1/*
2 * Copyright (c) 2004-2009 Voltaire, Inc. All rights reserved.
3 * Copyright (c) 2002-2005 Mellanox Technologies LTD. All rights reserved.
4 * Copyright (c) 1996-2003 Intel Corporation. All rights reserved.
5 * Copyright (c) 2013 Oracle and/or its affiliates. All rights reserved.
6 *
7 * This software is available to you under a choice of one of two
8 * licenses.  You may choose to be licensed under the terms of the GNU
9 * General Public License (GPL) Version 2, available from the file
10 * COPYING in the main directory of this source tree, or the
11 * OpenIB.org BSD license below:
12 *
13 *     Redistribution and use in source and binary forms, with or
14 *     without modification, are permitted provided that the following
15 *     conditions are met:
16 *
17 *      - Redistributions of source code must retain the above
18 *        copyright notice, this list of conditions and the following
19 *        disclaimer.
20 *
21 *      - Redistributions in binary form must reproduce the above
22 *        copyright notice, this list of conditions and the following
23 *        disclaimer in the documentation and/or other materials
24 *        provided with the distribution.
25 *
26 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
27 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
28 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
29 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
30 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
31 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
32 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
33 * SOFTWARE.
34 *
35 */
36
37/*
38 * Abstract:
39 *    Implementation of osm_sminfo_rcv_t.
40 * This object represents the SMInfo Receiver object.
41 * This object is part of the opensm family of objects.
42 */
43
44#if HAVE_CONFIG_H
45#  include <config.h>
46#endif				/* HAVE_CONFIG_H */
47
48#include <stdlib.h>
49#include <string.h>
50#include <iba/ib_types.h>
51#include <complib/cl_qmap.h>
52#include <complib/cl_passivelock.h>
53#include <complib/cl_debug.h>
54#include <opensm/osm_file_ids.h>
55#define FILE_ID OSM_FILE_SMINFO_RCV_C
56#include <opensm/osm_madw.h>
57#include <opensm/osm_log.h>
58#include <opensm/osm_node.h>
59#include <opensm/osm_helper.h>
60#include <opensm/osm_subnet.h>
61#include <opensm/osm_sm.h>
62#include <opensm/osm_opensm.h>
63
64/**********************************************************************
65 Return TRUE if the remote sm given (by ib_sm_info_t) is higher,
66 return FALSE otherwise.
67 By higher - we mean: SM with higher priority or with same priority
68 and lower GUID.
69**********************************************************************/
70static boolean_t smi_rcv_remote_sm_is_higher(IN osm_sm_t * sm,
71					     IN const ib_sm_info_t * p_rem_smi)
72{
73	return osm_sm_is_greater_than(ib_sminfo_get_priority(p_rem_smi),
74				      p_rem_smi->guid,
75				      sm->p_subn->opt.sm_priority,
76				      sm->p_subn->sm_port_guid);
77
78}
79
80static void smi_rcv_process_get_request(IN osm_sm_t * sm,
81					IN const osm_madw_t * p_madw,
82					IN boolean_t fill_sm_key)
83{
84	uint8_t payload[IB_SMP_DATA_SIZE];
85	ib_sm_info_t *p_smi = (ib_sm_info_t *) payload;
86	ib_api_status_t status;
87
88	OSM_LOG_ENTER(sm->p_log);
89
90	CL_ASSERT(p_madw);
91
92	/* No real need to grab the lock for this function. */
93	memset(payload, 0, sizeof(payload));
94
95	CL_ASSERT(osm_madw_get_smp_ptr(p_madw)->method == IB_MAD_METHOD_GET);
96
97	p_smi->guid = sm->p_subn->sm_port_guid;
98	p_smi->act_count = cl_hton32(sm->p_subn->p_osm->stats.qp0_mads_sent);
99	p_smi->pri_state = (uint8_t) (sm->p_subn->sm_state |
100				      sm->p_subn->opt.sm_priority << 4);
101	p_smi->sm_key = fill_sm_key ? sm->p_subn->opt.sm_key : 0;
102
103	status = osm_resp_send(sm, p_madw, 0, payload);
104	if (status != IB_SUCCESS) {
105		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F02: "
106			"Error sending SMInfo response (%s)\n",
107			ib_get_err_str(status));
108		goto Exit;
109	}
110
111Exit:
112	OSM_LOG_EXIT(sm->p_log);
113}
114
115/**********************************************************************
116 * Check if the p_smp received is legal.
