1 /*******************************************************************************
2 * This file contains main functions related to the iSCSI Target Core Driver.
4 * \u00a9 Copyright 2007-2011 RisingTide Systems LLC.
6 * Licensed to the Linux Foundation under the General Public License (GPL) version 2.
8 * Author: Nicholas A. Bellinger <nab@linux-iscsi.org>
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 ******************************************************************************/
21 #include <linux/string.h>
22 #include <linux/kthread.h>
23 #include <linux/crypto.h>
24 #include <linux/completion.h>
25 #include <linux/module.h>
26 #include <linux/idr.h>
27 #include <asm/unaligned.h>
28 #include <scsi/scsi_device.h>
29 #include <scsi/iscsi_proto.h>
30 #include <scsi/scsi_tcq.h>
31 #include <target/target_core_base.h>
32 #include <target/target_core_fabric.h>
33 #include <target/target_core_configfs.h>
35 #include "iscsi_target_core.h"
36 #include "iscsi_target_parameters.h"
37 #include "iscsi_target_seq_pdu_list.h"
38 #include "iscsi_target_tq.h"
39 #include "iscsi_target_configfs.h"
40 #include "iscsi_target_datain_values.h"
41 #include "iscsi_target_erl0.h"
42 #include "iscsi_target_erl1.h"
43 #include "iscsi_target_erl2.h"
44 #include "iscsi_target_login.h"
45 #include "iscsi_target_tmr.h"
46 #include "iscsi_target_tpg.h"
47 #include "iscsi_target_util.h"
48 #include "iscsi_target.h"
49 #include "iscsi_target_device.h"
50 #include "iscsi_target_stat.h"
52 #include <target/iscsi/iscsi_transport.h>
54 static LIST_HEAD(g_tiqn_list);
55 static LIST_HEAD(g_np_list);
56 static DEFINE_SPINLOCK(tiqn_lock);
57 static DEFINE_MUTEX(np_lock);
59 static struct idr tiqn_idr;
61 struct mutex auth_id_lock;
62 spinlock_t sess_idr_lock;
64 struct iscsit_global *iscsit_global;
66 struct kmem_cache *lio_cmd_cache;
67 struct kmem_cache *lio_qr_cache;
68 struct kmem_cache *lio_dr_cache;
69 struct kmem_cache *lio_ooo_cache;
70 struct kmem_cache *lio_r2t_cache;
72 static int iscsit_handle_immediate_data(struct iscsi_cmd *,
73 struct iscsi_scsi_req *, u32);
75 struct iscsi_tiqn *iscsit_get_tiqn_for_login(unsigned char *buf)
77 struct iscsi_tiqn *tiqn = NULL;
79 spin_lock(&tiqn_lock);
80 list_for_each_entry(tiqn, &g_tiqn_list, tiqn_list) {
81 if (!strcmp(tiqn->tiqn, buf)) {
83 spin_lock(&tiqn->tiqn_state_lock);
84 if (tiqn->tiqn_state == TIQN_STATE_ACTIVE) {
85 tiqn->tiqn_access_count++;
86 spin_unlock(&tiqn->tiqn_state_lock);
87 spin_unlock(&tiqn_lock);
90 spin_unlock(&tiqn->tiqn_state_lock);
93 spin_unlock(&tiqn_lock);
98 static int iscsit_set_tiqn_shutdown(struct iscsi_tiqn *tiqn)
100 spin_lock(&tiqn->tiqn_state_lock);
101 if (tiqn->tiqn_state == TIQN_STATE_ACTIVE) {
102 tiqn->tiqn_state = TIQN_STATE_SHUTDOWN;
103 spin_unlock(&tiqn->tiqn_state_lock);
106 spin_unlock(&tiqn->tiqn_state_lock);
111 void iscsit_put_tiqn_for_login(struct iscsi_tiqn *tiqn)
113 spin_lock(&tiqn->tiqn_state_lock);
114 tiqn->tiqn_access_count--;
115 spin_unlock(&tiqn->tiqn_state_lock);
119 * Note that IQN formatting is expected to be done in userspace, and
120 * no explict IQN format checks are done here.
122 struct iscsi_tiqn *iscsit_add_tiqn(unsigned char *buf)
124 struct iscsi_tiqn *tiqn = NULL;
127 if (strlen(buf) >= ISCSI_IQN_LEN) {
128 pr_err("Target IQN exceeds %d bytes\n",
130 return ERR_PTR(-EINVAL);
133 tiqn = kzalloc(sizeof(struct iscsi_tiqn), GFP_KERNEL);
135 pr_err("Unable to allocate struct iscsi_tiqn\n");
136 return ERR_PTR(-ENOMEM);
139 sprintf(tiqn->tiqn, "%s", buf);
140 INIT_LIST_HEAD(&tiqn->tiqn_list);
141 INIT_LIST_HEAD(&tiqn->tiqn_tpg_list);
142 spin_lock_init(&tiqn->tiqn_state_lock);
143 spin_lock_init(&tiqn->tiqn_tpg_lock);
144 spin_lock_init(&tiqn->sess_err_stats.lock);
145 spin_lock_init(&tiqn->login_stats.lock);
146 spin_lock_init(&tiqn->logout_stats.lock);
148 tiqn->tiqn_state = TIQN_STATE_ACTIVE;
150 idr_preload(GFP_KERNEL);
151 spin_lock(&tiqn_lock);
153 ret = idr_alloc(&tiqn_idr, NULL, 0, 0, GFP_NOWAIT);
155 pr_err("idr_alloc() failed for tiqn->tiqn_index\n");
156 spin_unlock(&tiqn_lock);
161 tiqn->tiqn_index = ret;
162 list_add_tail(&tiqn->tiqn_list, &g_tiqn_list);
164 spin_unlock(&tiqn_lock);
167 pr_debug("CORE[0] - Added iSCSI Target IQN: %s\n", tiqn->tiqn);
173 static void iscsit_wait_for_tiqn(struct iscsi_tiqn *tiqn)
176 * Wait for accesses to said struct iscsi_tiqn to end.
178 spin_lock(&tiqn->tiqn_state_lock);
179 while (tiqn->tiqn_access_count != 0) {
180 spin_unlock(&tiqn->tiqn_state_lock);
182 spin_lock(&tiqn->tiqn_state_lock);
184 spin_unlock(&tiqn->tiqn_state_lock);
187 void iscsit_del_tiqn(struct iscsi_tiqn *tiqn)
190 * iscsit_set_tiqn_shutdown sets tiqn->tiqn_state = TIQN_STATE_SHUTDOWN
191 * while holding tiqn->tiqn_state_lock. This means that all subsequent
192 * attempts to access this struct iscsi_tiqn will fail from both transport
193 * fabric and control code paths.
195 if (iscsit_set_tiqn_shutdown(tiqn) < 0) {
196 pr_err("iscsit_set_tiqn_shutdown() failed\n");
200 iscsit_wait_for_tiqn(tiqn);
202 spin_lock(&tiqn_lock);
203 list_del(&tiqn->tiqn_list);
204 idr_remove(&tiqn_idr, tiqn->tiqn_index);
205 spin_unlock(&tiqn_lock);
207 pr_debug("CORE[0] - Deleted iSCSI Target IQN: %s\n",
212 int iscsit_access_np(struct iscsi_np *np, struct iscsi_portal_group *tpg)
216 * Determine if the network portal is accepting storage traffic.
218 spin_lock_bh(&np->np_thread_lock);
219 if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
220 spin_unlock_bh(&np->np_thread_lock);
223 if (np->np_login_tpg) {
224 pr_err("np->np_login_tpg() is not NULL!\n");
225 spin_unlock_bh(&np->np_thread_lock);
228 spin_unlock_bh(&np->np_thread_lock);
230 * Determine if the portal group is accepting storage traffic.
232 spin_lock_bh(&tpg->tpg_state_lock);
233 if (tpg->tpg_state != TPG_STATE_ACTIVE) {
234 spin_unlock_bh(&tpg->tpg_state_lock);
237 spin_unlock_bh(&tpg->tpg_state_lock);
240 * Here we serialize access across the TIQN+TPG Tuple.
242 ret = mutex_lock_interruptible(&tpg->np_login_lock);
243 if ((ret != 0) || signal_pending(current))
246 spin_lock_bh(&np->np_thread_lock);
247 np->np_login_tpg = tpg;
248 spin_unlock_bh(&np->np_thread_lock);
253 int iscsit_deaccess_np(struct iscsi_np *np, struct iscsi_portal_group *tpg)
255 struct iscsi_tiqn *tiqn = tpg->tpg_tiqn;
257 spin_lock_bh(&np->np_thread_lock);
258 np->np_login_tpg = NULL;
259 spin_unlock_bh(&np->np_thread_lock);
261 mutex_unlock(&tpg->np_login_lock);
264 iscsit_put_tiqn_for_login(tiqn);
269 bool iscsit_check_np_match(
270 struct __kernel_sockaddr_storage *sockaddr,
272 int network_transport)
274 struct sockaddr_in *sock_in, *sock_in_e;
275 struct sockaddr_in6 *sock_in6, *sock_in6_e;
276 bool ip_match = false;
279 if (sockaddr->ss_family == AF_INET6) {
280 sock_in6 = (struct sockaddr_in6 *)sockaddr;
281 sock_in6_e = (struct sockaddr_in6 *)&np->np_sockaddr;
283 if (!memcmp(&sock_in6->sin6_addr.in6_u,
284 &sock_in6_e->sin6_addr.in6_u,
285 sizeof(struct in6_addr)))
288 port = ntohs(sock_in6->sin6_port);
290 sock_in = (struct sockaddr_in *)sockaddr;
291 sock_in_e = (struct sockaddr_in *)&np->np_sockaddr;
293 if (sock_in->sin_addr.s_addr == sock_in_e->sin_addr.s_addr)
296 port = ntohs(sock_in->sin_port);
299 if ((ip_match == true) && (np->np_port == port) &&
300 (np->np_network_transport == network_transport))
307 * Called with mutex np_lock held
309 static struct iscsi_np *iscsit_get_np(
310 struct __kernel_sockaddr_storage *sockaddr,
311 int network_transport)
316 list_for_each_entry(np, &g_np_list, np_list) {
317 spin_lock_bh(&np->np_thread_lock);
318 if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
319 spin_unlock_bh(&np->np_thread_lock);
323 match = iscsit_check_np_match(sockaddr, np, network_transport);
326 * Increment the np_exports reference count now to
327 * prevent iscsit_del_np() below from being called
328 * while iscsi_tpg_add_network_portal() is called.
331 spin_unlock_bh(&np->np_thread_lock);
334 spin_unlock_bh(&np->np_thread_lock);
340 struct iscsi_np *iscsit_add_np(
341 struct __kernel_sockaddr_storage *sockaddr,
343 int network_transport)
345 struct sockaddr_in *sock_in;
346 struct sockaddr_in6 *sock_in6;
350 mutex_lock(&np_lock);
353 * Locate the existing struct iscsi_np if already active..
355 np = iscsit_get_np(sockaddr, network_transport);
357 mutex_unlock(&np_lock);
361 np = kzalloc(sizeof(struct iscsi_np), GFP_KERNEL);
363 pr_err("Unable to allocate memory for struct iscsi_np\n");
364 mutex_unlock(&np_lock);
365 return ERR_PTR(-ENOMEM);
368 np->np_flags |= NPF_IP_NETWORK;
369 if (sockaddr->ss_family == AF_INET6) {
370 sock_in6 = (struct sockaddr_in6 *)sockaddr;
371 snprintf(np->np_ip, IPV6_ADDRESS_SPACE, "%s", ip_str);
372 np->np_port = ntohs(sock_in6->sin6_port);
374 sock_in = (struct sockaddr_in *)sockaddr;
375 sprintf(np->np_ip, "%s", ip_str);
376 np->np_port = ntohs(sock_in->sin_port);
379 np->np_network_transport = network_transport;
380 spin_lock_init(&np->np_thread_lock);
381 init_completion(&np->np_restart_comp);
382 INIT_LIST_HEAD(&np->np_list);
384 ret = iscsi_target_setup_login_socket(np, sockaddr);
387 mutex_unlock(&np_lock);
391 np->np_thread = kthread_run(iscsi_target_login_thread, np, "iscsi_np");
392 if (IS_ERR(np->np_thread)) {
393 pr_err("Unable to create kthread: iscsi_np\n");
394 ret = PTR_ERR(np->np_thread);
396 mutex_unlock(&np_lock);
400 * Increment the np_exports reference count now to prevent
401 * iscsit_del_np() below from being run while a new call to
402 * iscsi_tpg_add_network_portal() for a matching iscsi_np is
403 * active. We don't need to hold np->np_thread_lock at this
404 * point because iscsi_np has not been added to g_np_list yet.
407 np->np_thread_state = ISCSI_NP_THREAD_ACTIVE;
409 list_add_tail(&np->np_list, &g_np_list);
410 mutex_unlock(&np_lock);
412 pr_debug("CORE[0] - Added Network Portal: %s:%hu on %s\n",
413 np->np_ip, np->np_port, np->np_transport->name);
418 int iscsit_reset_np_thread(
420 struct iscsi_tpg_np *tpg_np,
421 struct iscsi_portal_group *tpg)
423 spin_lock_bh(&np->np_thread_lock);
426 * The reset operation need only be performed when the
427 * passed struct iscsi_portal_group has a login in progress
428 * to one of the network portals.
430 if (tpg_np->tpg_np->np_login_tpg != tpg) {
431 spin_unlock_bh(&np->np_thread_lock);
435 if (np->np_thread_state == ISCSI_NP_THREAD_INACTIVE) {
436 spin_unlock_bh(&np->np_thread_lock);
439 np->np_thread_state = ISCSI_NP_THREAD_RESET;
442 spin_unlock_bh(&np->np_thread_lock);
443 send_sig(SIGINT, np->np_thread, 1);
444 wait_for_completion(&np->np_restart_comp);
445 spin_lock_bh(&np->np_thread_lock);
447 spin_unlock_bh(&np->np_thread_lock);
452 static void iscsit_free_np(struct iscsi_np *np)
455 sock_release(np->np_socket);
458 int iscsit_del_np(struct iscsi_np *np)
460 spin_lock_bh(&np->np_thread_lock);
462 if (np->np_exports) {
464 spin_unlock_bh(&np->np_thread_lock);
467 np->np_thread_state = ISCSI_NP_THREAD_SHUTDOWN;
468 spin_unlock_bh(&np->np_thread_lock);
472 * We need to send the signal to wakeup Linux/Net
473 * which may be sleeping in sock_accept()..
475 send_sig(SIGINT, np->np_thread, 1);
476 kthread_stop(np->np_thread);
479 np->np_transport->iscsit_free_np(np);
481 mutex_lock(&np_lock);
482 list_del(&np->np_list);
483 mutex_unlock(&np_lock);
485 pr_debug("CORE[0] - Removed Network Portal: %s:%hu on %s\n",
486 np->np_ip, np->np_port, np->np_transport->name);
488 iscsit_put_transport(np->np_transport);
493 static int iscsit_immediate_queue(struct iscsi_conn *, struct iscsi_cmd *, int);
494 static int iscsit_response_queue(struct iscsi_conn *, struct iscsi_cmd *, int);
496 static int iscsit_queue_rsp(struct iscsi_conn *conn, struct iscsi_cmd *cmd)
498 iscsit_add_cmd_to_response_queue(cmd, cmd->conn, cmd->i_state);
502 static struct iscsit_transport iscsi_target_transport = {
504 .transport_type = ISCSI_TCP,
506 .iscsit_setup_np = iscsit_setup_np,
507 .iscsit_accept_np = iscsit_accept_np,
508 .iscsit_free_np = iscsit_free_np,
509 .iscsit_alloc_cmd = iscsit_alloc_cmd,
510 .iscsit_get_login_rx = iscsit_get_login_rx,
511 .iscsit_put_login_tx = iscsit_put_login_tx,
512 .iscsit_get_dataout = iscsit_build_r2ts_for_cmd,
513 .iscsit_immediate_queue = iscsit_immediate_queue,
514 .iscsit_response_queue = iscsit_response_queue,
515 .iscsit_queue_data_in = iscsit_queue_rsp,
516 .iscsit_queue_status = iscsit_queue_rsp,
519 static int __init iscsi_target_init_module(void)
523 pr_debug("iSCSI-Target "ISCSIT_VERSION"\n");
525 iscsit_global = kzalloc(sizeof(struct iscsit_global), GFP_KERNEL);
526 if (!iscsit_global) {
527 pr_err("Unable to allocate memory for iscsit_global\n");
530 mutex_init(&auth_id_lock);
531 spin_lock_init(&sess_idr_lock);
535 ret = iscsi_target_register_configfs();
539 ret = iscsi_thread_set_init();
543 if (iscsi_allocate_thread_sets(TARGET_THREAD_SET_COUNT) !=
544 TARGET_THREAD_SET_COUNT) {
545 pr_err("iscsi_allocate_thread_sets() returned"
546 " unexpected value!\n");
550 lio_cmd_cache = kmem_cache_create("lio_cmd_cache",
551 sizeof(struct iscsi_cmd), __alignof__(struct iscsi_cmd),
553 if (!lio_cmd_cache) {
554 pr_err("Unable to kmem_cache_create() for"
559 lio_qr_cache = kmem_cache_create("lio_qr_cache",
560 sizeof(struct iscsi_queue_req),
561 __alignof__(struct iscsi_queue_req), 0, NULL);
563 pr_err("nable to kmem_cache_create() for"
568 lio_dr_cache = kmem_cache_create("lio_dr_cache",
569 sizeof(struct iscsi_datain_req),
570 __alignof__(struct iscsi_datain_req), 0, NULL);
572 pr_err("Unable to kmem_cache_create() for"
577 lio_ooo_cache = kmem_cache_create("lio_ooo_cache",
578 sizeof(struct iscsi_ooo_cmdsn),
579 __alignof__(struct iscsi_ooo_cmdsn), 0, NULL);
580 if (!lio_ooo_cache) {
581 pr_err("Unable to kmem_cache_create() for"
586 lio_r2t_cache = kmem_cache_create("lio_r2t_cache",
587 sizeof(struct iscsi_r2t), __alignof__(struct iscsi_r2t),
589 if (!lio_r2t_cache) {
590 pr_err("Unable to kmem_cache_create() for"
595 iscsit_register_transport(&iscsi_target_transport);
597 if (iscsit_load_discovery_tpg() < 0)
602 kmem_cache_destroy(lio_r2t_cache);
604 kmem_cache_destroy(lio_ooo_cache);
606 kmem_cache_destroy(lio_dr_cache);
608 kmem_cache_destroy(lio_qr_cache);
610 kmem_cache_destroy(lio_cmd_cache);
612 iscsi_deallocate_thread_sets();
614 iscsi_thread_set_free();
616 iscsi_target_deregister_configfs();
618 kfree(iscsit_global);
622 static void __exit iscsi_target_cleanup_module(void)
624 iscsi_deallocate_thread_sets();
625 iscsi_thread_set_free();
626 iscsit_release_discovery_tpg();
627 iscsit_unregister_transport(&iscsi_target_transport);
628 kmem_cache_destroy(lio_cmd_cache);
629 kmem_cache_destroy(lio_qr_cache);
630 kmem_cache_destroy(lio_dr_cache);
631 kmem_cache_destroy(lio_ooo_cache);
632 kmem_cache_destroy(lio_r2t_cache);
634 iscsi_target_deregister_configfs();
636 kfree(iscsit_global);
639 static int iscsit_add_reject(
640 struct iscsi_conn *conn,
644 struct iscsi_cmd *cmd;
646 cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
650 cmd->iscsi_opcode = ISCSI_OP_REJECT;
651 cmd->reject_reason = reason;
653 cmd->buf_ptr = kmemdup(buf, ISCSI_HDR_LEN, GFP_KERNEL);
655 pr_err("Unable to allocate memory for cmd->buf_ptr\n");
656 iscsit_free_cmd(cmd, false);
660 spin_lock_bh(&conn->cmd_lock);
661 list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
662 spin_unlock_bh(&conn->cmd_lock);
664 cmd->i_state = ISTATE_SEND_REJECT;
665 iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
670 static int iscsit_add_reject_from_cmd(
671 struct iscsi_cmd *cmd,
676 struct iscsi_conn *conn;
679 pr_err("cmd->conn is NULL for ITT: 0x%08x\n",
685 cmd->iscsi_opcode = ISCSI_OP_REJECT;
686 cmd->reject_reason = reason;
688 cmd->buf_ptr = kmemdup(buf, ISCSI_HDR_LEN, GFP_KERNEL);
690 pr_err("Unable to allocate memory for cmd->buf_ptr\n");
691 iscsit_free_cmd(cmd, false);
696 spin_lock_bh(&conn->cmd_lock);
697 list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
698 spin_unlock_bh(&conn->cmd_lock);
701 cmd->i_state = ISTATE_SEND_REJECT;
702 iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
704 * Perform the kref_put now if se_cmd has already been setup by
705 * scsit_setup_scsi_cmd()
707 if (cmd->se_cmd.se_tfo != NULL) {
708 pr_debug("iscsi reject: calling target_put_sess_cmd >>>>>>\n");
709 target_put_sess_cmd(conn->sess->se_sess, &cmd->se_cmd);
714 static int iscsit_add_reject_cmd(struct iscsi_cmd *cmd, u8 reason,
717 return iscsit_add_reject_from_cmd(cmd, reason, true, buf);
720 int iscsit_reject_cmd(struct iscsi_cmd *cmd, u8 reason, unsigned char *buf)
722 return iscsit_add_reject_from_cmd(cmd, reason, false, buf);
726 * Map some portion of the allocated scatterlist to an iovec, suitable for
727 * kernel sockets to copy data in/out.
