iscsi_target.c 126 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693
  1. /*******************************************************************************
  2. * This file contains main functions related to the iSCSI Target Core Driver.
  3. *
  4. * (c) Copyright 2007-2013 Datera, Inc.
  5. *
  6. * Author: Nicholas A. Bellinger <nab@linux-iscsi.org>
  7. *
  8. * This program is free software; you can redistribute it and/or modify
  9. * it under the terms of the GNU General Public License as published by
  10. * the Free Software Foundation; either version 2 of the License, or
  11. * (at your option) any later version.
  12. *
  13. * This program is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. ******************************************************************************/
  18. #include <crypto/hash.h>
  19. #include <linux/string.h>
  20. #include <linux/kthread.h>
  21. #include <linux/completion.h>
  22. #include <linux/module.h>
  23. #include <linux/vmalloc.h>
  24. #include <linux/idr.h>
  25. #include <linux/delay.h>
  26. #include <linux/sched/signal.h>
  27. #include <asm/unaligned.h>
  28. #include <linux/inet.h>
  29. #include <net/ipv6.h>
  30. #include <scsi/scsi_proto.h>
  31. #include <scsi/iscsi_proto.h>
  32. #include <scsi/scsi_tcq.h>
  33. #include <target/target_core_base.h>
  34. #include <target/target_core_fabric.h>
  35. #include <target/iscsi/iscsi_target_core.h>
  36. #include "iscsi_target_parameters.h"
  37. #include "iscsi_target_seq_pdu_list.h"
  38. #include "iscsi_target_datain_values.h"
  39. #include "iscsi_target_erl0.h"
  40. #include "iscsi_target_erl1.h"
  41. #include "iscsi_target_erl2.h"
  42. #include "iscsi_target_login.h"
  43. #include "iscsi_target_tmr.h"
  44. #include "iscsi_target_tpg.h"
  45. #include "iscsi_target_util.h"
  46. #include "iscsi_target.h"
  47. #include "iscsi_target_device.h"
  48. #include <target/iscsi/iscsi_target_stat.h>
  49. #include <target/iscsi/iscsi_transport.h>
  50. static LIST_HEAD(g_tiqn_list);
  51. static LIST_HEAD(g_np_list);
  52. static DEFINE_SPINLOCK(tiqn_lock);
  53. static DEFINE_MUTEX(np_lock);
  54. static struct idr tiqn_idr;
  55. struct idr sess_idr;
  56. struct mutex auth_id_lock;
  57. spinlock_t sess_idr_lock;
  58. struct iscsit_global *iscsit_global;
  59. struct kmem_cache *lio_qr_cache;
  60. struct kmem_cache *lio_dr_cache;
  61. struct kmem_cache *lio_ooo_cache;
  62. struct kmem_cache *lio_r2t_cache;
  63. static int iscsit_handle_immediate_data(struct iscsi_cmd *,
  64. struct iscsi_scsi_req *, u32);
  65. struct iscsi_tiqn *iscsit_get_tiqn_for_login(unsigned char *buf)
  66. {
  67. struct iscsi_tiqn *tiqn = NULL;
  68. spin_lock(&tiqn_lock);
  69. list_for_each_entry(tiqn, &g_tiqn_list, tiqn_list) {
  70. if (!strcmp(tiqn->tiqn, buf)) {
  71. spin_lock(&tiqn->tiqn_state_lock);
  72. if (tiqn->tiqn_state == TIQN_STATE_ACTIVE) {
  73. tiqn->tiqn_access_count++;
  74. spin_unlock(&tiqn->tiqn_state_lock);
  75. spin_unlock(&tiqn_lock);
  76. return tiqn;
  77. }
  78. spin_unlock(&tiqn->tiqn_state_lock);
  79. }
  80. }
  81. spin_unlock(&tiqn_lock);
  82. return NULL;
  83. }
  84. static int iscsit_set_tiqn_shutdown(struct iscsi_tiqn *tiqn)
  85. {
  86. spin_lock(&tiqn->tiqn_state_lock);
  87. if (tiqn->tiqn_state == TIQN_STATE_ACTIVE) {
  88. tiqn->tiqn_state = TIQN_STATE_SHUTDOWN;
  89. spin_unlock(&tiqn->tiqn_state_lock);
  90. return 0;
  91. }
  92. spin_unlock(&tiqn->tiqn_state_lock);
  93. return -1;
  94. }
  95. void iscsit_put_tiqn_for_login(struct iscsi_tiqn *tiqn)
  96. {
  97. spin_lock(&tiqn->tiqn_state_lock);
  98. tiqn->tiqn_access_count--;
  99. spin_unlock(&tiqn->tiqn_state_lock);
  100. }
  101. /*
  102. * Note that IQN formatting is expected to be done in userspace, and
  103. * no explict IQN format checks are done here.
  104. */
  105. struct iscsi_tiqn *iscsit_add_tiqn(unsigned char *buf)
  106. {
  107. struct iscsi_tiqn *tiqn = NULL;
  108. int ret;
  109. if (strlen(buf) >= ISCSI_IQN_LEN) {
  110. pr_err("Target IQN exceeds %d bytes\n",
  111. ISCSI_IQN_LEN);
  112. return ERR_PTR(-EINVAL);
  113. }
  114. tiqn = kzalloc(sizeof(*tiqn), GFP_KERNEL);
  115. if (!tiqn)
  116. return ERR_PTR(-ENOMEM);
  117. sprintf(tiqn->tiqn, "%s", buf);
  118. INIT_LIST_HEAD(&tiqn->tiqn_list);
  119. INIT_LIST_HEAD(&tiqn->tiqn_tpg_list);
  120. spin_lock_init(&tiqn->tiqn_state_lock);
  121. spin_lock_init(&tiqn->tiqn_tpg_lock);
  122. spin_lock_init(&tiqn->sess_err_stats.lock);
  123. spin_lock_init(&tiqn->login_stats.lock);
  124. spin_lock_init(&tiqn->logout_stats.lock);
  125. tiqn->tiqn_state = TIQN_STATE_ACTIVE;
  126. idr_preload(GFP_KERNEL);
  127. spin_lock(&tiqn_lock);
  128. ret = idr_alloc(&tiqn_idr, NULL, 0, 0, GFP_NOWAIT);
  129. if (ret < 0) {
  130. pr_err("idr_alloc() failed for tiqn->tiqn_index\n");
  131. spin_unlock(&tiqn_lock);
  132. idr_preload_end();
  133. kfree(tiqn);
  134. return ERR_PTR(ret);
  135. }
  136. tiqn->tiqn_index = ret;
  137. list_add_tail(&tiqn->tiqn_list, &g_tiqn_list);
  138. spin_unlock(&tiqn_lock);
  139. idr_preload_end();
  140. pr_debug("CORE[0] - Added iSCSI Target IQN: %s\n", tiqn->tiqn);
  141. return tiqn;
  142. }
  143. static void iscsit_wait_for_tiqn(struct iscsi_tiqn *tiqn)
  144. {
  145. /*
  146. * Wait for accesses to said struct iscsi_tiqn to end.
  147. */
  148. spin_lock(&tiqn->tiqn_state_lock);
  149. while (tiqn->tiqn_access_count != 0) {
  150. spin_unlock(&tiqn->tiqn_state_lock);
  151. msleep(10);
  152. spin_lock(&tiqn->tiqn_state_lock);
  153. }
  154. spin_unlock(&tiqn->tiqn_state_lock);
  155. }
  156. void iscsit_del_tiqn(struct iscsi_tiqn *tiqn)
  157. {
  158. /*
  159. * iscsit_set_tiqn_shutdown sets tiqn->tiqn_state = TIQN_STATE_SHUTDOWN
  160. * while holding tiqn->tiqn_state_lock. This means that all subsequent
  161. * attempts to access this struct iscsi_tiqn will fail from both transport
  162. * fabric and control code paths.
  163. */
  164. if (iscsit_set_tiqn_shutdown(tiqn) < 0) {
  165. pr_err("iscsit_set_tiqn_shutdown() failed\n");
  166. return;
  167. }
  168. iscsit_wait_for_tiqn(tiqn);
  169. spin_lock(&tiqn_lock);
  170. list_del(&tiqn->tiqn_list);
  171. idr_remove(&tiqn_idr, tiqn->tiqn_index);
  172. spin_unlock(&tiqn_lock);
  173. pr_debug("CORE[0] - Deleted iSCSI Target IQN: %s\n",
  174. tiqn->tiqn);
  175. kfree(tiqn);
  176. }
  177. int iscsit_access_np(struct iscsi_np *np, struct iscsi_portal_group *tpg)
  178. {
  179. int ret;
  180. /*
  181. * Determine if the network portal is accepting storage traffic.
  182. */
  183. spin_lock_bh(&np->np_thread_lock);
  184. if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
  185. spin_unlock_bh(&np->np_thread_lock);
  186. return -1;
  187. }
  188. spin_unlock_bh(&np->np_thread_lock);
  189. /*
  190. * Determine if the portal group is accepting storage traffic.
  191. */
  192. spin_lock_bh(&tpg->tpg_state_lock);
  193. if (tpg->tpg_state != TPG_STATE_ACTIVE) {
  194. spin_unlock_bh(&tpg->tpg_state_lock);
  195. return -1;
  196. }
  197. spin_unlock_bh(&tpg->tpg_state_lock);
  198. /*
  199. * Here we serialize access across the TIQN+TPG Tuple.
  200. */
  201. ret = down_interruptible(&tpg->np_login_sem);
  202. if (ret != 0)
  203. return -1;
  204. spin_lock_bh(&tpg->tpg_state_lock);
  205. if (tpg->tpg_state != TPG_STATE_ACTIVE) {
  206. spin_unlock_bh(&tpg->tpg_state_lock);
  207. up(&tpg->np_login_sem);
  208. return -1;
  209. }
  210. spin_unlock_bh(&tpg->tpg_state_lock);
  211. return 0;
  212. }
  213. void iscsit_login_kref_put(struct kref *kref)
  214. {
  215. struct iscsi_tpg_np *tpg_np = container_of(kref,
  216. struct iscsi_tpg_np, tpg_np_kref);
  217. complete(&tpg_np->tpg_np_comp);
  218. }
  219. int iscsit_deaccess_np(struct iscsi_np *np, struct iscsi_portal_group *tpg,
  220. struct iscsi_tpg_np *tpg_np)
  221. {
  222. struct iscsi_tiqn *tiqn = tpg->tpg_tiqn;
  223. up(&tpg->np_login_sem);
  224. if (tpg_np)
  225. kref_put(&tpg_np->tpg_np_kref, iscsit_login_kref_put);
  226. if (tiqn)
  227. iscsit_put_tiqn_for_login(tiqn);
  228. return 0;
  229. }
  230. bool iscsit_check_np_match(
  231. struct sockaddr_storage *sockaddr,
  232. struct iscsi_np *np,
  233. int network_transport)
  234. {
  235. struct sockaddr_in *sock_in, *sock_in_e;
  236. struct sockaddr_in6 *sock_in6, *sock_in6_e;
  237. bool ip_match = false;
  238. u16 port, port_e;
  239. if (sockaddr->ss_family == AF_INET6) {
  240. sock_in6 = (struct sockaddr_in6 *)sockaddr;
  241. sock_in6_e = (struct sockaddr_in6 *)&np->np_sockaddr;
  242. if (!memcmp(&sock_in6->sin6_addr.in6_u,
  243. &sock_in6_e->sin6_addr.in6_u,
  244. sizeof(struct in6_addr)))
  245. ip_match = true;
  246. port = ntohs(sock_in6->sin6_port);
  247. port_e = ntohs(sock_in6_e->sin6_port);
  248. } else {
  249. sock_in = (struct sockaddr_in *)sockaddr;
  250. sock_in_e = (struct sockaddr_in *)&np->np_sockaddr;
  251. if (sock_in->sin_addr.s_addr == sock_in_e->sin_addr.s_addr)
  252. ip_match = true;
  253. port = ntohs(sock_in->sin_port);
  254. port_e = ntohs(sock_in_e->sin_port);
  255. }
  256. if (ip_match && (port_e == port) &&
  257. (np->np_network_transport == network_transport))
  258. return true;
  259. return false;
  260. }
  261. /*
  262. * Called with mutex np_lock held
  263. */
  264. static struct iscsi_np *iscsit_get_np(
  265. struct sockaddr_storage *sockaddr,
  266. int network_transport)
  267. {
  268. struct iscsi_np *np;
  269. bool match;
  270. list_for_each_entry(np, &g_np_list, np_list) {
  271. spin_lock_bh(&np->np_thread_lock);
  272. if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
  273. spin_unlock_bh(&np->np_thread_lock);
  274. continue;
  275. }
  276. match = iscsit_check_np_match(sockaddr, np, network_transport);
  277. if (match) {
  278. /*
  279. * Increment the np_exports reference count now to
  280. * prevent iscsit_del_np() below from being called
  281. * while iscsi_tpg_add_network_portal() is called.
  282. */
  283. np->np_exports++;
  284. spin_unlock_bh(&np->np_thread_lock);
  285. return np;
  286. }
  287. spin_unlock_bh(&np->np_thread_lock);
  288. }
  289. return NULL;
  290. }
  291. struct iscsi_np *iscsit_add_np(
  292. struct sockaddr_storage *sockaddr,
  293. int network_transport)
  294. {
  295. struct iscsi_np *np;
  296. int ret;
  297. mutex_lock(&np_lock);
  298. /*
  299. * Locate the existing struct iscsi_np if already active..
  300. */
  301. np = iscsit_get_np(sockaddr, network_transport);
  302. if (np) {
  303. mutex_unlock(&np_lock);
  304. return np;
  305. }
  306. np = kzalloc(sizeof(*np), GFP_KERNEL);
  307. if (!np) {
  308. mutex_unlock(&np_lock);
  309. return ERR_PTR(-ENOMEM);
  310. }
  311. np->np_flags |= NPF_IP_NETWORK;
  312. np->np_network_transport = network_transport;
  313. spin_lock_init(&np->np_thread_lock);
  314. init_completion(&np->np_restart_comp);
  315. INIT_LIST_HEAD(&np->np_list);
  316. timer_setup(&np->np_login_timer, iscsi_handle_login_thread_timeout, 0);
  317. ret = iscsi_target_setup_login_socket(np, sockaddr);
  318. if (ret != 0) {
  319. kfree(np);
  320. mutex_unlock(&np_lock);
  321. return ERR_PTR(ret);
  322. }
  323. np->np_thread = kthread_run(iscsi_target_login_thread, np, "iscsi_np");
  324. if (IS_ERR(np->np_thread)) {
  325. pr_err("Unable to create kthread: iscsi_np\n");
  326. ret = PTR_ERR(np->np_thread);
  327. kfree(np);
  328. mutex_unlock(&np_lock);
  329. return ERR_PTR(ret);
  330. }
  331. /*
  332. * Increment the np_exports reference count now to prevent
  333. * iscsit_del_np() below from being run while a new call to
  334. * iscsi_tpg_add_network_portal() for a matching iscsi_np is
  335. * active. We don't need to hold np->np_thread_lock at this
  336. * point because iscsi_np has not been added to g_np_list yet.
  337. */
  338. np->np_exports = 1;
  339. np->np_thread_state = ISCSI_NP_THREAD_ACTIVE;
  340. list_add_tail(&np->np_list, &g_np_list);
  341. mutex_unlock(&np_lock);
  342. pr_debug("CORE[0] - Added Network Portal: %pISpc on %s\n",
  343. &np->np_sockaddr, np->np_transport->name);
  344. return np;
  345. }
  346. int iscsit_reset_np_thread(
  347. struct iscsi_np *np,
  348. struct iscsi_tpg_np *tpg_np,
  349. struct iscsi_portal_group *tpg,
  350. bool shutdown)
  351. {
  352. spin_lock_bh(&np->np_thread_lock);
  353. if (np->np_thread_state == ISCSI_NP_THREAD_INACTIVE) {
  354. spin_unlock_bh(&np->np_thread_lock);
  355. return 0;
  356. }
  357. np->np_thread_state = ISCSI_NP_THREAD_RESET;
  358. atomic_inc(&np->np_reset_count);
  359. if (np->np_thread) {
  360. spin_unlock_bh(&np->np_thread_lock);
  361. send_sig(SIGINT, np->np_thread, 1);
  362. wait_for_completion(&np->np_restart_comp);
  363. spin_lock_bh(&np->np_thread_lock);
  364. }
  365. spin_unlock_bh(&np->np_thread_lock);
  366. if (tpg_np && shutdown) {
  367. kref_put(&tpg_np->tpg_np_kref, iscsit_login_kref_put);
  368. wait_for_completion(&tpg_np->tpg_np_comp);
  369. }
  370. return 0;
  371. }
  372. static void iscsit_free_np(struct iscsi_np *np)
  373. {
  374. if (np->np_socket)
  375. sock_release(np->np_socket);
  376. }
  377. int iscsit_del_np(struct iscsi_np *np)
  378. {
  379. spin_lock_bh(&np->np_thread_lock);
  380. np->np_exports--;
  381. if (np->np_exports) {
  382. np->enabled = true;
  383. spin_unlock_bh(&np->np_thread_lock);
  384. return 0;
  385. }
  386. np->np_thread_state = ISCSI_NP_THREAD_SHUTDOWN;
  387. spin_unlock_bh(&np->np_thread_lock);
  388. if (np->np_thread) {
  389. /*
  390. * We need to send the signal to wakeup Linux/Net
  391. * which may be sleeping in sock_accept()..
