 543 is->is_timeout++; 544 545 if (is->is_waiting_for_iscsid) { 546 if (iscsid_timeout > 0 && is->is_timeout > iscsid_timeout) { 547 ISCSI_SESSION_WARN(is, "timed out waiting for iscsid(8) " 548 "for %d seconds; reconnecting", 549 is->is_timeout); 550 reconnect_needed = true; 551 } 552 goto out; 553 } 554 555 if (is->is_login_phase) { 556 if (login_timeout > 0 && is->is_timeout > login_timeout) { 557 ISCSI_SESSION_WARN(is, "login timed out after %d seconds; " 558 "reconnecting", is->is_timeout); 559 reconnect_needed = true; 560 } 561 goto out; 562 } 563 564 if (ping_timeout <= 0) { 565 /* 566 * Pings are disabled. Don't send NOP-Out in this case. 567 * Reset the timeout, to avoid triggering reconnection, 568 * should the user decide to reenable them. 569 */ 570 is->is_timeout = 0; 571 goto out; 572 } 573 574 if (is->is_timeout >= ping_timeout) { 575 ISCSI_SESSION_WARN(is, "no ping reply (NOP-In) after %d seconds; " 576 "reconnecting", ping_timeout); 577 reconnect_needed = true; 578 goto out; 579 } 580 581 ISCSI_SESSION_UNLOCK(is); 582 583 /* 584 * If the ping was reset less than one second ago - which means 585 * that we've received some PDU during the last second - assume 586 * the traffic flows correctly and don't bother sending a NOP-Out. 587 * 588 * (It's 2 - one for one second, and one for incrementing is_timeout 589 * earlier in this routine.) 590 */ 591 if (is->is_timeout < 2) 592 return; 593 594 request = icl_pdu_new(is->is_conn, M_NOWAIT); 595 if (request == NULL) { 596 ISCSI_SESSION_WARN(is, "failed to allocate PDU"); 597 return; 598 } 599 bhsno = (struct iscsi_bhs_nop_out *)request->ip_bhs; 600 bhsno->bhsno_opcode = ISCSI_BHS_OPCODE_NOP_OUT | 601 ISCSI_BHS_OPCODE_IMMEDIATE; 602 bhsno->bhsno_flags = 0x80; 603 bhsno->bhsno_target_transfer_tag = 0xffffffff; 604 iscsi_pdu_queue(request); 605 return; 606 607 out: 608 ISCSI_SESSION_UNLOCK(is); 609 610 if (reconnect_needed) 611 iscsi_session_reconnect(is); 612 } 613 614 static void 615 iscsi_pdu_update_statsn(const struct icl_pdu *response) 616 { 617 const struct iscsi_bhs_data_in *bhsdi; 618 struct iscsi_session *is; 619 uint32_t expcmdsn, maxcmdsn, statsn; 620 621 is = PDU_SESSION(response); 622 623 ISCSI_SESSION_LOCK_ASSERT(is); 624 625 /* 626 * We're only using fields common for all the response 627 * (target -> initiator) PDUs. 628 */ 629 bhsdi = (const struct iscsi_bhs_data_in *)response->ip_bhs; 630 /* 631 * Ok, I lied. In case of Data-In, "The fields StatSN, Status, 632 * and Residual Count only have meaningful content if the S bit 633 * is set to 1", so we also need to check the bit specific for 634 * Data-In PDU. 635 */ 636 if (bhsdi->bhsdi_opcode != ISCSI_BHS_OPCODE_SCSI_DATA_IN || 637 (bhsdi->bhsdi_flags & BHSDI_FLAGS_S) != 0) { 638 statsn = ntohl(bhsdi->bhsdi_statsn); 639 if (statsn != is->is_statsn && statsn != (is->is_statsn + 1)) { 640 /* XXX: This is normal situation for MCS */ 641 ISCSI_SESSION_WARN(is, "PDU 0x%x StatSN %u != " 642 "session ExpStatSN %u (or + 1); reconnecting", 643 bhsdi->bhsdi_opcode, statsn, is->is_statsn); 644 iscsi_session_reconnect(is); 645 } 646 if (ISCSI_SNGT(statsn, is->is_statsn)) 647 is->is_statsn = statsn; 648 } 649 650 expcmdsn = ntohl(bhsdi->bhsdi_expcmdsn); 651 maxcmdsn = ntohl(bhsdi->bhsdi_maxcmdsn); 652 653 if (ISCSI_SNLT(maxcmdsn + 1, expcmdsn)) { 654 ISCSI_SESSION_DEBUG(is, 655 "PDU MaxCmdSN %u + 1 < PDU ExpCmdSN %u; ignoring", 656 maxcmdsn, expcmdsn); 657 } else { 658 if (ISCSI_SNGT(maxcmdsn, is->is_maxcmdsn)) { 659 is->is_maxcmdsn = maxcmdsn; 660 661 /* 662 * Command window increased; kick the maintanance thread 663 * to send out postponed commands. 664 */ 665 if (!STAILQ_EMPTY(&is->is_postponed)) 666 cv_signal(&is->is_maintenance_cv); 667 } else if (ISCSI_SNLT(maxcmdsn, is->is_maxcmdsn)) { 668 /* XXX: This is normal situation for MCS */ 669 ISCSI_SESSION_DEBUG(is, 670 "PDU MaxCmdSN %u < session MaxCmdSN %u; ignoring", 671 maxcmdsn, is->is_maxcmdsn); 672 } 673 674 if (ISCSI_SNGT(expcmdsn, is->is_expcmdsn)) { 675 is->is_expcmdsn = expcmdsn; 676 } else if (ISCSI_SNLT(expcmdsn, is->is_expcmdsn)) { 677 /* XXX: This is normal situation for MCS */ 678 ISCSI_SESSION_DEBUG(is, 679 "PDU ExpCmdSN %u < session ExpCmdSN %u; ignoring", 680 expcmdsn, is->is_expcmdsn); 681 } 682 } 683 684 /* 685 * Every incoming PDU - not just NOP-In - resets the ping timer. 686 * The purpose of the timeout is to reset the connection when it stalls; 687 * we don't want this to happen when NOP-In or NOP-Out ends up delayed 688 * in some queue. 689 */ 690 is->is_timeout = 0; 691 } 692 693 static void 694 iscsi_receive_callback(struct icl_pdu *response) 695 { 696 struct iscsi_session *is; 697 698 is = PDU_SESSION(response); 699 700 ISCSI_SESSION_LOCK(is); 701 702 #ifdef ICL_KERNEL_PROXY 703 if (is->is_login_phase) { 704 if (is->is_login_pdu == NULL) 705 is->is_login_pdu = response; 706 else 707 icl_pdu_free(response); 708 ISCSI_SESSION_UNLOCK(is); 709 cv_signal(&is->is_login_cv); 710 return; 711 } 712 #endif 713 714 iscsi_pdu_update_statsn(response); 715 716 /* 717 * The handling routine is responsible for freeing the PDU 718 * when it's no longer needed. 719 */ 720 switch (response->ip_bhs->bhs_opcode) { 721 case ISCSI_BHS_OPCODE_NOP_IN: 722 iscsi_pdu_handle_nop_in(response); 723 ISCSI_SESSION_UNLOCK(is); 724 break; 725 case ISCSI_BHS_OPCODE_SCSI_RESPONSE: 726 iscsi_pdu_handle_scsi_response(response); 727 /* Session lock dropped inside. */ 728 ISCSI_SESSION_LOCK_ASSERT_NOT(is); 729 break; 730 case ISCSI_BHS_OPCODE_TASK_RESPONSE: 731 iscsi_pdu_handle_task_response(response); 732 ISCSI_SESSION_UNLOCK(is); 733 break; 734 case ISCSI_BHS_OPCODE_SCSI_DATA_IN: 735 iscsi_pdu_handle_data_in(response); 736 /* Session lock dropped inside. */ 737 ISCSI_SESSION_LOCK_ASSERT_NOT(is); 738 break; 739 case ISCSI_BHS_OPCODE_LOGOUT_RESPONSE: 740 iscsi_pdu_handle_logout_response(response); 741 ISCSI_SESSION_UNLOCK(is); 742 break; 743 case ISCSI_BHS_OPCODE_R2T: 744 iscsi_pdu_handle_r2t(response); 745 ISCSI_SESSION_UNLOCK(is); 746 break; 747 case ISCSI_BHS_OPCODE_ASYNC_MESSAGE: 748 iscsi_pdu_handle_async_message(response); 749 ISCSI_SESSION_UNLOCK(is); 750 break; 751 case ISCSI_BHS_OPCODE_REJECT: 752 iscsi_pdu_handle_reject(response); 753 ISCSI_SESSION_UNLOCK(is); 754 break; 755 default: 756 ISCSI_SESSION_WARN(is, "received PDU with unsupported " 757 "opcode 0x%x; reconnecting", 758 response->ip_bhs->bhs_opcode); 759 iscsi_session_reconnect(is); 760 ISCSI_SESSION_UNLOCK(is); 761 icl_pdu_free(response); 762 } 763 } 764 765 static void 766 iscsi_error_callback(struct icl_conn *ic) 767 { 768 struct iscsi_session *is; 769 770 is = CONN_SESSION(ic); 771 772 ISCSI_SESSION_WARN(is, "connection error; reconnecting"); 773 iscsi_session_reconnect(is); 774 } 775 776 static void 777 iscsi_pdu_handle_nop_in(struct icl_pdu *response) 778 { 779 struct iscsi_session *is; 780 struct iscsi_bhs_nop_out *bhsno; 781 struct iscsi_bhs_nop_in *bhsni; 782 struct icl_pdu *request; 783 void *data = NULL; 784 size_t datasize; 785 int error; 786 787 is = PDU_SESSION(response); 788 bhsni = (struct iscsi_bhs_nop_in *)response->ip_bhs; 789 790 if (bhsni->bhsni_target_transfer_tag == 0xffffffff) { 791 /* 792 * Nothing to do; iscsi_pdu_update_statsn() already 793 * zeroed the timeout. 