729 static int iscsit_map_iovec(
730 struct iscsi_cmd *cmd,
736 struct scatterlist *sg;
737 unsigned int page_off;
740 * We know each entry in t_data_sg contains a page.
742 sg = &cmd->se_cmd.t_data_sg[data_offset / PAGE_SIZE];
743 page_off = (data_offset % PAGE_SIZE);
745 cmd->first_data_sg = sg;
746 cmd->first_data_sg_off = page_off;
748 while (data_length) {
749 u32 cur_len = min_t(u32, data_length, sg->length - page_off);
751 iov[i].iov_base = kmap(sg_page(sg)) + sg->offset + page_off;
752 iov[i].iov_len = cur_len;
754 data_length -= cur_len;
760 cmd->kmapped_nents = i;
765 static void iscsit_unmap_iovec(struct iscsi_cmd *cmd)
768 struct scatterlist *sg;
770 sg = cmd->first_data_sg;
772 for (i = 0; i < cmd->kmapped_nents; i++)
773 kunmap(sg_page(&sg[i]));
776 static void iscsit_ack_from_expstatsn(struct iscsi_conn *conn, u32 exp_statsn)
778 struct iscsi_cmd *cmd;
780 conn->exp_statsn = exp_statsn;
782 if (conn->sess->sess_ops->RDMAExtensions)
785 spin_lock_bh(&conn->cmd_lock);
786 list_for_each_entry(cmd, &conn->conn_cmd_list, i_conn_node) {
787 spin_lock(&cmd->istate_lock);
788 if ((cmd->i_state == ISTATE_SENT_STATUS) &&
789 iscsi_sna_lt(cmd->stat_sn, exp_statsn)) {
790 cmd->i_state = ISTATE_REMOVE;
791 spin_unlock(&cmd->istate_lock);
792 iscsit_add_cmd_to_immediate_queue(cmd, conn,
796 spin_unlock(&cmd->istate_lock);
798 spin_unlock_bh(&conn->cmd_lock);
801 static int iscsit_allocate_iovecs(struct iscsi_cmd *cmd)
803 u32 iov_count = max(1UL, DIV_ROUND_UP(cmd->se_cmd.data_length, PAGE_SIZE));
805 iov_count += ISCSI_IOV_DATA_BUFFER;
807 cmd->iov_data = kzalloc(iov_count * sizeof(struct kvec), GFP_KERNEL);
808 if (!cmd->iov_data) {
809 pr_err("Unable to allocate cmd->iov_data\n");
813 cmd->orig_iov_data_count = iov_count;
817 int iscsit_setup_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
820 int data_direction, payload_length;
821 struct iscsi_scsi_req *hdr;
825 spin_lock_bh(&conn->sess->session_stats_lock);
826 conn->sess->cmd_pdus++;
827 if (conn->sess->se_sess->se_node_acl) {
828 spin_lock(&conn->sess->se_sess->se_node_acl->stats_lock);
829 conn->sess->se_sess->se_node_acl->num_cmds++;
830 spin_unlock(&conn->sess->se_sess->se_node_acl->stats_lock);
832 spin_unlock_bh(&conn->sess->session_stats_lock);
834 hdr = (struct iscsi_scsi_req *) buf;
835 payload_length = ntoh24(hdr->dlength);
837 /* FIXME; Add checks for AdditionalHeaderSegment */
839 if (!(hdr->flags & ISCSI_FLAG_CMD_WRITE) &&
840 !(hdr->flags & ISCSI_FLAG_CMD_FINAL)) {
841 pr_err("ISCSI_FLAG_CMD_WRITE & ISCSI_FLAG_CMD_FINAL"
842 " not set. Bad iSCSI Initiator.\n");
843 return iscsit_add_reject_cmd(cmd,
844 ISCSI_REASON_BOOKMARK_INVALID, buf);
847 if (((hdr->flags & ISCSI_FLAG_CMD_READ) ||
848 (hdr->flags & ISCSI_FLAG_CMD_WRITE)) && !hdr->data_length) {
850 * From RFC-3720 Section 10.3.1:
852 * "Either or both of R and W MAY be 1 when either the
853 * Expected Data Transfer Length and/or Bidirectional Read
854 * Expected Data Transfer Length are 0"
856 * For this case, go ahead and clear the unnecssary bits
857 * to avoid any confusion with ->data_direction.
859 hdr->flags &= ~ISCSI_FLAG_CMD_READ;
860 hdr->flags &= ~ISCSI_FLAG_CMD_WRITE;
862 pr_warn("ISCSI_FLAG_CMD_READ or ISCSI_FLAG_CMD_WRITE"
863 " set when Expected Data Transfer Length is 0 for"
864 " CDB: 0x%02x, Fixing up flags\n", hdr->cdb[0]);
867 if (!(hdr->flags & ISCSI_FLAG_CMD_READ) &&
868 !(hdr->flags & ISCSI_FLAG_CMD_WRITE) && (hdr->data_length != 0)) {
869 pr_err("ISCSI_FLAG_CMD_READ and/or ISCSI_FLAG_CMD_WRITE"
870 " MUST be set if Expected Data Transfer Length is not 0."
871 " Bad iSCSI Initiator\n");
872 return iscsit_add_reject_cmd(cmd,
873 ISCSI_REASON_BOOKMARK_INVALID, buf);
876 if ((hdr->flags & ISCSI_FLAG_CMD_READ) &&
877 (hdr->flags & ISCSI_FLAG_CMD_WRITE)) {
878 pr_err("Bidirectional operations not supported!\n");
879 return iscsit_add_reject_cmd(cmd,
880 ISCSI_REASON_BOOKMARK_INVALID, buf);
883 if (hdr->opcode & ISCSI_OP_IMMEDIATE) {
884 pr_err("Illegally set Immediate Bit in iSCSI Initiator"
885 " Scsi Command PDU.\n");
886 return iscsit_add_reject_cmd(cmd,
887 ISCSI_REASON_BOOKMARK_INVALID, buf);
890 if (payload_length && !conn->sess->sess_ops->ImmediateData) {
891 pr_err("ImmediateData=No but DataSegmentLength=%u,"
892 " protocol error.\n", payload_length);
893 return iscsit_add_reject_cmd(cmd,
894 ISCSI_REASON_PROTOCOL_ERROR, buf);
897 if ((be32_to_cpu(hdr->data_length) == payload_length) &&
898 (!(hdr->flags & ISCSI_FLAG_CMD_FINAL))) {
899 pr_err("Expected Data Transfer Length and Length of"
900 " Immediate Data are the same, but ISCSI_FLAG_CMD_FINAL"
901 " bit is not set protocol error\n");
902 return iscsit_add_reject_cmd(cmd,
903 ISCSI_REASON_PROTOCOL_ERROR, buf);
906 if (payload_length > be32_to_cpu(hdr->data_length)) {
907 pr_err("DataSegmentLength: %u is greater than"
908 " EDTL: %u, protocol error.\n", payload_length,
910 return iscsit_add_reject_cmd(cmd,
911 ISCSI_REASON_PROTOCOL_ERROR, buf);
914 if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
915 pr_err("DataSegmentLength: %u is greater than"
916 " MaxXmitDataSegmentLength: %u, protocol error.\n",
917 payload_length, conn->conn_ops->MaxXmitDataSegmentLength);
918 return iscsit_add_reject_cmd(cmd,
919 ISCSI_REASON_PROTOCOL_ERROR, buf);
922 if (payload_length > conn->sess->sess_ops->FirstBurstLength) {
923 pr_err("DataSegmentLength: %u is greater than"
924 " FirstBurstLength: %u, protocol error.\n",
925 payload_length, conn->sess->sess_ops->FirstBurstLength);
926 return iscsit_add_reject_cmd(cmd,
927 ISCSI_REASON_BOOKMARK_INVALID, buf);
930 data_direction = (hdr->flags & ISCSI_FLAG_CMD_WRITE) ? DMA_TO_DEVICE :
931 (hdr->flags & ISCSI_FLAG_CMD_READ) ? DMA_FROM_DEVICE :
934 cmd->data_direction = data_direction;
935 iscsi_task_attr = hdr->flags & ISCSI_FLAG_CMD_ATTR_MASK;
937 * Figure out the SAM Task Attribute for the incoming SCSI CDB
939 if ((iscsi_task_attr == ISCSI_ATTR_UNTAGGED) ||
940 (iscsi_task_attr == ISCSI_ATTR_SIMPLE))
941 sam_task_attr = MSG_SIMPLE_TAG;
942 else if (iscsi_task_attr == ISCSI_ATTR_ORDERED)
943 sam_task_attr = MSG_ORDERED_TAG;
944 else if (iscsi_task_attr == ISCSI_ATTR_HEAD_OF_QUEUE)
945 sam_task_attr = MSG_HEAD_TAG;
946 else if (iscsi_task_attr == ISCSI_ATTR_ACA)
947 sam_task_attr = MSG_ACA_TAG;
949 pr_debug("Unknown iSCSI Task Attribute: 0x%02x, using"
950 " MSG_SIMPLE_TAG\n", iscsi_task_attr);
951 sam_task_attr = MSG_SIMPLE_TAG;
954 cmd->iscsi_opcode = ISCSI_OP_SCSI_CMD;
955 cmd->i_state = ISTATE_NEW_CMD;
956 cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
957 cmd->immediate_data = (payload_length) ? 1 : 0;
958 cmd->unsolicited_data = ((!(hdr->flags & ISCSI_FLAG_CMD_FINAL) &&
959 (hdr->flags & ISCSI_FLAG_CMD_WRITE)) ? 1 : 0);
960 if (cmd->unsolicited_data)
961 cmd->cmd_flags |= ICF_NON_IMMEDIATE_UNSOLICITED_DATA;
963 conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
964 if (hdr->flags & ISCSI_FLAG_CMD_READ) {
965 spin_lock_bh(&conn->sess->ttt_lock);
966 cmd->targ_xfer_tag = conn->sess->targ_xfer_tag++;
967 if (cmd->targ_xfer_tag == 0xFFFFFFFF)
968 cmd->targ_xfer_tag = conn->sess->targ_xfer_tag++;
969 spin_unlock_bh(&conn->sess->ttt_lock);
970 } else if (hdr->flags & ISCSI_FLAG_CMD_WRITE)
971 cmd->targ_xfer_tag = 0xFFFFFFFF;
972 cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
973 cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
974 cmd->first_burst_len = payload_length;
976 if (!conn->sess->sess_ops->RDMAExtensions &&
977 cmd->data_direction == DMA_FROM_DEVICE) {
978 struct iscsi_datain_req *dr;
980 dr = iscsit_allocate_datain_req();
982 return iscsit_add_reject_cmd(cmd,
983 ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
985 iscsit_attach_datain_req(cmd, dr);
989 * Initialize struct se_cmd descriptor from target_core_mod infrastructure
991 transport_init_se_cmd(&cmd->se_cmd, &lio_target_fabric_configfs->tf_ops,
992 conn->sess->se_sess, be32_to_cpu(hdr->data_length),
993 cmd->data_direction, sam_task_attr,
994 cmd->sense_buffer + 2);
996 pr_debug("Got SCSI Command, ITT: 0x%08x, CmdSN: 0x%08x,"
997 " ExpXferLen: %u, Length: %u, CID: %hu\n", hdr->itt,
998 hdr->cmdsn, be32_to_cpu(hdr->data_length), payload_length,
1001 target_get_sess_cmd(conn->sess->se_sess, &cmd->se_cmd, true);
1003 cmd->sense_reason = transport_lookup_cmd_lun(&cmd->se_cmd,
1004 scsilun_to_int(&hdr->lun));
1005 if (cmd->sense_reason)
1008 cmd->sense_reason = target_setup_cmd_from_cdb(&cmd->se_cmd, hdr->cdb);
1009 if (cmd->sense_reason) {
1010 if (cmd->sense_reason == TCM_OUT_OF_RESOURCES) {
1011 return iscsit_add_reject_cmd(cmd,
1012 ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
1018 if (iscsit_build_pdu_and_seq_lists(cmd, payload_length) < 0) {
1019 return iscsit_add_reject_cmd(cmd,
1020 ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
1024 spin_lock_bh(&conn->cmd_lock);
1025 list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
1026 spin_unlock_bh(&conn->cmd_lock);
1028 * Check if we need to delay processing because of ALUA
1029 * Active/NonOptimized primary access state..
1031 core_alua_check_nonop_delay(&cmd->se_cmd);
1035 EXPORT_SYMBOL(iscsit_setup_scsi_cmd);
1037 void iscsit_set_unsoliticed_dataout(struct iscsi_cmd *cmd)
1039 iscsit_set_dataout_sequence_values(cmd);
1041 spin_lock_bh(&cmd->dataout_timeout_lock);
1042 iscsit_start_dataout_timer(cmd, cmd->conn);
1043 spin_unlock_bh(&cmd->dataout_timeout_lock);
1045 EXPORT_SYMBOL(iscsit_set_unsoliticed_dataout);
1047 int iscsit_process_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
1048 struct iscsi_scsi_req *hdr)
1052 * Check the CmdSN against ExpCmdSN/MaxCmdSN here if
1053 * the Immediate Bit is not set, and no Immediate
1056 * A PDU/CmdSN carrying Immediate Data can only
1057 * be processed after the DataCRC has passed.
1058 * If the DataCRC fails, the CmdSN MUST NOT
1059 * be acknowledged. (See below)
1061 if (!cmd->immediate_data) {
1062 cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
1063 (unsigned char *)hdr, hdr->cmdsn);
1064 if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
1066 else if (cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
1067 target_put_sess_cmd(conn->sess->se_sess, &cmd->se_cmd);
1072 iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
1075 * If no Immediate Data is attached, it's OK to return now.
1077 if (!cmd->immediate_data) {
1078 if (!cmd->sense_reason && cmd->unsolicited_data)
1079 iscsit_set_unsoliticed_dataout(cmd);
1080 if (!cmd->sense_reason)
1083 target_put_sess_cmd(conn->sess->se_sess, &cmd->se_cmd);
1088 * Early CHECK_CONDITIONs with ImmediateData never make it to command
1089 * execution. These exceptions are processed in CmdSN order using
1090 * iscsit_check_received_cmdsn() in iscsit_get_immediate_data() below.
1092 if (cmd->sense_reason) {
1093 if (cmd->reject_reason)
1099 * Call directly into transport_generic_new_cmd() to perform
1100 * the backend memory allocation.
1102 cmd->sense_reason = transport_generic_new_cmd(&cmd->se_cmd);
1103 if (cmd->sense_reason)
1108 EXPORT_SYMBOL(iscsit_process_scsi_cmd);
1111 iscsit_get_immediate_data(struct iscsi_cmd *cmd, struct iscsi_scsi_req *hdr,
1114 struct iscsi_conn *conn = cmd->conn;
1115 int cmdsn_ret = 0, immed_ret = IMMEDIATE_DATA_NORMAL_OPERATION;
1117 * Special case for Unsupported SAM WRITE Opcodes and ImmediateData=Yes.
1119 if (dump_payload == true)
1120 goto after_immediate_data;
1122 immed_ret = iscsit_handle_immediate_data(cmd, hdr,
1123 cmd->first_burst_len);
1124 after_immediate_data:
1125 if (immed_ret == IMMEDIATE_DATA_NORMAL_OPERATION) {
1127 * A PDU/CmdSN carrying Immediate Data passed
1128 * DataCRC, check against ExpCmdSN/MaxCmdSN if
1129 * Immediate Bit is not set.
1131 cmdsn_ret = iscsit_sequence_cmd(cmd->conn, cmd,
1132 (unsigned char *)hdr, hdr->cmdsn);
1133 if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
1136 if (cmd->sense_reason || cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
1139 rc = iscsit_dump_data_payload(cmd->conn,
1140 cmd->first_burst_len, 1);
1141 target_put_sess_cmd(conn->sess->se_sess, &cmd->se_cmd);
1143 } else if (cmd->unsolicited_data)
1144 iscsit_set_unsoliticed_dataout(cmd);
1146 } else if (immed_ret == IMMEDIATE_DATA_ERL1_CRC_FAILURE) {
1148 * Immediate Data failed DataCRC and ERL>=1,
1149 * silently drop this PDU and let the initiator
1150 * plug the CmdSN gap.
1152 * FIXME: Send Unsolicited NOPIN with reserved
1153 * TTT here to help the initiator figure out
1154 * the missing CmdSN, although they should be
1155 * intelligent enough to determine the missing
1156 * CmdSN and issue a retry to plug the sequence.
1158 cmd->i_state = ISTATE_REMOVE;
1159 iscsit_add_cmd_to_immediate_queue(cmd, cmd->conn, cmd->i_state);
1160 } else /* immed_ret == IMMEDIATE_DATA_CANNOT_RECOVER */
1167 iscsit_handle_scsi_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
1170 struct iscsi_scsi_req *hdr = (struct iscsi_scsi_req *)buf;
1172 bool dump_payload = false;
1174 rc = iscsit_setup_scsi_cmd(conn, cmd, buf);
1178 * Allocation iovecs needed for struct socket operations for
1179 * traditional iSCSI block I/O.
