Home | History | Annotate | Line # | Download | only in iscsid
iscsid_main.c revision 1.6
      1  1.6       riz /*	$NetBSD: iscsid_main.c,v 1.6 2012/05/27 22:03:16 riz Exp $	*/
      2  1.1       agc 
      3  1.1       agc /*-
      4  1.1       agc  * Copyright (c) 2005,2006,2011 The NetBSD Foundation, Inc.
      5  1.1       agc  * All rights reserved.
      6  1.1       agc  *
      7  1.1       agc  * This code is derived from software contributed to The NetBSD Foundation
      8  1.1       agc  * by Wasabi Systems, Inc.
      9  1.1       agc  *
     10  1.1       agc  * Redistribution and use in source and binary forms, with or without
     11  1.1       agc  * modification, are permitted provided that the following conditions
     12  1.1       agc  * are met:
     13  1.1       agc  * 1. Redistributions of source code must retain the above copyright
     14  1.1       agc  *    notice, this list of conditions and the following disclaimer.
     15  1.1       agc  * 2. Redistributions in binary form must reproduce the above copyright
     16  1.1       agc  *    notice, this list of conditions and the following disclaimer in the
     17  1.1       agc  *    documentation and/or other materials provided with the distribution.
     18  1.1       agc  *
     19  1.1       agc  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20  1.1       agc  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21  1.1       agc  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22  1.1       agc  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23  1.1       agc  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24  1.1       agc  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25  1.1       agc  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26  1.1       agc  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27  1.1       agc  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28  1.1       agc  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29  1.1       agc  * POSSIBILITY OF SUCH DAMAGE.
     30  1.1       agc  */
     31  1.1       agc 
     32  1.1       agc #include "iscsid_globals.h"
     33  1.1       agc 
     34  1.1       agc #include <sys/types.h>
     35  1.1       agc #include <sys/socket.h>
     36  1.1       agc #include <sys/un.h>
     37  1.1       agc #include <sys/sysctl.h>
     38  1.1       agc 
     39  1.1       agc #include <ctype.h>
     40  1.1       agc #include <fcntl.h>
     41  1.1       agc 
     42  1.1       agc #define DEVICE    "/dev/iscsi0"
     43  1.1       agc 
     44  1.1       agc /* -------------------------------------------------------------------------- */
     45  1.1       agc 
     46  1.1       agc list_head_t list[NUM_DAEMON_LISTS];	/* the lists this daemon keeps */
     47  1.1       agc 
     48  1.1       agc pthread_mutex_t sesslist_lock;	/* session list lock */
     49  1.1       agc pthread_t event_thread;			/* event thread handle */
     50  1.1       agc 
     51  1.1       agc int driver = -1;				/* the driver's file desc */
     52  1.1       agc int client_sock;				/* the client communication socket */
     53  1.1       agc 
     54  1.4  christos #ifndef ISCSI_DEBUG
     55  1.4  christos #define ISCSI_DEBUG 0
     56  1.4  christos #endif
     57  1.1       agc int debug_level = ISCSI_DEBUG;	/* How much info to display */
     58  1.5  christos int nothreads;
     59  1.1       agc 
     60  1.1       agc /*
     61  1.1       agc    To avoid memory fragmentation (and speed things up a bit), we use the
     62  1.1       agc    static bufs unless the request or response exceeds the buffer size
     63  1.1       agc    (which it normally shouldn't, assuming we don't have thousands
     64  1.1       agc    of list entries).
     65  1.1       agc */
     66  1.3       agc static uint8_t req_buf[REQ_BUFFER_SIZE];	/* default buffer for requests */
     67  1.3       agc static uint8_t rsp_buf[RSP_BUFFER_SIZE];	/* default buffer for responses */
     68  1.1       agc 
     69  1.1       agc /* -------------------------------------------------------------------------- */
     70  1.1       agc 
     71  1.4  christos static void __dead
     72  1.4  christos usage(void)
     73  1.4  christos {
     74  1.4  christos 	fprintf(stderr, "Usage: %s [-d]\n", getprogname());
     75  1.4  christos 	exit(EXIT_FAILURE);
     76  1.4  christos }
     77  1.4  christos 
     78  1.1       agc 
     79  1.1       agc /*
     80  1.1       agc  * create_node_name:
     81  1.1       agc  *    Create and set default node name.
     82  1.1       agc  *
     83  1.1       agc  *    Returns 0 on success, else an error code.
