2019-05-27 14:55:06 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2011-07-23 14:43:04 +08:00
|
|
|
/*******************************************************************************
|
|
|
|
* This file contains main functions related to the iSCSI Target Core Driver.
|
|
|
|
*
|
2013-09-06 06:29:12 +08:00
|
|
|
* (c) Copyright 2007-2013 Datera, Inc.
|
2011-07-23 14:43:04 +08:00
|
|
|
*
|
|
|
|
* Author: Nicholas A. Bellinger <nab@linux-iscsi.org>
|
|
|
|
*
|
|
|
|
******************************************************************************/
|
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
#include <crypto/hash.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
#include <linux/string.h>
|
|
|
|
#include <linux/kthread.h>
|
|
|
|
#include <linux/completion.h>
|
2011-08-31 02:20:44 +08:00
|
|
|
#include <linux/module.h>
|
2015-05-29 02:35:41 +08:00
|
|
|
#include <linux/vmalloc.h>
|
2012-02-13 11:58:52 +08:00
|
|
|
#include <linux/idr.h>
|
2016-11-15 07:47:14 +08:00
|
|
|
#include <linux/delay.h>
|
2017-02-09 01:51:30 +08:00
|
|
|
#include <linux/sched/signal.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
#include <asm/unaligned.h>
|
2018-01-25 19:56:46 +08:00
|
|
|
#include <linux/inet.h>
|
2016-11-15 07:47:14 +08:00
|
|
|
#include <net/ipv6.h>
|
2015-05-08 16:11:12 +08:00
|
|
|
#include <scsi/scsi_proto.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
#include <scsi/iscsi_proto.h>
|
2012-04-04 06:51:22 +08:00
|
|
|
#include <scsi/scsi_tcq.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
#include <target/target_core_base.h>
|
2011-11-16 22:46:48 +08:00
|
|
|
#include <target/target_core_fabric.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-01-07 20:57:31 +08:00
|
|
|
#include <target/iscsi/iscsi_target_core.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
#include "iscsi_target_parameters.h"
|
|
|
|
#include "iscsi_target_seq_pdu_list.h"
|
|
|
|
#include "iscsi_target_datain_values.h"
|
|
|
|
#include "iscsi_target_erl0.h"
|
|
|
|
#include "iscsi_target_erl1.h"
|
|
|
|
#include "iscsi_target_erl2.h"
|
|
|
|
#include "iscsi_target_login.h"
|
|
|
|
#include "iscsi_target_tmr.h"
|
|
|
|
#include "iscsi_target_tpg.h"
|
|
|
|
#include "iscsi_target_util.h"
|
|
|
|
#include "iscsi_target.h"
|
|
|
|
#include "iscsi_target_device.h"
|
2015-01-07 20:57:31 +08:00
|
|
|
#include <target/iscsi/iscsi_target_stat.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-07 13:54:13 +08:00
|
|
|
#include <target/iscsi/iscsi_transport.h>
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static LIST_HEAD(g_tiqn_list);
|
|
|
|
static LIST_HEAD(g_np_list);
|
|
|
|
static DEFINE_SPINLOCK(tiqn_lock);
|
2014-01-25 08:18:54 +08:00
|
|
|
static DEFINE_MUTEX(np_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
static struct idr tiqn_idr;
|
2018-06-19 13:23:04 +08:00
|
|
|
DEFINE_IDA(sess_ida);
|
2011-07-23 14:43:04 +08:00
|
|
|
struct mutex auth_id_lock;
|
|
|
|
|
|
|
|
struct iscsit_global *iscsit_global;
|
|
|
|
|
|
|
|
struct kmem_cache *lio_qr_cache;
|
|
|
|
struct kmem_cache *lio_dr_cache;
|
|
|
|
struct kmem_cache *lio_ooo_cache;
|
|
|
|
struct kmem_cache *lio_r2t_cache;
|
|
|
|
|
|
|
|
static int iscsit_handle_immediate_data(struct iscsi_cmd *,
|
2013-03-21 06:29:15 +08:00
|
|
|
struct iscsi_scsi_req *, u32);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
struct iscsi_tiqn *iscsit_get_tiqn_for_login(unsigned char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_tiqn *tiqn = NULL;
|
|
|
|
|
|
|
|
spin_lock(&tiqn_lock);
|
|
|
|
list_for_each_entry(tiqn, &g_tiqn_list, tiqn_list) {
|
|
|
|
if (!strcmp(tiqn->tiqn, buf)) {
|
|
|
|
|
|
|
|
spin_lock(&tiqn->tiqn_state_lock);
|
|
|
|
if (tiqn->tiqn_state == TIQN_STATE_ACTIVE) {
|
|
|
|
tiqn->tiqn_access_count++;
|
|
|
|
spin_unlock(&tiqn->tiqn_state_lock);
|
|
|
|
spin_unlock(&tiqn_lock);
|
|
|
|
return tiqn;
|
|
|
|
}
|
|
|
|
spin_unlock(&tiqn->tiqn_state_lock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock(&tiqn_lock);
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsit_set_tiqn_shutdown(struct iscsi_tiqn *tiqn)
|
|
|
|
{
|
|
|
|
spin_lock(&tiqn->tiqn_state_lock);
|
|
|
|
if (tiqn->tiqn_state == TIQN_STATE_ACTIVE) {
|
|
|
|
tiqn->tiqn_state = TIQN_STATE_SHUTDOWN;
|
|
|
|
spin_unlock(&tiqn->tiqn_state_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
spin_unlock(&tiqn->tiqn_state_lock);
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void iscsit_put_tiqn_for_login(struct iscsi_tiqn *tiqn)
|
|
|
|
{
|
|
|
|
spin_lock(&tiqn->tiqn_state_lock);
|
|
|
|
tiqn->tiqn_access_count--;
|
|
|
|
spin_unlock(&tiqn->tiqn_state_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Note that IQN formatting is expected to be done in userspace, and
|
|
|
|
* no explict IQN format checks are done here.
|
|
|
|
*/
|
|
|
|
struct iscsi_tiqn *iscsit_add_tiqn(unsigned char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_tiqn *tiqn = NULL;
|
|
|
|
int ret;
|
|
|
|
|
2011-07-27 19:11:43 +08:00
|
|
|
if (strlen(buf) >= ISCSI_IQN_LEN) {
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_err("Target IQN exceeds %d bytes\n",
|
|
|
|
ISCSI_IQN_LEN);
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
}
|
|
|
|
|
2017-04-09 22:00:39 +08:00
|
|
|
tiqn = kzalloc(sizeof(*tiqn), GFP_KERNEL);
|
2017-04-09 21:34:50 +08:00
|
|
|
if (!tiqn)
|
2011-07-23 14:43:04 +08:00
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
|
|
|
sprintf(tiqn->tiqn, "%s", buf);
|
|
|
|
INIT_LIST_HEAD(&tiqn->tiqn_list);
|
|
|
|
INIT_LIST_HEAD(&tiqn->tiqn_tpg_list);
|
|
|
|
spin_lock_init(&tiqn->tiqn_state_lock);
|
|
|
|
spin_lock_init(&tiqn->tiqn_tpg_lock);
|
|
|
|
spin_lock_init(&tiqn->sess_err_stats.lock);
|
|
|
|
spin_lock_init(&tiqn->login_stats.lock);
|
|
|
|
spin_lock_init(&tiqn->logout_stats.lock);
|
|
|
|
|
|
|
|
tiqn->tiqn_state = TIQN_STATE_ACTIVE;
|
|
|
|
|
2013-02-28 09:04:43 +08:00
|
|
|
idr_preload(GFP_KERNEL);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_lock(&tiqn_lock);
|
2013-02-28 09:04:43 +08:00
|
|
|
|
|
|
|
ret = idr_alloc(&tiqn_idr, NULL, 0, 0, GFP_NOWAIT);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (ret < 0) {
|
2013-02-28 09:04:43 +08:00
|
|
|
pr_err("idr_alloc() failed for tiqn->tiqn_index\n");
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock(&tiqn_lock);
|
2013-02-28 09:04:43 +08:00
|
|
|
idr_preload_end();
|
2011-07-23 14:43:04 +08:00
|
|
|
kfree(tiqn);
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
2013-02-28 09:04:43 +08:00
|
|
|
tiqn->tiqn_index = ret;
|
2011-07-23 14:43:04 +08:00
|
|
|
list_add_tail(&tiqn->tiqn_list, &g_tiqn_list);
|
2013-02-28 09:04:43 +08:00
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock(&tiqn_lock);
|
2013-02-28 09:04:43 +08:00
|
|
|
idr_preload_end();
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
pr_debug("CORE[0] - Added iSCSI Target IQN: %s\n", tiqn->tiqn);
|
|
|
|
|
|
|
|
return tiqn;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iscsit_wait_for_tiqn(struct iscsi_tiqn *tiqn)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Wait for accesses to said struct iscsi_tiqn to end.
|
|
|
|
*/
|
|
|
|
spin_lock(&tiqn->tiqn_state_lock);
|
|
|
|
while (tiqn->tiqn_access_count != 0) {
|
|
|
|
spin_unlock(&tiqn->tiqn_state_lock);
|
|
|
|
msleep(10);
|
|
|
|
spin_lock(&tiqn->tiqn_state_lock);
|
|
|
|
}
|
|
|
|
spin_unlock(&tiqn->tiqn_state_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
void iscsit_del_tiqn(struct iscsi_tiqn *tiqn)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* iscsit_set_tiqn_shutdown sets tiqn->tiqn_state = TIQN_STATE_SHUTDOWN
|
|
|
|
* while holding tiqn->tiqn_state_lock. This means that all subsequent
|
|
|
|
* attempts to access this struct iscsi_tiqn will fail from both transport
|
|
|
|
* fabric and control code paths.
|
|
|
|
*/
|
|
|
|
if (iscsit_set_tiqn_shutdown(tiqn) < 0) {
|
|
|
|
pr_err("iscsit_set_tiqn_shutdown() failed\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
iscsit_wait_for_tiqn(tiqn);
|
|
|
|
|
|
|
|
spin_lock(&tiqn_lock);
|
|
|
|
list_del(&tiqn->tiqn_list);
|
|
|
|
idr_remove(&tiqn_idr, tiqn->tiqn_index);
|
|
|
|
spin_unlock(&tiqn_lock);
|
|
|
|
|
|
|
|
pr_debug("CORE[0] - Deleted iSCSI Target IQN: %s\n",
|
|
|
|
tiqn->tiqn);
|
|
|
|
kfree(tiqn);
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_access_np(struct iscsi_np *np, struct iscsi_portal_group *tpg)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
/*
|
|
|
|
* Determine if the network portal is accepting storage traffic.
|
|
|
|
*/
|
|
|
|
spin_lock_bh(&np->np_thread_lock);
|
|
|
|
if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
|
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
|
|
|
/*
|
|
|
|
* Determine if the portal group is accepting storage traffic.
|
|
|
|
*/
|
|
|
|
spin_lock_bh(&tpg->tpg_state_lock);
|
|
|
|
if (tpg->tpg_state != TPG_STATE_ACTIVE) {
|
|
|
|
spin_unlock_bh(&tpg->tpg_state_lock);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&tpg->tpg_state_lock);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Here we serialize access across the TIQN+TPG Tuple.
|
|
|
|
*/
|
2013-08-16 03:49:02 +08:00
|
|
|
ret = down_interruptible(&tpg->np_login_sem);
|
2015-05-20 06:10:44 +08:00
|
|
|
if (ret != 0)
|
2011-07-23 14:43:04 +08:00
|
|
|
return -1;
|
|
|
|
|
2013-08-16 03:49:02 +08:00
|
|
|
spin_lock_bh(&tpg->tpg_state_lock);
|
|
|
|
if (tpg->tpg_state != TPG_STATE_ACTIVE) {
|
|
|
|
spin_unlock_bh(&tpg->tpg_state_lock);
|
|
|
|
up(&tpg->np_login_sem);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&tpg->tpg_state_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-08-16 03:49:02 +08:00
|
|
|
void iscsit_login_kref_put(struct kref *kref)
|
|
|
|
{
|
|
|
|
struct iscsi_tpg_np *tpg_np = container_of(kref,
|
|
|
|
struct iscsi_tpg_np, tpg_np_kref);
|
|
|
|
|
|
|
|
complete(&tpg_np->tpg_np_comp);
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_deaccess_np(struct iscsi_np *np, struct iscsi_portal_group *tpg,
|
|
|
|
struct iscsi_tpg_np *tpg_np)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
struct iscsi_tiqn *tiqn = tpg->tpg_tiqn;
|
|
|
|
|
2013-08-16 03:49:02 +08:00
|
|
|
up(&tpg->np_login_sem);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-08-16 03:49:02 +08:00
|
|
|
if (tpg_np)
|
|
|
|
kref_put(&tpg_np->tpg_np_kref, iscsit_login_kref_put);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (tiqn)
|
|
|
|
iscsit_put_tiqn_for_login(tiqn);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-02-19 12:59:27 +08:00
|
|
|
bool iscsit_check_np_match(
|
2015-08-25 01:26:06 +08:00
|
|
|
struct sockaddr_storage *sockaddr,
|
2013-02-19 12:59:27 +08:00
|
|
|
struct iscsi_np *np,
|
2011-07-23 14:43:04 +08:00
|
|
|
int network_transport)
|
|
|
|
{
|
|
|
|
struct sockaddr_in *sock_in, *sock_in_e;
|
|
|
|
struct sockaddr_in6 *sock_in6, *sock_in6_e;
|
2013-02-19 12:59:27 +08:00
|
|
|
bool ip_match = false;
|
2015-08-25 01:26:04 +08:00
|
|
|
u16 port, port_e;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-02-19 12:59:27 +08:00
|
|
|
if (sockaddr->ss_family == AF_INET6) {
|
|
|
|
sock_in6 = (struct sockaddr_in6 *)sockaddr;
|
|
|
|
sock_in6_e = (struct sockaddr_in6 *)&np->np_sockaddr;
|
|
|
|
|
|
|
|
if (!memcmp(&sock_in6->sin6_addr.in6_u,
|
|
|
|
&sock_in6_e->sin6_addr.in6_u,
|
|
|
|
sizeof(struct in6_addr)))
|
|
|
|
ip_match = true;
|
|
|
|
|
|
|
|
port = ntohs(sock_in6->sin6_port);
|
2015-08-25 01:26:04 +08:00
|
|
|
port_e = ntohs(sock_in6_e->sin6_port);
|
2013-02-19 12:59:27 +08:00
|
|
|
} else {
|
|
|
|
sock_in = (struct sockaddr_in *)sockaddr;
|
|
|
|
sock_in_e = (struct sockaddr_in *)&np->np_sockaddr;
|
|
|
|
|
|
|
|
if (sock_in->sin_addr.s_addr == sock_in_e->sin_addr.s_addr)
|
|
|
|
ip_match = true;
|
|
|
|
|
|
|
|
port = ntohs(sock_in->sin_port);
|
2015-08-25 01:26:04 +08:00
|
|
|
port_e = ntohs(sock_in_e->sin_port);
|
2013-02-19 12:59:27 +08:00
|
|
|
}
|
|
|
|
|
2015-08-25 01:26:04 +08:00
|
|
|
if (ip_match && (port_e == port) &&
|
2013-02-19 12:59:27 +08:00
|
|
|
(np->np_network_transport == network_transport))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct iscsi_np *iscsit_get_np(
|
2015-08-25 01:26:06 +08:00
|
|
|
struct sockaddr_storage *sockaddr,
|
2013-02-19 12:59:27 +08:00
|
|
|
int network_transport)
|
|
|
|
{
|
|
|
|
struct iscsi_np *np;
|
|
|
|
bool match;
|
|
|
|
|
2019-01-26 02:34:53 +08:00
|
|
|
lockdep_assert_held(&np_lock);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
list_for_each_entry(np, &g_np_list, np_list) {
|
2014-01-25 08:18:54 +08:00
|
|
|
spin_lock_bh(&np->np_thread_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
|
2014-01-25 08:18:54 +08:00
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2013-02-19 12:59:27 +08:00
|
|
|
match = iscsit_check_np_match(sockaddr, np, network_transport);
|
2014-06-06 23:15:16 +08:00
|
|
|
if (match) {
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Increment the np_exports reference count now to
|
|
|
|
* prevent iscsit_del_np() below from being called
|
|
|
|
* while iscsi_tpg_add_network_portal() is called.
|
|
|
|
*/
|
|
|
|
np->np_exports++;
|
2014-01-25 08:18:54 +08:00
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
return np;
|
|
|
|
}
|
2014-01-25 08:18:54 +08:00
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct iscsi_np *iscsit_add_np(
|
2015-08-25 01:26:06 +08:00
|
|
|
struct sockaddr_storage *sockaddr,
|
2011-07-23 14:43:04 +08:00
|
|
|
int network_transport)
|
|
|
|
{
|
|
|
|
struct iscsi_np *np;
|
|
|
|
int ret;
|
2014-01-25 08:18:54 +08:00
|
|
|
|
|
|
|
mutex_lock(&np_lock);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Locate the existing struct iscsi_np if already active..
|
|
|
|
*/
|
|
|
|
np = iscsit_get_np(sockaddr, network_transport);
|
2014-01-25 08:18:54 +08:00
|
|
|
if (np) {
|
|
|
|
mutex_unlock(&np_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
return np;
|
2014-01-25 08:18:54 +08:00
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2017-04-09 22:00:39 +08:00
|
|
|
np = kzalloc(sizeof(*np), GFP_KERNEL);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (!np) {
|
2014-01-25 08:18:54 +08:00
|
|
|
mutex_unlock(&np_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
|
|
|
|
|
|
|
np->np_flags |= NPF_IP_NETWORK;
|
|
|
|
np->np_network_transport = network_transport;
|
|
|
|
spin_lock_init(&np->np_thread_lock);
|
|
|
|
init_completion(&np->np_restart_comp);
|
|
|
|
INIT_LIST_HEAD(&np->np_list);
|
|
|
|
|
2017-10-23 05:58:45 +08:00
|
|
|
timer_setup(&np->np_login_timer, iscsi_handle_login_thread_timeout, 0);
|
2017-05-24 07:48:50 +08:00
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
ret = iscsi_target_setup_login_socket(np, sockaddr);
|
|
|
|
if (ret != 0) {
|
|
|
|
kfree(np);
|
2014-01-25 08:18:54 +08:00
|
|
|
mutex_unlock(&np_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
np->np_thread = kthread_run(iscsi_target_login_thread, np, "iscsi_np");
|
|
|
|
if (IS_ERR(np->np_thread)) {
|
|
|
|
pr_err("Unable to create kthread: iscsi_np\n");
|
|
|
|
ret = PTR_ERR(np->np_thread);
|
|
|
|
kfree(np);
|
2014-01-25 08:18:54 +08:00
|
|
|
mutex_unlock(&np_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Increment the np_exports reference count now to prevent
|
|
|
|
* iscsit_del_np() below from being run while a new call to
|
|
|
|
* iscsi_tpg_add_network_portal() for a matching iscsi_np is
|
|
|
|
* active. We don't need to hold np->np_thread_lock at this
|
|
|
|
* point because iscsi_np has not been added to g_np_list yet.
|
|
|
|
*/
|
|
|
|
np->np_exports = 1;
|
2014-01-25 08:18:54 +08:00
|
|
|
np->np_thread_state = ISCSI_NP_THREAD_ACTIVE;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
list_add_tail(&np->np_list, &g_np_list);
|
2014-01-25 08:18:54 +08:00
|
|
|
mutex_unlock(&np_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-08-25 01:26:04 +08:00
|
|
|
pr_debug("CORE[0] - Added Network Portal: %pISpc on %s\n",
|
|
|
|
&np->np_sockaddr, np->np_transport->name);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
return np;
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_reset_np_thread(
|
|
|
|
struct iscsi_np *np,
|
|
|
|
struct iscsi_tpg_np *tpg_np,
|
2013-08-16 03:49:02 +08:00
|
|
|
struct iscsi_portal_group *tpg,
|
|
|
|
bool shutdown)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
spin_lock_bh(&np->np_thread_lock);
|
|
|
|
if (np->np_thread_state == ISCSI_NP_THREAD_INACTIVE) {
|
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
np->np_thread_state = ISCSI_NP_THREAD_RESET;
|
2017-08-05 14:59:31 +08:00
|
|
|
atomic_inc(&np->np_reset_count);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (np->np_thread) {
|
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
|
|
|
send_sig(SIGINT, np->np_thread, 1);
|
|
|
|
wait_for_completion(&np->np_restart_comp);
|
|
|
|
spin_lock_bh(&np->np_thread_lock);
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
|
|
|
|
2013-08-16 03:49:02 +08:00
|
|
|
if (tpg_np && shutdown) {
|
|
|
|
kref_put(&tpg_np->tpg_np_kref, iscsit_login_kref_put);
|
|
|
|
|
|
|
|
wait_for_completion(&tpg_np->tpg_np_comp);
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-03-07 13:54:13 +08:00
|
|
|
static void iscsit_free_np(struct iscsi_np *np)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
iscsi-target: Drop bogus struct file usage for iSCSI/SCTP
From Al Viro:
BTW, speaking of struct file treatment related to sockets -
there's this piece of code in iscsi:
/*
* The SCTP stack needs struct socket->file.
*/
if ((np->np_network_transport == ISCSI_SCTP_TCP) ||
(np->np_network_transport == ISCSI_SCTP_UDP)) {
if (!new_sock->file) {
new_sock->file = kzalloc(
sizeof(struct file), GFP_KERNEL);
For one thing, as far as I can see it'not true - sctp does *not* depend on
socket->file being non-NULL; it does, in one place, check socket->file->f_flags
for O_NONBLOCK, but there it treats NULL socket->file as "flag not set".
Which is the case here anyway - the fake struct file created in
__iscsi_target_login_thread() (and in iscsi_target_setup_login_socket(), with
the same excuse) do *not* get that flag set.
Moreover, it's a bloody serious violation of a bunch of asserts in VFS;
all struct file instances should come from filp_cachep, via get_empty_filp()
(or alloc_file(), which is a wrapper for it). FWIW, I'm very tempted to
do this and be done with the entire mess:
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Cc: Andy Grover <agrover@redhat.com>
Cc: Hannes Reinecke <hare@suse.de>
Cc: Christoph Hellwig <hch@lst.de>
Cc: stable@vger.kernel.org
Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
2012-07-21 15:55:18 +08:00
|
|
|
if (np->np_socket)
|
|
|
|
sock_release(np->np_socket);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_del_np(struct iscsi_np *np)
|
|
|
|
{
|
|
|
|
spin_lock_bh(&np->np_thread_lock);
|
|
|
|
np->np_exports--;
|
|
|
|
if (np->np_exports) {
|
2014-06-04 09:27:52 +08:00
|
|
|
np->enabled = true;
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
np->np_thread_state = ISCSI_NP_THREAD_SHUTDOWN;
|
|
|
|
spin_unlock_bh(&np->np_thread_lock);
|
|
|
|
|
|
|
|
if (np->np_thread) {
|
|
|
|
/*
|
|
|
|
* We need to send the signal to wakeup Linux/Net
|
|
|
|
* which may be sleeping in sock_accept()..
