1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #include <stdlib.h> 27 #include <stdio.h> 28 #include <wchar.h> 29 #include <strings.h> 30 #include <sys/types.h> 31 #include <sys/stat.h> 32 #include <fcntl.h> 33 #include <unistd.h> 34 #include <libintl.h> 35 #include <errno.h> 36 #include <string.h> 37 #include <assert.h> 38 #include <libnvpair.h> 39 #include <pthread.h> 40 #include <syslog.h> 41 #include <libstmf.h> 42 #include <netinet/in.h> 43 #include <inttypes.h> 44 #include <store.h> 45 #include <locale.h> 46 #include <math.h> 47 #include <libstmf_impl.h> 48 #include <sys/stmf_ioctl.h> 49 #include <sys/stmf_sbd_ioctl.h> 50 51 #define STMF_PATH "/devices/pseudo/stmf@0:admin" 52 #define SBD_PATH "/devices/pseudo/stmf_sbd@0:admin" 53 54 #define EUI "eui." 55 #define WWN "wwn." 56 #define IQN "iqn." 57 #define LU_ASCII_GUID_SIZE 32 58 #define LU_GUID_SIZE 16 59 #define OUI_ASCII_SIZE 6 60 #define OUI_SIZE 3 61 #define IDENT_LENGTH_BYTE 3 62 63 /* various initial allocation values */ 64 #define ALLOC_LU 8192 65 #define ALLOC_TARGET_PORT 2048 66 #define ALLOC_PROVIDER 64 67 #define ALLOC_GROUP 2048 68 #define ALLOC_SESSION 2048 69 #define ALLOC_VE 256 70 #define ALLOC_PP_DATA_SIZE 128*1024 71 #define ALLOC_GRP_MEMBER 256 72 73 #define MAX_ISCSI_NAME 223 74 #define MAX_SERIAL_SIZE 252 + 1 75 #define MAX_LU_ALIAS_SIZE 256 76 #define MAX_SBD_PROPS MAXPATHLEN + MAX_SERIAL_SIZE + MAX_LU_ALIAS_SIZE 77 78 #define OPEN_STMF 0 79 #define OPEN_EXCL_STMF O_EXCL 80 81 #define OPEN_SBD 0 82 #define OPEN_EXCL_SBD O_EXCL 83 84 #define LOGICAL_UNIT_TYPE 0 85 #define TARGET_TYPE 1 86 #define STMF_SERVICE_TYPE 2 87 88 #define HOST_GROUP 1 89 #define TARGET_GROUP 2 90 91 /* set default persistence here */ 92 #define STMF_DEFAULT_PERSIST STMF_PERSIST_SMF 93 94 #define MAX_PROVIDER_RETRY 30 95 96 static int openStmf(int, int *fd); 97 static int openSbd(int, int *fd); 98 static int groupIoctl(int fd, int cmd, stmfGroupName *); 99 static int loadStore(int fd); 100 static int initializeConfig(); 101 static int groupMemberIoctl(int fd, int cmd, stmfGroupName *, stmfDevid *); 102 static int guidCompare(const void *, const void *); 103 static int addViewEntryIoctl(int fd, stmfGuid *, stmfViewEntry *); 104 static int loadHostGroups(int fd, stmfGroupList *); 105 static int loadTargetGroups(int fd, stmfGroupList *); 106 static int getStmfState(stmf_state_desc_t *); 107 static int setStmfState(int fd, stmf_state_desc_t *, int); 108 static int setProviderData(int fd, char *, nvlist_t *, int, uint64_t *); 109 static int createDiskResource(luResourceImpl *); 110 static int createDiskLu(diskResource *, stmfGuid *); 111 static int deleteDiskLu(stmfGuid *luGuid); 112 static int getDiskProp(luResourceImpl *, uint32_t, char *, size_t *); 113 static int getDiskAllProps(stmfGuid *luGuid, luResource *hdl); 114 static int loadDiskPropsFromDriver(luResourceImpl *, sbd_lu_props_t *); 115 static int removeGuidFromDiskStore(stmfGuid *); 116 static int addGuidToDiskStore(stmfGuid *, char *); 117 static int persistDiskGuid(stmfGuid *, char *, boolean_t); 118 static int setDiskProp(luResourceImpl *, uint32_t, const char *); 119 static int checkHexUpper(char *); 120 static int strToShift(const char *); 121 static int niceStrToNum(const char *, uint64_t *); 122 static void diskError(uint32_t, int *); 123 static int importDiskLu(char *fname, stmfGuid *); 124 static int modifyDiskLu(diskResource *, stmfGuid *, const char *); 125 static int modifyDiskLuProp(stmfGuid *, const char *, uint32_t, const char *); 126 static int validateModifyDiskProp(uint32_t); 127 static uint8_t iGetPersistMethod(); 128 static int groupListIoctl(stmfGroupList **, int); 129 static int iLoadGroupFromPs(stmfGroupList **, int); 130 static int groupMemberListIoctl(stmfGroupName *, stmfGroupProperties **, int); 131 static int getProviderData(char *, nvlist_t **, int, uint64_t *); 132 static int viewEntryCompare(const void *, const void *); 133 134 static pthread_mutex_t persistenceTypeLock = PTHREAD_MUTEX_INITIALIZER; 135 static int iPersistType = 0; 136 /* when B_TRUE, no need to access SMF anymore. Just use iPersistType */ 137 static boolean_t iLibSetPersist = B_FALSE; 138 139 /* 140 * Open for stmf module 141 * 142 * flag - open flag (OPEN_STMF, OPEN_EXCL_STMF) 143 * fd - pointer to integer. On success, contains the stmf file descriptor 144 */ 145 static int 146 openStmf(int flag, int *fd) 147 { 148 int ret = STMF_STATUS_ERROR; 149 150 if ((*fd = open(STMF_PATH, O_NDELAY | O_RDONLY | flag)) != -1) { 151 ret = STMF_STATUS_SUCCESS; 152 } else { 153 if (errno == EBUSY) { 154 ret = STMF_ERROR_BUSY; 155 } else if (errno == EACCES) { 156 ret = STMF_ERROR_PERM; 157 } else { 158 ret = STMF_STATUS_ERROR; 159 } 160 syslog(LOG_DEBUG, "openStmf:open failure:%s:errno(%d)", 161 STMF_PATH, errno); 162 } 163 164 return (ret); 165 } 166 167 /* 168 * Open for sbd module 169 * 170 * flag - open flag (OPEN_STMF, OPEN_EXCL_STMF) 171 * fd - pointer to integer. On success, contains the stmf file descriptor 172 */ 173 static int 174 openSbd(int flag, int *fd) 175 { 176 int ret = STMF_STATUS_ERROR; 177 178 if ((*fd = open(SBD_PATH, O_NDELAY | O_RDONLY | flag)) != -1) { 179 ret = STMF_STATUS_SUCCESS; 180 } else { 181 if (errno == EBUSY) { 182 ret = STMF_ERROR_BUSY; 183 } else if (errno == EACCES) { 184 ret = STMF_ERROR_PERM; 185 } else { 186 ret = STMF_STATUS_ERROR; 187 } 188 syslog(LOG_DEBUG, "openSbd:open failure:%s:errno(%d)", 189 SBD_PATH, errno); 190 } 191 192 return (ret); 193 } 194 195 /* 196 * initializeConfig 197 * 198 * This routine should be called before any ioctl requiring initialization 199 * which is basically everything except stmfGetState(), setStmfState() and 200 * stmfLoadConfig(). 201 */ 202 static int 203 initializeConfig() 204 { 205 int ret; 206 stmfState state; 207 208 209 ret = stmfGetState(&state); 210 if (ret != STMF_STATUS_SUCCESS) { 211 return (ret); 212 } 213 214 /* if we've already initialized or in the process, return success */ 215 if (state.configState == STMF_CONFIG_STATE_INIT_DONE || 216 state.configState == STMF_CONFIG_STATE_INIT) { 217 return (STMF_STATUS_SUCCESS); 218 } 219 220 ret = stmfLoadConfig(); 221 if (ret != STMF_STATUS_SUCCESS) { 222 syslog(LOG_DEBUG, 223 "initializeConfig:stmfLoadConfig:error(%d)", ret); 224 return (ret); 225 } 226 227 ret = stmfGetState(&state); 228 if (ret != STMF_STATUS_SUCCESS) { 229 syslog(LOG_DEBUG, 230 "initializeConfig:stmfGetState:error(%d)", ret); 231 return (ret); 232 } 233 234 if (state.configState != STMF_CONFIG_STATE_INIT_DONE) { 235 syslog(LOG_DEBUG, "initializeConfig:state.configState(%d)", 236 state.configState); 237 ret = STMF_STATUS_ERROR; 238 } 239 240 return (ret); 241 } 242 243 244 /* 245 * groupIoctl 246 * 247 * Purpose: issue ioctl for create/delete on group 248 * 249 * cmd - valid STMF ioctl group cmd 250 * groupName - groupName to create or delete 251 */ 252 static int 253 groupIoctl(int fd, int cmd, stmfGroupName *groupName) 254 { 255 int ret = STMF_STATUS_SUCCESS; 256 int ioctlRet; 257 stmf_iocdata_t stmfIoctl; 258 stmf_group_name_t iGroupName; 259 260 bzero(&iGroupName, sizeof (iGroupName)); 261 262 bcopy(groupName, &iGroupName.name, strlen((char *)groupName)); 263 264 iGroupName.name_size = strlen((char *)groupName); 265 266 bzero(&stmfIoctl, sizeof (stmfIoctl)); 267 /* 268 * Issue ioctl to create the host group 269 */ 270 stmfIoctl.stmf_version = STMF_VERSION_1; 271 stmfIoctl.stmf_ibuf_size = sizeof (iGroupName); 272 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&iGroupName; 273 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 274 if (ioctlRet != 0) { 275 switch (errno) { 276 case EPERM: 277 case EACCES: 278 ret = STMF_ERROR_PERM; 279 break; 280 default: 281 switch (stmfIoctl.stmf_error) { 282 case STMF_IOCERR_TG_EXISTS: 283 case STMF_IOCERR_HG_EXISTS: 284 ret = STMF_ERROR_EXISTS; 285 break; 286 case STMF_IOCERR_TG_IN_USE: 287 case STMF_IOCERR_HG_IN_USE: 288 ret = STMF_ERROR_GROUP_IN_USE; 289 break; 290 case STMF_IOCERR_INVALID_HG: 291 case STMF_IOCERR_INVALID_TG: 292 ret = STMF_ERROR_NOT_FOUND; 293 break; 294 default: 295 syslog(LOG_DEBUG, 296 "groupIoctl:error(%d)", 297 stmfIoctl.stmf_error); 298 ret = STMF_STATUS_ERROR; 299 break; 300 } 301 break; 302 } 303 } 304 done: 305 return (ret); 306 } 307 308 /* 309 * groupMemberIoctl 310 * 311 * Purpose: issue ioctl for add/remove member on group 312 * 313 * cmd - valid STMF ioctl group member cmd 314 * groupName - groupName to add to or remove from 315 * devid - group member to add or remove 316 */ 317 static int 318 groupMemberIoctl(int fd, int cmd, stmfGroupName *groupName, stmfDevid *devid) 319 { 320 int ret = STMF_STATUS_SUCCESS; 321 int ioctlRet; 322 stmf_iocdata_t stmfIoctl; 323 stmf_group_op_data_t stmfGroupData; 324 325 bzero(&stmfGroupData, sizeof (stmfGroupData)); 326 327 bcopy(groupName, &stmfGroupData.group.name, strlen((char *)groupName)); 328 329 stmfGroupData.group.name_size = strlen((char *)groupName); 330 stmfGroupData.ident[IDENT_LENGTH_BYTE] = devid->identLength; 331 bcopy(&(devid->ident), &stmfGroupData.ident[IDENT_LENGTH_BYTE + 1], 332 devid->identLength); 333 334 bzero(&stmfIoctl, sizeof (stmfIoctl)); 335 /* 336 * Issue ioctl to add to the host group 337 */ 338 stmfIoctl.stmf_version = STMF_VERSION_1; 339 stmfIoctl.stmf_ibuf_size = sizeof (stmfGroupData); 340 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&stmfGroupData; 341 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 342 if (ioctlRet != 0) { 343 switch (errno) { 344 case EBUSY: 345 switch (stmfIoctl.stmf_error) { 346 case STMF_IOCERR_TG_NEED_TG_OFFLINE: 347 ret = STMF_ERROR_TG_ONLINE; 348 break; 349 default: 350 ret = STMF_ERROR_BUSY; 351 break; 352 } 353 break; 354 case EPERM: 355 case EACCES: 356 ret = STMF_ERROR_PERM; 357 break; 358 default: 359 switch (stmfIoctl.stmf_error) { 360 case STMF_IOCERR_TG_ENTRY_EXISTS: 361 case STMF_IOCERR_HG_ENTRY_EXISTS: 362 ret = STMF_ERROR_EXISTS; 363 break; 364 case STMF_IOCERR_INVALID_TG_ENTRY: 365 case STMF_IOCERR_INVALID_HG_ENTRY: 366 ret = 367 STMF_ERROR_MEMBER_NOT_FOUND; 368 break; 369 case STMF_IOCERR_INVALID_TG: 370 case STMF_IOCERR_INVALID_HG: 371 ret = 372 STMF_ERROR_GROUP_NOT_FOUND; 373 break; 374 default: 375 syslog(LOG_DEBUG, 376 "groupMemberIoctl:error" 377 "(%d)", 378 stmfIoctl.stmf_error); 379 ret = STMF_STATUS_ERROR; 380 break; 381 } 382 break; 383 } 384 } 385 done: 386 return (ret); 387 } 388 389 /* 390 * qsort function 391 * sort on veIndex 392 */ 393 static int 394 viewEntryCompare(const void *p1, const void *p2) 395 { 396 397 stmfViewEntry *v1 = (stmfViewEntry *)p1, *v2 = (stmfViewEntry *)p2; 398 if (v1->veIndex > v2->veIndex) 399 return (1); 400 if (v1->veIndex < v2->veIndex) 401 return (-1); 402 return (0); 403 } 404 405 /* 406 * guidCompare 407 * 408 * qsort function 409 * sort on guid 410 */ 411 static int 412 guidCompare(const void *p1, const void *p2) 413 { 414 415 stmfGuid *g1 = (stmfGuid *)p1, *g2 = (stmfGuid *)p2; 416 int i; 417 418 for (i = 0; i < sizeof (stmfGuid); i++) { 419 if (g1->guid[i] > g2->guid[i]) 420 return (1); 421 if (g1->guid[i] < g2->guid[i]) 422 return (-1); 423 } 424 425 return (0); 426 } 427 428 /* 429 * stmfAddToHostGroup 430 * 431 * Purpose: Adds an initiator to an existing host group 432 * 433 * hostGroupName - name of an existing host group 434 * hostName - name of initiator to add 435 */ 436 int 437 stmfAddToHostGroup(stmfGroupName *hostGroupName, stmfDevid *hostName) 438 { 439 int ret; 440 int fd; 441 442 if (hostGroupName == NULL || 443 (strnlen((char *)hostGroupName, sizeof (stmfGroupName)) 444 == sizeof (stmfGroupName)) || hostName == NULL) { 445 return (STMF_ERROR_INVALID_ARG); 446 } 447 448 /* call init */ 449 ret = initializeConfig(); 450 if (ret != STMF_STATUS_SUCCESS) { 451 return (ret); 452 } 453 454 /* 455 * Open control node for stmf 456 */ 457 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 458 return (ret); 459 460 if ((ret = groupMemberIoctl(fd, STMF_IOCTL_ADD_HG_ENTRY, hostGroupName, 461 hostName)) != STMF_STATUS_SUCCESS) { 462 goto done; 463 } 464 465 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 466 goto done; 467 } 468 469 ret = psAddHostGroupMember((char *)hostGroupName, 470 (char *)hostName->ident); 471 switch (ret) { 472 case STMF_PS_SUCCESS: 473 ret = STMF_STATUS_SUCCESS; 474 break; 475 case STMF_PS_ERROR_EXISTS: 476 ret = STMF_ERROR_EXISTS; 477 break; 478 case STMF_PS_ERROR_GROUP_NOT_FOUND: 479 ret = STMF_ERROR_GROUP_NOT_FOUND; 480 break; 481 case STMF_PS_ERROR_BUSY: 482 ret = STMF_ERROR_BUSY; 483 break; 484 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 485 ret = STMF_ERROR_SERVICE_NOT_FOUND; 486 break; 487 case STMF_PS_ERROR_VERSION_MISMATCH: 488 ret = STMF_ERROR_SERVICE_DATA_VERSION; 489 break; 490 default: 491 syslog(LOG_DEBUG, 492 "stmfAddToHostGroup:psAddHostGroupMember:error(%d)", 493 ret); 494 ret = STMF_STATUS_ERROR; 495 break; 496 } 497 498 done: 499 (void) close(fd); 500 return (ret); 501 } 502 503 /* 504 * stmfAddToTargetGroup 505 * 506 * Purpose: Adds a local port to an existing target group 507 * 508 * targetGroupName - name of an existing target group 509 * targetName - name of target to add 510 */ 511 int 512 stmfAddToTargetGroup(stmfGroupName *targetGroupName, stmfDevid *targetName) 513 { 514 int ret; 515 int fd; 516 517 if (targetGroupName == NULL || 518 (strnlen((char *)targetGroupName, sizeof (stmfGroupName)) 519 == sizeof (stmfGroupName)) || targetName == NULL) { 520 return (STMF_ERROR_INVALID_ARG); 521 } 522 523 /* call init */ 524 ret = initializeConfig(); 525 if (ret != STMF_STATUS_SUCCESS) { 526 return (ret); 527 } 528 529 /* 530 * Open control node for stmf 531 */ 532 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 533 return (ret); 534 535 if ((ret = groupMemberIoctl(fd, STMF_IOCTL_ADD_TG_ENTRY, 536 targetGroupName, targetName)) != STMF_STATUS_SUCCESS) { 537 goto done; 538 } 539 540 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 541 goto done; 542 } 543 544 ret = psAddTargetGroupMember((char *)targetGroupName, 545 (char *)targetName->ident); 546 switch (ret) { 547 case STMF_PS_SUCCESS: 548 ret = STMF_STATUS_SUCCESS; 549 break; 550 case STMF_PS_ERROR_EXISTS: 551 ret = STMF_ERROR_EXISTS; 552 break; 553 case STMF_PS_ERROR_GROUP_NOT_FOUND: 554 ret = STMF_ERROR_GROUP_NOT_FOUND; 555 break; 556 case STMF_PS_ERROR_BUSY: 557 ret = STMF_ERROR_BUSY; 558 break; 559 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 560 ret = STMF_ERROR_SERVICE_NOT_FOUND; 561 break; 562 case STMF_PS_ERROR_VERSION_MISMATCH: 563 ret = STMF_ERROR_SERVICE_DATA_VERSION; 564 break; 565 default: 566 syslog(LOG_DEBUG, 567 "stmfAddToTargetGroup:psAddTargetGroupMember:" 568 "error(%d)", ret); 569 ret = STMF_STATUS_ERROR; 570 break; 571 } 572 573 done: 574 (void) close(fd); 575 return (ret); 576 } 577 578 /* 579 * addViewEntryIoctl 580 * 581 * Purpose: Issues ioctl to add a view entry 582 * 583 * lu - Logical Unit identifier to which the view entry is added 584 * viewEntry - view entry to add 585 * init - When set to B_TRUE, we are in the init state, i.e. don't call open 586 */ 587 static int 588 addViewEntryIoctl(int fd, stmfGuid *lu, stmfViewEntry *viewEntry) 589 { 590 int ret = STMF_STATUS_SUCCESS; 591 int ioctlRet; 592 stmf_iocdata_t stmfIoctl; 593 stmf_view_op_entry_t ioctlViewEntry; 594 595 bzero(&ioctlViewEntry, sizeof (ioctlViewEntry)); 596 /* 597 * don't set ve_ndx or ve_ndx_valid as ve_ndx_valid should be 598 * false on input 599 */ 600 ioctlViewEntry.ve_lu_number_valid = viewEntry->luNbrValid; 601 ioctlViewEntry.ve_all_hosts = viewEntry->allHosts; 602 ioctlViewEntry.ve_all_targets = viewEntry->allTargets; 603 604 if (viewEntry->allHosts == B_FALSE) { 605 bcopy(viewEntry->hostGroup, &ioctlViewEntry.ve_host_group.name, 606 sizeof (stmfGroupName)); 607 ioctlViewEntry.ve_host_group.name_size = 608 strlen((char *)viewEntry->hostGroup); 609 } 610 if (viewEntry->allTargets == B_FALSE) { 611 bcopy(viewEntry->targetGroup, 612 &ioctlViewEntry.ve_target_group.name, 613 sizeof (stmfGroupName)); 614 ioctlViewEntry.ve_target_group.name_size = 615 strlen((char *)viewEntry->targetGroup); 616 } 617 if (viewEntry->luNbrValid) { 618 bcopy(viewEntry->luNbr, &ioctlViewEntry.ve_lu_nbr, 619 sizeof (ioctlViewEntry.ve_lu_nbr)); 620 } 621 bcopy(lu, &ioctlViewEntry.ve_guid, sizeof (stmfGuid)); 622 623 bzero(&stmfIoctl, sizeof (stmfIoctl)); 624 /* 625 * Issue ioctl to add to the view entry 626 */ 627 stmfIoctl.stmf_version = STMF_VERSION_1; 628 stmfIoctl.stmf_ibuf_size = sizeof (ioctlViewEntry); 629 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&ioctlViewEntry; 630 stmfIoctl.stmf_obuf_size = sizeof (ioctlViewEntry); 631 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)&ioctlViewEntry; 632 ioctlRet = ioctl(fd, STMF_IOCTL_ADD_VIEW_ENTRY, &stmfIoctl); 633 if (ioctlRet != 0) { 634 switch (errno) { 635 case EBUSY: 636 ret = STMF_ERROR_BUSY; 637 break; 638 case EPERM: 639 ret = STMF_ERROR_PERM; 640 break; 641 case EACCES: 642 switch (stmfIoctl.stmf_error) { 643 case STMF_IOCERR_UPDATE_NEED_CFG_INIT: 644 ret = STMF_ERROR_CONFIG_NONE; 645 break; 646 default: 647 ret = STMF_ERROR_PERM; 648 break; 649 } 650 break; 651 default: 652 switch (stmfIoctl.stmf_error) { 653 case STMF_IOCERR_LU_NUMBER_IN_USE: 654 ret = STMF_ERROR_LUN_IN_USE; 655 break; 656 case STMF_IOCERR_VIEW_ENTRY_CONFLICT: 657 ret = STMF_ERROR_VE_CONFLICT; 658 break; 659 case STMF_IOCERR_UPDATE_NEED_CFG_INIT: 660 ret = STMF_ERROR_CONFIG_NONE; 661 break; 662 case STMF_IOCERR_INVALID_HG: 663 ret = STMF_ERROR_INVALID_HG; 664 break; 665 case STMF_IOCERR_INVALID_TG: 666 ret = STMF_ERROR_INVALID_TG; 667 break; 668 default: 669 syslog(LOG_DEBUG, 670 "addViewEntryIoctl" 671 ":error(%d)", 672 stmfIoctl.stmf_error); 673 ret = STMF_STATUS_ERROR; 674 break; 675 } 676 break; 677 } 678 goto done; 679 } 680 681 /* copy lu nbr back to caller's view entry on success */ 682 viewEntry->veIndex = ioctlViewEntry.ve_ndx; 683 if (ioctlViewEntry.ve_lu_number_valid) { 684 bcopy(&ioctlViewEntry.ve_lu_nbr, viewEntry->luNbr, 685 sizeof (ioctlViewEntry.ve_lu_nbr)); 686 } 687 viewEntry->luNbrValid = B_TRUE; 688 689 done: 690 return (ret); 691 } 692 693 /* 694 * stmfAddViewEntry 695 * 696 * Purpose: Adds a view entry to a logical unit 697 * 698 * lu - guid of the logical unit to which the view entry is added 699 * viewEntry - view entry structure to add 700 */ 701 int 702 stmfAddViewEntry(stmfGuid *lu, stmfViewEntry *viewEntry) 703 { 704 int ret; 705 int fd; 706 stmfViewEntry iViewEntry; 707 708 if (lu == NULL || viewEntry == NULL) { 709 return (STMF_ERROR_INVALID_ARG); 710 } 711 712 /* initialize and set internal view entry */ 713 bzero(&iViewEntry, sizeof (iViewEntry)); 714 715 if (!viewEntry->allHosts) { 716 bcopy(viewEntry->hostGroup, iViewEntry.hostGroup, 717 sizeof (iViewEntry.hostGroup)); 718 } else { 719 iViewEntry.allHosts = B_TRUE; 720 } 721 722 if (!viewEntry->allTargets) { 723 bcopy(viewEntry->targetGroup, iViewEntry.targetGroup, 724 sizeof (iViewEntry.targetGroup)); 725 } else { 726 iViewEntry.allTargets = B_TRUE; 727 } 728 729 if (viewEntry->luNbrValid) { 730 iViewEntry.luNbrValid = B_TRUE; 731 bcopy(viewEntry->luNbr, iViewEntry.luNbr, 732 sizeof (iViewEntry.luNbr)); 733 } 734 735 /* 736 * set users return view entry index valid flag to false 737 * in case of failure 738 */ 739 viewEntry->veIndexValid = B_FALSE; 740 741 /* Check to ensure service exists */ 742 if (psCheckService() != STMF_STATUS_SUCCESS) { 743 return (STMF_ERROR_SERVICE_NOT_FOUND); 744 } 745 746 /* call init */ 747 ret = initializeConfig(); 748 if (ret != STMF_STATUS_SUCCESS) { 749 return (ret); 750 } 751 752 /* 753 * Open control node for stmf 754 */ 755 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 756 return (ret); 757 758 /* 759 * First add the view entry to the driver 760 */ 761 ret = addViewEntryIoctl(fd, lu, &iViewEntry); 762 if (ret != STMF_STATUS_SUCCESS) { 763 goto done; 764 } 765 766 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 767 goto done; 768 } 769 770 /* 771 * If the add to driver was successful, add it to the persistent 772 * store. 