     84  1.1       agc  */
     85  1.1       agc 
     86  1.3       agc static int
     87  1.1       agc create_node_name(void)
     88  1.1       agc {
     89  1.1       agc 	iscsi_set_node_name_parameters_t snp;
     90  1.1       agc 	uint32_t hid = 0;
     91  1.1       agc 	size_t siz;
     92  1.1       agc 	int mib[2];
     93  1.1       agc 	unsigned char *s;
     94  1.1       agc 
     95  1.1       agc 	(void) memset(&snp, 0x0, sizeof(snp));
     96  1.1       agc 	mib[0] = CTL_KERN;
     97  1.1       agc 	mib[1] = KERN_HOSTID;
     98  1.1       agc 	siz = sizeof(hid);
     99  1.1       agc 	sysctl(mib, 2, &hid, &siz, NULL, 0);
    100  1.1       agc 	mib[1] = KERN_HOSTNAME;
    101  1.1       agc 	siz = ISCSI_STRING_LENGTH - 45;
    102  1.1       agc 	sysctl(mib, 2, snp.InitiatorAlias, &siz, NULL, 0);
    103  1.1       agc 
    104  1.1       agc 	DEB(1, ("Host Name: <%s>, Host ID: %u\n", snp.InitiatorAlias, hid));
    105  1.1       agc 	if (!snp.InitiatorAlias[0]) {
    106  1.1       agc 		printf("Warning: iSCSI Node Name not set (No Host Name)!\n");
    107  1.1       agc 		return ISCSID_STATUS_NO_INITIATOR_NAME;
    108  1.1       agc 	}
    109  1.1       agc 	for (s = snp.InitiatorAlias; *s; s++)
    110  1.1       agc 		if (!isalnum((unsigned char) *s) && *s != '-' && *s != '.' && *s != ':')
    111  1.1       agc 			*s = '-';
    112  1.1       agc 	snprintf((char *)snp.InitiatorName, sizeof(snp.InitiatorName),
    113  1.1       agc 		"iqn.1994-04.org.netbsd:iscsi.%s:%u", snp.InitiatorAlias, hid);
    114  1.1       agc 
    115  1.1       agc 	ioctl(driver, ISCSI_SET_NODE_NAME, &snp);
    116  1.1       agc 	return snp.status;
    117  1.1       agc }
    118  1.1       agc 
    119  1.1       agc 
    120  1.1       agc /*
    121  1.1       agc  * init_daemon:
    122  1.1       agc  *    Open driver, create communication socket.
    123  1.1       agc  *
    124  1.1       agc  *    Returns:    <0 on error
    125  1.1       agc  */
    126  1.1       agc 
    127  1.3       agc static int
    128  1.1       agc init_daemon(void)
    129  1.1       agc {
    130  1.1       agc 	int sock, i;
    131  1.1       agc 	struct sockaddr_un name;
    132  1.1       agc 	iscsid_request_t req;
    133  1.1       agc 
    134  1.1       agc 	if ((driver = open(DEVICE, O_RDONLY)) < 0) {
    135  1.1       agc 		perror("opening " DEVICE);
    136  1.1       agc #ifndef ISCSI_DEBUG		/* DEBUG ONLY: Allow daemon to operate w/o driver */
    137  1.1       agc 		return -1;
    138  1.1       agc #endif
    139  1.1       agc 	}
    140  1.1       agc 
    141  1.1       agc 	sock = socket(AF_UNIX, SOCK_DGRAM, 0);
    142  1.1       agc 	if (sock < 0) {
    143  1.1       agc 		perror("opening datagram socket");
    144  1.1       agc 		return -1;
    145  1.1       agc 	}
    146  1.1       agc 
    147  1.1       agc 	name.sun_family = AF_UNIX;
    148  1.1       agc 	strlcpy(name.sun_path, ISCSID_SOCK_NAME, sizeof(name.sun_path));
    149  1.1       agc 
    150  1.1       agc 	req.request = ISCSID_DAEMON_TEST;
    151  1.1       agc 	req.parameter_length = 0;
    152  1.1       agc 
    153  1.2  christos 	i = sendto(sock, &req, sizeof(req), 0, (struct sockaddr *)(void *)&name,
    154  1.2  christos 				(socklen_t)sizeof(struct sockaddr_un));
    155  1.1       agc 	if (i == sizeof(req)) {
    156  1.1       agc 		printf("Daemon already loaded!\n");
    157  1.1       agc 		close(sock);
    158  1.1       agc 		return -1;
    159  1.1       agc 	}
    160  1.1       agc 
    161  1.1       agc 	unlink(ISCSID_SOCK_NAME);