|
|
|
|
*/
|
|
|
|
send_sig(SIGINT, np->np_thread, 1);
|
|
|
|
kthread_stop(np->np_thread);
|
2013-12-12 07:45:32 +08:00
|
|
|
np->np_thread = NULL;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
2013-03-07 13:54:13 +08:00
|
|
|
|
|
|
|
np->np_transport->iscsit_free_np(np);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2014-01-25 08:18:54 +08:00
|
|
|
mutex_lock(&np_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
list_del(&np->np_list);
|
2014-01-25 08:18:54 +08:00
|
|
|
mutex_unlock(&np_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-08-25 01:26:04 +08:00
|
|
|
pr_debug("CORE[0] - Removed Network Portal: %pISpc on %s\n",
|
|
|
|
&np->np_sockaddr, np->np_transport->name);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-07 13:54:13 +08:00
|
|
|
iscsit_put_transport(np->np_transport);
|
2011-07-23 14:43:04 +08:00
|
|
|
kfree(np);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-04-20 02:30:11 +08:00
|
|
|
static void iscsit_get_rx_pdu(struct iscsi_conn *);
|
2013-03-21 06:29:15 +08:00
|
|
|
|
2016-04-20 02:30:19 +08:00
|
|
|
int iscsit_queue_rsp(struct iscsi_conn *conn, struct iscsi_cmd *cmd)
|
2013-03-21 06:29:15 +08:00
|
|
|
{
|
2016-10-31 08:30:08 +08:00
|
|
|
return iscsit_add_cmd_to_response_queue(cmd, cmd->conn, cmd->i_state);
|
2013-03-21 06:29:15 +08:00
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_queue_rsp);
|
2013-03-21 06:29:15 +08:00
|
|
|
|
2016-04-20 02:30:19 +08:00
|
|
|
void iscsit_aborted_task(struct iscsi_conn *conn, struct iscsi_cmd *cmd)
|
2014-03-23 05:55:56 +08:00
|
|
|
{
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2016-06-03 05:56:45 +08:00
|
|
|
if (!list_empty(&cmd->i_conn_node) &&
|
|
|
|
!(cmd->se_cmd.transport_state & CMD_T_FABRIC_STOP))
|
2014-03-23 05:55:56 +08:00
|
|
|
list_del_init(&cmd->i_conn_node);
|
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
|
2017-05-24 07:48:43 +08:00
|
|
|
__iscsit_free_cmd(cmd, true);
|
2014-03-23 05:55:56 +08:00
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_aborted_task);
|
2014-03-23 05:55:56 +08:00
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
static void iscsit_do_crypto_hash_buf(struct ahash_request *, const void *,
|
2017-11-01 02:03:16 +08:00
|
|
|
u32, u32, const void *, void *);
|
2016-04-20 02:30:08 +08:00
|
|
|
static void iscsit_tx_thread_wait_for_tcp(struct iscsi_conn *);
|
|
|
|
|
|
|
|
static int
|
|
|
|
iscsit_xmit_nondatain_pdu(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
const void *data_buf, u32 data_buf_len)
|
|
|
|
{
|
|
|
|
struct iscsi_hdr *hdr = (struct iscsi_hdr *)cmd->pdu;
|
|
|
|
struct kvec *iov;
|
|
|
|
u32 niov = 0, tx_size = ISCSI_HDR_LEN;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
iov = &cmd->iov_misc[0];
|
|
|
|
iov[niov].iov_base = cmd->pdu;
|
|
|
|
iov[niov++].iov_len = ISCSI_HDR_LEN;
|
|
|
|
|
|
|
|
if (conn->conn_ops->HeaderDigest) {
|
|
|
|
u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
|
|
|
|
|
|
|
|
iscsit_do_crypto_hash_buf(conn->conn_tx_hash, hdr,
|
|
|
|
ISCSI_HDR_LEN, 0, NULL,
|
2017-11-01 02:03:16 +08:00
|
|
|
header_digest);
|
2016-04-20 02:30:08 +08:00
|
|
|
|
|
|
|
iov[0].iov_len += ISCSI_CRC_LEN;
|
|
|
|
tx_size += ISCSI_CRC_LEN;
|
|
|
|
pr_debug("Attaching CRC32C HeaderDigest"
|
|
|
|
" to opcode 0x%x 0x%08x\n",
|
|
|
|
hdr->opcode, *header_digest);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (data_buf_len) {
|
|
|
|
u32 padding = ((-data_buf_len) & 3);
|
|
|
|
|
|
|
|
iov[niov].iov_base = (void *)data_buf;
|
|
|
|
iov[niov++].iov_len = data_buf_len;
|
|
|
|
tx_size += data_buf_len;
|
|
|
|
|
|
|
|
if (padding != 0) {
|
|
|
|
iov[niov].iov_base = &cmd->pad_bytes;
|
|
|
|
iov[niov++].iov_len = padding;
|
|
|
|
tx_size += padding;
|
|
|
|
pr_debug("Attaching %u additional"
|
|
|
|
" padding bytes.\n", padding);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
|
|
|
iscsit_do_crypto_hash_buf(conn->conn_tx_hash,
|
|
|
|
data_buf, data_buf_len,
|
2017-11-01 02:03:16 +08:00
|
|
|
padding, &cmd->pad_bytes,
|
|
|
|
&cmd->data_crc);
|
2016-04-20 02:30:08 +08:00
|
|
|
|
|
|
|
iov[niov].iov_base = &cmd->data_crc;
|
|
|
|
iov[niov++].iov_len = ISCSI_CRC_LEN;
|
|
|
|
tx_size += ISCSI_CRC_LEN;
|
|
|
|
pr_debug("Attached DataDigest for %u"
|
|
|
|
" bytes opcode 0x%x, CRC 0x%08x\n",
|
|
|
|
data_buf_len, hdr->opcode, cmd->data_crc);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->iov_misc_count = niov;
|
|
|
|
cmd->tx_size = tx_size;
|
|
|
|
|
|
|
|
ret = iscsit_send_tx_data(cmd, conn, 1);
|
|
|
|
if (ret < 0) {
|
|
|
|
iscsit_tx_thread_wait_for_tcp(conn);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-04-03 03:58:14 +08:00
|
|
|
static int iscsit_map_iovec(struct iscsi_cmd *cmd, struct kvec *iov, int nvec,
|
|
|
|
u32 data_offset, u32 data_length);
|
2016-04-20 02:30:08 +08:00
|
|
|
static void iscsit_unmap_iovec(struct iscsi_cmd *);
|
|
|
|
static u32 iscsit_do_crypto_hash_sg(struct ahash_request *, struct iscsi_cmd *,
|
|
|
|
u32, u32, u32, u8 *);
|
|
|
|
static int
|
|
|
|
iscsit_xmit_datain_pdu(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
const struct iscsi_datain *datain)
|
|
|
|
{
|
|
|
|
struct kvec *iov;
|
|
|
|
u32 iov_count = 0, tx_size = 0;
|
|
|
|
int ret, iov_ret;
|
|
|
|
|
|
|
|
iov = &cmd->iov_data[0];
|
|
|
|
iov[iov_count].iov_base = cmd->pdu;
|
|
|
|
iov[iov_count++].iov_len = ISCSI_HDR_LEN;
|
|
|
|
tx_size += ISCSI_HDR_LEN;
|
|
|
|
|
|
|
|
if (conn->conn_ops->HeaderDigest) {
|
|
|
|
u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
|
|
|
|
|
|
|
|
iscsit_do_crypto_hash_buf(conn->conn_tx_hash, cmd->pdu,
|
|
|
|
ISCSI_HDR_LEN, 0, NULL,
|
2017-11-01 02:03:16 +08:00
|
|
|
header_digest);
|
2016-04-20 02:30:08 +08:00
|
|
|
|
|
|
|
iov[0].iov_len += ISCSI_CRC_LEN;
|
|
|
|
tx_size += ISCSI_CRC_LEN;
|
|
|
|
|
|
|
|
pr_debug("Attaching CRC32 HeaderDigest for DataIN PDU 0x%08x\n",
|
|
|
|
*header_digest);
|
|
|
|
}
|
|
|
|
|
2019-04-03 03:58:14 +08:00
|
|
|
iov_ret = iscsit_map_iovec(cmd, &cmd->iov_data[iov_count],
|
|
|
|
cmd->orig_iov_data_count - (iov_count + 2),
|
2016-04-20 02:30:08 +08:00
|
|
|
datain->offset, datain->length);
|
|
|
|
if (iov_ret < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
iov_count += iov_ret;
|
|
|
|
tx_size += datain->length;
|
|
|
|
|
|
|
|
cmd->padding = ((-datain->length) & 3);
|
|
|
|
if (cmd->padding) {
|
|
|
|
iov[iov_count].iov_base = cmd->pad_bytes;
|
|
|
|
iov[iov_count++].iov_len = cmd->padding;
|
|
|
|
tx_size += cmd->padding;
|
|
|
|
|
|
|
|
pr_debug("Attaching %u padding bytes\n", cmd->padding);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
|
|
|
cmd->data_crc = iscsit_do_crypto_hash_sg(conn->conn_tx_hash,
|
|
|
|
cmd, datain->offset,
|
|
|
|
datain->length,
|
|
|
|
cmd->padding,
|
|
|
|
cmd->pad_bytes);
|
|
|
|
|
|
|
|
iov[iov_count].iov_base = &cmd->data_crc;
|
|
|
|
iov[iov_count++].iov_len = ISCSI_CRC_LEN;
|
|
|
|
tx_size += ISCSI_CRC_LEN;
|
|
|
|
|
|
|
|
pr_debug("Attached CRC32C DataDigest %d bytes, crc 0x%08x\n",
|
|
|
|
datain->length + cmd->padding, cmd->data_crc);
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->iov_data_count = iov_count;
|
|
|
|
cmd->tx_size = tx_size;
|
|
|
|
|
|
|
|
ret = iscsit_fe_sendpage_sg(cmd, conn);
|
|
|
|
|
|
|
|
iscsit_unmap_iovec(cmd);
|
|
|
|
|
|
|
|
if (ret < 0) {
|
|
|
|
iscsit_tx_thread_wait_for_tcp(conn);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsit_xmit_pdu(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_datain_req *dr, const void *buf,
|
|
|
|
u32 buf_len)
|
|
|
|
{
|
|
|
|
if (dr)
|
|
|
|
return iscsit_xmit_datain_pdu(conn, cmd, buf);
|
|
|
|
else
|
|
|
|
return iscsit_xmit_nondatain_pdu(conn, cmd, buf, buf_len);
|
|
|
|
}
|
|
|
|
|
2014-04-03 03:52:38 +08:00
|
|
|
static enum target_prot_op iscsit_get_sup_prot_ops(struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
return TARGET_PROT_NORMAL;
|
|
|
|
}
|
|
|
|
|
2013-03-07 13:54:13 +08:00
|
|
|
static struct iscsit_transport iscsi_target_transport = {
|
|
|
|
.name = "iSCSI/TCP",
|
|
|
|
.transport_type = ISCSI_TCP,
|
2016-05-15 13:23:34 +08:00
|
|
|
.rdma_shutdown = false,
|
2013-03-07 13:54:13 +08:00
|
|
|
.owner = NULL,
|
|
|
|
.iscsit_setup_np = iscsit_setup_np,
|
|
|
|
.iscsit_accept_np = iscsit_accept_np,
|
|
|
|
.iscsit_free_np = iscsit_free_np,
|
|
|
|
.iscsit_get_login_rx = iscsit_get_login_rx,
|
|
|
|
.iscsit_put_login_tx = iscsit_put_login_tx,
|
2013-03-07 14:18:24 +08:00
|
|
|
.iscsit_get_dataout = iscsit_build_r2ts_for_cmd,
|
2013-03-21 06:29:15 +08:00
|
|
|
.iscsit_immediate_queue = iscsit_immediate_queue,
|
|
|
|
.iscsit_response_queue = iscsit_response_queue,
|
|
|
|
.iscsit_queue_data_in = iscsit_queue_rsp,
|
|
|
|
.iscsit_queue_status = iscsit_queue_rsp,
|
2014-03-23 05:55:56 +08:00
|
|
|
.iscsit_aborted_task = iscsit_aborted_task,
|
2016-04-20 02:30:08 +08:00
|
|
|
.iscsit_xmit_pdu = iscsit_xmit_pdu,
|
2016-04-20 02:30:11 +08:00
|
|
|
.iscsit_get_rx_pdu = iscsit_get_rx_pdu,
|
2014-04-03 03:52:38 +08:00
|
|
|
.iscsit_get_sup_prot_ops = iscsit_get_sup_prot_ops,
|
2013-03-07 13:54:13 +08:00
|
|
|
};
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static int __init iscsi_target_init_module(void)
|
|
|
|
{
|
2015-02-27 14:19:15 +08:00
|
|
|
int ret = 0, size;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
pr_debug("iSCSI-Target "ISCSIT_VERSION"\n");
|
2017-04-09 22:00:39 +08:00
|
|
|
iscsit_global = kzalloc(sizeof(*iscsit_global), GFP_KERNEL);
|
2017-04-09 21:34:50 +08:00
|
|
|
if (!iscsit_global)
|
2011-07-23 14:43:04 +08:00
|
|
|
return -1;
|
2017-04-09 21:34:50 +08:00
|
|
|
|
2015-02-27 14:19:15 +08:00
|
|
|
spin_lock_init(&iscsit_global->ts_bitmap_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
mutex_init(&auth_id_lock);
|
|
|
|
idr_init(&tiqn_idr);
|
|
|
|
|
2015-04-09 02:01:35 +08:00
|
|
|
ret = target_register_template(&iscsi_ops);
|
|
|
|
if (ret)
|
2011-07-23 14:43:04 +08:00
|
|
|
goto out;
|
|
|
|
|
2015-02-27 14:19:15 +08:00
|
|
|
size = BITS_TO_LONGS(ISCSIT_BITMAP_BITS) * sizeof(long);
|
|
|
|
iscsit_global->ts_bitmap = vzalloc(size);
|
2017-04-09 21:34:50 +08:00
|
|
|
if (!iscsit_global->ts_bitmap)
|
2011-07-23 14:43:04 +08:00
|
|
|
goto configfs_out;
|
|
|
|
|
|
|
|
lio_qr_cache = kmem_cache_create("lio_qr_cache",
|
|
|
|
sizeof(struct iscsi_queue_req),
|
|
|
|
__alignof__(struct iscsi_queue_req), 0, NULL);
|
|
|
|
if (!lio_qr_cache) {
|
2018-12-24 00:18:27 +08:00
|
|
|
pr_err("Unable to kmem_cache_create() for"
|
2011-07-23 14:43:04 +08:00
|
|
|
" lio_qr_cache\n");
|
2015-02-27 14:19:15 +08:00
|
|
|
goto bitmap_out;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
lio_dr_cache = kmem_cache_create("lio_dr_cache",
|
|
|
|
sizeof(struct iscsi_datain_req),
|
|
|
|
__alignof__(struct iscsi_datain_req), 0, NULL);
|
|
|
|
if (!lio_dr_cache) {
|
|
|
|
pr_err("Unable to kmem_cache_create() for"
|
|
|
|
" lio_dr_cache\n");
|
|
|
|
goto qr_out;
|
|
|
|
}
|
|
|
|
|
|
|
|
lio_ooo_cache = kmem_cache_create("lio_ooo_cache",
|
|
|
|
sizeof(struct iscsi_ooo_cmdsn),
|
|
|
|
__alignof__(struct iscsi_ooo_cmdsn), 0, NULL);
|
|
|
|
if (!lio_ooo_cache) {
|
|
|
|
pr_err("Unable to kmem_cache_create() for"
|
|
|
|
" lio_ooo_cache\n");
|
|
|
|
goto dr_out;
|
|
|
|
}
|
|
|
|
|
|
|
|
lio_r2t_cache = kmem_cache_create("lio_r2t_cache",
|
|
|
|
sizeof(struct iscsi_r2t), __alignof__(struct iscsi_r2t),
|
|
|
|
0, NULL);
|
|
|
|
if (!lio_r2t_cache) {
|
|
|
|
pr_err("Unable to kmem_cache_create() for"
|
|
|
|
" lio_r2t_cache\n");
|
|
|
|
goto ooo_out;
|
|
|
|
}
|
|
|
|
|
2013-03-07 13:54:13 +08:00
|
|
|
iscsit_register_transport(&iscsi_target_transport);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
if (iscsit_load_discovery_tpg() < 0)
|
|
|
|
goto r2t_out;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
r2t_out:
|
2014-11-30 19:00:11 +08:00
|
|
|
iscsit_unregister_transport(&iscsi_target_transport);
|
2011-07-23 14:43:04 +08:00
|
|
|
kmem_cache_destroy(lio_r2t_cache);
|
|
|
|
ooo_out:
|
|
|
|
kmem_cache_destroy(lio_ooo_cache);
|
|
|
|
dr_out:
|
|
|
|
kmem_cache_destroy(lio_dr_cache);
|
|
|
|
qr_out:
|
|
|
|
kmem_cache_destroy(lio_qr_cache);
|
2015-02-27 14:19:15 +08:00
|
|
|
bitmap_out:
|
|
|
|
vfree(iscsit_global->ts_bitmap);
|
2011-07-23 14:43:04 +08:00
|
|
|
configfs_out:
|
2015-04-09 02:01:35 +08:00
|
|
|
/* XXX: this probably wants it to be it's own unwind step.. */
|
|
|
|
if (iscsit_global->discovery_tpg)
|
|
|
|
iscsit_tpg_disable_portal_group(iscsit_global->discovery_tpg, 1);
|
|
|
|
target_unregister_template(&iscsi_ops);
|
2011-07-23 14:43:04 +08:00
|
|
|
out:
|
|
|
|
kfree(iscsit_global);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit iscsi_target_cleanup_module(void)
|
|
|
|
{
|
|
|
|
iscsit_release_discovery_tpg();
|
2013-03-07 13:54:13 +08:00
|
|
|
iscsit_unregister_transport(&iscsi_target_transport);
|
2011-07-23 14:43:04 +08:00
|
|
|
kmem_cache_destroy(lio_qr_cache);
|
|
|
|
kmem_cache_destroy(lio_dr_cache);
|
|
|
|
kmem_cache_destroy(lio_ooo_cache);
|
|
|
|
kmem_cache_destroy(lio_r2t_cache);
|
|
|
|
|
2015-04-09 02:01:35 +08:00
|
|
|
/*
|
|
|
|
* Shutdown discovery sessions and disable discovery TPG
|
|
|
|
*/
|
|
|
|
if (iscsit_global->discovery_tpg)
|
|
|
|
iscsit_tpg_disable_portal_group(iscsit_global->discovery_tpg, 1);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-04-09 02:01:35 +08:00
|
|
|
target_unregister_template(&iscsi_ops);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-02-27 14:19:15 +08:00
|
|
|
vfree(iscsit_global->ts_bitmap);
|
2011-07-23 14:43:04 +08:00
|
|
|
kfree(iscsit_global);
|
|
|
|
}
|
|
|
|
|
2016-04-20 02:30:19 +08:00
|
|
|
int iscsit_add_reject(
|
2013-07-03 18:48:24 +08:00
|
|
|
struct iscsi_conn *conn,
|
2011-07-23 14:43:04 +08:00
|
|
|
u8 reason,
|
2013-07-03 18:48:24 +08:00
|
|
|
unsigned char *buf)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd;
|
|
|
|
|
2014-01-20 11:36:44 +08:00
|
|
|
cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (!cmd)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
cmd->iscsi_opcode = ISCSI_OP_REJECT;
|
2013-07-03 18:48:24 +08:00
|
|
|
cmd->reject_reason = reason;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2011-11-18 06:43:40 +08:00
|
|
|
cmd->buf_ptr = kmemdup(buf, ISCSI_HDR_LEN, GFP_KERNEL);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (!cmd->buf_ptr) {
|
|
|
|
pr_err("Unable to allocate memory for cmd->buf_ptr\n");
|
2013-05-31 15:49:41 +08:00
|
|
|
iscsit_free_cmd(cmd, false);
|
2011-07-23 14:43:04 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2012-04-04 06:51:01 +08:00
|
|
|
list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
|
|
|
|
cmd->i_state = ISTATE_SEND_REJECT;
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
|
|
|
|
|
2013-07-03 18:48:24 +08:00
|
|
|
return -1;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_add_reject);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-07-03 18:48:24 +08:00
|
|
|
static int iscsit_add_reject_from_cmd(
|
|
|
|
struct iscsi_cmd *cmd,
|
2011-07-23 14:43:04 +08:00
|
|
|
u8 reason,
|
2013-07-03 18:48:24 +08:00
|
|
|
bool add_to_conn,
|
|
|
|
unsigned char *buf)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
struct iscsi_conn *conn;
|
2017-11-01 02:03:17 +08:00
|
|
|
const bool do_put = cmd->se_cmd.se_tfo != NULL;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (!cmd->conn) {
|
|
|
|
pr_err("cmd->conn is NULL for ITT: 0x%08x\n",
|
|
|
|
cmd->init_task_tag);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
conn = cmd->conn;
|
|
|
|
|
|
|
|
cmd->iscsi_opcode = ISCSI_OP_REJECT;
|
2013-07-03 18:48:24 +08:00
|
|
|
cmd->reject_reason = reason;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2011-11-18 06:43:40 +08:00
|
|
|
cmd->buf_ptr = kmemdup(buf, ISCSI_HDR_LEN, GFP_KERNEL);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (!cmd->buf_ptr) {
|
|
|
|
pr_err("Unable to allocate memory for cmd->buf_ptr\n");
|
2013-05-31 15:49:41 +08:00
|
|
|
iscsit_free_cmd(cmd, false);
|
2011-07-23 14:43:04 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (add_to_conn) {
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2012-04-04 06:51:01 +08:00
|
|
|
list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->i_state = ISTATE_SEND_REJECT;
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
|
2013-03-07 14:18:24 +08:00
|
|
|
/*
|
|
|
|
* Perform the kref_put now if se_cmd has already been setup by
|
|
|
|
* scsit_setup_scsi_cmd()
|
|
|
|
*/
|
2017-11-01 02:03:17 +08:00
|
|
|
if (do_put) {
|
2013-03-07 14:18:24 +08:00
|
|
|
pr_debug("iscsi reject: calling target_put_sess_cmd >>>>>>\n");
|
2015-04-27 19:52:36 +08:00
|
|
|
target_put_sess_cmd(&cmd->se_cmd);
|
2013-03-07 14:18:24 +08:00
|
|
|
}
|
2013-07-03 18:48:24 +08:00
|
|
|
return -1;
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-07-03 18:48:24 +08:00
|
|
|
static int iscsit_add_reject_cmd(struct iscsi_cmd *cmd, u8 reason,
|
|
|
|
unsigned char *buf)
|
|
|
|
{
|
|
|
|
return iscsit_add_reject_from_cmd(cmd, reason, true, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_reject_cmd(struct iscsi_cmd *cmd, u8 reason, unsigned char *buf)
|
|
|
|
{
|
|
|
|
return iscsit_add_reject_from_cmd(cmd, reason, false, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_reject_cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Map some portion of the allocated scatterlist to an iovec, suitable for
|
2012-04-04 06:51:29 +08:00
|
|
|
* kernel sockets to copy data in/out.
|
2011-07-23 14:43:04 +08:00
|
|
|
*/
|
2019-04-03 03:58:14 +08:00
|
|
|
static int iscsit_map_iovec(struct iscsi_cmd *cmd, struct kvec *iov, int nvec,
|
|
|
|
u32 data_offset, u32 data_length)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2019-04-03 03:58:14 +08:00
|
|
|
u32 i = 0, orig_data_length = data_length;
|
2011-07-23 14:43:04 +08:00
|
|
|
struct scatterlist *sg;
|
|
|
|
unsigned int page_off;
|
|
|
|
|
|
|
|
/*
|
2012-04-04 06:51:29 +08:00
|
|
|
* We know each entry in t_data_sg contains a page.
|
2011-07-23 14:43:04 +08:00
|
|
|
*/
|
2016-05-08 23:17:54 +08:00
|
|
|
u32 ent = data_offset / PAGE_SIZE;
|
|
|
|
|
2019-04-03 03:58:14 +08:00
|
|
|
if (!data_length)
|
|
|
|
return 0;
|
|
|
|
|
2016-05-08 23:17:54 +08:00
|
|
|
if (ent >= cmd->se_cmd.t_data_nents) {
|
|
|
|
pr_err("Initial page entry out-of-bounds\n");
|
2019-04-03 03:58:14 +08:00
|
|
|
goto overflow;
|
2016-05-08 23:17:54 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
sg = &cmd->se_cmd.t_data_sg[ent];
|
2011-07-23 14:43:04 +08:00
|
|
|
page_off = (data_offset % PAGE_SIZE);
|
|
|
|
|
|
|
|
cmd->first_data_sg = sg;
|
|
|
|
cmd->first_data_sg_off = page_off;
|
|
|
|
|
|
|
|
while (data_length) {
|
2019-04-03 03:58:14 +08:00
|
|
|
u32 cur_len;
|
|
|
|
|
|
|
|
if (WARN_ON_ONCE(!sg || i >= nvec))
|
|
|
|
goto overflow;
|
|
|
|
|
|
|
|
cur_len = min_t(u32, data_length, sg->length - page_off);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
iov[i].iov_base = kmap(sg_page(sg)) + sg->offset + page_off;
|
|
|
|
iov[i].iov_len = cur_len;
|
|
|
|
|
|
|
|
data_length -= cur_len;
|
|
|
|
page_off = 0;
|
|
|
|
sg = sg_next(sg);
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->kmapped_nents = i;
|
|
|
|
|
|
|
|
return i;
|
2019-04-03 03:58:14 +08:00
|
|
|
|
|
|
|
overflow:
|
|
|
|
pr_err("offset %d + length %d overflow; %d/%d; sg-list:\n",
|
|
|
|
data_offset, orig_data_length, i, nvec);
|
|
|
|
for_each_sg(cmd->se_cmd.t_data_sg, sg,
|
|
|
|
cmd->se_cmd.t_data_nents, i) {
|
|
|
|
pr_err("[%d] off %d len %d\n",
|
|
|
|
i, sg->offset, sg->length);
|
|
|
|
}
|
|
|
|
return -1;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void iscsit_unmap_iovec(struct iscsi_cmd *cmd)
|
|
|
|
{
|
|
|
|
u32 i;
|
|
|
|
struct scatterlist *sg;
|
|
|
|
|
|
|
|
sg = cmd->first_data_sg;
|
|
|
|
|
|
|
|
for (i = 0; i < cmd->kmapped_nents; i++)
|
|
|
|
kunmap(sg_page(&sg[i]));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iscsit_ack_from_expstatsn(struct iscsi_conn *conn, u32 exp_statsn)
|
|
|
|
{
|
2013-10-04 04:56:14 +08:00
|
|
|
LIST_HEAD(ack_list);
|
|
|
|
struct iscsi_cmd *cmd, *cmd_p;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
conn->exp_statsn = exp_statsn;
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
if (conn->sess->sess_ops->RDMAExtensions)
|
|
|
|
return;
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2013-10-04 04:56:14 +08:00
|
|
|
list_for_each_entry_safe(cmd, cmd_p, &conn->conn_cmd_list, i_conn_node) {
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_lock(&cmd->istate_lock);
|
|
|
|
if ((cmd->i_state == ISTATE_SENT_STATUS) &&
|
2012-11-06 10:02:41 +08:00
|
|
|
iscsi_sna_lt(cmd->stat_sn, exp_statsn)) {
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->i_state = ISTATE_REMOVE;
|
|
|
|
spin_unlock(&cmd->istate_lock);
|
2013-10-04 04:56:14 +08:00
|
|
|
list_move_tail(&cmd->i_conn_node, &ack_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
spin_unlock(&cmd->istate_lock);
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
2013-10-04 04:56:14 +08:00
|
|
|
|
|
|
|
list_for_each_entry_safe(cmd, cmd_p, &ack_list, i_conn_node) {
|
2014-02-04 04:53:51 +08:00
|
|
|
list_del_init(&cmd->i_conn_node);
|
2013-10-04 04:56:14 +08:00
|
|
|
iscsit_free_cmd(cmd, false);
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsit_allocate_iovecs(struct iscsi_cmd *cmd)
|
|
|
|
{
|
2012-05-21 08:10:29 +08:00
|
|
|
u32 iov_count = max(1UL, DIV_ROUND_UP(cmd->se_cmd.data_length, PAGE_SIZE));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2011-10-12 23:06:56 +08:00
|
|
|
iov_count += ISCSI_IOV_DATA_BUFFER;
|
2017-04-09 21:06:00 +08:00
|
|
|
cmd->iov_data = kcalloc(iov_count, sizeof(*cmd->iov_data), GFP_KERNEL);
|
2017-04-09 21:34:50 +08:00
|
|
|
if (!cmd->iov_data)
|
2011-07-23 14:43:04 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
cmd->orig_iov_data_count = iov_count;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
int iscsit_setup_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
unsigned char *buf)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2013-03-07 14:18:24 +08:00
|
|
|
int data_direction, payload_length;
|
2011-07-23 14:43:04 +08:00
|
|
|
struct iscsi_scsi_req *hdr;
|
2012-04-04 06:51:22 +08:00
|
|
|
int iscsi_task_attr;
|
|
|
|
int sam_task_attr;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-11-14 10:54:45 +08:00
|
|
|
atomic_long_inc(&conn->sess->cmd_pdus);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
hdr = (struct iscsi_scsi_req *) buf;
|
|
|
|
payload_length = ntoh24(hdr->dlength);
|
|
|
|
|
|
|
|
/* FIXME; Add checks for AdditionalHeaderSegment */
|
|
|
|
|
|
|
|
if (!(hdr->flags & ISCSI_FLAG_CMD_WRITE) &&
|
|
|
|
!(hdr->flags & ISCSI_FLAG_CMD_FINAL)) {
|
|
|
|
pr_err("ISCSI_FLAG_CMD_WRITE & ISCSI_FLAG_CMD_FINAL"
|
|
|
|
" not set. Bad iSCSI Initiator.\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_INVALID, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (((hdr->flags & ISCSI_FLAG_CMD_READ) ||
|
|
|
|
(hdr->flags & ISCSI_FLAG_CMD_WRITE)) && !hdr->data_length) {
|
|
|
|
/*
|
2013-11-26 06:53:57 +08:00
|
|
|
* From RFC-3720 Section 10.3.1:
|
|
|
|
*
|
|
|
|
* "Either or both of R and W MAY be 1 when either the
|
|
|
|
* Expected Data Transfer Length and/or Bidirectional Read
|
|
|
|
* Expected Data Transfer Length are 0"
|
|
|
|
*
|
|
|
|
* For this case, go ahead and clear the unnecssary bits
|
|
|
|
* to avoid any confusion with ->data_direction.
|
2011-07-23 14:43:04 +08:00
|
|
|
*/
|
2013-11-26 06:53:57 +08:00
|
|
|
hdr->flags &= ~ISCSI_FLAG_CMD_READ;
|
|
|
|
hdr->flags &= ~ISCSI_FLAG_CMD_WRITE;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-11-26 06:53:57 +08:00
|
|
|
pr_warn("ISCSI_FLAG_CMD_READ or ISCSI_FLAG_CMD_WRITE"
|
2011-07-23 14:43:04 +08:00
|
|
|
" set when Expected Data Transfer Length is 0 for"
|
2013-11-26 06:53:57 +08:00
|
|
|
" CDB: 0x%02x, Fixing up flags\n", hdr->cdb[0]);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!(hdr->flags & ISCSI_FLAG_CMD_READ) &&
|
|
|
|
!(hdr->flags & ISCSI_FLAG_CMD_WRITE) && (hdr->data_length != 0)) {
|
|
|
|
pr_err("ISCSI_FLAG_CMD_READ and/or ISCSI_FLAG_CMD_WRITE"
|
|
|
|
" MUST be set if Expected Data Transfer Length is not 0."
|
|
|
|
" Bad iSCSI Initiator\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_INVALID, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if ((hdr->flags & ISCSI_FLAG_CMD_READ) &&
|
|
|
|
(hdr->flags & ISCSI_FLAG_CMD_WRITE)) {
|
|
|
|
pr_err("Bidirectional operations not supported!\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_INVALID, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (hdr->opcode & ISCSI_OP_IMMEDIATE) {
|
|
|
|
pr_err("Illegally set Immediate Bit in iSCSI Initiator"
|
|
|
|
" Scsi Command PDU.\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_INVALID, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (payload_length && !conn->sess->sess_ops->ImmediateData) {
|
|
|
|
pr_err("ImmediateData=No but DataSegmentLength=%u,"
|
|
|
|
" protocol error.\n", payload_length);
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_PROTOCOL_ERROR, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-07-03 18:48:24 +08:00
|
|
|
if ((be32_to_cpu(hdr->data_length) == payload_length) &&
|
2011-07-23 14:43:04 +08:00
|
|
|
(!(hdr->flags & ISCSI_FLAG_CMD_FINAL))) {
|
|
|
|
pr_err("Expected Data Transfer Length and Length of"
|
|
|
|
" Immediate Data are the same, but ISCSI_FLAG_CMD_FINAL"
|
|
|
|
" bit is not set protocol error\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_PROTOCOL_ERROR, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2012-09-26 20:00:40 +08:00
|
|
|
if (payload_length > be32_to_cpu(hdr->data_length)) {
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_err("DataSegmentLength: %u is greater than"
|
|
|
|
" EDTL: %u, protocol error.\n", payload_length,
|
|
|
|
hdr->data_length);
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_PROTOCOL_ERROR, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2012-09-30 12:51:26 +08:00
|
|
|
if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_err("DataSegmentLength: %u is greater than"
|
2012-09-30 12:51:26 +08:00
|
|
|
" MaxXmitDataSegmentLength: %u, protocol error.\n",
|
|
|
|
payload_length, conn->conn_ops->MaxXmitDataSegmentLength);
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_PROTOCOL_ERROR, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (payload_length > conn->sess->sess_ops->FirstBurstLength) {
|
|
|
|
pr_err("DataSegmentLength: %u is greater than"
|
|
|
|
" FirstBurstLength: %u, protocol error.\n",
|
|
|
|
payload_length, conn->sess->sess_ops->FirstBurstLength);
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_INVALID, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
data_direction = (hdr->flags & ISCSI_FLAG_CMD_WRITE) ? DMA_TO_DEVICE :
|
|
|
|
(hdr->flags & ISCSI_FLAG_CMD_READ) ? DMA_FROM_DEVICE :
|
|
|
|
DMA_NONE;
|
|
|
|
|
2012-04-04 06:51:22 +08:00
|
|
|
cmd->data_direction = data_direction;
|
|
|
|
iscsi_task_attr = hdr->flags & ISCSI_FLAG_CMD_ATTR_MASK;
|
|
|
|
/*
|
|
|
|
* Figure out the SAM Task Attribute for the incoming SCSI CDB
|
|
|
|
*/
|
|
|
|
if ((iscsi_task_attr == ISCSI_ATTR_UNTAGGED) ||
|
|
|
|
(iscsi_task_attr == ISCSI_ATTR_SIMPLE))
|
2014-11-24 23:07:25 +08:00
|
|
|
sam_task_attr = TCM_SIMPLE_TAG;
|
2012-04-04 06:51:22 +08:00
|
|
|
else if (iscsi_task_attr == ISCSI_ATTR_ORDERED)
|
2014-11-24 23:07:25 +08:00
|
|
|
sam_task_attr = TCM_ORDERED_TAG;
|
2012-04-04 06:51:22 +08:00
|
|
|
else if (iscsi_task_attr == ISCSI_ATTR_HEAD_OF_QUEUE)
|
2014-11-24 23:07:25 +08:00
|
|
|
sam_task_attr = TCM_HEAD_TAG;
|
2012-04-04 06:51:22 +08:00
|
|
|
else if (iscsi_task_attr == ISCSI_ATTR_ACA)
|
2014-11-24 23:07:25 +08:00
|
|
|
sam_task_attr = TCM_ACA_TAG;
|
2012-04-04 06:51:22 +08:00
|
|
|
else {
|
|
|
|
pr_debug("Unknown iSCSI Task Attribute: 0x%02x, using"
|
2014-11-24 23:07:25 +08:00
|
|
|
" TCM_SIMPLE_TAG\n", iscsi_task_attr);
|
|
|
|
sam_task_attr = TCM_SIMPLE_TAG;
|
2012-04-04 06:51:22 +08:00
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->iscsi_opcode = ISCSI_OP_SCSI_CMD;
|
|
|
|
cmd->i_state = ISTATE_NEW_CMD;
|
|
|
|
cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
|
|
|
|
cmd->immediate_data = (payload_length) ? 1 : 0;
|
|
|
|
cmd->unsolicited_data = ((!(hdr->flags & ISCSI_FLAG_CMD_FINAL) &&
|
|
|
|
(hdr->flags & ISCSI_FLAG_CMD_WRITE)) ? 1 : 0);
|
|
|
|
if (cmd->unsolicited_data)
|
|
|
|
cmd->cmd_flags |= ICF_NON_IMMEDIATE_UNSOLICITED_DATA;
|
|
|
|
|
|
|
|
conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
|
2015-07-22 06:07:56 +08:00
|
|
|
if (hdr->flags & ISCSI_FLAG_CMD_READ)
|
2015-01-26 18:49:05 +08:00
|
|
|
cmd->targ_xfer_tag = session_get_next_ttt(conn->sess);
|
2015-07-22 06:07:56 +08:00
|
|
|
else
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->targ_xfer_tag = 0xFFFFFFFF;
|
2012-09-26 20:00:40 +08:00
|
|
|
cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
|
|
|
|
cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->first_burst_len = payload_length;
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
if (!conn->sess->sess_ops->RDMAExtensions &&
|
|
|
|
cmd->data_direction == DMA_FROM_DEVICE) {
|
2011-07-23 14:43:04 +08:00
|
|
|
struct iscsi_datain_req *dr;
|
|
|
|
|
|
|
|
dr = iscsit_allocate_datain_req();
|
|
|
|
if (!dr)
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
iscsit_attach_datain_req(cmd, dr);
|
|
|
|
}
|
|
|
|
|
2012-04-04 06:51:23 +08:00
|
|
|
/*
|
|
|
|
* Initialize struct se_cmd descriptor from target_core_mod infrastructure
|
|
|
|
*/
|
2015-04-09 02:01:35 +08:00
|
|
|
transport_init_se_cmd(&cmd->se_cmd, &iscsi_ops,
|
2012-09-26 20:00:40 +08:00
|
|
|
conn->sess->se_sess, be32_to_cpu(hdr->data_length),
|
|
|
|
cmd->data_direction, sam_task_attr,
|
2020-06-08 03:58:31 +08:00
|
|
|
cmd->sense_buffer + 2, scsilun_to_int(&hdr->lun));
|
2012-04-04 06:51:23 +08:00
|
|
|
|
|
|
|
pr_debug("Got SCSI Command, ITT: 0x%08x, CmdSN: 0x%08x,"
|
|
|
|
" ExpXferLen: %u, Length: %u, CID: %hu\n", hdr->itt,
|
2013-03-07 14:18:24 +08:00
|
|
|
hdr->cmdsn, be32_to_cpu(hdr->data_length), payload_length,
|
|
|
|
conn->cid);
|
|
|
|
|
2020-02-13 13:09:00 +08:00
|
|
|
target_get_sess_cmd(&cmd->se_cmd, true);
|
2012-04-04 06:51:23 +08:00
|
|
|
|
2020-06-08 03:58:32 +08:00
|
|
|
cmd->sense_reason = target_cmd_init_cdb(&cmd->se_cmd, hdr->cdb);
|
|
|
|
if (cmd->sense_reason) {
|
|
|
|
if (cmd->sense_reason == TCM_OUT_OF_RESOURCES) {
|
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
goto attach_cmd;
|
|
|
|
}
|
|
|
|
|
2020-06-08 03:58:31 +08:00
|
|
|
cmd->sense_reason = transport_lookup_cmd_lun(&cmd->se_cmd);
|
2012-11-07 04:24:09 +08:00
|
|
|
if (cmd->sense_reason)
|
|
|
|
goto attach_cmd;
|
|
|
|
|
2015-04-14 19:26:44 +08:00
|
|
|
/* only used for printks or comparing with ->ref_task_tag */
|
|
|
|
cmd->se_cmd.tag = (__force u32)cmd->init_task_tag;
|
2020-06-08 03:58:33 +08:00
|
|
|
cmd->sense_reason = target_cmd_parse_cdb(&cmd->se_cmd);
|
2020-06-08 03:58:32 +08:00
|
|
|
if (cmd->sense_reason)
|
2011-07-23 14:43:04 +08:00
|
|
|
goto attach_cmd;
|
2012-04-04 06:51:20 +08:00
|
|
|
|
2012-11-07 04:24:09 +08:00
|
|
|
if (iscsit_build_pdu_and_seq_lists(cmd, payload_length) < 0) {
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
attach_cmd:
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2012-04-04 06:51:01 +08:00
|
|
|
list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
/*
|
|
|
|
* Check if we need to delay processing because of ALUA
|
|
|
|
* Active/NonOptimized primary access state..
