2019-05-27 06:55:05 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2005-08-05 02:33:07 +00:00
|
|
|
/*
|
2005-04-16 22:20:36 +00:00
|
|
|
* iSCSI transport class definitions
|
|
|
|
*
|
|
|
|
* Copyright (C) IBM Corporation, 2004
|
2005-08-05 02:33:07 +00:00
|
|
|
* Copyright (C) Mike Christie, 2004 - 2005
|
|
|
|
* Copyright (C) Dmitry Yusupov, 2004 - 2005
|
|
|
|
* Copyright (C) Alex Aizman, 2004 - 2005
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
|
|
|
#include <linux/module.h>
|
2006-01-11 12:16:10 +00:00
|
|
|
#include <linux/mutex.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 08:04:11 +00:00
|
|
|
#include <linux/slab.h>
|
2011-07-25 18:48:50 +00:00
|
|
|
#include <linux/bsg-lib.h>
|
2011-10-06 08:56:57 +00:00
|
|
|
#include <linux/idr.h>
|
2005-08-05 02:33:07 +00:00
|
|
|
#include <net/tcp.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <scsi/scsi.h>
|
|
|
|
#include <scsi/scsi_host.h>
|
|
|
|
#include <scsi/scsi_device.h>
|
|
|
|
#include <scsi/scsi_transport.h>
|
|
|
|
#include <scsi/scsi_transport_iscsi.h>
|
2005-08-05 02:33:07 +00:00
|
|
|
#include <scsi/iscsi_if.h>
|
2010-07-22 11:29:49 +00:00
|
|
|
#include <scsi/scsi_cmnd.h>
|
2011-07-25 18:48:50 +00:00
|
|
|
#include <scsi/scsi_bsg_iscsi.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-06-16 15:11:34 +00:00
|
|
|
#define ISCSI_TRANSPORT_VERSION "2.0-870"
|
2005-04-16 22:20:36 +00:00
|
|
|
|
scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func
In iscsi_if_rx func, after receiving one request through
iscsi_if_recv_msg func, iscsi_if_send_reply will be called to try to
reply to the request in a do-while loop. If the iscsi_if_send_reply
function keeps returning -EAGAIN, a deadlock will occur.
For example, a client only send msg without calling recvmsg func, then
it will result in the watchdog soft lockup. The details are given as
follows:
sock_fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_ISCSI);
retval = bind(sock_fd, (struct sock addr*) & src_addr, sizeof(src_addr);
while (1) {
state_msg = sendmsg(sock_fd, &msg, 0);
//Note: recvmsg(sock_fd, &msg, 0) is not processed here.
}
close(sock_fd);
watchdog: BUG: soft lockup - CPU#7 stuck for 22s! [netlink_test:253305] Sample time: 4000897528 ns(HZ: 250) Sample stat:
curr: user: 675503481560, nice: 321724050, sys: 448689506750, idle: 4654054240530, iowait: 40885550700, irq: 14161174020, softirq: 8104324140, st: 0
deta: user: 0, nice: 0, sys: 3998210100, idle: 0, iowait: 0, irq: 1547170, softirq: 242870, st: 0 Sample softirq:
TIMER: 992
SCHED: 8
Sample irqstat:
irq 2: delta 1003, curr: 3103802, arch_timer
CPU: 7 PID: 253305 Comm: netlink_test Kdump: loaded Tainted: G OE
Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
pstate: 40400005 (nZcv daif +PAN -UAO)
pc : __alloc_skb+0x104/0x1b0