794 */ 795 icl_pdu_free(response); 796 return; 797 } 798 799 datasize = icl_pdu_data_segment_length(response); 800 if (datasize > 0) { 801 data = malloc(datasize, M_ISCSI, M_NOWAIT | M_ZERO); 802 if (data == NULL) { 803 ISCSI_SESSION_WARN(is, "failed to allocate memory; " 804 "reconnecting"); 805 icl_pdu_free(response); 806 iscsi_session_reconnect(is); 807 return; 808 } 809 icl_pdu_get_data(response, 0, data, datasize); 810 } 811 812 request = icl_pdu_new(response->ip_conn, M_NOWAIT); 813 if (request == NULL) { 814 ISCSI_SESSION_WARN(is, "failed to allocate memory; " 815 "reconnecting"); 816 free(data, M_ISCSI); 817 icl_pdu_free(response); 818 iscsi_session_reconnect(is); 819 return; 820 } 821 bhsno = (struct iscsi_bhs_nop_out *)request->ip_bhs; 822 bhsno->bhsno_opcode = ISCSI_BHS_OPCODE_NOP_OUT | 823 ISCSI_BHS_OPCODE_IMMEDIATE; 824 bhsno->bhsno_flags = 0x80; 825 bhsno->bhsno_initiator_task_tag = 0xffffffff; 826 bhsno->bhsno_target_transfer_tag = bhsni->bhsni_target_transfer_tag; 827 if (datasize > 0) { 828 error = icl_pdu_append_data(request, data, datasize, M_NOWAIT); 829 if (error != 0) { 830 ISCSI_SESSION_WARN(is, "failed to allocate memory; " 831 "reconnecting"); 832 free(data, M_ISCSI); 833 icl_pdu_free(request); 834 icl_pdu_free(response); 835 iscsi_session_reconnect(is); 836 return; 837 } 838 free(data, M_ISCSI); 839 } 840 841 icl_pdu_free(response); 842 iscsi_pdu_queue_locked(request); 843 } 844 845 static void 846 iscsi_pdu_handle_scsi_response(struct icl_pdu *response) 847 { 848 struct iscsi_bhs_scsi_response *bhssr; 849 struct iscsi_outstanding *io; 850 struct iscsi_session *is; 851 union ccb *ccb; 852 struct ccb_scsiio *csio; 853 size_t data_segment_len, received; 854 uint16_t sense_len; 855 856 is = PDU_SESSION(response); 857 858 bhssr = (struct iscsi_bhs_scsi_response *)response->ip_bhs; 859 io = iscsi_outstanding_find(is, bhssr->bhssr_initiator_task_tag); 860 if (io == NULL || io->io_ccb == NULL) { 861 ISCSI_SESSION_WARN(is, "bad itt 0x%x", bhssr->bhssr_initiator_task_tag); 862 icl_pdu_free(response); 863 iscsi_session_reconnect(is); 864 ISCSI_SESSION_UNLOCK(is); 865 return; 866 } 867 868 ccb = io->io_ccb; 869 received = io->io_received; 870 iscsi_outstanding_remove(is, io); 871 ISCSI_SESSION_UNLOCK(is); 872 873 if (bhssr->bhssr_response != BHSSR_RESPONSE_COMMAND_COMPLETED) { 874 ISCSI_SESSION_WARN(is, "service response 0x%x", bhssr->bhssr_response); 875 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 876 xpt_freeze_devq(ccb->ccb_h.path, 1); 877 ISCSI_SESSION_DEBUG(is, "freezing devq"); 878 } 879 ccb->ccb_h.status = CAM_REQ_CMP_ERR | CAM_DEV_QFRZN; 880 } else if (bhssr->bhssr_status == 0) { 881 ccb->ccb_h.status = CAM_REQ_CMP; 882 } else { 883 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 884 xpt_freeze_devq(ccb->ccb_h.path, 1); 885 ISCSI_SESSION_DEBUG(is, "freezing devq"); 886 } 887 ccb->ccb_h.status = CAM_SCSI_STATUS_ERROR | CAM_DEV_QFRZN; 888 ccb->csio.scsi_status = bhssr->bhssr_status; 889 } 890 891 csio = &ccb->csio; 892 data_segment_len = icl_pdu_data_segment_length(response); 893 if (data_segment_len > 0) { 894 if (data_segment_len < sizeof(sense_len)) { 895 ISCSI_SESSION_WARN(is, "truncated data segment (%zd bytes)", 896 data_segment_len); 897 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 898 xpt_freeze_devq(ccb->ccb_h.path, 1); 899 ISCSI_SESSION_DEBUG(is, "freezing devq"); 900 } 901 ccb->ccb_h.status = CAM_REQ_CMP_ERR | CAM_DEV_QFRZN; 902 goto out; 903 } 904 icl_pdu_get_data(response, 0, &sense_len, sizeof(sense_len)); 905 sense_len = ntohs(sense_len); 906 #if 0 907 ISCSI_SESSION_DEBUG(is, "sense_len %d, data len %zd", 908 sense_len, data_segment_len); 909 #endif 910 if (sizeof(sense_len) + sense_len > data_segment_len) { 911 ISCSI_SESSION_WARN(is, "truncated data segment " 912 "(%zd bytes, should be %zd)", 913 data_segment_len, sizeof(sense_len) + sense_len); 914 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 915 xpt_freeze_devq(ccb->ccb_h.path, 1); 916 ISCSI_SESSION_DEBUG(is, "freezing devq"); 917 } 918 ccb->ccb_h.status = CAM_REQ_CMP_ERR | CAM_DEV_QFRZN; 919 goto out; 920 } else if (sizeof(sense_len) + sense_len < data_segment_len) 921 ISCSI_SESSION_WARN(is, "oversize data segment " 922 "(%zd bytes, should be %zd)", 923 data_segment_len, sizeof(sense_len) + sense_len); 924 if (sense_len > csio->sense_len) { 925 ISCSI_SESSION_DEBUG(is, "truncating sense from %d to %d", 926 sense_len, csio->sense_len); 927 sense_len = csio->sense_len; 928 } 929 icl_pdu_get_data(response, sizeof(sense_len), &csio->sense_data, sense_len); 930 csio->sense_resid = csio->sense_len - sense_len; 931 ccb->ccb_h.status |= CAM_AUTOSNS_VALID; 932 } 933 934 out: 935 if (bhssr->bhssr_flags & BHSSR_FLAGS_RESIDUAL_UNDERFLOW) 936 csio->resid = ntohl(bhssr->bhssr_residual_count); 937 938 if ((csio->ccb_h.flags & CAM_DIR_MASK) == CAM_DIR_IN) { 939 KASSERT(received <= csio->dxfer_len, 940 ("received > csio->dxfer_len")); 941 if (received < csio->dxfer_len) { 942 if (csio->resid != csio->dxfer_len - received) { 943 ISCSI_SESSION_WARN(is, "underflow mismatch: " 944 "target indicates %d, we calculated %zd", 945 csio->resid, csio->dxfer_len - received); 946 } 947 csio->resid = csio->dxfer_len - received; 948 } 949 } 950 951 xpt_done(ccb); 952 icl_pdu_free(response); 953 } 954 955 static void 956 iscsi_pdu_handle_task_response(struct icl_pdu *response) 957 { 958 struct iscsi_bhs_task_management_response *bhstmr; 959 struct iscsi_outstanding *io, *aio; 960 struct iscsi_session *is; 961 962 is = PDU_SESSION(response); 963 964 bhstmr = (struct iscsi_bhs_task_management_response *)response->ip_bhs; 965 io = iscsi_outstanding_find(is, bhstmr->bhstmr_initiator_task_tag); 966 if (io == NULL || io->io_ccb != NULL) { 967 ISCSI_SESSION_WARN(is, "bad itt 0x%x", 968 bhstmr->bhstmr_initiator_task_tag); 969 icl_pdu_free(response); 970 iscsi_session_reconnect(is); 971 return; 972 } 973 974 if (bhstmr->bhstmr_response != BHSTMR_RESPONSE_FUNCTION_COMPLETE) { 975 ISCSI_SESSION_WARN(is, "task response 0x%x", 976 bhstmr->bhstmr_response); 977 } else { 978 aio = iscsi_outstanding_find(is, io->io_datasn); 979 if (aio != NULL && aio->io_ccb != NULL) 980 iscsi_session_terminate_task(is, aio, false); 981 } 982 983 iscsi_outstanding_remove(is, io); 984 icl_pdu_free(response); 985 } 986 987 static void 988 iscsi_pdu_handle_data_in(struct icl_pdu *response) 989 { 990 struct iscsi_bhs_data_in *bhsdi; 991 struct iscsi_outstanding *io; 992 struct iscsi_session *is; 993 union ccb *ccb; 994 struct ccb_scsiio *csio; 995 size_t data_segment_len, received, oreceived; 996 997 is = PDU_SESSION(response); 998 bhsdi = (struct iscsi_bhs_data_in *)response->ip_bhs; 999 io = iscsi_outstanding_find(is, bhsdi->bhsdi_initiator_task_tag); 1000 if (io == NULL || io->io_ccb == NULL) { 1001 ISCSI_SESSION_WARN(is, "bad itt 0x%x", bhsdi->bhsdi_initiator_task_tag); 1002 icl_pdu_free(response); 1003 iscsi_session_reconnect(is); 1004 ISCSI_SESSION_UNLOCK(is); 1005 return; 1006 } 1007 1008 data_segment_len = icl_pdu_data_segment_length(response); 1009 if (data_segment_len == 0) { 1010 /* 1011 * "The sending of 0 length data segments should be avoided, 1012 * but initiators and targets MUST be able to properly receive 1013 * 0 length data segments." 