|
|
|
|
*/
|
|
|
|
core_alua_check_nonop_delay(&cmd->se_cmd);
|
2012-04-04 06:51:29 +08:00
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_setup_scsi_cmd);
|
2012-11-07 04:24:09 +08:00
|
|
|
|
2019-01-26 02:34:54 +08:00
|
|
|
void iscsit_set_unsolicited_dataout(struct iscsi_cmd *cmd)
|
2013-03-07 14:18:24 +08:00
|
|
|
{
|
|
|
|
iscsit_set_dataout_sequence_values(cmd);
|
|
|
|
|
|
|
|
spin_lock_bh(&cmd->dataout_timeout_lock);
|
|
|
|
iscsit_start_dataout_timer(cmd, cmd->conn);
|
|
|
|
spin_unlock_bh(&cmd->dataout_timeout_lock);
|
|
|
|
}
|
2019-01-26 02:34:54 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_set_unsolicited_dataout);
|
2013-03-07 14:18:24 +08:00
|
|
|
|
|
|
|
int iscsit_process_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_scsi_req *hdr)
|
|
|
|
{
|
|
|
|
int cmdsn_ret = 0;
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Check the CmdSN against ExpCmdSN/MaxCmdSN here if
|
|
|
|
* the Immediate Bit is not set, and no Immediate
|
|
|
|
* Data is attached.
|
|
|
|
*
|
|
|
|
* A PDU/CmdSN carrying Immediate Data can only
|
|
|
|
* be processed after the DataCRC has passed.
|
|
|
|
* If the DataCRC fails, the CmdSN MUST NOT
|
|
|
|
* be acknowledged. (See below)
|
|
|
|
*/
|
|
|
|
if (!cmd->immediate_data) {
|
2013-07-03 18:58:58 +08:00
|
|
|
cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
|
|
|
|
(unsigned char *)hdr, hdr->cmdsn);
|
|
|
|
if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
|
|
|
|
return -1;
|
|
|
|
else if (cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
|
2015-04-27 19:52:36 +08:00
|
|
|
target_put_sess_cmd(&cmd->se_cmd);
|
2011-10-29 04:32:35 +08:00
|
|
|
return 0;
|
2013-03-07 14:18:24 +08:00
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2012-09-26 20:00:40 +08:00
|
|
|
iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If no Immediate Data is attached, it's OK to return now.
|
|
|
|
*/
|
|
|
|
if (!cmd->immediate_data) {
|
2013-03-07 14:18:24 +08:00
|
|
|
if (!cmd->sense_reason && cmd->unsolicited_data)
|
2019-01-26 02:34:54 +08:00
|
|
|
iscsit_set_unsolicited_dataout(cmd);
|
2013-03-07 14:18:24 +08:00
|
|
|
if (!cmd->sense_reason)
|
|
|
|
return 0;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-04-27 19:52:36 +08:00
|
|
|
target_put_sess_cmd(&cmd->se_cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2013-03-07 14:18:24 +08:00
|
|
|
* Early CHECK_CONDITIONs with ImmediateData never make it to command
|
|
|
|
* execution. These exceptions are processed in CmdSN order using
|
|
|
|
* iscsit_check_received_cmdsn() in iscsit_get_immediate_data() below.
|
2011-07-23 14:43:04 +08:00
|
|
|
*/
|
2017-05-24 07:48:45 +08:00
|
|
|
if (cmd->sense_reason)
|
2013-03-07 14:18:24 +08:00
|
|
|
return 1;
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Call directly into transport_generic_new_cmd() to perform
|
|
|
|
* the backend memory allocation.
|
|
|
|
*/
|
2012-11-07 04:24:09 +08:00
|
|
|
cmd->sense_reason = transport_generic_new_cmd(&cmd->se_cmd);
|
2013-07-03 18:58:58 +08:00
|
|
|
if (cmd->sense_reason)
|
2013-03-07 14:18:24 +08:00
|
|
|
return 1;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_process_scsi_cmd);
|
|
|
|
|
|
|
|
static int
|
|
|
|
iscsit_get_immediate_data(struct iscsi_cmd *cmd, struct iscsi_scsi_req *hdr,
|
|
|
|
bool dump_payload)
|
|
|
|
{
|
|
|
|
int cmdsn_ret = 0, immed_ret = IMMEDIATE_DATA_NORMAL_OPERATION;
|
2019-04-03 03:58:15 +08:00
|
|
|
int rc;
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
/*
|
|
|
|
* Special case for Unsupported SAM WRITE Opcodes and ImmediateData=Yes.
|
|
|
|
*/
|
2019-04-03 03:58:15 +08:00
|
|
|
if (dump_payload) {
|
|
|
|
u32 length = min(cmd->se_cmd.data_length - cmd->write_data_done,
|
|
|
|
cmd->first_burst_len);
|
|
|
|
|
|
|
|
pr_debug("Dumping min(%d - %d, %d) = %d bytes of immediate data\n",
|
|
|
|
cmd->se_cmd.data_length, cmd->write_data_done,
|
|
|
|
cmd->first_burst_len, length);
|
|
|
|
rc = iscsit_dump_data_payload(cmd->conn, length, 1);
|
|
|
|
pr_debug("Finished dumping immediate data\n");
|
|
|
|
if (rc < 0)
|
|
|
|
immed_ret = IMMEDIATE_DATA_CANNOT_RECOVER;
|
|
|
|
} else {
|
|
|
|
immed_ret = iscsit_handle_immediate_data(cmd, hdr,
|
|
|
|
cmd->first_burst_len);
|
iscsi-target: Reject immediate data underflow larger than SCSI transfer length
When iscsi WRITE underflow occurs there are two different scenarios
that can happen.
Normally in practice, when an EDTL vs. SCSI CDB TRANSFER LENGTH
underflow is detected, the iscsi immediate data payload is the
smaller SCSI CDB TRANSFER LENGTH.
That is, when a host fabric LLD is using a fixed size EDTL for
a specific control CDB, the SCSI CDB TRANSFER LENGTH and actual
SCSI payload ends up being smaller than EDTL. In iscsi, this
means the received iscsi immediate data payload matches the
smaller SCSI CDB TRANSFER LENGTH, because there is no more
SCSI payload to accept beyond SCSI CDB TRANSFER LENGTH.
However, it's possible for a malicous host to send a WRITE
underflow where EDTL is larger than SCSI CDB TRANSFER LENGTH,
but incoming iscsi immediate data actually matches EDTL.
In the wild, we've never had a iscsi host environment actually
try to do this.
For this special case, it's wrong to truncate part of the
control CDB payload and continue to process the command during
underflow when immediate data payload received was larger than
SCSI CDB TRANSFER LENGTH, so go ahead and reject and drop the
bogus payload as a defensive action.
Note this potential bug was originally relaxed by the following
for allowing WRITE underflow in MSFT FCP host environments:
commit c72c5250224d475614a00c1d7e54a67f77cd3410
Author: Roland Dreier <roland@purestorage.com>
Date: Wed Jul 22 15:08:18 2015 -0700
target: allow underflow/overflow for PR OUT etc. commands
Cc: Roland Dreier <roland@purestorage.com>
Cc: Mike Christie <mchristi@redhat.com>
Cc: Hannes Reinecke <hare@suse.de>
Cc: Martin K. Petersen <martin.petersen@oracle.com>
Cc: <stable@vger.kernel.org> # v4.3+
Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
2017-06-08 11:29:50 +08:00
|
|
|
}
|
2013-03-07 14:18:24 +08:00
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
if (immed_ret == IMMEDIATE_DATA_NORMAL_OPERATION) {
|
|
|
|
/*
|
|
|
|
* A PDU/CmdSN carrying Immediate Data passed
|
|
|
|
* DataCRC, check against ExpCmdSN/MaxCmdSN if
|
|
|
|
* Immediate Bit is not set.
|
|
|
|
*/
|
2013-07-03 18:58:58 +08:00
|
|
|
cmdsn_ret = iscsit_sequence_cmd(cmd->conn, cmd,
|
|
|
|
(unsigned char *)hdr, hdr->cmdsn);
|
2013-08-22 15:05:45 +08:00
|
|
|
if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
|
2013-07-03 18:58:58 +08:00
|
|
|
return -1;
|
2013-03-07 14:18:24 +08:00
|
|
|
|
2013-08-22 15:05:45 +08:00
|
|
|
if (cmd->sense_reason || cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
|
2015-04-27 19:52:36 +08:00
|
|
|
target_put_sess_cmd(&cmd->se_cmd);
|
2019-04-03 03:58:15 +08:00
|
|
|
|
|
|
|
return 0;
|
2013-03-07 14:18:24 +08:00
|
|
|
} else if (cmd->unsolicited_data)
|
2019-01-26 02:34:54 +08:00
|
|
|
iscsit_set_unsolicited_dataout(cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
} else if (immed_ret == IMMEDIATE_DATA_ERL1_CRC_FAILURE) {
|
|
|
|
/*
|
|
|
|
* Immediate Data failed DataCRC and ERL>=1,
|
|
|
|
* silently drop this PDU and let the initiator
|
|
|
|
* plug the CmdSN gap.
|
|
|
|
*
|
|
|
|
* FIXME: Send Unsolicited NOPIN with reserved
|
|
|
|
* TTT here to help the initiator figure out
|
|
|
|
* the missing CmdSN, although they should be
|
|
|
|
* intelligent enough to determine the missing
|
|
|
|
* CmdSN and issue a retry to plug the sequence.
|
|
|
|
*/
|
|
|
|
cmd->i_state = ISTATE_REMOVE;
|
2013-03-07 14:18:24 +08:00
|
|
|
iscsit_add_cmd_to_immediate_queue(cmd, cmd->conn, cmd->i_state);
|
2011-07-23 14:43:04 +08:00
|
|
|
} else /* immed_ret == IMMEDIATE_DATA_CANNOT_RECOVER */
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
static int
|
|
|
|
iscsit_handle_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
unsigned char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_scsi_req *hdr = (struct iscsi_scsi_req *)buf;
|
|
|
|
int rc, immed_data;
|
|
|
|
bool dump_payload = false;
|
|
|
|
|
|
|
|
rc = iscsit_setup_scsi_cmd(conn, cmd, buf);
|
|
|
|
if (rc < 0)
|
2013-07-03 18:58:58 +08:00
|
|
|
return 0;
|
2013-03-07 14:18:24 +08:00
|
|
|
/*
|
|
|
|
* Allocation iovecs needed for struct socket operations for
|
|
|
|
* traditional iSCSI block I/O.
|
|
|
|
*/
|
|
|
|
if (iscsit_allocate_iovecs(cmd) < 0) {
|
2015-04-10 15:47:27 +08:00
|
|
|
return iscsit_reject_cmd(cmd,
|
2013-07-03 18:48:24 +08:00
|
|
|
ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
|
2013-03-07 14:18:24 +08:00
|
|
|
}
|
|
|
|
immed_data = cmd->immediate_data;
|
|
|
|
|
|
|
|
rc = iscsit_process_scsi_cmd(conn, cmd, hdr);
|
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
else if (rc > 0)
|
|
|
|
dump_payload = true;
|
|
|
|
|
|
|
|
if (!immed_data)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return iscsit_get_immediate_data(cmd, hdr, dump_payload);
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static u32 iscsit_do_crypto_hash_sg(
|
2016-01-24 21:19:52 +08:00
|
|
|
struct ahash_request *hash,
|
2011-07-23 14:43:04 +08:00
|
|
|
struct iscsi_cmd *cmd,
|
|
|
|
u32 data_offset,
|
|
|
|
u32 data_length,
|
|
|
|
u32 padding,
|
|
|
|
u8 *pad_bytes)
|
|
|
|
{
|
|
|
|
u32 data_crc;
|
|
|
|
struct scatterlist *sg;
|
|
|
|
unsigned int page_off;
|
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
crypto_ahash_init(hash);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
sg = cmd->first_data_sg;
|
|
|
|
page_off = cmd->first_data_sg_off;
|
|
|
|
|
2020-08-25 20:35:10 +08:00
|
|
|
if (data_length && page_off) {
|
|
|
|
struct scatterlist first_sg;
|
|
|
|
u32 len = min_t(u32, data_length, sg->length - page_off);
|
|
|
|
|
|
|
|
sg_init_table(&first_sg, 1);
|
|
|
|
sg_set_page(&first_sg, sg_page(sg), len, sg->offset + page_off);
|
|
|
|
|
|
|
|
ahash_request_set_crypt(hash, &first_sg, NULL, len);
|
|
|
|
crypto_ahash_update(hash);
|
|
|
|
|
|
|
|
data_length -= len;
|
|
|
|
sg = sg_next(sg);
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
while (data_length) {
|
2020-08-25 20:35:10 +08:00
|
|
|
u32 cur_len = min_t(u32, data_length, sg->length);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
ahash_request_set_crypt(hash, sg, NULL, cur_len);
|
|
|
|
crypto_ahash_update(hash);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
data_length -= cur_len;
|
2015-07-21 08:12:12 +08:00
|
|
|
/* iscsit_map_iovec has already checked for invalid sg pointers */
|
|
|
|
sg = sg_next(sg);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (padding) {
|
|
|
|
struct scatterlist pad_sg;
|
|
|
|
|
|
|
|
sg_init_one(&pad_sg, pad_bytes, padding);
|
2016-01-24 21:19:52 +08:00
|
|
|
ahash_request_set_crypt(hash, &pad_sg, (u8 *)&data_crc,
|
|
|
|
padding);
|
|
|
|
crypto_ahash_finup(hash);
|
|
|
|
} else {
|
|
|
|
ahash_request_set_crypt(hash, NULL, (u8 *)&data_crc, 0);
|
|
|
|
crypto_ahash_final(hash);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return data_crc;
|
|
|
|
}
|
|
|
|
|
2017-11-01 02:03:16 +08:00
|
|
|
static void iscsit_do_crypto_hash_buf(struct ahash_request *hash,
|
|
|
|
const void *buf, u32 payload_length, u32 padding,
|
|
|
|
const void *pad_bytes, void *data_crc)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2016-01-24 21:19:52 +08:00
|
|
|
struct scatterlist sg[2];
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
sg_init_table(sg, ARRAY_SIZE(sg));
|
|
|
|
sg_set_buf(sg, buf, payload_length);
|
2018-09-05 02:47:40 +08:00
|
|
|
if (padding)
|
|
|
|
sg_set_buf(sg + 1, pad_bytes, padding);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
ahash_request_set_crypt(hash, sg, data_crc, payload_length + padding);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
crypto_ahash_digest(hash);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
int
|
2017-01-13 23:23:21 +08:00
|
|
|
__iscsit_check_dataout_hdr(struct iscsi_conn *conn, void *buf,
|
|
|
|
struct iscsi_cmd *cmd, u32 payload_length,
|
|
|
|
bool *success)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2017-01-13 23:23:21 +08:00
|
|
|
struct iscsi_data *hdr = buf;
|
2011-07-23 14:43:04 +08:00
|
|
|
struct se_cmd *se_cmd;
|
2013-03-07 14:18:24 +08:00
|
|
|
int rc;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
/* iSCSI write */
|
2013-11-14 10:54:45 +08:00
|
|
|
atomic_long_add(payload_length, &conn->sess->rx_data_octets);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
pr_debug("Got DataOut ITT: 0x%08x, TTT: 0x%08x,"
|
|
|
|
" DataSN: 0x%08x, Offset: %u, Length: %u, CID: %hu\n",
|
2013-03-07 14:18:24 +08:00
|
|
|
hdr->itt, hdr->ttt, hdr->datasn, ntohl(hdr->offset),
|
2011-07-23 14:43:04 +08:00
|
|
|
payload_length, conn->cid);
|
|
|
|
|
|
|
|
if (cmd->cmd_flags & ICF_GOT_LAST_DATAOUT) {
|
|
|
|
pr_err("Command ITT: 0x%08x received DataOUT after"
|
|
|
|
" last DataOUT received, dumping payload\n",
|
|
|
|
cmd->init_task_tag);
|
|
|
|
return iscsit_dump_data_payload(conn, payload_length, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cmd->data_direction != DMA_TO_DEVICE) {
|
|
|
|
pr_err("Command ITT: 0x%08x received DataOUT for a"
|
|
|
|
" NON-WRITE command.\n", cmd->init_task_tag);
|
2014-06-21 01:59:57 +08:00
|
|
|
return iscsit_dump_data_payload(conn, payload_length, 1);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
se_cmd = &cmd->se_cmd;
|
|
|
|
iscsit_mod_dataout_timer(cmd);
|
|
|
|
|
2012-09-26 20:00:40 +08:00
|
|
|
if ((be32_to_cpu(hdr->offset) + payload_length) > cmd->se_cmd.data_length) {
|
2017-11-01 02:03:15 +08:00
|
|
|
pr_err("DataOut Offset: %u, Length %u greater than iSCSI Command EDTL %u, protocol error.\n",
|
|
|
|
be32_to_cpu(hdr->offset), payload_length,
|
|
|
|
cmd->se_cmd.data_length);
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_reject_cmd(cmd, ISCSI_REASON_BOOKMARK_INVALID, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (cmd->unsolicited_data) {
|
|
|
|
int dump_unsolicited_data = 0;
|
|
|
|
|
|
|
|
if (conn->sess->sess_ops->InitialR2T) {
|
|
|
|
pr_err("Received unexpected unsolicited data"
|
|
|
|
" while InitialR2T=Yes, protocol error.\n");
|
|
|
|
transport_send_check_condition_and_sense(&cmd->se_cmd,
|
|
|
|
TCM_UNEXPECTED_UNSOLICITED_DATA, 0);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Special case for dealing with Unsolicited DataOUT
|
|
|
|
* and Unsupported SAM WRITE Opcodes and SE resource allocation
|
|
|
|
* failures;
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Something's amiss if we're not in WRITE_PENDING state... */
|
|
|
|
WARN_ON(se_cmd->t_state != TRANSPORT_WRITE_PENDING);
|
2012-11-07 04:24:09 +08:00
|
|
|
if (!(se_cmd->se_cmd_flags & SCF_SUPPORTED_SAM_OPCODE))
|
2011-07-23 14:43:04 +08:00
|
|
|
dump_unsolicited_data = 1;
|
|
|
|
|
|
|
|
if (dump_unsolicited_data) {
|
|
|
|
/*
|
|
|
|
* Check if a delayed TASK_ABORTED status needs to
|
|
|
|
* be sent now if the ISCSI_FLAG_CMD_FINAL has been
|
2015-10-23 06:53:22 +08:00
|
|
|
* received with the unsolicited data out.
|
2011-07-23 14:43:04 +08:00
|
|
|
*/
|
|
|
|
if (hdr->flags & ISCSI_FLAG_CMD_FINAL)
|
|
|
|
iscsit_stop_dataout_timer(cmd);
|
|
|
|
|
|
|
|
return iscsit_dump_data_payload(conn, payload_length, 1);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* For the normal solicited data path:
|
|
|
|
*
|
|
|
|
* Check for a delayed TASK_ABORTED status and dump any
|
|
|
|
* incoming data out payload if one exists. Also, when the
|
|
|
|
* ISCSI_FLAG_CMD_FINAL is set to denote the end of the current
|
|
|
|
* data out sequence, we decrement outstanding_r2ts. Once
|
|
|
|
* outstanding_r2ts reaches zero, go ahead and send the delayed
|
|
|
|
* TASK_ABORTED status.
|
|
|
|
*/
|
2011-12-22 03:13:47 +08:00
|
|
|
if (se_cmd->transport_state & CMD_T_ABORTED) {
|
2018-11-28 07:52:02 +08:00
|
|
|
if (hdr->flags & ISCSI_FLAG_CMD_FINAL &&
|
|
|
|
--cmd->outstanding_r2ts < 1)
|
|
|
|
iscsit_stop_dataout_timer(cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
return iscsit_dump_data_payload(conn, payload_length, 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
2016-12-23 21:37:52 +08:00
|
|
|
* Perform DataSN, DataSequenceInOrder, DataPDUInOrder, and
|
2011-07-23 14:43:04 +08:00
|
|
|
* within-command recovery checks before receiving the payload.
|
|
|
|
*/
|
2013-03-07 14:18:24 +08:00
|
|
|
rc = iscsit_check_pre_dataout(cmd, buf);
|
|
|
|
if (rc == DATAOUT_WITHIN_COMMAND_RECOVERY)
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
2013-03-07 14:18:24 +08:00
|
|
|
else if (rc == DATAOUT_CANNOT_RECOVER)
|
2011-07-23 14:43:04 +08:00
|
|
|
return -1;
|
2017-01-13 23:23:21 +08:00
|
|
|
*success = true;
|
2013-03-07 14:18:24 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2017-01-13 23:23:21 +08:00
|
|
|
EXPORT_SYMBOL(__iscsit_check_dataout_hdr);
|
|
|
|
|
|
|
|
int
|
|
|
|
iscsit_check_dataout_hdr(struct iscsi_conn *conn, void *buf,
|
|
|
|
struct iscsi_cmd **out_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_data *hdr = buf;
|
|
|
|
struct iscsi_cmd *cmd;
|
|
|
|
u32 payload_length = ntoh24(hdr->dlength);
|
|
|
|
int rc;
|
|
|
|
bool success = false;
|
|
|
|
|
|
|
|
if (!payload_length) {
|
|
|
|
pr_warn_ratelimited("DataOUT payload is ZERO, ignoring.\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
|
|
|
|
pr_err_ratelimited("DataSegmentLength: %u is greater than"
|
|
|
|
" MaxXmitDataSegmentLength: %u\n", payload_length,
|
|
|
|
conn->conn_ops->MaxXmitDataSegmentLength);
|
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd = iscsit_find_cmd_from_itt_or_dump(conn, hdr->itt, payload_length);
|
|
|
|
if (!cmd)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
rc = __iscsit_check_dataout_hdr(conn, buf, cmd, payload_length, &success);
|
|
|
|
|
|
|
|
if (success)
|
|
|
|
*out_cmd = cmd;
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
2013-03-07 14:18:24 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_check_dataout_hdr);
|
|
|
|
|
|
|
|
static int
|
|
|
|
iscsit_get_dataout(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_data *hdr)
|
|
|
|
{
|
|
|
|
struct kvec *iov;
|
|
|
|
u32 checksum, iov_count = 0, padding = 0, rx_got = 0, rx_size = 0;
|
2019-04-03 03:58:13 +08:00
|
|
|
u32 payload_length;
|
2013-03-07 14:18:24 +08:00
|
|
|
int iov_ret, data_crc_failed = 0;
|
|
|
|
|
2019-04-03 03:58:13 +08:00
|
|
|
payload_length = min_t(u32, cmd->se_cmd.data_length,
|
|
|
|
ntoh24(hdr->dlength));
|
2011-07-23 14:43:04 +08:00
|
|
|
rx_size += payload_length;
|
|
|
|
iov = &cmd->iov_data[0];
|
|
|
|
|
2019-04-03 03:58:14 +08:00
|
|
|
iov_ret = iscsit_map_iovec(cmd, iov, cmd->orig_iov_data_count - 2,
|
|
|
|
be32_to_cpu(hdr->offset), payload_length);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (iov_ret < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
iov_count += iov_ret;
|
|
|
|
|
|
|
|
padding = ((-payload_length) & 3);
|
|
|
|
if (padding != 0) {
|
|
|
|
iov[iov_count].iov_base = cmd->pad_bytes;
|
|
|
|
iov[iov_count++].iov_len = padding;
|
|
|
|
rx_size += padding;
|
|
|
|
pr_debug("Receiving %u padding bytes.\n", padding);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
|
|
|
iov[iov_count].iov_base = &checksum;
|
|
|
|
iov[iov_count++].iov_len = ISCSI_CRC_LEN;
|
|
|
|
rx_size += ISCSI_CRC_LEN;
|
|
|
|
}
|
|
|
|
|
2019-04-03 03:58:14 +08:00
|
|
|
WARN_ON_ONCE(iov_count > cmd->orig_iov_data_count);
|
2011-07-23 14:43:04 +08:00
|
|
|
rx_got = rx_data(conn, &cmd->iov_data[0], iov_count, rx_size);
|
|
|
|
|
|
|
|
iscsit_unmap_iovec(cmd);
|
|
|
|
|
|
|
|
if (rx_got != rx_size)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
|
|
|
u32 data_crc;
|
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
data_crc = iscsit_do_crypto_hash_sg(conn->conn_rx_hash, cmd,
|
2012-09-26 20:00:40 +08:00
|
|
|
be32_to_cpu(hdr->offset),
|
|
|
|
payload_length, padding,
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->pad_bytes);
|
|
|
|
|
|
|
|
if (checksum != data_crc) {
|
|
|
|
pr_err("ITT: 0x%08x, Offset: %u, Length: %u,"
|
|
|
|
" DataSN: 0x%08x, CRC32C DataDigest 0x%08x"
|
|
|
|
" does not match computed 0x%08x\n",
|
|
|
|
hdr->itt, hdr->offset, payload_length,
|
|
|
|
hdr->datasn, checksum, data_crc);
|
|
|
|
data_crc_failed = 1;
|
|
|
|
} else {
|
|
|
|
pr_debug("Got CRC32C DataDigest 0x%08x for"
|
|
|
|
" %u bytes of Data Out\n", checksum,
|
|
|
|
payload_length);
|
|
|
|
}
|
|
|
|
}
|
2013-03-07 14:18:24 +08:00
|
|
|
|
|
|
|
return data_crc_failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
iscsit_check_dataout_payload(struct iscsi_cmd *cmd, struct iscsi_data *hdr,
|
|
|
|
bool data_crc_failed)
|
|
|
|
{
|
|
|
|
struct iscsi_conn *conn = cmd->conn;
|
|
|
|
int rc, ooo_cmdsn;
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Increment post receive data and CRC values or perform
|
|
|
|
* within-command recovery.
|
|
|
|
*/
|
2013-03-07 14:18:24 +08:00
|
|
|
rc = iscsit_check_post_dataout(cmd, (unsigned char *)hdr, data_crc_failed);
|
|
|
|
if ((rc == DATAOUT_NORMAL) || (rc == DATAOUT_WITHIN_COMMAND_RECOVERY))
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
2013-03-07 14:18:24 +08:00
|
|
|
else if (rc == DATAOUT_SEND_R2T) {
|
2011-07-23 14:43:04 +08:00
|
|
|
iscsit_set_dataout_sequence_values(cmd);
|
2013-03-07 14:18:24 +08:00
|
|
|
conn->conn_transport->iscsit_get_dataout(conn, cmd, false);
|
|
|
|
} else if (rc == DATAOUT_SEND_TO_TRANSPORT) {
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Handle extra special case for out of order
|
|
|
|
* Unsolicited Data Out.