    162  1.2  christos 	if (bind(sock, (struct sockaddr *)(void *)&name, (socklen_t)sizeof(struct sockaddr_un))) {
    163  1.1       agc 		perror("binding name to socket");
    164  1.1       agc 		return -1;
    165  1.1       agc 	}
    166  1.1       agc 
    167  1.1       agc 	for (i = 0; i < NUM_DAEMON_LISTS; i++) {
    168  1.1       agc 		TAILQ_INIT(&list[i].list);
    169  1.1       agc 		list[i].num_entries = 0;
    170  1.1       agc 	}
    171  1.1       agc 
    172  1.5  christos 	if (!nothreads && (i = pthread_mutex_init(&sesslist_lock, NULL)) != 0) {
    173  1.1       agc 		printf("Mutex init failed (%d)\n", i);
    174  1.1       agc 		close(sock);
    175  1.1       agc 		return -1;
    176  1.1       agc 	}
    177  1.1       agc 
    178  1.1       agc 	if (!register_event_handler()) {
    179  1.1       agc 		printf("Couldn't register event handler\n");
    180  1.1       agc 		close(sock);
    181  1.1       agc 		unlink(ISCSID_SOCK_NAME);
    182  1.5  christos 		if (!nothreads)
    183  1.5  christos 			pthread_mutex_destroy(&sesslist_lock);
    184  1.1       agc 		return -1;
    185  1.1       agc 	}
    186  1.1       agc 
    187  1.1       agc 	create_node_name();
    188  1.1       agc 
    189  1.1       agc 	return sock;
    190  1.1       agc }
    191  1.1       agc 
    192  1.1       agc 
    193  1.1       agc /*
    194  1.1       agc  * make_rsp:
    195  1.1       agc  *    Allocate a response buffer if the static buffer is insufficient, set
    196  1.1       agc  *    the response parameter length.
    197  1.1       agc  *
    198  1.1       agc  *    Parameter:
    199  1.1       agc  *          len         Response parameter size (not counting header)
    200  1.1       agc  *          prsp        Pointer to address of response buffer
    201  1.1       agc  *          prsp_temp   Will be set to TRUE if buffer was allocated, FALSE
    202  1.1       agc  *                      for static buffer.
    203  1.1       agc  *
    204  1.1       agc  *    Returns:    Pointer to response buffer, NULL if allocation failed.
    205  1.1       agc  */
    206  1.1       agc 
    207  1.1       agc iscsid_response_t *
    208  1.2  christos make_rsp(size_t len, iscsid_response_t ** prsp, int *prsp_temp)
    209  1.1       agc {
    210  1.1       agc 	iscsid_response_t *rsp;
    211  1.1       agc 
    212  1.1       agc 	if ((len + sizeof(iscsid_response_t)) > RSP_BUFFER_SIZE) {
    213  1.1       agc 		if ((rsp = calloc(1, len)) == NULL) {
    214  1.1       agc 			(*prsp)->status = ISCSID_STATUS_NO_RESOURCES;
    215  1.1       agc 			return NULL;
    216  1.1       agc 		}
    217  1.1       agc 		*prsp_temp = TRUE;
    218  1.1       agc 		*prsp = rsp;
    219  1.1       agc 	} else
    220  1.1       agc 		rsp = *prsp;
    221  1.1       agc 
    222  1.1       agc 	memset (rsp, 0, len + sizeof(iscsid_response_t));
    223  1.2  christos 	rsp->parameter_length = (uint32_t)len;
    224  1.1       agc 	return rsp;
    225  1.1       agc }
    226  1.1       agc 
    227  1.1       agc 
    228  1.1       agc /*
    229  1.1       agc  * process_message:
    230  1.1       agc  *    minimal parameter check and dispatch for the daemon functions.
    231  1.1       agc  *
    232  1.1       agc  *    Parameter:
    233  1.1       agc  *          req         The request
    234  1.1       agc  *          prsp        Pointer to address of response buffer
    235  1.1       agc  *          prsp_temp   Will be set to TRUE if buffer was allocated, FALSE
    236  1.1       agc  *                      for static buffer.