  392. */
  393. send_sig(SIGINT, np->np_thread, 1);
  394. kthread_stop(np->np_thread);
  395. np->np_thread = NULL;
  396. }
  397. np->np_transport->iscsit_free_np(np);
  398. mutex_lock(&np_lock);
  399. list_del(&np->np_list);
  400. mutex_unlock(&np_lock);
  401. pr_debug("CORE[0] - Removed Network Portal: %pISpc on %s\n",
  402. &np->np_sockaddr, np->np_transport->name);
  403. iscsit_put_transport(np->np_transport);
  404. kfree(np);
  405. return 0;
  406. }
  407. static void iscsit_get_rx_pdu(struct iscsi_conn *);
  408. int iscsit_queue_rsp(struct iscsi_conn *conn, struct iscsi_cmd *cmd)
  409. {
  410. return iscsit_add_cmd_to_response_queue(cmd, cmd->conn, cmd->i_state);
  411. }
  412. EXPORT_SYMBOL(iscsit_queue_rsp);
  413. void iscsit_aborted_task(struct iscsi_conn *conn, struct iscsi_cmd *cmd)
  414. {
  415. spin_lock_bh(&conn->cmd_lock);
  416. if (!list_empty(&cmd->i_conn_node) &&
  417. !(cmd->se_cmd.transport_state & CMD_T_FABRIC_STOP))
  418. list_del_init(&cmd->i_conn_node);
  419. spin_unlock_bh(&conn->cmd_lock);
  420. __iscsit_free_cmd(cmd, true);
  421. }
  422. EXPORT_SYMBOL(iscsit_aborted_task);
  423. static void iscsit_do_crypto_hash_buf(struct ahash_request *, const void *,
  424. u32, u32, const void *, void *);
  425. static void iscsit_tx_thread_wait_for_tcp(struct iscsi_conn *);
  426. static int
  427. iscsit_xmit_nondatain_pdu(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  428. const void *data_buf, u32 data_buf_len)
  429. {
  430. struct iscsi_hdr *hdr = (struct iscsi_hdr *)cmd->pdu;
  431. struct kvec *iov;
  432. u32 niov = 0, tx_size = ISCSI_HDR_LEN;
  433. int ret;
  434. iov = &cmd->iov_misc[0];
  435. iov[niov].iov_base = cmd->pdu;
  436. iov[niov++].iov_len = ISCSI_HDR_LEN;
  437. if (conn->conn_ops->HeaderDigest) {
  438. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  439. iscsit_do_crypto_hash_buf(conn->conn_tx_hash, hdr,
  440. ISCSI_HDR_LEN, 0, NULL,
  441. header_digest);
  442. iov[0].iov_len += ISCSI_CRC_LEN;
  443. tx_size += ISCSI_CRC_LEN;
  444. pr_debug("Attaching CRC32C HeaderDigest"
  445. " to opcode 0x%x 0x%08x\n",
  446. hdr->opcode, *header_digest);
  447. }
  448. if (data_buf_len) {
  449. u32 padding = ((-data_buf_len) & 3);
  450. iov[niov].iov_base = (void *)data_buf;
  451. iov[niov++].iov_len = data_buf_len;
  452. tx_size += data_buf_len;
  453. if (padding != 0) {
  454. iov[niov].iov_base = &cmd->pad_bytes;
  455. iov[niov++].iov_len = padding;
  456. tx_size += padding;
  457. pr_debug("Attaching %u additional"
  458. " padding bytes.\n", padding);
  459. }
  460. if (conn->conn_ops->DataDigest) {
  461. iscsit_do_crypto_hash_buf(conn->conn_tx_hash,
  462. data_buf, data_buf_len,
  463. padding, &cmd->pad_bytes,
  464. &cmd->data_crc);
  465. iov[niov].iov_base = &cmd->data_crc;
  466. iov[niov++].iov_len = ISCSI_CRC_LEN;
  467. tx_size += ISCSI_CRC_LEN;
  468. pr_debug("Attached DataDigest for %u"
  469. " bytes opcode 0x%x, CRC 0x%08x\n",
  470. data_buf_len, hdr->opcode, cmd->data_crc);
  471. }
  472. }
  473. cmd->iov_misc_count = niov;
  474. cmd->tx_size = tx_size;
  475. ret = iscsit_send_tx_data(cmd, conn, 1);
  476. if (ret < 0) {
  477. iscsit_tx_thread_wait_for_tcp(conn);
  478. return ret;
  479. }
  480. return 0;
  481. }
  482. static int iscsit_map_iovec(struct iscsi_cmd *, struct kvec *, u32, u32);
  483. static void iscsit_unmap_iovec(struct iscsi_cmd *);
  484. static u32 iscsit_do_crypto_hash_sg(struct ahash_request *, struct iscsi_cmd *,
  485. u32, u32, u32, u8 *);
  486. static int
  487. iscsit_xmit_datain_pdu(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  488. const struct iscsi_datain *datain)
  489. {
  490. struct kvec *iov;
  491. u32 iov_count = 0, tx_size = 0;
  492. int ret, iov_ret;
  493. iov = &cmd->iov_data[0];
  494. iov[iov_count].iov_base = cmd->pdu;
  495. iov[iov_count++].iov_len = ISCSI_HDR_LEN;
  496. tx_size += ISCSI_HDR_LEN;
  497. if (conn->conn_ops->HeaderDigest) {
  498. u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
  499. iscsit_do_crypto_hash_buf(conn->conn_tx_hash, cmd->pdu,
  500. ISCSI_HDR_LEN, 0, NULL,
  501. header_digest);
  502. iov[0].iov_len += ISCSI_CRC_LEN;
  503. tx_size += ISCSI_CRC_LEN;
  504. pr_debug("Attaching CRC32 HeaderDigest for DataIN PDU 0x%08x\n",
  505. *header_digest);
  506. }
  507. iov_ret = iscsit_map_iovec(cmd, &cmd->iov_data[1],
  508. datain->offset, datain->length);
  509. if (iov_ret < 0)
  510. return -1;
  511. iov_count += iov_ret;
  512. tx_size += datain->length;
  513. cmd->padding = ((-datain->length) & 3);
  514. if (cmd->padding) {
  515. iov[iov_count].iov_base = cmd->pad_bytes;
  516. iov[iov_count++].iov_len = cmd->padding;
  517. tx_size += cmd->padding;
  518. pr_debug("Attaching %u padding bytes\n", cmd->padding);
  519. }
  520. if (conn->conn_ops->DataDigest) {
  521. cmd->data_crc = iscsit_do_crypto_hash_sg(conn->conn_tx_hash,
  522. cmd, datain->offset,
  523. datain->length,
  524. cmd->padding,
  525. cmd->pad_bytes);
  526. iov[iov_count].iov_base = &cmd->data_crc;
  527. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  528. tx_size += ISCSI_CRC_LEN;
  529. pr_debug("Attached CRC32C DataDigest %d bytes, crc 0x%08x\n",
  530. datain->length + cmd->padding, cmd->data_crc);
  531. }
  532. cmd->iov_data_count = iov_count;
  533. cmd->tx_size = tx_size;
  534. ret = iscsit_fe_sendpage_sg(cmd, conn);
  535. iscsit_unmap_iovec(cmd);
  536. if (ret < 0) {
  537. iscsit_tx_thread_wait_for_tcp(conn);
  538. return ret;
  539. }
  540. return 0;
  541. }
  542. static int iscsit_xmit_pdu(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  543. struct iscsi_datain_req *dr, const void *buf,
  544. u32 buf_len)
  545. {
  546. if (dr)
  547. return iscsit_xmit_datain_pdu(conn, cmd, buf);
  548. else
  549. return iscsit_xmit_nondatain_pdu(conn, cmd, buf, buf_len);
  550. }
  551. static enum target_prot_op iscsit_get_sup_prot_ops(struct iscsi_conn *conn)
  552. {
  553. return TARGET_PROT_NORMAL;
  554. }
  555. static struct iscsit_transport iscsi_target_transport = {
  556. .name = "iSCSI/TCP",
  557. .transport_type = ISCSI_TCP,
  558. .rdma_shutdown = false,
  559. .owner = NULL,
  560. .iscsit_setup_np = iscsit_setup_np,
  561. .iscsit_accept_np = iscsit_accept_np,
  562. .iscsit_free_np = iscsit_free_np,
  563. .iscsit_get_login_rx = iscsit_get_login_rx,
  564. .iscsit_put_login_tx = iscsit_put_login_tx,
  565. .iscsit_get_dataout = iscsit_build_r2ts_for_cmd,
  566. .iscsit_immediate_queue = iscsit_immediate_queue,
  567. .iscsit_response_queue = iscsit_response_queue,
  568. .iscsit_queue_data_in = iscsit_queue_rsp,
  569. .iscsit_queue_status = iscsit_queue_rsp,
  570. .iscsit_aborted_task = iscsit_aborted_task,
  571. .iscsit_xmit_pdu = iscsit_xmit_pdu,
  572. .iscsit_get_rx_pdu = iscsit_get_rx_pdu,
  573. .iscsit_get_sup_prot_ops = iscsit_get_sup_prot_ops,
  574. };
  575. static int __init iscsi_target_init_module(void)
  576. {
  577. int ret = 0, size;
  578. pr_debug("iSCSI-Target "ISCSIT_VERSION"\n");
  579. iscsit_global = kzalloc(sizeof(*iscsit_global), GFP_KERNEL);
  580. if (!iscsit_global)
  581. return -1;
  582. spin_lock_init(&iscsit_global->ts_bitmap_lock);
  583. mutex_init(&auth_id_lock);
  584. spin_lock_init(&sess_idr_lock);
  585. idr_init(&tiqn_idr);
  586. idr_init(&sess_idr);
  587. ret = target_register_template(&iscsi_ops);
  588. if (ret)
  589. goto out;
  590. size = BITS_TO_LONGS(ISCSIT_BITMAP_BITS) * sizeof(long);
  591. iscsit_global->ts_bitmap = vzalloc(size);
  592. if (!iscsit_global->ts_bitmap)
  593. goto configfs_out;
  594. lio_qr_cache = kmem_cache_create("lio_qr_cache",
  595. sizeof(struct iscsi_queue_req),
  596. __alignof__(struct iscsi_queue_req), 0, NULL);
  597. if (!lio_qr_cache) {
  598. pr_err("nable to kmem_cache_create() for"
  599. " lio_qr_cache\n");
  600. goto bitmap_out;
  601. }
  602. lio_dr_cache = kmem_cache_create("lio_dr_cache",
  603. sizeof(struct iscsi_datain_req),
  604. __alignof__(struct iscsi_datain_req), 0, NULL);
  605. if (!lio_dr_cache) {
  606. pr_err("Unable to kmem_cache_create() for"
  607. " lio_dr_cache\n");
  608. goto qr_out;
  609. }
  610. lio_ooo_cache = kmem_cache_create("lio_ooo_cache",
  611. sizeof(struct iscsi_ooo_cmdsn),
  612. __alignof__(struct iscsi_ooo_cmdsn), 0, NULL);
  613. if (!lio_ooo_cache) {
  614. pr_err("Unable to kmem_cache_create() for"
  615. " lio_ooo_cache\n");
  616. goto dr_out;
  617. }
  618. lio_r2t_cache = kmem_cache_create("lio_r2t_cache",
  619. sizeof(struct iscsi_r2t), __alignof__(struct iscsi_r2t),
  620. 0, NULL);
  621. if (!lio_r2t_cache) {
  622. pr_err("Unable to kmem_cache_create() for"
  623. " lio_r2t_cache\n");
  624. goto ooo_out;
  625. }
  626. iscsit_register_transport(&iscsi_target_transport);
  627. if (iscsit_load_discovery_tpg() < 0)
  628. goto r2t_out;
  629. return ret;
  630. r2t_out:
  631. iscsit_unregister_transport(&iscsi_target_transport);
  632. kmem_cache_destroy(lio_r2t_cache);
  633. ooo_out:
  634. kmem_cache_destroy(lio_ooo_cache);
  635. dr_out:
  636. kmem_cache_destroy(lio_dr_cache);
  637. qr_out:
  638. kmem_cache_destroy(lio_qr_cache);
  639. bitmap_out:
  640. vfree(iscsit_global->ts_bitmap);
  641. configfs_out:
  642. /* XXX: this probably wants it to be it's own unwind step.. */
  643. if (iscsit_global->discovery_tpg)
  644. iscsit_tpg_disable_portal_group(iscsit_global->discovery_tpg, 1);
  645. target_unregister_template(&iscsi_ops);
  646. out:
  647. kfree(iscsit_global);
  648. return -ENOMEM;
  649. }
  650. static void __exit iscsi_target_cleanup_module(void)
  651. {
  652. iscsit_release_discovery_tpg();
  653. iscsit_unregister_transport(&iscsi_target_transport);
  654. kmem_cache_destroy(lio_qr_cache);
  655. kmem_cache_destroy(lio_dr_cache);
  656. kmem_cache_destroy(lio_ooo_cache);
  657. kmem_cache_destroy(lio_r2t_cache);
  658. /*
  659. * Shutdown discovery sessions and disable discovery TPG
  660. */
  661. if (iscsit_global->discovery_tpg)
  662. iscsit_tpg_disable_portal_group(iscsit_global->discovery_tpg, 1);
  663. target_unregister_template(&iscsi_ops);
  664. vfree(iscsit_global->ts_bitmap);
  665. kfree(iscsit_global);
  666. }
  667. int iscsit_add_reject(
  668. struct iscsi_conn *conn,
  669. u8 reason,
  670. unsigned char *buf)
  671. {
  672. struct iscsi_cmd *cmd;
  673. cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
  674. if (!cmd)
  675. return -1;
  676. cmd->iscsi_opcode = ISCSI_OP_REJECT;
  677. cmd->reject_reason = reason;
  678. cmd->buf_ptr = kmemdup(buf, ISCSI_HDR_LEN, GFP_KERNEL);
  679. if (!cmd->buf_ptr) {
  680. pr_err("Unable to allocate memory for cmd->buf_ptr\n");
  681. iscsit_free_cmd(cmd, false);
  682. return -1;
  683. }
  684. spin_lock_bh(&conn->cmd_lock);
  685. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  686. spin_unlock_bh(&conn->cmd_lock);
  687. cmd->i_state = ISTATE_SEND_REJECT;
  688. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  689. return -1;
  690. }
  691. EXPORT_SYMBOL(iscsit_add_reject);
  692. static int iscsit_add_reject_from_cmd(
  693. struct iscsi_cmd *cmd,
  694. u8 reason,
  695. bool add_to_conn,
  696. unsigned char *buf)
  697. {
  698. struct iscsi_conn *conn;
  699. const bool do_put = cmd->se_cmd.se_tfo != NULL;
  700. if (!cmd->conn) {
  701. pr_err("cmd->conn is NULL for ITT: 0x%08x\n",
  702. cmd->init_task_tag);
  703. return -1;
  704. }
  705. conn = cmd->conn;
  706. cmd->iscsi_opcode = ISCSI_OP_REJECT;
  707. cmd->reject_reason = reason;
  708. cmd->buf_ptr = kmemdup(buf, ISCSI_HDR_LEN, GFP_KERNEL);
  709. if (!cmd->buf_ptr) {
  710. pr_err("Unable to allocate memory for cmd->buf_ptr\n");
  711. iscsit_free_cmd(cmd, false);
  712. return -1;
  713. }
  714. if (add_to_conn) {
  715. spin_lock_bh(&conn->cmd_lock);
  716. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  717. spin_unlock_bh(&conn->cmd_lock);
  718. }
  719. cmd->i_state = ISTATE_SEND_REJECT;
  720. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  721. /*
  722. * Perform the kref_put now if se_cmd has already been setup by
  723. * scsit_setup_scsi_cmd()
  724. */
  725. if (do_put) {
  726. pr_debug("iscsi reject: calling target_put_sess_cmd >>>>>>\n");
  727. target_put_sess_cmd(&cmd->se_cmd);
  728. }
  729. return -1;
  730. }
  731. static int iscsit_add_reject_cmd(struct iscsi_cmd *cmd, u8 reason,
  732. unsigned char *buf)
  733. {
  734. return iscsit_add_reject_from_cmd(cmd, reason, true, buf);
  735. }
  736. int iscsit_reject_cmd(struct iscsi_cmd *cmd, u8 reason, unsigned char *buf)
  737. {
  738. return iscsit_add_reject_from_cmd(cmd, reason, false, buf);
  739. }
  740. EXPORT_SYMBOL(iscsit_reject_cmd);
  741. /*
  742. * Map some portion of the allocated scatterlist to an iovec, suitable for
  743. * kernel sockets to copy data in/out.
  744. */
  745. static int iscsit_map_iovec(
  746. struct iscsi_cmd *cmd,
  747. struct kvec *iov,
  748. u32 data_offset,
  749. u32 data_length)
  750. {
  751. u32 i = 0;
  752. struct scatterlist *sg;
  753. unsigned int page_off;
  754. /*
  755. * We know each entry in t_data_sg contains a page.
  756. */
  757. u32 ent = data_offset / PAGE_SIZE;
  758. if (ent >= cmd->se_cmd.t_data_nents) {
  759. pr_err("Initial page entry out-of-bounds\n");
  760. return -1;
  761. }
  762. sg = &cmd->se_cmd.t_data_sg[ent];
  763. page_off = (data_offset % PAGE_SIZE);
  764. cmd->first_data_sg = sg;
  765. cmd->first_data_sg_off = page_off;
  766. while (data_length) {
  767. u32 cur_len = min_t(u32, data_length, sg->length - page_off);
  768. iov[i].iov_base = kmap(sg_page(sg)) + sg->offset + page_off;
  769. iov[i].iov_len = cur_len;
  770. data_length -= cur_len;
  771. page_off = 0;
  772. sg = sg_next(sg);
  773. i++;
  774. }
  775. cmd->kmapped_nents = i;
  776. return i;
  777. }
  778. static void iscsit_unmap_iovec(struct iscsi_cmd *cmd)
  779. {
  780. u32 i;
  781. struct scatterlist *sg;
  782. sg = cmd->first_data_sg;
  783. for (i = 0; i < cmd->kmapped_nents; i++)
  784. kunmap(sg_page(&sg[i]));
  785. }
  786. static void iscsit_ack_from_expstatsn(struct iscsi_conn *conn, u32 exp_statsn)
  787. {
  788. LIST_HEAD(ack_list);
  789. struct iscsi_cmd *cmd, *cmd_p;
  790. conn->exp_statsn = exp_statsn;
  791. if (conn->sess->sess_ops->RDMAExtensions)
  792. return;
  793. spin_lock_bh(&conn->cmd_lock);
  794. list_for_each_entry_safe(cmd, cmd_p, &conn->conn_cmd_list, i_conn_node) {
  795. spin_lock(&cmd->istate_lock);
  796. if ((cmd->i_state == ISTATE_SENT_STATUS) &&
  797. iscsi_sna_lt(cmd->stat_sn, exp_statsn)) {
  798. cmd->i_state = ISTATE_REMOVE;
  799. spin_unlock(&cmd->istate_lock);
  800. list_move_tail(&cmd->i_conn_node, &ack_list);
  801. continue;
  802. }
  803. spin_unlock(&cmd->istate_lock);
  804. }
  805. spin_unlock_bh(&conn->cmd_lock);
  806. list_for_each_entry_safe(cmd, cmd_p, &ack_list, i_conn_node) {
  807. list_del_init(&cmd->i_conn_node);
  808. iscsit_free_cmd(cmd, false);
  809. }
  810. }
  811. static int iscsit_allocate_iovecs(struct iscsi_cmd *cmd)
  812. {
  813. u32 iov_count = max(1UL, DIV_ROUND_UP(cmd->se_cmd.data_length, PAGE_SIZE));
  814. iov_count += ISCSI_IOV_DATA_BUFFER;
  815. cmd->iov_data = kcalloc(iov_count, sizeof(*cmd->iov_data), GFP_KERNEL);
  816. if (!cmd->iov_data)
  817. return -ENOMEM;
  818. cmd->orig_iov_data_count = iov_count;
  819. return 0;
  820. }
  821. int iscsit_setup_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  822. unsigned char *buf)
  823. {
  824. int data_direction, payload_length;
  825. struct iscsi_scsi_req *hdr;
  826. int iscsi_task_attr;
  827. int sam_task_attr;
  828. atomic_long_inc(&conn->sess->cmd_pdus);
  829. hdr = (struct iscsi_scsi_req *) buf;
  830. payload_length = ntoh24(hdr->dlength);
  831. /* FIXME; Add checks for AdditionalHeaderSegment */
  832. if (!(hdr->flags & ISCSI_FLAG_CMD_WRITE) &&
  833. !(hdr->flags & ISCSI_FLAG_CMD_FINAL)) {
  834. pr_err("ISCSI_FLAG_CMD_WRITE & ISCSI_FLAG_CMD_FINAL"
  835. " not set. Bad iSCSI Initiator.\n");
  836. return iscsit_add_reject_cmd(cmd,
  837. ISCSI_REASON_BOOKMARK_INVALID, buf);
  838. }
  839. if (((hdr->flags & ISCSI_FLAG_CMD_READ) ||
  840. (hdr->flags & ISCSI_FLAG_CMD_WRITE)) && !hdr->data_length) {
  841. /*
  842. * From RFC-3720 Section 10.3.1:
  843. *
  844. * "Either or both of R and W MAY be 1 when either the
  845. * Expected Data Transfer Length and/or Bidirectional Read
  846. * Expected Data Transfer Length are 0"
  847. *
  848. * For this case, go ahead and clear the unnecssary bits
  849. * to avoid any confusion with ->data_direction.
  850. */
  851. hdr->flags &= ~ISCSI_FLAG_CMD_READ;
  852. hdr->flags &= ~ISCSI_FLAG_CMD_WRITE;
  853. pr_warn("ISCSI_FLAG_CMD_READ or ISCSI_FLAG_CMD_WRITE"
  854. " set when Expected Data Transfer Length is 0 for"
  855. " CDB: 0x%02x, Fixing up flags\n", hdr->cdb[0]);
  856. }
  857. if (!(hdr->flags & ISCSI_FLAG_CMD_READ) &&
  858. !(hdr->flags & ISCSI_FLAG_CMD_WRITE) && (hdr->data_length != 0)) {
  859. pr_err("ISCSI_FLAG_CMD_READ and/or ISCSI_FLAG_CMD_WRITE"
  860. " MUST be set if Expected Data Transfer Length is not 0."
  861. " Bad iSCSI Initiator\n");
  862. return iscsit_add_reject_cmd(cmd,
  863. ISCSI_REASON_BOOKMARK_INVALID, buf);
  864. }
  865. if ((hdr->flags & ISCSI_FLAG_CMD_READ) &&
  866. (hdr->flags & ISCSI_FLAG_CMD_WRITE)) {
  867. pr_err("Bidirectional operations not supported!\n");
  868. return iscsit_add_reject_cmd(cmd,
  869. ISCSI_REASON_BOOKMARK_INVALID, buf);
  870. }
  871. if (hdr->opcode & ISCSI_OP_IMMEDIATE) {
  872. pr_err("Illegally set Immediate Bit in iSCSI Initiator"
  873. " Scsi Command PDU.\n");
  874. return iscsit_add_reject_cmd(cmd,
  875. ISCSI_REASON_BOOKMARK_INVALID, buf);
  876. }
  877. if (payload_length && !conn->sess->sess_ops->ImmediateData) {
  878. pr_err("ImmediateData=No but DataSegmentLength=%u,"
  879. " protocol error.\n", payload_length);
  880. return iscsit_add_reject_cmd(cmd,
  881. ISCSI_REASON_PROTOCOL_ERROR, buf);
  882. }
  883. if ((be32_to_cpu(hdr->data_length) == payload_length) &&
  884. (!(hdr->flags & ISCSI_FLAG_CMD_FINAL))) {
  885. pr_err("Expected Data Transfer Length and Length of"
  886. " Immediate Data are the same, but ISCSI_FLAG_CMD_FINAL"
  887. " bit is not set protocol error\n");
  888. return iscsit_add_reject_cmd(cmd,
  889. ISCSI_REASON_PROTOCOL_ERROR, buf);
  890. }
  891. if (payload_length > be32_to_cpu(hdr->data_length)) {
  892. pr_err("DataSegmentLength: %u is greater than"
  893. " EDTL: %u, protocol error.\n", payload_length,
  894. hdr->data_length);
  895. return iscsit_add_reject_cmd(cmd,
  896. ISCSI_REASON_PROTOCOL_ERROR, buf);
  897. }
  898. if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
  899. pr_err("DataSegmentLength: %u is greater than"
  900. " MaxXmitDataSegmentLength: %u, protocol error.\n",
  901. payload_length, conn->conn_ops->MaxXmitDataSegmentLength);
  902. return iscsit_add_reject_cmd(cmd,
  903. ISCSI_REASON_PROTOCOL_ERROR, buf);
  904. }
  905. if (payload_length > conn->sess->sess_ops->FirstBurstLength) {
  906. pr_err("DataSegmentLength: %u is greater than"
  907. " FirstBurstLength: %u, protocol error.\n",
  908. payload_length, conn->sess->sess_ops->FirstBurstLength);
  909. return iscsit_add_reject_cmd(cmd,
  910. ISCSI_REASON_BOOKMARK_INVALID, buf);
  911. }
  912. data_direction = (hdr->flags & ISCSI_FLAG_CMD_WRITE) ? DMA_TO_DEVICE :
  913. (hdr->flags & ISCSI_FLAG_CMD_READ) ? DMA_FROM_DEVICE :
  914. DMA_NONE;
  915. cmd->data_direction = data_direction;
  916. iscsi_task_attr = hdr->flags & ISCSI_FLAG_CMD_ATTR_MASK;
  917. /*
  918. * Figure out the SAM Task Attribute for the incoming SCSI CDB
  919. */
  920. if ((iscsi_task_attr == ISCSI_ATTR_UNTAGGED) ||
  921. (iscsi_task_attr == ISCSI_ATTR_SIMPLE))
  922. sam_task_attr = TCM_SIMPLE_TAG;
  923. else if (iscsi_task_attr == ISCSI_ATTR_ORDERED)
  924. sam_task_attr = TCM_ORDERED_TAG;
  925. else if (iscsi_task_attr == ISCSI_ATTR_HEAD_OF_QUEUE)
  926. sam_task_attr = TCM_HEAD_TAG;
  927. else if (iscsi_task_attr == ISCSI_ATTR_ACA)
  928. sam_task_attr = TCM_ACA_TAG;
  929. else {
  930. pr_debug("Unknown iSCSI Task Attribute: 0x%02x, using"
  931. " TCM_SIMPLE_TAG\n", iscsi_task_attr);
  932. sam_task_attr = TCM_SIMPLE_TAG;
  933. }
  934. cmd->iscsi_opcode = ISCSI_OP_SCSI_CMD;
  935. cmd->i_state = ISTATE_NEW_CMD;
  936. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
  937. cmd->immediate_data = (payload_length) ? 1 : 0;
  938. cmd->unsolicited_data = ((!(hdr->flags & ISCSI_FLAG_CMD_FINAL) &&
  939. (hdr->flags & ISCSI_FLAG_CMD_WRITE)) ? 1 : 0);
  940. if (cmd->unsolicited_data)
  941. cmd->cmd_flags |= ICF_NON_IMMEDIATE_UNSOLICITED_DATA;
  942. conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
  943. if (hdr->flags & ISCSI_FLAG_CMD_READ)
  944. cmd->targ_xfer_tag = session_get_next_ttt(conn->sess);
  945. else
  946. cmd->targ_xfer_tag = 0xFFFFFFFF;
  947. cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
  948. cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
  949. cmd->first_burst_len = payload_length;
  950. if (!conn->sess->sess_ops->RDMAExtensions &&
  951. cmd->data_direction == DMA_FROM_DEVICE) {
  952. struct iscsi_datain_req *dr;
  953. dr = iscsit_allocate_datain_req();
  954. if (!dr)
  955. return iscsit_add_reject_cmd(cmd,
  956. ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
  957. iscsit_attach_datain_req(cmd, dr);
  958. }
  959. /*
  960. * Initialize struct se_cmd descriptor from target_core_mod infrastructure
  961. */
  962. transport_init_se_cmd(&cmd->se_cmd, &iscsi_ops,
  963. conn->sess->se_sess, be32_to_cpu(hdr->data_length),
  964. cmd->data_direction, sam_task_attr,
  965. cmd->sense_buffer + 2);
  966. pr_debug("Got SCSI Command, ITT: 0x%08x, CmdSN: 0x%08x,"
  967. " ExpXferLen: %u, Length: %u, CID: %hu\n", hdr->itt,
  968. hdr->cmdsn, be32_to_cpu(hdr->data_length), payload_length,
  969. conn->cid);
  970. target_get_sess_cmd(&cmd->se_cmd, true);
  971. cmd->sense_reason = transport_lookup_cmd_lun(&cmd->se_cmd,
  972. scsilun_to_int(&hdr->lun));
  973. if (cmd->sense_reason)
  974. goto attach_cmd;
  975. /* only used for printks or comparing with ->ref_task_tag */
  976. cmd->se_cmd.tag = (__force u32)cmd->init_task_tag;
  977. cmd->sense_reason = target_setup_cmd_from_cdb(&cmd->se_cmd, hdr->cdb);
  978. if (cmd->sense_reason) {
  979. if (cmd->sense_reason == TCM_OUT_OF_RESOURCES) {
  980. return iscsit_add_reject_cmd(cmd,
  981. ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
  982. }
  983. goto attach_cmd;
  984. }
  985. if (iscsit_build_pdu_and_seq_lists(cmd, payload_length) < 0) {
  986. return iscsit_add_reject_cmd(cmd,
  987. ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
  988. }
  989. attach_cmd:
  990. spin_lock_bh(&conn->cmd_lock);
  991. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  992. spin_unlock_bh(&conn->cmd_lock);
  993. /*
  994. * Check if we need to delay processing because of ALUA
  995. * Active/NonOptimized primary access state..