117 * Current checks:
118 *   MADHeader:AttributeModifier of ACKNOWLEDGE that was not sent by a
119 *             Standby SM.
120 *   MADHeader:AttributeModifiers of HANDOVER/DISABLE/STANDBY/DISCOVER
121 *             that was not sent by a Master SM.
122 * FUTURE - TO DO:
123 *   Check that the SM_Key matches.
124 **********************************************************************/
125static ib_api_status_t smi_rcv_check_set_req_legality(IN const ib_smp_t * p_smp)
126{
127	ib_sm_info_t *p_smi;
128
129	p_smi = ib_smp_get_payload_ptr(p_smp);
130
131	if (p_smp->attr_mod == IB_SMINFO_ATTR_MOD_ACKNOWLEDGE) {
132		if (ib_sminfo_get_state(p_smi) == IB_SMINFO_STATE_STANDBY)
133			return IB_SUCCESS;
134	} else if (p_smp->attr_mod == IB_SMINFO_ATTR_MOD_HANDOVER ||
135		   p_smp->attr_mod == IB_SMINFO_ATTR_MOD_DISABLE ||
136		   p_smp->attr_mod == IB_SMINFO_ATTR_MOD_STANDBY ||
137		   p_smp->attr_mod == IB_SMINFO_ATTR_MOD_DISCOVER) {
138		if (ib_sminfo_get_state(p_smi) == IB_SMINFO_STATE_MASTER)
139			return IB_SUCCESS;
140	}
141
142	return IB_INVALID_PARAMETER;
143}
144
145static void smi_rcv_process_set_request(IN osm_sm_t * sm,
146					IN const osm_madw_t * p_madw)
147{
148	uint8_t payload[IB_SMP_DATA_SIZE];
149	ib_smp_t *p_smp;
150	ib_sm_info_t *p_smi = (ib_sm_info_t *) payload;
151	ib_sm_info_t *sm_smi;
152	ib_api_status_t status;
153	osm_sm_signal_t sm_signal;
154
155	OSM_LOG_ENTER(sm->p_log);
156
157	CL_ASSERT(p_madw);
158
159	memset(payload, 0, sizeof(payload));
160
161	p_smp = osm_madw_get_smp_ptr(p_madw);
162	sm_smi = ib_smp_get_payload_ptr(p_smp);
163
164	if (p_smp->method != IB_MAD_METHOD_SET) {
165		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F03: "
166			"Unsupported set method 0x%X\n", p_smp->method);
167		goto Exit;
168	}
169
170	CL_PLOCK_ACQUIRE(sm->p_lock);
171
172	p_smi->guid = sm->p_subn->sm_port_guid;
173	p_smi->act_count = cl_hton32(sm->p_subn->p_osm->stats.qp0_mads_sent);
174	p_smi->pri_state = (uint8_t) (sm->p_subn->sm_state |
175				      sm->p_subn->opt.sm_priority << 4);
176	p_smi->sm_key = sm->p_subn->opt.sm_key;
177
178	/* Check the legality of the packet */
179	status = smi_rcv_check_set_req_legality(p_smp);
180	if (status != IB_SUCCESS) {
181		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F04: "
182			"Check legality failed. AttributeModifier:0x%X RemoteState:%s\n",
183			p_smp->attr_mod,
184			osm_get_sm_mgr_state_str(ib_sminfo_get_state(sm_smi)));
185		status = osm_resp_send(sm, p_madw, 7, payload);
186		if (status != IB_SUCCESS)
187			OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F05: "
188				"Error sending SMInfo response (%s)\n",
189				ib_get_err_str(status));
190		CL_PLOCK_RELEASE(sm->p_lock);
191		goto Exit;
192	}
193
194	/* translate from IB_SMINFO_ATTR to OSM_SM_SIGNAL */
195	switch (p_smp->attr_mod) {
196	case IB_SMINFO_ATTR_MOD_HANDOVER:
197		sm_signal = OSM_SM_SIGNAL_HANDOVER;
198		break;
199	case IB_SMINFO_ATTR_MOD_ACKNOWLEDGE:
200		sm_signal = OSM_SM_SIGNAL_ACKNOWLEDGE;
201		break;
202	case IB_SMINFO_ATTR_MOD_DISABLE:
203		sm_signal = OSM_SM_SIGNAL_DISABLE;
204		break;
205	case IB_SMINFO_ATTR_MOD_STANDBY:
206		sm_signal = OSM_SM_SIGNAL_STANDBY;
207		break;
208	case IB_SMINFO_ATTR_MOD_DISCOVER:
209		sm_signal = OSM_SM_SIGNAL_DISCOVER;
210		break;
211	default:
212		/*
213		   This code shouldn't be reached - checked in the
214		   check legality
215		 */
216		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F06: "
217			"THIS CODE SHOULD NOT BE REACHED!!\n");
218		CL_PLOCK_RELEASE(sm->p_lock);
219		goto Exit;
220	}
221
222	CL_PLOCK_RELEASE(sm->p_lock);
223
224	/* check legality of the needed transition in the SM state machine */
225	status = osm_sm_state_mgr_check_legality(sm, sm_signal);
226	if (status != IB_SUCCESS) {
227		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F07: "
228			"Failed check of legality of needed SM transition. "
229			"AttributeModifier:0x%X RemoteState:%s\n",
230			p_smp->attr_mod,
231			osm_get_sm_mgr_state_str(ib_sminfo_get_state(sm_smi)));
232		status = osm_resp_send(sm, p_madw, 7, payload);
233		if (status != IB_SUCCESS)
234			OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F08: "
235				"Error sending SMInfo response (%s)\n",
236				ib_get_err_str(status));
237		goto Exit;
238	}
239
240	/* the SubnSet(SMInfo) command is ok. Send a response. */
241	status = osm_resp_send(sm, p_madw, 0, payload);
242	if (status != IB_SUCCESS)
243		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F09: "
244			"Error sending SMInfo response (%s)\n",
245			ib_get_err_str(status));
246
247	/* it is a legal packet - act according to it */
248
249	/* if the AttributeModifier is STANDBY - need to save on the sm in */
250	/* the master_sm_guid variable - the guid of the current master. */
251	if (p_smp->attr_mod == IB_SMINFO_ATTR_MOD_STANDBY) {
252		OSM_LOG(sm->p_log, OSM_LOG_VERBOSE,
253			"Received a STANDBY signal. Updating "
254			"sm_state_mgr master_guid: 0x%016" PRIx64 "\n",
255			cl_ntoh64(sm_smi->guid));
256		CL_PLOCK_EXCL_ACQUIRE(sm->p_lock);
257		sm->master_sm_guid = sm_smi->guid;
258		CL_PLOCK_RELEASE(sm->p_lock);
259	}
260
261	status = osm_sm_state_mgr_process(sm, sm_signal);
262
263	if (status != IB_SUCCESS)
264		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F10: "
265			"Error in SM state transition (%s)\n",
266			ib_get_err_str(status));
267
268Exit:
269	OSM_LOG_EXIT(sm->p_log);
270}
271
272static void smi_rcv_process_get_sm(IN osm_sm_t * sm,
273				   IN const osm_remote_sm_t * p_sm,
274				   boolean_t light_sweep)
275{
276	const ib_sm_info_t *p_smi;
277
278	OSM_LOG_ENTER(sm->p_log);
279
280	p_smi = &p_sm->smi;
281
282	OSM_LOG(sm->p_log, OSM_LOG_VERBOSE,
283		"Detected SM 0x%016" PRIx64 " in state %u (%s)\n",
284		cl_ntoh64(p_smi->guid), ib_sminfo_get_state(p_smi),
285		osm_get_sm_mgr_state_str(ib_sminfo_get_state(p_smi)));
286
287	/* Check the state of this SM vs. our own. */
288	switch (sm->p_subn->sm_state) {
289	case IB_SMINFO_STATE_NOTACTIVE:
290		break;
291
292	case IB_SMINFO_STATE_DISCOVERING:
293		switch (ib_sminfo_get_state(p_smi)) {
294		case IB_SMINFO_STATE_NOTACTIVE:
295			break;
296		case IB_SMINFO_STATE_MASTER:
297			sm->master_sm_found = 1;
298			/* save on the sm the guid of the current master. */
299			OSM_LOG(sm->p_log, OSM_LOG_VERBOSE,
300				"Found master SM. Updating sm_state_mgr master_guid: 0x%016"
301				PRIx64 "\n", cl_ntoh64(p_smi->guid));
302			sm->master_sm_guid = p_smi->guid;
303			break;
304		case IB_SMINFO_STATE_DISCOVERING:
305		case IB_SMINFO_STATE_STANDBY:
306			if (smi_rcv_remote_sm_is_higher(sm, p_smi)) {
307				/* the remote is a higher sm - need to stop sweeping */
308				sm->master_sm_found = 1;
309				/* save on the sm the guid of the higher SM we found - */
310				/* we will poll it - as long as it lives - we should be in Standby. */
311				OSM_LOG(sm->p_log, OSM_LOG_VERBOSE,
312					"Found higher SM. Updating sm_state_mgr master_guid:"
313					" 0x%016" PRIx64 "\n",
314					cl_ntoh64(p_smi->guid));
315				sm->master_sm_guid = p_smi->guid;
316			}
317			break;
318		default:
319			break;
320		}
321		break;
322
323	case IB_SMINFO_STATE_STANDBY:
324		/* if the guid of the SM that sent us this response is equal to the */
325		/* p_sm_mgr->master_guid - then this is a signal that the polling */
326		switch (ib_sminfo_get_state(p_smi)) {
327		case IB_SMINFO_STATE_MASTER:
328			/* This means the master is alive */
329			/* Signal that to the SM state mgr */
330			osm_sm_state_mgr_signal_master_is_alive(sm);
331
332			if (!smi_rcv_remote_sm_is_higher(sm, p_smi))
333				osm_send_trap144(sm,
334						 TRAP_144_MASK_SM_PRIORITY_CHANGE);
335			break;
336		case IB_SMINFO_STATE_STANDBY:
337			/* This should be the response from the sm we are polling. */
338			/* If it is - then signal master is alive */
339			if (sm->master_sm_guid == p_sm->smi.guid) {
340				/* Make sure that it is an SM with higher priority than us.
341				   If we started polling it when it was master, and it moved
342				   to standby - then it might be with a lower priority than
343				   us - and then we don't want to continue polling it. */
344				if (smi_rcv_remote_sm_is_higher(sm, p_smi))
345					osm_sm_state_mgr_signal_master_is_alive
346					    (sm);
347			}
348			break;
349		default:
350			/* any other state - do nothing */
351			break;
352		}
353		break;
354
355	case IB_SMINFO_STATE_MASTER:
356		switch (ib_sminfo_get_state(p_smi)) {
357		case IB_SMINFO_STATE_MASTER:
358			/* If this is a response due to our polling, this means that we are
359			 * waiting for a handover from this SM, and it is still alive -
360			 * signal that. If we detected the remote SM with higher priority
361			 * we should init a heavy sweep in order to go STANDBY. If we
362			 * detected a remote SM with lower priority, we should resend trap144
363			 * as it might not get it and we don't want to wait for a HANDOVER
364			 * forever.
365			 */
366			if (sm->polling_sm_guid) {
367				if (smi_rcv_remote_sm_is_higher(sm, p_smi))
368					sm->p_subn->force_heavy_sweep = TRUE;
369				else {
370					/* Update master_sm_guid to the GUID of the newly
371					 * found MASTER SM and send trap 144 to it.
