Merge tag 'for-5.17-rc2-tag' of git://git.kernel.org/pub/scm/linux/kernel/git/kdave...
[linux-block.git] / drivers / scsi / libiscsi.c
CommitLineData
1a59d1b8 1// SPDX-License-Identifier: GPL-2.0-or-later
7996a778
MC
2/*
3 * iSCSI lib functions
4 *
5 * Copyright (C) 2006 Red Hat, Inc. All rights reserved.
6 * Copyright (C) 2004 - 2006 Mike Christie
7 * Copyright (C) 2004 - 2005 Dmitry Yusupov
8 * Copyright (C) 2004 - 2005 Alex Aizman
9 * maintained by open-iscsi@googlegroups.com
7996a778
MC
10 */
11#include <linux/types.h>
7996a778
MC
12#include <linux/kfifo.h>
13#include <linux/delay.h>
11836572 14#include <linux/log2.h>
5a0e3ad6 15#include <linux/slab.h>
3f07c014 16#include <linux/sched/signal.h>
acf3368f 17#include <linux/module.h>
8eb00539 18#include <asm/unaligned.h>
7996a778
MC
19#include <net/tcp.h>
20#include <scsi/scsi_cmnd.h>
21#include <scsi/scsi_device.h>
22#include <scsi/scsi_eh.h>
23#include <scsi/scsi_tcq.h>
24#include <scsi/scsi_host.h>
25#include <scsi/scsi.h>
26#include <scsi/iscsi_proto.h>
27#include <scsi/scsi_transport.h>
28#include <scsi/scsi_transport_iscsi.h>
29#include <scsi/libiscsi.h>
c2332b00 30#include <trace/events/iscsi.h>
7996a778 31
bd2199d4
EZ
32static int iscsi_dbg_lib_conn;
33module_param_named(debug_libiscsi_conn, iscsi_dbg_lib_conn, int,
34 S_IRUGO | S_IWUSR);
35MODULE_PARM_DESC(debug_libiscsi_conn,
36 "Turn on debugging for connections in libiscsi module. "
37 "Set to 1 to turn on, and zero to turn off. Default is off.");
38
39static int iscsi_dbg_lib_session;
40module_param_named(debug_libiscsi_session, iscsi_dbg_lib_session, int,
41 S_IRUGO | S_IWUSR);
42MODULE_PARM_DESC(debug_libiscsi_session,
43 "Turn on debugging for sessions in libiscsi module. "
44 "Set to 1 to turn on, and zero to turn off. Default is off.");
45
46static int iscsi_dbg_lib_eh;
47module_param_named(debug_libiscsi_eh, iscsi_dbg_lib_eh, int,
48 S_IRUGO | S_IWUSR);
49MODULE_PARM_DESC(debug_libiscsi_eh,
50 "Turn on debugging for error handling in libiscsi module. "
51 "Set to 1 to turn on, and zero to turn off. Default is off.");
1b2c7af8
MC
52
53#define ISCSI_DBG_CONN(_conn, dbg_fmt, arg...) \
54 do { \
bd2199d4 55 if (iscsi_dbg_lib_conn) \
1b2c7af8
MC
56 iscsi_conn_printk(KERN_INFO, _conn, \
57 "%s " dbg_fmt, \
58 __func__, ##arg); \
c2332b00
FH
59 iscsi_dbg_trace(trace_iscsi_dbg_conn, \
60 &(_conn)->cls_conn->dev, \
61 "%s " dbg_fmt, __func__, ##arg);\
1b2c7af8
MC
62 } while (0);
63
64#define ISCSI_DBG_SESSION(_session, dbg_fmt, arg...) \
65 do { \
bd2199d4
EZ
66 if (iscsi_dbg_lib_session) \
67 iscsi_session_printk(KERN_INFO, _session, \
68 "%s " dbg_fmt, \
69 __func__, ##arg); \
c2332b00
FH
70 iscsi_dbg_trace(trace_iscsi_dbg_session, \
71 &(_session)->cls_session->dev, \
72 "%s " dbg_fmt, __func__, ##arg); \
bd2199d4
EZ
73 } while (0);
74
75#define ISCSI_DBG_EH(_session, dbg_fmt, arg...) \
76 do { \
77 if (iscsi_dbg_lib_eh) \
1b2c7af8
MC
78 iscsi_session_printk(KERN_INFO, _session, \
79 "%s " dbg_fmt, \
80 __func__, ##arg); \
c2332b00
FH
81 iscsi_dbg_trace(trace_iscsi_dbg_eh, \
82 &(_session)->cls_session->dev, \
83 "%s " dbg_fmt, __func__, ##arg); \
1b2c7af8
MC
84 } while (0);
85
32ae763e
MC
86inline void iscsi_conn_queue_work(struct iscsi_conn *conn)
87{
88 struct Scsi_Host *shost = conn->session->host;
89 struct iscsi_host *ihost = shost_priv(shost);
90
1336aed1
MC
91 if (ihost->workq)
92 queue_work(ihost->workq, &conn->xmitwork);
32ae763e
MC
93}
94EXPORT_SYMBOL_GPL(iscsi_conn_queue_work);
95
4c0ba5d2
MC
96static void __iscsi_update_cmdsn(struct iscsi_session *session,
97 uint32_t exp_cmdsn, uint32_t max_cmdsn)
7996a778 98{
77a23c21
MC
99 /*
100 * standard specifies this check for when to update expected and
101 * max sequence numbers
102 */
103 if (iscsi_sna_lt(max_cmdsn, exp_cmdsn - 1))
104 return;
105
106 if (exp_cmdsn != session->exp_cmdsn &&
107 !iscsi_sna_lt(exp_cmdsn, session->exp_cmdsn))
7996a778
MC
108 session->exp_cmdsn = exp_cmdsn;
109
77a23c21 110 if (max_cmdsn != session->max_cmdsn &&
46a84c65 111 !iscsi_sna_lt(max_cmdsn, session->max_cmdsn))
77a23c21 112 session->max_cmdsn = max_cmdsn;
7996a778 113}
4c0ba5d2
MC
114
115void iscsi_update_cmdsn(struct iscsi_session *session, struct iscsi_nopin *hdr)
116{
117 __iscsi_update_cmdsn(session, be32_to_cpu(hdr->exp_cmdsn),
118 be32_to_cpu(hdr->max_cmdsn));
119}
77a23c21 120EXPORT_SYMBOL_GPL(iscsi_update_cmdsn);
7996a778 121
577577da
MC
122/**
123 * iscsi_prep_data_out_pdu - initialize Data-Out
124 * @task: scsi command task
125 * @r2t: R2T info
126 * @hdr: iscsi data in pdu
127 *
128 * Notes:
129 * Initialize Data-Out within this R2T sequence and finds
130 * proper data_offset within this SCSI command.
131 *
132 * This function is called with connection lock taken.
133 **/
134void iscsi_prep_data_out_pdu(struct iscsi_task *task, struct iscsi_r2t_info *r2t,
135 struct iscsi_data *hdr)
7996a778 136{
9c19a7d0 137 struct iscsi_conn *conn = task->conn;
577577da
MC
138 unsigned int left = r2t->data_length - r2t->sent;
139
140 task->hdr_len = sizeof(struct iscsi_data);
7996a778
MC
141
142 memset(hdr, 0, sizeof(struct iscsi_data));
577577da
MC
143 hdr->ttt = r2t->ttt;
144 hdr->datasn = cpu_to_be32(r2t->datasn);
145 r2t->datasn++;
7996a778 146 hdr->opcode = ISCSI_OP_SCSI_DATA_OUT;
55bdabdf 147 hdr->lun = task->lun;
577577da
MC
148 hdr->itt = task->hdr_itt;
149 hdr->exp_statsn = r2t->exp_statsn;
150 hdr->offset = cpu_to_be32(r2t->data_offset + r2t->sent);
151 if (left > conn->max_xmit_dlength) {
7996a778 152 hton24(hdr->dlength, conn->max_xmit_dlength);
577577da 153 r2t->data_count = conn->max_xmit_dlength;
7996a778
MC
154 hdr->flags = 0;
155 } else {
577577da
MC
156 hton24(hdr->dlength, left);
157 r2t->data_count = left;
7996a778
MC
158 hdr->flags = ISCSI_FLAG_CMD_FINAL;
159 }
577577da 160 conn->dataout_pdus_cnt++;
7996a778 161}
577577da 162EXPORT_SYMBOL_GPL(iscsi_prep_data_out_pdu);
7996a778 163
9c19a7d0 164static int iscsi_add_hdr(struct iscsi_task *task, unsigned len)
004d6530 165{
9c19a7d0 166 unsigned exp_len = task->hdr_len + len;
004d6530 167
9c19a7d0 168 if (exp_len > task->hdr_max) {
004d6530
BH
169 WARN_ON(1);
170 return -EINVAL;
171 }
172
173 WARN_ON(len & (ISCSI_PAD_LEN - 1)); /* caller must pad the AHS */
9c19a7d0 174 task->hdr_len = exp_len;
004d6530
BH
175 return 0;
176}
177
38d1c069
BH
178/*
179 * make an extended cdb AHS
180 */
9c19a7d0 181static int iscsi_prep_ecdb_ahs(struct iscsi_task *task)
38d1c069 182{
9c19a7d0 183 struct scsi_cmnd *cmd = task->sc;
38d1c069
BH
184 unsigned rlen, pad_len;
185 unsigned short ahslength;
186 struct iscsi_ecdb_ahdr *ecdb_ahdr;
187 int rc;
188
9c19a7d0 189 ecdb_ahdr = iscsi_next_hdr(task);
38d1c069
BH
190 rlen = cmd->cmd_len - ISCSI_CDB_SIZE;
191
192 BUG_ON(rlen > sizeof(ecdb_ahdr->ecdb));
193 ahslength = rlen + sizeof(ecdb_ahdr->reserved);
194
195 pad_len = iscsi_padding(rlen);
196
9c19a7d0 197 rc = iscsi_add_hdr(task, sizeof(ecdb_ahdr->ahslength) +
38d1c069
BH
198 sizeof(ecdb_ahdr->ahstype) + ahslength + pad_len);
199 if (rc)
200 return rc;
201
202 if (pad_len)
203 memset(&ecdb_ahdr->ecdb[rlen], 0, pad_len);
204
205 ecdb_ahdr->ahslength = cpu_to_be16(ahslength);
206 ecdb_ahdr->ahstype = ISCSI_AHSTYPE_CDB;
207 ecdb_ahdr->reserved = 0;
208 memcpy(ecdb_ahdr->ecdb, cmd->cmnd + ISCSI_CDB_SIZE, rlen);
209
1b2c7af8
MC
210 ISCSI_DBG_SESSION(task->conn->session,
211 "iscsi_prep_ecdb_ahs: varlen_cdb_len %d "
212 "rlen %d pad_len %d ahs_length %d iscsi_headers_size "
213 "%u\n", cmd->cmd_len, rlen, pad_len, ahslength,
214 task->hdr_len);
38d1c069
BH
215 return 0;
216}
217
5d12c05e
MC
218/**
219 * iscsi_check_tmf_restrictions - check if a task is affected by TMF
220 * @task: iscsi task
221 * @opcode: opcode to check for
222 *
223 * During TMF a task has to be checked if it's affected.
224 * All unrelated I/O can be passed through, but I/O to the
225 * affected LUN should be restricted.
226 * If 'fast_abort' is set we won't be sending any I/O to the
227 * affected LUN.
228 * Otherwise the target is waiting for all TTTs to be completed,
229 * so we have to send all outstanding Data-Out PDUs to the target.
230 */
231static int iscsi_check_tmf_restrictions(struct iscsi_task *task, int opcode)
232{
ec29d0ac
MC
233 struct iscsi_session *session = task->conn->session;
234 struct iscsi_tm *tmf = &session->tmhdr;
9cb78c16 235 u64 hdr_lun;
5d12c05e 236
ec29d0ac 237 if (session->tmf_state == TMF_INITIAL)
5d12c05e
MC
238 return 0;
239
240 if ((tmf->opcode & ISCSI_OPCODE_MASK) != ISCSI_OP_SCSI_TMFUNC)
241 return 0;
242
243 switch (ISCSI_TM_FUNC_VALUE(tmf)) {
244 case ISCSI_TM_FUNC_LOGICAL_UNIT_RESET:
245 /*
246 * Allow PDUs for unrelated LUNs
247 */
55bdabdf 248 hdr_lun = scsilun_to_int(&tmf->lun);
5d12c05e
MC
249 if (hdr_lun != task->sc->device->lun)
250 return 0;
df561f66 251 fallthrough;
3fe5ae8b 252 case ISCSI_TM_FUNC_TARGET_WARM_RESET:
5d12c05e
MC
253 /*
254 * Fail all SCSI cmd PDUs
255 */
256 if (opcode != ISCSI_OP_SCSI_DATA_OUT) {
ec29d0ac
MC
257 iscsi_session_printk(KERN_INFO, session,
258 "task [op %x itt 0x%x/0x%x] rejected.\n",
259 opcode, task->itt, task->hdr_itt);
5d12c05e
MC
260 return -EACCES;
261 }
262 /*
263 * And also all data-out PDUs in response to R2T
264 * if fast_abort is set.
265 */
ec29d0ac
MC
266 if (session->fast_abort) {
267 iscsi_session_printk(KERN_INFO, session,
268 "task [op %x itt 0x%x/0x%x] fast abort.\n",
269 opcode, task->itt, task->hdr_itt);
5d12c05e
MC
270 return -EACCES;
271 }
272 break;
273 case ISCSI_TM_FUNC_ABORT_TASK:
274 /*
275 * the caller has already checked if the task
276 * they want to abort was in the pending queue so if
277 * we are here the cmd pdu has gone out already, and
278 * we will only hit this for data-outs
279 */
280 if (opcode == ISCSI_OP_SCSI_DATA_OUT &&
281 task->hdr_itt == tmf->rtt) {
ec29d0ac 282 ISCSI_DBG_SESSION(session,
5d12c05e
MC
283 "Preventing task %x/%x from sending "
284 "data-out due to abort task in "
285 "progress\n", task->itt,
286 task->hdr_itt);
287 return -EACCES;
288 }
289 break;
290 }
291
292 return 0;
293}
294
7996a778
MC
295/**
296 * iscsi_prep_scsi_cmd_pdu - prep iscsi scsi cmd pdu
9c19a7d0 297 * @task: iscsi task
7996a778
MC
298 *
299 * Prep basic iSCSI PDU fields for a scsi cmd pdu. The LLD should set
300 * fields like dlength or final based on how much data it sends
301 */
9c19a7d0 302static int iscsi_prep_scsi_cmd_pdu(struct iscsi_task *task)
7996a778 303{
9c19a7d0 304 struct iscsi_conn *conn = task->conn;
7996a778 305 struct iscsi_session *session = conn->session;
9c19a7d0 306 struct scsi_cmnd *sc = task->sc;
12352183 307 struct iscsi_scsi_req *hdr;
d77e6535 308 unsigned hdrlength, cmd_len, transfer_length;
262ef636 309 itt_t itt;
004d6530 310 int rc;
7996a778 311
5d12c05e
MC
312 rc = iscsi_check_tmf_restrictions(task, ISCSI_OP_SCSI_CMD);
313 if (rc)
314 return rc;
315
184b57c6
MC
316 if (conn->session->tt->alloc_pdu) {
317 rc = conn->session->tt->alloc_pdu(task, ISCSI_OP_SCSI_CMD);
318 if (rc)
319 return rc;
320 }
12352183 321 hdr = (struct iscsi_scsi_req *)task->hdr;
262ef636 322 itt = hdr->itt;
577577da
MC
323 memset(hdr, 0, sizeof(*hdr));
324
2ff79d52
MC
325 if (session->tt->parse_pdu_itt)
326 hdr->itt = task->hdr_itt = itt;
327 else
328 hdr->itt = task->hdr_itt = build_itt(task->itt,
329 task->conn->session->age);
9c19a7d0
MC
330 task->hdr_len = 0;
331 rc = iscsi_add_hdr(task, sizeof(*hdr));
004d6530
BH
332 if (rc)
333 return rc;
a8ac6311
OK
334 hdr->opcode = ISCSI_OP_SCSI_CMD;
335 hdr->flags = ISCSI_ATTR_SIMPLE;
55bdabdf
AG
336 int_to_scsilun(sc->device->lun, &hdr->lun);
337 task->lun = hdr->lun;
a8ac6311 338 hdr->exp_statsn = cpu_to_be32(conn->exp_statsn);
38d1c069
BH
339 cmd_len = sc->cmd_len;
340 if (cmd_len < ISCSI_CDB_SIZE)
341 memset(&hdr->cdb[cmd_len], 0, ISCSI_CDB_SIZE - cmd_len);
342 else if (cmd_len > ISCSI_CDB_SIZE) {
9c19a7d0 343 rc = iscsi_prep_ecdb_ahs(task);
38d1c069
BH
344 if (rc)
345 return rc;
346 cmd_len = ISCSI_CDB_SIZE;
347 }
348 memcpy(hdr->cdb, sc->cmnd, cmd_len);
7996a778 349
9c19a7d0 350 task->imm_count = 0;
55e51eda
SG
351 if (scsi_get_prot_op(sc) != SCSI_PROT_NORMAL)
352 task->protected = true;
353
d77e6535
SG
354 transfer_length = scsi_transfer_length(sc);
355 hdr->data_length = cpu_to_be32(transfer_length);
7996a778 356 if (sc->sc_data_direction == DMA_TO_DEVICE) {
577577da
MC
357 struct iscsi_r2t_info *r2t = &task->unsol_r2t;
358
7996a778
MC
359 hdr->flags |= ISCSI_FLAG_CMD_WRITE;
360 /*
361 * Write counters:
362 *
363 * imm_count bytes to be sent right after
364 * SCSI PDU Header
365 *
366 * unsol_count bytes(as Data-Out) to be sent
367 * without R2T ack right after
368 * immediate data
369 *
577577da 370 * r2t data_length bytes to be sent via R2T ack's
7996a778
MC
371 *
372 * pad_count bytes to be sent as zero-padding
373 */
577577da 374 memset(r2t, 0, sizeof(*r2t));
7996a778
MC
375
376 if (session->imm_data_en) {
d77e6535 377 if (transfer_length >= session->first_burst)
9c19a7d0 378 task->imm_count = min(session->first_burst,
7996a778
MC
379 conn->max_xmit_dlength);
380 else
d77e6535
SG
381 task->imm_count = min(transfer_length,
382 conn->max_xmit_dlength);
9c19a7d0 383 hton24(hdr->dlength, task->imm_count);
7996a778 384 } else
a8ac6311 385 zero_data(hdr->dlength);
7996a778 386
ffd0436e 387 if (!session->initial_r2t_en) {
d77e6535
SG
388 r2t->data_length = min(session->first_burst,
389 transfer_length) -
577577da
MC
390 task->imm_count;
391 r2t->data_offset = task->imm_count;
392 r2t->ttt = cpu_to_be32(ISCSI_RESERVED_TAG);
393 r2t->exp_statsn = cpu_to_be32(conn->exp_statsn);
ffd0436e
MC
394 }
395
577577da 396 if (!task->unsol_r2t.data_length)
7996a778 397 /* No unsolicit Data-Out's */
a8ac6311 398 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
7996a778 399 } else {
7996a778
MC
400 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
401 zero_data(hdr->dlength);
402
403 if (sc->sc_data_direction == DMA_FROM_DEVICE)
404 hdr->flags |= ISCSI_FLAG_CMD_READ;
405 }
406
004d6530 407 /* calculate size of additional header segments (AHSs) */
9c19a7d0 408 hdrlength = task->hdr_len - sizeof(*hdr);
004d6530
BH
409
410 WARN_ON(hdrlength & (ISCSI_PAD_LEN-1));
411 hdrlength /= ISCSI_PAD_LEN;
412
413 WARN_ON(hdrlength >= 256);
414 hdr->hlength = hdrlength & 0xFF;
96b1f96d 415 hdr->cmdsn = task->cmdsn = cpu_to_be32(session->cmdsn);
004d6530 416
577577da 417 if (session->tt->init_task && session->tt->init_task(task))
052d0144
MC
418 return -EIO;
419
9c19a7d0 420 task->state = ISCSI_TASK_RUNNING;
d3305f34 421 session->cmdsn++;
77a23c21 422
a8ac6311 423 conn->scsicmd_pdus_cnt++;
1b2c7af8 424 ISCSI_DBG_SESSION(session, "iscsi prep [%s cid %d sc %p cdb 0x%x "
ae3d56d8 425 "itt 0x%x len %d cmdsn %d win %d]\n",
1b2c7af8
MC
426 sc->sc_data_direction == DMA_TO_DEVICE ?
427 "write" : "read", conn->id, sc, sc->cmnd[0],
d77e6535 428 task->itt, transfer_length,
1b2c7af8
MC
429 session->cmdsn,
430 session->max_cmdsn - session->exp_cmdsn + 1);
004d6530 431 return 0;
7996a778 432}
7996a778
MC
433
434/**
3bbaaad9 435 * iscsi_free_task - free a task
9c19a7d0 436 * @task: iscsi cmd task
7996a778 437 *
659743b0 438 * Must be called with session back_lock.
3e5c28ad
MC
439 * This function returns the scsi command to scsi-ml or cleans
440 * up mgmt tasks then returns the task to the pool.
7996a778 441 */
3bbaaad9 442static void iscsi_free_task(struct iscsi_task *task)
7996a778 443{
9c19a7d0 444 struct iscsi_conn *conn = task->conn;
c1635cb7 445 struct iscsi_session *session = conn->session;
9c19a7d0 446 struct scsi_cmnd *sc = task->sc;
f41d4721 447 int oldstate = task->state;
7996a778 448
4421c9eb
MC
449 ISCSI_DBG_SESSION(session, "freeing task itt 0x%x state %d sc %p\n",
450 task->itt, task->state, task->sc);
451
577577da 452 session->tt->cleanup_task(task);
3bbaaad9 453 task->state = ISCSI_TASK_FREE;
9c19a7d0 454 task->sc = NULL;
3e5c28ad 455 /*
9c19a7d0 456 * login task is preallocated so do not free
3e5c28ad 457 */
9c19a7d0 458 if (conn->login_task == task)
3e5c28ad
MC
459 return;
460
7acd72eb 461 kfifo_in(&session->cmdpool.queue, (void*)&task, sizeof(void*));
052d0144 462
3e5c28ad 463 if (sc) {
3e5c28ad
MC
464 /* SCSI eh reuses commands to verify us */
465 sc->SCp.ptr = NULL;
466 /*
f41d4721
MC
467 * queue command may call this to free the task, so
468 * it will decide how to return sc to scsi-ml.