  996. */
  997. core_alua_check_nonop_delay(&cmd->se_cmd);
  998. return 0;
  999. }
  1000. EXPORT_SYMBOL(iscsit_setup_scsi_cmd);
  1001. void iscsit_set_unsoliticed_dataout(struct iscsi_cmd *cmd)
  1002. {
  1003. iscsit_set_dataout_sequence_values(cmd);
  1004. spin_lock_bh(&cmd->dataout_timeout_lock);
  1005. iscsit_start_dataout_timer(cmd, cmd->conn);
  1006. spin_unlock_bh(&cmd->dataout_timeout_lock);
  1007. }
  1008. EXPORT_SYMBOL(iscsit_set_unsoliticed_dataout);
  1009. int iscsit_process_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1010. struct iscsi_scsi_req *hdr)
  1011. {
  1012. int cmdsn_ret = 0;
  1013. /*
  1014. * Check the CmdSN against ExpCmdSN/MaxCmdSN here if
  1015. * the Immediate Bit is not set, and no Immediate
  1016. * Data is attached.
  1017. *
  1018. * A PDU/CmdSN carrying Immediate Data can only
  1019. * be processed after the DataCRC has passed.
  1020. * If the DataCRC fails, the CmdSN MUST NOT
  1021. * be acknowledged. (See below)
  1022. */
  1023. if (!cmd->immediate_data) {
  1024. cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
  1025. (unsigned char *)hdr, hdr->cmdsn);
  1026. if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  1027. return -1;
  1028. else if (cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
  1029. target_put_sess_cmd(&cmd->se_cmd);
  1030. return 0;
  1031. }
  1032. }
  1033. iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
  1034. /*
  1035. * If no Immediate Data is attached, it's OK to return now.
  1036. */
  1037. if (!cmd->immediate_data) {
  1038. if (!cmd->sense_reason && cmd->unsolicited_data)
  1039. iscsit_set_unsoliticed_dataout(cmd);
  1040. if (!cmd->sense_reason)
  1041. return 0;
  1042. target_put_sess_cmd(&cmd->se_cmd);
  1043. return 0;
  1044. }
  1045. /*
  1046. * Early CHECK_CONDITIONs with ImmediateData never make it to command
  1047. * execution. These exceptions are processed in CmdSN order using
  1048. * iscsit_check_received_cmdsn() in iscsit_get_immediate_data() below.
  1049. */
  1050. if (cmd->sense_reason)
  1051. return 1;
  1052. /*
  1053. * Call directly into transport_generic_new_cmd() to perform
  1054. * the backend memory allocation.
  1055. */
  1056. cmd->sense_reason = transport_generic_new_cmd(&cmd->se_cmd);
  1057. if (cmd->sense_reason)
  1058. return 1;
  1059. return 0;
  1060. }
  1061. EXPORT_SYMBOL(iscsit_process_scsi_cmd);
  1062. static int
  1063. iscsit_get_immediate_data(struct iscsi_cmd *cmd, struct iscsi_scsi_req *hdr,
  1064. bool dump_payload)
  1065. {
  1066. int cmdsn_ret = 0, immed_ret = IMMEDIATE_DATA_NORMAL_OPERATION;
  1067. /*
  1068. * Special case for Unsupported SAM WRITE Opcodes and ImmediateData=Yes.
  1069. */
  1070. if (dump_payload)
  1071. goto after_immediate_data;
  1072. /*
  1073. * Check for underflow case where both EDTL and immediate data payload
  1074. * exceeds what is presented by CDB's TRANSFER LENGTH, and what has
  1075. * already been set in target_cmd_size_check() as se_cmd->data_length.
  1076. *
  1077. * For this special case, fail the command and dump the immediate data
  1078. * payload.
  1079. */
  1080. if (cmd->first_burst_len > cmd->se_cmd.data_length) {
  1081. cmd->sense_reason = TCM_INVALID_CDB_FIELD;
  1082. goto after_immediate_data;
  1083. }
  1084. immed_ret = iscsit_handle_immediate_data(cmd, hdr,
  1085. cmd->first_burst_len);
  1086. after_immediate_data:
  1087. if (immed_ret == IMMEDIATE_DATA_NORMAL_OPERATION) {
  1088. /*
  1089. * A PDU/CmdSN carrying Immediate Data passed
  1090. * DataCRC, check against ExpCmdSN/MaxCmdSN if
  1091. * Immediate Bit is not set.
  1092. */
  1093. cmdsn_ret = iscsit_sequence_cmd(cmd->conn, cmd,
  1094. (unsigned char *)hdr, hdr->cmdsn);
  1095. if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  1096. return -1;
  1097. if (cmd->sense_reason || cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
  1098. int rc;
  1099. rc = iscsit_dump_data_payload(cmd->conn,
  1100. cmd->first_burst_len, 1);
  1101. target_put_sess_cmd(&cmd->se_cmd);
  1102. return rc;
  1103. } else if (cmd->unsolicited_data)
  1104. iscsit_set_unsoliticed_dataout(cmd);
  1105. } else if (immed_ret == IMMEDIATE_DATA_ERL1_CRC_FAILURE) {
  1106. /*
  1107. * Immediate Data failed DataCRC and ERL>=1,
  1108. * silently drop this PDU and let the initiator
  1109. * plug the CmdSN gap.
  1110. *
  1111. * FIXME: Send Unsolicited NOPIN with reserved
  1112. * TTT here to help the initiator figure out
  1113. * the missing CmdSN, although they should be
  1114. * intelligent enough to determine the missing
  1115. * CmdSN and issue a retry to plug the sequence.
  1116. */
  1117. cmd->i_state = ISTATE_REMOVE;
  1118. iscsit_add_cmd_to_immediate_queue(cmd, cmd->conn, cmd->i_state);
  1119. } else /* immed_ret == IMMEDIATE_DATA_CANNOT_RECOVER */
  1120. return -1;
  1121. return 0;
  1122. }
  1123. static int
  1124. iscsit_handle_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1125. unsigned char *buf)
  1126. {
  1127. struct iscsi_scsi_req *hdr = (struct iscsi_scsi_req *)buf;
  1128. int rc, immed_data;
  1129. bool dump_payload = false;
  1130. rc = iscsit_setup_scsi_cmd(conn, cmd, buf);
  1131. if (rc < 0)
  1132. return 0;
  1133. /*
  1134. * Allocation iovecs needed for struct socket operations for
  1135. * traditional iSCSI block I/O.
  1136. */
  1137. if (iscsit_allocate_iovecs(cmd) < 0) {
  1138. return iscsit_reject_cmd(cmd,
  1139. ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
  1140. }
  1141. immed_data = cmd->immediate_data;
  1142. rc = iscsit_process_scsi_cmd(conn, cmd, hdr);
  1143. if (rc < 0)
  1144. return rc;
  1145. else if (rc > 0)
  1146. dump_payload = true;
  1147. if (!immed_data)
  1148. return 0;
  1149. return iscsit_get_immediate_data(cmd, hdr, dump_payload);
  1150. }
  1151. static u32 iscsit_do_crypto_hash_sg(
  1152. struct ahash_request *hash,
  1153. struct iscsi_cmd *cmd,
  1154. u32 data_offset,
  1155. u32 data_length,
  1156. u32 padding,
  1157. u8 *pad_bytes)
  1158. {
  1159. u32 data_crc;
  1160. struct scatterlist *sg;
  1161. unsigned int page_off;
  1162. crypto_ahash_init(hash);
  1163. sg = cmd->first_data_sg;
  1164. page_off = cmd->first_data_sg_off;
  1165. while (data_length) {
  1166. u32 cur_len = min_t(u32, data_length, (sg->length - page_off));
  1167. ahash_request_set_crypt(hash, sg, NULL, cur_len);
  1168. crypto_ahash_update(hash);
  1169. data_length -= cur_len;
  1170. page_off = 0;
  1171. /* iscsit_map_iovec has already checked for invalid sg pointers */
  1172. sg = sg_next(sg);
  1173. }
  1174. if (padding) {
  1175. struct scatterlist pad_sg;
  1176. sg_init_one(&pad_sg, pad_bytes, padding);
  1177. ahash_request_set_crypt(hash, &pad_sg, (u8 *)&data_crc,
  1178. padding);
  1179. crypto_ahash_finup(hash);
  1180. } else {
  1181. ahash_request_set_crypt(hash, NULL, (u8 *)&data_crc, 0);
  1182. crypto_ahash_final(hash);
  1183. }
  1184. return data_crc;
  1185. }
  1186. static void iscsit_do_crypto_hash_buf(struct ahash_request *hash,
  1187. const void *buf, u32 payload_length, u32 padding,
  1188. const void *pad_bytes, void *data_crc)
  1189. {
  1190. struct scatterlist sg[2];
  1191. sg_init_table(sg, ARRAY_SIZE(sg));
  1192. sg_set_buf(sg, buf, payload_length);
  1193. sg_set_buf(sg + 1, pad_bytes, padding);
  1194. ahash_request_set_crypt(hash, sg, data_crc, payload_length + padding);
  1195. crypto_ahash_digest(hash);
  1196. }
  1197. int
  1198. __iscsit_check_dataout_hdr(struct iscsi_conn *conn, void *buf,
  1199. struct iscsi_cmd *cmd, u32 payload_length,
  1200. bool *success)
  1201. {
  1202. struct iscsi_data *hdr = buf;
  1203. struct se_cmd *se_cmd;
  1204. int rc;
  1205. /* iSCSI write */
  1206. atomic_long_add(payload_length, &conn->sess->rx_data_octets);
  1207. pr_debug("Got DataOut ITT: 0x%08x, TTT: 0x%08x,"
  1208. " DataSN: 0x%08x, Offset: %u, Length: %u, CID: %hu\n",
  1209. hdr->itt, hdr->ttt, hdr->datasn, ntohl(hdr->offset),
  1210. payload_length, conn->cid);
  1211. if (cmd->cmd_flags & ICF_GOT_LAST_DATAOUT) {
  1212. pr_err("Command ITT: 0x%08x received DataOUT after"
  1213. " last DataOUT received, dumping payload\n",
  1214. cmd->init_task_tag);
  1215. return iscsit_dump_data_payload(conn, payload_length, 1);
  1216. }
  1217. if (cmd->data_direction != DMA_TO_DEVICE) {
  1218. pr_err("Command ITT: 0x%08x received DataOUT for a"
  1219. " NON-WRITE command.\n", cmd->init_task_tag);
  1220. return iscsit_dump_data_payload(conn, payload_length, 1);
  1221. }
  1222. se_cmd = &cmd->se_cmd;
  1223. iscsit_mod_dataout_timer(cmd);
  1224. if ((be32_to_cpu(hdr->offset) + payload_length) > cmd->se_cmd.data_length) {
  1225. pr_err("DataOut Offset: %u, Length %u greater than iSCSI Command EDTL %u, protocol error.\n",
  1226. be32_to_cpu(hdr->offset), payload_length,
  1227. cmd->se_cmd.data_length);
  1228. return iscsit_reject_cmd(cmd, ISCSI_REASON_BOOKMARK_INVALID, buf);
  1229. }
  1230. if (cmd->unsolicited_data) {
  1231. int dump_unsolicited_data = 0;
  1232. if (conn->sess->sess_ops->InitialR2T) {
  1233. pr_err("Received unexpected unsolicited data"
  1234. " while InitialR2T=Yes, protocol error.\n");
  1235. transport_send_check_condition_and_sense(&cmd->se_cmd,
  1236. TCM_UNEXPECTED_UNSOLICITED_DATA, 0);
  1237. return -1;
  1238. }
  1239. /*
  1240. * Special case for dealing with Unsolicited DataOUT
  1241. * and Unsupported SAM WRITE Opcodes and SE resource allocation
  1242. * failures;
  1243. */
  1244. /* Something's amiss if we're not in WRITE_PENDING state... */
  1245. WARN_ON(se_cmd->t_state != TRANSPORT_WRITE_PENDING);
  1246. if (!(se_cmd->se_cmd_flags & SCF_SUPPORTED_SAM_OPCODE))
  1247. dump_unsolicited_data = 1;
  1248. if (dump_unsolicited_data) {
  1249. /*
  1250. * Check if a delayed TASK_ABORTED status needs to
  1251. * be sent now if the ISCSI_FLAG_CMD_FINAL has been
  1252. * received with the unsolicited data out.
  1253. */
  1254. if (hdr->flags & ISCSI_FLAG_CMD_FINAL)
  1255. iscsit_stop_dataout_timer(cmd);
  1256. transport_check_aborted_status(se_cmd,
  1257. (hdr->flags & ISCSI_FLAG_CMD_FINAL));
  1258. return iscsit_dump_data_payload(conn, payload_length, 1);
  1259. }
  1260. } else {
  1261. /*
  1262. * For the normal solicited data path:
  1263. *
  1264. * Check for a delayed TASK_ABORTED status and dump any
  1265. * incoming data out payload if one exists. Also, when the
  1266. * ISCSI_FLAG_CMD_FINAL is set to denote the end of the current
  1267. * data out sequence, we decrement outstanding_r2ts. Once
  1268. * outstanding_r2ts reaches zero, go ahead and send the delayed
  1269. * TASK_ABORTED status.
  1270. */
  1271. if (se_cmd->transport_state & CMD_T_ABORTED) {
  1272. if (hdr->flags & ISCSI_FLAG_CMD_FINAL)
  1273. if (--cmd->outstanding_r2ts < 1) {
  1274. iscsit_stop_dataout_timer(cmd);
  1275. transport_check_aborted_status(
  1276. se_cmd, 1);
  1277. }
  1278. return iscsit_dump_data_payload(conn, payload_length, 1);
  1279. }
  1280. }
  1281. /*
  1282. * Perform DataSN, DataSequenceInOrder, DataPDUInOrder, and
  1283. * within-command recovery checks before receiving the payload.
  1284. */
  1285. rc = iscsit_check_pre_dataout(cmd, buf);
  1286. if (rc == DATAOUT_WITHIN_COMMAND_RECOVERY)
  1287. return 0;
  1288. else if (rc == DATAOUT_CANNOT_RECOVER)
  1289. return -1;
  1290. *success = true;
  1291. return 0;
  1292. }
  1293. EXPORT_SYMBOL(__iscsit_check_dataout_hdr);
  1294. int
  1295. iscsit_check_dataout_hdr(struct iscsi_conn *conn, void *buf,
  1296. struct iscsi_cmd **out_cmd)
  1297. {
  1298. struct iscsi_data *hdr = buf;
  1299. struct iscsi_cmd *cmd;
  1300. u32 payload_length = ntoh24(hdr->dlength);
  1301. int rc;
  1302. bool success = false;
  1303. if (!payload_length) {
  1304. pr_warn_ratelimited("DataOUT payload is ZERO, ignoring.\n");
  1305. return 0;
  1306. }
  1307. if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
  1308. pr_err_ratelimited("DataSegmentLength: %u is greater than"
  1309. " MaxXmitDataSegmentLength: %u\n", payload_length,
  1310. conn->conn_ops->MaxXmitDataSegmentLength);
  1311. return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR, buf);
  1312. }
  1313. cmd = iscsit_find_cmd_from_itt_or_dump(conn, hdr->itt, payload_length);
  1314. if (!cmd)
  1315. return 0;
  1316. rc = __iscsit_check_dataout_hdr(conn, buf, cmd, payload_length, &success);
  1317. if (success)
  1318. *out_cmd = cmd;
  1319. return rc;
  1320. }
  1321. EXPORT_SYMBOL(iscsit_check_dataout_hdr);
  1322. static int
  1323. iscsit_get_dataout(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1324. struct iscsi_data *hdr)
  1325. {
  1326. struct kvec *iov;
  1327. u32 checksum, iov_count = 0, padding = 0, rx_got = 0, rx_size = 0;
  1328. u32 payload_length = ntoh24(hdr->dlength);
  1329. int iov_ret, data_crc_failed = 0;
  1330. rx_size += payload_length;
  1331. iov = &cmd->iov_data[0];
  1332. iov_ret = iscsit_map_iovec(cmd, iov, be32_to_cpu(hdr->offset),
  1333. payload_length);
  1334. if (iov_ret < 0)
  1335. return -1;
  1336. iov_count += iov_ret;
  1337. padding = ((-payload_length) & 3);
  1338. if (padding != 0) {
  1339. iov[iov_count].iov_base = cmd->pad_bytes;
  1340. iov[iov_count++].iov_len = padding;
  1341. rx_size += padding;
  1342. pr_debug("Receiving %u padding bytes.\n", padding);
  1343. }
  1344. if (conn->conn_ops->DataDigest) {
  1345. iov[iov_count].iov_base = &checksum;
  1346. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  1347. rx_size += ISCSI_CRC_LEN;
  1348. }
  1349. rx_got = rx_data(conn, &cmd->iov_data[0], iov_count, rx_size);
  1350. iscsit_unmap_iovec(cmd);
  1351. if (rx_got != rx_size)
  1352. return -1;
  1353. if (conn->conn_ops->DataDigest) {
  1354. u32 data_crc;
  1355. data_crc = iscsit_do_crypto_hash_sg(conn->conn_rx_hash, cmd,
  1356. be32_to_cpu(hdr->offset),
  1357. payload_length, padding,
  1358. cmd->pad_bytes);
  1359. if (checksum != data_crc) {
  1360. pr_err("ITT: 0x%08x, Offset: %u, Length: %u,"
  1361. " DataSN: 0x%08x, CRC32C DataDigest 0x%08x"
  1362. " does not match computed 0x%08x\n",
  1363. hdr->itt, hdr->offset, payload_length,
  1364. hdr->datasn, checksum, data_crc);
  1365. data_crc_failed = 1;
  1366. } else {
  1367. pr_debug("Got CRC32C DataDigest 0x%08x for"
  1368. " %u bytes of Data Out\n", checksum,
  1369. payload_length);
  1370. }
  1371. }
  1372. return data_crc_failed;
  1373. }
  1374. int
  1375. iscsit_check_dataout_payload(struct iscsi_cmd *cmd, struct iscsi_data *hdr,
  1376. bool data_crc_failed)
  1377. {
  1378. struct iscsi_conn *conn = cmd->conn;
  1379. int rc, ooo_cmdsn;
  1380. /*
  1381. * Increment post receive data and CRC values or perform
  1382. * within-command recovery.
  1383. */
  1384. rc = iscsit_check_post_dataout(cmd, (unsigned char *)hdr, data_crc_failed);
  1385. if ((rc == DATAOUT_NORMAL) || (rc == DATAOUT_WITHIN_COMMAND_RECOVERY))
  1386. return 0;
  1387. else if (rc == DATAOUT_SEND_R2T) {
  1388. iscsit_set_dataout_sequence_values(cmd);
  1389. conn->conn_transport->iscsit_get_dataout(conn, cmd, false);
  1390. } else if (rc == DATAOUT_SEND_TO_TRANSPORT) {
  1391. /*
  1392. * Handle extra special case for out of order
  1393. * Unsolicited Data Out.
  1394. */
  1395. spin_lock_bh(&cmd->istate_lock);
  1396. ooo_cmdsn = (cmd->cmd_flags & ICF_OOO_CMDSN);
  1397. cmd->cmd_flags |= ICF_GOT_LAST_DATAOUT;
  1398. cmd->i_state = ISTATE_RECEIVED_LAST_DATAOUT;
  1399. spin_unlock_bh(&cmd->istate_lock);
  1400. iscsit_stop_dataout_timer(cmd);
  1401. if (ooo_cmdsn)
  1402. return 0;
  1403. target_execute_cmd(&cmd->se_cmd);
  1404. return 0;
  1405. } else /* DATAOUT_CANNOT_RECOVER */
  1406. return -1;
  1407. return 0;
  1408. }
  1409. EXPORT_SYMBOL(iscsit_check_dataout_payload);
  1410. static int iscsit_handle_data_out(struct iscsi_conn *conn, unsigned char *buf)
  1411. {
  1412. struct iscsi_cmd *cmd = NULL;
  1413. struct iscsi_data *hdr = (struct iscsi_data *)buf;
  1414. int rc;
  1415. bool data_crc_failed = false;
  1416. rc = iscsit_check_dataout_hdr(conn, buf, &cmd);
  1417. if (rc < 0)
  1418. return 0;
  1419. else if (!cmd)
  1420. return 0;
  1421. rc = iscsit_get_dataout(conn, cmd, hdr);
  1422. if (rc < 0)
  1423. return rc;
  1424. else if (rc > 0)
  1425. data_crc_failed = true;
  1426. return iscsit_check_dataout_payload(cmd, hdr, data_crc_failed);
  1427. }
  1428. int iscsit_setup_nop_out(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1429. struct iscsi_nopout *hdr)
  1430. {
  1431. u32 payload_length = ntoh24(hdr->dlength);
  1432. if (!(hdr->flags & ISCSI_FLAG_CMD_FINAL)) {
  1433. pr_err("NopOUT Flag's, Left Most Bit not set, protocol error.\n");
  1434. if (!cmd)
  1435. return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
  1436. (unsigned char *)hdr);
  1437. return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
  1438. (unsigned char *)hdr);
  1439. }
  1440. if (hdr->itt == RESERVED_ITT && !(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
  1441. pr_err("NOPOUT ITT is reserved, but Immediate Bit is"
  1442. " not set, protocol error.\n");
  1443. if (!cmd)
  1444. return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
  1445. (unsigned char *)hdr);
  1446. return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
  1447. (unsigned char *)hdr);
  1448. }
  1449. if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
  1450. pr_err("NOPOUT Ping Data DataSegmentLength: %u is"
  1451. " greater than MaxXmitDataSegmentLength: %u, protocol"
  1452. " error.\n", payload_length,
  1453. conn->conn_ops->MaxXmitDataSegmentLength);
  1454. if (!cmd)
  1455. return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
  1456. (unsigned char *)hdr);
  1457. return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
  1458. (unsigned char *)hdr);
  1459. }
  1460. pr_debug("Got NOPOUT Ping %s ITT: 0x%08x, TTT: 0x%08x,"
  1461. " CmdSN: 0x%08x, ExpStatSN: 0x%08x, Length: %u\n",
  1462. hdr->itt == RESERVED_ITT ? "Response" : "Request",
  1463. hdr->itt, hdr->ttt, hdr->cmdsn, hdr->exp_statsn,
  1464. payload_length);
  1465. /*
  1466. * This is not a response to a Unsolicited NopIN, which means
  1467. * it can either be a NOPOUT ping request (with a valid ITT),
  1468. * or a NOPOUT not requesting a NOPIN (with a reserved ITT).
  1469. * Either way, make sure we allocate an struct iscsi_cmd, as both
  1470. * can contain ping data.
  1471. */
  1472. if (hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
  1473. cmd->iscsi_opcode = ISCSI_OP_NOOP_OUT;
  1474. cmd->i_state = ISTATE_SEND_NOPIN;
  1475. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ?
  1476. 1 : 0);
  1477. conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
  1478. cmd->targ_xfer_tag = 0xFFFFFFFF;
  1479. cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
  1480. cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
  1481. cmd->data_direction = DMA_NONE;
  1482. }
  1483. return 0;
  1484. }
  1485. EXPORT_SYMBOL(iscsit_setup_nop_out);
  1486. int iscsit_process_nop_out(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1487. struct iscsi_nopout *hdr)
  1488. {
  1489. struct iscsi_cmd *cmd_p = NULL;
  1490. int cmdsn_ret = 0;
  1491. /*
  1492. * Initiator is expecting a NopIN ping reply..
  1493. */
  1494. if (hdr->itt != RESERVED_ITT) {
  1495. if (!cmd)
  1496. return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
  1497. (unsigned char *)hdr);
  1498. spin_lock_bh(&conn->cmd_lock);
  1499. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  1500. spin_unlock_bh(&conn->cmd_lock);
  1501. iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
  1502. if (hdr->opcode & ISCSI_OP_IMMEDIATE) {
  1503. iscsit_add_cmd_to_response_queue(cmd, conn,
  1504. cmd->i_state);
  1505. return 0;
  1506. }
  1507. cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
  1508. (unsigned char *)hdr, hdr->cmdsn);
  1509. if (cmdsn_ret == CMDSN_LOWER_THAN_EXP)
  1510. return 0;
  1511. if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  1512. return -1;
  1513. return 0;
  1514. }
  1515. /*
  1516. * This was a response to a unsolicited NOPIN ping.