372					 */
373					sm->master_sm_guid = sm->polling_sm_guid;
374					osm_send_trap144(sm, TRAP_144_MASK_SM_PRIORITY_CHANGE);
375				}
376				osm_sm_state_mgr_signal_master_is_alive(sm);
377			} else {
378				/* This is a response we got while sweeping the subnet.
379				 *
380				 * If this is during a heavy sweep, we will handle a case of
381				 * handover needed later on, when the sweep is done and all
382				 * SMs are recognized.
383				 *
384				 * If this is during a light sweep, initiate a heavy sweep
385				 * to initiate handover scenarios.
386				 *
387				 * Note that it does not matter if the remote SM is lower
388				 * or higher priority.  If it is lower priority, we must
389				 * wait for it HANDOVER.  If it is higher priority, we need
390				 * to HANDOVER to it.  Both cases are handled after doing
391				 * a heavy sweep.
392				 */
393				if (light_sweep)
394					sm->p_subn->force_heavy_sweep = TRUE;
395			}
396			break;
397		case IB_SMINFO_STATE_STANDBY:
398			if (light_sweep &&
399			    smi_rcv_remote_sm_is_higher(sm, p_smi))
400				sm->p_subn->force_heavy_sweep = TRUE;
401			break;
402		default:
403			/* any other state - do nothing */
404			break;
405		}
406		break;
407
408	default:
409		break;
410	}
411
412	OSM_LOG_EXIT(sm->p_log);
413}
414
415static void smi_rcv_process_get_response(IN osm_sm_t * sm,
416					 IN const osm_madw_t * p_madw)
417{
418	const ib_smp_t *p_smp;
419	const ib_sm_info_t *p_smi;
420	cl_qmap_t *p_sm_tbl;
421	osm_port_t *p_port;
422	ib_net64_t port_guid;
423	osm_remote_sm_t *p_sm;
424	char buf[256];
425
426	OSM_LOG_ENTER(sm->p_log);
427
428	CL_ASSERT(p_madw);
429
430	p_smp = osm_madw_get_smp_ptr(p_madw);
431
432	if (p_smp->method != IB_MAD_METHOD_GET_RESP) {
433		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F11: "
434			"Unsupported response method 0x%X\n", p_smp->method);
435		goto Exit;
436	}
437
438	p_smi = ib_smp_get_payload_ptr(p_smp);
439	p_sm_tbl = &sm->p_subn->sm_guid_tbl;
440	port_guid = p_smi->guid;
441
442	osm_dump_sm_info_v2(sm->p_log, p_smi, FILE_ID, OSM_LOG_DEBUG);
443
444	/* Check that the sm_key of the found SM is the same as ours,
445	   or is zero. If not - OpenSM should ignore this SM */
446	if (sm->p_subn->opt.sm_key != 0 && p_smi->sm_key != sm->p_subn->opt.sm_key) {
447		if (p_smp->mgmt_class == IB_MCLASS_SUBN_DIR)
448			sprint_uint8_arr(buf, sizeof(buf),
449				p_smp->initial_path, p_smp->hop_count + 1);
450		else
451			sprintf(buf, "LID %u",
452				cl_ntoh16(p_madw->mad_addr.addr_type.smi.source_lid));
453		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F18: "
454			"Got SM (%s) with sm_key 0x%016" PRIx64 " that doesn't match our "
455			"local sm_key. Ignoring SMInfo\n", buf, cl_ntoh64(p_smi->sm_key));
456		osm_log_v2(sm->p_log, OSM_LOG_SYS, FILE_ID,
457			   "Found remote SM (%s) with non-matching sm_key\n", buf);
458		goto Exit;
459	}
460
461	/* Determine if we already have another SM object for this SM. */
462	CL_PLOCK_EXCL_ACQUIRE(sm->p_lock);
463
464	p_port = osm_get_port_by_guid(sm->p_subn, port_guid);
465	if (!p_port) {