3e5c28ad 469 */
f41d4721 470 if (oldstate != ISCSI_TASK_REQUEUE_SCSIQ)
b4b84edc 471 scsi_done(sc);
3e5c28ad 472 }
7996a778
MC
473}
474
913e5bf4 475void __iscsi_get_task(struct iscsi_task *task)
60ecebf5 476{
6dc618cd 477 refcount_inc(&task->refcount);
60ecebf5 478}
913e5bf4 479EXPORT_SYMBOL_GPL(__iscsi_get_task);
60ecebf5 480
8eea2f55 481void __iscsi_put_task(struct iscsi_task *task)
60ecebf5 482{
6dc618cd 483 if (refcount_dec_and_test(&task->refcount))
3bbaaad9 484 iscsi_free_task(task);
60ecebf5 485}
8eea2f55 486EXPORT_SYMBOL_GPL(__iscsi_put_task);
60ecebf5 487
9c19a7d0 488void iscsi_put_task(struct iscsi_task *task)
3e5c28ad 489{
9c19a7d0 490 struct iscsi_session *session = task->conn->session;
3e5c28ad 491
659743b0
SP
492 /* regular RX path uses back_lock */
493 spin_lock_bh(&session->back_lock);
9c19a7d0 494 __iscsi_put_task(task);
659743b0 495 spin_unlock_bh(&session->back_lock);
3e5c28ad 496}
9c19a7d0 497EXPORT_SYMBOL_GPL(iscsi_put_task);
3e5c28ad 498
3bbaaad9
MC
499/**
500 * iscsi_complete_task - finish a task
501 * @task: iscsi cmd task
b3cd5050 502 * @state: state to complete task with
3bbaaad9 503 *
659743b0 504 * Must be called with session back_lock.
3bbaaad9 505 */
b3cd5050 506static void iscsi_complete_task(struct iscsi_task *task, int state)
3bbaaad9
MC
507{
508 struct iscsi_conn *conn = task->conn;
509
4421c9eb
MC
510 ISCSI_DBG_SESSION(conn->session,
511 "complete task itt 0x%x state %d sc %p\n",
512 task->itt, task->state, task->sc);
b3cd5050
MC
513 if (task->state == ISCSI_TASK_COMPLETED ||
514 task->state == ISCSI_TASK_ABRT_TMF ||
f41d4721
MC
515 task->state == ISCSI_TASK_ABRT_SESS_RECOV ||
516 task->state == ISCSI_TASK_REQUEUE_SCSIQ)
3bbaaad9
MC
517 return;
518 WARN_ON_ONCE(task->state == ISCSI_TASK_FREE);
b3cd5050 519 task->state = state;
3bbaaad9 520
fe0a8a95
LD
521 if (READ_ONCE(conn->ping_task) == task)
522 WRITE_ONCE(conn->ping_task, NULL);
3bbaaad9
MC
523
524 /* release get from queueing */
525 __iscsi_put_task(task);
526}
527
4c0ba5d2
MC
528/**
529 * iscsi_complete_scsi_task - finish scsi task normally
530 * @task: iscsi task for scsi cmd
531 * @exp_cmdsn: expected cmd sn in cpu format
532 * @max_cmdsn: max cmd sn in cpu format
533 *
534 * This is used when drivers do not need or cannot perform
535 * lower level pdu processing.
536 *
659743b0 537 * Called with session back_lock
4c0ba5d2
MC
538 */
539void iscsi_complete_scsi_task(struct iscsi_task *task,
540 uint32_t exp_cmdsn, uint32_t max_cmdsn)
541{
542 struct iscsi_conn *conn = task->conn;
543
544 ISCSI_DBG_SESSION(conn->session, "[itt 0x%x]\n", task->itt);
545
546 conn->last_recv = jiffies;
547 __iscsi_update_cmdsn(conn->session, exp_cmdsn, max_cmdsn);
548 iscsi_complete_task(task, ISCSI_TASK_COMPLETED);
549}
550EXPORT_SYMBOL_GPL(iscsi_complete_scsi_task);
551
5923d64b
MC
552/*
553 * Must be called with back and frwd lock
554 */
555static bool cleanup_queued_task(struct iscsi_task *task)
556{
557 struct iscsi_conn *conn = task->conn;
558 bool early_complete = false;
559
560 /* Bad target might have completed task while it was still running */
561 if (task->state == ISCSI_TASK_COMPLETED)
562 early_complete = true;
563
564 if (!list_empty(&task->running)) {
565 list_del_init(&task->running);
566 /*
567 * If it's on a list but still running, this could be from
568 * a bad target sending a rsp early, cleanup from a TMF, or
569 * session recovery.
570 */
571 if (task->state == ISCSI_TASK_RUNNING ||
572 task->state == ISCSI_TASK_COMPLETED)
573 __iscsi_put_task(task);
574 }
575
99b06033
MC
576 if (conn->session->running_aborted_task == task) {
577 conn->session->running_aborted_task = NULL;
578 __iscsi_put_task(task);
579 }
580
5923d64b
MC
581 if (conn->task == task) {
582 conn->task = NULL;
583 __iscsi_put_task(task);
584 }
585
586 return early_complete;
587}
4c0ba5d2 588
b3a7ea8d 589/*
14936b1e
MC
590 * session frwd lock must be held and if not called for a task that is still
591 * pending or from the xmit thread, then xmit thread must be suspended
b3a7ea8d 592 */
3bbaaad9 593static void fail_scsi_task(struct iscsi_task *task, int err)
b3a7ea8d 594{
3bbaaad9 595 struct iscsi_conn *conn = task->conn;
b3a7ea8d 596 struct scsi_cmnd *sc;
b3cd5050 597 int state;
b3a7ea8d 598
5923d64b
MC
599 spin_lock_bh(&conn->session->back_lock);
600 if (cleanup_queued_task(task)) {
601 spin_unlock_bh(&conn->session->back_lock);
602 return;
603 }
604
b3cd5050 605 if (task->state == ISCSI_TASK_PENDING) {
b3a7ea8d
MC
606 /*
607 * cmd never made it to the xmit thread, so we should not count
608 * the cmd in the sequencing
609 */
610 conn->session->queued_cmdsn--;
b3cd5050
MC
611 /* it was never sent so just complete like normal */
612 state = ISCSI_TASK_COMPLETED;
613 } else if (err == DID_TRANSPORT_DISRUPTED)
614 state = ISCSI_TASK_ABRT_SESS_RECOV;
615 else
616 state = ISCSI_TASK_ABRT_TMF;
b3a7ea8d 617
14936b1e 618 sc = task->sc;
b3cd5050 619 sc->result = err << 16;
ae3d56d8 620 scsi_set_resid(sc, scsi_bufflen(sc));
b3cd5050 621 iscsi_complete_task(task, state);
659743b0 622 spin_unlock_bh(&conn->session->back_lock);
b3a7ea8d
MC
623}
624
3e5c28ad 625static int iscsi_prep_mgmt_task(struct iscsi_conn *conn,
9c19a7d0 626 struct iscsi_task *task)
052d0144
MC
627{
628 struct iscsi_session *session = conn->session;
577577da 629 struct iscsi_hdr *hdr = task->hdr;
052d0144 630 struct iscsi_nopout *nop = (struct iscsi_nopout *)hdr;
4f704dc0 631 uint8_t opcode = hdr->opcode & ISCSI_OPCODE_MASK;
052d0144
MC
632
633 if (conn->session->state == ISCSI_STATE_LOGGING_OUT)
634 return -ENOTCONN;
635
4f704dc0 636 if (opcode != ISCSI_OP_LOGIN && opcode != ISCSI_OP_TEXT)
052d0144
MC
637 nop->exp_statsn = cpu_to_be32(conn->exp_statsn);
638 /*
639 * pre-format CmdSN for outgoing PDU.
640 */
641 nop->cmdsn = cpu_to_be32(session->cmdsn);
642 if (hdr->itt != RESERVED_ITT) {
052d0144 643 /*
4f704dc0 644 * TODO: We always use immediate for normal session pdus.
052d0144
MC
645 * If we start to send tmfs or nops as non-immediate then
646 * we should start checking the cmdsn numbers for mgmt tasks.
4f704dc0
MC
647 *
648 * During discovery sessions iscsid sends TEXT as non immediate,
649 * but we always only send one PDU at a time.
052d0144
MC
650 */
651 if (conn->c_stage == ISCSI_CONN_STARTED &&
652 !(hdr->opcode & ISCSI_OP_IMMEDIATE)) {
653 session->queued_cmdsn++;
654 session->cmdsn++;
655 }
656 }
657
ae15f801
MC
658 if (session->tt->init_task && session->tt->init_task(task))
659 return -EIO;
052d0144
MC
660
661 if ((hdr->opcode & ISCSI_OPCODE_MASK) == ISCSI_OP_LOGOUT)
662 session->state = ISCSI_STATE_LOGGING_OUT;
663
577577da 664 task->state = ISCSI_TASK_RUNNING;
1b2c7af8
MC
665 ISCSI_DBG_SESSION(session, "mgmtpdu [op 0x%x hdr->itt 0x%x "
666 "datalen %d]\n", hdr->opcode & ISCSI_OPCODE_MASK,
667 hdr->itt, task->data_count);
052d0144
MC
668 return 0;
669}
670
9c19a7d0 671static struct iscsi_task *
f6d5180c
MC
672__iscsi_conn_send_pdu(struct iscsi_conn *conn, struct iscsi_hdr *hdr,
673 char *data, uint32_t data_size)
674{
675 struct iscsi_session *session = conn->session;
1336aed1 676 struct iscsi_host *ihost = shost_priv(session->host);
4f704dc0 677 uint8_t opcode = hdr->opcode & ISCSI_OPCODE_MASK;
9c19a7d0 678 struct iscsi_task *task;
262ef636 679 itt_t itt;
f6d5180c
MC
680
681 if (session->state == ISCSI_STATE_TERMINATE)
682 return NULL;
683
4f704dc0 684 if (opcode == ISCSI_OP_LOGIN || opcode == ISCSI_OP_TEXT) {
f6d5180c
MC
685 /*
686 * Login and Text are sent serially, in
687 * request-followed-by-response sequence.
3e5c28ad
MC
688 * Same task can be used. Same ITT must be used.
689 * Note that login_task is preallocated at conn_create().
f6d5180c 690 */
4f704dc0
MC
691 if (conn->login_task->state != ISCSI_TASK_FREE) {
692 iscsi_conn_printk(KERN_ERR, conn, "Login/Text in "
693 "progress. Cannot start new task.\n");
694 return NULL;
695 }
696
cbaa4221
MC
697 if (data_size > ISCSI_DEF_MAX_RECV_SEG_LEN) {
698 iscsi_conn_printk(KERN_ERR, conn, "Invalid buffer len of %u for login task. Max len is %u\n", data_size, ISCSI_DEF_MAX_RECV_SEG_LEN);
699 return NULL;
700 }
701
9c19a7d0 702 task = conn->login_task;
4f704dc0 703 } else {
26013ad4
MC
704 if (session->state != ISCSI_STATE_LOGGED_IN)
705 return NULL;
706
cbaa4221
MC
707 if (data_size != 0) {
708 iscsi_conn_printk(KERN_ERR, conn, "Can not send data buffer of len %u for op 0x%x\n", data_size, opcode);
709 return NULL;
710 }
711
f6d5180c
MC
712 BUG_ON(conn->c_stage == ISCSI_CONN_INITIAL_STAGE);
713 BUG_ON(conn->c_stage == ISCSI_CONN_STOPPED);
714
7acd72eb 715 if (!kfifo_out(&session->cmdpool.queue,
9c19a7d0 716 (void*)&task, sizeof(void*)))
f6d5180c
MC
717 return NULL;
718 }
3e5c28ad
MC
719 /*
720 * released in complete pdu for task we expect a response for, and
721 * released by the lld when it has transmitted the task for
722 * pdus we do not expect a response for.
723 */
6dc618cd 724 refcount_set(&task->refcount, 1);
9c19a7d0
MC
725 task->conn = conn;
726 task->sc = NULL;
3bbaaad9
MC
727 INIT_LIST_HEAD(&task->running);
728 task->state = ISCSI_TASK_PENDING;
f6d5180c
MC
729
730 if (data_size) {
9c19a7d0
MC
731 memcpy(task->data, data, data_size);
732 task->data_count = data_size;
f6d5180c 733 } else
9c19a7d0 734 task->data_count = 0;
f6d5180c 735
184b57c6
MC
736 if (conn->session->tt->alloc_pdu) {
737 if (conn->session->tt->alloc_pdu(task, hdr->opcode)) {
738 iscsi_conn_printk(KERN_ERR, conn, "Could not allocate "
739 "pdu for mgmt task.\n");
3bbaaad9 740 goto free_task;
184b57c6 741 }
577577da 742 }
184b57c6 743
262ef636 744 itt = task->hdr->itt;
577577da 745 task->hdr_len = sizeof(struct iscsi_hdr);
9c19a7d0 746 memcpy(task->hdr, hdr, sizeof(struct iscsi_hdr));
262ef636
MC
747
748 if (hdr->itt != RESERVED_ITT) {
749 if (session->tt->parse_pdu_itt)
750 task->hdr->itt = itt;
751 else
752 task->hdr->itt = build_itt(task->itt,
753 task->conn->session->age);
754 }
755
fe0a8a95
LD
756 if (unlikely(READ_ONCE(conn->ping_task) == INVALID_SCSI_TASK))
757 WRITE_ONCE(conn->ping_task, task);
758
1336aed1 759 if (!ihost->workq) {
577577da
MC
760 if (iscsi_prep_mgmt_task(conn, task))
761 goto free_task;
052d0144 762
9c19a7d0 763 if (session->tt->xmit_task(task))
577577da 764 goto free_task;
3bbaaad9
MC
765 } else {
766 list_add_tail(&task->running, &conn->mgmtqueue);
32ae763e 767 iscsi_conn_queue_work(conn);
3bbaaad9 768 }
052d0144 769
9c19a7d0 770 return task;
577577da
MC
771
772free_task:
659743b0 773 /* regular RX path uses back_lock */
4fa50799 774 spin_lock(&session->back_lock);
577577da 775 __iscsi_put_task(task);
4fa50799 776 spin_unlock(&session->back_lock);
577577da 777 return NULL;
f6d5180c
MC
778}
779
780int iscsi_conn_send_pdu(struct iscsi_cls_conn *cls_conn, struct iscsi_hdr *hdr,
781 char *data, uint32_t data_size)
782{
783 struct iscsi_conn *conn = cls_conn->dd_data;
784 struct iscsi_session *session = conn->session;
785 int err = 0;
786
659743b0 787 spin_lock_bh(&session->frwd_lock);
f6d5180c
MC
788 if (!__iscsi_conn_send_pdu(conn, hdr, data, data_size))
789 err = -EPERM;
659743b0 790 spin_unlock_bh(&session->frwd_lock);
f6d5180c
MC
791 return err;
792}
793EXPORT_SYMBOL_GPL(iscsi_conn_send_pdu);
794
7996a778 795/**
ae6b4e69 796 * iscsi_scsi_cmd_rsp - SCSI Command Response processing
7996a778
MC
797 * @conn: iscsi connection
798 * @hdr: iscsi header
9c19a7d0 799 * @task: scsi command task
7996a778
MC
800 * @data: cmd data buffer
801 * @datalen: len of buffer
802 *
803 * iscsi_cmd_rsp sets up the scsi_cmnd fields based on the PDU and
a656183e 804 * then completes the command and task. called under back_lock
7996a778 805 **/
77a23c21 806static void iscsi_scsi_cmd_rsp(struct iscsi_conn *conn, struct iscsi_hdr *hdr,
9c19a7d0 807 struct iscsi_task *task, char *data,
77a23c21 808 int datalen)
7996a778 809{
12352183 810 struct iscsi_scsi_rsp *rhdr = (struct iscsi_scsi_rsp *)hdr;
7996a778 811 struct iscsi_session *session = conn->session;
9c19a7d0 812 struct scsi_cmnd *sc = task->sc;
7996a778 813
77a23c21 814 iscsi_update_cmdsn(session, (struct iscsi_nopin*)rhdr);
7996a778
MC
815 conn->exp_statsn = be32_to_cpu(rhdr->statsn) + 1;
816
817 sc->result = (DID_OK << 16) | rhdr->cmd_status;
818
55e51eda
SG
819 if (task->protected) {
820 sector_t sector;
821 u8 ascq;
822
823 /**
824 * Transports that didn't implement check_protection
825 * callback but still published T10-PI support to scsi-mid
826 * deserve this BUG_ON.
827 **/
828 BUG_ON(!session->tt->check_protection);
829
830 ascq = session->tt->check_protection(task, &sector);
831 if (ascq) {
f2b1e9c6 832 scsi_build_sense(sc, 1, ILLEGAL_REQUEST, 0x10, ascq);
a73c2a2f
SG
833 scsi_set_sense_information(sc->sense_buffer,
834 SCSI_SENSE_BUFFERSIZE,
835 sector);
55e51eda
SG
836 goto out;
837 }
838 }
839
7996a778
MC
840 if (rhdr->response != ISCSI_STATUS_CMD_COMPLETED) {
841 sc->result = DID_ERROR << 16;
842 goto out;
843 }
844
845 if (rhdr->cmd_status == SAM_STAT_CHECK_CONDITION) {
9b80cb4b 846 uint16_t senselen;
7996a778
MC
847
848 if (datalen < 2) {
849invalid_datalen:
322d739d
MC
850 iscsi_conn_printk(KERN_ERR, conn,
851 "Got CHECK_CONDITION but invalid data "
852 "buffer size of %d\n", datalen);
7996a778
MC
853 sc->result = DID_BAD_TARGET << 16;
854 goto out;
855 }
856
8f333991 857 senselen = get_unaligned_be16(data);
7996a778
MC
858 if (datalen < senselen)
859 goto invalid_datalen;
860
861 memcpy(sc->sense_buffer, data + 2,
9b80cb4b 862 min_t(uint16_t, senselen, SCSI_SENSE_BUFFERSIZE));
1b2c7af8
MC
863 ISCSI_DBG_SESSION(session, "copied %d bytes of sense\n",
864 min_t(uint16_t, senselen,
865 SCSI_SENSE_BUFFERSIZE));
7996a778
MC
866 }
867
c07d4444
BH
868 if (rhdr->flags & (ISCSI_FLAG_CMD_BIDI_UNDERFLOW |
869 ISCSI_FLAG_CMD_BIDI_OVERFLOW)) {
ae3d56d8 870 sc->result = (DID_BAD_TARGET << 16) | rhdr->cmd_status;
c07d4444
BH
871 }
872
7207fea4
BH
873 if (rhdr->flags & (ISCSI_FLAG_CMD_UNDERFLOW |
874 ISCSI_FLAG_CMD_OVERFLOW)) {
7996a778
MC
875 int res_count = be32_to_cpu(rhdr->residual_count);
876
7207fea4
BH
877 if (res_count > 0 &&
878 (rhdr->flags & ISCSI_FLAG_CMD_OVERFLOW ||
879 res_count <= scsi_bufflen(sc)))
c07d4444 880 /* write side for bidi or uni-io set_resid */
1c138991 881 scsi_set_resid(sc, res_count);
7996a778
MC
882 else
883 sc->result = (DID_BAD_TARGET << 16) | rhdr->cmd_status;
c07d4444 884 }
7996a778 885out:
3bbaaad9 886 ISCSI_DBG_SESSION(session, "cmd rsp done [sc %p res %d itt 0x%x]\n",
1b2c7af8 887 sc, sc->result, task->itt);
7996a778 888 conn->scsirsp_pdus_cnt++;
b3cd5050 889 iscsi_complete_task(task, ISCSI_TASK_COMPLETED);
7996a778
MC
890}
891
1d9edf02
MC
892/**
893 * iscsi_data_in_rsp - SCSI Data-In Response processing
894 * @conn: iscsi connection
895 * @hdr: iscsi pdu
896 * @task: scsi command task
a656183e
LD
897 *
898 * iscsi_data_in_rsp sets up the scsi_cmnd fields based on the data received
899 * then completes the command and task. called under back_lock
1d9edf02
MC
900 **/
901static void
902iscsi_data_in_rsp(struct iscsi_conn *conn, struct iscsi_hdr *hdr,
903 struct iscsi_task *task)
904{
905 struct iscsi_data_rsp *rhdr = (struct iscsi_data_rsp *)hdr;
906 struct scsi_cmnd *sc = task->sc;
907
908 if (!(rhdr->flags & ISCSI_FLAG_DATA_STATUS))
909 return;
910
edbc9aa0 911 iscsi_update_cmdsn(conn->session, (struct iscsi_nopin *)hdr);
1d9edf02
MC
912 sc->result = (DID_OK << 16) | rhdr->cmd_status;
913 conn->exp_statsn = be32_to_cpu(rhdr->statsn) + 1;
914 if (rhdr->flags & (ISCSI_FLAG_DATA_UNDERFLOW |
915 ISCSI_FLAG_DATA_OVERFLOW)) {
916 int res_count = be32_to_cpu(rhdr->residual_count);
917
918 if (res_count > 0 &&
919 (rhdr->flags & ISCSI_FLAG_CMD_OVERFLOW ||
ae3d56d8 920 res_count <= sc->sdb.length))
960bf87a 921 scsi_set_resid(sc, res_count);
1d9edf02
MC
922 else
923 sc->result = (DID_BAD_TARGET << 16) | rhdr->cmd_status;
924 }
925
3bbaaad9
MC
926 ISCSI_DBG_SESSION(conn->session, "data in with status done "
927 "[sc %p res %d itt 0x%x]\n",
928 sc, sc->result, task->itt);
1d9edf02 929 conn->scsirsp_pdus_cnt++;
b3cd5050 930 iscsi_complete_task(task, ISCSI_TASK_COMPLETED);
1d9edf02
MC
931}
932
7ea8b828
MC
933static void iscsi_tmf_rsp(struct iscsi_conn *conn, struct iscsi_hdr *hdr)
934{
935 struct iscsi_tm_rsp *tmf = (struct iscsi_tm_rsp *)hdr;
ec29d0ac 936 struct iscsi_session *session = conn->session;
7ea8b828
MC
937
938 conn->exp_statsn = be32_to_cpu(hdr->statsn) + 1;
939 conn->tmfrsp_pdus_cnt++;
940
ec29d0ac 941 if (session->tmf_state != TMF_QUEUED)
7ea8b828
MC
942 return;
943
944 if (tmf->response == ISCSI_TMF_RSP_COMPLETE)
ec29d0ac 945 session->tmf_state = TMF_SUCCESS;
7ea8b828 946 else if (tmf->response == ISCSI_TMF_RSP_NO_TASK)
ec29d0ac 947 session->tmf_state = TMF_NOT_FOUND;
7ea8b828 948 else
ec29d0ac
MC
949 session->tmf_state = TMF_FAILED;
950 wake_up(&session->ehwait);
7ea8b828
MC
951}
952
52f5664a 953static int iscsi_send_nopout(struct iscsi_conn *conn, struct iscsi_nopin *rhdr)
f6d5180c
MC
954{
955 struct iscsi_nopout hdr;
9c19a7d0 956 struct iscsi_task *task;
f6d5180c 957
fe0a8a95
LD
958 if (!rhdr) {
959 if (READ_ONCE(conn->ping_task))
960 return -EINVAL;
961 WRITE_ONCE(conn->ping_task, INVALID_SCSI_TASK);
962 }
f6d5180c
MC
963
964 memset(&hdr, 0, sizeof(struct iscsi_nopout));
965 hdr.opcode = ISCSI_OP_NOOP_OUT | ISCSI_OP_IMMEDIATE;
966 hdr.flags = ISCSI_FLAG_CMD_FINAL;
967
968 if (rhdr) {
55bdabdf 969 hdr.lun = rhdr->lun;
f6d5180c
MC
970 hdr.ttt = rhdr->ttt;
971 hdr.itt = RESERVED_ITT;
972 } else
973 hdr.ttt = RESERVED_ITT;
974
9c19a7d0 975 task = __iscsi_conn_send_pdu(conn, (struct iscsi_hdr *)&hdr, NULL, 0);
52f5664a 976 if (!task) {
fe0a8a95
LD
977 if (!rhdr)
978 WRITE_ONCE(conn->ping_task, NULL);
322d739d 979 iscsi_conn_printk(KERN_ERR, conn, "Could not send nopout\n");
52f5664a
AN
980 return -EIO;
981 } else if (!rhdr) {
d3acf022 982 /* only track our nops */
d3acf022
MC
983 conn->last_ping = jiffies;
984 }
52f5664a
AN
985
986 return 0;
f6d5180c
MC
987}
988
a656183e
LD
989/**
990 * iscsi_nop_out_rsp - SCSI NOP Response processing
991 * @task: scsi command task
992 * @nop: the nop structure
993 * @data: where to put the data
994 * @datalen: length of data
995 *
996 * iscsi_nop_out_rsp handles nop response from use or
997 * from user space. called under back_lock
998 **/
8afa1439
MC
999static int iscsi_nop_out_rsp(struct iscsi_task *task,
1000 struct iscsi_nopin *nop, char *data, int datalen)
1001{
1002 struct iscsi_conn *conn = task->conn;
1003 int rc = 0;
1004
fe0a8a95 1005 if (READ_ONCE(conn->ping_task) != task) {
8afa1439
MC
1006 /*
1007 * If this is not in response to one of our
1008 * nops then it must be from userspace.