lr : __alloc_skb+0x9c/0x1b0
sp : ffff000033603a30
x29: ffff000033603a30 x28: 00000000000002dd
x27: ffff800b34ced810 x26: ffff800ba7569f00
x25: 00000000ffffffff x24: 0000000000000000
x23: ffff800f7c43f600 x22: 0000000000480020
x21: ffff0000091d9000 x20: ffff800b34eff200
x19: ffff800ba7569f00 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000
x15: 0000000000000000 x14: 0001000101000100
x13: 0000000101010000 x12: 0101000001010100
x11: 0001010101010001 x10: 00000000000002dd
x9 : ffff000033603d58 x8 : ffff800b34eff400
x7 : ffff800ba7569200 x6 : ffff800b34eff400
x5 : 0000000000000000 x4 : 00000000ffffffff
x3 : 0000000000000000 x2 : 0000000000000001
x1 : ffff800b34eff2c0 x0 : 0000000000000300 Call trace:
__alloc_skb+0x104/0x1b0
iscsi_if_rx+0x144/0x12bc [scsi_transport_iscsi]
netlink_unicast+0x1e0/0x258
netlink_sendmsg+0x310/0x378
sock_sendmsg+0x4c/0x70
sock_write_iter+0x90/0xf0
__vfs_write+0x11c/0x190
vfs_write+0xac/0x1c0
ksys_write+0x6c/0xd8
__arm64_sys_write+0x24/0x30
el0_svc_common+0x78/0x130
el0_svc_handler+0x38/0x78
el0_svc+0x8/0xc
Link: https://lore.kernel.org/r/EDBAAA0BBBA2AC4E9C8B6B81DEEE1D6915E3D4D2@dggeml505-mbx.china.huawei.com
Signed-off-by: Bo Wu <wubo40@huawei.com>
Reviewed-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2019-11-20 13:26:17 +00:00
|
|
|
#define ISCSI_SEND_MAX_ALLOWED 10
|
|
|
|
|
2018-11-21 17:04:43 +00:00
|
|
|
#define CREATE_TRACE_POINTS
|
|
|
|
#include <trace/events/iscsi.h>
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Export tracepoint symbols to be used by other modules.
|
|
|
|
*/
|
|
|
|
EXPORT_TRACEPOINT_SYMBOL_GPL(iscsi_dbg_conn);
|
|
|
|
EXPORT_TRACEPOINT_SYMBOL_GPL(iscsi_dbg_eh);
|
|
|
|
EXPORT_TRACEPOINT_SYMBOL_GPL(iscsi_dbg_session);
|
|
|
|
EXPORT_TRACEPOINT_SYMBOL_GPL(iscsi_dbg_tcp);
|
|
|
|
EXPORT_TRACEPOINT_SYMBOL_GPL(iscsi_dbg_sw_tcp);
|
|
|
|
|
2009-08-20 20:11:01 +00:00
|
|
|
static int dbg_session;
|
|
|
|
module_param_named(debug_session, dbg_session, int,
|
|
|
|
S_IRUGO | S_IWUSR);
|
|
|
|
MODULE_PARM_DESC(debug_session,
|
|
|
|
"Turn on debugging for sessions in scsi_transport_iscsi "
|
|
|
|
"module. Set to 1 to turn on, and zero to turn off. Default "
|
|
|
|
"is off.");
|
|
|
|
|
|
|
|
static int dbg_conn;
|
|
|
|
module_param_named(debug_conn, dbg_conn, int,
|
|
|
|
S_IRUGO | S_IWUSR);
|
|
|
|
MODULE_PARM_DESC(debug_conn,
|
|
|
|
"Turn on debugging for connections in scsi_transport_iscsi "
|
|
|
|
"module. Set to 1 to turn on, and zero to turn off. Default "
|
|
|
|
"is off.");
|
|
|
|
|
|
|
|
#define ISCSI_DBG_TRANS_SESSION(_session, dbg_fmt, arg...) \
|
|
|
|
do { \
|
|
|
|
if (dbg_session) \
|
|
|
|
iscsi_cls_session_printk(KERN_INFO, _session, \
|
|
|
|
"%s: " dbg_fmt, \
|
|
|
|
__func__, ##arg); \
|
2018-11-21 17:04:43 +00:00
|
|
|
iscsi_dbg_trace(trace_iscsi_dbg_trans_session, \
|
|
|