466		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F12: "
467			"No port object for this SM\n");
468		goto _unlock_and_exit;
469	}
470
471	if (osm_port_get_guid(p_port) != p_smi->guid) {
472		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F13: "
473			"Bogus SM port GUID, Expected 0x%016" PRIx64
474			", Received 0x%016" PRIx64 "\n",
475			cl_ntoh64(osm_port_get_guid(p_port)),
476			cl_ntoh64(p_smi->guid));
477		goto _unlock_and_exit;
478	}
479
480	if (port_guid == sm->p_subn->sm_port_guid) {
481		OSM_LOG(sm->p_log, OSM_LOG_VERBOSE,
482			"Self query response received - SM port 0x%016" PRIx64
483			"\n", cl_ntoh64(port_guid));
484		goto _unlock_and_exit;
485	}
486
487	p_sm = (osm_remote_sm_t *) cl_qmap_get(p_sm_tbl, port_guid);
488	if (p_sm == (osm_remote_sm_t *) cl_qmap_end(p_sm_tbl)) {
489		p_sm = malloc(sizeof(*p_sm));
490		if (p_sm == NULL) {
491			OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F14: "
492				"Unable to allocate SM object\n");
493			goto _unlock_and_exit;
494		}
495
496		osm_remote_sm_init(p_sm, p_smi);
497
498		cl_qmap_insert(p_sm_tbl, port_guid, &p_sm->map_item);
499	} else
500		/* We already know this SM. Update the SMInfo attribute. */
501		p_sm->smi = *p_smi;
502
503	smi_rcv_process_get_sm(sm, p_sm,
504			       osm_madw_get_smi_context_ptr(p_madw)->
505			       light_sweep);
506
507_unlock_and_exit:
508	CL_PLOCK_RELEASE(sm->p_lock);
509
510Exit:
511	OSM_LOG_EXIT(sm->p_log);
512}
513
514static void smi_rcv_process_set_response(IN osm_sm_t * sm,
515					 IN const osm_madw_t * p_madw)
516{
517	const ib_smp_t *p_smp;
518	const ib_sm_info_t *p_smi;
519
520	OSM_LOG_ENTER(sm->p_log);
521
522	CL_ASSERT(p_madw);
523
524	p_smp = osm_madw_get_smp_ptr(p_madw);
525	if (ib_smp_get_status(p_smp)) {
526		OSM_LOG(sm->p_log, OSM_LOG_DEBUG,
527			"MAD status 0x%x received\n",
528			cl_ntoh16(ib_smp_get_status(p_smp)));
529		goto Exit;
530	}
531
532	if (p_smp->method != IB_MAD_METHOD_GET_RESP) {
533		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F16: "
534			"Unsupported response method 0x%X\n", p_smp->method);
535		goto Exit;
536	}
537
538	p_smi = ib_smp_get_payload_ptr(p_smp);
539	osm_dump_sm_info_v2(sm->p_log, p_smi, FILE_ID, OSM_LOG_DEBUG);
540
541	/* Check the AttributeModifier */
542	if (p_smp->attr_mod != IB_SMINFO_ATTR_MOD_HANDOVER) {
543		OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F17: "
544			"Unsupported attribute modifier 0x%X, "
545			"expected ATTR_MOD_HANDOVER\n",
546			p_smp->attr_mod);
547		goto Exit;
548	}
549
550	/* This is a response on a HANDOVER request - Nothing to do. */
551
552Exit:
553	OSM_LOG_EXIT(sm->p_log);
554}
555
556void osm_sminfo_rcv_process(IN void *context, IN void *data)
557{
558	osm_sm_t *sm = context;
559	osm_madw_t *p_madw = data;
560	ib_smp_t *p_smp;
561	osm_smi_context_t *p_smi_context;
562
563	OSM_LOG_ENTER(sm->p_log);
564
565	CL_ASSERT(p_madw);
566
567	p_smp = osm_madw_get_smp_ptr(p_madw);
568	if (ib_smp_get_status(p_smp)) {
569		OSM_LOG(sm->p_log, OSM_LOG_DEBUG,
570			"MAD status 0x%x received\n",