    237  1.1       agc  */
    238  1.1       agc 
    239  1.3       agc static void
    240  1.1       agc process_message(iscsid_request_t *req, iscsid_response_t **prsp, int *prsp_temp)
    241  1.1       agc {
    242  1.1       agc 	iscsid_response_t *rsp;
    243  1.2  christos 	void *p = req->parameter;
    244  1.1       agc 
    245  1.1       agc 	*prsp_temp = FALSE;
    246  1.2  christos 	*prsp = rsp = (iscsid_response_t *)(void *)rsp_buf;
    247  1.1       agc 	rsp->parameter_length = 0;
    248  1.1       agc 	rsp->status = ISCSID_STATUS_SUCCESS;
    249  1.1       agc 
    250  1.1       agc 	switch (req->request) {
    251  1.1       agc 	case ISCSID_ADD_TARGET:
    252  1.1       agc 		if (req->parameter_length < sizeof(iscsid_add_target_req_t)) {
    253  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    254  1.1       agc 			break;
    255  1.1       agc 		}
    256  1.2  christos 		add_target((iscsid_add_target_req_t *)p, prsp, prsp_temp);
    257  1.1       agc 		break;
    258  1.1       agc 
    259  1.1       agc 	case ISCSID_ADD_PORTAL:
    260  1.1       agc 		if (req->parameter_length != sizeof(iscsid_add_portal_req_t)) {
    261  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    262  1.1       agc 			break;
    263  1.1       agc 		}
    264  1.2  christos 		add_portal((iscsid_add_portal_req_t *)p, prsp, prsp_temp);
    265  1.1       agc 		break;
    266  1.1       agc 
    267  1.1       agc 	case ISCSID_SET_TARGET_OPTIONS:
    268  1.1       agc 		if (req->parameter_length != sizeof(iscsid_get_set_target_options_t)) {
    269  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    270  1.1       agc 			break;
    271  1.1       agc 		}
    272  1.2  christos 		rsp->status = set_target_options((iscsid_get_set_target_options_t *)p);
    273  1.1       agc 		break;
    274  1.1       agc 
    275  1.1       agc 	case ISCSID_GET_TARGET_OPTIONS:
    276  1.1       agc 		if (req->parameter_length != sizeof(iscsid_sym_id_t)) {
    277  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    278  1.1       agc 			break;
    279  1.1       agc 		}
    280  1.1       agc 		rsp->status = ISCSID_STATUS_NOTIMPL;
    281  1.1       agc 		break;
    282  1.1       agc 
    283  1.1       agc 	case ISCSID_SET_TARGET_AUTHENTICATION:
    284  1.1       agc 		if (req->parameter_length !=
    285  1.1       agc 			sizeof(iscsid_set_target_authentication_req_t)) {
    286  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    287  1.1       agc 			break;
    288  1.1       agc 		}
    289  1.2  christos 		rsp->status = set_target_auth((iscsid_set_target_authentication_req_t *)p);
    290  1.1       agc 		break;
    291  1.1       agc 
    292  1.1       agc 	case ISCSID_SLP_FIND_TARGETS:
    293  1.1       agc 		rsp->status = ISCSID_STATUS_NOTIMPL;
    294  1.1       agc 		break;
    295  1.1       agc 
    296  1.1       agc 	case ISCSID_REFRESH_TARGETS:
    297  1.1       agc 		if (req->parameter_length < sizeof(iscsid_refresh_req_t)) {
    298  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    299  1.1       agc 			break;
    300  1.1       agc 		}
    301  1.2  christos 		rsp->status = refresh_targets((iscsid_refresh_req_t *)p);
    302  1.1       agc 		break;
    303  1.1       agc 
    304  1.1       agc 	case ISCSID_REMOVE_TARGET:
    305  1.1       agc 		if (req->parameter_length != sizeof(iscsid_list_id_t)) {
    306  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    307  1.1       agc 			break;
    308  1.1       agc 		}
    309  1.2  christos 		rsp->status = remove_target((iscsid_list_id_t *)p);
    310  1.1       agc 		break;
    311  1.1       agc 
    312  1.1       agc 	case ISCSID_SEARCH_LIST:
    313  1.1       agc 		if (req->parameter_length != sizeof(iscsid_search_list_req_t)) {