  1517. */
  1518. if (hdr->ttt != cpu_to_be32(0xFFFFFFFF)) {
  1519. cmd_p = iscsit_find_cmd_from_ttt(conn, be32_to_cpu(hdr->ttt));
  1520. if (!cmd_p)
  1521. return -EINVAL;
  1522. iscsit_stop_nopin_response_timer(conn);
  1523. cmd_p->i_state = ISTATE_REMOVE;
  1524. iscsit_add_cmd_to_immediate_queue(cmd_p, conn, cmd_p->i_state);
  1525. iscsit_start_nopin_timer(conn);
  1526. return 0;
  1527. }
  1528. /*
  1529. * Otherwise, initiator is not expecting a NOPIN is response.
  1530. * Just ignore for now.
  1531. */
  1532. if (cmd)
  1533. iscsit_free_cmd(cmd, false);
  1534. return 0;
  1535. }
  1536. EXPORT_SYMBOL(iscsit_process_nop_out);
  1537. static int iscsit_handle_nop_out(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1538. unsigned char *buf)
  1539. {
  1540. unsigned char *ping_data = NULL;
  1541. struct iscsi_nopout *hdr = (struct iscsi_nopout *)buf;
  1542. struct kvec *iov = NULL;
  1543. u32 payload_length = ntoh24(hdr->dlength);
  1544. int ret;
  1545. ret = iscsit_setup_nop_out(conn, cmd, hdr);
  1546. if (ret < 0)
  1547. return 0;
  1548. /*
  1549. * Handle NOP-OUT payload for traditional iSCSI sockets
  1550. */
  1551. if (payload_length && hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
  1552. u32 checksum, data_crc, padding = 0;
  1553. int niov = 0, rx_got, rx_size = payload_length;
  1554. ping_data = kzalloc(payload_length + 1, GFP_KERNEL);
  1555. if (!ping_data) {
  1556. ret = -1;
  1557. goto out;
  1558. }
  1559. iov = &cmd->iov_misc[0];
  1560. iov[niov].iov_base = ping_data;
  1561. iov[niov++].iov_len = payload_length;
  1562. padding = ((-payload_length) & 3);
  1563. if (padding != 0) {
  1564. pr_debug("Receiving %u additional bytes"
  1565. " for padding.\n", padding);
  1566. iov[niov].iov_base = &cmd->pad_bytes;
  1567. iov[niov++].iov_len = padding;
  1568. rx_size += padding;
  1569. }
  1570. if (conn->conn_ops->DataDigest) {
  1571. iov[niov].iov_base = &checksum;
  1572. iov[niov++].iov_len = ISCSI_CRC_LEN;
  1573. rx_size += ISCSI_CRC_LEN;
  1574. }
  1575. rx_got = rx_data(conn, &cmd->iov_misc[0], niov, rx_size);
  1576. if (rx_got != rx_size) {
  1577. ret = -1;
  1578. goto out;
  1579. }
  1580. if (conn->conn_ops->DataDigest) {
  1581. iscsit_do_crypto_hash_buf(conn->conn_rx_hash, ping_data,
  1582. payload_length, padding,
  1583. cmd->pad_bytes, &data_crc);
  1584. if (checksum != data_crc) {
  1585. pr_err("Ping data CRC32C DataDigest"
  1586. " 0x%08x does not match computed 0x%08x\n",
  1587. checksum, data_crc);
  1588. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  1589. pr_err("Unable to recover from"
  1590. " NOPOUT Ping DataCRC failure while in"
  1591. " ERL=0.\n");
  1592. ret = -1;
  1593. goto out;
  1594. } else {
  1595. /*
  1596. * Silently drop this PDU and let the
  1597. * initiator plug the CmdSN gap.
  1598. */
  1599. pr_debug("Dropping NOPOUT"
  1600. " Command CmdSN: 0x%08x due to"
  1601. " DataCRC error.\n", hdr->cmdsn);
  1602. ret = 0;
  1603. goto out;
  1604. }
  1605. } else {
  1606. pr_debug("Got CRC32C DataDigest"
  1607. " 0x%08x for %u bytes of ping data.\n",
  1608. checksum, payload_length);
  1609. }
  1610. }
  1611. ping_data[payload_length] = '\0';
  1612. /*
  1613. * Attach ping data to struct iscsi_cmd->buf_ptr.
  1614. */
  1615. cmd->buf_ptr = ping_data;
  1616. cmd->buf_ptr_size = payload_length;
  1617. pr_debug("Got %u bytes of NOPOUT ping"
  1618. " data.\n", payload_length);
  1619. pr_debug("Ping Data: \"%s\"\n", ping_data);
  1620. }
  1621. return iscsit_process_nop_out(conn, cmd, hdr);
  1622. out:
  1623. if (cmd)
  1624. iscsit_free_cmd(cmd, false);
  1625. kfree(ping_data);
  1626. return ret;
  1627. }
  1628. static enum tcm_tmreq_table iscsit_convert_tmf(u8 iscsi_tmf)
  1629. {
  1630. switch (iscsi_tmf) {
  1631. case ISCSI_TM_FUNC_ABORT_TASK:
  1632. return TMR_ABORT_TASK;
  1633. case ISCSI_TM_FUNC_ABORT_TASK_SET:
  1634. return TMR_ABORT_TASK_SET;
  1635. case ISCSI_TM_FUNC_CLEAR_ACA:
  1636. return TMR_CLEAR_ACA;
  1637. case ISCSI_TM_FUNC_CLEAR_TASK_SET:
  1638. return TMR_CLEAR_TASK_SET;
  1639. case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET:
  1640. return TMR_LUN_RESET;
  1641. case ISCSI_TM_FUNC_TARGET_WARM_RESET:
  1642. return TMR_TARGET_WARM_RESET;
  1643. case ISCSI_TM_FUNC_TARGET_COLD_RESET:
  1644. return TMR_TARGET_COLD_RESET;
  1645. default:
  1646. return TMR_UNKNOWN;
  1647. }
  1648. }
  1649. int
  1650. iscsit_handle_task_mgt_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1651. unsigned char *buf)
  1652. {
  1653. struct se_tmr_req *se_tmr;
  1654. struct iscsi_tmr_req *tmr_req;
  1655. struct iscsi_tm *hdr;
  1656. int out_of_order_cmdsn = 0, ret;
  1657. u8 function, tcm_function = TMR_UNKNOWN;
  1658. hdr = (struct iscsi_tm *) buf;
  1659. hdr->flags &= ~ISCSI_FLAG_CMD_FINAL;
  1660. function = hdr->flags;
  1661. pr_debug("Got Task Management Request ITT: 0x%08x, CmdSN:"
  1662. " 0x%08x, Function: 0x%02x, RefTaskTag: 0x%08x, RefCmdSN:"
  1663. " 0x%08x, CID: %hu\n", hdr->itt, hdr->cmdsn, function,
  1664. hdr->rtt, hdr->refcmdsn, conn->cid);
  1665. if ((function != ISCSI_TM_FUNC_ABORT_TASK) &&
  1666. ((function != ISCSI_TM_FUNC_TASK_REASSIGN) &&
  1667. hdr->rtt != RESERVED_ITT)) {
  1668. pr_err("RefTaskTag should be set to 0xFFFFFFFF.\n");
  1669. hdr->rtt = RESERVED_ITT;
  1670. }
  1671. if ((function == ISCSI_TM_FUNC_TASK_REASSIGN) &&
  1672. !(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
  1673. pr_err("Task Management Request TASK_REASSIGN not"
  1674. " issued as immediate command, bad iSCSI Initiator"
  1675. "implementation\n");
  1676. return iscsit_add_reject_cmd(cmd,
  1677. ISCSI_REASON_PROTOCOL_ERROR, buf);
  1678. }
  1679. if ((function != ISCSI_TM_FUNC_ABORT_TASK) &&
  1680. be32_to_cpu(hdr->refcmdsn) != ISCSI_RESERVED_TAG)
  1681. hdr->refcmdsn = cpu_to_be32(ISCSI_RESERVED_TAG);
  1682. cmd->data_direction = DMA_NONE;
  1683. cmd->tmr_req = kzalloc(sizeof(*cmd->tmr_req), GFP_KERNEL);
  1684. if (!cmd->tmr_req) {
  1685. return iscsit_add_reject_cmd(cmd,
  1686. ISCSI_REASON_BOOKMARK_NO_RESOURCES,
  1687. buf);
  1688. }
  1689. transport_init_se_cmd(&cmd->se_cmd, &iscsi_ops,
  1690. conn->sess->se_sess, 0, DMA_NONE,
  1691. TCM_SIMPLE_TAG, cmd->sense_buffer + 2);
  1692. target_get_sess_cmd(&cmd->se_cmd, true);
  1693. /*
  1694. * TASK_REASSIGN for ERL=2 / connection stays inside of
  1695. * LIO-Target $FABRIC_MOD
  1696. */
  1697. if (function != ISCSI_TM_FUNC_TASK_REASSIGN) {
  1698. tcm_function = iscsit_convert_tmf(function);
  1699. if (tcm_function == TMR_UNKNOWN) {
  1700. pr_err("Unknown iSCSI TMR Function:"
  1701. " 0x%02x\n", function);
  1702. return iscsit_add_reject_cmd(cmd,
  1703. ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
  1704. }
  1705. }
  1706. ret = core_tmr_alloc_req(&cmd->se_cmd, cmd->tmr_req, tcm_function,
  1707. GFP_KERNEL);
  1708. if (ret < 0)
  1709. return iscsit_add_reject_cmd(cmd,
  1710. ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
  1711. cmd->tmr_req->se_tmr_req = cmd->se_cmd.se_tmr_req;
  1712. cmd->iscsi_opcode = ISCSI_OP_SCSI_TMFUNC;
  1713. cmd->i_state = ISTATE_SEND_TASKMGTRSP;
  1714. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
  1715. cmd->init_task_tag = hdr->itt;
  1716. cmd->targ_xfer_tag = 0xFFFFFFFF;
  1717. cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
  1718. cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
  1719. se_tmr = cmd->se_cmd.se_tmr_req;
  1720. tmr_req = cmd->tmr_req;
  1721. /*
  1722. * Locate the struct se_lun for all TMRs not related to ERL=2 TASK_REASSIGN
  1723. */
  1724. if (function != ISCSI_TM_FUNC_TASK_REASSIGN) {
  1725. ret = transport_lookup_tmr_lun(&cmd->se_cmd,
  1726. scsilun_to_int(&hdr->lun));
  1727. if (ret < 0) {
  1728. se_tmr->response = ISCSI_TMF_RSP_NO_LUN;
  1729. goto attach;
  1730. }
  1731. }
  1732. switch (function) {
  1733. case ISCSI_TM_FUNC_ABORT_TASK:
  1734. se_tmr->response = iscsit_tmr_abort_task(cmd, buf);
  1735. if (se_tmr->response)
  1736. goto attach;
  1737. break;
  1738. case ISCSI_TM_FUNC_ABORT_TASK_SET:
  1739. case ISCSI_TM_FUNC_CLEAR_ACA:
  1740. case ISCSI_TM_FUNC_CLEAR_TASK_SET:
  1741. case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET:
  1742. break;
  1743. case ISCSI_TM_FUNC_TARGET_WARM_RESET:
  1744. if (iscsit_tmr_task_warm_reset(conn, tmr_req, buf) < 0) {
  1745. se_tmr->response = ISCSI_TMF_RSP_AUTH_FAILED;
  1746. goto attach;
  1747. }
  1748. break;
  1749. case ISCSI_TM_FUNC_TARGET_COLD_RESET:
  1750. if (iscsit_tmr_task_cold_reset(conn, tmr_req, buf) < 0) {
  1751. se_tmr->response = ISCSI_TMF_RSP_AUTH_FAILED;
  1752. goto attach;
  1753. }
  1754. break;
  1755. case ISCSI_TM_FUNC_TASK_REASSIGN:
  1756. se_tmr->response = iscsit_tmr_task_reassign(cmd, buf);
  1757. /*
  1758. * Perform sanity checks on the ExpDataSN only if the
  1759. * TASK_REASSIGN was successful.
  1760. */
  1761. if (se_tmr->response)
  1762. break;
  1763. if (iscsit_check_task_reassign_expdatasn(tmr_req, conn) < 0)
  1764. return iscsit_add_reject_cmd(cmd,
  1765. ISCSI_REASON_BOOKMARK_INVALID, buf);
  1766. break;
  1767. default:
  1768. pr_err("Unknown TMR function: 0x%02x, protocol"
  1769. " error.\n", function);
  1770. se_tmr->response = ISCSI_TMF_RSP_NOT_SUPPORTED;
  1771. goto attach;
  1772. }
  1773. if ((function != ISCSI_TM_FUNC_TASK_REASSIGN) &&
  1774. (se_tmr->response == ISCSI_TMF_RSP_COMPLETE))
  1775. se_tmr->call_transport = 1;
  1776. attach:
  1777. spin_lock_bh(&conn->cmd_lock);
  1778. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  1779. spin_unlock_bh(&conn->cmd_lock);
  1780. if (!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
  1781. int cmdsn_ret = iscsit_sequence_cmd(conn, cmd, buf, hdr->cmdsn);
  1782. if (cmdsn_ret == CMDSN_HIGHER_THAN_EXP) {
  1783. out_of_order_cmdsn = 1;
  1784. } else if (cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
  1785. target_put_sess_cmd(&cmd->se_cmd);
  1786. return 0;
  1787. } else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER) {
  1788. return -1;
  1789. }
  1790. }
  1791. iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
  1792. if (out_of_order_cmdsn || !(hdr->opcode & ISCSI_OP_IMMEDIATE))
  1793. return 0;
  1794. /*
  1795. * Found the referenced task, send to transport for processing.
  1796. */
  1797. if (se_tmr->call_transport)
  1798. return transport_generic_handle_tmr(&cmd->se_cmd);
  1799. /*
  1800. * Could not find the referenced LUN, task, or Task Management
  1801. * command not authorized or supported. Change state and
  1802. * let the tx_thread send the response.
  1803. *
  1804. * For connection recovery, this is also the default action for
  1805. * TMR TASK_REASSIGN.
  1806. */
  1807. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  1808. target_put_sess_cmd(&cmd->se_cmd);
  1809. return 0;
  1810. }
  1811. EXPORT_SYMBOL(iscsit_handle_task_mgt_cmd);
  1812. /* #warning FIXME: Support Text Command parameters besides SendTargets */
  1813. int
  1814. iscsit_setup_text_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1815. struct iscsi_text *hdr)
  1816. {
  1817. u32 payload_length = ntoh24(hdr->dlength);
  1818. if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
  1819. pr_err("Unable to accept text parameter length: %u"
  1820. "greater than MaxXmitDataSegmentLength %u.\n",
  1821. payload_length, conn->conn_ops->MaxXmitDataSegmentLength);
  1822. return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
  1823. (unsigned char *)hdr);
  1824. }
  1825. if (!(hdr->flags & ISCSI_FLAG_CMD_FINAL) ||
  1826. (hdr->flags & ISCSI_FLAG_TEXT_CONTINUE)) {
  1827. pr_err("Multi sequence text commands currently not supported\n");
  1828. return iscsit_reject_cmd(cmd, ISCSI_REASON_CMD_NOT_SUPPORTED,
  1829. (unsigned char *)hdr);
  1830. }
  1831. pr_debug("Got Text Request: ITT: 0x%08x, CmdSN: 0x%08x,"
  1832. " ExpStatSN: 0x%08x, Length: %u\n", hdr->itt, hdr->cmdsn,
  1833. hdr->exp_statsn, payload_length);
  1834. cmd->iscsi_opcode = ISCSI_OP_TEXT;
  1835. cmd->i_state = ISTATE_SEND_TEXTRSP;
  1836. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
  1837. conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
  1838. cmd->targ_xfer_tag = 0xFFFFFFFF;
  1839. cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
  1840. cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
  1841. cmd->data_direction = DMA_NONE;
  1842. kfree(cmd->text_in_ptr);
  1843. cmd->text_in_ptr = NULL;
  1844. return 0;
  1845. }
  1846. EXPORT_SYMBOL(iscsit_setup_text_cmd);
  1847. int
  1848. iscsit_process_text_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1849. struct iscsi_text *hdr)
  1850. {
  1851. unsigned char *text_in = cmd->text_in_ptr, *text_ptr;
  1852. int cmdsn_ret;
  1853. if (!text_in) {
  1854. cmd->targ_xfer_tag = be32_to_cpu(hdr->ttt);
  1855. if (cmd->targ_xfer_tag == 0xFFFFFFFF) {
  1856. pr_err("Unable to locate text_in buffer for sendtargets"
  1857. " discovery\n");
  1858. goto reject;
  1859. }
  1860. goto empty_sendtargets;
  1861. }
  1862. if (strncmp("SendTargets", text_in, 11) != 0) {
  1863. pr_err("Received Text Data that is not"
  1864. " SendTargets, cannot continue.\n");
  1865. goto reject;
  1866. }
  1867. text_ptr = strchr(text_in, '=');
  1868. if (!text_ptr) {
  1869. pr_err("No \"=\" separator found in Text Data,"
  1870. " cannot continue.\n");
  1871. goto reject;
  1872. }
  1873. if (!strncmp("=All", text_ptr, 4)) {
  1874. cmd->cmd_flags |= ICF_SENDTARGETS_ALL;
  1875. } else if (!strncmp("=iqn.", text_ptr, 5) ||
  1876. !strncmp("=eui.", text_ptr, 5)) {
  1877. cmd->cmd_flags |= ICF_SENDTARGETS_SINGLE;
  1878. } else {
  1879. pr_err("Unable to locate valid SendTargets=%s value\n", text_ptr);
  1880. goto reject;
  1881. }
  1882. spin_lock_bh(&conn->cmd_lock);
  1883. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  1884. spin_unlock_bh(&conn->cmd_lock);
  1885. empty_sendtargets:
  1886. iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
  1887. if (!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
  1888. cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
  1889. (unsigned char *)hdr, hdr->cmdsn);
  1890. if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  1891. return -1;
  1892. return 0;
  1893. }
  1894. return iscsit_execute_cmd(cmd, 0);
  1895. reject:
  1896. return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
  1897. (unsigned char *)hdr);
  1898. }
  1899. EXPORT_SYMBOL(iscsit_process_text_cmd);
  1900. static int
  1901. iscsit_handle_text_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  1902. unsigned char *buf)
  1903. {
  1904. struct iscsi_text *hdr = (struct iscsi_text *)buf;
  1905. char *text_in = NULL;
  1906. u32 payload_length = ntoh24(hdr->dlength);
  1907. int rx_size, rc;
  1908. rc = iscsit_setup_text_cmd(conn, cmd, hdr);
  1909. if (rc < 0)
  1910. return 0;
  1911. rx_size = payload_length;
  1912. if (payload_length) {
  1913. u32 checksum = 0, data_crc = 0;
  1914. u32 padding = 0, pad_bytes = 0;
  1915. int niov = 0, rx_got;
  1916. struct kvec iov[3];
  1917. text_in = kzalloc(payload_length, GFP_KERNEL);
  1918. if (!text_in)
  1919. goto reject;
  1920. cmd->text_in_ptr = text_in;
  1921. memset(iov, 0, 3 * sizeof(struct kvec));
  1922. iov[niov].iov_base = text_in;
  1923. iov[niov++].iov_len = payload_length;
  1924. padding = ((-payload_length) & 3);
  1925. if (padding != 0) {
  1926. iov[niov].iov_base = &pad_bytes;
  1927. iov[niov++].iov_len = padding;
  1928. rx_size += padding;
  1929. pr_debug("Receiving %u additional bytes"
  1930. " for padding.\n", padding);
  1931. }
  1932. if (conn->conn_ops->DataDigest) {
  1933. iov[niov].iov_base = &checksum;
  1934. iov[niov++].iov_len = ISCSI_CRC_LEN;
  1935. rx_size += ISCSI_CRC_LEN;
  1936. }
  1937. rx_got = rx_data(conn, &iov[0], niov, rx_size);
  1938. if (rx_got != rx_size)
  1939. goto reject;
  1940. if (conn->conn_ops->DataDigest) {
  1941. iscsit_do_crypto_hash_buf(conn->conn_rx_hash, text_in,
  1942. payload_length, padding,
  1943. &pad_bytes, &data_crc);
  1944. if (checksum != data_crc) {
  1945. pr_err("Text data CRC32C DataDigest"
  1946. " 0x%08x does not match computed"
  1947. " 0x%08x\n", checksum, data_crc);
  1948. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  1949. pr_err("Unable to recover from"
  1950. " Text Data digest failure while in"
  1951. " ERL=0.\n");
  1952. goto reject;
  1953. } else {
  1954. /*
  1955. * Silently drop this PDU and let the
  1956. * initiator plug the CmdSN gap.
  1957. */
  1958. pr_debug("Dropping Text"
  1959. " Command CmdSN: 0x%08x due to"
  1960. " DataCRC error.\n", hdr->cmdsn);
  1961. kfree(text_in);
  1962. return 0;
  1963. }
  1964. } else {
  1965. pr_debug("Got CRC32C DataDigest"
  1966. " 0x%08x for %u bytes of text data.\n",
  1967. checksum, payload_length);
  1968. }
  1969. }
  1970. text_in[payload_length - 1] = '\0';
  1971. pr_debug("Successfully read %d bytes of text"
  1972. " data.\n", payload_length);
  1973. }
  1974. return iscsit_process_text_cmd(conn, cmd, hdr);
  1975. reject:
  1976. kfree(cmd->text_in_ptr);
  1977. cmd->text_in_ptr = NULL;
  1978. return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR, buf);
  1979. }
  1980. int iscsit_logout_closesession(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  1981. {
  1982. struct iscsi_conn *conn_p;
  1983. struct iscsi_session *sess = conn->sess;
  1984. pr_debug("Received logout request CLOSESESSION on CID: %hu"
  1985. " for SID: %u.\n", conn->cid, conn->sess->sid);
  1986. atomic_set(&sess->session_logout, 1);
  1987. atomic_set(&conn->conn_logout_remove, 1);
  1988. conn->conn_logout_reason = ISCSI_LOGOUT_REASON_CLOSE_SESSION;
  1989. iscsit_inc_conn_usage_count(conn);
  1990. iscsit_inc_session_usage_count(sess);
  1991. spin_lock_bh(&sess->conn_lock);
  1992. list_for_each_entry(conn_p, &sess->sess_conn_list, conn_list) {
  1993. if (conn_p->conn_state != TARG_CONN_STATE_LOGGED_IN)
  1994. continue;
  1995. pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
  1996. conn_p->conn_state = TARG_CONN_STATE_IN_LOGOUT;
  1997. }
  1998. spin_unlock_bh(&sess->conn_lock);
  1999. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  2000. return 0;
  2001. }
  2002. int iscsit_logout_closeconnection(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  2003. {
  2004. struct iscsi_conn *l_conn;
  2005. struct iscsi_session *sess = conn->sess;
  2006. pr_debug("Received logout request CLOSECONNECTION for CID:"
  2007. " %hu on CID: %hu.\n", cmd->logout_cid, conn->cid);
  2008. /*
  2009. * A Logout Request with a CLOSECONNECTION reason code for a CID
  2010. * can arrive on a connection with a differing CID.