1014 */ 1015 ISCSI_SESSION_UNLOCK(is); 1016 icl_pdu_free(response); 1017 return; 1018 } 1019 1020 /* 1021 * We need to track this for security reasons - without it, malicious target 1022 * could respond to SCSI READ without sending Data-In PDUs, which would result 1023 * in read operation on the initiator side returning random kernel data. 1024 */ 1025 if (ntohl(bhsdi->bhsdi_buffer_offset) != io->io_received) { 1026 ISCSI_SESSION_WARN(is, "data out of order; expected offset %zd, got %zd", 1027 io->io_received, (size_t)ntohl(bhsdi->bhsdi_buffer_offset)); 1028 icl_pdu_free(response); 1029 iscsi_session_reconnect(is); 1030 ISCSI_SESSION_UNLOCK(is); 1031 return; 1032 } 1033 1034 ccb = io->io_ccb; 1035 csio = &ccb->csio; 1036 1037 if (io->io_received + data_segment_len > csio->dxfer_len) { 1038 ISCSI_SESSION_WARN(is, "oversize data segment (%zd bytes " 1039 "at offset %zd, buffer is %d)", 1040 data_segment_len, io->io_received, csio->dxfer_len); 1041 icl_pdu_free(response); 1042 iscsi_session_reconnect(is); 1043 ISCSI_SESSION_UNLOCK(is); 1044 return; 1045 } 1046 1047 oreceived = io->io_received; 1048 io->io_received += data_segment_len; 1049 received = io->io_received; 1050 if ((bhsdi->bhsdi_flags & BHSDI_FLAGS_S) != 0) 1051 iscsi_outstanding_remove(is, io); 1052 ISCSI_SESSION_UNLOCK(is); 1053 1054 icl_pdu_get_data(response, 0, csio->data_ptr + oreceived, data_segment_len); 1055 1056 /* 1057 * XXX: Check DataSN. 1058 * XXX: Check F. 1059 */ 1060 if ((bhsdi->bhsdi_flags & BHSDI_FLAGS_S) == 0) { 1061 /* 1062 * Nothing more to do. 1063 */ 1064 icl_pdu_free(response); 1065 return; 1066 } 1067 1068 //ISCSI_SESSION_DEBUG(is, "got S flag; status 0x%x", bhsdi->bhsdi_status); 1069 if (bhsdi->bhsdi_status == 0) { 1070 ccb->ccb_h.status = CAM_REQ_CMP; 1071 } else { 1072 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 1073 xpt_freeze_devq(ccb->ccb_h.path, 1); 1074 ISCSI_SESSION_DEBUG(is, "freezing devq"); 1075 } 1076 ccb->ccb_h.status = CAM_SCSI_STATUS_ERROR | CAM_DEV_QFRZN; 1077 csio->scsi_status = bhsdi->bhsdi_status; 1078 } 1079 1080 if ((csio->ccb_h.flags & CAM_DIR_MASK) == CAM_DIR_IN) { 1081 KASSERT(received <= csio->dxfer_len, 1082 ("received > csio->dxfer_len")); 1083 if (received < csio->dxfer_len) { 1084 csio->resid = ntohl(bhsdi->bhsdi_residual_count); 1085 if (csio->resid != csio->dxfer_len - received) { 1086 ISCSI_SESSION_WARN(is, "underflow mismatch: " 1087 "target indicates %d, we calculated %zd", 1088 csio->resid, csio->dxfer_len - received); 1089 } 1090 csio->resid = csio->dxfer_len - received; 1091 } 1092 } 1093 1094 xpt_done(ccb); 1095 icl_pdu_free(response); 1096 } 1097 1098 static void 1099 iscsi_pdu_handle_logout_response(struct icl_pdu *response) 1100 { 1101 1102 ISCSI_SESSION_DEBUG(PDU_SESSION(response), "logout response"); 1103 icl_pdu_free(response); 1104 } 1105 1106 static void 1107 iscsi_pdu_handle_r2t(struct icl_pdu *response) 1108 { 1109 struct icl_pdu *request; 1110 struct iscsi_session *is; 1111 struct iscsi_bhs_r2t *bhsr2t; 1112 struct iscsi_bhs_data_out *bhsdo; 1113 struct iscsi_outstanding *io; 1114 struct ccb_scsiio *csio; 1115 size_t off, len, total_len; 1116 int error; 1117 1118 is = PDU_SESSION(response); 1119 1120 bhsr2t = (struct iscsi_bhs_r2t *)response->ip_bhs; 1121 io = iscsi_outstanding_find(is, bhsr2t->bhsr2t_initiator_task_tag); 1122 if (io == NULL || io->io_ccb == NULL) { 1123 ISCSI_SESSION_WARN(is, "bad itt 0x%x; reconnecting", 1124 bhsr2t->bhsr2t_initiator_task_tag); 1125 icl_pdu_free(response); 1126 iscsi_session_reconnect(is); 1127 return; 1128 } 1129 1130 csio = &io->io_ccb->csio; 1131 1132 if ((csio->ccb_h.flags & CAM_DIR_MASK) != CAM_DIR_OUT) { 1133 ISCSI_SESSION_WARN(is, "received R2T for read command; reconnecting"); 1134 icl_pdu_free(response); 1135 iscsi_session_reconnect(is); 1136 return; 1137 } 1138 1139 /* 1140 * XXX: Verify R2TSN. 1141 */ 1142 1143 io->io_datasn = 0; 1144 1145 off = ntohl(bhsr2t->bhsr2t_buffer_offset); 1146 if (off > csio->dxfer_len) { 1147 ISCSI_SESSION_WARN(is, "target requested invalid offset " 1148 "%zd, buffer is is %d; reconnecting", off, csio->dxfer_len); 1149 icl_pdu_free(response); 1150 iscsi_session_reconnect(is); 1151 return; 1152 } 1153 1154 total_len = ntohl(bhsr2t->bhsr2t_desired_data_transfer_length); 1155 if (total_len == 0 || total_len > csio->dxfer_len) { 1156 ISCSI_SESSION_WARN(is, "target requested invalid length " 1157 "%zd, buffer is %d; reconnecting", total_len, csio->dxfer_len); 1158 icl_pdu_free(response); 1159 iscsi_session_reconnect(is); 1160 return; 1161 } 1162 1163 //ISCSI_SESSION_DEBUG(is, "r2t; off %zd, len %zd", off, total_len); 1164 1165 for (;;) { 1166 len = total_len; 1167 1168 if (len > is->is_max_data_segment_length) 1169 len = is->is_max_data_segment_length; 1170 1171 if (off + len > csio->dxfer_len) { 1172 ISCSI_SESSION_WARN(is, "target requested invalid " 1173 "length/offset %zd, buffer is %d; reconnecting", 1174 off + len, csio->dxfer_len); 1175 icl_pdu_free(response); 1176 iscsi_session_reconnect(is); 1177 return; 1178 } 1179 1180 request = icl_pdu_new(response->ip_conn, M_NOWAIT); 1181 if (request == NULL) { 1182 icl_pdu_free(response); 1183 iscsi_session_reconnect(is); 1184 return; 1185 } 1186 1187 bhsdo = (struct iscsi_bhs_data_out *)request->ip_bhs; 1188 bhsdo->bhsdo_opcode = ISCSI_BHS_OPCODE_SCSI_DATA_OUT; 1189 bhsdo->bhsdo_lun = bhsr2t->bhsr2t_lun; 1190 bhsdo->bhsdo_initiator_task_tag = 1191 bhsr2t->bhsr2t_initiator_task_tag; 1192 bhsdo->bhsdo_target_transfer_tag = 1193 bhsr2t->bhsr2t_target_transfer_tag; 1194 bhsdo->bhsdo_datasn = htonl(io->io_datasn++); 1195 bhsdo->bhsdo_buffer_offset = htonl(off); 1196 error = icl_pdu_append_data(request, csio->data_ptr + off, len, 1197 M_NOWAIT); 1198 if (error != 0) { 1199 ISCSI_SESSION_WARN(is, "failed to allocate memory; " 1200 "reconnecting"); 1201 icl_pdu_free(request); 1202 icl_pdu_free(response); 1203 iscsi_session_reconnect(is); 1204 return; 1205 } 1206 1207 off += len; 1208 total_len -= len; 1209 1210 if (total_len == 0) { 1211 bhsdo->bhsdo_flags |= BHSDO_FLAGS_F; 1212 //ISCSI_SESSION_DEBUG(is, "setting F, off %zd", off); 1213 } else { 1214 //ISCSI_SESSION_DEBUG(is, "not finished, off %zd", off); 1215 } 1216 1217 iscsi_pdu_queue_locked(request); 1218 1219 if (total_len == 0) 1220 break; 1221 } 1222 1223 icl_pdu_free(response); 1224 } 1225 1226 static void 1227 iscsi_pdu_handle_async_message(struct icl_pdu *response) 1228 { 1229 struct iscsi_bhs_asynchronous_message *bhsam; 1230 struct iscsi_session *is; 1231 1232 is = PDU_SESSION(response); 1233 bhsam = (struct iscsi_bhs_asynchronous_message *)response->ip_bhs; 1234 switch (bhsam->bhsam_async_event) { 1235 case BHSAM_EVENT_TARGET_REQUESTS_LOGOUT: 1236 ISCSI_SESSION_WARN(is, "target requests logout; removing session"); 1237 iscsi_session_logout(is); 1238 iscsi_session_terminate(is); 1239 break; 1240 case BHSAM_EVENT_TARGET_TERMINATES_CONNECTION: 1241 ISCSI_SESSION_WARN(is, "target indicates it will drop drop the connection"); 1242 break; 1243 case BHSAM_EVENT_TARGET_TERMINATES_SESSION: 1244 ISCSI_SESSION_WARN(is, "target indicates it will drop drop the session"); 1245 break; 1246 default: 1247 /* 1248 * XXX: Technically, we're obligated to also handle 1249 * parameter renegotiation. 