1009 */
1010 if (iscsi_recv_pdu(conn->cls_conn, (struct iscsi_hdr *)nop,
1011 data, datalen))
1012 rc = ISCSI_ERR_CONN_FAILED;
1013 } else
1014 mod_timer(&conn->transport_timer, jiffies + conn->recv_timeout);
1015 iscsi_complete_task(task, ISCSI_TASK_COMPLETED);
1016 return rc;
1017}
1018
62f38300
MC
1019static int iscsi_handle_reject(struct iscsi_conn *conn, struct iscsi_hdr *hdr,
1020 char *data, int datalen)
1021{
1022 struct iscsi_reject *reject = (struct iscsi_reject *)hdr;
1023 struct iscsi_hdr rejected_pdu;
8afa1439 1024 int opcode, rc = 0;
62f38300
MC
1025
1026 conn->exp_statsn = be32_to_cpu(reject->statsn) + 1;
1027
8afa1439
MC
1028 if (ntoh24(reject->dlength) > datalen ||
1029 ntoh24(reject->dlength) < sizeof(struct iscsi_hdr)) {
1030 iscsi_conn_printk(KERN_ERR, conn, "Cannot handle rejected "
1031 "pdu. Invalid data length (pdu dlength "
1032 "%u, datalen %d\n", ntoh24(reject->dlength),
1033 datalen);
1034 return ISCSI_ERR_PROTO;
1035 }
1036 memcpy(&rejected_pdu, data, sizeof(struct iscsi_hdr));
1037 opcode = rejected_pdu.opcode & ISCSI_OPCODE_MASK;
1038
1039 switch (reject->reason) {
1040 case ISCSI_REASON_DATA_DIGEST_ERROR:
1041 iscsi_conn_printk(KERN_ERR, conn,
1042 "pdu (op 0x%x itt 0x%x) rejected "
1043 "due to DataDigest error.\n",
e5dbbe27 1044 opcode, rejected_pdu.itt);
8afa1439
MC
1045 break;
1046 case ISCSI_REASON_IMM_CMD_REJECT:
1047 iscsi_conn_printk(KERN_ERR, conn,
1048 "pdu (op 0x%x itt 0x%x) rejected. Too many "
1049 "immediate commands.\n",
e5dbbe27 1050 opcode, rejected_pdu.itt);
8afa1439
MC
1051 /*
1052 * We only send one TMF at a time so if the target could not
1053 * handle it, then it should get fixed (RFC mandates that
1054 * a target can handle one immediate TMF per conn).
1055 *
1056 * For nops-outs, we could have sent more than one if
1057 * the target is sending us lots of nop-ins
1058 */
1059 if (opcode != ISCSI_OP_NOOP_OUT)
1060 return 0;
62f38300 1061
4dec6a8f 1062 if (rejected_pdu.itt == cpu_to_be32(ISCSI_RESERVED_TAG)) {
8afa1439
MC
1063 /*
1064 * nop-out in response to target's nop-out rejected.
1065 * Just resend.
1066 */
659743b0
SP
1067 /* In RX path we are under back lock */
1068 spin_unlock(&conn->session->back_lock);
1069 spin_lock(&conn->session->frwd_lock);
8afa1439
MC
1070 iscsi_send_nopout(conn,
1071 (struct iscsi_nopin*)&rejected_pdu);
659743b0
SP
1072 spin_unlock(&conn->session->frwd_lock);
1073 spin_lock(&conn->session->back_lock);
1074 } else {
8afa1439
MC
1075 struct iscsi_task *task;
1076 /*
1077 * Our nop as ping got dropped. We know the target
1078 * and transport are ok so just clean up
1079 */
1080 task = iscsi_itt_to_task(conn, rejected_pdu.itt);
1081 if (!task) {
1082 iscsi_conn_printk(KERN_ERR, conn,
1083 "Invalid pdu reject. Could "
1084 "not lookup rejected task.\n");
1085 rc = ISCSI_ERR_BAD_ITT;
1086 } else
1087 rc = iscsi_nop_out_rsp(task,
1088 (struct iscsi_nopin*)&rejected_pdu,
1089 NULL, 0);
62f38300 1090 }
8afa1439
MC
1091 break;
1092 default:
1093 iscsi_conn_printk(KERN_ERR, conn,
1094 "pdu (op 0x%x itt 0x%x) rejected. Reason "
e5dbbe27
VC
1095 "code 0x%x\n", rejected_pdu.opcode,
1096 rejected_pdu.itt, reject->reason);
8afa1439 1097 break;
62f38300 1098 }
8afa1439 1099 return rc;
62f38300
MC
1100}
1101
913e5bf4
MC
1102/**
1103 * iscsi_itt_to_task - look up task by itt
1104 * @conn: iscsi connection
1105 * @itt: itt
1106 *
1107 * This should be used for mgmt tasks like login and nops, or if
1108 * the LDD's itt space does not include the session age.
1109 *
659743b0 1110 * The session back_lock must be held.
913e5bf4 1111 */
8f9256ce 1112struct iscsi_task *iscsi_itt_to_task(struct iscsi_conn *conn, itt_t itt)
913e5bf4
MC
1113{
1114 struct iscsi_session *session = conn->session;
262ef636 1115 int i;
913e5bf4
MC
1116
1117 if (itt == RESERVED_ITT)
1118 return NULL;
1119
262ef636
MC
1120 if (session->tt->parse_pdu_itt)
1121 session->tt->parse_pdu_itt(conn, itt, &i, NULL);
1122 else
1123 i = get_itt(itt);
913e5bf4
MC
1124 if (i >= session->cmds_max)
1125 return NULL;
1126
1127 return session->cmds[i];
1128}
8f9256ce 1129EXPORT_SYMBOL_GPL(iscsi_itt_to_task);
913e5bf4 1130
7996a778
MC
1131/**
1132 * __iscsi_complete_pdu - complete pdu
1133 * @conn: iscsi conn
1134 * @hdr: iscsi header
1135 * @data: data buffer
1136 * @datalen: len of data buffer
1137 *
1138 * Completes pdu processing by freeing any resources allocated at
659743b0 1139 * queuecommand or send generic. session back_lock must be held and verify
7996a778
MC
1140 * itt must have been called.
1141 */
913e5bf4
MC
1142int __iscsi_complete_pdu(struct iscsi_conn *conn, struct iscsi_hdr *hdr,
1143 char *data, int datalen)
7996a778
MC
1144{
1145 struct iscsi_session *session = conn->session;
1146 int opcode = hdr->opcode & ISCSI_OPCODE_MASK, rc = 0;
9c19a7d0 1147 struct iscsi_task *task;
7996a778
MC
1148 uint32_t itt;
1149
f6d5180c 1150 conn->last_recv = jiffies;
0af967f5
MC
1151 rc = iscsi_verify_itt(conn, hdr->itt);
1152 if (rc)
1153 return rc;
1154
b4377356
AV
1155 if (hdr->itt != RESERVED_ITT)
1156 itt = get_itt(hdr->itt);
7996a778 1157 else
b4377356 1158 itt = ~0U;
7996a778 1159
1b2c7af8
MC
1160 ISCSI_DBG_SESSION(session, "[op 0x%x cid %d itt 0x%x len %d]\n",
1161 opcode, conn->id, itt, datalen);
7996a778 1162
3e5c28ad 1163 if (itt == ~0U) {
77a23c21 1164 iscsi_update_cmdsn(session, (struct iscsi_nopin*)hdr);
62f38300 1165
7996a778
MC
1166 switch(opcode) {
1167 case ISCSI_OP_NOOP_IN:
40527afe 1168 if (datalen) {
7996a778 1169 rc = ISCSI_ERR_PROTO;
40527afe
MC
1170 break;
1171 }
1172
b4377356 1173 if (hdr->ttt == cpu_to_be32(ISCSI_RESERVED_TAG))
40527afe
MC
1174 break;
1175
659743b0
SP
1176 /* In RX path we are under back lock */
1177 spin_unlock(&session->back_lock);
1178 spin_lock(&session->frwd_lock);
f6d5180c 1179 iscsi_send_nopout(conn, (struct iscsi_nopin*)hdr);
659743b0
SP
1180 spin_unlock(&session->frwd_lock);
1181 spin_lock(&session->back_lock);
7996a778
MC
1182 break;
1183 case ISCSI_OP_REJECT:
62f38300
MC
1184 rc = iscsi_handle_reject(conn, hdr, data, datalen);
1185 break;
7996a778 1186 case ISCSI_OP_ASYNC_EVENT:
8d2860b3 1187 conn->exp_statsn = be32_to_cpu(hdr->statsn) + 1;
5831c737
MC
1188 if (iscsi_recv_pdu(conn->cls_conn, hdr, data, datalen))
1189 rc = ISCSI_ERR_CONN_FAILED;
7996a778
MC
1190 break;
1191 default:
1192 rc = ISCSI_ERR_BAD_OPCODE;
1193 break;
1194 }
3e5c28ad
MC
1195 goto out;
1196 }
1197
3e5c28ad
MC
1198 switch(opcode) {
1199 case ISCSI_OP_SCSI_CMD_RSP:
913e5bf4
MC
1200 case ISCSI_OP_SCSI_DATA_IN:
1201 task = iscsi_itt_to_ctask(conn, hdr->itt);
1202 if (!task)
1203 return ISCSI_ERR_BAD_ITT;
d355e57d 1204 task->last_xfer = jiffies;
913e5bf4
MC
1205 break;
1206 case ISCSI_OP_R2T:
1207 /*
1208 * LLD handles R2Ts if they need to.
1209 */
1210 return 0;
1211 case ISCSI_OP_LOGOUT_RSP:
1212 case ISCSI_OP_LOGIN_RSP:
1213 case ISCSI_OP_TEXT_RSP:
1214 case ISCSI_OP_SCSI_TMFUNC_RSP:
1215 case ISCSI_OP_NOOP_IN:
1216 task = iscsi_itt_to_task(conn, hdr->itt);
1217 if (!task)
1218 return ISCSI_ERR_BAD_ITT;
1219 break;
1220 default:
1221 return ISCSI_ERR_BAD_OPCODE;
1222 }
1223
1224 switch(opcode) {
1225 case ISCSI_OP_SCSI_CMD_RSP:
9c19a7d0 1226 iscsi_scsi_cmd_rsp(conn, hdr, task, data, datalen);
3e5c28ad
MC
1227 break;
1228 case ISCSI_OP_SCSI_DATA_IN:
1d9edf02 1229 iscsi_data_in_rsp(conn, hdr, task);
3e5c28ad 1230 break;
3e5c28ad
MC
1231 case ISCSI_OP_LOGOUT_RSP:
1232 iscsi_update_cmdsn(session, (struct iscsi_nopin*)hdr);
1233 if (datalen) {
1234 rc = ISCSI_ERR_PROTO;
1235 break;
1236 }
1237 conn->exp_statsn = be32_to_cpu(hdr->statsn) + 1;
1238 goto recv_pdu;
1239 case ISCSI_OP_LOGIN_RSP:
1240 case ISCSI_OP_TEXT_RSP:
1241 iscsi_update_cmdsn(session, (struct iscsi_nopin*)hdr);
1242 /*
1243 * login related PDU's exp_statsn is handled in
1244 * userspace
1245 */
1246 goto recv_pdu;
1247 case ISCSI_OP_SCSI_TMFUNC_RSP:
1248 iscsi_update_cmdsn(session, (struct iscsi_nopin*)hdr);
1249 if (datalen) {
1250 rc = ISCSI_ERR_PROTO;
1251 break;
1252 }
1253
1254 iscsi_tmf_rsp(conn, hdr);
b3cd5050 1255 iscsi_complete_task(task, ISCSI_TASK_COMPLETED);
3e5c28ad
MC
1256 break;
1257 case ISCSI_OP_NOOP_IN:
1258 iscsi_update_cmdsn(session, (struct iscsi_nopin*)hdr);
1259 if (hdr->ttt != cpu_to_be32(ISCSI_RESERVED_TAG) || datalen) {
1260 rc = ISCSI_ERR_PROTO;
1261 break;
1262 }
1263 conn->exp_statsn = be32_to_cpu(hdr->statsn) + 1;
1264
8afa1439
MC
1265 rc = iscsi_nop_out_rsp(task, (struct iscsi_nopin*)hdr,
1266 data, datalen);
3e5c28ad
MC
1267 break;
1268 default:
1269 rc = ISCSI_ERR_BAD_OPCODE;
1270 break;
1271 }
7996a778 1272
3e5c28ad
MC
1273out:
1274 return rc;
1275recv_pdu:
1276 if (iscsi_recv_pdu(conn->cls_conn, hdr, data, datalen))
1277 rc = ISCSI_ERR_CONN_FAILED;
b3cd5050 1278 iscsi_complete_task(task, ISCSI_TASK_COMPLETED);
7996a778
MC
1279 return rc;
1280}
913e5bf4 1281EXPORT_SYMBOL_GPL(__iscsi_complete_pdu);
7996a778
MC
1282
1283int iscsi_complete_pdu(struct iscsi_conn *conn, struct iscsi_hdr *hdr,
1284 char *data, int datalen)
1285{
1286 int rc;
1287
659743b0 1288 spin_lock(&conn->session->back_lock);
7996a778 1289 rc = __iscsi_complete_pdu(conn, hdr, data, datalen);
659743b0 1290 spin_unlock(&conn->session->back_lock);
7996a778
MC
1291 return rc;
1292}
1293EXPORT_SYMBOL_GPL(iscsi_complete_pdu);
1294
0af967f5 1295int iscsi_verify_itt(struct iscsi_conn *conn, itt_t itt)
7996a778
MC
1296{
1297 struct iscsi_session *session = conn->session;
262ef636 1298 int age = 0, i = 0;
7996a778 1299
0af967f5
MC
1300 if (itt == RESERVED_ITT)
1301 return 0;
7996a778 1302
262ef636
MC
1303 if (session->tt->parse_pdu_itt)
1304 session->tt->parse_pdu_itt(conn, itt, &i, &age);
1305 else {
1306 i = get_itt(itt);
1307 age = ((__force u32)itt >> ISCSI_AGE_SHIFT) & ISCSI_AGE_MASK;
1308 }
1309
1310 if (age != session->age) {
0af967f5
MC
1311 iscsi_conn_printk(KERN_ERR, conn,
1312 "received itt %x expected session age (%x)\n",
913e5bf4 1313 (__force u32)itt, session->age);
0af967f5
MC
1314 return ISCSI_ERR_BAD_ITT;
1315 }
7996a778 1316
3e5c28ad
MC
1317 if (i >= session->cmds_max) {
1318 iscsi_conn_printk(KERN_ERR, conn,
1319 "received invalid itt index %u (max cmds "
1320 "%u.\n", i, session->cmds_max);
1321 return ISCSI_ERR_BAD_ITT;
7996a778 1322 }
7996a778
MC
1323 return 0;
1324}
1325EXPORT_SYMBOL_GPL(iscsi_verify_itt);
1326
913e5bf4
MC
1327/**
1328 * iscsi_itt_to_ctask - look up ctask by itt
1329 * @conn: iscsi connection
1330 * @itt: itt
1331 *
1332 * This should be used for cmd tasks.
1333 *
659743b0 1334 * The session back_lock must be held.
913e5bf4
MC
1335 */
1336struct iscsi_task *iscsi_itt_to_ctask(struct iscsi_conn *conn, itt_t itt)
0af967f5 1337{
9c19a7d0 1338 struct iscsi_task *task;
0af967f5
MC
1339
1340 if (iscsi_verify_itt(conn, itt))
1341 return NULL;
1342
913e5bf4
MC
1343 task = iscsi_itt_to_task(conn, itt);
1344 if (!task || !task->sc)
0af967f5
MC
1345 return NULL;
1346
913e5bf4
MC
1347 if (task->sc->SCp.phase != conn->session->age) {
1348 iscsi_session_printk(KERN_ERR, conn->session,
1349 "task's session age %d, expected %d\n",
1350 task->sc->SCp.phase, conn->session->age);
0af967f5 1351 return NULL;
913e5bf4 1352 }
0af967f5 1353
9c19a7d0 1354 return task;
0af967f5
MC
1355}
1356EXPORT_SYMBOL_GPL(iscsi_itt_to_ctask);
1357
40a06e75 1358void iscsi_session_failure(struct iscsi_session *session,
e5bd7b54
MC
1359 enum iscsi_err err)
1360{
e5bd7b54 1361 struct iscsi_conn *conn;
e5bd7b54 1362
659743b0 1363 spin_lock_bh(&session->frwd_lock);
e5bd7b54
MC
1364 conn = session->leadconn;
1365 if (session->state == ISCSI_STATE_TERMINATE || !conn) {
659743b0 1366 spin_unlock_bh(&session->frwd_lock);
e5bd7b54
MC
1367 return;
1368 }
1369
b1d19e8c 1370 iscsi_get_conn(conn->cls_conn);
659743b0 1371 spin_unlock_bh(&session->frwd_lock);
e5bd7b54
MC
1372 /*
1373 * if the host is being removed bypass the connection
1374 * recovery initialization because we are going to kill
1375 * the session.
1376 */
1377 if (err == ISCSI_ERR_INVALID_HOST)
1378 iscsi_conn_error_event(conn->cls_conn, err);
1379 else
1380 iscsi_conn_failure(conn, err);
b1d19e8c 1381 iscsi_put_conn(conn->cls_conn);
e5bd7b54
MC
1382}
1383EXPORT_SYMBOL_GPL(iscsi_session_failure);
1384
891e2639 1385static bool iscsi_set_conn_failed(struct iscsi_conn *conn)
7996a778
MC
1386{
1387 struct iscsi_session *session = conn->session;
7996a778 1388
891e2639
MC
1389 if (session->state == ISCSI_STATE_FAILED)
1390 return false;
656cffc9 1391
67a61114 1392 if (conn->stop_stage == 0)
7996a778 1393 session->state = ISCSI_STATE_FAILED;
e5bd7b54 1394
7996a778
MC
1395 set_bit(ISCSI_SUSPEND_BIT, &conn->suspend_tx);
1396 set_bit(ISCSI_SUSPEND_BIT, &conn->suspend_rx);
891e2639
MC
1397 return true;
1398}
1399
1400void iscsi_conn_failure(struct iscsi_conn *conn, enum iscsi_err err)
1401{
1402 struct iscsi_session *session = conn->session;
1403 bool needs_evt;
1404
1405 spin_lock_bh(&session->frwd_lock);
1406 needs_evt = iscsi_set_conn_failed(conn);
1407 spin_unlock_bh(&session->frwd_lock);
1408
1409 if (needs_evt)
1410 iscsi_conn_error_event(conn->cls_conn, err);
7996a778
MC
1411}
1412EXPORT_SYMBOL_GPL(iscsi_conn_failure);
1413
77a23c21
MC
1414static int iscsi_check_cmdsn_window_closed(struct iscsi_conn *conn)
1415{
1416 struct iscsi_session *session = conn->session;
1417
1418 /*
1419 * Check for iSCSI window and take care of CmdSN wrap-around
1420 */
e0726407 1421 if (!iscsi_sna_lte(session->queued_cmdsn, session->max_cmdsn)) {
1b2c7af8
MC
1422 ISCSI_DBG_SESSION(session, "iSCSI CmdSN closed. ExpCmdSn "
1423 "%u MaxCmdSN %u CmdSN %u/%u\n",
1424 session->exp_cmdsn, session->max_cmdsn,
1425 session->cmdsn, session->queued_cmdsn);
77a23c21
MC
1426 return -ENOSPC;
1427 }
1428 return 0;
1429}
1430
5923d64b
MC
1431static int iscsi_xmit_task(struct iscsi_conn *conn, struct iscsi_task *task,
1432 bool was_requeue)
77a23c21 1433{
843c0a8a 1434 int rc;
77a23c21 1435
79edd00d 1436 spin_lock_bh(&conn->session->back_lock);
5923d64b
MC
1437
1438 if (!conn->task) {
1439 /* Take a ref so we can access it after xmit_task() */
1440 __iscsi_get_task(task);
1441 } else {
1442 /* Already have a ref from when we failed to send it last call */
1443 conn->task = NULL;
1444 }
1445
1446 /*
1447 * If this was a requeue for a R2T we have an extra ref on the task in
1448 * case a bad target sends a cmd rsp before we have handled the task.
1449 */
1450 if (was_requeue)
1451 __iscsi_put_task(task);
1452
1453 /*
1454 * Do this after dropping the extra ref because if this was a requeue
1455 * it's removed from that list and cleanup_queued_task would miss it.
1456 */
1457 if (test_bit(ISCSI_SUSPEND_BIT, &conn->suspend_tx)) {
1458 /*
1459 * Save the task and ref in case we weren't cleaning up this
1460 * task and get woken up again.
1461 */
1462 conn->task = task;
79edd00d
AS
1463 spin_unlock_bh(&conn->session->back_lock);
1464 return -ENODATA;
1465 }
79edd00d 1466 spin_unlock_bh(&conn->session->back_lock);
5923d64b 1467
659743b0 1468 spin_unlock_bh(&conn->session->frwd_lock);
9c19a7d0 1469 rc = conn->session->tt->xmit_task(task);
659743b0 1470 spin_lock_bh(&conn->session->frwd_lock);
d355e57d 1471 if (!rc) {
9c19a7d0 1472 /* done with this task */
d355e57d 1473 task->last_xfer = jiffies;
d355e57d 1474 }
659743b0 1475 /* regular RX path uses back_lock */
72b97402 1476 spin_lock(&conn->session->back_lock);
5923d64b
MC
1477 if (rc && task->state == ISCSI_TASK_RUNNING) {
1478 /*
1479 * get an extra ref that is released next time we access it
1480 * as conn->task above.