  2011. */
  2012. if (conn->cid == cmd->logout_cid) {
  2013. spin_lock_bh(&conn->state_lock);
  2014. pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
  2015. conn->conn_state = TARG_CONN_STATE_IN_LOGOUT;
  2016. atomic_set(&conn->conn_logout_remove, 1);
  2017. conn->conn_logout_reason = ISCSI_LOGOUT_REASON_CLOSE_CONNECTION;
  2018. iscsit_inc_conn_usage_count(conn);
  2019. spin_unlock_bh(&conn->state_lock);
  2020. } else {
  2021. /*
  2022. * Handle all different cid CLOSECONNECTION requests in
  2023. * iscsit_logout_post_handler_diffcid() as to give enough
  2024. * time for any non immediate command's CmdSN to be
  2025. * acknowledged on the connection in question.
  2026. *
  2027. * Here we simply make sure the CID is still around.
  2028. */
  2029. l_conn = iscsit_get_conn_from_cid(sess,
  2030. cmd->logout_cid);
  2031. if (!l_conn) {
  2032. cmd->logout_response = ISCSI_LOGOUT_CID_NOT_FOUND;
  2033. iscsit_add_cmd_to_response_queue(cmd, conn,
  2034. cmd->i_state);
  2035. return 0;
  2036. }
  2037. iscsit_dec_conn_usage_count(l_conn);
  2038. }
  2039. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  2040. return 0;
  2041. }
  2042. int iscsit_logout_removeconnforrecovery(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  2043. {
  2044. struct iscsi_session *sess = conn->sess;
  2045. pr_debug("Received explicit REMOVECONNFORRECOVERY logout for"
  2046. " CID: %hu on CID: %hu.\n", cmd->logout_cid, conn->cid);
  2047. if (sess->sess_ops->ErrorRecoveryLevel != 2) {
  2048. pr_err("Received Logout Request REMOVECONNFORRECOVERY"
  2049. " while ERL!=2.\n");
  2050. cmd->logout_response = ISCSI_LOGOUT_RECOVERY_UNSUPPORTED;
  2051. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  2052. return 0;
  2053. }
  2054. if (conn->cid == cmd->logout_cid) {
  2055. pr_err("Received Logout Request REMOVECONNFORRECOVERY"
  2056. " with CID: %hu on CID: %hu, implementation error.\n",
  2057. cmd->logout_cid, conn->cid);
  2058. cmd->logout_response = ISCSI_LOGOUT_CLEANUP_FAILED;
  2059. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  2060. return 0;
  2061. }
  2062. iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
  2063. return 0;
  2064. }
  2065. int
  2066. iscsit_handle_logout_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
  2067. unsigned char *buf)
  2068. {
  2069. int cmdsn_ret, logout_remove = 0;
  2070. u8 reason_code = 0;
  2071. struct iscsi_logout *hdr;
  2072. struct iscsi_tiqn *tiqn = iscsit_snmp_get_tiqn(conn);
  2073. hdr = (struct iscsi_logout *) buf;
  2074. reason_code = (hdr->flags & 0x7f);
  2075. if (tiqn) {
  2076. spin_lock(&tiqn->logout_stats.lock);
  2077. if (reason_code == ISCSI_LOGOUT_REASON_CLOSE_SESSION)
  2078. tiqn->logout_stats.normal_logouts++;
  2079. else
  2080. tiqn->logout_stats.abnormal_logouts++;
  2081. spin_unlock(&tiqn->logout_stats.lock);
  2082. }
  2083. pr_debug("Got Logout Request ITT: 0x%08x CmdSN: 0x%08x"
  2084. " ExpStatSN: 0x%08x Reason: 0x%02x CID: %hu on CID: %hu\n",
  2085. hdr->itt, hdr->cmdsn, hdr->exp_statsn, reason_code,
  2086. hdr->cid, conn->cid);
  2087. if (conn->conn_state != TARG_CONN_STATE_LOGGED_IN) {
  2088. pr_err("Received logout request on connection that"
  2089. " is not in logged in state, ignoring request.\n");
  2090. iscsit_free_cmd(cmd, false);
  2091. return 0;
  2092. }
  2093. cmd->iscsi_opcode = ISCSI_OP_LOGOUT;
  2094. cmd->i_state = ISTATE_SEND_LOGOUTRSP;
  2095. cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
  2096. conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
  2097. cmd->targ_xfer_tag = 0xFFFFFFFF;
  2098. cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
  2099. cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
  2100. cmd->logout_cid = be16_to_cpu(hdr->cid);
  2101. cmd->logout_reason = reason_code;
  2102. cmd->data_direction = DMA_NONE;
  2103. /*
  2104. * We need to sleep in these cases (by returning 1) until the Logout
  2105. * Response gets sent in the tx thread.
  2106. */
  2107. if ((reason_code == ISCSI_LOGOUT_REASON_CLOSE_SESSION) ||
  2108. ((reason_code == ISCSI_LOGOUT_REASON_CLOSE_CONNECTION) &&
  2109. be16_to_cpu(hdr->cid) == conn->cid))
  2110. logout_remove = 1;
  2111. spin_lock_bh(&conn->cmd_lock);
  2112. list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
  2113. spin_unlock_bh(&conn->cmd_lock);
  2114. if (reason_code != ISCSI_LOGOUT_REASON_RECOVERY)
  2115. iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
  2116. /*
  2117. * Immediate commands are executed, well, immediately.
  2118. * Non-Immediate Logout Commands are executed in CmdSN order.
  2119. */
  2120. if (cmd->immediate_cmd) {
  2121. int ret = iscsit_execute_cmd(cmd, 0);
  2122. if (ret < 0)
  2123. return ret;
  2124. } else {
  2125. cmdsn_ret = iscsit_sequence_cmd(conn, cmd, buf, hdr->cmdsn);
  2126. if (cmdsn_ret == CMDSN_LOWER_THAN_EXP)
  2127. logout_remove = 0;
  2128. else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
  2129. return -1;
  2130. }
  2131. return logout_remove;
  2132. }
  2133. EXPORT_SYMBOL(iscsit_handle_logout_cmd);
  2134. int iscsit_handle_snack(
  2135. struct iscsi_conn *conn,
  2136. unsigned char *buf)
  2137. {
  2138. struct iscsi_snack *hdr;
  2139. hdr = (struct iscsi_snack *) buf;
  2140. hdr->flags &= ~ISCSI_FLAG_CMD_FINAL;
  2141. pr_debug("Got ISCSI_INIT_SNACK, ITT: 0x%08x, ExpStatSN:"
  2142. " 0x%08x, Type: 0x%02x, BegRun: 0x%08x, RunLength: 0x%08x,"
  2143. " CID: %hu\n", hdr->itt, hdr->exp_statsn, hdr->flags,
  2144. hdr->begrun, hdr->runlength, conn->cid);
  2145. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  2146. pr_err("Initiator sent SNACK request while in"
  2147. " ErrorRecoveryLevel=0.\n");
  2148. return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
  2149. buf);
  2150. }
  2151. /*
  2152. * SNACK_DATA and SNACK_R2T are both 0, so check which function to
  2153. * call from inside iscsi_send_recovery_datain_or_r2t().
  2154. */
  2155. switch (hdr->flags & ISCSI_FLAG_SNACK_TYPE_MASK) {
  2156. case 0:
  2157. return iscsit_handle_recovery_datain_or_r2t(conn, buf,
  2158. hdr->itt,
  2159. be32_to_cpu(hdr->ttt),
  2160. be32_to_cpu(hdr->begrun),
  2161. be32_to_cpu(hdr->runlength));
  2162. case ISCSI_FLAG_SNACK_TYPE_STATUS:
  2163. return iscsit_handle_status_snack(conn, hdr->itt,
  2164. be32_to_cpu(hdr->ttt),
  2165. be32_to_cpu(hdr->begrun), be32_to_cpu(hdr->runlength));
  2166. case ISCSI_FLAG_SNACK_TYPE_DATA_ACK:
  2167. return iscsit_handle_data_ack(conn, be32_to_cpu(hdr->ttt),
  2168. be32_to_cpu(hdr->begrun),
  2169. be32_to_cpu(hdr->runlength));
  2170. case ISCSI_FLAG_SNACK_TYPE_RDATA:
  2171. /* FIXME: Support R-Data SNACK */
  2172. pr_err("R-Data SNACK Not Supported.\n");
  2173. return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
  2174. buf);
  2175. default:
  2176. pr_err("Unknown SNACK type 0x%02x, protocol"
  2177. " error.\n", hdr->flags & 0x0f);
  2178. return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
  2179. buf);
  2180. }
  2181. return 0;
  2182. }
  2183. EXPORT_SYMBOL(iscsit_handle_snack);
  2184. static void iscsit_rx_thread_wait_for_tcp(struct iscsi_conn *conn)
  2185. {
  2186. if ((conn->sock->sk->sk_shutdown & SEND_SHUTDOWN) ||
  2187. (conn->sock->sk->sk_shutdown & RCV_SHUTDOWN)) {
  2188. wait_for_completion_interruptible_timeout(
  2189. &conn->rx_half_close_comp,
  2190. ISCSI_RX_THREAD_TCP_TIMEOUT * HZ);
  2191. }
  2192. }
  2193. static int iscsit_handle_immediate_data(
  2194. struct iscsi_cmd *cmd,
  2195. struct iscsi_scsi_req *hdr,
  2196. u32 length)
  2197. {
  2198. int iov_ret, rx_got = 0, rx_size = 0;
  2199. u32 checksum, iov_count = 0, padding = 0;
  2200. struct iscsi_conn *conn = cmd->conn;
  2201. struct kvec *iov;
  2202. iov_ret = iscsit_map_iovec(cmd, cmd->iov_data, cmd->write_data_done, length);
  2203. if (iov_ret < 0)
  2204. return IMMEDIATE_DATA_CANNOT_RECOVER;
  2205. rx_size = length;
  2206. iov_count = iov_ret;
  2207. iov = &cmd->iov_data[0];
  2208. padding = ((-length) & 3);
  2209. if (padding != 0) {
  2210. iov[iov_count].iov_base = cmd->pad_bytes;
  2211. iov[iov_count++].iov_len = padding;
  2212. rx_size += padding;
  2213. }
  2214. if (conn->conn_ops->DataDigest) {
  2215. iov[iov_count].iov_base = &checksum;
  2216. iov[iov_count++].iov_len = ISCSI_CRC_LEN;
  2217. rx_size += ISCSI_CRC_LEN;
  2218. }
  2219. rx_got = rx_data(conn, &cmd->iov_data[0], iov_count, rx_size);
  2220. iscsit_unmap_iovec(cmd);
  2221. if (rx_got != rx_size) {
  2222. iscsit_rx_thread_wait_for_tcp(conn);
  2223. return IMMEDIATE_DATA_CANNOT_RECOVER;
  2224. }
  2225. if (conn->conn_ops->DataDigest) {
  2226. u32 data_crc;
  2227. data_crc = iscsit_do_crypto_hash_sg(conn->conn_rx_hash, cmd,
  2228. cmd->write_data_done, length, padding,
  2229. cmd->pad_bytes);
  2230. if (checksum != data_crc) {
  2231. pr_err("ImmediateData CRC32C DataDigest 0x%08x"
  2232. " does not match computed 0x%08x\n", checksum,
  2233. data_crc);
  2234. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  2235. pr_err("Unable to recover from"
  2236. " Immediate Data digest failure while"
  2237. " in ERL=0.\n");
  2238. iscsit_reject_cmd(cmd,
  2239. ISCSI_REASON_DATA_DIGEST_ERROR,
  2240. (unsigned char *)hdr);
  2241. return IMMEDIATE_DATA_CANNOT_RECOVER;
  2242. } else {
  2243. iscsit_reject_cmd(cmd,
  2244. ISCSI_REASON_DATA_DIGEST_ERROR,
  2245. (unsigned char *)hdr);
  2246. return IMMEDIATE_DATA_ERL1_CRC_FAILURE;
  2247. }
  2248. } else {
  2249. pr_debug("Got CRC32C DataDigest 0x%08x for"
  2250. " %u bytes of Immediate Data\n", checksum,
  2251. length);
  2252. }
  2253. }
  2254. cmd->write_data_done += length;
  2255. if (cmd->write_data_done == cmd->se_cmd.data_length) {
  2256. spin_lock_bh(&cmd->istate_lock);
  2257. cmd->cmd_flags |= ICF_GOT_LAST_DATAOUT;
  2258. cmd->i_state = ISTATE_RECEIVED_LAST_DATAOUT;
  2259. spin_unlock_bh(&cmd->istate_lock);
  2260. }
  2261. return IMMEDIATE_DATA_NORMAL_OPERATION;
  2262. }
  2263. /*
  2264. * Called with sess->conn_lock held.
  2265. */
  2266. /* #warning iscsi_build_conn_drop_async_message() only sends out on connections
  2267. with active network interface */
  2268. static void iscsit_build_conn_drop_async_message(struct iscsi_conn *conn)
  2269. {
  2270. struct iscsi_cmd *cmd;
  2271. struct iscsi_conn *conn_p;
  2272. bool found = false;
  2273. /*
  2274. * Only send a Asynchronous Message on connections whos network
  2275. * interface is still functional.
  2276. */
  2277. list_for_each_entry(conn_p, &conn->sess->sess_conn_list, conn_list) {
  2278. if (conn_p->conn_state == TARG_CONN_STATE_LOGGED_IN) {
  2279. iscsit_inc_conn_usage_count(conn_p);
  2280. found = true;
  2281. break;
  2282. }
  2283. }
  2284. if (!found)
  2285. return;
  2286. cmd = iscsit_allocate_cmd(conn_p, TASK_RUNNING);
  2287. if (!cmd) {
  2288. iscsit_dec_conn_usage_count(conn_p);
  2289. return;
  2290. }
  2291. cmd->logout_cid = conn->cid;
  2292. cmd->iscsi_opcode = ISCSI_OP_ASYNC_EVENT;
  2293. cmd->i_state = ISTATE_SEND_ASYNCMSG;
  2294. spin_lock_bh(&conn_p->cmd_lock);
  2295. list_add_tail(&cmd->i_conn_node, &conn_p->conn_cmd_list);
  2296. spin_unlock_bh(&conn_p->cmd_lock);
  2297. iscsit_add_cmd_to_response_queue(cmd, conn_p, cmd->i_state);
  2298. iscsit_dec_conn_usage_count(conn_p);
  2299. }
  2300. static int iscsit_send_conn_drop_async_message(
  2301. struct iscsi_cmd *cmd,
  2302. struct iscsi_conn *conn)
  2303. {
  2304. struct iscsi_async *hdr;
  2305. cmd->iscsi_opcode = ISCSI_OP_ASYNC_EVENT;
  2306. hdr = (struct iscsi_async *) cmd->pdu;
  2307. hdr->opcode = ISCSI_OP_ASYNC_EVENT;
  2308. hdr->flags = ISCSI_FLAG_CMD_FINAL;
  2309. cmd->init_task_tag = RESERVED_ITT;
  2310. cmd->targ_xfer_tag = 0xFFFFFFFF;
  2311. put_unaligned_be64(0xFFFFFFFFFFFFFFFFULL, &hdr->rsvd4[0]);
  2312. cmd->stat_sn = conn->stat_sn++;
  2313. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2314. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2315. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2316. hdr->async_event = ISCSI_ASYNC_MSG_DROPPING_CONNECTION;
  2317. hdr->param1 = cpu_to_be16(cmd->logout_cid);
  2318. hdr->param2 = cpu_to_be16(conn->sess->sess_ops->DefaultTime2Wait);
  2319. hdr->param3 = cpu_to_be16(conn->sess->sess_ops->DefaultTime2Retain);
  2320. pr_debug("Sending Connection Dropped Async Message StatSN:"
  2321. " 0x%08x, for CID: %hu on CID: %hu\n", cmd->stat_sn,
  2322. cmd->logout_cid, conn->cid);
  2323. return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
  2324. }
  2325. static void iscsit_tx_thread_wait_for_tcp(struct iscsi_conn *conn)
  2326. {
  2327. if ((conn->sock->sk->sk_shutdown & SEND_SHUTDOWN) ||
  2328. (conn->sock->sk->sk_shutdown & RCV_SHUTDOWN)) {
  2329. wait_for_completion_interruptible_timeout(
  2330. &conn->tx_half_close_comp,
  2331. ISCSI_TX_THREAD_TCP_TIMEOUT * HZ);
  2332. }
  2333. }
  2334. void
  2335. iscsit_build_datain_pdu(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
  2336. struct iscsi_datain *datain, struct iscsi_data_rsp *hdr,
  2337. bool set_statsn)
  2338. {
  2339. hdr->opcode = ISCSI_OP_SCSI_DATA_IN;
  2340. hdr->flags = datain->flags;
  2341. if (hdr->flags & ISCSI_FLAG_DATA_STATUS) {
  2342. if (cmd->se_cmd.se_cmd_flags & SCF_OVERFLOW_BIT) {
  2343. hdr->flags |= ISCSI_FLAG_DATA_OVERFLOW;
  2344. hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
  2345. } else if (cmd->se_cmd.se_cmd_flags & SCF_UNDERFLOW_BIT) {
  2346. hdr->flags |= ISCSI_FLAG_DATA_UNDERFLOW;
  2347. hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
  2348. }
  2349. }
  2350. hton24(hdr->dlength, datain->length);
  2351. if (hdr->flags & ISCSI_FLAG_DATA_ACK)
  2352. int_to_scsilun(cmd->se_cmd.orig_fe_lun,
  2353. (struct scsi_lun *)&hdr->lun);
  2354. else
  2355. put_unaligned_le64(0xFFFFFFFFFFFFFFFFULL, &hdr->lun);
  2356. hdr->itt = cmd->init_task_tag;
  2357. if (hdr->flags & ISCSI_FLAG_DATA_ACK)
  2358. hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
  2359. else
  2360. hdr->ttt = cpu_to_be32(0xFFFFFFFF);
  2361. if (set_statsn)
  2362. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2363. else
  2364. hdr->statsn = cpu_to_be32(0xFFFFFFFF);
  2365. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2366. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2367. hdr->datasn = cpu_to_be32(datain->data_sn);
  2368. hdr->offset = cpu_to_be32(datain->offset);
  2369. pr_debug("Built DataIN ITT: 0x%08x, StatSN: 0x%08x,"
  2370. " DataSN: 0x%08x, Offset: %u, Length: %u, CID: %hu\n",
  2371. cmd->init_task_tag, ntohl(hdr->statsn), ntohl(hdr->datasn),
  2372. ntohl(hdr->offset), datain->length, conn->cid);
  2373. }
  2374. EXPORT_SYMBOL(iscsit_build_datain_pdu);
  2375. static int iscsit_send_datain(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  2376. {
  2377. struct iscsi_data_rsp *hdr = (struct iscsi_data_rsp *)&cmd->pdu[0];
  2378. struct iscsi_datain datain;
  2379. struct iscsi_datain_req *dr;
  2380. int eodr = 0, ret;
  2381. bool set_statsn = false;
  2382. memset(&datain, 0, sizeof(struct iscsi_datain));
  2383. dr = iscsit_get_datain_values(cmd, &datain);
  2384. if (!dr) {
  2385. pr_err("iscsit_get_datain_values failed for ITT: 0x%08x\n",
  2386. cmd->init_task_tag);
  2387. return -1;
  2388. }
  2389. /*
  2390. * Be paranoid and double check the logic for now.
  2391. */
  2392. if ((datain.offset + datain.length) > cmd->se_cmd.data_length) {
  2393. pr_err("Command ITT: 0x%08x, datain.offset: %u and"
  2394. " datain.length: %u exceeds cmd->data_length: %u\n",
  2395. cmd->init_task_tag, datain.offset, datain.length,
  2396. cmd->se_cmd.data_length);
  2397. return -1;
  2398. }
  2399. atomic_long_add(datain.length, &conn->sess->tx_data_octets);
  2400. /*
  2401. * Special case for successfully execution w/ both DATAIN
  2402. * and Sense Data.
  2403. */
  2404. if ((datain.flags & ISCSI_FLAG_DATA_STATUS) &&
  2405. (cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE))
  2406. datain.flags &= ~ISCSI_FLAG_DATA_STATUS;
  2407. else {
  2408. if ((dr->dr_complete == DATAIN_COMPLETE_NORMAL) ||
  2409. (dr->dr_complete == DATAIN_COMPLETE_CONNECTION_RECOVERY)) {
  2410. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2411. cmd->stat_sn = conn->stat_sn++;
  2412. set_statsn = true;
  2413. } else if (dr->dr_complete ==
  2414. DATAIN_COMPLETE_WITHIN_COMMAND_RECOVERY)
  2415. set_statsn = true;
  2416. }
  2417. iscsit_build_datain_pdu(cmd, conn, &datain, hdr, set_statsn);
  2418. ret = conn->conn_transport->iscsit_xmit_pdu(conn, cmd, dr, &datain, 0);
  2419. if (ret < 0)
  2420. return ret;
  2421. if (dr->dr_complete) {
  2422. eodr = (cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) ?
  2423. 2 : 1;
  2424. iscsit_free_datain_req(cmd, dr);
  2425. }
  2426. return eodr;
  2427. }
  2428. int
  2429. iscsit_build_logout_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
  2430. struct iscsi_logout_rsp *hdr)
  2431. {
  2432. struct iscsi_conn *logout_conn = NULL;
  2433. struct iscsi_conn_recovery *cr = NULL;
  2434. struct iscsi_session *sess = conn->sess;
  2435. /*
  2436. * The actual shutting down of Sessions and/or Connections
  2437. * for CLOSESESSION and CLOSECONNECTION Logout Requests
  2438. * is done in scsi_logout_post_handler().
  2439. */
  2440. switch (cmd->logout_reason) {
  2441. case ISCSI_LOGOUT_REASON_CLOSE_SESSION:
  2442. pr_debug("iSCSI session logout successful, setting"
  2443. " logout response to ISCSI_LOGOUT_SUCCESS.\n");
  2444. cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
  2445. break;
  2446. case ISCSI_LOGOUT_REASON_CLOSE_CONNECTION:
  2447. if (cmd->logout_response == ISCSI_LOGOUT_CID_NOT_FOUND)
  2448. break;
  2449. /*
  2450. * For CLOSECONNECTION logout requests carrying
  2451. * a matching logout CID -> local CID, the reference
  2452. * for the local CID will have been incremented in
  2453. * iscsi_logout_closeconnection().
  2454. *
  2455. * For CLOSECONNECTION logout requests carrying
  2456. * a different CID than the connection it arrived
  2457. * on, the connection responding to cmd->logout_cid
  2458. * is stopped in iscsit_logout_post_handler_diffcid().
  2459. */
  2460. pr_debug("iSCSI CID: %hu logout on CID: %hu"
  2461. " successful.\n", cmd->logout_cid, conn->cid);
  2462. cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
  2463. break;
  2464. case ISCSI_LOGOUT_REASON_RECOVERY:
  2465. if ((cmd->logout_response == ISCSI_LOGOUT_RECOVERY_UNSUPPORTED) ||
  2466. (cmd->logout_response == ISCSI_LOGOUT_CLEANUP_FAILED))
  2467. break;
  2468. /*
  2469. * If the connection is still active from our point of view
  2470. * force connection recovery to occur.