1181 if (iscsit_allocate_iovecs(cmd) < 0) {
1182 return iscsit_add_reject_cmd(cmd,
1183 ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
1185 immed_data = cmd->immediate_data;
1187 rc = iscsit_process_scsi_cmd(conn, cmd, hdr);
1191 dump_payload = true;
1196 return iscsit_get_immediate_data(cmd, hdr, dump_payload);
1199 static u32 iscsit_do_crypto_hash_sg(
1200 struct hash_desc *hash,
1201 struct iscsi_cmd *cmd,
1209 struct scatterlist *sg;
1210 unsigned int page_off;
1212 crypto_hash_init(hash);
1214 sg = cmd->first_data_sg;
1215 page_off = cmd->first_data_sg_off;
1218 while (data_length) {
1219 u32 cur_len = min_t(u32, data_length, (sg[i].length - page_off));
1221 crypto_hash_update(hash, &sg[i], cur_len);
1223 data_length -= cur_len;
1229 struct scatterlist pad_sg;
1231 sg_init_one(&pad_sg, pad_bytes, padding);
1232 crypto_hash_update(hash, &pad_sg, padding);
1234 crypto_hash_final(hash, (u8 *) &data_crc);
1239 static void iscsit_do_crypto_hash_buf(
1240 struct hash_desc *hash,
1247 struct scatterlist sg;
1249 crypto_hash_init(hash);
1251 sg_init_one(&sg, buf, payload_length);
1252 crypto_hash_update(hash, &sg, payload_length);
1255 sg_init_one(&sg, pad_bytes, padding);
1256 crypto_hash_update(hash, &sg, padding);
1258 crypto_hash_final(hash, data_crc);
1262 iscsit_check_dataout_hdr(struct iscsi_conn *conn, unsigned char *buf,
1263 struct iscsi_cmd **out_cmd)
1265 struct iscsi_data *hdr = (struct iscsi_data *)buf;
1266 struct iscsi_cmd *cmd = NULL;
1267 struct se_cmd *se_cmd;
1268 unsigned long flags;
1269 u32 payload_length = ntoh24(hdr->dlength);
1272 if (!payload_length) {
1273 pr_err("DataOUT payload is ZERO, protocol error.\n");
1274 return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
1279 spin_lock_bh(&conn->sess->session_stats_lock);
1280 conn->sess->rx_data_octets += payload_length;
1281 if (conn->sess->se_sess->se_node_acl) {
1282 spin_lock(&conn->sess->se_sess->se_node_acl->stats_lock);
1283 conn->sess->se_sess->se_node_acl->write_bytes += payload_length;
1284 spin_unlock(&conn->sess->se_sess->se_node_acl->stats_lock);
1286 spin_unlock_bh(&conn->sess->session_stats_lock);
1288 if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
1289 pr_err("DataSegmentLength: %u is greater than"
1290 " MaxXmitDataSegmentLength: %u\n", payload_length,
1291 conn->conn_ops->MaxXmitDataSegmentLength);
1292 return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
1296 cmd = iscsit_find_cmd_from_itt_or_dump(conn, hdr->itt,
1301 pr_debug("Got DataOut ITT: 0x%08x, TTT: 0x%08x,"
1302 " DataSN: 0x%08x, Offset: %u, Length: %u, CID: %hu\n",
1303 hdr->itt, hdr->ttt, hdr->datasn, ntohl(hdr->offset),
1304 payload_length, conn->cid);
1306 if (cmd->cmd_flags & ICF_GOT_LAST_DATAOUT) {
1307 pr_err("Command ITT: 0x%08x received DataOUT after"
1308 " last DataOUT received, dumping payload\n",
1309 cmd->init_task_tag);
1310 return iscsit_dump_data_payload(conn, payload_length, 1);
1313 if (cmd->data_direction != DMA_TO_DEVICE) {
1314 pr_err("Command ITT: 0x%08x received DataOUT for a"
1315 " NON-WRITE command.\n", cmd->init_task_tag);
1316 return iscsit_dump_data_payload(conn, payload_length, 1);
1318 se_cmd = &cmd->se_cmd;
1319 iscsit_mod_dataout_timer(cmd);
1321 if ((be32_to_cpu(hdr->offset) + payload_length) > cmd->se_cmd.data_length) {
1322 pr_err("DataOut Offset: %u, Length %u greater than"
1323 " iSCSI Command EDTL %u, protocol error.\n",
1324 hdr->offset, payload_length, cmd->se_cmd.data_length);
1325 return iscsit_reject_cmd(cmd, ISCSI_REASON_BOOKMARK_INVALID, buf);
1328 if (cmd->unsolicited_data) {
1329 int dump_unsolicited_data = 0;
1331 if (conn->sess->sess_ops->InitialR2T) {
1332 pr_err("Received unexpected unsolicited data"
1333 " while InitialR2T=Yes, protocol error.\n");
1334 transport_send_check_condition_and_sense(&cmd->se_cmd,
1335 TCM_UNEXPECTED_UNSOLICITED_DATA, 0);
1339 * Special case for dealing with Unsolicited DataOUT
1340 * and Unsupported SAM WRITE Opcodes and SE resource allocation
1344 /* Something's amiss if we're not in WRITE_PENDING state... */
1345 spin_lock_irqsave(&se_cmd->t_state_lock, flags);
1346 WARN_ON(se_cmd->t_state != TRANSPORT_WRITE_PENDING);
1347 spin_unlock_irqrestore(&se_cmd->t_state_lock, flags);
1349 spin_lock_irqsave(&se_cmd->t_state_lock, flags);
1350 if (!(se_cmd->se_cmd_flags & SCF_SUPPORTED_SAM_OPCODE))
1351 dump_unsolicited_data = 1;
1352 spin_unlock_irqrestore(&se_cmd->t_state_lock, flags);
1354 if (dump_unsolicited_data) {
1356 * Check if a delayed TASK_ABORTED status needs to
1357 * be sent now if the ISCSI_FLAG_CMD_FINAL has been
1358 * received with the unsolicitied data out.
1360 if (hdr->flags & ISCSI_FLAG_CMD_FINAL)
1361 iscsit_stop_dataout_timer(cmd);
1363 transport_check_aborted_status(se_cmd,
1364 (hdr->flags & ISCSI_FLAG_CMD_FINAL));
1365 return iscsit_dump_data_payload(conn, payload_length, 1);
1369 * For the normal solicited data path:
1371 * Check for a delayed TASK_ABORTED status and dump any
1372 * incoming data out payload if one exists. Also, when the
1373 * ISCSI_FLAG_CMD_FINAL is set to denote the end of the current
1374 * data out sequence, we decrement outstanding_r2ts. Once
1375 * outstanding_r2ts reaches zero, go ahead and send the delayed
1376 * TASK_ABORTED status.
1378 if (se_cmd->transport_state & CMD_T_ABORTED) {
1379 if (hdr->flags & ISCSI_FLAG_CMD_FINAL)
1380 if (--cmd->outstanding_r2ts < 1) {
1381 iscsit_stop_dataout_timer(cmd);
1382 transport_check_aborted_status(
1386 return iscsit_dump_data_payload(conn, payload_length, 1);
1390 * Preform DataSN, DataSequenceInOrder, DataPDUInOrder, and
1391 * within-command recovery checks before receiving the payload.
1393 rc = iscsit_check_pre_dataout(cmd, buf);
1394 if (rc == DATAOUT_WITHIN_COMMAND_RECOVERY)
1396 else if (rc == DATAOUT_CANNOT_RECOVER)
1402 EXPORT_SYMBOL(iscsit_check_dataout_hdr);
1405 iscsit_get_dataout(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
1406 struct iscsi_data *hdr)
1409 u32 checksum, iov_count = 0, padding = 0, rx_got = 0, rx_size = 0;
1410 u32 payload_length = ntoh24(hdr->dlength);
1411 int iov_ret, data_crc_failed = 0;
1413 rx_size += payload_length;
1414 iov = &cmd->iov_data[0];
1416 iov_ret = iscsit_map_iovec(cmd, iov, be32_to_cpu(hdr->offset),
1421 iov_count += iov_ret;
1423 padding = ((-payload_length) & 3);
1425 iov[iov_count].iov_base = cmd->pad_bytes;
1426 iov[iov_count++].iov_len = padding;
1428 pr_debug("Receiving %u padding bytes.\n", padding);
1431 if (conn->conn_ops->DataDigest) {
1432 iov[iov_count].iov_base = &checksum;
1433 iov[iov_count++].iov_len = ISCSI_CRC_LEN;
1434 rx_size += ISCSI_CRC_LEN;
1437 rx_got = rx_data(conn, &cmd->iov_data[0], iov_count, rx_size);
1439 iscsit_unmap_iovec(cmd);
1441 if (rx_got != rx_size)
1444 if (conn->conn_ops->DataDigest) {
1447 data_crc = iscsit_do_crypto_hash_sg(&conn->conn_rx_hash, cmd,
1448 be32_to_cpu(hdr->offset),
1449 payload_length, padding,
1452 if (checksum != data_crc) {
1453 pr_err("ITT: 0x%08x, Offset: %u, Length: %u,"
1454 " DataSN: 0x%08x, CRC32C DataDigest 0x%08x"
1455 " does not match computed 0x%08x\n",
1456 hdr->itt, hdr->offset, payload_length,
1457 hdr->datasn, checksum, data_crc);
1458 data_crc_failed = 1;
1460 pr_debug("Got CRC32C DataDigest 0x%08x for"
1461 " %u bytes of Data Out\n", checksum,
1466 return data_crc_failed;
1470 iscsit_check_dataout_payload(struct iscsi_cmd *cmd, struct iscsi_data *hdr,
1471 bool data_crc_failed)
1473 struct iscsi_conn *conn = cmd->conn;
1476 * Increment post receive data and CRC values or perform
1477 * within-command recovery.
1479 rc = iscsit_check_post_dataout(cmd, (unsigned char *)hdr, data_crc_failed);
1480 if ((rc == DATAOUT_NORMAL) || (rc == DATAOUT_WITHIN_COMMAND_RECOVERY))
1482 else if (rc == DATAOUT_SEND_R2T) {
1483 iscsit_set_dataout_sequence_values(cmd);
1484 conn->conn_transport->iscsit_get_dataout(conn, cmd, false);
1485 } else if (rc == DATAOUT_SEND_TO_TRANSPORT) {
1487 * Handle extra special case for out of order
1488 * Unsolicited Data Out.
1490 spin_lock_bh(&cmd->istate_lock);
1491 ooo_cmdsn = (cmd->cmd_flags & ICF_OOO_CMDSN);
1492 cmd->cmd_flags |= ICF_GOT_LAST_DATAOUT;
1493 cmd->i_state = ISTATE_RECEIVED_LAST_DATAOUT;
1494 spin_unlock_bh(&cmd->istate_lock);
1496 iscsit_stop_dataout_timer(cmd);
1499 target_execute_cmd(&cmd->se_cmd);
1501 } else /* DATAOUT_CANNOT_RECOVER */
1506 EXPORT_SYMBOL(iscsit_check_dataout_payload);
1508 static int iscsit_handle_data_out(struct iscsi_conn *conn, unsigned char *buf)
1510 struct iscsi_cmd *cmd;
1511 struct iscsi_data *hdr = (struct iscsi_data *)buf;
1513 bool data_crc_failed = false;
1515 rc = iscsit_check_dataout_hdr(conn, buf, &cmd);
1521 rc = iscsit_get_dataout(conn, cmd, hdr);
1525 data_crc_failed = true;
1527 return iscsit_check_dataout_payload(cmd, hdr, data_crc_failed);
1530 int iscsit_handle_nop_out(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
1533 unsigned char *ping_data = NULL;
1534 int cmdsn_ret, niov = 0, ret = 0, rx_got, rx_size;
1535 u32 checksum, data_crc, padding = 0, payload_length;
1536 struct iscsi_cmd *cmd_p = NULL;
1537 struct kvec *iov = NULL;
1538 struct iscsi_nopout *hdr;
1540 hdr = (struct iscsi_nopout *) buf;
1541 payload_length = ntoh24(hdr->dlength);
1543 if (hdr->itt == RESERVED_ITT && !(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
1544 pr_err("NOPOUT ITT is reserved, but Immediate Bit is"
1545 " not set, protocol error.\n");
1547 return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
1548 (unsigned char *)hdr);
1550 return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
1551 (unsigned char *)hdr);
1554 if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
1555 pr_err("NOPOUT Ping Data DataSegmentLength: %u is"
1556 " greater than MaxXmitDataSegmentLength: %u, protocol"
1557 " error.\n", payload_length,
1558 conn->conn_ops->MaxXmitDataSegmentLength);
1560 return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
1561 (unsigned char *)hdr);
1563 return iscsit_reject_cmd(cmd, ISCSI_REASON_PROTOCOL_ERROR,
1564 (unsigned char *)hdr);
1567 pr_debug("Got NOPOUT Ping %s ITT: 0x%08x, TTT: 0x%08x,"
1568 " CmdSN: 0x%08x, ExpStatSN: 0x%08x, Length: %u\n",
1569 hdr->itt == RESERVED_ITT ? "Response" : "Request",
1570 hdr->itt, hdr->ttt, hdr->cmdsn, hdr->exp_statsn,
1573 * This is not a response to a Unsolicited NopIN, which means
1574 * it can either be a NOPOUT ping request (with a valid ITT),
1575 * or a NOPOUT not requesting a NOPIN (with a reserved ITT).
1576 * Either way, make sure we allocate an struct iscsi_cmd, as both
1577 * can contain ping data.
1579 if (hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
1581 return iscsit_reject_cmd(cmd,
1582 ISCSI_REASON_BOOKMARK_NO_RESOURCES,
1583 (unsigned char *)hdr);
1585 cmd->iscsi_opcode = ISCSI_OP_NOOP_OUT;
1586 cmd->i_state = ISTATE_SEND_NOPIN;
1587 cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ?
1589 conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
1590 cmd->targ_xfer_tag = 0xFFFFFFFF;
1591 cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
1592 cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
1593 cmd->data_direction = DMA_NONE;
1596 if (payload_length && hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
1597 rx_size = payload_length;
1598 ping_data = kzalloc(payload_length + 1, GFP_KERNEL);
1600 pr_err("Unable to allocate memory for"
1601 " NOPOUT ping data.\n");
1606 iov = &cmd->iov_misc[0];
1607 iov[niov].iov_base = ping_data;
1608 iov[niov++].iov_len = payload_length;
1610 padding = ((-payload_length) & 3);
1612 pr_debug("Receiving %u additional bytes"
1613 " for padding.\n", padding);
1614 iov[niov].iov_base = &cmd->pad_bytes;
1615 iov[niov++].iov_len = padding;
1618 if (conn->conn_ops->DataDigest) {
1619 iov[niov].iov_base = &checksum;
1620 iov[niov++].iov_len = ISCSI_CRC_LEN;
1621 rx_size += ISCSI_CRC_LEN;
1624 rx_got = rx_data(conn, &cmd->iov_misc[0], niov, rx_size);
1625 if (rx_got != rx_size) {
1630 if (conn->conn_ops->DataDigest) {
1631 iscsit_do_crypto_hash_buf(&conn->conn_rx_hash,
1632 ping_data, payload_length,
1633 padding, cmd->pad_bytes,
1636 if (checksum != data_crc) {
1637 pr_err("Ping data CRC32C DataDigest"
1638 " 0x%08x does not match computed 0x%08x\n",
1639 checksum, data_crc);
1640 if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
1641 pr_err("Unable to recover from"
1642 " NOPOUT Ping DataCRC failure while in"
1648 * Silently drop this PDU and let the
1649 * initiator plug the CmdSN gap.
1651 pr_debug("Dropping NOPOUT"
1652 " Command CmdSN: 0x%08x due to"
1653 " DataCRC error.\n", hdr->cmdsn);
1658 pr_debug("Got CRC32C DataDigest"
1659 " 0x%08x for %u bytes of ping data.\n",
1660 checksum, payload_length);
1664 ping_data[payload_length] = '\0';
1666 * Attach ping data to struct iscsi_cmd->buf_ptr.
1668 cmd->buf_ptr = ping_data;
1669 cmd->buf_ptr_size = payload_length;
1671 pr_debug("Got %u bytes of NOPOUT ping"
1672 " data.\n", payload_length);
1673 pr_debug("Ping Data: \"%s\"\n", ping_data);
1676 if (hdr->itt != RESERVED_ITT) {
1678 pr_err("Checking CmdSN for NOPOUT,"
1679 " but cmd is NULL!\n");
1683 * Initiator is expecting a NopIN ping reply,
1685 spin_lock_bh(&conn->cmd_lock);
1686 list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
1687 spin_unlock_bh(&conn->cmd_lock);
1689 iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
1691 if (hdr->opcode & ISCSI_OP_IMMEDIATE) {
1692 iscsit_add_cmd_to_response_queue(cmd, conn,
1697 cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
1698 (unsigned char *)hdr, hdr->cmdsn);
1699 if (cmdsn_ret == CMDSN_LOWER_THAN_EXP) {
1703 if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
1709 if (hdr->ttt != cpu_to_be32(0xFFFFFFFF)) {
1711 * This was a response to a unsolicited NOPIN ping.
1713 cmd_p = iscsit_find_cmd_from_ttt(conn, be32_to_cpu(hdr->ttt));
1717 iscsit_stop_nopin_response_timer(conn);
1719 cmd_p->i_state = ISTATE_REMOVE;
1720 iscsit_add_cmd_to_immediate_queue(cmd_p, conn, cmd_p->i_state);
1721 iscsit_start_nopin_timer(conn);
1724 * Initiator is not expecting a NOPIN is response.
1725 * Just ignore for now.
1727 * iSCSI v19-91 10.18
1728 * "A NOP-OUT may also be used to confirm a changed
1729 * ExpStatSN if another PDU will not be available
1739 iscsit_free_cmd(cmd, false);
1744 EXPORT_SYMBOL(iscsit_handle_nop_out);
1747 iscsit_handle_task_mgt_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
1750 struct se_tmr_req *se_tmr;
1751 struct iscsi_tmr_req *tmr_req;
1752 struct iscsi_tm *hdr;
1753 int out_of_order_cmdsn = 0, ret;
1754 bool sess_ref = false;
1757 hdr = (struct iscsi_tm *) buf;
1758 hdr->flags &= ~ISCSI_FLAG_CMD_FINAL;
1759 function = hdr->flags;
1761 pr_debug("Got Task Management Request ITT: 0x%08x, CmdSN:"
1762 " 0x%08x, Function: 0x%02x, RefTaskTag: 0x%08x, RefCmdSN:"
1763 " 0x%08x, CID: %hu\n", hdr->itt, hdr->cmdsn, function,
1764 hdr->rtt, hdr->refcmdsn, conn->cid);
1766 if ((function != ISCSI_TM_FUNC_ABORT_TASK) &&
1767 ((function != ISCSI_TM_FUNC_TASK_REASSIGN) &&
1768 hdr->rtt != RESERVED_ITT)) {
1769 pr_err("RefTaskTag should be set to 0xFFFFFFFF.\n");
1770 hdr->rtt = RESERVED_ITT;
1773 if ((function == ISCSI_TM_FUNC_TASK_REASSIGN) &&
1774 !(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
1775 pr_err("Task Management Request TASK_REASSIGN not"
1776 " issued as immediate command, bad iSCSI Initiator"
1777 "implementation\n");
1778 return iscsit_add_reject_cmd(cmd,
1779 ISCSI_REASON_PROTOCOL_ERROR, buf);
1781 if ((function != ISCSI_TM_FUNC_ABORT_TASK) &&
1782 be32_to_cpu(hdr->refcmdsn) != ISCSI_RESERVED_TAG)
1783 hdr->refcmdsn = cpu_to_be32(ISCSI_RESERVED_TAG);
1785 cmd->data_direction = DMA_NONE;
1787 cmd->tmr_req = kzalloc(sizeof(struct iscsi_tmr_req), GFP_KERNEL);
1788 if (!cmd->tmr_req) {
1789 pr_err("Unable to allocate memory for"
1790 " Task Management command!\n");
1791 return iscsit_add_reject_cmd(cmd,
1792 ISCSI_REASON_BOOKMARK_NO_RESOURCES,
1797 * TASK_REASSIGN for ERL=2 / connection stays inside of
1798 * LIO-Target $FABRIC_MOD
1800 if (function != ISCSI_TM_FUNC_TASK_REASSIGN) {
1805 transport_init_se_cmd(&cmd->se_cmd,
1806 &lio_target_fabric_configfs->tf_ops,
1807 conn->sess->se_sess, 0, DMA_NONE,
1808 MSG_SIMPLE_TAG, cmd->sense_buffer + 2);
1810 target_get_sess_cmd(conn->sess->se_sess, &cmd->se_cmd, true);
1814 case ISCSI_TM_FUNC_ABORT_TASK:
1815 tcm_function = TMR_ABORT_TASK;
1817 case ISCSI_TM_FUNC_ABORT_TASK_SET:
1818 tcm_function = TMR_ABORT_TASK_SET;
1820 case ISCSI_TM_FUNC_CLEAR_ACA:
1821 tcm_function = TMR_CLEAR_ACA;
1823 case ISCSI_TM_FUNC_CLEAR_TASK_SET:
1824 tcm_function = TMR_CLEAR_TASK_SET;
1826 case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET:
1827 tcm_function = TMR_LUN_RESET;
1829 case ISCSI_TM_FUNC_TARGET_WARM_RESET:
1830 tcm_function = TMR_TARGET_WARM_RESET;
1832 case ISCSI_TM_FUNC_TARGET_COLD_RESET:
1833 tcm_function = TMR_TARGET_COLD_RESET;
1836 pr_err("Unknown iSCSI TMR Function:"
1837 " 0x%02x\n", function);
1838 return iscsit_add_reject_cmd(cmd,
1839 ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
1842 ret = core_tmr_alloc_req(&cmd->se_cmd, cmd->tmr_req,
1843 tcm_function, GFP_KERNEL);
1845 return iscsit_add_reject_cmd(cmd,
1846 ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
1848 cmd->tmr_req->se_tmr_req = cmd->se_cmd.se_tmr_req;
1851 cmd->iscsi_opcode = ISCSI_OP_SCSI_TMFUNC;
1852 cmd->i_state = ISTATE_SEND_TASKMGTRSP;
1853 cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
1854 cmd->init_task_tag = hdr->itt;
1855 cmd->targ_xfer_tag = 0xFFFFFFFF;
1856 cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
1857 cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
1858 se_tmr = cmd->se_cmd.se_tmr_req;
1859 tmr_req = cmd->tmr_req;
1861 * Locate the struct se_lun for all TMRs not related to ERL=2 TASK_REASSIGN
1863 if (function != ISCSI_TM_FUNC_TASK_REASSIGN) {
1864 ret = transport_lookup_tmr_lun(&cmd->se_cmd,
1865 scsilun_to_int(&hdr->lun));
1867 se_tmr->response = ISCSI_TMF_RSP_NO_LUN;
1873 case ISCSI_TM_FUNC_ABORT_TASK:
1874 se_tmr->response = iscsit_tmr_abort_task(cmd, buf);
1875 if (se_tmr->response)
1878 case ISCSI_TM_FUNC_ABORT_TASK_SET:
1879 case ISCSI_TM_FUNC_CLEAR_ACA:
1880 case ISCSI_TM_FUNC_CLEAR_TASK_SET:
1881 case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET:
1883 case ISCSI_TM_FUNC_TARGET_WARM_RESET:
1884 if (iscsit_tmr_task_warm_reset(conn, tmr_req, buf) < 0) {
1885 se_tmr->response = ISCSI_TMF_RSP_AUTH_FAILED;
1889 case ISCSI_TM_FUNC_TARGET_COLD_RESET:
1890 if (iscsit_tmr_task_cold_reset(conn, tmr_req, buf) < 0) {
1891 se_tmr->response = ISCSI_TMF_RSP_AUTH_FAILED;
1895 case ISCSI_TM_FUNC_TASK_REASSIGN:
1896 se_tmr->response = iscsit_tmr_task_reassign(cmd, buf);
1898 * Perform sanity checks on the ExpDataSN only if the
1899 * TASK_REASSIGN was successful.