|
&(_session)->dev, \
|
|
|
|
"%s " dbg_fmt, __func__, ##arg); \
|
2009-08-20 20:11:01 +00:00
|
|
|
} while (0);
|
|
|
|
|
|
|
|
#define ISCSI_DBG_TRANS_CONN(_conn, dbg_fmt, arg...) \
|
|
|
|
do { \
|
|
|
|
if (dbg_conn) \
|
|
|
|
iscsi_cls_conn_printk(KERN_INFO, _conn, \
|
|
|
|
"%s: " dbg_fmt, \
|
2018-11-21 17:04:43 +00:00
|
|
|
__func__, ##arg); \
|
|
|
|
iscsi_dbg_trace(trace_iscsi_dbg_trans_conn, \
|
|
|
|
&(_conn)->dev, \
|
|
|
|
"%s " dbg_fmt, __func__, ##arg); \
|
2009-08-20 20:11:01 +00:00
|
|
|
} while (0);
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
struct iscsi_internal {
|
|
|
|
struct scsi_transport_template t;
|
2005-08-05 02:33:07 +00:00
|
|
|
struct iscsi_transport *iscsi_transport;
|
|
|
|
struct list_head list;
|
2008-02-21 23:13:36 +00:00
|
|
|
struct device dev;
|
2006-04-07 02:13:39 +00:00
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
struct transport_container conn_cont;
|
|
|
|
struct transport_container session_cont;
|
2005-04-16 22:20:36 +00:00
|
|
|
};
|
|
|
|
|
2020-01-25 06:19:25 +00:00
|
|
|
/* Worker to perform connection failure on unresponsive connections
|
|
|
|
* completely in kernel space.
|
|
|
|
*/
|
|
|
|
static void stop_conn_work_fn(struct work_struct *work);
|
|
|
|
static DECLARE_WORK(stop_conn_work, stop_conn_work_fn);
|
|
|
|
|
2007-02-28 23:32:18 +00:00
|
|
|
static atomic_t iscsi_session_nr; /* sysfs session id for next new session */
|
2007-12-13 18:43:27 +00:00
|
|
|
static struct workqueue_struct *iscsi_eh_timer_workq;
|
2006-04-07 02:13:33 +00:00
|
|
|
|
2020-02-27 19:59:45 +00:00
|
|
|
static struct workqueue_struct *iscsi_destroy_workq;
|
|
|
|
|
2011-10-06 08:56:57 +00:00
|
|
|
static DEFINE_IDA(iscsi_sess_ida);
|
2005-08-05 02:33:07 +00:00
|
|
|
/*
|
|
|
|
* list of registered transports and lock that must
|
|
|
|
* be held while accessing list. The iscsi_transport_lock must
|
2006-01-11 12:16:10 +00:00
|
|
|
* be acquired after the rx_queue_mutex.
|
2005-08-05 02:33:07 +00:00
|
|
|
*/
|
|
|
|
static LIST_HEAD(iscsi_transports);
|
|
|
|
static DEFINE_SPINLOCK(iscsi_transport_lock);
|
|
|
|
|
|
|
|
#define to_iscsi_internal(tmpl) \
|
|
|
|
container_of(tmpl, struct iscsi_internal, t)
|
|
|
|
|
2008-02-21 23:13:36 +00:00
|
|
|
#define dev_to_iscsi_internal(_dev) \
|
|
|
|
container_of(_dev, struct iscsi_internal, dev)
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2008-02-21 23:13:36 +00:00
|
|
|
static void iscsi_transport_release(struct device *dev)
|
2005-08-05 02:33:07 +00:00
|
|
|
{
|
2008-02-21 23:13:36 +00:00
|
|
|
struct iscsi_internal *priv = dev_to_iscsi_internal(dev);
|
2005-08-05 02:33:07 +00:00
|
|
|
kfree(priv);
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
/*
|
|
|
|
* iscsi_transport_class represents the iscsi_transports that are
|
|
|
|
* registered.