1481 */
1482 __iscsi_get_task(task);
1483 conn->task = task;
1484 }
1485
d355e57d 1486 __iscsi_put_task(task);
72b97402 1487 spin_unlock(&conn->session->back_lock);
77a23c21
MC
1488 return rc;
1489}
1490
843c0a8a 1491/**
9c19a7d0
MC
1492 * iscsi_requeue_task - requeue task to run from session workqueue
1493 * @task: task to requeue
843c0a8a 1494 *
5923d64b 1495 * Callers must have taken a ref to the task that is going to be requeued.
843c0a8a 1496 */
9c19a7d0 1497void iscsi_requeue_task(struct iscsi_task *task)
843c0a8a 1498{
9c19a7d0 1499 struct iscsi_conn *conn = task->conn;
843c0a8a 1500
3bbaaad9
MC
1501 /*
1502 * this may be on the requeue list already if the xmit_task callout
1503 * is handling the r2ts while we are adding new ones
1504 */
5923d64b
MC
1505 spin_lock_bh(&conn->session->frwd_lock);
1506 if (list_empty(&task->running)) {
3bbaaad9 1507 list_add_tail(&task->running, &conn->requeue);
5923d64b
MC
1508 } else {
1509 /*
1510 * Don't need the extra ref since it's already requeued and
1511 * has a ref.
1512 */
1513 iscsi_put_task(task);
1514 }
32ae763e 1515 iscsi_conn_queue_work(conn);
5923d64b 1516 spin_unlock_bh(&conn->session->frwd_lock);
843c0a8a 1517}
9c19a7d0 1518EXPORT_SYMBOL_GPL(iscsi_requeue_task);
843c0a8a 1519
7996a778
MC
1520/**
1521 * iscsi_data_xmit - xmit any command into the scheduled connection
1522 * @conn: iscsi connection
1523 *
1524 * Notes:
1525 * The function can return -EAGAIN in which case the caller must
1526 * re-schedule it again later or recover. '0' return code means
1527 * successful xmit.
1528 **/
1529static int iscsi_data_xmit(struct iscsi_conn *conn)
1530{
5d12c05e 1531 struct iscsi_task *task;
3219e529 1532 int rc = 0;
7996a778 1533
659743b0 1534 spin_lock_bh(&conn->session->frwd_lock);
70b31c15 1535 if (test_bit(ISCSI_SUSPEND_BIT, &conn->suspend_tx)) {
1b2c7af8 1536 ISCSI_DBG_SESSION(conn->session, "Tx suspended!\n");
659743b0 1537 spin_unlock_bh(&conn->session->frwd_lock);
3219e529 1538 return -ENODATA;
7996a778 1539 }
7996a778 1540
9c19a7d0 1541 if (conn->task) {
5923d64b 1542 rc = iscsi_xmit_task(conn, conn->task, false);
3219e529 1543 if (rc)
70b31c15 1544 goto done;
7996a778
MC
1545 }
1546
77a23c21
MC
1547 /*
1548 * process mgmt pdus like nops before commands since we should
1549 * only have one nop-out as a ping from us and targets should not
1550 * overflow us with nop-ins
1551 */
1552check_mgmt:
843c0a8a 1553 while (!list_empty(&conn->mgmtqueue)) {
5923d64b
MC
1554 task = list_entry(conn->mgmtqueue.next, struct iscsi_task,
1555 running);
1556 list_del_init(&task->running);
1557 if (iscsi_prep_mgmt_task(conn, task)) {
659743b0
SP
1558 /* regular RX path uses back_lock */
1559 spin_lock_bh(&conn->session->back_lock);
5923d64b 1560 __iscsi_put_task(task);
659743b0 1561 spin_unlock_bh(&conn->session->back_lock);
b3a7ea8d
MC
1562 continue;
1563 }
5923d64b 1564 rc = iscsi_xmit_task(conn, task, false);
77a23c21 1565 if (rc)
70b31c15 1566 goto done;
7996a778
MC
1567 }
1568
843c0a8a 1569 /* process pending command queue */
3bbaaad9 1570 while (!list_empty(&conn->cmdqueue)) {
5923d64b
MC
1571 task = list_entry(conn->cmdqueue.next, struct iscsi_task,
1572 running);
1573 list_del_init(&task->running);
b3a7ea8d 1574 if (conn->session->state == ISCSI_STATE_LOGGING_OUT) {
5923d64b 1575 fail_scsi_task(task, DID_IMM_RETRY);
b3a7ea8d
MC
1576 continue;
1577 }
5923d64b 1578 rc = iscsi_prep_scsi_cmd_pdu(task);
577577da 1579 if (rc) {
d28d48c6 1580 if (rc == -ENOMEM || rc == -EACCES)
5923d64b 1581 fail_scsi_task(task, DID_IMM_RETRY);
d28d48c6 1582 else
5923d64b 1583 fail_scsi_task(task, DID_ABORT);
004d6530
BH
1584 continue;
1585 }
5923d64b 1586 rc = iscsi_xmit_task(conn, task, false);
77a23c21 1587 if (rc)
70b31c15 1588 goto done;
77a23c21 1589 /*
9c19a7d0 1590 * we could continuously get new task requests so
77a23c21
MC
1591 * we need to check the mgmt queue for nops that need to
1592 * be sent to aviod starvation
1593 */
843c0a8a
MC
1594 if (!list_empty(&conn->mgmtqueue))
1595 goto check_mgmt;
1596 }
1597
1598 while (!list_empty(&conn->requeue)) {
b3a7ea8d
MC
1599 /*
1600 * we always do fastlogout - conn stop code will clean up.
1601 */
1602 if (conn->session->state == ISCSI_STATE_LOGGING_OUT)
1603 break;
1604
5d12c05e
MC
1605 task = list_entry(conn->requeue.next, struct iscsi_task,
1606 running);
5923d64b 1607
5d12c05e
MC
1608 if (iscsi_check_tmf_restrictions(task, ISCSI_OP_SCSI_DATA_OUT))
1609 break;
1610
5923d64b
MC
1611 list_del_init(&task->running);
1612 rc = iscsi_xmit_task(conn, task, true);
843c0a8a 1613 if (rc)
70b31c15 1614 goto done;
843c0a8a 1615 if (!list_empty(&conn->mgmtqueue))
77a23c21 1616 goto check_mgmt;
7996a778 1617 }
659743b0 1618 spin_unlock_bh(&conn->session->frwd_lock);
3219e529 1619 return -ENODATA;
7996a778 1620
70b31c15 1621done:
659743b0 1622 spin_unlock_bh(&conn->session->frwd_lock);
3219e529 1623 return rc;
7996a778
MC
1624}
1625
c4028958 1626static void iscsi_xmitworker(struct work_struct *work)
7996a778 1627{
c4028958
DH
1628 struct iscsi_conn *conn =
1629 container_of(work, struct iscsi_conn, xmitwork);
3219e529 1630 int rc;
7996a778
MC
1631 /*
1632 * serialize Xmit worker on a per-connection basis.
1633 */
3219e529
MC
1634 do {
1635 rc = iscsi_data_xmit(conn);
1636 } while (rc >= 0 || rc == -EAGAIN);
7996a778
MC
1637}
1638
577577da
MC
1639static inline struct iscsi_task *iscsi_alloc_task(struct iscsi_conn *conn,
1640 struct scsi_cmnd *sc)
1641{
1642 struct iscsi_task *task;
1643
7acd72eb 1644 if (!kfifo_out(&conn->session->cmdpool.queue,
577577da
MC
1645 (void *) &task, sizeof(void *)))
1646 return NULL;
1647
1648 sc->SCp.phase = conn->session->age;
1649 sc->SCp.ptr = (char *) task;
1650
6dc618cd 1651 refcount_set(&task->refcount, 1);
577577da
MC
1652 task->state = ISCSI_TASK_PENDING;
1653 task->conn = conn;
1654 task->sc = sc;
d355e57d
MC
1655 task->have_checked_conn = false;
1656 task->last_timeout = jiffies;
1657 task->last_xfer = jiffies;
55e51eda 1658 task->protected = false;
577577da
MC
1659 INIT_LIST_HEAD(&task->running);
1660 return task;
1661}
1662
7996a778
MC
1663enum {
1664 FAILURE_BAD_HOST = 1,
1665 FAILURE_SESSION_FAILED,
1666 FAILURE_SESSION_FREED,
1667 FAILURE_WINDOW_CLOSED,
60ecebf5 1668 FAILURE_OOM,
7996a778 1669 FAILURE_SESSION_TERMINATE,
656cffc9 1670 FAILURE_SESSION_IN_RECOVERY,
7996a778 1671 FAILURE_SESSION_RECOVERY_TIMEOUT,
b3a7ea8d 1672 FAILURE_SESSION_LOGGING_OUT,
6eabafbe 1673 FAILURE_SESSION_NOT_READY,
7996a778
MC
1674};
1675
f41d4721 1676int iscsi_queuecommand(struct Scsi_Host *host, struct scsi_cmnd *sc)
7996a778 1677{
75613521 1678 struct iscsi_cls_session *cls_session;
1336aed1 1679 struct iscsi_host *ihost;
7996a778
MC
1680 int reason = 0;
1681 struct iscsi_session *session;
1682 struct iscsi_conn *conn;
9c19a7d0 1683 struct iscsi_task *task = NULL;
7996a778 1684
7996a778 1685 sc->result = 0;
f47f2cf5 1686 sc->SCp.ptr = NULL;
7996a778 1687
1336aed1 1688 ihost = shost_priv(host);
7996a778 1689
75613521
MC
1690 cls_session = starget_to_session(scsi_target(sc->device));
1691 session = cls_session->dd_data;
659743b0 1692 spin_lock_bh(&session->frwd_lock);
7996a778 1693
75613521 1694 reason = iscsi_session_chkready(cls_session);
6eabafbe
MC
1695 if (reason) {
1696 sc->result = reason;
1697 goto fault;
1698 }
1699
301e0f7e 1700 if (session->state != ISCSI_STATE_LOGGED_IN) {
656cffc9
MC
1701 /*
1702 * to handle the race between when we set the recovery state
1703 * and block the session we requeue here (commands could
1704 * be entering our queuecommand while a block is starting
1705 * up because the block code is not locked)
1706 */
9000bcd6 1707 switch (session->state) {
301e0f7e 1708 case ISCSI_STATE_FAILED:
d7549412
RDT
1709 /*
1710 * cmds should fail during shutdown, if the session
1711 * state is bad, allowing completion to happen
1712 */
1713 if (unlikely(system_state != SYSTEM_RUNNING)) {
1714 reason = FAILURE_SESSION_FAILED;
1715 sc->result = DID_NO_CONNECT << 16;
1716 break;
1717 }
df561f66 1718 fallthrough;
9000bcd6 1719 case ISCSI_STATE_IN_RECOVERY:
656cffc9 1720 reason = FAILURE_SESSION_IN_RECOVERY;
301e0f7e
MC
1721 sc->result = DID_IMM_RETRY << 16;
1722 break;
9000bcd6
MC
1723 case ISCSI_STATE_LOGGING_OUT:
1724 reason = FAILURE_SESSION_LOGGING_OUT;
301e0f7e
MC
1725 sc->result = DID_IMM_RETRY << 16;
1726 break;
b3a7ea8d 1727 case ISCSI_STATE_RECOVERY_FAILED:
656cffc9 1728 reason = FAILURE_SESSION_RECOVERY_TIMEOUT;
56d7fcfa 1729 sc->result = DID_TRANSPORT_FAILFAST << 16;
b3a7ea8d
MC
1730 break;
1731 case ISCSI_STATE_TERMINATE:
656cffc9 1732 reason = FAILURE_SESSION_TERMINATE;
6eabafbe 1733 sc->result = DID_NO_CONNECT << 16;
b3a7ea8d 1734 break;
b3a7ea8d 1735 default:
656cffc9 1736 reason = FAILURE_SESSION_FREED;
6eabafbe 1737 sc->result = DID_NO_CONNECT << 16;
b3a7ea8d 1738 }
7996a778
MC
1739 goto fault;
1740 }
1741
7996a778 1742 conn = session->leadconn;
98644047
MC
1743 if (!conn) {
1744 reason = FAILURE_SESSION_FREED;
6eabafbe 1745 sc->result = DID_NO_CONNECT << 16;
98644047
MC
1746 goto fault;
1747 }
7996a778 1748
661134ad
MC
1749 if (test_bit(ISCSI_SUSPEND_BIT, &conn->suspend_tx)) {
1750 reason = FAILURE_SESSION_IN_RECOVERY;
eef9ffdf 1751 sc->result = DID_REQUEUE << 16;
661134ad
MC
1752 goto fault;
1753 }
1754
77a23c21
MC
1755 if (iscsi_check_cmdsn_window_closed(conn)) {
1756 reason = FAILURE_WINDOW_CLOSED;
1757 goto reject;
1758 }
1759
577577da
MC
1760 task = iscsi_alloc_task(conn, sc);
1761 if (!task) {
60ecebf5
MC
1762 reason = FAILURE_OOM;
1763 goto reject;
1764 }
7996a778 1765
1336aed1 1766 if (!ihost->workq) {
577577da
MC
1767 reason = iscsi_prep_scsi_cmd_pdu(task);
1768 if (reason) {
5d12c05e 1769 if (reason == -ENOMEM || reason == -EACCES) {
577577da
MC
1770 reason = FAILURE_OOM;
1771 goto prepd_reject;
1772 } else {
1773 sc->result = DID_ABORT << 16;
1774 goto prepd_fault;
1775 }
052d0144 1776 }
9c19a7d0 1777 if (session->tt->xmit_task(task)) {
d3305f34 1778 session->cmdsn--;
052d0144 1779 reason = FAILURE_SESSION_NOT_READY;
577577da 1780 goto prepd_reject;
052d0144 1781 }
3bbaaad9
MC
1782 } else {
1783 list_add_tail(&task->running, &conn->cmdqueue);
32ae763e 1784 iscsi_conn_queue_work(conn);
3bbaaad9 1785 }
052d0144
MC
1786
1787 session->queued_cmdsn++;
659743b0 1788 spin_unlock_bh(&session->frwd_lock);
7996a778
MC
1789 return 0;
1790
577577da 1791prepd_reject:
a656183e 1792 spin_lock_bh(&session->back_lock);
f41d4721 1793 iscsi_complete_task(task, ISCSI_TASK_REQUEUE_SCSIQ);
a656183e 1794 spin_unlock_bh(&session->back_lock);
7996a778 1795reject:
659743b0 1796 spin_unlock_bh(&session->frwd_lock);
1b2c7af8
MC
1797 ISCSI_DBG_SESSION(session, "cmd 0x%x rejected (%d)\n",
1798 sc->cmnd[0], reason);
d6d13ee1 1799 return SCSI_MLQUEUE_TARGET_BUSY;
7996a778 1800
577577da 1801prepd_fault:
a656183e 1802 spin_lock_bh(&session->back_lock);
f41d4721 1803 iscsi_complete_task(task, ISCSI_TASK_REQUEUE_SCSIQ);
a656183e 1804 spin_unlock_bh(&session->back_lock);
7996a778 1805fault:
659743b0 1806 spin_unlock_bh(&session->frwd_lock);
1b2c7af8
MC
1807 ISCSI_DBG_SESSION(session, "iscsi: cmd 0x%x is not queued (%d)\n",
1808 sc->cmnd[0], reason);
ae3d56d8 1809 scsi_set_resid(sc, scsi_bufflen(sc));
b4b84edc 1810 scsi_done(sc);
7996a778
MC
1811 return 0;
1812}
1813EXPORT_SYMBOL_GPL(iscsi_queuecommand);
1814
6b5d6c44
MC
1815int iscsi_target_alloc(struct scsi_target *starget)
1816{
1817 struct iscsi_cls_session *cls_session = starget_to_session(starget);
1818 struct iscsi_session *session = cls_session->dd_data;
1819
1820 starget->can_queue = session->scsi_cmds_max;
1821 return 0;
1822}
1823EXPORT_SYMBOL_GPL(iscsi_target_alloc);
1824
2c4b9637 1825static void iscsi_tmf_timedout(struct timer_list *t)
7996a778 1826{
ec29d0ac 1827 struct iscsi_session *session = from_timer(session, t, tmf_timer);
7996a778 1828
659743b0 1829 spin_lock(&session->frwd_lock);
ec29d0ac
MC
1830 if (session->tmf_state == TMF_QUEUED) {
1831 session->tmf_state = TMF_TIMEDOUT;
bd2199d4 1832 ISCSI_DBG_EH(session, "tmf timedout\n");
7996a778 1833 /* unblock eh_abort() */
ec29d0ac 1834 wake_up(&session->ehwait);
7996a778 1835 }
659743b0 1836 spin_unlock(&session->frwd_lock);
7996a778
MC
1837}
1838
9c19a7d0 1839static int iscsi_exec_task_mgmt_fn(struct iscsi_conn *conn,
f6d5180c
MC
1840 struct iscsi_tm *hdr, int age,
1841 int timeout)
1360c58a 1842 __must_hold(&session->frwd_lock)
7996a778 1843{
7996a778 1844 struct iscsi_session *session = conn->session;
9c19a7d0 1845 struct iscsi_task *task;
7996a778 1846
9c19a7d0 1847 task = __iscsi_conn_send_pdu(conn, (struct iscsi_hdr *)hdr,
843c0a8a 1848 NULL, 0);
9c19a7d0 1849 if (!task) {
659743b0 1850 spin_unlock_bh(&session->frwd_lock);
df4da5cd 1851 iscsi_conn_printk(KERN_ERR, conn, "Could not send TMF.\n");
7996a778 1852 iscsi_conn_failure(conn, ISCSI_ERR_CONN_FAILED);
659743b0 1853 spin_lock_bh(&session->frwd_lock);
77a23c21 1854 return -EPERM;
7996a778 1855 }
843c0a8a 1856 conn->tmfcmd_pdus_cnt++;
ec29d0ac
MC
1857 session->tmf_timer.expires = timeout * HZ + jiffies;
1858 add_timer(&session->tmf_timer);
bd2199d4 1859 ISCSI_DBG_EH(session, "tmf set timeout\n");
7996a778 1860
659743b0 1861 spin_unlock_bh(&session->frwd_lock);
6724add1 1862 mutex_unlock(&session->eh_mutex);
7996a778
MC
1863
1864 /*
1865 * block eh thread until:
1866 *
843c0a8a
MC
1867 * 1) tmf response
1868 * 2) tmf timeout
7996a778
MC
1869 * 3) session is terminated or restarted or userspace has
1870 * given up on recovery
1871 */
ec29d0ac 1872 wait_event_interruptible(session->ehwait, age != session->age ||
7996a778 1873 session->state != ISCSI_STATE_LOGGED_IN ||
ec29d0ac 1874 session->tmf_state != TMF_QUEUED);
7996a778
MC
1875 if (signal_pending(current))
1876 flush_signals(current);
ec29d0ac 1877 del_timer_sync(&session->tmf_timer);
843c0a8a 1878
6724add1 1879 mutex_lock(&session->eh_mutex);
659743b0 1880 spin_lock_bh(&session->frwd_lock);
9c19a7d0 1881 /* if the session drops it will clean up the task */
843c0a8a
MC
1882 if (age != session->age ||
1883 session->state != ISCSI_STATE_LOGGED_IN)
1884 return -ENOTCONN;
7996a778
MC
1885 return 0;
1886}
1887
843c0a8a 1888/*
14936b1e 1889 * Fail commands. session frwd lock held and xmit thread flushed.
843c0a8a 1890 */
9cb78c16 1891static void fail_scsi_tasks(struct iscsi_conn *conn, u64 lun, int error)
843c0a8a 1892{
14936b1e 1893 struct iscsi_session *session = conn->session;
3bbaaad9
MC
1894 struct iscsi_task *task;
1895 int i;
843c0a8a 1896
14936b1e
MC
1897 spin_lock_bh(&session->back_lock);
1898 for (i = 0; i < session->cmds_max; i++) {
1899 task = session->cmds[i];
3bbaaad9
MC
1900 if (!task->sc || task->state == ISCSI_TASK_FREE)
1901 continue;
843c0a8a 1902
3bbaaad9
MC
1903 if (lun != -1 && lun != task->sc->device->lun)
1904 continue;
843c0a8a 1905
14936b1e
MC
1906 __iscsi_get_task(task);
1907 spin_unlock_bh(&session->back_lock);
1908
1909 ISCSI_DBG_SESSION(session,
3bbaaad9
MC
1910 "failing sc %p itt 0x%x state %d\n",
1911 task->sc, task->itt, task->state);
b3cd5050 1912 fail_scsi_task(task, error);
14936b1e
MC
1913
1914 spin_unlock_bh(&session->frwd_lock);
1915 iscsi_put_task(task);
1916 spin_lock_bh(&session->frwd_lock);
1917
1918 spin_lock_bh(&session->back_lock);
843c0a8a 1919 }
14936b1e
MC
1920
1921 spin_unlock_bh(&session->back_lock);
843c0a8a
MC
1922}
1923
661134ad
MC
1924/**
1925 * iscsi_suspend_queue - suspend iscsi_queuecommand
1926 * @conn: iscsi conn to stop queueing IO on
1927 *
659743b0 1928 * This grabs the session frwd_lock to make sure no one is in
661134ad
MC
1929 * xmit_task/queuecommand, and then sets suspend to prevent
1930 * new commands from being queued. This only needs to be called
1931 * by offload drivers that need to sync a path like ep disconnect
1932 * with the iscsi_queuecommand/xmit_task. To start IO again libiscsi
1933 * will call iscsi_start_tx and iscsi_unblock_session when in FFP.
1934 */
1935void iscsi_suspend_queue(struct iscsi_conn *conn)
1936{
659743b0 1937 spin_lock_bh(&conn->session->frwd_lock);
661134ad 1938 set_bit(ISCSI_SUSPEND_BIT, &conn->suspend_tx);
659743b0 1939 spin_unlock_bh(&conn->session->frwd_lock);
661134ad
MC
1940}
1941EXPORT_SYMBOL_GPL(iscsi_suspend_queue);
1942
1943/**
1944 * iscsi_suspend_tx - suspend iscsi_data_xmit
1945 * @conn: iscsi conn tp stop processing IO on.
1946 *
1947 * This function sets the suspend bit to prevent iscsi_data_xmit
1948 * from sending new IO, and if work is queued on the xmit thread
1949 * it will wait for it to be completed.