1901 if (se_tmr->response)
1904 if (iscsit_check_task_reassign_expdatasn(tmr_req, conn) < 0)
1905 return iscsit_add_reject_cmd(cmd,
1906 ISCSI_REASON_BOOKMARK_INVALID, buf);
1909 pr_err("Unknown TMR function: 0x%02x, protocol"
1910 " error.\n", function);
1911 se_tmr->response = ISCSI_TMF_RSP_NOT_SUPPORTED;
1915 if ((function != ISCSI_TM_FUNC_TASK_REASSIGN) &&
1916 (se_tmr->response == ISCSI_TMF_RSP_COMPLETE))
1917 se_tmr->call_transport = 1;
1919 spin_lock_bh(&conn->cmd_lock);
1920 list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
1921 spin_unlock_bh(&conn->cmd_lock);
1923 if (!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
1924 int cmdsn_ret = iscsit_sequence_cmd(conn, cmd, buf, hdr->cmdsn);
1925 if (cmdsn_ret == CMDSN_HIGHER_THAN_EXP)
1926 out_of_order_cmdsn = 1;
1927 else if (cmdsn_ret == CMDSN_LOWER_THAN_EXP)
1929 else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
1932 iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
1934 if (out_of_order_cmdsn || !(hdr->opcode & ISCSI_OP_IMMEDIATE))
1937 * Found the referenced task, send to transport for processing.
1939 if (se_tmr->call_transport)
1940 return transport_generic_handle_tmr(&cmd->se_cmd);
1943 * Could not find the referenced LUN, task, or Task Management
1944 * command not authorized or supported. Change state and
1945 * let the tx_thread send the response.
1947 * For connection recovery, this is also the default action for
1948 * TMR TASK_REASSIGN.
1951 pr_debug("Handle TMR, using sess_ref=true check\n");
1952 target_put_sess_cmd(conn->sess->se_sess, &cmd->se_cmd);
1955 iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
1958 EXPORT_SYMBOL(iscsit_handle_task_mgt_cmd);
1960 /* #warning FIXME: Support Text Command parameters besides SendTargets */
1961 static int iscsit_handle_text_cmd(
1962 struct iscsi_conn *conn,
1965 char *text_ptr, *text_in;
1966 int cmdsn_ret, niov = 0, rx_got, rx_size;
1967 u32 checksum = 0, data_crc = 0, payload_length;
1968 u32 padding = 0, pad_bytes = 0, text_length = 0;
1969 struct iscsi_cmd *cmd;
1971 struct iscsi_text *hdr;
1973 hdr = (struct iscsi_text *) buf;
1974 payload_length = ntoh24(hdr->dlength);
1976 if (payload_length > conn->conn_ops->MaxXmitDataSegmentLength) {
1977 pr_err("Unable to accept text parameter length: %u"
1978 "greater than MaxXmitDataSegmentLength %u.\n",
1979 payload_length, conn->conn_ops->MaxXmitDataSegmentLength);
1980 return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR, buf);
1983 pr_debug("Got Text Request: ITT: 0x%08x, CmdSN: 0x%08x,"
1984 " ExpStatSN: 0x%08x, Length: %u\n", hdr->itt, hdr->cmdsn,
1985 hdr->exp_statsn, payload_length);
1987 rx_size = text_length = payload_length;
1989 text_in = kzalloc(text_length, GFP_KERNEL);
1991 pr_err("Unable to allocate memory for"
1992 " incoming text parameters\n");
1996 memset(iov, 0, 3 * sizeof(struct kvec));
1997 iov[niov].iov_base = text_in;
1998 iov[niov++].iov_len = text_length;
2000 padding = ((-payload_length) & 3);
2002 iov[niov].iov_base = &pad_bytes;
2003 iov[niov++].iov_len = padding;
2005 pr_debug("Receiving %u additional bytes"
2006 " for padding.\n", padding);
2008 if (conn->conn_ops->DataDigest) {
2009 iov[niov].iov_base = &checksum;
2010 iov[niov++].iov_len = ISCSI_CRC_LEN;
2011 rx_size += ISCSI_CRC_LEN;
2014 rx_got = rx_data(conn, &iov[0], niov, rx_size);
2015 if (rx_got != rx_size) {
2020 if (conn->conn_ops->DataDigest) {
2021 iscsit_do_crypto_hash_buf(&conn->conn_rx_hash,
2022 text_in, text_length,
2023 padding, (u8 *)&pad_bytes,
2026 if (checksum != data_crc) {
2027 pr_err("Text data CRC32C DataDigest"
2028 " 0x%08x does not match computed"
2029 " 0x%08x\n", checksum, data_crc);
2030 if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
2031 pr_err("Unable to recover from"
2032 " Text Data digest failure while in"
2038 * Silently drop this PDU and let the
2039 * initiator plug the CmdSN gap.
2041 pr_debug("Dropping Text"
2042 " Command CmdSN: 0x%08x due to"
2043 " DataCRC error.\n", hdr->cmdsn);
2048 pr_debug("Got CRC32C DataDigest"
2049 " 0x%08x for %u bytes of text data.\n",
2050 checksum, text_length);
2053 text_in[text_length - 1] = '\0';
2054 pr_debug("Successfully read %d bytes of text"
2055 " data.\n", text_length);
2057 if (strncmp("SendTargets", text_in, 11) != 0) {
2058 pr_err("Received Text Data that is not"
2059 " SendTargets, cannot continue.\n");
2063 text_ptr = strchr(text_in, '=');
2065 pr_err("No \"=\" separator found in Text Data,"
2066 " cannot continue.\n");
2070 if (strncmp("=All", text_ptr, 4) != 0) {
2071 pr_err("Unable to locate All value for"
2072 " SendTargets key, cannot continue.\n");
2076 /*#warning Support SendTargets=(iSCSI Target Name/Nothing) values. */
2080 cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
2082 return iscsit_add_reject(conn,
2083 ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
2085 cmd->iscsi_opcode = ISCSI_OP_TEXT;
2086 cmd->i_state = ISTATE_SEND_TEXTRSP;
2087 cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
2088 conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
2089 cmd->targ_xfer_tag = 0xFFFFFFFF;
2090 cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
2091 cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
2092 cmd->data_direction = DMA_NONE;
2094 spin_lock_bh(&conn->cmd_lock);
2095 list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
2096 spin_unlock_bh(&conn->cmd_lock);
2098 iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
2100 if (!(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
2101 cmdsn_ret = iscsit_sequence_cmd(conn, cmd,
2102 (unsigned char *)hdr, hdr->cmdsn);
2103 if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
2109 return iscsit_execute_cmd(cmd, 0);
2112 int iscsit_logout_closesession(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
2114 struct iscsi_conn *conn_p;
2115 struct iscsi_session *sess = conn->sess;
2117 pr_debug("Received logout request CLOSESESSION on CID: %hu"
2118 " for SID: %u.\n", conn->cid, conn->sess->sid);
2120 atomic_set(&sess->session_logout, 1);
2121 atomic_set(&conn->conn_logout_remove, 1);
2122 conn->conn_logout_reason = ISCSI_LOGOUT_REASON_CLOSE_SESSION;
2124 iscsit_inc_conn_usage_count(conn);
2125 iscsit_inc_session_usage_count(sess);
2127 spin_lock_bh(&sess->conn_lock);
2128 list_for_each_entry(conn_p, &sess->sess_conn_list, conn_list) {
2129 if (conn_p->conn_state != TARG_CONN_STATE_LOGGED_IN)
2132 pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
2133 conn_p->conn_state = TARG_CONN_STATE_IN_LOGOUT;
2135 spin_unlock_bh(&sess->conn_lock);
2137 iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
2142 int iscsit_logout_closeconnection(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
2144 struct iscsi_conn *l_conn;
2145 struct iscsi_session *sess = conn->sess;
2147 pr_debug("Received logout request CLOSECONNECTION for CID:"
2148 " %hu on CID: %hu.\n", cmd->logout_cid, conn->cid);
2151 * A Logout Request with a CLOSECONNECTION reason code for a CID
2152 * can arrive on a connection with a differing CID.
2154 if (conn->cid == cmd->logout_cid) {
2155 spin_lock_bh(&conn->state_lock);
2156 pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
2157 conn->conn_state = TARG_CONN_STATE_IN_LOGOUT;
2159 atomic_set(&conn->conn_logout_remove, 1);
2160 conn->conn_logout_reason = ISCSI_LOGOUT_REASON_CLOSE_CONNECTION;
2161 iscsit_inc_conn_usage_count(conn);
2163 spin_unlock_bh(&conn->state_lock);
2166 * Handle all different cid CLOSECONNECTION requests in
2167 * iscsit_logout_post_handler_diffcid() as to give enough
2168 * time for any non immediate command's CmdSN to be
2169 * acknowledged on the connection in question.
2171 * Here we simply make sure the CID is still around.
2173 l_conn = iscsit_get_conn_from_cid(sess,
2176 cmd->logout_response = ISCSI_LOGOUT_CID_NOT_FOUND;
2177 iscsit_add_cmd_to_response_queue(cmd, conn,
2182 iscsit_dec_conn_usage_count(l_conn);
2185 iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
2190 int iscsit_logout_removeconnforrecovery(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
2192 struct iscsi_session *sess = conn->sess;
2194 pr_debug("Received explicit REMOVECONNFORRECOVERY logout for"
2195 " CID: %hu on CID: %hu.\n", cmd->logout_cid, conn->cid);
2197 if (sess->sess_ops->ErrorRecoveryLevel != 2) {
2198 pr_err("Received Logout Request REMOVECONNFORRECOVERY"
2199 " while ERL!=2.\n");
2200 cmd->logout_response = ISCSI_LOGOUT_RECOVERY_UNSUPPORTED;
2201 iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
2205 if (conn->cid == cmd->logout_cid) {
2206 pr_err("Received Logout Request REMOVECONNFORRECOVERY"
2207 " with CID: %hu on CID: %hu, implementation error.\n",
2208 cmd->logout_cid, conn->cid);
2209 cmd->logout_response = ISCSI_LOGOUT_CLEANUP_FAILED;
2210 iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
2214 iscsit_add_cmd_to_response_queue(cmd, conn, cmd->i_state);
2220 iscsit_handle_logout_cmd(struct iscsi_conn *conn, struct iscsi_cmd *cmd,
2223 int cmdsn_ret, logout_remove = 0;
2225 struct iscsi_logout *hdr;
2226 struct iscsi_tiqn *tiqn = iscsit_snmp_get_tiqn(conn);
2228 hdr = (struct iscsi_logout *) buf;
2229 reason_code = (hdr->flags & 0x7f);
2232 spin_lock(&tiqn->logout_stats.lock);
2233 if (reason_code == ISCSI_LOGOUT_REASON_CLOSE_SESSION)
2234 tiqn->logout_stats.normal_logouts++;
2236 tiqn->logout_stats.abnormal_logouts++;
2237 spin_unlock(&tiqn->logout_stats.lock);
2240 pr_debug("Got Logout Request ITT: 0x%08x CmdSN: 0x%08x"
2241 " ExpStatSN: 0x%08x Reason: 0x%02x CID: %hu on CID: %hu\n",
2242 hdr->itt, hdr->cmdsn, hdr->exp_statsn, reason_code,
2243 hdr->cid, conn->cid);
2245 if (conn->conn_state != TARG_CONN_STATE_LOGGED_IN) {
2246 pr_err("Received logout request on connection that"
2247 " is not in logged in state, ignoring request.\n");
2248 iscsit_free_cmd(cmd, false);
2252 cmd->iscsi_opcode = ISCSI_OP_LOGOUT;
2253 cmd->i_state = ISTATE_SEND_LOGOUTRSP;
2254 cmd->immediate_cmd = ((hdr->opcode & ISCSI_OP_IMMEDIATE) ? 1 : 0);
2255 conn->sess->init_task_tag = cmd->init_task_tag = hdr->itt;
2256 cmd->targ_xfer_tag = 0xFFFFFFFF;
2257 cmd->cmd_sn = be32_to_cpu(hdr->cmdsn);
2258 cmd->exp_stat_sn = be32_to_cpu(hdr->exp_statsn);
2259 cmd->logout_cid = be16_to_cpu(hdr->cid);
2260 cmd->logout_reason = reason_code;
2261 cmd->data_direction = DMA_NONE;
2264 * We need to sleep in these cases (by returning 1) until the Logout
2265 * Response gets sent in the tx thread.
2267 if ((reason_code == ISCSI_LOGOUT_REASON_CLOSE_SESSION) ||
2268 ((reason_code == ISCSI_LOGOUT_REASON_CLOSE_CONNECTION) &&
2269 be16_to_cpu(hdr->cid) == conn->cid))
2272 spin_lock_bh(&conn->cmd_lock);
2273 list_add_tail(&cmd->i_conn_node, &conn->conn_cmd_list);
2274 spin_unlock_bh(&conn->cmd_lock);
2276 if (reason_code != ISCSI_LOGOUT_REASON_RECOVERY)
2277 iscsit_ack_from_expstatsn(conn, be32_to_cpu(hdr->exp_statsn));
2280 * Immediate commands are executed, well, immediately.
2281 * Non-Immediate Logout Commands are executed in CmdSN order.
2283 if (cmd->immediate_cmd) {
2284 int ret = iscsit_execute_cmd(cmd, 0);
2289 cmdsn_ret = iscsit_sequence_cmd(conn, cmd, buf, hdr->cmdsn);
2290 if (cmdsn_ret == CMDSN_LOWER_THAN_EXP)
2292 else if (cmdsn_ret == CMDSN_ERROR_CANNOT_RECOVER)
2296 return logout_remove;
2298 EXPORT_SYMBOL(iscsit_handle_logout_cmd);
2300 static int iscsit_handle_snack(
2301 struct iscsi_conn *conn,
2304 struct iscsi_snack *hdr;
2306 hdr = (struct iscsi_snack *) buf;
2307 hdr->flags &= ~ISCSI_FLAG_CMD_FINAL;
2309 pr_debug("Got ISCSI_INIT_SNACK, ITT: 0x%08x, ExpStatSN:"
2310 " 0x%08x, Type: 0x%02x, BegRun: 0x%08x, RunLength: 0x%08x,"
2311 " CID: %hu\n", hdr->itt, hdr->exp_statsn, hdr->flags,
2312 hdr->begrun, hdr->runlength, conn->cid);
2314 if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
2315 pr_err("Initiator sent SNACK request while in"
2316 " ErrorRecoveryLevel=0.\n");
2317 return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
2321 * SNACK_DATA and SNACK_R2T are both 0, so check which function to
2322 * call from inside iscsi_send_recovery_datain_or_r2t().
2324 switch (hdr->flags & ISCSI_FLAG_SNACK_TYPE_MASK) {
2326 return iscsit_handle_recovery_datain_or_r2t(conn, buf,
2328 be32_to_cpu(hdr->ttt),
2329 be32_to_cpu(hdr->begrun),
2330 be32_to_cpu(hdr->runlength));
2331 case ISCSI_FLAG_SNACK_TYPE_STATUS:
2332 return iscsit_handle_status_snack(conn, hdr->itt,
2333 be32_to_cpu(hdr->ttt),
2334 be32_to_cpu(hdr->begrun), be32_to_cpu(hdr->runlength));
2335 case ISCSI_FLAG_SNACK_TYPE_DATA_ACK:
2336 return iscsit_handle_data_ack(conn, be32_to_cpu(hdr->ttt),
2337 be32_to_cpu(hdr->begrun),
2338 be32_to_cpu(hdr->runlength));
2339 case ISCSI_FLAG_SNACK_TYPE_RDATA:
2340 /* FIXME: Support R-Data SNACK */
2341 pr_err("R-Data SNACK Not Supported.\n");
2342 return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
2345 pr_err("Unknown SNACK type 0x%02x, protocol"
2346 " error.\n", hdr->flags & 0x0f);
2347 return iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
2354 static void iscsit_rx_thread_wait_for_tcp(struct iscsi_conn *conn)
2356 if ((conn->sock->sk->sk_shutdown & SEND_SHUTDOWN) ||
2357 (conn->sock->sk->sk_shutdown & RCV_SHUTDOWN)) {
2358 wait_for_completion_interruptible_timeout(
2359 &conn->rx_half_close_comp,
2360 ISCSI_RX_THREAD_TCP_TIMEOUT * HZ);
2364 static int iscsit_handle_immediate_data(
2365 struct iscsi_cmd *cmd,
2366 struct iscsi_scsi_req *hdr,
2369 int iov_ret, rx_got = 0, rx_size = 0;
2370 u32 checksum, iov_count = 0, padding = 0;
2371 struct iscsi_conn *conn = cmd->conn;
2374 iov_ret = iscsit_map_iovec(cmd, cmd->iov_data, cmd->write_data_done, length);
2376 return IMMEDIATE_DATA_CANNOT_RECOVER;
2379 iov_count = iov_ret;
2380 iov = &cmd->iov_data[0];
2382 padding = ((-length) & 3);
2384 iov[iov_count].iov_base = cmd->pad_bytes;
2385 iov[iov_count++].iov_len = padding;
2389 if (conn->conn_ops->DataDigest) {
2390 iov[iov_count].iov_base = &checksum;
2391 iov[iov_count++].iov_len = ISCSI_CRC_LEN;
2392 rx_size += ISCSI_CRC_LEN;
2395 rx_got = rx_data(conn, &cmd->iov_data[0], iov_count, rx_size);
2397 iscsit_unmap_iovec(cmd);
2399 if (rx_got != rx_size) {
2400 iscsit_rx_thread_wait_for_tcp(conn);
2401 return IMMEDIATE_DATA_CANNOT_RECOVER;
2404 if (conn->conn_ops->DataDigest) {
2407 data_crc = iscsit_do_crypto_hash_sg(&conn->conn_rx_hash, cmd,
2408 cmd->write_data_done, length, padding,
2411 if (checksum != data_crc) {
2412 pr_err("ImmediateData CRC32C DataDigest 0x%08x"
2413 " does not match computed 0x%08x\n", checksum,
2416 if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
2417 pr_err("Unable to recover from"
2418 " Immediate Data digest failure while"
2420 iscsit_reject_cmd(cmd,
2421 ISCSI_REASON_DATA_DIGEST_ERROR,
2422 (unsigned char *)hdr);
2423 return IMMEDIATE_DATA_CANNOT_RECOVER;
2425 iscsit_reject_cmd(cmd,
2426 ISCSI_REASON_DATA_DIGEST_ERROR,
2427 (unsigned char *)hdr);
2428 return IMMEDIATE_DATA_ERL1_CRC_FAILURE;
2431 pr_debug("Got CRC32C DataDigest 0x%08x for"
2432 " %u bytes of Immediate Data\n", checksum,
2437 cmd->write_data_done += length;
2439 if (cmd->write_data_done == cmd->se_cmd.data_length) {
2440 spin_lock_bh(&cmd->istate_lock);
2441 cmd->cmd_flags |= ICF_GOT_LAST_DATAOUT;
2442 cmd->i_state = ISTATE_RECEIVED_LAST_DATAOUT;
2443 spin_unlock_bh(&cmd->istate_lock);
2446 return IMMEDIATE_DATA_NORMAL_OPERATION;
2450 * Called with sess->conn_lock held.
