iscsi_target.c 121 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501
  1. /*******************************************************************************
  2. * This file contains main functions related to the iSCSI Target Core Driver.
  3. *
  4. * \u00a9 Copyright 2007-2011 RisingTide Systems LLC.
  5. *
  6. * Licensed to the Linux Foundation under the General Public License (GPL) version 2.
  7. *
  8. * Author: Nicholas A. Bellinger <nab@linux-iscsi.org>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License as published by
  12. * the Free Software Foundation; either version 2 of the License, or
  13. * (at your option) any later version.
  14. *
  15. * This program is distributed in the hope that it will be useful,
  16. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. * GNU General Public License for more details.
  19. ******************************************************************************/
  20. #include <linux/string.h>
  21. #include <linux/kthread.h>
  22. #include <linux/crypto.h>
  23. #include <linux/completion.h>
  24. #include <linux/module.h>
  25. #include <linux/idr.h>
  26. #include <asm/unaligned.h>
  27. #include <scsi/scsi_device.h>
  28. #include <scsi/iscsi_proto.h>
  29. #include <target/target_core_base.h>
  30. #include <target/target_core_fabric.h>
  31. #include "iscsi_target_core.h"
  32. #include "iscsi_target_parameters.h"
  33. #include "iscsi_target_seq_pdu_list.h"
  34. #include "iscsi_target_tq.h"
  35. #include "iscsi_target_configfs.h"
  36. #include "iscsi_target_datain_values.h"
  37. #include "iscsi_target_erl0.h"
  38. #include "iscsi_target_erl1.h"
  39. #include "iscsi_target_erl2.h"
  40. #include "iscsi_target_login.h"
  41. #include "iscsi_target_tmr.h"
  42. #include "iscsi_target_tpg.h"
  43. #include "iscsi_target_util.h"
  44. #include "iscsi_target.h"
  45. #include "iscsi_target_device.h"
  46. #include "iscsi_target_stat.h"
  47. static LIST_HEAD(g_tiqn_list);
  48. static LIST_HEAD(g_np_list);
  49. static DEFINE_SPINLOCK(tiqn_lock);
  50. static DEFINE_SPINLOCK(np_lock);
  51. static struct idr tiqn_idr;
  52. struct idr sess_idr;
  53. struct mutex auth_id_lock;
  54. spinlock_t sess_idr_lock;
  55. struct iscsit_global *iscsit_global;
  56. struct kmem_cache *lio_cmd_cache;
  57. struct kmem_cache *lio_qr_cache;
  58. struct kmem_cache *lio_dr_cache;
  59. struct kmem_cache *lio_ooo_cache;
  60. struct kmem_cache *lio_r2t_cache;
  61. static int iscsit_handle_immediate_data(struct iscsi_cmd *,
  62. unsigned char *buf, u32);
  63. static int iscsit_logout_post_handler(struct iscsi_cmd *, struct iscsi_conn *);
  64. struct iscsi_tiqn *iscsit_get_tiqn_for_login(unsigned char *buf)
  65. {
  66. struct iscsi_tiqn *tiqn = NULL;
  67. spin_lock(&tiqn_lock);
  68. list_for_each_entry(tiqn, &g_tiqn_list, tiqn_list) {
  69. if (!strcmp(tiqn->tiqn, buf)) {
  70. spin_lock(&tiqn->tiqn_state_lock);
  71. if (tiqn->tiqn_state == TIQN_STATE_ACTIVE) {
  72. tiqn->tiqn_access_count++;
  73. spin_unlock(&tiqn->tiqn_state_lock);
  74. spin_unlock(&tiqn_lock);
  75. return tiqn;
  76. }
  77. spin_unlock(&tiqn->tiqn_state_lock);
  78. }
  79. }
  80. spin_unlock(&tiqn_lock);
  81. return NULL;
  82. }
  83. static int iscsit_set_tiqn_shutdown(struct iscsi_tiqn *tiqn)
  84. {
  85. spin_lock(&tiqn->tiqn_state_lock);
  86. if (tiqn->tiqn_state == TIQN_STATE_ACTIVE) {
  87. tiqn->tiqn_state = TIQN_STATE_SHUTDOWN;
  88. spin_unlock(&tiqn->tiqn_state_lock);
  89. return 0;
  90. }
  91. spin_unlock(&tiqn->tiqn_state_lock);
  92. return -1;
  93. }
  94. void iscsit_put_tiqn_for_login(struct iscsi_tiqn *tiqn)
  95. {
  96. spin_lock(&tiqn->tiqn_state_lock);
  97. tiqn->tiqn_access_count--;
  98. spin_unlock(&tiqn->tiqn_state_lock);
  99. }
  100. /*
  101. * Note that IQN formatting is expected to be done in userspace, and
  102. * no explict IQN format checks are done here.
  103. */
  104. struct iscsi_tiqn *iscsit_add_tiqn(unsigned char *buf)
  105. {
  106. struct iscsi_tiqn *tiqn = NULL;
  107. int ret;
  108. if (strlen(buf) >= ISCSI_IQN_LEN) {
  109. pr_err("Target IQN exceeds %d bytes\n",
  110. ISCSI_IQN_LEN);
  111. return ERR_PTR(-EINVAL);
  112. }
  113. tiqn = kzalloc(sizeof(struct iscsi_tiqn), GFP_KERNEL);
  114. if (!tiqn) {
  115. pr_err("Unable to allocate struct iscsi_tiqn\n");
  116. return ERR_PTR(-ENOMEM);
  117. }
  118. sprintf(tiqn->tiqn, "%s", buf);
  119. INIT_LIST_HEAD(&tiqn->tiqn_list);
  120. INIT_LIST_HEAD(&tiqn->tiqn_tpg_list);
  121. spin_lock_init(&tiqn->tiqn_state_lock);
  122. spin_lock_init(&tiqn->tiqn_tpg_lock);
  123. spin_lock_init(&tiqn->sess_err_stats.lock);
  124. spin_lock_init(&tiqn->login_stats.lock);
  125. spin_lock_init(&tiqn->logout_stats.lock);
  126. if (!idr_pre_get(&tiqn_idr, GFP_KERNEL)) {
  127. pr_err("idr_pre_get() for tiqn_idr failed\n");
  128. kfree(tiqn);
  129. return ERR_PTR(-ENOMEM);
  130. }
  131. tiqn->tiqn_state = TIQN_STATE_ACTIVE;
  132. spin_lock(&tiqn_lock);
  133. ret = idr_get_new(&tiqn_idr, NULL, &tiqn->tiqn_index);
  134. if (ret < 0) {
  135. pr_err("idr_get_new() failed for tiqn->tiqn_index\n");
  136. spin_unlock(&tiqn_lock);
  137. kfree(tiqn);
  138. return ERR_PTR(ret);
  139. }
  140. list_add_tail(&tiqn->tiqn_list, &g_tiqn_list);
  141. spin_unlock(&tiqn_lock);
  142. pr_debug("CORE[0] - Added iSCSI Target IQN: %s\n", tiqn->tiqn);
  143. return tiqn;
  144. }
  145. static void iscsit_wait_for_tiqn(struct iscsi_tiqn *tiqn)
  146. {
  147. /*
  148. * Wait for accesses to said struct iscsi_tiqn to end.
  149. */
  150. spin_lock(&tiqn->tiqn_state_lock);
  151. while (tiqn->tiqn_access_count != 0) {
  152. spin_unlock(&tiqn->tiqn_state_lock);
  153. msleep(10);
  154. spin_lock(&tiqn->tiqn_state_lock);
  155. }
  156. spin_unlock(&tiqn->tiqn_state_lock);
  157. }
  158. void iscsit_del_tiqn(struct iscsi_tiqn *tiqn)
  159. {
  160. /*
  161. * iscsit_set_tiqn_shutdown sets tiqn->tiqn_state = TIQN_STATE_SHUTDOWN
  162. * while holding tiqn->tiqn_state_lock. This means that all subsequent
  163. * attempts to access this struct iscsi_tiqn will fail from both transport
  164. * fabric and control code paths.
  165. */
  166. if (iscsit_set_tiqn_shutdown(tiqn) < 0) {
  167. pr_err("iscsit_set_tiqn_shutdown() failed\n");
  168. return;
  169. }
  170. iscsit_wait_for_tiqn(tiqn);
  171. spin_lock(&tiqn_lock);
  172. list_del(&tiqn->tiqn_list);
  173. idr_remove(&tiqn_idr, tiqn->tiqn_index);
  174. spin_unlock(&tiqn_lock);
  175. pr_debug("CORE[0] - Deleted iSCSI Target IQN: %s\n",
  176. tiqn->tiqn);
  177. kfree(tiqn);
  178. }
  179. int iscsit_access_np(struct iscsi_np *np, struct iscsi_portal_group *tpg)
  180. {
  181. int ret;
  182. /*
  183. * Determine if the network portal is accepting storage traffic.
  184. */
  185. spin_lock_bh(&np->np_thread_lock);
  186. if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
  187. spin_unlock_bh(&np->np_thread_lock);
  188. return -1;
  189. }
  190. if (np->np_login_tpg) {
  191. pr_err("np->np_login_tpg() is not NULL!\n");
  192. spin_unlock_bh(&np->np_thread_lock);
  193. return -1;
  194. }
  195. spin_unlock_bh(&np->np_thread_lock);
  196. /*
  197. * Determine if the portal group is accepting storage traffic.
  198. */
  199. spin_lock_bh(&tpg->tpg_state_lock);
  200. if (tpg->tpg_state != TPG_STATE_ACTIVE) {
  201. spin_unlock_bh(&tpg->tpg_state_lock);
  202. return -1;
  203. }
  204. spin_unlock_bh(&tpg->tpg_state_lock);
  205. /*
  206. * Here we serialize access across the TIQN+TPG Tuple.
  207. */
  208. ret = mutex_lock_interruptible(&tpg->np_login_lock);
  209. if ((ret != 0) || signal_pending(current))
  210. return -1;
  211. spin_lock_bh(&np->np_thread_lock);
  212. np->np_login_tpg = tpg;
  213. spin_unlock_bh(&np->np_thread_lock);
  214. return 0;
  215. }
  216. int iscsit_deaccess_np(struct iscsi_np *np, struct iscsi_portal_group *tpg)
  217. {
  218. struct iscsi_tiqn *tiqn = tpg->tpg_tiqn;
  219. spin_lock_bh(&np->np_thread_lock);
  220. np->np_login_tpg = NULL;
  221. spin_unlock_bh(&np->np_thread_lock);
  222. mutex_unlock(&tpg->np_login_lock);
  223. if (tiqn)
  224. iscsit_put_tiqn_for_login(tiqn);
  225. return 0;
  226. }
  227. static struct iscsi_np *iscsit_get_np(
  228. struct __kernel_sockaddr_storage *sockaddr,
  229. int network_transport)
  230. {
  231. struct sockaddr_in *sock_in, *sock_in_e;
  232. struct sockaddr_in6 *sock_in6, *sock_in6_e;
  233. struct iscsi_np *np;
  234. int ip_match = 0;
  235. u16 port;
  236. spin_lock_bh(&np_lock);
  237. list_for_each_entry(np, &g_np_list, np_list) {
  238. spin_lock(&np->np_thread_lock);
  239. if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
  240. spin_unlock(&np->np_thread_lock);
  241. continue;
  242. }
  243. if (sockaddr->ss_family == AF_INET6) {
  244. sock_in6 = (struct sockaddr_in6 *)sockaddr;
  245. sock_in6_e = (struct sockaddr_in6 *)&np->np_sockaddr;
  246. if (!memcmp(&sock_in6->sin6_addr.in6_u,
  247. &sock_in6_e->sin6_addr.in6_u,
  248. sizeof(struct in6_addr)))
  249. ip_match = 1;
  250. port = ntohs(sock_in6->sin6_port);
  251. } else {
  252. sock_in = (struct sockaddr_in *)sockaddr;
  253. sock_in_e = (struct sockaddr_in *)&np->np_sockaddr;
  254. if (sock_in->sin_addr.s_addr ==
  255. sock_in_e->sin_addr.s_addr)
  256. ip_match = 1;
  257. port = ntohs(sock_in->sin_port);
  258. }
  259. if ((ip_match == 1) && (np->np_port == port) &&
  260. (np->np_network_transport == network_transport)) {
  261. /*
  262. * Increment the np_exports reference count now to
  263. * prevent iscsit_del_np() below from being called
  264. * while iscsi_tpg_add_network_portal() is called.
  265. */
  266. np->np_exports++;
  267. spin_unlock(&np->np_thread_lock);
  268. spin_unlock_bh(&np_lock);
  269. return np;
  270. }
  271. spin_unlock(&np->np_thread_lock);
  272. }
  273. spin_unlock_bh(&np_lock);
  274. return NULL;
  275. }
  276. struct iscsi_np *iscsit_add_np(
  277. struct __kernel_sockaddr_storage *sockaddr,
  278. char *ip_str,
  279. int network_transport)
  280. {
  281. struct sockaddr_in *sock_in;
  282. struct sockaddr_in6 *sock_in6;
  283. struct iscsi_np *np;
  284. int ret;
  285. /*
  286. * Locate the existing struct iscsi_np if already active..
  287. */
  288. np = iscsit_get_np(sockaddr, network_transport);
  289. if (np)
  290. return np;
  291. np = kzalloc(sizeof(struct iscsi_np), GFP_KERNEL);
  292. if (!np) {
  293. pr_err("Unable to allocate memory for struct iscsi_np\n");
  294. return ERR_PTR(-ENOMEM);
  295. }
  296. np->np_flags |= NPF_IP_NETWORK;
  297. if (sockaddr->ss_family == AF_INET6) {
  298. sock_in6 = (struct sockaddr_in6 *)sockaddr;
  299. snprintf(np->np_ip, IPV6_ADDRESS_SPACE, "%s", ip_str);
  300. np->np_port = ntohs(sock_in6->sin6_port);
  301. } else {
  302. sock_in = (struct sockaddr_in *)sockaddr;
  303. sprintf(np->np_ip, "%s", ip_str);
  304. np->np_port = ntohs(sock_in->sin_port);
  305. }
  306. np->np_network_transport = network_transport;
  307. spin_lock_init(&np->np_thread_lock);
  308. init_completion(&np->np_restart_comp);
  309. INIT_LIST_HEAD(&np->np_list);
  310. ret = iscsi_target_setup_login_socket(np, sockaddr);
  311. if (ret != 0) {
  312. kfree(np);
  313. return ERR_PTR(ret);
  314. }
  315. np->np_thread = kthread_run(iscsi_target_login_thread, np, "iscsi_np");
  316. if (IS_ERR(np->np_thread)) {
  317. pr_err("Unable to create kthread: iscsi_np\n");
  318. ret = PTR_ERR(np->np_thread);
  319. kfree(np);
  320. return ERR_PTR(ret);
  321. }
  322. /*
  323. * Increment the np_exports reference count now to prevent
  324. * iscsit_del_np() below from being run while a new call to
  325. * iscsi_tpg_add_network_portal() for a matching iscsi_np is
  326. * active. We don't need to hold np->np_thread_lock at this
  327. * point because iscsi_np has not been added to g_np_list yet.
  328. */
  329. np->np_exports = 1;
  330. spin_lock_bh(&np_lock);
  331. list_add_tail(&np->np_list, &g_np_list);
  332. spin_unlock_bh(&np_lock);
  333. pr_debug("CORE[0] - Added Network Portal: %s:%hu on %s\n",
  334. np->np_ip, np->np_port, (np->np_network_transport == ISCSI_TCP) ?
  335. "TCP" : "SCTP");
  336. return np;
  337. }
  338. int iscsit_reset_np_thread(
  339. struct iscsi_np *np,
  340. struct iscsi_tpg_np *tpg_np,
  341. struct iscsi_portal_group *tpg)
  342. {
  343. spin_lock_bh(&np->np_thread_lock);
  344. if (tpg && tpg_np) {
  345. /*
  346. * The reset operation need only be performed when the
  347. * passed struct iscsi_portal_group has a login in progress
  348. * to one of the network portals.
  349. */
  350. if (tpg_np->tpg_np->np_login_tpg != tpg) {
  351. spin_unlock_bh(&np->np_thread_lock);
  352. return 0;
  353. }
  354. }
  355. if (np->np_thread_state == ISCSI_NP_THREAD_INACTIVE) {
  356. spin_unlock_bh(&np->np_thread_lock);
  357. return 0;
  358. }
  359. np->np_thread_state = ISCSI_NP_THREAD_RESET;
  360. if (np->np_thread) {
  361. spin_unlock_bh(&np->np_thread_lock);
  362. send_sig(SIGINT, np->np_thread, 1);
  363. wait_for_completion(&np->np_restart_comp);
  364. spin_lock_bh(&np->np_thread_lock);
  365. }
  366. spin_unlock_bh(&np->np_thread_lock);
  367. return 0;
  368. }
  369. int iscsit_del_np_comm(struct iscsi_np *np)
  370. {
  371. if (!np->np_socket)
  372. return 0;
  373. /*
  374. * Some network transports allocate their own struct sock->file,
  375. * see if we need to free any additional allocated resources.
  376. */
  377. if (np->np_flags & NPF_SCTP_STRUCT_FILE) {
  378. kfree(np->np_socket->file);
  379. np->np_socket->file = NULL;
  380. }
  381. sock_release(np->np_socket);
  382. return 0;
  383. }
  384. int iscsit_del_np(struct iscsi_np *np)
  385. {
  386. spin_lock_bh(&np->np_thread_lock);
  387. np->np_exports--;
  388. if (np->np_exports) {
  389. spin_unlock_bh(&np->np_thread_lock);
  390. return 0;
  391. }
  392. np->np_thread_state = ISCSI_NP_THREAD_SHUTDOWN;
  393. spin_unlock_bh(&np->np_thread_lock);
  394. if (np->np_thread) {
  395. /*
  396. * We need to send the signal to wakeup Linux/Net
  397. * which may be sleeping in sock_accept()..
  398. */
  399. send_sig(SIGINT, np->np_thread, 1);
  400. kthread_stop(np->np_thread);
  401. }
  402. iscsit_del_np_comm(np);
  403. spin_lock_bh(&np_lock);
  404. list_del(&np->np_list);
  405. spin_unlock_bh(&np_lock);
  406. pr_debug("CORE[0] - Removed Network Portal: %s:%hu on %s\n",
  407. np->np_ip, np->np_port, (np->np_network_transport == ISCSI_TCP) ?
  408. "TCP" : "SCTP");
  409. kfree(np);
  410. return 0;
  411. }
  412. static int __init iscsi_target_init_module(void)
  413. {
  414. int ret = 0;
  415. pr_debug("iSCSI-Target "ISCSIT_VERSION"\n");
  416. iscsit_global = kzalloc(sizeof(struct iscsit_global), GFP_KERNEL);
  417. if (!iscsit_global) {
  418. pr_err("Unable to allocate memory for iscsit_global\n");
  419. return -1;
  420. }
  421. mutex_init(&auth_id_lock);
  422. spin_lock_init(&sess_idr_lock);
  423. idr_init(&tiqn_idr);
  424. idr_init(&sess_idr);
  425. ret = iscsi_target_register_configfs();
  426. if (ret < 0)
  427. goto out;
  428. ret = iscsi_thread_set_init();
  429. if (ret < 0)
  430. goto configfs_out;
  431. if (iscsi_allocate_thread_sets(TARGET_THREAD_SET_COUNT) !=
  432. TARGET_THREAD_SET_COUNT) {
  433. pr_err("iscsi_allocate_thread_sets() returned"
  434. " unexpected value!\n");
  435. goto ts_out1;
  436. }
  437. lio_cmd_cache = kmem_cache_create("lio_cmd_cache",
  438. sizeof(struct iscsi_cmd), __alignof__(struct iscsi_cmd),
  439. 0, NULL);
  440. if (!lio_cmd_cache) {
  441. pr_err("Unable to kmem_cache_create() for"
  442. " lio_cmd_cache\n");
  443. goto ts_out2;
  444. }
  445. lio_qr_cache = kmem_cache_create("lio_qr_cache",
  446. sizeof(struct iscsi_queue_req),
  447. __alignof__(struct iscsi_queue_req), 0, NULL);
  448. if (!lio_qr_cache) {
  449. pr_err("nable to kmem_cache_create() for"
  450. " lio_qr_cache\n");
  451. goto cmd_out;
  452. }
  453. lio_dr_cache = kmem_cache_create("lio_dr_cache",
  454. sizeof(struct iscsi_datain_req),
  455. __alignof__(struct iscsi_datain_req), 0, NULL);
  456. if (!lio_dr_cache) {
  457. pr_err("Unable to kmem_cache_create() for"
  458. " lio_dr_cache\n");
  459. goto qr_out;
  460. }
  461. lio_ooo_cache = kmem_cache_create("lio_ooo_cache",
  462. sizeof(struct iscsi_ooo_cmdsn),
  463. __alignof__(struct iscsi_ooo_cmdsn), 0, NULL);
  464. if (!lio_ooo_cache) {
  465. pr_err("Unable to kmem_cache_create() for"
  466. " lio_ooo_cache\n");
  467. goto dr_out;
  468. }
  469. lio_r2t_cache = kmem_cache_create("lio_r2t_cache",
  470. sizeof(struct iscsi_r2t), __alignof__(struct iscsi_r2t),
  471. 0, NULL);
  472. if (!lio_r2t_cache) {
  473. pr_err("Unable to kmem_cache_create() for"
  474. " lio_r2t_cache\n");
  475. goto ooo_out;
  476. }
  477. if (iscsit_load_discovery_tpg() < 0)
  478. goto r2t_out;
  479. return ret;
  480. r2t_out:
  481. kmem_cache_destroy(lio_r2t_cache);
  482. ooo_out:
  483. kmem_cache_destroy(lio_ooo_cache);
  484. dr_out:
  485. kmem_cache_destroy(lio_dr_cache);
  486. qr_out:
  487. kmem_cache_destroy(lio_qr_cache);
  488. cmd_out:
  489. kmem_cache_destroy(lio_cmd_cache);
  490. ts_out2:
  491. iscsi_deallocate_thread_sets();
  492. ts_out1:
  493. iscsi_thread_set_free();
  494. configfs_out:
  495. iscsi_target_deregister_configfs();
  496. out:
  497. kfree(iscsit_global);
  498. return -ENOMEM;
  499. }
  500. static void __exit iscsi_target_cleanup_module(void)
  501. {
  502. iscsi_deallocate_thread_sets();
  503. iscsi_thread_set_free();
  504. iscsit_release_discovery_tpg();
  505. kmem_cache_destroy(lio_cmd_cache);
  506. kmem_cache_destroy(lio_qr_cache);
  507. kmem_cache_destroy(lio_dr_cache);
  508. kmem_cache_destroy(lio_ooo_cache);
  509. kmem_cache_destroy(lio_r2t_cache);
  510. iscsi_target_deregister_configfs();
  511. kfree(iscsit_global);
  512. }
  513. static int iscsit_add_reject(
  514. u8 reason,
  515. int fail_conn,
  516. unsigned char *buf,
  517. struct iscsi_conn *conn)
  518. {
  519. struct iscsi_cmd *cmd;
  520. struct iscsi_reject *hdr;
  521. int ret;
  522. cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
  523. if (!cmd)
  524. return -1;
  525. cmd->iscsi_opcode = ISCSI_OP_REJECT;
  526. if (fail_conn)
  527. cmd->cmd_flags |= ICF_REJECT_FAIL_CONN;
  528. hdr = (struct iscsi_reject *) cmd->pdu;
  529. hdr->reason = reason;
  530. cmd->buf_ptr = kmemdup(buf, ISCSI_HDR_LEN, GFP_KERNEL);
  531. if (!cmd->buf_ptr) {
  532. pr_err("Unable to allocate memory for cmd->buf_ptr\n");
  533. iscsit_release_cmd(cmd);
  534. return -1;
  535. }
  536. spin_lock_bh(&conn->cmd_lock);
  537. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  538. spin_unlock_bh(&conn->cmd_lock);
  539. cmd->i_state = ISTATE_SEND_REJECT;
  540. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  541. ret = wait_for_completion_interruptible(&cmd->reject_comp);
  542. if (ret != 0)
  543. return -1;
  544. return (!fail_conn) ? 0 : -1;
  545. }
  546. int iscsit_add_reject_from_cmd(
  547. u8 reason,
  548. int fail_conn,
  549. int add_to_conn,
  550. unsigned char *buf,
  551. struct iscsi_cmd *cmd)
  552. {
  553. struct iscsi_conn *conn;
  554. struct iscsi_reject *hdr;
  555. int ret;
  556. if (!cmd->conn) {
  557. pr_err("cmd->conn is NULL for ITT: 0x%08x\n",
  558. cmd->init_task_tag);
  559. return -1;
  560. }
  561. conn = cmd->conn;
  562. cmd->iscsi_opcode = ISCSI_OP_REJECT;
  563. if (fail_conn)
  564. cmd->cmd_flags |= ICF_REJECT_FAIL_CONN;
  565. hdr = (struct iscsi_reject *) cmd->pdu;
  566. hdr->reason = reason;
  567. cmd->buf_ptr = kmemdup(buf, ISCSI_HDR_LEN, GFP_KERNEL);
  568. if (!cmd->buf_ptr) {
  569. pr_err("Unable to allocate memory for cmd->buf_ptr\n");
  570. iscsit_release_cmd(cmd);
  571. return -1;
  572. }
  573. if (add_to_conn) {
  574. spin_lock_bh(&conn->cmd_lock);
  575. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  576. spin_unlock_bh(&conn->cmd_lock);
  577. }
  578. cmd->i_state = ISTATE_SEND_REJECT;
  579. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  580. ret = wait_for_completion_interruptible(&cmd->reject_comp);
  581. if (ret != 0)
  582. return -1;
  583. return (!fail_conn) ? 0 : -1;
  584. }
  585. /*
  586. * Map some portion of the allocated scatterlist to an iovec, suitable for
  587. * kernel sockets to copy data in/out. This handles both pages and slab-allocated
  588. * buffers, since we have been tricky and mapped t_mem_sg to the buffer in
  589. * either case (see iscsit_alloc_buffs)
  590. */
  591. static int iscsit_map_iovec(
  592. struct iscsi_cmd *cmd,
  593. struct kvec *iov,
  594. u32 data_offset,
  595. u32 data_length)
  596. {
  597. u32 i = 0;
  598. struct scatterlist *sg;
  599. unsigned int page_off;
  600. /*
  601. * We have a private mapping of the allocated pages in t_mem_sg.