773 */ 774 ret = psAddViewEntry(lu, &iViewEntry); 775 switch (ret) { 776 case STMF_PS_SUCCESS: 777 ret = STMF_STATUS_SUCCESS; 778 break; 779 case STMF_PS_ERROR_NOT_FOUND: 780 ret = STMF_ERROR_NOT_FOUND; 781 break; 782 case STMF_PS_ERROR_BUSY: 783 ret = STMF_ERROR_BUSY; 784 break; 785 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 786 ret = STMF_ERROR_SERVICE_NOT_FOUND; 787 break; 788 case STMF_PS_ERROR_VERSION_MISMATCH: 789 ret = STMF_ERROR_SERVICE_DATA_VERSION; 790 break; 791 default: 792 syslog(LOG_DEBUG, 793 "stmfAddViewEntry:psAddViewEntry:error(%d)", ret); 794 ret = STMF_STATUS_ERROR; 795 break; 796 } 797 798 done: 799 (void) close(fd); 800 801 if (ret == STMF_STATUS_SUCCESS) { 802 /* set caller's view entry on success */ 803 viewEntry->veIndexValid = iViewEntry.veIndexValid; 804 viewEntry->veIndex = iViewEntry.veIndex; 805 viewEntry->luNbrValid = B_TRUE; 806 bcopy(iViewEntry.luNbr, viewEntry->luNbr, 807 sizeof (iViewEntry.luNbr)); 808 } 809 return (ret); 810 } 811 812 /* 813 * stmfClearProviderData 814 * 815 * Purpose: delete all provider data for specified provider 816 * 817 * providerName - name of provider for which data should be deleted 818 */ 819 int 820 stmfClearProviderData(char *providerName, int providerType) 821 { 822 int ret; 823 int fd; 824 int ioctlRet; 825 int savedErrno; 826 stmf_iocdata_t stmfIoctl; 827 stmf_ppioctl_data_t ppi; 828 829 /* call init */ 830 ret = initializeConfig(); 831 if (ret != STMF_STATUS_SUCCESS) { 832 return (ret); 833 } 834 835 if (providerName == NULL) { 836 return (STMF_ERROR_INVALID_ARG); 837 } 838 839 if (providerType != STMF_LU_PROVIDER_TYPE && 840 providerType != STMF_PORT_PROVIDER_TYPE) { 841 return (STMF_ERROR_INVALID_ARG); 842 } 843 844 /* 845 * Open control node for stmf 846 */ 847 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 848 return (ret); 849 850 bzero(&ppi, sizeof (ppi)); 851 852 (void) strncpy(ppi.ppi_name, providerName, sizeof (ppi.ppi_name)); 853 854 switch (providerType) { 855 case STMF_LU_PROVIDER_TYPE: 856 ppi.ppi_lu_provider = 1; 857 break; 858 case STMF_PORT_PROVIDER_TYPE: 859 ppi.ppi_port_provider = 1; 860 break; 861 default: 862 ret = STMF_ERROR_INVALID_ARG; 863 goto done; 864 } 865 866 bzero(&stmfIoctl, sizeof (stmfIoctl)); 867 868 stmfIoctl.stmf_version = STMF_VERSION_1; 869 stmfIoctl.stmf_ibuf_size = sizeof (stmf_ppioctl_data_t); 870 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&ppi; 871 872 ioctlRet = ioctl(fd, STMF_IOCTL_CLEAR_PP_DATA, &stmfIoctl); 873 if (ioctlRet != 0) { 874 savedErrno = errno; 875 switch (savedErrno) { 876 case EBUSY: 877 ret = STMF_ERROR_BUSY; 878 break; 879 case EPERM: 880 case EACCES: 881 ret = STMF_ERROR_PERM; 882 break; 883 default: 884 syslog(LOG_DEBUG, 885 "stmfClearProviderData:ioctl error(%d)", 886 ioctlRet); 887 ret = STMF_STATUS_ERROR; 888 break; 889 } 890 if (savedErrno != ENOENT) { 891 goto done; 892 } 893 } 894 895 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 896 goto done; 897 } 898 899 ret = psClearProviderData(providerName, providerType); 900 switch (ret) { 901 case STMF_PS_SUCCESS: 902 ret = STMF_STATUS_SUCCESS; 903 break; 904 case STMF_PS_ERROR_NOT_FOUND: 905 ret = STMF_ERROR_NOT_FOUND; 906 break; 907 case STMF_PS_ERROR_BUSY: 908 ret = STMF_ERROR_BUSY; 909 break; 910 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 911 ret = STMF_ERROR_SERVICE_NOT_FOUND; 912 break; 913 case STMF_PS_ERROR_VERSION_MISMATCH: 914 ret = STMF_ERROR_SERVICE_DATA_VERSION; 915 break; 916 default: 917 syslog(LOG_DEBUG, 918 "stmfClearProviderData:psClearProviderData" 919 ":error(%d)", ret); 920 ret = STMF_STATUS_ERROR; 921 break; 922 } 923 924 done: 925 (void) close(fd); 926 return (ret); 927 } 928 929 /* 930 * stmfCreateHostGroup 931 * 932 * Purpose: Create a new initiator group 933 * 934 * hostGroupName - name of host group to create 935 */ 936 int 937 stmfCreateHostGroup(stmfGroupName *hostGroupName) 938 { 939 int ret; 940 int fd; 941 942 if (hostGroupName == NULL || 943 (strnlen((char *)hostGroupName, sizeof (stmfGroupName)) 944 == sizeof (stmfGroupName))) { 945 return (STMF_ERROR_INVALID_ARG); 946 } 947 948 /* Check to ensure service exists */ 949 if (psCheckService() != STMF_STATUS_SUCCESS) { 950 return (STMF_ERROR_SERVICE_NOT_FOUND); 951 } 952 953 /* call init */ 954 ret = initializeConfig(); 955 if (ret != STMF_STATUS_SUCCESS) { 956 return (ret); 957 } 958 959 /* 960 * Open control node for stmf 961 */ 962 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 963 return (ret); 964 965 if ((ret = groupIoctl(fd, STMF_IOCTL_CREATE_HOST_GROUP, 966 hostGroupName)) != STMF_STATUS_SUCCESS) { 967 goto done; 968 } 969 970 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 971 goto done; 972 } 973 974 ret = psCreateHostGroup((char *)hostGroupName); 975 switch (ret) { 976 case STMF_PS_SUCCESS: 977 ret = STMF_STATUS_SUCCESS; 978 break; 979 case STMF_PS_ERROR_EXISTS: 980 ret = STMF_ERROR_EXISTS; 981 break; 982 case STMF_PS_ERROR_BUSY: 983 ret = STMF_ERROR_BUSY; 984 break; 985 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 986 ret = STMF_ERROR_SERVICE_NOT_FOUND; 987 break; 988 case STMF_PS_ERROR_VERSION_MISMATCH: 989 ret = STMF_ERROR_SERVICE_DATA_VERSION; 990 break; 991 default: 992 syslog(LOG_DEBUG, 993 "stmfCreateHostGroup:psCreateHostGroup:error(%d)", 994 ret); 995 ret = STMF_STATUS_ERROR; 996 break; 997 } 998 999 done: 1000 (void) close(fd); 1001 return (ret); 1002 } 1003 1004 /* 1005 * stmfCreateLu 1006 * 1007 * Purpose: Create a logical unit 1008 * 1009 * hdl - handle to logical unit resource created via stmfCreateLuResource 1010 * 1011 * luGuid - If non-NULL, on success, contains the guid of the created logical 1012 * unit 1013 */ 1014 int 1015 stmfCreateLu(luResource hdl, stmfGuid *luGuid) 1016 { 1017 int ret = STMF_STATUS_SUCCESS; 1018 luResourceImpl *luPropsHdl = hdl; 1019 1020 if (hdl == NULL) { 1021 return (STMF_ERROR_INVALID_ARG); 1022 } 1023 1024 if (luPropsHdl->type == STMF_DISK) { 1025 ret = createDiskLu((diskResource *)luPropsHdl->resource, 1026 luGuid); 1027 } else { 1028 return (STMF_ERROR_INVALID_ARG); 1029 } 1030 1031 return (ret); 1032 } 1033 1034 /* 1035 * stmfCreateLuResource 1036 * 1037 * Purpose: Create resource handle for a logical unit 1038 * 1039 * dType - Type of logical unit resource to create 1040 * Can be: STMF_DISK 1041 * 1042 * hdl - pointer to luResource 1043 */ 1044 int 1045 stmfCreateLuResource(uint16_t dType, luResource *hdl) 1046 { 1047 int ret = STMF_STATUS_SUCCESS; 1048 1049 if (dType != STMF_DISK || hdl == NULL) { 1050 return (STMF_ERROR_INVALID_ARG); 1051 } 1052 1053 *hdl = calloc(1, sizeof (luResourceImpl)); 1054 if (*hdl == NULL) { 1055 return (STMF_ERROR_NOMEM); 1056 } 1057 1058 ret = createDiskResource((luResourceImpl *)*hdl); 1059 if (ret != STMF_STATUS_SUCCESS) { 1060 free(*hdl); 1061 return (ret); 1062 } 1063 1064 return (STMF_STATUS_SUCCESS); 1065 } 1066 1067 /* 1068 * Creates a disk logical unit 1069 * 1070 * disk - pointer to diskResource structure that represents the properties 1071 * for the disk logical unit to be created. 1072 */ 1073 static int 1074 createDiskLu(diskResource *disk, stmfGuid *createdGuid) 1075 { 1076 int ret = STMF_STATUS_SUCCESS; 1077 int dataFileNameLen = 0; 1078 int metaFileNameLen = 0; 1079 int serialNumLen = 0; 1080 int luAliasLen = 0; 1081 int luMgmtUrlLen = 0; 1082 int sluBufSize = 0; 1083 int bufOffset = 0; 1084 int fd = 0; 1085 int ioctlRet; 1086 int savedErrno; 1087 stmfGuid guid; 1088 stmf_iocdata_t sbdIoctl = {0}; 1089 1090 sbd_create_and_reg_lu_t *sbdLu = NULL; 1091 1092 /* 1093 * Open control node for sbd 1094 */ 1095 if ((ret = openSbd(OPEN_SBD, &fd)) != STMF_STATUS_SUCCESS) 1096 return (ret); 1097 1098 /* data file name must be specified */ 1099 if (disk->luDataFileNameValid) { 1100 dataFileNameLen = strlen(disk->luDataFileName); 1101 } else { 1102 (void) close(fd); 1103 return (STMF_ERROR_MISSING_PROP_VAL); 1104 } 1105 1106 sluBufSize += dataFileNameLen + 1; 1107 1108 if (disk->luMetaFileNameValid) { 1109 metaFileNameLen = strlen(disk->luMetaFileName); 1110 sluBufSize += metaFileNameLen + 1; 1111 } 1112 1113 serialNumLen = strlen(disk->serialNum); 1114 sluBufSize += serialNumLen; 1115 1116 if (disk->luAliasValid) { 1117 luAliasLen = strlen(disk->luAlias); 1118 sluBufSize += luAliasLen + 1; 1119 } 1120 1121 if (disk->luMgmtUrlValid) { 1122 luMgmtUrlLen = strlen(disk->luMgmtUrl); 1123 sluBufSize += luMgmtUrlLen + 1; 1124 } 1125 1126 /* 1127 * 8 is the size of the buffer set aside for 1128 * concatenation of variable length fields 1129 */ 1130 sbdLu = (sbd_create_and_reg_lu_t *)calloc(1, 1131 sizeof (sbd_create_and_reg_lu_t) + sluBufSize - 8); 1132 if (sbdLu == NULL) { 1133 return (STMF_ERROR_NOMEM); 1134 } 1135 1136 sbdLu->slu_struct_size = sizeof (sbd_create_and_reg_lu_t) + 1137 sluBufSize - 8; 1138 1139 if (metaFileNameLen) { 1140 sbdLu->slu_meta_fname_valid = 1; 1141 sbdLu->slu_meta_fname_off = bufOffset; 1142 bcopy(disk->luMetaFileName, &(sbdLu->slu_buf[bufOffset]), 1143 metaFileNameLen + 1); 1144 bufOffset += metaFileNameLen + 1; 1145 } 1146 1147 bcopy(disk->luDataFileName, &(sbdLu->slu_buf[bufOffset]), 1148 dataFileNameLen + 1); 1149 sbdLu->slu_data_fname_off = bufOffset; 1150 bufOffset += dataFileNameLen + 1; 1151 1152 /* currently, serial # is not passed null terminated to the driver */ 1153 if (disk->serialNumValid) { 1154 sbdLu->slu_serial_valid = 1; 1155 sbdLu->slu_serial_off = bufOffset; 1156 sbdLu->slu_serial_size = serialNumLen; 1157 bcopy(disk->serialNum, &(sbdLu->slu_buf[bufOffset]), 1158 serialNumLen); 1159 bufOffset += serialNumLen; 1160 } 1161 1162 if (disk->luAliasValid) { 1163 sbdLu->slu_alias_valid = 1; 1164 sbdLu->slu_alias_off = bufOffset; 1165 bcopy(disk->luAlias, &(sbdLu->slu_buf[bufOffset]), 1166 luAliasLen + 1); 1167 bufOffset += luAliasLen + 1; 1168 } 1169 1170 if (disk->luMgmtUrlValid) { 1171 sbdLu->slu_mgmt_url_valid = 1; 1172 sbdLu->slu_mgmt_url_off = bufOffset; 1173 bcopy(disk->luMgmtUrl, &(sbdLu->slu_buf[bufOffset]), 1174 luMgmtUrlLen + 1); 1175 bufOffset += luMgmtUrlLen + 1; 1176 } 1177 1178 if (disk->luSizeValid) { 1179 sbdLu->slu_lu_size_valid = 1; 1180 sbdLu->slu_lu_size = disk->luSize; 1181 } 1182 1183 if (disk->luGuidValid) { 1184 sbdLu->slu_guid_valid = 1; 1185 bcopy(disk->luGuid, sbdLu->slu_guid, sizeof (disk->luGuid)); 1186 } 1187 1188 if (disk->vidValid) { 1189 sbdLu->slu_vid_valid = 1; 1190 bcopy(disk->vid, sbdLu->slu_vid, sizeof (disk->vid)); 1191 } 1192 1193 if (disk->pidValid) { 1194 sbdLu->slu_pid_valid = 1; 1195 bcopy(disk->pid, sbdLu->slu_pid, sizeof (disk->pid)); 1196 } 1197 1198 if (disk->revValid) { 1199 sbdLu->slu_rev_valid = 1; 1200 bcopy(disk->rev, sbdLu->slu_rev, sizeof (disk->rev)); 1201 } 1202 1203 if (disk->companyIdValid) { 1204 sbdLu->slu_company_id_valid = 1; 1205 sbdLu->slu_company_id = disk->companyId; 1206 } 1207 1208 if (disk->blkSizeValid) { 1209 sbdLu->slu_blksize_valid = 1; 1210 sbdLu->slu_blksize = disk->blkSize; 1211 } 1212 1213 if (disk->writeProtectEnableValid) { 1214 if (disk->writeProtectEnable) { 1215 sbdLu->slu_write_protected = 1; 1216 } 1217 } 1218 1219 if (disk->writebackCacheDisableValid) { 1220 sbdLu->slu_writeback_cache_disable_valid = 1; 1221 if (disk->writebackCacheDisable) { 1222 sbdLu->slu_writeback_cache_disable = 1; 1223 } 1224 } 1225 1226 sbdIoctl.stmf_version = STMF_VERSION_1; 1227 sbdIoctl.stmf_ibuf_size = sbdLu->slu_struct_size; 1228 sbdIoctl.stmf_ibuf = (uint64_t)(unsigned long)sbdLu; 1229 sbdIoctl.stmf_obuf_size = sbdLu->slu_struct_size; 1230 sbdIoctl.stmf_obuf = (uint64_t)(unsigned long)sbdLu; 1231 1232 ioctlRet = ioctl(fd, SBD_IOCTL_CREATE_AND_REGISTER_LU, &sbdIoctl); 1233 if (ioctlRet != 0) { 1234 savedErrno = errno; 1235 switch (savedErrno) { 1236 case EBUSY: 1237 ret = STMF_ERROR_BUSY; 1238 break; 1239 case EPERM: 1240 case EACCES: 1241 ret = STMF_ERROR_PERM; 1242 break; 1243 default: 1244 diskError(sbdIoctl.stmf_error, &ret); 1245 if (ret == STMF_STATUS_ERROR) { 1246 syslog(LOG_DEBUG, 1247 "createDiskLu:ioctl " 1248 "error(%d) (%d) (%d)", ioctlRet, 1249 sbdIoctl.stmf_error, savedErrno); 1250 } 1251 break; 1252 } 1253 } 1254 1255 if (ret != STMF_STATUS_SUCCESS) { 1256 goto done; 1257 } 1258 1259 /* 1260 * on success, copy the resulting guid into the caller's guid if not 1261 * NULL 1262 */ 1263 if (createdGuid) { 1264 bcopy(sbdLu->slu_guid, createdGuid->guid, 1265 sizeof (sbdLu->slu_guid)); 1266 } 1267 1268 bcopy(sbdLu->slu_guid, guid.guid, sizeof (sbdLu->slu_guid)); 1269 if (disk->luMetaFileNameValid) { 1270 ret = addGuidToDiskStore(&guid, disk->luMetaFileName); 1271 } else { 1272 ret = addGuidToDiskStore(&guid, disk->luDataFileName); 1273 } 1274 done: 1275 free(sbdLu); 1276 (void) close(fd); 1277 return (ret); 1278 } 1279 1280 1281 /* 1282 * stmfImportLu 1283 * 1284 * Purpose: Import a previously created logical unit 1285 * 1286 * dType - Type of logical unit 1287 * Can be: STMF_DISK 1288 * 1289 * luGuid - If non-NULL, on success, contains the guid of the imported logical 1290 * unit 1291 * 1292 * fname - A file name where the metadata resides 1293 * 1294 */ 1295 int 1296 stmfImportLu(uint16_t dType, char *fname, stmfGuid *luGuid) 1297 { 1298 int ret = STMF_STATUS_SUCCESS; 1299 1300 if (dType == STMF_DISK) { 1301 ret = importDiskLu(fname, luGuid); 1302 } else { 1303 return (STMF_ERROR_INVALID_ARG); 1304 } 1305 1306 return (ret); 1307 } 1308 1309 /* 1310 * importDiskLu 1311 * 1312 * filename - filename to import 1313 * createdGuid - if not NULL, on success contains the imported guid 1314 * 1315 */ 1316 static int 1317 importDiskLu(char *fname, stmfGuid *createdGuid) 1318 { 1319 int ret = STMF_STATUS_SUCCESS; 1320 int fd = 0; 1321 int ioctlRet; 1322 int savedErrno; 1323 int metaFileNameLen; 1324 stmfGuid iGuid; 1325 int iluBufSize = 0; 1326 sbd_import_lu_t *sbdLu = NULL; 1327 stmf_iocdata_t sbdIoctl = {0}; 1328 1329 if (fname == NULL) { 1330 return (STMF_ERROR_INVALID_ARG); 1331 } 1332 1333 /* 1334 * Open control node for sbd 1335 */ 1336 if ((ret = openSbd(OPEN_SBD, &fd)) != STMF_STATUS_SUCCESS) 1337 return (ret); 1338 1339 metaFileNameLen = strlen(fname); 1340 iluBufSize += metaFileNameLen + 1; 1341 1342 /* 1343 * 8 is the size of the buffer set aside for 1344 * concatenation of variable length fields 1345 */ 1346 sbdLu = (sbd_import_lu_t *)calloc(1, 1347 sizeof (sbd_import_lu_t) + iluBufSize - 8); 1348 if (sbdLu == NULL) { 1349 (void) close(fd); 1350 return (STMF_ERROR_NOMEM); 1351 } 1352 1353 /* 1354 * Accept either a data file or meta data file. 1355 * sbd will do the right thing here either way. 1356 * i.e. if it's a data file, it assumes that the 1357 * meta data is shared with the data. 1358 */ 1359 (void) strncpy(sbdLu->ilu_meta_fname, fname, metaFileNameLen); 1360 1361 sbdLu->ilu_struct_size = sizeof (sbd_import_lu_t) + iluBufSize - 8; 1362 1363 sbdIoctl.stmf_version = STMF_VERSION_1; 1364 sbdIoctl.stmf_ibuf_size = sbdLu->ilu_struct_size; 1365 sbdIoctl.stmf_ibuf = (uint64_t)(unsigned long)sbdLu; 1366 sbdIoctl.stmf_obuf_size = sbdLu->ilu_struct_size; 1367 sbdIoctl.stmf_obuf = (uint64_t)(unsigned long)sbdLu; 1368 1369 ioctlRet = ioctl(fd, SBD_IOCTL_IMPORT_LU, &sbdIoctl); 1370 if (ioctlRet != 0) { 1371 savedErrno = errno; 1372 switch (savedErrno) { 1373 case EBUSY: 1374 ret = STMF_ERROR_BUSY; 1375 break; 1376 case EPERM: 1377 case EACCES: 1378 ret = STMF_ERROR_PERM; 1379 break; 1380 default: 1381 diskError(sbdIoctl.stmf_error, &ret); 1382 if (ret == STMF_STATUS_ERROR) { 1383 syslog(LOG_DEBUG, 1384 "importDiskLu:ioctl " 1385 "error(%d) (%d) (%d)", ioctlRet, 1386 sbdIoctl.stmf_error, savedErrno); 1387 } 1388 break; 1389 } 1390 } 1391 1392 if (ret != STMF_STATUS_SUCCESS) { 1393 goto done; 1394 } 1395 1396 /* 1397 * on success, copy the resulting guid into the caller's guid if not 1398 * NULL and add it to the persistent store for sbd 1399 */ 1400 if (createdGuid) { 1401 bcopy(sbdLu->ilu_ret_guid, createdGuid->guid, 1402 sizeof (sbdLu->ilu_ret_guid)); 1403 ret = addGuidToDiskStore(createdGuid, fname); 1404 } else { 1405 bcopy(sbdLu->ilu_ret_guid, iGuid.guid, 1406 sizeof (sbdLu->ilu_ret_guid)); 1407 ret = addGuidToDiskStore(&iGuid, fname); 1408 } 1409 done: 1410 free(sbdLu); 1411 (void) close(fd); 1412 return (ret); 1413 } 1414 1415 /* 1416 * diskError 1417 * 1418 * Purpose: Translate sbd driver error 1419 */ 1420 static void 1421 diskError(uint32_t stmfError, int *ret) 1422 { 1423 switch (stmfError) { 1424 case SBD_RET_META_CREATION_FAILED: 1425 case SBD_RET_ZFS_META_CREATE_FAILED: 1426 *ret = STMF_ERROR_META_CREATION; 1427 break; 1428 case SBD_RET_INVALID_BLKSIZE: 1429 *ret = STMF_ERROR_INVALID_BLKSIZE; 1430 break; 1431 case SBD_RET_FILE_ALREADY_REGISTERED: 1432 *ret = STMF_ERROR_FILE_IN_USE; 1433 break; 1434 case SBD_RET_GUID_ALREADY_REGISTERED: 1435 *ret = STMF_ERROR_GUID_IN_USE; 1436 break; 1437 case SBD_RET_META_PATH_NOT_ABSOLUTE: 1438 case SBD_RET_META_FILE_LOOKUP_FAILED: 1439 case SBD_RET_META_FILE_OPEN_FAILED: 1440 case SBD_RET_META_FILE_GETATTR_FAILED: 1441 case SBD_RET_NO_META: 1442 *ret = STMF_ERROR_META_FILE_NAME; 1443 break; 1444 case SBD_RET_DATA_PATH_NOT_ABSOLUTE: 1445 case SBD_RET_DATA_FILE_LOOKUP_FAILED: 1446 case SBD_RET_DATA_FILE_OPEN_FAILED: 1447 case SBD_RET_DATA_FILE_GETATTR_FAILED: 1448 *ret = STMF_ERROR_DATA_FILE_NAME; 1449 break; 1450 case SBD_RET_FILE_SIZE_ERROR: 1451 *ret = STMF_ERROR_FILE_SIZE_INVALID; 1452 break; 1453 case SBD_RET_SIZE_OUT_OF_RANGE: 1454 *ret = STMF_ERROR_SIZE_OUT_OF_RANGE; 1455 break; 1456 case SBD_RET_LU_BUSY: 1457 *ret = STMF_ERROR_LU_BUSY; 1458 break; 1459 case SBD_RET_WRITE_CACHE_SET_FAILED: 1460 *ret = STMF_ERROR_WRITE_CACHE_SET; 1461 break; 1462 default: 1463 *ret = STMF_STATUS_ERROR; 1464 break; 1465 } 1466 } 1467 1468 /* 1469 * Creates a logical unit resource of type STMF_DISK. 1470 * 1471 * No defaults should be set here as all defaults are derived from the 1472 * driver's default settings. 