1250 */ 1251 ISCSI_SESSION_WARN(is, "ignoring AsyncEvent %d", bhsam->bhsam_async_event); 1252 break; 1253 } 1254 1255 icl_pdu_free(response); 1256 } 1257 1258 static void 1259 iscsi_pdu_handle_reject(struct icl_pdu *response) 1260 { 1261 struct iscsi_bhs_reject *bhsr; 1262 struct iscsi_session *is; 1263 1264 is = PDU_SESSION(response); 1265 bhsr = (struct iscsi_bhs_reject *)response->ip_bhs; 1266 ISCSI_SESSION_WARN(is, "received Reject PDU, reason 0x%x; protocol error?", 1267 bhsr->bhsr_reason); 1268 1269 icl_pdu_free(response); 1270 } 1271 1272 static int 1273 iscsi_ioctl_daemon_wait(struct iscsi_softc *sc, 1274 struct iscsi_daemon_request *request) 1275 { 1276 struct iscsi_session *is; 1277 int error; 1278 1279 sx_slock(&sc->sc_lock); 1280 for (;;) { 1281 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 1282 ISCSI_SESSION_LOCK(is); 1283 if (is->is_waiting_for_iscsid) 1284 break; 1285 ISCSI_SESSION_UNLOCK(is); 1286 } 1287 1288 if (is == NULL) { 1289 /* 1290 * No session requires attention from iscsid(8); wait. 1291 */ 1292 error = cv_wait_sig(&sc->sc_cv, &sc->sc_lock); 1293 if (error != 0) { 1294 sx_sunlock(&sc->sc_lock); 1295 return (error); 1296 } 1297 continue; 1298 } 1299 1300 is->is_waiting_for_iscsid = false; 1301 is->is_login_phase = true; 1302 is->is_reason[0] = '\0'; 1303 ISCSI_SESSION_UNLOCK(is); 1304 1305 request->idr_session_id = is->is_id; 1306 memcpy(&request->idr_isid, &is->is_isid, 1307 sizeof(request->idr_isid)); 1308 request->idr_tsih = 0; /* New or reinstated session. */ 1309 memcpy(&request->idr_conf, &is->is_conf, 1310 sizeof(request->idr_conf)); 1311 1312 error = icl_limits(is->is_conf.isc_offload, 1313 &request->idr_limits.isl_max_data_segment_length); 1314 if (error != 0) { 1315 ISCSI_SESSION_WARN(is, "icl_limits for offload \"%s\" " 1316 "failed with error %d", is->is_conf.isc_offload, 1317 error); 1318 sx_sunlock(&sc->sc_lock); 1319 return (error); 1320 } 1321 1322 sx_sunlock(&sc->sc_lock); 1323 return (0); 1324 } 1325 } 1326 1327 static int 1328 iscsi_ioctl_daemon_handoff(struct iscsi_softc *sc, 1329 struct iscsi_daemon_handoff *handoff) 1330 { 1331 struct iscsi_session *is; 1332 struct icl_conn *ic; 1333 int error; 1334 1335 sx_slock(&sc->sc_lock); 1336 1337 /* 1338 * Find the session to hand off socket to. 1339 */ 1340 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 1341 if (is->is_id == handoff->idh_session_id) 1342 break; 1343 } 1344 if (is == NULL) { 1345 sx_sunlock(&sc->sc_lock); 1346 return (ESRCH); 1347 } 1348 ISCSI_SESSION_LOCK(is); 1349 ic = is->is_conn; 1350 if (is->is_conf.isc_discovery || is->is_terminating) { 1351 ISCSI_SESSION_UNLOCK(is); 1352 sx_sunlock(&sc->sc_lock); 1353 return (EINVAL); 1354 } 1355 if (is->is_connected) { 1356 /* 1357 * This might have happened because another iscsid(8) 1358 * instance handed off the connection in the meantime. 1359 * Just return. 1360 */ 1361 ISCSI_SESSION_WARN(is, "handoff on already connected " 1362 "session"); 1363 ISCSI_SESSION_UNLOCK(is); 1364 sx_sunlock(&sc->sc_lock); 1365 return (EBUSY); 1366 } 1367 1368 strlcpy(is->is_target_alias, handoff->idh_target_alias, 1369 sizeof(is->is_target_alias)); 1370 is->is_tsih = handoff->idh_tsih; 1371 is->is_statsn = handoff->idh_statsn; 1372 is->is_initial_r2t = handoff->idh_initial_r2t; 1373 is->is_immediate_data = handoff->idh_immediate_data; 1374 1375 /* 1376 * Cap MaxRecvDataSegmentLength obtained from the target to the maximum 1377 * size supported by our ICL module. 1378 */ 1379 is->is_max_data_segment_length = min(ic->ic_max_data_segment_length, 1380 handoff->idh_max_data_segment_length); 1381 is->is_max_burst_length = handoff->idh_max_burst_length; 1382 is->is_first_burst_length = handoff->idh_first_burst_length; 1383 1384 if (handoff->idh_header_digest == ISCSI_DIGEST_CRC32C) 1385 ic->ic_header_crc32c = true; 1386 else 1387 ic->ic_header_crc32c = false; 1388 if (handoff->idh_data_digest == ISCSI_DIGEST_CRC32C) 1389 ic->ic_data_crc32c = true; 1390 else 1391 ic->ic_data_crc32c = false; 1392 1393 is->is_cmdsn = 0; 1394 is->is_expcmdsn = 0; 1395 is->is_maxcmdsn = 0; 1396 is->is_waiting_for_iscsid = false; 1397 is->is_login_phase = false; 1398 is->is_timeout = 0; 1399 is->is_connected = true; 1400 is->is_reason[0] = '\0'; 1401 1402 ISCSI_SESSION_UNLOCK(is); 1403 1404 #ifdef ICL_KERNEL_PROXY 1405 if (handoff->idh_socket != 0) { 1406 #endif 1407 /* 1408 * Handoff without using ICL proxy. 1409 */ 1410 error = icl_conn_handoff(ic, handoff->idh_socket); 1411 if (error != 0) { 1412 sx_sunlock(&sc->sc_lock); 1413 iscsi_session_terminate(is); 1414 return (error); 1415 } 1416 #ifdef ICL_KERNEL_PROXY 1417 } 1418 #endif 1419 1420 sx_sunlock(&sc->sc_lock); 1421 1422 if (is->is_sim != NULL) { 1423 /* 1424 * When reconnecting, there already is SIM allocated for the session. 1425 */ 1426 KASSERT(is->is_simq_frozen, ("reconnect without frozen simq")); 1427 ISCSI_SESSION_LOCK(is); 1428 ISCSI_SESSION_DEBUG(is, "releasing"); 1429 xpt_release_simq(is->is_sim, 1); 1430 is->is_simq_frozen = false; 1431 ISCSI_SESSION_UNLOCK(is); 1432 1433 } else { 1434 ISCSI_SESSION_LOCK(is); 1435 is->is_devq = cam_simq_alloc(maxtags); 1436 if (is->is_devq == NULL) { 1437 ISCSI_SESSION_WARN(is, "failed to allocate simq"); 1438 iscsi_session_terminate(is); 1439 return (ENOMEM); 1440 } 1441 1442 is->is_sim = cam_sim_alloc(iscsi_action, iscsi_poll, "iscsi", 1443 is, is->is_id /* unit */, &is->is_lock, 1444 1, maxtags, is->is_devq); 1445 if (is->is_sim == NULL) { 1446 ISCSI_SESSION_UNLOCK(is); 1447 ISCSI_SESSION_WARN(is, "failed to allocate SIM"); 1448 cam_simq_free(is->is_devq); 1449 iscsi_session_terminate(is); 1450 return (ENOMEM); 1451 } 1452 1453 error = xpt_bus_register(is->is_sim, NULL, 0); 1454 if (error != 0) { 1455 ISCSI_SESSION_UNLOCK(is); 1456 ISCSI_SESSION_WARN(is, "failed to register bus"); 1457 iscsi_session_terminate(is); 1458 return (ENOMEM); 1459 } 1460 1461 error = xpt_create_path(&is->is_path, /*periph*/NULL, 1462 cam_sim_path(is->is_sim), CAM_TARGET_WILDCARD, 1463 CAM_LUN_WILDCARD); 1464 if (error != CAM_REQ_CMP) { 1465 ISCSI_SESSION_UNLOCK(is); 1466 ISCSI_SESSION_WARN(is, "failed to create path"); 1467 iscsi_session_terminate(is); 1468 return (ENOMEM); 1469 } 1470 ISCSI_SESSION_UNLOCK(is); 1471 } 