  2471. */
  2472. logout_conn = iscsit_get_conn_from_cid_rcfr(sess,
  2473. cmd->logout_cid);
  2474. if (logout_conn) {
  2475. iscsit_connection_reinstatement_rcfr(logout_conn);
  2476. iscsit_dec_conn_usage_count(logout_conn);
  2477. }
  2478. cr = iscsit_get_inactive_connection_recovery_entry(
  2479. conn->sess, cmd->logout_cid);
  2480. if (!cr) {
  2481. pr_err("Unable to locate CID: %hu for"
  2482. " REMOVECONNFORRECOVERY Logout Request.\n",
  2483. cmd->logout_cid);
  2484. cmd->logout_response = ISCSI_LOGOUT_CID_NOT_FOUND;
  2485. break;
  2486. }
  2487. iscsit_discard_cr_cmds_by_expstatsn(cr, cmd->exp_stat_sn);
  2488. pr_debug("iSCSI REMOVECONNFORRECOVERY logout"
  2489. " for recovery for CID: %hu on CID: %hu successful.\n",
  2490. cmd->logout_cid, conn->cid);
  2491. cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
  2492. break;
  2493. default:
  2494. pr_err("Unknown cmd->logout_reason: 0x%02x\n",
  2495. cmd->logout_reason);
  2496. return -1;
  2497. }
  2498. hdr->opcode = ISCSI_OP_LOGOUT_RSP;
  2499. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2500. hdr->response = cmd->logout_response;
  2501. hdr->itt = cmd->init_task_tag;
  2502. cmd->stat_sn = conn->stat_sn++;
  2503. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2504. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2505. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2506. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2507. pr_debug("Built Logout Response ITT: 0x%08x StatSN:"
  2508. " 0x%08x Response: 0x%02x CID: %hu on CID: %hu\n",
  2509. cmd->init_task_tag, cmd->stat_sn, hdr->response,
  2510. cmd->logout_cid, conn->cid);
  2511. return 0;
  2512. }
  2513. EXPORT_SYMBOL(iscsit_build_logout_rsp);
  2514. static int
  2515. iscsit_send_logout(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  2516. {
  2517. int rc;
  2518. rc = iscsit_build_logout_rsp(cmd, conn,
  2519. (struct iscsi_logout_rsp *)&cmd->pdu[0]);
  2520. if (rc < 0)
  2521. return rc;
  2522. return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
  2523. }
  2524. void
  2525. iscsit_build_nopin_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
  2526. struct iscsi_nopin *hdr, bool nopout_response)
  2527. {
  2528. hdr->opcode = ISCSI_OP_NOOP_IN;
  2529. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2530. hton24(hdr->dlength, cmd->buf_ptr_size);
  2531. if (nopout_response)
  2532. put_unaligned_le64(0xFFFFFFFFFFFFFFFFULL, &hdr->lun);
  2533. hdr->itt = cmd->init_task_tag;
  2534. hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
  2535. cmd->stat_sn = (nopout_response) ? conn->stat_sn++ :
  2536. conn->stat_sn;
  2537. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2538. if (nopout_response)
  2539. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2540. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2541. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2542. pr_debug("Built NOPIN %s Response ITT: 0x%08x, TTT: 0x%08x,"
  2543. " StatSN: 0x%08x, Length %u\n", (nopout_response) ?
  2544. "Solicited" : "Unsolicited", cmd->init_task_tag,
  2545. cmd->targ_xfer_tag, cmd->stat_sn, cmd->buf_ptr_size);
  2546. }
  2547. EXPORT_SYMBOL(iscsit_build_nopin_rsp);
  2548. /*
  2549. * Unsolicited NOPIN, either requesting a response or not.
  2550. */
  2551. static int iscsit_send_unsolicited_nopin(
  2552. struct iscsi_cmd *cmd,
  2553. struct iscsi_conn *conn,
  2554. int want_response)
  2555. {
  2556. struct iscsi_nopin *hdr = (struct iscsi_nopin *)&cmd->pdu[0];
  2557. int ret;
  2558. iscsit_build_nopin_rsp(cmd, conn, hdr, false);
  2559. pr_debug("Sending Unsolicited NOPIN TTT: 0x%08x StatSN:"
  2560. " 0x%08x CID: %hu\n", hdr->ttt, cmd->stat_sn, conn->cid);
  2561. ret = conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
  2562. if (ret < 0)
  2563. return ret;
  2564. spin_lock_bh(&cmd->istate_lock);
  2565. cmd->i_state = want_response ?
  2566. ISTATE_SENT_NOPIN_WANT_RESPONSE : ISTATE_SENT_STATUS;
  2567. spin_unlock_bh(&cmd->istate_lock);
  2568. return 0;
  2569. }
  2570. static int
  2571. iscsit_send_nopin(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  2572. {
  2573. struct iscsi_nopin *hdr = (struct iscsi_nopin *)&cmd->pdu[0];
  2574. iscsit_build_nopin_rsp(cmd, conn, hdr, true);
  2575. /*
  2576. * NOPOUT Ping Data is attached to struct iscsi_cmd->buf_ptr.
  2577. * NOPOUT DataSegmentLength is at struct iscsi_cmd->buf_ptr_size.
  2578. */
  2579. pr_debug("Echoing back %u bytes of ping data.\n", cmd->buf_ptr_size);
  2580. return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL,
  2581. cmd->buf_ptr,
  2582. cmd->buf_ptr_size);
  2583. }
  2584. static int iscsit_send_r2t(
  2585. struct iscsi_cmd *cmd,
  2586. struct iscsi_conn *conn)
  2587. {
  2588. struct iscsi_r2t *r2t;
  2589. struct iscsi_r2t_rsp *hdr;
  2590. int ret;
  2591. r2t = iscsit_get_r2t_from_list(cmd);
  2592. if (!r2t)
  2593. return -1;
  2594. hdr = (struct iscsi_r2t_rsp *) cmd->pdu;
  2595. memset(hdr, 0, ISCSI_HDR_LEN);
  2596. hdr->opcode = ISCSI_OP_R2T;
  2597. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2598. int_to_scsilun(cmd->se_cmd.orig_fe_lun,
  2599. (struct scsi_lun *)&hdr->lun);
  2600. hdr->itt = cmd->init_task_tag;
  2601. if (conn->conn_transport->iscsit_get_r2t_ttt)
  2602. conn->conn_transport->iscsit_get_r2t_ttt(conn, cmd, r2t);
  2603. else
  2604. r2t->targ_xfer_tag = session_get_next_ttt(conn->sess);
  2605. hdr->ttt = cpu_to_be32(r2t->targ_xfer_tag);
  2606. hdr->statsn = cpu_to_be32(conn->stat_sn);
  2607. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2608. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2609. hdr->r2tsn = cpu_to_be32(r2t->r2t_sn);
  2610. hdr->data_offset = cpu_to_be32(r2t->offset);
  2611. hdr->data_length = cpu_to_be32(r2t->xfer_len);
  2612. pr_debug("Built %sR2T, ITT: 0x%08x, TTT: 0x%08x, StatSN:"
  2613. " 0x%08x, R2TSN: 0x%08x, Offset: %u, DDTL: %u, CID: %hu\n",
  2614. (!r2t->recovery_r2t) ? "" : "Recovery ", cmd->init_task_tag,
  2615. r2t->targ_xfer_tag, ntohl(hdr->statsn), r2t->r2t_sn,
  2616. r2t->offset, r2t->xfer_len, conn->cid);
  2617. spin_lock_bh(&cmd->r2t_lock);
  2618. r2t->sent_r2t = 1;
  2619. spin_unlock_bh(&cmd->r2t_lock);
  2620. ret = conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
  2621. if (ret < 0) {
  2622. return ret;
  2623. }
  2624. spin_lock_bh(&cmd->dataout_timeout_lock);
  2625. iscsit_start_dataout_timer(cmd, conn);
  2626. spin_unlock_bh(&cmd->dataout_timeout_lock);
  2627. return 0;
  2628. }
  2629. /*
  2630. * @recovery: If called from iscsi_task_reassign_complete_write() for
  2631. * connection recovery.
  2632. */
  2633. int iscsit_build_r2ts_for_cmd(
  2634. struct iscsi_conn *conn,
  2635. struct iscsi_cmd *cmd,
  2636. bool recovery)
  2637. {
  2638. int first_r2t = 1;
  2639. u32 offset = 0, xfer_len = 0;
  2640. spin_lock_bh(&cmd->r2t_lock);
  2641. if (cmd->cmd_flags & ICF_SENT_LAST_R2T) {
  2642. spin_unlock_bh(&cmd->r2t_lock);
  2643. return 0;
  2644. }
  2645. if (conn->sess->sess_ops->DataSequenceInOrder &&
  2646. !recovery)
  2647. cmd->r2t_offset = max(cmd->r2t_offset, cmd->write_data_done);
  2648. while (cmd->outstanding_r2ts < conn->sess->sess_ops->MaxOutstandingR2T) {
  2649. if (conn->sess->sess_ops->DataSequenceInOrder) {
  2650. offset = cmd->r2t_offset;
  2651. if (first_r2t && recovery) {
  2652. int new_data_end = offset +
  2653. conn->sess->sess_ops->MaxBurstLength -
  2654. cmd->next_burst_len;
  2655. if (new_data_end > cmd->se_cmd.data_length)
  2656. xfer_len = cmd->se_cmd.data_length - offset;
  2657. else
  2658. xfer_len =
  2659. conn->sess->sess_ops->MaxBurstLength -
  2660. cmd->next_burst_len;
  2661. } else {
  2662. int new_data_end = offset +
  2663. conn->sess->sess_ops->MaxBurstLength;
  2664. if (new_data_end > cmd->se_cmd.data_length)
  2665. xfer_len = cmd->se_cmd.data_length - offset;
  2666. else
  2667. xfer_len = conn->sess->sess_ops->MaxBurstLength;
  2668. }
  2669. cmd->r2t_offset += xfer_len;
  2670. if (cmd->r2t_offset == cmd->se_cmd.data_length)
  2671. cmd->cmd_flags |= ICF_SENT_LAST_R2T;
  2672. } else {
  2673. struct iscsi_seq *seq;
  2674. seq = iscsit_get_seq_holder_for_r2t(cmd);
  2675. if (!seq) {
  2676. spin_unlock_bh(&cmd->r2t_lock);
  2677. return -1;
  2678. }
  2679. offset = seq->offset;
  2680. xfer_len = seq->xfer_len;
  2681. if (cmd->seq_send_order == cmd->seq_count)
  2682. cmd->cmd_flags |= ICF_SENT_LAST_R2T;
  2683. }
  2684. cmd->outstanding_r2ts++;
  2685. first_r2t = 0;
  2686. if (iscsit_add_r2t_to_list(cmd, offset, xfer_len, 0, 0) < 0) {
  2687. spin_unlock_bh(&cmd->r2t_lock);
  2688. return -1;
  2689. }
  2690. if (cmd->cmd_flags & ICF_SENT_LAST_R2T)
  2691. break;
  2692. }
  2693. spin_unlock_bh(&cmd->r2t_lock);
  2694. return 0;
  2695. }
  2696. EXPORT_SYMBOL(iscsit_build_r2ts_for_cmd);
  2697. void iscsit_build_rsp_pdu(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
  2698. bool inc_stat_sn, struct iscsi_scsi_rsp *hdr)
  2699. {
  2700. if (inc_stat_sn)
  2701. cmd->stat_sn = conn->stat_sn++;
  2702. atomic_long_inc(&conn->sess->rsp_pdus);
  2703. memset(hdr, 0, ISCSI_HDR_LEN);
  2704. hdr->opcode = ISCSI_OP_SCSI_CMD_RSP;
  2705. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2706. if (cmd->se_cmd.se_cmd_flags & SCF_OVERFLOW_BIT) {
  2707. hdr->flags |= ISCSI_FLAG_CMD_OVERFLOW;
  2708. hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
  2709. } else if (cmd->se_cmd.se_cmd_flags & SCF_UNDERFLOW_BIT) {
  2710. hdr->flags |= ISCSI_FLAG_CMD_UNDERFLOW;
  2711. hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
  2712. }
  2713. hdr->response = cmd->iscsi_response;
  2714. hdr->cmd_status = cmd->se_cmd.scsi_status;
  2715. hdr->itt = cmd->init_task_tag;
  2716. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2717. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2718. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2719. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2720. pr_debug("Built SCSI Response, ITT: 0x%08x, StatSN: 0x%08x,"
  2721. " Response: 0x%02x, SAM Status: 0x%02x, CID: %hu\n",
  2722. cmd->init_task_tag, cmd->stat_sn, cmd->se_cmd.scsi_status,
  2723. cmd->se_cmd.scsi_status, conn->cid);
  2724. }
  2725. EXPORT_SYMBOL(iscsit_build_rsp_pdu);
  2726. static int iscsit_send_response(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  2727. {
  2728. struct iscsi_scsi_rsp *hdr = (struct iscsi_scsi_rsp *)&cmd->pdu[0];
  2729. bool inc_stat_sn = (cmd->i_state == ISTATE_SEND_STATUS);
  2730. void *data_buf = NULL;
  2731. u32 padding = 0, data_buf_len = 0;
  2732. iscsit_build_rsp_pdu(cmd, conn, inc_stat_sn, hdr);
  2733. /*
  2734. * Attach SENSE DATA payload to iSCSI Response PDU
  2735. */
  2736. if (cmd->se_cmd.sense_buffer &&
  2737. ((cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) ||
  2738. (cmd->se_cmd.se_cmd_flags & SCF_EMULATED_TASK_SENSE))) {
  2739. put_unaligned_be16(cmd->se_cmd.scsi_sense_length, cmd->sense_buffer);
  2740. cmd->se_cmd.scsi_sense_length += sizeof (__be16);
  2741. padding = -(cmd->se_cmd.scsi_sense_length) & 3;
  2742. hton24(hdr->dlength, (u32)cmd->se_cmd.scsi_sense_length);
  2743. data_buf = cmd->sense_buffer;
  2744. data_buf_len = cmd->se_cmd.scsi_sense_length + padding;
  2745. if (padding) {
  2746. memset(cmd->sense_buffer +
  2747. cmd->se_cmd.scsi_sense_length, 0, padding);
  2748. pr_debug("Adding %u bytes of padding to"
  2749. " SENSE.\n", padding);
  2750. }
  2751. pr_debug("Attaching SENSE DATA: %u bytes to iSCSI"
  2752. " Response PDU\n",
  2753. cmd->se_cmd.scsi_sense_length);
  2754. }
  2755. return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, data_buf,
  2756. data_buf_len);
  2757. }
  2758. static u8 iscsit_convert_tcm_tmr_rsp(struct se_tmr_req *se_tmr)
  2759. {
  2760. switch (se_tmr->response) {
  2761. case TMR_FUNCTION_COMPLETE:
  2762. return ISCSI_TMF_RSP_COMPLETE;
  2763. case TMR_TASK_DOES_NOT_EXIST:
  2764. return ISCSI_TMF_RSP_NO_TASK;
  2765. case TMR_LUN_DOES_NOT_EXIST:
  2766. return ISCSI_TMF_RSP_NO_LUN;
  2767. case TMR_TASK_MGMT_FUNCTION_NOT_SUPPORTED:
  2768. return ISCSI_TMF_RSP_NOT_SUPPORTED;
  2769. case TMR_FUNCTION_REJECTED:
  2770. default:
  2771. return ISCSI_TMF_RSP_REJECTED;
  2772. }
  2773. }
  2774. void
  2775. iscsit_build_task_mgt_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
  2776. struct iscsi_tm_rsp *hdr)
  2777. {
  2778. struct se_tmr_req *se_tmr = cmd->se_cmd.se_tmr_req;
  2779. hdr->opcode = ISCSI_OP_SCSI_TMFUNC_RSP;
  2780. hdr->flags = ISCSI_FLAG_CMD_FINAL;
  2781. hdr->response = iscsit_convert_tcm_tmr_rsp(se_tmr);
  2782. hdr->itt = cmd->init_task_tag;
  2783. cmd->stat_sn = conn->stat_sn++;
  2784. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2785. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2786. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2787. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2788. pr_debug("Built Task Management Response ITT: 0x%08x,"
  2789. " StatSN: 0x%08x, Response: 0x%02x, CID: %hu\n",
  2790. cmd->init_task_tag, cmd->stat_sn, hdr->response, conn->cid);
  2791. }
  2792. EXPORT_SYMBOL(iscsit_build_task_mgt_rsp);
  2793. static int
  2794. iscsit_send_task_mgt_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
  2795. {
  2796. struct iscsi_tm_rsp *hdr = (struct iscsi_tm_rsp *)&cmd->pdu[0];
  2797. iscsit_build_task_mgt_rsp(cmd, conn, hdr);
  2798. return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL, NULL, 0);
  2799. }
  2800. #define SENDTARGETS_BUF_LIMIT 32768U
  2801. static int
  2802. iscsit_build_sendtargets_response(struct iscsi_cmd *cmd,
  2803. enum iscsit_transport_type network_transport,
  2804. int skip_bytes, bool *completed)
  2805. {
  2806. char *payload = NULL;
  2807. struct iscsi_conn *conn = cmd->conn;
  2808. struct iscsi_portal_group *tpg;
  2809. struct iscsi_tiqn *tiqn;
  2810. struct iscsi_tpg_np *tpg_np;
  2811. int buffer_len, end_of_buf = 0, len = 0, payload_len = 0;
  2812. int target_name_printed;
  2813. unsigned char buf[ISCSI_IQN_LEN+12]; /* iqn + "TargetName=" + \0 */
  2814. unsigned char *text_in = cmd->text_in_ptr, *text_ptr = NULL;
  2815. bool active;
  2816. buffer_len = min(conn->conn_ops->MaxRecvDataSegmentLength,
  2817. SENDTARGETS_BUF_LIMIT);
  2818. payload = kzalloc(buffer_len, GFP_KERNEL);
  2819. if (!payload)
  2820. return -ENOMEM;
  2821. /*
  2822. * Locate pointer to iqn./eui. string for ICF_SENDTARGETS_SINGLE
  2823. * explicit case..
  2824. */
  2825. if (cmd->cmd_flags & ICF_SENDTARGETS_SINGLE) {
  2826. text_ptr = strchr(text_in, '=');
  2827. if (!text_ptr) {
  2828. pr_err("Unable to locate '=' string in text_in:"
  2829. " %s\n", text_in);
  2830. kfree(payload);
  2831. return -EINVAL;
  2832. }
  2833. /*
  2834. * Skip over '=' character..
  2835. */
  2836. text_ptr += 1;
  2837. }
  2838. spin_lock(&tiqn_lock);
  2839. list_for_each_entry(tiqn, &g_tiqn_list, tiqn_list) {
  2840. if ((cmd->cmd_flags & ICF_SENDTARGETS_SINGLE) &&
  2841. strcmp(tiqn->tiqn, text_ptr)) {
  2842. continue;
  2843. }
  2844. target_name_printed = 0;
  2845. spin_lock(&tiqn->tiqn_tpg_lock);
  2846. list_for_each_entry(tpg, &tiqn->tiqn_tpg_list, tpg_list) {
  2847. /* If demo_mode_discovery=0 and generate_node_acls=0
  2848. * (demo mode dislabed) do not return
  2849. * TargetName+TargetAddress unless a NodeACL exists.
  2850. */
  2851. if ((tpg->tpg_attrib.generate_node_acls == 0) &&
  2852. (tpg->tpg_attrib.demo_mode_discovery == 0) &&
  2853. (!target_tpg_has_node_acl(&tpg->tpg_se_tpg,
  2854. cmd->conn->sess->sess_ops->InitiatorName))) {
  2855. continue;
  2856. }
  2857. spin_lock(&tpg->tpg_state_lock);
  2858. active = (tpg->tpg_state == TPG_STATE_ACTIVE);
  2859. spin_unlock(&tpg->tpg_state_lock);
  2860. if (!active && tpg->tpg_attrib.tpg_enabled_sendtargets)
  2861. continue;
  2862. spin_lock(&tpg->tpg_np_lock);
  2863. list_for_each_entry(tpg_np, &tpg->tpg_gnp_list,
  2864. tpg_np_list) {
  2865. struct iscsi_np *np = tpg_np->tpg_np;
  2866. struct sockaddr_storage *sockaddr;
  2867. if (np->np_network_transport != network_transport)
  2868. continue;
  2869. if (!target_name_printed) {
  2870. len = sprintf(buf, "TargetName=%s",
  2871. tiqn->tiqn);
  2872. len += 1;
  2873. if ((len + payload_len) > buffer_len) {
  2874. spin_unlock(&tpg->tpg_np_lock);
  2875. spin_unlock(&tiqn->tiqn_tpg_lock);
  2876. end_of_buf = 1;
  2877. goto eob;
  2878. }
  2879. if (skip_bytes && len <= skip_bytes) {
  2880. skip_bytes -= len;
  2881. } else {
  2882. memcpy(payload + payload_len, buf, len);
  2883. payload_len += len;
  2884. target_name_printed = 1;
  2885. if (len > skip_bytes)
  2886. skip_bytes = 0;
  2887. }
  2888. }
  2889. if (inet_addr_is_any((struct sockaddr *)&np->np_sockaddr))
  2890. sockaddr = &conn->local_sockaddr;
  2891. else
  2892. sockaddr = &np->np_sockaddr;
  2893. len = sprintf(buf, "TargetAddress="
  2894. "%pISpc,%hu",
  2895. sockaddr,
  2896. tpg->tpgt);
  2897. len += 1;
  2898. if ((len + payload_len) > buffer_len) {
  2899. spin_unlock(&tpg->tpg_np_lock);
  2900. spin_unlock(&tiqn->tiqn_tpg_lock);
  2901. end_of_buf = 1;
  2902. goto eob;
  2903. }
  2904. if (skip_bytes && len <= skip_bytes) {
  2905. skip_bytes -= len;
  2906. } else {
  2907. memcpy(payload + payload_len, buf, len);
  2908. payload_len += len;
  2909. if (len > skip_bytes)
  2910. skip_bytes = 0;
  2911. }
  2912. }
  2913. spin_unlock(&tpg->tpg_np_lock);
  2914. }
  2915. spin_unlock(&tiqn->tiqn_tpg_lock);
  2916. eob:
  2917. if (end_of_buf) {
  2918. *completed = false;
  2919. break;
  2920. }
  2921. if (cmd->cmd_flags & ICF_SENDTARGETS_SINGLE)
  2922. break;
  2923. }
  2924. spin_unlock(&tiqn_lock);
  2925. cmd->buf_ptr = payload;
  2926. return payload_len;
  2927. }
  2928. int
  2929. iscsit_build_text_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
  2930. struct iscsi_text_rsp *hdr,
  2931. enum iscsit_transport_type network_transport)
  2932. {
  2933. int text_length, padding;
  2934. bool completed = true;
  2935. text_length = iscsit_build_sendtargets_response(cmd, network_transport,
  2936. cmd->read_data_done,
  2937. &completed);
  2938. if (text_length < 0)
  2939. return text_length;
  2940. if (completed) {
  2941. hdr->flags = ISCSI_FLAG_CMD_FINAL;
  2942. } else {
  2943. hdr->flags = ISCSI_FLAG_TEXT_CONTINUE;
  2944. cmd->read_data_done += text_length;
  2945. if (cmd->targ_xfer_tag == 0xFFFFFFFF)
  2946. cmd->targ_xfer_tag = session_get_next_ttt(conn->sess);
  2947. }
  2948. hdr->opcode = ISCSI_OP_TEXT_RSP;
  2949. padding = ((-text_length) & 3);
  2950. hton24(hdr->dlength, text_length);
  2951. hdr->itt = cmd->init_task_tag;
  2952. hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
  2953. cmd->stat_sn = conn->stat_sn++;
  2954. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2955. iscsit_increment_maxcmdsn(cmd, conn->sess);
  2956. /*
  2957. * Reset maxcmdsn_inc in multi-part text payload exchanges to
  2958. * correctly increment MaxCmdSN for each response answering a
  2959. * non immediate text request with a valid CmdSN.