1473 */ 1474 static int 1475 createDiskResource(luResourceImpl *hdl) 1476 { 1477 hdl->type = STMF_DISK; 1478 1479 hdl->resource = calloc(1, sizeof (diskResource)); 1480 if (hdl->resource == NULL) { 1481 return (STMF_ERROR_NOMEM); 1482 } 1483 1484 return (STMF_STATUS_SUCCESS); 1485 } 1486 1487 /* 1488 * stmfDeleteLu 1489 * 1490 * Purpose: Delete a logical unit 1491 * 1492 * hdl - handle to logical unit resource created via stmfCreateLuResource 1493 * 1494 * luGuid - If non-NULL, on success, contains the guid of the created logical 1495 * unit 1496 */ 1497 int 1498 stmfDeleteLu(stmfGuid *luGuid) 1499 { 1500 int ret = STMF_STATUS_SUCCESS; 1501 stmfLogicalUnitProperties luProps; 1502 1503 if (luGuid == NULL) { 1504 return (STMF_ERROR_INVALID_ARG); 1505 } 1506 1507 /* Check logical unit provider name to call correct dtype function */ 1508 if ((ret = stmfGetLogicalUnitProperties(luGuid, &luProps)) 1509 != STMF_STATUS_SUCCESS) { 1510 return (ret); 1511 } else { 1512 if (strcmp(luProps.providerName, "sbd") == 0) { 1513 ret = deleteDiskLu(luGuid); 1514 } else if (luProps.status == STMF_LOGICAL_UNIT_UNREGISTERED) { 1515 return (STMF_ERROR_NOT_FOUND); 1516 } else { 1517 return (STMF_ERROR_INVALID_ARG); 1518 } 1519 } 1520 1521 return (ret); 1522 } 1523 1524 static int 1525 deleteDiskLu(stmfGuid *luGuid) 1526 { 1527 int ret = STMF_STATUS_SUCCESS; 1528 int fd; 1529 int savedErrno; 1530 int ioctlRet; 1531 sbd_delete_lu_t deleteLu = {0}; 1532 1533 stmf_iocdata_t sbdIoctl = {0}; 1534 1535 /* 1536 * Open control node for sbd 1537 */ 1538 if ((ret = openSbd(OPEN_SBD, &fd)) != STMF_STATUS_SUCCESS) 1539 return (ret); 1540 1541 ret = removeGuidFromDiskStore(luGuid); 1542 if (ret != STMF_STATUS_SUCCESS) { 1543 goto done; 1544 } 1545 1546 bcopy(luGuid, deleteLu.dlu_guid, sizeof (deleteLu.dlu_guid)); 1547 deleteLu.dlu_by_guid = 1; 1548 1549 sbdIoctl.stmf_version = STMF_VERSION_1; 1550 sbdIoctl.stmf_ibuf_size = sizeof (deleteLu); 1551 sbdIoctl.stmf_ibuf = (uint64_t)(unsigned long)&deleteLu; 1552 ioctlRet = ioctl(fd, SBD_IOCTL_DELETE_LU, &sbdIoctl); 1553 if (ioctlRet != 0) { 1554 savedErrno = errno; 1555 switch (savedErrno) { 1556 case EBUSY: 1557 ret = STMF_ERROR_BUSY; 1558 break; 1559 case EPERM: 1560 case EACCES: 1561 ret = STMF_ERROR_PERM; 1562 break; 1563 case ENOENT: 1564 ret = STMF_ERROR_NOT_FOUND; 1565 break; 1566 default: 1567 syslog(LOG_DEBUG, 1568 "deleteDiskLu:ioctl error(%d) (%d) (%d)", 1569 ioctlRet, sbdIoctl.stmf_error, savedErrno); 1570 ret = STMF_STATUS_ERROR; 1571 break; 1572 } 1573 } 1574 1575 done: 1576 (void) close(fd); 1577 return (ret); 1578 } 1579 1580 /* 1581 * stmfModifyLu 1582 * 1583 * Purpose: Modify properties of a logical unit 1584 * 1585 * luGuid - guid of registered logical unit 1586 * prop - property to modify 1587 * propVal - property value to set 1588 * 1589 */ 1590 int 1591 stmfModifyLu(stmfGuid *luGuid, uint32_t prop, const char *propVal) 1592 { 1593 int ret = STMF_STATUS_SUCCESS; 1594 stmfLogicalUnitProperties luProps; 1595 1596 if (luGuid == NULL) { 1597 return (STMF_ERROR_INVALID_ARG); 1598 } 1599 1600 /* Check logical unit provider name to call correct dtype function */ 1601 if ((ret = stmfGetLogicalUnitProperties(luGuid, &luProps)) 1602 != STMF_STATUS_SUCCESS) { 1603 return (ret); 1604 } else { 1605 if (strcmp(luProps.providerName, "sbd") == 0) { 1606 ret = modifyDiskLuProp(luGuid, NULL, prop, propVal); 1607 } else if (luProps.status == STMF_LOGICAL_UNIT_UNREGISTERED) { 1608 return (STMF_ERROR_NOT_FOUND); 1609 } else { 1610 return (STMF_ERROR_INVALID_ARG); 1611 } 1612 } 1613 1614 return (ret); 1615 } 1616 1617 /* 1618 * stmfModifyLuByFname 1619 * 1620 * Purpose: Modify a device by filename. Device does not need to be registered. 1621 * 1622 * dType - type of device to modify 1623 * STMF_DISK 1624 * 1625 * fname - filename or meta filename 1626 * prop - valid property identifier 1627 * propVal - property value 1628 * 1629 */ 1630 int 1631 stmfModifyLuByFname(uint16_t dType, const char *fname, uint32_t prop, 1632 const char *propVal) 1633 { 1634 int ret = STMF_STATUS_SUCCESS; 1635 if (fname == NULL) { 1636 return (STMF_ERROR_INVALID_ARG); 1637 } 1638 1639 if (dType == STMF_DISK) { 1640 ret = modifyDiskLuProp(NULL, fname, prop, propVal); 1641 } else { 1642 return (STMF_ERROR_INVALID_ARG); 1643 } 1644 1645 return (ret); 1646 } 1647 1648 static int 1649 modifyDiskLuProp(stmfGuid *luGuid, const char *fname, uint32_t prop, 1650 const char *propVal) 1651 { 1652 int ret = STMF_STATUS_SUCCESS; 1653 luResource hdl = NULL; 1654 luResourceImpl *luPropsHdl; 1655 1656 ret = stmfCreateLuResource(STMF_DISK, &hdl); 1657 if (ret != STMF_STATUS_SUCCESS) { 1658 return (ret); 1659 } 1660 ret = validateModifyDiskProp(prop); 1661 if (ret != STMF_STATUS_SUCCESS) { 1662 (void) stmfFreeLuResource(hdl); 1663 return (STMF_ERROR_INVALID_PROP); 1664 } 1665 ret = stmfSetLuProp(hdl, prop, propVal); 1666 if (ret != STMF_STATUS_SUCCESS) { 1667 (void) stmfFreeLuResource(hdl); 1668 return (ret); 1669 } 1670 luPropsHdl = hdl; 1671 ret = modifyDiskLu((diskResource *)luPropsHdl->resource, luGuid, fname); 1672 (void) stmfFreeLuResource(hdl); 1673 return (ret); 1674 } 1675 1676 static int 1677 validateModifyDiskProp(uint32_t prop) 1678 { 1679 switch (prop) { 1680 case STMF_LU_PROP_ALIAS: 1681 case STMF_LU_PROP_SIZE: 1682 case STMF_LU_PROP_MGMT_URL: 1683 case STMF_LU_PROP_WRITE_PROTECT: 1684 case STMF_LU_PROP_WRITE_CACHE_DISABLE: 1685 return (STMF_STATUS_SUCCESS); 1686 break; 1687 default: 1688 return (STMF_STATUS_ERROR); 1689 break; 1690 } 1691 } 1692 1693 static int 1694 modifyDiskLu(diskResource *disk, stmfGuid *luGuid, const char *fname) 1695 { 1696 int ret = STMF_STATUS_SUCCESS; 1697 int luAliasLen = 0; 1698 int luMgmtUrlLen = 0; 1699 int mluBufSize = 0; 1700 int bufOffset = 0; 1701 int fd = 0; 1702 int ioctlRet; 1703 int savedErrno; 1704 int fnameSize = 0; 1705 stmf_iocdata_t sbdIoctl = {0}; 1706 1707 sbd_modify_lu_t *sbdLu = NULL; 1708 1709 if (luGuid == NULL && fname == NULL) { 1710 return (STMF_ERROR_INVALID_ARG); 1711 } 1712 1713 if (fname) { 1714 fnameSize = strlen(fname) + 1; 1715 mluBufSize += fnameSize; 1716 } 1717 1718 /* 1719 * Open control node for sbd 1720 */ 1721 if ((ret = openSbd(OPEN_SBD, &fd)) != STMF_STATUS_SUCCESS) 1722 return (ret); 1723 1724 if (disk->luAliasValid) { 1725 luAliasLen = strlen(disk->luAlias); 1726 mluBufSize += luAliasLen + 1; 1727 } 1728 1729 if (disk->luMgmtUrlValid) { 1730 luMgmtUrlLen = strlen(disk->luMgmtUrl); 1731 mluBufSize += luMgmtUrlLen + 1; 1732 } 1733 1734 /* 1735 * 8 is the size of the buffer set aside for 1736 * concatenation of variable length fields 1737 */ 1738 sbdLu = (sbd_modify_lu_t *)calloc(1, 1739 sizeof (sbd_modify_lu_t) + mluBufSize - 8 + fnameSize); 1740 if (sbdLu == NULL) { 1741 (void) close(fd); 1742 return (STMF_ERROR_NOMEM); 1743 } 1744 1745 sbdLu->mlu_struct_size = sizeof (sbd_modify_lu_t) + 1746 mluBufSize - 8 + fnameSize; 1747 1748 if (disk->luAliasValid) { 1749 sbdLu->mlu_alias_valid = 1; 1750 sbdLu->mlu_alias_off = bufOffset; 1751 bcopy(disk->luAlias, &(sbdLu->mlu_buf[bufOffset]), 1752 luAliasLen + 1); 1753 bufOffset += luAliasLen + 1; 1754 } 1755 1756 if (disk->luMgmtUrlValid) { 1757 sbdLu->mlu_mgmt_url_valid = 1; 1758 sbdLu->mlu_mgmt_url_off = bufOffset; 1759 bcopy(disk->luMgmtUrl, &(sbdLu->mlu_buf[bufOffset]), 1760 luMgmtUrlLen + 1); 1761 bufOffset += luMgmtUrlLen + 1; 1762 } 1763 1764 if (disk->luSizeValid) { 1765 sbdLu->mlu_lu_size_valid = 1; 1766 sbdLu->mlu_lu_size = disk->luSize; 1767 } 1768 1769 if (disk->writeProtectEnableValid) { 1770 sbdLu->mlu_write_protected_valid = 1; 1771 if (disk->writeProtectEnable) { 1772 sbdLu->mlu_write_protected = 1; 1773 } 1774 } 1775 1776 if (disk->writebackCacheDisableValid) { 1777 sbdLu->mlu_writeback_cache_disable_valid = 1; 1778 if (disk->writebackCacheDisable) { 1779 sbdLu->mlu_writeback_cache_disable = 1; 1780 } 1781 } 1782 1783 if (luGuid) { 1784 bcopy(luGuid, sbdLu->mlu_input_guid, sizeof (stmfGuid)); 1785 sbdLu->mlu_by_guid = 1; 1786 } else { 1787 sbdLu->mlu_fname_off = bufOffset; 1788 bcopy(fname, &(sbdLu->mlu_buf[bufOffset]), fnameSize + 1); 1789 sbdLu->mlu_by_fname = 1; 1790 } 1791 1792 sbdIoctl.stmf_version = STMF_VERSION_1; 1793 sbdIoctl.stmf_ibuf_size = sbdLu->mlu_struct_size; 1794 sbdIoctl.stmf_ibuf = (uint64_t)(unsigned long)sbdLu; 1795 1796 ioctlRet = ioctl(fd, SBD_IOCTL_MODIFY_LU, &sbdIoctl); 1797 if (ioctlRet != 0) { 1798 savedErrno = errno; 1799 switch (savedErrno) { 1800 case EBUSY: 1801 ret = STMF_ERROR_BUSY; 1802 break; 1803 case EPERM: 1804 case EACCES: 1805 ret = STMF_ERROR_PERM; 1806 break; 1807 default: 1808 diskError(sbdIoctl.stmf_error, &ret); 1809 if (ret == STMF_STATUS_ERROR) { 1810 syslog(LOG_DEBUG, 1811 "modifyDiskLu:ioctl " 1812 "error(%d) (%d) (%d)", ioctlRet, 1813 sbdIoctl.stmf_error, savedErrno); 1814 } 1815 break; 1816 } 1817 } 1818 1819 if (ret != STMF_STATUS_SUCCESS) { 1820 goto done; 1821 } 1822 1823 done: 1824 free(sbdLu); 1825 (void) close(fd); 1826 return (ret); 1827 } 1828 1829 /* 1830 * removeGuidFromDiskStore 1831 * 1832 * Purpose: delete a logical unit from the sbd provider data 1833 */ 1834 static int 1835 removeGuidFromDiskStore(stmfGuid *guid) 1836 { 1837 return (persistDiskGuid(guid, NULL, B_FALSE)); 1838 } 1839 1840 1841 /* 1842 * addGuidToDiskStore 1843 * 1844 * Purpose: add a logical unit to the sbd provider data 1845 */ 1846 static int 1847 addGuidToDiskStore(stmfGuid *guid, char *filename) 1848 { 1849 return (persistDiskGuid(guid, filename, B_TRUE)); 1850 } 1851 1852 1853 /* 1854 * persistDiskGuid 1855 * 1856 * Purpose: Persist or unpersist a guid for the sbd provider data 1857 * 1858 */ 1859 static int 1860 persistDiskGuid(stmfGuid *guid, char *filename, boolean_t persist) 1861 { 1862 char guidAsciiBuf[LU_ASCII_GUID_SIZE + 1] = {0}; 1863 nvlist_t *nvl = NULL; 1864 1865 uint64_t setToken; 1866 boolean_t retryGetProviderData = B_FALSE; 1867 boolean_t newData = B_FALSE; 1868 int ret = STMF_STATUS_SUCCESS; 1869 int retryCnt = 0; 1870 int stmfRet; 1871 1872 /* if we're persisting a guid, there must be a filename */ 1873 if (persist && !filename) { 1874 return (1); 1875 } 1876 1877 /* guid is stored in lowercase ascii hex */ 1878 (void) snprintf(guidAsciiBuf, sizeof (guidAsciiBuf), 1879 "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x" 1880 "%02x%02x%02x%02x%02x%02x", 1881 guid->guid[0], guid->guid[1], guid->guid[2], guid->guid[3], 1882 guid->guid[4], guid->guid[5], guid->guid[6], guid->guid[7], 1883 guid->guid[8], guid->guid[9], guid->guid[10], guid->guid[11], 1884 guid->guid[12], guid->guid[13], guid->guid[14], guid->guid[15]); 1885 1886 1887 do { 1888 retryGetProviderData = B_FALSE; 1889 stmfRet = stmfGetProviderDataProt("sbd", &nvl, 1890 STMF_LU_PROVIDER_TYPE, &setToken); 1891 if (stmfRet != STMF_STATUS_SUCCESS) { 1892 if (persist && stmfRet == STMF_ERROR_NOT_FOUND) { 1893 ret = nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0); 1894 if (ret != 0) { 1895 syslog(LOG_DEBUG, 1896 "unpersistGuid:nvlist_alloc(%d)", 1897 ret); 1898 ret = STMF_STATUS_ERROR; 1899 goto done; 1900 } 1901 newData = B_TRUE; 1902 } else { 1903 ret = stmfRet; 1904 goto done; 1905 } 1906 } 1907 if (persist) { 1908 ret = nvlist_add_string(nvl, guidAsciiBuf, filename); 1909 } else { 1910 ret = nvlist_remove(nvl, guidAsciiBuf, 1911 DATA_TYPE_STRING); 1912 if (ret == ENOENT) { 1913 ret = 0; 1914 } 1915 } 1916 if (ret == 0) { 1917 if (newData) { 1918 stmfRet = stmfSetProviderDataProt("sbd", nvl, 1919 STMF_LU_PROVIDER_TYPE, NULL); 1920 } else { 1921 stmfRet = stmfSetProviderDataProt("sbd", nvl, 1922 STMF_LU_PROVIDER_TYPE, &setToken); 1923 } 1924 if (stmfRet != STMF_STATUS_SUCCESS) { 1925 if (stmfRet == STMF_ERROR_BUSY) { 1926 /* get/set failed, try again */ 1927 retryGetProviderData = B_TRUE; 1928 if (retryCnt++ > MAX_PROVIDER_RETRY) { 1929 ret = stmfRet; 1930 break; 1931 } 1932 continue; 1933 } else if (stmfRet == 1934 STMF_ERROR_PROV_DATA_STALE) { 1935 /* update failed, try again */ 1936 nvlist_free(nvl); 1937 nvl = NULL; 1938 retryGetProviderData = B_TRUE; 1939 if (retryCnt++ > MAX_PROVIDER_RETRY) { 1940 ret = stmfRet; 1941 break; 1942 } 1943 continue; 1944 } else { 1945 syslog(LOG_DEBUG, 1946 "unpersistGuid:error(%x)", stmfRet); 1947 ret = stmfRet; 1948 } 1949 break; 1950 } 1951 } else { 1952 syslog(LOG_DEBUG, 1953 "unpersistGuid:error nvlist_add/remove(%d)", 1954 ret); 1955 ret = STMF_STATUS_ERROR; 1956 } 1957 } while (retryGetProviderData); 1958 1959 done: 1960 nvlist_free(nvl); 1961 return (ret); 1962 } 1963 1964 1965 /* 1966 * stmfGetLuProp 1967 * 1968 * Purpose: Get current value for a resource property 1969 * 1970 * hdl - luResource from a previous call to stmfCreateLuResource 1971 * 1972 * resourceProp - a valid resource property type 1973 * 1974 * propVal - void pointer to a pointer of the value to be retrieved 1975 */ 1976 int 1977 stmfGetLuProp(luResource hdl, uint32_t prop, char *propVal, size_t *propLen) 1978 { 1979 int ret = STMF_STATUS_SUCCESS; 1980 luResourceImpl *luPropsHdl = hdl; 1981 if (hdl == NULL || propLen == NULL || propVal == NULL) { 1982 return (STMF_ERROR_INVALID_ARG); 1983 } 1984 1985 if (luPropsHdl->type == STMF_DISK) { 1986 ret = getDiskProp(luPropsHdl, prop, propVal, propLen); 1987 } else { 1988 return (STMF_ERROR_INVALID_ARG); 1989 } 1990 1991 return (ret); 1992 } 1993 1994 /* 1995 * stmfGetLuResource 1996 * 1997 * Purpose: Get a logical unit resource handle for a given logical unit. 1998 * 1999 * hdl - pointer to luResource 2000 */ 2001 int 2002 stmfGetLuResource(stmfGuid *luGuid, luResource *hdl) 2003 { 2004 int ret = STMF_STATUS_SUCCESS; 2005 stmfLogicalUnitProperties luProps; 2006 2007 2008 /* Check logical unit provider name to call correct dtype function */ 2009 if ((ret = stmfGetLogicalUnitProperties(luGuid, &luProps)) 2010 != STMF_STATUS_SUCCESS) { 2011 return (ret); 2012 } else { 2013 if (strcmp(luProps.providerName, "sbd") == 0) { 2014 ret = getDiskAllProps(luGuid, hdl); 2015 } else if (luProps.status == STMF_LOGICAL_UNIT_UNREGISTERED) { 2016 return (STMF_ERROR_NOT_FOUND); 2017 } else { 2018 return (STMF_ERROR_INVALID_ARG); 2019 } 2020 } 2021 2022 return (ret); 2023 } 2024 2025 /* 2026 * getDiskAllProps 2027 * 2028 * Purpose: load all disk properties from sbd driver 2029 * 2030 * luGuid - guid of disk device for which properties are to be retrieved 2031 * hdl - allocated luResource into which properties are to be copied 2032 * 2033 */ 2034 static int 2035 getDiskAllProps(stmfGuid *luGuid, luResource *hdl) 2036 { 2037 int ret = STMF_STATUS_SUCCESS; 2038 int fd; 2039 sbd_lu_props_t *sbdProps; 2040 int ioctlRet; 2041 int savedErrno; 2042 int sbdPropsSize = sizeof (*sbdProps) + MAX_SBD_PROPS; 2043 stmf_iocdata_t sbdIoctl = {0}; 2044 2045 /* 2046 * Open control node for sbd 2047 */ 2048 if ((ret = openSbd(OPEN_SBD, &fd)) != STMF_STATUS_SUCCESS) 2049 return (ret); 2050 2051 2052 *hdl = calloc(1, sizeof (luResourceImpl)); 2053 if (*hdl == NULL) { 2054 (void) close(fd); 2055 return (STMF_ERROR_NOMEM); 2056 } 2057 2058 sbdProps = calloc(1, sbdPropsSize); 2059 if (sbdProps == NULL) { 2060 free(*hdl); 2061 (void) close(fd); 2062 return (STMF_ERROR_NOMEM); 2063 } 2064 2065 ret = createDiskResource((luResourceImpl *)*hdl); 2066 if (ret != STMF_STATUS_SUCCESS) { 2067 free(*hdl); 2068 (void) close(fd); 2069 return (ret); 2070 } 2071 2072 sbdProps->slp_input_guid = 1; 2073 bcopy(luGuid, sbdProps->slp_guid, sizeof (sbdProps->slp_guid)); 2074 2075 sbdIoctl.stmf_version = STMF_VERSION_1; 2076 sbdIoctl.stmf_ibuf_size = sbdPropsSize; 2077 sbdIoctl.stmf_ibuf = (uint64_t)(unsigned long)sbdProps; 2078 sbdIoctl.stmf_obuf_size = sbdPropsSize; 2079 sbdIoctl.stmf_obuf = (uint64_t)(unsigned long)sbdProps; 2080 ioctlRet = ioctl(fd, SBD_IOCTL_GET_LU_PROPS, &sbdIoctl); 2081 if (ioctlRet != 0) { 2082 savedErrno = errno; 2083 switch (savedErrno) { 2084 case EBUSY: 2085 ret = STMF_ERROR_BUSY; 2086 break; 2087 case EPERM: 2088 case EACCES: 2089 ret = STMF_ERROR_PERM; 2090 break; 2091 case ENOENT: 2092 ret = STMF_ERROR_NOT_FOUND; 2093 break; 2094 default: 2095 syslog(LOG_DEBUG, 2096 "getDiskAllProps:ioctl error(%d) (%d) (%d)", 2097 ioctlRet, sbdIoctl.stmf_error, savedErrno); 2098 ret = STMF_STATUS_ERROR; 2099 break; 2100 } 2101 } 2102 2103 if (ret == STMF_STATUS_SUCCESS) { 2104 ret = loadDiskPropsFromDriver((luResourceImpl *)*hdl, sbdProps); 2105 } 2106 2107 (void) close(fd); 2108 return (ret); 2109 } 2110 2111 /* 2112 * loadDiskPropsFromDriver 2113 * 2114 * Purpose: Retrieve all disk type properties from sbd driver 2115 * 2116 * hdl - Allocated luResourceImpl 2117 * sbdProps - sbd_lu_props_t structure returned from sbd driver 2118 * 2119 */ 2120 static int 2121 loadDiskPropsFromDriver(luResourceImpl *hdl, sbd_lu_props_t *sbdProps) 2122 { 2123 int ret = STMF_STATUS_SUCCESS; 2124 diskResource *diskLu = hdl->resource; 2125 /* copy guid */ 2126 diskLu->luGuidValid = B_TRUE; 2127 bcopy(sbdProps->slp_guid, diskLu->luGuid, sizeof (sbdProps->slp_guid)); 2128 2129 if (sbdProps->slp_separate_meta && sbdProps->slp_meta_fname_valid) { 2130 diskLu->luMetaFileNameValid = B_TRUE; 2131 if (strlcpy(diskLu->luMetaFileName, 2132 (char *)&(sbdProps->slp_buf[sbdProps->slp_meta_fname_off]), 2133 sizeof (diskLu->luMetaFileName)) >= 2134 sizeof (diskLu->luMetaFileName)) { 2135 return (STMF_STATUS_ERROR); 2136 } 2137 } 2138 2139 if (sbdProps->slp_data_fname_valid) { 2140 diskLu->luDataFileNameValid = B_TRUE; 2141 if (strlcpy(diskLu->luDataFileName, 2142 (char *)&(sbdProps->slp_buf[sbdProps->slp_data_fname_off]), 2143 sizeof (diskLu->luDataFileName)) >= 2144 sizeof (diskLu->luDataFileName)) { 2145 return (STMF_STATUS_ERROR); 2146 } 2147 } 2148 2149 if (sbdProps->slp_serial_valid) { 2150 diskLu->serialNumValid = B_TRUE; 2151 bcopy(&(sbdProps->slp_buf[sbdProps->slp_serial_off]), 2152 diskLu->serialNum, sbdProps->slp_serial_size); 2153 } 2154 2155 if (sbdProps->slp_mgmt_url_valid) { 2156 diskLu->luMgmtUrlValid = B_TRUE; 2157 if (strlcpy(diskLu->luMgmtUrl, 2158 (char *)&(sbdProps->slp_buf[sbdProps->slp_mgmt_url_off]), 2159 sizeof (diskLu->luMgmtUrl)) >= 2160 sizeof (diskLu->luMgmtUrl)) { 2161 return (STMF_STATUS_ERROR); 2162 } 2163 } 2164 2165 if (sbdProps->slp_alias_valid) { 2166 diskLu->luAliasValid = B_TRUE; 2167 if (strlcpy(diskLu->luAlias, 2168 (char *)&(sbdProps->slp_buf[sbdProps->slp_alias_off]), 2169 sizeof (diskLu->luAlias)) >= 2170 sizeof (diskLu->luAlias)) { 2171 return (STMF_STATUS_ERROR); 2172 } 2173 } else { /* set alias to data filename if not set */ 2174 if (sbdProps->slp_data_fname_valid) { 2175 diskLu->luAliasValid = B_TRUE; 2176 if (strlcpy(diskLu->luAlias, 2177 (char *)&(sbdProps->slp_buf[ 2178 sbdProps->slp_data_fname_off]), 2179 sizeof (diskLu->luAlias)) >= 2180 sizeof (diskLu->luAlias)) { 2181 return (STMF_STATUS_ERROR); 2182 } 2183 } 2184 } 2185 2186 diskLu->vidValid = B_TRUE; 2187 bcopy(sbdProps->slp_vid, diskLu->vid, sizeof (diskLu->vid)); 2188 2189 diskLu->pidValid = B_TRUE; 2190 bcopy(sbdProps->slp_pid, diskLu->pid, sizeof (diskLu->pid)); 2191 2192 diskLu->revValid = B_TRUE; 2193 bcopy(sbdProps->slp_rev, diskLu->rev, sizeof (diskLu->rev)); 2194 2195 diskLu->writeProtectEnableValid = B_TRUE; 2196 if (sbdProps->slp_write_protected) { 2197 diskLu->writeProtectEnable = B_TRUE; 2198 } 2199 2200 diskLu->writebackCacheDisableValid = B_TRUE; 2201 if (sbdProps->slp_writeback_cache_disable_cur) { 2202 diskLu->writebackCacheDisable = B_TRUE; 2203 } 2204 2205 diskLu->blkSizeValid = B_TRUE; 2206 diskLu->blkSize = sbdProps->slp_blksize; 2207 2208 diskLu->luSizeValid = B_TRUE; 2209 diskLu->luSize = sbdProps->slp_lu_size; 2210 2211 return (ret); 2212 } 2213 2214 2215 /* 2216 * stmfSetLuProp 2217 * 2218 * Purpose: set a property on an luResource 2219 * 2220 * hdl - allocated luResource 2221 * prop - property identifier 2222 * propVal - property value to be set 2223 */ 2224 int 2225 stmfSetLuProp(luResource hdl, uint32_t prop, const char *propVal) 2226 { 2227 int ret = STMF_STATUS_SUCCESS; 2228 luResourceImpl *luPropsHdl = hdl; 2229 if (hdl == NULL) { 2230 return (STMF_ERROR_INVALID_ARG); 2231 } 2232 2233 if (luPropsHdl->type == STMF_DISK) { 2234 ret = setDiskProp(luPropsHdl, prop, propVal); 2235 } else { 2236 return (STMF_ERROR_INVALID_ARG); 2237 } 2238 2239 return (ret); 2240 } 2241 2242 /* 2243 * getDiskProp 2244 * 2245 * Purpose: retrieve a given property from a logical unit resource of type disk 2246 * 2247 * hdl - allocated luResourceImpl 2248 * prop - property identifier 2249 * propVal - pointer to character to contain the retrieved property value 2250 * propLen - On input this is the length of propVal. On failure, it contains the 2251 * number of bytes required for propVal 2252 */ 2253 static int 2254 getDiskProp(luResourceImpl *hdl, uint32_t prop, char *propVal, size_t *propLen) 2255 { 2256 int ret = STMF_STATUS_SUCCESS; 2257 diskResource *diskLu = hdl->resource; 2258 size_t reqLen; 2259 2260 switch (prop) { 2261 case STMF_LU_PROP_BLOCK_SIZE: 2262 if (diskLu->blkSizeValid == B_FALSE) { 2263 return (STMF_ERROR_NO_PROP); 2264 } 2265 reqLen = snprintf(propVal, *propLen, "%llu", 2266 (u_longlong_t)diskLu->blkSize); 2267 if (reqLen >= *propLen) { 2268 *propLen = reqLen + 1; 2269 return (STMF_ERROR_INVALID_ARG); 2270 } 2271 break; 2272 case STMF_LU_PROP_FILENAME: 2273 if (diskLu->luDataFileNameValid == B_FALSE) { 2274 return (STMF_ERROR_NO_PROP); 2275 } 2276 if ((reqLen = strlcpy(propVal, diskLu->luDataFileName, 2277 *propLen)) >= *propLen) { 2278 *propLen = reqLen + 1; 2279 return (STMF_ERROR_INVALID_ARG); 2280 } 2281 break; 2282 case STMF_LU_PROP_META_FILENAME: 2283 if (diskLu->luMetaFileNameValid == B_FALSE) { 2284 return (STMF_ERROR_NO_PROP); 2285 } 2286 if ((reqLen = strlcpy(propVal, diskLu->luMetaFileName, 2287 *propLen)) >= *propLen) { 2288 *propLen = reqLen + 1; 2289 return (STMF_ERROR_INVALID_ARG); 2290 } 2291 break; 2292 case STMF_LU_PROP_MGMT_URL: 2293 if (diskLu->luMgmtUrlValid == B_FALSE) { 2294 return (STMF_ERROR_NO_PROP); 2295 } 2296 if ((reqLen = strlcpy(propVal, diskLu->luMgmtUrl, 2297 *propLen)) >= *propLen) { 2298 *propLen = reqLen + 1; 2299 return (STMF_ERROR_INVALID_ARG); 2300 } 2301 break; 2302 case STMF_LU_PROP_GUID: 2303 if (diskLu->luGuidValid == B_FALSE) { 2304 return (STMF_ERROR_NO_PROP); 2305 } 2306 reqLen = snprintf(propVal, *propLen, 2307 "%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X" 2308 "%02X%02X%02X%02X", 2309 diskLu->luGuid[0], diskLu->luGuid[1], 2310 diskLu->luGuid[2], diskLu->luGuid[3], 2311 diskLu->luGuid[4], diskLu->luGuid[5], 2312 diskLu->luGuid[6], diskLu->luGuid[7], 2313 diskLu->luGuid[8], diskLu->luGuid[9], 2314 diskLu->luGuid[10], diskLu->luGuid[11], 2315 diskLu->luGuid[12], diskLu->luGuid[13], 2316 diskLu->luGuid[14], diskLu->luGuid[15]); 2317 if (reqLen >= *propLen) { 2318 *propLen = reqLen + 1; 2319 return (STMF_ERROR_INVALID_ARG); 2320 } 2321 break; 2322 case STMF_LU_PROP_SERIAL_NUM: 2323 if (diskLu->serialNumValid == B_FALSE) { 2324 return (STMF_ERROR_NO_PROP); 2325 } 2326 if ((reqLen = strlcpy(propVal, diskLu->serialNum, 2327 *propLen)) >= *propLen) { 2328 *propLen = reqLen + 1; 2329 return (STMF_ERROR_INVALID_ARG); 2330 } 2331 break; 2332 case STMF_LU_PROP_SIZE: 2333 if (diskLu->luSizeValid == B_FALSE) { 2334 return (STMF_ERROR_NO_PROP); 2335 } 2336 (void) snprintf(propVal, *propLen, "%llu", 2337 (u_longlong_t)diskLu->luSize); 2338 break; 2339 case STMF_LU_PROP_ALIAS: 2340 if (diskLu->luAliasValid == B_FALSE) { 2341 return (STMF_ERROR_NO_PROP); 2342 } 2343 if ((reqLen = strlcpy(propVal, diskLu->luAlias, 2344 *propLen)) >= *propLen) { 2345 *propLen = reqLen + 1; 2346 return (STMF_ERROR_INVALID_ARG); 2347 } 2348 break; 2349 case STMF_LU_PROP_VID: 2350 if (diskLu->vidValid == B_FALSE) { 2351 return (STMF_ERROR_NO_PROP); 2352 } 2353 if (*propLen <= sizeof (diskLu->vid)) { 2354 return (STMF_ERROR_INVALID_ARG); 2355 } 2356 bcopy(diskLu->vid, propVal, sizeof (diskLu->vid)); 2357 propVal[sizeof (diskLu->vid)] = 0; 2358 break; 2359 case STMF_LU_PROP_PID: 2360 if (diskLu->pidValid == B_FALSE) { 2361 return (STMF_ERROR_NO_PROP); 2362 } 2363 if (*propLen <= sizeof (diskLu->pid)) { 2364 return (STMF_ERROR_INVALID_ARG); 2365 } 2366 bcopy(diskLu->pid, propVal, sizeof (diskLu->pid)); 2367 propVal[sizeof (diskLu->pid)] = 0; 2368 break; 2369 case STMF_LU_PROP_WRITE_PROTECT: 2370 if (diskLu->writeProtectEnableValid == B_FALSE) { 2371 return (STMF_ERROR_NO_PROP); 2372 } 2373 if (diskLu->writeProtectEnable) { 2374 if ((reqLen = strlcpy(propVal, "true", 2375 *propLen)) >= *propLen) { 2376 *propLen = reqLen + 1; 2377 return (STMF_ERROR_INVALID_ARG); 2378 } 2379 } else { 2380 if ((reqLen = strlcpy(propVal, "false", 2381 *propLen)) >= *propLen) { 2382 *propLen = reqLen + 1; 2383 return (STMF_ERROR_INVALID_ARG); 2384 } 2385 } 2386 break; 2387 case STMF_LU_PROP_WRITE_CACHE_DISABLE: 2388 if (diskLu->writebackCacheDisableValid == B_FALSE) { 2389 return (STMF_ERROR_NO_PROP); 2390 } 2391 if (diskLu->writebackCacheDisable) { 2392 if ((reqLen = strlcpy(propVal, "true", 2393 *propLen)) >= *propLen) { 2394 *propLen = reqLen + 1; 2395 return (STMF_ERROR_INVALID_ARG); 2396 } 2397 } else { 2398 if ((reqLen = strlcpy(propVal, "false", 2399 *propLen)) >= *propLen) { 2400 *propLen = reqLen + 1; 2401 return (STMF_ERROR_INVALID_ARG); 2402 } 2403 } 2404 break; 2405 default: 2406 ret = STMF_ERROR_NO_PROP; 2407 break; 2408 } 2409 2410 return (ret); 2411 } 2412 2413 /* 2414 * setDiskProp 2415 * 2416 * Purpose: set properties for resource of type disk 2417 * 2418 * hdl - allocated luResourceImpl 2419 * resourceProp - valid resource identifier 2420 * propVal - valid resource value 2421 */ 2422 static int 2423 setDiskProp(luResourceImpl *hdl, uint32_t resourceProp, const char *propVal) 2424 { 2425 int ret = STMF_STATUS_SUCCESS; 2426 int i; 2427 diskResource *diskLu = hdl->resource; 2428 unsigned long long numericProp = 0; 2429 char guidProp[LU_ASCII_GUID_SIZE + 1]; 2430 char ouiProp[OUI_ASCII_SIZE + 1]; 2431 unsigned int oui[OUI_SIZE]; 2432 unsigned int guid[LU_GUID_SIZE]; 2433 int propSize; 2434 2435 2436 if (propVal == NULL) { 2437 return (STMF_ERROR_INVALID_ARG); 2438 } 2439 2440 switch (resourceProp) { 2441 case STMF_LU_PROP_ALIAS: 2442 if (strlcpy(diskLu->luAlias, propVal, 2443 sizeof (diskLu->luAlias)) >= 2444 sizeof (diskLu->luAlias)) { 2445 return (STMF_ERROR_INVALID_PROPSIZE); 2446 } 2447 diskLu->luAliasValid = B_TRUE; 2448 break; 2449 case STMF_LU_PROP_BLOCK_SIZE: 2450 (void) sscanf(propVal, "%llu", &numericProp); 2451 if (numericProp > UINT16_MAX) { 2452 return (STMF_ERROR_INVALID_PROPSIZE); 2453 } 2454 diskLu->blkSize = numericProp; 2455 diskLu->blkSizeValid = B_TRUE; 2456 break; 2457 case STMF_LU_PROP_COMPANY_ID: 2458 if ((strlcpy(ouiProp, propVal, sizeof (ouiProp))) >= 2459 sizeof (ouiProp)) { 2460 return (STMF_ERROR_INVALID_ARG); 2461 } 2462 if (checkHexUpper(ouiProp) != 0) { 2463 return (STMF_ERROR_INVALID_ARG); 2464 } 2465 (void) sscanf(ouiProp, "%2X%2X%2X", 2466 &oui[0], &oui[1], &oui[2]); 2467 2468 diskLu->companyId = 0; 2469 diskLu->companyId += oui[0] << 16; 2470 diskLu->companyId += oui[1] << 8; 2471 diskLu->companyId += oui[2]; 2472 diskLu->companyIdValid = B_TRUE; 2473 break; 2474 case STMF_LU_PROP_GUID: 2475 if (strlen(propVal) != LU_ASCII_GUID_SIZE) { 2476 return (STMF_ERROR_INVALID_PROPSIZE); 2477 } 2478 2479 if ((strlcpy(guidProp, propVal, sizeof (guidProp))) >= 2480 sizeof (guidProp)) { 2481 return (STMF_ERROR_INVALID_ARG); 2482 } 2483 2484 if (checkHexUpper(guidProp) != 0) { 2485 return (STMF_ERROR_INVALID_ARG); 2486 } 2487 2488 (void) sscanf(guidProp, 2489 "%2X%2X%2X%2X%2X%2X%2X%2X%2X%2X%2X%2X%2X%2X%2X%2X", 2490 &guid[0], &guid[1], &guid[2], &guid[3], &guid[4], 2491 &guid[5], &guid[6], &guid[7], &guid[8], &guid[9], 2492 &guid[10], &guid[11], &guid[12], &guid[13], 2493 &guid[14], &guid[15]); 2494 for (i = 0; i < sizeof (diskLu->luGuid); i++) { 2495 diskLu->luGuid[i] = guid[i]; 2496 } 2497 diskLu->luGuidValid = B_TRUE; 2498 break; 2499 case STMF_LU_PROP_FILENAME: 2500 if ((strlcpy(diskLu->luDataFileName, propVal, 2501 sizeof (diskLu->luDataFileName))) >= 2502 sizeof (diskLu->luDataFileName)) { 2503 return (STMF_ERROR_INVALID_PROPSIZE); 2504 } 2505 diskLu->luDataFileNameValid = B_TRUE; 2506 break; 2507 case STMF_LU_PROP_META_FILENAME: 2508 if ((strlcpy(diskLu->luMetaFileName, propVal, 2509 sizeof (diskLu->luMetaFileName))) >= 2510 sizeof (diskLu->luMetaFileName)) { 2511 return (STMF_ERROR_INVALID_PROPSIZE); 2512 } 2513 diskLu->luMetaFileNameValid = B_TRUE; 2514 break; 2515 case STMF_LU_PROP_MGMT_URL: 2516 if ((strlcpy(diskLu->luMgmtUrl, propVal, 2517 sizeof (diskLu->luMgmtUrl))) >= 2518 sizeof (diskLu->luMgmtUrl)) { 2519 return (STMF_ERROR_INVALID_PROPSIZE); 2520 } 2521 diskLu->luMgmtUrlValid = B_TRUE; 2522 break; 2523 case STMF_LU_PROP_PID: 2524 if ((propSize = strlen(propVal)) > 2525 sizeof (diskLu->pid)) { 2526 return (STMF_ERROR_INVALID_PROPSIZE); 2527 } 2528 (void) strncpy(diskLu->pid, propVal, propSize); 2529 diskLu->pidValid = B_TRUE; 2530 break; 2531 case STMF_LU_PROP_SERIAL_NUM: 2532 if ((propSize = strlen(propVal)) > 2533 (sizeof (diskLu->serialNum) - 1)) { 2534 return (STMF_ERROR_INVALID_PROPSIZE); 2535 } 2536 (void) strncpy(diskLu->serialNum, propVal, propSize); 2537 diskLu->serialNumValid = B_TRUE; 2538 break; 2539 case STMF_LU_PROP_SIZE: 2540 if ((niceStrToNum(propVal, &diskLu->luSize) != 0)) { 2541 return (STMF_ERROR_INVALID_ARG); 2542 } 2543 diskLu->luSizeValid = B_TRUE; 2544 break; 2545 case STMF_LU_PROP_VID: 2546 if ((propSize = strlen(propVal)) > 2547 sizeof (diskLu->vid)) { 2548 return (STMF_ERROR_INVALID_PROPSIZE); 2549 } 2550 (void) strncpy(diskLu->vid, propVal, propSize); 2551 diskLu->vidValid = B_TRUE; 2552 break; 2553 case STMF_LU_PROP_WRITE_PROTECT: 2554 if (strcasecmp(propVal, "TRUE") == 0) { 2555 diskLu->writeProtectEnable = B_TRUE; 2556 } else if (strcasecmp(propVal, "FALSE") == 0) { 2557 diskLu->writeProtectEnable = B_FALSE; 2558 } else { 2559 return (STMF_ERROR_INVALID_ARG); 2560 } 2561 diskLu->writeProtectEnableValid = B_TRUE; 2562 break; 2563 case STMF_LU_PROP_WRITE_CACHE_DISABLE: 2564 if (strcasecmp(propVal, "TRUE") == 0) { 2565 diskLu->writebackCacheDisable = B_TRUE; 2566 } else if (strcasecmp(propVal, "FALSE") == 0) { 2567 diskLu->writebackCacheDisable = B_FALSE; 2568 } else { 2569 return (STMF_ERROR_INVALID_ARG); 2570 } 2571 diskLu->writebackCacheDisableValid = B_TRUE; 2572 break; 2573 default: 2574 ret = STMF_ERROR_NO_PROP; 2575 break; 2576 } 2577 return (ret); 2578 } 2579 2580 static int 2581 checkHexUpper(char *buf) 2582 { 2583 int i; 2584 2585 for (i = 0; i < strlen(buf); i++) { 2586 if (isxdigit(buf[i])) { 2587 buf[i] = toupper(buf[i]); 2588 continue; 2589 } 2590 return (-1); 2591 } 2592 2593 return (0); 2594 } 2595 2596 /* 2597 * Given a numeric suffix, convert the value into a number of bits that the 2598 * resulting value must be shifted. 2599 * Code lifted from libzfs_util.c 2600 */ 2601 static int 2602 strToShift(const char *buf) 2603 { 2604 const char *ends = "BKMGTPE"; 2605 int i; 2606 2607 if (buf[0] == '\0') 2608 return (0); 2609 2610 for (i = 0; i < strlen(ends); i++) { 2611 if (toupper(buf[0]) == ends[i]) 2612 return (10*i); 2613 } 2614 2615 return (-1); 2616 } 2617 2618 int 2619 stmfFreeLuResource(luResource hdl) 2620 { 2621 int ret = STMF_STATUS_SUCCESS; 2622 if (hdl == NULL) { 2623 return (STMF_ERROR_INVALID_ARG); 2624 } 2625 2626 luResourceImpl *hdlImpl = hdl; 2627 free(hdlImpl->resource); 2628 free(hdlImpl); 2629 return (ret); 2630 } 2631 2632 /* 2633 * Convert a string of the form '100G' into a real number. Used when setting 2634 * the size of a logical unit. 2635 * Code lifted from libzfs_util.c 2636 */ 2637 static int 2638 niceStrToNum(const char *value, uint64_t *num) 2639 { 2640 char *end; 2641 int shift; 2642 2643 *num = 0; 2644 2645 /* Check to see if this looks like a number. */ 2646 if ((value[0] < '0' || value[0] > '9') && value[0] != '.') { 2647 return (-1); 2648 } 2649 2650 /* Rely on stroull() to process the numeric portion. */ 2651 errno = 0; 2652 *num = strtoull(value, &end, 10); 2653 2654 /* 2655 * Check for ERANGE, which indicates that the value is too large to fit 2656 * in a 64-bit value. 2657 */ 2658 if (errno == ERANGE) { 2659 return (-1); 2660 } 2661 2662 /* 2663 * If we have a decimal value, then do the computation with floating 2664 * point arithmetic. Otherwise, use standard arithmetic. 2665 */ 2666 if (*end == '.') { 2667 double fval = strtod(value, &end); 2668 2669 if ((shift = strToShift(end)) == -1) { 2670 return (-1); 2671 } 2672 2673 fval *= pow(2, shift); 2674 2675 if (fval > UINT64_MAX) { 2676 return (-1); 2677 } 2678 2679 *num = (uint64_t)fval; 2680 } else { 2681 if ((shift = strToShift(end)) == -1) { 2682 return (-1); 2683 } 2684 2685 /* Check for overflow */ 2686 if (shift >= 64 || (*num << shift) >> shift != *num) { 2687 return (-1); 2688 } 2689 2690 *num <<= shift; 2691 } 2692 2693 return (0); 2694 } 2695 2696 /* 2697 * stmfCreateTargetGroup 2698 * 2699 * Purpose: Create a local port group 2700 * 2701 * targetGroupName - name of local port group to create 2702 */ 2703 int 2704 stmfCreateTargetGroup(stmfGroupName *targetGroupName) 2705 { 2706 int ret; 2707 int fd; 2708 2709 if (targetGroupName == NULL || 2710 (strnlen((char *)targetGroupName, sizeof (stmfGroupName)) 2711 == sizeof (stmfGroupName))) { 2712 return (STMF_ERROR_INVALID_ARG); 2713 } 2714 2715 /* Check to ensure service exists */ 2716 if (psCheckService() != STMF_STATUS_SUCCESS) { 2717 return (STMF_ERROR_SERVICE_NOT_FOUND); 2718 } 2719 2720 /* call init */ 2721 ret = initializeConfig(); 2722 if (ret != STMF_STATUS_SUCCESS) { 2723 return (ret); 2724 } 2725 2726 /* 2727 * Open control node for stmf 2728 */ 2729 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 2730 return (ret); 2731 2732 /* 2733 * Add the group to the driver 2734 */ 2735 if ((ret = groupIoctl(fd, STMF_IOCTL_CREATE_TARGET_GROUP, 2736 targetGroupName)) != STMF_STATUS_SUCCESS) { 2737 goto done; 2738 } 2739 2740 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 2741 goto done; 2742 } 2743 2744 /* 2745 * If the add to the driver was successful, add it to the persistent 2746 * store. 2747 */ 2748 ret = psCreateTargetGroup((char *)targetGroupName); 2749 switch (ret) { 2750 case STMF_PS_SUCCESS: 2751 ret = STMF_STATUS_SUCCESS; 2752 break; 2753 case STMF_PS_ERROR_EXISTS: 2754 ret = STMF_ERROR_EXISTS; 2755 break; 2756 case STMF_PS_ERROR_BUSY: 2757 ret = STMF_ERROR_BUSY; 2758 break; 2759 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 2760 ret = STMF_ERROR_SERVICE_NOT_FOUND; 2761 break; 2762 case STMF_PS_ERROR_VERSION_MISMATCH: 2763 ret = STMF_ERROR_SERVICE_DATA_VERSION; 2764 break; 2765 default: 2766 syslog(LOG_DEBUG, 2767 "stmfCreateTargetGroup:psCreateTargetGroup" 2768 ":error(%d)", ret); 2769 ret = STMF_STATUS_ERROR; 2770 break; 2771 } 2772 2773 done: 2774 (void) close(fd); 2775 return (ret); 2776 } 2777 2778 /* 2779 * stmfDeleteHostGroup 2780 * 2781 * Purpose: Delete an initiator or local port group 2782 * 2783 * hostGroupName - group to delete 2784 */ 2785 int 2786 stmfDeleteHostGroup(stmfGroupName *hostGroupName) 2787 { 2788 int ret; 2789 int fd; 2790 2791 if (hostGroupName == NULL) { 2792 return (STMF_ERROR_INVALID_ARG); 2793 } 2794 2795 /* Check to ensure service exists */ 2796 if (psCheckService() != STMF_STATUS_SUCCESS) { 2797 return (STMF_ERROR_SERVICE_NOT_FOUND); 2798 } 2799 2800 /* call init */ 2801 ret = initializeConfig(); 2802 if (ret != STMF_STATUS_SUCCESS) { 2803 return (ret); 2804 } 2805 2806 /* 2807 * Open control node for stmf 2808 */ 2809 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 2810 return (ret); 2811 2812 /* 2813 * Remove the group from the driver 2814 */ 2815 if ((ret = groupIoctl(fd, STMF_IOCTL_REMOVE_HOST_GROUP, 2816 hostGroupName)) != STMF_STATUS_SUCCESS) { 2817 goto done; 2818 } 2819 2820 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 2821 goto done; 2822 } 2823 2824 /* 2825 * If the remove from the driver was successful, remove it from the 2826 * persistent store. 2827 */ 2828 ret = psDeleteHostGroup((char *)hostGroupName); 2829 switch (ret) { 2830 case STMF_PS_SUCCESS: 2831 ret = STMF_STATUS_SUCCESS; 2832 break; 2833 case STMF_PS_ERROR_NOT_FOUND: 2834 ret = STMF_ERROR_NOT_FOUND; 2835 break; 2836 case STMF_PS_ERROR_BUSY: 2837 ret = STMF_ERROR_BUSY; 2838 break; 2839 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 2840 ret = STMF_ERROR_SERVICE_NOT_FOUND; 2841 break; 2842 case STMF_PS_ERROR_VERSION_MISMATCH: 2843 ret = STMF_ERROR_SERVICE_DATA_VERSION; 2844 break; 2845 default: 2846 syslog(LOG_DEBUG, 2847 "stmfDeleteHostGroup:psDeleteHostGroup:error(%d)", 2848 ret); 2849 ret = STMF_STATUS_ERROR; 2850 break; 2851 } 2852 2853 done: 2854 (void) close(fd); 2855 return (ret); 2856 } 2857 2858 /* 2859 * stmfDeleteTargetGroup 2860 * 2861 * Purpose: Delete an initiator or local port group 2862 * 2863 * targetGroupName - group to delete 2864 */ 2865 int 2866 stmfDeleteTargetGroup(stmfGroupName *targetGroupName) 2867 { 2868 int ret = STMF_STATUS_SUCCESS; 2869 int fd; 2870 2871 if (targetGroupName == NULL) { 2872 return (STMF_ERROR_INVALID_ARG); 2873 } 2874 2875 /* Check to ensure service exists */ 2876 if (psCheckService() != STMF_STATUS_SUCCESS) { 2877 return (STMF_ERROR_SERVICE_NOT_FOUND); 2878 } 2879 2880 /* call init */ 2881 ret = initializeConfig(); 2882 if (ret != STMF_STATUS_SUCCESS) { 2883 return (ret); 2884 } 2885 2886 /* 2887 * Open control node for stmf 2888 */ 2889 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 2890 return (ret); 2891 2892 /* 2893 * Remove the group from the driver 2894 */ 2895 if ((ret = groupIoctl(fd, STMF_IOCTL_REMOVE_TARGET_GROUP, 2896 targetGroupName)) != STMF_STATUS_SUCCESS) { 2897 goto done; 2898 } 2899 2900 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 2901 goto done; 2902 } 2903 2904 /* 2905 * If the remove from the driver was successful, remove it from the 2906 * persistent store. 2907 */ 2908 ret = psDeleteTargetGroup((char *)targetGroupName); 2909 switch (ret) { 2910 case STMF_PS_SUCCESS: 2911 ret = STMF_STATUS_SUCCESS; 2912 break; 2913 case STMF_PS_ERROR_NOT_FOUND: 2914 ret = STMF_ERROR_NOT_FOUND; 2915 break; 2916 case STMF_PS_ERROR_BUSY: 2917 ret = STMF_ERROR_BUSY; 2918 break; 2919 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 2920 ret = STMF_ERROR_SERVICE_NOT_FOUND; 2921 break; 2922 case STMF_PS_ERROR_VERSION_MISMATCH: 2923 ret = STMF_ERROR_SERVICE_DATA_VERSION; 2924 break; 2925 default: 2926 syslog(LOG_DEBUG, 2927 "stmfDeleteTargetGroup:psDeleteTargetGroup" 2928 ":error(%d)", ret); 2929 ret = STMF_STATUS_ERROR; 2930 break; 2931 } 2932 2933 done: 2934 (void) close(fd); 2935 return (ret); 2936 } 2937 2938 /* 2939 * stmfDevidFromIscsiName 2940 * 2941 * Purpose: convert an iSCSI name to an stmf devid 2942 * 2943 * iscsiName - unicode nul terminated utf-8 encoded iSCSI name 2944 * devid - on success, contains the converted iscsi name 2945 */ 2946 int 2947 stmfDevidFromIscsiName(char *iscsiName, stmfDevid *devid) 2948 { 2949 if (devid == NULL || iscsiName == NULL) 2950 return (STMF_ERROR_INVALID_ARG); 2951 2952 bzero(devid, sizeof (stmfDevid)); 2953 2954 /* Validate size of target */ 2955 if ((devid->identLength = strlen(iscsiName)) > MAX_ISCSI_NAME || 2956 devid->identLength < strlen(EUI) || 2957 devid->identLength < strlen(IQN)) { 2958 return (STMF_ERROR_INVALID_ARG); 2959 } 2960 2961 if ((strncmp(iscsiName, EUI, strlen(EUI)) != 0) && 2962 strncmp(iscsiName, IQN, strlen(IQN)) != 0) { 2963 return (STMF_ERROR_INVALID_ARG); 2964 } 2965 2966 /* copy UTF-8 bytes to ident */ 2967 bcopy(iscsiName, devid->ident, devid->identLength); 2968 2969 return (STMF_STATUS_SUCCESS); 2970 } 2971 2972 /* 2973 * stmfDevidFromWwn 2974 * 2975 * Purpose: convert a WWN to an stmf devid 2976 * 2977 * wwn - 8-byte wwn identifier 2978 * devid - on success, contains the converted wwn 2979 */ 2980 int 2981 stmfDevidFromWwn(uchar_t *wwn, stmfDevid *devid) 2982 { 2983 if (wwn == NULL || devid == NULL) 2984 return (STMF_ERROR_INVALID_ARG); 2985 2986 bzero(devid, sizeof (stmfDevid)); 2987 2988 /* Copy eui prefix */ 2989 (void) bcopy(WWN, devid->ident, strlen(WWN)); 2990 2991 /* Convert to ASCII uppercase hexadecimal string */ 2992 (void) snprintf((char *)&devid->ident[strlen(WWN)], 2993 sizeof (devid->ident), "%02X%02X%02X%02X%02X%02X%02X%02X", 2994 wwn[0], wwn[1], wwn[2], wwn[3], wwn[4], wwn[5], wwn[6], wwn[7]); 2995 2996 devid->identLength = strlen((char *)devid->ident); 2997 2998 return (STMF_STATUS_SUCCESS); 2999 } 3000 3001 /* 3002 * stmfFreeMemory 3003 * 3004 * Purpose: Free memory allocated by this library 3005 * 3006 * memory - previously allocated pointer of memory managed by library 3007 */ 3008 void 3009 stmfFreeMemory(void *memory) 3010 { 3011 free(memory); 3012 } 3013 3014 /* 3015 * get host group, target group list from stmf 3016 * 3017 * groupType - HOST_GROUP, TARGET_GROUP 3018 */ 3019 static int 3020 groupListIoctl(stmfGroupList **groupList, int