  602. * At this point, we also know each contains a page.
  603. */
  604. sg = &cmd->t_mem_sg[data_offset / PAGE_SIZE];
  605. page_off = (data_offset % PAGE_SIZE);
  606. cmd->first_data_sg = sg;
  607. cmd->first_data_sg_off = page_off;
  608. while (data_length) {
  609. u32 cur_len = min_t(u32, data_length, sg->length - page_off);
  610. iov[i].iov_base = kmap(sg_page(sg)) + sg->offset + page_off;
  611. iov[i].iov_len = cur_len;
  612. data_length -= cur_len;
  613. page_off = 0;
  614. sg = sg_next(sg);
  615. i++;
  616. }
  617. cmd->kmapped_nents = i;
  618. return i;
  619. }
  620. static void iscsit_unmap_iovec(struct iscsi_cmd *cmd)
  621. {
  622. u32 i;
  623. struct scatterlist *sg;
  624. sg = cmd->first_data_sg;
  625. for (i = 0; i < cmd->kmapped_nents; i++)
  626. kunmap(sg_page(&sg[i]));
  627. }
  628. static void iscsit_ack_from_expstatsn(struct iscsi_conn *conn, u32 exp_statsn)
  629. {
  630. struct iscsi_cmd *cmd;
  631. conn->exp_statsn = exp_statsn;
  632. spin_lock_bh(&conn->cmd_lock);
  633. list_for_each_entry(cmd, &conn->conn_cmd_list, i_conn_node) {
  634. spin_lock(&cmd->istate_lock);
  635. if ((cmd->i_state == ISTATE_SENT_STATUS) &&
  636. (cmd->stat_sn < exp_statsn)) {
  637. cmd->i_state = ISTATE_REMOVE;
  638. spin_unlock(&cmd->istate_lock);
  639. iscsit_add_cmd_to_immediate_queue(cmd, conn,
  640. cmd->i_state);
  641. continue;
  642. }
  643. spin_unlock(&cmd->istate_lock);
  644. }
  645. spin_unlock_bh(&conn->cmd_lock);
  646. }
  647. static int iscsit_allocate_iovecs(struct iscsi_cmd *cmd)
  648. {
  649. u32 iov_count = (cmd->se_cmd.t_data_nents == 0) ? 1 :
  650. cmd->se_cmd.t_data_nents;
  651. iov_count += ISCSI_IOV_DATA_BUFFER;
  652. cmd->iov_data = kzalloc(iov_count * sizeof(struct kvec), GFP_KERNEL);
  653. if (!cmd->iov_data) {
  654. pr_err("Unable to allocate cmd->iov_data\n");
  655. return -ENOMEM;
  656. }
  657. cmd->orig_iov_data_count = iov_count;
  658. return 0;
  659. }
  660. static int iscsit_alloc_buffs(struct iscsi_cmd *cmd)
  661. {
  662. struct scatterlist *sgl;
  663. u32 length = cmd->se_cmd.data_length;
  664. int nents = DIV_ROUND_UP(length, PAGE_SIZE);
  665. int i = 0, j = 0, ret;
  666. /*
  667. * If no SCSI payload is present, allocate the default iovecs used for
  668. * iSCSI PDU Header
  669. */
  670. if (!length)
  671. return iscsit_allocate_iovecs(cmd);
  672. sgl = kzalloc(sizeof(*sgl) * nents, GFP_KERNEL);
  673. if (!sgl)
  674. return -ENOMEM;
  675. sg_init_table(sgl, nents);
  676. while (length) {
  677. int buf_size = min_t(int, length, PAGE_SIZE);
  678. struct page *page;
  679. page = alloc_page(GFP_KERNEL | __GFP_ZERO);
  680. if (!page)
  681. goto page_alloc_failed;
  682. sg_set_page(&sgl[i], page, buf_size, 0);
  683. length -= buf_size;
  684. i++;
  685. }
  686. cmd->t_mem_sg = sgl;
  687. cmd->t_mem_sg_nents = nents;
  688. /* BIDI ops not supported */
  689. /* Tell the core about our preallocated memory */
  690. transport_generic_map_mem_to_cmd(&cmd->se_cmd, sgl, nents, NULL, 0);
  691. /*
  692. * Allocate iovecs for SCSI payload after transport_generic_map_mem_to_cmd
  693. * so that cmd->se_cmd.t_tasks_se_num has been set.
  694. */
  695. ret = iscsit_allocate_iovecs(cmd);
  696. if (ret < 0)
  697. return -ENOMEM;
  698. return 0;
  699. page_alloc_failed:
  700. while (j < i)
  701. __free_page(sg_page(&sgl[j++]));
  702. kfree(sgl);
  703. return -ENOMEM;
  704. }
  705. static int iscsit_handle_scsi_cmd(
  706. struct iscsi_conn *conn,
  707. unsigned char *buf)
  708. {
  709. int data_direction, cmdsn_ret = 0, immed_ret, ret, transport_ret;
  710. int dump_immediate_data = 0, send_check_condition = 0, payload_length;
  711. struct iscsi_cmd *cmd = NULL;
  712. struct iscsi_scsi_req *hdr;
  713. spin_lock_bh(&conn->sess->session_stats_lock);
  714. conn->sess->cmd_pdus++;
  715. if (conn->sess->se_sess->se_node_acl) {
  716. spin_lock(&conn->sess->se_sess->se_node_acl->stats_lock);
  717. conn->sess->se_sess->se_node_acl->num_cmds++;
  718. spin_unlock(&conn->sess->se_sess->se_node_acl->stats_lock);
  719. }
  720. spin_unlock_bh(&conn->sess->session_stats_lock);
  721. hdr = (struct iscsi_scsi_req *) buf;
  722. payload_length = ntoh24(hdr->dlength);
  723. hdr->itt = be32_to_cpu(hdr->itt);
  724. hdr->data_length = be32_to_cpu(hdr->data_length);
  725. hdr->cmdsn = be32_to_cpu(hdr->cmdsn);
  726. hdr->exp_statsn = be32_to_cpu(hdr->exp_statsn);
  727. /* FIXME; Add checks for AdditionalHeaderSegment */
  728. if (!(hdr->flags & ISCSI_FLAG_CMD_WRITE) &&
  729. !(hdr->flags & ISCSI_FLAG_CMD_FINAL)) {
  730. pr_err("ISCSI_FLAG_CMD_WRITE & ISCSI_FLAG_CMD_FINAL"
  731. " not set. Bad iSCSI Initiator.\n");
  732. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_INVALID, 1,
  733. buf, conn);
  734. }
  735. if (((hdr->flags & ISCSI_FLAG_CMD_READ) ||
  736. (hdr->flags & ISCSI_FLAG_CMD_WRITE)) && !hdr->data_length) {
  737. /*
  738. * Vmware ESX v3.0 uses a modified Cisco Initiator (v3.4.2)
  739. * that adds support for RESERVE/RELEASE. There is a bug
  740. * add with this new functionality that sets R/W bits when
  741. * neither CDB carries any READ or WRITE datapayloads.
  742. */
  743. if ((hdr->cdb[0] == 0x16) || (hdr->cdb[0] == 0x17)) {
  744. hdr->flags &= ~ISCSI_FLAG_CMD_READ;
  745. hdr->flags &= ~ISCSI_FLAG_CMD_WRITE;
  746. goto done;
  747. }
  748. pr_err("ISCSI_FLAG_CMD_READ or ISCSI_FLAG_CMD_WRITE"
  749. " set when Expected Data Transfer Length is 0 for"
  750. " CDB: 0x%02x. Bad iSCSI Initiator.\n", hdr->cdb[0]);
  751. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_INVALID, 1,
  752. buf, conn);
  753. }
  754. done:
  755. if (!(hdr->flags & ISCSI_FLAG_CMD_READ) &&
  756. !(hdr->flags & ISCSI_FLAG_CMD_WRITE) && (hdr->data_length != 0)) {
  757. pr_err("ISCSI_FLAG_CMD_READ and/or ISCSI_FLAG_CMD_WRITE"
  758. " MUST be set if Expected Data Transfer Length is not 0."
  759. " Bad iSCSI Initiator\n");
  760. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_INVALID, 1,
  761. buf, conn);
  762. }
  763. if ((hdr->flags & ISCSI_FLAG_CMD_READ) &&
  764. (hdr->flags & ISCSI_FLAG_CMD_WRITE)) {
  765. pr_err("Bidirectional operations not supported!\n");
  766. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_INVALID, 1,
  767. buf, conn);
  768. }
  769. if (hdr->opcode & ISCSI_OP_IMMEDIATE) {
  770. pr_err("Illegally set Immediate Bit in iSCSI Initiator"
  771. " Scsi Command PDU.\n");
  772. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_INVALID, 1,
  773. buf, conn);
  774. }
  775. if (payload_length && !conn->sess->sess_ops->ImmediateData) {
  776. pr_err("ImmediateData=No but DataSegmentLength=%u,"
  777. " protocol error.\n", payload_length);
  778. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  779. buf, conn);
  780. }
  781. if ((hdr->data_length == payload_length) &&
  782. (!(hdr->flags & ISCSI_FLAG_CMD_FINAL))) {
  783. pr_err("Expected Data Transfer Length and Length of"
  784. " Immediate Data are the same, but ISCSI_FLAG_CMD_FINAL"
  785. " bit is not set protocol error\n");
  786. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  787. buf, conn);
  788. }
  789. if (payload_length > hdr->data_length) {
  790. pr_err("DataSegmentLength: %u is greater than"
  791. " EDTL: %u, protocol error.\n", payload_length,
  792. hdr->data_length);
  793. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  794. buf, conn);
  795. }
  796. if (payload_length > conn->conn_ops->MaxRecvDataSegmentLength) {
  797. pr_err("DataSegmentLength: %u is greater than"
  798. " MaxRecvDataSegmentLength: %u, protocol error.\n",
  799. payload_length, conn->conn_ops->MaxRecvDataSegmentLength);
  800. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  801. buf, conn);
  802. }
  803. if (payload_length > conn->sess->sess_ops->FirstBurstLength) {
  804. pr_err("DataSegmentLength: %u is greater than"
  805. " FirstBurstLength: %u, protocol error.\n",
  806. payload_length, conn->sess->sess_ops->FirstBurstLength);
  807. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_INVALID, 1,
  808. buf, conn);
  809. }
  810. data_direction = (hdr->flags & ISCSI_FLAG_CMD_WRITE) ? DMA_TO_DEVICE :
  811. (hdr->flags & ISCSI_FLAG_CMD_READ) ? DMA_FROM_DEVICE :
  812. DMA_NONE;
  813. cmd = iscsit_allocate_se_cmd(conn, hdr->data_length, data_direction,
  814. (hdr->flags & ISCSI_FLAG_CMD_ATTR_MASK));
  815. if (!cmd)
  816. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_NO_RESOURCES, 1,
  817. buf, conn);
  818. pr_debug("Got SCSI Command, ITT: 0x%08x, CmdSN: 0x%08x,"
  819. " ExpXferLen: %u, Length: %u, CID: %hu\n", hdr->itt,
  820. hdr->cmdsn, hdr->data_length, payload_length, conn->cid);
  821. cmd->iscsi_opcode = ISCSI_OP_SCSI_CMD;
  822. cmd->i_state = ISTATE_NEW_CMD;
  823. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
  824. cmd->immediate_data = (payload_length) ? 1 : 0;
  825. cmd->unsolicited_data = ((!(hdr->flags & ISCSI_FLAG_CMD_FINAL) &&
  826. (hdr->flags & ISCSI_FLAG_CMD_WRITE)) ? 1 : 0);
  827. if (cmd->unsolicited_data)
  828. cmd->cmd_flags |= ICF_NON_IMMEDIATE_UNSOLICITED_DATA;
  829. conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
  830. if (hdr->flags & ISCSI_FLAG_CMD_READ) {
  831. spin_lock_bh(&conn->sess->ttt_lock);
  832. cmd->targ_xfer_tag = conn->sess->targ_xfer_tag++;
  833. if (cmd->targ_xfer_tag == 0xFFFFFFFF)
  834. cmd->targ_xfer_tag = conn->sess->targ_xfer_tag++;
  835. spin_unlock_bh(&conn->sess->ttt_lock);
  836. } else if (hdr->flags & ISCSI_FLAG_CMD_WRITE)
  837. cmd->targ_xfer_tag = 0xFFFFFFFF;
  838. cmd->cmd_sn = hdr->cmdsn;
  839. cmd->exp_stat_sn = hdr->exp_statsn;
  840. cmd->first_burst_len = payload_length;
  841. if (cmd->data_direction == DMA_FROM_DEVICE) {
  842. struct iscsi_datain_req *dr;
  843. dr = iscsit_allocate_datain_req();
  844. if (!dr)
  845. return iscsit_add_reject_from_cmd(
  846. ISCSI_REASON_BOOKMARK_NO_RESOURCES,
  847. 1, 1, buf, cmd);
  848. iscsit_attach_datain_req(cmd, dr);
  849. }
  850. /*
  851. * The CDB is going to an se_device_t.
  852. */
  853. ret = transport_lookup_cmd_lun(&cmd->se_cmd,
  854. scsilun_to_int(&hdr->lun));
  855. if (ret < 0) {
  856. if (cmd->se_cmd.scsi_sense_reason == TCM_NON_EXISTENT_LUN) {
  857. pr_debug("Responding to non-acl'ed,"
  858. " non-existent or non-exported iSCSI LUN:"
  859. " 0x%016Lx\n", get_unaligned_le64(&hdr->lun));
  860. }
  861. send_check_condition = 1;
  862. goto attach_cmd;
  863. }
  864. transport_ret = target_setup_cmd_from_cdb(&cmd->se_cmd, hdr->cdb);
  865. if (transport_ret == -ENOMEM) {
  866. return iscsit_add_reject_from_cmd(
  867. ISCSI_REASON_BOOKMARK_NO_RESOURCES,
  868. 1, 1, buf, cmd);
  869. } else if (transport_ret < 0) {
  870. /*
  871. * Unsupported SAM Opcode. CHECK_CONDITION will be sent
  872. * in iscsit_execute_cmd() during the CmdSN OOO Execution
  873. * Mechinism.
  874. */
  875. send_check_condition = 1;
  876. } else {
  877. cmd->data_length = cmd->se_cmd.data_length;
  878. if (iscsit_decide_list_to_build(cmd, payload_length) < 0)
  879. return iscsit_add_reject_from_cmd(
  880. ISCSI_REASON_BOOKMARK_NO_RESOURCES,
  881. 1, 1, buf, cmd);
  882. }
  883. attach_cmd:
  884. spin_lock_bh(&conn->cmd_lock);
  885. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  886. spin_unlock_bh(&conn->cmd_lock);
  887. /*
  888. * Check if we need to delay processing because of ALUA
  889. * Active/NonOptimized primary access state..
  890. */
  891. core_alua_check_nonop_delay(&cmd->se_cmd);
  892. /*
  893. * Allocate and setup SGL used with transport_generic_map_mem_to_cmd().
  894. * also call iscsit_allocate_iovecs()
  895. */
  896. ret = iscsit_alloc_buffs(cmd);
  897. if (ret < 0)
  898. return iscsit_add_reject_from_cmd(
  899. ISCSI_REASON_BOOKMARK_NO_RESOURCES,
  900. 1, 0, buf, cmd);
  901. /*
  902. * Check the CmdSN against ExpCmdSN/MaxCmdSN here if
  903. * the Immediate Bit is not set, and no Immediate
  904. * Data is attached.
  905. *
  906. * A PDU/CmdSN carrying Immediate Data can only
  907. * be processed after the DataCRC has passed.
  908. * If the DataCRC fails, the CmdSN MUST NOT
  909. * be acknowledged. (See below)
  910. */
  911. if (!cmd->immediate_data) {
  912. cmdsn_ret = iscsit_sequence_cmd(conn, cmd, hdr->cmdsn);
  913. if (cmdsn_ret == CMDSN_LOWER_THAN_EXP)
  914. return 0;
  915. else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  916. return iscsit_add_reject_from_cmd(
  917. ISCSI_REASON_PROTOCOL_ERROR,
  918. 1, 0, buf, cmd);
  919. }
  920. iscsit_ack_from_expstatsn(conn, hdr->exp_statsn);
  921. /*
  922. * If no Immediate Data is attached, it's OK to return now.
  923. */
  924. if (!cmd->immediate_data) {
  925. if (send_check_condition)
  926. return 0;
  927. if (cmd->unsolicited_data) {
  928. iscsit_set_dataout_sequence_values(cmd);
  929. spin_lock_bh(&cmd->dataout_timeout_lock);
  930. iscsit_start_dataout_timer(cmd, cmd->conn);
  931. spin_unlock_bh(&cmd->dataout_timeout_lock);
  932. }
  933. return 0;
  934. }
  935. /*
  936. * Early CHECK_CONDITIONs never make it to the transport processing
  937. * thread. They are processed in CmdSN order by
  938. * iscsit_check_received_cmdsn() below.
  939. */
  940. if (send_check_condition) {
  941. immed_ret = IMMEDIATE_DATA_NORMAL_OPERATION;
  942. dump_immediate_data = 1;
  943. goto after_immediate_data;
  944. }
  945. /*
  946. * Call directly into transport_generic_new_cmd() to perform
  947. * the backend memory allocation.
  948. */
  949. ret = transport_generic_new_cmd(&cmd->se_cmd);
  950. if (ret < 0) {
  951. immed_ret = IMMEDIATE_DATA_NORMAL_OPERATION;
  952. dump_immediate_data = 1;
  953. goto after_immediate_data;
  954. }
  955. immed_ret = iscsit_handle_immediate_data(cmd, buf, payload_length);
  956. after_immediate_data:
  957. if (immed_ret == IMMEDIATE_DATA_NORMAL_OPERATION) {
  958. /*
  959. * A PDU/CmdSN carrying Immediate Data passed
  960. * DataCRC, check against ExpCmdSN/MaxCmdSN if
  961. * Immediate Bit is not set.
  962. */
  963. cmdsn_ret = iscsit_sequence_cmd(conn, cmd, hdr->cmdsn);
  964. /*
  965. * Special case for Unsupported SAM WRITE Opcodes
  966. * and ImmediateData=Yes.
  967. */
  968. if (dump_immediate_data) {
  969. if (iscsit_dump_data_payload(conn, payload_length, 1) < 0)
  970. return -1;
  971. } else if (cmd->unsolicited_data) {
  972. iscsit_set_dataout_sequence_values(cmd);
  973. spin_lock_bh(&cmd->dataout_timeout_lock);
  974. iscsit_start_dataout_timer(cmd, cmd->conn);
  975. spin_unlock_bh(&cmd->dataout_timeout_lock);
  976. }
  977. if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  978. return iscsit_add_reject_from_cmd(
  979. ISCSI_REASON_PROTOCOL_ERROR,
  980. 1, 0, buf, cmd);
  981. } else if (immed_ret == IMMEDIATE_DATA_ERL1_CRC_FAILURE) {
  982. /*
  983. * Immediate Data failed DataCRC and ERL>=1,
  984. * silently drop this PDU and let the initiator
  985. * plug the CmdSN gap.
  986. *
  987. * FIXME: Send Unsolicited NOPIN with reserved
  988. * TTT here to help the initiator figure out
  989. * the missing CmdSN, although they should be
  990. * intelligent enough to determine the missing
  991. * CmdSN and issue a retry to plug the sequence.