    314  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    315  1.1       agc 			break;
    316  1.1       agc 		}
    317  1.2  christos 		search_list((iscsid_search_list_req_t *)p, prsp, prsp_temp);
    318  1.1       agc 		break;
    319  1.1       agc 
    320  1.1       agc 	case ISCSID_GET_LIST:
    321  1.1       agc 		if (req->parameter_length != sizeof(iscsid_get_list_req_t)) {
    322  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    323  1.1       agc 			break;
    324  1.1       agc 		}
    325  1.2  christos 		get_list((iscsid_get_list_req_t *)p, prsp, prsp_temp);
    326  1.1       agc 		break;
    327  1.1       agc 
    328  1.1       agc 	case ISCSID_GET_TARGET_INFO:
    329  1.1       agc 		if (req->parameter_length != sizeof(iscsid_list_id_t)) {
    330  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    331  1.1       agc 			break;
    332  1.1       agc 		}
    333  1.2  christos 		get_target_info((iscsid_list_id_t *)p, prsp, prsp_temp);
    334  1.1       agc 		break;
    335  1.1       agc 
    336  1.1       agc 	case ISCSID_GET_PORTAL_INFO:
    337  1.1       agc 		if (req->parameter_length != sizeof(iscsid_list_id_t)) {
    338  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    339  1.1       agc 			break;
    340  1.1       agc 		}
    341  1.2  christos 		get_portal_info((iscsid_list_id_t *)p, prsp, prsp_temp);
    342  1.1       agc 		break;
    343  1.1       agc 
    344  1.1       agc #ifndef ISCSI_MINIMAL
    345  1.1       agc 	case ISCSID_ADD_ISNS_SERVER:
    346  1.1       agc 		if (req->parameter_length != sizeof(iscsid_add_isns_server_req_t)) {
    347  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    348  1.1       agc 			break;
    349  1.1       agc 		}
    350  1.2  christos 		add_isns_server((iscsid_add_isns_server_req_t *)p,
    351  1.1       agc 						prsp, prsp_temp);
    352  1.1       agc 		break;
    353  1.1       agc 
    354  1.1       agc 	case ISCSID_GET_ISNS_SERVER:
    355  1.1       agc 		if (req->parameter_length != sizeof(iscsid_sym_id_t)) {
    356  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    357  1.1       agc 			break;
    358  1.1       agc 		}
    359  1.2  christos 		get_isns_server((iscsid_sym_id_t *)p, prsp, prsp_temp);
    360  1.1       agc 		break;
    361  1.1       agc 
    362  1.1       agc 	case ISCSID_SLP_FIND_ISNS_SERVERS:
    363  1.1       agc 		rsp->status = ISCSID_STATUS_NOTIMPL;
    364  1.1       agc 		break;
    365  1.1       agc 
    366  1.1       agc 	case ISCSID_REMOVE_ISNS_SERVER:
    367  1.1       agc 		if (req->parameter_length != sizeof(iscsid_sym_id_t)) {
    368  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    369  1.1       agc 			break;
    370  1.1       agc 		}
    371  1.2  christos 		rsp->status = remove_isns_server((iscsid_sym_id_t *)p);
    372  1.1       agc 		break;
    373  1.1       agc #endif
    374  1.1       agc 
    375  1.1       agc 	case ISCSID_ADD_INITIATOR_PORTAL:
    376  1.1       agc 		if (req->parameter_length != sizeof(iscsid_add_initiator_req_t)) {
    377  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    378  1.1       agc 			break;
    379  1.1       agc 		}
    380  1.2  christos 		add_initiator_portal((iscsid_add_initiator_req_t *)p,
    381  1.1       agc 							prsp, prsp_temp);
    382  1.1       agc 		break;
    383  1.1       agc 
    384  1.1       agc 	case ISCSID_GET_INITIATOR_PORTAL:
    385  1.1       agc 		if (req->parameter_length != sizeof(iscsid_sym_id_t)) {
    386  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    387  1.1       agc 			break;
    388  1.1       agc 		}
    389  1.2  christos 		get_initiator_portal((iscsid_sym_id_t *)p, prsp, prsp_temp);
    390  1.1       agc 		break;
    391  1.1       agc 
    392  1.1       agc 	case ISCSID_REMOVE_INITIATOR_PORTAL:
    393  1.1       agc 		if (req->parameter_length != sizeof(iscsid_sym_id_t)) {