|
|
|
|
*/
|
|
|
|
static struct class iscsi_transport_class = {
|
|
|
|
.name = "iscsi_transport",
|
2008-02-21 23:13:36 +00:00
|
|
|
.dev_release = iscsi_transport_release,
|
2005-08-05 02:33:07 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static ssize_t
|
2008-02-21 23:13:36 +00:00
|
|
|
show_transport_handle(struct device *dev, struct device_attribute *attr,
|
|
|
|
char *buf)
|
2005-08-05 02:33:07 +00:00
|
|
|
{
|
2008-02-21 23:13:36 +00:00
|
|
|
struct iscsi_internal *priv = dev_to_iscsi_internal(dev);
|
2021-02-23 21:06:24 +00:00
|
|
|
|
|
|
|
if (!capable(CAP_SYS_ADMIN))
|
|
|
|
return -EACCES;
|
2021-02-24 02:00:17 +00:00
|
|
|
return sysfs_emit(buf, "%llu\n",
|
|
|
|
(unsigned long long)iscsi_handle(priv->iscsi_transport));
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
2008-02-21 23:13:36 +00:00
|
|
|
static DEVICE_ATTR(handle, S_IRUGO, show_transport_handle, NULL);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
|
|
|
#define show_transport_attr(name, format) \
|
|
|
|
static ssize_t \
|
2008-02-21 23:13:36 +00:00
|
|
|
show_transport_##name(struct device *dev, \
|
|
|
|
struct device_attribute *attr,char *buf) \
|
2005-08-05 02:33:07 +00:00
|
|
|
{ \
|
2008-02-21 23:13:36 +00:00
|
|
|
struct iscsi_internal *priv = dev_to_iscsi_internal(dev); \
|
2021-02-24 02:00:17 +00:00
|
|
|
return sysfs_emit(buf, format"\n", priv->iscsi_transport->name);\
|
2005-08-05 02:33:07 +00:00
|
|
|
} \
|
2008-02-21 23:13:36 +00:00
|
|
|
static DEVICE_ATTR(name, S_IRUGO, show_transport_##name, NULL);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
|
|
|
show_transport_attr(caps, "0x%x");
|
|
|
|
|
|
|
|
static struct attribute *iscsi_transport_attrs[] = {
|
2008-02-21 23:13:36 +00:00
|
|
|
&dev_attr_handle.attr,
|
|
|
|
&dev_attr_caps.attr,
|
2005-08-05 02:33:07 +00:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct attribute_group iscsi_transport_group = {
|
|
|
|
.attrs = iscsi_transport_attrs,
|
|
|
|
};
|
|
|
|
|
2008-05-21 20:54:13 +00:00
|
|
|
/*
|
|
|
|
* iSCSI endpoint attrs
|
|
|
|
*/
|
|
|
|
#define iscsi_dev_to_endpoint(_dev) \
|
|
|
|
container_of(_dev, struct iscsi_endpoint, dev)
|
|
|
|
|
|
|
|
#define ISCSI_ATTR(_prefix,_name,_mode,_show,_store) \
|
|
|
|
struct device_attribute dev_attr_##_prefix##_##_name = \
|
|
|
|
__ATTR(_name,_mode,_show,_store)
|
|
|
|
|
|
|
|
static void iscsi_endpoint_release(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iscsi_endpoint *ep = iscsi_dev_to_endpoint(dev);
|
|
|
|
kfree(ep);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct class iscsi_endpoint_class = {
|
|
|
|
.name = "iscsi_endpoint",
|
|
|
|
.dev_release = iscsi_endpoint_release,
|
|
|
|
};
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
show_ep_handle(struct device *dev, struct device_attribute *attr, char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_endpoint *ep = iscsi_dev_to_endpoint(dev);
|
2021-02-24 02:00:17 +00:00
|
|
|
return sysfs_emit(buf, "%llu\n", (unsigned long long) ep->id);
|
2008-05-21 20:54:13 +00:00
|
|
|
}
|
|
|
|
static ISCSI_ATTR(ep, handle, S_IRUGO, show_ep_handle, NULL);