  992. */
  993. cmd->i_state = ISTATE_REMOVE;
  994. iscsit_add_cmd_to_immediate_queue(cmd, conn, cmd->i_state);
  995. } else /* immed_ret == IMMEDIATE_DATA_CANNOT_RECOVER */
  996. return -1;
  997. return 0;
  998. }
  999. static u32 iscsit_do_crypto_hash_sg(
  1000. struct hash_desc *hash,
  1001. struct iscsi_cmd *cmd,
  1002. u32 data_offset,
  1003. u32 data_length,
  1004. u32 padding,
  1005. u8 *pad_bytes)
  1006. {
  1007. u32 data_crc;
  1008. u32 i;
  1009. struct scatterlist *sg;
  1010. unsigned int page_off;
  1011. crypto_hash_init(hash);
  1012. sg = cmd->first_data_sg;
  1013. page_off = cmd->first_data_sg_off;
  1014. i = 0;
  1015. while (data_length) {
  1016. u32 cur_len = min_t(u32, data_length, (sg[i].length - page_off));
  1017. crypto_hash_update(hash, &sg[i], cur_len);
  1018. data_length -= cur_len;
  1019. page_off = 0;
  1020. i++;
  1021. }
  1022. if (padding) {
  1023. struct scatterlist pad_sg;
  1024. sg_init_one(&pad_sg, pad_bytes, padding);
  1025. crypto_hash_update(hash, &pad_sg, padding);
  1026. }
  1027. crypto_hash_final(hash, (u8 *) &data_crc);
  1028. return data_crc;
  1029. }
  1030. static void iscsit_do_crypto_hash_buf(
  1031. struct hash_desc *hash,
  1032. unsigned char *buf,
  1033. u32 payload_length,
  1034. u32 padding,
  1035. u8 *pad_bytes,
  1036. u8 *data_crc)
  1037. {
  1038. struct scatterlist sg;
  1039. crypto_hash_init(hash);
  1040. sg_init_one(&sg, buf, payload_length);
  1041. crypto_hash_update(hash, &sg, payload_length);
  1042. if (padding) {
  1043. sg_init_one(&sg, pad_bytes, padding);
  1044. crypto_hash_update(hash, &sg, padding);
  1045. }
  1046. crypto_hash_final(hash, data_crc);
  1047. }
  1048. static int iscsit_handle_data_out(struct iscsi_conn *conn, unsigned char *buf)
  1049. {
  1050. int iov_ret, ooo_cmdsn = 0, ret;
  1051. u8 data_crc_failed = 0;
  1052. u32 checksum, iov_count = 0, padding = 0, rx_got = 0;
  1053. u32 rx_size = 0, payload_length;
  1054. struct iscsi_cmd *cmd = NULL;
  1055. struct se_cmd *se_cmd;
  1056. struct iscsi_data *hdr;
  1057. struct kvec *iov;
  1058. unsigned long flags;
  1059. hdr = (struct iscsi_data *) buf;
  1060. payload_length = ntoh24(hdr->dlength);
  1061. hdr->itt = be32_to_cpu(hdr->itt);
  1062. hdr->ttt = be32_to_cpu(hdr->ttt);
  1063. hdr->exp_statsn = be32_to_cpu(hdr->exp_statsn);
  1064. hdr->datasn = be32_to_cpu(hdr->datasn);
  1065. hdr->offset = be32_to_cpu(hdr->offset);
  1066. if (!payload_length) {
  1067. pr_err("DataOUT payload is ZERO, protocol error.\n");
  1068. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1069. buf, conn);
  1070. }
  1071. /* iSCSI write */
  1072. spin_lock_bh(&conn->sess->session_stats_lock);
  1073. conn->sess->rx_data_octets += payload_length;
  1074. if (conn->sess->se_sess->se_node_acl) {
  1075. spin_lock(&conn->sess->se_sess->se_node_acl->stats_lock);
  1076. conn->sess->se_sess->se_node_acl->write_bytes += payload_length;
  1077. spin_unlock(&conn->sess->se_sess->se_node_acl->stats_lock);
  1078. }
  1079. spin_unlock_bh(&conn->sess->session_stats_lock);
  1080. if (payload_length > conn->conn_ops->MaxRecvDataSegmentLength) {
  1081. pr_err("DataSegmentLength: %u is greater than"
  1082. " MaxRecvDataSegmentLength: %u\n", payload_length,
  1083. conn->conn_ops->MaxRecvDataSegmentLength);
  1084. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1085. buf, conn);
  1086. }
  1087. cmd = iscsit_find_cmd_from_itt_or_dump(conn, hdr->itt,
  1088. payload_length);
  1089. if (!cmd)
  1090. return 0;
  1091. pr_debug("Got DataOut ITT: 0x%08x, TTT: 0x%08x,"
  1092. " DataSN: 0x%08x, Offset: %u, Length: %u, CID: %hu\n",
  1093. hdr->itt, hdr->ttt, hdr->datasn, hdr->offset,
  1094. payload_length, conn->cid);
  1095. if (cmd->cmd_flags & ICF_GOT_LAST_DATAOUT) {
  1096. pr_err("Command ITT: 0x%08x received DataOUT after"
  1097. " last DataOUT received, dumping payload\n",
  1098. cmd->init_task_tag);
  1099. return iscsit_dump_data_payload(conn, payload_length, 1);
  1100. }
  1101. if (cmd->data_direction != DMA_TO_DEVICE) {
  1102. pr_err("Command ITT: 0x%08x received DataOUT for a"
  1103. " NON-WRITE command.\n", cmd->init_task_tag);
  1104. return iscsit_add_reject_from_cmd(ISCSI_REASON_PROTOCOL_ERROR,
  1105. 1, 0, buf, cmd);
  1106. }
  1107. se_cmd = &cmd->se_cmd;
  1108. iscsit_mod_dataout_timer(cmd);
  1109. if ((hdr->offset + payload_length) > cmd->data_length) {
  1110. pr_err("DataOut Offset: %u, Length %u greater than"
  1111. " iSCSI Command EDTL %u, protocol error.\n",
  1112. hdr->offset, payload_length, cmd->data_length);
  1113. return iscsit_add_reject_from_cmd(ISCSI_REASON_BOOKMARK_INVALID,
  1114. 1, 0, buf, cmd);
  1115. }
  1116. if (cmd->unsolicited_data) {
  1117. int dump_unsolicited_data = 0;
  1118. if (conn->sess->sess_ops->InitialR2T) {
  1119. pr_err("Received unexpected unsolicited data"
  1120. " while InitialR2T=Yes, protocol error.\n");
  1121. transport_send_check_condition_and_sense(&cmd->se_cmd,
  1122. TCM_UNEXPECTED_UNSOLICITED_DATA, 0);
  1123. return -1;
  1124. }
  1125. /*
  1126. * Special case for dealing with Unsolicited DataOUT
  1127. * and Unsupported SAM WRITE Opcodes and SE resource allocation
  1128. * failures;
  1129. */
  1130. /* Something's amiss if we're not in WRITE_PENDING state... */
  1131. spin_lock_irqsave(&se_cmd->t_state_lock, flags);
  1132. WARN_ON(se_cmd->t_state != TRANSPORT_WRITE_PENDING);
  1133. spin_unlock_irqrestore(&se_cmd->t_state_lock, flags);
  1134. spin_lock_irqsave(&se_cmd->t_state_lock, flags);
  1135. if (!(se_cmd->se_cmd_flags & SCF_SUPPORTED_SAM_OPCODE) ||
  1136. (se_cmd->se_cmd_flags & SCF_SCSI_CDB_EXCEPTION))
  1137. dump_unsolicited_data = 1;
  1138. spin_unlock_irqrestore(&se_cmd->t_state_lock, flags);
  1139. if (dump_unsolicited_data) {
  1140. /*
  1141. * Check if a delayed TASK_ABORTED status needs to
  1142. * be sent now if the ISCSI_FLAG_CMD_FINAL has been
  1143. * received with the unsolicitied data out.
  1144. */
  1145. if (hdr->flags & ISCSI_FLAG_CMD_FINAL)
  1146. iscsit_stop_dataout_timer(cmd);
  1147. transport_check_aborted_status(se_cmd,
  1148. (hdr->flags & ISCSI_FLAG_CMD_FINAL));
  1149. return iscsit_dump_data_payload(conn, payload_length, 1);
  1150. }
  1151. } else {
  1152. /*
  1153. * For the normal solicited data path:
  1154. *
  1155. * Check for a delayed TASK_ABORTED status and dump any
  1156. * incoming data out payload if one exists. Also, when the
  1157. * ISCSI_FLAG_CMD_FINAL is set to denote the end of the current
  1158. * data out sequence, we decrement outstanding_r2ts. Once
  1159. * outstanding_r2ts reaches zero, go ahead and send the delayed
  1160. * TASK_ABORTED status.
  1161. */
  1162. if (se_cmd->transport_state & CMD_T_ABORTED) {
  1163. if (hdr->flags & ISCSI_FLAG_CMD_FINAL)
  1164. if (--cmd->outstanding_r2ts < 1) {
  1165. iscsit_stop_dataout_timer(cmd);
  1166. transport_check_aborted_status(
  1167. se_cmd, 1);
  1168. }
  1169. return iscsit_dump_data_payload(conn, payload_length, 1);
  1170. }
  1171. }
  1172. /*
  1173. * Preform DataSN, DataSequenceInOrder, DataPDUInOrder, and
  1174. * within-command recovery checks before receiving the payload.
  1175. */
  1176. ret = iscsit_check_pre_dataout(cmd, buf);
  1177. if (ret == DATAOUT_WITHIN_COMMAND_RECOVERY)
  1178. return 0;
  1179. else if (ret == DATAOUT_CANNOT_RECOVER)
  1180. return -1;
  1181. rx_size += payload_length;
  1182. iov = &cmd->iov_data[0];
  1183. iov_ret = iscsit_map_iovec(cmd, iov, hdr->offset, payload_length);
  1184. if (iov_ret < 0)
  1185. return -1;
  1186. iov_count += iov_ret;
  1187. padding = ((-payload_length) & 3);
  1188. if (padding != 0) {
  1189. iov[iov_count].iov_base = cmd->pad_bytes;
  1190. iov[iov_count++].iov_len = padding;
  1191. rx_size += padding;
  1192. pr_debug("Receiving %u padding bytes.\n", padding);
  1193. }
  1194. if (conn->conn_ops->DataDigest) {
  1195. iov[iov_count].iov_base = &checksum;
  1196. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  1197. rx_size += ISCSI_CRC_LEN;
  1198. }
  1199. rx_got = rx_data(conn, &cmd->iov_data[0], iov_count, rx_size);
  1200. iscsit_unmap_iovec(cmd);
  1201. if (rx_got != rx_size)
  1202. return -1;
  1203. if (conn->conn_ops->DataDigest) {
  1204. u32 data_crc;
  1205. data_crc = iscsit_do_crypto_hash_sg(&conn->conn_rx_hash, cmd,
  1206. hdr->offset, payload_length, padding,
  1207. cmd->pad_bytes);
  1208. if (checksum != data_crc) {
  1209. pr_err("ITT: 0x%08x, Offset: %u, Length: %u,"
  1210. " DataSN: 0x%08x, CRC32C DataDigest 0x%08x"
  1211. " does not match computed 0x%08x\n",
  1212. hdr->itt, hdr->offset, payload_length,
  1213. hdr->datasn, checksum, data_crc);
  1214. data_crc_failed = 1;
  1215. } else {
  1216. pr_debug("Got CRC32C DataDigest 0x%08x for"
  1217. " %u bytes of Data Out\n", checksum,
  1218. payload_length);
  1219. }
  1220. }
  1221. /*
  1222. * Increment post receive data and CRC values or perform
  1223. * within-command recovery.
  1224. */
  1225. ret = iscsit_check_post_dataout(cmd, buf, data_crc_failed);
  1226. if ((ret == DATAOUT_NORMAL) || (ret == DATAOUT_WITHIN_COMMAND_RECOVERY))
  1227. return 0;
  1228. else if (ret == DATAOUT_SEND_R2T) {
  1229. iscsit_set_dataout_sequence_values(cmd);
  1230. iscsit_build_r2ts_for_cmd(cmd, conn, false);
  1231. } else if (ret == DATAOUT_SEND_TO_TRANSPORT) {
  1232. /*
  1233. * Handle extra special case for out of order
  1234. * Unsolicited Data Out.
  1235. */
  1236. spin_lock_bh(&cmd->istate_lock);
  1237. ooo_cmdsn = (cmd->cmd_flags & ICF_OOO_CMDSN);
  1238. cmd->cmd_flags |= ICF_GOT_LAST_DATAOUT;
  1239. cmd->i_state = ISTATE_RECEIVED_LAST_DATAOUT;
  1240. spin_unlock_bh(&cmd->istate_lock);
  1241. iscsit_stop_dataout_timer(cmd);
  1242. return (!ooo_cmdsn) ? transport_generic_handle_data(
  1243. &cmd->se_cmd) : 0;
  1244. } else /* DATAOUT_CANNOT_RECOVER */
  1245. return -1;
  1246. return 0;
  1247. }
  1248. static int iscsit_handle_nop_out(
  1249. struct iscsi_conn *conn,
  1250. unsigned char *buf)
  1251. {
  1252. unsigned char *ping_data = NULL;
  1253. int cmdsn_ret, niov = 0, ret = 0, rx_got, rx_size;
  1254. u32 checksum, data_crc, padding = 0, payload_length;
  1255. struct iscsi_cmd *cmd = NULL;
  1256. struct kvec *iov = NULL;
  1257. struct iscsi_nopout *hdr;
  1258. hdr = (struct iscsi_nopout *) buf;
  1259. payload_length = ntoh24(hdr->dlength);
  1260. hdr->itt = be32_to_cpu(hdr->itt);
  1261. hdr->ttt = be32_to_cpu(hdr->ttt);
  1262. hdr->cmdsn = be32_to_cpu(hdr->cmdsn);
  1263. hdr->exp_statsn = be32_to_cpu(hdr->exp_statsn);
  1264. if ((hdr->itt == 0xFFFFFFFF) && !(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
  1265. pr_err("NOPOUT ITT is reserved, but Immediate Bit is"
  1266. " not set, protocol error.\n");
  1267. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1268. buf, conn);
  1269. }
  1270. if (payload_length > conn->conn_ops->MaxRecvDataSegmentLength) {
  1271. pr_err("NOPOUT Ping Data DataSegmentLength: %u is"
  1272. " greater than MaxRecvDataSegmentLength: %u, protocol"
  1273. " error.\n", payload_length,
  1274. conn->conn_ops->MaxRecvDataSegmentLength);
  1275. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1276. buf, conn);
  1277. }
  1278. pr_debug("Got NOPOUT Ping %s ITT: 0x%08x, TTT: 0x%09x,"
  1279. " CmdSN: 0x%08x, ExpStatSN: 0x%08x, Length: %u\n",
  1280. (hdr->itt == 0xFFFFFFFF) ? "Response" : "Request",
  1281. hdr->itt, hdr->ttt, hdr->cmdsn, hdr->exp_statsn,
  1282. payload_length);
  1283. /*
  1284. * This is not a response to a Unsolicited NopIN, which means
  1285. * it can either be a NOPOUT ping request (with a valid ITT),
  1286. * or a NOPOUT not requesting a NOPIN (with a reserved ITT).
  1287. * Either way, make sure we allocate an struct iscsi_cmd, as both
  1288. * can contain ping data.
  1289. */
  1290. if (hdr->ttt == 0xFFFFFFFF) {
  1291. cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
  1292. if (!cmd)
  1293. return iscsit_add_reject(
  1294. ISCSI_REASON_BOOKMARK_NO_RESOURCES,
  1295. 1, buf, conn);
  1296. cmd->iscsi_opcode = ISCSI_OP_NOOP_OUT;
  1297. cmd->i_state = ISTATE_SEND_NOPIN;
  1298. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ?
  1299. 1 : 0);
  1300. conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
  1301. cmd->targ_xfer_tag = 0xFFFFFFFF;
  1302. cmd->cmd_sn = hdr->cmdsn;
  1303. cmd->exp_stat_sn = hdr->exp_statsn;
  1304. cmd->data_direction = DMA_NONE;
  1305. }
  1306. if (payload_length && (hdr->ttt == 0xFFFFFFFF)) {
  1307. rx_size = payload_length;
  1308. ping_data = kzalloc(payload_length + 1, GFP_KERNEL);
  1309. if (!ping_data) {
  1310. pr_err("Unable to allocate memory for"
  1311. " NOPOUT ping data.\n");
  1312. ret = -1;
  1313. goto out;
  1314. }
  1315. iov = &cmd->iov_misc[0];
  1316. iov[niov].iov_base = ping_data;
  1317. iov[niov++].iov_len = payload_length;
  1318. padding = ((-payload_length) & 3);
  1319. if (padding != 0) {
  1320. pr_debug("Receiving %u additional bytes"
  1321. " for padding.\n", padding);
  1322. iov[niov].iov_base = &cmd->pad_bytes;
  1323. iov[niov++].iov_len = padding;
  1324. rx_size += padding;
  1325. }
  1326. if (conn->conn_ops->DataDigest) {
  1327. iov[niov].iov_base = &checksum;
  1328. iov[niov++].iov_len = ISCSI_CRC_LEN;
  1329. rx_size += ISCSI_CRC_LEN;
  1330. }
  1331. rx_got = rx_data(conn, &cmd->iov_misc[0], niov, rx_size);
  1332. if (rx_got != rx_size) {
  1333. ret = -1;
  1334. goto out;
  1335. }
  1336. if (conn->conn_ops->DataDigest) {
  1337. iscsit_do_crypto_hash_buf(&conn->conn_rx_hash,
  1338. ping_data, payload_length,
  1339. padding, cmd->pad_bytes,
  1340. (u8 *)&data_crc);
  1341. if (checksum != data_crc) {
  1342. pr_err("Ping data CRC32C DataDigest"
  1343. " 0x%08x does not match computed 0x%08x\n",
  1344. checksum, data_crc);
  1345. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  1346. pr_err("Unable to recover from"
  1347. " NOPOUT Ping DataCRC failure while in"
  1348. " ERL=0.\n");
  1349. ret = -1;
  1350. goto out;
  1351. } else {
  1352. /*
  1353. * Silently drop this PDU and let the
  1354. * initiator plug the CmdSN gap.
  1355. */
  1356. pr_debug("Dropping NOPOUT"
  1357. " Command CmdSN: 0x%08x due to"
  1358. " DataCRC error.\n", hdr->cmdsn);
  1359. ret = 0;
  1360. goto out;
  1361. }
  1362. } else {
  1363. pr_debug("Got CRC32C DataDigest"
  1364. " 0x%08x for %u bytes of ping data.\n",
  1365. checksum, payload_length);
  1366. }
  1367. }
  1368. ping_data[payload_length] = '\0';
  1369. /*
  1370. * Attach ping data to struct iscsi_cmd->buf_ptr.
  1371. */
  1372. cmd->buf_ptr = ping_data;
  1373. cmd->buf_ptr_size = payload_length;
  1374. pr_debug("Got %u bytes of NOPOUT ping"
  1375. " data.\n", payload_length);
  1376. pr_debug("Ping Data: \"%s\"\n", ping_data);
  1377. }
  1378. if (hdr->itt != 0xFFFFFFFF) {
  1379. if (!cmd) {
  1380. pr_err("Checking CmdSN for NOPOUT,"
  1381. " but cmd is NULL!\n");
  1382. return -1;
  1383. }
  1384. /*
  1385. * Initiator is expecting a NopIN ping reply,
  1386. */
  1387. spin_lock_bh(&conn->cmd_lock);
  1388. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  1389. spin_unlock_bh(&conn->cmd_lock);
  1390. iscsit_ack_from_expstatsn(conn, hdr->exp_statsn);
  1391. if (hdr->opcode & ISCSI_OP_IMMEDIATE) {
  1392. iscsit_add_cmd_to_response_queue(cmd, conn,
  1393. cmd->i_state);
  1394. return 0;
  1395. }
  1396. cmdsn_ret = iscsit_sequence_cmd(conn, cmd, hdr->cmdsn);
  1397. if (cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
  1398. ret = 0;
  1399. goto ping_out;
  1400. }
  1401. if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  1402. return iscsit_add_reject_from_cmd(
  1403. ISCSI_REASON_PROTOCOL_ERROR,
  1404. 1, 0, buf, cmd);
  1405. return 0;
  1406. }
  1407. if (hdr->ttt != 0xFFFFFFFF) {
  1408. /*
  1409. * This was a response to a unsolicited NOPIN ping.
  1410. */
  1411. cmd = iscsit_find_cmd_from_ttt(conn, hdr->ttt);
  1412. if (!cmd)
  1413. return -1;
  1414. iscsit_stop_nopin_response_timer(conn);
  1415. cmd->i_state = ISTATE_REMOVE;
  1416. iscsit_add_cmd_to_immediate_queue(cmd, conn, cmd->i_state);
  1417. iscsit_start_nopin_timer(conn);
  1418. } else {
  1419. /*
  1420. * Initiator is not expecting a NOPIN is response.
  1421. * Just ignore for now.
  1422. *
  1423. * iSCSI v19-91 10.18
  1424. * "A NOP-OUT may also be used to confirm a changed
  1425. * ExpStatSN if another PDU will not be available
  1426. * for a long time."