    394  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    395  1.1       agc 			break;
    396  1.1       agc 		}
    397  1.2  christos 		rsp->status = remove_initiator_portal((iscsid_sym_id_t *)p);
    398  1.1       agc 		break;
    399  1.1       agc 
    400  1.1       agc 	case ISCSID_LOGIN:
    401  1.1       agc 		if (req->parameter_length != sizeof(iscsid_login_req_t)) {
    402  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    403  1.1       agc 			break;
    404  1.1       agc 		}
    405  1.2  christos 		login((iscsid_login_req_t *)p, rsp);
    406  1.1       agc 		break;
    407  1.1       agc 
    408  1.1       agc 	case ISCSID_ADD_CONNECTION:
    409  1.1       agc 		if (req->parameter_length != sizeof(iscsid_login_req_t)) {
    410  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    411  1.1       agc 			break;
    412  1.1       agc 		}
    413  1.2  christos 		add_connection((iscsid_login_req_t *)p, rsp);
    414  1.1       agc 		break;
    415  1.1       agc 
    416  1.1       agc 	case ISCSID_LOGOUT:
    417  1.1       agc 		if (req->parameter_length != sizeof(iscsid_sym_id_t)) {
    418  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    419  1.1       agc 			break;
    420  1.1       agc 		}
    421  1.2  christos 		rsp->status = logout((iscsid_sym_id_t *)p);
    422  1.1       agc 		break;
    423  1.1       agc 
    424  1.1       agc 	case ISCSID_REMOVE_CONNECTION:
    425  1.1       agc 		if (req->parameter_length != sizeof(iscsid_remove_connection_req_t)) {
    426  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    427  1.1       agc 			break;
    428  1.1       agc 		}
    429  1.2  christos 		rsp->status = remove_connection((iscsid_remove_connection_req_t *)p);
    430  1.1       agc 		break;
    431  1.1       agc 
    432  1.1       agc 	case ISCSID_GET_SESSION_LIST:
    433  1.1       agc 		get_session_list(prsp, prsp_temp);
    434  1.1       agc 		break;
    435  1.1       agc 
    436  1.1       agc 	case ISCSID_GET_CONNECTION_LIST:
    437  1.1       agc 		if (req->parameter_length != sizeof(iscsid_sym_id_t)) {
    438  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    439  1.1       agc 			break;
    440  1.1       agc 		}
    441  1.2  christos 		get_connection_list((iscsid_sym_id_t *)p, prsp, prsp_temp);
    442  1.1       agc 		break;
    443  1.1       agc 
    444  1.1       agc 	case ISCSID_GET_CONNECTION_INFO:
    445  1.1       agc 		if (req->parameter_length != sizeof(iscsid_get_connection_info_req_t)) {
    446  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    447  1.1       agc 			break;
    448  1.1       agc 		}
    449  1.2  christos 		get_connection_info((iscsid_get_connection_info_req_t *)p,
    450  1.1       agc 							prsp, prsp_temp);
    451  1.1       agc 		break;
    452  1.1       agc 
    453  1.1       agc 	case ISCSID_SET_NODE_NAME:
    454  1.1       agc 		if (req->parameter_length != sizeof(iscsid_set_node_name_req_t)) {
    455  1.1       agc 			rsp->status = ISCSID_STATUS_INVALID_PARAMETER;
    456  1.1       agc 			break;
    457  1.1       agc 		}
    458  1.2  christos 		rsp->status = set_node_name((iscsid_set_node_name_req_t *)p);
    459  1.1       agc 		break;
    460  1.1       agc 
    461  1.1       agc 	case ISCSID_GET_VERSION:
    462  1.1       agc 		get_version(prsp, prsp_temp);
    463  1.1       agc 		break;
    464  1.1       agc 
    465  1.1       agc 	default:
    466  1.1       agc 		rsp->status = ISCSID_STATUS_INVALID_REQUEST;
    467  1.1       agc 		break;
    468  1.1       agc 	}
    469  1.1       agc }
    470  1.1       agc 
    471  1.1       agc 
    472  1.1       agc /*
    473  1.1       agc  * exit_daemon:
    474  1.1       agc  *    Deregister the event handler, deregister isns servers, then exit program.