2452 /* #warning iscsi_build_conn_drop_async_message() only sends out on connections
2453 with active network interface */
2454 static void iscsit_build_conn_drop_async_message(struct iscsi_conn *conn)
2456 struct iscsi_cmd *cmd;
2457 struct iscsi_conn *conn_p;
2461 * Only send a Asynchronous Message on connections whos network
2462 * interface is still functional.
2464 list_for_each_entry(conn_p, &conn->sess->sess_conn_list, conn_list) {
2465 if (conn_p->conn_state == TARG_CONN_STATE_LOGGED_IN) {
2466 iscsit_inc_conn_usage_count(conn_p);
2475 cmd = iscsit_allocate_cmd(conn_p, GFP_ATOMIC);
2477 iscsit_dec_conn_usage_count(conn_p);
2481 cmd->logout_cid = conn->cid;
2482 cmd->iscsi_opcode = ISCSI_OP_ASYNC_EVENT;
2483 cmd->i_state = ISTATE_SEND_ASYNCMSG;
2485 spin_lock_bh(&conn_p->cmd_lock);
2486 list_add_tail(&cmd->i_conn_node, &conn_p->conn_cmd_list);
2487 spin_unlock_bh(&conn_p->cmd_lock);
2489 iscsit_add_cmd_to_response_queue(cmd, conn_p, cmd->i_state);
2490 iscsit_dec_conn_usage_count(conn_p);
2493 static int iscsit_send_conn_drop_async_message(
2494 struct iscsi_cmd *cmd,
2495 struct iscsi_conn *conn)
2497 struct iscsi_async *hdr;
2499 cmd->tx_size = ISCSI_HDR_LEN;
2500 cmd->iscsi_opcode = ISCSI_OP_ASYNC_EVENT;
2502 hdr = (struct iscsi_async *) cmd->pdu;
2503 hdr->opcode = ISCSI_OP_ASYNC_EVENT;
2504 hdr->flags = ISCSI_FLAG_CMD_FINAL;
2505 cmd->init_task_tag = RESERVED_ITT;
2506 cmd->targ_xfer_tag = 0xFFFFFFFF;
2507 put_unaligned_be64(0xFFFFFFFFFFFFFFFFULL, &hdr->rsvd4[0]);
2508 cmd->stat_sn = conn->stat_sn++;
2509 hdr->statsn = cpu_to_be32(cmd->stat_sn);
2510 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
2511 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
2512 hdr->async_event = ISCSI_ASYNC_MSG_DROPPING_CONNECTION;
2513 hdr->param1 = cpu_to_be16(cmd->logout_cid);
2514 hdr->param2 = cpu_to_be16(conn->sess->sess_ops->DefaultTime2Wait);
2515 hdr->param3 = cpu_to_be16(conn->sess->sess_ops->DefaultTime2Retain);
2517 if (conn->conn_ops->HeaderDigest) {
2518 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
2520 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, hdr,
2521 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
2523 cmd->tx_size += ISCSI_CRC_LEN;
2524 pr_debug("Attaching CRC32C HeaderDigest to"
2525 " Async Message 0x%08x\n", *header_digest);
2528 cmd->iov_misc[0].iov_base = cmd->pdu;
2529 cmd->iov_misc[0].iov_len = cmd->tx_size;
2530 cmd->iov_misc_count = 1;
2532 pr_debug("Sending Connection Dropped Async Message StatSN:"
2533 " 0x%08x, for CID: %hu on CID: %hu\n", cmd->stat_sn,
2534 cmd->logout_cid, conn->cid);
2538 static void iscsit_tx_thread_wait_for_tcp(struct iscsi_conn *conn)
2540 if ((conn->sock->sk->sk_shutdown & SEND_SHUTDOWN) ||
2541 (conn->sock->sk->sk_shutdown & RCV_SHUTDOWN)) {
2542 wait_for_completion_interruptible_timeout(
2543 &conn->tx_half_close_comp,
2544 ISCSI_TX_THREAD_TCP_TIMEOUT * HZ);
2549 iscsit_build_datain_pdu(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
2550 struct iscsi_datain *datain, struct iscsi_data_rsp *hdr,
2553 hdr->opcode = ISCSI_OP_SCSI_DATA_IN;
2554 hdr->flags = datain->flags;
2555 if (hdr->flags & ISCSI_FLAG_DATA_STATUS) {
2556 if (cmd->se_cmd.se_cmd_flags & SCF_OVERFLOW_BIT) {
2557 hdr->flags |= ISCSI_FLAG_DATA_OVERFLOW;
2558 hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
2559 } else if (cmd->se_cmd.se_cmd_flags & SCF_UNDERFLOW_BIT) {
2560 hdr->flags |= ISCSI_FLAG_DATA_UNDERFLOW;
2561 hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
2564 hton24(hdr->dlength, datain->length);
2565 if (hdr->flags & ISCSI_FLAG_DATA_ACK)
2566 int_to_scsilun(cmd->se_cmd.orig_fe_lun,
2567 (struct scsi_lun *)&hdr->lun);
2569 put_unaligned_le64(0xFFFFFFFFFFFFFFFFULL, &hdr->lun);
2571 hdr->itt = cmd->init_task_tag;
2573 if (hdr->flags & ISCSI_FLAG_DATA_ACK)
2574 hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
2576 hdr->ttt = cpu_to_be32(0xFFFFFFFF);
2578 hdr->statsn = cpu_to_be32(cmd->stat_sn);
2580 hdr->statsn = cpu_to_be32(0xFFFFFFFF);
2582 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
2583 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
2584 hdr->datasn = cpu_to_be32(datain->data_sn);
2585 hdr->offset = cpu_to_be32(datain->offset);
2587 pr_debug("Built DataIN ITT: 0x%08x, StatSN: 0x%08x,"
2588 " DataSN: 0x%08x, Offset: %u, Length: %u, CID: %hu\n",
2589 cmd->init_task_tag, ntohl(hdr->statsn), ntohl(hdr->datasn),
2590 ntohl(hdr->offset), datain->length, conn->cid);
2593 static int iscsit_send_datain(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
2595 struct iscsi_data_rsp *hdr = (struct iscsi_data_rsp *)&cmd->pdu[0];
2596 struct iscsi_datain datain;
2597 struct iscsi_datain_req *dr;
2599 u32 iov_count = 0, tx_size = 0;
2600 int eodr = 0, ret, iov_ret;
2601 bool set_statsn = false;
2603 memset(&datain, 0, sizeof(struct iscsi_datain));
2604 dr = iscsit_get_datain_values(cmd, &datain);
2606 pr_err("iscsit_get_datain_values failed for ITT: 0x%08x\n",
2607 cmd->init_task_tag);
2611 * Be paranoid and double check the logic for now.
2613 if ((datain.offset + datain.length) > cmd->se_cmd.data_length) {
2614 pr_err("Command ITT: 0x%08x, datain.offset: %u and"
2615 " datain.length: %u exceeds cmd->data_length: %u\n",
2616 cmd->init_task_tag, datain.offset, datain.length,
2617 cmd->se_cmd.data_length);
2621 spin_lock_bh(&conn->sess->session_stats_lock);
2622 conn->sess->tx_data_octets += datain.length;
2623 if (conn->sess->se_sess->se_node_acl) {
2624 spin_lock(&conn->sess->se_sess->se_node_acl->stats_lock);
2625 conn->sess->se_sess->se_node_acl->read_bytes += datain.length;
2626 spin_unlock(&conn->sess->se_sess->se_node_acl->stats_lock);
2628 spin_unlock_bh(&conn->sess->session_stats_lock);
2630 * Special case for successfully execution w/ both DATAIN
2633 if ((datain.flags & ISCSI_FLAG_DATA_STATUS) &&
2634 (cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE))
2635 datain.flags &= ~ISCSI_FLAG_DATA_STATUS;
2637 if ((dr->dr_complete == DATAIN_COMPLETE_NORMAL) ||
2638 (dr->dr_complete == DATAIN_COMPLETE_CONNECTION_RECOVERY)) {
2639 iscsit_increment_maxcmdsn(cmd, conn->sess);
2640 cmd->stat_sn = conn->stat_sn++;
2642 } else if (dr->dr_complete ==
2643 DATAIN_COMPLETE_WITHIN_COMMAND_RECOVERY)
2647 iscsit_build_datain_pdu(cmd, conn, &datain, hdr, set_statsn);
2649 iov = &cmd->iov_data[0];
2650 iov[iov_count].iov_base = cmd->pdu;
2651 iov[iov_count++].iov_len = ISCSI_HDR_LEN;
2652 tx_size += ISCSI_HDR_LEN;
2654 if (conn->conn_ops->HeaderDigest) {
2655 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
2657 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, cmd->pdu,
2658 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
2660 iov[0].iov_len += ISCSI_CRC_LEN;
2661 tx_size += ISCSI_CRC_LEN;
2663 pr_debug("Attaching CRC32 HeaderDigest"
2664 " for DataIN PDU 0x%08x\n", *header_digest);
2667 iov_ret = iscsit_map_iovec(cmd, &cmd->iov_data[1],
2668 datain.offset, datain.length);
2672 iov_count += iov_ret;
2673 tx_size += datain.length;
2675 cmd->padding = ((-datain.length) & 3);
2677 iov[iov_count].iov_base = cmd->pad_bytes;
2678 iov[iov_count++].iov_len = cmd->padding;
2679 tx_size += cmd->padding;
2681 pr_debug("Attaching %u padding bytes\n",
2684 if (conn->conn_ops->DataDigest) {
2685 cmd->data_crc = iscsit_do_crypto_hash_sg(&conn->conn_tx_hash, cmd,
2686 datain.offset, datain.length, cmd->padding, cmd->pad_bytes);
2688 iov[iov_count].iov_base = &cmd->data_crc;
2689 iov[iov_count++].iov_len = ISCSI_CRC_LEN;
2690 tx_size += ISCSI_CRC_LEN;
2692 pr_debug("Attached CRC32C DataDigest %d bytes, crc"
2693 " 0x%08x\n", datain.length+cmd->padding, cmd->data_crc);
2696 cmd->iov_data_count = iov_count;
2697 cmd->tx_size = tx_size;
2699 /* sendpage is preferred but can't insert markers */
2700 if (!conn->conn_ops->IFMarker)
2701 ret = iscsit_fe_sendpage_sg(cmd, conn);
2703 ret = iscsit_send_tx_data(cmd, conn, 0);
2705 iscsit_unmap_iovec(cmd);
2708 iscsit_tx_thread_wait_for_tcp(conn);
2712 if (dr->dr_complete) {
2713 eodr = (cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) ?
2715 iscsit_free_datain_req(cmd, dr);
2722 iscsit_build_logout_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
2723 struct iscsi_logout_rsp *hdr)
2725 struct iscsi_conn *logout_conn = NULL;
2726 struct iscsi_conn_recovery *cr = NULL;
2727 struct iscsi_session *sess = conn->sess;
2729 * The actual shutting down of Sessions and/or Connections
2730 * for CLOSESESSION and CLOSECONNECTION Logout Requests
2731 * is done in scsi_logout_post_handler().
2733 switch (cmd->logout_reason) {
2734 case ISCSI_LOGOUT_REASON_CLOSE_SESSION:
2735 pr_debug("iSCSI session logout successful, setting"
2736 " logout response to ISCSI_LOGOUT_SUCCESS.\n");
2737 cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
2739 case ISCSI_LOGOUT_REASON_CLOSE_CONNECTION:
2740 if (cmd->logout_response == ISCSI_LOGOUT_CID_NOT_FOUND)
2743 * For CLOSECONNECTION logout requests carrying
2744 * a matching logout CID -> local CID, the reference
2745 * for the local CID will have been incremented in
2746 * iscsi_logout_closeconnection().
2748 * For CLOSECONNECTION logout requests carrying
2749 * a different CID than the connection it arrived
2750 * on, the connection responding to cmd->logout_cid
2751 * is stopped in iscsit_logout_post_handler_diffcid().
2754 pr_debug("iSCSI CID: %hu logout on CID: %hu"
2755 " successful.\n", cmd->logout_cid, conn->cid);
2756 cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
2758 case ISCSI_LOGOUT_REASON_RECOVERY:
2759 if ((cmd->logout_response == ISCSI_LOGOUT_RECOVERY_UNSUPPORTED) ||
2760 (cmd->logout_response == ISCSI_LOGOUT_CLEANUP_FAILED))
2763 * If the connection is still active from our point of view
2764 * force connection recovery to occur.
2766 logout_conn = iscsit_get_conn_from_cid_rcfr(sess,
2769 iscsit_connection_reinstatement_rcfr(logout_conn);
2770 iscsit_dec_conn_usage_count(logout_conn);
2773 cr = iscsit_get_inactive_connection_recovery_entry(
2774 conn->sess, cmd->logout_cid);
2776 pr_err("Unable to locate CID: %hu for"
2777 " REMOVECONNFORRECOVERY Logout Request.\n",
2779 cmd->logout_response = ISCSI_LOGOUT_CID_NOT_FOUND;
2783 iscsit_discard_cr_cmds_by_expstatsn(cr, cmd->exp_stat_sn);
2785 pr_debug("iSCSI REMOVECONNFORRECOVERY logout"
2786 " for recovery for CID: %hu on CID: %hu successful.\n",
2787 cmd->logout_cid, conn->cid);
2788 cmd->logout_response = ISCSI_LOGOUT_SUCCESS;
2791 pr_err("Unknown cmd->logout_reason: 0x%02x\n",
2792 cmd->logout_reason);
2796 hdr->opcode = ISCSI_OP_LOGOUT_RSP;
2797 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
2798 hdr->response = cmd->logout_response;
2799 hdr->itt = cmd->init_task_tag;
2800 cmd->stat_sn = conn->stat_sn++;
2801 hdr->statsn = cpu_to_be32(cmd->stat_sn);
2803 iscsit_increment_maxcmdsn(cmd, conn->sess);
2804 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
2805 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
2807 pr_debug("Built Logout Response ITT: 0x%08x StatSN:"
2808 " 0x%08x Response: 0x%02x CID: %hu on CID: %hu\n",
2809 cmd->init_task_tag, cmd->stat_sn, hdr->response,
2810 cmd->logout_cid, conn->cid);
2814 EXPORT_SYMBOL(iscsit_build_logout_rsp);
2817 iscsit_send_logout(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
2820 int niov = 0, tx_size, rc;
2822 rc = iscsit_build_logout_rsp(cmd, conn,
2823 (struct iscsi_logout_rsp *)&cmd->pdu[0]);
2827 tx_size = ISCSI_HDR_LEN;
2828 iov = &cmd->iov_misc[0];
2829 iov[niov].iov_base = cmd->pdu;
2830 iov[niov++].iov_len = ISCSI_HDR_LEN;
2832 if (conn->conn_ops->HeaderDigest) {
2833 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
2835 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, &cmd->pdu[0],
2836 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
2838 iov[0].iov_len += ISCSI_CRC_LEN;
2839 tx_size += ISCSI_CRC_LEN;
2840 pr_debug("Attaching CRC32C HeaderDigest to"
2841 " Logout Response 0x%08x\n", *header_digest);
2843 cmd->iov_misc_count = niov;
2844 cmd->tx_size = tx_size;
2850 iscsit_build_nopin_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
2851 struct iscsi_nopin *hdr, bool nopout_response)
2853 hdr->opcode = ISCSI_OP_NOOP_IN;
2854 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
2855 hton24(hdr->dlength, cmd->buf_ptr_size);
2856 if (nopout_response)
2857 put_unaligned_le64(0xFFFFFFFFFFFFFFFFULL, &hdr->lun);
2858 hdr->itt = cmd->init_task_tag;
2859 hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
2860 cmd->stat_sn = (nopout_response) ? conn->stat_sn++ :
2862 hdr->statsn = cpu_to_be32(cmd->stat_sn);
2864 if (nopout_response)
2865 iscsit_increment_maxcmdsn(cmd, conn->sess);
2867 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
2868 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
2870 pr_debug("Built NOPIN %s Response ITT: 0x%08x, TTT: 0x%08x,"
2871 " StatSN: 0x%08x, Length %u\n", (nopout_response) ?
2872 "Solicitied" : "Unsolicitied", cmd->init_task_tag,
2873 cmd->targ_xfer_tag, cmd->stat_sn, cmd->buf_ptr_size);
2875 EXPORT_SYMBOL(iscsit_build_nopin_rsp);
2878 * Unsolicited NOPIN, either requesting a response or not.
2880 static int iscsit_send_unsolicited_nopin(
2881 struct iscsi_cmd *cmd,
2882 struct iscsi_conn *conn,
2885 struct iscsi_nopin *hdr = (struct iscsi_nopin *)&cmd->pdu[0];
2886 int tx_size = ISCSI_HDR_LEN, ret;
2888 iscsit_build_nopin_rsp(cmd, conn, hdr, false);
2890 if (conn->conn_ops->HeaderDigest) {
2891 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
2893 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, hdr,
2894 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
2896 tx_size += ISCSI_CRC_LEN;
2897 pr_debug("Attaching CRC32C HeaderDigest to"
2898 " NopIN 0x%08x\n", *header_digest);
2901 cmd->iov_misc[0].iov_base = cmd->pdu;
2902 cmd->iov_misc[0].iov_len = tx_size;
2903 cmd->iov_misc_count = 1;
2904 cmd->tx_size = tx_size;
2906 pr_debug("Sending Unsolicited NOPIN TTT: 0x%08x StatSN:"
2907 " 0x%08x CID: %hu\n", hdr->ttt, cmd->stat_sn, conn->cid);
2909 ret = iscsit_send_tx_data(cmd, conn, 1);
2911 iscsit_tx_thread_wait_for_tcp(conn);
2915 spin_lock_bh(&cmd->istate_lock);
2916 cmd->i_state = want_response ?