  1427. */
  1428. ret = 0;
  1429. goto out;
  1430. }
  1431. return 0;
  1432. out:
  1433. if (cmd)
  1434. iscsit_release_cmd(cmd);
  1435. ping_out:
  1436. kfree(ping_data);
  1437. return ret;
  1438. }
  1439. static int iscsit_handle_task_mgt_cmd(
  1440. struct iscsi_conn *conn,
  1441. unsigned char *buf)
  1442. {
  1443. struct iscsi_cmd *cmd;
  1444. struct se_tmr_req *se_tmr;
  1445. struct iscsi_tmr_req *tmr_req;
  1446. struct iscsi_tm *hdr;
  1447. int out_of_order_cmdsn = 0;
  1448. int ret;
  1449. u8 function;
  1450. hdr = (struct iscsi_tm *) buf;
  1451. hdr->itt = be32_to_cpu(hdr->itt);
  1452. hdr->rtt = be32_to_cpu(hdr->rtt);
  1453. hdr->cmdsn = be32_to_cpu(hdr->cmdsn);
  1454. hdr->exp_statsn = be32_to_cpu(hdr->exp_statsn);
  1455. hdr->refcmdsn = be32_to_cpu(hdr->refcmdsn);
  1456. hdr->exp_datasn = be32_to_cpu(hdr->exp_datasn);
  1457. hdr->flags &= ~ISCSI_FLAG_CMD_FINAL;
  1458. function = hdr->flags;
  1459. pr_debug("Got Task Management Request ITT: 0x%08x, CmdSN:"
  1460. " 0x%08x, Function: 0x%02x, RefTaskTag: 0x%08x, RefCmdSN:"
  1461. " 0x%08x, CID: %hu\n", hdr->itt, hdr->cmdsn, function,
  1462. hdr->rtt, hdr->refcmdsn, conn->cid);
  1463. if ((function != ISCSI_TM_FUNC_ABORT_TASK) &&
  1464. ((function != ISCSI_TM_FUNC_TASK_REASSIGN) &&
  1465. (hdr->rtt != ISCSI_RESERVED_TAG))) {
  1466. pr_err("RefTaskTag should be set to 0xFFFFFFFF.\n");
  1467. hdr->rtt = ISCSI_RESERVED_TAG;
  1468. }
  1469. if ((function == ISCSI_TM_FUNC_TASK_REASSIGN) &&
  1470. !(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
  1471. pr_err("Task Management Request TASK_REASSIGN not"
  1472. " issued as immediate command, bad iSCSI Initiator"
  1473. "implementation\n");
  1474. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1475. buf, conn);
  1476. }
  1477. if ((function != ISCSI_TM_FUNC_ABORT_TASK) &&
  1478. (hdr->refcmdsn != ISCSI_RESERVED_TAG))
  1479. hdr->refcmdsn = ISCSI_RESERVED_TAG;
  1480. cmd = iscsit_allocate_se_cmd_for_tmr(conn, function);
  1481. if (!cmd)
  1482. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_NO_RESOURCES,
  1483. 1, buf, conn);
  1484. cmd->iscsi_opcode = ISCSI_OP_SCSI_TMFUNC;
  1485. cmd->i_state = ISTATE_SEND_TASKMGTRSP;
  1486. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
  1487. cmd->init_task_tag = hdr->itt;
  1488. cmd->targ_xfer_tag = 0xFFFFFFFF;
  1489. cmd->cmd_sn = hdr->cmdsn;
  1490. cmd->exp_stat_sn = hdr->exp_statsn;
  1491. se_tmr = cmd->se_cmd.se_tmr_req;
  1492. tmr_req = cmd->tmr_req;
  1493. /*
  1494. * Locate the struct se_lun for all TMRs not related to ERL=2 TASK_REASSIGN
  1495. */
  1496. if (function != ISCSI_TM_FUNC_TASK_REASSIGN) {
  1497. ret = transport_lookup_tmr_lun(&cmd->se_cmd,
  1498. scsilun_to_int(&hdr->lun));
  1499. if (ret < 0) {
  1500. cmd->se_cmd.se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
  1501. se_tmr->response = ISCSI_TMF_RSP_NO_LUN;
  1502. goto attach;
  1503. }
  1504. }
  1505. switch (function) {
  1506. case ISCSI_TM_FUNC_ABORT_TASK:
  1507. se_tmr->response = iscsit_tmr_abort_task(cmd, buf);
  1508. if (se_tmr->response != ISCSI_TMF_RSP_COMPLETE) {
  1509. cmd->se_cmd.se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
  1510. goto attach;
  1511. }
  1512. break;
  1513. case ISCSI_TM_FUNC_ABORT_TASK_SET:
  1514. case ISCSI_TM_FUNC_CLEAR_ACA:
  1515. case ISCSI_TM_FUNC_CLEAR_TASK_SET:
  1516. case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET:
  1517. break;
  1518. case ISCSI_TM_FUNC_TARGET_WARM_RESET:
  1519. if (iscsit_tmr_task_warm_reset(conn, tmr_req, buf) < 0) {
  1520. cmd->se_cmd.se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
  1521. se_tmr->response = ISCSI_TMF_RSP_AUTH_FAILED;
  1522. goto attach;
  1523. }
  1524. break;
  1525. case ISCSI_TM_FUNC_TARGET_COLD_RESET:
  1526. if (iscsit_tmr_task_cold_reset(conn, tmr_req, buf) < 0) {
  1527. cmd->se_cmd.se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
  1528. se_tmr->response = ISCSI_TMF_RSP_AUTH_FAILED;
  1529. goto attach;
  1530. }
  1531. break;
  1532. case ISCSI_TM_FUNC_TASK_REASSIGN:
  1533. se_tmr->response = iscsit_tmr_task_reassign(cmd, buf);
  1534. /*
  1535. * Perform sanity checks on the ExpDataSN only if the
  1536. * TASK_REASSIGN was successful.
  1537. */
  1538. if (se_tmr->response != ISCSI_TMF_RSP_COMPLETE)
  1539. break;
  1540. if (iscsit_check_task_reassign_expdatasn(tmr_req, conn) < 0)
  1541. return iscsit_add_reject_from_cmd(
  1542. ISCSI_REASON_BOOKMARK_INVALID, 1, 1,
  1543. buf, cmd);
  1544. break;
  1545. default:
  1546. pr_err("Unknown TMR function: 0x%02x, protocol"
  1547. " error.\n", function);
  1548. cmd->se_cmd.se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
  1549. se_tmr->response = ISCSI_TMF_RSP_NOT_SUPPORTED;
  1550. goto attach;
  1551. }
  1552. if ((function != ISCSI_TM_FUNC_TASK_REASSIGN) &&
  1553. (se_tmr->response == ISCSI_TMF_RSP_COMPLETE))
  1554. se_tmr->call_transport = 1;
  1555. attach:
  1556. spin_lock_bh(&conn->cmd_lock);
  1557. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  1558. spin_unlock_bh(&conn->cmd_lock);
  1559. if (!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
  1560. int cmdsn_ret = iscsit_sequence_cmd(conn, cmd, hdr->cmdsn);
  1561. if (cmdsn_ret == CMDSN_HIGHER_THAN_EXP)
  1562. out_of_order_cmdsn = 1;
  1563. else if (cmdsn_ret == CMDSN_LOWER_THAN_EXP)
  1564. return 0;
  1565. else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  1566. return iscsit_add_reject_from_cmd(
  1567. ISCSI_REASON_PROTOCOL_ERROR,
  1568. 1, 0, buf, cmd);
  1569. }
  1570. iscsit_ack_from_expstatsn(conn, hdr->exp_statsn);
  1571. if (out_of_order_cmdsn || !(hdr->opcode & ISCSI_OP_IMMEDIATE))
  1572. return 0;
  1573. /*
  1574. * Found the referenced task, send to transport for processing.
  1575. */
  1576. if (se_tmr->call_transport)
  1577. return transport_generic_handle_tmr(&cmd->se_cmd);
  1578. /*
  1579. * Could not find the referenced LUN, task, or Task Management
  1580. * command not authorized or supported. Change state and
  1581. * let the tx_thread send the response.
  1582. *
  1583. * For connection recovery, this is also the default action for
  1584. * TMR TASK_REASSIGN.
  1585. */
  1586. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  1587. return 0;
  1588. }
  1589. /* #warning FIXME: Support Text Command parameters besides SendTargets */
  1590. static int iscsit_handle_text_cmd(
  1591. struct iscsi_conn *conn,
  1592. unsigned char *buf)
  1593. {
  1594. char *text_ptr, *text_in;
  1595. int cmdsn_ret, niov = 0, rx_got, rx_size;
  1596. u32 checksum = 0, data_crc = 0, payload_length;
  1597. u32 padding = 0, pad_bytes = 0, text_length = 0;
  1598. struct iscsi_cmd *cmd;
  1599. struct kvec iov[3];
  1600. struct iscsi_text *hdr;
  1601. hdr = (struct iscsi_text *) buf;
  1602. payload_length = ntoh24(hdr->dlength);
  1603. hdr->itt = be32_to_cpu(hdr->itt);
  1604. hdr->ttt = be32_to_cpu(hdr->ttt);
  1605. hdr->cmdsn = be32_to_cpu(hdr->cmdsn);
  1606. hdr->exp_statsn = be32_to_cpu(hdr->exp_statsn);
  1607. if (payload_length > conn->conn_ops->MaxRecvDataSegmentLength) {
  1608. pr_err("Unable to accept text parameter length: %u"
  1609. "greater than MaxRecvDataSegmentLength %u.\n",
  1610. payload_length, conn->conn_ops->MaxRecvDataSegmentLength);
  1611. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1612. buf, conn);
  1613. }
  1614. pr_debug("Got Text Request: ITT: 0x%08x, CmdSN: 0x%08x,"
  1615. " ExpStatSN: 0x%08x, Length: %u\n", hdr->itt, hdr->cmdsn,
  1616. hdr->exp_statsn, payload_length);
  1617. rx_size = text_length = payload_length;
  1618. if (text_length) {
  1619. text_in = kzalloc(text_length, GFP_KERNEL);
  1620. if (!text_in) {
  1621. pr_err("Unable to allocate memory for"
  1622. " incoming text parameters\n");
  1623. return -1;
  1624. }
  1625. memset(iov, 0, 3 * sizeof(struct kvec));
  1626. iov[niov].iov_base = text_in;
  1627. iov[niov++].iov_len = text_length;
  1628. padding = ((-payload_length) & 3);
  1629. if (padding != 0) {
  1630. iov[niov].iov_base = &pad_bytes;
  1631. iov[niov++].iov_len = padding;
  1632. rx_size += padding;
  1633. pr_debug("Receiving %u additional bytes"
  1634. " for padding.\n", padding);
  1635. }
  1636. if (conn->conn_ops->DataDigest) {
  1637. iov[niov].iov_base = &checksum;
  1638. iov[niov++].iov_len = ISCSI_CRC_LEN;
  1639. rx_size += ISCSI_CRC_LEN;
  1640. }
  1641. rx_got = rx_data(conn, &iov[0], niov, rx_size);
  1642. if (rx_got != rx_size) {
  1643. kfree(text_in);
  1644. return -1;
  1645. }
  1646. if (conn->conn_ops->DataDigest) {
  1647. iscsit_do_crypto_hash_buf(&conn->conn_rx_hash,
  1648. text_in, text_length,
  1649. padding, (u8 *)&pad_bytes,
  1650. (u8 *)&data_crc);
  1651. if (checksum != data_crc) {
  1652. pr_err("Text data CRC32C DataDigest"
  1653. " 0x%08x does not match computed"
  1654. " 0x%08x\n", checksum, data_crc);
  1655. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  1656. pr_err("Unable to recover from"
  1657. " Text Data digest failure while in"
  1658. " ERL=0.\n");
  1659. kfree(text_in);
  1660. return -1;
  1661. } else {
  1662. /*
  1663. * Silently drop this PDU and let the
  1664. * initiator plug the CmdSN gap.
  1665. */
  1666. pr_debug("Dropping Text"
  1667. " Command CmdSN: 0x%08x due to"
  1668. " DataCRC error.\n", hdr->cmdsn);
  1669. kfree(text_in);
  1670. return 0;
  1671. }
  1672. } else {
  1673. pr_debug("Got CRC32C DataDigest"
  1674. " 0x%08x for %u bytes of text data.\n",
  1675. checksum, text_length);
  1676. }
  1677. }
  1678. text_in[text_length - 1] = '\0';
  1679. pr_debug("Successfully read %d bytes of text"
  1680. " data.\n", text_length);
  1681. if (strncmp("SendTargets", text_in, 11) != 0) {
  1682. pr_err("Received Text Data that is not"
  1683. " SendTargets, cannot continue.\n");
  1684. kfree(text_in);
  1685. return -1;
  1686. }
  1687. text_ptr = strchr(text_in, '=');
  1688. if (!text_ptr) {
  1689. pr_err("No \"=\" separator found in Text Data,"
  1690. " cannot continue.\n");
  1691. kfree(text_in);
  1692. return -1;
  1693. }
  1694. if (strncmp("=All", text_ptr, 4) != 0) {
  1695. pr_err("Unable to locate All value for"
  1696. " SendTargets key, cannot continue.\n");
  1697. kfree(text_in);
  1698. return -1;
  1699. }
  1700. /*#warning Support SendTargets=(iSCSI Target Name/Nothing) values. */
  1701. kfree(text_in);
  1702. }
  1703. cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
  1704. if (!cmd)
  1705. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_NO_RESOURCES,
  1706. 1, buf, conn);
  1707. cmd->iscsi_opcode = ISCSI_OP_TEXT;
  1708. cmd->i_state = ISTATE_SEND_TEXTRSP;
  1709. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
  1710. conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
  1711. cmd->targ_xfer_tag = 0xFFFFFFFF;
  1712. cmd->cmd_sn = hdr->cmdsn;
  1713. cmd->exp_stat_sn = hdr->exp_statsn;
  1714. cmd->data_direction = DMA_NONE;
  1715. spin_lock_bh(&conn->cmd_lock);
  1716. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  1717. spin_unlock_bh(&conn->cmd_lock);
  1718. iscsit_ack_from_expstatsn(conn, hdr->exp_statsn);
  1719. if (!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
  1720. cmdsn_ret = iscsit_sequence_cmd(conn, cmd, hdr->cmdsn);
  1721. if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  1722. return iscsit_add_reject_from_cmd(
  1723. ISCSI_REASON_PROTOCOL_ERROR,
  1724. 1, 0, buf, cmd);
  1725. return 0;
  1726. }
  1727. return iscsit_execute_cmd(cmd, 0);
  1728. }
  1729. int iscsit_logout_closesession(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  1730. {
  1731. struct iscsi_conn *conn_p;
  1732. struct iscsi_session *sess = conn->sess;
  1733. pr_debug("Received logout request CLOSESESSION on CID: %hu"
  1734. " for SID: %u.\n", conn->cid, conn->sess->sid);
  1735. atomic_set(&sess->session_logout, 1);
  1736. atomic_set(&conn->conn_logout_remove, 1);
  1737. conn->conn_logout_reason = ISCSI_LOGOUT_REASON_CLOSE_SESSION;
  1738. iscsit_inc_conn_usage_count(conn);
  1739. iscsit_inc_session_usage_count(sess);
  1740. spin_lock_bh(&sess->conn_lock);
  1741. list_for_each_entry(conn_p, &sess->sess_conn_list, conn_list) {
  1742. if (conn_p->conn_state != TARG_CONN_STATE_LOGGED_IN)
  1743. continue;
  1744. pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
  1745. conn_p->conn_state = TARG_CONN_STATE_IN_LOGOUT;
  1746. }
  1747. spin_unlock_bh(&sess->conn_lock);
  1748. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  1749. return 0;
  1750. }
  1751. int iscsit_logout_closeconnection(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  1752. {
  1753. struct iscsi_conn *l_conn;
  1754. struct iscsi_session *sess = conn->sess;
  1755. pr_debug("Received logout request CLOSECONNECTION for CID:"
  1756. " %hu on CID: %hu.\n", cmd->logout_cid, conn->cid);
  1757. /*
  1758. * A Logout Request with a CLOSECONNECTION reason code for a CID
  1759. * can arrive on a connection with a differing CID.
  1760. */
  1761. if (conn->cid == cmd->logout_cid) {
  1762. spin_lock_bh(&conn->state_lock);
  1763. pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
  1764. conn->conn_state = TARG_CONN_STATE_IN_LOGOUT;
  1765. atomic_set(&conn->conn_logout_remove, 1);
  1766. conn->conn_logout_reason = ISCSI_LOGOUT_REASON_CLOSE_CONNECTION;
  1767. iscsit_inc_conn_usage_count(conn);
  1768. spin_unlock_bh(&conn->state_lock);
  1769. } else {
  1770. /*
  1771. * Handle all different cid CLOSECONNECTION requests in
  1772. * iscsit_logout_post_handler_diffcid() as to give enough
  1773. * time for any non immediate command's CmdSN to be
  1774. * acknowledged on the connection in question.
  1775. *
  1776. * Here we simply make sure the CID is still around.
  1777. */
  1778. l_conn = iscsit_get_conn_from_cid(sess,
  1779. cmd->logout_cid);
  1780. if (!l_conn) {
  1781. cmd->logout_response = ISCSI_LOGOUT_CID_NOT_FOUND;
  1782. iscsit_add_cmd_to_response_queue(cmd, conn,
  1783. cmd->i_state);
  1784. return 0;
  1785. }
  1786. iscsit_dec_conn_usage_count(l_conn);
  1787. }
  1788. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  1789. return 0;
  1790. }
  1791. int iscsit_logout_removeconnforrecovery(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  1792. {
  1793. struct iscsi_session *sess = conn->sess;
  1794. pr_debug("Received explicit REMOVECONNFORRECOVERY logout for"
  1795. " CID: %hu on CID: %hu.\n", cmd->logout_cid, conn->cid);
  1796. if (sess->sess_ops->ErrorRecoveryLevel != 2) {
  1797. pr_err("Received Logout Request REMOVECONNFORRECOVERY"
  1798. " while ERL!=2.\n");
  1799. cmd->logout_response = ISCSI_LOGOUT_RECOVERY_UNSUPPORTED;
  1800. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  1801. return 0;
  1802. }
  1803. if (conn->cid == cmd->logout_cid) {
  1804. pr_err("Received Logout Request REMOVECONNFORRECOVERY"
  1805. " with CID: %hu on CID: %hu, implementation error.\n",
  1806. cmd->logout_cid, conn->cid);
  1807. cmd->logout_response = ISCSI_LOGOUT_CLEANUP_FAILED;
  1808. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  1809. return 0;
  1810. }
  1811. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  1812. return 0;
  1813. }
  1814. static int iscsit_handle_logout_cmd(
  1815. struct iscsi_conn *conn,
  1816. unsigned char *buf)
  1817. {
  1818. int cmdsn_ret, logout_remove = 0;
  1819. u8 reason_code = 0;
  1820. struct iscsi_cmd *cmd;
  1821. struct iscsi_logout *hdr;
  1822. struct iscsi_tiqn *tiqn = iscsit_snmp_get_tiqn(conn);
  1823. hdr = (struct iscsi_logout *) buf;
  1824. reason_code = (hdr->flags & 0x7f);
  1825. hdr->itt = be32_to_cpu(hdr->itt);
  1826. hdr->cid = be16_to_cpu(hdr->cid);
  1827. hdr->cmdsn = be32_to_cpu(hdr->cmdsn);
  1828. hdr->exp_statsn = be32_to_cpu(hdr->exp_statsn);
  1829. if (tiqn) {
  1830. spin_lock(&tiqn->logout_stats.lock);
  1831. if (reason_code == ISCSI_LOGOUT_REASON_CLOSE_SESSION)
  1832. tiqn->logout_stats.normal_logouts++;
  1833. else
  1834. tiqn->logout_stats.abnormal_logouts++;
  1835. spin_unlock(&tiqn->logout_stats.lock);
  1836. }
  1837. pr_debug("Got Logout Request ITT: 0x%08x CmdSN: 0x%08x"
  1838. " ExpStatSN: 0x%08x Reason: 0x%02x CID: %hu on CID: %hu\n",
  1839. hdr->itt, hdr->cmdsn, hdr->exp_statsn, reason_code,
  1840. hdr->cid, conn->cid);
  1841. if (conn->conn_state != TARG_CONN_STATE_LOGGED_IN) {
  1842. pr_err("Received logout request on connection that"
  1843. " is not in logged in state, ignoring request.\n");
  1844. return 0;
  1845. }
  1846. cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
  1847. if (!cmd)
  1848. return iscsit_add_reject(ISCSI_REASON_BOOKMARK_NO_RESOURCES, 1,
  1849. buf, conn);
  1850. cmd->iscsi_opcode = ISCSI_OP_LOGOUT;
  1851. cmd->i_state = ISTATE_SEND_LOGOUTRSP;
  1852. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
  1853. conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
  1854. cmd->targ_xfer_tag = 0xFFFFFFFF;
  1855. cmd->cmd_sn = hdr->cmdsn;
  1856. cmd->exp_stat_sn = hdr->exp_statsn;
  1857. cmd->logout_cid = hdr->cid;
  1858. cmd->logout_reason = reason_code;
  1859. cmd->data_direction = DMA_NONE;
  1860. /*
  1861. * We need to sleep in these cases (by returning 1) until the Logout
  1862. * Response gets sent in the tx thread.
  1863. */
  1864. if ((reason_code == ISCSI_LOGOUT_REASON_CLOSE_SESSION) ||
  1865. ((reason_code == ISCSI_LOGOUT_REASON_CLOSE_CONNECTION) &&
  1866. (hdr->cid == conn->cid)))
  1867. logout_remove = 1;
  1868. spin_lock_bh(&conn->cmd_lock);
  1869. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  1870. spin_unlock_bh(&conn->cmd_lock);
  1871. if (reason_code != ISCSI_LOGOUT_REASON_RECOVERY)
  1872. iscsit_ack_from_expstatsn(conn, hdr->exp_statsn);
  1873. /*
  1874. * Immediate commands are executed, well, immediately.
  1875. * Non-Immediate Logout Commands are executed in CmdSN order.
  1876. */
  1877. if (cmd->immediate_cmd) {
  1878. int ret = iscsit_execute_cmd(cmd, 0);
  1879. if (ret < 0)
  1880. return ret;
  1881. } else {
  1882. cmdsn_ret = iscsit_sequence_cmd(conn, cmd, hdr->cmdsn);
  1883. if (cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
  1884. logout_remove = 0;
  1885. } else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER) {
  1886. return iscsit_add_reject_from_cmd(
  1887. ISCSI_REASON_PROTOCOL_ERROR,
  1888. 1, 0, buf, cmd);
  1889. }
  1890. }
  1891. return logout_remove;
  1892. }
  1893. static int iscsit_handle_snack(
  1894. struct iscsi_conn *conn,
  1895. unsigned char *buf)
  1896. {
  1897. struct iscsi_snack *hdr;
  1898. hdr = (struct iscsi_snack *) buf;
  1899. hdr->flags &= ~ISCSI_FLAG_CMD_FINAL;
  1900. hdr->itt = be32_to_cpu(hdr->itt);
  1901. hdr->ttt = be32_to_cpu(hdr->ttt);
  1902. hdr->exp_statsn = be32_to_cpu(hdr->exp_statsn);
  1903. hdr->begrun = be32_to_cpu(hdr->begrun);
  1904. hdr->runlength = be32_to_cpu(hdr->runlength);
  1905. pr_debug("Got ISCSI_INIT_SNACK, ITT: 0x%08x, ExpStatSN:"
  1906. " 0x%08x, Type: 0x%02x, BegRun: 0x%08x, RunLength: 0x%08x,"
  1907. " CID: %hu\n", hdr->itt, hdr->exp_statsn, hdr->flags,
  1908. hdr->begrun, hdr->runlength, conn->cid);
  1909. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  1910. pr_err("Initiator sent SNACK request while in"
  1911. " ErrorRecoveryLevel=0.\n");
  1912. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1913. buf, conn);
  1914. }
  1915. /*
  1916. * SNACK_DATA and SNACK_R2T are both 0, so check which function to
  1917. * call from inside iscsi_send_recovery_datain_or_r2t().