|
|
|
|
*/
|
|
|
|
spin_lock_bh(&cmd->istate_lock);
|
|
|
|
ooo_cmdsn = (cmd->cmd_flags & ICF_OOO_CMDSN);
|
|
|
|
cmd->cmd_flags |= ICF_GOT_LAST_DATAOUT;
|
|
|
|
cmd->i_state = ISTATE_RECEIVED_LAST_DATAOUT;
|
|
|
|
spin_unlock_bh(&cmd->istate_lock);
|
|
|
|
|
|
|
|
iscsit_stop_dataout_timer(cmd);
|
2012-07-09 03:58:42 +08:00
|
|
|
if (ooo_cmdsn)
|
|
|
|
return 0;
|
|
|
|
target_execute_cmd(&cmd->se_cmd);
|
|
|
|
return 0;
|
2011-07-23 14:43:04 +08:00
|
|
|
} else /* DATAOUT_CANNOT_RECOVER */
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2013-03-07 14:18:24 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_check_dataout_payload);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
static int iscsit_handle_data_out(struct iscsi_conn *conn, unsigned char *buf)
|
|
|
|
{
|
2013-11-07 12:55:39 +08:00
|
|
|
struct iscsi_cmd *cmd = NULL;
|
2013-03-07 14:18:24 +08:00
|
|
|
struct iscsi_data *hdr = (struct iscsi_data *)buf;
|
|
|
|
int rc;
|
|
|
|
bool data_crc_failed = false;
|
|
|
|
|
|
|
|
rc = iscsit_check_dataout_hdr(conn, buf, &cmd);
|
|
|
|
if (rc < 0)
|
2013-07-03 18:58:58 +08:00
|
|
|
return 0;
|
2013-03-07 14:18:24 +08:00
|
|
|
else if (!cmd)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
rc = iscsit_get_dataout(conn, cmd, hdr);
|
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
else if (rc > 0)
|
|
|
|
data_crc_failed = true;
|
|
|
|
|
|
|
|
return iscsit_check_dataout_payload(cmd, hdr, data_crc_failed);
|
|
|
|
}
|
|
|
|
|
2013-06-15 07:07:47 +08:00
|
|
|
int iscsit_setup_nop_out(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_nopout *hdr)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2013-06-15 07:07:47 +08:00
|
|
|
u32 payload_length = ntoh24(hdr->dlength);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2014-03-15 06:28:59 +08:00
|
|
|
if (!(hdr->flags & ISCSI_FLAG_CMD_FINAL)) {
|
|
|
|
pr_err("NopOUT Flag's, Left Most Bit not set, protocol error.\n");
|
|
|
|
if (!cmd)
|
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
|
|
|
|
|
|
|
return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
|
|
|
}
|
|
|
|
|
2012-09-26 20:00:39 +08:00
|
|
|
if (hdr->itt == RESERVED_ITT && !(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_err("NOPOUT ITT is reserved, but Immediate Bit is"
|
|
|
|
" not set, protocol error.\n");
|
2013-08-24 13:28:56 +08:00
|
|
|
if (!cmd)
|
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
|
|
|
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2012-09-30 12:51:26 +08:00
|
|
|
if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_err("NOPOUT Ping Data DataSegmentLength: %u is"
|
2012-09-30 12:51:26 +08:00
|
|
|
" greater than MaxXmitDataSegmentLength: %u, protocol"
|
2011-07-23 14:43:04 +08:00
|
|
|
" error.\n", payload_length,
|
2012-09-30 12:51:26 +08:00
|
|
|
conn->conn_ops->MaxXmitDataSegmentLength);
|
2013-08-24 13:28:56 +08:00
|
|
|
if (!cmd)
|
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
|
|
|
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
pr_debug("Got NOPOUT Ping %s ITT: 0x%08x, TTT: 0x%08x,"
|
2011-07-23 14:43:04 +08:00
|
|
|
" CmdSN: 0x%08x, ExpStatSN: 0x%08x, Length: %u\n",
|
2012-09-26 20:00:39 +08:00
|
|
|
hdr->itt == RESERVED_ITT ? "Response" : "Request",
|
2011-07-23 14:43:04 +08:00
|
|
|
hdr->itt, hdr->ttt, hdr->cmdsn, hdr->exp_statsn,
|
|
|
|
payload_length);
|
|
|
|
/*
|
|
|
|
* This is not a response to a Unsolicited NopIN, which means
|
|
|
|
* it can either be a NOPOUT ping request (with a valid ITT),
|
|
|
|
* or a NOPOUT not requesting a NOPIN (with a reserved ITT).
|
|
|
|
* Either way, make sure we allocate an struct iscsi_cmd, as both
|
|
|
|
* can contain ping data.
|
|
|
|
*/
|
2012-09-26 20:00:40 +08:00
|
|
|
if (hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->iscsi_opcode = ISCSI_OP_NOOP_OUT;
|
|
|
|
cmd->i_state = ISTATE_SEND_NOPIN;
|
|
|
|
cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ?
|
|
|
|
1 : 0);
|
|
|
|
conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
|
|
|
|
cmd->targ_xfer_tag = 0xFFFFFFFF;
|
2012-09-26 20:00:40 +08:00
|
|
|
cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
|
|
|
|
cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->data_direction = DMA_NONE;
|
|
|
|
}
|
|
|
|
|
2013-06-15 07:07:47 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_setup_nop_out);
|
|
|
|
|
|
|
|
int iscsit_process_nop_out(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_nopout *hdr)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd_p = NULL;
|
|
|
|
int cmdsn_ret = 0;
|
|
|
|
/*
|
|
|
|
* Initiator is expecting a NopIN ping reply..
|
|
|
|
*/
|
|
|
|
if (hdr->itt != RESERVED_ITT) {
|
2014-05-02 04:44:56 +08:00
|
|
|
if (!cmd)
|
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
2013-06-15 07:07:47 +08:00
|
|
|
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
|
|
|
list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
|
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
|
|
|
|
iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
|
|
|
|
|
|
|
|
if (hdr->opcode & ISCSI_OP_IMMEDIATE) {
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn,
|
|
|
|
cmd->i_state);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-07-03 18:58:58 +08:00
|
|
|
cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
|
|
|
|
(unsigned char *)hdr, hdr->cmdsn);
|
2013-06-15 07:07:47 +08:00
|
|
|
if (cmdsn_ret == CMDSN_LOWER_THAN_EXP)
|
|
|
|
return 0;
|
|
|
|
if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
|
2013-07-03 18:48:24 +08:00
|
|
|
return -1;
|
2013-06-15 07:07:47 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* This was a response to a unsolicited NOPIN ping.
|
|
|
|
*/
|
|
|
|
if (hdr->ttt != cpu_to_be32(0xFFFFFFFF)) {
|
|
|
|
cmd_p = iscsit_find_cmd_from_ttt(conn, be32_to_cpu(hdr->ttt));
|
|
|
|
if (!cmd_p)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
iscsit_stop_nopin_response_timer(conn);
|
|
|
|
|
|
|
|
cmd_p->i_state = ISTATE_REMOVE;
|
|
|
|
iscsit_add_cmd_to_immediate_queue(cmd_p, conn, cmd_p->i_state);
|
|
|
|
|
|
|
|
iscsit_start_nopin_timer(conn);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Otherwise, initiator is not expecting a NOPIN is response.
|
|
|
|
* Just ignore for now.
|
|
|
|
*/
|
2016-09-15 23:50:11 +08:00
|
|
|
|
|
|
|
if (cmd)
|
|
|
|
iscsit_free_cmd(cmd, false);
|
|
|
|
|
2013-06-15 07:07:47 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_process_nop_out);
|
|
|
|
|
|
|
|
static int iscsit_handle_nop_out(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
unsigned char *buf)
|
|
|
|
{
|
|
|
|
unsigned char *ping_data = NULL;
|
|
|
|
struct iscsi_nopout *hdr = (struct iscsi_nopout *)buf;
|
|
|
|
struct kvec *iov = NULL;
|
|
|
|
u32 payload_length = ntoh24(hdr->dlength);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = iscsit_setup_nop_out(conn, cmd, hdr);
|
|
|
|
if (ret < 0)
|
2013-07-03 18:58:58 +08:00
|
|
|
return 0;
|
2013-06-15 07:07:47 +08:00
|
|
|
/*
|
|
|
|
* Handle NOP-OUT payload for traditional iSCSI sockets
|
|
|
|
*/
|
2012-09-26 20:00:40 +08:00
|
|
|
if (payload_length && hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
|
2013-06-15 07:07:47 +08:00
|
|
|
u32 checksum, data_crc, padding = 0;
|
|
|
|
int niov = 0, rx_got, rx_size = payload_length;
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
ping_data = kzalloc(payload_length + 1, GFP_KERNEL);
|
|
|
|
if (!ping_data) {
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
iov = &cmd->iov_misc[0];
|
|
|
|
iov[niov].iov_base = ping_data;
|
|
|
|
iov[niov++].iov_len = payload_length;
|
|
|
|
|
|
|
|
padding = ((-payload_length) & 3);
|
|
|
|
if (padding != 0) {
|
|
|
|
pr_debug("Receiving %u additional bytes"
|
|
|
|
" for padding.\n", padding);
|
|
|
|
iov[niov].iov_base = &cmd->pad_bytes;
|
|
|
|
iov[niov++].iov_len = padding;
|
|
|
|
rx_size += padding;
|
|
|
|
}
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
|
|
|
iov[niov].iov_base = &checksum;
|
|
|
|
iov[niov++].iov_len = ISCSI_CRC_LEN;
|
|
|
|
rx_size += ISCSI_CRC_LEN;
|
|
|
|
}
|
|
|
|
|
2019-04-03 03:58:14 +08:00
|
|
|
WARN_ON_ONCE(niov > ARRAY_SIZE(cmd->iov_misc));
|
2011-07-23 14:43:04 +08:00
|
|
|
rx_got = rx_data(conn, &cmd->iov_misc[0], niov, rx_size);
|
|
|
|
if (rx_got != rx_size) {
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
2017-11-01 02:03:16 +08:00
|
|
|
iscsit_do_crypto_hash_buf(conn->conn_rx_hash, ping_data,
|
|
|
|
payload_length, padding,
|
|
|
|
cmd->pad_bytes, &data_crc);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (checksum != data_crc) {
|
|
|
|
pr_err("Ping data CRC32C DataDigest"
|
|
|
|
" 0x%08x does not match computed 0x%08x\n",
|
|
|
|
checksum, data_crc);
|
|
|
|
if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
|
|
|
|
pr_err("Unable to recover from"
|
|
|
|
" NOPOUT Ping DataCRC failure while in"
|
|
|
|
" ERL=0.\n");
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Silently drop this PDU and let the
|
|
|
|
* initiator plug the CmdSN gap.
|
|
|
|
*/
|
|
|
|
pr_debug("Dropping NOPOUT"
|
|
|
|
" Command CmdSN: 0x%08x due to"
|
|
|
|
" DataCRC error.\n", hdr->cmdsn);
|
|
|
|
ret = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
pr_debug("Got CRC32C DataDigest"
|
|
|
|
" 0x%08x for %u bytes of ping data.\n",
|
|
|
|
checksum, payload_length);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ping_data[payload_length] = '\0';
|
|
|
|
/*
|
|
|
|
* Attach ping data to struct iscsi_cmd->buf_ptr.
|
|
|
|
*/
|
target: remove useless casts
A reader should spend an extra moment whenever noticing a cast,
because either something special is going on that deserves extra
attention or, as is all too often the case, the code is wrong.
These casts, afaics, have all been useless. They cast a foo* to a
foo*, cast a void* to the assigned type, cast a foo* to void*, before
assigning it to a void* variable, etc.
In a few cases I also removed an additional &...[0], which is equally
useless.
Lastly I added three FIXMEs where, to the best of my judgement, the
code appears to have a bug. It would be good if someone could check
these.
Signed-off-by: Joern Engel <joern@logfs.org>
Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
2011-11-24 09:05:51 +08:00
|
|
|
cmd->buf_ptr = ping_data;
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->buf_ptr_size = payload_length;
|
|
|
|
|
|
|
|
pr_debug("Got %u bytes of NOPOUT ping"
|
|
|
|
" data.\n", payload_length);
|
|
|
|
pr_debug("Ping Data: \"%s\"\n", ping_data);
|
|
|
|
}
|
|
|
|
|
2013-06-15 07:07:47 +08:00
|
|
|
return iscsit_process_nop_out(conn, cmd, hdr);
|
2011-07-23 14:43:04 +08:00
|
|
|
out:
|
|
|
|
if (cmd)
|
2013-05-31 15:49:41 +08:00
|
|
|
iscsit_free_cmd(cmd, false);
|
2013-06-15 07:07:47 +08:00
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
kfree(ping_data);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-01-06 18:32:08 +08:00
|
|
|
static enum tcm_tmreq_table iscsit_convert_tmf(u8 iscsi_tmf)
|
|
|
|
{
|
|
|
|
switch (iscsi_tmf) {
|
|
|
|
case ISCSI_TM_FUNC_ABORT_TASK:
|
|
|
|
return TMR_ABORT_TASK;
|
|
|
|
case ISCSI_TM_FUNC_ABORT_TASK_SET:
|
|
|
|
return TMR_ABORT_TASK_SET;
|
|
|
|
case ISCSI_TM_FUNC_CLEAR_ACA:
|
|
|
|
return TMR_CLEAR_ACA;
|
|
|
|
case ISCSI_TM_FUNC_CLEAR_TASK_SET:
|
|
|
|
return TMR_CLEAR_TASK_SET;
|
|
|
|
case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET:
|
|
|
|
return TMR_LUN_RESET;
|
|
|
|
case ISCSI_TM_FUNC_TARGET_WARM_RESET:
|
|
|
|
return TMR_TARGET_WARM_RESET;
|
|
|
|
case ISCSI_TM_FUNC_TARGET_COLD_RESET:
|
|
|
|
return TMR_TARGET_COLD_RESET;
|
|
|
|
default:
|
|
|
|
return TMR_UNKNOWN;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
int
|
|
|
|
iscsit_handle_task_mgt_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
unsigned char *buf)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
struct se_tmr_req *se_tmr;
|
|
|
|
struct iscsi_tmr_req *tmr_req;
|
|
|
|
struct iscsi_tm *hdr;
|
2013-07-03 18:11:48 +08:00
|
|
|
int out_of_order_cmdsn = 0, ret;
|
2017-01-05 19:39:57 +08:00
|
|
|
u8 function, tcm_function = TMR_UNKNOWN;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
hdr = (struct iscsi_tm *) buf;
|
|
|
|
hdr->flags &= ~ISCSI_FLAG_CMD_FINAL;
|
|
|
|
function = hdr->flags;
|
|
|
|
|
|
|
|
pr_debug("Got Task Management Request ITT: 0x%08x, CmdSN:"
|
|
|
|
" 0x%08x, Function: 0x%02x, RefTaskTag: 0x%08x, RefCmdSN:"
|
|
|
|
" 0x%08x, CID: %hu\n", hdr->itt, hdr->cmdsn, function,
|
|
|
|
hdr->rtt, hdr->refcmdsn, conn->cid);
|
|
|
|
|
|
|
|
if ((function != ISCSI_TM_FUNC_ABORT_TASK) &&
|
|
|
|
((function != ISCSI_TM_FUNC_TASK_REASSIGN) &&
|
2012-09-26 20:00:39 +08:00
|
|
|
hdr->rtt != RESERVED_ITT)) {
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_err("RefTaskTag should be set to 0xFFFFFFFF.\n");
|
2012-09-26 20:00:39 +08:00
|
|
|
hdr->rtt = RESERVED_ITT;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if ((function == ISCSI_TM_FUNC_TASK_REASSIGN) &&
|
|
|
|
!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
|
|
|
|
pr_err("Task Management Request TASK_REASSIGN not"
|
|
|
|
" issued as immediate command, bad iSCSI Initiator"
|
|
|
|
"implementation\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_PROTOCOL_ERROR, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
if ((function != ISCSI_TM_FUNC_ABORT_TASK) &&
|
2012-09-26 20:00:40 +08:00
|
|
|
be32_to_cpu(hdr->refcmdsn) != ISCSI_RESERVED_TAG)
|
|
|
|
hdr->refcmdsn = cpu_to_be32(ISCSI_RESERVED_TAG);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2012-04-04 06:51:22 +08:00
|
|
|
cmd->data_direction = DMA_NONE;
|
2017-04-09 22:00:39 +08:00
|
|
|
cmd->tmr_req = kzalloc(sizeof(*cmd->tmr_req), GFP_KERNEL);
|
2017-10-28 03:32:59 +08:00
|
|
|
if (!cmd->tmr_req) {
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_NO_RESOURCES,
|
|
|
|
buf);
|
2017-10-28 03:32:59 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
transport_init_se_cmd(&cmd->se_cmd, &iscsi_ops,
|
|
|
|
conn->sess->se_sess, 0, DMA_NONE,
|
2020-06-08 03:58:31 +08:00
|
|
|
TCM_SIMPLE_TAG, cmd->sense_buffer + 2,
|
|
|
|
scsilun_to_int(&hdr->lun));
|
2017-10-28 03:32:59 +08:00
|
|
|
|
2020-02-13 13:09:00 +08:00
|
|
|
target_get_sess_cmd(&cmd->se_cmd, true);
|
2012-04-04 06:51:22 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* TASK_REASSIGN for ERL=2 / connection stays inside of
|
|
|
|
* LIO-Target $FABRIC_MOD
|
|
|
|
*/
|
|
|
|
if (function != ISCSI_TM_FUNC_TASK_REASSIGN) {
|
2017-01-06 18:32:08 +08:00
|
|
|
tcm_function = iscsit_convert_tmf(function);
|
|
|
|
if (tcm_function == TMR_UNKNOWN) {
|
2012-04-04 06:51:22 +08:00
|
|
|
pr_err("Unknown iSCSI TMR Function:"
|
|
|
|
" 0x%02x\n", function);
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
|
2012-04-04 06:51:22 +08:00
|
|
|
}
|
2017-01-05 19:39:57 +08:00
|
|
|
}
|
|
|
|
ret = core_tmr_alloc_req(&cmd->se_cmd, cmd->tmr_req, tcm_function,
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (ret < 0)
|
|
|
|
return iscsit_add_reject_cmd(cmd,
|
2013-07-03 18:48:24 +08:00
|
|
|
ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
|
2012-04-04 06:51:22 +08:00
|
|
|
|
2017-01-05 19:39:57 +08:00
|
|
|
cmd->tmr_req->se_tmr_req = cmd->se_cmd.se_tmr_req;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
cmd->iscsi_opcode = ISCSI_OP_SCSI_TMFUNC;
|
|
|
|
cmd->i_state = ISTATE_SEND_TASKMGTRSP;
|
|
|
|
cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
|
|
|
|
cmd->init_task_tag = hdr->itt;
|
|
|
|
cmd->targ_xfer_tag = 0xFFFFFFFF;
|
2012-09-26 20:00:40 +08:00
|
|
|
cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
|
|
|
|
cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
|
2011-07-23 14:43:04 +08:00
|
|
|
se_tmr = cmd->se_cmd.se_tmr_req;
|
|
|
|
tmr_req = cmd->tmr_req;
|
|
|
|
/*
|
|
|
|
* Locate the struct se_lun for all TMRs not related to ERL=2 TASK_REASSIGN
|
|
|
|
*/
|
|
|
|
if (function != ISCSI_TM_FUNC_TASK_REASSIGN) {
|
2020-06-08 03:58:31 +08:00
|
|
|
ret = transport_lookup_tmr_lun(&cmd->se_cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
se_tmr->response = ISCSI_TMF_RSP_NO_LUN;
|
|
|
|
goto attach;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (function) {
|
|
|
|
case ISCSI_TM_FUNC_ABORT_TASK:
|
|
|
|
se_tmr->response = iscsit_tmr_abort_task(cmd, buf);
|
2012-11-07 04:24:09 +08:00
|
|
|
if (se_tmr->response)
|
2011-07-23 14:43:04 +08:00
|
|
|
goto attach;
|
|
|
|
break;
|
|
|
|
case ISCSI_TM_FUNC_ABORT_TASK_SET:
|
|
|
|
case ISCSI_TM_FUNC_CLEAR_ACA:
|
|
|
|
case ISCSI_TM_FUNC_CLEAR_TASK_SET:
|
|
|
|
case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET:
|
|
|
|
break;
|
|
|
|
case ISCSI_TM_FUNC_TARGET_WARM_RESET:
|
|
|
|
if (iscsit_tmr_task_warm_reset(conn, tmr_req, buf) < 0) {
|
|
|
|
se_tmr->response = ISCSI_TMF_RSP_AUTH_FAILED;
|
|
|
|
goto attach;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ISCSI_TM_FUNC_TARGET_COLD_RESET:
|
|
|
|
if (iscsit_tmr_task_cold_reset(conn, tmr_req, buf) < 0) {
|
|
|
|
se_tmr->response = ISCSI_TMF_RSP_AUTH_FAILED;
|
|
|
|
goto attach;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ISCSI_TM_FUNC_TASK_REASSIGN:
|
|
|
|
se_tmr->response = iscsit_tmr_task_reassign(cmd, buf);
|
|
|
|
/*
|
|
|
|
* Perform sanity checks on the ExpDataSN only if the
|
|
|
|
* TASK_REASSIGN was successful.
|
|
|
|
*/
|
2012-11-07 04:24:09 +08:00
|
|
|
if (se_tmr->response)
|
2011-07-23 14:43:04 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
if (iscsit_check_task_reassign_expdatasn(tmr_req, conn) < 0)
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject_cmd(cmd,
|
|
|
|
ISCSI_REASON_BOOKMARK_INVALID, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pr_err("Unknown TMR function: 0x%02x, protocol"
|
|
|
|
" error.\n", function);
|
|
|
|
se_tmr->response = ISCSI_TMF_RSP_NOT_SUPPORTED;
|
|
|
|
goto attach;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((function != ISCSI_TM_FUNC_TASK_REASSIGN) &&
|
|
|
|
(se_tmr->response == ISCSI_TMF_RSP_COMPLETE))
|
|
|
|
se_tmr->call_transport = 1;
|
|
|
|
attach:
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2012-04-04 06:51:01 +08:00
|
|
|
list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
|
|
|
|
if (!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
|
2013-07-03 18:58:58 +08:00
|
|
|
int cmdsn_ret = iscsit_sequence_cmd(conn, cmd, buf, hdr->cmdsn);
|
2017-10-28 11:52:56 +08:00
|
|
|
if (cmdsn_ret == CMDSN_HIGHER_THAN_EXP) {
|
2011-07-23 14:43:04 +08:00
|
|
|
out_of_order_cmdsn = 1;
|
2017-10-28 11:52:56 +08:00
|
|
|
} else if (cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
|
|
|
|
target_put_sess_cmd(&cmd->se_cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
2017-10-28 11:52:56 +08:00
|
|
|
} else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER) {
|
2013-07-03 18:48:24 +08:00
|
|
|
return -1;
|
2017-10-28 11:52:56 +08:00
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
2012-09-26 20:00:40 +08:00
|
|
|
iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2011-10-29 04:37:19 +08:00
|
|
|
if (out_of_order_cmdsn || !(hdr->opcode & ISCSI_OP_IMMEDIATE))
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
/*
|
|
|
|
* Found the referenced task, send to transport for processing.
|
|
|
|
*/
|
|
|
|
if (se_tmr->call_transport)
|
|
|
|
return transport_generic_handle_tmr(&cmd->se_cmd);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Could not find the referenced LUN, task, or Task Management
|
|
|
|
* command not authorized or supported. Change state and
|
|
|
|
* let the tx_thread send the response.
|
|
|
|
*
|
|
|
|
* For connection recovery, this is also the default action for
|
|
|
|
* TMR TASK_REASSIGN.
|
|
|
|
*/
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
|
2017-10-28 03:32:59 +08:00
|
|
|
target_put_sess_cmd(&cmd->se_cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2013-03-07 14:18:24 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_handle_task_mgt_cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
/* #warning FIXME: Support Text Command parameters besides SendTargets */
|
2013-06-15 07:46:16 +08:00
|
|
|
int
|
|
|
|
iscsit_setup_text_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_text *hdr)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2013-06-15 07:46:16 +08:00
|
|
|
u32 payload_length = ntoh24(hdr->dlength);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2012-09-30 12:51:26 +08:00
|
|
|
if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_err("Unable to accept text parameter length: %u"
|
2012-09-30 12:51:26 +08:00
|
|
|
"greater than MaxXmitDataSegmentLength %u.\n",
|
|
|
|
payload_length, conn->conn_ops->MaxXmitDataSegmentLength);
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-11-14 06:33:24 +08:00
|
|
|
if (!(hdr->flags & ISCSI_FLAG_CMD_FINAL) ||
|
|
|
|
(hdr->flags & ISCSI_FLAG_TEXT_CONTINUE)) {
|
|
|
|
pr_err("Multi sequence text commands currently not supported\n");
|
|
|
|
return iscsit_reject_cmd(cmd, ISCSI_REASON_CMD_NOT_SUPPORTED,
|
|
|
|
(unsigned char *)hdr);
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_debug("Got Text Request: ITT: 0x%08x, CmdSN: 0x%08x,"
|
|
|
|
" ExpStatSN: 0x%08x, Length: %u\n", hdr->itt, hdr->cmdsn,
|
|
|
|
hdr->exp_statsn, payload_length);
|
|
|
|
|
2013-06-15 07:46:16 +08:00
|
|
|
cmd->iscsi_opcode = ISCSI_OP_TEXT;
|
|
|
|
cmd->i_state = ISTATE_SEND_TEXTRSP;
|
|
|
|
cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
|
|
|
|
conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
|
|
|
|
cmd->targ_xfer_tag = 0xFFFFFFFF;
|
|
|
|
cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
|
|
|
|
cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
|
|
|
|
cmd->data_direction = DMA_NONE;
|
2017-07-23 22:33:33 +08:00
|
|
|
kfree(cmd->text_in_ptr);
|
2015-02-10 00:07:25 +08:00
|
|
|
cmd->text_in_ptr = NULL;
|
2013-06-15 07:46:16 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_setup_text_cmd);
|
|
|
|
|
|
|
|
int
|
|
|
|
iscsit_process_text_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_text *hdr)
|
|
|
|
{
|
2013-06-20 13:43:11 +08:00
|
|
|
unsigned char *text_in = cmd->text_in_ptr, *text_ptr;
|
2013-06-15 07:46:16 +08:00
|
|
|
int cmdsn_ret;
|
|
|
|
|
2013-06-20 13:43:11 +08:00
|
|
|
if (!text_in) {
|
2015-02-10 00:07:25 +08:00
|
|
|
cmd->targ_xfer_tag = be32_to_cpu(hdr->ttt);
|
|
|
|
if (cmd->targ_xfer_tag == 0xFFFFFFFF) {
|
|
|
|
pr_err("Unable to locate text_in buffer for sendtargets"
|
|
|
|
" discovery\n");
|
|
|
|
goto reject;
|
|
|
|
}
|
|
|
|
goto empty_sendtargets;
|
2013-06-20 13:43:11 +08:00
|
|
|
}
|
2019-09-12 17:55:46 +08:00
|
|
|
if (strncmp("SendTargets=", text_in, 12) != 0) {
|
2013-06-20 13:43:11 +08:00
|
|
|
pr_err("Received Text Data that is not"
|
|
|
|
" SendTargets, cannot continue.\n");
|
|
|
|
goto reject;
|
|
|
|
}
|
2019-09-12 17:55:46 +08:00
|
|
|
/* '=' confirmed in strncmp */
|
2013-06-20 13:43:11 +08:00
|
|
|
text_ptr = strchr(text_in, '=');
|
2019-09-12 17:55:46 +08:00
|
|
|
BUG_ON(!text_ptr);
|
|
|
|
if (!strncmp("=All", text_ptr, 5)) {
|
2015-01-10 07:13:08 +08:00
|
|
|
cmd->cmd_flags |= ICF_SENDTARGETS_ALL;
|
2013-06-20 13:45:42 +08:00
|
|
|
} else if (!strncmp("=iqn.", text_ptr, 5) ||
|
|
|
|
!strncmp("=eui.", text_ptr, 5)) {
|
2015-01-10 07:13:08 +08:00
|
|
|
cmd->cmd_flags |= ICF_SENDTARGETS_SINGLE;
|
2013-06-20 13:43:11 +08:00
|
|
|
} else {
|
2019-09-12 17:55:46 +08:00
|
|
|
pr_err("Unable to locate valid SendTargets%s value\n",
|
|
|
|
text_ptr);
|
2013-06-20 13:43:11 +08:00
|
|
|
goto reject;
|
|
|
|
}
|
|
|
|
|
2013-06-15 07:46:16 +08:00
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
|
|
|
list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
|
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
|
2015-02-10 00:07:25 +08:00
|
|
|
empty_sendtargets:
|
2013-06-15 07:46:16 +08:00
|
|
|
iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
|
|
|
|
|
|
|
|
if (!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
|
2013-07-03 18:58:58 +08:00
|
|
|
cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
|
|
|
|
(unsigned char *)hdr, hdr->cmdsn);
|
2013-06-15 07:46:16 +08:00
|
|
|
if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
|
2013-07-03 18:48:24 +08:00
|
|
|
return -1;
|
|
|
|
|
2013-06-15 07:46:16 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return iscsit_execute_cmd(cmd, 0);
|
2013-06-20 13:43:11 +08:00
|
|
|
|
|
|
|
reject:
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
(unsigned char *)hdr);
|
2013-06-15 07:46:16 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_process_text_cmd);
|
|
|
|
|
|
|
|
static int
|
|
|
|
iscsit_handle_text_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
unsigned char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_text *hdr = (struct iscsi_text *)buf;
|
|
|
|
char *text_in = NULL;
|
|
|
|
u32 payload_length = ntoh24(hdr->dlength);
|
|
|
|
int rx_size, rc;
|
|
|
|
|
|
|
|
rc = iscsit_setup_text_cmd(conn, cmd, hdr);
|
|
|
|
if (rc < 0)
|
2013-07-03 18:58:58 +08:00
|
|
|
return 0;
|
2013-06-15 07:46:16 +08:00
|
|
|
|
|
|
|
rx_size = payload_length;
|
|
|
|
if (payload_length) {
|
|
|
|
u32 checksum = 0, data_crc = 0;
|
2019-01-26 02:34:58 +08:00
|
|
|
u32 padding = 0;
|
2013-06-15 07:46:16 +08:00
|
|
|
int niov = 0, rx_got;
|
2019-01-26 02:34:58 +08:00
|
|
|
struct kvec iov[2];
|
2013-06-15 07:46:16 +08:00
|
|
|
|
2019-01-26 02:34:58 +08:00
|
|
|
rx_size = ALIGN(payload_length, 4);
|
|
|
|
text_in = kzalloc(rx_size, GFP_KERNEL);
|
2017-04-09 21:34:50 +08:00
|
|
|
if (!text_in)
|
2013-06-15 07:46:16 +08:00
|
|
|
goto reject;
|
2017-04-09 21:34:50 +08:00
|
|
|
|
2013-06-20 13:43:11 +08:00
|
|
|
cmd->text_in_ptr = text_in;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2019-01-26 02:34:58 +08:00
|
|
|
memset(iov, 0, sizeof(iov));
|
2011-07-23 14:43:04 +08:00
|
|
|
iov[niov].iov_base = text_in;
|
2019-01-26 02:34:58 +08:00
|
|
|
iov[niov++].iov_len = rx_size;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2019-01-26 02:34:58 +08:00
|
|
|
padding = rx_size - payload_length;
|
|
|
|
if (padding)
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_debug("Receiving %u additional bytes"
|
|
|
|
" for padding.\n", padding);
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
|
|
|
iov[niov].iov_base = &checksum;
|
|
|
|
iov[niov++].iov_len = ISCSI_CRC_LEN;
|
|
|
|
rx_size += ISCSI_CRC_LEN;
|
|
|
|
}
|
|
|
|
|
2019-04-03 03:58:14 +08:00
|
|
|
WARN_ON_ONCE(niov > ARRAY_SIZE(iov));
|
2011-07-23 14:43:04 +08:00
|
|
|
rx_got = rx_data(conn, &iov[0], niov, rx_size);
|
2013-06-15 07:46:16 +08:00
|
|
|
if (rx_got != rx_size)
|
|
|
|
goto reject;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
2019-01-26 02:34:58 +08:00
|
|
|
iscsit_do_crypto_hash_buf(conn->conn_rx_hash,
|
|
|
|
text_in, rx_size, 0, NULL,
|
|
|
|
&data_crc);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (checksum != data_crc) {
|
|
|
|
pr_err("Text data CRC32C DataDigest"
|
|
|
|
" 0x%08x does not match computed"
|
|
|
|
" 0x%08x\n", checksum, data_crc);
|
|
|
|
if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
|
|
|
|
pr_err("Unable to recover from"
|
|
|
|
" Text Data digest failure while in"
|
|
|
|
" ERL=0.\n");
|
2013-06-15 07:46:16 +08:00
|
|
|
goto reject;
|
2011-07-23 14:43:04 +08:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Silently drop this PDU and let the
|
|
|
|
* initiator plug the CmdSN gap.