  2960. */
  2961. cmd->maxcmdsn_inc = 0;
  2962. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2963. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2964. pr_debug("Built Text Response: ITT: 0x%08x, TTT: 0x%08x, StatSN: 0x%08x,"
  2965. " Length: %u, CID: %hu F: %d C: %d\n", cmd->init_task_tag,
  2966. cmd->targ_xfer_tag, cmd->stat_sn, text_length, conn->cid,
  2967. !!(hdr->flags & ISCSI_FLAG_CMD_FINAL),
  2968. !!(hdr->flags & ISCSI_FLAG_TEXT_CONTINUE));
  2969. return text_length + padding;
  2970. }
  2971. EXPORT_SYMBOL(iscsit_build_text_rsp);
  2972. static int iscsit_send_text_rsp(
  2973. struct iscsi_cmd *cmd,
  2974. struct iscsi_conn *conn)
  2975. {
  2976. struct iscsi_text_rsp *hdr = (struct iscsi_text_rsp *)cmd->pdu;
  2977. int text_length;
  2978. text_length = iscsit_build_text_rsp(cmd, conn, hdr,
  2979. conn->conn_transport->transport_type);
  2980. if (text_length < 0)
  2981. return text_length;
  2982. return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL,
  2983. cmd->buf_ptr,
  2984. text_length);
  2985. }
  2986. void
  2987. iscsit_build_reject(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
  2988. struct iscsi_reject *hdr)
  2989. {
  2990. hdr->opcode = ISCSI_OP_REJECT;
  2991. hdr->reason = cmd->reject_reason;
  2992. hdr->flags |= ISCSI_FLAG_CMD_FINAL;
  2993. hton24(hdr->dlength, ISCSI_HDR_LEN);
  2994. hdr->ffffffff = cpu_to_be32(0xffffffff);
  2995. cmd->stat_sn = conn->stat_sn++;
  2996. hdr->statsn = cpu_to_be32(cmd->stat_sn);
  2997. hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
  2998. hdr->max_cmdsn = cpu_to_be32((u32) atomic_read(&conn->sess->max_cmd_sn));
  2999. }
  3000. EXPORT_SYMBOL(iscsit_build_reject);
  3001. static int iscsit_send_reject(
  3002. struct iscsi_cmd *cmd,
  3003. struct iscsi_conn *conn)
  3004. {
  3005. struct iscsi_reject *hdr = (struct iscsi_reject *)&cmd->pdu[0];
  3006. iscsit_build_reject(cmd, conn, hdr);
  3007. pr_debug("Built Reject PDU StatSN: 0x%08x, Reason: 0x%02x,"
  3008. " CID: %hu\n", ntohl(hdr->statsn), hdr->reason, conn->cid);
  3009. return conn->conn_transport->iscsit_xmit_pdu(conn, cmd, NULL,
  3010. cmd->buf_ptr,
  3011. ISCSI_HDR_LEN);
  3012. }
  3013. void iscsit_thread_get_cpumask(struct iscsi_conn *conn)
  3014. {
  3015. int ord, cpu;
  3016. /*
  3017. * bitmap_id is assigned from iscsit_global->ts_bitmap from
  3018. * within iscsit_start_kthreads()
  3019. *
  3020. * Here we use bitmap_id to determine which CPU that this
  3021. * iSCSI connection's RX/TX threads will be scheduled to
  3022. * execute upon.
  3023. */
  3024. ord = conn->bitmap_id % cpumask_weight(cpu_online_mask);
  3025. for_each_online_cpu(cpu) {
  3026. if (ord-- == 0) {
  3027. cpumask_set_cpu(cpu, conn->conn_cpumask);
  3028. return;
  3029. }
  3030. }
  3031. /*
  3032. * This should never be reached..
  3033. */
  3034. dump_stack();
  3035. cpumask_setall(conn->conn_cpumask);
  3036. }
  3037. int
  3038. iscsit_immediate_queue(struct iscsi_conn *conn, struct iscsi_cmd *cmd, int state)
  3039. {
  3040. int ret;
  3041. switch (state) {
  3042. case ISTATE_SEND_R2T:
  3043. ret = iscsit_send_r2t(cmd, conn);
  3044. if (ret < 0)
  3045. goto err;
  3046. break;
  3047. case ISTATE_REMOVE:
  3048. spin_lock_bh(&conn->cmd_lock);
  3049. list_del_init(&cmd->i_conn_node);
  3050. spin_unlock_bh(&conn->cmd_lock);
  3051. iscsit_free_cmd(cmd, false);
  3052. break;
  3053. case ISTATE_SEND_NOPIN_WANT_RESPONSE:
  3054. iscsit_mod_nopin_response_timer(conn);
  3055. ret = iscsit_send_unsolicited_nopin(cmd, conn, 1);
  3056. if (ret < 0)
  3057. goto err;
  3058. break;
  3059. case ISTATE_SEND_NOPIN_NO_RESPONSE:
  3060. ret = iscsit_send_unsolicited_nopin(cmd, conn, 0);
  3061. if (ret < 0)
  3062. goto err;
  3063. break;
  3064. default:
  3065. pr_err("Unknown Opcode: 0x%02x ITT:"
  3066. " 0x%08x, i_state: %d on CID: %hu\n",
  3067. cmd->iscsi_opcode, cmd->init_task_tag, state,
  3068. conn->cid);
  3069. goto err;
  3070. }
  3071. return 0;
  3072. err:
  3073. return -1;
  3074. }
  3075. EXPORT_SYMBOL(iscsit_immediate_queue);
  3076. static int
  3077. iscsit_handle_immediate_queue(struct iscsi_conn *conn)
  3078. {
  3079. struct iscsit_transport *t = conn->conn_transport;
  3080. struct iscsi_queue_req *qr;
  3081. struct iscsi_cmd *cmd;
  3082. u8 state;
  3083. int ret;
  3084. while ((qr = iscsit_get_cmd_from_immediate_queue(conn))) {
  3085. atomic_set(&conn->check_immediate_queue, 0);
  3086. cmd = qr->cmd;
  3087. state = qr->state;
  3088. kmem_cache_free(lio_qr_cache, qr);
  3089. ret = t->iscsit_immediate_queue(conn, cmd, state);
  3090. if (ret < 0)
  3091. return ret;
  3092. }
  3093. return 0;
  3094. }
  3095. int
  3096. iscsit_response_queue(struct iscsi_conn *conn, struct iscsi_cmd *cmd, int state)
  3097. {
  3098. int ret;
  3099. check_rsp_state:
  3100. switch (state) {
  3101. case ISTATE_SEND_DATAIN:
  3102. ret = iscsit_send_datain(cmd, conn);
  3103. if (ret < 0)
  3104. goto err;
  3105. else if (!ret)
  3106. /* more drs */
  3107. goto check_rsp_state;
  3108. else if (ret == 1) {
  3109. /* all done */
  3110. spin_lock_bh(&cmd->istate_lock);
  3111. cmd->i_state = ISTATE_SENT_STATUS;
  3112. spin_unlock_bh(&cmd->istate_lock);
  3113. if (atomic_read(&conn->check_immediate_queue))
  3114. return 1;
  3115. return 0;
  3116. } else if (ret == 2) {
  3117. /* Still must send status,
  3118. SCF_TRANSPORT_TASK_SENSE was set */
  3119. spin_lock_bh(&cmd->istate_lock);
  3120. cmd->i_state = ISTATE_SEND_STATUS;
  3121. spin_unlock_bh(&cmd->istate_lock);
  3122. state = ISTATE_SEND_STATUS;
  3123. goto check_rsp_state;
  3124. }
  3125. break;
  3126. case ISTATE_SEND_STATUS:
  3127. case ISTATE_SEND_STATUS_RECOVERY:
  3128. ret = iscsit_send_response(cmd, conn);
  3129. break;
  3130. case ISTATE_SEND_LOGOUTRSP:
  3131. ret = iscsit_send_logout(cmd, conn);
  3132. break;
  3133. case ISTATE_SEND_ASYNCMSG:
  3134. ret = iscsit_send_conn_drop_async_message(
  3135. cmd, conn);
  3136. break;
  3137. case ISTATE_SEND_NOPIN:
  3138. ret = iscsit_send_nopin(cmd, conn);
  3139. break;
  3140. case ISTATE_SEND_REJECT:
  3141. ret = iscsit_send_reject(cmd, conn);
  3142. break;
  3143. case ISTATE_SEND_TASKMGTRSP:
  3144. ret = iscsit_send_task_mgt_rsp(cmd, conn);
  3145. if (ret != 0)
  3146. break;
  3147. ret = iscsit_tmr_post_handler(cmd, conn);
  3148. if (ret != 0)
  3149. iscsit_fall_back_to_erl0(conn->sess);
  3150. break;
  3151. case ISTATE_SEND_TEXTRSP:
  3152. ret = iscsit_send_text_rsp(cmd, conn);
  3153. break;
  3154. default:
  3155. pr_err("Unknown Opcode: 0x%02x ITT:"
  3156. " 0x%08x, i_state: %d on CID: %hu\n",
  3157. cmd->iscsi_opcode, cmd->init_task_tag,
  3158. state, conn->cid);
  3159. goto err;
  3160. }
  3161. if (ret < 0)
  3162. goto err;
  3163. switch (state) {
  3164. case ISTATE_SEND_LOGOUTRSP:
  3165. if (!iscsit_logout_post_handler(cmd, conn))
  3166. return -ECONNRESET;
  3167. /* fall through */
  3168. case ISTATE_SEND_STATUS:
  3169. case ISTATE_SEND_ASYNCMSG:
  3170. case ISTATE_SEND_NOPIN:
  3171. case ISTATE_SEND_STATUS_RECOVERY:
  3172. case ISTATE_SEND_TEXTRSP:
  3173. case ISTATE_SEND_TASKMGTRSP:
  3174. case ISTATE_SEND_REJECT:
  3175. spin_lock_bh(&cmd->istate_lock);
  3176. cmd->i_state = ISTATE_SENT_STATUS;
  3177. spin_unlock_bh(&cmd->istate_lock);
  3178. break;
  3179. default:
  3180. pr_err("Unknown Opcode: 0x%02x ITT:"
  3181. " 0x%08x, i_state: %d on CID: %hu\n",
  3182. cmd->iscsi_opcode, cmd->init_task_tag,
  3183. cmd->i_state, conn->cid);
  3184. goto err;
  3185. }
  3186. if (atomic_read(&conn->check_immediate_queue))
  3187. return 1;
  3188. return 0;
  3189. err:
  3190. return -1;
  3191. }
  3192. EXPORT_SYMBOL(iscsit_response_queue);
  3193. static int iscsit_handle_response_queue(struct iscsi_conn *conn)
  3194. {
  3195. struct iscsit_transport *t = conn->conn_transport;
  3196. struct iscsi_queue_req *qr;
  3197. struct iscsi_cmd *cmd;
  3198. u8 state;
  3199. int ret;
  3200. while ((qr = iscsit_get_cmd_from_response_queue(conn))) {
  3201. cmd = qr->cmd;
  3202. state = qr->state;
  3203. kmem_cache_free(lio_qr_cache, qr);
  3204. ret = t->iscsit_response_queue(conn, cmd, state);
  3205. if (ret == 1 || ret < 0)
  3206. return ret;
  3207. }
  3208. return 0;
  3209. }
  3210. int iscsi_target_tx_thread(void *arg)
  3211. {
  3212. int ret = 0;
  3213. struct iscsi_conn *conn = arg;
  3214. bool conn_freed = false;
  3215. /*
  3216. * Allow ourselves to be interrupted by SIGINT so that a
  3217. * connection recovery / failure event can be triggered externally.
  3218. */
  3219. allow_signal(SIGINT);
  3220. while (!kthread_should_stop()) {
  3221. /*
  3222. * Ensure that both TX and RX per connection kthreads
  3223. * are scheduled to run on the same CPU.
  3224. */
  3225. iscsit_thread_check_cpumask(conn, current, 1);
  3226. wait_event_interruptible(conn->queues_wq,
  3227. !iscsit_conn_all_queues_empty(conn));
  3228. if (signal_pending(current))
  3229. goto transport_err;
  3230. get_immediate:
  3231. ret = iscsit_handle_immediate_queue(conn);
  3232. if (ret < 0)
  3233. goto transport_err;
  3234. ret = iscsit_handle_response_queue(conn);
  3235. if (ret == 1) {
  3236. goto get_immediate;
  3237. } else if (ret == -ECONNRESET) {
  3238. conn_freed = true;
  3239. goto out;
  3240. } else if (ret < 0) {
  3241. goto transport_err;
  3242. }
  3243. }
  3244. transport_err:
  3245. /*
  3246. * Avoid the normal connection failure code-path if this connection
  3247. * is still within LOGIN mode, and iscsi_np process context is
  3248. * responsible for cleaning up the early connection failure.
  3249. */
  3250. if (conn->conn_state != TARG_CONN_STATE_IN_LOGIN)
  3251. iscsit_take_action_for_connection_exit(conn, &conn_freed);
  3252. out:
  3253. if (!conn_freed) {
  3254. while (!kthread_should_stop()) {
  3255. msleep(100);
  3256. }
  3257. }
  3258. return 0;
  3259. }
  3260. static int iscsi_target_rx_opcode(struct iscsi_conn *conn, unsigned char *buf)
  3261. {
  3262. struct iscsi_hdr *hdr = (struct iscsi_hdr *)buf;
  3263. struct iscsi_cmd *cmd;
  3264. int ret = 0;
  3265. switch (hdr->opcode & ISCSI_OPCODE_MASK) {
  3266. case ISCSI_OP_SCSI_CMD:
  3267. cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
  3268. if (!cmd)
  3269. goto reject;
  3270. ret = iscsit_handle_scsi_cmd(conn, cmd, buf);
  3271. break;
  3272. case ISCSI_OP_SCSI_DATA_OUT:
  3273. ret = iscsit_handle_data_out(conn, buf);
  3274. break;
  3275. case ISCSI_OP_NOOP_OUT:
  3276. cmd = NULL;
  3277. if (hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
  3278. cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
  3279. if (!cmd)
  3280. goto reject;
  3281. }
  3282. ret = iscsit_handle_nop_out(conn, cmd, buf);
  3283. break;
  3284. case ISCSI_OP_SCSI_TMFUNC:
  3285. cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
  3286. if (!cmd)
  3287. goto reject;
  3288. ret = iscsit_handle_task_mgt_cmd(conn, cmd, buf);
  3289. break;
  3290. case ISCSI_OP_TEXT:
  3291. if (hdr->ttt != cpu_to_be32(0xFFFFFFFF)) {
  3292. cmd = iscsit_find_cmd_from_itt(conn, hdr->itt);
  3293. if (!cmd)
  3294. goto reject;
  3295. } else {
  3296. cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
  3297. if (!cmd)
  3298. goto reject;
  3299. }
  3300. ret = iscsit_handle_text_cmd(conn, cmd, buf);
  3301. break;
  3302. case ISCSI_OP_LOGOUT:
  3303. cmd = iscsit_allocate_cmd(conn, TASK_INTERRUPTIBLE);
  3304. if (!cmd)
  3305. goto reject;
  3306. ret = iscsit_handle_logout_cmd(conn, cmd, buf);
  3307. if (ret > 0)
  3308. wait_for_completion_timeout(&conn->conn_logout_comp,
  3309. SECONDS_FOR_LOGOUT_COMP * HZ);
  3310. break;
  3311. case ISCSI_OP_SNACK:
  3312. ret = iscsit_handle_snack(conn, buf);
  3313. break;
  3314. default:
  3315. pr_err("Got unknown iSCSI OpCode: 0x%02x\n", hdr->opcode);
  3316. if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
  3317. pr_err("Cannot recover from unknown"
  3318. " opcode while ERL=0, closing iSCSI connection.\n");
  3319. return -1;
  3320. }
  3321. pr_err("Unable to recover from unknown opcode while OFMarker=No,"
  3322. " closing iSCSI connection.\n");
  3323. ret = -1;
  3324. break;
  3325. }
  3326. return ret;
  3327. reject:
  3328. return iscsit_add_reject(conn, ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
  3329. }
  3330. static bool iscsi_target_check_conn_state(struct iscsi_conn *conn)
  3331. {
  3332. bool ret;
  3333. spin_lock_bh(&conn->state_lock);
  3334. ret = (conn->conn_state != TARG_CONN_STATE_LOGGED_IN);
  3335. spin_unlock_bh(&conn->state_lock);
  3336. return ret;
  3337. }
  3338. static void iscsit_get_rx_pdu(struct iscsi_conn *conn)
  3339. {
  3340. int ret;
  3341. u8 buffer[ISCSI_HDR_LEN], opcode;
  3342. u32 checksum = 0, digest = 0;
  3343. struct kvec iov;
  3344. while (!kthread_should_stop()) {
  3345. /*
  3346. * Ensure that both TX and RX per connection kthreads
  3347. * are scheduled to run on the same CPU.
  3348. */
  3349. iscsit_thread_check_cpumask(conn, current, 0);
  3350. memset(buffer, 0, ISCSI_HDR_LEN);
  3351. memset(&iov, 0, sizeof(struct kvec));
  3352. iov.iov_base = buffer;
  3353. iov.iov_len = ISCSI_HDR_LEN;
  3354. ret = rx_data(conn, &iov, 1, ISCSI_HDR_LEN);
  3355. if (ret != ISCSI_HDR_LEN) {
  3356. iscsit_rx_thread_wait_for_tcp(conn);
  3357. return;
  3358. }
  3359. if (conn->conn_ops->HeaderDigest) {
  3360. iov.iov_base = &digest;
  3361. iov.iov_len = ISCSI_CRC_LEN;
  3362. ret = rx_data(conn, &iov, 1, ISCSI_CRC_LEN);
  3363. if (ret != ISCSI_CRC_LEN) {
  3364. iscsit_rx_thread_wait_for_tcp(conn);
  3365. return;
  3366. }
  3367. iscsit_do_crypto_hash_buf(conn->conn_rx_hash, buffer,
  3368. ISCSI_HDR_LEN, 0, NULL,
  3369. &checksum);
  3370. if (digest != checksum) {
  3371. pr_err("HeaderDigest CRC32C failed,"
  3372. " received 0x%08x, computed 0x%08x\n",
  3373. digest, checksum);
  3374. /*
  3375. * Set the PDU to 0xff so it will intentionally
  3376. * hit default in the switch below.
  3377. */
  3378. memset(buffer, 0xff, ISCSI_HDR_LEN);
  3379. atomic_long_inc(&conn->sess->conn_digest_errors);
  3380. } else {
  3381. pr_debug("Got HeaderDigest CRC32C"
  3382. " 0x%08x\n", checksum);
  3383. }
  3384. }
  3385. if (conn->conn_state == TARG_CONN_STATE_IN_LOGOUT)
  3386. return;
  3387. opcode = buffer[0] & ISCSI_OPCODE_MASK;
  3388. if (conn->sess->sess_ops->SessionType &&
  3389. ((!(opcode & ISCSI_OP_TEXT)) ||
  3390. (!(opcode & ISCSI_OP_LOGOUT)))) {
  3391. pr_err("Received illegal iSCSI Opcode: 0x%02x"
  3392. " while in Discovery Session, rejecting.\n", opcode);
  3393. iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
  3394. buffer);
  3395. return;
  3396. }
  3397. ret = iscsi_target_rx_opcode(conn, buffer);
  3398. if (ret < 0)
  3399. return;
  3400. }
  3401. }
  3402. int iscsi_target_rx_thread(void *arg)
  3403. {
  3404. int rc;
  3405. struct iscsi_conn *conn = arg;
  3406. bool conn_freed = false;
  3407. /*
  3408. * Allow ourselves to be interrupted by SIGINT so that a
  3409. * connection recovery / failure event can be triggered externally.
  3410. */
  3411. allow_signal(SIGINT);
  3412. /*
  3413. * Wait for iscsi_post_login_handler() to complete before allowing
  3414. * incoming iscsi/tcp socket I/O, and/or failing the connection.
  3415. */
  3416. rc = wait_for_completion_interruptible(&conn->rx_login_comp);
  3417. if (rc < 0 || iscsi_target_check_conn_state(conn))
  3418. goto out;
  3419. if (!conn->conn_transport->iscsit_get_rx_pdu)
  3420. return 0;
  3421. conn->conn_transport->iscsit_get_rx_pdu(conn);
  3422. if (!signal_pending(current))
  3423. atomic_set(&conn->transport_failed, 1);
  3424. iscsit_take_action_for_connection_exit(conn, &conn_freed);
  3425. out:
  3426. if (!conn_freed) {
  3427. while (!kthread_should_stop()) {
  3428. msleep(100);
  3429. }
  3430. }
  3431. return 0;
  3432. }
  3433. static void iscsit_release_commands_from_conn(struct iscsi_conn *conn)
  3434. {
  3435. LIST_HEAD(tmp_list);
  3436. struct iscsi_cmd *cmd = NULL, *cmd_tmp = NULL;
  3437. struct iscsi_session *sess = conn->sess;
  3438. /*
  3439. * We expect this function to only ever be called from either RX or TX
  3440. * thread context via iscsit_close_connection() once the other context
  3441. * has been reset -> returned sleeping pre-handler state.
  3442. */
  3443. spin_lock_bh(&conn->cmd_lock);
  3444. list_splice_init(&conn->conn_cmd_list, &tmp_list);
  3445. list_for_each_entry(cmd, &tmp_list, i_conn_node) {
  3446. struct se_cmd *se_cmd = &cmd->se_cmd;
  3447. if (se_cmd->se_tfo != NULL) {
  3448. spin_lock(&se_cmd->t_state_lock);
  3449. se_cmd->transport_state |= CMD_T_FABRIC_STOP;
  3450. spin_unlock(&se_cmd->t_state_lock);
  3451. }
  3452. }
  3453. spin_unlock_bh(&conn->cmd_lock);
  3454. list_for_each_entry_safe(cmd, cmd_tmp, &tmp_list, i_conn_node) {
  3455. list_del_init(&cmd->i_conn_node);
  3456. iscsit_increment_maxcmdsn(cmd, sess);
  3457. iscsit_free_cmd(cmd, true);
  3458. }
  3459. }
  3460. static void iscsit_stop_timers_for_cmds(
  3461. struct iscsi_conn *conn)
  3462. {
  3463. struct iscsi_cmd *cmd;
  3464. spin_lock_bh(&conn->cmd_lock);
  3465. list_for_each_entry(cmd, &conn->conn_cmd_list, i_conn_node) {
  3466. if (cmd->data_direction == DMA_TO_DEVICE)
  3467. iscsit_stop_dataout_timer(cmd);
  3468. }
  3469. spin_unlock_bh(&conn->cmd_lock);
  3470. }
  3471. int iscsit_close_connection(
  3472. struct iscsi_conn *conn)
  3473. {
  3474. int conn_logout = (conn->conn_state == TARG_CONN_STATE_IN_LOGOUT);
  3475. struct iscsi_session *sess = conn->sess;
  3476. pr_debug("Closing iSCSI connection CID %hu on SID:"
  3477. " %u\n", conn->cid, sess->sid);
  3478. /*
  3479. * Always up conn_logout_comp for the traditional TCP and HW_OFFLOAD
  3480. * case just in case the RX Thread in iscsi_target_rx_opcode() is
  3481. * sleeping and the logout response never got sent because the
  3482. * connection failed.
  3483. *
  3484. * However for iser-target, isert_wait4logout() is using conn_logout_comp
  3485. * to signal logout response TX interrupt completion. Go ahead and skip
  3486. * this for iser since isert_rx_opcode() does not wait on logout failure,
  3487. * and to avoid iscsi_conn pointer dereference in iser-target code.
  3488. */
  3489. if (!conn->conn_transport->rdma_shutdown)
  3490. complete(&conn->conn_logout_comp);
  3491. if (!strcmp(current->comm, ISCSI_RX_THREAD_NAME)) {
  3492. if (conn->tx_thread &&
  3493. cmpxchg(&conn->tx_thread_active, true, false)) {
  3494. send_sig(SIGINT, conn->tx_thread, 1);
  3495. kthread_stop(conn->tx_thread);
  3496. }
  3497. } else if (!strcmp(current->comm, ISCSI_TX_THREAD_NAME)) {
  3498. if (conn->rx_thread &&
  3499. cmpxchg(&conn->rx_thread_active, true, false)) {
  3500. send_sig(SIGINT, conn->rx_thread, 1);
  3501. kthread_stop(conn->rx_thread);
  3502. }
  3503. }
  3504. spin_lock(&iscsit_global->ts_bitmap_lock);
  3505. bitmap_release_region(iscsit_global->ts_bitmap, conn->bitmap_id,
  3506. get_order(1));
  3507. spin_unlock(&iscsit_global->ts_bitmap_lock);
  3508. iscsit_stop_timers_for_cmds(conn);
  3509. iscsit_stop_nopin_response_timer(conn);
  3510. iscsit_stop_nopin_timer(conn);
  3511. if (conn->conn_transport->iscsit_wait_conn)
  3512. conn->conn_transport->iscsit_wait_conn(conn);
  3513. /*
  3514. * During Connection recovery drop unacknowledged out of order
  3515. * commands for this connection, and prepare the other commands
  3516. * for reallegiance.