1472 1473 return (0); 1474 } 1475 1476 static int 1477 iscsi_ioctl_daemon_fail(struct iscsi_softc *sc, 1478 struct iscsi_daemon_fail *fail) 1479 { 1480 struct iscsi_session *is; 1481 1482 sx_slock(&sc->sc_lock); 1483 1484 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 1485 if (is->is_id == fail->idf_session_id) 1486 break; 1487 } 1488 if (is == NULL) { 1489 sx_sunlock(&sc->sc_lock); 1490 return (ESRCH); 1491 } 1492 ISCSI_SESSION_LOCK(is); 1493 ISCSI_SESSION_DEBUG(is, "iscsid(8) failed: %s", 1494 fail->idf_reason); 1495 strlcpy(is->is_reason, fail->idf_reason, sizeof(is->is_reason)); 1496 //is->is_waiting_for_iscsid = false; 1497 //is->is_login_phase = true; 1498 //iscsi_session_reconnect(is); 1499 ISCSI_SESSION_UNLOCK(is); 1500 sx_sunlock(&sc->sc_lock); 1501 1502 return (0); 1503 } 1504 1505 #ifdef ICL_KERNEL_PROXY 1506 static int 1507 iscsi_ioctl_daemon_connect(struct iscsi_softc *sc, 1508 struct iscsi_daemon_connect *idc) 1509 { 1510 struct iscsi_session *is; 1511 struct sockaddr *from_sa, *to_sa; 1512 int error; 1513 1514 sx_slock(&sc->sc_lock); 1515 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 1516 if (is->is_id == idc->idc_session_id) 1517 break; 1518 } 1519 if (is == NULL) { 1520 sx_sunlock(&sc->sc_lock); 1521 return (ESRCH); 1522 } 1523 sx_sunlock(&sc->sc_lock); 1524 1525 if (idc->idc_from_addrlen > 0) { 1526 error = getsockaddr(&from_sa, (void *)idc->idc_from_addr, idc->idc_from_addrlen); 1527 if (error != 0) { 1528 ISCSI_SESSION_WARN(is, 1529 "getsockaddr failed with error %d", error); 1530 return (error); 1531 } 1532 } else { 1533 from_sa = NULL; 1534 } 1535 error = getsockaddr(&to_sa, (void *)idc->idc_to_addr, idc->idc_to_addrlen); 1536 if (error != 0) { 1537 ISCSI_SESSION_WARN(is, "getsockaddr failed with error %d", 1538 error); 1539 free(from_sa, M_SONAME); 1540 return (error); 1541 } 1542 1543 ISCSI_SESSION_LOCK(is); 1544 is->is_waiting_for_iscsid = false; 1545 is->is_login_phase = true; 1546 is->is_timeout = 0; 1547 ISCSI_SESSION_UNLOCK(is); 1548 1549 error = icl_conn_connect(is->is_conn, idc->idc_iser, idc->idc_domain, 1550 idc->idc_socktype, idc->idc_protocol, from_sa, to_sa); 1551 free(from_sa, M_SONAME); 1552 free(to_sa, M_SONAME); 1553 1554 /* 1555 * Digests are always disabled during login phase. 1556 */ 1557 is->is_conn->ic_header_crc32c = false; 1558 is->is_conn->ic_data_crc32c = false; 1559 1560 return (error); 1561 } 1562 1563 static int 1564 iscsi_ioctl_daemon_send(struct iscsi_softc *sc, 1565 struct iscsi_daemon_send *ids) 1566 { 1567 struct iscsi_session *is; 1568 struct icl_pdu *ip; 1569 size_t datalen; 1570 void *data; 1571 int error; 1572 1573 sx_slock(&sc->sc_lock); 1574 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 1575 if (is->is_id == ids->ids_session_id) 1576 break; 1577 } 1578 if (is == NULL) { 1579 sx_sunlock(&sc->sc_lock); 1580 return (ESRCH); 1581 } 1582 sx_sunlock(&sc->sc_lock); 1583 1584 if (is->is_login_phase == false) 1585 return (EBUSY); 1586 1587 if (is->is_terminating || is->is_reconnecting) 1588 return (EIO); 1589 1590 datalen = ids->ids_data_segment_len; 1591 if (datalen > ISCSI_MAX_DATA_SEGMENT_LENGTH) 1592 return (EINVAL); 1593 if (datalen > 0) { 1594 data = malloc(datalen, M_ISCSI, M_WAITOK); 1595 error = copyin(ids->ids_data_segment, data, datalen); 1596 if (error != 0) { 1597 free(data, M_ISCSI); 1598 return (error); 1599 } 1600 } 1601 1602 ip = icl_pdu_new(is->is_conn, M_WAITOK); 1603 memcpy(ip->ip_bhs, ids->ids_bhs, sizeof(*ip->ip_bhs)); 1604 if (datalen > 0) { 1605 error = icl_pdu_append_data(ip, data, datalen, M_WAITOK); 1606 KASSERT(error == 0, ("icl_pdu_append_data(..., M_WAITOK) failed")); 1607 free(data, M_ISCSI); 1608 } 1609 icl_pdu_queue(ip); 1610 1611 return (0); 1612 } 1613 1614 static int 1615 iscsi_ioctl_daemon_receive(struct iscsi_softc *sc, 1616 struct iscsi_daemon_receive *idr) 1617 { 1618 struct iscsi_session *is; 1619 struct icl_pdu *ip; 1620 void *data; 1621 1622 sx_slock(&sc->sc_lock); 1623 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 1624 if (is->is_id == idr->idr_session_id) 1625 break; 1626 } 1627 if (is == NULL) { 1628 sx_sunlock(&sc->sc_lock); 1629 return (ESRCH); 1630 } 1631 sx_sunlock(&sc->sc_lock); 1632 1633 if (is->is_login_phase == false) 1634 return (EBUSY); 1635 1636 ISCSI_SESSION_LOCK(is); 1637 while (is->is_login_pdu == NULL && 1638 is->is_terminating == false && 1639 is->is_reconnecting == false) 1640 cv_wait(&is->is_login_cv, &is->is_lock); 1641 if (is->is_terminating || is->is_reconnecting) { 1642 ISCSI_SESSION_UNLOCK(is); 1643 return (EIO); 1644 } 1645 ip = is->is_login_pdu; 1646 is->is_login_pdu = NULL; 1647 ISCSI_SESSION_UNLOCK(is); 1648 1649 if (ip->ip_data_len > idr->idr_data_segment_len) { 1650 icl_pdu_free(ip); 1651 return (EMSGSIZE); 1652 } 1653 1654 copyout(ip->ip_bhs, idr->idr_bhs, sizeof(*ip->ip_bhs)); 1655 if (ip->ip_data_len > 0) { 1656 data = malloc(ip->ip_data_len, M_ISCSI, M_WAITOK); 1657 icl_pdu_get_data(ip, 0, data, ip->ip_data_len); 1658 copyout(data, idr->idr_data_segment, ip->ip_data_len); 1659 free(data, M_ISCSI); 1660 } 1661 1662 icl_pdu_free(ip); 1663 1664 return (0); 1665 } 1666 #endif /* ICL_KERNEL_PROXY */ 1667 1668 static void 1669 iscsi_sanitize_session_conf(struct iscsi_session_conf *isc) 1670 { 1671 /* 1672 * Just make sure all the fields are null-terminated. 1673 * 1674 * XXX: This is not particularly secure. We should 1675 * create our own conf and then copy in relevant 1676 * fields. 1677 */ 1678 isc->isc_initiator[ISCSI_NAME_LEN - 1] = '\0'; 1679 isc->isc_initiator_addr[ISCSI_ADDR_LEN - 1] = '\0'; 1680 isc->isc_initiator_alias[ISCSI_ALIAS_LEN - 1] = '\0'; 1681 isc->isc_target[ISCSI_NAME_LEN - 1] = '\0'; 1682 isc->isc_target_addr[ISCSI_ADDR_LEN - 1] = '\0'; 1683 isc->isc_user[ISCSI_NAME_LEN - 1] = '\0'; 1684 isc->isc_secret[ISCSI_SECRET_LEN - 1] = '\0'; 1685 isc->isc_mutual_user[ISCSI_NAME_LEN - 1] = '\0'; 1686 isc->isc_mutual_secret[ISCSI_SECRET_LEN - 1] = '\0'; 1687 } 1688 1689 static bool 1690 iscsi_valid_session_conf(const struct iscsi_session_conf *isc) 1691 { 1692 1693 if (isc->isc_initiator[0] == '\0') { 1694 ISCSI_DEBUG("empty isc_initiator"); 1695 return (false); 1696 } 1697 1698 if (isc->isc_target_addr[0] == '\0') { 1699 ISCSI_DEBUG("empty isc_target_addr"); 1700 return (false); 1701 } 1702 1703 if (isc->isc_discovery != 0 && isc->isc_target[0] != 0) { 1704 ISCSI_DEBUG("non-empty isc_target for discovery session"); 1705 return (false); 1706 } 1707 1708 if (isc->isc_discovery == 0 && isc->isc_target[0] == 0) { 1709 ISCSI_DEBUG("empty isc_target for non-discovery session"); 1710 return (false); 1711 } 1712 1713 return (true); 1714 } 1715 1716 static int 1717 iscsi_ioctl_session_add(struct iscsi_softc *sc, struct iscsi_session_add *isa) 1718 { 1719 struct iscsi_session *is; 1720 const struct iscsi_session *is2; 1721 int error; 1722 1723 iscsi_sanitize_session_conf(&isa->isa_conf); 1724 if (iscsi_valid_session_conf(&isa->isa_conf) == false) 1725 return (EINVAL); 1726 1727 is = malloc(sizeof(*is), M_ISCSI, M_ZERO | M_WAITOK); 1728 memcpy(&is->is_conf, &isa->isa_conf, sizeof(is->is_conf)); 1729 1730 sx_xlock(&sc->sc_lock); 1731 1732 /* 1733 * Prevent duplicates. 