|
|
|
|
*/
|
|
|
|
pr_debug("Dropping Text"
|
|
|
|
" Command CmdSN: 0x%08x due to"
|
|
|
|
" DataCRC error.\n", hdr->cmdsn);
|
|
|
|
kfree(text_in);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
pr_debug("Got CRC32C DataDigest"
|
|
|
|
" 0x%08x for %u bytes of text data.\n",
|
2013-06-15 07:46:16 +08:00
|
|
|
checksum, payload_length);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
}
|
2013-06-15 07:46:16 +08:00
|
|
|
text_in[payload_length - 1] = '\0';
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_debug("Successfully read %d bytes of text"
|
2013-06-15 07:46:16 +08:00
|
|
|
" data.\n", payload_length);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-06-15 07:46:16 +08:00
|
|
|
return iscsit_process_text_cmd(conn, cmd, hdr);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-06-15 07:46:16 +08:00
|
|
|
reject:
|
2013-06-20 13:43:11 +08:00
|
|
|
kfree(cmd->text_in_ptr);
|
|
|
|
cmd->text_in_ptr = NULL;
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR, buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_logout_closesession(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_conn *conn_p;
|
|
|
|
struct iscsi_session *sess = conn->sess;
|
|
|
|
|
|
|
|
pr_debug("Received logout request CLOSESESSION on CID: %hu"
|
|
|
|
" for SID: %u.\n", conn->cid, conn->sess->sid);
|
|
|
|
|
|
|
|
atomic_set(&sess->session_logout, 1);
|
|
|
|
atomic_set(&conn->conn_logout_remove, 1);
|
|
|
|
conn->conn_logout_reason = ISCSI_LOGOUT_REASON_CLOSE_SESSION;
|
|
|
|
|
|
|
|
iscsit_inc_conn_usage_count(conn);
|
|
|
|
iscsit_inc_session_usage_count(sess);
|
|
|
|
|
|
|
|
spin_lock_bh(&sess->conn_lock);
|
|
|
|
list_for_each_entry(conn_p, &sess->sess_conn_list, conn_list) {
|
|
|
|
if (conn_p->conn_state != TARG_CONN_STATE_LOGGED_IN)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
|
|
|
|
conn_p->conn_state = TARG_CONN_STATE_IN_LOGOUT;
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_logout_closeconnection(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_conn *l_conn;
|
|
|
|
struct iscsi_session *sess = conn->sess;
|
|
|
|
|
|
|
|
pr_debug("Received logout request CLOSECONNECTION for CID:"
|
|
|
|
" %hu on CID: %hu.\n", cmd->logout_cid, conn->cid);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A Logout Request with a CLOSECONNECTION reason code for a CID
|
|
|
|
* can arrive on a connection with a differing CID.
|
|
|
|
*/
|
|
|
|
if (conn->cid == cmd->logout_cid) {
|
|
|
|
spin_lock_bh(&conn->state_lock);
|
|
|
|
pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
|
|
|
|
conn->conn_state = TARG_CONN_STATE_IN_LOGOUT;
|
|
|
|
|
|
|
|
atomic_set(&conn->conn_logout_remove, 1);
|
|
|
|
conn->conn_logout_reason = ISCSI_LOGOUT_REASON_CLOSE_CONNECTION;
|
|
|
|
iscsit_inc_conn_usage_count(conn);
|
|
|
|
|
|
|
|
spin_unlock_bh(&conn->state_lock);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Handle all different cid CLOSECONNECTION requests in
|
|
|
|
* iscsit_logout_post_handler_diffcid() as to give enough
|
|
|
|
* time for any non immediate command's CmdSN to be
|
|
|
|
* acknowledged on the connection in question.
|
|
|
|
*
|
|
|
|
* Here we simply make sure the CID is still around.
|
|
|
|
*/
|
|
|
|
l_conn = iscsit_get_conn_from_cid(sess,
|
|
|
|
cmd->logout_cid);
|
|
|
|
if (!l_conn) {
|
|
|
|
cmd->logout_response = ISCSI_LOGOUT_CID_NOT_FOUND;
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn,
|
|
|
|
cmd->i_state);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
iscsit_dec_conn_usage_count(l_conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_logout_removeconnforrecovery(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_session *sess = conn->sess;
|
|
|
|
|
|
|
|
pr_debug("Received explicit REMOVECONNFORRECOVERY logout for"
|
|
|
|
" CID: %hu on CID: %hu.\n", cmd->logout_cid, conn->cid);
|
|
|
|
|
|
|
|
if (sess->sess_ops->ErrorRecoveryLevel != 2) {
|
|
|
|
pr_err("Received Logout Request REMOVECONNFORRECOVERY"
|
|
|
|
" while ERL!=2.\n");
|
|
|
|
cmd->logout_response = ISCSI_LOGOUT_RECOVERY_UNSUPPORTED;
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->cid == cmd->logout_cid) {
|
|
|
|
pr_err("Received Logout Request REMOVECONNFORRECOVERY"
|
|
|
|
" with CID: %hu on CID: %hu, implementation error.\n",
|
|
|
|
cmd->logout_cid, conn->cid);
|
|
|
|
cmd->logout_response = ISCSI_LOGOUT_CLEANUP_FAILED;
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
int
|
|
|
|
iscsit_handle_logout_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
|
|
|
|
unsigned char *buf)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
int cmdsn_ret, logout_remove = 0;
|
|
|
|
u8 reason_code = 0;
|
|
|
|
struct iscsi_logout *hdr;
|
|
|
|
struct iscsi_tiqn *tiqn = iscsit_snmp_get_tiqn(conn);
|
|
|
|
|
|
|
|
hdr = (struct iscsi_logout *) buf;
|
|
|
|
reason_code = (hdr->flags & 0x7f);
|
|
|
|
|
|
|
|
if (tiqn) {
|
|
|
|
spin_lock(&tiqn->logout_stats.lock);
|
|
|
|
if (reason_code == ISCSI_LOGOUT_REASON_CLOSE_SESSION)
|
|
|
|
tiqn->logout_stats.normal_logouts++;
|
|
|
|
else
|
|
|
|
tiqn->logout_stats.abnormal_logouts++;
|
|
|
|
spin_unlock(&tiqn->logout_stats.lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_debug("Got Logout Request ITT: 0x%08x CmdSN: 0x%08x"
|
|
|
|
" ExpStatSN: 0x%08x Reason: 0x%02x CID: %hu on CID: %hu\n",
|
|
|
|
hdr->itt, hdr->cmdsn, hdr->exp_statsn, reason_code,
|
|
|
|
hdr->cid, conn->cid);
|
|
|
|
|
|
|
|
if (conn->conn_state != TARG_CONN_STATE_LOGGED_IN) {
|
|
|
|
pr_err("Received logout request on connection that"
|
|
|
|
" is not in logged in state, ignoring request.\n");
|
2013-05-31 15:49:41 +08:00
|
|
|
iscsit_free_cmd(cmd, false);
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->iscsi_opcode = ISCSI_OP_LOGOUT;
|
|
|
|
cmd->i_state = ISTATE_SEND_LOGOUTRSP;
|
|
|
|
cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
|
|
|
|
conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
|
|
|
|
cmd->targ_xfer_tag = 0xFFFFFFFF;
|
2012-09-26 20:00:40 +08:00
|
|
|
cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
|
|
|
|
cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
|
|
|
|
cmd->logout_cid = be16_to_cpu(hdr->cid);
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->logout_reason = reason_code;
|
|
|
|
cmd->data_direction = DMA_NONE;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We need to sleep in these cases (by returning 1) until the Logout
|
|
|
|
* Response gets sent in the tx thread.
|
|
|
|
*/
|
|
|
|
if ((reason_code == ISCSI_LOGOUT_REASON_CLOSE_SESSION) ||
|
|
|
|
((reason_code == ISCSI_LOGOUT_REASON_CLOSE_CONNECTION) &&
|
2012-09-26 20:00:40 +08:00
|
|
|
be16_to_cpu(hdr->cid) == conn->cid))
|
2011-07-23 14:43:04 +08:00
|
|
|
logout_remove = 1;
|
|
|
|
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2012-04-04 06:51:01 +08:00
|
|
|
list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
|
|
|
|
if (reason_code != ISCSI_LOGOUT_REASON_RECOVERY)
|
2012-09-26 20:00:40 +08:00
|
|
|
iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Immediate commands are executed, well, immediately.
|
|
|
|
* Non-Immediate Logout Commands are executed in CmdSN order.
|
|
|
|
*/
|
2012-04-04 06:51:02 +08:00
|
|
|
if (cmd->immediate_cmd) {
|
2011-07-23 14:43:04 +08:00
|
|
|
int ret = iscsit_execute_cmd(cmd, 0);
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
} else {
|
2013-07-03 18:58:58 +08:00
|
|
|
cmdsn_ret = iscsit_sequence_cmd(conn, cmd, buf, hdr->cmdsn);
|
2013-07-03 18:48:24 +08:00
|
|
|
if (cmdsn_ret == CMDSN_LOWER_THAN_EXP)
|
2011-07-23 14:43:04 +08:00
|
|
|
logout_remove = 0;
|
2013-07-03 18:48:24 +08:00
|
|
|
else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
|
|
|
|
return -1;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return logout_remove;
|
|
|
|
}
|
2013-03-07 14:18:24 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_handle_logout_cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-04-20 02:30:19 +08:00
|
|
|
int iscsit_handle_snack(
|
2011-07-23 14:43:04 +08:00
|
|
|
struct iscsi_conn *conn,
|
|
|
|
unsigned char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_snack *hdr;
|
|
|
|
|
|
|
|
hdr = (struct iscsi_snack *) buf;
|
|
|
|
hdr->flags &= ~ISCSI_FLAG_CMD_FINAL;
|
|
|
|
|
|
|
|
pr_debug("Got ISCSI_INIT_SNACK, ITT: 0x%08x, ExpStatSN:"
|
|
|
|
" 0x%08x, Type: 0x%02x, BegRun: 0x%08x, RunLength: 0x%08x,"
|
|
|
|
" CID: %hu\n", hdr->itt, hdr->exp_statsn, hdr->flags,
|
|
|
|
hdr->begrun, hdr->runlength, conn->cid);
|
|
|
|
|
|
|
|
if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
|
|
|
|
pr_err("Initiator sent SNACK request while in"
|
|
|
|
" ErrorRecoveryLevel=0.\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* SNACK_DATA and SNACK_R2T are both 0, so check which function to
|
|
|
|
* call from inside iscsi_send_recovery_datain_or_r2t().
|
|
|
|
*/
|
|
|
|
switch (hdr->flags & ISCSI_FLAG_SNACK_TYPE_MASK) {
|
|
|
|
case 0:
|
|
|
|
return iscsit_handle_recovery_datain_or_r2t(conn, buf,
|
2012-09-26 20:00:40 +08:00
|
|
|
hdr->itt,
|
|
|
|
be32_to_cpu(hdr->ttt),
|
|
|
|
be32_to_cpu(hdr->begrun),
|
|
|
|
be32_to_cpu(hdr->runlength));
|
2011-07-23 14:43:04 +08:00
|
|
|
case ISCSI_FLAG_SNACK_TYPE_STATUS:
|
2012-09-26 20:00:40 +08:00
|
|
|
return iscsit_handle_status_snack(conn, hdr->itt,
|
|
|
|
be32_to_cpu(hdr->ttt),
|
|
|
|
be32_to_cpu(hdr->begrun), be32_to_cpu(hdr->runlength));
|
2011-07-23 14:43:04 +08:00
|
|
|
case ISCSI_FLAG_SNACK_TYPE_DATA_ACK:
|
2012-09-26 20:00:40 +08:00
|
|
|
return iscsit_handle_data_ack(conn, be32_to_cpu(hdr->ttt),
|
|
|
|
be32_to_cpu(hdr->begrun),
|
|
|
|
be32_to_cpu(hdr->runlength));
|
2011-07-23 14:43:04 +08:00
|
|
|
case ISCSI_FLAG_SNACK_TYPE_RDATA:
|
|
|
|
/* FIXME: Support R-Data SNACK */
|
|
|
|
pr_err("R-Data SNACK Not Supported.\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
default:
|
|
|
|
pr_err("Unknown SNACK type 0x%02x, protocol"
|
|
|
|
" error.\n", hdr->flags & 0x0f);
|
2013-07-03 18:48:24 +08:00
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
buf);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_handle_snack);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
static void iscsit_rx_thread_wait_for_tcp(struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
if ((conn->sock->sk->sk_shutdown & SEND_SHUTDOWN) ||
|
|
|
|
(conn->sock->sk->sk_shutdown & RCV_SHUTDOWN)) {
|
|
|
|
wait_for_completion_interruptible_timeout(
|
|
|
|
&conn->rx_half_close_comp,
|
|
|
|
ISCSI_RX_THREAD_TCP_TIMEOUT * HZ);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsit_handle_immediate_data(
|
|
|
|
struct iscsi_cmd *cmd,
|
2013-03-07 14:18:24 +08:00
|
|
|
struct iscsi_scsi_req *hdr,
|
2011-07-23 14:43:04 +08:00
|
|
|
u32 length)
|
|
|
|
{
|
|
|
|
int iov_ret, rx_got = 0, rx_size = 0;
|
|
|
|
u32 checksum, iov_count = 0, padding = 0;
|
|
|
|
struct iscsi_conn *conn = cmd->conn;
|
|
|
|
struct kvec *iov;
|
2019-04-03 03:58:13 +08:00
|
|
|
void *overflow_buf = NULL;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2019-04-03 03:58:13 +08:00
|
|
|
BUG_ON(cmd->write_data_done > cmd->se_cmd.data_length);
|
|
|
|
rx_size = min(cmd->se_cmd.data_length - cmd->write_data_done, length);
|
2019-04-03 03:58:14 +08:00
|
|
|
iov_ret = iscsit_map_iovec(cmd, cmd->iov_data,
|
|
|
|
cmd->orig_iov_data_count - 2,
|
|
|
|
cmd->write_data_done, rx_size);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (iov_ret < 0)
|
|
|
|
return IMMEDIATE_DATA_CANNOT_RECOVER;
|
|
|
|
|
|
|
|
iov_count = iov_ret;
|
|
|
|
iov = &cmd->iov_data[0];
|
2019-04-03 03:58:13 +08:00
|
|
|
if (rx_size < length) {
|
|
|
|
/*
|
|
|
|
* Special case: length of immediate data exceeds the data
|
|
|
|
* buffer size derived from the CDB.
|
|
|
|
*/
|
|
|
|
overflow_buf = kmalloc(length - rx_size, GFP_KERNEL);
|
|
|
|
if (!overflow_buf) {
|
|
|
|
iscsit_unmap_iovec(cmd);
|
|
|
|
return IMMEDIATE_DATA_CANNOT_RECOVER;
|
|
|
|
}
|
|
|
|
cmd->overflow_buf = overflow_buf;
|
|
|
|
iov[iov_count].iov_base = overflow_buf;
|
|
|
|
iov[iov_count].iov_len = length - rx_size;
|
|
|
|
iov_count++;
|
|
|
|
rx_size = length;
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
padding = ((-length) & 3);
|
|
|
|
if (padding != 0) {
|
|
|
|
iov[iov_count].iov_base = cmd->pad_bytes;
|
|
|
|
iov[iov_count++].iov_len = padding;
|
|
|
|
rx_size += padding;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
|
|
|
iov[iov_count].iov_base = &checksum;
|
|
|
|
iov[iov_count++].iov_len = ISCSI_CRC_LEN;
|
|
|
|
rx_size += ISCSI_CRC_LEN;
|
|
|
|
}
|
|
|
|
|
2019-04-03 03:58:14 +08:00
|
|
|
WARN_ON_ONCE(iov_count > cmd->orig_iov_data_count);
|
2011-07-23 14:43:04 +08:00
|
|
|
rx_got = rx_data(conn, &cmd->iov_data[0], iov_count, rx_size);
|
|
|
|
|
|
|
|
iscsit_unmap_iovec(cmd);
|
|
|
|
|
|
|
|
if (rx_got != rx_size) {
|
|
|
|
iscsit_rx_thread_wait_for_tcp(conn);
|
|
|
|
return IMMEDIATE_DATA_CANNOT_RECOVER;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->conn_ops->DataDigest) {
|
|
|
|
u32 data_crc;
|
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
data_crc = iscsit_do_crypto_hash_sg(conn->conn_rx_hash, cmd,
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->write_data_done, length, padding,
|
|
|
|
cmd->pad_bytes);
|
|
|
|
|
|
|
|
if (checksum != data_crc) {
|
|
|
|
pr_err("ImmediateData CRC32C DataDigest 0x%08x"
|
|
|
|
" does not match computed 0x%08x\n", checksum,
|
|
|
|
data_crc);
|
|
|
|
|
|
|
|
if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
|
|
|
|
pr_err("Unable to recover from"
|
|
|
|
" Immediate Data digest failure while"
|
|
|
|
" in ERL=0.\n");
|
2013-07-03 18:48:24 +08:00
|
|
|
iscsit_reject_cmd(cmd,
|
2011-07-23 14:43:04 +08:00
|
|
|
ISCSI_REASON_DATA_DIGEST_ERROR,
|
2013-07-03 18:48:24 +08:00
|
|
|
(unsigned char *)hdr);
|
2011-07-23 14:43:04 +08:00
|
|
|
return IMMEDIATE_DATA_CANNOT_RECOVER;
|
|
|
|
} else {
|
2013-07-03 18:48:24 +08:00
|
|
|
iscsit_reject_cmd(cmd,
|
2011-07-23 14:43:04 +08:00
|
|
|
ISCSI_REASON_DATA_DIGEST_ERROR,
|
2013-07-03 18:48:24 +08:00
|
|
|
(unsigned char *)hdr);
|
2011-07-23 14:43:04 +08:00
|
|
|
return IMMEDIATE_DATA_ERL1_CRC_FAILURE;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
pr_debug("Got CRC32C DataDigest 0x%08x for"
|
|
|
|
" %u bytes of Immediate Data\n", checksum,
|
|
|
|
length);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->write_data_done += length;
|
|
|
|
|
2012-04-04 06:51:24 +08:00
|
|
|
if (cmd->write_data_done == cmd->se_cmd.data_length) {
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_lock_bh(&cmd->istate_lock);
|
|
|
|
cmd->cmd_flags |= ICF_GOT_LAST_DATAOUT;
|
|
|
|
cmd->i_state = ISTATE_RECEIVED_LAST_DATAOUT;
|
|
|
|
spin_unlock_bh(&cmd->istate_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
return IMMEDIATE_DATA_NORMAL_OPERATION;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* #warning iscsi_build_conn_drop_async_message() only sends out on connections
|
|
|
|
with active network interface */
|
|
|
|
static void iscsit_build_conn_drop_async_message(struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd;
|
|
|
|
struct iscsi_conn *conn_p;
|
2014-02-20 07:32:14 +08:00
|
|
|
bool found = false;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2019-01-26 02:34:53 +08:00
|
|
|
lockdep_assert_held(&conn->sess->conn_lock);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Only send a Asynchronous Message on connections whos network
|
|
|
|
* interface is still functional.
|
|
|
|
*/
|
|
|
|
list_for_each_entry(conn_p, &conn->sess->sess_conn_list, conn_list) {
|
|
|
|
if (conn_p->conn_state == TARG_CONN_STATE_LOGGED_IN) {
|
|
|
|
iscsit_inc_conn_usage_count(conn_p);
|
2014-02-20 07:32:14 +08:00
|
|
|
found = true;
|
2011-07-23 14:43:04 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-20 07:32:14 +08:00
|
|
|
if (!found)
|
2011-07-23 14:43:04 +08:00
|
|
|
return;
|
|
|
|
|
2014-01-20 11:36:44 +08:00
|
|
|
cmd = iscsit_allocate_cmd(conn_p, TASK_RUNNING);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (!cmd) {
|
|
|
|
iscsit_dec_conn_usage_count(conn_p);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->logout_cid = conn->cid;
|
|
|
|
cmd->iscsi_opcode = ISCSI_OP_ASYNC_EVENT;
|
|
|
|
cmd->i_state = ISTATE_SEND_ASYNCMSG;
|
|
|
|
|
|
|
|
spin_lock_bh(&conn_p->cmd_lock);
|
2012-04-04 06:51:01 +08:00
|
|
|
list_add_tail(&cmd->i_conn_node, &conn_p->conn_cmd_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock_bh(&conn_p->cmd_lock);
|
|
|
|
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, conn_p, cmd->i_state);
|
|
|
|
iscsit_dec_conn_usage_count(conn_p);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsit_send_conn_drop_async_message(
|
|
|
|
struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_async *hdr;
|
|
|
|
|
|
|
|
cmd->iscsi_opcode = ISCSI_OP_ASYNC_EVENT;
|
|
|
|
|
|
|
|
hdr = (struct iscsi_async *) cmd->pdu;
|
|
|
|
hdr->opcode = ISCSI_OP_ASYNC_EVENT;
|
|
|
|
hdr->flags = ISCSI_FLAG_CMD_FINAL;
|
2012-09-26 20:00:39 +08:00
|
|
|
cmd->init_task_tag = RESERVED_ITT;
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->targ_xfer_tag = 0xFFFFFFFF;
|
|
|
|
put_unaligned_be64(0xFFFFFFFFFFFFFFFFULL, &hdr->rsvd4[0]);
|
|
|
|
cmd->stat_sn = conn->stat_sn++;
|
|
|
|
hdr->statsn = cpu_to_be32(cmd->stat_sn);
|
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2011-07-23 14:43:04 +08:00
|
|
|
hdr->async_event = ISCSI_ASYNC_MSG_DROPPING_CONNECTION;
|
|
|
|
hdr->param1 = cpu_to_be16(cmd->logout_cid);
|
|
|
|
hdr->param2 = cpu_to_be16(conn->sess->sess_ops->DefaultTime2Wait);
|
|
|
|
hdr->param3 = cpu_to_be16(conn->sess->sess_ops->DefaultTime2Retain);
|
|
|
|
|
|
|
|
pr_debug("Sending Connection Dropped Async Message StatSN:"
|
|
|
|
" 0x%08x, for CID: %hu on CID: %hu\n", cmd->stat_sn,
|
|
|
|
cmd->logout_cid, conn->cid);
|
2016-04-20 02:30:08 +08:00
|
|
|
|
|
|
|
return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2012-04-04 06:51:09 +08:00
|
|
|
static void iscsit_tx_thread_wait_for_tcp(struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
if ((conn->sock->sk->sk_shutdown & SEND_SHUTDOWN) ||
|
|
|
|
(conn->sock->sk->sk_shutdown & RCV_SHUTDOWN)) {
|
|
|
|
wait_for_completion_interruptible_timeout(
|
|
|
|
&conn->tx_half_close_comp,
|
|
|
|
ISCSI_TX_THREAD_TCP_TIMEOUT * HZ);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-20 02:30:19 +08:00
|
|
|
void
|
2013-03-21 06:29:15 +08:00
|
|
|
iscsit_build_datain_pdu(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
|
|
|
|
struct iscsi_datain *datain, struct iscsi_data_rsp *hdr,
|
|
|
|
bool set_statsn)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2013-03-21 06:29:15 +08:00
|
|
|
hdr->opcode = ISCSI_OP_SCSI_DATA_IN;
|
|
|
|
hdr->flags = datain->flags;
|
|
|
|
if (hdr->flags & ISCSI_FLAG_DATA_STATUS) {
|
|
|
|
if (cmd->se_cmd.se_cmd_flags & SCF_OVERFLOW_BIT) {
|
|
|
|
hdr->flags |= ISCSI_FLAG_DATA_OVERFLOW;
|
|
|
|
hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
|
|
|
|
} else if (cmd->se_cmd.se_cmd_flags & SCF_UNDERFLOW_BIT) {
|
|
|
|
hdr->flags |= ISCSI_FLAG_DATA_UNDERFLOW;
|
|
|
|
hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
hton24(hdr->dlength, datain->length);
|
|
|
|
if (hdr->flags & ISCSI_FLAG_DATA_ACK)
|
|
|
|
int_to_scsilun(cmd->se_cmd.orig_fe_lun,
|
|
|
|
(struct scsi_lun *)&hdr->lun);
|
|
|
|
else
|
|
|
|
put_unaligned_le64(0xFFFFFFFFFFFFFFFFULL, &hdr->lun);
|
|
|
|
|
|
|
|
hdr->itt = cmd->init_task_tag;
|
|
|
|
|
|
|
|
if (hdr->flags & ISCSI_FLAG_DATA_ACK)
|
|
|
|
hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
|
|
|
|
else
|
|
|
|
hdr->ttt = cpu_to_be32(0xFFFFFFFF);
|
|
|
|
if (set_statsn)
|
|
|
|
hdr->statsn = cpu_to_be32(cmd->stat_sn);
|
|
|
|
else
|
|
|
|
hdr->statsn = cpu_to_be32(0xFFFFFFFF);
|
|
|
|
|
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2013-03-21 06:29:15 +08:00
|
|
|
hdr->datasn = cpu_to_be32(datain->data_sn);
|
|
|
|
hdr->offset = cpu_to_be32(datain->offset);
|
|
|
|
|
|
|
|
pr_debug("Built DataIN ITT: 0x%08x, StatSN: 0x%08x,"
|
|
|
|
" DataSN: 0x%08x, Offset: %u, Length: %u, CID: %hu\n",
|
|
|
|
cmd->init_task_tag, ntohl(hdr->statsn), ntohl(hdr->datasn),
|
|
|
|
ntohl(hdr->offset), datain->length, conn->cid);
|
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_build_datain_pdu);
|
2013-03-21 06:29:15 +08:00
|
|
|
|
|
|
|
static int iscsit_send_datain(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_data_rsp *hdr = (struct iscsi_data_rsp *)&cmd->pdu[0];
|
2011-07-23 14:43:04 +08:00
|
|
|
struct iscsi_datain datain;
|
|
|
|
struct iscsi_datain_req *dr;
|
2016-04-20 02:30:08 +08:00
|
|
|
int eodr = 0, ret;
|
2013-03-21 06:29:15 +08:00
|
|
|
bool set_statsn = false;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
memset(&datain, 0, sizeof(struct iscsi_datain));
|
|
|
|
dr = iscsit_get_datain_values(cmd, &datain);
|
|
|
|
if (!dr) {
|
|
|
|
pr_err("iscsit_get_datain_values failed for ITT: 0x%08x\n",
|
|
|
|
cmd->init_task_tag);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Be paranoid and double check the logic for now.
|
|
|
|
*/
|
2012-04-04 06:51:24 +08:00
|
|
|
if ((datain.offset + datain.length) > cmd->se_cmd.data_length) {
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_err("Command ITT: 0x%08x, datain.offset: %u and"
|
|
|
|
" datain.length: %u exceeds cmd->data_length: %u\n",
|
|
|
|
cmd->init_task_tag, datain.offset, datain.length,
|
2013-03-21 06:29:15 +08:00
|
|
|
cmd->se_cmd.data_length);
|
2011-07-23 14:43:04 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-11-14 10:54:45 +08:00
|
|
|
atomic_long_add(datain.length, &conn->sess->tx_data_octets);
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Special case for successfully execution w/ both DATAIN
|
|
|
|
* and Sense Data.
|
|
|
|
*/
|
|
|
|
if ((datain.flags & ISCSI_FLAG_DATA_STATUS) &&
|
|
|
|
(cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE))
|
|
|
|
datain.flags &= ~ISCSI_FLAG_DATA_STATUS;
|
|
|
|
else {
|
|
|
|
if ((dr->dr_complete == DATAIN_COMPLETE_NORMAL) ||
|
|
|
|
(dr->dr_complete == DATAIN_COMPLETE_CONNECTION_RECOVERY)) {
|
|
|
|
iscsit_increment_maxcmdsn(cmd, conn->sess);
|
|
|
|
cmd->stat_sn = conn->stat_sn++;
|
2013-03-21 06:29:15 +08:00
|
|
|
set_statsn = true;
|
2011-07-23 14:43:04 +08:00
|
|
|
} else if (dr->dr_complete ==
|
2013-03-21 06:29:15 +08:00
|
|
|
DATAIN_COMPLETE_WITHIN_COMMAND_RECOVERY)
|
|
|
|
set_statsn = true;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
iscsit_build_datain_pdu(cmd, conn, &datain, hdr, set_statsn);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
ret = conn->conn_transport->iscsit_xmit_pdu(conn, cmd, dr, &datain, 0);
|
|
|
|
if (ret < 0)
|
2012-04-04 06:51:09 +08:00
|
|
|
return ret;
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
if (dr->dr_complete) {
|
2012-04-04 06:51:09 +08:00
|
|
|
eodr = (cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) ?
|
2011-07-23 14:43:04 +08:00
|
|
|
2 : 1;
|
|
|
|
iscsit_free_datain_req(cmd, dr);
|
|
|
|
}
|
|
|
|
|
2012-04-04 06:51:09 +08:00
|
|
|
return eodr;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
int
|
|
|
|
iscsit_build_logout_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
|
|
|
|
struct iscsi_logout_rsp *hdr)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
struct iscsi_conn *logout_conn = NULL;
|
|
|
|
struct iscsi_conn_recovery *cr = NULL;
|
|
|
|
struct iscsi_session *sess = conn->sess;
|
|
|
|
/*
|
|
|
|
* The actual shutting down of Sessions and/or Connections
|
|
|
|
* for CLOSESESSION and CLOSECONNECTION Logout Requests
|
|
|
|
* is done in scsi_logout_post_handler().
|
|
|
|
*/
|
|
|
|
switch (cmd->logout_reason) {
|
|
|
|
case ISCSI_LOGOUT_REASON_CLOSE_SESSION:
|
|
|
|
pr_debug("iSCSI session logout successful, setting"
|
|
|
|
" logout response to ISCSI_LOGOUT_SUCCESS.\n");
|
|
|
|
cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
|
|
|
|
break;
|
|
|
|
case ISCSI_LOGOUT_REASON_CLOSE_CONNECTION:
|
|
|
|
if (cmd->logout_response == ISCSI_LOGOUT_CID_NOT_FOUND)
|
|
|
|
break;
|
|
|
|
/*
|
|
|
|
* For CLOSECONNECTION logout requests carrying
|
|
|
|
* a matching logout CID -> local CID, the reference
|
|
|
|
* for the local CID will have been incremented in
|
|
|
|
* iscsi_logout_closeconnection().
|
|
|
|
*
|
|
|
|
* For CLOSECONNECTION logout requests carrying
|
|
|
|
* a different CID than the connection it arrived
|
|
|
|
* on, the connection responding to cmd->logout_cid
|
|
|
|
* is stopped in iscsit_logout_post_handler_diffcid().
|
|
|
|
*/
|
|
|
|
|
|
|
|
pr_debug("iSCSI CID: %hu logout on CID: %hu"
|
|
|
|
" successful.\n", cmd->logout_cid, conn->cid);
|
|
|
|
cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
|
|
|
|
break;
|
|
|
|
case ISCSI_LOGOUT_REASON_RECOVERY:
|
|
|
|
if ((cmd->logout_response == ISCSI_LOGOUT_RECOVERY_UNSUPPORTED) ||
|
|
|
|
(cmd->logout_response == ISCSI_LOGOUT_CLEANUP_FAILED))
|
|
|
|
break;
|
|
|
|
/*
|
|
|
|
* If the connection is still active from our point of view
|
|
|
|
* force connection recovery to occur.