  1918. */
  1919. switch (hdr->flags & ISCSI_FLAG_SNACK_TYPE_MASK) {
  1920. case 0:
  1921. return iscsit_handle_recovery_datain_or_r2t(conn, buf,
  1922. hdr->itt, hdr->ttt, hdr->begrun, hdr->runlength);
  1923. case ISCSI_FLAG_SNACK_TYPE_STATUS:
  1924. return iscsit_handle_status_snack(conn, hdr->itt, hdr->ttt,
  1925. hdr->begrun, hdr->runlength);
  1926. case ISCSI_FLAG_SNACK_TYPE_DATA_ACK:
  1927. return iscsit_handle_data_ack(conn, hdr->ttt, hdr->begrun,
  1928. hdr->runlength);
  1929. case ISCSI_FLAG_SNACK_TYPE_RDATA:
  1930. /* FIXME: Support R-Data SNACK */
  1931. pr_err("R-Data SNACK Not Supported.\n");
  1932. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1933. buf, conn);
  1934. default:
  1935. pr_err("Unknown SNACK type 0x%02x, protocol"
  1936. " error.\n", hdr->flags & 0x0f);
  1937. return iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  1938. buf, conn);
  1939. }
  1940. return 0;
  1941. }
  1942. static void iscsit_rx_thread_wait_for_tcp(struct iscsi_conn *conn)
  1943. {
  1944. if ((conn->sock->sk->sk_shutdown & SEND_SHUTDOWN) ||
  1945. (conn->sock->sk->sk_shutdown & RCV_SHUTDOWN)) {
  1946. wait_for_completion_interruptible_timeout(
  1947. &conn->rx_half_close_comp,
  1948. ISCSI_RX_THREAD_TCP_TIMEOUT * HZ);
  1949. }
  1950. }
  1951. static int iscsit_handle_immediate_data(
  1952. struct iscsi_cmd *cmd,
  1953. unsigned char *buf,
  1954. u32 length)
  1955. {
  1956. int iov_ret, rx_got = 0, rx_size = 0;
  1957. u32 checksum, iov_count = 0, padding = 0;
  1958. struct iscsi_conn *conn = cmd->conn;
  1959. struct kvec *iov;
  1960. iov_ret = iscsit_map_iovec(cmd, cmd->iov_data, cmd->write_data_done, length);
  1961. if (iov_ret < 0)
  1962. return IMMEDIATE_DATA_CANNOT_RECOVER;
  1963. rx_size = length;
  1964. iov_count = iov_ret;
  1965. iov = &cmd->iov_data[0];
  1966. padding = ((-length) & 3);
  1967. if (padding != 0) {
  1968. iov[iov_count].iov_base = cmd->pad_bytes;
  1969. iov[iov_count++].iov_len = padding;
  1970. rx_size += padding;
  1971. }
  1972. if (conn->conn_ops->DataDigest) {
  1973. iov[iov_count].iov_base = &checksum;
  1974. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  1975. rx_size += ISCSI_CRC_LEN;
  1976. }
  1977. rx_got = rx_data(conn, &cmd->iov_data[0], iov_count, rx_size);
  1978. iscsit_unmap_iovec(cmd);
  1979. if (rx_got != rx_size) {
  1980. iscsit_rx_thread_wait_for_tcp(conn);
  1981. return IMMEDIATE_DATA_CANNOT_RECOVER;
  1982. }
  1983. if (conn->conn_ops->DataDigest) {
  1984. u32 data_crc;
  1985. data_crc = iscsit_do_crypto_hash_sg(&conn->conn_rx_hash, cmd,
  1986. cmd->write_data_done, length, padding,
  1987. cmd->pad_bytes);
  1988. if (checksum != data_crc) {
  1989. pr_err("ImmediateData CRC32C DataDigest 0x%08x"
  1990. " does not match computed 0x%08x\n", checksum,
  1991. data_crc);
  1992. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  1993. pr_err("Unable to recover from"
  1994. " Immediate Data digest failure while"
  1995. " in ERL=0.\n");
  1996. iscsit_add_reject_from_cmd(
  1997. ISCSI_REASON_DATA_DIGEST_ERROR,
  1998. 1, 0, buf, cmd);
  1999. return IMMEDIATE_DATA_CANNOT_RECOVER;
  2000. } else {
  2001. iscsit_add_reject_from_cmd(
  2002. ISCSI_REASON_DATA_DIGEST_ERROR,
  2003. 0, 0, buf, cmd);
  2004. return IMMEDIATE_DATA_ERL1_CRC_FAILURE;
  2005. }
  2006. } else {
  2007. pr_debug("Got CRC32C DataDigest 0x%08x for"
  2008. " %u bytes of Immediate Data\n", checksum,
  2009. length);
  2010. }
  2011. }
  2012. cmd->write_data_done += length;
  2013. if (cmd->write_data_done == cmd->data_length) {
  2014. spin_lock_bh(&cmd->istate_lock);
  2015. cmd->cmd_flags |= ICF_GOT_LAST_DATAOUT;
  2016. cmd->i_state = ISTATE_RECEIVED_LAST_DATAOUT;
  2017. spin_unlock_bh(&cmd->istate_lock);
  2018. }
  2019. return IMMEDIATE_DATA_NORMAL_OPERATION;
  2020. }
  2021. /*
  2022. * Called with sess->conn_lock held.
  2023. */
  2024. /* #warning iscsi_build_conn_drop_async_message() only sends out on connections
  2025. with active network interface */
  2026. static void iscsit_build_conn_drop_async_message(struct iscsi_conn *conn)
  2027. {
  2028. struct iscsi_cmd *cmd;
  2029. struct iscsi_conn *conn_p;
  2030. /*
  2031. * Only send a Asynchronous Message on connections whos network
  2032. * interface is still functional.
  2033. */
  2034. list_for_each_entry(conn_p, &conn->sess->sess_conn_list, conn_list) {
  2035. if (conn_p->conn_state == TARG_CONN_STATE_LOGGED_IN) {
  2036. iscsit_inc_conn_usage_count(conn_p);
  2037. break;
  2038. }
  2039. }
  2040. if (!conn_p)
  2041. return;
  2042. cmd = iscsit_allocate_cmd(conn_p, GFP_KERNEL);
  2043. if (!cmd) {
  2044. iscsit_dec_conn_usage_count(conn_p);
  2045. return;
  2046. }
  2047. cmd->logout_cid = conn->cid;
  2048. cmd->iscsi_opcode = ISCSI_OP_ASYNC_EVENT;
  2049. cmd->i_state = ISTATE_SEND_ASYNCMSG;
  2050. spin_lock_bh(&conn_p->cmd_lock);
  2051. list_add_tail(&cmd->i_conn_node, &conn_p->conn_cmd_list);
  2052. spin_unlock_bh(&conn_p->cmd_lock);
  2053. iscsit_add_cmd_to_response_queue(cmd, conn_p, cmd->i_state);
  2054. iscsit_dec_conn_usage_count(conn_p);
  2055. }
  2056. static int iscsit_send_conn_drop_async_message(
  2057. struct iscsi_cmd *cmd,
  2058. struct iscsi_conn *conn)
  2059. {
  2060. struct iscsi_async *hdr;
  2061. cmd->tx_size = ISCSI_HDR_LEN;
  2062. cmd->iscsi_opcode = ISCSI_OP_ASYNC_EVENT;
  2063. hdr = (struct iscsi_async *) cmd->pdu;
  2064. hdr->opcode = ISCSI_OP_ASYNC_EVENT;
  2065. hdr->flags = ISCSI_FLAG_CMD_FINAL;
  2066. cmd->init_task_tag = 0xFFFFFFFF;
  2067. cmd->targ_xfer_tag = 0xFFFFFFFF;
  2068. put_unaligned_be64(0xFFFFFFFFFFFFFFFFULL, &hdr->rsvd4[0]);
  2069. cmd->stat_sn = conn->stat_sn++;
  2070. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2071. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2072. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2073. hdr->async_event = ISCSI_ASYNC_MSG_DROPPING_CONNECTION;
  2074. hdr->param1 = cpu_to_be16(cmd->logout_cid);
  2075. hdr->param2 = cpu_to_be16(conn->sess->sess_ops->DefaultTime2Wait);
  2076. hdr->param3 = cpu_to_be16(conn->sess->sess_ops->DefaultTime2Retain);
  2077. if (conn->conn_ops->HeaderDigest) {
  2078. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2079. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2080. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2081. 0, NULL, (u8 *)header_digest);
  2082. cmd->tx_size += ISCSI_CRC_LEN;
  2083. pr_debug("Attaching CRC32C HeaderDigest to"
  2084. " Async Message 0x%08x\n", *header_digest);
  2085. }
  2086. cmd->iov_misc[0].iov_base = cmd->pdu;
  2087. cmd->iov_misc[0].iov_len = cmd->tx_size;
  2088. cmd->iov_misc_count = 1;
  2089. pr_debug("Sending Connection Dropped Async Message StatSN:"
  2090. " 0x%08x, for CID: %hu on CID: %hu\n", cmd->stat_sn,
  2091. cmd->logout_cid, conn->cid);
  2092. return 0;
  2093. }
  2094. static void iscsit_tx_thread_wait_for_tcp(struct iscsi_conn *conn)
  2095. {
  2096. if ((conn->sock->sk->sk_shutdown & SEND_SHUTDOWN) ||
  2097. (conn->sock->sk->sk_shutdown & RCV_SHUTDOWN)) {
  2098. wait_for_completion_interruptible_timeout(
  2099. &conn->tx_half_close_comp,
  2100. ISCSI_TX_THREAD_TCP_TIMEOUT * HZ);
  2101. }
  2102. }
  2103. static int iscsit_send_data_in(
  2104. struct iscsi_cmd *cmd,
  2105. struct iscsi_conn *conn)
  2106. {
  2107. int iov_ret = 0, set_statsn = 0;
  2108. u32 iov_count = 0, tx_size = 0;
  2109. struct iscsi_datain datain;
  2110. struct iscsi_datain_req *dr;
  2111. struct iscsi_data_rsp *hdr;
  2112. struct kvec *iov;
  2113. int eodr = 0;
  2114. int ret;
  2115. memset(&datain, 0, sizeof(struct iscsi_datain));
  2116. dr = iscsit_get_datain_values(cmd, &datain);
  2117. if (!dr) {
  2118. pr_err("iscsit_get_datain_values failed for ITT: 0x%08x\n",
  2119. cmd->init_task_tag);
  2120. return -1;
  2121. }
  2122. /*
  2123. * Be paranoid and double check the logic for now.
  2124. */
  2125. if ((datain.offset + datain.length) > cmd->data_length) {
  2126. pr_err("Command ITT: 0x%08x, datain.offset: %u and"
  2127. " datain.length: %u exceeds cmd->data_length: %u\n",
  2128. cmd->init_task_tag, datain.offset, datain.length,
  2129. cmd->data_length);
  2130. return -1;
  2131. }
  2132. spin_lock_bh(&conn->sess->session_stats_lock);
  2133. conn->sess->tx_data_octets += datain.length;
  2134. if (conn->sess->se_sess->se_node_acl) {
  2135. spin_lock(&conn->sess->se_sess->se_node_acl->stats_lock);
  2136. conn->sess->se_sess->se_node_acl->read_bytes += datain.length;
  2137. spin_unlock(&conn->sess->se_sess->se_node_acl->stats_lock);
  2138. }
  2139. spin_unlock_bh(&conn->sess->session_stats_lock);
  2140. /*
  2141. * Special case for successfully execution w/ both DATAIN
  2142. * and Sense Data.
  2143. */
  2144. if ((datain.flags & ISCSI_FLAG_DATA_STATUS) &&
  2145. (cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE))
  2146. datain.flags &= ~ISCSI_FLAG_DATA_STATUS;
  2147. else {
  2148. if ((dr->dr_complete == DATAIN_COMPLETE_NORMAL) ||
  2149. (dr->dr_complete == DATAIN_COMPLETE_CONNECTION_RECOVERY)) {
  2150. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2151. cmd->stat_sn = conn->stat_sn++;
  2152. set_statsn = 1;
  2153. } else if (dr->dr_complete ==
  2154. DATAIN_COMPLETE_WITHIN_COMMAND_RECOVERY)
  2155. set_statsn = 1;
  2156. }
  2157. hdr = (struct iscsi_data_rsp *) cmd->pdu;
  2158. memset(hdr, 0, ISCSI_HDR_LEN);
  2159. hdr->opcode = ISCSI_OP_SCSI_DATA_IN;
  2160. hdr->flags = datain.flags;
  2161. if (hdr->flags & ISCSI_FLAG_DATA_STATUS) {
  2162. if (cmd->se_cmd.se_cmd_flags & SCF_OVERFLOW_BIT) {
  2163. hdr->flags |= ISCSI_FLAG_DATA_OVERFLOW;
  2164. hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
  2165. } else if (cmd->se_cmd.se_cmd_flags & SCF_UNDERFLOW_BIT) {
  2166. hdr->flags |= ISCSI_FLAG_DATA_UNDERFLOW;
  2167. hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
  2168. }
  2169. }
  2170. hton24(hdr->dlength, datain.length);
  2171. if (hdr->flags & ISCSI_FLAG_DATA_ACK)
  2172. int_to_scsilun(cmd->se_cmd.orig_fe_lun,
  2173. (struct scsi_lun *)&hdr->lun);
  2174. else
  2175. put_unaligned_le64(0xFFFFFFFFFFFFFFFFULL, &hdr->lun);
  2176. hdr->itt = cpu_to_be32(cmd->init_task_tag);
  2177. hdr->ttt = (hdr->flags & ISCSI_FLAG_DATA_ACK) ?
  2178. cpu_to_be32(cmd->targ_xfer_tag) :
  2179. 0xFFFFFFFF;
  2180. hdr->statsn = (set_statsn) ? cpu_to_be32(cmd->stat_sn) :
  2181. 0xFFFFFFFF;
  2182. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2183. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2184. hdr->datasn = cpu_to_be32(datain.data_sn);
  2185. hdr->offset = cpu_to_be32(datain.offset);
  2186. iov = &cmd->iov_data[0];
  2187. iov[iov_count].iov_base = cmd->pdu;
  2188. iov[iov_count++].iov_len = ISCSI_HDR_LEN;
  2189. tx_size += ISCSI_HDR_LEN;
  2190. if (conn->conn_ops->HeaderDigest) {
  2191. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2192. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2193. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2194. 0, NULL, (u8 *)header_digest);
  2195. iov[0].iov_len += ISCSI_CRC_LEN;
  2196. tx_size += ISCSI_CRC_LEN;
  2197. pr_debug("Attaching CRC32 HeaderDigest"
  2198. " for DataIN PDU 0x%08x\n", *header_digest);
  2199. }
  2200. iov_ret = iscsit_map_iovec(cmd, &cmd->iov_data[1], datain.offset, datain.length);
  2201. if (iov_ret < 0)
  2202. return -1;
  2203. iov_count += iov_ret;
  2204. tx_size += datain.length;
  2205. cmd->padding = ((-datain.length) & 3);
  2206. if (cmd->padding) {
  2207. iov[iov_count].iov_base = cmd->pad_bytes;
  2208. iov[iov_count++].iov_len = cmd->padding;
  2209. tx_size += cmd->padding;
  2210. pr_debug("Attaching %u padding bytes\n",
  2211. cmd->padding);
  2212. }
  2213. if (conn->conn_ops->DataDigest) {
  2214. cmd->data_crc = iscsit_do_crypto_hash_sg(&conn->conn_tx_hash, cmd,
  2215. datain.offset, datain.length, cmd->padding, cmd->pad_bytes);
  2216. iov[iov_count].iov_base = &cmd->data_crc;
  2217. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  2218. tx_size += ISCSI_CRC_LEN;
  2219. pr_debug("Attached CRC32C DataDigest %d bytes, crc"
  2220. " 0x%08x\n", datain.length+cmd->padding, cmd->data_crc);
  2221. }
  2222. cmd->iov_data_count = iov_count;
  2223. cmd->tx_size = tx_size;
  2224. pr_debug("Built DataIN ITT: 0x%08x, StatSN: 0x%08x,"
  2225. " DataSN: 0x%08x, Offset: %u, Length: %u, CID: %hu\n",
  2226. cmd->init_task_tag, ntohl(hdr->statsn), ntohl(hdr->datasn),
  2227. ntohl(hdr->offset), datain.length, conn->cid);
  2228. /* sendpage is preferred but can't insert markers */
  2229. if (!conn->conn_ops->IFMarker)
  2230. ret = iscsit_fe_sendpage_sg(cmd, conn);
  2231. else
  2232. ret = iscsit_send_tx_data(cmd, conn, 0);
  2233. iscsit_unmap_iovec(cmd);
  2234. if (ret < 0) {
  2235. iscsit_tx_thread_wait_for_tcp(conn);
  2236. return ret;
  2237. }
  2238. if (dr->dr_complete) {
  2239. eodr = (cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) ?
  2240. 2 : 1;
  2241. iscsit_free_datain_req(cmd, dr);
  2242. }
  2243. return eodr;
  2244. }
  2245. static int iscsit_send_logout_response(
  2246. struct iscsi_cmd *cmd,
  2247. struct iscsi_conn *conn)
  2248. {
  2249. int niov = 0, tx_size;
  2250. struct iscsi_conn *logout_conn = NULL;
  2251. struct iscsi_conn_recovery *cr = NULL;
  2252. struct iscsi_session *sess = conn->sess;
  2253. struct kvec *iov;
  2254. struct iscsi_logout_rsp *hdr;
  2255. /*
  2256. * The actual shutting down of Sessions and/or Connections
  2257. * for CLOSESESSION and CLOSECONNECTION Logout Requests
  2258. * is done in scsi_logout_post_handler().
  2259. */
  2260. switch (cmd->logout_reason) {
  2261. case ISCSI_LOGOUT_REASON_CLOSE_SESSION:
  2262. pr_debug("iSCSI session logout successful, setting"
  2263. " logout response to ISCSI_LOGOUT_SUCCESS.\n");
  2264. cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
  2265. break;
  2266. case ISCSI_LOGOUT_REASON_CLOSE_CONNECTION:
  2267. if (cmd->logout_response == ISCSI_LOGOUT_CID_NOT_FOUND)
  2268. break;
  2269. /*
  2270. * For CLOSECONNECTION logout requests carrying
  2271. * a matching logout CID -> local CID, the reference
  2272. * for the local CID will have been incremented in
  2273. * iscsi_logout_closeconnection().
  2274. *
  2275. * For CLOSECONNECTION logout requests carrying
  2276. * a different CID than the connection it arrived
  2277. * on, the connection responding to cmd->logout_cid
  2278. * is stopped in iscsit_logout_post_handler_diffcid().
  2279. */
  2280. pr_debug("iSCSI CID: %hu logout on CID: %hu"
  2281. " successful.\n", cmd->logout_cid, conn->cid);
  2282. cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
  2283. break;
  2284. case ISCSI_LOGOUT_REASON_RECOVERY:
  2285. if ((cmd->logout_response == ISCSI_LOGOUT_RECOVERY_UNSUPPORTED) ||
  2286. (cmd->logout_response == ISCSI_LOGOUT_CLEANUP_FAILED))
  2287. break;
  2288. /*
  2289. * If the connection is still active from our point of view
  2290. * force connection recovery to occur.
  2291. */
  2292. logout_conn = iscsit_get_conn_from_cid_rcfr(sess,
  2293. cmd->logout_cid);
  2294. if ((logout_conn)) {
  2295. iscsit_connection_reinstatement_rcfr(logout_conn);
  2296. iscsit_dec_conn_usage_count(logout_conn);
  2297. }
  2298. cr = iscsit_get_inactive_connection_recovery_entry(
  2299. conn->sess, cmd->logout_cid);
  2300. if (!cr) {
  2301. pr_err("Unable to locate CID: %hu for"
  2302. " REMOVECONNFORRECOVERY Logout Request.\n",
  2303. cmd->logout_cid);
  2304. cmd->logout_response = ISCSI_LOGOUT_CID_NOT_FOUND;
  2305. break;
  2306. }
  2307. iscsit_discard_cr_cmds_by_expstatsn(cr, cmd->exp_stat_sn);
  2308. pr_debug("iSCSI REMOVECONNFORRECOVERY logout"
  2309. " for recovery for CID: %hu on CID: %hu successful.\n",
  2310. cmd->logout_cid, conn->cid);
  2311. cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
  2312. break;
  2313. default:
  2314. pr_err("Unknown cmd->logout_reason: 0x%02x\n",
  2315. cmd->logout_reason);
  2316. return -1;
  2317. }
  2318. tx_size = ISCSI_HDR_LEN;
  2319. hdr = (struct iscsi_logout_rsp *)cmd->pdu;
  2320. memset(hdr, 0, ISCSI_HDR_LEN);
  2321. hdr->opcode = ISCSI_OP_LOGOUT_RSP;
  2322. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2323. hdr->response = cmd->logout_response;
  2324. hdr->itt = cpu_to_be32(cmd->init_task_tag);
  2325. cmd->stat_sn = conn->stat_sn++;
  2326. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2327. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2328. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2329. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2330. iov = &cmd->iov_misc[0];
  2331. iov[niov].iov_base = cmd->pdu;
  2332. iov[niov++].iov_len = ISCSI_HDR_LEN;
  2333. if (conn->conn_ops->HeaderDigest) {
  2334. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2335. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2336. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2337. 0, NULL, (u8 *)header_digest);
  2338. iov[0].iov_len += ISCSI_CRC_LEN;
  2339. tx_size += ISCSI_CRC_LEN;
  2340. pr_debug("Attaching CRC32C HeaderDigest to"
  2341. " Logout Response 0x%08x\n", *header_digest);
  2342. }
  2343. cmd->iov_misc_count = niov;
  2344. cmd->tx_size = tx_size;
  2345. pr_debug("Sending Logout Response ITT: 0x%08x StatSN:"
  2346. " 0x%08x Response: 0x%02x CID: %hu on CID: %hu\n",
  2347. cmd->init_task_tag, cmd->stat_sn, hdr->response,
  2348. cmd->logout_cid, conn->cid);
  2349. return 0;
  2350. }
  2351. /*
  2352. * Unsolicited NOPIN, either requesting a response or not.
  2353. */
  2354. static int iscsit_send_unsolicited_nopin(
  2355. struct iscsi_cmd *cmd,
  2356. struct iscsi_conn *conn,
  2357. int want_response)
  2358. {
  2359. int tx_size = ISCSI_HDR_LEN;
  2360. struct iscsi_nopin *hdr;
  2361. int ret;
  2362. hdr = (struct iscsi_nopin *) cmd->pdu;
  2363. memset(hdr, 0, ISCSI_HDR_LEN);
  2364. hdr->opcode = ISCSI_OP_NOOP_IN;
  2365. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2366. hdr->itt = cpu_to_be32(cmd->init_task_tag);
  2367. hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
  2368. cmd->stat_sn = conn->stat_sn;
  2369. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2370. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2371. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2372. if (conn->conn_ops->HeaderDigest) {
  2373. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2374. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2375. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2376. 0, NULL, (u8 *)header_digest);
  2377. tx_size += ISCSI_CRC_LEN;
  2378. pr_debug("Attaching CRC32C HeaderDigest to"
  2379. " NopIN 0x%08x\n", *header_digest);
  2380. }
  2381. cmd->iov_misc[0].iov_base = cmd->pdu;
  2382. cmd->iov_misc[0].iov_len = tx_size;
  2383. cmd->iov_misc_count = 1;
  2384. cmd->tx_size = tx_size;
  2385. pr_debug("Sending Unsolicited NOPIN TTT: 0x%08x StatSN:"
  2386. " 0x%08x CID: %hu\n", hdr->ttt, cmd->stat_sn, conn->cid);
  2387. ret = iscsit_send_tx_data(cmd, conn, 1);
  2388. if (ret < 0) {
  2389. iscsit_tx_thread_wait_for_tcp(conn);
  2390. return ret;
  2391. }
  2392. spin_lock_bh(&cmd->istate_lock);
  2393. cmd->i_state = want_response ?