1950 */
b40977d9 1951void iscsi_suspend_tx(struct iscsi_conn *conn)
6724add1 1952{
32ae763e
MC
1953 struct Scsi_Host *shost = conn->session->host;
1954 struct iscsi_host *ihost = shost_priv(shost);
1955
6724add1 1956 set_bit(ISCSI_SUSPEND_BIT, &conn->suspend_tx);
1336aed1 1957 if (ihost->workq)
32ae763e 1958 flush_workqueue(ihost->workq);
6724add1 1959}
b40977d9 1960EXPORT_SYMBOL_GPL(iscsi_suspend_tx);
6724add1
MC
1961
1962static void iscsi_start_tx(struct iscsi_conn *conn)
1963{
1964 clear_bit(ISCSI_SUSPEND_BIT, &conn->suspend_tx);
1336aed1 1965 iscsi_conn_queue_work(conn);
6724add1
MC
1966}
1967
4c48a829
MC
1968/*
1969 * We want to make sure a ping is in flight. It has timed out.
1970 * And we are not busy processing a pdu that is making
1971 * progress but got started before the ping and is taking a while
1972 * to complete so the ping is just stuck behind it in a queue.
1973 */
1974static int iscsi_has_ping_timed_out(struct iscsi_conn *conn)
1975{
fe0a8a95 1976 if (READ_ONCE(conn->ping_task) &&
4c48a829
MC
1977 time_before_eq(conn->last_recv + (conn->recv_timeout * HZ) +
1978 (conn->ping_timeout * HZ), jiffies))
1979 return 1;
1980 else
1981 return 0;
1982}
1983
b6a05c82 1984enum blk_eh_timer_return iscsi_eh_cmd_timed_out(struct scsi_cmnd *sc)
f6d5180c 1985{
6600593c 1986 enum blk_eh_timer_return rc = BLK_EH_DONE;
92ed4d69 1987 struct iscsi_task *task = NULL, *running_task;
f6d5180c
MC
1988 struct iscsi_cls_session *cls_session;
1989 struct iscsi_session *session;
1990 struct iscsi_conn *conn;
92ed4d69 1991 int i;
f6d5180c 1992
d355e57d 1993 cls_session = starget_to_session(scsi_target(sc->device));
75613521 1994 session = cls_session->dd_data;
f6d5180c 1995
bd2199d4 1996 ISCSI_DBG_EH(session, "scsi cmd %p timedout\n", sc);
f6d5180c 1997
5480e299 1998 spin_lock_bh(&session->frwd_lock);
14936b1e 1999 spin_lock(&session->back_lock);
e3d338a5
MC
2000 task = (struct iscsi_task *)sc->SCp.ptr;
2001 if (!task) {
2002 /*
2003 * Raced with completion. Blk layer has taken ownership
2004 * so let timeout code complete it now.
2005 */
adb2b769 2006 rc = BLK_EH_DONE;
14936b1e 2007 spin_unlock(&session->back_lock);
e3d338a5
MC
2008 goto done;
2009 }
14936b1e
MC
2010 __iscsi_get_task(task);
2011 spin_unlock(&session->back_lock);
e3d338a5 2012
f6d5180c 2013 if (session->state != ISCSI_STATE_LOGGED_IN) {
d7549412
RDT
2014 /*
2015 * During shutdown, if session is prematurely disconnected,
2016 * recovery won't happen and there will be hung cmds. Not
2017 * handling cmds would trigger EH, also bad in this case.
2018 * Instead, handle cmd, allow completion to happen and let
2019 * upper layer to deal with the result.
2020 */
2021 if (unlikely(system_state != SYSTEM_RUNNING)) {
2022 sc->result = DID_NO_CONNECT << 16;
2023 ISCSI_DBG_EH(session, "sc on shutdown, handled\n");
adb2b769 2024 rc = BLK_EH_DONE;
d7549412
RDT
2025 goto done;
2026 }
f6d5180c
MC
2027 /*
2028 * We are probably in the middle of iscsi recovery so let
2029 * that complete and handle the error.
2030 */
242f9dcb 2031 rc = BLK_EH_RESET_TIMER;
f6d5180c
MC
2032 goto done;
2033 }
2034
2035 conn = session->leadconn;
2036 if (!conn) {
2037 /* In the middle of shuting down */
242f9dcb 2038 rc = BLK_EH_RESET_TIMER;
f6d5180c
MC
2039 goto done;
2040 }
2041
d355e57d
MC
2042 /*
2043 * If we have sent (at least queued to the network layer) a pdu or
2044 * recvd one for the task since the last timeout ask for
2045 * more time. If on the next timeout we have not made progress
2046 * we can check if it is the task or connection when we send the
2047 * nop as a ping.
2048 */
92ed4d69 2049 if (time_after(task->last_xfer, task->last_timeout)) {
bd2199d4
EZ
2050 ISCSI_DBG_EH(session, "Command making progress. Asking "
2051 "scsi-ml for more time to complete. "
92ed4d69 2052 "Last data xfer at %lu. Last timeout was at "
bd2199d4 2053 "%lu\n.", task->last_xfer, task->last_timeout);
d355e57d
MC
2054 task->have_checked_conn = false;
2055 rc = BLK_EH_RESET_TIMER;
2056 goto done;
2057 }
2058
f6d5180c
MC
2059 if (!conn->recv_timeout && !conn->ping_timeout)
2060 goto done;
2061 /*
2062 * if the ping timedout then we are in the middle of cleaning up
2063 * and can let the iscsi eh handle it
2064 */
4c48a829 2065 if (iscsi_has_ping_timed_out(conn)) {
242f9dcb 2066 rc = BLK_EH_RESET_TIMER;
4c48a829
MC
2067 goto done;
2068 }
d355e57d 2069
14936b1e 2070 spin_lock(&session->back_lock);
92ed4d69
MC
2071 for (i = 0; i < conn->session->cmds_max; i++) {
2072 running_task = conn->session->cmds[i];
2073 if (!running_task->sc || running_task == task ||
2074 running_task->state != ISCSI_TASK_RUNNING)
2075 continue;
2076
2077 /*
2078 * Only check if cmds started before this one have made
2079 * progress, or this could never fail
2080 */
2081 if (time_after(running_task->sc->jiffies_at_alloc,
2082 task->sc->jiffies_at_alloc))
2083 continue;
2084
2085 if (time_after(running_task->last_xfer, task->last_timeout)) {
2086 /*
2087 * This task has not made progress, but a task
2088 * started before us has transferred data since
2089 * we started/last-checked. We could be queueing
2090 * too many tasks or the LU is bad.
2091 *
2092 * If the device is bad the cmds ahead of us on
2093 * other devs will complete, and this loop will
2094 * eventually fail starting the scsi eh.
2095 */
2096 ISCSI_DBG_EH(session, "Command has not made progress "
2097 "but commands ahead of it have. "
2098 "Asking scsi-ml for more time to "
2099 "complete. Our last xfer vs running task "
2100 "last xfer %lu/%lu. Last check %lu.\n",
2101 task->last_xfer, running_task->last_xfer,
2102 task->last_timeout);
14936b1e 2103 spin_unlock(&session->back_lock);
92ed4d69
MC
2104 rc = BLK_EH_RESET_TIMER;
2105 goto done;
2106 }
2107 }
14936b1e 2108 spin_unlock(&session->back_lock);
92ed4d69 2109
d355e57d
MC
2110 /* Assumes nop timeout is shorter than scsi cmd timeout */
2111 if (task->have_checked_conn)
2112 goto done;
2113
f6d5180c 2114 /*
d355e57d
MC
2115 * Checking the transport already or nop from a cmd timeout still
2116 * running
f6d5180c 2117 */
fe0a8a95 2118 if (READ_ONCE(conn->ping_task)) {
d355e57d 2119 task->have_checked_conn = true;
242f9dcb 2120 rc = BLK_EH_RESET_TIMER;
4c48a829
MC
2121 goto done;
2122 }
2123
d355e57d
MC
2124 /* Make sure there is a transport check done */
2125 iscsi_send_nopout(conn, NULL);
2126 task->have_checked_conn = true;
2127 rc = BLK_EH_RESET_TIMER;
2128
f6d5180c 2129done:
5480e299 2130 spin_unlock_bh(&session->frwd_lock);
14936b1e
MC
2131
2132 if (task) {
2133 task->last_timeout = jiffies;
2134 iscsi_put_task(task);
2135 }
bd2199d4 2136 ISCSI_DBG_EH(session, "return %s\n", rc == BLK_EH_RESET_TIMER ?
d7549412 2137 "timer reset" : "shutdown or nh");
f6d5180c
MC
2138 return rc;
2139}
b6a05c82 2140EXPORT_SYMBOL_GPL(iscsi_eh_cmd_timed_out);
f6d5180c 2141
2c4b9637 2142static void iscsi_check_transport_timeouts(struct timer_list *t)
f6d5180c 2143{
2c4b9637 2144 struct iscsi_conn *conn = from_timer(conn, t, transport_timer);
f6d5180c 2145 struct iscsi_session *session = conn->session;
4cf10435 2146 unsigned long recv_timeout, next_timeout = 0, last_recv;
f6d5180c 2147
659743b0 2148 spin_lock(&session->frwd_lock);
f6d5180c
MC
2149 if (session->state != ISCSI_STATE_LOGGED_IN)
2150 goto done;
2151
4cf10435
MC
2152 recv_timeout = conn->recv_timeout;
2153 if (!recv_timeout)
f6d5180c
MC
2154 goto done;
2155
4cf10435 2156 recv_timeout *= HZ;
f6d5180c 2157 last_recv = conn->last_recv;
4c48a829
MC
2158
2159 if (iscsi_has_ping_timed_out(conn)) {
322d739d 2160 iscsi_conn_printk(KERN_ERR, conn, "ping timeout of %d secs "
4c48a829
MC
2161 "expired, recv timeout %d, last rx %lu, "
2162 "last ping %lu, now %lu\n",
2163 conn->ping_timeout, conn->recv_timeout,
2164 last_recv, conn->last_ping, jiffies);
659743b0 2165 spin_unlock(&session->frwd_lock);
09ff742c 2166 iscsi_conn_failure(conn, ISCSI_ERR_NOP_TIMEDOUT);
f6d5180c
MC
2167 return;
2168 }
2169
4cf10435 2170 if (time_before_eq(last_recv + recv_timeout, jiffies)) {
c8611f97 2171 /* send a ping to try to provoke some traffic */
1b2c7af8 2172 ISCSI_DBG_CONN(conn, "Sending nopout as ping\n");
52f5664a
AN
2173 if (iscsi_send_nopout(conn, NULL))
2174 next_timeout = jiffies + (1 * HZ);
2175 else
2176 next_timeout = conn->last_ping + (conn->ping_timeout * HZ);
ad294e9c 2177 } else
4cf10435 2178 next_timeout = last_recv + recv_timeout;
f6d5180c 2179
1b2c7af8 2180 ISCSI_DBG_CONN(conn, "Setting next tmo %lu\n", next_timeout);
ad294e9c 2181 mod_timer(&conn->transport_timer, next_timeout);
f6d5180c 2182done:
659743b0 2183 spin_unlock(&session->frwd_lock);
f6d5180c
MC
2184}
2185
891e2639
MC
2186/**
2187 * iscsi_conn_unbind - prevent queueing to conn.
2188 * @cls_conn: iscsi conn ep is bound to.
2189 * @is_active: is the conn in use for boot or is this for EH/termination
2190 *
2191 * This must be called by drivers implementing the ep_disconnect callout.
2192 * It disables queueing to the connection from libiscsi in preparation for
2193 * an ep_disconnect call.
2194 */
2195void iscsi_conn_unbind(struct iscsi_cls_conn *cls_conn, bool is_active)
2196{
2197 struct iscsi_session *session;
2198 struct iscsi_conn *conn;
2199
2200 if (!cls_conn)
2201 return;
2202
2203 conn = cls_conn->dd_data;
2204 session = conn->session;
2205 /*
2206 * Wait for iscsi_eh calls to exit. We don't wait for the tmf to
2207 * complete or timeout. The caller just wants to know what's running
2208 * is everything that needs to be cleaned up, and no cmds will be
2209 * queued.
2210 */
2211 mutex_lock(&session->eh_mutex);
2212
2213 iscsi_suspend_queue(conn);
2214 iscsi_suspend_tx(conn);
2215
2216 spin_lock_bh(&session->frwd_lock);
2217 if (!is_active) {
2218 /*
2219 * if logout timed out before userspace could even send a PDU
2220 * the state might still be in ISCSI_STATE_LOGGED_IN and
2221 * allowing new cmds and TMFs.
2222 */
2223 if (session->state == ISCSI_STATE_LOGGED_IN)
2224 iscsi_set_conn_failed(conn);
2225 }
2226 spin_unlock_bh(&session->frwd_lock);
2227 mutex_unlock(&session->eh_mutex);
2228}
2229EXPORT_SYMBOL_GPL(iscsi_conn_unbind);
2230
9c19a7d0 2231static void iscsi_prep_abort_task_pdu(struct iscsi_task *task,
843c0a8a
MC
2232 struct iscsi_tm *hdr)
2233{
2234 memset(hdr, 0, sizeof(*hdr));
2235 hdr->opcode = ISCSI_OP_SCSI_TMFUNC | ISCSI_OP_IMMEDIATE;
2236 hdr->flags = ISCSI_TM_FUNC_ABORT_TASK & ISCSI_FLAG_TM_FUNC_MASK;
2237 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
55bdabdf 2238 hdr->lun = task->lun;
577577da
MC
2239 hdr->rtt = task->hdr_itt;
2240 hdr->refcmdsn = task->cmdsn;
843c0a8a
MC
2241}
2242
7996a778
MC
2243int iscsi_eh_abort(struct scsi_cmnd *sc)
2244{
75613521
MC
2245 struct iscsi_cls_session *cls_session;
2246 struct iscsi_session *session;
f47f2cf5 2247 struct iscsi_conn *conn;
9c19a7d0 2248 struct iscsi_task *task;
843c0a8a 2249 struct iscsi_tm *hdr;
e9e410e8 2250 int age;
7996a778 2251
75613521
MC
2252 cls_session = starget_to_session(scsi_target(sc->device));
2253 session = cls_session->dd_data;
2254
bd2199d4 2255 ISCSI_DBG_EH(session, "aborting sc %p\n", sc);
4421c9eb 2256
6724add1 2257 mutex_lock(&session->eh_mutex);
659743b0 2258 spin_lock_bh(&session->frwd_lock);
f47f2cf5
MC
2259 /*
2260 * if session was ISCSI_STATE_IN_RECOVERY then we may not have
2261 * got the command.
2262 */
2263 if (!sc->SCp.ptr) {
bd2199d4
EZ
2264 ISCSI_DBG_EH(session, "sc never reached iscsi layer or "
2265 "it completed.\n");
659743b0 2266 spin_unlock_bh(&session->frwd_lock);
6724add1 2267 mutex_unlock(&session->eh_mutex);
f47f2cf5
MC
2268 return SUCCESS;
2269 }
2270
7996a778
MC
2271 /*
2272 * If we are not logged in or we have started a new session
2273 * then let the host reset code handle this
2274 */
843c0a8a
MC
2275 if (!session->leadconn || session->state != ISCSI_STATE_LOGGED_IN ||
2276 sc->SCp.phase != session->age) {
659743b0 2277 spin_unlock_bh(&session->frwd_lock);
843c0a8a 2278 mutex_unlock(&session->eh_mutex);
bd2199d4 2279 ISCSI_DBG_EH(session, "failing abort due to dropped "
4421c9eb 2280 "session.\n");
843c0a8a
MC
2281 return FAILED;
2282 }
2283
14936b1e 2284 spin_lock(&session->back_lock);
9c19a7d0 2285 task = (struct iscsi_task *)sc->SCp.ptr;
14936b1e
MC
2286 if (!task || !task->sc) {
2287 /* task completed before time out */
bd2199d4 2288 ISCSI_DBG_EH(session, "sc completed while abort in progress\n");
14936b1e
MC
2289
2290 spin_unlock(&session->back_lock);
258aad75
MC
2291 spin_unlock_bh(&session->frwd_lock);
2292 mutex_unlock(&session->eh_mutex);
2293 return SUCCESS;
7ea8b828 2294 }
258aad75
MC
2295
2296 conn = session->leadconn;
2297 iscsi_get_conn(conn->cls_conn);
2298 conn->eh_abort_cnt++;
2299 age = session->age;
2300
14936b1e
MC
2301 ISCSI_DBG_EH(session, "aborting [sc %p itt 0x%x]\n", sc, task->itt);
2302 __iscsi_get_task(task);
2303 spin_unlock(&session->back_lock);
7996a778 2304
9c19a7d0 2305 if (task->state == ISCSI_TASK_PENDING) {
b3cd5050 2306 fail_scsi_task(task, DID_ABORT);
77a23c21
MC
2307 goto success;
2308 }
7996a778 2309
843c0a8a 2310 /* only have one tmf outstanding at a time */
ec29d0ac 2311 if (session->tmf_state != TMF_INITIAL)
7996a778 2312 goto failed;
ec29d0ac 2313 session->tmf_state = TMF_QUEUED;
7996a778 2314
ec29d0ac 2315 hdr = &session->tmhdr;
9c19a7d0 2316 iscsi_prep_abort_task_pdu(task, hdr);
843c0a8a 2317
e9e410e8 2318 if (iscsi_exec_task_mgmt_fn(conn, hdr, age, session->abort_timeout))
843c0a8a 2319 goto failed;
843c0a8a 2320
ec29d0ac 2321 switch (session->tmf_state) {
843c0a8a 2322 case TMF_SUCCESS:
659743b0 2323 spin_unlock_bh(&session->frwd_lock);
913e5bf4
MC
2324 /*
2325 * stop tx side incase the target had sent a abort rsp but
2326 * the initiator was still writing out data.
2327 */
6724add1 2328 iscsi_suspend_tx(conn);
77a23c21 2329 /*
913e5bf4
MC
2330 * we do not stop the recv side because targets have been
2331 * good and have never sent us a successful tmf response
2332 * then sent more data for the cmd.
77a23c21 2333 */
659743b0 2334 spin_lock_bh(&session->frwd_lock);
b3cd5050 2335 fail_scsi_task(task, DID_ABORT);
ec29d0ac 2336 session->tmf_state = TMF_INITIAL;
5d12c05e 2337 memset(hdr, 0, sizeof(*hdr));
659743b0 2338 spin_unlock_bh(&session->frwd_lock);
6724add1 2339 iscsi_start_tx(conn);
77a23c21 2340 goto success_unlocked;
843c0a8a 2341 case TMF_TIMEDOUT:
99b06033 2342 session->running_aborted_task = task;
659743b0 2343 spin_unlock_bh(&session->frwd_lock);
df4da5cd 2344 iscsi_conn_failure(conn, ISCSI_ERR_SCSI_EH_SESSION_RST);
843c0a8a
MC
2345 goto failed_unlocked;
2346 case TMF_NOT_FOUND:
f6f96457 2347 if (iscsi_task_is_completed(task)) {
ec29d0ac 2348 session->tmf_state = TMF_INITIAL;
5d12c05e 2349 memset(hdr, 0, sizeof(*hdr));
9c19a7d0 2350 /* task completed before tmf abort response */
bd2199d4
EZ
2351 ISCSI_DBG_EH(session, "sc completed while abort in "
2352 "progress\n");
77a23c21 2353 goto success;
7ea8b828 2354 }
df561f66 2355 fallthrough;
7ea8b828 2356 default:
ec29d0ac 2357 session->tmf_state = TMF_INITIAL;
843c0a8a 2358 goto failed;
7996a778
MC
2359 }
2360
77a23c21 2361success:
659743b0 2362 spin_unlock_bh(&session->frwd_lock);
77a23c21 2363success_unlocked:
bd2199d4
EZ
2364 ISCSI_DBG_EH(session, "abort success [sc %p itt 0x%x]\n",
2365 sc, task->itt);
14936b1e 2366 iscsi_put_task(task);
d39df158 2367 iscsi_put_conn(conn->cls_conn);
6724add1 2368 mutex_unlock(&session->eh_mutex);
7996a778
MC
2369 return SUCCESS;
2370
2371failed:
659743b0 2372 spin_unlock_bh(&session->frwd_lock);
77a23c21 2373failed_unlocked:
bd2199d4
EZ
2374 ISCSI_DBG_EH(session, "abort failed [sc %p itt 0x%x]\n", sc,
2375 task ? task->itt : 0);
99b06033
MC
2376 /*
2377 * The driver might be accessing the task so hold the ref. The conn
2378 * stop cleanup will drop the ref after ep_disconnect so we know the
2379 * driver's no longer touching the task.
2380 */
2381 if (!session->running_aborted_task)
2382 iscsi_put_task(task);
2383
d39df158 2384 iscsi_put_conn(conn->cls_conn);
6724add1 2385 mutex_unlock(&session->eh_mutex);
7996a778
MC
2386 return FAILED;
2387}
2388EXPORT_SYMBOL_GPL(iscsi_eh_abort);
2389
843c0a8a
MC
2390static void iscsi_prep_lun_reset_pdu(struct scsi_cmnd *sc, struct iscsi_tm *hdr)
2391{
2392 memset(hdr, 0, sizeof(*hdr));
2393 hdr->opcode = ISCSI_OP_SCSI_TMFUNC | ISCSI_OP_IMMEDIATE;
2394 hdr->flags = ISCSI_TM_FUNC_LOGICAL_UNIT_RESET & ISCSI_FLAG_TM_FUNC_MASK;
2395 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
55bdabdf 2396 int_to_scsilun(sc->device->lun, &hdr->lun);
f6d5180c 2397 hdr->rtt = RESERVED_ITT;
843c0a8a
MC
2398}
2399
2400int iscsi_eh_device_reset(struct scsi_cmnd *sc)
2401{
75613521
MC
2402 struct iscsi_cls_session *cls_session;
2403 struct iscsi_session *session;
843c0a8a
MC
2404 struct iscsi_conn *conn;
2405 struct iscsi_tm *hdr;
2406 int rc = FAILED;
2407
75613521
MC
2408 cls_session = starget_to_session(scsi_target(sc->device));
2409 session = cls_session->dd_data;
2410
9cb78c16
HR
2411 ISCSI_DBG_EH(session, "LU Reset [sc %p lun %llu]\n", sc,
2412 sc->device->lun);
843c0a8a
MC
2413
2414 mutex_lock(&session->eh_mutex);
659743b0 2415 spin_lock_bh(&session->frwd_lock);
843c0a8a
MC
2416 /*
2417 * Just check if we are not logged in. We cannot check for
2418 * the phase because the reset could come from a ioctl.