|
|
|
|
*/
|
|
|
|
logout_conn = iscsit_get_conn_from_cid_rcfr(sess,
|
|
|
|
cmd->logout_cid);
|
2012-07-13 08:34:54 +08:00
|
|
|
if (logout_conn) {
|
2011-07-23 14:43:04 +08:00
|
|
|
iscsit_connection_reinstatement_rcfr(logout_conn);
|
|
|
|
iscsit_dec_conn_usage_count(logout_conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
cr = iscsit_get_inactive_connection_recovery_entry(
|
|
|
|
conn->sess, cmd->logout_cid);
|
|
|
|
if (!cr) {
|
|
|
|
pr_err("Unable to locate CID: %hu for"
|
|
|
|
" REMOVECONNFORRECOVERY Logout Request.\n",
|
|
|
|
cmd->logout_cid);
|
|
|
|
cmd->logout_response = ISCSI_LOGOUT_CID_NOT_FOUND;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
iscsit_discard_cr_cmds_by_expstatsn(cr, cmd->exp_stat_sn);
|
|
|
|
|
|
|
|
pr_debug("iSCSI REMOVECONNFORRECOVERY logout"
|
|
|
|
" for recovery for CID: %hu on CID: %hu successful.\n",
|
|
|
|
cmd->logout_cid, conn->cid);
|
|
|
|
cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pr_err("Unknown cmd->logout_reason: 0x%02x\n",
|
|
|
|
cmd->logout_reason);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
hdr->opcode = ISCSI_OP_LOGOUT_RSP;
|
|
|
|
hdr->flags |= ISCSI_FLAG_CMD_FINAL;
|
|
|
|
hdr->response = cmd->logout_response;
|
2012-09-26 20:00:39 +08:00
|
|
|
hdr->itt = cmd->init_task_tag;
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->stat_sn = conn->stat_sn++;
|
|
|
|
hdr->statsn = cpu_to_be32(cmd->stat_sn);
|
|
|
|
|
|
|
|
iscsit_increment_maxcmdsn(cmd, conn->sess);
|
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
pr_debug("Built Logout Response ITT: 0x%08x StatSN:"
|
|
|
|
" 0x%08x Response: 0x%02x CID: %hu on CID: %hu\n",
|
|
|
|
cmd->init_task_tag, cmd->stat_sn, hdr->response,
|
|
|
|
cmd->logout_cid, conn->cid);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_build_logout_rsp);
|
|
|
|
|
|
|
|
static int
|
|
|
|
iscsit_send_logout(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
|
|
|
|
{
|
2016-04-20 02:30:08 +08:00
|
|
|
int rc;
|
2013-03-21 06:29:15 +08:00
|
|
|
|
|
|
|
rc = iscsit_build_logout_rsp(cmd, conn,
|
|
|
|
(struct iscsi_logout_rsp *)&cmd->pdu[0]);
|
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
void
|
|
|
|
iscsit_build_nopin_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
|
|
|
|
struct iscsi_nopin *hdr, bool nopout_response)
|
|
|
|
{
|
|
|
|
hdr->opcode = ISCSI_OP_NOOP_IN;
|
|
|
|
hdr->flags |= ISCSI_FLAG_CMD_FINAL;
|
|
|
|
hton24(hdr->dlength, cmd->buf_ptr_size);
|
|
|
|
if (nopout_response)
|
|
|
|
put_unaligned_le64(0xFFFFFFFFFFFFFFFFULL, &hdr->lun);
|
|
|
|
hdr->itt = cmd->init_task_tag;
|
|
|
|
hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
|
|
|
|
cmd->stat_sn = (nopout_response) ? conn->stat_sn++ :
|
|
|
|
conn->stat_sn;
|
|
|
|
hdr->statsn = cpu_to_be32(cmd->stat_sn);
|
|
|
|
|
|
|
|
if (nopout_response)
|
|
|
|
iscsit_increment_maxcmdsn(cmd, conn->sess);
|
|
|
|
|
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2013-03-21 06:29:15 +08:00
|
|
|
|
|
|
|
pr_debug("Built NOPIN %s Response ITT: 0x%08x, TTT: 0x%08x,"
|
|
|
|
" StatSN: 0x%08x, Length %u\n", (nopout_response) ?
|
2016-09-02 22:30:34 +08:00
|
|
|
"Solicited" : "Unsolicited", cmd->init_task_tag,
|
2013-03-21 06:29:15 +08:00
|
|
|
cmd->targ_xfer_tag, cmd->stat_sn, cmd->buf_ptr_size);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_build_nopin_rsp);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Unsolicited NOPIN, either requesting a response or not.
|
|
|
|
*/
|
|
|
|
static int iscsit_send_unsolicited_nopin(
|
|
|
|
struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_conn *conn,
|
|
|
|
int want_response)
|
|
|
|
{
|
2013-03-21 06:29:15 +08:00
|
|
|
struct iscsi_nopin *hdr = (struct iscsi_nopin *)&cmd->pdu[0];
|
2016-04-20 02:30:08 +08:00
|
|
|
int ret;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
iscsit_build_nopin_rsp(cmd, conn, hdr, false);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
pr_debug("Sending Unsolicited NOPIN TTT: 0x%08x StatSN:"
|
|
|
|
" 0x%08x CID: %hu\n", hdr->ttt, cmd->stat_sn, conn->cid);
|
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
ret = conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
|
|
|
|
if (ret < 0)
|
2012-04-04 06:51:09 +08:00
|
|
|
return ret;
|
|
|
|
|
|
|
|
spin_lock_bh(&cmd->istate_lock);
|
|
|
|
cmd->i_state = want_response ?
|
|
|
|
ISTATE_SENT_NOPIN_WANT_RESPONSE : ISTATE_SENT_STATUS;
|
|
|
|
spin_unlock_bh(&cmd->istate_lock);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
static int
|
|
|
|
iscsit_send_nopin(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2013-03-21 06:29:15 +08:00
|
|
|
struct iscsi_nopin *hdr = (struct iscsi_nopin *)&cmd->pdu[0];
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
iscsit_build_nopin_rsp(cmd, conn, hdr, true);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* NOPOUT Ping Data is attached to struct iscsi_cmd->buf_ptr.
|
|
|
|
* NOPOUT DataSegmentLength is at struct iscsi_cmd->buf_ptr_size.
|
|
|
|
*/
|
2016-04-20 02:30:08 +08:00
|
|
|
pr_debug("Echoing back %u bytes of ping data.\n", cmd->buf_ptr_size);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL,
|
|
|
|
cmd->buf_ptr,
|
|
|
|
cmd->buf_ptr_size);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2012-04-04 06:51:09 +08:00
|
|
|
static int iscsit_send_r2t(
|
2011-07-23 14:43:04 +08:00
|
|
|
struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_r2t *r2t;
|
|
|
|
struct iscsi_r2t_rsp *hdr;
|
2012-04-04 06:51:09 +08:00
|
|
|
int ret;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
r2t = iscsit_get_r2t_from_list(cmd);
|
|
|
|
if (!r2t)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
hdr = (struct iscsi_r2t_rsp *) cmd->pdu;
|
|
|
|
memset(hdr, 0, ISCSI_HDR_LEN);
|
|
|
|
hdr->opcode = ISCSI_OP_R2T;
|
|
|
|
hdr->flags |= ISCSI_FLAG_CMD_FINAL;
|
|
|
|
int_to_scsilun(cmd->se_cmd.orig_fe_lun,
|
|
|
|
(struct scsi_lun *)&hdr->lun);
|
2012-09-26 20:00:39 +08:00
|
|
|
hdr->itt = cmd->init_task_tag;
|
2016-04-20 02:30:13 +08:00
|
|
|
if (conn->conn_transport->iscsit_get_r2t_ttt)
|
|
|
|
conn->conn_transport->iscsit_get_r2t_ttt(conn, cmd, r2t);
|
|
|
|
else
|
|
|
|
r2t->targ_xfer_tag = session_get_next_ttt(conn->sess);
|
2011-07-23 14:43:04 +08:00
|
|
|
hdr->ttt = cpu_to_be32(r2t->targ_xfer_tag);
|
|
|
|
hdr->statsn = cpu_to_be32(conn->stat_sn);
|
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2011-07-23 14:43:04 +08:00
|
|
|
hdr->r2tsn = cpu_to_be32(r2t->r2t_sn);
|
|
|
|
hdr->data_offset = cpu_to_be32(r2t->offset);
|
|
|
|
hdr->data_length = cpu_to_be32(r2t->xfer_len);
|
|
|
|
|
|
|
|
pr_debug("Built %sR2T, ITT: 0x%08x, TTT: 0x%08x, StatSN:"
|
|
|
|
" 0x%08x, R2TSN: 0x%08x, Offset: %u, DDTL: %u, CID: %hu\n",
|
|
|
|
(!r2t->recovery_r2t) ? "" : "Recovery ", cmd->init_task_tag,
|
|
|
|
r2t->targ_xfer_tag, ntohl(hdr->statsn), r2t->r2t_sn,
|
|
|
|
r2t->offset, r2t->xfer_len, conn->cid);
|
|
|
|
|
|
|
|
spin_lock_bh(&cmd->r2t_lock);
|
|
|
|
r2t->sent_r2t = 1;
|
|
|
|
spin_unlock_bh(&cmd->r2t_lock);
|
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
ret = conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
|
2012-04-04 06:51:09 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock_bh(&cmd->dataout_timeout_lock);
|
|
|
|
iscsit_start_dataout_timer(cmd, conn);
|
|
|
|
spin_unlock_bh(&cmd->dataout_timeout_lock);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2012-04-04 06:51:12 +08:00
|
|
|
* @recovery: If called from iscsi_task_reassign_complete_write() for
|
|
|
|
* connection recovery.
|
2011-07-23 14:43:04 +08:00
|
|
|
*/
|
|
|
|
int iscsit_build_r2ts_for_cmd(
|
|
|
|
struct iscsi_conn *conn,
|
2013-03-07 14:18:24 +08:00
|
|
|
struct iscsi_cmd *cmd,
|
2012-04-04 06:51:12 +08:00
|
|
|
bool recovery)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
int first_r2t = 1;
|
|
|
|
u32 offset = 0, xfer_len = 0;
|
|
|
|
|
|
|
|
spin_lock_bh(&cmd->r2t_lock);
|
|
|
|
if (cmd->cmd_flags & ICF_SENT_LAST_R2T) {
|
|
|
|
spin_unlock_bh(&cmd->r2t_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-04-04 06:51:12 +08:00
|
|
|
if (conn->sess->sess_ops->DataSequenceInOrder &&
|
|
|
|
!recovery)
|
2012-04-04 06:51:02 +08:00
|
|
|
cmd->r2t_offset = max(cmd->r2t_offset, cmd->write_data_done);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
while (cmd->outstanding_r2ts < conn->sess->sess_ops->MaxOutstandingR2T) {
|
|
|
|
if (conn->sess->sess_ops->DataSequenceInOrder) {
|
|
|
|
offset = cmd->r2t_offset;
|
|
|
|
|
2012-04-04 06:51:12 +08:00
|
|
|
if (first_r2t && recovery) {
|
|
|
|
int new_data_end = offset +
|
|
|
|
conn->sess->sess_ops->MaxBurstLength -
|
|
|
|
cmd->next_burst_len;
|
|
|
|
|
2012-04-04 06:51:24 +08:00
|
|
|
if (new_data_end > cmd->se_cmd.data_length)
|
|
|
|
xfer_len = cmd->se_cmd.data_length - offset;
|
2012-04-04 06:51:12 +08:00
|
|
|
else
|
|
|
|
xfer_len =
|
|
|
|
conn->sess->sess_ops->MaxBurstLength -
|
|
|
|
cmd->next_burst_len;
|
2011-07-23 14:43:04 +08:00
|
|
|
} else {
|
2012-04-04 06:51:12 +08:00
|
|
|
int new_data_end = offset +
|
|
|
|
conn->sess->sess_ops->MaxBurstLength;
|
|
|
|
|
2012-04-04 06:51:24 +08:00
|
|
|
if (new_data_end > cmd->se_cmd.data_length)
|
|
|
|
xfer_len = cmd->se_cmd.data_length - offset;
|
2012-04-04 06:51:12 +08:00
|
|
|
else
|
|
|
|
xfer_len = conn->sess->sess_ops->MaxBurstLength;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
2019-04-03 03:58:12 +08:00
|
|
|
|
|
|
|
if ((s32)xfer_len < 0) {
|
|
|
|
cmd->cmd_flags |= ICF_SENT_LAST_R2T;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->r2t_offset += xfer_len;
|
|
|
|
|
2012-04-04 06:51:24 +08:00
|
|
|
if (cmd->r2t_offset == cmd->se_cmd.data_length)
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->cmd_flags |= ICF_SENT_LAST_R2T;
|
|
|
|
} else {
|
|
|
|
struct iscsi_seq *seq;
|
|
|
|
|
|
|
|
seq = iscsit_get_seq_holder_for_r2t(cmd);
|
|
|
|
if (!seq) {
|
|
|
|
spin_unlock_bh(&cmd->r2t_lock);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
offset = seq->offset;
|
|
|
|
xfer_len = seq->xfer_len;
|
|
|
|
|
|
|
|
if (cmd->seq_send_order == cmd->seq_count)
|
|
|
|
cmd->cmd_flags |= ICF_SENT_LAST_R2T;
|
|
|
|
}
|
|
|
|
cmd->outstanding_r2ts++;
|
|
|
|
first_r2t = 0;
|
|
|
|
|
|
|
|
if (iscsit_add_r2t_to_list(cmd, offset, xfer_len, 0, 0) < 0) {
|
|
|
|
spin_unlock_bh(&cmd->r2t_lock);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cmd->cmd_flags & ICF_SENT_LAST_R2T)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&cmd->r2t_lock);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_build_r2ts_for_cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
void iscsit_build_rsp_pdu(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
|
|
|
|
bool inc_stat_sn, struct iscsi_scsi_rsp *hdr)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2013-03-21 06:29:15 +08:00
|
|
|
if (inc_stat_sn)
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->stat_sn = conn->stat_sn++;
|
|
|
|
|
2013-11-14 10:54:45 +08:00
|
|
|
atomic_long_inc(&conn->sess->rsp_pdus);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
memset(hdr, 0, ISCSI_HDR_LEN);
|
|
|
|
hdr->opcode = ISCSI_OP_SCSI_CMD_RSP;
|
|
|
|
hdr->flags |= ISCSI_FLAG_CMD_FINAL;
|
|
|
|
if (cmd->se_cmd.se_cmd_flags & SCF_OVERFLOW_BIT) {
|
|
|
|
hdr->flags |= ISCSI_FLAG_CMD_OVERFLOW;
|
2011-11-16 15:59:00 +08:00
|
|
|
hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
|
2011-07-23 14:43:04 +08:00
|
|
|
} else if (cmd->se_cmd.se_cmd_flags & SCF_UNDERFLOW_BIT) {
|
|
|
|
hdr->flags |= ISCSI_FLAG_CMD_UNDERFLOW;
|
2011-11-16 15:59:00 +08:00
|
|
|
hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
hdr->response = cmd->iscsi_response;
|
|
|
|
hdr->cmd_status = cmd->se_cmd.scsi_status;
|
2012-09-26 20:00:39 +08:00
|
|
|
hdr->itt = cmd->init_task_tag;
|
2011-07-23 14:43:04 +08:00
|
|
|
hdr->statsn = cpu_to_be32(cmd->stat_sn);
|
|
|
|
|
|
|
|
iscsit_increment_maxcmdsn(cmd, conn->sess);
|
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
pr_debug("Built SCSI Response, ITT: 0x%08x, StatSN: 0x%08x,"
|
|
|
|
" Response: 0x%02x, SAM Status: 0x%02x, CID: %hu\n",
|
|
|
|
cmd->init_task_tag, cmd->stat_sn, cmd->se_cmd.scsi_status,
|
|
|
|
cmd->se_cmd.scsi_status, conn->cid);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_build_rsp_pdu);
|
|
|
|
|
|
|
|
static int iscsit_send_response(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_scsi_rsp *hdr = (struct iscsi_scsi_rsp *)&cmd->pdu[0];
|
|
|
|
bool inc_stat_sn = (cmd->i_state == ISTATE_SEND_STATUS);
|
2016-04-20 02:30:08 +08:00
|
|
|
void *data_buf = NULL;
|
|
|
|
u32 padding = 0, data_buf_len = 0;
|
2013-03-21 06:29:15 +08:00
|
|
|
|
|
|
|
iscsit_build_rsp_pdu(cmd, conn, inc_stat_sn, hdr);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Attach SENSE DATA payload to iSCSI Response PDU
|
|
|
|
*/
|
|
|
|
if (cmd->se_cmd.sense_buffer &&
|
|
|
|
((cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) ||
|
|
|
|
(cmd->se_cmd.se_cmd_flags & SCF_EMULATED_TASK_SENSE))) {
|
2012-08-16 05:35:25 +08:00
|
|
|
put_unaligned_be16(cmd->se_cmd.scsi_sense_length, cmd->sense_buffer);
|
|
|
|
cmd->se_cmd.scsi_sense_length += sizeof (__be16);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
padding = -(cmd->se_cmd.scsi_sense_length) & 3;
|
2012-09-26 20:00:40 +08:00
|
|
|
hton24(hdr->dlength, (u32)cmd->se_cmd.scsi_sense_length);
|
2016-04-20 02:30:08 +08:00
|
|
|
data_buf = cmd->sense_buffer;
|
|
|
|
data_buf_len = cmd->se_cmd.scsi_sense_length + padding;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (padding) {
|
2012-08-16 05:35:25 +08:00
|
|
|
memset(cmd->sense_buffer +
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->se_cmd.scsi_sense_length, 0, padding);
|
|
|
|
pr_debug("Adding %u bytes of padding to"
|
|
|
|
" SENSE.\n", padding);
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_debug("Attaching SENSE DATA: %u bytes to iSCSI"
|
|
|
|
" Response PDU\n",
|
|
|
|
cmd->se_cmd.scsi_sense_length);
|
|
|
|
}
|
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, data_buf,
|
|
|
|
data_buf_len);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static u8 iscsit_convert_tcm_tmr_rsp(struct se_tmr_req *se_tmr)
|
|
|
|
{
|
|
|
|
switch (se_tmr->response) {
|
|
|
|
case TMR_FUNCTION_COMPLETE:
|
|
|
|
return ISCSI_TMF_RSP_COMPLETE;
|
|
|
|
case TMR_TASK_DOES_NOT_EXIST:
|
|
|
|
return ISCSI_TMF_RSP_NO_TASK;
|
|
|
|
case TMR_LUN_DOES_NOT_EXIST:
|
|
|
|
return ISCSI_TMF_RSP_NO_LUN;
|
|
|
|
case TMR_TASK_MGMT_FUNCTION_NOT_SUPPORTED:
|
|
|
|
return ISCSI_TMF_RSP_NOT_SUPPORTED;
|
|
|
|
case TMR_FUNCTION_REJECTED:
|
|
|
|
default:
|
|
|
|
return ISCSI_TMF_RSP_REJECTED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
void
|
|
|
|
iscsit_build_task_mgt_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
|
|
|
|
struct iscsi_tm_rsp *hdr)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
struct se_tmr_req *se_tmr = cmd->se_cmd.se_tmr_req;
|
|
|
|
|
|
|
|
hdr->opcode = ISCSI_OP_SCSI_TMFUNC_RSP;
|
2011-11-28 14:25:14 +08:00
|
|
|
hdr->flags = ISCSI_FLAG_CMD_FINAL;
|
2011-07-23 14:43:04 +08:00
|
|
|
hdr->response = iscsit_convert_tcm_tmr_rsp(se_tmr);
|
2012-09-26 20:00:39 +08:00
|
|
|
hdr->itt = cmd->init_task_tag;
|
2011-07-23 14:43:04 +08:00
|
|
|
cmd->stat_sn = conn->stat_sn++;
|
|
|
|
hdr->statsn = cpu_to_be32(cmd->stat_sn);
|
|
|
|
|
|
|
|
iscsit_increment_maxcmdsn(cmd, conn->sess);
|
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
pr_debug("Built Task Management Response ITT: 0x%08x,"
|
|
|
|
" StatSN: 0x%08x, Response: 0x%02x, CID: %hu\n",
|
|
|
|
cmd->init_task_tag, cmd->stat_sn, hdr->response, conn->cid);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_build_task_mgt_rsp);
|
|
|
|
|
|
|
|
static int
|
|
|
|
iscsit_send_task_mgt_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_tm_rsp *hdr = (struct iscsi_tm_rsp *)&cmd->pdu[0];
|
|
|
|
|
|
|
|
iscsit_build_task_mgt_rsp(cmd, conn, hdr);
|
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2012-04-04 06:51:12 +08:00
|
|
|
#define SENDTARGETS_BUF_LIMIT 32768U
|
|
|
|
|
2014-06-10 23:27:59 +08:00
|
|
|
static int
|
|
|
|
iscsit_build_sendtargets_response(struct iscsi_cmd *cmd,
|
2015-02-10 00:07:25 +08:00
|
|
|
enum iscsit_transport_type network_transport,
|
|
|
|
int skip_bytes, bool *completed)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
char *payload = NULL;
|
|
|
|
struct iscsi_conn *conn = cmd->conn;
|
|
|
|
struct iscsi_portal_group *tpg;
|
|
|
|
struct iscsi_tiqn *tiqn;
|
|
|
|
struct iscsi_tpg_np *tpg_np;
|
|
|
|
int buffer_len, end_of_buf = 0, len = 0, payload_len = 0;
|
2013-10-08 05:13:46 +08:00
|
|
|
int target_name_printed;
|
2012-04-04 06:51:12 +08:00
|
|
|
unsigned char buf[ISCSI_IQN_LEN+12]; /* iqn + "TargetName=" + \0 */
|
2013-06-20 13:45:42 +08:00
|
|
|
unsigned char *text_in = cmd->text_in_ptr, *text_ptr = NULL;
|
2015-08-01 15:10:12 +08:00
|
|
|
bool active;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-01-26 18:49:06 +08:00
|
|
|
buffer_len = min(conn->conn_ops->MaxRecvDataSegmentLength,
|
2012-04-04 06:51:12 +08:00
|
|
|
SENDTARGETS_BUF_LIMIT);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
payload = kzalloc(buffer_len, GFP_KERNEL);
|
2017-04-09 21:34:50 +08:00
|
|
|
if (!payload)
|
2011-07-23 14:43:04 +08:00
|
|
|
return -ENOMEM;
|
2017-04-09 21:34:50 +08:00
|
|
|
|
2013-06-20 13:45:42 +08:00
|
|
|
/*
|
2015-01-10 07:13:08 +08:00
|
|
|
* Locate pointer to iqn./eui. string for ICF_SENDTARGETS_SINGLE
|
2013-06-20 13:45:42 +08:00
|
|
|
* explicit case..
|
|
|
|
*/
|
2015-01-10 07:13:08 +08:00
|
|
|
if (cmd->cmd_flags & ICF_SENDTARGETS_SINGLE) {
|
2013-06-20 13:45:42 +08:00
|
|
|
text_ptr = strchr(text_in, '=');
|
|
|
|
if (!text_ptr) {
|
|
|
|
pr_err("Unable to locate '=' string in text_in:"
|
|
|
|
" %s\n", text_in);
|
2013-06-24 23:46:57 +08:00
|
|
|
kfree(payload);
|
2013-06-20 13:45:42 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Skip over '=' character..
|
|
|
|
*/
|
|
|
|
text_ptr += 1;
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
spin_lock(&tiqn_lock);
|
|
|
|
list_for_each_entry(tiqn, &g_tiqn_list, tiqn_list) {
|
2015-01-10 07:13:08 +08:00
|
|
|
if ((cmd->cmd_flags & ICF_SENDTARGETS_SINGLE) &&
|
2013-06-20 13:45:42 +08:00
|
|
|
strcmp(tiqn->tiqn, text_ptr)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2013-10-08 05:13:46 +08:00
|
|
|
target_name_printed = 0;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
spin_lock(&tiqn->tiqn_tpg_lock);
|
|
|
|
list_for_each_entry(tpg, &tiqn->tiqn_tpg_list, tpg_list) {
|
|
|
|
|
2013-10-08 05:13:46 +08:00
|
|
|
/* If demo_mode_discovery=0 and generate_node_acls=0
|
|
|
|
* (demo mode dislabed) do not return
|
|
|
|
* TargetName+TargetAddress unless a NodeACL exists.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ((tpg->tpg_attrib.generate_node_acls == 0) &&
|
|
|
|
(tpg->tpg_attrib.demo_mode_discovery == 0) &&
|
2016-01-08 14:09:27 +08:00
|
|
|
(!target_tpg_has_node_acl(&tpg->tpg_se_tpg,
|
2013-10-08 05:13:46 +08:00
|
|
|
cmd->conn->sess->sess_ops->InitiatorName))) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_lock(&tpg->tpg_state_lock);
|
2015-08-01 15:10:12 +08:00
|
|
|
active = (tpg->tpg_state == TPG_STATE_ACTIVE);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock(&tpg->tpg_state_lock);
|
|
|
|
|
2015-08-01 15:10:12 +08:00
|
|
|
if (!active && tpg->tpg_attrib.tpg_enabled_sendtargets)
|
|
|
|
continue;
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_lock(&tpg->tpg_np_lock);
|
|
|
|
list_for_each_entry(tpg_np, &tpg->tpg_gnp_list,
|
|
|
|
tpg_np_list) {
|
2012-01-17 15:33:48 +08:00
|
|
|
struct iscsi_np *np = tpg_np->tpg_np;
|
2015-08-25 01:26:06 +08:00
|
|
|
struct sockaddr_storage *sockaddr;
|
2012-01-17 15:33:48 +08:00
|
|
|
|
2014-06-10 23:27:59 +08:00
|
|
|
if (np->np_network_transport != network_transport)
|
|
|
|
continue;
|
|
|
|
|
2013-10-08 05:13:46 +08:00
|
|
|
if (!target_name_printed) {
|
|
|
|
len = sprintf(buf, "TargetName=%s",
|
|
|
|
tiqn->tiqn);
|
|
|
|
len += 1;
|
|
|
|
|
|
|
|
if ((len + payload_len) > buffer_len) {
|
|
|
|
spin_unlock(&tpg->tpg_np_lock);
|
|
|
|
spin_unlock(&tiqn->tiqn_tpg_lock);
|
|
|
|
end_of_buf = 1;
|
|
|
|
goto eob;
|
|
|
|
}
|
2015-02-10 00:07:25 +08:00
|
|
|
|
|
|
|
if (skip_bytes && len <= skip_bytes) {
|
|
|
|
skip_bytes -= len;
|
|
|
|
} else {
|
|
|
|
memcpy(payload + payload_len, buf, len);
|
|
|
|
payload_len += len;
|
|
|
|
target_name_printed = 1;
|
|
|
|
if (len > skip_bytes)
|
|
|
|
skip_bytes = 0;
|
|
|
|
}
|
2013-10-08 05:13:46 +08:00
|
|
|
}
|
|
|
|
|
2018-01-25 19:56:46 +08:00
|
|
|
if (inet_addr_is_any((struct sockaddr *)&np->np_sockaddr))
|
2015-08-25 01:26:04 +08:00
|
|
|
sockaddr = &conn->local_sockaddr;
|
2015-04-01 01:43:18 +08:00
|
|
|
else
|
2015-08-25 01:26:04 +08:00
|
|
|
sockaddr = &np->np_sockaddr;
|
2015-04-01 01:43:18 +08:00
|
|
|
|
2015-08-25 01:26:04 +08:00
|
|
|
len = sprintf(buf, "TargetAddress="
|
|
|
|
"%pISpc,%hu",
|
|
|
|
sockaddr,
|
|
|
|
tpg->tpgt);
|
2011-07-23 14:43:04 +08:00
|
|
|
len += 1;
|
|
|
|
|
|
|
|
if ((len + payload_len) > buffer_len) {
|
|
|
|
spin_unlock(&tpg->tpg_np_lock);
|
|
|
|
spin_unlock(&tiqn->tiqn_tpg_lock);
|
|
|
|
end_of_buf = 1;
|
|
|
|
goto eob;
|
|
|
|
}
|
2015-02-10 00:07:25 +08:00
|
|
|
|
|
|
|
if (skip_bytes && len <= skip_bytes) {
|
|
|
|
skip_bytes -= len;
|
|
|
|
} else {
|
|
|
|
memcpy(payload + payload_len, buf, len);
|
|
|
|
payload_len += len;
|
|
|
|
if (len > skip_bytes)
|
|
|
|
skip_bytes = 0;
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
spin_unlock(&tpg->tpg_np_lock);
|
|
|
|
}
|
|
|
|
spin_unlock(&tiqn->tiqn_tpg_lock);
|
|
|
|
eob:
|
2015-02-10 00:07:25 +08:00
|
|
|
if (end_of_buf) {
|
|
|
|
*completed = false;
|
2011-07-23 14:43:04 +08:00
|
|
|
break;
|
2015-02-10 00:07:25 +08:00
|
|
|
}
|
2013-06-20 13:45:42 +08:00
|
|
|
|
2015-01-10 07:13:08 +08:00
|
|
|
if (cmd->cmd_flags & ICF_SENDTARGETS_SINGLE)
|
2013-06-20 13:45:42 +08:00
|
|
|
break;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
spin_unlock(&tiqn_lock);
|
|
|
|
|
|
|
|
cmd->buf_ptr = payload;
|
|
|
|
|
|
|
|
return payload_len;
|
|
|
|
}
|
|
|
|
|
2013-06-15 09:49:55 +08:00
|
|
|
int
|
|
|
|
iscsit_build_text_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
|
2014-06-10 23:27:59 +08:00
|
|
|
struct iscsi_text_rsp *hdr,
|
|
|
|
enum iscsit_transport_type network_transport)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2013-06-15 09:49:55 +08:00
|
|
|
int text_length, padding;
|
2015-02-10 00:07:25 +08:00
|
|
|
bool completed = true;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-02-10 00:07:25 +08:00
|
|
|
text_length = iscsit_build_sendtargets_response(cmd, network_transport,
|
|
|
|
cmd->read_data_done,
|
|
|
|
&completed);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (text_length < 0)
|
|
|
|
return text_length;
|
|
|
|
|
2015-02-10 00:07:25 +08:00
|
|
|
if (completed) {
|
2017-07-23 22:33:45 +08:00
|
|
|
hdr->flags = ISCSI_FLAG_CMD_FINAL;
|
2015-02-10 00:07:25 +08:00
|
|
|
} else {
|
2017-07-23 22:33:45 +08:00
|
|
|
hdr->flags = ISCSI_FLAG_TEXT_CONTINUE;
|
2015-02-10 00:07:25 +08:00
|
|
|
cmd->read_data_done += text_length;
|
|
|
|
if (cmd->targ_xfer_tag == 0xFFFFFFFF)
|
|
|
|
cmd->targ_xfer_tag = session_get_next_ttt(conn->sess);
|
|
|
|
}
|
2013-06-15 09:49:55 +08:00
|
|
|
hdr->opcode = ISCSI_OP_TEXT_RSP;
|
2011-07-23 14:43:04 +08:00
|
|
|
padding = ((-text_length) & 3);
|
|
|
|
hton24(hdr->dlength, text_length);
|
2013-06-15 09:49:55 +08:00
|
|
|
hdr->itt = cmd->init_task_tag;
|
|
|
|
hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
|
|
|
|
cmd->stat_sn = conn->stat_sn++;
|
|
|
|
hdr->statsn = cpu_to_be32(cmd->stat_sn);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
iscsit_increment_maxcmdsn(cmd, conn->sess);
|
2015-02-10 00:07:25 +08:00
|
|
|
/*
|
|
|
|
* Reset maxcmdsn_inc in multi-part text payload exchanges to
|
|
|
|
* correctly increment MaxCmdSN for each response answering a
|
|
|
|
* non immediate text request with a valid CmdSN.