    475  1.1       agc  */
    476  1.1       agc 
    477  1.1       agc void
    478  1.1       agc exit_daemon(void)
    479  1.1       agc {
    480  1.6       riz 	LOCK_SESSIONS;
    481  1.1       agc 	deregister_event_handler();
    482  1.1       agc 
    483  1.1       agc #ifndef ISCSI_MINIMAL
    484  1.1       agc 	dereg_all_isns_servers();
    485  1.1       agc #endif
    486  1.1       agc 
    487  1.6       riz 	close(client_sock);
    488  1.1       agc 	printf("iSCSI Daemon Exits\n");
    489  1.1       agc 	exit(0);
    490  1.1       agc }
    491  1.1       agc 
    492  1.1       agc 
    493  1.1       agc /*
    494  1.1       agc  * main:
    495  1.1       agc  *    init, go daemon, then loop reading requests, processing them,
    496  1.1       agc  *    and sending responses.
    497  1.1       agc  *    Stops on receiving a terminate message (no response to that one is sent),
    498  1.1       agc  *    or when an error occurs reading or writing the socket.
    499  1.1       agc  *
    500  1.1       agc  *    Parameter:  argc, argv currently ignored.
    501  1.1       agc  */
    502  1.1       agc 
    503  1.1       agc int
    504  1.2  christos /*ARGSUSED*/
    505  1.1       agc main(int argc, char **argv)
    506  1.1       agc {
    507  1.4  christos 	int req_temp, rsp_temp, c;
    508  1.2  christos 	ssize_t ret;
    509  1.2  christos 	size_t len;
    510  1.1       agc 	struct sockaddr_un from;
    511  1.1       agc 	socklen_t fromlen;
    512  1.1       agc 	iscsid_request_t *req;
    513  1.1       agc 	iscsid_response_t *rsp;
    514  1.1       agc 	struct timeval seltout = { 2, 0 };	/* 2 second poll interval */
    515  1.1       agc 
    516  1.1       agc 	client_sock = init_daemon();
    517  1.1       agc 	if (client_sock < 0)
    518  1.1       agc 		exit(1);
    519  1.1       agc 
    520  1.1       agc 	printf("iSCSI Daemon loaded\n");
    521  1.1       agc 
    522  1.5  christos 	while ((c = getopt(argc, argv, "dn")) != -1)
    523  1.4  christos 		switch (c) {
    524  1.5  christos 		case 'n':
    525  1.5  christos 			nothreads++;
    526  1.5  christos 			break;
    527  1.4  christos 		case 'd':
    528  1.4  christos 			debug_level++;
    529  1.4  christos 			break;
    530  1.4  christos 		default:
    531  1.4  christos 			usage();
    532  1.4  christos 		}
    533  1.4  christos 
    534  1.4  christos 	if (!debug_level)
    535  1.4  christos 		daemon(0, 1);
    536  1.1       agc 
    537  1.5  christos 	if (nothreads)
    538  1.5  christos 		setsockopt(client_sock, SOL_SOCKET, SO_RCVTIMEO, &seltout,
    539  1.5  christos 		    sizeof(seltout));
    540  1.5  christos 	else {
    541  1.5  christos 		ret = pthread_create(&event_thread, NULL, event_handler, NULL);
    542  1.5  christos 		if (ret) {
    543  1.5  christos 			printf("Thread creation failed (%zd)\n", ret);
    544  1.5  christos 			close(client_sock);
    545  1.5  christos 			unlink(ISCSID_SOCK_NAME);
    546  1.5  christos 			deregister_event_handler();
    547  1.5  christos 			pthread_mutex_destroy(&sesslist_lock);
    548  1.5  christos 			return -1;
    549  1.5  christos 		}
    550  1.1       agc 	}
    551  1.1       agc 
    552  1.1       agc     /* ---------------------------------------------------------------------- */
    553  1.1       agc 
    554  1.1       agc 	for (;;) {
    555  1.1       agc 		/* First, get size of request */
    556  1.2  christos 		req = (iscsid_request_t *)(void *)req_buf;
    557  1.1       agc 		fromlen = sizeof(from);
    558  1.1       agc 		len = sizeof(iscsid_request_t);
    559  1.1       agc 
    560  1.5  christos 		if (nothreads) {
    561  1.6       riz 			do {
    562  1.6       riz 				ret = recvfrom(client_sock, req, len, MSG_PEEK |
    563  1.6       riz 				MSG_WAITALL, (struct sockaddr *)(void *)&from,
    564  1.6       riz 			    	&fromlen);
    565  1.6       riz 				if (ret == -1)