2917 ISTATE_SENT_NOPIN_WANT_RESPONSE : ISTATE_SENT_STATUS;
2918 spin_unlock_bh(&cmd->istate_lock);
2924 iscsit_send_nopin(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
2926 struct iscsi_nopin *hdr = (struct iscsi_nopin *)&cmd->pdu[0];
2929 int niov = 0, tx_size;
2931 iscsit_build_nopin_rsp(cmd, conn, hdr, true);
2933 tx_size = ISCSI_HDR_LEN;
2934 iov = &cmd->iov_misc[0];
2935 iov[niov].iov_base = cmd->pdu;
2936 iov[niov++].iov_len = ISCSI_HDR_LEN;
2938 if (conn->conn_ops->HeaderDigest) {
2939 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
2941 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, hdr,
2942 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
2944 iov[0].iov_len += ISCSI_CRC_LEN;
2945 tx_size += ISCSI_CRC_LEN;
2946 pr_debug("Attaching CRC32C HeaderDigest"
2947 " to NopIn 0x%08x\n", *header_digest);
2951 * NOPOUT Ping Data is attached to struct iscsi_cmd->buf_ptr.
2952 * NOPOUT DataSegmentLength is at struct iscsi_cmd->buf_ptr_size.
2954 if (cmd->buf_ptr_size) {
2955 iov[niov].iov_base = cmd->buf_ptr;
2956 iov[niov++].iov_len = cmd->buf_ptr_size;
2957 tx_size += cmd->buf_ptr_size;
2959 pr_debug("Echoing back %u bytes of ping"
2960 " data.\n", cmd->buf_ptr_size);
2962 padding = ((-cmd->buf_ptr_size) & 3);
2964 iov[niov].iov_base = &cmd->pad_bytes;
2965 iov[niov++].iov_len = padding;
2967 pr_debug("Attaching %u additional"
2968 " padding bytes.\n", padding);
2970 if (conn->conn_ops->DataDigest) {
2971 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
2972 cmd->buf_ptr, cmd->buf_ptr_size,
2973 padding, (u8 *)&cmd->pad_bytes,
2974 (u8 *)&cmd->data_crc);
2976 iov[niov].iov_base = &cmd->data_crc;
2977 iov[niov++].iov_len = ISCSI_CRC_LEN;
2978 tx_size += ISCSI_CRC_LEN;
2979 pr_debug("Attached DataDigest for %u"
2980 " bytes of ping data, CRC 0x%08x\n",
2981 cmd->buf_ptr_size, cmd->data_crc);
2985 cmd->iov_misc_count = niov;
2986 cmd->tx_size = tx_size;
2991 static int iscsit_send_r2t(
2992 struct iscsi_cmd *cmd,
2993 struct iscsi_conn *conn)
2996 struct iscsi_r2t *r2t;
2997 struct iscsi_r2t_rsp *hdr;
3000 r2t = iscsit_get_r2t_from_list(cmd);
3004 hdr = (struct iscsi_r2t_rsp *) cmd->pdu;
3005 memset(hdr, 0, ISCSI_HDR_LEN);
3006 hdr->opcode = ISCSI_OP_R2T;
3007 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
3008 int_to_scsilun(cmd->se_cmd.orig_fe_lun,
3009 (struct scsi_lun *)&hdr->lun);
3010 hdr->itt = cmd->init_task_tag;
3011 spin_lock_bh(&conn->sess->ttt_lock);
3012 r2t->targ_xfer_tag = conn->sess->targ_xfer_tag++;
3013 if (r2t->targ_xfer_tag == 0xFFFFFFFF)
3014 r2t->targ_xfer_tag = conn->sess->targ_xfer_tag++;
3015 spin_unlock_bh(&conn->sess->ttt_lock);
3016 hdr->ttt = cpu_to_be32(r2t->targ_xfer_tag);
3017 hdr->statsn = cpu_to_be32(conn->stat_sn);
3018 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
3019 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
3020 hdr->r2tsn = cpu_to_be32(r2t->r2t_sn);
3021 hdr->data_offset = cpu_to_be32(r2t->offset);
3022 hdr->data_length = cpu_to_be32(r2t->xfer_len);
3024 cmd->iov_misc[0].iov_base = cmd->pdu;
3025 cmd->iov_misc[0].iov_len = ISCSI_HDR_LEN;
3026 tx_size += ISCSI_HDR_LEN;
3028 if (conn->conn_ops->HeaderDigest) {
3029 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
3031 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, hdr,
3032 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
3034 cmd->iov_misc[0].iov_len += ISCSI_CRC_LEN;
3035 tx_size += ISCSI_CRC_LEN;
3036 pr_debug("Attaching CRC32 HeaderDigest for R2T"
3037 " PDU 0x%08x\n", *header_digest);
3040 pr_debug("Built %sR2T, ITT: 0x%08x, TTT: 0x%08x, StatSN:"
3041 " 0x%08x, R2TSN: 0x%08x, Offset: %u, DDTL: %u, CID: %hu\n",
3042 (!r2t->recovery_r2t) ? "" : "Recovery ", cmd->init_task_tag,
3043 r2t->targ_xfer_tag, ntohl(hdr->statsn), r2t->r2t_sn,
3044 r2t->offset, r2t->xfer_len, conn->cid);
3046 cmd->iov_misc_count = 1;
3047 cmd->tx_size = tx_size;
3049 spin_lock_bh(&cmd->r2t_lock);
3051 spin_unlock_bh(&cmd->r2t_lock);
3053 ret = iscsit_send_tx_data(cmd, conn, 1);
3055 iscsit_tx_thread_wait_for_tcp(conn);
3059 spin_lock_bh(&cmd->dataout_timeout_lock);
3060 iscsit_start_dataout_timer(cmd, conn);
3061 spin_unlock_bh(&cmd->dataout_timeout_lock);
3067 * @recovery: If called from iscsi_task_reassign_complete_write() for
3068 * connection recovery.
3070 int iscsit_build_r2ts_for_cmd(
3071 struct iscsi_conn *conn,
3072 struct iscsi_cmd *cmd,
3076 u32 offset = 0, xfer_len = 0;
3078 spin_lock_bh(&cmd->r2t_lock);
3079 if (cmd->cmd_flags & ICF_SENT_LAST_R2T) {
3080 spin_unlock_bh(&cmd->r2t_lock);
3084 if (conn->sess->sess_ops->DataSequenceInOrder &&
3086 cmd->r2t_offset = max(cmd->r2t_offset, cmd->write_data_done);
3088 while (cmd->outstanding_r2ts < conn->sess->sess_ops->MaxOutstandingR2T) {
3089 if (conn->sess->sess_ops->DataSequenceInOrder) {
3090 offset = cmd->r2t_offset;
3092 if (first_r2t && recovery) {
3093 int new_data_end = offset +
3094 conn->sess->sess_ops->MaxBurstLength -
3095 cmd->next_burst_len;
3097 if (new_data_end > cmd->se_cmd.data_length)
3098 xfer_len = cmd->se_cmd.data_length - offset;
3101 conn->sess->sess_ops->MaxBurstLength -
3102 cmd->next_burst_len;
3104 int new_data_end = offset +
3105 conn->sess->sess_ops->MaxBurstLength;
3107 if (new_data_end > cmd->se_cmd.data_length)
3108 xfer_len = cmd->se_cmd.data_length - offset;
3110 xfer_len = conn->sess->sess_ops->MaxBurstLength;
3112 cmd->r2t_offset += xfer_len;
3114 if (cmd->r2t_offset == cmd->se_cmd.data_length)
3115 cmd->cmd_flags |= ICF_SENT_LAST_R2T;
3117 struct iscsi_seq *seq;
3119 seq = iscsit_get_seq_holder_for_r2t(cmd);
3121 spin_unlock_bh(&cmd->r2t_lock);
3125 offset = seq->offset;
3126 xfer_len = seq->xfer_len;
3128 if (cmd->seq_send_order == cmd->seq_count)
3129 cmd->cmd_flags |= ICF_SENT_LAST_R2T;
3131 cmd->outstanding_r2ts++;
3134 if (iscsit_add_r2t_to_list(cmd, offset, xfer_len, 0, 0) < 0) {
3135 spin_unlock_bh(&cmd->r2t_lock);
3139 if (cmd->cmd_flags & ICF_SENT_LAST_R2T)
3142 spin_unlock_bh(&cmd->r2t_lock);
3147 void iscsit_build_rsp_pdu(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
3148 bool inc_stat_sn, struct iscsi_scsi_rsp *hdr)
3151 cmd->stat_sn = conn->stat_sn++;
3153 spin_lock_bh(&conn->sess->session_stats_lock);
3154 conn->sess->rsp_pdus++;
3155 spin_unlock_bh(&conn->sess->session_stats_lock);
3157 memset(hdr, 0, ISCSI_HDR_LEN);
3158 hdr->opcode = ISCSI_OP_SCSI_CMD_RSP;
3159 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
3160 if (cmd->se_cmd.se_cmd_flags & SCF_OVERFLOW_BIT) {
3161 hdr->flags |= ISCSI_FLAG_CMD_OVERFLOW;
3162 hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
3163 } else if (cmd->se_cmd.se_cmd_flags & SCF_UNDERFLOW_BIT) {
3164 hdr->flags |= ISCSI_FLAG_CMD_UNDERFLOW;
3165 hdr->residual_count = cpu_to_be32(cmd->se_cmd.residual_count);
3167 hdr->response = cmd->iscsi_response;
3168 hdr->cmd_status = cmd->se_cmd.scsi_status;
3169 hdr->itt = cmd->init_task_tag;
3170 hdr->statsn = cpu_to_be32(cmd->stat_sn);
3172 iscsit_increment_maxcmdsn(cmd, conn->sess);
3173 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
3174 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
3176 pr_debug("Built SCSI Response, ITT: 0x%08x, StatSN: 0x%08x,"
3177 " Response: 0x%02x, SAM Status: 0x%02x, CID: %hu\n",
3178 cmd->init_task_tag, cmd->stat_sn, cmd->se_cmd.scsi_status,
3179 cmd->se_cmd.scsi_status, conn->cid);
3181 EXPORT_SYMBOL(iscsit_build_rsp_pdu);
3183 static int iscsit_send_response(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
3185 struct iscsi_scsi_rsp *hdr = (struct iscsi_scsi_rsp *)&cmd->pdu[0];
3187 u32 padding = 0, tx_size = 0;
3189 bool inc_stat_sn = (cmd->i_state == ISTATE_SEND_STATUS);
3191 iscsit_build_rsp_pdu(cmd, conn, inc_stat_sn, hdr);
3193 iov = &cmd->iov_misc[0];
3194 iov[iov_count].iov_base = cmd->pdu;
3195 iov[iov_count++].iov_len = ISCSI_HDR_LEN;
3196 tx_size += ISCSI_HDR_LEN;
3199 * Attach SENSE DATA payload to iSCSI Response PDU
3201 if (cmd->se_cmd.sense_buffer &&
3202 ((cmd->se_cmd.se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) ||
3203 (cmd->se_cmd.se_cmd_flags & SCF_EMULATED_TASK_SENSE))) {
3204 put_unaligned_be16(cmd->se_cmd.scsi_sense_length, cmd->sense_buffer);
3205 cmd->se_cmd.scsi_sense_length += sizeof (__be16);
3207 padding = -(cmd->se_cmd.scsi_sense_length) & 3;
3208 hton24(hdr->dlength, (u32)cmd->se_cmd.scsi_sense_length);
3209 iov[iov_count].iov_base = cmd->sense_buffer;
3210 iov[iov_count++].iov_len =
3211 (cmd->se_cmd.scsi_sense_length + padding);
3212 tx_size += cmd->se_cmd.scsi_sense_length;
3215 memset(cmd->sense_buffer +
3216 cmd->se_cmd.scsi_sense_length, 0, padding);
3218 pr_debug("Adding %u bytes of padding to"
3219 " SENSE.\n", padding);
3222 if (conn->conn_ops->DataDigest) {
3223 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
3225 (cmd->se_cmd.scsi_sense_length + padding),
3226 0, NULL, (u8 *)&cmd->data_crc);
3228 iov[iov_count].iov_base = &cmd->data_crc;
3229 iov[iov_count++].iov_len = ISCSI_CRC_LEN;
3230 tx_size += ISCSI_CRC_LEN;
3232 pr_debug("Attaching CRC32 DataDigest for"
3233 " SENSE, %u bytes CRC 0x%08x\n",
3234 (cmd->se_cmd.scsi_sense_length + padding),
3238 pr_debug("Attaching SENSE DATA: %u bytes to iSCSI"
3240 cmd->se_cmd.scsi_sense_length);
3243 if (conn->conn_ops->HeaderDigest) {
3244 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
3246 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, cmd->pdu,
3247 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
3249 iov[0].iov_len += ISCSI_CRC_LEN;
3250 tx_size += ISCSI_CRC_LEN;
3251 pr_debug("Attaching CRC32 HeaderDigest for Response"
3252 " PDU 0x%08x\n", *header_digest);
3255 cmd->iov_misc_count = iov_count;
3256 cmd->tx_size = tx_size;
3261 static u8 iscsit_convert_tcm_tmr_rsp(struct se_tmr_req *se_tmr)
3263 switch (se_tmr->response) {
3264 case TMR_FUNCTION_COMPLETE:
3265 return ISCSI_TMF_RSP_COMPLETE;
3266 case TMR_TASK_DOES_NOT_EXIST:
3267 return ISCSI_TMF_RSP_NO_TASK;
3268 case TMR_LUN_DOES_NOT_EXIST:
3269 return ISCSI_TMF_RSP_NO_LUN;
3270 case TMR_TASK_MGMT_FUNCTION_NOT_SUPPORTED:
3271 return ISCSI_TMF_RSP_NOT_SUPPORTED;
3272 case TMR_FUNCTION_AUTHORIZATION_FAILED:
3273 return ISCSI_TMF_RSP_AUTH_FAILED;
3274 case TMR_FUNCTION_REJECTED:
3276 return ISCSI_TMF_RSP_REJECTED;
3281 iscsit_build_task_mgt_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
3282 struct iscsi_tm_rsp *hdr)
3284 struct se_tmr_req *se_tmr = cmd->se_cmd.se_tmr_req;
3286 hdr->opcode = ISCSI_OP_SCSI_TMFUNC_RSP;
3287 hdr->flags = ISCSI_FLAG_CMD_FINAL;
3288 hdr->response = iscsit_convert_tcm_tmr_rsp(se_tmr);
3289 hdr->itt = cmd->init_task_tag;
3290 cmd->stat_sn = conn->stat_sn++;
3291 hdr->statsn = cpu_to_be32(cmd->stat_sn);
3293 iscsit_increment_maxcmdsn(cmd, conn->sess);
3294 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
3295 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
3297 pr_debug("Built Task Management Response ITT: 0x%08x,"
3298 " StatSN: 0x%08x, Response: 0x%02x, CID: %hu\n",
3299 cmd->init_task_tag, cmd->stat_sn, hdr->response, conn->cid);
3301 EXPORT_SYMBOL(iscsit_build_task_mgt_rsp);
3304 iscsit_send_task_mgt_rsp(struct iscsi_cmd *cmd, struct iscsi_conn *conn)
3306 struct iscsi_tm_rsp *hdr = (struct iscsi_tm_rsp *)&cmd->pdu[0];
3309 iscsit_build_task_mgt_rsp(cmd, conn, hdr);
3311 cmd->iov_misc[0].iov_base = cmd->pdu;
3312 cmd->iov_misc[0].iov_len = ISCSI_HDR_LEN;
3313 tx_size += ISCSI_HDR_LEN;
3315 if (conn->conn_ops->HeaderDigest) {
3316 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
3318 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, hdr,
3319 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
3321 cmd->iov_misc[0].iov_len += ISCSI_CRC_LEN;
3322 tx_size += ISCSI_CRC_LEN;
3323 pr_debug("Attaching CRC32 HeaderDigest for Task"
3324 " Mgmt Response PDU 0x%08x\n", *header_digest);
3327 cmd->iov_misc_count = 1;
3328 cmd->tx_size = tx_size;
3333 static bool iscsit_check_inaddr_any(struct iscsi_np *np)
3337 if (np->np_sockaddr.ss_family == AF_INET6) {
3338 const struct sockaddr_in6 sin6 = {
3339 .sin6_addr = IN6ADDR_ANY_INIT };
3340 struct sockaddr_in6 *sock_in6 =
3341 (struct sockaddr_in6 *)&np->np_sockaddr;
3343 if (!memcmp(sock_in6->sin6_addr.s6_addr,
3344 sin6.sin6_addr.s6_addr, 16))
3347 struct sockaddr_in * sock_in =
3348 (struct sockaddr_in *)&np->np_sockaddr;
3350 if (sock_in->sin_addr.s_addr == htonl(INADDR_ANY))
3357 #define SENDTARGETS_BUF_LIMIT 32768U
3359 static int iscsit_build_sendtargets_response(struct iscsi_cmd *cmd)
3361 char *payload = NULL;
3362 struct iscsi_conn *conn = cmd->conn;
3363 struct iscsi_portal_group *tpg;
3364 struct iscsi_tiqn *tiqn;
3365 struct iscsi_tpg_np *tpg_np;
3366 int buffer_len, end_of_buf = 0, len = 0, payload_len = 0;
3367 unsigned char buf[ISCSI_IQN_LEN+12]; /* iqn + "TargetName=" + \0 */
3369 buffer_len = max(conn->conn_ops->MaxRecvDataSegmentLength,
3370 SENDTARGETS_BUF_LIMIT);
3372 payload = kzalloc(buffer_len, GFP_KERNEL);
3374 pr_err("Unable to allocate memory for sendtargets"
3379 spin_lock(&tiqn_lock);
3380 list_for_each_entry(tiqn, &g_tiqn_list, tiqn_list) {
3381 len = sprintf(buf, "TargetName=%s", tiqn->tiqn);
3384 if ((len + payload_len) > buffer_len) {
3388 memcpy(payload + payload_len, buf, len);
3391 spin_lock(&tiqn->tiqn_tpg_lock);
3392 list_for_each_entry(tpg, &tiqn->tiqn_tpg_list, tpg_list) {
3394 spin_lock(&tpg->tpg_state_lock);
3395 if ((tpg->tpg_state == TPG_STATE_FREE) ||
3396 (tpg->tpg_state == TPG_STATE_INACTIVE)) {
3397 spin_unlock(&tpg->tpg_state_lock);
3400 spin_unlock(&tpg->tpg_state_lock);
3402 spin_lock(&tpg->tpg_np_lock);
3403 list_for_each_entry(tpg_np, &tpg->tpg_gnp_list,
3405 struct iscsi_np *np = tpg_np->tpg_np;
3406 bool inaddr_any = iscsit_check_inaddr_any(np);
3408 len = sprintf(buf, "TargetAddress="
3410 (np->np_sockaddr.ss_family == AF_INET6) ?
3411 "[" : "", (inaddr_any == false) ?
3412 np->np_ip : conn->local_ip,
3413 (np->np_sockaddr.ss_family == AF_INET6) ?
3414 "]" : "", (inaddr_any == false) ?
3415 np->np_port : conn->local_port,
3419 if ((len + payload_len) > buffer_len) {
3420 spin_unlock(&tpg->tpg_np_lock);
3421 spin_unlock(&tiqn->tiqn_tpg_lock);
3425 memcpy(payload + payload_len, buf, len);
3428 spin_unlock(&tpg->tpg_np_lock);
3430 spin_unlock(&tiqn->tiqn_tpg_lock);
3435 spin_unlock(&tiqn_lock);
3437 cmd->buf_ptr = payload;
3443 * FIXME: Add support for F_BIT and C_BIT when the length is longer than
3444 * MaxRecvDataSegmentLength.