1734 */ 1735 TAILQ_FOREACH(is2, &sc->sc_sessions, is_next) { 1736 if (!!is->is_conf.isc_discovery != 1737 !!is2->is_conf.isc_discovery) 1738 continue; 1739 1740 if (strcmp(is->is_conf.isc_target_addr, 1741 is2->is_conf.isc_target_addr) != 0) 1742 continue; 1743 1744 if (is->is_conf.isc_discovery == 0 && 1745 strcmp(is->is_conf.isc_target, 1746 is2->is_conf.isc_target) != 0) 1747 continue; 1748 1749 sx_xunlock(&sc->sc_lock); 1750 free(is, M_ISCSI); 1751 return (EBUSY); 1752 } 1753 1754 is->is_conn = icl_new_conn(is->is_conf.isc_offload, 1755 "iscsi", &is->is_lock); 1756 if (is->is_conn == NULL) { 1757 sx_xunlock(&sc->sc_lock); 1758 free(is, M_ISCSI); 1759 return (EINVAL); 1760 } 1761 is->is_conn->ic_receive = iscsi_receive_callback; 1762 is->is_conn->ic_error = iscsi_error_callback; 1763 is->is_conn->ic_prv0 = is; 1764 TAILQ_INIT(&is->is_outstanding); 1765 STAILQ_INIT(&is->is_postponed); 1766 mtx_init(&is->is_lock, "iscsi_lock", NULL, MTX_DEF); 1767 cv_init(&is->is_maintenance_cv, "iscsi_mt"); 1768 #ifdef ICL_KERNEL_PROXY 1769 cv_init(&is->is_login_cv, "iscsi_login"); 1770 #endif 1771 1772 is->is_softc = sc; 1773 sc->sc_last_session_id++; 1774 is->is_id = sc->sc_last_session_id; 1775 is->is_isid[0] = 0x80; /* RFC 3720, 10.12.5: 10b, "Random" ISID. */ 1776 arc4rand(&is->is_isid[1], 5, 0); 1777 is->is_tsih = 0; 1778 callout_init(&is->is_callout, 1); 1779 1780 error = kthread_add(iscsi_maintenance_thread, is, NULL, NULL, 0, 0, "iscsimt"); 1781 if (error != 0) { 1782 ISCSI_SESSION_WARN(is, "kthread_add(9) failed with error %d", error); 1783 sx_xunlock(&sc->sc_lock); 1784 return (error); 1785 } 1786 1787 callout_reset(&is->is_callout, 1 * hz, iscsi_callout, is); 1788 TAILQ_INSERT_TAIL(&sc->sc_sessions, is, is_next); 1789 1790 /* 1791 * Trigger immediate reconnection. 1792 */ 1793 ISCSI_SESSION_LOCK(is); 1794 is->is_waiting_for_iscsid = true; 1795 strlcpy(is->is_reason, "Waiting for iscsid(8)", sizeof(is->is_reason)); 1796 ISCSI_SESSION_UNLOCK(is); 1797 cv_signal(&sc->sc_cv); 1798 1799 sx_xunlock(&sc->sc_lock); 1800 1801 return (0); 1802 } 1803 1804 static bool 1805 iscsi_session_conf_matches(unsigned int id1, const struct iscsi_session_conf *c1, 1806 unsigned int id2, const struct iscsi_session_conf *c2) 1807 { 1808 1809 if (id2 != 0 && id2 != id1) 1810 return (false); 1811 if (c2->isc_target[0] != '\0' && 1812 strcmp(c1->isc_target, c2->isc_target) != 0) 1813 return (false); 1814 if (c2->isc_target_addr[0] != '\0' && 1815 strcmp(c1->isc_target_addr, c2->isc_target_addr) != 0) 1816 return (false); 1817 return (true); 1818 } 1819 1820 static int 1821 iscsi_ioctl_session_remove(struct iscsi_softc *sc, 1822 struct iscsi_session_remove *isr) 1823 { 1824 struct iscsi_session *is, *tmp; 1825 bool found = false; 1826 1827 iscsi_sanitize_session_conf(&isr->isr_conf); 1828 1829 sx_xlock(&sc->sc_lock); 1830 TAILQ_FOREACH_SAFE(is, &sc->sc_sessions, is_next, tmp) { 1831 ISCSI_SESSION_LOCK(is); 1832 if (iscsi_session_conf_matches(is->is_id, &is->is_conf, 1833 isr->isr_session_id, &isr->isr_conf)) { 1834 found = true; 1835 iscsi_session_logout(is); 1836 iscsi_session_terminate(is); 1837 } 1838 ISCSI_SESSION_UNLOCK(is); 1839 } 1840 sx_xunlock(&sc->sc_lock); 1841 1842 if (!found) 1843 return (ESRCH); 1844 1845 return (0); 1846 } 1847 1848 static int 1849 iscsi_ioctl_session_list(struct iscsi_softc *sc, struct iscsi_session_list *isl) 1850 { 1851 int error; 1852 unsigned int i = 0; 1853 struct iscsi_session *is; 1854 struct iscsi_session_state iss; 1855 1856 sx_slock(&sc->sc_lock); 1857 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 1858 if (i >= isl->isl_nentries) { 1859 sx_sunlock(&sc->sc_lock); 1860 return (EMSGSIZE); 1861 } 1862 memset(&iss, 0, sizeof(iss)); 1863 memcpy(&iss.iss_conf, &is->is_conf, sizeof(iss.iss_conf)); 1864 iss.iss_id = is->is_id; 1865 strlcpy(iss.iss_target_alias, is->is_target_alias, sizeof(iss.iss_target_alias)); 1866 strlcpy(iss.iss_reason, is->is_reason, sizeof(iss.iss_reason)); 1867 strlcpy(iss.iss_offload, is->is_conn->ic_offload, sizeof(iss.iss_offload)); 1868 1869 if (is->is_conn->ic_header_crc32c) 1870 iss.iss_header_digest = ISCSI_DIGEST_CRC32C; 1871 else 1872 iss.iss_header_digest = ISCSI_DIGEST_NONE; 1873 1874 if (is->is_conn->ic_data_crc32c) 1875 iss.iss_data_digest = ISCSI_DIGEST_CRC32C; 1876 else 1877 iss.iss_data_digest = ISCSI_DIGEST_NONE; 1878 1879 iss.iss_max_data_segment_length = is->is_max_data_segment_length; 1880 iss.iss_immediate_data = is->is_immediate_data; 1881 iss.iss_connected = is->is_connected; 1882 1883 error = copyout(&iss, isl->isl_pstates + i, sizeof(iss)); 1884 if (error != 0) { 1885 sx_sunlock(&sc->sc_lock); 1886 return (error); 1887 } 1888 i++; 1889 } 1890 sx_sunlock(&sc->sc_lock); 1891 1892 isl->isl_nentries = i; 1893 1894 return (0); 1895 } 1896 1897 static int 1898 iscsi_ioctl_session_modify(struct iscsi_softc *sc, 1899 struct iscsi_session_modify *ism) 1900 { 1901 struct iscsi_session *is; 1902 1903 iscsi_sanitize_session_conf(&ism->ism_conf); 1904 if (iscsi_valid_session_conf(&ism->ism_conf) == false) 1905 return (EINVAL); 1906 1907 sx_xlock(&sc->sc_lock); 1908 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 1909 ISCSI_SESSION_LOCK(is); 1910 if (is->is_id == ism->ism_session_id) 1911 break; 1912 ISCSI_SESSION_UNLOCK(is); 1913 } 1914 if (is == NULL) { 1915 sx_xunlock(&sc->sc_lock); 1916 return (ESRCH); 1917 } 1918 sx_xunlock(&sc->sc_lock); 1919 1920 memcpy(&is->is_conf, &ism->ism_conf, sizeof(is->is_conf)); 1921 ISCSI_SESSION_UNLOCK(is); 1922 1923 iscsi_session_reconnect(is); 1924 1925 return (0); 1926 } 1927 1928 static int 1929 iscsi_ioctl(struct cdev *dev, u_long cmd, caddr_t arg, int mode, 1930 struct thread *td) 1931 { 1932 struct iscsi_softc *sc; 1933 1934 sc = dev->si_drv1; 1935 1936 switch (cmd) { 1937 case ISCSIDWAIT: 1938 return (iscsi_ioctl_daemon_wait(sc, 1939 (struct iscsi_daemon_request *)arg)); 1940 case ISCSIDHANDOFF: 1941 return (iscsi_ioctl_daemon_handoff(sc, 1942 (struct iscsi_daemon_handoff *)arg)); 1943 case ISCSIDFAIL: 1944 return (iscsi_ioctl_daemon_fail(sc, 1945 (struct iscsi_daemon_fail *)arg)); 1946 #ifdef ICL_KERNEL_PROXY 1947 case ISCSIDCONNECT: 1948 return (iscsi_ioctl_daemon_connect(sc, 1949 (struct iscsi_daemon_connect *)arg)); 1950 case ISCSIDSEND: 1951 return (iscsi_ioctl_daemon_send(sc, 1952 (struct iscsi_daemon_send *)arg)); 1953 case ISCSIDRECEIVE: 1954 return (iscsi_ioctl_daemon_receive(sc, 1955 (struct iscsi_daemon_receive *)arg)); 1956 #endif /* ICL_KERNEL_PROXY */ 1957 case ISCSISADD: 1958 return (iscsi_ioctl_session_add(sc, 1959 (struct iscsi_session_add *)arg)); 1960 case ISCSISREMOVE: 1961 return (iscsi_ioctl_session_remove(sc, 1962 (struct iscsi_session_remove *)arg)); 1963 case ISCSISLIST: 1964 return (iscsi_ioctl_session_list(sc, 1965 (struct iscsi_session_list *)arg)); 1966 case