  2394. ISTATE_SENT_NOPIN_WANT_RESPONSE : ISTATE_SENT_STATUS;
  2395. spin_unlock_bh(&cmd->istate_lock);
  2396. return 0;
  2397. }
  2398. static int iscsit_send_nopin_response(
  2399. struct iscsi_cmd *cmd,
  2400. struct iscsi_conn *conn)
  2401. {
  2402. int niov = 0, tx_size;
  2403. u32 padding = 0;
  2404. struct kvec *iov;
  2405. struct iscsi_nopin *hdr;
  2406. tx_size = ISCSI_HDR_LEN;
  2407. hdr = (struct iscsi_nopin *) cmd->pdu;
  2408. memset(hdr, 0, ISCSI_HDR_LEN);
  2409. hdr->opcode = ISCSI_OP_NOOP_IN;
  2410. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2411. hton24(hdr->dlength, cmd->buf_ptr_size);
  2412. put_unaligned_le64(0xFFFFFFFFFFFFFFFFULL, &hdr->lun);
  2413. hdr->itt = cpu_to_be32(cmd->init_task_tag);
  2414. hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
  2415. cmd->stat_sn = conn->stat_sn++;
  2416. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2417. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2418. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2419. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2420. iov = &cmd->iov_misc[0];
  2421. iov[niov].iov_base = cmd->pdu;
  2422. iov[niov++].iov_len = ISCSI_HDR_LEN;
  2423. if (conn->conn_ops->HeaderDigest) {
  2424. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2425. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2426. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2427. 0, NULL, (u8 *)header_digest);
  2428. iov[0].iov_len += ISCSI_CRC_LEN;
  2429. tx_size += ISCSI_CRC_LEN;
  2430. pr_debug("Attaching CRC32C HeaderDigest"
  2431. " to NopIn 0x%08x\n", *header_digest);
  2432. }
  2433. /*
  2434. * NOPOUT Ping Data is attached to struct iscsi_cmd->buf_ptr.
  2435. * NOPOUT DataSegmentLength is at struct iscsi_cmd->buf_ptr_size.
  2436. */
  2437. if (cmd->buf_ptr_size) {
  2438. iov[niov].iov_base = cmd->buf_ptr;
  2439. iov[niov++].iov_len = cmd->buf_ptr_size;
  2440. tx_size += cmd->buf_ptr_size;
  2441. pr_debug("Echoing back %u bytes of ping"
  2442. " data.\n", cmd->buf_ptr_size);
  2443. padding = ((-cmd->buf_ptr_size) & 3);
  2444. if (padding != 0) {
  2445. iov[niov].iov_base = &cmd->pad_bytes;
  2446. iov[niov++].iov_len = padding;
  2447. tx_size += padding;
  2448. pr_debug("Attaching %u additional"
  2449. " padding bytes.\n", padding);
  2450. }
  2451. if (conn->conn_ops->DataDigest) {
  2452. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2453. cmd->buf_ptr, cmd->buf_ptr_size,
  2454. padding, (u8 *)&cmd->pad_bytes,
  2455. (u8 *)&cmd->data_crc);
  2456. iov[niov].iov_base = &cmd->data_crc;
  2457. iov[niov++].iov_len = ISCSI_CRC_LEN;
  2458. tx_size += ISCSI_CRC_LEN;
  2459. pr_debug("Attached DataDigest for %u"
  2460. " bytes of ping data, CRC 0x%08x\n",
  2461. cmd->buf_ptr_size, cmd->data_crc);
  2462. }
  2463. }
  2464. cmd->iov_misc_count = niov;
  2465. cmd->tx_size = tx_size;
  2466. pr_debug("Sending NOPIN Response ITT: 0x%08x, TTT:"
  2467. " 0x%08x, StatSN: 0x%08x, Length %u\n", cmd->init_task_tag,
  2468. cmd->targ_xfer_tag, cmd->stat_sn, cmd->buf_ptr_size);
  2469. return 0;
  2470. }
  2471. static int iscsit_send_r2t(
  2472. struct iscsi_cmd *cmd,
  2473. struct iscsi_conn *conn)
  2474. {
  2475. int tx_size = 0;
  2476. struct iscsi_r2t *r2t;
  2477. struct iscsi_r2t_rsp *hdr;
  2478. int ret;
  2479. r2t = iscsit_get_r2t_from_list(cmd);
  2480. if (!r2t)
  2481. return -1;
  2482. hdr = (struct iscsi_r2t_rsp *) cmd->pdu;
  2483. memset(hdr, 0, ISCSI_HDR_LEN);
  2484. hdr->opcode = ISCSI_OP_R2T;
  2485. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2486. int_to_scsilun(cmd->se_cmd.orig_fe_lun,
  2487. (struct scsi_lun *)&hdr->lun);
  2488. hdr->itt = cpu_to_be32(cmd->init_task_tag);
  2489. spin_lock_bh(&conn->sess->ttt_lock);
  2490. r2t->targ_xfer_tag = conn->sess->targ_xfer_tag++;
  2491. if (r2t->targ_xfer_tag == 0xFFFFFFFF)
  2492. r2t->targ_xfer_tag = conn->sess->targ_xfer_tag++;
  2493. spin_unlock_bh(&conn->sess->ttt_lock);
  2494. hdr->ttt = cpu_to_be32(r2t->targ_xfer_tag);
  2495. hdr->statsn = cpu_to_be32(conn->stat_sn);
  2496. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2497. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2498. hdr->r2tsn = cpu_to_be32(r2t->r2t_sn);
  2499. hdr->data_offset = cpu_to_be32(r2t->offset);
  2500. hdr->data_length = cpu_to_be32(r2t->xfer_len);
  2501. cmd->iov_misc[0].iov_base = cmd->pdu;
  2502. cmd->iov_misc[0].iov_len = ISCSI_HDR_LEN;
  2503. tx_size += ISCSI_HDR_LEN;
  2504. if (conn->conn_ops->HeaderDigest) {
  2505. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2506. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2507. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2508. 0, NULL, (u8 *)header_digest);
  2509. cmd->iov_misc[0].iov_len += ISCSI_CRC_LEN;
  2510. tx_size += ISCSI_CRC_LEN;
  2511. pr_debug("Attaching CRC32 HeaderDigest for R2T"
  2512. " PDU 0x%08x\n", *header_digest);
  2513. }
  2514. pr_debug("Built %sR2T, ITT: 0x%08x, TTT: 0x%08x, StatSN:"
  2515. " 0x%08x, R2TSN: 0x%08x, Offset: %u, DDTL: %u, CID: %hu\n",
  2516. (!r2t->recovery_r2t) ? "" : "Recovery ", cmd->init_task_tag,
  2517. r2t->targ_xfer_tag, ntohl(hdr->statsn), r2t->r2t_sn,
  2518. r2t->offset, r2t->xfer_len, conn->cid);
  2519. cmd->iov_misc_count = 1;
  2520. cmd->tx_size = tx_size;
  2521. spin_lock_bh(&cmd->r2t_lock);
  2522. r2t->sent_r2t = 1;
  2523. spin_unlock_bh(&cmd->r2t_lock);
  2524. ret = iscsit_send_tx_data(cmd, conn, 1);
  2525. if (ret < 0) {
  2526. iscsit_tx_thread_wait_for_tcp(conn);
  2527. return ret;
  2528. }
  2529. spin_lock_bh(&cmd->dataout_timeout_lock);
  2530. iscsit_start_dataout_timer(cmd, conn);
  2531. spin_unlock_bh(&cmd->dataout_timeout_lock);
  2532. return 0;
  2533. }
  2534. /*
  2535. * @recovery: If called from iscsi_task_reassign_complete_write() for
  2536. * connection recovery.
  2537. */
  2538. int iscsit_build_r2ts_for_cmd(
  2539. struct iscsi_cmd *cmd,
  2540. struct iscsi_conn *conn,
  2541. bool recovery)
  2542. {
  2543. int first_r2t = 1;
  2544. u32 offset = 0, xfer_len = 0;
  2545. spin_lock_bh(&cmd->r2t_lock);
  2546. if (cmd->cmd_flags & ICF_SENT_LAST_R2T) {
  2547. spin_unlock_bh(&cmd->r2t_lock);
  2548. return 0;
  2549. }
  2550. if (conn->sess->sess_ops->DataSequenceInOrder &&
  2551. !recovery)
  2552. cmd->r2t_offset = max(cmd->r2t_offset, cmd->write_data_done);
  2553. while (cmd->outstanding_r2ts < conn->sess->sess_ops->MaxOutstandingR2T) {
  2554. if (conn->sess->sess_ops->DataSequenceInOrder) {
  2555. offset = cmd->r2t_offset;
  2556. if (first_r2t && recovery) {
  2557. int new_data_end = offset +
  2558. conn->sess->sess_ops->MaxBurstLength -
  2559. cmd->next_burst_len;
  2560. if (new_data_end > cmd->data_length)
  2561. xfer_len = cmd->data_length - offset;
  2562. else
  2563. xfer_len =
  2564. conn->sess->sess_ops->MaxBurstLength -
  2565. cmd->next_burst_len;
  2566. } else {
  2567. int new_data_end = offset +
  2568. conn->sess->sess_ops->MaxBurstLength;
  2569. if (new_data_end > cmd->data_length)
  2570. xfer_len = cmd->data_length - offset;
  2571. else
  2572. xfer_len = conn->sess->sess_ops->MaxBurstLength;
  2573. }
  2574. cmd->r2t_offset += xfer_len;
  2575. if (cmd->r2t_offset == cmd->data_length)
  2576. cmd->cmd_flags |= ICF_SENT_LAST_R2T;
  2577. } else {
  2578. struct iscsi_seq *seq;
  2579. seq = iscsit_get_seq_holder_for_r2t(cmd);
  2580. if (!seq) {
  2581. spin_unlock_bh(&cmd->r2t_lock);
  2582. return -1;
  2583. }
  2584. offset = seq->offset;
  2585. xfer_len = seq->xfer_len;
  2586. if (cmd->seq_send_order == cmd->seq_count)
  2587. cmd->cmd_flags |= ICF_SENT_LAST_R2T;
  2588. }
  2589. cmd->outstanding_r2ts++;
  2590. first_r2t = 0;
  2591. if (iscsit_add_r2t_to_list(cmd, offset, xfer_len, 0, 0) < 0) {
  2592. spin_unlock_bh(&cmd->r2t_lock);
  2593. return -1;
  2594. }
  2595. if (cmd->cmd_flags & ICF_SENT_LAST_R2T)
  2596. break;
  2597. }
  2598. spin_unlock_bh(&cmd->r2t_lock);
  2599. return 0;
  2600. }
  2601. static int iscsit_send_status(
  2602. struct iscsi_cmd *cmd,
  2603. struct iscsi_conn *conn)
  2604. {
  2605. u8 iov_count = 0, recovery;
  2606. u32 padding = 0, tx_size = 0;
  2607. struct iscsi_scsi_rsp *hdr;
  2608. struct kvec *iov;
  2609. recovery = (cmd->i_state != ISTATE_SEND_STATUS);
  2610. if (!recovery)
  2611. cmd->stat_sn = conn->stat_sn++;
  2612. spin_lock_bh(&conn->sess->session_stats_lock);
  2613. conn->sess->rsp_pdus++;
  2614. spin_unlock_bh(&conn->sess->session_stats_lock);
  2615. hdr = (struct iscsi_scsi_rsp *) cmd->pdu;
  2616. memset(hdr, 0, ISCSI_HDR_LEN);
  2617. hdr->opcode = ISCSI_OP_SCSI_CMD_RSP;
  2618. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2619. if (cmd->se_cmd.se_cmd_flags & SCF_OVERFLOW_BIT) {
  2620. hdr->flags |= ISCSI_FLAG_CMD_OVERFLOW;
  2621. hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
  2622. } else if (cmd->se_cmd.se_cmd_flags & SCF_UNDERFLOW_BIT) {
  2623. hdr->flags |= ISCSI_FLAG_CMD_UNDERFLOW;
  2624. hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
  2625. }
  2626. hdr->response = cmd->iscsi_response;
  2627. hdr->cmd_status = cmd->se_cmd.scsi_status;
  2628. hdr->itt = cpu_to_be32(cmd->init_task_tag);
  2629. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2630. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2631. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2632. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2633. iov = &cmd->iov_misc[0];
  2634. iov[iov_count].iov_base = cmd->pdu;
  2635. iov[iov_count++].iov_len = ISCSI_HDR_LEN;
  2636. tx_size += ISCSI_HDR_LEN;
  2637. /*
  2638. * Attach SENSE DATA payload to iSCSI Response PDU
  2639. */
  2640. if (cmd->se_cmd.sense_buffer &&
  2641. ((cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) ||
  2642. (cmd->se_cmd.se_cmd_flags & SCF_EMULATED_TASK_SENSE))) {
  2643. padding = -(cmd->se_cmd.scsi_sense_length) & 3;
  2644. hton24(hdr->dlength, cmd->se_cmd.scsi_sense_length);
  2645. iov[iov_count].iov_base = cmd->se_cmd.sense_buffer;
  2646. iov[iov_count++].iov_len =
  2647. (cmd->se_cmd.scsi_sense_length + padding);
  2648. tx_size += cmd->se_cmd.scsi_sense_length;
  2649. if (padding) {
  2650. memset(cmd->se_cmd.sense_buffer +
  2651. cmd->se_cmd.scsi_sense_length, 0, padding);
  2652. tx_size += padding;
  2653. pr_debug("Adding %u bytes of padding to"
  2654. " SENSE.\n", padding);
  2655. }
  2656. if (conn->conn_ops->DataDigest) {
  2657. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2658. cmd->se_cmd.sense_buffer,
  2659. (cmd->se_cmd.scsi_sense_length + padding),
  2660. 0, NULL, (u8 *)&cmd->data_crc);
  2661. iov[iov_count].iov_base = &cmd->data_crc;
  2662. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  2663. tx_size += ISCSI_CRC_LEN;
  2664. pr_debug("Attaching CRC32 DataDigest for"
  2665. " SENSE, %u bytes CRC 0x%08x\n",
  2666. (cmd->se_cmd.scsi_sense_length + padding),
  2667. cmd->data_crc);
  2668. }
  2669. pr_debug("Attaching SENSE DATA: %u bytes to iSCSI"
  2670. " Response PDU\n",
  2671. cmd->se_cmd.scsi_sense_length);
  2672. }
  2673. if (conn->conn_ops->HeaderDigest) {
  2674. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2675. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2676. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2677. 0, NULL, (u8 *)header_digest);
  2678. iov[0].iov_len += ISCSI_CRC_LEN;
  2679. tx_size += ISCSI_CRC_LEN;
  2680. pr_debug("Attaching CRC32 HeaderDigest for Response"
  2681. " PDU 0x%08x\n", *header_digest);
  2682. }
  2683. cmd->iov_misc_count = iov_count;
  2684. cmd->tx_size = tx_size;
  2685. pr_debug("Built %sSCSI Response, ITT: 0x%08x, StatSN: 0x%08x,"
  2686. " Response: 0x%02x, SAM Status: 0x%02x, CID: %hu\n",
  2687. (!recovery) ? "" : "Recovery ", cmd->init_task_tag,
  2688. cmd->stat_sn, 0x00, cmd->se_cmd.scsi_status, conn->cid);
  2689. return 0;
  2690. }
  2691. static u8 iscsit_convert_tcm_tmr_rsp(struct se_tmr_req *se_tmr)
  2692. {
  2693. switch (se_tmr->response) {
  2694. case TMR_FUNCTION_COMPLETE:
  2695. return ISCSI_TMF_RSP_COMPLETE;
  2696. case TMR_TASK_DOES_NOT_EXIST:
  2697. return ISCSI_TMF_RSP_NO_TASK;
  2698. case TMR_LUN_DOES_NOT_EXIST:
  2699. return ISCSI_TMF_RSP_NO_LUN;
  2700. case TMR_TASK_MGMT_FUNCTION_NOT_SUPPORTED:
  2701. return ISCSI_TMF_RSP_NOT_SUPPORTED;
  2702. case TMR_FUNCTION_AUTHORIZATION_FAILED:
  2703. return ISCSI_TMF_RSP_AUTH_FAILED;
  2704. case TMR_FUNCTION_REJECTED:
  2705. default:
  2706. return ISCSI_TMF_RSP_REJECTED;
  2707. }
  2708. }
  2709. static int iscsit_send_task_mgt_rsp(
  2710. struct iscsi_cmd *cmd,
  2711. struct iscsi_conn *conn)
  2712. {
  2713. struct se_tmr_req *se_tmr = cmd->se_cmd.se_tmr_req;
  2714. struct iscsi_tm_rsp *hdr;
  2715. u32 tx_size = 0;
  2716. hdr = (struct iscsi_tm_rsp *) cmd->pdu;
  2717. memset(hdr, 0, ISCSI_HDR_LEN);
  2718. hdr->opcode = ISCSI_OP_SCSI_TMFUNC_RSP;
  2719. hdr->flags = ISCSI_FLAG_CMD_FINAL;
  2720. hdr->response = iscsit_convert_tcm_tmr_rsp(se_tmr);
  2721. hdr->itt = cpu_to_be32(cmd->init_task_tag);
  2722. cmd->stat_sn = conn->stat_sn++;
  2723. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2724. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2725. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2726. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2727. cmd->iov_misc[0].iov_base = cmd->pdu;
  2728. cmd->iov_misc[0].iov_len = ISCSI_HDR_LEN;
  2729. tx_size += ISCSI_HDR_LEN;
  2730. if (conn->conn_ops->HeaderDigest) {
  2731. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2732. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2733. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2734. 0, NULL, (u8 *)header_digest);
  2735. cmd->iov_misc[0].iov_len += ISCSI_CRC_LEN;
  2736. tx_size += ISCSI_CRC_LEN;
  2737. pr_debug("Attaching CRC32 HeaderDigest for Task"
  2738. " Mgmt Response PDU 0x%08x\n", *header_digest);
  2739. }
  2740. cmd->iov_misc_count = 1;
  2741. cmd->tx_size = tx_size;
  2742. pr_debug("Built Task Management Response ITT: 0x%08x,"
  2743. " StatSN: 0x%08x, Response: 0x%02x, CID: %hu\n",
  2744. cmd->init_task_tag, cmd->stat_sn, hdr->response, conn->cid);
  2745. return 0;
  2746. }
  2747. static bool iscsit_check_inaddr_any(struct iscsi_np *np)
  2748. {
  2749. bool ret = false;
  2750. if (np->np_sockaddr.ss_family == AF_INET6) {
  2751. const struct sockaddr_in6 sin6 = {
  2752. .sin6_addr = IN6ADDR_ANY_INIT };
  2753. struct sockaddr_in6 *sock_in6 =
  2754. (struct sockaddr_in6 *)&np->np_sockaddr;
  2755. if (!memcmp(sock_in6->sin6_addr.s6_addr,
  2756. sin6.sin6_addr.s6_addr, 16))
  2757. ret = true;
  2758. } else {
  2759. struct sockaddr_in * sock_in =
  2760. (struct sockaddr_in *)&np->np_sockaddr;
  2761. if (sock_in->sin_addr.s_addr == INADDR_ANY)
  2762. ret = true;
  2763. }
  2764. return ret;
  2765. }
  2766. #define SENDTARGETS_BUF_LIMIT 32768U
  2767. static int iscsit_build_sendtargets_response(struct iscsi_cmd *cmd)
  2768. {
  2769. char *payload = NULL;
  2770. struct iscsi_conn *conn = cmd->conn;
  2771. struct iscsi_portal_group *tpg;
  2772. struct iscsi_tiqn *tiqn;
  2773. struct iscsi_tpg_np *tpg_np;
  2774. int buffer_len, end_of_buf = 0, len = 0, payload_len = 0;
  2775. unsigned char buf[ISCSI_IQN_LEN+12]; /* iqn + "TargetName=" + \0 */
  2776. buffer_len = max(conn->conn_ops->MaxRecvDataSegmentLength,
  2777. SENDTARGETS_BUF_LIMIT);
  2778. payload = kzalloc(buffer_len, GFP_KERNEL);
  2779. if (!payload) {
  2780. pr_err("Unable to allocate memory for sendtargets"
  2781. " response.\n");
  2782. return -ENOMEM;
  2783. }
  2784. spin_lock(&tiqn_lock);
  2785. list_for_each_entry(tiqn, &g_tiqn_list, tiqn_list) {
  2786. len = sprintf(buf, "TargetName=%s", tiqn->tiqn);
  2787. len += 1;
  2788. if ((len + payload_len) > buffer_len) {
  2789. spin_unlock(&tiqn->tiqn_tpg_lock);
  2790. end_of_buf = 1;
  2791. goto eob;
  2792. }
  2793. memcpy(payload + payload_len, buf, len);
  2794. payload_len += len;
  2795. spin_lock(&tiqn->tiqn_tpg_lock);
  2796. list_for_each_entry(tpg, &tiqn->tiqn_tpg_list, tpg_list) {
  2797. spin_lock(&tpg->tpg_state_lock);
  2798. if ((tpg->tpg_state == TPG_STATE_FREE) ||
  2799. (tpg->tpg_state == TPG_STATE_INACTIVE)) {
  2800. spin_unlock(&tpg->tpg_state_lock);
  2801. continue;
  2802. }
  2803. spin_unlock(&tpg->tpg_state_lock);
  2804. spin_lock(&tpg->tpg_np_lock);
  2805. list_for_each_entry(tpg_np, &tpg->tpg_gnp_list,
  2806. tpg_np_list) {
  2807. struct iscsi_np *np = tpg_np->tpg_np;
  2808. bool inaddr_any = iscsit_check_inaddr_any(np);
  2809. len = sprintf(buf, "TargetAddress="
  2810. "%s%s%s:%hu,%hu",
  2811. (np->np_sockaddr.ss_family == AF_INET6) ?
  2812. "[" : "", (inaddr_any == false) ?
  2813. np->np_ip : conn->local_ip,
  2814. (np->np_sockaddr.ss_family == AF_INET6) ?
  2815. "]" : "", (inaddr_any == false) ?
  2816. np->np_port : conn->local_port,
  2817. tpg->tpgt);
  2818. len += 1;
  2819. if ((len + payload_len) > buffer_len) {
  2820. spin_unlock(&tpg->tpg_np_lock);
  2821. spin_unlock(&tiqn->tiqn_tpg_lock);
  2822. end_of_buf = 1;
  2823. goto eob;
  2824. }
  2825. memcpy(payload + payload_len, buf, len);
  2826. payload_len += len;
  2827. }
  2828. spin_unlock(&tpg->tpg_np_lock);
  2829. }
  2830. spin_unlock(&tiqn->tiqn_tpg_lock);
  2831. eob:
  2832. if (end_of_buf)
  2833. break;
  2834. }
  2835. spin_unlock(&tiqn_lock);
  2836. cmd->buf_ptr = payload;
  2837. return payload_len;
  2838. }
  2839. /*
  2840. * FIXME: Add support for F_BIT and C_BIT when the length is longer than
  2841. * MaxRecvDataSegmentLength.