groupType) 3021 { 3022 int ret; 3023 int fd; 3024 int ioctlRet; 3025 int i; 3026 int cmd; 3027 stmf_iocdata_t stmfIoctl; 3028 /* framework group list */ 3029 stmf_group_name_t *iGroupList = NULL; 3030 uint32_t groupListSize; 3031 3032 if (groupList == NULL) { 3033 return (STMF_ERROR_INVALID_ARG); 3034 } 3035 3036 if (groupType == HOST_GROUP) { 3037 cmd = STMF_IOCTL_GET_HG_LIST; 3038 } else if (groupType == TARGET_GROUP) { 3039 cmd = STMF_IOCTL_GET_TG_LIST; 3040 } else { 3041 return (STMF_ERROR_INVALID_ARG); 3042 } 3043 3044 /* call init */ 3045 ret = initializeConfig(); 3046 if (ret != STMF_STATUS_SUCCESS) { 3047 return (ret); 3048 } 3049 3050 /* 3051 * Open control node for stmf 3052 */ 3053 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 3054 return (ret); 3055 3056 /* 3057 * Allocate ioctl input buffer 3058 */ 3059 groupListSize = ALLOC_GROUP; 3060 groupListSize = groupListSize * (sizeof (stmf_group_name_t)); 3061 iGroupList = (stmf_group_name_t *)calloc(1, groupListSize); 3062 if (iGroupList == NULL) { 3063 ret = STMF_ERROR_NOMEM; 3064 goto done; 3065 } 3066 3067 bzero(&stmfIoctl, sizeof (stmfIoctl)); 3068 /* 3069 * Issue ioctl to get the group list 3070 */ 3071 stmfIoctl.stmf_version = STMF_VERSION_1; 3072 stmfIoctl.stmf_obuf_size = groupListSize; 3073 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)iGroupList; 3074 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 3075 if (ioctlRet != 0) { 3076 switch (errno) { 3077 case EBUSY: 3078 ret = STMF_ERROR_BUSY; 3079 break; 3080 case EPERM: 3081 case EACCES: 3082 ret = STMF_ERROR_PERM; 3083 break; 3084 default: 3085 syslog(LOG_DEBUG, 3086 "groupListIoctl:ioctl errno(%d)", 3087 errno); 3088 ret = STMF_STATUS_ERROR; 3089 break; 3090 } 3091 goto done; 3092 } 3093 /* 3094 * Check whether input buffer was large enough 3095 */ 3096 if (stmfIoctl.stmf_obuf_max_nentries > ALLOC_GROUP) { 3097 groupListSize = stmfIoctl.stmf_obuf_max_nentries * 3098 sizeof (stmf_group_name_t); 3099 iGroupList = realloc(iGroupList, groupListSize); 3100 if (iGroupList == NULL) { 3101 ret = STMF_ERROR_NOMEM; 3102 goto done; 3103 } 3104 stmfIoctl.stmf_obuf_size = groupListSize; 3105 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)iGroupList; 3106 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 3107 if (ioctlRet != 0) { 3108 switch (errno) { 3109 case EBUSY: 3110 ret = STMF_ERROR_BUSY; 3111 break; 3112 case EPERM: 3113 case EACCES: 3114 ret = STMF_ERROR_PERM; 3115 break; 3116 default: 3117 syslog(LOG_DEBUG, 3118 "groupListIoctl:ioctl errno(%d)", 3119 errno); 3120 ret = STMF_STATUS_ERROR; 3121 break; 3122 } 3123 goto done; 3124 } 3125 } 3126 3127 /* allocate and copy to caller's buffer */ 3128 *groupList = (stmfGroupList *)calloc(1, sizeof (stmfGroupList) + 3129 sizeof (stmfGroupName) * stmfIoctl.stmf_obuf_nentries); 3130 if (*groupList == NULL) { 3131 ret = STMF_ERROR_NOMEM; 3132 goto done; 3133 } 3134 (*groupList)->cnt = stmfIoctl.stmf_obuf_nentries; 3135 for (i = 0; i < stmfIoctl.stmf_obuf_nentries; i++) { 3136 bcopy(iGroupList[i].name, (*groupList)->name[i], 3137 sizeof (stmfGroupName)); 3138 } 3139 3140 done: 3141 free(iGroupList); 3142 (void) close(fd); 3143 return (ret); 3144 } 3145 3146 /* 3147 * get host group members, target group members from stmf 3148 * 3149 * groupProps - allocated on success 3150 * 3151 * groupType - HOST_GROUP, TARGET_GROUP 3152 */ 3153 static int 3154 groupMemberListIoctl(stmfGroupName *groupName, stmfGroupProperties **groupProps, 3155 int groupType) 3156 { 3157 int ret; 3158 int fd; 3159 int ioctlRet; 3160 int i; 3161 int cmd; 3162 stmf_iocdata_t stmfIoctl; 3163 /* framework group list */ 3164 stmf_group_name_t iGroupName; 3165 stmf_ge_ident_t *iGroupMembers; 3166 uint32_t groupListSize; 3167 3168 if (groupName == NULL) { 3169 return (STMF_ERROR_INVALID_ARG); 3170 } 3171 3172 if (groupType == HOST_GROUP) { 3173 cmd = STMF_IOCTL_GET_HG_ENTRIES; 3174 } else if (groupType == TARGET_GROUP) { 3175 cmd = STMF_IOCTL_GET_TG_ENTRIES; 3176 } else { 3177 return (STMF_ERROR_INVALID_ARG); 3178 } 3179 3180 /* call init */ 3181 ret = initializeConfig(); 3182 if (ret != STMF_STATUS_SUCCESS) { 3183 return (ret); 3184 } 3185 3186 /* 3187 * Open control node for stmf 3188 */ 3189 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 3190 return (ret); 3191 3192 bzero(&iGroupName, sizeof (iGroupName)); 3193 3194 bcopy(groupName, &iGroupName.name, strlen((char *)groupName)); 3195 3196 iGroupName.name_size = strlen((char *)groupName); 3197 3198 /* 3199 * Allocate ioctl input buffer 3200 */ 3201 groupListSize = ALLOC_GRP_MEMBER; 3202 groupListSize = groupListSize * (sizeof (stmf_ge_ident_t)); 3203 iGroupMembers = (stmf_ge_ident_t *)calloc(1, groupListSize); 3204 if (iGroupMembers == NULL) { 3205 ret = STMF_ERROR_NOMEM; 3206 goto done; 3207 } 3208 3209 bzero(&stmfIoctl, sizeof (stmfIoctl)); 3210 /* 3211 * Issue ioctl to get the group list 3212 */ 3213 stmfIoctl.stmf_version = STMF_VERSION_1; 3214 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&iGroupName; 3215 stmfIoctl.stmf_ibuf_size = sizeof (stmf_group_name_t); 3216 stmfIoctl.stmf_obuf_size = groupListSize; 3217 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)iGroupMembers; 3218 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 3219 if (ioctlRet != 0) { 3220 switch (errno) { 3221 case EBUSY: 3222 ret = STMF_ERROR_BUSY; 3223 break; 3224 case EPERM: 3225 case EACCES: 3226 ret = STMF_ERROR_PERM; 3227 break; 3228 default: 3229 syslog(LOG_DEBUG, 3230 "groupListIoctl:ioctl errno(%d)", 3231 errno); 3232 ret = STMF_STATUS_ERROR; 3233 break; 3234 } 3235 goto done; 3236 } 3237 /* 3238 * Check whether input buffer was large enough 3239 */ 3240 if (stmfIoctl.stmf_obuf_max_nentries > ALLOC_GRP_MEMBER) { 3241 groupListSize = stmfIoctl.stmf_obuf_max_nentries * 3242 sizeof (stmf_ge_ident_t); 3243 iGroupMembers = realloc(iGroupMembers, groupListSize); 3244 if (iGroupMembers == NULL) { 3245 ret = STMF_ERROR_NOMEM; 3246 goto done; 3247 } 3248 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&iGroupName; 3249 stmfIoctl.stmf_ibuf_size = sizeof (stmf_group_name_t); 3250 stmfIoctl.stmf_obuf_size = groupListSize; 3251 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)iGroupMembers; 3252 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 3253 if (ioctlRet != 0) { 3254 switch (errno) { 3255 case EBUSY: 3256 ret = STMF_ERROR_BUSY; 3257 break; 3258 case EPERM: 3259 case EACCES: 3260 ret = STMF_ERROR_PERM; 3261 break; 3262 default: 3263 syslog(LOG_DEBUG, 3264 "groupListIoctl:ioctl errno(%d)", 3265 errno); 3266 ret = STMF_STATUS_ERROR; 3267 break; 3268 } 3269 goto done; 3270 } 3271 } 3272 3273 /* allocate and copy to caller's buffer */ 3274 *groupProps = (stmfGroupProperties *)calloc(1, 3275 sizeof (stmfGroupProperties) + 3276 sizeof (stmfDevid) * stmfIoctl.stmf_obuf_nentries); 3277 if (*groupProps == NULL) { 3278 ret = STMF_ERROR_NOMEM; 3279 goto done; 3280 } 3281 (*groupProps)->cnt = stmfIoctl.stmf_obuf_nentries; 3282 for (i = 0; i < stmfIoctl.stmf_obuf_nentries; i++) { 3283 (*groupProps)->name[i].identLength = 3284 iGroupMembers[i].ident_size; 3285 bcopy(iGroupMembers[i].ident, (*groupProps)->name[i].ident, 3286 iGroupMembers[i].ident_size); 3287 } 3288 3289 done: 3290 free(iGroupMembers); 3291 (void) close(fd); 3292 return (ret); 3293 } 3294 3295 /* 3296 * Purpose: access persistent config data for host groups and target groups 3297 */ 3298 static int 3299 iLoadGroupFromPs(stmfGroupList **groupList, int type) 3300 { 3301 int ret; 3302 3303 if (groupList == NULL) { 3304 return (STMF_ERROR_INVALID_ARG); 3305 } 3306 3307 if (type == HOST_GROUP) { 3308 ret = psGetHostGroupList(groupList); 3309 } else if (type == TARGET_GROUP) { 3310 ret = psGetTargetGroupList(groupList); 3311 } else { 3312 return (STMF_ERROR_INVALID_ARG); 3313 } 3314 switch (ret) { 3315 case STMF_PS_SUCCESS: 3316 ret = STMF_STATUS_SUCCESS; 3317 break; 3318 case STMF_PS_ERROR_NOT_FOUND: 3319 ret = STMF_ERROR_NOT_FOUND; 3320 break; 3321 case STMF_PS_ERROR_BUSY: 3322 ret = STMF_ERROR_BUSY; 3323 break; 3324 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 3325 ret = STMF_ERROR_SERVICE_NOT_FOUND; 3326 break; 3327 case STMF_PS_ERROR_VERSION_MISMATCH: 3328 ret = STMF_ERROR_SERVICE_DATA_VERSION; 3329 break; 3330 default: 3331 syslog(LOG_DEBUG, 3332 "stmfGetHostGroupList:psGetHostGroupList:error(%d)", 3333 ret); 3334 ret = STMF_STATUS_ERROR; 3335 break; 3336 } 3337 3338 return (ret); 3339 } 3340 3341 /* 3342 * stmfGetHostGroupList 3343 * 3344 * Purpose: Retrieves the list of initiator group oids 3345 * 3346 * hostGroupList - pointer to pointer to hostGroupList structure 3347 * on success, this contains the host group list. 3348 */ 3349 int 3350 stmfGetHostGroupList(stmfGroupList **hostGroupList) 3351 { 3352 int ret = STMF_STATUS_ERROR; 3353 3354 if (hostGroupList == NULL) { 3355 return (STMF_ERROR_INVALID_ARG); 3356 } 3357 3358 ret = groupListIoctl(hostGroupList, HOST_GROUP); 3359 return (ret); 3360 } 3361 3362 3363 /* 3364 * Purpose: access persistent config data for host groups and target groups 3365 */ 3366 static int 3367 iLoadGroupMembersFromPs(stmfGroupName *groupName, 3368 stmfGroupProperties **groupProp, int type) 3369 { 3370 int ret; 3371 3372 if (groupName == NULL) { 3373 return (STMF_ERROR_INVALID_ARG); 3374 } 3375 3376 if (type == HOST_GROUP) { 3377 ret = psGetHostGroupMemberList((char *)groupName, groupProp); 3378 } else if (type == TARGET_GROUP) { 3379 ret = psGetTargetGroupMemberList((char *)groupName, groupProp); 3380 } else { 3381 return (STMF_ERROR_INVALID_ARG); 3382 } 3383 switch (ret) { 3384 case STMF_PS_SUCCESS: 3385 ret = STMF_STATUS_SUCCESS; 3386 break; 3387 case STMF_PS_ERROR_NOT_FOUND: 3388 ret = STMF_ERROR_NOT_FOUND; 3389 break; 3390 case STMF_PS_ERROR_BUSY: 3391 ret = STMF_ERROR_BUSY; 3392 break; 3393 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 3394 ret = STMF_ERROR_SERVICE_NOT_FOUND; 3395 break; 3396 case STMF_PS_ERROR_VERSION_MISMATCH: 3397 ret = STMF_ERROR_SERVICE_DATA_VERSION; 3398 break; 3399 default: 3400 syslog(LOG_DEBUG, 3401 "iLoadGroupMembersFromPs:psGetHostGroupList:" 3402 "error(%d)", ret); 3403 ret = STMF_STATUS_ERROR; 3404 break; 3405 } 3406 3407 return (ret); 3408 } 3409 3410 /* 3411 * stmfGetHostGroupMembers 3412 * 3413 * Purpose: Retrieves the group properties for a host group 3414 * 3415 * groupName - name of group for which to retrieve host group members. 3416 * groupProp - pointer to pointer to stmfGroupProperties structure 3417 * on success, this contains the list of group members. 3418 */ 3419 int 3420 stmfGetHostGroupMembers(stmfGroupName *groupName, 3421 stmfGroupProperties **groupProp) 3422 { 3423 int ret; 3424 3425 if (groupName == NULL || groupProp == NULL) { 3426 return (STMF_ERROR_INVALID_ARG); 3427 } 3428 3429 ret = groupMemberListIoctl(groupName, groupProp, HOST_GROUP); 3430 3431 return (ret); 3432 } 3433 3434 /* 3435 * stmfGetProviderData 3436 * 3437 * Purpose: Get provider data list 3438 * 3439 * providerName - name of provider for which to retrieve the data 3440 * nvl - pointer to nvlist_t pointer which will contain the nvlist data 3441 * retrieved. 3442 * providerType - type of provider for which to retrieve data. 3443 * STMF_LU_PROVIDER_TYPE 3444 * STMF_PORT_PROVIDER_TYPE 3445 */ 3446 int 3447 stmfGetProviderData(char *providerName, nvlist_t **nvl, int providerType) 3448 { 3449 return (stmfGetProviderDataProt(providerName, nvl, providerType, 3450 NULL)); 3451 } 3452 3453 /* 3454 * stmfGetProviderDataProt 3455 * 3456 * Purpose: Get provider data list with token 3457 * 3458 * providerName - name of provider for which to retrieve the data 3459 * nvl - pointer to nvlist_t pointer which will contain the nvlist data 3460 * retrieved. 3461 * providerType - type of provider for which to retrieve data. 3462 * STMF_LU_PROVIDER_TYPE 3463 * STMF_PORT_PROVIDER_TYPE 3464 * setToken - Returns the stale data token 3465 */ 3466 int 3467 stmfGetProviderDataProt(char *providerName, nvlist_t **nvl, int providerType, 3468 uint64_t *setToken) 3469 { 3470 int ret; 3471 3472 if (providerName == NULL || nvl == NULL) { 3473 return (STMF_ERROR_INVALID_ARG); 3474 } 3475 if (providerType != STMF_LU_PROVIDER_TYPE && 3476 providerType != STMF_PORT_PROVIDER_TYPE) { 3477 return (STMF_ERROR_INVALID_ARG); 3478 } 3479 /* call init */ 3480 ret = initializeConfig(); 3481 if (ret != STMF_STATUS_SUCCESS) { 3482 return (ret); 3483 } 3484 return (getProviderData(providerName, nvl, providerType, setToken)); 3485 } 3486 3487 /* 3488 * stmfGetProviderDataList 3489 * 3490 * Purpose: Get the list of providers currently persisting data 3491 * 3492 * providerList - pointer to pointer to an stmfProviderList structure allocated 3493 * by the caller. Will contain the list of providers on success. 3494 */ 3495 int 3496 stmfGetProviderDataList(stmfProviderList **providerList) 3497 { 3498 int ret; 3499 3500 ret = psGetProviderDataList(providerList); 3501 switch (ret) { 3502 case STMF_PS_SUCCESS: 3503 ret = STMF_STATUS_SUCCESS; 3504 break; 3505 case STMF_PS_ERROR_BUSY: 3506 ret = STMF_ERROR_BUSY; 3507 break; 3508 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 3509 ret = STMF_ERROR_SERVICE_NOT_FOUND; 3510 break; 3511 case STMF_PS_ERROR_VERSION_MISMATCH: 3512 ret = STMF_ERROR_SERVICE_DATA_VERSION; 3513 break; 3514 default: 3515 syslog(LOG_DEBUG, 3516 "stmfGetProviderDataList:psGetProviderDataList" 3517 ":error(%d)", ret); 3518 ret = STMF_STATUS_ERROR; 3519 break; 3520 } 3521 3522 return (ret); 3523 } 3524 3525 3526 /* 3527 * stmfGetSessionList 3528 * 3529 * Purpose: Retrieves the session list for a target (devid) 3530 * 3531 * devid - devid of target for which to retrieve session information. 3532 * sessionList - pointer to pointer to stmfSessionList structure 3533 * on success, this contains the list of initiator sessions. 3534 */ 3535 int 3536 stmfGetSessionList(stmfDevid *devid, stmfSessionList **sessionList) 3537 { 3538 int ret = STMF_STATUS_SUCCESS; 3539 int fd; 3540 int ioctlRet; 3541 int cmd = STMF_IOCTL_SESSION_LIST; 3542 int i; 3543 stmf_iocdata_t stmfIoctl; 3544 slist_scsi_session_t *fSessionList, *fSessionListP = NULL; 3545 uint8_t ident[260]; 3546 uint32_t fSessionListSize; 3547 3548 if (sessionList == NULL || devid == NULL) { 3549 ret = STMF_ERROR_INVALID_ARG; 3550 } 3551 3552 /* call init */ 3553 ret = initializeConfig(); 3554 if (ret != STMF_STATUS_SUCCESS) { 3555 return (ret); 3556 } 3557 3558 /* 3559 * Open control node for stmf 3560 */ 3561 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 3562 return (ret); 3563 3564 /* 3565 * Allocate ioctl input buffer 3566 */ 3567 fSessionListSize = ALLOC_SESSION; 3568 fSessionListSize = fSessionListSize * (sizeof (slist_scsi_session_t)); 3569 fSessionList = (slist_scsi_session_t *)calloc(1, fSessionListSize); 3570 fSessionListP = fSessionList; 3571 if (fSessionList == NULL) { 3572 ret = STMF_ERROR_NOMEM; 3573 goto done; 3574 } 3575 3576 ident[IDENT_LENGTH_BYTE] = devid->identLength; 3577 bcopy(&(devid->ident), &ident[IDENT_LENGTH_BYTE + 1], 3578 devid->identLength); 3579 3580 bzero(&stmfIoctl, sizeof (stmfIoctl)); 3581 /* 3582 * Issue ioctl to get the session list 3583 */ 3584 stmfIoctl.stmf_version = STMF_VERSION_1; 3585 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&ident; 3586 stmfIoctl.stmf_ibuf_size = sizeof (ident); 3587 stmfIoctl.stmf_obuf_size = fSessionListSize; 3588 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)fSessionList; 3589 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 3590 if (ioctlRet != 0) { 3591 switch (errno) { 3592 case EBUSY: 3593 ret = STMF_ERROR_BUSY; 3594 break; 3595 case EPERM: 3596 case EACCES: 3597 ret = STMF_ERROR_PERM; 3598 break; 3599 default: 3600 syslog(LOG_DEBUG, 3601 "stmfGetSessionList:ioctl errno(%d)", 3602 errno); 3603 ret = STMF_STATUS_ERROR; 3604 break; 3605 } 3606 goto done; 3607 } 3608 /* 3609 * Check whether input buffer was large enough 3610 */ 3611 if (stmfIoctl.stmf_obuf_max_nentries > ALLOC_SESSION) { 3612 fSessionListSize = stmfIoctl.stmf_obuf_max_nentries * 3613 sizeof (slist_scsi_session_t); 3614 fSessionList = realloc(fSessionList, fSessionListSize); 3615 if (fSessionList == NULL) { 3616 ret = STMF_ERROR_NOMEM; 3617 goto done; 3618 } 3619 fSessionListP = fSessionList; 3620 stmfIoctl.stmf_obuf_size = fSessionListSize; 3621 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)fSessionList; 3622 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 3623 if (ioctlRet != 0) { 3624 switch (errno) { 3625 case EBUSY: 3626 ret = STMF_ERROR_BUSY; 3627 break; 3628 case EPERM: 3629 case EACCES: 3630 ret = STMF_ERROR_PERM; 3631 break; 3632 default: 3633 syslog(LOG_DEBUG, 3634 "stmfGetSessionList:ioctl " 3635 "errno(%d)", errno); 3636 ret = STMF_STATUS_ERROR; 3637 break; 3638 } 3639 goto done; 3640 } 3641 } 3642 3643 /* 3644 * allocate caller's buffer with the final size 3645 */ 3646 *sessionList = (stmfSessionList *)calloc(1, sizeof (stmfSessionList) + 3647 stmfIoctl.stmf_obuf_max_nentries * sizeof (stmfSession)); 3648 if (*sessionList == NULL) { 3649 ret = STMF_ERROR_NOMEM; 3650 free(sessionList); 3651 goto done; 3652 } 3653 3654 (*sessionList)->cnt = stmfIoctl.stmf_obuf_max_nentries; 3655 3656 /* 3657 * copy session info to caller's buffer 3658 */ 3659 for (i = 0; i < (*sessionList)->cnt; i++) { 3660 (*sessionList)->session[i].initiator.identLength = 3661 fSessionList->initiator[IDENT_LENGTH_BYTE]; 3662 bcopy(&(fSessionList->initiator[IDENT_LENGTH_BYTE + 1]), 3663 (*sessionList)->session[i].initiator.ident, 3664 STMF_IDENT_LENGTH); 3665 bcopy(&(fSessionList->alias), 3666 &((*sessionList)->session[i].alias), 3667 sizeof ((*sessionList)->session[i].alias)); 3668 bcopy(&(fSessionList++->creation_time), 3669 &((*sessionList)->session[i].creationTime), 3670 sizeof (time_t)); 3671 } 3672 done: 3673 (void) close(fd); 3674 free(fSessionListP); 3675 return (ret); 3676 } 3677 3678 /* 3679 * stmfGetTargetGroupList 3680 * 3681 * Purpose: Retrieves the list of target groups 3682 * 3683 * targetGroupList - pointer to a pointer to an stmfGroupList structure. On 3684 * success, it contains the list of target groups. 3685 */ 3686 int 3687 stmfGetTargetGroupList(stmfGroupList **targetGroupList) 3688 { 3689 int ret; 3690 3691 if (targetGroupList == NULL) { 3692 return (STMF_ERROR_INVALID_ARG); 3693 } 3694 3695 ret = groupListIoctl(targetGroupList, TARGET_GROUP); 3696 return (ret); 3697 } 3698 3699 /* 3700 * stmfGetTargetGroupMembers 3701 * 3702 * Purpose: Retrieves the group members for a target group 3703 * 3704 * groupName - name of target group for which to retrieve members. 3705 * groupProp - pointer to pointer to stmfGroupProperties structure 3706 * on success, this contains the list of group members. 3707 */ 3708 int 3709 stmfGetTargetGroupMembers(stmfGroupName *groupName, 3710 stmfGroupProperties **groupProp) 3711 { 3712 int ret; 3713 3714 if (groupName == NULL || groupProp == NULL) { 3715 return (STMF_ERROR_INVALID_ARG); 3716 } 3717 3718 ret = groupMemberListIoctl(groupName, groupProp, TARGET_GROUP); 3719 3720 return (ret); 3721 } 3722 3723 /* 3724 * stmfGetTargetList 3725 * 3726 * Purpose: Retrieves the list of target ports 3727 * 3728 * targetList - pointer to a pointer to an stmfDevidList structure. 3729 * On success, it contains the list of local ports (target). 