3446 static int iscsit_send_text_rsp(
3447 struct iscsi_cmd *cmd,
3448 struct iscsi_conn *conn)
3450 struct iscsi_text_rsp *hdr;
3452 u32 padding = 0, tx_size = 0;
3453 int text_length, iov_count = 0;
3455 text_length = iscsit_build_sendtargets_response(cmd);
3456 if (text_length < 0)
3459 padding = ((-text_length) & 3);
3461 memset(cmd->buf_ptr + text_length, 0, padding);
3462 pr_debug("Attaching %u additional bytes for"
3463 " padding.\n", padding);
3466 hdr = (struct iscsi_text_rsp *) cmd->pdu;
3467 memset(hdr, 0, ISCSI_HDR_LEN);
3468 hdr->opcode = ISCSI_OP_TEXT_RSP;
3469 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
3470 hton24(hdr->dlength, text_length);
3471 hdr->itt = cmd->init_task_tag;
3472 hdr->ttt = cpu_to_be32(cmd->targ_xfer_tag);
3473 cmd->stat_sn = conn->stat_sn++;
3474 hdr->statsn = cpu_to_be32(cmd->stat_sn);
3476 iscsit_increment_maxcmdsn(cmd, conn->sess);
3477 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
3478 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
3480 iov = &cmd->iov_misc[0];
3482 iov[iov_count].iov_base = cmd->pdu;
3483 iov[iov_count++].iov_len = ISCSI_HDR_LEN;
3484 iov[iov_count].iov_base = cmd->buf_ptr;
3485 iov[iov_count++].iov_len = text_length + padding;
3487 tx_size += (ISCSI_HDR_LEN + text_length + padding);
3489 if (conn->conn_ops->HeaderDigest) {
3490 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
3492 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, hdr,
3493 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
3495 iov[0].iov_len += ISCSI_CRC_LEN;
3496 tx_size += ISCSI_CRC_LEN;
3497 pr_debug("Attaching CRC32 HeaderDigest for"
3498 " Text Response PDU 0x%08x\n", *header_digest);
3501 if (conn->conn_ops->DataDigest) {
3502 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash,
3503 cmd->buf_ptr, (text_length + padding),
3504 0, NULL, (u8 *)&cmd->data_crc);
3506 iov[iov_count].iov_base = &cmd->data_crc;
3507 iov[iov_count++].iov_len = ISCSI_CRC_LEN;
3508 tx_size += ISCSI_CRC_LEN;
3510 pr_debug("Attaching DataDigest for %u bytes of text"
3511 " data, CRC 0x%08x\n", (text_length + padding),
3515 cmd->iov_misc_count = iov_count;
3516 cmd->tx_size = tx_size;
3518 pr_debug("Built Text Response: ITT: 0x%08x, StatSN: 0x%08x,"
3519 " Length: %u, CID: %hu\n", cmd->init_task_tag, cmd->stat_sn,
3520 text_length, conn->cid);
3525 iscsit_build_reject(struct iscsi_cmd *cmd, struct iscsi_conn *conn,
3526 struct iscsi_reject *hdr)
3528 hdr->opcode = ISCSI_OP_REJECT;
3529 hdr->reason = cmd->reject_reason;
3530 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
3531 hton24(hdr->dlength, ISCSI_HDR_LEN);
3532 hdr->ffffffff = cpu_to_be32(0xffffffff);
3533 cmd->stat_sn = conn->stat_sn++;
3534 hdr->statsn = cpu_to_be32(cmd->stat_sn);
3535 hdr->exp_cmdsn = cpu_to_be32(conn->sess->exp_cmd_sn);
3536 hdr->max_cmdsn = cpu_to_be32(conn->sess->max_cmd_sn);
3539 EXPORT_SYMBOL(iscsit_build_reject);
3541 static int iscsit_send_reject(
3542 struct iscsi_cmd *cmd,
3543 struct iscsi_conn *conn)
3545 struct iscsi_reject *hdr = (struct iscsi_reject *)&cmd->pdu[0];
3547 u32 iov_count = 0, tx_size;
3549 iscsit_build_reject(cmd, conn, hdr);
3551 iov = &cmd->iov_misc[0];
3552 iov[iov_count].iov_base = cmd->pdu;
3553 iov[iov_count++].iov_len = ISCSI_HDR_LEN;
3554 iov[iov_count].iov_base = cmd->buf_ptr;
3555 iov[iov_count++].iov_len = ISCSI_HDR_LEN;
3557 tx_size = (ISCSI_HDR_LEN + ISCSI_HDR_LEN);
3559 if (conn->conn_ops->HeaderDigest) {
3560 u32 *header_digest = (u32 *)&cmd->pdu[ISCSI_HDR_LEN];
3562 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, hdr,
3563 ISCSI_HDR_LEN, 0, NULL, (u8 *)header_digest);
3565 iov[0].iov_len += ISCSI_CRC_LEN;
3566 tx_size += ISCSI_CRC_LEN;
3567 pr_debug("Attaching CRC32 HeaderDigest for"
3568 " REJECT PDU 0x%08x\n", *header_digest);
3571 if (conn->conn_ops->DataDigest) {
3572 iscsit_do_crypto_hash_buf(&conn->conn_tx_hash, cmd->buf_ptr,
3573 ISCSI_HDR_LEN, 0, NULL, (u8 *)&cmd->data_crc);
3575 iov[iov_count].iov_base = &cmd->data_crc;
3576 iov[iov_count++].iov_len = ISCSI_CRC_LEN;
3577 tx_size += ISCSI_CRC_LEN;
3578 pr_debug("Attaching CRC32 DataDigest for REJECT"
3579 " PDU 0x%08x\n", cmd->data_crc);
3582 cmd->iov_misc_count = iov_count;
3583 cmd->tx_size = tx_size;
3585 pr_debug("Built Reject PDU StatSN: 0x%08x, Reason: 0x%02x,"
3586 " CID: %hu\n", ntohl(hdr->statsn), hdr->reason, conn->cid);
3591 void iscsit_thread_get_cpumask(struct iscsi_conn *conn)
3593 struct iscsi_thread_set *ts = conn->thread_set;
3596 * thread_id is assigned from iscsit_global->ts_bitmap from
3597 * within iscsi_thread_set.c:iscsi_allocate_thread_sets()
3599 * Here we use thread_id to determine which CPU that this
3600 * iSCSI connection's iscsi_thread_set will be scheduled to
3603 ord = ts->thread_id % cpumask_weight(cpu_online_mask);
3604 for_each_online_cpu(cpu) {
3606 cpumask_set_cpu(cpu, conn->conn_cpumask);
3611 * This should never be reached..
3614 cpumask_setall(conn->conn_cpumask);
3617 static inline void iscsit_thread_check_cpumask(
3618 struct iscsi_conn *conn,
3619 struct task_struct *p,
3624 * mode == 1 signals iscsi_target_tx_thread() usage.
3625 * mode == 0 signals iscsi_target_rx_thread() usage.
3628 if (!conn->conn_tx_reset_cpumask)
3630 conn->conn_tx_reset_cpumask = 0;
3632 if (!conn->conn_rx_reset_cpumask)
3634 conn->conn_rx_reset_cpumask = 0;
3637 * Update the CPU mask for this single kthread so that
3638 * both TX and RX kthreads are scheduled to run on the
3641 memset(buf, 0, 128);
3642 cpumask_scnprintf(buf, 128, conn->conn_cpumask);
3643 set_cpus_allowed_ptr(p, conn->conn_cpumask);
3647 iscsit_immediate_queue(struct iscsi_conn *conn, struct iscsi_cmd *cmd, int state)
3652 case ISTATE_SEND_R2T:
3653 ret = iscsit_send_r2t(cmd, conn);
3658 spin_lock_bh(&conn->cmd_lock);
3659 list_del_init(&cmd->i_conn_node);
3660 spin_unlock_bh(&conn->cmd_lock);
3662 iscsit_free_cmd(cmd, false);
3664 case ISTATE_SEND_NOPIN_WANT_RESPONSE:
3665 iscsit_mod_nopin_response_timer(conn);
3666 ret = iscsit_send_unsolicited_nopin(cmd, conn, 1);
3670 case ISTATE_SEND_NOPIN_NO_RESPONSE:
3671 ret = iscsit_send_unsolicited_nopin(cmd, conn, 0);
3676 pr_err("Unknown Opcode: 0x%02x ITT:"
3677 " 0x%08x, i_state: %d on CID: %hu\n",
3678 cmd->iscsi_opcode, cmd->init_task_tag, state,
3690 iscsit_handle_immediate_queue(struct iscsi_conn *conn)
3692 struct iscsit_transport *t = conn->conn_transport;
3693 struct iscsi_queue_req *qr;
3694 struct iscsi_cmd *cmd;
3698 while ((qr = iscsit_get_cmd_from_immediate_queue(conn))) {
3699 atomic_set(&conn->check_immediate_queue, 0);
3702 kmem_cache_free(lio_qr_cache, qr);
3704 ret = t->iscsit_immediate_queue(conn, cmd, state);
3713 iscsit_response_queue(struct iscsi_conn *conn, struct iscsi_cmd *cmd, int state)
3719 case ISTATE_SEND_DATAIN:
3720 ret = iscsit_send_datain(cmd, conn);
3725 goto check_rsp_state;
3726 else if (ret == 1) {
3728 spin_lock_bh(&cmd->istate_lock);
3729 cmd->i_state = ISTATE_SENT_STATUS;
3730 spin_unlock_bh(&cmd->istate_lock);
3732 if (atomic_read(&conn->check_immediate_queue))
3736 } else if (ret == 2) {
3737 /* Still must send status,
3738 SCF_TRANSPORT_TASK_SENSE was set */
3739 spin_lock_bh(&cmd->istate_lock);
3740 cmd->i_state = ISTATE_SEND_STATUS;
3741 spin_unlock_bh(&cmd->istate_lock);
3742 state = ISTATE_SEND_STATUS;
3743 goto check_rsp_state;
3747 case ISTATE_SEND_STATUS:
3748 case ISTATE_SEND_STATUS_RECOVERY:
3749 ret = iscsit_send_response(cmd, conn);
3751 case ISTATE_SEND_LOGOUTRSP:
3752 ret = iscsit_send_logout(cmd, conn);
3754 case ISTATE_SEND_ASYNCMSG:
3755 ret = iscsit_send_conn_drop_async_message(
3758 case ISTATE_SEND_NOPIN:
3759 ret = iscsit_send_nopin(cmd, conn);
3761 case ISTATE_SEND_REJECT:
3762 ret = iscsit_send_reject(cmd, conn);
3764 case ISTATE_SEND_TASKMGTRSP:
3765 ret = iscsit_send_task_mgt_rsp(cmd, conn);
3768 ret = iscsit_tmr_post_handler(cmd, conn);
3770 iscsit_fall_back_to_erl0(conn->sess);
3772 case ISTATE_SEND_TEXTRSP:
3773 ret = iscsit_send_text_rsp(cmd, conn);
3776 pr_err("Unknown Opcode: 0x%02x ITT:"
3777 " 0x%08x, i_state: %d on CID: %hu\n",
3778 cmd->iscsi_opcode, cmd->init_task_tag,
3785 if (iscsit_send_tx_data(cmd, conn, 1) < 0) {
3786 iscsit_tx_thread_wait_for_tcp(conn);
3787 iscsit_unmap_iovec(cmd);
3790 iscsit_unmap_iovec(cmd);
3793 case ISTATE_SEND_LOGOUTRSP:
3794 if (!iscsit_logout_post_handler(cmd, conn))
3797 case ISTATE_SEND_STATUS:
3798 case ISTATE_SEND_ASYNCMSG:
3799 case ISTATE_SEND_NOPIN:
3800 case ISTATE_SEND_STATUS_RECOVERY:
3801 case ISTATE_SEND_TEXTRSP:
3802 case ISTATE_SEND_TASKMGTRSP:
3803 case ISTATE_SEND_REJECT:
3804 spin_lock_bh(&cmd->istate_lock);
3805 cmd->i_state = ISTATE_SENT_STATUS;
3806 spin_unlock_bh(&cmd->istate_lock);
3809 pr_err("Unknown Opcode: 0x%02x ITT:"
3810 " 0x%08x, i_state: %d on CID: %hu\n",
3811 cmd->iscsi_opcode, cmd->init_task_tag,
3812 cmd->i_state, conn->cid);
3816 if (atomic_read(&conn->check_immediate_queue))
3827 static int iscsit_handle_response_queue(struct iscsi_conn *conn)
3829 struct iscsit_transport *t = conn->conn_transport;
3830 struct iscsi_queue_req *qr;
3831 struct iscsi_cmd *cmd;
3835 while ((qr = iscsit_get_cmd_from_response_queue(conn))) {
3838 kmem_cache_free(lio_qr_cache, qr);
3840 ret = t->iscsit_response_queue(conn, cmd, state);
3841 if (ret == 1 || ret < 0)
3848 int iscsi_target_tx_thread(void *arg)
3851 struct iscsi_conn *conn;
3852 struct iscsi_thread_set *ts = arg;
3854 * Allow ourselves to be interrupted by SIGINT so that a
3855 * connection recovery / failure event can be triggered externally.
3857 allow_signal(SIGINT);
3860 conn = iscsi_tx_thread_pre_handler(ts);
3866 while (!kthread_should_stop()) {
3868 * Ensure that both TX and RX per connection kthreads
3869 * are scheduled to run on the same CPU.
3871 iscsit_thread_check_cpumask(conn, current, 1);
3873 wait_event_interruptible(conn->queues_wq,
3874 !iscsit_conn_all_queues_empty(conn) ||
3875 ts->status == ISCSI_THREAD_SET_RESET);
3877 if ((ts->status == ISCSI_THREAD_SET_RESET) ||
3878 signal_pending(current))
3882 ret = iscsit_handle_immediate_queue(conn);
3886 ret = iscsit_handle_response_queue(conn);
3889 else if (ret == -EAGAIN)
3896 iscsit_take_action_for_connection_exit(conn);
3902 static int iscsi_target_rx_opcode(struct iscsi_conn *conn, unsigned char *buf)
3904 struct iscsi_hdr *hdr = (struct iscsi_hdr *)buf;
3905 struct iscsi_cmd *cmd;
3908 switch (hdr->opcode & ISCSI_OPCODE_MASK) {
3909 case ISCSI_OP_SCSI_CMD:
3910 cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
3914 ret = iscsit_handle_scsi_cmd(conn, cmd, buf);
3916 case ISCSI_OP_SCSI_DATA_OUT:
3917 ret = iscsit_handle_data_out(conn, buf);
3919 case ISCSI_OP_NOOP_OUT:
3921 if (hdr->ttt == cpu_to_be32(0xFFFFFFFF)) {
3922 cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
3926 ret = iscsit_handle_nop_out(conn, cmd, buf);
3928 case ISCSI_OP_SCSI_TMFUNC:
3929 cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
3933 ret = iscsit_handle_task_mgt_cmd(conn, cmd, buf);
3936 ret = iscsit_handle_text_cmd(conn, buf);
3938 case ISCSI_OP_LOGOUT:
3939 cmd = iscsit_allocate_cmd(conn, GFP_KERNEL);
3943 ret = iscsit_handle_logout_cmd(conn, cmd, buf);
3945 wait_for_completion_timeout(&conn->conn_logout_comp,
3946 SECONDS_FOR_LOGOUT_COMP * HZ);
3948 case ISCSI_OP_SNACK:
3949 ret = iscsit_handle_snack(conn, buf);
3952 pr_err("Got unknown iSCSI OpCode: 0x%02x\n", hdr->opcode);
3953 if (!conn->sess->sess_ops->ErrorRecoveryLevel) {
3954 pr_err("Cannot recover from unknown"
3955 " opcode while ERL=0, closing iSCSI connection.\n");
3958 if (!conn->conn_ops->OFMarker) {
3959 pr_err("Unable to recover from unknown"
3960 " opcode while OFMarker=No, closing iSCSI"
3964 if (iscsit_recover_from_unknown_opcode(conn) < 0) {
3965 pr_err("Unable to recover from unknown"
3966 " opcode, closing iSCSI connection.\n");
3974 return iscsit_add_reject(conn, ISCSI_REASON_BOOKMARK_NO_RESOURCES, buf);
3977 int iscsi_target_rx_thread(void *arg)
3980 u8 buffer[ISCSI_HDR_LEN], opcode;
3981 u32 checksum = 0, digest = 0;
3982 struct iscsi_conn *conn = NULL;
3983 struct iscsi_thread_set *ts = arg;
3986 * Allow ourselves to be interrupted by SIGINT so that a
3987 * connection recovery / failure event can be triggered externally.
3989 allow_signal(SIGINT);
3992 conn = iscsi_rx_thread_pre_handler(ts);
3996 if (conn->conn_transport->transport_type == ISCSI_INFINIBAND) {
3997 struct completion comp;
4000 init_completion(&comp);
4001 rc = wait_for_completion_interruptible(&comp);
4008 while (!kthread_should_stop()) {
4010 * Ensure that both TX and RX per connection kthreads
4011 * are scheduled to run on the same CPU.
4013 iscsit_thread_check_cpumask(conn, current, 0);
4015 memset(buffer, 0, ISCSI_HDR_LEN);
4016 memset(&iov, 0, sizeof(struct kvec));
4018 iov.iov_base = buffer;
4019 iov.iov_len = ISCSI_HDR_LEN;
4021 ret = rx_data(conn, &iov, 1, ISCSI_HDR_LEN);
4022 if (ret != ISCSI_HDR_LEN) {
4023 iscsit_rx_thread_wait_for_tcp(conn);
4028 * Set conn->bad_hdr for use with REJECT PDUs.
4030 memcpy(&conn->bad_hdr, &buffer, ISCSI_HDR_LEN);
4032 if (conn->conn_ops->HeaderDigest) {
4033 iov.iov_base = &digest;
4034 iov.iov_len = ISCSI_CRC_LEN;
4036 ret = rx_data(conn, &iov, 1, ISCSI_CRC_LEN);
4037 if (ret != ISCSI_CRC_LEN) {
4038 iscsit_rx_thread_wait_for_tcp(conn);
4042 iscsit_do_crypto_hash_buf(&conn->conn_rx_hash,
4043 buffer, ISCSI_HDR_LEN,
4044 0, NULL, (u8 *)&checksum);
4046 if (digest != checksum) {
4047 pr_err("HeaderDigest CRC32C failed,"
4048 " received 0x%08x, computed 0x%08x\n",
4051 * Set the PDU to 0xff so it will intentionally
4052 * hit default in the switch below.
4054 memset(buffer, 0xff, ISCSI_HDR_LEN);
4055 spin_lock_bh(&conn->sess->session_stats_lock);
4056 conn->sess->conn_digest_errors++;
4057 spin_unlock_bh(&conn->sess->session_stats_lock);
4059 pr_debug("Got HeaderDigest CRC32C"
4060 " 0x%08x\n", checksum);
4064 if (conn->conn_state == TARG_CONN_STATE_IN_LOGOUT)
4067 opcode = buffer[0] & ISCSI_OPCODE_MASK;
4069 if (conn->sess->sess_ops->SessionType &&
4070 ((!(opcode & ISCSI_OP_TEXT)) ||
4071 (!(opcode & ISCSI_OP_LOGOUT)))) {
4072 pr_err("Received illegal iSCSI Opcode: 0x%02x"
4073 " while in Discovery Session, rejecting.\n", opcode);
4074 iscsit_add_reject(conn, ISCSI_REASON_PROTOCOL_ERROR,
4079 ret = iscsi_target_rx_opcode(conn, buffer);
4085 if (!signal_pending(current))
4086 atomic_set(&conn->transport_failed, 1);
4087 iscsit_take_action_for_connection_exit(conn);
4093 static void iscsit_release_commands_from_conn(struct iscsi_conn *conn)
4095 struct iscsi_cmd *cmd = NULL, *cmd_tmp = NULL;
4096 struct iscsi_session *sess = conn->sess;
4098 * We expect this function to only ever be called from either RX or TX
4099 * thread context via iscsit_close_connection() once the other context
4100 * has been reset -> returned sleeping pre-handler state.