|
|
|
|
*/
|
|
|
|
cmd->maxcmdsn_inc = 0;
|
2013-06-15 09:49:55 +08:00
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-02-10 00:07:25 +08:00
|
|
|
pr_debug("Built Text Response: ITT: 0x%08x, TTT: 0x%08x, StatSN: 0x%08x,"
|
|
|
|
" Length: %u, CID: %hu F: %d C: %d\n", cmd->init_task_tag,
|
|
|
|
cmd->targ_xfer_tag, cmd->stat_sn, text_length, conn->cid,
|
|
|
|
!!(hdr->flags & ISCSI_FLAG_CMD_FINAL),
|
|
|
|
!!(hdr->flags & ISCSI_FLAG_TEXT_CONTINUE));
|
2013-06-15 09:49:55 +08:00
|
|
|
|
|
|
|
return text_length + padding;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_build_text_rsp);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-06-15 09:49:55 +08:00
|
|
|
static int iscsit_send_text_rsp(
|
|
|
|
struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_text_rsp *hdr = (struct iscsi_text_rsp *)cmd->pdu;
|
2016-04-20 02:30:08 +08:00
|
|
|
int text_length;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-04-20 02:30:15 +08:00
|
|
|
text_length = iscsit_build_text_rsp(cmd, conn, hdr,
|
|
|
|
conn->conn_transport->transport_type);
|
2016-04-20 02:30:08 +08:00
|
|
|
if (text_length < 0)
|
|
|
|
return text_length;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL,
|
|
|
|
cmd->buf_ptr,
|
|
|
|
text_length);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
void
|
|
|
|
iscsit_build_reject(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
|
|
|
|
struct iscsi_reject *hdr)
|
|
|
|
{
|
|
|
|
hdr->opcode = ISCSI_OP_REJECT;
|
2013-07-03 18:48:24 +08:00
|
|
|
hdr->reason = cmd->reject_reason;
|
2013-03-21 06:29:15 +08:00
|
|
|
hdr->flags |= ISCSI_FLAG_CMD_FINAL;
|
|
|
|
hton24(hdr->dlength, ISCSI_HDR_LEN);
|
|
|
|
hdr->ffffffff = cpu_to_be32(0xffffffff);
|
|
|
|
cmd->stat_sn = conn->stat_sn++;
|
|
|
|
hdr->statsn = cpu_to_be32(cmd->stat_sn);
|
|
|
|
hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
|
2015-07-24 05:53:32 +08:00
|
|
|
hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
|
2013-03-21 06:29:15 +08:00
|
|
|
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(iscsit_build_reject);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static int iscsit_send_reject(
|
|
|
|
struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
2013-05-04 07:46:41 +08:00
|
|
|
struct iscsi_reject *hdr = (struct iscsi_reject *)&cmd->pdu[0];
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-05-04 07:46:41 +08:00
|
|
|
iscsit_build_reject(cmd, conn, hdr);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
pr_debug("Built Reject PDU StatSN: 0x%08x, Reason: 0x%02x,"
|
|
|
|
" CID: %hu\n", ntohl(hdr->statsn), hdr->reason, conn->cid);
|
|
|
|
|
2016-04-20 02:30:08 +08:00
|
|
|
return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL,
|
|
|
|
cmd->buf_ptr,
|
|
|
|
ISCSI_HDR_LEN);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void iscsit_thread_get_cpumask(struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
int ord, cpu;
|
|
|
|
/*
|
2015-02-27 14:19:15 +08:00
|
|
|
* bitmap_id is assigned from iscsit_global->ts_bitmap from
|
|
|
|
* within iscsit_start_kthreads()
|
2011-07-23 14:43:04 +08:00
|
|
|
*
|
2015-02-27 14:19:15 +08:00
|
|
|
* Here we use bitmap_id to determine which CPU that this
|
|
|
|
* iSCSI connection's RX/TX threads will be scheduled to
|
2011-07-23 14:43:04 +08:00
|
|
|
* execute upon.
|
|
|
|
*/
|
2015-02-27 14:19:15 +08:00
|
|
|
ord = conn->bitmap_id % cpumask_weight(cpu_online_mask);
|
2011-07-23 14:43:04 +08:00
|
|
|
for_each_online_cpu(cpu) {
|
|
|
|
if (ord-- == 0) {
|
|
|
|
cpumask_set_cpu(cpu, conn->conn_cpumask);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* This should never be reached..
|
|
|
|
*/
|
|
|
|
dump_stack();
|
|
|
|
cpumask_setall(conn->conn_cpumask);
|
|
|
|
}
|
|
|
|
|
2016-04-20 02:30:19 +08:00
|
|
|
int
|
2013-03-21 06:29:15 +08:00
|
|
|
iscsit_immediate_queue(struct iscsi_conn *conn, struct iscsi_cmd *cmd, int state)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2012-04-04 06:51:09 +08:00
|
|
|
int ret;
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
switch (state) {
|
|
|
|
case ISTATE_SEND_R2T:
|
|
|
|
ret = iscsit_send_r2t(cmd, conn);
|
|
|
|
if (ret < 0)
|
|
|
|
goto err;
|
|
|
|
break;
|
|
|
|
case ISTATE_REMOVE:
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2014-02-04 04:53:51 +08:00
|
|
|
list_del_init(&cmd->i_conn_node);
|
2013-03-21 06:29:15 +08:00
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
2012-04-04 06:51:09 +08:00
|
|
|
|
2013-05-31 15:49:41 +08:00
|
|
|
iscsit_free_cmd(cmd, false);
|
2013-03-21 06:29:15 +08:00
|
|
|
break;
|
|
|
|
case ISTATE_SEND_NOPIN_WANT_RESPONSE:
|
|
|
|
iscsit_mod_nopin_response_timer(conn);
|
|
|
|
ret = iscsit_send_unsolicited_nopin(cmd, conn, 1);
|
|
|
|
if (ret < 0)
|
2012-04-04 06:51:09 +08:00
|
|
|
goto err;
|
2013-03-21 06:29:15 +08:00
|
|
|
break;
|
|
|
|
case ISTATE_SEND_NOPIN_NO_RESPONSE:
|
|
|
|
ret = iscsit_send_unsolicited_nopin(cmd, conn, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
goto err;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pr_err("Unknown Opcode: 0x%02x ITT:"
|
|
|
|
" 0x%08x, i_state: %d on CID: %hu\n",
|
|
|
|
cmd->iscsi_opcode, cmd->init_task_tag, state,
|
|
|
|
conn->cid);
|
|
|
|
goto err;
|
2012-04-04 06:51:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
err:
|
|
|
|
return -1;
|
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_immediate_queue);
|
2012-04-04 06:51:09 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
static int
|
|
|
|
iscsit_handle_immediate_queue(struct iscsi_conn *conn)
|
2012-04-04 06:51:09 +08:00
|
|
|
{
|
2013-03-21 06:29:15 +08:00
|
|
|
struct iscsit_transport *t = conn->conn_transport;
|
2012-04-04 06:51:09 +08:00
|
|
|
struct iscsi_queue_req *qr;
|
|
|
|
struct iscsi_cmd *cmd;
|
|
|
|
u8 state;
|
|
|
|
int ret;
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
while ((qr = iscsit_get_cmd_from_immediate_queue(conn))) {
|
|
|
|
atomic_set(&conn->check_immediate_queue, 0);
|
2012-04-04 06:51:09 +08:00
|
|
|
cmd = qr->cmd;
|
|
|
|
state = qr->state;
|
|
|
|
kmem_cache_free(lio_qr_cache, qr);
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
ret = t->iscsit_immediate_queue(conn, cmd, state);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
}
|
2013-02-28 09:53:52 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2012-04-04 06:51:09 +08:00
|
|
|
|
2016-04-20 02:30:19 +08:00
|
|
|
int
|
2013-03-21 06:29:15 +08:00
|
|
|
iscsit_response_queue(struct iscsi_conn *conn, struct iscsi_cmd *cmd, int state)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
check_rsp_state:
|
|
|
|
switch (state) {
|
|
|
|
case ISTATE_SEND_DATAIN:
|
|
|
|
ret = iscsit_send_datain(cmd, conn);
|
2012-04-04 06:51:09 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto err;
|
2013-03-21 06:29:15 +08:00
|
|
|
else if (!ret)
|
|
|
|
/* more drs */
|
|
|
|
goto check_rsp_state;
|
|
|
|
else if (ret == 1) {
|
|
|
|
/* all done */
|
|
|
|
spin_lock_bh(&cmd->istate_lock);
|
|
|
|
cmd->i_state = ISTATE_SENT_STATUS;
|
|
|
|
spin_unlock_bh(&cmd->istate_lock);
|
2012-04-04 06:51:09 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
if (atomic_read(&conn->check_immediate_queue))
|
|
|
|
return 1;
|
2012-04-04 06:51:09 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
return 0;
|
|
|
|
} else if (ret == 2) {
|
|
|
|
/* Still must send status,
|
|
|
|
SCF_TRANSPORT_TASK_SENSE was set */
|
2012-04-04 06:51:09 +08:00
|
|
|
spin_lock_bh(&cmd->istate_lock);
|
2013-03-21 06:29:15 +08:00
|
|
|
cmd->i_state = ISTATE_SEND_STATUS;
|
2012-04-04 06:51:09 +08:00
|
|
|
spin_unlock_bh(&cmd->istate_lock);
|
2013-03-21 06:29:15 +08:00
|
|
|
state = ISTATE_SEND_STATUS;
|
|
|
|
goto check_rsp_state;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
case ISTATE_SEND_STATUS:
|
|
|
|
case ISTATE_SEND_STATUS_RECOVERY:
|
|
|
|
ret = iscsit_send_response(cmd, conn);
|
|
|
|
break;
|
|
|
|
case ISTATE_SEND_LOGOUTRSP:
|
|
|
|
ret = iscsit_send_logout(cmd, conn);
|
|
|
|
break;
|
|
|
|
case ISTATE_SEND_ASYNCMSG:
|
|
|
|
ret = iscsit_send_conn_drop_async_message(
|
|
|
|
cmd, conn);
|
|
|
|
break;
|
|
|
|
case ISTATE_SEND_NOPIN:
|
|
|
|
ret = iscsit_send_nopin(cmd, conn);
|
|
|
|
break;
|
|
|
|
case ISTATE_SEND_REJECT:
|
|
|
|
ret = iscsit_send_reject(cmd, conn);
|
|
|
|
break;
|
|
|
|
case ISTATE_SEND_TASKMGTRSP:
|
|
|
|
ret = iscsit_send_task_mgt_rsp(cmd, conn);
|
|
|
|
if (ret != 0)
|
2012-04-04 06:51:09 +08:00
|
|
|
break;
|
2013-03-21 06:29:15 +08:00
|
|
|
ret = iscsit_tmr_post_handler(cmd, conn);
|
|
|
|
if (ret != 0)
|
|
|
|
iscsit_fall_back_to_erl0(conn->sess);
|
|
|
|
break;
|
|
|
|
case ISTATE_SEND_TEXTRSP:
|
|
|
|
ret = iscsit_send_text_rsp(cmd, conn);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pr_err("Unknown Opcode: 0x%02x ITT:"
|
|
|
|
" 0x%08x, i_state: %d on CID: %hu\n",
|
|
|
|
cmd->iscsi_opcode, cmd->init_task_tag,
|
|
|
|
state, conn->cid);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (ret < 0)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
switch (state) {
|
|
|
|
case ISTATE_SEND_LOGOUTRSP:
|
|
|
|
if (!iscsit_logout_post_handler(cmd, conn))
|
2015-02-27 14:19:15 +08:00
|
|
|
return -ECONNRESET;
|
2020-08-24 06:36:59 +08:00
|
|
|
fallthrough;
|
2013-03-21 06:29:15 +08:00
|
|
|
case ISTATE_SEND_STATUS:
|
|
|
|
case ISTATE_SEND_ASYNCMSG:
|
|
|
|
case ISTATE_SEND_NOPIN:
|
|
|
|
case ISTATE_SEND_STATUS_RECOVERY:
|
|
|
|
case ISTATE_SEND_TEXTRSP:
|
|
|
|
case ISTATE_SEND_TASKMGTRSP:
|
2013-07-03 18:48:24 +08:00
|
|
|
case ISTATE_SEND_REJECT:
|
2013-03-21 06:29:15 +08:00
|
|
|
spin_lock_bh(&cmd->istate_lock);
|
|
|
|
cmd->i_state = ISTATE_SENT_STATUS;
|
|
|
|
spin_unlock_bh(&cmd->istate_lock);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pr_err("Unknown Opcode: 0x%02x ITT:"
|
|
|
|
" 0x%08x, i_state: %d on CID: %hu\n",
|
|
|
|
cmd->iscsi_opcode, cmd->init_task_tag,
|
|
|
|
cmd->i_state, conn->cid);
|
|
|
|
goto err;
|
2012-04-04 06:51:09 +08:00
|
|
|
}
|
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
if (atomic_read(&conn->check_immediate_queue))
|
|
|
|
return 1;
|
|
|
|
|
2012-04-04 06:51:09 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
err:
|
|
|
|
return -1;
|
|
|
|
}
|
2016-04-20 02:30:19 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_response_queue);
|
2012-04-04 06:51:09 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
static int iscsit_handle_response_queue(struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsit_transport *t = conn->conn_transport;
|
|
|
|
struct iscsi_queue_req *qr;
|
|
|
|
struct iscsi_cmd *cmd;
|
|
|
|
u8 state;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
while ((qr = iscsit_get_cmd_from_response_queue(conn))) {
|
|
|
|
cmd = qr->cmd;
|
|
|
|
state = qr->state;
|
|
|
|
kmem_cache_free(lio_qr_cache, qr);
|
|
|
|
|
|
|
|
ret = t->iscsit_response_queue(conn, cmd, state);
|
|
|
|
if (ret == 1 || ret < 0)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-04-04 06:51:09 +08:00
|
|
|
int iscsi_target_tx_thread(void *arg)
|
|
|
|
{
|
2011-07-23 14:43:04 +08:00
|
|
|
int ret = 0;
|
2015-02-27 14:19:15 +08:00
|
|
|
struct iscsi_conn *conn = arg;
|
2017-05-16 17:57:55 +08:00
|
|
|
bool conn_freed = false;
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Allow ourselves to be interrupted by SIGINT so that a
|
|
|
|
* connection recovery / failure event can be triggered externally.
|
|
|
|
*/
|
|
|
|
allow_signal(SIGINT);
|
|
|
|
|
|
|
|
while (!kthread_should_stop()) {
|
|
|
|
/*
|
|
|
|
* Ensure that both TX and RX per connection kthreads
|
|
|
|
* are scheduled to run on the same CPU.
|
|
|
|
*/
|
|
|
|
iscsit_thread_check_cpumask(conn, current, 1);
|
|
|
|
|
2012-11-01 00:16:46 +08:00
|
|
|
wait_event_interruptible(conn->queues_wq,
|
2015-02-27 14:19:15 +08:00
|
|
|
!iscsit_conn_all_queues_empty(conn));
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-02-27 14:19:15 +08:00
|
|
|
if (signal_pending(current))
|
2011-07-23 14:43:04 +08:00
|
|
|
goto transport_err;
|
|
|
|
|
2013-02-28 09:53:52 +08:00
|
|
|
get_immediate:
|
2013-03-21 06:29:15 +08:00
|
|
|
ret = iscsit_handle_immediate_queue(conn);
|
2012-04-04 06:51:09 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto transport_err;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-03-21 06:29:15 +08:00
|
|
|
ret = iscsit_handle_response_queue(conn);
|
2017-05-16 17:57:55 +08:00
|
|
|
if (ret == 1) {
|
2013-02-28 09:53:52 +08:00
|
|
|
goto get_immediate;
|
2017-05-16 17:57:55 +08:00
|
|
|
} else if (ret == -ECONNRESET) {
|
|
|
|
conn_freed = true;
|
2015-02-27 14:19:15 +08:00
|
|
|
goto out;
|
2017-05-16 17:57:55 +08:00
|
|
|
} else if (ret < 0) {
|
2012-04-04 06:51:09 +08:00
|
|
|
goto transport_err;
|
2017-05-16 17:57:55 +08:00
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
transport_err:
|
2015-07-23 14:14:19 +08:00
|
|
|
/*
|
|
|
|
* Avoid the normal connection failure code-path if this connection
|
|
|
|
* is still within LOGIN mode, and iscsi_np process context is
|
|
|
|
* responsible for cleaning up the early connection failure.
|
|
|
|
*/
|
|
|
|
if (conn->conn_state != TARG_CONN_STATE_IN_LOGIN)
|
2017-05-16 17:57:55 +08:00
|
|
|
iscsit_take_action_for_connection_exit(conn, &conn_freed);
|
2011-07-23 14:43:04 +08:00
|
|
|
out:
|
2017-05-16 17:57:55 +08:00
|
|
|
if (!conn_freed) {
|
|
|
|
while (!kthread_should_stop()) {
|
|
|
|
msleep(100);
|
|
|
|
}
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
static int iscsi_target_rx_opcode(struct iscsi_conn *conn, unsigned char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_hdr *hdr = (struct iscsi_hdr *)buf;
|
|
|
|
struct iscsi_cmd *cmd;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
switch (hdr->opcode & ISCSI_OPCODE_MASK) {
|
|
|
|
case ISCSI_OP_SCSI_CMD:
|
2014-01-20 11:36:44 +08:00
|
|
|
cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
|
2013-03-07 14:18:24 +08:00
|
|
|
if (!cmd)
|
2013-07-03 18:48:24 +08:00
|
|
|
goto reject;
|
2013-03-07 14:18:24 +08:00
|
|
|
|
|
|
|
ret = iscsit_handle_scsi_cmd(conn, cmd, buf);
|
|
|
|
break;
|
|
|
|
case ISCSI_OP_SCSI_DATA_OUT:
|
|
|
|
ret = iscsit_handle_data_out(conn, buf);
|
|
|
|
break;
|
|
|
|
case ISCSI_OP_NOOP_OUT:
|
|
|
|
cmd = NULL;
|
|
|
|
if (hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
|
2014-01-20 11:36:44 +08:00
|
|
|
cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
|
2013-03-07 14:18:24 +08:00
|
|
|
if (!cmd)
|
2013-07-03 18:48:24 +08:00
|
|
|
goto reject;
|
2013-03-07 14:18:24 +08:00
|
|
|
}
|
|
|
|
ret = iscsit_handle_nop_out(conn, cmd, buf);
|
|
|
|
break;
|
|
|
|
case ISCSI_OP_SCSI_TMFUNC:
|
2014-01-20 11:36:44 +08:00
|
|
|
cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
|
2013-03-07 14:18:24 +08:00
|
|
|
if (!cmd)
|
2013-07-03 18:48:24 +08:00
|
|
|
goto reject;
|
2013-03-07 14:18:24 +08:00
|
|
|
|
|
|
|
ret = iscsit_handle_task_mgt_cmd(conn, cmd, buf);
|
|
|
|
break;
|
|
|
|
case ISCSI_OP_TEXT:
|
2015-02-10 00:07:25 +08:00
|
|
|
if (hdr->ttt != cpu_to_be32(0xFFFFFFFF)) {
|
|
|
|
cmd = iscsit_find_cmd_from_itt(conn, hdr->itt);
|
|
|
|
if (!cmd)
|
|
|
|
goto reject;
|
|
|
|
} else {
|
|
|
|
cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
|
|
|
|
if (!cmd)
|
|
|
|
goto reject;
|
|
|
|
}
|
2013-06-15 07:46:16 +08:00
|
|
|
|
|
|
|
ret = iscsit_handle_text_cmd(conn, cmd, buf);
|
2013-03-07 14:18:24 +08:00
|
|
|
break;
|
|
|
|
case ISCSI_OP_LOGOUT:
|
2014-01-20 11:36:44 +08:00
|
|
|
cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
|
2013-03-07 14:18:24 +08:00
|
|
|
if (!cmd)
|
2013-07-03 18:48:24 +08:00
|
|
|
goto reject;
|
2013-03-07 14:18:24 +08:00
|
|
|
|
|
|
|
ret = iscsit_handle_logout_cmd(conn, cmd, buf);
|
|
|
|
if (ret > 0)
|
|
|
|
wait_for_completion_timeout(&conn->conn_logout_comp,
|
|
|
|
SECONDS_FOR_LOGOUT_COMP * HZ);
|
|
|
|
break;
|
|
|
|
case ISCSI_OP_SNACK:
|
|
|
|
ret = iscsit_handle_snack(conn, buf);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pr_err("Got unknown iSCSI OpCode: 0x%02x\n", hdr->opcode);
|
|
|
|
if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
|
|
|
|
pr_err("Cannot recover from unknown"
|
|
|
|
" opcode while ERL=0, closing iSCSI connection.\n");
|
|
|
|
return -1;
|
|
|
|
}
|
iscsi-target: remove support for obsolete markers
Support for markers is currently broken because of a bug in
iscsi_enforce_integrity_rules(): the "IFMarkInt_Reject" and
"OFMarkInt_Reject" variables are always equal to 1 in
iscsi_enforce_integrity_rules().
Moreover, fixed interval markers keys (IFMarker, OFMarker, IFMarkInt
and OFMarkInt) are obsolete according to iSCSI RFC 7143:
>From http://tools.ietf.org/html/rfc7143#section-13.25:
13.25. Obsoleted Keys
This document obsoletes the following keys defined in [RFC3720]:
IFMarker, OFMarker, OFMarkInt, and IFMarkInt. However, iSCSI
implementations compliant to this document may still receive these
obsoleted keys -- i.e., in a responder role -- in a text negotiation.
When an IFMarker or OFMarker key is received, a compliant iSCSI
implementation SHOULD respond with the constant "Reject" value. The
implementation MAY alternatively respond with a "No" value.
However, the implementation MUST NOT respond with a "NotUnderstood"
value for either of these keys.
When an IFMarkInt or OFMarkInt key is received, a compliant iSCSI
implementation MUST respond with the constant "Reject" value. The
implementation MUST NOT respond with a "NotUnderstood" value for
either of these keys.
This patch disables markers by turning the corresponding parameters to
read-only. The default value of IFMarker and OFMarker remains "No" but
the user cannot change it to "Yes" anymore. The new value of IFMarkInt
and OFMarkInt is "Reject".
(Drop left-over iscsi_get_value_from_number_range + make configfs
parameters attrs R/W nops - nab)
Signed-off-by: Christophe Vu-Brugier <cvubrugier@fastmail.fm>
Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
2015-04-20 04:18:33 +08:00
|
|
|
pr_err("Unable to recover from unknown opcode while OFMarker=No,"
|
|
|
|
" closing iSCSI connection.\n");
|
|
|
|
ret = -1;
|
2013-03-07 14:18:24 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2013-07-03 18:48:24 +08:00
|
|
|
reject:
|
|
|
|
return iscsit_add_reject(conn, ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
|
2013-03-07 14:18:24 +08:00
|
|
|
}
|
|
|
|
|
2015-11-06 06:11:59 +08:00
|
|
|
static bool iscsi_target_check_conn_state(struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
bool ret;
|
|
|
|
|
|
|
|
spin_lock_bh(&conn->state_lock);
|
|
|
|
ret = (conn->conn_state != TARG_CONN_STATE_LOGGED_IN);
|
|
|
|
spin_unlock_bh(&conn->state_lock);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-04-20 02:30:11 +08:00
|
|
|
static void iscsit_get_rx_pdu(struct iscsi_conn *conn)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
2016-04-20 02:30:11 +08:00
|
|
|
int ret;
|
2018-09-05 02:47:40 +08:00
|
|
|
u8 *buffer, opcode;
|
2011-07-23 14:43:04 +08:00
|
|
|
u32 checksum = 0, digest = 0;
|
|
|
|
struct kvec iov;
|
2013-03-07 14:18:24 +08:00
|
|
|
|
2018-09-05 02:47:40 +08:00
|
|
|
buffer = kcalloc(ISCSI_HDR_LEN, sizeof(*buffer), GFP_KERNEL);
|
|
|
|
if (!buffer)
|
|
|
|
return;
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
while (!kthread_should_stop()) {
|
|
|
|
/*
|
|
|
|
* Ensure that both TX and RX per connection kthreads
|
|
|
|
* are scheduled to run on the same CPU.
|
|
|
|
*/
|
|
|
|
iscsit_thread_check_cpumask(conn, current, 0);
|
|
|
|
|
|
|
|
memset(&iov, 0, sizeof(struct kvec));
|
|
|
|
|
|
|
|
iov.iov_base = buffer;
|
|
|
|
iov.iov_len = ISCSI_HDR_LEN;
|
|
|
|
|
|
|
|
ret = rx_data(conn, &iov, 1, ISCSI_HDR_LEN);
|
|
|
|
if (ret != ISCSI_HDR_LEN) {
|
|
|
|
iscsit_rx_thread_wait_for_tcp(conn);
|
2018-09-05 02:47:40 +08:00
|
|
|
break;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->conn_ops->HeaderDigest) {
|
|
|
|
iov.iov_base = &digest;
|
|
|
|
iov.iov_len = ISCSI_CRC_LEN;
|
|
|
|
|
|
|
|
ret = rx_data(conn, &iov, 1, ISCSI_CRC_LEN);
|
|
|
|
if (ret != ISCSI_CRC_LEN) {
|
|
|
|
iscsit_rx_thread_wait_for_tcp(conn);
|
2018-09-05 02:47:40 +08:00
|
|
|
break;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2017-11-01 02:03:16 +08:00
|
|
|
iscsit_do_crypto_hash_buf(conn->conn_rx_hash, buffer,
|
|
|
|
ISCSI_HDR_LEN, 0, NULL,
|
|
|
|
&checksum);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (digest != checksum) {
|
|
|
|
pr_err("HeaderDigest CRC32C failed,"
|
|
|
|
" received 0x%08x, computed 0x%08x\n",
|
|
|
|
digest, checksum);
|
|
|
|
/*
|
|
|
|
* Set the PDU to 0xff so it will intentionally
|
|
|
|
* hit default in the switch below.
|
|
|
|
*/
|
|
|
|
memset(buffer, 0xff, ISCSI_HDR_LEN);
|
2013-11-14 10:54:45 +08:00
|
|
|
atomic_long_inc(&conn->sess->conn_digest_errors);
|
2011-07-23 14:43:04 +08:00
|
|
|
} else {
|
|
|
|
pr_debug("Got HeaderDigest CRC32C"
|
|
|
|
" 0x%08x\n", checksum);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->conn_state == TARG_CONN_STATE_IN_LOGOUT)
|
2018-09-05 02:47:40 +08:00
|
|
|
break;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
opcode = buffer[0] & ISCSI_OPCODE_MASK;
|
|
|
|
|
|
|
|
if (conn->sess->sess_ops->SessionType &&
|
|
|
|
((!(opcode & ISCSI_OP_TEXT)) ||
|
|
|
|
(!(opcode & ISCSI_OP_LOGOUT)))) {
|
|
|
|
pr_err("Received illegal iSCSI Opcode: 0x%02x"
|
|
|
|
" while in Discovery Session, rejecting.\n", opcode);
|
2013-07-03 18:48:24 +08:00
|
|
|
iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
|
|
|
|
buffer);
|
2018-09-05 02:47:40 +08:00
|
|
|
break;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
ret = iscsi_target_rx_opcode(conn, buffer);
|
|
|
|
if (ret < 0)
|
2018-09-05 02:47:40 +08:00
|
|
|
break;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
2018-09-05 02:47:40 +08:00
|
|
|
|
|
|
|
kfree(buffer);
|
2016-04-20 02:30:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int iscsi_target_rx_thread(void *arg)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct iscsi_conn *conn = arg;
|
2017-05-16 17:57:55 +08:00
|
|
|
bool conn_freed = false;
|
2016-04-20 02:30:11 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Allow ourselves to be interrupted by SIGINT so that a
|
|
|
|
* connection recovery / failure event can be triggered externally.
|
|
|
|
*/
|
|
|
|
allow_signal(SIGINT);
|
|
|
|
/*
|
|
|
|
* Wait for iscsi_post_login_handler() to complete before allowing
|
|
|
|
* incoming iscsi/tcp socket I/O, and/or failing the connection.
|
|
|
|
*/
|
|
|
|
rc = wait_for_completion_interruptible(&conn->rx_login_comp);
|
|
|
|
if (rc < 0 || iscsi_target_check_conn_state(conn))
|
2017-05-16 17:57:55 +08:00
|
|
|
goto out;
|
2016-04-20 02:30:11 +08:00
|
|
|
|
|
|
|
if (!conn->conn_transport->iscsit_get_rx_pdu)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
conn->conn_transport->iscsit_get_rx_pdu(conn);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (!signal_pending(current))
|
|
|
|
atomic_set(&conn->transport_failed, 1);
|
2017-05-16 17:57:55 +08:00
|
|
|
iscsit_take_action_for_connection_exit(conn, &conn_freed);
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (!conn_freed) {
|
|
|
|
while (!kthread_should_stop()) {
|
|
|
|
msleep(100);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iscsit_release_commands_from_conn(struct iscsi_conn *conn)
|
|
|
|
{
|
2016-06-03 05:56:45 +08:00
|
|
|
LIST_HEAD(tmp_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
struct iscsi_cmd *cmd = NULL, *cmd_tmp = NULL;
|
|
|
|
struct iscsi_session *sess = conn->sess;
|
|
|
|
/*
|
|
|
|
* We expect this function to only ever be called from either RX or TX
|
|
|
|
* thread context via iscsit_close_connection() once the other context
|
|
|
|
* has been reset -> returned sleeping pre-handler state.