ISCSISMODIFY: 1967 return (iscsi_ioctl_session_modify(sc, 1968 (struct iscsi_session_modify *)arg)); 1969 default: 1970 return (EINVAL); 1971 } 1972 } 1973 1974 static struct iscsi_outstanding * 1975 iscsi_outstanding_find(struct iscsi_session *is, uint32_t initiator_task_tag) 1976 { 1977 struct iscsi_outstanding *io; 1978 1979 ISCSI_SESSION_LOCK_ASSERT(is); 1980 1981 TAILQ_FOREACH(io, &is->is_outstanding, io_next) { 1982 if (io->io_initiator_task_tag == initiator_task_tag) 1983 return (io); 1984 } 1985 return (NULL); 1986 } 1987 1988 static struct iscsi_outstanding * 1989 iscsi_outstanding_find_ccb(struct iscsi_session *is, union ccb *ccb) 1990 { 1991 struct iscsi_outstanding *io; 1992 1993 ISCSI_SESSION_LOCK_ASSERT(is); 1994 1995 TAILQ_FOREACH(io, &is->is_outstanding, io_next) { 1996 if (io->io_ccb == ccb) 1997 return (io); 1998 } 1999 return (NULL); 2000 } 2001 2002 static struct iscsi_outstanding * 2003 iscsi_outstanding_add(struct iscsi_session *is, 2004 union ccb *ccb, uint32_t *initiator_task_tagp) 2005 { 2006 struct iscsi_outstanding *io; 2007 int error; 2008 2009 ISCSI_SESSION_LOCK_ASSERT(is); 2010 2011 io = uma_zalloc(iscsi_outstanding_zone, M_NOWAIT | M_ZERO); 2012 if (io == NULL) { 2013 ISCSI_SESSION_WARN(is, "failed to allocate %zd bytes", 2014 sizeof(*io)); 2015 return (NULL); 2016 } 2017 2018 error = icl_conn_task_setup(is->is_conn, &ccb->csio, 2019 initiator_task_tagp, &io->io_icl_prv); 2020 if (error != 0) { 2021 ISCSI_SESSION_WARN(is, 2022 "icl_conn_task_setup() failed with error %d", error); 2023 uma_zfree(iscsi_outstanding_zone, io); 2024 return (NULL); 2025 } 2026 2027 KASSERT(iscsi_outstanding_find(is, *initiator_task_tagp) == NULL, 2028 ("initiator_task_tag 0x%x already added", *initiator_task_tagp)); 2029 2030 io->io_initiator_task_tag = *initiator_task_tagp; 2031 io->io_ccb = ccb; 2032 TAILQ_INSERT_TAIL(&is->is_outstanding, io, io_next); 2033 return (io); 2034 } 2035 2036 static void 2037 iscsi_outstanding_remove(struct iscsi_session *is, struct iscsi_outstanding *io) 2038 { 2039 2040 ISCSI_SESSION_LOCK_ASSERT(is); 2041 2042 icl_conn_task_done(is->is_conn, io->io_icl_prv); 2043 TAILQ_REMOVE(&is->is_outstanding, io, io_next); 2044 uma_zfree(iscsi_outstanding_zone, io); 2045 } 2046 2047 static void 2048 iscsi_action_abort(struct iscsi_session *is, union ccb *ccb) 2049 { 2050 struct icl_pdu *request; 2051 struct iscsi_bhs_task_management_request *bhstmr; 2052 struct ccb_abort *cab = &ccb->cab; 2053 struct iscsi_outstanding *io, *aio; 2054 uint32_t initiator_task_tag; 2055 2056 ISCSI_SESSION_LOCK_ASSERT(is); 2057 2058 #if 0 2059 KASSERT(is->is_login_phase == false, ("%s called during Login Phase", __func__)); 2060 #else 2061 if (is->is_login_phase) { 2062 ccb->ccb_h.status = CAM_REQ_ABORTED; 2063 xpt_done(ccb); 2064 return; 2065 } 2066 #endif 2067 2068 aio = iscsi_outstanding_find_ccb(is, cab->abort_ccb); 2069 if (aio == NULL) { 2070 ccb->ccb_h.status = CAM_REQ_CMP; 2071 xpt_done(ccb); 2072 return; 2073 } 2074 2075 request = icl_pdu_new(is->is_conn, M_NOWAIT); 2076 if (request == NULL) { 2077 ccb->ccb_h.status = CAM_RESRC_UNAVAIL; 2078 xpt_done(ccb); 2079 return; 2080 } 2081 2082 initiator_task_tag = is->is_initiator_task_tag++; 2083 2084 io = iscsi_outstanding_add(is, NULL, &initiator_task_tag); 2085 if (io == NULL) { 2086 icl_pdu_free(request); 2087 ccb->ccb_h.status = CAM_RESRC_UNAVAIL; 2088 xpt_done(ccb); 2089 return; 2090 } 2091 io->io_datasn = aio->io_initiator_task_tag; 2092 2093 bhstmr = (struct iscsi_bhs_task_management_request *)request->ip_bhs; 2094 bhstmr->bhstmr_opcode = ISCSI_BHS_OPCODE_TASK_REQUEST; 2095 bhstmr->bhstmr_function = 0x80 | BHSTMR_FUNCTION_ABORT_TASK; 2096 bhstmr->bhstmr_lun = htobe64(CAM_EXTLUN_BYTE_SWIZZLE(ccb->ccb_h.target_lun)); 2097 bhstmr->bhstmr_initiator_task_tag = initiator_task_tag; 2098 bhstmr->bhstmr_referenced_task_tag = aio->io_initiator_task_tag; 2099 2100 iscsi_pdu_queue_locked(request); 2101 } 2102 2103 static void 2104 iscsi_action_scsiio(struct iscsi_session *is, union ccb *ccb) 2105 { 2106 struct icl_pdu *request; 2107 struct iscsi_bhs_scsi_command *bhssc; 2108 struct ccb_scsiio *csio; 2109 struct iscsi_outstanding *io; 2110 size_t len; 2111 uint32_t initiator_task_tag; 2112 int error; 2113 2114 ISCSI_SESSION_LOCK_ASSERT(is); 2115 2116 #if 0 2117 KASSERT(is->is_login_phase == false, ("%s called during Login Phase", __func__)); 2118 #else 2119 if (is->is_login_phase) { 2120 ISCSI_SESSION_DEBUG(is, "called during login phase"); 2121 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 2122 xpt_freeze_devq(ccb->ccb_h.path, 1); 2123 ISCSI_SESSION_DEBUG(is, "freezing devq"); 2124 } 2125 ccb->ccb_h.status = CAM_REQ_ABORTED | CAM_DEV_QFRZN; 2126 xpt_done(ccb); 2127 return; 2128 } 2129 #endif 2130 2131 request = icl_pdu_new(is->is_conn, M_NOWAIT); 2132 if (request == NULL) { 2133 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 2134 xpt_freeze_devq(ccb->ccb_h.path, 1); 2135 ISCSI_SESSION_DEBUG(is, "freezing devq"); 2136 } 2137 ccb->ccb_h.status = CAM_RESRC_UNAVAIL | CAM_DEV_QFRZN; 2138 xpt_done(ccb); 2139 return; 2140 } 2141 2142 initiator_task_tag = is->is_initiator_task_tag++; 2143 io = iscsi_outstanding_add(is, ccb, &initiator_task_tag); 2144 if (io == NULL) { 2145 icl_pdu_free(request); 2146 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 2147 xpt_freeze_devq(ccb->ccb_h.path, 1); 2148 ISCSI_SESSION_DEBUG(is, "freezing devq"); 2149 } 2150 ccb->ccb_h.status = CAM_RESRC_UNAVAIL | CAM_DEV_QFRZN; 2151 xpt_done(ccb); 2152 return; 2153 } 2154 2155 csio = &ccb->csio; 2156 bhssc = (struct iscsi_bhs_scsi_command *)request->ip_bhs; 2157 bhssc->bhssc_opcode = ISCSI_BHS_OPCODE_SCSI_COMMAND; 2158 bhssc->bhssc_flags |= BHSSC_FLAGS_F; 2159 switch (csio->ccb_h.flags & CAM_DIR_MASK) { 2160 case CAM_DIR_IN: 2161 bhssc->bhssc_flags |= BHSSC_FLAGS_R; 2162 break; 2163 case CAM_DIR_OUT: 2164 bhssc->bhssc_flags |= BHSSC_FLAGS_W; 2165 break; 2166 } 2167 2168 if ((ccb->ccb_h.flags & CAM_TAG_ACTION_VALID) != 0) { 2169 switch (csio->tag_action) { 2170 case MSG_HEAD_OF_Q_TAG: 2171 bhssc->bhssc_flags |= BHSSC_FLAGS_ATTR_HOQ; 2172 break; 2173 case MSG_ORDERED_Q_TAG: 2174 bhssc->bhssc_flags |= BHSSC_FLAGS_ATTR_ORDERED; 2175 break; 2176 case MSG_ACA_TASK: 2177 bhssc->bhssc_flags |= BHSSC_FLAGS_ATTR_ACA; 2178 break; 2179 case MSG_SIMPLE_Q_TAG: 2180 default: 2181 bhssc->bhssc_flags |= BHSSC_FLAGS_ATTR_SIMPLE; 2182 break; 2183 } 2184 } else 2185 bhssc->bhssc_flags |= BHSSC_FLAGS_ATTR_UNTAGGED; 2186 2187 bhssc->bhssc_lun = htobe64(CAM_EXTLUN_BYTE_SWIZZLE(ccb->ccb_h.target_lun)); 2188 bhssc->bhssc_initiator_task_tag = initiator_task_tag; 2189 bhssc->bhssc_expected_data_transfer_length = htonl(csio->dxfer_len); 2190 KASSERT(csio->cdb_len <= sizeof(bhssc->bhssc_cdb), 2191 ("unsupported CDB size %zd", (size_t)csio->cdb_len)); 2192 2193 if (csio->ccb_h.flags & CAM_CDB_POINTER) 2194 memcpy(&bhssc->bhssc_cdb, csio->cdb_io.cdb_ptr, csio->cdb_len); 2195 else 2196 memcpy(&bhssc->bhssc_cdb, csio->cdb_io.cdb_bytes, csio->cdb_len); 