4102 spin_lock_bh(&conn->cmd_lock);
4103 list_for_each_entry_safe(cmd, cmd_tmp, &conn->conn_cmd_list, i_conn_node) {
4105 list_del_init(&cmd->i_conn_node);
4106 spin_unlock_bh(&conn->cmd_lock);
4108 iscsit_increment_maxcmdsn(cmd, sess);
4110 iscsit_free_cmd(cmd, true);
4112 spin_lock_bh(&conn->cmd_lock);
4114 spin_unlock_bh(&conn->cmd_lock);
4117 static void iscsit_stop_timers_for_cmds(
4118 struct iscsi_conn *conn)
4120 struct iscsi_cmd *cmd;
4122 spin_lock_bh(&conn->cmd_lock);
4123 list_for_each_entry(cmd, &conn->conn_cmd_list, i_conn_node) {
4124 if (cmd->data_direction == DMA_TO_DEVICE)
4125 iscsit_stop_dataout_timer(cmd);
4127 spin_unlock_bh(&conn->cmd_lock);
4130 int iscsit_close_connection(
4131 struct iscsi_conn *conn)
4133 int conn_logout = (conn->conn_state == TARG_CONN_STATE_IN_LOGOUT);
4134 struct iscsi_session *sess = conn->sess;
4136 pr_debug("Closing iSCSI connection CID %hu on SID:"
4137 " %u\n", conn->cid, sess->sid);
4139 * Always up conn_logout_comp just in case the RX Thread is sleeping
4140 * and the logout response never got sent because the connection
4143 complete(&conn->conn_logout_comp);
4145 iscsi_release_thread_set(conn);
4147 iscsit_stop_timers_for_cmds(conn);
4148 iscsit_stop_nopin_response_timer(conn);
4149 iscsit_stop_nopin_timer(conn);
4151 if (conn->conn_transport->iscsit_wait_conn)
4152 conn->conn_transport->iscsit_wait_conn(conn);
4155 * During Connection recovery drop unacknowledged out of order
4156 * commands for this connection, and prepare the other commands
4159 * During normal operation clear the out of order commands (but
4160 * do not free the struct iscsi_ooo_cmdsn's) and release all
4161 * struct iscsi_cmds.
4163 if (atomic_read(&conn->connection_recovery)) {
4164 iscsit_discard_unacknowledged_ooo_cmdsns_for_conn(conn);
4165 iscsit_prepare_cmds_for_realligance(conn);
4167 iscsit_clear_ooo_cmdsns_for_conn(conn);
4168 iscsit_release_commands_from_conn(conn);
4170 iscsit_free_queue_reqs_for_conn(conn);
4173 * Handle decrementing session or connection usage count if
4174 * a logout response was not able to be sent because the
4175 * connection failed. Fall back to Session Recovery here.
4177 if (atomic_read(&conn->conn_logout_remove)) {
4178 if (conn->conn_logout_reason == ISCSI_LOGOUT_REASON_CLOSE_SESSION) {
4179 iscsit_dec_conn_usage_count(conn);
4180 iscsit_dec_session_usage_count(sess);
4182 if (conn->conn_logout_reason == ISCSI_LOGOUT_REASON_CLOSE_CONNECTION)
4183 iscsit_dec_conn_usage_count(conn);
4185 atomic_set(&conn->conn_logout_remove, 0);
4186 atomic_set(&sess->session_reinstatement, 0);
4187 atomic_set(&sess->session_fall_back_to_erl0, 1);
4190 spin_lock_bh(&sess->conn_lock);
4191 list_del(&conn->conn_list);
4194 * Attempt to let the Initiator know this connection failed by
4195 * sending an Connection Dropped Async Message on another
4196 * active connection.
4198 if (atomic_read(&conn->connection_recovery))
4199 iscsit_build_conn_drop_async_message(conn);
4201 spin_unlock_bh(&sess->conn_lock);
4204 * If connection reinstatement is being performed on this connection,
4205 * up the connection reinstatement semaphore that is being blocked on
4206 * in iscsit_cause_connection_reinstatement().
4208 spin_lock_bh(&conn->state_lock);
4209 if (atomic_read(&conn->sleep_on_conn_wait_comp)) {
4210 spin_unlock_bh(&conn->state_lock);
4211 complete(&conn->conn_wait_comp);
4212 wait_for_completion(&conn->conn_post_wait_comp);
4213 spin_lock_bh(&conn->state_lock);
4217 * If connection reinstatement is being performed on this connection
4218 * by receiving a REMOVECONNFORRECOVERY logout request, up the
4219 * connection wait rcfr semaphore that is being blocked on
4220 * an iscsit_connection_reinstatement_rcfr().
4222 if (atomic_read(&conn->connection_wait_rcfr)) {
4223 spin_unlock_bh(&conn->state_lock);
4224 complete(&conn->conn_wait_rcfr_comp);
4225 wait_for_completion(&conn->conn_post_wait_comp);
4226 spin_lock_bh(&conn->state_lock);
4228 atomic_set(&conn->connection_reinstatement, 1);
4229 spin_unlock_bh(&conn->state_lock);
4232 * If any other processes are accessing this connection pointer we
4233 * must wait until they have completed.
4235 iscsit_check_conn_usage_count(conn);
4237 if (conn->conn_rx_hash.tfm)
4238 crypto_free_hash(conn->conn_rx_hash.tfm);
4239 if (conn->conn_tx_hash.tfm)
4240 crypto_free_hash(conn->conn_tx_hash.tfm);
4242 if (conn->conn_cpumask)
4243 free_cpumask_var(conn->conn_cpumask);
4245 kfree(conn->conn_ops);
4246 conn->conn_ops = NULL;
4249 sock_release(conn->sock);
4251 if (conn->conn_transport->iscsit_free_conn)
4252 conn->conn_transport->iscsit_free_conn(conn);
4254 iscsit_put_transport(conn->conn_transport);
4256 conn->thread_set = NULL;
4258 pr_debug("Moving to TARG_CONN_STATE_FREE.\n");
4259 conn->conn_state = TARG_CONN_STATE_FREE;
4262 spin_lock_bh(&sess->conn_lock);
4263 atomic_dec(&sess->nconn);
4264 pr_debug("Decremented iSCSI connection count to %hu from node:"
4265 " %s\n", atomic_read(&sess->nconn),
4266 sess->sess_ops->InitiatorName);
4268 * Make sure that if one connection fails in an non ERL=2 iSCSI
4269 * Session that they all fail.
4271 if ((sess->sess_ops->ErrorRecoveryLevel != 2) && !conn_logout &&
4272 !atomic_read(&sess->session_logout))
4273 atomic_set(&sess->session_fall_back_to_erl0, 1);
4276 * If this was not the last connection in the session, and we are
4277 * performing session reinstatement or falling back to ERL=0, call
4278 * iscsit_stop_session() without sleeping to shutdown the other
4279 * active connections.
4281 if (atomic_read(&sess->nconn)) {
4282 if (!atomic_read(&sess->session_reinstatement) &&
4283 !atomic_read(&sess->session_fall_back_to_erl0)) {
4284 spin_unlock_bh(&sess->conn_lock);
4287 if (!atomic_read(&sess->session_stop_active)) {
4288 atomic_set(&sess->session_stop_active, 1);
4289 spin_unlock_bh(&sess->conn_lock);
4290 iscsit_stop_session(sess, 0, 0);
4293 spin_unlock_bh(&sess->conn_lock);
4298 * If this was the last connection in the session and one of the
4299 * following is occurring:
4301 * Session Reinstatement is not being performed, and are falling back
4302 * to ERL=0 call iscsit_close_session().
4304 * Session Logout was requested. iscsit_close_session() will be called
4307 * Session Continuation is not being performed, start the Time2Retain
4308 * handler and check if sleep_on_sess_wait_sem is active.
4310 if (!atomic_read(&sess->session_reinstatement) &&
4311 atomic_read(&sess->session_fall_back_to_erl0)) {
4312 spin_unlock_bh(&sess->conn_lock);
4313 target_put_session(sess->se_sess);
4316 } else if (atomic_read(&sess->session_logout)) {
4317 pr_debug("Moving to TARG_SESS_STATE_FREE.\n");
4318 sess->session_state = TARG_SESS_STATE_FREE;
4319 spin_unlock_bh(&sess->conn_lock);
4321 if (atomic_read(&sess->sleep_on_sess_wait_comp))
4322 complete(&sess->session_wait_comp);
4326 pr_debug("Moving to TARG_SESS_STATE_FAILED.\n");
4327 sess->session_state = TARG_SESS_STATE_FAILED;
4329 if (!atomic_read(&sess->session_continuation)) {
4330 spin_unlock_bh(&sess->conn_lock);
4331 iscsit_start_time2retain_handler(sess);
4333 spin_unlock_bh(&sess->conn_lock);
4335 if (atomic_read(&sess->sleep_on_sess_wait_comp))
4336 complete(&sess->session_wait_comp);
4340 spin_unlock_bh(&sess->conn_lock);
4345 int iscsit_close_session(struct iscsi_session *sess)
4347 struct iscsi_portal_group *tpg = ISCSI_TPG_S(sess);
4348 struct se_portal_group *se_tpg = &tpg->tpg_se_tpg;
4350 if (atomic_read(&sess->nconn)) {
4351 pr_err("%d connection(s) still exist for iSCSI session"
4352 " to %s\n", atomic_read(&sess->nconn),
4353 sess->sess_ops->InitiatorName);
4357 spin_lock_bh(&se_tpg->session_lock);
4358 atomic_set(&sess->session_logout, 1);
4359 atomic_set(&sess->session_reinstatement, 1);
4360 iscsit_stop_time2retain_timer(sess);
4361 spin_unlock_bh(&se_tpg->session_lock);
4364 * transport_deregister_session_configfs() will clear the
4365 * struct se_node_acl->nacl_sess pointer now as a iscsi_np process context
4366 * can be setting it again with __transport_register_session() in
4367 * iscsi_post_login_handler() again after the iscsit_stop_session()
4368 * completes in iscsi_np context.
4370 transport_deregister_session_configfs(sess->se_sess);
4373 * If any other processes are accessing this session pointer we must
4374 * wait until they have completed. If we are in an interrupt (the
4375 * time2retain handler) and contain and active session usage count we
4376 * restart the timer and exit.
4378 if (!in_interrupt()) {
4379 if (iscsit_check_session_usage_count(sess) == 1)
4380 iscsit_stop_session(sess, 1, 1);
4382 if (iscsit_check_session_usage_count(sess) == 2) {
4383 atomic_set(&sess->session_logout, 0);
4384 iscsit_start_time2retain_handler(sess);
4389 transport_deregister_session(sess->se_sess);
4391 if (sess->sess_ops->ErrorRecoveryLevel == 2)
4392 iscsit_free_connection_recovery_entires(sess);
4394 iscsit_free_all_ooo_cmdsns(sess);
4396 spin_lock_bh(&se_tpg->session_lock);
4397 pr_debug("Moving to TARG_SESS_STATE_FREE.\n");
4398 sess->session_state = TARG_SESS_STATE_FREE;
4399 pr_debug("Released iSCSI session from node: %s\n",
4400 sess->sess_ops->InitiatorName);
4403 tpg->tpg_tiqn->tiqn_nsessions--;
4405 pr_debug("Decremented number of active iSCSI Sessions on"
4406 " iSCSI TPG: %hu to %u\n", tpg->tpgt, tpg->nsessions);
4408 spin_lock(&sess_idr_lock);
4409 idr_remove(&sess_idr, sess->session_index);
4410 spin_unlock(&sess_idr_lock);
4412 kfree(sess->sess_ops);
4413 sess->sess_ops = NULL;
4414 spin_unlock_bh(&se_tpg->session_lock);
4420 static void iscsit_logout_post_handler_closesession(
4421 struct iscsi_conn *conn)
4423 struct iscsi_session *sess = conn->sess;
4425 iscsi_set_thread_clear(conn, ISCSI_CLEAR_TX_THREAD);
4426 iscsi_set_thread_set_signal(conn, ISCSI_SIGNAL_TX_THREAD);
4428 atomic_set(&conn->conn_logout_remove, 0);
4429 complete(&conn->conn_logout_comp);
4431 iscsit_dec_conn_usage_count(conn);
4432 iscsit_stop_session(sess, 1, 1);
4433 iscsit_dec_session_usage_count(sess);
4434 target_put_session(sess->se_sess);
4437 static void iscsit_logout_post_handler_samecid(
4438 struct iscsi_conn *conn)
4440 iscsi_set_thread_clear(conn, ISCSI_CLEAR_TX_THREAD);
4441 iscsi_set_thread_set_signal(conn, ISCSI_SIGNAL_TX_THREAD);
4443 atomic_set(&conn->conn_logout_remove, 0);
4444 complete(&conn->conn_logout_comp);
4446 iscsit_cause_connection_reinstatement(conn, 1);
4447 iscsit_dec_conn_usage_count(conn);
4450 static void iscsit_logout_post_handler_diffcid(
4451 struct iscsi_conn *conn,
4454 struct iscsi_conn *l_conn;
4455 struct iscsi_session *sess = conn->sess;
4456 bool conn_found = false;
4461 spin_lock_bh(&sess->conn_lock);
4462 list_for_each_entry(l_conn, &sess->sess_conn_list, conn_list) {
4463 if (l_conn->cid == cid) {
4464 iscsit_inc_conn_usage_count(l_conn);
4469 spin_unlock_bh(&sess->conn_lock);
4475 l_conn->sock->ops->shutdown(l_conn->sock, RCV_SHUTDOWN);
4477 spin_lock_bh(&l_conn->state_lock);
4478 pr_debug("Moving to TARG_CONN_STATE_IN_LOGOUT.\n");
4479 l_conn->conn_state = TARG_CONN_STATE_IN_LOGOUT;
4480 spin_unlock_bh(&l_conn->state_lock);
4482 iscsit_cause_connection_reinstatement(l_conn, 1);
4483 iscsit_dec_conn_usage_count(l_conn);
4487 * Return of 0 causes the TX thread to restart.
4489 int iscsit_logout_post_handler(
4490 struct iscsi_cmd *cmd,
4491 struct iscsi_conn *conn)
4495 switch (cmd->logout_reason) {
4496 case ISCSI_LOGOUT_REASON_CLOSE_SESSION:
4497 switch (cmd->logout_response) {
4498 case ISCSI_LOGOUT_SUCCESS:
4499 case ISCSI_LOGOUT_CLEANUP_FAILED:
4501 iscsit_logout_post_handler_closesession(conn);
4506 case ISCSI_LOGOUT_REASON_CLOSE_CONNECTION:
4507 if (conn->cid == cmd->logout_cid) {
4508 switch (cmd->logout_response) {
4509 case ISCSI_LOGOUT_SUCCESS:
4510 case ISCSI_LOGOUT_CLEANUP_FAILED:
4512 iscsit_logout_post_handler_samecid(conn);
4517 switch (cmd->logout_response) {
4518 case ISCSI_LOGOUT_SUCCESS:
4519 iscsit_logout_post_handler_diffcid(conn,
4522 case ISCSI_LOGOUT_CID_NOT_FOUND:
4523 case ISCSI_LOGOUT_CLEANUP_FAILED:
4530 case ISCSI_LOGOUT_REASON_RECOVERY:
4531 switch (cmd->logout_response) {
4532 case ISCSI_LOGOUT_SUCCESS:
4533 case ISCSI_LOGOUT_CID_NOT_FOUND:
4534 case ISCSI_LOGOUT_RECOVERY_UNSUPPORTED:
4535 case ISCSI_LOGOUT_CLEANUP_FAILED:
4547 EXPORT_SYMBOL(iscsit_logout_post_handler);
4549 void iscsit_fail_session(struct iscsi_session *sess)
4551 struct iscsi_conn *conn;
4553 spin_lock_bh(&sess->conn_lock);
4554 list_for_each_entry(conn, &sess->sess_conn_list, conn_list) {
4555 pr_debug("Moving to TARG_CONN_STATE_CLEANUP_WAIT.\n");
4556 conn->conn_state = TARG_CONN_STATE_CLEANUP_WAIT;
4558 spin_unlock_bh(&sess->conn_lock);
4560 pr_debug("Moving to TARG_SESS_STATE_FAILED.\n");
4561 sess->session_state = TARG_SESS_STATE_FAILED;
4564 int iscsit_free_session(struct iscsi_session *sess)
4566 u16 conn_count = atomic_read(&sess->nconn);
4567 struct iscsi_conn *conn, *conn_tmp = NULL;
4570 spin_lock_bh(&sess->conn_lock);
4571 atomic_set(&sess->sleep_on_sess_wait_comp, 1);
4573 list_for_each_entry_safe(conn, conn_tmp, &sess->sess_conn_list,
4575 if (conn_count == 0)
4578 if (list_is_last(&conn->conn_list, &sess->sess_conn_list)) {
4581 iscsit_inc_conn_usage_count(conn_tmp);
4584 iscsit_inc_conn_usage_count(conn);
4586 spin_unlock_bh(&sess->conn_lock);
4587 iscsit_cause_connection_reinstatement(conn, 1);
4588 spin_lock_bh(&sess->conn_lock);
4590 iscsit_dec_conn_usage_count(conn);
4592 iscsit_dec_conn_usage_count(conn_tmp);
4597 if (atomic_read(&sess->nconn)) {
4598 spin_unlock_bh(&sess->conn_lock);
4599 wait_for_completion(&sess->session_wait_comp);
4601 spin_unlock_bh(&sess->conn_lock);
4603 target_put_session(sess->se_sess);
4607 void iscsit_stop_session(
4608 struct iscsi_session *sess,
4610 int connection_sleep)
4612 u16 conn_count = atomic_read(&sess->nconn);
4613 struct iscsi_conn *conn, *conn_tmp = NULL;
4616 spin_lock_bh(&sess->conn_lock);
4618 atomic_set(&sess->sleep_on_sess_wait_comp, 1);
4620 if (connection_sleep) {
4621 list_for_each_entry_safe(conn, conn_tmp, &sess->sess_conn_list,
4623 if (conn_count == 0)
4626 if (list_is_last(&conn->conn_list, &sess->sess_conn_list)) {
4629 iscsit_inc_conn_usage_count(conn_tmp);
4632 iscsit_inc_conn_usage_count(conn);
4634 spin_unlock_bh(&sess->conn_lock);
4635 iscsit_cause_connection_reinstatement(conn, 1);
4636 spin_lock_bh(&sess->conn_lock);
4638 iscsit_dec_conn_usage_count(conn);
4640 iscsit_dec_conn_usage_count(conn_tmp);
4644 list_for_each_entry(conn, &sess->sess_conn_list, conn_list)
4645 iscsit_cause_connection_reinstatement(conn, 0);
4648 if (session_sleep && atomic_read(&sess->nconn)) {
4649 spin_unlock_bh(&sess->conn_lock);
4650 wait_for_completion(&sess->session_wait_comp);
4652 spin_unlock_bh(&sess->conn_lock);
4655 int iscsit_release_sessions_for_tpg(struct iscsi_portal_group *tpg, int force)
4657 struct iscsi_session *sess;
4658 struct se_portal_group *se_tpg = &tpg->tpg_se_tpg;
4659 struct se_session *se_sess, *se_sess_tmp;
4660 int session_count = 0;
4662 spin_lock_bh(&se_tpg->session_lock);
4663 if (tpg->nsessions && !force) {
4664 spin_unlock_bh(&se_tpg->session_lock);
4668 list_for_each_entry_safe(se_sess, se_sess_tmp, &se_tpg->tpg_sess_list,
4670 sess = (struct iscsi_session *)se_sess->fabric_sess_ptr;
4672 spin_lock(&sess->conn_lock);
4673 if (atomic_read(&sess->session_fall_back_to_erl0) ||
4674 atomic_read(&sess->session_logout) ||
4675 (sess->time2retain_timer_flags & ISCSI_TF_EXPIRED)) {
4676 spin_unlock(&sess->conn_lock);
4679 atomic_set(&sess->session_reinstatement, 1);
4680 spin_unlock(&sess->conn_lock);
4681 spin_unlock_bh(&se_tpg->session_lock);
4683 iscsit_free_session(sess);
4684 spin_lock_bh(&se_tpg->session_lock);
4688 spin_unlock_bh(&se_tpg->session_lock);
4690 pr_debug("Released %d iSCSI Session(s) from Target Portal"
4691 " Group: %hu\n", session_count, tpg->tpgt);
4695 MODULE_DESCRIPTION("iSCSI-Target Driver for mainline target infrastructure");
4696 MODULE_VERSION("4.1.x");
4697 MODULE_AUTHOR("nab@Linux-iSCSI.org");
4698 MODULE_LICENSE("GPL");
4700 module_init(iscsi_target_init_module);
4701 module_exit(iscsi_target_cleanup_module);