|
|
|
|
*/
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2016-06-03 05:56:45 +08:00
|
|
|
list_splice_init(&conn->conn_cmd_list, &tmp_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2016-06-03 05:56:45 +08:00
|
|
|
list_for_each_entry(cmd, &tmp_list, i_conn_node) {
|
|
|
|
struct se_cmd *se_cmd = &cmd->se_cmd;
|
|
|
|
|
|
|
|
if (se_cmd->se_tfo != NULL) {
|
2019-01-26 02:34:56 +08:00
|
|
|
spin_lock_irq(&se_cmd->t_state_lock);
|
2016-06-03 05:56:45 +08:00
|
|
|
se_cmd->transport_state |= CMD_T_FABRIC_STOP;
|
2019-01-26 02:34:56 +08:00
|
|
|
spin_unlock_irq(&se_cmd->t_state_lock);
|
2016-06-03 05:56:45 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
|
|
|
|
list_for_each_entry_safe(cmd, cmd_tmp, &tmp_list, i_conn_node) {
|
2014-02-04 04:53:51 +08:00
|
|
|
list_del_init(&cmd->i_conn_node);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
iscsit_increment_maxcmdsn(cmd, sess);
|
2013-05-31 15:49:41 +08:00
|
|
|
iscsit_free_cmd(cmd, true);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iscsit_stop_timers_for_cmds(
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd;
|
|
|
|
|
|
|
|
spin_lock_bh(&conn->cmd_lock);
|
2012-04-04 06:51:01 +08:00
|
|
|
list_for_each_entry(cmd, &conn->conn_cmd_list, i_conn_node) {
|
2011-07-23 14:43:04 +08:00
|
|
|
if (cmd->data_direction == DMA_TO_DEVICE)
|
|
|
|
iscsit_stop_dataout_timer(cmd);
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&conn->cmd_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_close_connection(
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
int conn_logout = (conn->conn_state == TARG_CONN_STATE_IN_LOGOUT);
|
|
|
|
struct iscsi_session *sess = conn->sess;
|
|
|
|
|
|
|
|
pr_debug("Closing iSCSI connection CID %hu on SID:"
|
|
|
|
" %u\n", conn->cid, sess->sid);
|
|
|
|
/*
|
2016-04-20 02:30:18 +08:00
|
|
|
* Always up conn_logout_comp for the traditional TCP and HW_OFFLOAD
|
|
|
|
* case just in case the RX Thread in iscsi_target_rx_opcode() is
|
|
|
|
* sleeping and the logout response never got sent because the
|
|
|
|
* connection failed.
|
2015-02-23 16:57:51 +08:00
|
|
|
*
|
|
|
|
* However for iser-target, isert_wait4logout() is using conn_logout_comp
|
|
|
|
* to signal logout response TX interrupt completion. Go ahead and skip
|
|
|
|
* this for iser since isert_rx_opcode() does not wait on logout failure,
|
|
|
|
* and to avoid iscsi_conn pointer dereference in iser-target code.
|
2011-07-23 14:43:04 +08:00
|
|
|
*/
|
2016-05-15 13:23:34 +08:00
|
|
|
if (!conn->conn_transport->rdma_shutdown)
|
2015-02-23 16:57:51 +08:00
|
|
|
complete(&conn->conn_logout_comp);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-02-27 14:19:15 +08:00
|
|
|
if (!strcmp(current->comm, ISCSI_RX_THREAD_NAME)) {
|
|
|
|
if (conn->tx_thread &&
|
|
|
|
cmpxchg(&conn->tx_thread_active, true, false)) {
|
|
|
|
send_sig(SIGINT, conn->tx_thread, 1);
|
|
|
|
kthread_stop(conn->tx_thread);
|
|
|
|
}
|
|
|
|
} else if (!strcmp(current->comm, ISCSI_TX_THREAD_NAME)) {
|
|
|
|
if (conn->rx_thread &&
|
|
|
|
cmpxchg(&conn->rx_thread_active, true, false)) {
|
|
|
|
send_sig(SIGINT, conn->rx_thread, 1);
|
|
|
|
kthread_stop(conn->rx_thread);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock(&iscsit_global->ts_bitmap_lock);
|
|
|
|
bitmap_release_region(iscsit_global->ts_bitmap, conn->bitmap_id,
|
|
|
|
get_order(1));
|
|
|
|
spin_unlock(&iscsit_global->ts_bitmap_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
iscsit_stop_timers_for_cmds(conn);
|
|
|
|
iscsit_stop_nopin_response_timer(conn);
|
|
|
|
iscsit_stop_nopin_timer(conn);
|
2014-02-04 04:54:39 +08:00
|
|
|
|
2020-02-13 13:08:59 +08:00
|
|
|
if (conn->conn_transport->iscsit_wait_conn)
|
|
|
|
conn->conn_transport->iscsit_wait_conn(conn);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* During Connection recovery drop unacknowledged out of order
|
|
|
|
* commands for this connection, and prepare the other commands
|
2016-12-23 21:40:24 +08:00
|
|
|
* for reallegiance.
|
2011-07-23 14:43:04 +08:00
|
|
|
*
|
|
|
|
* During normal operation clear the out of order commands (but
|
|
|
|
* do not free the struct iscsi_ooo_cmdsn's) and release all
|
|
|
|
* struct iscsi_cmds.
|
|
|
|
*/
|
|
|
|
if (atomic_read(&conn->connection_recovery)) {
|
|
|
|
iscsit_discard_unacknowledged_ooo_cmdsns_for_conn(conn);
|
2016-12-23 21:40:24 +08:00
|
|
|
iscsit_prepare_cmds_for_reallegiance(conn);
|
2011-07-23 14:43:04 +08:00
|
|
|
} else {
|
|
|
|
iscsit_clear_ooo_cmdsns_for_conn(conn);
|
|
|
|
iscsit_release_commands_from_conn(conn);
|
|
|
|
}
|
2014-06-10 12:03:54 +08:00
|
|
|
iscsit_free_queue_reqs_for_conn(conn);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle decrementing session or connection usage count if
|
|
|
|
* a logout response was not able to be sent because the
|
|
|
|
* connection failed. Fall back to Session Recovery here.
|
|
|
|
*/
|
|
|
|
if (atomic_read(&conn->conn_logout_remove)) {
|
|
|
|
if (conn->conn_logout_reason == ISCSI_LOGOUT_REASON_CLOSE_SESSION) {
|
|
|
|
iscsit_dec_conn_usage_count(conn);
|
|
|
|
iscsit_dec_session_usage_count(sess);
|
|
|
|
}
|
|
|
|
if (conn->conn_logout_reason == ISCSI_LOGOUT_REASON_CLOSE_CONNECTION)
|
|
|
|
iscsit_dec_conn_usage_count(conn);
|
|
|
|
|
|
|
|
atomic_set(&conn->conn_logout_remove, 0);
|
|
|
|
atomic_set(&sess->session_reinstatement, 0);
|
|
|
|
atomic_set(&sess->session_fall_back_to_erl0, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock_bh(&sess->conn_lock);
|
|
|
|
list_del(&conn->conn_list);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Attempt to let the Initiator know this connection failed by
|
|
|
|
* sending an Connection Dropped Async Message on another
|
|
|
|
* active connection.
|
|
|
|
*/
|
|
|
|
if (atomic_read(&conn->connection_recovery))
|
|
|
|
iscsit_build_conn_drop_async_message(conn);
|
|
|
|
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If connection reinstatement is being performed on this connection,
|
|
|
|
* up the connection reinstatement semaphore that is being blocked on
|
|
|
|
* in iscsit_cause_connection_reinstatement().
|
|
|
|
*/
|
|
|
|
spin_lock_bh(&conn->state_lock);
|
|
|
|
if (atomic_read(&conn->sleep_on_conn_wait_comp)) {
|
|
|
|
spin_unlock_bh(&conn->state_lock);
|
|
|
|
complete(&conn->conn_wait_comp);
|
|
|
|
wait_for_completion(&conn->conn_post_wait_comp);
|
|
|
|
spin_lock_bh(&conn->state_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If connection reinstatement is being performed on this connection
|
|
|
|
* by receiving a REMOVECONNFORRECOVERY logout request, up the
|
|
|
|
* connection wait rcfr semaphore that is being blocked on
|
|
|
|
* an iscsit_connection_reinstatement_rcfr().
|
|
|
|
*/
|
|
|
|
if (atomic_read(&conn->connection_wait_rcfr)) {
|
|
|
|
spin_unlock_bh(&conn->state_lock);
|
|
|
|
complete(&conn->conn_wait_rcfr_comp);
|
|
|
|
wait_for_completion(&conn->conn_post_wait_comp);
|
|
|
|
spin_lock_bh(&conn->state_lock);
|
|
|
|
}
|
|
|
|
atomic_set(&conn->connection_reinstatement, 1);
|
|
|
|
spin_unlock_bh(&conn->state_lock);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If any other processes are accessing this connection pointer we
|
|
|
|
* must wait until they have completed.
|
|
|
|
*/
|
|
|
|
iscsit_check_conn_usage_count(conn);
|
|
|
|
|
2016-01-24 21:19:52 +08:00
|
|
|
ahash_request_free(conn->conn_tx_hash);
|
|
|
|
if (conn->conn_rx_hash) {
|
|
|
|
struct crypto_ahash *tfm;
|
|
|
|
|
|
|
|
tfm = crypto_ahash_reqtfm(conn->conn_rx_hash);
|
|
|
|
ahash_request_free(conn->conn_rx_hash);
|
|
|
|
crypto_free_ahash(tfm);
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
iscsi-target: Drop bogus struct file usage for iSCSI/SCTP
From Al Viro:
BTW, speaking of struct file treatment related to sockets -
there's this piece of code in iscsi:
/*
* The SCTP stack needs struct socket->file.
*/
if ((np->np_network_transport == ISCSI_SCTP_TCP) ||
(np->np_network_transport == ISCSI_SCTP_UDP)) {
if (!new_sock->file) {
new_sock->file = kzalloc(
sizeof(struct file), GFP_KERNEL);
For one thing, as far as I can see it'not true - sctp does *not* depend on
socket->file being non-NULL; it does, in one place, check socket->file->f_flags
for O_NONBLOCK, but there it treats NULL socket->file as "flag not set".
Which is the case here anyway - the fake struct file created in
__iscsi_target_login_thread() (and in iscsi_target_setup_login_socket(), with
the same excuse) do *not* get that flag set.
Moreover, it's a bloody serious violation of a bunch of asserts in VFS;
all struct file instances should come from filp_cachep, via get_empty_filp()
(or alloc_file(), which is a wrapper for it). FWIW, I'm very tempted to
do this and be done with the entire mess:
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Cc: Andy Grover <agrover@redhat.com>
Cc: Hannes Reinecke <hare@suse.de>
Cc: Christoph Hellwig <hch@lst.de>
Cc: stable@vger.kernel.org
Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
2012-07-21 15:55:18 +08:00
|
|
|
if (conn->sock)
|
2011-07-23 14:43:04 +08:00
|
|
|
sock_release(conn->sock);
|
2013-03-07 13:54:13 +08:00
|
|
|
|
|
|
|
if (conn->conn_transport->iscsit_free_conn)
|
|
|
|
conn->conn_transport->iscsit_free_conn(conn);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
pr_debug("Moving to TARG_CONN_STATE_FREE.\n");
|
|
|
|
conn->conn_state = TARG_CONN_STATE_FREE;
|
2018-08-28 03:45:16 +08:00
|
|
|
iscsit_free_conn(conn);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
spin_lock_bh(&sess->conn_lock);
|
|
|
|
atomic_dec(&sess->nconn);
|
|
|
|
pr_debug("Decremented iSCSI connection count to %hu from node:"
|
|
|
|
" %s\n", atomic_read(&sess->nconn),
|
|
|
|
sess->sess_ops->InitiatorName);
|
|
|
|
/*
|
|
|
|
* Make sure that if one connection fails in an non ERL=2 iSCSI
|
|
|
|
* Session that they all fail.
|
|
|
|
*/
|
|
|
|
if ((sess->sess_ops->ErrorRecoveryLevel != 2) && !conn_logout &&
|
|
|
|
!atomic_read(&sess->session_logout))
|
|
|
|
atomic_set(&sess->session_fall_back_to_erl0, 1);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If this was not the last connection in the session, and we are
|
|
|
|
* performing session reinstatement or falling back to ERL=0, call
|
|
|
|
* iscsit_stop_session() without sleeping to shutdown the other
|
|
|
|
* active connections.
|
|
|
|
*/
|
|
|
|
if (atomic_read(&sess->nconn)) {
|
|
|
|
if (!atomic_read(&sess->session_reinstatement) &&
|
|
|
|
!atomic_read(&sess->session_fall_back_to_erl0)) {
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!atomic_read(&sess->session_stop_active)) {
|
|
|
|
atomic_set(&sess->session_stop_active, 1);
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
iscsit_stop_session(sess, 0, 0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If this was the last connection in the session and one of the
|
|
|
|
* following is occurring:
|
|
|
|
*
|
|
|
|
* Session Reinstatement is not being performed, and are falling back
|
|
|
|
* to ERL=0 call iscsit_close_session().
|
|
|
|
*
|
|
|
|
* Session Logout was requested. iscsit_close_session() will be called
|
|
|
|
* elsewhere.
|
|
|
|
*
|
|
|
|
* Session Continuation is not being performed, start the Time2Retain
|
|
|
|
* handler and check if sleep_on_sess_wait_sem is active.
|
|
|
|
*/
|
|
|
|
if (!atomic_read(&sess->session_reinstatement) &&
|
|
|
|
atomic_read(&sess->session_fall_back_to_erl0)) {
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
2020-03-14 01:06:55 +08:00
|
|
|
complete_all(&sess->session_wait_comp);
|
2016-05-02 21:45:24 +08:00
|
|
|
iscsit_close_session(sess);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
} else if (atomic_read(&sess->session_logout)) {
|
|
|
|
pr_debug("Moving to TARG_SESS_STATE_FREE.\n");
|
|
|
|
sess->session_state = TARG_SESS_STATE_FREE;
|
|
|
|
|
2020-03-14 01:06:55 +08:00
|
|
|
if (atomic_read(&sess->session_close)) {
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
complete_all(&sess->session_wait_comp);
|
|
|
|
iscsit_close_session(sess);
|
|
|
|
} else {
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
pr_debug("Moving to TARG_SESS_STATE_FAILED.\n");
|
|
|
|
sess->session_state = TARG_SESS_STATE_FAILED;
|
|
|
|
|
2020-03-14 01:06:55 +08:00
|
|
|
if (!atomic_read(&sess->session_continuation))
|
2011-07-23 14:43:04 +08:00
|
|
|
iscsit_start_time2retain_handler(sess);
|
|
|
|
|
2020-03-14 01:06:55 +08:00
|
|
|
if (atomic_read(&sess->session_close)) {
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
complete_all(&sess->session_wait_comp);
|
|
|
|
iscsit_close_session(sess);
|
|
|
|
} else {
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-02 21:45:24 +08:00
|
|
|
/*
|
|
|
|
* If the iSCSI Session for the iSCSI Initiator Node exists,
|
|
|
|
* forcefully shutdown the iSCSI NEXUS.
|
|
|
|
*/
|
2011-07-23 14:43:04 +08:00
|
|
|
int iscsit_close_session(struct iscsi_session *sess)
|
|
|
|
{
|
2013-10-10 02:05:58 +08:00
|
|
|
struct iscsi_portal_group *tpg = sess->tpg;
|
2011-07-23 14:43:04 +08:00
|
|
|
struct se_portal_group *se_tpg = &tpg->tpg_se_tpg;
|
|
|
|
|
|
|
|
if (atomic_read(&sess->nconn)) {
|
|
|
|
pr_err("%d connection(s) still exist for iSCSI session"
|
|
|
|
" to %s\n", atomic_read(&sess->nconn),
|
|
|
|
sess->sess_ops->InitiatorName);
|
|
|
|
BUG();
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock_bh(&se_tpg->session_lock);
|
|
|
|
atomic_set(&sess->session_logout, 1);
|
|
|
|
atomic_set(&sess->session_reinstatement, 1);
|
|
|
|
iscsit_stop_time2retain_timer(sess);
|
|
|
|
spin_unlock_bh(&se_tpg->session_lock);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* transport_deregister_session_configfs() will clear the
|
|
|
|
* struct se_node_acl->nacl_sess pointer now as a iscsi_np process context
|
|
|
|
* can be setting it again with __transport_register_session() in
|
|
|
|
* iscsi_post_login_handler() again after the iscsit_stop_session()
|
|
|
|
* completes in iscsi_np context.
|
|
|
|
*/
|
|
|
|
transport_deregister_session_configfs(sess->se_sess);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If any other processes are accessing this session pointer we must
|
|
|
|
* wait until they have completed. If we are in an interrupt (the
|
|
|
|
* time2retain handler) and contain and active session usage count we
|
|
|
|
* restart the timer and exit.
|
|
|
|
*/
|
|
|
|
if (!in_interrupt()) {
|
2020-03-14 01:06:56 +08:00
|
|
|
iscsit_check_session_usage_count(sess);
|
2011-07-23 14:43:04 +08:00
|
|
|
} else {
|
|
|
|
if (iscsit_check_session_usage_count(sess) == 2) {
|
|
|
|
atomic_set(&sess->session_logout, 0);
|
|
|
|
iscsit_start_time2retain_handler(sess);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
transport_deregister_session(sess->se_sess);
|
|
|
|
|
|
|
|
if (sess->sess_ops->ErrorRecoveryLevel == 2)
|
2018-09-14 20:28:08 +08:00
|
|
|
iscsit_free_connection_recovery_entries(sess);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
iscsit_free_all_ooo_cmdsns(sess);
|
|
|
|
|
|
|
|
spin_lock_bh(&se_tpg->session_lock);
|
|
|
|
pr_debug("Moving to TARG_SESS_STATE_FREE.\n");
|
|
|
|
sess->session_state = TARG_SESS_STATE_FREE;
|
|
|
|
pr_debug("Released iSCSI session from node: %s\n",
|
|
|
|
sess->sess_ops->InitiatorName);
|
|
|
|
tpg->nsessions--;
|
|
|
|
if (tpg->tpg_tiqn)
|
|
|
|
tpg->tpg_tiqn->tiqn_nsessions--;
|
|
|
|
|
|
|
|
pr_debug("Decremented number of active iSCSI Sessions on"
|
|
|
|
" iSCSI TPG: %hu to %u\n", tpg->tpgt, tpg->nsessions);
|
|
|
|
|
2018-06-19 13:23:04 +08:00
|
|
|
ida_free(&sess_ida, sess->session_index);
|
2011-07-23 14:43:04 +08:00
|
|
|
kfree(sess->sess_ops);
|
|
|
|
sess->sess_ops = NULL;
|
|
|
|
spin_unlock_bh(&se_tpg->session_lock);
|
|
|
|
|
|
|
|
kfree(sess);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iscsit_logout_post_handler_closesession(
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_session *sess = conn->sess;
|
2015-07-24 06:30:31 +08:00
|
|
|
int sleep = 1;
|
|
|
|
/*
|
|
|
|
* Traditional iscsi/tcp will invoke this logic from TX thread
|
|
|
|
* context during session logout, so clear tx_thread_active and
|
|
|
|
* sleep if iscsit_close_connection() has not already occured.
|
|
|
|
*
|
|
|
|
* Since iser-target invokes this logic from it's own workqueue,
|
|
|
|
* always sleep waiting for RX/TX thread shutdown to complete
|
|
|
|
* within iscsit_close_connection().
|
|
|
|
*/
|
2017-06-03 20:35:47 +08:00
|
|
|
if (!conn->conn_transport->rdma_shutdown) {
|
2015-07-24 06:30:31 +08:00
|
|
|
sleep = cmpxchg(&conn->tx_thread_active, true, false);
|
2017-06-03 20:35:47 +08:00
|
|
|
if (!sleep)
|
|
|
|
return;
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
atomic_set(&conn->conn_logout_remove, 0);
|
|
|
|
complete(&conn->conn_logout_comp);
|
|
|
|
|
|
|
|
iscsit_dec_conn_usage_count(conn);
|
2020-03-14 01:06:55 +08:00
|
|
|
atomic_set(&sess->session_close, 1);
|
2015-02-27 14:19:15 +08:00
|
|
|
iscsit_stop_session(sess, sleep, sleep);
|
2011-07-23 14:43:04 +08:00
|
|
|
iscsit_dec_session_usage_count(sess);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iscsit_logout_post_handler_samecid(
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
2015-07-24 06:30:31 +08:00
|
|
|
int sleep = 1;
|
|
|
|
|
2017-06-03 20:35:47 +08:00
|
|
|
if (!conn->conn_transport->rdma_shutdown) {
|
2015-07-24 06:30:31 +08:00
|
|
|
sleep = cmpxchg(&conn->tx_thread_active, true, false);
|
2017-06-03 20:35:47 +08:00
|
|
|
if (!sleep)
|
|
|
|
return;
|
|
|
|
}
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
atomic_set(&conn->conn_logout_remove, 0);
|
|
|
|
complete(&conn->conn_logout_comp);
|
|
|
|
|
2015-02-27 14:19:15 +08:00
|
|
|
iscsit_cause_connection_reinstatement(conn, sleep);
|
2011-07-23 14:43:04 +08:00
|
|
|
iscsit_dec_conn_usage_count(conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iscsit_logout_post_handler_diffcid(
|
|
|
|
struct iscsi_conn *conn,
|
|
|
|
u16 cid)
|
|
|
|
{
|
|
|
|
struct iscsi_conn *l_conn;
|
|
|
|
struct iscsi_session *sess = conn->sess;
|
2014-09-18 02:45:17 +08:00
|
|
|
bool conn_found = false;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (!sess)
|
|
|
|
return;
|
|
|
|
|
|
|
|
spin_lock_bh(&sess->conn_lock);
|
|
|
|
list_for_each_entry(l_conn, &sess->sess_conn_list, conn_list) {
|
|
|
|
if (l_conn->cid == cid) {
|
|
|
|
iscsit_inc_conn_usage_count(l_conn);
|
2014-09-18 02:45:17 +08:00
|
|
|
conn_found = true;
|
2011-07-23 14:43:04 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
|
2014-09-18 02:45:17 +08:00
|
|
|
if (!conn_found)
|
2011-07-23 14:43:04 +08:00
|
|
|
return;
|
|
|
|
|
|
|
|
if (l_conn->sock)
|
|
|
|
l_conn->sock->ops->shutdown(l_conn->sock, RCV_SHUTDOWN);
|
|
|
|
|
|
|
|
spin_lock_bh(&l_conn->state_lock);
|
|
|
|
pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
|
|
|
|
l_conn->conn_state = TARG_CONN_STATE_IN_LOGOUT;
|
|
|
|
spin_unlock_bh(&l_conn->state_lock);
|
|
|
|
|
|
|
|
iscsit_cause_connection_reinstatement(l_conn, 1);
|
|
|
|
iscsit_dec_conn_usage_count(l_conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return of 0 causes the TX thread to restart.
|
|
|
|
*/
|
2013-03-21 06:29:15 +08:00
|
|
|
int iscsit_logout_post_handler(
|
2011-07-23 14:43:04 +08:00
|
|
|
struct iscsi_cmd *cmd,
|
|
|
|
struct iscsi_conn *conn)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
switch (cmd->logout_reason) {
|
|
|
|
case ISCSI_LOGOUT_REASON_CLOSE_SESSION:
|
|
|
|
switch (cmd->logout_response) {
|
|
|
|
case ISCSI_LOGOUT_SUCCESS:
|
|
|
|
case ISCSI_LOGOUT_CLEANUP_FAILED:
|
|
|
|
default:
|
|
|
|
iscsit_logout_post_handler_closesession(conn);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ISCSI_LOGOUT_REASON_CLOSE_CONNECTION:
|
|
|
|
if (conn->cid == cmd->logout_cid) {
|
|
|
|
switch (cmd->logout_response) {
|
|
|
|
case ISCSI_LOGOUT_SUCCESS:
|
|
|
|
case ISCSI_LOGOUT_CLEANUP_FAILED:
|
|
|
|
default:
|
|
|
|
iscsit_logout_post_handler_samecid(conn);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
switch (cmd->logout_response) {
|
|
|
|
case ISCSI_LOGOUT_SUCCESS:
|
|
|
|
iscsit_logout_post_handler_diffcid(conn,
|
|
|
|
cmd->logout_cid);
|
|
|
|
break;
|
|
|
|
case ISCSI_LOGOUT_CID_NOT_FOUND:
|
|
|
|
case ISCSI_LOGOUT_CLEANUP_FAILED:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ISCSI_LOGOUT_REASON_RECOVERY:
|
|
|
|
switch (cmd->logout_response) {
|
|
|
|
case ISCSI_LOGOUT_SUCCESS:
|
|
|
|
case ISCSI_LOGOUT_CID_NOT_FOUND:
|
|
|
|
case ISCSI_LOGOUT_RECOVERY_UNSUPPORTED:
|
|
|
|
case ISCSI_LOGOUT_CLEANUP_FAILED:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ret = 1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
2013-03-21 06:29:15 +08:00
|
|
|
EXPORT_SYMBOL(iscsit_logout_post_handler);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
void iscsit_fail_session(struct iscsi_session *sess)
|
|
|
|
{
|
|
|
|
struct iscsi_conn *conn;
|
|
|
|
|
|
|
|
spin_lock_bh(&sess->conn_lock);
|
|
|
|
list_for_each_entry(conn, &sess->sess_conn_list, conn_list) {
|
|
|
|
pr_debug("Moving to TARG_CONN_STATE_CLEANUP_WAIT.\n");
|
|
|
|
conn->conn_state = TARG_CONN_STATE_CLEANUP_WAIT;
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
|
|
|
|
pr_debug("Moving to TARG_SESS_STATE_FAILED.\n");
|
|
|
|
sess->session_state = TARG_SESS_STATE_FAILED;
|
|
|
|
}
|
|
|
|
|
|
|
|
void iscsit_stop_session(
|
|
|
|
struct iscsi_session *sess,
|
|
|
|
int session_sleep,
|
|
|
|
int connection_sleep)
|
|
|
|
{
|
|
|
|
u16 conn_count = atomic_read(&sess->nconn);
|
|
|
|
struct iscsi_conn *conn, *conn_tmp = NULL;
|
|
|
|
int is_last;
|
|
|
|
|
|
|
|
spin_lock_bh(&sess->conn_lock);
|
|
|
|
|
|
|
|
if (connection_sleep) {
|
|
|
|
list_for_each_entry_safe(conn, conn_tmp, &sess->sess_conn_list,
|
|
|
|
conn_list) {
|
|
|
|
if (conn_count == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (list_is_last(&conn->conn_list, &sess->sess_conn_list)) {
|
|
|
|
is_last = 1;
|
|
|
|
} else {
|
|
|
|
iscsit_inc_conn_usage_count(conn_tmp);
|
|
|
|
is_last = 0;
|
|
|
|
}
|
|
|
|
iscsit_inc_conn_usage_count(conn);
|
|
|
|
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
iscsit_cause_connection_reinstatement(conn, 1);
|
|
|
|
spin_lock_bh(&sess->conn_lock);
|
|
|
|
|
|
|
|
iscsit_dec_conn_usage_count(conn);
|
|
|
|
if (is_last == 0)
|
|
|
|
iscsit_dec_conn_usage_count(conn_tmp);
|
|
|
|
conn_count--;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
list_for_each_entry(conn, &sess->sess_conn_list, conn_list)
|
|
|
|
iscsit_cause_connection_reinstatement(conn, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (session_sleep && atomic_read(&sess->nconn)) {
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
wait_for_completion(&sess->session_wait_comp);
|
|
|
|
} else
|
|
|
|
spin_unlock_bh(&sess->conn_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsit_release_sessions_for_tpg(struct iscsi_portal_group *tpg, int force)
|
|
|
|
{
|
|
|
|
struct iscsi_session *sess;
|
|
|
|
struct se_portal_group *se_tpg = &tpg->tpg_se_tpg;
|
|
|
|
struct se_session *se_sess, *se_sess_tmp;
|
2015-07-22 15:24:09 +08:00
|
|
|
LIST_HEAD(free_list);
|
2011-07-23 14:43:04 +08:00
|
|
|
int session_count = 0;
|
|
|
|
|
|
|
|
spin_lock_bh(&se_tpg->session_lock);
|
|
|
|
if (tpg->nsessions && !force) {
|
|
|
|
spin_unlock_bh(&se_tpg->session_lock);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
list_for_each_entry_safe(se_sess, se_sess_tmp, &se_tpg->tpg_sess_list,
|
|
|
|
sess_list) {
|
|
|
|
sess = (struct iscsi_session *)se_sess->fabric_sess_ptr;
|
|
|
|
|
|
|
|
spin_lock(&sess->conn_lock);
|
|
|
|
if (atomic_read(&sess->session_fall_back_to_erl0) ||
|
|
|
|
atomic_read(&sess->session_logout) ||
|
2020-03-14 01:06:55 +08:00
|
|
|
atomic_read(&sess->session_close) ||
|
2011-07-23 14:43:04 +08:00
|
|
|
(sess->time2retain_timer_flags & ISCSI_TF_EXPIRED)) {
|
|
|
|
spin_unlock(&sess->conn_lock);
|
|
|
|
continue;
|
|
|
|
}
|
2020-03-14 01:06:55 +08:00
|
|
|
iscsit_inc_session_usage_count(sess);
|
2011-07-23 14:43:04 +08:00
|
|
|
atomic_set(&sess->session_reinstatement, 1);
|
2017-04-26 01:55:12 +08:00
|
|
|
atomic_set(&sess->session_fall_back_to_erl0, 1);
|
2020-03-14 01:06:55 +08:00
|
|
|
atomic_set(&sess->session_close, 1);
|
2011-07-23 14:43:04 +08:00
|
|
|
spin_unlock(&sess->conn_lock);
|
|
|
|
|
2015-07-22 15:24:09 +08:00
|
|
|
list_move_tail(&se_sess->sess_list, &free_list);
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&se_tpg->session_lock);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-07-22 15:24:09 +08:00
|
|
|
list_for_each_entry_safe(se_sess, se_sess_tmp, &free_list, sess_list) {
|
|
|
|
sess = (struct iscsi_session *)se_sess->fabric_sess_ptr;
|
|
|
|
|
2020-03-14 01:06:55 +08:00
|
|
|
list_del_init(&se_sess->sess_list);
|
2020-03-14 01:06:54 +08:00
|
|
|
iscsit_stop_session(sess, 1, 1);
|
2020-03-14 01:06:55 +08:00
|
|
|
iscsit_dec_session_usage_count(sess);
|
2011-07-23 14:43:04 +08:00
|
|
|
session_count++;
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_debug("Released %d iSCSI Session(s) from Target Portal"
|
|
|
|
" Group: %hu\n", session_count, tpg->tpgt);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
MODULE_DESCRIPTION("iSCSI-Target Driver for mainline target infrastructure");
|
|
|
|
MODULE_VERSION("4.1.x");
|
|
|
|
MODULE_AUTHOR("nab@Linux-iSCSI.org");
|
|
|
|
MODULE_LICENSE("GPL");
|
|
|
|
|
|
|
|
module_init(iscsi_target_init_module);
|
|
|
|
module_exit(iscsi_target_cleanup_module);
|