    566  1.6       riz 					event_handler(NULL);
    567  1.6       riz 			} while (ret == -1 && errno == EAGAIN);
    568  1.5  christos 		} else {
    569  1.5  christos 			do {
    570  1.5  christos 				ret = recvfrom(client_sock, req, len, MSG_PEEK |
    571  1.5  christos 				    MSG_WAITALL, (struct sockaddr *) &from,
    572  1.5  christos 				    &fromlen);
    573  1.5  christos 				if (ret == -1)
    574  1.5  christos 					event_handler(NULL);
    575  1.5  christos 			} while (ret == -1 && errno == EAGAIN);
    576  1.5  christos 		}
    577  1.1       agc 
    578  1.2  christos 		if ((size_t)ret != len) {
    579  1.1       agc 			perror("Receiving from socket");
    580  1.1       agc 			break;
    581  1.1       agc 		}
    582  1.1       agc 		DEB(99, ("Request %d, parlen %d\n",
    583  1.1       agc 				req->request, req->parameter_length));
    584  1.1       agc 
    585  1.1       agc 		len += req->parameter_length;
    586  1.1       agc 
    587  1.1       agc 		/* now that we know the size, get the buffer for it */
    588  1.1       agc 		req_temp = (len > REQ_BUFFER_SIZE);
    589  1.1       agc 
    590  1.1       agc 		if (req_temp) {
    591  1.1       agc 			req = malloc(len);
    592  1.1       agc 			if (!req) {
    593  1.2  christos 				printf("Can't alloc %zu bytes\n", len);
    594  1.1       agc 				break;
    595  1.1       agc 			}
    596  1.1       agc 		}
    597  1.1       agc 		/* read the complete request */
    598  1.1       agc 		fromlen = sizeof(from);
    599  1.1       agc 		ret = recvfrom(client_sock, req, len, MSG_WAITALL,
    600  1.2  christos 						(struct sockaddr *)(void *)&from, &fromlen);
    601  1.2  christos 		if ((size_t)ret != len) {
    602  1.1       agc 			DEBOUT(("Error receiving from socket!\n"));
    603  1.1       agc 			if (req_temp)
    604  1.1       agc 				free(req);
    605  1.1       agc 			continue;
    606  1.1       agc 		}
    607  1.1       agc 		/* terminate? then go die. */
    608  1.1       agc 		if (req->request == ISCSID_DAEMON_TERMINATE)
    609  1.1       agc 			break;
    610  1.1       agc 
    611  1.1       agc 		/* No reply required to test message */
    612  1.1       agc 		if (req->request == ISCSID_DAEMON_TEST) {
    613  1.1       agc 			if (req_temp)
    614  1.1       agc 				free(req);
    615  1.1       agc 			continue;
    616  1.1       agc 		}
    617  1.1       agc 		/* no return path? then we can't send a reply, */
    618  1.1       agc 		/* so don't process the command */
    619  1.1       agc 		if (!from.sun_path[0]) {
    620  1.1       agc 			DEBOUT(("No Return Address!\n"));
    621  1.1       agc 			continue;
    622  1.1       agc 		}
    623  1.1       agc 		/* process the request */
    624  1.1       agc 		process_message(req, &rsp, &rsp_temp);
    625  1.1       agc 		if (rsp == NULL)
    626  1.1       agc 			break;
    627  1.1       agc 
    628  1.1       agc 		DEB(99, ("Sending reply: status %d, len %d\n",
    629  1.1       agc 				rsp->status, rsp->parameter_length));
    630  1.1       agc 
    631  1.1       agc 		/* send the response */
    632  1.1       agc 		len = sizeof(iscsid_response_t) + rsp->parameter_length;
    633  1.1       agc 		ret = sendto(client_sock, rsp, len, 0,
    634  1.2  christos 					(struct sockaddr *)(void *)&from, fromlen);
    635  1.2  christos 		if (len != (size_t)ret) {
    636  1.1       agc 			DEBOUT(("Error sending reply!\n"));
    637  1.1       agc 		}
    638  1.1       agc 		/* free temp buffers if we needed them */
    639  1.1       agc 		if (req_temp)
    640  1.1       agc 			free(req);
    641  1.1       agc 		if (rsp_temp)
    642  1.1       agc 			free(rsp);
    643  1.1       agc 	}
    644  1.1       agc 
    645  1.1       agc 	exit_daemon();
    646  1.1       agc 
    647  1.1       agc 	/* we never get here */
    648  1.1       agc 	return 0;
    649  1.1       agc }
    650