|
|
|
|
|
|
|
|
static struct attribute *iscsi_endpoint_attrs[] = {
|
|
|
|
&dev_attr_ep_handle.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct attribute_group iscsi_endpoint_group = {
|
|
|
|
.attrs = iscsi_endpoint_attrs,
|
|
|
|
};
|
|
|
|
|
|
|
|
#define ISCSI_MAX_EPID -1
|
|
|
|
|
2013-02-01 19:40:17 +00:00
|
|
|
static int iscsi_match_epid(struct device *dev, const void *data)
|
2008-05-21 20:54:13 +00:00
|
|
|
{
|
|
|
|
struct iscsi_endpoint *ep = iscsi_dev_to_endpoint(dev);
|
2013-02-01 19:40:17 +00:00
|
|
|
const uint64_t *epid = data;
|
2008-05-21 20:54:13 +00:00
|
|
|
|
|
|
|
return *epid == ep->id;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct iscsi_endpoint *
|
|
|
|
iscsi_create_endpoint(int dd_size)
|
|
|
|
{
|
|
|
|
struct device *dev;
|
|
|
|
struct iscsi_endpoint *ep;
|
2008-09-24 16:46:11 +00:00
|
|
|
uint64_t id;
|
2008-05-21 20:54:13 +00:00
|
|
|
int err;
|
|
|
|
|
|
|
|
for (id = 1; id < ISCSI_MAX_EPID; id++) {
|
2008-05-22 21:21:08 +00:00
|
|
|
dev = class_find_device(&iscsi_endpoint_class, NULL, &id,
|
2008-05-21 20:54:13 +00:00
|
|
|
iscsi_match_epid);
|
|
|
|
if (!dev)
|
|
|
|
break;
|
2015-05-20 09:38:58 +00:00
|
|
|
else
|
|
|
|
put_device(dev);
|
2008-05-21 20:54:13 +00:00
|
|
|
}
|
|
|
|
if (id == ISCSI_MAX_EPID) {
|
|
|
|
printk(KERN_ERR "Too many connections. Max supported %u\n",
|
|
|
|
ISCSI_MAX_EPID - 1);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ep = kzalloc(sizeof(*ep) + dd_size, GFP_KERNEL);
|
|
|
|
if (!ep)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ep->id = id;
|
|
|
|
ep->dev.class = &iscsi_endpoint_class;
|
2008-12-03 21:41:36 +00:00
|
|
|
dev_set_name(&ep->dev, "ep-%llu", (unsigned long long) id);
|
2008-05-21 20:54:13 +00:00
|
|
|
err = device_register(&ep->dev);
|
|
|
|
if (err)
|
|
|
|
goto free_ep;
|
|
|
|
|
|
|
|
err = sysfs_create_group(&ep->dev.kobj, &iscsi_endpoint_group);
|
|
|
|
if (err)
|
|
|
|
goto unregister_dev;
|
|
|
|
|
|
|
|
if (dd_size)
|
|
|
|
ep->dd_data = &ep[1];
|
|
|
|
return ep;
|
|
|
|
|
|
|
|
unregister_dev:
|
|
|
|
device_unregister(&ep->dev);
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
free_ep:
|
|
|
|
kfree(ep);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_create_endpoint);
|
|
|
|
|
|
|
|
void iscsi_destroy_endpoint(struct iscsi_endpoint *ep)
|
|
|
|
{
|
|
|
|
sysfs_remove_group(&ep->dev.kobj, &iscsi_endpoint_group);
|
|
|
|
device_unregister(&ep->dev);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_destroy_endpoint);
|
|
|
|
|
|
|
|
struct iscsi_endpoint *iscsi_lookup_endpoint(u64 handle)
|
|
|
|
{
|
2008-06-16 15:11:35 +00:00
|
|
|
struct iscsi_endpoint *ep;
|
2008-05-21 20:54:13 +00:00
|
|
|
struct device *dev;
|
|
|
|
|
2008-05-22 21:21:08 +00:00
|
|
|
dev = class_find_device(&iscsi_endpoint_class, NULL, &handle,
|
2008-05-21 20:54:13 +00:00
|
|
|
iscsi_match_epid);
|
|
|
|
if (!dev)
|
|
|
|
return NULL;
|
|
|
|
|
2008-06-16 15:11:35 +00:00
|
|
|
ep = iscsi_dev_to_endpoint(dev);
|
|
|
|
/*
|
|
|
|
* we can drop this now because the interface will prevent
|
|
|
|
* removals and lookups from racing.