3730 */ 3731 int 3732 stmfGetTargetList(stmfDevidList **targetList) 3733 { 3734 int ret; 3735 int fd; 3736 int ioctlRet; 3737 int i; 3738 stmf_iocdata_t stmfIoctl; 3739 /* framework target port list */ 3740 slist_target_port_t *fTargetList, *fTargetListP = NULL; 3741 uint32_t fTargetListSize; 3742 3743 if (targetList == NULL) { 3744 return (STMF_ERROR_INVALID_ARG); 3745 } 3746 3747 /* call init */ 3748 ret = initializeConfig(); 3749 if (ret != STMF_STATUS_SUCCESS) { 3750 return (ret); 3751 } 3752 3753 /* 3754 * Open control node for stmf 3755 */ 3756 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 3757 return (ret); 3758 3759 /* 3760 * Allocate ioctl input buffer 3761 */ 3762 fTargetListSize = ALLOC_TARGET_PORT * sizeof (slist_target_port_t); 3763 fTargetListP = fTargetList = 3764 (slist_target_port_t *)calloc(1, fTargetListSize); 3765 if (fTargetList == NULL) { 3766 ret = STMF_ERROR_NOMEM; 3767 goto done; 3768 } 3769 3770 bzero(&stmfIoctl, sizeof (stmfIoctl)); 3771 /* 3772 * Issue ioctl to retrieve target list 3773 */ 3774 stmfIoctl.stmf_version = STMF_VERSION_1; 3775 stmfIoctl.stmf_obuf_size = fTargetListSize; 3776 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)fTargetList; 3777 ioctlRet = ioctl(fd, STMF_IOCTL_TARGET_PORT_LIST, &stmfIoctl); 3778 if (ioctlRet != 0) { 3779 switch (errno) { 3780 case EBUSY: 3781 ret = STMF_ERROR_BUSY; 3782 break; 3783 case EPERM: 3784 case EACCES: 3785 ret = STMF_ERROR_PERM; 3786 break; 3787 default: 3788 syslog(LOG_DEBUG, 3789 "stmfGetTargetList:ioctl errno(%d)", errno); 3790 ret = STMF_STATUS_ERROR; 3791 break; 3792 } 3793 goto done; 3794 } 3795 /* 3796 * Check whether input buffer was large enough 3797 */ 3798 if (stmfIoctl.stmf_obuf_max_nentries > ALLOC_TARGET_PORT) { 3799 fTargetListSize = stmfIoctl.stmf_obuf_max_nentries * 3800 sizeof (slist_target_port_t); 3801 fTargetListP = fTargetList = 3802 realloc(fTargetList, fTargetListSize); 3803 if (fTargetList == NULL) { 3804 ret = STMF_ERROR_NOMEM; 3805 goto done; 3806 } 3807 stmfIoctl.stmf_obuf_size = fTargetListSize; 3808 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)fTargetList; 3809 ioctlRet = ioctl(fd, STMF_IOCTL_TARGET_PORT_LIST, 3810 &stmfIoctl); 3811 if (ioctlRet != 0) { 3812 switch (errno) { 3813 case EBUSY: 3814 ret = STMF_ERROR_BUSY; 3815 break; 3816 case EPERM: 3817 case EACCES: 3818 ret = STMF_ERROR_PERM; 3819 break; 3820 default: 3821 syslog(LOG_DEBUG, 3822 "stmfGetTargetList:ioctl errno(%d)", 3823 errno); 3824 ret = STMF_STATUS_ERROR; 3825 break; 3826 } 3827 goto done; 3828 } 3829 } 3830 3831 *targetList = (stmfDevidList *)calloc(1, 3832 stmfIoctl.stmf_obuf_max_nentries * sizeof (stmfDevid) + 3833 sizeof (stmfDevidList)); 3834 if (*targetList == NULL) { 3835 ret = STMF_ERROR_NOMEM; 3836 goto done; 3837 } 3838 3839 (*targetList)->cnt = stmfIoctl.stmf_obuf_max_nentries; 3840 for (i = 0; i < stmfIoctl.stmf_obuf_max_nentries; i++, fTargetList++) { 3841 (*targetList)->devid[i].identLength = 3842 fTargetList->target[IDENT_LENGTH_BYTE]; 3843 bcopy(&fTargetList->target[IDENT_LENGTH_BYTE + 1], 3844 &(*targetList)->devid[i].ident, 3845 fTargetList->target[IDENT_LENGTH_BYTE]); 3846 } 3847 3848 done: 3849 (void) close(fd); 3850 free(fTargetListP); 3851 return (ret); 3852 } 3853 3854 /* 3855 * stmfGetTargetProperties 3856 * 3857 * Purpose: Retrieves the properties for a logical unit 3858 * 3859 * devid - devid of the target for which to retrieve properties 3860 * targetProps - pointer to an stmfTargetProperties structure. 3861 * On success, it contains the target properties for 3862 * the specified devid. 3863 */ 3864 int 3865 stmfGetTargetProperties(stmfDevid *devid, stmfTargetProperties *targetProps) 3866 { 3867 int ret = STMF_STATUS_SUCCESS; 3868 int fd; 3869 int ioctlRet; 3870 stmf_iocdata_t stmfIoctl; 3871 sioc_target_port_props_t targetProperties; 3872 3873 if (devid == NULL || targetProps == NULL) { 3874 return (STMF_ERROR_INVALID_ARG); 3875 } 3876 3877 /* call init */ 3878 ret = initializeConfig(); 3879 if (ret != STMF_STATUS_SUCCESS) { 3880 return (ret); 3881 } 3882 3883 /* 3884 * Open control node for stmf 3885 */ 3886 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 3887 return (ret); 3888 3889 targetProperties.tgt_id[IDENT_LENGTH_BYTE] = devid->identLength; 3890 bcopy(&(devid->ident), &targetProperties.tgt_id[IDENT_LENGTH_BYTE + 1], 3891 devid->identLength); 3892 3893 bzero(&stmfIoctl, sizeof (stmfIoctl)); 3894 /* 3895 * Issue ioctl to add to the host group 3896 */ 3897 stmfIoctl.stmf_version = STMF_VERSION_1; 3898 stmfIoctl.stmf_ibuf_size = sizeof (targetProperties.tgt_id); 3899 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&targetProperties.tgt_id; 3900 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)&targetProperties; 3901 stmfIoctl.stmf_obuf_size = sizeof (targetProperties); 3902 ioctlRet = ioctl(fd, STMF_IOCTL_GET_TARGET_PORT_PROPERTIES, 3903 &stmfIoctl); 3904 if (ioctlRet != 0) { 3905 switch (errno) { 3906 case EBUSY: 3907 ret = STMF_ERROR_BUSY; 3908 break; 3909 case EPERM: 3910 case EACCES: 3911 ret = STMF_ERROR_PERM; 3912 break; 3913 case ENOENT: 3914 ret = STMF_ERROR_NOT_FOUND; 3915 break; 3916 default: 3917 syslog(LOG_DEBUG, 3918 "stmfGetTargetProperties:ioctl errno(%d)", 3919 errno); 3920 ret = STMF_STATUS_ERROR; 3921 break; 3922 } 3923 goto done; 3924 } 3925 3926 bcopy(targetProperties.tgt_provider_name, targetProps->providerName, 3927 sizeof (targetProperties.tgt_provider_name)); 3928 if (targetProperties.tgt_state == STMF_STATE_ONLINE) { 3929 targetProps->status = STMF_TARGET_PORT_ONLINE; 3930 } else if (targetProperties.tgt_state == STMF_STATE_OFFLINE) { 3931 targetProps->status = STMF_TARGET_PORT_OFFLINE; 3932 } else if (targetProperties.tgt_state == STMF_STATE_ONLINING) { 3933 targetProps->status = STMF_TARGET_PORT_ONLINING; 3934 } else if (targetProperties.tgt_state == STMF_STATE_OFFLINING) { 3935 targetProps->status = STMF_TARGET_PORT_OFFLINING; 3936 } 3937 bcopy(targetProperties.tgt_alias, targetProps->alias, 3938 sizeof (targetProps->alias)); 3939 done: 3940 (void) close(fd); 3941 return (ret); 3942 } 3943 3944 /* 3945 * stmfGetLogicalUnitList 3946 * 3947 * Purpose: Retrieves list of logical unit Object IDs 3948 * 3949 * luList - pointer to a pointer to a stmfGuidList structure. On success, 3950 * it contains the list of logical unit guids. 3951 * 3952 */ 3953 int 3954 stmfGetLogicalUnitList(stmfGuidList **luList) 3955 { 3956 int ret; 3957 int fd; 3958 int ioctlRet; 3959 int cmd = STMF_IOCTL_LU_LIST; 3960 int i; 3961 stmf_iocdata_t stmfIoctl; 3962 slist_lu_t *fLuList; 3963 uint32_t fLuListSize; 3964 uint32_t listCnt; 3965 3966 if (luList == NULL) { 3967 return (STMF_ERROR_INVALID_ARG); 3968 } 3969 3970 /* call init */ 3971 ret = initializeConfig(); 3972 if (ret != STMF_STATUS_SUCCESS) { 3973 return (ret); 3974 } 3975 3976 /* 3977 * Open control node for stmf 3978 */ 3979 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 3980 return (ret); 3981 3982 /* 3983 * Allocate ioctl input buffer 3984 */ 3985 fLuListSize = ALLOC_LU; 3986 fLuListSize = fLuListSize * (sizeof (slist_lu_t)); 3987 fLuList = (slist_lu_t *)calloc(1, fLuListSize); 3988 if (fLuList == NULL) { 3989 ret = STMF_ERROR_NOMEM; 3990 goto done; 3991 } 3992 3993 bzero(&stmfIoctl, sizeof (stmfIoctl)); 3994 /* 3995 * Issue ioctl to get the LU list 3996 */ 3997 stmfIoctl.stmf_version = STMF_VERSION_1; 3998 stmfIoctl.stmf_obuf_size = fLuListSize; 3999 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)fLuList; 4000 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 4001 if (ioctlRet != 0) { 4002 switch (errno) { 4003 case EBUSY: 4004 ret = STMF_ERROR_BUSY; 4005 break; 4006 case EPERM: 4007 case EACCES: 4008 ret = STMF_ERROR_PERM; 4009 break; 4010 default: 4011 syslog(LOG_DEBUG, 4012 "stmfGetLogicalUnitList:ioctl errno(%d)", 4013 errno); 4014 ret = STMF_STATUS_ERROR; 4015 break; 4016 } 4017 goto done; 4018 } 4019 /* 4020 * Check whether input buffer was large enough 4021 */ 4022 if (stmfIoctl.stmf_obuf_max_nentries > ALLOC_LU) { 4023 fLuListSize = stmfIoctl.stmf_obuf_max_nentries * 4024 sizeof (slist_lu_t); 4025 free(fLuList); 4026 fLuList = (slist_lu_t *)calloc(1, fLuListSize); 4027 if (fLuList == NULL) { 4028 ret = STMF_ERROR_NOMEM; 4029 goto done; 4030 } 4031 stmfIoctl.stmf_obuf_size = fLuListSize; 4032 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)fLuList; 4033 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 4034 if (ioctlRet != 0) { 4035 switch (errno) { 4036 case EBUSY: 4037 ret = STMF_ERROR_BUSY; 4038 break; 4039 case EPERM: 4040 case EACCES: 4041 ret = STMF_ERROR_PERM; 4042 break; 4043 default: 4044 syslog(LOG_DEBUG, 4045 "stmfGetLogicalUnitList:" 4046 "ioctl errno(%d)", errno); 4047 ret = STMF_STATUS_ERROR; 4048 break; 4049 } 4050 goto done; 4051 } 4052 } 4053 4054 if (ret != STMF_STATUS_SUCCESS) { 4055 goto done; 4056 } 4057 4058 listCnt = stmfIoctl.stmf_obuf_nentries; 4059 4060 /* 4061 * allocate caller's buffer with the final size 4062 */ 4063 *luList = (stmfGuidList *)calloc(1, sizeof (stmfGuidList) + 4064 listCnt * sizeof (stmfGuid)); 4065 if (*luList == NULL) { 4066 ret = STMF_ERROR_NOMEM; 4067 goto done; 4068 } 4069 4070 (*luList)->cnt = listCnt; 4071 4072 /* copy to caller's buffer */ 4073 for (i = 0; i < listCnt; i++) { 4074 bcopy(&fLuList[i].lu_guid, (*luList)->guid[i].guid, 4075 sizeof (stmfGuid)); 4076 } 4077 4078 /* 4079 * sort the list. This gives a consistent view across gets 4080 */ 4081 qsort((void *)&((*luList)->guid[0]), (*luList)->cnt, 4082 sizeof (stmfGuid), guidCompare); 4083 4084 done: 4085 (void) close(fd); 4086 /* 4087 * free internal buffers 4088 */ 4089 free(fLuList); 4090 return (ret); 4091 } 4092 4093 /* 4094 * stmfGetLogicalUnitProperties 4095 * 4096 * Purpose: Retrieves the properties for a logical unit 4097 * 4098 * lu - guid of the logical unit for which to retrieve properties 4099 * stmfLuProps - pointer to an stmfLogicalUnitProperties structure. On success, 4100 * it contains the logical unit properties for the specified guid. 4101 */ 4102 int 4103 stmfGetLogicalUnitProperties(stmfGuid *lu, stmfLogicalUnitProperties *luProps) 4104 { 4105 int ret = STMF_STATUS_SUCCESS; 4106 int stmfRet; 4107 int fd; 4108 int ioctlRet; 4109 int cmd = STMF_IOCTL_GET_LU_PROPERTIES; 4110 stmfViewEntryList *viewEntryList = NULL; 4111 stmf_iocdata_t stmfIoctl; 4112 sioc_lu_props_t fLuProps; 4113 4114 if (lu == NULL || luProps == NULL) { 4115 return (STMF_ERROR_INVALID_ARG); 4116 } 4117 4118 bzero(luProps, sizeof (stmfLogicalUnitProperties)); 4119 4120 /* call init */ 4121 ret = initializeConfig(); 4122 if (ret != STMF_STATUS_SUCCESS) { 4123 return (ret); 4124 } 4125 4126 /* 4127 * Open control node for stmf 4128 */ 4129 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 4130 return (ret); 4131 4132 bzero(&stmfIoctl, sizeof (stmfIoctl)); 4133 /* 4134 * Issue ioctl to add to the host group 4135 */ 4136 stmfIoctl.stmf_version = STMF_VERSION_1; 4137 stmfIoctl.stmf_ibuf_size = sizeof (stmfGuid); 4138 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)lu; 4139 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)&fLuProps; 4140 stmfIoctl.stmf_obuf_size = sizeof (fLuProps); 4141 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 4142 if (ioctlRet != 0) { 4143 switch (errno) { 4144 case EBUSY: 4145 ret = STMF_ERROR_BUSY; 4146 break; 4147 case EPERM: 4148 case EACCES: 4149 ret = STMF_ERROR_PERM; 4150 break; 4151 case ENOENT: 4152 stmfRet = stmfGetViewEntryList(lu, 4153 &viewEntryList); 4154 if (stmfRet == STMF_STATUS_SUCCESS) { 4155 luProps->status = 4156 STMF_LOGICAL_UNIT_UNREGISTERED; 4157 if (viewEntryList->cnt > 0) { 4158 ret = STMF_STATUS_SUCCESS; 4159 } else { 4160 ret = STMF_ERROR_NOT_FOUND; 4161 } 4162 } else { 4163 ret = STMF_ERROR_NOT_FOUND; 4164 } 4165 stmfFreeMemory(viewEntryList); 4166 break; 4167 default: 4168 syslog(LOG_DEBUG, 4169 "stmfGetLogicalUnit:ioctl errno(%d)", 4170 errno); 4171 ret = STMF_STATUS_ERROR; 4172 break; 4173 } 4174 goto done; 4175 } 4176 4177 bcopy(fLuProps.lu_provider_name, luProps->providerName, 4178 sizeof (fLuProps.lu_provider_name)); 4179 if (fLuProps.lu_state == STMF_STATE_ONLINE) { 4180 luProps->status = STMF_LOGICAL_UNIT_ONLINE; 4181 } else if (fLuProps.lu_state == STMF_STATE_OFFLINE) { 4182 luProps->status = STMF_LOGICAL_UNIT_OFFLINE; 4183 } else if (fLuProps.lu_state == STMF_STATE_ONLINING) { 4184 luProps->status = STMF_LOGICAL_UNIT_ONLINING; 4185 } else if (fLuProps.lu_state == STMF_STATE_OFFLINING) { 4186 luProps->status = STMF_LOGICAL_UNIT_OFFLINING; 4187 } 4188 bcopy(fLuProps.lu_alias, luProps->alias, sizeof (luProps->alias)); 4189 done: 4190 (void) close(fd); 4191 return (ret); 4192 } 4193 4194 /* 4195 * stmfGetState 4196 * 4197 * Purpose: retrieve the current state of the stmf module 4198 * 4199 * state - pointer to stmfState structure allocated by the caller 4200 * On success, contains the state of stmf 4201 */ 4202 int 4203 stmfGetState(stmfState *state) 4204 { 4205 int ret; 4206 stmf_state_desc_t iState; 4207 4208 if (state == NULL) { 4209 return (STMF_ERROR_INVALID_ARG); 4210 } 4211 4212 ret = getStmfState(&iState); 4213 if (ret != STMF_STATUS_SUCCESS) { 4214 return (ret); 4215 } 4216 switch (iState.state) { 4217 case STMF_STATE_ONLINE: 4218 state->operationalState = 4219 STMF_SERVICE_STATE_ONLINE; 4220 break; 4221 case STMF_STATE_OFFLINE: 4222 state->operationalState = 4223 STMF_SERVICE_STATE_OFFLINE; 4224 break; 4225 case STMF_STATE_ONLINING: 4226 state->operationalState = 4227 STMF_SERVICE_STATE_ONLINING; 4228 break; 4229 case STMF_STATE_OFFLINING: 4230 state->operationalState = 4231 STMF_SERVICE_STATE_OFFLINING; 4232 break; 4233 default: 4234 state->operationalState = 4235 STMF_SERVICE_STATE_UNKNOWN; 4236 break; 4237 } 4238 switch (iState.config_state) { 4239 case STMF_CONFIG_NONE: 4240 state->configState = STMF_CONFIG_STATE_NONE; 4241 break; 4242 case STMF_CONFIG_INIT: 4243 state->configState = STMF_CONFIG_STATE_INIT; 4244 break; 4245 case STMF_CONFIG_INIT_DONE: 4246 state->configState = 4247 STMF_CONFIG_STATE_INIT_DONE; 4248 break; 4249 default: 4250 state->configState = 4251 STMF_CONFIG_STATE_UNKNOWN; 4252 break; 4253 } 4254 return (STMF_STATUS_SUCCESS); 4255 } 4256 4257 /* 4258 * stmfGetViewEntryList 4259 * 4260 * Purpose: Retrieves the list of view entries for the specified 4261 * logical unit. 4262 * 4263 * lu - the guid of the logical unit for which to retrieve the view entry list 4264 * viewEntryList - a pointer to a pointer to a stmfViewEntryList structure. On 4265 * success, contains the list of view entries. 4266 */ 4267 int 4268 stmfGetViewEntryList(stmfGuid *lu, stmfViewEntryList **viewEntryList) 4269 { 4270 int ret; 4271 int fd; 4272 int ioctlRet; 4273 int cmd = STMF_IOCTL_LU_VE_LIST; 4274 int i; 4275 stmf_iocdata_t stmfIoctl; 4276 stmf_view_op_entry_t *fVeList; 4277 uint32_t fVeListSize; 4278 uint32_t listCnt; 4279 4280 if (lu == NULL || viewEntryList == NULL) { 4281 return (STMF_ERROR_INVALID_ARG); 4282 } 4283 4284 /* call init */ 4285 ret = initializeConfig(); 4286 if (ret != STMF_STATUS_SUCCESS) { 4287 return (ret); 4288 } 4289 4290 /* 4291 * Open control node for stmf 4292 */ 4293 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 4294 return (ret); 4295 4296 /* 4297 * Allocate ioctl input buffer 4298 */ 4299 fVeListSize = ALLOC_VE; 4300 fVeListSize = fVeListSize * (sizeof (stmf_view_op_entry_t)); 4301 fVeList = (stmf_view_op_entry_t *)calloc(1, fVeListSize); 4302 if (fVeList == NULL) { 4303 ret = STMF_ERROR_NOMEM; 4304 goto done; 4305 } 4306 4307 bzero(&stmfIoctl, sizeof (stmfIoctl)); 4308 /* 4309 * Issue ioctl to get the LU list 4310 */ 4311 stmfIoctl.stmf_version = STMF_VERSION_1; 4312 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)lu; 4313 stmfIoctl.stmf_ibuf_size = sizeof (stmfGuid); 4314 stmfIoctl.stmf_obuf_size = fVeListSize; 4315 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)fVeList; 4316 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 4317 if (ioctlRet != 0) { 4318 switch (errno) { 4319 case EBUSY: 4320 ret = STMF_ERROR_BUSY; 4321 break; 4322 case EPERM: 4323 case EACCES: 4324 ret = STMF_ERROR_PERM; 4325 break; 4326 default: 4327 syslog(LOG_DEBUG, 4328 "stmfGetViewEntryList:ioctl errno(%d)", 4329 errno); 4330 ret = STMF_STATUS_ERROR; 4331 break; 4332 } 4333 goto done; 4334 } 4335 /* 4336 * Check whether input buffer was large enough 4337 */ 4338 if (stmfIoctl.stmf_obuf_max_nentries > ALLOC_VE) { 4339 bzero(&stmfIoctl, sizeof (stmfIoctl)); 4340 fVeListSize = stmfIoctl.stmf_obuf_max_nentries * 4341 sizeof (stmf_view_op_entry_t); 4342 free(fVeList); 4343 fVeList = (stmf_view_op_entry_t *)calloc(1, fVeListSize); 4344 if (fVeList == NULL) { 4345 return (STMF_ERROR_NOMEM); 4346 } 4347 stmfIoctl.stmf_obuf_size = fVeListSize; 4348 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)fVeList; 4349 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 4350 if (ioctlRet != 0) { 4351 switch (errno) { 4352 case EBUSY: 4353 ret = STMF_ERROR_BUSY; 4354 break; 4355 case EPERM: 4356 case EACCES: 4357 ret = STMF_ERROR_PERM; 4358 break; 4359 default: 4360 syslog(LOG_DEBUG, 4361 "stmfGetLogicalUnitList:" 4362 "ioctl errno(%d)", errno); 4363 ret = STMF_STATUS_ERROR; 4364 break; 4365 } 4366 goto done; 4367 } 4368 } 4369 4370 if (ret != STMF_STATUS_SUCCESS) { 4371 goto done; 4372 } 4373 4374 if (stmfIoctl.stmf_obuf_nentries == 0) { 4375 ret = STMF_ERROR_NOT_FOUND; 4376 goto done; 4377 } 4378 4379 listCnt = stmfIoctl.stmf_obuf_nentries; 4380 4381 /* 4382 * allocate caller's buffer with the final size 4383 */ 4384 *viewEntryList = (stmfViewEntryList *)calloc(1, 4385 sizeof (stmfViewEntryList) + listCnt * sizeof (stmfViewEntry)); 4386 if (*viewEntryList == NULL) { 4387 ret = STMF_ERROR_NOMEM; 4388 goto done; 4389 } 4390 4391 (*viewEntryList)->cnt = listCnt; 4392 4393 /* copy to caller's buffer */ 4394 for (i = 0; i < listCnt; i++) { 4395 (*viewEntryList)->ve[i].veIndexValid = B_TRUE; 4396 (*viewEntryList)->ve[i].veIndex = fVeList[i].ve_ndx; 4397 if (fVeList[i].ve_all_hosts == 1) { 4398 (*viewEntryList)->ve[i].allHosts = B_TRUE; 4399 } else { 4400 bcopy(fVeList[i].ve_host_group.name, 4401 (*viewEntryList)->ve[i].hostGroup, 4402 fVeList[i].ve_host_group.name_size); 4403 } 4404 if (fVeList[i].ve_all_targets == 1) { 4405 (*viewEntryList)->ve[i].allTargets = B_TRUE; 4406 } else { 4407 bcopy(fVeList[i].ve_target_group.name, 4408 (*viewEntryList)->ve[i].targetGroup, 4409 fVeList[i].ve_target_group.name_size); 4410 } 4411 bcopy(fVeList[i].ve_lu_nbr, (*viewEntryList)->ve[i].luNbr, 4412 sizeof ((*viewEntryList)->ve[i].luNbr)); 4413 (*viewEntryList)->ve[i].luNbrValid = B_TRUE; 4414 } 4415 4416 /* 4417 * sort the list. This gives a consistent view across gets 4418 */ 4419 qsort((void *)&((*viewEntryList)->ve[0]), (*viewEntryList)->cnt, 4420 sizeof (stmfViewEntry), viewEntryCompare); 4421 4422 done: 4423 (void) close(fd); 4424 /* 4425 * free internal buffers 4426 */ 4427 free(fVeList); 4428 return (ret); 4429 } 4430 4431 4432 /* 4433 * loadHostGroups 4434 * 4435 * Purpose - issues the ioctl to load the host groups into stmf 4436 * 4437 * fd - file descriptor for the control node of stmf. 4438 * groupList - populated host group list 4439 */ 4440 static int 4441 loadHostGroups(int fd, stmfGroupList *groupList) 4442 { 4443 int i, j; 4444 int ret = STMF_STATUS_SUCCESS; 4445 stmfGroupProperties *groupProps = NULL; 4446 4447 for (i = 0; i < groupList->cnt; i++) { 4448 if ((ret = groupIoctl(fd, STMF_IOCTL_CREATE_HOST_GROUP, 4449 &(groupList->name[i]))) != STMF_STATUS_SUCCESS) { 4450 goto out; 4451 } 4452 ret = iLoadGroupMembersFromPs(&(groupList->name[i]), 4453 &groupProps, HOST_GROUP); 4454 for (j = 0; j < groupProps->cnt; j++) { 4455 if ((ret = groupMemberIoctl(fd, STMF_IOCTL_ADD_HG_ENTRY, 4456 &(groupList->name[i]), &(groupProps->name[j]))) 4457 != STMF_STATUS_SUCCESS) { 4458 goto out; 4459 } 4460 } 4461 } 4462 4463 4464 out: 4465 stmfFreeMemory(groupProps); 4466 return (ret); 4467 } 4468 4469 /* 4470 * loadTargetGroups 4471 * 4472 * Purpose - issues the ioctl to load the target groups into stmf 4473 * 4474 * fd - file descriptor for the control node of stmf. 