  2842. */
  2843. static int iscsit_send_text_rsp(
  2844. struct iscsi_cmd *cmd,
  2845. struct iscsi_conn *conn)
  2846. {
  2847. struct iscsi_text_rsp *hdr;
  2848. struct kvec *iov;
  2849. u32 padding = 0, tx_size = 0;
  2850. int text_length, iov_count = 0;
  2851. text_length = iscsit_build_sendtargets_response(cmd);
  2852. if (text_length < 0)
  2853. return text_length;
  2854. padding = ((-text_length) & 3);
  2855. if (padding != 0) {
  2856. memset(cmd->buf_ptr + text_length, 0, padding);
  2857. pr_debug("Attaching %u additional bytes for"
  2858. " padding.\n", padding);
  2859. }
  2860. hdr = (struct iscsi_text_rsp *) cmd->pdu;
  2861. memset(hdr, 0, ISCSI_HDR_LEN);
  2862. hdr->opcode = ISCSI_OP_TEXT_RSP;
  2863. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2864. hton24(hdr->dlength, text_length);
  2865. hdr->itt = cpu_to_be32(cmd->init_task_tag);
  2866. hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
  2867. cmd->stat_sn = conn->stat_sn++;
  2868. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2869. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2870. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2871. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2872. iov = &cmd->iov_misc[0];
  2873. iov[iov_count].iov_base = cmd->pdu;
  2874. iov[iov_count++].iov_len = ISCSI_HDR_LEN;
  2875. iov[iov_count].iov_base = cmd->buf_ptr;
  2876. iov[iov_count++].iov_len = text_length + padding;
  2877. tx_size += (ISCSI_HDR_LEN + text_length + padding);
  2878. if (conn->conn_ops->HeaderDigest) {
  2879. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2880. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2881. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2882. 0, NULL, (u8 *)header_digest);
  2883. iov[0].iov_len += ISCSI_CRC_LEN;
  2884. tx_size += ISCSI_CRC_LEN;
  2885. pr_debug("Attaching CRC32 HeaderDigest for"
  2886. " Text Response PDU 0x%08x\n", *header_digest);
  2887. }
  2888. if (conn->conn_ops->DataDigest) {
  2889. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2890. cmd->buf_ptr, (text_length + padding),
  2891. 0, NULL, (u8 *)&cmd->data_crc);
  2892. iov[iov_count].iov_base = &cmd->data_crc;
  2893. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  2894. tx_size += ISCSI_CRC_LEN;
  2895. pr_debug("Attaching DataDigest for %u bytes of text"
  2896. " data, CRC 0x%08x\n", (text_length + padding),
  2897. cmd->data_crc);
  2898. }
  2899. cmd->iov_misc_count = iov_count;
  2900. cmd->tx_size = tx_size;
  2901. pr_debug("Built Text Response: ITT: 0x%08x, StatSN: 0x%08x,"
  2902. " Length: %u, CID: %hu\n", cmd->init_task_tag, cmd->stat_sn,
  2903. text_length, conn->cid);
  2904. return 0;
  2905. }
  2906. static int iscsit_send_reject(
  2907. struct iscsi_cmd *cmd,
  2908. struct iscsi_conn *conn)
  2909. {
  2910. u32 iov_count = 0, tx_size = 0;
  2911. struct iscsi_reject *hdr;
  2912. struct kvec *iov;
  2913. hdr = (struct iscsi_reject *) cmd->pdu;
  2914. hdr->opcode = ISCSI_OP_REJECT;
  2915. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2916. hton24(hdr->dlength, ISCSI_HDR_LEN);
  2917. cmd->stat_sn = conn->stat_sn++;
  2918. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2919. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2920. hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
  2921. iov = &cmd->iov_misc[0];
  2922. iov[iov_count].iov_base = cmd->pdu;
  2923. iov[iov_count++].iov_len = ISCSI_HDR_LEN;
  2924. iov[iov_count].iov_base = cmd->buf_ptr;
  2925. iov[iov_count++].iov_len = ISCSI_HDR_LEN;
  2926. tx_size = (ISCSI_HDR_LEN + ISCSI_HDR_LEN);
  2927. if (conn->conn_ops->HeaderDigest) {
  2928. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  2929. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2930. (unsigned char *)hdr, ISCSI_HDR_LEN,
  2931. 0, NULL, (u8 *)header_digest);
  2932. iov[0].iov_len += ISCSI_CRC_LEN;
  2933. tx_size += ISCSI_CRC_LEN;
  2934. pr_debug("Attaching CRC32 HeaderDigest for"
  2935. " REJECT PDU 0x%08x\n", *header_digest);
  2936. }
  2937. if (conn->conn_ops->DataDigest) {
  2938. iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
  2939. (unsigned char *)cmd->buf_ptr, ISCSI_HDR_LEN,
  2940. 0, NULL, (u8 *)&cmd->data_crc);
  2941. iov[iov_count].iov_base = &cmd->data_crc;
  2942. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  2943. tx_size += ISCSI_CRC_LEN;
  2944. pr_debug("Attaching CRC32 DataDigest for REJECT"
  2945. " PDU 0x%08x\n", cmd->data_crc);
  2946. }
  2947. cmd->iov_misc_count = iov_count;
  2948. cmd->tx_size = tx_size;
  2949. pr_debug("Built Reject PDU StatSN: 0x%08x, Reason: 0x%02x,"
  2950. " CID: %hu\n", ntohl(hdr->statsn), hdr->reason, conn->cid);
  2951. return 0;
  2952. }
  2953. void iscsit_thread_get_cpumask(struct iscsi_conn *conn)
  2954. {
  2955. struct iscsi_thread_set *ts = conn->thread_set;
  2956. int ord, cpu;
  2957. /*
  2958. * thread_id is assigned from iscsit_global->ts_bitmap from
  2959. * within iscsi_thread_set.c:iscsi_allocate_thread_sets()
  2960. *
  2961. * Here we use thread_id to determine which CPU that this
  2962. * iSCSI connection's iscsi_thread_set will be scheduled to
  2963. * execute upon.
  2964. */
  2965. ord = ts->thread_id % cpumask_weight(cpu_online_mask);
  2966. for_each_online_cpu(cpu) {
  2967. if (ord-- == 0) {
  2968. cpumask_set_cpu(cpu, conn->conn_cpumask);
  2969. return;
  2970. }
  2971. }
  2972. /*
  2973. * This should never be reached..
  2974. */
  2975. dump_stack();
  2976. cpumask_setall(conn->conn_cpumask);
  2977. }
  2978. static inline void iscsit_thread_check_cpumask(
  2979. struct iscsi_conn *conn,
  2980. struct task_struct *p,
  2981. int mode)
  2982. {
  2983. char buf[128];
  2984. /*
  2985. * mode == 1 signals iscsi_target_tx_thread() usage.
  2986. * mode == 0 signals iscsi_target_rx_thread() usage.
  2987. */
  2988. if (mode == 1) {
  2989. if (!conn->conn_tx_reset_cpumask)
  2990. return;
  2991. conn->conn_tx_reset_cpumask = 0;
  2992. } else {
  2993. if (!conn->conn_rx_reset_cpumask)
  2994. return;
  2995. conn->conn_rx_reset_cpumask = 0;
  2996. }
  2997. /*
  2998. * Update the CPU mask for this single kthread so that
  2999. * both TX and RX kthreads are scheduled to run on the
  3000. * same CPU.
  3001. */
  3002. memset(buf, 0, 128);
  3003. cpumask_scnprintf(buf, 128, conn->conn_cpumask);
  3004. set_cpus_allowed_ptr(p, conn->conn_cpumask);
  3005. }
  3006. static int handle_immediate_queue(struct iscsi_conn *conn)
  3007. {
  3008. struct iscsi_queue_req *qr;
  3009. struct iscsi_cmd *cmd;
  3010. u8 state;
  3011. int ret;
  3012. while ((qr = iscsit_get_cmd_from_immediate_queue(conn))) {
  3013. atomic_set(&conn->check_immediate_queue, 0);
  3014. cmd = qr->cmd;
  3015. state = qr->state;
  3016. kmem_cache_free(lio_qr_cache, qr);
  3017. switch (state) {
  3018. case ISTATE_SEND_R2T:
  3019. ret = iscsit_send_r2t(cmd, conn);
  3020. if (ret < 0)
  3021. goto err;
  3022. break;
  3023. case ISTATE_REMOVE:
  3024. if (cmd->data_direction == DMA_TO_DEVICE)
  3025. iscsit_stop_dataout_timer(cmd);
  3026. spin_lock_bh(&conn->cmd_lock);
  3027. list_del(&cmd->i_conn_node);
  3028. spin_unlock_bh(&conn->cmd_lock);
  3029. iscsit_free_cmd(cmd);
  3030. continue;
  3031. case ISTATE_SEND_NOPIN_WANT_RESPONSE:
  3032. iscsit_mod_nopin_response_timer(conn);
  3033. ret = iscsit_send_unsolicited_nopin(cmd,
  3034. conn, 1);
  3035. if (ret < 0)
  3036. goto err;
  3037. break;
  3038. case ISTATE_SEND_NOPIN_NO_RESPONSE:
  3039. ret = iscsit_send_unsolicited_nopin(cmd,
  3040. conn, 0);
  3041. if (ret < 0)
  3042. goto err;
  3043. break;
  3044. default:
  3045. pr_err("Unknown Opcode: 0x%02x ITT:"
  3046. " 0x%08x, i_state: %d on CID: %hu\n",
  3047. cmd->iscsi_opcode, cmd->init_task_tag, state,
  3048. conn->cid);
  3049. goto err;
  3050. }
  3051. }
  3052. return 0;
  3053. err:
  3054. return -1;
  3055. }
  3056. static int handle_response_queue(struct iscsi_conn *conn)
  3057. {
  3058. struct iscsi_queue_req *qr;
  3059. struct iscsi_cmd *cmd;
  3060. u8 state;
  3061. int ret;
  3062. while ((qr = iscsit_get_cmd_from_response_queue(conn))) {
  3063. cmd = qr->cmd;
  3064. state = qr->state;
  3065. kmem_cache_free(lio_qr_cache, qr);
  3066. check_rsp_state:
  3067. switch (state) {
  3068. case ISTATE_SEND_DATAIN:
  3069. ret = iscsit_send_data_in(cmd, conn);
  3070. if (ret < 0)
  3071. goto err;
  3072. else if (!ret)
  3073. /* more drs */
  3074. goto check_rsp_state;
  3075. else if (ret == 1) {
  3076. /* all done */
  3077. spin_lock_bh(&cmd->istate_lock);
  3078. cmd->i_state = ISTATE_SENT_STATUS;
  3079. spin_unlock_bh(&cmd->istate_lock);
  3080. continue;
  3081. } else if (ret == 2) {
  3082. /* Still must send status,
  3083. SCF_TRANSPORT_TASK_SENSE was set */
  3084. spin_lock_bh(&cmd->istate_lock);
  3085. cmd->i_state = ISTATE_SEND_STATUS;
  3086. spin_unlock_bh(&cmd->istate_lock);
  3087. state = ISTATE_SEND_STATUS;
  3088. goto check_rsp_state;
  3089. }
  3090. break;
  3091. case ISTATE_SEND_STATUS:
  3092. case ISTATE_SEND_STATUS_RECOVERY:
  3093. ret = iscsit_send_status(cmd, conn);
  3094. break;
  3095. case ISTATE_SEND_LOGOUTRSP:
  3096. ret = iscsit_send_logout_response(cmd, conn);
  3097. break;
  3098. case ISTATE_SEND_ASYNCMSG:
  3099. ret = iscsit_send_conn_drop_async_message(
  3100. cmd, conn);
  3101. break;
  3102. case ISTATE_SEND_NOPIN:
  3103. ret = iscsit_send_nopin_response(cmd, conn);
  3104. break;
  3105. case ISTATE_SEND_REJECT:
  3106. ret = iscsit_send_reject(cmd, conn);
  3107. break;
  3108. case ISTATE_SEND_TASKMGTRSP:
  3109. ret = iscsit_send_task_mgt_rsp(cmd, conn);
  3110. if (ret != 0)
  3111. break;
  3112. ret = iscsit_tmr_post_handler(cmd, conn);
  3113. if (ret != 0)
  3114. iscsit_fall_back_to_erl0(conn->sess);
  3115. break;
  3116. case ISTATE_SEND_TEXTRSP:
  3117. ret = iscsit_send_text_rsp(cmd, conn);
  3118. break;
  3119. default:
  3120. pr_err("Unknown Opcode: 0x%02x ITT:"
  3121. " 0x%08x, i_state: %d on CID: %hu\n",
  3122. cmd->iscsi_opcode, cmd->init_task_tag,
  3123. state, conn->cid);
  3124. goto err;
  3125. }
  3126. if (ret < 0)
  3127. goto err;
  3128. if (iscsit_send_tx_data(cmd, conn, 1) < 0) {
  3129. iscsit_tx_thread_wait_for_tcp(conn);
  3130. iscsit_unmap_iovec(cmd);
  3131. goto err;
  3132. }
  3133. iscsit_unmap_iovec(cmd);
  3134. switch (state) {
  3135. case ISTATE_SEND_LOGOUTRSP:
  3136. if (!iscsit_logout_post_handler(cmd, conn))
  3137. goto restart;
  3138. /* fall through */
  3139. case ISTATE_SEND_STATUS:
  3140. case ISTATE_SEND_ASYNCMSG:
  3141. case ISTATE_SEND_NOPIN:
  3142. case ISTATE_SEND_STATUS_RECOVERY:
  3143. case ISTATE_SEND_TEXTRSP:
  3144. case ISTATE_SEND_TASKMGTRSP:
  3145. spin_lock_bh(&cmd->istate_lock);
  3146. cmd->i_state = ISTATE_SENT_STATUS;
  3147. spin_unlock_bh(&cmd->istate_lock);
  3148. break;
  3149. case ISTATE_SEND_REJECT:
  3150. if (cmd->cmd_flags & ICF_REJECT_FAIL_CONN) {
  3151. cmd->cmd_flags &= ~ICF_REJECT_FAIL_CONN;
  3152. complete(&cmd->reject_comp);
  3153. goto err;
  3154. }
  3155. complete(&cmd->reject_comp);
  3156. break;
  3157. default:
  3158. pr_err("Unknown Opcode: 0x%02x ITT:"
  3159. " 0x%08x, i_state: %d on CID: %hu\n",
  3160. cmd->iscsi_opcode, cmd->init_task_tag,
  3161. cmd->i_state, conn->cid);
  3162. goto err;
  3163. }
  3164. if (atomic_read(&conn->check_immediate_queue))
  3165. break;
  3166. }
  3167. return 0;
  3168. err:
  3169. return -1;
  3170. restart:
  3171. return -EAGAIN;
  3172. }
  3173. int iscsi_target_tx_thread(void *arg)
  3174. {
  3175. int ret = 0;
  3176. struct iscsi_conn *conn;
  3177. struct iscsi_thread_set *ts = arg;
  3178. /*
  3179. * Allow ourselves to be interrupted by SIGINT so that a
  3180. * connection recovery / failure event can be triggered externally.
  3181. */
  3182. allow_signal(SIGINT);
  3183. restart:
  3184. conn = iscsi_tx_thread_pre_handler(ts);
  3185. if (!conn)
  3186. goto out;
  3187. ret = 0;
  3188. while (!kthread_should_stop()) {
  3189. /*
  3190. * Ensure that both TX and RX per connection kthreads
  3191. * are scheduled to run on the same CPU.
  3192. */
  3193. iscsit_thread_check_cpumask(conn, current, 1);
  3194. schedule_timeout_interruptible(MAX_SCHEDULE_TIMEOUT);
  3195. if ((ts->status == ISCSI_THREAD_SET_RESET) ||
  3196. signal_pending(current))
  3197. goto transport_err;
  3198. ret = handle_immediate_queue(conn);
  3199. if (ret < 0)
  3200. goto transport_err;
  3201. ret = handle_response_queue(conn);
  3202. if (ret == -EAGAIN)
  3203. goto restart;
  3204. else if (ret < 0)
  3205. goto transport_err;
  3206. }
  3207. transport_err:
  3208. iscsit_take_action_for_connection_exit(conn);
  3209. goto restart;
  3210. out:
  3211. return 0;
  3212. }
  3213. int iscsi_target_rx_thread(void *arg)
  3214. {
  3215. int ret;
  3216. u8 buffer[ISCSI_HDR_LEN], opcode;
  3217. u32 checksum = 0, digest = 0;
  3218. struct iscsi_conn *conn = NULL;
  3219. struct iscsi_thread_set *ts = arg;
  3220. struct kvec iov;
  3221. /*
  3222. * Allow ourselves to be interrupted by SIGINT so that a
  3223. * connection recovery / failure event can be triggered externally.
  3224. */
  3225. allow_signal(SIGINT);
  3226. restart:
  3227. conn = iscsi_rx_thread_pre_handler(ts);
  3228. if (!conn)
  3229. goto out;
  3230. while (!kthread_should_stop()) {
  3231. /*
  3232. * Ensure that both TX and RX per connection kthreads
  3233. * are scheduled to run on the same CPU.
  3234. */
  3235. iscsit_thread_check_cpumask(conn, current, 0);
  3236. memset(buffer, 0, ISCSI_HDR_LEN);
  3237. memset(&iov, 0, sizeof(struct kvec));
  3238. iov.iov_base = buffer;
  3239. iov.iov_len = ISCSI_HDR_LEN;
  3240. ret = rx_data(conn, &iov, 1, ISCSI_HDR_LEN);
  3241. if (ret != ISCSI_HDR_LEN) {
  3242. iscsit_rx_thread_wait_for_tcp(conn);
  3243. goto transport_err;
  3244. }
  3245. /*
  3246. * Set conn->bad_hdr for use with REJECT PDUs.
  3247. */
  3248. memcpy(&conn->bad_hdr, &buffer, ISCSI_HDR_LEN);
  3249. if (conn->conn_ops->HeaderDigest) {
  3250. iov.iov_base = &digest;
  3251. iov.iov_len = ISCSI_CRC_LEN;
  3252. ret = rx_data(conn, &iov, 1, ISCSI_CRC_LEN);
  3253. if (ret != ISCSI_CRC_LEN) {
  3254. iscsit_rx_thread_wait_for_tcp(conn);
  3255. goto transport_err;
  3256. }
  3257. iscsit_do_crypto_hash_buf(&conn->conn_rx_hash,
  3258. buffer, ISCSI_HDR_LEN,
  3259. 0, NULL, (u8 *)&checksum);
  3260. if (digest != checksum) {
  3261. pr_err("HeaderDigest CRC32C failed,"
  3262. " received 0x%08x, computed 0x%08x\n",
  3263. digest, checksum);
  3264. /*
  3265. * Set the PDU to 0xff so it will intentionally
  3266. * hit default in the switch below.
  3267. */
  3268. memset(buffer, 0xff, ISCSI_HDR_LEN);
  3269. spin_lock_bh(&conn->sess->session_stats_lock);
  3270. conn->sess->conn_digest_errors++;
  3271. spin_unlock_bh(&conn->sess->session_stats_lock);
  3272. } else {
  3273. pr_debug("Got HeaderDigest CRC32C"
  3274. " 0x%08x\n", checksum);
  3275. }
  3276. }
  3277. if (conn->conn_state == TARG_CONN_STATE_IN_LOGOUT)
  3278. goto transport_err;
  3279. opcode = buffer[0] & ISCSI_OPCODE_MASK;
  3280. if (conn->sess->sess_ops->SessionType &&
  3281. ((!(opcode & ISCSI_OP_TEXT)) ||
  3282. (!(opcode & ISCSI_OP_LOGOUT)))) {
  3283. pr_err("Received illegal iSCSI Opcode: 0x%02x"
  3284. " while in Discovery Session, rejecting.\n", opcode);
  3285. iscsit_add_reject(ISCSI_REASON_PROTOCOL_ERROR, 1,
  3286. buffer, conn);
  3287. goto transport_err;
  3288. }
  3289. switch (opcode) {
  3290. case ISCSI_OP_SCSI_CMD:
  3291. if (iscsit_handle_scsi_cmd(conn, buffer) < 0)
  3292. goto transport_err;
  3293. break;
  3294. case ISCSI_OP_SCSI_DATA_OUT:
  3295. if (iscsit_handle_data_out(conn, buffer) < 0)
  3296. goto transport_err;
  3297. break;
  3298. case ISCSI_OP_NOOP_OUT:
  3299. if (iscsit_handle_nop_out(conn, buffer) < 0)
  3300. goto transport_err;
  3301. break;
  3302. case ISCSI_OP_SCSI_TMFUNC:
  3303. if (iscsit_handle_task_mgt_cmd(conn, buffer) < 0)
  3304. goto transport_err;
  3305. break;
  3306. case ISCSI_OP_TEXT:
  3307. if (iscsit_handle_text_cmd(conn, buffer) < 0)
  3308. goto transport_err;
  3309. break;
  3310. case ISCSI_OP_LOGOUT:
  3311. ret = iscsit_handle_logout_cmd(conn, buffer);
  3312. if (ret > 0) {
  3313. wait_for_completion_timeout(&conn->conn_logout_comp,
  3314. SECONDS_FOR_LOGOUT_COMP * HZ);
  3315. goto transport_err;
  3316. } else if (ret < 0)
  3317. goto transport_err;
  3318. break;
  3319. case ISCSI_OP_SNACK:
  3320. if (iscsit_handle_snack(conn, buffer) < 0)
  3321. goto transport_err;
  3322. break;
  3323. default:
  3324. pr_err("Got unknown iSCSI OpCode: 0x%02x\n",
  3325. opcode);
  3326. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  3327. pr_err("Cannot recover from unknown"
  3328. " opcode while ERL=0, closing iSCSI connection"
  3329. ".\n");
  3330. goto transport_err;
  3331. }
  3332. if (!conn->conn_ops->OFMarker) {
  3333. pr_err("Unable to recover from unknown"
  3334. " opcode while OFMarker=No, closing iSCSI"
  3335. " connection.\n");
  3336. goto transport_err;
  3337. }
  3338. if (iscsit_recover_from_unknown_opcode(conn) < 0) {
  3339. pr_err("Unable to recover from unknown"
  3340. " opcode, closing iSCSI connection.\n");
  3341. goto transport_err;
  3342. }
  3343. break;
  3344. }
  3345. }
  3346. transport_err:
  3347. if (!signal_pending(current))
  3348. atomic_set(&conn->transport_failed, 1);
  3349. iscsit_take_action_for_connection_exit(conn);
  3350. goto restart;
  3351. out:
  3352. return 0;
  3353. }
  3354. static void iscsit_release_commands_from_conn(struct iscsi_conn *conn)
  3355. {
  3356. struct iscsi_cmd *cmd = NULL, *cmd_tmp = NULL;
  3357. struct iscsi_session *sess = conn->sess;
  3358. /*
  3359. * We expect this function to only ever be called from either RX or TX
  3360. * thread context via iscsit_close_connection() once the other context
  3361. * has been reset -> returned sleeping pre-handler state.
  3362. */
  3363. spin_lock_bh(&conn->cmd_lock);
  3364. list_for_each_entry_safe(cmd, cmd_tmp, &conn->conn_cmd_list, i_conn_node) {
  3365. list_del(&cmd->i_conn_node);
  3366. spin_unlock_bh(&conn->cmd_lock);
  3367. iscsit_increment_maxcmdsn(cmd, sess);
  3368. iscsit_free_cmd(cmd);
  3369. spin_lock_bh(&conn->cmd_lock);
  3370. }
  3371. spin_unlock_bh(&conn->cmd_lock);
  3372. }
  3373. static void iscsit_stop_timers_for_cmds(
  3374. struct iscsi_conn *conn)
  3375. {
  3376. struct iscsi_cmd *cmd;
  3377. spin_lock_bh(&conn->cmd_lock);
  3378. list_for_each_entry(cmd, &conn->conn_cmd_list, i_conn_node) {
  3379. if (cmd->data_direction == DMA_TO_DEVICE)
  3380. iscsit_stop_dataout_timer(cmd);
  3381. }
  3382. spin_unlock_bh(&conn->cmd_lock);
  3383. }
  3384. int iscsit_close_connection(
  3385. struct iscsi_conn *conn)
  3386. {
  3387. int conn_logout = (conn->conn_state == TARG_CONN_STATE_IN_LOGOUT);
  3388. struct iscsi_session *sess = conn->sess;
  3389. pr_debug("Closing iSCSI connection CID %hu on SID:"
  3390. " %u\n", conn->cid, sess->sid);
  3391. /*
  3392. * Always up conn_logout_comp just in case the RX Thread is sleeping
  3393. * and the logout response never got sent because the connection
  3394. * failed.