|
|
|
|
*/
|
|
|
|
put_device(dev);
|
|
|
|
return ep;
|
2008-05-21 20:54:13 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_lookup_endpoint);
|
|
|
|
|
2011-07-25 18:48:40 +00:00
|
|
|
/*
|
|
|
|
* Interface to display network param to sysfs
|
|
|
|
*/
|
|
|
|
|
|
|
|
static void iscsi_iface_release(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iscsi_iface *iface = iscsi_dev_to_iface(dev);
|
|
|
|
struct device *parent = iface->dev.parent;
|
|
|
|
|
|
|
|
kfree(iface);
|
|
|
|
put_device(parent);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct class iscsi_iface_class = {
|
|
|
|
.name = "iscsi_iface",
|
|
|
|
.dev_release = iscsi_iface_release,
|
|
|
|
};
|
|
|
|
|
|
|
|
#define ISCSI_IFACE_ATTR(_prefix, _name, _mode, _show, _store) \
|
|
|
|
struct device_attribute dev_attr_##_prefix##_##_name = \
|
|
|
|
__ATTR(_name, _mode, _show, _store)
|
|
|
|
|
|
|
|
/* iface attrs show */
|
|
|
|
#define iscsi_iface_attr_show(type, name, param_type, param) \
|
|
|
|
static ssize_t \
|
|
|
|
show_##type##_##name(struct device *dev, struct device_attribute *attr, \
|
|
|
|
char *buf) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_iface *iface = iscsi_dev_to_iface(dev); \
|
|
|
|
struct iscsi_transport *t = iface->transport; \
|
|
|
|
return t->get_iface_param(iface, param_type, param, buf); \
|
|
|
|
} \
|
|
|
|
|
|
|
|
#define iscsi_iface_net_attr(type, name, param) \
|
|
|
|
iscsi_iface_attr_show(type, name, ISCSI_NET_PARAM, param) \
|
|
|
|
static ISCSI_IFACE_ATTR(type, name, S_IRUGO, show_##type##_##name, NULL);
|
|
|
|
|
2013-10-18 13:01:41 +00:00
|
|
|
#define iscsi_iface_attr(type, name, param) \
|
|
|
|
iscsi_iface_attr_show(type, name, ISCSI_IFACE_PARAM, param) \
|
|
|
|
static ISCSI_IFACE_ATTR(type, name, S_IRUGO, show_##type##_##name, NULL);
|
|
|
|
|
|
|
|
/* generic read only ipv4 attribute */
|
2011-07-25 18:48:40 +00:00
|
|
|
iscsi_iface_net_attr(ipv4_iface, ipaddress, ISCSI_NET_PARAM_IPV4_ADDR);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, gateway, ISCSI_NET_PARAM_IPV4_GW);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, subnet, ISCSI_NET_PARAM_IPV4_SUBNET);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, bootproto, ISCSI_NET_PARAM_IPV4_BOOTPROTO);
|
2013-10-18 13:01:41 +00:00
|
|
|
iscsi_iface_net_attr(ipv4_iface, dhcp_dns_address_en,
|
|
|
|
ISCSI_NET_PARAM_IPV4_DHCP_DNS_ADDR_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, dhcp_slp_da_info_en,
|
|
|
|
ISCSI_NET_PARAM_IPV4_DHCP_SLP_DA_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, tos_en, ISCSI_NET_PARAM_IPV4_TOS_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, tos, ISCSI_NET_PARAM_IPV4_TOS);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, grat_arp_en,
|
|
|
|
ISCSI_NET_PARAM_IPV4_GRAT_ARP_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, dhcp_alt_client_id_en,
|
|
|
|
ISCSI_NET_PARAM_IPV4_DHCP_ALT_CLIENT_ID_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, dhcp_alt_client_id,
|
|
|
|