4475 * groupList - populated target group list. 4476 */ 4477 static int 4478 loadTargetGroups(int fd, stmfGroupList *groupList) 4479 { 4480 int i, j; 4481 int ret = STMF_STATUS_SUCCESS; 4482 stmfGroupProperties *groupProps = NULL; 4483 4484 for (i = 0; i < groupList->cnt; i++) { 4485 if ((ret = groupIoctl(fd, STMF_IOCTL_CREATE_TARGET_GROUP, 4486 &(groupList->name[i]))) != STMF_STATUS_SUCCESS) { 4487 goto out; 4488 } 4489 ret = iLoadGroupMembersFromPs(&(groupList->name[i]), 4490 &groupProps, TARGET_GROUP); 4491 for (j = 0; j < groupProps->cnt; j++) { 4492 if ((ret = groupMemberIoctl(fd, STMF_IOCTL_ADD_TG_ENTRY, 4493 &(groupList->name[i]), &(groupProps->name[j]))) 4494 != STMF_STATUS_SUCCESS) { 4495 goto out; 4496 } 4497 } 4498 } 4499 4500 4501 out: 4502 stmfFreeMemory(groupProps); 4503 return (ret); 4504 } 4505 4506 4507 /* 4508 * loadStore 4509 * 4510 * Purpose: Load the configuration data from the store 4511 * 4512 * First load the host groups and target groups, then the view entries 4513 * and finally the provider data 4514 * 4515 * fd - file descriptor of control node for stmf. 4516 */ 4517 static int 4518 loadStore(int fd) 4519 { 4520 int ret; 4521 int i, j; 4522 stmfGroupList *groupList = NULL; 4523 stmfGuidList *guidList = NULL; 4524 stmfViewEntryList *viewEntryList = NULL; 4525 stmfProviderList *providerList = NULL; 4526 int providerType; 4527 nvlist_t *nvl = NULL; 4528 4529 4530 4531 /* load host groups */ 4532 ret = iLoadGroupFromPs(&groupList, HOST_GROUP); 4533 if (ret != STMF_STATUS_SUCCESS) { 4534 return (ret); 4535 } 4536 ret = loadHostGroups(fd, groupList); 4537 if (ret != STMF_STATUS_SUCCESS) { 4538 goto out; 4539 } 4540 4541 stmfFreeMemory(groupList); 4542 groupList = NULL; 4543 4544 /* load target groups */ 4545 ret = iLoadGroupFromPs(&groupList, TARGET_GROUP); 4546 if (ret != STMF_STATUS_SUCCESS) { 4547 goto out; 4548 } 4549 ret = loadTargetGroups(fd, groupList); 4550 if (ret != STMF_STATUS_SUCCESS) { 4551 goto out; 4552 } 4553 4554 stmfFreeMemory(groupList); 4555 groupList = NULL; 4556 4557 /* Get the guid list */ 4558 ret = psGetLogicalUnitList(&guidList); 4559 switch (ret) { 4560 case STMF_PS_SUCCESS: 4561 ret = STMF_STATUS_SUCCESS; 4562 break; 4563 case STMF_PS_ERROR_NOT_FOUND: 4564 ret = STMF_ERROR_NOT_FOUND; 4565 break; 4566 case STMF_PS_ERROR_BUSY: 4567 ret = STMF_ERROR_BUSY; 4568 break; 4569 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 4570 ret = STMF_ERROR_SERVICE_NOT_FOUND; 4571 break; 4572 case STMF_PS_ERROR_VERSION_MISMATCH: 4573 ret = STMF_ERROR_SERVICE_DATA_VERSION; 4574 break; 4575 default: 4576 ret = STMF_STATUS_ERROR; 4577 break; 4578 } 4579 4580 if (ret != STMF_STATUS_SUCCESS) { 4581 goto out; 4582 } 4583 4584 /* 4585 * We have the guid list, now get the corresponding 4586 * view entries for each guid 4587 */ 4588 for (i = 0; i < guidList->cnt; i++) { 4589 ret = psGetViewEntryList(&guidList->guid[i], &viewEntryList); 4590 switch (ret) { 4591 case STMF_PS_SUCCESS: 4592 ret = STMF_STATUS_SUCCESS; 4593 break; 4594 case STMF_PS_ERROR_NOT_FOUND: 4595 ret = STMF_ERROR_NOT_FOUND; 4596 break; 4597 case STMF_PS_ERROR_BUSY: 4598 ret = STMF_ERROR_BUSY; 4599 break; 4600 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 4601 ret = STMF_ERROR_SERVICE_NOT_FOUND; 4602 break; 4603 case STMF_PS_ERROR_VERSION_MISMATCH: 4604 ret = STMF_ERROR_SERVICE_DATA_VERSION; 4605 break; 4606 default: 4607 ret = STMF_STATUS_ERROR; 4608 break; 4609 } 4610 if (ret != STMF_STATUS_SUCCESS) { 4611 goto out; 4612 } 4613 for (j = 0; j < viewEntryList->cnt; j++) { 4614 ret = addViewEntryIoctl(fd, &guidList->guid[i], 4615 &viewEntryList->ve[j]); 4616 if (ret != STMF_STATUS_SUCCESS) { 4617 goto out; 4618 } 4619 } 4620 } 4621 4622 /* get the list of providers that have data */ 4623 ret = psGetProviderDataList(&providerList); 4624 switch (ret) { 4625 case STMF_PS_SUCCESS: 4626 ret = STMF_STATUS_SUCCESS; 4627 break; 4628 case STMF_PS_ERROR_NOT_FOUND: 4629 ret = STMF_ERROR_NOT_FOUND; 4630 break; 4631 case STMF_PS_ERROR_BUSY: 4632 ret = STMF_ERROR_BUSY; 4633 break; 4634 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 4635 ret = STMF_ERROR_SERVICE_NOT_FOUND; 4636 break; 4637 case STMF_PS_ERROR_VERSION_MISMATCH: 4638 ret = STMF_ERROR_SERVICE_DATA_VERSION; 4639 break; 4640 default: 4641 ret = STMF_STATUS_ERROR; 4642 break; 4643 } 4644 if (ret != STMF_STATUS_SUCCESS) { 4645 goto out; 4646 } 4647 4648 for (i = 0; i < providerList->cnt; i++) { 4649 providerType = providerList->provider[i].providerType; 4650 ret = psGetProviderData(providerList->provider[i].name, 4651 &nvl, providerType, NULL); 4652 switch (ret) { 4653 case STMF_PS_SUCCESS: 4654 ret = STMF_STATUS_SUCCESS; 4655 break; 4656 case STMF_PS_ERROR_NOT_FOUND: 4657 ret = STMF_ERROR_NOT_FOUND; 4658 break; 4659 case STMF_PS_ERROR_BUSY: 4660 ret = STMF_ERROR_BUSY; 4661 break; 4662 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 4663 ret = STMF_ERROR_SERVICE_NOT_FOUND; 4664 break; 4665 case STMF_PS_ERROR_VERSION_MISMATCH: 4666 ret = STMF_ERROR_SERVICE_DATA_VERSION; 4667 break; 4668 default: 4669 ret = STMF_STATUS_ERROR; 4670 break; 4671 } 4672 if (ret != STMF_STATUS_SUCCESS) { 4673 goto out; 4674 } 4675 4676 /* call setProviderData */ 4677 ret = setProviderData(fd, providerList->provider[i].name, nvl, 4678 providerType, NULL); 4679 switch (ret) { 4680 case STMF_PS_SUCCESS: 4681 ret = STMF_STATUS_SUCCESS; 4682 break; 4683 case STMF_PS_ERROR_NOT_FOUND: 4684 ret = STMF_ERROR_NOT_FOUND; 4685 break; 4686 case STMF_PS_ERROR_BUSY: 4687 ret = STMF_ERROR_BUSY; 4688 break; 4689 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 4690 ret = STMF_ERROR_SERVICE_NOT_FOUND; 4691 break; 4692 case STMF_PS_ERROR_VERSION_MISMATCH: 4693 ret = STMF_ERROR_SERVICE_DATA_VERSION; 4694 break; 4695 default: 4696 ret = STMF_STATUS_ERROR; 4697 break; 4698 } 4699 if (ret != STMF_STATUS_SUCCESS) { 4700 goto out; 4701 } 4702 4703 nvlist_free(nvl); 4704 nvl = NULL; 4705 } 4706 out: 4707 if (groupList != NULL) { 4708 free(groupList); 4709 } 4710 if (guidList != NULL) { 4711 free(guidList); 4712 } 4713 if (viewEntryList != NULL) { 4714 free(viewEntryList); 4715 } 4716 if (nvl != NULL) { 4717 nvlist_free(nvl); 4718 } 4719 return (ret); 4720 } 4721 4722 /* 4723 * stmfLoadConfig 4724 * 4725 * Purpose - load the configuration data from smf into stmf 4726 * 4727 */ 4728 int 4729 stmfLoadConfig(void) 4730 { 4731 int ret = STMF_STATUS_SUCCESS; 4732 int fd; 4733 stmf_state_desc_t stmfStateSet; 4734 stmfState state; 4735 4736 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 4737 stmfStateSet.state = STMF_STATE_OFFLINE; 4738 4739 if ((ret = openStmf(OPEN_EXCL_STMF, &fd)) 4740 != STMF_STATUS_SUCCESS) { 4741 return (ret); 4742 } 4743 /* 4744 * Configuration not stored persistently; nothing to 4745 * initialize so do not set to STMF_CONFIG_INIT. 4746 */ 4747 stmfStateSet.config_state = STMF_CONFIG_INIT_DONE; 4748 goto done; 4749 } 4750 4751 /* Check to ensure service exists */ 4752 if (psCheckService() != STMF_STATUS_SUCCESS) { 4753 return (STMF_ERROR_SERVICE_NOT_FOUND); 4754 } 4755 4756 ret = stmfGetState(&state); 4757 if (ret == STMF_STATUS_SUCCESS) { 4758 if (state.operationalState != STMF_SERVICE_STATE_OFFLINE) { 4759 return (STMF_ERROR_SERVICE_ONLINE); 4760 } 4761 } else { 4762 return (STMF_STATUS_ERROR); 4763 } 4764 4765 4766 stmfStateSet.state = STMF_STATE_OFFLINE; 4767 stmfStateSet.config_state = STMF_CONFIG_INIT; 4768 4769 /* 4770 * Open control node for stmf 4771 */ 4772 if ((ret = openStmf(OPEN_EXCL_STMF, &fd)) != STMF_STATUS_SUCCESS) 4773 return (ret); 4774 4775 ret = setStmfState(fd, &stmfStateSet, STMF_SERVICE_TYPE); 4776 if (ret != STMF_STATUS_SUCCESS) { 4777 goto done; 4778 } 4779 4780 /* Load the persistent configuration data */ 4781 ret = loadStore(fd); 4782 if (ret != 0) { 4783 goto done; 4784 } 4785 4786 stmfStateSet.state = STMF_STATE_OFFLINE; 4787 stmfStateSet.config_state = STMF_CONFIG_INIT_DONE; 4788 4789 done: 4790 if (ret == STMF_STATUS_SUCCESS) { 4791 ret = setStmfState(fd, &stmfStateSet, STMF_SERVICE_TYPE); 4792 } 4793 (void) close(fd); 4794 return (ret); 4795 } 4796 4797 4798 /* 4799 * getStmfState 4800 * 4801 * stmfState - pointer to stmf_state_desc_t structure. Will contain the state 4802 * information of the stmf service on success. 4803 */ 4804 static int 4805 getStmfState(stmf_state_desc_t *stmfState) 4806 { 4807 int ret = STMF_STATUS_SUCCESS; 4808 int fd; 4809 int ioctlRet; 4810 stmf_iocdata_t stmfIoctl; 4811 4812 /* 4813 * Open control node for stmf 4814 */ 4815 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 4816 return (ret); 4817 4818 bzero(&stmfIoctl, sizeof (stmfIoctl)); 4819 /* 4820 * Issue ioctl to get the stmf state 4821 */ 4822 stmfIoctl.stmf_version = STMF_VERSION_1; 4823 stmfIoctl.stmf_ibuf_size = sizeof (stmf_state_desc_t); 4824 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)stmfState; 4825 stmfIoctl.stmf_obuf_size = sizeof (stmf_state_desc_t); 4826 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)stmfState; 4827 ioctlRet = ioctl(fd, STMF_IOCTL_GET_STMF_STATE, &stmfIoctl); 4828 4829 (void) close(fd); 4830 4831 if (ioctlRet != 0) { 4832 switch (errno) { 4833 case EBUSY: 4834 ret = STMF_ERROR_BUSY; 4835 break; 4836 case EPERM: 4837 case EACCES: 4838 ret = STMF_ERROR_PERM; 4839 break; 4840 default: 4841 syslog(LOG_DEBUG, 4842 "getStmfState:ioctl errno(%d)", errno); 4843 ret = STMF_STATUS_ERROR; 4844 break; 4845 } 4846 } 4847 return (ret); 4848 } 4849 4850 4851 /* 4852 * setStmfState 4853 * 4854 * stmfState - pointer to caller set state structure 4855 * objectType - one of: 4856 * LOGICAL_UNIT_TYPE 4857 * TARGET_TYPE 4858 * STMF_SERVICE_TYPE 4859 */ 4860 static int 4861 setStmfState(int fd, stmf_state_desc_t *stmfState, int objectType) 4862 { 4863 int ret = STMF_STATUS_SUCCESS; 4864 int ioctlRet; 4865 int cmd; 4866 stmf_iocdata_t stmfIoctl; 4867 4868 switch (objectType) { 4869 case LOGICAL_UNIT_TYPE: 4870 cmd = STMF_IOCTL_SET_LU_STATE; 4871 break; 4872 case TARGET_TYPE: 4873 cmd = STMF_IOCTL_SET_TARGET_PORT_STATE; 4874 break; 4875 case STMF_SERVICE_TYPE: 4876 cmd = STMF_IOCTL_SET_STMF_STATE; 4877 break; 4878 default: 4879 ret = STMF_STATUS_ERROR; 4880 goto done; 4881 } 4882 4883 bzero(&stmfIoctl, sizeof (stmfIoctl)); 4884 /* 4885 * Issue ioctl to set the stmf state 4886 */ 4887 stmfIoctl.stmf_version = STMF_VERSION_1; 4888 stmfIoctl.stmf_ibuf_size = sizeof (stmf_state_desc_t); 4889 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)stmfState; 4890 ioctlRet = ioctl(fd, cmd, &stmfIoctl); 4891 if (ioctlRet != 0) { 4892 switch (errno) { 4893 case EBUSY: 4894 ret = STMF_ERROR_BUSY; 4895 break; 4896 case EPERM: 4897 case EACCES: 4898 ret = STMF_ERROR_PERM; 4899 break; 4900 case ENOENT: 4901 ret = STMF_ERROR_NOT_FOUND; 4902 break; 4903 default: 4904 syslog(LOG_DEBUG, 4905 "setStmfState:ioctl errno(%d)", errno); 4906 ret = STMF_STATUS_ERROR; 4907 break; 4908 } 4909 } 4910 done: 4911 return (ret); 4912 } 4913 4914 /* 4915 * stmfOnline 4916 * 4917 * Purpose: Online stmf service 4918 * 4919 */ 4920 int 4921 stmfOnline(void) 4922 { 4923 int ret; 4924 int fd; 4925 stmfState state; 4926 stmf_state_desc_t iState; 4927 4928 ret = stmfGetState(&state); 4929 if (ret == STMF_STATUS_SUCCESS) { 4930 if (state.operationalState == STMF_SERVICE_STATE_ONLINE) { 4931 return (STMF_ERROR_SERVICE_ONLINE); 4932 } 4933 } else { 4934 return (STMF_STATUS_ERROR); 4935 } 4936 iState.state = STMF_STATE_ONLINE; 4937 iState.config_state = STMF_CONFIG_NONE; 4938 /* 4939 * Open control node for stmf 4940 * to make call to setStmfState() 4941 */ 4942 if ((ret = openStmf(OPEN_EXCL_STMF, &fd)) != STMF_STATUS_SUCCESS) 4943 return (ret); 4944 ret = setStmfState(fd, &iState, STMF_SERVICE_TYPE); 4945 (void) close(fd); 4946 return (ret); 4947 } 4948 4949 /* 4950 * stmfOffline 4951 * 4952 * Purpose: Offline stmf service 4953 * 4954 */ 4955 int 4956 stmfOffline(void) 4957 { 4958 int ret; 4959 int fd; 4960 stmfState state; 4961 stmf_state_desc_t iState; 4962 4963 ret = stmfGetState(&state); 4964 if (ret == STMF_STATUS_SUCCESS) { 4965 if (state.operationalState == STMF_SERVICE_STATE_OFFLINE) { 4966 return (STMF_ERROR_SERVICE_OFFLINE); 4967 } 4968 } else { 4969 return (STMF_STATUS_ERROR); 4970 } 4971 iState.state = STMF_STATE_OFFLINE; 4972 iState.config_state = STMF_CONFIG_NONE; 4973 4974 /* 4975 * Open control node for stmf 4976 * to make call to setStmfState() 4977 */ 4978 if ((ret = openStmf(OPEN_EXCL_STMF, &fd)) != STMF_STATUS_SUCCESS) 4979 return (ret); 4980 ret = setStmfState(fd, &iState, STMF_SERVICE_TYPE); 4981 (void) close(fd); 4982 return (ret); 4983 } 4984 4985 4986 /* 4987 * stmfOfflineTarget 4988 * 4989 * Purpose: Change state of target to offline 4990 * 4991 * devid - devid of the target to offline 4992 */ 4993 int 4994 stmfOfflineTarget(stmfDevid *devid) 4995 { 4996 stmf_state_desc_t targetState; 4997 int ret = STMF_STATUS_SUCCESS; 4998 int fd; 4999 5000 if (devid == NULL) { 5001 return (STMF_ERROR_INVALID_ARG); 5002 } 5003 bzero(&targetState, sizeof (targetState)); 5004 5005 targetState.state = STMF_STATE_OFFLINE; 5006 targetState.ident[IDENT_LENGTH_BYTE] = devid->identLength; 5007 bcopy(&(devid->ident), &targetState.ident[IDENT_LENGTH_BYTE + 1], 5008 devid->identLength); 5009 /* 5010 * Open control node for stmf 5011 * to make call to setStmfState() 5012 */ 5013 if ((ret = openStmf(OPEN_EXCL_STMF, &fd)) != STMF_STATUS_SUCCESS) 5014 return (ret); 5015 ret = setStmfState(fd, &targetState, TARGET_TYPE); 5016 (void) close(fd); 5017 return (ret); 5018 } 5019 5020 /* 5021 * stmfOfflineLogicalUnit 5022 * 5023 * Purpose: Change state of logical unit to offline 5024 * 5025 * lu - guid of the logical unit to offline 5026 */ 5027 int 5028 stmfOfflineLogicalUnit(stmfGuid *lu) 5029 { 5030 stmf_state_desc_t luState; 5031 int ret = STMF_STATUS_SUCCESS; 5032 int fd; 5033 5034 if (lu == NULL) { 5035 return (STMF_ERROR_INVALID_ARG); 5036 } 5037 5038 bzero(&luState, sizeof (luState)); 5039 5040 luState.state = STMF_STATE_OFFLINE; 5041 bcopy(lu, &luState.ident, sizeof (stmfGuid)); 5042 /* 5043 * Open control node for stmf 5044 * to make call to setStmfState() 5045 */ 5046 if ((ret = openStmf(OPEN_EXCL_STMF, &fd)) != STMF_STATUS_SUCCESS) 5047 return (ret); 5048 ret = setStmfState(fd, &luState, LOGICAL_UNIT_TYPE); 5049 (void) close(fd); 5050 return (ret); 5051 } 5052 5053 /* 5054 * stmfOnlineTarget 5055 * 5056 * Purpose: Change state of target to online 5057 * 5058 * devid - devid of the target to online 5059 */ 5060 int 5061 stmfOnlineTarget(stmfDevid *devid) 5062 { 5063 stmf_state_desc_t targetState; 5064 int ret = STMF_STATUS_SUCCESS; 5065 int fd; 5066 5067 if (devid == NULL) { 5068 return (STMF_ERROR_INVALID_ARG); 5069 } 5070 bzero(&targetState, sizeof (targetState)); 5071 5072 targetState.state = STMF_STATE_ONLINE; 5073 targetState.ident[IDENT_LENGTH_BYTE] = devid->identLength; 5074 bcopy(&(devid->ident), &targetState.ident[IDENT_LENGTH_BYTE + 1], 5075 devid->identLength); 5076 /* 5077 * Open control node for stmf 5078 * to make call to setStmfState() 5079 */ 5080 if ((ret = openStmf(OPEN_EXCL_STMF, &fd)) != STMF_STATUS_SUCCESS) 5081 return (ret); 5082 ret = setStmfState(fd, &targetState, TARGET_TYPE); 5083 (void) close(fd); 5084 return (ret); 5085 } 5086 5087 /* 5088 * stmfOnlineLogicalUnit 5089 * 5090 * Purpose: Change state of logical unit to online 5091 * 5092 * lu - guid of the logical unit to online 5093 */ 5094 int 5095 stmfOnlineLogicalUnit(stmfGuid *lu) 5096 { 5097 stmf_state_desc_t luState; 5098 int ret = STMF_STATUS_SUCCESS; 5099 int fd; 5100 5101 if (lu == NULL) { 5102 return (STMF_ERROR_INVALID_ARG); 5103 } 5104 5105 bzero(&luState, sizeof (luState)); 5106 5107 luState.state = STMF_STATE_ONLINE; 5108 bcopy(lu, &luState.ident, sizeof (stmfGuid)); 5109 /* 5110 * Open control node for stmf 5111 * to make call to setStmfState() 5112 */ 5113 if ((ret = openStmf(OPEN_EXCL_STMF, &fd)) != STMF_STATUS_SUCCESS) 5114 return (ret); 5115 ret = setStmfState(fd, &luState, LOGICAL_UNIT_TYPE); 5116 (void) close(fd); 5117 return (ret); 5118 } 5119 5120 /* 5121 * stmfRemoveFromHostGroup 5122 * 5123 * Purpose: Removes an initiator from an initiator group 5124 * 5125 * hostGroupName - name of an initiator group 5126 * hostName - name of host group member to remove 5127 */ 5128 int 5129 stmfRemoveFromHostGroup(stmfGroupName *hostGroupName, stmfDevid *hostName) 5130 { 5131 int ret; 5132 int fd; 5133 5134 if (hostGroupName == NULL || 5135 (strnlen((char *)hostGroupName, sizeof (stmfGroupName)) 5136 == sizeof (stmfGroupName)) || hostName == NULL) { 5137 return (STMF_ERROR_INVALID_ARG); 5138 } 5139 5140 /* call init */ 5141 ret = initializeConfig(); 5142 if (ret != STMF_STATUS_SUCCESS) { 5143 return (ret); 5144 } 5145 5146 /* 5147 * Open control node for stmf 5148 */ 5149 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 5150 return (ret); 5151 5152 if ((ret = groupMemberIoctl(fd, STMF_IOCTL_REMOVE_HG_ENTRY, 5153 hostGroupName, hostName)) != STMF_STATUS_SUCCESS) { 5154 goto done; 5155 } 5156 5157 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 5158 goto done; 5159 } 5160 5161 ret = psRemoveHostGroupMember((char *)hostGroupName, 5162 (char *)hostName->ident); 5163 switch (ret) { 5164 case STMF_PS_SUCCESS: 5165 ret = STMF_STATUS_SUCCESS; 5166 break; 5167 case STMF_PS_ERROR_MEMBER_NOT_FOUND: 5168 ret = STMF_ERROR_MEMBER_NOT_FOUND; 5169 break; 5170 case STMF_PS_ERROR_GROUP_NOT_FOUND: 5171 ret = STMF_ERROR_GROUP_NOT_FOUND; 5172 break; 5173 case STMF_PS_ERROR_BUSY: 5174 ret = STMF_ERROR_BUSY; 5175 break; 5176 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 5177 ret = STMF_ERROR_SERVICE_NOT_FOUND; 5178 break; 5179 case STMF_PS_ERROR_VERSION_MISMATCH: 5180 ret = STMF_ERROR_SERVICE_DATA_VERSION; 5181 break; 5182 default: 5183 syslog(LOG_DEBUG, 5184 "stmfRemoveFromHostGroup" 5185 "psRemoveHostGroupMember:error(%d)", ret); 5186 ret = STMF_STATUS_ERROR; 5187 break; 5188 } 5189 5190 done: 5191 (void) close(fd); 5192 return (ret); 5193 } 5194 5195 /* 5196 * stmfRemoveFromTargetGroup 5197 * 5198 * Purpose: Removes a local port from a local port group 5199 * 5200 * targetGroupName - name of a target group 5201 * targetName - name of target to remove 5202 */ 5203 int 5204 stmfRemoveFromTargetGroup(stmfGroupName *targetGroupName, stmfDevid *targetName) 5205 { 5206 int ret; 5207 int fd; 5208 5209 if (targetGroupName == NULL || 5210 (strnlen((char *)targetGroupName, sizeof (stmfGroupName)) 5211 == sizeof (stmfGroupName)) || targetName == NULL) { 5212 return (STMF_ERROR_INVALID_ARG); 5213 } 5214 5215 /* call init */ 5216 ret = initializeConfig(); 5217 if (ret != STMF_STATUS_SUCCESS) { 5218 return (ret); 5219 } 5220 5221 /* 5222 * Open control node for stmf 5223 */ 5224 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 5225 return (ret); 5226 5227 if ((ret = groupMemberIoctl(fd, STMF_IOCTL_REMOVE_TG_ENTRY, 5228 targetGroupName, targetName)) != STMF_STATUS_SUCCESS) { 5229 goto done; 5230 } 5231 5232 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 5233 goto done; 5234 } 5235 5236 ret = psRemoveTargetGroupMember((char *)targetGroupName, 5237 (char *)targetName->ident); 5238 switch (ret) { 5239 case STMF_PS_SUCCESS: 5240 ret = STMF_STATUS_SUCCESS; 5241 break; 5242 case STMF_PS_ERROR_MEMBER_NOT_FOUND: 5243 ret = STMF_ERROR_MEMBER_NOT_FOUND; 5244 break; 5245 case STMF_PS_ERROR_GROUP_NOT_FOUND: 5246 ret = STMF_ERROR_GROUP_NOT_FOUND; 5247 break; 5248 case STMF_PS_ERROR_BUSY: 5249 ret = STMF_ERROR_BUSY; 5250 break; 5251 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 5252 ret = STMF_ERROR_SERVICE_NOT_FOUND; 5253 break; 5254 case STMF_PS_ERROR_VERSION_MISMATCH: 5255 ret = STMF_ERROR_SERVICE_DATA_VERSION; 5256 break; 5257 default: 5258 syslog(LOG_DEBUG, 5259 "stmfRemoveFromTargetGroup" 5260 "psRemoveTargetGroupMember:error(%d)", ret); 5261 ret = STMF_STATUS_ERROR; 5262 break; 5263 } 5264 5265 done: 5266 (void) close(fd); 5267 return (ret); 5268 } 5269 5270 /* 5271 * stmfRemoveViewEntry 5272 * 5273 * Purpose: Removes a view entry from a logical unit 5274 * 5275 * lu - guid of lu for which view entry is being removed 5276 * viewEntryIndex - index of view entry to remove 5277 * 5278 */ 5279 int 5280 stmfRemoveViewEntry(stmfGuid *lu, uint32_t viewEntryIndex) 5281 { 5282 int ret = STMF_STATUS_SUCCESS; 5283 int fd; 5284 int ioctlRet; 5285 stmf_iocdata_t stmfIoctl; 5286 stmf_view_op_entry_t ioctlViewEntry; 5287 5288 if (lu == NULL) { 5289 return (STMF_ERROR_INVALID_ARG); 5290 } 5291 5292 /* call init */ 5293 ret = initializeConfig(); 5294 if (ret != STMF_STATUS_SUCCESS) { 5295 return (ret); 5296 } 5297 5298 /* 5299 * Open control node for stmf 5300 */ 5301 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 5302 return (ret); 5303 5304 bzero(&ioctlViewEntry, sizeof (ioctlViewEntry)); 5305 ioctlViewEntry.ve_ndx_valid = B_TRUE; 5306 ioctlViewEntry.ve_ndx = viewEntryIndex; 5307 bcopy(lu, &ioctlViewEntry.ve_guid, sizeof (stmfGuid)); 5308 5309 bzero(&stmfIoctl, sizeof (stmfIoctl)); 5310 /* 5311 * Issue ioctl to add to the view entry 5312 */ 5313 stmfIoctl.stmf_version = STMF_VERSION_1; 5314 stmfIoctl.stmf_ibuf_size = sizeof (ioctlViewEntry); 5315 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&ioctlViewEntry; 5316 ioctlRet = ioctl(fd, STMF_IOCTL_REMOVE_VIEW_ENTRY, &stmfIoctl); 5317 if (ioctlRet != 0) { 5318 switch (errno) { 5319 case EBUSY: 5320 ret = STMF_ERROR_BUSY; 5321 break; 5322 case EPERM: 5323 ret = STMF_ERROR_PERM; 5324 break; 5325 case EACCES: 5326 switch (stmfIoctl.stmf_error) { 5327 case STMF_IOCERR_UPDATE_NEED_CFG_INIT: 5328 ret = STMF_ERROR_CONFIG_NONE; 5329 break; 5330 default: 5331 ret = STMF_ERROR_PERM; 5332 break; 5333 } 5334 break; 5335 case ENODEV: 5336 case ENOENT: 5337 ret = STMF_ERROR_NOT_FOUND; 5338 break; 5339 default: 5340 syslog(LOG_DEBUG, 5341 "stmfRemoveViewEntry:ioctl errno(%d)", 5342 errno); 5343 ret = STMF_STATUS_ERROR; 5344 break; 5345 } 5346 goto done; 5347 } 5348 5349 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 5350 goto done; 5351 } 5352 5353 ret = psRemoveViewEntry(lu, viewEntryIndex); 5354 switch (ret) { 5355 case STMF_PS_SUCCESS: 5356 ret = STMF_STATUS_SUCCESS; 5357 break; 5358 case STMF_PS_ERROR_NOT_FOUND: 5359 ret = STMF_ERROR_NOT_FOUND; 5360 break; 5361 case STMF_PS_ERROR_BUSY: 5362 ret = STMF_ERROR_BUSY; 5363 break; 5364 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 5365 ret = STMF_ERROR_SERVICE_NOT_FOUND; 5366 break; 5367 case STMF_PS_ERROR_VERSION_MISMATCH: 5368 ret = STMF_ERROR_SERVICE_DATA_VERSION; 5369 break; 5370 default: 5371 syslog(LOG_DEBUG, 5372 "stmfRemoveViewEntry" "psRemoveViewEntry:error(%d)", 5373 ret); 5374 ret = STMF_STATUS_ERROR; 5375 break; 5376 } 5377 5378 done: 5379 (void) close(fd); 5380 return (ret); 5381 } 5382 5383 /* 5384 * stmfSetProviderData 5385 * 5386 * Purpose: set the provider data 5387 * 5388 * providerName - unique name of provider 5389 * nvl - nvlist to set 5390 * providerType - type of provider for which to set data 5391 * STMF_LU_PROVIDER_TYPE 5392 * STMF_PORT_PROVIDER_TYPE 5393 */ 5394 int 5395 stmfSetProviderData(char *providerName, nvlist_t *nvl, int providerType) 5396 { 5397 return (stmfSetProviderDataProt(providerName, nvl, providerType, 5398 NULL)); 5399 } 5400 5401 /* 5402 * stmfSetProviderDataProt 5403 * 5404 * Purpose: set the provider data 5405 * 5406 * providerName - unique name of provider 5407 * nvl - nvlist to set 5408 * providerType - type of provider for which to set data 5409 * STMF_LU_PROVIDER_TYPE 5410 * STMF_PORT_PROVIDER_TYPE 5411 * setToken - Stale data token returned in the stmfGetProviderDataProt() 5412 * call or NULL. 5413 */ 5414 int 5415 stmfSetProviderDataProt(char *providerName, nvlist_t *nvl, int providerType, 5416 uint64_t *setToken) 5417 { 5418 int ret; 5419 int fd; 5420 5421 if (providerName == NULL || nvl == NULL) { 5422 return (STMF_ERROR_INVALID_ARG); 5423 } 5424 5425 if (providerType != STMF_LU_PROVIDER_TYPE && 5426 providerType != STMF_PORT_PROVIDER_TYPE) { 5427 return (STMF_ERROR_INVALID_ARG); 5428 } 5429 5430 /* call init */ 5431 ret = initializeConfig(); 5432 if (ret != STMF_STATUS_SUCCESS) { 5433 return (ret); 5434 } 5435 5436 /* 5437 * Open control node for stmf 5438 */ 5439 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 5440 return (ret); 5441 5442 ret = setProviderData(fd, providerName, nvl, providerType, setToken); 5443 5444 (void) close(fd); 5445 5446 if (ret != STMF_STATUS_SUCCESS) { 5447 goto done; 5448 } 5449 5450 if (iGetPersistMethod() == STMF_PERSIST_NONE) { 5451 goto done; 5452 } 5453 5454 /* setting driver provider data successful. Now persist it */ 5455 ret = psSetProviderData(providerName, nvl, providerType, NULL); 5456 switch (ret) { 5457 case STMF_PS_SUCCESS: 5458 ret = STMF_STATUS_SUCCESS; 5459 break; 5460 case STMF_PS_ERROR_EXISTS: 5461 ret = STMF_ERROR_EXISTS; 5462 break; 5463 case STMF_PS_ERROR_BUSY: 5464 ret = STMF_ERROR_BUSY; 5465 break; 5466 case STMF_PS_ERROR_SERVICE_NOT_FOUND: 5467 ret = STMF_ERROR_SERVICE_NOT_FOUND; 5468 break; 5469 case STMF_PS_ERROR_VERSION_MISMATCH: 5470 ret = STMF_ERROR_SERVICE_DATA_VERSION; 5471 break; 5472 case STMF_PS_ERROR_PROV_DATA_STALE: 5473 ret = STMF_ERROR_PROV_DATA_STALE; 5474 break; 5475 default: 5476 syslog(LOG_DEBUG, 5477 "stmfSetProviderData" 5478 "psSetProviderData:error(%d)", ret); 5479 ret = STMF_STATUS_ERROR; 5480 break; 5481 } 5482 5483 done: 5484 return (ret); 5485 } 5486 5487 /* 5488 * getProviderData 5489 * 5490 * Purpose: set the provider data from stmf 5491 * 5492 * providerName - unique name of provider 5493 * nvl - nvlist to load/retrieve 5494 * providerType - logical unit or port provider 5495 * setToken - returned stale data token 5496 */ 5497 int 5498 getProviderData(char *providerName, nvlist_t **nvl, int providerType, 5499 uint64_t *setToken) 5500 { 5501 int ret = STMF_STATUS_SUCCESS; 5502 int fd; 5503 int ioctlRet; 5504 size_t nvlistSize = ALLOC_PP_DATA_SIZE; 5505 int retryCnt = 0; 5506 int retryCntMax = MAX_PROVIDER_RETRY; 5507 stmf_ppioctl_data_t ppi = {0}, *ppi_out = NULL; 5508 boolean_t retry = B_TRUE; 5509 stmf_iocdata_t stmfIoctl; 5510 5511 if (providerName == NULL) { 5512 return (STMF_ERROR_INVALID_ARG); 5513 } 5514 5515 /* 5516 * Open control node for stmf 5517 */ 5518 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 5519 return (ret); 5520 5521 /* set provider name and provider type */ 5522 if (strlcpy(ppi.ppi_name, providerName, 5523 sizeof (ppi.ppi_name)) >= 5524 sizeof (ppi.ppi_name)) { 5525 ret = STMF_ERROR_INVALID_ARG; 5526 goto done; 5527 } 5528 switch (providerType) { 5529 case STMF_LU_PROVIDER_TYPE: 5530 ppi.ppi_lu_provider = 1; 5531 break; 5532 case STMF_PORT_PROVIDER_TYPE: 5533 ppi.ppi_port_provider = 1; 5534 break; 5535 default: 5536 ret = STMF_ERROR_INVALID_ARG; 5537 goto done; 5538 } 5539 5540 do { 5541 /* allocate memory for ioctl */ 5542 ppi_out = (stmf_ppioctl_data_t *)calloc(1, nvlistSize + 5543 sizeof (stmf_ppioctl_data_t)); 5544 if (ppi_out == NULL) { 5545 ret = STMF_ERROR_NOMEM; 5546 goto done; 5547 5548 } 5549 5550 /* set the size of the ioctl data to allocated buffer */ 5551 ppi.ppi_data_size = nvlistSize; 5552 5553 bzero(&stmfIoctl, sizeof (stmfIoctl)); 5554 5555 stmfIoctl.stmf_version = STMF_VERSION_1; 5556 stmfIoctl.stmf_ibuf_size = sizeof (stmf_ppioctl_data_t); 5557 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&ppi; 5558 stmfIoctl.stmf_obuf_size = sizeof (stmf_ppioctl_data_t) + 5559 nvlistSize; 5560 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)ppi_out; 5561 ioctlRet = ioctl(fd, STMF_IOCTL_GET_PP_DATA, &stmfIoctl); 5562 if (ioctlRet != 0) { 5563 switch (errno) { 5564 case EBUSY: 5565 ret = STMF_ERROR_BUSY; 5566 break; 5567 case EPERM: 5568 case EACCES: 5569 ret = STMF_ERROR_PERM; 5570 break; 5571 case EINVAL: 5572 if (stmfIoctl.stmf_error == 5573 STMF_IOCERR_INSUFFICIENT_BUF) { 5574 nvlistSize = 5575 ppi_out->ppi_data_size; 5576 free(ppi_out); 5577 ppi_out = NULL; 5578 if (retryCnt++ > retryCntMax) { 5579 retry = B_FALSE; 5580 ret = STMF_ERROR_BUSY; 5581 } else { 5582 ret = 5583 STMF_STATUS_SUCCESS; 5584 } 5585 } else { 5586 syslog(LOG_DEBUG, 5587 "getProviderData:ioctl" 5588 "unable to retrieve " 5589 "nvlist"); 5590 ret = STMF_STATUS_ERROR; 5591 } 5592 break; 5593 case ENOENT: 5594 ret = STMF_ERROR_NOT_FOUND; 5595 break; 5596 default: 5597 syslog(LOG_DEBUG, 5598 "getProviderData:ioctl errno(%d)", 5599 errno); 5600 ret = STMF_STATUS_ERROR; 5601 break; 5602 } 5603 if (ret != STMF_STATUS_SUCCESS) 5604 goto done; 5605 } 5606 } while (retry && stmfIoctl.stmf_error == STMF_IOCERR_INSUFFICIENT_BUF); 5607 5608 if ((ret = nvlist_unpack((char *)ppi_out->ppi_data, 5609 ppi_out->ppi_data_size, nvl, 0)) != 0) { 5610 ret = STMF_STATUS_ERROR; 5611 goto done; 5612 } 5613 5614 /* caller has asked for new token */ 5615 if (setToken) { 5616 *setToken = ppi_out->ppi_token; 5617 } 5618 done: 5619 free(ppi_out); 5620 (void) close(fd); 5621 return (ret); 5622 } 5623 5624 /* 5625 * setProviderData 5626 * 5627 * Purpose: set the provider data in stmf 5628 * 5629 * providerName - unique name of provider 5630 * nvl - nvlist to set 5631 * providerType - logical unit or port provider 5632 * setToken - stale data token to check if not NULL 5633 */ 5634 static int 5635 setProviderData(int fd, char *providerName, nvlist_t *nvl, int providerType, 5636 uint64_t *setToken) 5637 { 5638 int ret = STMF_STATUS_SUCCESS; 5639 int ioctlRet; 5640 size_t nvlistEncodedSize; 5641 stmf_ppioctl_data_t *ppi = NULL; 5642 uint64_t outToken; 5643 char *allocatedNvBuffer; 5644 stmf_iocdata_t stmfIoctl; 5645 5646 if (providerName == NULL) { 5647 return (STMF_ERROR_INVALID_ARG); 5648 } 5649 5650 /* get size of encoded nvlist */ 5651 if (nvlist_size(nvl, &nvlistEncodedSize, NV_ENCODE_XDR) != 0) { 5652 return (STMF_STATUS_ERROR); 5653 } 5654 5655 /* allocate memory for ioctl */ 5656 ppi = (stmf_ppioctl_data_t *)calloc(1, nvlistEncodedSize + 5657 sizeof (stmf_ppioctl_data_t)); 5658 if (ppi == NULL) { 5659 return (STMF_ERROR_NOMEM); 5660 } 5661 5662 if (setToken) { 5663 ppi->ppi_token_valid = 1; 5664 ppi->ppi_token = *setToken; 5665 } 5666 5667 allocatedNvBuffer = (char *)&ppi->ppi_data; 5668 if (nvlist_pack(nvl, &allocatedNvBuffer, &nvlistEncodedSize, 5669 NV_ENCODE_XDR, 0) != 0) { 5670 return (STMF_STATUS_ERROR); 5671 } 5672 5673 /* set provider name and provider type */ 5674 (void) strncpy(ppi->ppi_name, providerName, sizeof (ppi->ppi_name)); 5675 switch (providerType) { 5676 case STMF_LU_PROVIDER_TYPE: 5677 ppi->ppi_lu_provider = 1; 5678 break; 5679 case STMF_PORT_PROVIDER_TYPE: 5680 ppi->ppi_port_provider = 1; 5681 break; 5682 default: 5683 return (STMF_ERROR_INVALID_ARG); 5684 } 5685 5686 /* set the size of the ioctl data to packed data size */ 5687 ppi->ppi_data_size = nvlistEncodedSize; 5688 5689 bzero(&stmfIoctl, sizeof (stmfIoctl)); 5690 5691 stmfIoctl.stmf_version = STMF_VERSION_1; 5692 /* 5693 * Subtracting 8 from the size as that is the size of the last member 5694 * of the structure where the packed data resides 5695 */ 5696 stmfIoctl.stmf_ibuf_size = nvlistEncodedSize + 5697 sizeof (stmf_ppioctl_data_t) - 8; 5698 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)ppi; 5699 stmfIoctl.stmf_obuf_size = sizeof (uint64_t); 5700 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)&outToken; 5701 ioctlRet = ioctl(fd, STMF_IOCTL_LOAD_PP_DATA, &stmfIoctl); 5702 if (ioctlRet != 0) { 5703 switch (errno) { 5704 case EBUSY: 5705 ret = STMF_ERROR_BUSY; 5706 break; 5707 case EPERM: 5708 case EACCES: 5709 ret = STMF_ERROR_PERM; 5710 break; 5711 case EINVAL: 5712 if (stmfIoctl.stmf_error == 5713 STMF_IOCERR_PPD_UPDATED) { 5714 ret = STMF_ERROR_PROV_DATA_STALE; 5715 } else { 5716 ret = STMF_STATUS_ERROR; 5717 } 5718 break; 5719 default: 5720 syslog(LOG_DEBUG, 5721 "setProviderData:ioctl errno(%d)", errno); 5722 ret = STMF_STATUS_ERROR; 5723 break; 5724 } 5725 if (ret != STMF_STATUS_SUCCESS) 5726 goto done; 5727 } 5728 5729 /* caller has asked for new token */ 5730 if (setToken) { 5731 *setToken = outToken; 5732 } 5733 done: 5734 free(ppi); 5735 return (ret); 5736 } 5737 5738 /* 5739 * set the persistence method in the library only or library and service 5740 */ 5741 int 5742 stmfSetPersistMethod(uint8_t persistType, boolean_t serviceSet) 5743 { 5744 int ret = STMF_STATUS_SUCCESS; 5745 int oldPersist; 5746 5747 (void) pthread_mutex_lock(&persistenceTypeLock); 5748 oldPersist = iPersistType; 5749 if (persistType == STMF_PERSIST_NONE || 5750 persistType == STMF_PERSIST_SMF) { 5751 iLibSetPersist = B_TRUE; 5752 iPersistType = persistType; 5753 } else { 5754 (void) pthread_mutex_unlock(&persistenceTypeLock); 5755 return (STMF_ERROR_INVALID_ARG); 5756 } 5757 /* Is this for this library open or in SMF */ 5758 if (serviceSet == B_TRUE) { 5759 ret = psSetServicePersist(persistType); 5760 if (ret != STMF_PS_SUCCESS) { 5761 ret = STMF_ERROR_PERSIST_TYPE; 5762 /* Set to old value */ 5763 iPersistType = oldPersist; 5764 } 5765 } 5766 (void) pthread_mutex_unlock(&persistenceTypeLock); 5767 5768 return (ret); 5769 } 5770 5771 /* 5772 * Only returns internal state for persist. If unset, goes to ps. If that 5773 * fails, returns default setting 5774 */ 5775 static uint8_t 5776 iGetPersistMethod() 5777 { 5778 5779 uint8_t persistType = 0; 5780 5781 (void) pthread_mutex_lock(&persistenceTypeLock); 5782 if (iLibSetPersist) { 5783 persistType = iPersistType; 5784 } else { 5785 int ret; 5786 ret = psGetServicePersist(&persistType); 5787 if (ret != STMF_PS_SUCCESS) { 5788 /* set to default */ 5789 persistType = STMF_DEFAULT_PERSIST; 5790 } 5791 } 5792 (void) pthread_mutex_unlock(&persistenceTypeLock); 5793 return (persistType); 5794 } 5795 5796 /* 5797 * Returns either library state or persistent config state depending on 5798 * serviceState 5799 */ 5800 int 5801 stmfGetPersistMethod(uint8_t *persistType, boolean_t serviceState) 5802 { 5803 int ret = STMF_STATUS_SUCCESS; 5804 5805 if (persistType == NULL) { 5806 return (STMF_ERROR_INVALID_ARG); 5807 } 5808 if (serviceState) { 5809 ret = psGetServicePersist(persistType); 5810 if (ret != STMF_PS_SUCCESS) { 5811 ret = STMF_ERROR_PERSIST_TYPE; 5812 } 5813 } else { 5814 (void) pthread_mutex_lock(&persistenceTypeLock); 5815 if (iLibSetPersist) { 5816 *persistType = iPersistType; 5817 } else { 5818 *persistType = STMF_DEFAULT_PERSIST; 5819 } 5820 (void) pthread_mutex_unlock(&persistenceTypeLock); 5821 } 5822 5823 return (ret); 5824 } 5825 5826 /* 5827 * validateLunNumIoctl 5828 * 5829 * Purpose: Issues ioctl to check and get available lun# in view entry 5830 * 5831 * viewEntry - view entry to use 5832 */ 5833 static int 5834 validateLunNumIoctl(int fd, stmfViewEntry *viewEntry) 5835 { 5836 int ret = STMF_STATUS_SUCCESS; 5837 int ioctlRet; 5838 stmf_iocdata_t stmfIoctl; 5839 stmf_view_op_entry_t ioctlViewEntry; 5840 5841 bzero(&ioctlViewEntry, sizeof (ioctlViewEntry)); 5842 /* 5843 * don't set ve_ndx or ve_ndx_valid as ve_ndx_valid should be 5844 * false on input 5845 */ 5846 ioctlViewEntry.ve_lu_number_valid = viewEntry->luNbrValid; 5847 ioctlViewEntry.ve_all_hosts = viewEntry->allHosts; 5848 ioctlViewEntry.ve_all_targets = viewEntry->allTargets; 5849 5850 if (viewEntry->allHosts == B_FALSE) { 5851 bcopy(viewEntry->hostGroup, &ioctlViewEntry.ve_host_group.name, 5852 sizeof (stmfGroupName)); 5853 ioctlViewEntry.ve_host_group.name_size = 5854 strlen((char *)viewEntry->hostGroup); 5855 } 5856 if (viewEntry->allTargets == B_FALSE) { 5857 bcopy(viewEntry->targetGroup, 5858 &ioctlViewEntry.ve_target_group.name, 5859 sizeof (stmfGroupName)); 5860 ioctlViewEntry.ve_target_group.name_size = 5861 strlen((char *)viewEntry->targetGroup); 5862 } 5863 /* Validating the lun number */ 5864 if (viewEntry->luNbrValid) { 5865 bcopy(viewEntry->luNbr, &ioctlViewEntry.ve_lu_nbr, 5866 sizeof (ioctlViewEntry.ve_lu_nbr)); 5867 } 5868 5869 bzero(&stmfIoctl, sizeof (stmfIoctl)); 5870 /* 5871 * Issue ioctl to validate lun# in the view entry 5872 */ 5873 stmfIoctl.stmf_version = STMF_VERSION_1; 5874 stmfIoctl.stmf_ibuf_size = sizeof (ioctlViewEntry); 5875 stmfIoctl.stmf_ibuf = (uint64_t)(unsigned long)&ioctlViewEntry; 5876 stmfIoctl.stmf_obuf_size = sizeof (ioctlViewEntry); 5877 stmfIoctl.stmf_obuf = (uint64_t)(unsigned long)&ioctlViewEntry; 5878 ioctlRet = ioctl(fd, STMF_IOCTL_VALIDATE_VIEW, &stmfIoctl); 5879 5880 /* save available lun number */ 5881 if (!viewEntry->luNbrValid) { 5882 bcopy(ioctlViewEntry.ve_lu_nbr, viewEntry->luNbr, 5883 sizeof (ioctlViewEntry.ve_lu_nbr)); 5884 } 5885 if (ioctlRet != 0) { 5886 switch (errno) { 5887 case EBUSY: 5888 ret = STMF_ERROR_BUSY; 5889 break; 5890 case EPERM: 5891 ret = STMF_ERROR_PERM; 5892 break; 5893 case EACCES: 5894 switch (stmfIoctl.stmf_error) { 5895 case STMF_IOCERR_UPDATE_NEED_CFG_INIT: 5896 ret = STMF_ERROR_CONFIG_NONE; 5897 break; 5898 default: 5899 ret = STMF_ERROR_PERM; 5900 break; 5901 } 5902 break; 5903 default: 5904 switch (stmfIoctl.stmf_error) { 5905 case STMF_IOCERR_LU_NUMBER_IN_USE: 5906 ret = STMF_ERROR_LUN_IN_USE; 5907 break; 5908 case STMF_IOCERR_VIEW_ENTRY_CONFLICT: 5909 ret = STMF_ERROR_VE_CONFLICT; 5910 break; 5911 case STMF_IOCERR_UPDATE_NEED_CFG_INIT: 5912 ret = STMF_ERROR_CONFIG_NONE; 5913 break; 5914 case STMF_IOCERR_INVALID_HG: 5915 ret = STMF_ERROR_INVALID_HG; 5916 break; 5917 case STMF_IOCERR_INVALID_TG: 5918 ret = STMF_ERROR_INVALID_TG; 5919 break; 5920 default: 5921 syslog(LOG_DEBUG, 5922 "addViewEntryIoctl" 5923 ":error(%d)", 5924 stmfIoctl.stmf_error); 5925 ret = STMF_STATUS_ERROR; 5926 break; 5927 } 5928 break; 5929 } 5930 } 5931 return (ret); 5932 } 5933 5934 /* 5935 * stmfValidateView 5936 * 5937 * Purpose: Validate or get lun # base on TG, HG of view entry 5938 * 5939 * viewEntry - view entry structure to use 5940 */ 5941 int 5942 stmfValidateView(stmfViewEntry *viewEntry) 5943 { 5944 int ret; 5945 int fd; 5946 stmfViewEntry iViewEntry; 5947 5948 if (viewEntry == NULL) { 5949 return (STMF_ERROR_INVALID_ARG); 5950 } 5951 5952 /* initialize and set internal view entry */ 5953 bzero(&iViewEntry, sizeof (iViewEntry)); 5954 5955 if (!viewEntry->allHosts) { 5956 bcopy(viewEntry->hostGroup, iViewEntry.hostGroup, 5957 sizeof (iViewEntry.hostGroup)); 5958 } else { 5959 iViewEntry.allHosts = B_TRUE; 5960 } 5961 5962 if (!viewEntry->allTargets) { 5963 bcopy(viewEntry->targetGroup, iViewEntry.targetGroup, 5964 sizeof (iViewEntry.targetGroup)); 5965 } else { 5966 iViewEntry.allTargets = B_TRUE; 5967 } 5968 5969 if (viewEntry->luNbrValid) { 5970 iViewEntry.luNbrValid = B_TRUE; 5971 bcopy(viewEntry->luNbr, iViewEntry.luNbr, 5972 sizeof (iViewEntry.luNbr)); 5973 } 5974 5975 /* 5976 * set users return view entry index valid flag to false 5977 * in case of failure 5978 */ 5979 viewEntry->veIndexValid = B_FALSE; 5980 5981 /* Check to ensure service exists */ 5982 if (psCheckService() != STMF_STATUS_SUCCESS) { 5983 return (STMF_ERROR_SERVICE_NOT_FOUND); 5984 } 5985 5986 /* call init */ 5987 ret = initializeConfig(); 5988 if (ret != STMF_STATUS_SUCCESS) { 5989 return (ret); 5990 } 5991 5992 /* 5993 * Open control node for stmf 5994 */ 5995 if ((ret = openStmf(OPEN_STMF, &fd)) != STMF_STATUS_SUCCESS) 5996 return (ret); 5997 5998 /* 5999 * Validate lun# in the view entry from the driver 6000 */ 6001 ret = validateLunNumIoctl(fd, &iViewEntry); 6002 (void) close(fd); 6003 6004 /* save available lun number */ 6005 if (!viewEntry->luNbrValid) { 6006 bcopy(iViewEntry.luNbr, viewEntry->luNbr, 6007 sizeof (iViewEntry.luNbr)); 6008 } 6009 6010 return (ret); 6011 } 6012