2197 2198 if (is->is_immediate_data && 2199 (csio->ccb_h.flags & CAM_DIR_MASK) == CAM_DIR_OUT) { 2200 len = csio->dxfer_len; 2201 //ISCSI_SESSION_DEBUG(is, "adding %zd of immediate data", len); 2202 if (len > is->is_first_burst_length) { 2203 ISCSI_SESSION_DEBUG(is, "len %zd -> %zd", len, is->is_first_burst_length); 2204 len = is->is_first_burst_length; 2205 } 2206 if (len > is->is_max_data_segment_length) { 2207 ISCSI_SESSION_DEBUG(is, "len %zd -> %zd", len, is->is_max_data_segment_length); 2208 len = is->is_max_data_segment_length; 2209 } 2210 2211 error = icl_pdu_append_data(request, csio->data_ptr, len, M_NOWAIT); 2212 if (error != 0) { 2213 icl_pdu_free(request); 2214 if ((ccb->ccb_h.status & CAM_DEV_QFRZN) == 0) { 2215 xpt_freeze_devq(ccb->ccb_h.path, 1); 2216 ISCSI_SESSION_DEBUG(is, "freezing devq"); 2217 } 2218 ccb->ccb_h.status = CAM_RESRC_UNAVAIL | CAM_DEV_QFRZN; 2219 xpt_done(ccb); 2220 return; 2221 } 2222 } 2223 iscsi_pdu_queue_locked(request); 2224 } 2225 2226 static void 2227 iscsi_action(struct cam_sim *sim, union ccb *ccb) 2228 { 2229 struct iscsi_session *is; 2230 2231 is = cam_sim_softc(sim); 2232 2233 ISCSI_SESSION_LOCK_ASSERT(is); 2234 2235 if (is->is_terminating || 2236 (is->is_connected == false && fail_on_disconnection)) { 2237 ccb->ccb_h.status = CAM_DEV_NOT_THERE; 2238 xpt_done(ccb); 2239 return; 2240 } 2241 2242 switch (ccb->ccb_h.func_code) { 2243 case XPT_PATH_INQ: 2244 { 2245 struct ccb_pathinq *cpi = &ccb->cpi; 2246 2247 cpi->version_num = 1; 2248 cpi->hba_inquiry = PI_TAG_ABLE; 2249 cpi->target_sprt = 0; 2250 cpi->hba_misc = PIM_EXTLUNS; 2251 cpi->hba_eng_cnt = 0; 2252 cpi->max_target = 0; 2253 /* 2254 * Note that the variable below is only relevant for targets 2255 * that don't claim compliance with anything above SPC2, which 2256 * means they don't support REPORT_LUNS. 2257 */ 2258 cpi->max_lun = 255; 2259 cpi->initiator_id = ~0; 2260 strlcpy(cpi->sim_vid, "FreeBSD", SIM_IDLEN); 2261 strlcpy(cpi->hba_vid, "iSCSI", HBA_IDLEN); 2262 strlcpy(cpi->dev_name, cam_sim_name(sim), DEV_IDLEN); 2263 cpi->unit_number = cam_sim_unit(sim); 2264 cpi->bus_id = cam_sim_bus(sim); 2265 cpi->base_transfer_speed = 150000; /* XXX */ 2266 cpi->transport = XPORT_ISCSI; 2267 cpi->transport_version = 0; 2268 cpi->protocol = PROTO_SCSI; 2269 cpi->protocol_version = SCSI_REV_SPC3; 2270 cpi->maxio = MAXPHYS; 2271 cpi->ccb_h.status = CAM_REQ_CMP; 2272 break; 2273 } 2274 case XPT_GET_TRAN_SETTINGS: 2275 { 2276 struct ccb_trans_settings *cts; 2277 struct ccb_trans_settings_scsi *scsi; 2278 2279 cts = &ccb->cts; 2280 scsi = &cts->proto_specific.scsi; 2281 2282 cts->protocol = PROTO_SCSI; 2283 cts->protocol_version = SCSI_REV_SPC3; 2284 cts->transport = XPORT_ISCSI; 2285 cts->transport_version = 0; 2286 scsi->valid = CTS_SCSI_VALID_TQ; 2287 scsi->flags = CTS_SCSI_FLAGS_TAG_ENB; 2288 cts->ccb_h.status = CAM_REQ_CMP; 2289 break; 2290 } 2291 case XPT_CALC_GEOMETRY: 2292 cam_calc_geometry(&ccb->ccg, /*extended*/1); 2293 ccb->ccb_h.status = CAM_REQ_CMP; 2294 break; 2295 #if 0 2296 /* 2297 * XXX: What's the point? 2298 */ 2299 case XPT_RESET_BUS: 2300 case XPT_TERM_IO: 2301 ISCSI_SESSION_DEBUG(is, "faking success for reset, abort, or term_io"); 2302 ccb->ccb_h.status = CAM_REQ_CMP; 2303 break; 2304 #endif 2305 case XPT_ABORT: 2306 iscsi_action_abort(is, ccb); 2307 return; 2308 case XPT_SCSI_IO: 2309 iscsi_action_scsiio(is, ccb); 2310 return; 2311 default: 2312 #if 0 2313 ISCSI_SESSION_DEBUG(is, "got unsupported code 0x%x", ccb->ccb_h.func_code); 2314 #endif 2315 ccb->ccb_h.status = CAM_FUNC_NOTAVAIL; 2316 break; 2317 } 2318 xpt_done(ccb); 2319 } 2320 2321 static void 2322 iscsi_poll(struct cam_sim *sim) 2323 { 2324 2325 KASSERT(0, ("%s: you're not supposed to be here", __func__)); 2326 } 2327 2328 static void 2329 iscsi_shutdown(struct iscsi_softc *sc) 2330 { 2331 struct iscsi_session *is; 2332 2333 /* 2334 * Trying to reconnect during system shutdown would lead to hang. 2335 */ 2336 fail_on_disconnection = 1; 2337 2338 /* 2339 * If we have any sessions waiting for reconnection, request 2340 * maintenance thread to fail them immediately instead of waiting 2341 * for reconnect timeout. 2342 */ 2343 sx_slock(&sc->sc_lock); 2344 TAILQ_FOREACH(is, &sc->sc_sessions, is_next) { 2345 ISCSI_SESSION_LOCK(is); 2346 if (is->is_waiting_for_iscsid) 2347 iscsi_session_reconnect(is); 2348 ISCSI_SESSION_UNLOCK(is); 2349 } 2350 sx_sunlock(&sc->sc_lock); 2351 } 2352 2353 static int 2354 iscsi_load(void) 2355 { 2356 int error; 2357 2358 sc = malloc(sizeof(*sc), M_ISCSI, M_ZERO | M_WAITOK); 2359 sx_init(&sc->sc_lock, "iscsi"); 2360 TAILQ_INIT(&sc->sc_sessions); 2361 cv_init(&sc->sc_cv, "iscsi_cv"); 2362 2363 iscsi_outstanding_zone = uma_zcreate("iscsi_outstanding", 2364 sizeof(struct iscsi_outstanding), NULL, NULL, NULL, NULL, 2365 UMA_ALIGN_PTR, 0); 2366 2367 error = make_dev_p(MAKEDEV_CHECKNAME, &sc->sc_cdev, &iscsi_cdevsw, 2368 NULL, UID_ROOT, GID_WHEEL, 0600, "iscsi"); 2369 if (error != 0) { 2370 ISCSI_WARN("failed to create device node, error %d", error); 2371 return (error); 2372 } 2373 sc->sc_cdev->si_drv1 = sc; 2374 2375 sc->sc_shutdown_eh = EVENTHANDLER_REGISTER(shutdown_pre_sync, 2376 iscsi_shutdown, sc, SHUTDOWN_PRI_DEFAULT-1); 2377 2378 return (0); 2379 } 2380 2381 static int 2382 iscsi_unload(void) 2383 { 2384 struct iscsi_session *is, *tmp; 2385 2386 if (sc->sc_cdev != NULL) { 2387 ISCSI_DEBUG("removing device node"); 2388 destroy_dev(sc->sc_cdev); 2389 ISCSI_DEBUG("device node removed"); 2390 } 2391 2392 if (sc->sc_shutdown_eh != NULL) 2393 EVENTHANDLER_DEREGISTER(shutdown_pre_sync, sc->sc_shutdown_eh); 2394 2395 sx_slock(&sc->sc_lock); 2396 TAILQ_FOREACH_SAFE(is, &sc->sc_sessions, is_next, tmp) 2397 iscsi_session_terminate(is); 2398 while(!TAILQ_EMPTY(&sc->sc_sessions)) { 2399 ISCSI_DEBUG("waiting for sessions to terminate"); 2400 cv_wait(&sc->sc_cv, &sc->sc_lock); 2401 } 2402 ISCSI_DEBUG("all sessions terminated"); 2403 sx_sunlock(&sc->sc_lock); 2404 2405 uma_zdestroy(iscsi_outstanding_zone); 2406 sx_destroy(&sc->sc_lock); 2407 cv_destroy(&sc->sc_cv); 2408 free(sc, M_ISCSI); 2409 return (0); 2410 } 2411 2412 static int 2413 iscsi_quiesce(void) 2414 { 2415 sx_slock(&sc->sc_lock); 2416 if (!TAILQ_EMPTY(&sc->sc_sessions)) { 2417 sx_sunlock(&sc->sc_lock); 2418 return (EBUSY); 2419 } 2420 sx_sunlock(&sc->sc_lock); 2421 return (0); 2422 } 2423 2424 static int 2425 iscsi_modevent(module_t mod, int what, void *arg) 2426 { 2427 int error; 2428 2429 switch (what) { 2430 case MOD_LOAD: 2431 error = iscsi_load(); 2432 break; 2433 case MOD_UNLOAD: 2434 error = iscsi_unload(); 2435 break; 2436 case MOD_QUIESCE: 2437 error = iscsi_quiesce(); 2438 break; 2439 default: 2440 error = EINVAL; 2441 break; 2442 } 2443 return (error); 2444 } 2445 2446 moduledata_t iscsi_data = { 2447 "iscsi", 2448 iscsi_modevent, 2449 0 2450 }; 2451 2452 DECLARE_MODULE(iscsi, iscsi_data, SI_SUB_DRIVERS, SI_ORDER_MIDDLE); 2453 MODULE_DEPEND(iscsi, cam, 1, 1, 1); 2454 MODULE_DEPEND(iscsi, icl, 1, 1, 1); 2455