  3395. */
  3396. complete(&conn->conn_logout_comp);
  3397. iscsi_release_thread_set(conn);
  3398. iscsit_stop_timers_for_cmds(conn);
  3399. iscsit_stop_nopin_response_timer(conn);
  3400. iscsit_stop_nopin_timer(conn);
  3401. iscsit_free_queue_reqs_for_conn(conn);
  3402. /*
  3403. * During Connection recovery drop unacknowledged out of order
  3404. * commands for this connection, and prepare the other commands
  3405. * for realligence.
  3406. *
  3407. * During normal operation clear the out of order commands (but
  3408. * do not free the struct iscsi_ooo_cmdsn's) and release all
  3409. * struct iscsi_cmds.
  3410. */
  3411. if (atomic_read(&conn->connection_recovery)) {
  3412. iscsit_discard_unacknowledged_ooo_cmdsns_for_conn(conn);
  3413. iscsit_prepare_cmds_for_realligance(conn);
  3414. } else {
  3415. iscsit_clear_ooo_cmdsns_for_conn(conn);
  3416. iscsit_release_commands_from_conn(conn);
  3417. }
  3418. /*
  3419. * Handle decrementing session or connection usage count if
  3420. * a logout response was not able to be sent because the
  3421. * connection failed. Fall back to Session Recovery here.
  3422. */
  3423. if (atomic_read(&conn->conn_logout_remove)) {
  3424. if (conn->conn_logout_reason == ISCSI_LOGOUT_REASON_CLOSE_SESSION) {
  3425. iscsit_dec_conn_usage_count(conn);
  3426. iscsit_dec_session_usage_count(sess);
  3427. }
  3428. if (conn->conn_logout_reason == ISCSI_LOGOUT_REASON_CLOSE_CONNECTION)
  3429. iscsit_dec_conn_usage_count(conn);
  3430. atomic_set(&conn->conn_logout_remove, 0);
  3431. atomic_set(&sess->session_reinstatement, 0);
  3432. atomic_set(&sess->session_fall_back_to_erl0, 1);
  3433. }
  3434. spin_lock_bh(&sess->conn_lock);
  3435. list_del(&conn->conn_list);
  3436. /*
  3437. * Attempt to let the Initiator know this connection failed by
  3438. * sending an Connection Dropped Async Message on another
  3439. * active connection.
  3440. */
  3441. if (atomic_read(&conn->connection_recovery))
  3442. iscsit_build_conn_drop_async_message(conn);
  3443. spin_unlock_bh(&sess->conn_lock);
  3444. /*
  3445. * If connection reinstatement is being performed on this connection,
  3446. * up the connection reinstatement semaphore that is being blocked on
  3447. * in iscsit_cause_connection_reinstatement().
  3448. */
  3449. spin_lock_bh(&conn->state_lock);
  3450. if (atomic_read(&conn->sleep_on_conn_wait_comp)) {
  3451. spin_unlock_bh(&conn->state_lock);
  3452. complete(&conn->conn_wait_comp);
  3453. wait_for_completion(&conn->conn_post_wait_comp);
  3454. spin_lock_bh(&conn->state_lock);
  3455. }
  3456. /*
  3457. * If connection reinstatement is being performed on this connection
  3458. * by receiving a REMOVECONNFORRECOVERY logout request, up the
  3459. * connection wait rcfr semaphore that is being blocked on
  3460. * an iscsit_connection_reinstatement_rcfr().
  3461. */
  3462. if (atomic_read(&conn->connection_wait_rcfr)) {
  3463. spin_unlock_bh(&conn->state_lock);
  3464. complete(&conn->conn_wait_rcfr_comp);
  3465. wait_for_completion(&conn->conn_post_wait_comp);
  3466. spin_lock_bh(&conn->state_lock);
  3467. }
  3468. atomic_set(&conn->connection_reinstatement, 1);
  3469. spin_unlock_bh(&conn->state_lock);
  3470. /*
  3471. * If any other processes are accessing this connection pointer we
  3472. * must wait until they have completed.
  3473. */
  3474. iscsit_check_conn_usage_count(conn);
  3475. if (conn->conn_rx_hash.tfm)
  3476. crypto_free_hash(conn->conn_rx_hash.tfm);
  3477. if (conn->conn_tx_hash.tfm)
  3478. crypto_free_hash(conn->conn_tx_hash.tfm);
  3479. if (conn->conn_cpumask)
  3480. free_cpumask_var(conn->conn_cpumask);
  3481. kfree(conn->conn_ops);
  3482. conn->conn_ops = NULL;
  3483. if (conn->sock) {
  3484. if (conn->conn_flags & CONNFLAG_SCTP_STRUCT_FILE) {
  3485. kfree(conn->sock->file);
  3486. conn->sock->file = NULL;
  3487. }
  3488. sock_release(conn->sock);
  3489. }
  3490. conn->thread_set = NULL;
  3491. pr_debug("Moving to TARG_CONN_STATE_FREE.\n");
  3492. conn->conn_state = TARG_CONN_STATE_FREE;
  3493. kfree(conn);
  3494. spin_lock_bh(&sess->conn_lock);
  3495. atomic_dec(&sess->nconn);
  3496. pr_debug("Decremented iSCSI connection count to %hu from node:"
  3497. " %s\n", atomic_read(&sess->nconn),
  3498. sess->sess_ops->InitiatorName);
  3499. /*
  3500. * Make sure that if one connection fails in an non ERL=2 iSCSI
  3501. * Session that they all fail.
  3502. */
  3503. if ((sess->sess_ops->ErrorRecoveryLevel != 2) && !conn_logout &&
  3504. !atomic_read(&sess->session_logout))
  3505. atomic_set(&sess->session_fall_back_to_erl0, 1);
  3506. /*
  3507. * If this was not the last connection in the session, and we are
  3508. * performing session reinstatement or falling back to ERL=0, call
  3509. * iscsit_stop_session() without sleeping to shutdown the other
  3510. * active connections.
  3511. */
  3512. if (atomic_read(&sess->nconn)) {
  3513. if (!atomic_read(&sess->session_reinstatement) &&
  3514. !atomic_read(&sess->session_fall_back_to_erl0)) {
  3515. spin_unlock_bh(&sess->conn_lock);
  3516. return 0;
  3517. }
  3518. if (!atomic_read(&sess->session_stop_active)) {
  3519. atomic_set(&sess->session_stop_active, 1);
  3520. spin_unlock_bh(&sess->conn_lock);
  3521. iscsit_stop_session(sess, 0, 0);
  3522. return 0;
  3523. }
  3524. spin_unlock_bh(&sess->conn_lock);
  3525. return 0;
  3526. }
  3527. /*
  3528. * If this was the last connection in the session and one of the
  3529. * following is occurring:
  3530. *
  3531. * Session Reinstatement is not being performed, and are falling back
  3532. * to ERL=0 call iscsit_close_session().
  3533. *
  3534. * Session Logout was requested. iscsit_close_session() will be called
  3535. * elsewhere.
  3536. *
  3537. * Session Continuation is not being performed, start the Time2Retain
  3538. * handler and check if sleep_on_sess_wait_sem is active.
  3539. */
  3540. if (!atomic_read(&sess->session_reinstatement) &&
  3541. atomic_read(&sess->session_fall_back_to_erl0)) {
  3542. spin_unlock_bh(&sess->conn_lock);
  3543. target_put_session(sess->se_sess);
  3544. return 0;
  3545. } else if (atomic_read(&sess->session_logout)) {
  3546. pr_debug("Moving to TARG_SESS_STATE_FREE.\n");
  3547. sess->session_state = TARG_SESS_STATE_FREE;
  3548. spin_unlock_bh(&sess->conn_lock);
  3549. if (atomic_read(&sess->sleep_on_sess_wait_comp))
  3550. complete(&sess->session_wait_comp);
  3551. return 0;
  3552. } else {
  3553. pr_debug("Moving to TARG_SESS_STATE_FAILED.\n");
  3554. sess->session_state = TARG_SESS_STATE_FAILED;
  3555. if (!atomic_read(&sess->session_continuation)) {
  3556. spin_unlock_bh(&sess->conn_lock);
  3557. iscsit_start_time2retain_handler(sess);
  3558. } else
  3559. spin_unlock_bh(&sess->conn_lock);
  3560. if (atomic_read(&sess->sleep_on_sess_wait_comp))
  3561. complete(&sess->session_wait_comp);
  3562. return 0;
  3563. }
  3564. spin_unlock_bh(&sess->conn_lock);
  3565. return 0;
  3566. }
  3567. int iscsit_close_session(struct iscsi_session *sess)
  3568. {
  3569. struct iscsi_portal_group *tpg = ISCSI_TPG_S(sess);
  3570. struct se_portal_group *se_tpg = &tpg->tpg_se_tpg;
  3571. if (atomic_read(&sess->nconn)) {
  3572. pr_err("%d connection(s) still exist for iSCSI session"
  3573. " to %s\n", atomic_read(&sess->nconn),
  3574. sess->sess_ops->InitiatorName);
  3575. BUG();
  3576. }
  3577. spin_lock_bh(&se_tpg->session_lock);
  3578. atomic_set(&sess->session_logout, 1);
  3579. atomic_set(&sess->session_reinstatement, 1);
  3580. iscsit_stop_time2retain_timer(sess);
  3581. spin_unlock_bh(&se_tpg->session_lock);
  3582. /*
  3583. * transport_deregister_session_configfs() will clear the
  3584. * struct se_node_acl->nacl_sess pointer now as a iscsi_np process context
  3585. * can be setting it again with __transport_register_session() in
  3586. * iscsi_post_login_handler() again after the iscsit_stop_session()
  3587. * completes in iscsi_np context.
  3588. */
  3589. transport_deregister_session_configfs(sess->se_sess);
  3590. /*
  3591. * If any other processes are accessing this session pointer we must
  3592. * wait until they have completed. If we are in an interrupt (the
  3593. * time2retain handler) and contain and active session usage count we
  3594. * restart the timer and exit.
  3595. */
  3596. if (!in_interrupt()) {
  3597. if (iscsit_check_session_usage_count(sess) == 1)
  3598. iscsit_stop_session(sess, 1, 1);
  3599. } else {
  3600. if (iscsit_check_session_usage_count(sess) == 2) {
  3601. atomic_set(&sess->session_logout, 0);
  3602. iscsit_start_time2retain_handler(sess);
  3603. return 0;
  3604. }
  3605. }
  3606. transport_deregister_session(sess->se_sess);
  3607. if (sess->sess_ops->ErrorRecoveryLevel == 2)
  3608. iscsit_free_connection_recovery_entires(sess);
  3609. iscsit_free_all_ooo_cmdsns(sess);
  3610. spin_lock_bh(&se_tpg->session_lock);
  3611. pr_debug("Moving to TARG_SESS_STATE_FREE.\n");
  3612. sess->session_state = TARG_SESS_STATE_FREE;
  3613. pr_debug("Released iSCSI session from node: %s\n",
  3614. sess->sess_ops->InitiatorName);
  3615. tpg->nsessions--;
  3616. if (tpg->tpg_tiqn)
  3617. tpg->tpg_tiqn->tiqn_nsessions--;
  3618. pr_debug("Decremented number of active iSCSI Sessions on"
  3619. " iSCSI TPG: %hu to %u\n", tpg->tpgt, tpg->nsessions);
  3620. spin_lock(&sess_idr_lock);
  3621. idr_remove(&sess_idr, sess->session_index);
  3622. spin_unlock(&sess_idr_lock);
  3623. kfree(sess->sess_ops);
  3624. sess->sess_ops = NULL;
  3625. spin_unlock_bh(&se_tpg->session_lock);
  3626. kfree(sess);
  3627. return 0;
  3628. }
  3629. static void iscsit_logout_post_handler_closesession(
  3630. struct iscsi_conn *conn)
  3631. {
  3632. struct iscsi_session *sess = conn->sess;
  3633. iscsi_set_thread_clear(conn, ISCSI_CLEAR_TX_THREAD);
  3634. iscsi_set_thread_set_signal(conn, ISCSI_SIGNAL_TX_THREAD);
  3635. atomic_set(&conn->conn_logout_remove, 0);
  3636. complete(&conn->conn_logout_comp);
  3637. iscsit_dec_conn_usage_count(conn);
  3638. iscsit_stop_session(sess, 1, 1);
  3639. iscsit_dec_session_usage_count(sess);
  3640. target_put_session(sess->se_sess);
  3641. }
  3642. static void iscsit_logout_post_handler_samecid(
  3643. struct iscsi_conn *conn)
  3644. {
  3645. iscsi_set_thread_clear(conn, ISCSI_CLEAR_TX_THREAD);
  3646. iscsi_set_thread_set_signal(conn, ISCSI_SIGNAL_TX_THREAD);
  3647. atomic_set(&conn->conn_logout_remove, 0);
  3648. complete(&conn->conn_logout_comp);
  3649. iscsit_cause_connection_reinstatement(conn, 1);
  3650. iscsit_dec_conn_usage_count(conn);
  3651. }
  3652. static void iscsit_logout_post_handler_diffcid(
  3653. struct iscsi_conn *conn,
  3654. u16 cid)
  3655. {
  3656. struct iscsi_conn *l_conn;
  3657. struct iscsi_session *sess = conn->sess;
  3658. if (!sess)
  3659. return;
  3660. spin_lock_bh(&sess->conn_lock);
  3661. list_for_each_entry(l_conn, &sess->sess_conn_list, conn_list) {
  3662. if (l_conn->cid == cid) {
  3663. iscsit_inc_conn_usage_count(l_conn);
  3664. break;
  3665. }
  3666. }
  3667. spin_unlock_bh(&sess->conn_lock);
  3668. if (!l_conn)
  3669. return;
  3670. if (l_conn->sock)
  3671. l_conn->sock->ops->shutdown(l_conn->sock, RCV_SHUTDOWN);
  3672. spin_lock_bh(&l_conn->state_lock);
  3673. pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
  3674. l_conn->conn_state = TARG_CONN_STATE_IN_LOGOUT;
  3675. spin_unlock_bh(&l_conn->state_lock);
  3676. iscsit_cause_connection_reinstatement(l_conn, 1);
  3677. iscsit_dec_conn_usage_count(l_conn);
  3678. }
  3679. /*
  3680. * Return of 0 causes the TX thread to restart.
  3681. */
  3682. static int iscsit_logout_post_handler(
  3683. struct iscsi_cmd *cmd,
  3684. struct iscsi_conn *conn)
  3685. {
  3686. int ret = 0;
  3687. switch (cmd->logout_reason) {
  3688. case ISCSI_LOGOUT_REASON_CLOSE_SESSION:
  3689. switch (cmd->logout_response) {
  3690. case ISCSI_LOGOUT_SUCCESS:
  3691. case ISCSI_LOGOUT_CLEANUP_FAILED:
  3692. default:
  3693. iscsit_logout_post_handler_closesession(conn);
  3694. break;
  3695. }
  3696. ret = 0;
  3697. break;
  3698. case ISCSI_LOGOUT_REASON_CLOSE_CONNECTION:
  3699. if (conn->cid == cmd->logout_cid) {
  3700. switch (cmd->logout_response) {
  3701. case ISCSI_LOGOUT_SUCCESS:
  3702. case ISCSI_LOGOUT_CLEANUP_FAILED:
  3703. default:
  3704. iscsit_logout_post_handler_samecid(conn);
  3705. break;
  3706. }
  3707. ret = 0;
  3708. } else {
  3709. switch (cmd->logout_response) {
  3710. case ISCSI_LOGOUT_SUCCESS:
  3711. iscsit_logout_post_handler_diffcid(conn,
  3712. cmd->logout_cid);
  3713. break;
  3714. case ISCSI_LOGOUT_CID_NOT_FOUND:
  3715. case ISCSI_LOGOUT_CLEANUP_FAILED:
  3716. default:
  3717. break;
  3718. }
  3719. ret = 1;
  3720. }
  3721. break;
  3722. case ISCSI_LOGOUT_REASON_RECOVERY:
  3723. switch (cmd->logout_response) {
  3724. case ISCSI_LOGOUT_SUCCESS:
  3725. case ISCSI_LOGOUT_CID_NOT_FOUND:
  3726. case ISCSI_LOGOUT_RECOVERY_UNSUPPORTED:
  3727. case ISCSI_LOGOUT_CLEANUP_FAILED:
  3728. default:
  3729. break;
  3730. }
  3731. ret = 1;
  3732. break;
  3733. default:
  3734. break;
  3735. }
  3736. return ret;
  3737. }
  3738. void iscsit_fail_session(struct iscsi_session *sess)
  3739. {
  3740. struct iscsi_conn *conn;
  3741. spin_lock_bh(&sess->conn_lock);
  3742. list_for_each_entry(conn, &sess->sess_conn_list, conn_list) {
  3743. pr_debug("Moving to TARG_CONN_STATE_CLEANUP_WAIT.\n");
  3744. conn->conn_state = TARG_CONN_STATE_CLEANUP_WAIT;
  3745. }
  3746. spin_unlock_bh(&sess->conn_lock);
  3747. pr_debug("Moving to TARG_SESS_STATE_FAILED.\n");
  3748. sess->session_state = TARG_SESS_STATE_FAILED;
  3749. }
  3750. int iscsit_free_session(struct iscsi_session *sess)
  3751. {
  3752. u16 conn_count = atomic_read(&sess->nconn);
  3753. struct iscsi_conn *conn, *conn_tmp = NULL;
  3754. int is_last;
  3755. spin_lock_bh(&sess->conn_lock);
  3756. atomic_set(&sess->sleep_on_sess_wait_comp, 1);
  3757. list_for_each_entry_safe(conn, conn_tmp, &sess->sess_conn_list,
  3758. conn_list) {
  3759. if (conn_count == 0)
  3760. break;
  3761. if (list_is_last(&conn->conn_list, &sess->sess_conn_list)) {
  3762. is_last = 1;
  3763. } else {
  3764. iscsit_inc_conn_usage_count(conn_tmp);
  3765. is_last = 0;
  3766. }
  3767. iscsit_inc_conn_usage_count(conn);
  3768. spin_unlock_bh(&sess->conn_lock);
  3769. iscsit_cause_connection_reinstatement(conn, 1);
  3770. spin_lock_bh(&sess->conn_lock);
  3771. iscsit_dec_conn_usage_count(conn);
  3772. if (is_last == 0)
  3773. iscsit_dec_conn_usage_count(conn_tmp);
  3774. conn_count--;
  3775. }
  3776. if (atomic_read(&sess->nconn)) {
  3777. spin_unlock_bh(&sess->conn_lock);
  3778. wait_for_completion(&sess->session_wait_comp);
  3779. } else
  3780. spin_unlock_bh(&sess->conn_lock);
  3781. target_put_session(sess->se_sess);
  3782. return 0;
  3783. }
  3784. void iscsit_stop_session(
  3785. struct iscsi_session *sess,
  3786. int session_sleep,
  3787. int connection_sleep)
  3788. {
  3789. u16 conn_count = atomic_read(&sess->nconn);
  3790. struct iscsi_conn *conn, *conn_tmp = NULL;
  3791. int is_last;
  3792. spin_lock_bh(&sess->conn_lock);
  3793. if (session_sleep)
  3794. atomic_set(&sess->sleep_on_sess_wait_comp, 1);
  3795. if (connection_sleep) {
  3796. list_for_each_entry_safe(conn, conn_tmp, &sess->sess_conn_list,
  3797. conn_list) {
  3798. if (conn_count == 0)
  3799. break;
  3800. if (list_is_last(&conn->conn_list, &sess->sess_conn_list)) {
  3801. is_last = 1;
  3802. } else {
  3803. iscsit_inc_conn_usage_count(conn_tmp);
  3804. is_last = 0;
  3805. }
  3806. iscsit_inc_conn_usage_count(conn);
  3807. spin_unlock_bh(&sess->conn_lock);
  3808. iscsit_cause_connection_reinstatement(conn, 1);
  3809. spin_lock_bh(&sess->conn_lock);
  3810. iscsit_dec_conn_usage_count(conn);
  3811. if (is_last == 0)
  3812. iscsit_dec_conn_usage_count(conn_tmp);
  3813. conn_count--;
  3814. }
  3815. } else {
  3816. list_for_each_entry(conn, &sess->sess_conn_list, conn_list)
  3817. iscsit_cause_connection_reinstatement(conn, 0);
  3818. }
  3819. if (session_sleep && atomic_read(&sess->nconn)) {
  3820. spin_unlock_bh(&sess->conn_lock);
  3821. wait_for_completion(&sess->session_wait_comp);
  3822. } else
  3823. spin_unlock_bh(&sess->conn_lock);
  3824. }
  3825. int iscsit_release_sessions_for_tpg(struct iscsi_portal_group *tpg, int force)
  3826. {
  3827. struct iscsi_session *sess;
  3828. struct se_portal_group *se_tpg = &tpg->tpg_se_tpg;
  3829. struct se_session *se_sess, *se_sess_tmp;
  3830. int session_count = 0;
  3831. spin_lock_bh(&se_tpg->session_lock);
  3832. if (tpg->nsessions && !force) {
  3833. spin_unlock_bh(&se_tpg->session_lock);
  3834. return -1;
  3835. }
  3836. list_for_each_entry_safe(se_sess, se_sess_tmp, &se_tpg->tpg_sess_list,
  3837. sess_list) {
  3838. sess = (struct iscsi_session *)se_sess->fabric_sess_ptr;
  3839. spin_lock(&sess->conn_lock);
  3840. if (atomic_read(&sess->session_fall_back_to_erl0) ||
  3841. atomic_read(&sess->session_logout) ||
  3842. (sess->time2retain_timer_flags & ISCSI_TF_EXPIRED)) {
  3843. spin_unlock(&sess->conn_lock);
  3844. continue;
  3845. }
  3846. atomic_set(&sess->session_reinstatement, 1);
  3847. spin_unlock(&sess->conn_lock);
  3848. spin_unlock_bh(&se_tpg->session_lock);
  3849. iscsit_free_session(sess);
  3850. spin_lock_bh(&se_tpg->session_lock);
  3851. session_count++;
  3852. }
  3853. spin_unlock_bh(&se_tpg->session_lock);
  3854. pr_debug("Released %d iSCSI Session(s) from Target Portal"
  3855. " Group: %hu\n", session_count, tpg->tpgt);
  3856. return 0;
  3857. }
  3858. MODULE_DESCRIPTION("iSCSI-Target Driver for mainline target infrastructure");
  3859. MODULE_VERSION("4.1.x");
  3860. MODULE_AUTHOR("nab@Linux-iSCSI.org");
  3861. MODULE_LICENSE("GPL");
  3862. module_init(iscsi_target_init_module);
  3863. module_exit(iscsi_target_cleanup_module);