2419 */
2420 if (!session->leadconn || session->state != ISCSI_STATE_LOGGED_IN)
2421 goto unlock;
2422 conn = session->leadconn;
2423
2424 /* only have one tmf outstanding at a time */
ec29d0ac 2425 if (session->tmf_state != TMF_INITIAL)
843c0a8a 2426 goto unlock;
ec29d0ac 2427 session->tmf_state = TMF_QUEUED;
843c0a8a 2428
ec29d0ac 2429 hdr = &session->tmhdr;
843c0a8a
MC
2430 iscsi_prep_lun_reset_pdu(sc, hdr);
2431
9c19a7d0 2432 if (iscsi_exec_task_mgmt_fn(conn, hdr, session->age,
f6d5180c 2433 session->lu_reset_timeout)) {
843c0a8a
MC
2434 rc = FAILED;
2435 goto unlock;
2436 }
2437
ec29d0ac 2438 switch (session->tmf_state) {
843c0a8a
MC
2439 case TMF_SUCCESS:
2440 break;
2441 case TMF_TIMEDOUT:
659743b0 2442 spin_unlock_bh(&session->frwd_lock);
df4da5cd 2443 iscsi_conn_failure(conn, ISCSI_ERR_SCSI_EH_SESSION_RST);
843c0a8a
MC
2444 goto done;
2445 default:
ec29d0ac 2446 session->tmf_state = TMF_INITIAL;
843c0a8a
MC
2447 goto unlock;
2448 }
2449
2450 rc = SUCCESS;
659743b0 2451 spin_unlock_bh(&session->frwd_lock);
843c0a8a
MC
2452
2453 iscsi_suspend_tx(conn);
913e5bf4 2454
659743b0 2455 spin_lock_bh(&session->frwd_lock);
5d12c05e 2456 memset(hdr, 0, sizeof(*hdr));
3bbaaad9 2457 fail_scsi_tasks(conn, sc->device->lun, DID_ERROR);
ec29d0ac 2458 session->tmf_state = TMF_INITIAL;
659743b0 2459 spin_unlock_bh(&session->frwd_lock);
843c0a8a
MC
2460
2461 iscsi_start_tx(conn);
2462 goto done;
2463
2464unlock:
659743b0 2465 spin_unlock_bh(&session->frwd_lock);
843c0a8a 2466done:
bd2199d4
EZ
2467 ISCSI_DBG_EH(session, "dev reset result = %s\n",
2468 rc == SUCCESS ? "SUCCESS" : "FAILED");
843c0a8a
MC
2469 mutex_unlock(&session->eh_mutex);
2470 return rc;
2471}
2472EXPORT_SYMBOL_GPL(iscsi_eh_device_reset);
2473
3fe5ae8b
MC
2474void iscsi_session_recovery_timedout(struct iscsi_cls_session *cls_session)
2475{
2476 struct iscsi_session *session = cls_session->dd_data;
2477
659743b0 2478 spin_lock_bh(&session->frwd_lock);
3fe5ae8b
MC
2479 if (session->state != ISCSI_STATE_LOGGED_IN) {
2480 session->state = ISCSI_STATE_RECOVERY_FAILED;
ec29d0ac 2481 wake_up(&session->ehwait);
3fe5ae8b 2482 }
659743b0 2483 spin_unlock_bh(&session->frwd_lock);
3fe5ae8b
MC
2484}
2485EXPORT_SYMBOL_GPL(iscsi_session_recovery_timedout);
2486
2487/**
2488 * iscsi_eh_session_reset - drop session and attempt relogin
2489 * @sc: scsi command
2490 *
2491 * This function will wait for a relogin, session termination from
2492 * userspace, or a recovery/replacement timeout.
2493 */
309ce156 2494int iscsi_eh_session_reset(struct scsi_cmnd *sc)
3fe5ae8b
MC
2495{
2496 struct iscsi_cls_session *cls_session;
2497 struct iscsi_session *session;
2498 struct iscsi_conn *conn;
2499
2500 cls_session = starget_to_session(scsi_target(sc->device));
2501 session = cls_session->dd_data;
3fe5ae8b
MC
2502
2503 mutex_lock(&session->eh_mutex);
659743b0 2504 spin_lock_bh(&session->frwd_lock);
3fe5ae8b
MC
2505 if (session->state == ISCSI_STATE_TERMINATE) {
2506failed:
2507 ISCSI_DBG_EH(session,
2508 "failing session reset: Could not log back into "
5db6dd14
FH
2509 "%s [age %d]\n", session->targetname,
2510 session->age);
659743b0 2511 spin_unlock_bh(&session->frwd_lock);
3fe5ae8b
MC
2512 mutex_unlock(&session->eh_mutex);
2513 return FAILED;
2514 }
2515
fda290c5
MC
2516 conn = session->leadconn;
2517 iscsi_get_conn(conn->cls_conn);
2518
659743b0 2519 spin_unlock_bh(&session->frwd_lock);
3fe5ae8b 2520 mutex_unlock(&session->eh_mutex);
fda290c5 2521
df4da5cd 2522 iscsi_conn_failure(conn, ISCSI_ERR_SCSI_EH_SESSION_RST);
fda290c5 2523 iscsi_put_conn(conn->cls_conn);
3fe5ae8b
MC
2524
2525 ISCSI_DBG_EH(session, "wait for relogin\n");
ec29d0ac 2526 wait_event_interruptible(session->ehwait,
3fe5ae8b
MC
2527 session->state == ISCSI_STATE_TERMINATE ||
2528 session->state == ISCSI_STATE_LOGGED_IN ||
2529 session->state == ISCSI_STATE_RECOVERY_FAILED);
2530 if (signal_pending(current))
2531 flush_signals(current);
2532
2533 mutex_lock(&session->eh_mutex);
659743b0 2534 spin_lock_bh(&session->frwd_lock);
3fe5ae8b
MC
2535 if (session->state == ISCSI_STATE_LOGGED_IN) {
2536 ISCSI_DBG_EH(session,
2537 "session reset succeeded for %s,%s\n",
2538 session->targetname, conn->persistent_address);
2539 } else
2540 goto failed;
659743b0 2541 spin_unlock_bh(&session->frwd_lock);
3fe5ae8b
MC
2542 mutex_unlock(&session->eh_mutex);
2543 return SUCCESS;
2544}
309ce156 2545EXPORT_SYMBOL_GPL(iscsi_eh_session_reset);
3fe5ae8b
MC
2546
2547static void iscsi_prep_tgt_reset_pdu(struct scsi_cmnd *sc, struct iscsi_tm *hdr)
2548{
2549 memset(hdr, 0, sizeof(*hdr));
2550 hdr->opcode = ISCSI_OP_SCSI_TMFUNC | ISCSI_OP_IMMEDIATE;
2551 hdr->flags = ISCSI_TM_FUNC_TARGET_WARM_RESET & ISCSI_FLAG_TM_FUNC_MASK;
2552 hdr->flags |= ISCSI_FLAG_CMD_FINAL;
2553 hdr->rtt = RESERVED_ITT;
2554}
2555
2556/**
2557 * iscsi_eh_target_reset - reset target
2558 * @sc: scsi command
2559 *
309ce156 2560 * This will attempt to send a warm target reset.
3fe5ae8b 2561 */
3907adf6 2562static int iscsi_eh_target_reset(struct scsi_cmnd *sc)
3fe5ae8b
MC
2563{
2564 struct iscsi_cls_session *cls_session;
2565 struct iscsi_session *session;
2566 struct iscsi_conn *conn;
2567 struct iscsi_tm *hdr;
2568 int rc = FAILED;
2569
2570 cls_session = starget_to_session(scsi_target(sc->device));
2571 session = cls_session->dd_data;
2572
2573 ISCSI_DBG_EH(session, "tgt Reset [sc %p tgt %s]\n", sc,
2574 session->targetname);
2575
2576 mutex_lock(&session->eh_mutex);
659743b0 2577 spin_lock_bh(&session->frwd_lock);
3fe5ae8b
MC
2578 /*
2579 * Just check if we are not logged in. We cannot check for
2580 * the phase because the reset could come from a ioctl.
2581 */
2582 if (!session->leadconn || session->state != ISCSI_STATE_LOGGED_IN)
2583 goto unlock;
2584 conn = session->leadconn;
2585
2586 /* only have one tmf outstanding at a time */
ec29d0ac 2587 if (session->tmf_state != TMF_INITIAL)
3fe5ae8b 2588 goto unlock;
ec29d0ac 2589 session->tmf_state = TMF_QUEUED;
3fe5ae8b 2590
ec29d0ac 2591 hdr = &session->tmhdr;
3fe5ae8b
MC
2592 iscsi_prep_tgt_reset_pdu(sc, hdr);
2593
2594 if (iscsi_exec_task_mgmt_fn(conn, hdr, session->age,
2595 session->tgt_reset_timeout)) {
2596 rc = FAILED;
2597 goto unlock;
2598 }
2599
ec29d0ac 2600 switch (session->tmf_state) {
3fe5ae8b
MC
2601 case TMF_SUCCESS:
2602 break;
2603 case TMF_TIMEDOUT:
659743b0 2604 spin_unlock_bh(&session->frwd_lock);
df4da5cd 2605 iscsi_conn_failure(conn, ISCSI_ERR_SCSI_EH_SESSION_RST);
3fe5ae8b
MC
2606 goto done;
2607 default:
ec29d0ac 2608 session->tmf_state = TMF_INITIAL;
3fe5ae8b
MC
2609 goto unlock;
2610 }
2611
2612 rc = SUCCESS;
659743b0 2613 spin_unlock_bh(&session->frwd_lock);
3fe5ae8b
MC
2614
2615 iscsi_suspend_tx(conn);
2616
659743b0 2617 spin_lock_bh(&session->frwd_lock);
3fe5ae8b
MC
2618 memset(hdr, 0, sizeof(*hdr));
2619 fail_scsi_tasks(conn, -1, DID_ERROR);
ec29d0ac 2620 session->tmf_state = TMF_INITIAL;
659743b0 2621 spin_unlock_bh(&session->frwd_lock);
3fe5ae8b
MC
2622
2623 iscsi_start_tx(conn);
2624 goto done;
2625
2626unlock:
659743b0 2627 spin_unlock_bh(&session->frwd_lock);
3fe5ae8b
MC
2628done:
2629 ISCSI_DBG_EH(session, "tgt %s reset result = %s\n", session->targetname,
2630 rc == SUCCESS ? "SUCCESS" : "FAILED");
2631 mutex_unlock(&session->eh_mutex);
309ce156
JK
2632 return rc;
2633}
3fe5ae8b 2634
309ce156
JK
2635/**
2636 * iscsi_eh_recover_target - reset target and possibly the session
2637 * @sc: scsi command
2638 *
2639 * This will attempt to send a warm target reset. If that fails,
2640 * we will escalate to ERL0 session recovery.
2641 */
2642int iscsi_eh_recover_target(struct scsi_cmnd *sc)
2643{
2644 int rc;
2645
2646 rc = iscsi_eh_target_reset(sc);
3fe5ae8b
MC
2647 if (rc == FAILED)
2648 rc = iscsi_eh_session_reset(sc);
2649 return rc;
2650}
309ce156 2651EXPORT_SYMBOL_GPL(iscsi_eh_recover_target);
3fe5ae8b 2652
6320377f
OK
2653/*
2654 * Pre-allocate a pool of @max items of @item_size. By default, the pool
2655 * should be accessed via kfifo_{get,put} on q->queue.
2656 * Optionally, the caller can obtain the array of object pointers
2657 * by passing in a non-NULL @items pointer
2658 */
7996a778 2659int
6320377f 2660iscsi_pool_init(struct iscsi_pool *q, int max, void ***items, int item_size)
7996a778 2661{
6320377f 2662 int i, num_arrays = 1;
7996a778 2663
6320377f 2664 memset(q, 0, sizeof(*q));
7996a778
MC
2665
2666 q->max = max;
6320377f
OK
2667
2668 /* If the user passed an items pointer, he wants a copy of
2669 * the array. */
2670 if (items)
2671 num_arrays++;
778e1cdd 2672 q->pool = kvcalloc(num_arrays * max, sizeof(void *), GFP_KERNEL);
6320377f 2673 if (q->pool == NULL)
f474a37b 2674 return -ENOMEM;
7996a778 2675
c1e13f25 2676 kfifo_init(&q->queue, (void*)q->pool, max * sizeof(void*));
7996a778
MC
2677
2678 for (i = 0; i < max; i++) {
6320377f 2679 q->pool[i] = kzalloc(item_size, GFP_KERNEL);
7996a778 2680 if (q->pool[i] == NULL) {
6320377f
OK
2681 q->max = i;
2682 goto enomem;
7996a778 2683 }
7acd72eb 2684 kfifo_in(&q->queue, (void*)&q->pool[i], sizeof(void*));
7996a778 2685 }
6320377f
OK
2686
2687 if (items) {
2688 *items = q->pool + max;
2689 memcpy(*items, q->pool, max * sizeof(void *));
2690 }
2691
7996a778 2692 return 0;
6320377f
OK
2693
2694enomem:
2695 iscsi_pool_free(q);
2696 return -ENOMEM;
7996a778
MC
2697}
2698EXPORT_SYMBOL_GPL(iscsi_pool_init);
2699
6320377f 2700void iscsi_pool_free(struct iscsi_pool *q)
7996a778
MC
2701{
2702 int i;
2703
2704 for (i = 0; i < q->max; i++)
6320377f 2705 kfree(q->pool[i]);
bfcc62ed 2706 kvfree(q->pool);
7996a778
MC
2707}
2708EXPORT_SYMBOL_GPL(iscsi_pool_free);
2709
b4046922
MC
2710int iscsi_host_get_max_scsi_cmds(struct Scsi_Host *shost,
2711 uint16_t requested_cmds_max)
2712{
2713 int scsi_cmds, total_cmds = requested_cmds_max;
2714
2715check:
2716 if (!total_cmds)
2717 total_cmds = ISCSI_DEF_XMIT_CMDS_MAX;
2718 /*
2719 * The iscsi layer needs some tasks for nop handling and tmfs,
2720 * so the cmds_max must at least be greater than ISCSI_MGMT_CMDS_MAX
2721 * + 1 command for scsi IO.
2722 */
2723 if (total_cmds < ISCSI_TOTAL_CMDS_MIN) {
2724 printk(KERN_ERR "iscsi: invalid max cmds of %d. Must be a power of two that is at least %d.\n",
2725 total_cmds, ISCSI_TOTAL_CMDS_MIN);
2726 return -EINVAL;
2727 }
2728
2729 if (total_cmds > ISCSI_TOTAL_CMDS_MAX) {
2730 printk(KERN_INFO "iscsi: invalid max cmds of %d. Must be a power of 2 less than or equal to %d. Using %d.\n",
2731 requested_cmds_max, ISCSI_TOTAL_CMDS_MAX,
2732 ISCSI_TOTAL_CMDS_MAX);
2733 total_cmds = ISCSI_TOTAL_CMDS_MAX;
2734 }
2735
2736 if (!is_power_of_2(total_cmds)) {
2737 total_cmds = rounddown_pow_of_two(total_cmds);
2738 if (total_cmds < ISCSI_TOTAL_CMDS_MIN) {
2739 printk(KERN_ERR "iscsi: invalid max cmds of %d. Must be a power of 2 greater than %d.\n", requested_cmds_max, ISCSI_TOTAL_CMDS_MIN);
2740 return -EINVAL;
2741 }
2742
2743 printk(KERN_INFO "iscsi: invalid max cmds %d. Must be a power of 2. Rounding max cmds down to %d.\n",
2744 requested_cmds_max, total_cmds);
2745 }
2746
2747 scsi_cmds = total_cmds - ISCSI_MGMT_CMDS_MAX;
2748 if (shost->can_queue && scsi_cmds > shost->can_queue) {
2749 total_cmds = shost->can_queue;
2750
2751 printk(KERN_INFO "iscsi: requested max cmds %u is higher than driver limit. Using driver limit %u\n",
2752 requested_cmds_max, shost->can_queue);
2753 goto check;
2754 }
2755
2756 return scsi_cmds;
2757}
2758EXPORT_SYMBOL_GPL(iscsi_host_get_max_scsi_cmds);
2759
a4804cd6
MC
2760/**
2761 * iscsi_host_add - add host to system
2762 * @shost: scsi host
2763 * @pdev: parent device
2764 *
2765 * This should be called by partial offload and software iscsi drivers
2766 * to add a host to the system.
2767 */
2768int iscsi_host_add(struct Scsi_Host *shost, struct device *pdev)
2769{
8e9a20ce
MC
2770 if (!shost->can_queue)
2771 shost->can_queue = ISCSI_DEF_XMIT_CMDS_MAX;
2772
4d108350
MC
2773 if (!shost->cmd_per_lun)
2774 shost->cmd_per_lun = ISCSI_DEF_CMD_PER_LUN;
2775
a4804cd6
MC
2776 return scsi_add_host(shost, pdev);
2777}
2778EXPORT_SYMBOL_GPL(iscsi_host_add);
2779
2780/**
2781 * iscsi_host_alloc - allocate a host and driver data
2782 * @sht: scsi host template
2783 * @dd_data_size: driver host data size
32ae763e 2784 * @xmit_can_sleep: bool indicating if LLD will queue IO from a work queue
a4804cd6
MC
2785 *
2786 * This should be called by partial offload and software iscsi drivers.
2787 * To access the driver specific memory use the iscsi_host_priv() macro.
2788 */
2789struct Scsi_Host *iscsi_host_alloc(struct scsi_host_template *sht,
4d108350 2790 int dd_data_size, bool xmit_can_sleep)
75613521 2791{
a4804cd6 2792 struct Scsi_Host *shost;
e5bd7b54 2793 struct iscsi_host *ihost;
a4804cd6
MC
2794
2795 shost = scsi_host_alloc(sht, sizeof(struct iscsi_host) + dd_data_size);
2796 if (!shost)
2797 return NULL;
e5bd7b54 2798 ihost = shost_priv(shost);
32ae763e
MC
2799
2800 if (xmit_can_sleep) {
2801 snprintf(ihost->workq_name, sizeof(ihost->workq_name),
2802 "iscsi_q_%d", shost->host_no);
3ce41966
BL
2803 ihost->workq = alloc_workqueue("%s",
2804 WQ_SYSFS | __WQ_LEGACY | WQ_MEM_RECLAIM | WQ_UNBOUND,
1a982620 2805 1, ihost->workq_name);
32ae763e
MC
2806 if (!ihost->workq)
2807 goto free_host;
2808 }
2809
e5bd7b54
MC
2810 spin_lock_init(&ihost->lock);
2811 ihost->state = ISCSI_HOST_SETUP;
2812 ihost->num_sessions = 0;
2813 init_waitqueue_head(&ihost->session_removal_wq);
a4804cd6 2814 return shost;
32ae763e
MC
2815
2816free_host:
2817 scsi_host_put(shost);
2818 return NULL;
a4804cd6
MC
2819}
2820EXPORT_SYMBOL_GPL(iscsi_host_alloc);
2821
e5bd7b54
MC
2822static void iscsi_notify_host_removed(struct iscsi_cls_session *cls_session)
2823{
40a06e75 2824 iscsi_session_failure(cls_session->dd_data, ISCSI_ERR_INVALID_HOST);
e5bd7b54
MC
2825}
2826
a4804cd6
MC
2827/**
2828 * iscsi_host_remove - remove host and sessions
2829 * @shost: scsi host
2830 *
e5bd7b54
MC
2831 * If there are any sessions left, this will initiate the removal and wait
2832 * for the completion.
a4804cd6
MC
2833 */
2834void iscsi_host_remove(struct Scsi_Host *shost)
2835{
e5bd7b54
MC
2836 struct iscsi_host *ihost = shost_priv(shost);
2837 unsigned long flags;
2838
2839 spin_lock_irqsave(&ihost->lock, flags);
2840 ihost->state = ISCSI_HOST_REMOVED;
2841 spin_unlock_irqrestore(&ihost->lock, flags);
2842
2843 iscsi_host_for_each_session(shost, iscsi_notify_host_removed);
2844 wait_event_interruptible(ihost->session_removal_wq,
2845 ihost->num_sessions == 0);
2846 if (signal_pending(current))
2847 flush_signals(current);
2848
a4804cd6 2849 scsi_remove_host(shost);
75613521 2850}
a4804cd6 2851EXPORT_SYMBOL_GPL(iscsi_host_remove);
7996a778 2852
a4804cd6 2853void iscsi_host_free(struct Scsi_Host *shost)
75613521
MC
2854{
2855 struct iscsi_host *ihost = shost_priv(shost);
7996a778 2856
c435f0a9
MC
2857 if (ihost->workq)
2858 destroy_workqueue(ihost->workq);
2859
75613521
MC
2860 kfree(ihost->netdev);
2861 kfree(ihost->hwaddress);
2862 kfree(ihost->initiatorname);
a4804cd6 2863 scsi_host_put(shost);
75613521 2864}
a4804cd6 2865EXPORT_SYMBOL_GPL(iscsi_host_free);
7996a778 2866
e5bd7b54
MC
2867static void iscsi_host_dec_session_cnt(struct Scsi_Host *shost)
2868{
2869 struct iscsi_host *ihost = shost_priv(shost);
2870 unsigned long flags;
2871
2872 shost = scsi_host_get(shost);
2873 if (!shost) {
2874 printk(KERN_ERR "Invalid state. Cannot notify host removal "
2875 "of session teardown event because host already "
2876 "removed.\n");
2877 return;
2878 }
2879
2880 spin_lock_irqsave(&ihost->lock, flags);
2881 ihost->num_sessions--;
2882 if (ihost->num_sessions == 0)
2883 wake_up(&ihost->session_removal_wq);
2884 spin_unlock_irqrestore(&ihost->lock, flags);
2885 scsi_host_put(shost);
2886}
2887
7996a778
MC
2888/**
2889 * iscsi_session_setup - create iscsi cls session and host and session
7996a778 2890 * @iscsit: iscsi transport template
75613521
MC
2891 * @shost: scsi host
2892 * @cmds_max: session can queue
ccd4a430 2893 * @dd_size: private driver data size, added to session allocation size
9c19a7d0 2894 * @cmd_task_size: LLD task private data size
7996a778 2895 * @initial_cmdsn: initial CmdSN
ccd4a430 2896 * @id: target ID to add to this session
7996a778
MC
2897 *
2898 * This can be used by software iscsi_transports that allocate
2899 * a session per scsi host.
3cf7b233
MC
2900 *
2901 * Callers should set cmds_max to the largest total numer (mgmt + scsi) of
2902 * tasks they support. The iscsi layer reserves ISCSI_MGMT_CMDS_MAX tasks
2903 * for nop handling and login/logout requests.