571			cl_ntoh16(ib_smp_get_status(p_smp)));
572		goto Exit;
573	}
574
575	/* Determine if this is a request for our own SMInfo or if
576	   this is a response to our request for another SM's SMInfo. */
577	if (ib_smp_is_response(p_smp)) {
578		const ib_sm_info_t *p_smi = ib_smp_get_payload_ptr(p_smp);
579
580		/* Get the context - to see if this is a response to a Get or Set method */
581		p_smi_context = osm_madw_get_smi_context_ptr(p_madw);
582
583		/* Verify that response is from expected port and there is
584		   no port moving issue. */
585		if (p_smi_context->port_guid != p_smi->guid) {
586			OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F19: "
587				"Unexpected SM port GUID in response"
588				", Expected 0x%016" PRIx64
589				", Received 0x%016" PRIx64 "\n",
590				cl_ntoh64(p_smi_context->port_guid),
591				cl_ntoh64(p_smi->guid));
592			goto Exit;
593		}
594
595		if (p_smi_context->set_method == FALSE)
596			/* this is a response to a Get method */
597			smi_rcv_process_get_response(sm, p_madw);
598		else
599			/* this is a response to a Set method */
600			smi_rcv_process_set_response(sm, p_madw);
601	} else {
602		osm_port_t * p_port;
603		ib_net64_t my_mkey;
604		uint8_t mpb;
605		char buf[256];
606
607		if(!(p_port = osm_get_port_by_guid(sm->p_subn,
608						   sm->p_subn->sm_port_guid)))
609			goto Exit;
610
611		if (!p_port->p_physp)
612			goto Exit;
613
614		my_mkey = ib_port_info_get_m_key(&p_port->p_physp->port_info);
615		mpb = my_mkey ? ib_port_info_get_mpb(&p_port->p_physp->port_info) : 0;
616
617		if (p_smp->method == IB_MAD_METHOD_GET) {
618			/* M-Key Authentication */
619			if (my_mkey && mpb > 1 && my_mkey != p_smp->m_key) {
620				if (p_smp->mgmt_class == IB_MCLASS_SUBN_DIR)
621					sprint_uint8_arr(buf, sizeof(buf),
622					      p_smp->return_path, p_smp->hop_count + 1);
623				else
624					sprintf(buf, "LID %u",
625						cl_ntoh16(p_madw->mad_addr.addr_type.smi.source_lid));
626				OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F1A: "
627					"SMInfo(GET) sender (%s) authentication failure."
628					"Ignoring SMInfo\n", buf);
629				goto Exit;
630			}
631			/* If protection bits == 1 but MKEY mismatch, return SM-KEY = 0 */
632			if (my_mkey && mpb == 1 && my_mkey != p_smp->m_key)
633				smi_rcv_process_get_request(sm, p_madw, FALSE);
634			else
635				smi_rcv_process_get_request(sm, p_madw, TRUE);
636		} else {
637			/* M-Key Authentication */
638			if (my_mkey && my_mkey != p_smp->m_key) {
639				if (p_smp->mgmt_class == IB_MCLASS_SUBN_DIR)
640					sprint_uint8_arr(buf, sizeof(buf),
641					      p_smp->return_path, p_smp->hop_count + 1);
642				else
643					sprintf(buf, "LID %u",
644						cl_ntoh16(p_madw->mad_addr.addr_type.smi.source_lid));
645				OSM_LOG(sm->p_log, OSM_LOG_ERROR, "ERR 2F1B: "
646					"SMInfo(SET) sender (%s) authentication failure."
647					"Ignoring SMInfo\n", buf);
648				goto Exit;
649			}
650			/* This should be a SubnSet request */
651			smi_rcv_process_set_request(sm, p_madw);
652		}
653	}
654
655Exit:
656	OSM_LOG_EXIT(sm->p_log);
657}
658