  3517. *
  3518. * During normal operation clear the out of order commands (but
  3519. * do not free the struct iscsi_ooo_cmdsn's) and release all
  3520. * struct iscsi_cmds.
  3521. */
  3522. if (atomic_read(&conn->connection_recovery)) {
  3523. iscsit_discard_unacknowledged_ooo_cmdsns_for_conn(conn);
  3524. iscsit_prepare_cmds_for_reallegiance(conn);
  3525. } else {
  3526. iscsit_clear_ooo_cmdsns_for_conn(conn);
  3527. iscsit_release_commands_from_conn(conn);
  3528. }
  3529. iscsit_free_queue_reqs_for_conn(conn);
  3530. /*
  3531. * Handle decrementing session or connection usage count if
  3532. * a logout response was not able to be sent because the
  3533. * connection failed. Fall back to Session Recovery here.
  3534. */
  3535. if (atomic_read(&conn->conn_logout_remove)) {
  3536. if (conn->conn_logout_reason == ISCSI_LOGOUT_REASON_CLOSE_SESSION) {
  3537. iscsit_dec_conn_usage_count(conn);
  3538. iscsit_dec_session_usage_count(sess);
  3539. }
  3540. if (conn->conn_logout_reason == ISCSI_LOGOUT_REASON_CLOSE_CONNECTION)
  3541. iscsit_dec_conn_usage_count(conn);
  3542. atomic_set(&conn->conn_logout_remove, 0);
  3543. atomic_set(&sess->session_reinstatement, 0);
  3544. atomic_set(&sess->session_fall_back_to_erl0, 1);
  3545. }
  3546. spin_lock_bh(&sess->conn_lock);
  3547. list_del(&conn->conn_list);
  3548. /*
  3549. * Attempt to let the Initiator know this connection failed by
  3550. * sending an Connection Dropped Async Message on another
  3551. * active connection.
  3552. */
  3553. if (atomic_read(&conn->connection_recovery))
  3554. iscsit_build_conn_drop_async_message(conn);
  3555. spin_unlock_bh(&sess->conn_lock);
  3556. /*
  3557. * If connection reinstatement is being performed on this connection,
  3558. * up the connection reinstatement semaphore that is being blocked on
  3559. * in iscsit_cause_connection_reinstatement().
  3560. */
  3561. spin_lock_bh(&conn->state_lock);
  3562. if (atomic_read(&conn->sleep_on_conn_wait_comp)) {
  3563. spin_unlock_bh(&conn->state_lock);
  3564. complete(&conn->conn_wait_comp);
  3565. wait_for_completion(&conn->conn_post_wait_comp);
  3566. spin_lock_bh(&conn->state_lock);
  3567. }
  3568. /*
  3569. * If connection reinstatement is being performed on this connection
  3570. * by receiving a REMOVECONNFORRECOVERY logout request, up the
  3571. * connection wait rcfr semaphore that is being blocked on
  3572. * an iscsit_connection_reinstatement_rcfr().
  3573. */
  3574. if (atomic_read(&conn->connection_wait_rcfr)) {
  3575. spin_unlock_bh(&conn->state_lock);
  3576. complete(&conn->conn_wait_rcfr_comp);
  3577. wait_for_completion(&conn->conn_post_wait_comp);
  3578. spin_lock_bh(&conn->state_lock);
  3579. }
  3580. atomic_set(&conn->connection_reinstatement, 1);
  3581. spin_unlock_bh(&conn->state_lock);
  3582. /*
  3583. * If any other processes are accessing this connection pointer we
  3584. * must wait until they have completed.
  3585. */
  3586. iscsit_check_conn_usage_count(conn);
  3587. ahash_request_free(conn->conn_tx_hash);
  3588. if (conn->conn_rx_hash) {
  3589. struct crypto_ahash *tfm;
  3590. tfm = crypto_ahash_reqtfm(conn->conn_rx_hash);
  3591. ahash_request_free(conn->conn_rx_hash);
  3592. crypto_free_ahash(tfm);
  3593. }
  3594. free_cpumask_var(conn->conn_cpumask);
  3595. kfree(conn->conn_ops);
  3596. conn->conn_ops = NULL;
  3597. if (conn->sock)
  3598. sock_release(conn->sock);
  3599. if (conn->conn_transport->iscsit_free_conn)
  3600. conn->conn_transport->iscsit_free_conn(conn);
  3601. iscsit_put_transport(conn->conn_transport);
  3602. pr_debug("Moving to TARG_CONN_STATE_FREE.\n");
  3603. conn->conn_state = TARG_CONN_STATE_FREE;
  3604. kfree(conn);
  3605. spin_lock_bh(&sess->conn_lock);
  3606. atomic_dec(&sess->nconn);
  3607. pr_debug("Decremented iSCSI connection count to %hu from node:"
  3608. " %s\n", atomic_read(&sess->nconn),
  3609. sess->sess_ops->InitiatorName);
  3610. /*
  3611. * Make sure that if one connection fails in an non ERL=2 iSCSI
  3612. * Session that they all fail.
  3613. */
  3614. if ((sess->sess_ops->ErrorRecoveryLevel != 2) && !conn_logout &&
  3615. !atomic_read(&sess->session_logout))
  3616. atomic_set(&sess->session_fall_back_to_erl0, 1);
  3617. /*
  3618. * If this was not the last connection in the session, and we are
  3619. * performing session reinstatement or falling back to ERL=0, call
  3620. * iscsit_stop_session() without sleeping to shutdown the other
  3621. * active connections.
  3622. */
  3623. if (atomic_read(&sess->nconn)) {
  3624. if (!atomic_read(&sess->session_reinstatement) &&
  3625. !atomic_read(&sess->session_fall_back_to_erl0)) {
  3626. spin_unlock_bh(&sess->conn_lock);
  3627. return 0;
  3628. }
  3629. if (!atomic_read(&sess->session_stop_active)) {
  3630. atomic_set(&sess->session_stop_active, 1);
  3631. spin_unlock_bh(&sess->conn_lock);
  3632. iscsit_stop_session(sess, 0, 0);
  3633. return 0;
  3634. }
  3635. spin_unlock_bh(&sess->conn_lock);
  3636. return 0;
  3637. }
  3638. /*
  3639. * If this was the last connection in the session and one of the
  3640. * following is occurring:
  3641. *
  3642. * Session Reinstatement is not being performed, and are falling back
  3643. * to ERL=0 call iscsit_close_session().
  3644. *
  3645. * Session Logout was requested. iscsit_close_session() will be called
  3646. * elsewhere.
  3647. *
  3648. * Session Continuation is not being performed, start the Time2Retain
  3649. * handler and check if sleep_on_sess_wait_sem is active.
  3650. */
  3651. if (!atomic_read(&sess->session_reinstatement) &&
  3652. atomic_read(&sess->session_fall_back_to_erl0)) {
  3653. spin_unlock_bh(&sess->conn_lock);
  3654. iscsit_close_session(sess);
  3655. return 0;
  3656. } else if (atomic_read(&sess->session_logout)) {
  3657. pr_debug("Moving to TARG_SESS_STATE_FREE.\n");
  3658. sess->session_state = TARG_SESS_STATE_FREE;
  3659. spin_unlock_bh(&sess->conn_lock);
  3660. if (atomic_read(&sess->sleep_on_sess_wait_comp))
  3661. complete(&sess->session_wait_comp);
  3662. return 0;
  3663. } else {
  3664. pr_debug("Moving to TARG_SESS_STATE_FAILED.\n");
  3665. sess->session_state = TARG_SESS_STATE_FAILED;
  3666. if (!atomic_read(&sess->session_continuation)) {
  3667. spin_unlock_bh(&sess->conn_lock);
  3668. iscsit_start_time2retain_handler(sess);
  3669. } else
  3670. spin_unlock_bh(&sess->conn_lock);
  3671. if (atomic_read(&sess->sleep_on_sess_wait_comp))
  3672. complete(&sess->session_wait_comp);
  3673. return 0;
  3674. }
  3675. }
  3676. /*
  3677. * If the iSCSI Session for the iSCSI Initiator Node exists,
  3678. * forcefully shutdown the iSCSI NEXUS.
  3679. */
  3680. int iscsit_close_session(struct iscsi_session *sess)
  3681. {
  3682. struct iscsi_portal_group *tpg = sess->tpg;
  3683. struct se_portal_group *se_tpg = &tpg->tpg_se_tpg;
  3684. if (atomic_read(&sess->nconn)) {
  3685. pr_err("%d connection(s) still exist for iSCSI session"
  3686. " to %s\n", atomic_read(&sess->nconn),
  3687. sess->sess_ops->InitiatorName);
  3688. BUG();
  3689. }
  3690. spin_lock_bh(&se_tpg->session_lock);
  3691. atomic_set(&sess->session_logout, 1);
  3692. atomic_set(&sess->session_reinstatement, 1);
  3693. iscsit_stop_time2retain_timer(sess);
  3694. spin_unlock_bh(&se_tpg->session_lock);
  3695. /*
  3696. * transport_deregister_session_configfs() will clear the
  3697. * struct se_node_acl->nacl_sess pointer now as a iscsi_np process context
  3698. * can be setting it again with __transport_register_session() in
  3699. * iscsi_post_login_handler() again after the iscsit_stop_session()
  3700. * completes in iscsi_np context.
  3701. */
  3702. transport_deregister_session_configfs(sess->se_sess);
  3703. /*
  3704. * If any other processes are accessing this session pointer we must
  3705. * wait until they have completed. If we are in an interrupt (the
  3706. * time2retain handler) and contain and active session usage count we
  3707. * restart the timer and exit.
  3708. */
  3709. if (!in_interrupt()) {
  3710. if (iscsit_check_session_usage_count(sess) == 1)
  3711. iscsit_stop_session(sess, 1, 1);
  3712. } else {
  3713. if (iscsit_check_session_usage_count(sess) == 2) {
  3714. atomic_set(&sess->session_logout, 0);
  3715. iscsit_start_time2retain_handler(sess);
  3716. return 0;
  3717. }
  3718. }
  3719. transport_deregister_session(sess->se_sess);
  3720. if (sess->sess_ops->ErrorRecoveryLevel == 2)
  3721. iscsit_free_connection_recovery_entires(sess);
  3722. iscsit_free_all_ooo_cmdsns(sess);
  3723. spin_lock_bh(&se_tpg->session_lock);
  3724. pr_debug("Moving to TARG_SESS_STATE_FREE.\n");
  3725. sess->session_state = TARG_SESS_STATE_FREE;
  3726. pr_debug("Released iSCSI session from node: %s\n",
  3727. sess->sess_ops->InitiatorName);
  3728. tpg->nsessions--;
  3729. if (tpg->tpg_tiqn)
  3730. tpg->tpg_tiqn->tiqn_nsessions--;
  3731. pr_debug("Decremented number of active iSCSI Sessions on"
  3732. " iSCSI TPG: %hu to %u\n", tpg->tpgt, tpg->nsessions);
  3733. spin_lock(&sess_idr_lock);
  3734. idr_remove(&sess_idr, sess->session_index);
  3735. spin_unlock(&sess_idr_lock);
  3736. kfree(sess->sess_ops);
  3737. sess->sess_ops = NULL;
  3738. spin_unlock_bh(&se_tpg->session_lock);
  3739. kfree(sess);
  3740. return 0;
  3741. }
  3742. static void iscsit_logout_post_handler_closesession(
  3743. struct iscsi_conn *conn)
  3744. {
  3745. struct iscsi_session *sess = conn->sess;
  3746. int sleep = 1;
  3747. /*
  3748. * Traditional iscsi/tcp will invoke this logic from TX thread
  3749. * context during session logout, so clear tx_thread_active and
  3750. * sleep if iscsit_close_connection() has not already occured.
  3751. *
  3752. * Since iser-target invokes this logic from it's own workqueue,
  3753. * always sleep waiting for RX/TX thread shutdown to complete
  3754. * within iscsit_close_connection().
  3755. */
  3756. if (!conn->conn_transport->rdma_shutdown) {
  3757. sleep = cmpxchg(&conn->tx_thread_active, true, false);
  3758. if (!sleep)
  3759. return;
  3760. }
  3761. atomic_set(&conn->conn_logout_remove, 0);
  3762. complete(&conn->conn_logout_comp);
  3763. iscsit_dec_conn_usage_count(conn);
  3764. iscsit_stop_session(sess, sleep, sleep);
  3765. iscsit_dec_session_usage_count(sess);
  3766. iscsit_close_session(sess);
  3767. }
  3768. static void iscsit_logout_post_handler_samecid(
  3769. struct iscsi_conn *conn)
  3770. {
  3771. int sleep = 1;
  3772. if (!conn->conn_transport->rdma_shutdown) {
  3773. sleep = cmpxchg(&conn->tx_thread_active, true, false);
  3774. if (!sleep)
  3775. return;
  3776. }
  3777. atomic_set(&conn->conn_logout_remove, 0);
  3778. complete(&conn->conn_logout_comp);
  3779. iscsit_cause_connection_reinstatement(conn, sleep);
  3780. iscsit_dec_conn_usage_count(conn);
  3781. }
  3782. static void iscsit_logout_post_handler_diffcid(
  3783. struct iscsi_conn *conn,
  3784. u16 cid)
  3785. {
  3786. struct iscsi_conn *l_conn;
  3787. struct iscsi_session *sess = conn->sess;
  3788. bool conn_found = false;
  3789. if (!sess)
  3790. return;
  3791. spin_lock_bh(&sess->conn_lock);
  3792. list_for_each_entry(l_conn, &sess->sess_conn_list, conn_list) {
  3793. if (l_conn->cid == cid) {
  3794. iscsit_inc_conn_usage_count(l_conn);
  3795. conn_found = true;
  3796. break;
  3797. }
  3798. }
  3799. spin_unlock_bh(&sess->conn_lock);
  3800. if (!conn_found)
  3801. return;
  3802. if (l_conn->sock)
  3803. l_conn->sock->ops->shutdown(l_conn->sock, RCV_SHUTDOWN);
  3804. spin_lock_bh(&l_conn->state_lock);
  3805. pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
  3806. l_conn->conn_state = TARG_CONN_STATE_IN_LOGOUT;
  3807. spin_unlock_bh(&l_conn->state_lock);
  3808. iscsit_cause_connection_reinstatement(l_conn, 1);
  3809. iscsit_dec_conn_usage_count(l_conn);
  3810. }
  3811. /*
  3812. * Return of 0 causes the TX thread to restart.
  3813. */
  3814. int iscsit_logout_post_handler(
  3815. struct iscsi_cmd *cmd,
  3816. struct iscsi_conn *conn)
  3817. {
  3818. int ret = 0;
  3819. switch (cmd->logout_reason) {
  3820. case ISCSI_LOGOUT_REASON_CLOSE_SESSION:
  3821. switch (cmd->logout_response) {
  3822. case ISCSI_LOGOUT_SUCCESS:
  3823. case ISCSI_LOGOUT_CLEANUP_FAILED:
  3824. default:
  3825. iscsit_logout_post_handler_closesession(conn);
  3826. break;
  3827. }
  3828. ret = 0;
  3829. break;
  3830. case ISCSI_LOGOUT_REASON_CLOSE_CONNECTION:
  3831. if (conn->cid == cmd->logout_cid) {
  3832. switch (cmd->logout_response) {
  3833. case ISCSI_LOGOUT_SUCCESS:
  3834. case ISCSI_LOGOUT_CLEANUP_FAILED:
  3835. default:
  3836. iscsit_logout_post_handler_samecid(conn);
  3837. break;
  3838. }
  3839. ret = 0;
  3840. } else {
  3841. switch (cmd->logout_response) {
  3842. case ISCSI_LOGOUT_SUCCESS:
  3843. iscsit_logout_post_handler_diffcid(conn,
  3844. cmd->logout_cid);
  3845. break;
  3846. case ISCSI_LOGOUT_CID_NOT_FOUND:
  3847. case ISCSI_LOGOUT_CLEANUP_FAILED:
  3848. default:
  3849. break;
  3850. }
  3851. ret = 1;
  3852. }
  3853. break;
  3854. case ISCSI_LOGOUT_REASON_RECOVERY:
  3855. switch (cmd->logout_response) {
  3856. case ISCSI_LOGOUT_SUCCESS:
  3857. case ISCSI_LOGOUT_CID_NOT_FOUND:
  3858. case ISCSI_LOGOUT_RECOVERY_UNSUPPORTED:
  3859. case ISCSI_LOGOUT_CLEANUP_FAILED:
  3860. default:
  3861. break;
  3862. }
  3863. ret = 1;
  3864. break;
  3865. default:
  3866. break;
  3867. }
  3868. return ret;
  3869. }
  3870. EXPORT_SYMBOL(iscsit_logout_post_handler);
  3871. void iscsit_fail_session(struct iscsi_session *sess)
  3872. {
  3873. struct iscsi_conn *conn;
  3874. spin_lock_bh(&sess->conn_lock);
  3875. list_for_each_entry(conn, &sess->sess_conn_list, conn_list) {
  3876. pr_debug("Moving to TARG_CONN_STATE_CLEANUP_WAIT.\n");
  3877. conn->conn_state = TARG_CONN_STATE_CLEANUP_WAIT;
  3878. }
  3879. spin_unlock_bh(&sess->conn_lock);
  3880. pr_debug("Moving to TARG_SESS_STATE_FAILED.\n");
  3881. sess->session_state = TARG_SESS_STATE_FAILED;
  3882. }
  3883. int iscsit_free_session(struct iscsi_session *sess)
  3884. {
  3885. u16 conn_count = atomic_read(&sess->nconn);
  3886. struct iscsi_conn *conn, *conn_tmp = NULL;
  3887. int is_last;
  3888. spin_lock_bh(&sess->conn_lock);
  3889. atomic_set(&sess->sleep_on_sess_wait_comp, 1);
  3890. list_for_each_entry_safe(conn, conn_tmp, &sess->sess_conn_list,
  3891. conn_list) {
  3892. if (conn_count == 0)
  3893. break;
  3894. if (list_is_last(&conn->conn_list, &sess->sess_conn_list)) {
  3895. is_last = 1;
  3896. } else {
  3897. iscsit_inc_conn_usage_count(conn_tmp);
  3898. is_last = 0;
  3899. }
  3900. iscsit_inc_conn_usage_count(conn);
  3901. spin_unlock_bh(&sess->conn_lock);
  3902. iscsit_cause_connection_reinstatement(conn, 1);
  3903. spin_lock_bh(&sess->conn_lock);
  3904. iscsit_dec_conn_usage_count(conn);
  3905. if (is_last == 0)
  3906. iscsit_dec_conn_usage_count(conn_tmp);
  3907. conn_count--;
  3908. }
  3909. if (atomic_read(&sess->nconn)) {
  3910. spin_unlock_bh(&sess->conn_lock);
  3911. wait_for_completion(&sess->session_wait_comp);
  3912. } else
  3913. spin_unlock_bh(&sess->conn_lock);
  3914. iscsit_close_session(sess);
  3915. return 0;
  3916. }
  3917. void iscsit_stop_session(
  3918. struct iscsi_session *sess,
  3919. int session_sleep,
  3920. int connection_sleep)
  3921. {
  3922. u16 conn_count = atomic_read(&sess->nconn);
  3923. struct iscsi_conn *conn, *conn_tmp = NULL;
  3924. int is_last;
  3925. spin_lock_bh(&sess->conn_lock);
  3926. if (session_sleep)
  3927. atomic_set(&sess->sleep_on_sess_wait_comp, 1);
  3928. if (connection_sleep) {
  3929. list_for_each_entry_safe(conn, conn_tmp, &sess->sess_conn_list,
  3930. conn_list) {
  3931. if (conn_count == 0)
  3932. break;
  3933. if (list_is_last(&conn->conn_list, &sess->sess_conn_list)) {
  3934. is_last = 1;
  3935. } else {
  3936. iscsit_inc_conn_usage_count(conn_tmp);
  3937. is_last = 0;
  3938. }
  3939. iscsit_inc_conn_usage_count(conn);
  3940. spin_unlock_bh(&sess->conn_lock);
  3941. iscsit_cause_connection_reinstatement(conn, 1);
  3942. spin_lock_bh(&sess->conn_lock);
  3943. iscsit_dec_conn_usage_count(conn);
  3944. if (is_last == 0)
  3945. iscsit_dec_conn_usage_count(conn_tmp);
  3946. conn_count--;
  3947. }
  3948. } else {
  3949. list_for_each_entry(conn, &sess->sess_conn_list, conn_list)
  3950. iscsit_cause_connection_reinstatement(conn, 0);
  3951. }
  3952. if (session_sleep && atomic_read(&sess->nconn)) {
  3953. spin_unlock_bh(&sess->conn_lock);
  3954. wait_for_completion(&sess->session_wait_comp);
  3955. } else
  3956. spin_unlock_bh(&sess->conn_lock);
  3957. }
  3958. int iscsit_release_sessions_for_tpg(struct iscsi_portal_group *tpg, int force)
  3959. {
  3960. struct iscsi_session *sess;
  3961. struct se_portal_group *se_tpg = &tpg->tpg_se_tpg;
  3962. struct se_session *se_sess, *se_sess_tmp;
  3963. LIST_HEAD(free_list);
  3964. int session_count = 0;
  3965. spin_lock_bh(&se_tpg->session_lock);
  3966. if (tpg->nsessions && !force) {
  3967. spin_unlock_bh(&se_tpg->session_lock);
  3968. return -1;
  3969. }
  3970. list_for_each_entry_safe(se_sess, se_sess_tmp, &se_tpg->tpg_sess_list,
  3971. sess_list) {
  3972. sess = (struct iscsi_session *)se_sess->fabric_sess_ptr;
  3973. spin_lock(&sess->conn_lock);
  3974. if (atomic_read(&sess->session_fall_back_to_erl0) ||
  3975. atomic_read(&sess->session_logout) ||
  3976. (sess->time2retain_timer_flags & ISCSI_TF_EXPIRED)) {
  3977. spin_unlock(&sess->conn_lock);
  3978. continue;
  3979. }
  3980. atomic_set(&sess->session_reinstatement, 1);
  3981. atomic_set(&sess->session_fall_back_to_erl0, 1);
  3982. spin_unlock(&sess->conn_lock);
  3983. list_move_tail(&se_sess->sess_list, &free_list);
  3984. }
  3985. spin_unlock_bh(&se_tpg->session_lock);
  3986. list_for_each_entry_safe(se_sess, se_sess_tmp, &free_list, sess_list) {
  3987. sess = (struct iscsi_session *)se_sess->fabric_sess_ptr;
  3988. iscsit_free_session(sess);
  3989. session_count++;
  3990. }
  3991. pr_debug("Released %d iSCSI Session(s) from Target Portal"
  3992. " Group: %hu\n", session_count, tpg->tpgt);
  3993. return 0;
  3994. }
  3995. MODULE_DESCRIPTION("iSCSI-Target Driver for mainline target infrastructure");
  3996. MODULE_VERSION("4.1.x");
  3997. MODULE_AUTHOR("nab@Linux-iSCSI.org");
  3998. MODULE_LICENSE("GPL");
  3999. module_init(iscsi_target_init_module);
  4000. module_exit(iscsi_target_cleanup_module);