75613521 2904 */
7996a778 2905struct iscsi_cls_session *
75613521 2906iscsi_session_setup(struct iscsi_transport *iscsit, struct Scsi_Host *shost,
b8b9e1b8 2907 uint16_t cmds_max, int dd_size, int cmd_task_size,
7970634b 2908 uint32_t initial_cmdsn, unsigned int id)
7996a778 2909{
e5bd7b54 2910 struct iscsi_host *ihost = shost_priv(shost);
7996a778
MC
2911 struct iscsi_session *session;
2912 struct iscsi_cls_session *cls_session;
b4046922 2913 int cmd_i, scsi_cmds;
e5bd7b54
MC
2914 unsigned long flags;
2915
2916 spin_lock_irqsave(&ihost->lock, flags);
2917 if (ihost->state == ISCSI_HOST_REMOVED) {
2918 spin_unlock_irqrestore(&ihost->lock, flags);
2919 return NULL;
2920 }
2921 ihost->num_sessions++;
2922 spin_unlock_irqrestore(&ihost->lock, flags);
8e9a20ce 2923
b4046922
MC
2924 scsi_cmds = iscsi_host_get_max_scsi_cmds(shost, cmds_max);
2925 if (scsi_cmds < 0)
e5bd7b54 2926 goto dec_session_count;
1548271e 2927
5d91e209 2928 cls_session = iscsi_alloc_session(shost, iscsit,
b8b9e1b8
JK
2929 sizeof(struct iscsi_session) +
2930 dd_size);
75613521 2931 if (!cls_session)
e5bd7b54 2932 goto dec_session_count;
75613521
MC
2933 session = cls_session->dd_data;
2934 session->cls_session = cls_session;
7996a778
MC
2935 session->host = shost;
2936 session->state = ISCSI_STATE_FREE;
f6d5180c 2937 session->fast_abort = 1;
3fe5ae8b 2938 session->tgt_reset_timeout = 30;
4cd49ea1
MC
2939 session->lu_reset_timeout = 15;
2940 session->abort_timeout = 10;
3cf7b233 2941 session->scsi_cmds_max = scsi_cmds;
b4046922 2942 session->cmds_max = scsi_cmds + ISCSI_MGMT_CMDS_MAX;
e0726407 2943 session->queued_cmdsn = session->cmdsn = initial_cmdsn;
7996a778
MC
2944 session->exp_cmdsn = initial_cmdsn + 1;
2945 session->max_cmdsn = initial_cmdsn + 1;
2946 session->max_r2t = 1;
2947 session->tt = iscsit;
b8b9e1b8 2948 session->dd_data = cls_session->dd_data + sizeof(*session);
659743b0 2949
ec29d0ac
MC
2950 session->tmf_state = TMF_INITIAL;
2951 timer_setup(&session->tmf_timer, iscsi_tmf_timedout, 0);
6724add1 2952 mutex_init(&session->eh_mutex);
e018f03d 2953 init_waitqueue_head(&session->ehwait);
ec29d0ac 2954
659743b0
SP
2955 spin_lock_init(&session->frwd_lock);
2956 spin_lock_init(&session->back_lock);
7996a778
MC
2957
2958 /* initialize SCSI PDU commands pool */
2959 if (iscsi_pool_init(&session->cmdpool, session->cmds_max,
2960 (void***)&session->cmds,
9c19a7d0 2961 cmd_task_size + sizeof(struct iscsi_task)))
7996a778
MC
2962 goto cmdpool_alloc_fail;
2963
2964 /* pre-format cmds pool with ITT */
2965 for (cmd_i = 0; cmd_i < session->cmds_max; cmd_i++) {
9c19a7d0 2966 struct iscsi_task *task = session->cmds[cmd_i];
7996a778 2967
9c19a7d0
MC
2968 if (cmd_task_size)
2969 task->dd_data = &task[1];
2970 task->itt = cmd_i;
3bbaaad9 2971 task->state = ISCSI_TASK_FREE;
9c19a7d0 2972 INIT_LIST_HEAD(&task->running);
7996a778
MC
2973 }
2974
f53a88da 2975 if (!try_module_get(iscsit->owner))
75613521 2976 goto module_get_fail;
7996a778 2977
7970634b 2978 if (iscsi_add_session(cls_session, id))
75613521 2979 goto cls_session_fail;
e5bd7b54 2980
7996a778
MC
2981 return cls_session;
2982
2983cls_session_fail:
75613521
MC
2984 module_put(iscsit->owner);
2985module_get_fail:
6320377f 2986 iscsi_pool_free(&session->cmdpool);
7996a778 2987cmdpool_alloc_fail:
75613521 2988 iscsi_free_session(cls_session);
e5bd7b54
MC
2989dec_session_count:
2990 iscsi_host_dec_session_cnt(shost);
7996a778
MC
2991 return NULL;
2992}
2993EXPORT_SYMBOL_GPL(iscsi_session_setup);
2994
2995/**
2996 * iscsi_session_teardown - destroy session, host, and cls_session
75613521 2997 * @cls_session: iscsi session
75613521 2998 */
7996a778
MC
2999void iscsi_session_teardown(struct iscsi_cls_session *cls_session)
3000{
75613521 3001 struct iscsi_session *session = cls_session->dd_data;
63f75cc8 3002 struct module *owner = cls_session->transport->owner;
e5bd7b54 3003 struct Scsi_Host *shost = session->host;
7996a778 3004
9e10b512
KK
3005 iscsi_remove_session(cls_session);
3006
a1f3486b 3007 iscsi_pool_free(&session->cmdpool);
b2c64167
MC
3008 kfree(session->password);
3009 kfree(session->password_in);
3010 kfree(session->username);
3011 kfree(session->username_in);
f3ff0c36 3012 kfree(session->targetname);
3c5c4801 3013 kfree(session->targetalias);
88dfd340 3014 kfree(session->initiatorname);
3b9373e9
EW
3015 kfree(session->boot_root);
3016 kfree(session->boot_nic);
3017 kfree(session->boot_target);
88dfd340 3018 kfree(session->ifacename);
f8525eb4
AC
3019 kfree(session->portal_type);
3020 kfree(session->discovery_parent_type);
f3ff0c36 3021
9e10b512
KK
3022 iscsi_free_session(cls_session);
3023
e5bd7b54 3024 iscsi_host_dec_session_cnt(shost);
63f75cc8 3025 module_put(owner);
7996a778
MC
3026}
3027EXPORT_SYMBOL_GPL(iscsi_session_teardown);
3028
3029/**
3030 * iscsi_conn_setup - create iscsi_cls_conn and iscsi_conn
3031 * @cls_session: iscsi_cls_session
5d91e209 3032 * @dd_size: private driver data size
7996a778 3033 * @conn_idx: cid
5d91e209 3034 */
7996a778 3035struct iscsi_cls_conn *
5d91e209
MC
3036iscsi_conn_setup(struct iscsi_cls_session *cls_session, int dd_size,
3037 uint32_t conn_idx)
7996a778 3038{
75613521 3039 struct iscsi_session *session = cls_session->dd_data;
7996a778
MC
3040 struct iscsi_conn *conn;
3041 struct iscsi_cls_conn *cls_conn;
d36ab6f3 3042 char *data;
7996a778 3043
5d91e209
MC
3044 cls_conn = iscsi_create_conn(cls_session, sizeof(*conn) + dd_size,
3045 conn_idx);
7996a778
MC
3046 if (!cls_conn)
3047 return NULL;
3048 conn = cls_conn->dd_data;
5d91e209 3049 memset(conn, 0, sizeof(*conn) + dd_size);
7996a778 3050
5d91e209 3051 conn->dd_data = cls_conn->dd_data + sizeof(*conn);
7996a778
MC
3052 conn->session = session;
3053 conn->cls_conn = cls_conn;
3054 conn->c_stage = ISCSI_CONN_INITIAL_STAGE;
3055 conn->id = conn_idx;
3056 conn->exp_statsn = 0;
f6d5180c 3057
2c4b9637 3058 timer_setup(&conn->transport_timer, iscsi_check_transport_timeouts, 0);
f6d5180c 3059
843c0a8a 3060 INIT_LIST_HEAD(&conn->mgmtqueue);
3bbaaad9 3061 INIT_LIST_HEAD(&conn->cmdqueue);
843c0a8a 3062 INIT_LIST_HEAD(&conn->requeue);
c4028958 3063 INIT_WORK(&conn->xmitwork, iscsi_xmitworker);
7996a778 3064
9c19a7d0 3065 /* allocate login_task used for the login/text sequences */
659743b0 3066 spin_lock_bh(&session->frwd_lock);
7acd72eb 3067 if (!kfifo_out(&session->cmdpool.queue,
9c19a7d0 3068 (void*)&conn->login_task,
7996a778 3069 sizeof(void*))) {
659743b0 3070 spin_unlock_bh(&session->frwd_lock);
9c19a7d0 3071 goto login_task_alloc_fail;
7996a778 3072 }
659743b0 3073 spin_unlock_bh(&session->frwd_lock);
7996a778 3074
cfeb2cf9
MC
3075 data = (char *) __get_free_pages(GFP_KERNEL,
3076 get_order(ISCSI_DEF_MAX_RECV_SEG_LEN));
d36ab6f3 3077 if (!data)
9c19a7d0
MC
3078 goto login_task_data_alloc_fail;
3079 conn->login_task->data = conn->data = data;
d36ab6f3 3080
7996a778
MC
3081 return cls_conn;
3082
9c19a7d0 3083login_task_data_alloc_fail:
7acd72eb 3084 kfifo_in(&session->cmdpool.queue, (void*)&conn->login_task,
d36ab6f3 3085 sizeof(void*));
9c19a7d0 3086login_task_alloc_fail:
7996a778
MC
3087 iscsi_destroy_conn(cls_conn);
3088 return NULL;
3089}
3090EXPORT_SYMBOL_GPL(iscsi_conn_setup);
3091
3092/**
3093 * iscsi_conn_teardown - teardown iscsi connection
ccd4a430 3094 * @cls_conn: iscsi class connection
7996a778
MC
3095 *
3096 * TODO: we may need to make this into a two step process
3097 * like scsi-mls remove + put host
3098 */
3099void iscsi_conn_teardown(struct iscsi_cls_conn *cls_conn)
3100{
3101 struct iscsi_conn *conn = cls_conn->dd_data;
3102 struct iscsi_session *session = conn->session;
1b8d0300
L
3103 char *tmp_persistent_address = conn->persistent_address;
3104 char *tmp_local_ipaddr = conn->local_ipaddr;
7996a778 3105
f6d5180c
MC
3106 del_timer_sync(&conn->transport_timer);
3107
660d0831 3108 mutex_lock(&session->eh_mutex);
659743b0 3109 spin_lock_bh(&session->frwd_lock);
7996a778
MC
3110 conn->c_stage = ISCSI_CONN_CLEANUP_WAIT;
3111 if (session->leadconn == conn) {
3112 /*
3113 * leading connection? then give up on recovery.
3114 */
3115 session->state = ISCSI_STATE_TERMINATE;
ec29d0ac 3116 wake_up(&session->ehwait);
7996a778 3117 }
659743b0 3118 spin_unlock_bh(&session->frwd_lock);
7996a778 3119
779ea120 3120 /* flush queued up work because we free the connection below */
843c0a8a 3121 iscsi_suspend_tx(conn);
779ea120 3122
659743b0 3123 spin_lock_bh(&session->frwd_lock);
cfeb2cf9
MC
3124 free_pages((unsigned long) conn->data,
3125 get_order(ISCSI_DEF_MAX_RECV_SEG_LEN));
659743b0
SP
3126 /* regular RX path uses back_lock */
3127 spin_lock_bh(&session->back_lock);
7acd72eb 3128 kfifo_in(&session->cmdpool.queue, (void*)&conn->login_task,
7996a778 3129 sizeof(void*));
659743b0 3130 spin_unlock_bh(&session->back_lock);
e0726407 3131 if (session->leadconn == conn)
7996a778 3132 session->leadconn = NULL;
659743b0 3133 spin_unlock_bh(&session->frwd_lock);
660d0831 3134 mutex_unlock(&session->eh_mutex);
7996a778 3135
7996a778 3136 iscsi_destroy_conn(cls_conn);
1b8d0300
L
3137 kfree(tmp_persistent_address);
3138 kfree(tmp_local_ipaddr);
7996a778
MC
3139}
3140EXPORT_SYMBOL_GPL(iscsi_conn_teardown);
3141
3142int iscsi_conn_start(struct iscsi_cls_conn *cls_conn)
3143{
3144 struct iscsi_conn *conn = cls_conn->dd_data;
3145 struct iscsi_session *session = conn->session;
3146
ffd0436e 3147 if (!session) {
322d739d
MC
3148 iscsi_conn_printk(KERN_ERR, conn,
3149 "can't start unbound connection\n");
7996a778
MC
3150 return -EPERM;
3151 }
3152
db98ccde
MC
3153 if ((session->imm_data_en || !session->initial_r2t_en) &&
3154 session->first_burst > session->max_burst) {
322d739d
MC
3155 iscsi_conn_printk(KERN_INFO, conn, "invalid burst lengths: "
3156 "first_burst %d max_burst %d\n",
3157 session->first_burst, session->max_burst);
ffd0436e
MC
3158 return -EINVAL;
3159 }
3160
f6d5180c 3161 if (conn->ping_timeout && !conn->recv_timeout) {
322d739d
MC
3162 iscsi_conn_printk(KERN_ERR, conn, "invalid recv timeout of "
3163 "zero. Using 5 seconds\n.");
f6d5180c
MC
3164 conn->recv_timeout = 5;
3165 }
3166
3167 if (conn->recv_timeout && !conn->ping_timeout) {
322d739d
MC
3168 iscsi_conn_printk(KERN_ERR, conn, "invalid ping timeout of "
3169 "zero. Using 5 seconds.\n");
f6d5180c
MC
3170 conn->ping_timeout = 5;
3171 }
3172
659743b0 3173 spin_lock_bh(&session->frwd_lock);
7996a778
MC
3174 conn->c_stage = ISCSI_CONN_STARTED;
3175 session->state = ISCSI_STATE_LOGGED_IN;
e0726407 3176 session->queued_cmdsn = session->cmdsn;
7996a778 3177
f6d5180c
MC
3178 conn->last_recv = jiffies;
3179 conn->last_ping = jiffies;
3180 if (conn->recv_timeout && conn->ping_timeout)
3181 mod_timer(&conn->transport_timer,
3182 jiffies + (conn->recv_timeout * HZ));
3183
7996a778
MC
3184 switch(conn->stop_stage) {
3185 case STOP_CONN_RECOVER:
3186 /*
3187 * unblock eh_abort() if it is blocked. re-try all
3188 * commands after successful recovery
3189 */
7996a778 3190 conn->stop_stage = 0;
ec29d0ac 3191 session->tmf_state = TMF_INITIAL;
7996a778 3192 session->age++;
8b1d0343
MC
3193 if (session->age == 16)
3194 session->age = 0;
6eabafbe 3195 break;
7996a778 3196 case STOP_CONN_TERM:
7996a778 3197 conn->stop_stage = 0;
7996a778
MC
3198 break;
3199 default:
3200 break;
3201 }
659743b0 3202 spin_unlock_bh(&session->frwd_lock);
7996a778 3203
75613521 3204 iscsi_unblock_session(session->cls_session);
ec29d0ac 3205 wake_up(&session->ehwait);
7996a778
MC
3206 return 0;
3207}
3208EXPORT_SYMBOL_GPL(iscsi_conn_start);
3209
3210static void
3bbaaad9 3211fail_mgmt_tasks(struct iscsi_session *session, struct iscsi_conn *conn)
7996a778 3212{
3bbaaad9 3213 struct iscsi_task *task;
b3cd5050 3214 int i, state;
7996a778 3215
3bbaaad9
MC
3216 for (i = 0; i < conn->session->cmds_max; i++) {
3217 task = conn->session->cmds[i];
3218 if (task->sc)
3219 continue;
7996a778 3220
3bbaaad9
MC
3221 if (task->state == ISCSI_TASK_FREE)
3222 continue;
7996a778 3223
3bbaaad9
MC
3224 ISCSI_DBG_SESSION(conn->session,
3225 "failing mgmt itt 0x%x state %d\n",
3226 task->itt, task->state);
5923d64b
MC
3227
3228 spin_lock_bh(&session->back_lock);
3229 if (cleanup_queued_task(task)) {
3230 spin_unlock_bh(&session->back_lock);
3231 continue;
3232 }
3233
b3cd5050
MC
3234 state = ISCSI_TASK_ABRT_SESS_RECOV;
3235 if (task->state == ISCSI_TASK_PENDING)
3236 state = ISCSI_TASK_COMPLETED;
3237 iscsi_complete_task(task, state);
a656183e 3238 spin_unlock_bh(&session->back_lock);
3bbaaad9 3239 }
7996a778
MC
3240}
3241
0dcf8feb 3242void iscsi_conn_stop(struct iscsi_cls_conn *cls_conn, int flag)
7996a778 3243{
0dcf8feb
MC
3244 struct iscsi_conn *conn = cls_conn->dd_data;
3245 struct iscsi_session *session = conn->session;
ed2abc7f
MC
3246 int old_stop_stage;
3247
6724add1 3248 mutex_lock(&session->eh_mutex);
659743b0 3249 spin_lock_bh(&session->frwd_lock);
ed2abc7f 3250 if (conn->stop_stage == STOP_CONN_TERM) {
659743b0 3251 spin_unlock_bh(&session->frwd_lock);
6724add1
MC
3252 mutex_unlock(&session->eh_mutex);
3253 return;
3254 }
3255
ed2abc7f
MC
3256 /*
3257 * When this is called for the in_login state, we only want to clean
9c19a7d0 3258 * up the login task and connection. We do not need to block and set
67a61114 3259 * the recovery state again
ed2abc7f 3260 */
67a61114
MC
3261 if (flag == STOP_CONN_TERM)
3262 session->state = ISCSI_STATE_TERMINATE;
3263 else if (conn->stop_stage != STOP_CONN_RECOVER)
3264 session->state = ISCSI_STATE_IN_RECOVERY;
4ae0a6c1
MC
3265
3266 old_stop_stage = conn->stop_stage;
3267 conn->stop_stage = flag;
659743b0 3268 spin_unlock_bh(&session->frwd_lock);
ed2abc7f 3269
26013ad4
MC
3270 del_timer_sync(&conn->transport_timer);
3271 iscsi_suspend_tx(conn);
3272
659743b0 3273 spin_lock_bh(&session->frwd_lock);
67a61114 3274 conn->c_stage = ISCSI_CONN_STOPPED;
659743b0 3275 spin_unlock_bh(&session->frwd_lock);
6724add1 3276
7996a778
MC
3277 /*
3278 * for connection level recovery we should not calculate
3279 * header digest. conn->hdr_size used for optimization
3280 * in hdr_extract() and will be re-negotiated at
3281 * set_param() time.
3282 */
3283 if (flag == STOP_CONN_RECOVER) {
3284 conn->hdrdgst_en = 0;
3285 conn->datadgst_en = 0;
656cffc9 3286 if (session->state == ISCSI_STATE_IN_RECOVERY &&
67a61114 3287 old_stop_stage != STOP_CONN_RECOVER) {
1b2c7af8 3288 ISCSI_DBG_SESSION(session, "blocking session\n");
75613521 3289 iscsi_block_session(session->cls_session);
67a61114 3290 }
7996a778 3291 }
656cffc9 3292
656cffc9
MC
3293 /*
3294 * flush queues.
3295 */
659743b0 3296 spin_lock_bh(&session->frwd_lock);
b3cd5050 3297 fail_scsi_tasks(conn, -1, DID_TRANSPORT_DISRUPTED);
3bbaaad9 3298 fail_mgmt_tasks(session, conn);
ec29d0ac 3299 memset(&session->tmhdr, 0, sizeof(session->tmhdr));
659743b0 3300 spin_unlock_bh(&session->frwd_lock);
6724add1 3301 mutex_unlock(&session->eh_mutex);
7996a778 3302}
7996a778
MC
3303EXPORT_SYMBOL_GPL(iscsi_conn_stop);
3304
3305int iscsi_conn_bind(struct iscsi_cls_session *cls_session,
3306 struct iscsi_cls_conn *cls_conn, int is_leading)
3307{
75613521 3308 struct iscsi_session *session = cls_session->dd_data;
98644047 3309 struct iscsi_conn *conn = cls_conn->dd_data;
7996a778 3310
659743b0 3311 spin_lock_bh(&session->frwd_lock);
7996a778
MC
3312 if (is_leading)
3313 session->leadconn = conn;
659743b0 3314 spin_unlock_bh(&session->frwd_lock);
7996a778 3315
c8447e4c
MC
3316 /*
3317 * The target could have reduced it's window size between logins, so
3318 * we have to reset max/exp cmdsn so we can see the new values.
3319 */
3320 spin_lock_bh(&session->back_lock);
3321 session->max_cmdsn = session->exp_cmdsn = session->cmdsn + 1;
3322 spin_unlock_bh(&session->back_lock);
7996a778
MC
3323 /*
3324 * Unblock xmitworker(), Login Phase will pass through.
3325 */
3326 clear_bit(ISCSI_SUSPEND_BIT, &conn->suspend_rx);
3327 clear_bit(ISCSI_SUSPEND_BIT, &conn->suspend_tx);
3328 return 0;
3329}
3330EXPORT_SYMBOL_GPL(iscsi_conn_bind);
3331
adaf6990 3332int iscsi_switch_str_param(char **param, char *new_val_buf)
5700b1af
MC
3333{
3334 char *new_val;
3335
3336 if (*param) {
3337 if (!strcmp(*param, new_val_buf))
3338 return 0;
3339 }
3340
3341 new_val = kstrdup(new_val_buf, GFP_NOIO);
3342 if (!new_val)
3343 return -ENOMEM;
3344
3345 kfree(*param);
3346 *param = new_val;
3347 return 0;
3348}
adaf6990 3349EXPORT_SYMBOL_GPL(iscsi_switch_str_param);
a54a52ca
MC
3350
3351int iscsi_set_param(struct iscsi_cls_conn *cls_conn,
3352 enum iscsi_param param, char *buf, int buflen)
3353{
3354 struct iscsi_conn *conn = cls_conn->dd_data;
3355 struct iscsi_session *session = conn->session;
6a06a4b8 3356 int val;
a54a52ca
MC
3357
3358 switch(param) {
843c0a8a
MC
3359 case ISCSI_PARAM_FAST_ABORT:
3360 sscanf(buf, "%d", &session->fast_abort);
3361 break;
f6d5180c
MC
3362 case ISCSI_PARAM_ABORT_TMO:
3363 sscanf(buf, "%d", &session->abort_timeout);
3364 break;
3365 case ISCSI_PARAM_LU_RESET_TMO:
3366 sscanf(buf, "%d", &session->lu_reset_timeout);
3367 break;
3fe5ae8b
MC
3368 case ISCSI_PARAM_TGT_RESET_TMO:
3369 sscanf(buf, "%d", &session->tgt_reset_timeout);
3370 break;
f6d5180c
MC
3371 case ISCSI_PARAM_PING_TMO:
3372 sscanf(buf, "%d", &conn->ping_timeout);
3373 break;
3374 case ISCSI_PARAM_RECV_TMO:
3375 sscanf(buf, "%d", &conn->recv_timeout);
3376 break;
a54a52ca
MC
3377 case ISCSI_PARAM_MAX_RECV_DLENGTH:
3378 sscanf(buf, "%d", &conn->max_recv_dlength);
3379 break;
3380 case ISCSI_PARAM_MAX_XMIT_DLENGTH:
3381 sscanf(buf, "%d", &conn->max_xmit_dlength);
3382 break;
3383 case ISCSI_PARAM_HDRDGST_EN:
3384 sscanf(buf, "%d", &conn->hdrdgst_en);
3385 break;
3386 case ISCSI_PARAM_DATADGST_EN:
3387 sscanf(buf, "%d", &conn->datadgst_en);
3388 break;
3389 case ISCSI_PARAM_INITIAL_R2T_EN:
3390 sscanf(buf, "%d", &session->initial_r2t_en);
3391 break;
3392 case ISCSI_PARAM_MAX_R2T:
1304be5f 3393 sscanf(buf, "%hu", &session->max_r2t);
a54a52ca
MC
3394 break;
3395 case ISCSI_PARAM_IMM_DATA_EN:
3396 sscanf(buf, "%d", &session->imm_data_en);
3397 break;
3398 case ISCSI_PARAM_FIRST_BURST:
3399 sscanf(buf, "%d", &session->first_burst);
3400 break;
3401 case ISCSI_PARAM_MAX_BURST:
3402 sscanf(buf, "%d", &session->max_burst);
3403 break;
3404 case ISCSI_PARAM_PDU_INORDER_EN:
3405 sscanf(buf, "%d", &session->pdu_inorder_en);
3406 break;
3407 case ISCSI_PARAM_DATASEQ_INORDER_EN:
3408 sscanf(buf, "%d", &session->dataseq_inorder_en);
3409 break;
3410 case ISCSI_PARAM_ERL:
3411 sscanf(buf, "%d", &session->erl);
3412 break;
a54a52ca
MC
3413 case ISCSI_PARAM_EXP_STATSN:
3414 sscanf(buf, "%u", &conn->exp_statsn);
3415 break;
b2c64167 3416 case ISCSI_PARAM_USERNAME:
5700b1af 3417 return iscsi_switch_str_param(&session->username, buf);
b2c64167 3418 case ISCSI_PARAM_USERNAME_IN:
5700b1af 3419 return iscsi_switch_str_param(&session->username_in, buf);
b2c64167 3420 case ISCSI_PARAM_PASSWORD:
5700b1af 3421 return iscsi_switch_str_param(&session->password, buf);
b2c64167 3422 case ISCSI_PARAM_PASSWORD_IN:
5700b1af 3423 return iscsi_switch_str_param(&session->password_in, buf);
a54a52ca 3424 case ISCSI_PARAM_TARGET_NAME:
5700b1af 3425 return iscsi_switch_str_param(&session->targetname, buf);
3c5c4801
VC
3426 case ISCSI_PARAM_TARGET_ALIAS:
3427 return iscsi_switch_str_param(&session->targetalias, buf);
a54a52ca
MC
3428 case ISCSI_PARAM_TPGT:
3429 sscanf(buf, "%d", &session->tpgt);
3430 break;
3431 case ISCSI_PARAM_PERSISTENT_PORT:
3432 sscanf(buf, "%d", &conn->persistent_port);
3433 break;
3434 case ISCSI_PARAM_PERSISTENT_ADDRESS:
5700b1af 3435 return iscsi_switch_str_param(&conn->persistent_address, buf);
88dfd340 3436 case ISCSI_PARAM_IFACE_NAME:
5700b1af 3437 return iscsi_switch_str_param(&session->ifacename, buf);
88dfd340 3438 case ISCSI_PARAM_INITIATOR_NAME:
5700b1af 3439 return iscsi_switch_str_param(&session->initiatorname, buf);
3b9373e9
EW
3440 case ISCSI_PARAM_BOOT_ROOT:
3441 return iscsi_switch_str_param(&session->boot_root, buf);
3442 case ISCSI_PARAM_BOOT_NIC:
3443 return iscsi_switch_str_param(&session->boot_nic, buf);
3444 case ISCSI_PARAM_BOOT_TARGET:
3445 return iscsi_switch_str_param(&session->boot_target, buf);
f8525eb4
AC
3446 case ISCSI_PARAM_PORTAL_TYPE:
3447 return iscsi_switch_str_param(&session->portal_type, buf);
3448 case ISCSI_PARAM_DISCOVERY_PARENT_TYPE:
3449 return iscsi_switch_str_param(&session->discovery_parent_type,
3450 buf);
6a06a4b8
OG
3451 case ISCSI_PARAM_DISCOVERY_SESS:
3452 sscanf(buf, "%d", &val);
3453 session->discovery_sess = !!val;
3454 break;
ae56ff40
AC
3455 case ISCSI_PARAM_LOCAL_IPADDR:
3456 return iscsi_switch_str_param(&conn->local_ipaddr, buf);
a54a52ca
MC
3457 default:
3458 return -ENOSYS;
3459 }
3460
3461 return 0;
3462}
3463EXPORT_SYMBOL_GPL(iscsi_set_param);
3464
3465int iscsi_session_get_param(struct iscsi_cls_session *cls_session,
3466 enum iscsi_param param, char *buf)
3467{
75613521 3468 struct iscsi_session *session = cls_session->dd_data;
a54a52ca
MC
3469 int len;
3470
3471 switch(param) {
843c0a8a 3472 case ISCSI_PARAM_FAST_ABORT:
ec98ea70 3473 len = sysfs_emit(buf, "%d\n", session->fast_abort);
843c0a8a 3474 break;
f6d5180c 3475 case ISCSI_PARAM_ABORT_TMO:
ec98ea70 3476 len = sysfs_emit(buf, "%d\n", session->abort_timeout);
f6d5180c
MC
3477 break;
3478 case ISCSI_PARAM_LU_RESET_TMO:
ec98ea70 3479 len = sysfs_emit(buf, "%d\n", session->lu_reset_timeout);
f6d5180c 3480 break;
3fe5ae8b 3481 case ISCSI_PARAM_TGT_RESET_TMO:
ec98ea70 3482 len = sysfs_emit(buf, "%d\n", session->tgt_reset_timeout);
3fe5ae8b 3483 break;
a54a52ca 3484 case ISCSI_PARAM_INITIAL_R2T_EN:
ec98ea70 3485 len = sysfs_emit(buf, "%d\n", session->initial_r2t_en);
a54a52ca
MC
3486 break;
3487 case ISCSI_PARAM_MAX_R2T:
ec98ea70 3488 len = sysfs_emit(buf, "%hu\n", session->max_r2t);
a54a52ca
MC
3489 break;
3490 case ISCSI_PARAM_IMM_DATA_EN:
ec98ea70 3491 len = sysfs_emit(buf, "%d\n", session->imm_data_en);
a54a52ca
MC
3492 break;
3493 case ISCSI_PARAM_FIRST_BURST:
ec98ea70 3494 len = sysfs_emit(buf, "%u\n", session->first_burst);
a54a52ca
MC
3495 break;
3496 case ISCSI_PARAM_MAX_BURST:
ec98ea70 3497 len = sysfs_emit(buf, "%u\n", session->max_burst);
a54a52ca
MC
3498 break;
3499 case ISCSI_PARAM_PDU_INORDER_EN:
ec98ea70 3500 len = sysfs_emit(buf, "%d\n", session->pdu_inorder_en);
a54a52ca
MC
3501 break;
3502 case ISCSI_PARAM_DATASEQ_INORDER_EN:
ec98ea70 3503 len = sysfs_emit(buf, "%d\n", session->dataseq_inorder_en);
a54a52ca 3504 break;
5f09e1f3 3505 case ISCSI_PARAM_DEF_TASKMGMT_TMO:
ec98ea70 3506 len = sysfs_emit(buf, "%d\n", session->def_taskmgmt_tmo);
5f09e1f3 3507 break;
a54a52ca 3508 case ISCSI_PARAM_ERL:
ec98ea70 3509 len = sysfs_emit(buf, "%d\n", session->erl);
a54a52ca
MC
3510 break;
3511 case ISCSI_PARAM_TARGET_NAME:
ec98ea70 3512 len = sysfs_emit(buf, "%s\n", session->targetname);
a54a52ca 3513 break;
3c5c4801 3514 case ISCSI_PARAM_TARGET_ALIAS:
ec98ea70 3515 len = sysfs_emit(buf, "%s\n", session->targetalias);
3c5c4801 3516 break;
a54a52ca 3517 case ISCSI_PARAM_TPGT:
ec98ea70 3518 len = sysfs_emit(buf, "%d\n", session->tpgt);
a54a52ca 3519 break;
b2c64167 3520 case ISCSI_PARAM_USERNAME:
ec98ea70 3521 len = sysfs_emit(buf, "%s\n", session->username);
b2c64167
MC
3522 break;
3523 case ISCSI_PARAM_USERNAME_IN:
ec98ea70 3524 len = sysfs_emit(buf, "%s\n", session->username_in);
b2c64167
MC
3525 break;
3526 case ISCSI_PARAM_PASSWORD:
ec98ea70 3527 len = sysfs_emit(buf, "%s\n", session->password);
b2c64167
MC
3528 break;
3529 case ISCSI_PARAM_PASSWORD_IN:
ec98ea70 3530 len = sysfs_emit(buf, "%s\n", session->password_in);
b2c64167 3531 break;
88dfd340 3532 case ISCSI_PARAM_IFACE_NAME:
ec98ea70 3533 len = sysfs_emit(buf, "%s\n", session->ifacename);
88dfd340
MC
3534 break;
3535 case ISCSI_PARAM_INITIATOR_NAME:
ec98ea70 3536 len = sysfs_emit(buf, "%s\n", session->initiatorname);
88dfd340 3537 break;
3b9373e9 3538 case ISCSI_PARAM_BOOT_ROOT:
ec98ea70 3539 len = sysfs_emit(buf, "%s\n", session->boot_root);
3b9373e9
EW
3540 break;
3541 case ISCSI_PARAM_BOOT_NIC:
ec98ea70 3542 len = sysfs_emit(buf, "%s\n", session->boot_nic);
3b9373e9
EW
3543 break;
3544 case ISCSI_PARAM_BOOT_TARGET:
ec98ea70 3545 len = sysfs_emit(buf, "%s\n", session->boot_target);
9a2307b1 3546 break;
f8525eb4 3547 case ISCSI_PARAM_AUTO_SND_TGT_DISABLE:
ec98ea70 3548 len = sysfs_emit(buf, "%u\n", session->auto_snd_tgt_disable);
f8525eb4
AC
3549 break;
3550 case ISCSI_PARAM_DISCOVERY_SESS:
ec98ea70 3551 len = sysfs_emit(buf, "%u\n", session->discovery_sess);
f8525eb4
AC
3552 break;
3553 case ISCSI_PARAM_PORTAL_TYPE:
ec98ea70 3554 len = sysfs_emit(buf, "%s\n", session->portal_type);
f8525eb4
AC
3555 break;
3556 case ISCSI_PARAM_CHAP_AUTH_EN:
ec98ea70 3557 len = sysfs_emit(buf, "%u\n", session->chap_auth_en);
f8525eb4
AC
3558 break;
3559 case ISCSI_PARAM_DISCOVERY_LOGOUT_EN:
ec98ea70 3560 len = sysfs_emit(buf, "%u\n", session->discovery_logout_en);
f8525eb4
AC
3561 break;
3562 case ISCSI_PARAM_BIDI_CHAP_EN:
ec98ea70 3563 len = sysfs_emit(buf, "%u\n", session->bidi_chap_en);
f8525eb4
AC
3564 break;
3565 case ISCSI_PARAM_DISCOVERY_AUTH_OPTIONAL:
ec98ea70 3566 len = sysfs_emit(buf, "%u\n", session->discovery_auth_optional);
f8525eb4
AC
3567 break;
3568 case ISCSI_PARAM_DEF_TIME2WAIT:
ec98ea70 3569 len = sysfs_emit(buf, "%d\n", session->time2wait);
f8525eb4
AC
3570 break;
3571 case ISCSI_PARAM_DEF_TIME2RETAIN:
ec98ea70 3572 len = sysfs_emit(buf, "%d\n", session->time2retain);
f8525eb4
AC
3573 break;
3574 case ISCSI_PARAM_TSID:
ec98ea70 3575 len = sysfs_emit(buf, "%u\n", session->tsid);
f8525eb4
AC
3576 break;
3577 case ISCSI_PARAM_ISID:
ec98ea70 3578 len = sysfs_emit(buf, "%02x%02x%02x%02x%02x%02x\n",
f8525eb4
AC
3579 session->isid[0], session->isid[1],
3580 session->isid[2], session->isid[3],
3581 session->isid[4], session->isid[5]);
3582 break;
3583 case ISCSI_PARAM_DISCOVERY_PARENT_IDX:
ec98ea70 3584 len = sysfs_emit(buf, "%u\n", session->discovery_parent_idx);
f8525eb4
AC
3585 break;
3586 case ISCSI_PARAM_DISCOVERY_PARENT_TYPE:
3587 if (session->discovery_parent_type)
ec98ea70 3588 len = sysfs_emit(buf, "%s\n",
f8525eb4
AC
3589 session->discovery_parent_type);
3590 else
ec98ea70 3591 len = sysfs_emit(buf, "\n");
3b9373e9 3592 break;
a54a52ca
MC
3593 default:
3594 return -ENOSYS;
3595 }
3596
3597 return len;
3598}
3599EXPORT_SYMBOL_GPL(iscsi_session_get_param);
3600
00f3708e
MC
3601int iscsi_conn_get_addr_param(struct sockaddr_storage *addr,
3602 enum iscsi_param param, char *buf)
3603{
3604 struct sockaddr_in6 *sin6 = NULL;
3605 struct sockaddr_in *sin = NULL;
3606 int len;
3607
3608 switch (addr->ss_family) {
3609 case AF_INET:
3610 sin = (struct sockaddr_in *)addr;
3611 break;
3612 case AF_INET6:
3613 sin6 = (struct sockaddr_in6 *)addr;
3614 break;
3615 default:
3616 return -EINVAL;
3617 }
3618
3619 switch (param) {
3620 case ISCSI_PARAM_CONN_ADDRESS:
3621 case ISCSI_HOST_PARAM_IPADDRESS:
3622 if (sin)
ec98ea70 3623 len = sysfs_emit(buf, "%pI4\n", &sin->sin_addr.s_addr);
00f3708e 3624 else
ec98ea70 3625 len = sysfs_emit(buf, "%pI6\n", &sin6->sin6_addr);
00f3708e
MC
3626 break;
3627 case ISCSI_PARAM_CONN_PORT:
4bfb8ebf 3628 case ISCSI_PARAM_LOCAL_PORT:
00f3708e 3629 if (sin)
ec98ea70 3630 len = sysfs_emit(buf, "%hu\n", be16_to_cpu(sin->sin_port));
00f3708e 3631 else
ec98ea70 3632 len = sysfs_emit(buf, "%hu\n",
00f3708e
MC
3633 be16_to_cpu(sin6->sin6_port));
3634 break;
3635 default:
3636 return -EINVAL;
3637 }
3638
3639 return len;
3640}
3641EXPORT_SYMBOL_GPL(iscsi_conn_get_addr_param);
3642
a54a52ca
MC
3643int iscsi_conn_get_param(struct iscsi_cls_conn *cls_conn,
3644 enum iscsi_param param, char *buf)
3645{
3646 struct iscsi_conn *conn = cls_conn->dd_data;
3647 int len;
3648
3649 switch(param) {
f6d5180c 3650 case ISCSI_PARAM_PING_TMO:
ec98ea70 3651 len = sysfs_emit(buf, "%u\n", conn->ping_timeout);
f6d5180c
MC
3652 break;
3653 case ISCSI_PARAM_RECV_TMO:
ec98ea70 3654 len = sysfs_emit(buf, "%u\n", conn->recv_timeout);
f6d5180c 3655 break;
a54a52ca 3656 case ISCSI_PARAM_MAX_RECV_DLENGTH:
ec98ea70 3657 len = sysfs_emit(buf, "%u\n", conn->max_recv_dlength);
a54a52ca
MC
3658 break;
3659 case ISCSI_PARAM_MAX_XMIT_DLENGTH:
ec98ea70 3660 len = sysfs_emit(buf, "%u\n", conn->max_xmit_dlength);
a54a52ca
MC
3661 break;
3662 case ISCSI_PARAM_HDRDGST_EN:
ec98ea70 3663 len = sysfs_emit(buf, "%d\n", conn->hdrdgst_en);
a54a52ca
MC
3664 break;
3665 case ISCSI_PARAM_DATADGST_EN:
ec98ea70 3666 len = sysfs_emit(buf, "%d\n", conn->datadgst_en);
a54a52ca
MC
3667 break;
3668 case ISCSI_PARAM_IFMARKER_EN:
ec98ea70 3669 len = sysfs_emit(buf, "%d\n", conn->ifmarker_en);
a54a52ca
MC
3670 break;
3671 case ISCSI_PARAM_OFMARKER_EN:
ec98ea70 3672 len = sysfs_emit(buf, "%d\n", conn->ofmarker_en);
a54a52ca
MC
3673 break;
3674 case ISCSI_PARAM_EXP_STATSN:
ec98ea70 3675 len = sysfs_emit(buf, "%u\n", conn->exp_statsn);
a54a52ca
MC
3676 break;
3677 case ISCSI_PARAM_PERSISTENT_PORT:
ec98ea70 3678 len = sysfs_emit(buf, "%d\n", conn->persistent_port);
a54a52ca
MC
3679 break;
3680 case ISCSI_PARAM_PERSISTENT_ADDRESS:
ec98ea70 3681 len = sysfs_emit(buf, "%s\n", conn->persistent_address);
a54a52ca 3682 break;
f8525eb4 3683 case ISCSI_PARAM_STATSN:
ec98ea70 3684 len = sysfs_emit(buf, "%u\n", conn->statsn);
f8525eb4
AC
3685 break;
3686 case ISCSI_PARAM_MAX_SEGMENT_SIZE:
ec98ea70 3687 len = sysfs_emit(buf, "%u\n", conn->max_segment_size);
f8525eb4
AC
3688 break;
3689 case ISCSI_PARAM_KEEPALIVE_TMO:
ec98ea70 3690 len = sysfs_emit(buf, "%u\n", conn->keepalive_tmo);
f8525eb4
AC
3691 break;
3692 case ISCSI_PARAM_LOCAL_PORT:
ec98ea70 3693 len = sysfs_emit(buf, "%u\n", conn->local_port);
f8525eb4
AC
3694 break;
3695 case ISCSI_PARAM_TCP_TIMESTAMP_STAT:
ec98ea70 3696 len = sysfs_emit(buf, "%u\n", conn->tcp_timestamp_stat);
f8525eb4
AC
3697 break;
3698 case ISCSI_PARAM_TCP_NAGLE_DISABLE:
ec98ea70 3699 len = sysfs_emit(buf, "%u\n", conn->tcp_nagle_disable);
f8525eb4
AC
3700 break;
3701 case ISCSI_PARAM_TCP_WSF_DISABLE:
ec98ea70 3702 len = sysfs_emit(buf, "%u\n", conn->tcp_wsf_disable);
f8525eb4
AC
3703 break;
3704 case ISCSI_PARAM_TCP_TIMER_SCALE:
ec98ea70 3705 len = sysfs_emit(buf, "%u\n", conn->tcp_timer_scale);
f8525eb4
AC
3706 break;
3707 case ISCSI_PARAM_TCP_TIMESTAMP_EN:
ec98ea70 3708 len = sysfs_emit(buf, "%u\n", conn->tcp_timestamp_en);
f8525eb4
AC
3709 break;
3710 case ISCSI_PARAM_IP_FRAGMENT_DISABLE:
ec98ea70 3711 len = sysfs_emit(buf, "%u\n", conn->fragment_disable);
f8525eb4
AC
3712 break;
3713 case ISCSI_PARAM_IPV4_TOS:
ec98ea70 3714 len = sysfs_emit(buf, "%u\n", conn->ipv4_tos);
f8525eb4
AC
3715 break;
3716 case ISCSI_PARAM_IPV6_TC:
ec98ea70 3717 len = sysfs_emit(buf, "%u\n", conn->ipv6_traffic_class);
f8525eb4 3718 break;
5f09e1f3 3719 case ISCSI_PARAM_IPV6_FLOW_LABEL:
ec98ea70 3720 len = sysfs_emit(buf, "%u\n", conn->ipv6_flow_label);
5f09e1f3 3721 break;
f8525eb4 3722 case ISCSI_PARAM_IS_FW_ASSIGNED_IPV6:
ec98ea70 3723 len = sysfs_emit(buf, "%u\n", conn->is_fw_assigned_ipv6);
f8525eb4
AC
3724 break;
3725 case ISCSI_PARAM_TCP_XMIT_WSF:
ec98ea70 3726 len = sysfs_emit(buf, "%u\n", conn->tcp_xmit_wsf);
f8525eb4
AC
3727 break;
3728 case ISCSI_PARAM_TCP_RECV_WSF:
ec98ea70 3729 len = sysfs_emit(buf, "%u\n", conn->tcp_recv_wsf);
f8525eb4 3730 break;
ae56ff40 3731 case ISCSI_PARAM_LOCAL_IPADDR:
ec98ea70 3732 len = sysfs_emit(buf, "%s\n", conn->local_ipaddr);
ae56ff40 3733 break;
a54a52ca
MC
3734 default:
3735 return -ENOSYS;
3736 }
3737
3738 return len;
3739}
3740EXPORT_SYMBOL_GPL(iscsi_conn_get_param);
3741
0801c242
MC
3742int iscsi_host_get_param(struct Scsi_Host *shost, enum iscsi_host_param param,
3743 char *buf)
3744{
75613521 3745 struct iscsi_host *ihost = shost_priv(shost);
0801c242
MC
3746 int len;
3747
3748 switch (param) {
d8196ed2 3749 case ISCSI_HOST_PARAM_NETDEV_NAME:
ec98ea70 3750 len = sysfs_emit(buf, "%s\n", ihost->netdev);
d8196ed2 3751 break;
0801c242 3752 case ISCSI_HOST_PARAM_HWADDRESS:
ec98ea70 3753 len = sysfs_emit(buf, "%s\n", ihost->hwaddress);
0801c242 3754 break;
8ad5781a 3755 case ISCSI_HOST_PARAM_INITIATOR_NAME:
ec98ea70 3756 len = sysfs_emit(buf, "%s\n", ihost->initiatorname);
8ad5781a 3757 break;
0801c242
MC
3758 default:
3759 return -ENOSYS;
3760 }
3761
3762 return len;
3763}
3764EXPORT_SYMBOL_GPL(iscsi_host_get_param);
3765
3766int iscsi_host_set_param(struct Scsi_Host *shost, enum iscsi_host_param param,
3767 char *buf, int buflen)
3768{
75613521 3769 struct iscsi_host *ihost = shost_priv(shost);
0801c242
MC
3770
3771 switch (param) {
d8196ed2 3772 case ISCSI_HOST_PARAM_NETDEV_NAME:
5700b1af 3773 return iscsi_switch_str_param(&ihost->netdev, buf);
0801c242 3774 case ISCSI_HOST_PARAM_HWADDRESS:
5700b1af 3775 return iscsi_switch_str_param(&ihost->hwaddress, buf);
8ad5781a 3776 case ISCSI_HOST_PARAM_INITIATOR_NAME:
5700b1af 3777 return iscsi_switch_str_param(&ihost->initiatorname, buf);
0801c242
MC
3778 default:
3779 return -ENOSYS;
3780 }
3781
3782 return 0;
3783}
3784EXPORT_SYMBOL_GPL(iscsi_host_set_param);
3785
7996a778
MC
3786MODULE_AUTHOR("Mike Christie");
3787MODULE_DESCRIPTION("iSCSI library functions");
3788MODULE_LICENSE("GPL");