ISCSI_NET_PARAM_IPV4_DHCP_ALT_CLIENT_ID);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, dhcp_req_vendor_id_en,
|
|
|
|
ISCSI_NET_PARAM_IPV4_DHCP_REQ_VENDOR_ID_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, dhcp_use_vendor_id_en,
|
|
|
|
ISCSI_NET_PARAM_IPV4_DHCP_USE_VENDOR_ID_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, dhcp_vendor_id,
|
|
|
|
ISCSI_NET_PARAM_IPV4_DHCP_VENDOR_ID);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, dhcp_learn_iqn_en,
|
|
|
|
ISCSI_NET_PARAM_IPV4_DHCP_LEARN_IQN_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, fragment_disable,
|
|
|
|
ISCSI_NET_PARAM_IPV4_FRAGMENT_DISABLE);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, incoming_forwarding_en,
|
|
|
|
ISCSI_NET_PARAM_IPV4_IN_FORWARD_EN);
|
|
|
|
iscsi_iface_net_attr(ipv4_iface, ttl, ISCSI_NET_PARAM_IPV4_TTL);
|
2011-07-25 18:48:40 +00:00
|
|
|
|
|
|
|
/* generic read only ipv6 attribute */
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, ipaddress, ISCSI_NET_PARAM_IPV6_ADDR);
|
2013-10-18 13:01:41 +00:00
|
|
|
iscsi_iface_net_attr(ipv6_iface, link_local_addr,
|
|
|
|
ISCSI_NET_PARAM_IPV6_LINKLOCAL);
|
2011-07-25 18:48:40 +00:00
|
|
|
iscsi_iface_net_attr(ipv6_iface, router_addr, ISCSI_NET_PARAM_IPV6_ROUTER);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, ipaddr_autocfg,
|
|
|
|
ISCSI_NET_PARAM_IPV6_ADDR_AUTOCFG);
|
2011-10-06 08:56:58 +00:00
|
|
|
iscsi_iface_net_attr(ipv6_iface, link_local_autocfg,
|
2011-07-25 18:48:40 +00:00
|
|
|
ISCSI_NET_PARAM_IPV6_LINKLOCAL_AUTOCFG);
|
2013-10-18 13:01:41 +00:00
|
|
|
iscsi_iface_net_attr(ipv6_iface, link_local_state,
|
|
|
|
ISCSI_NET_PARAM_IPV6_LINKLOCAL_STATE);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, router_state,
|
|
|
|
ISCSI_NET_PARAM_IPV6_ROUTER_STATE);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, grat_neighbor_adv_en,
|
|
|
|
ISCSI_NET_PARAM_IPV6_GRAT_NEIGHBOR_ADV_EN);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, mld_en, ISCSI_NET_PARAM_IPV6_MLD_EN);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, flow_label, ISCSI_NET_PARAM_IPV6_FLOW_LABEL);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, traffic_class,
|
|
|
|
ISCSI_NET_PARAM_IPV6_TRAFFIC_CLASS);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, hop_limit, ISCSI_NET_PARAM_IPV6_HOP_LIMIT);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, nd_reachable_tmo,
|
|
|
|
ISCSI_NET_PARAM_IPV6_ND_REACHABLE_TMO);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, nd_rexmit_time,
|
|
|
|
ISCSI_NET_PARAM_IPV6_ND_REXMIT_TIME);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, nd_stale_tmo,
|
|
|
|
ISCSI_NET_PARAM_IPV6_ND_STALE_TMO);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, dup_addr_detect_cnt,
|
|
|
|
ISCSI_NET_PARAM_IPV6_DUP_ADDR_DETECT_CNT);
|
|
|
|
iscsi_iface_net_attr(ipv6_iface, router_adv_link_mtu,
|
|
|
|
ISCSI_NET_PARAM_IPV6_RTR_ADV_LINK_MTU);
|
2011-07-25 18:48:40 +00:00
|
|
|
|
|
|
|
/* common read only iface attribute */
|
|
|
|
iscsi_iface_net_attr(iface, enabled, ISCSI_NET_PARAM_IFACE_ENABLE);
|
2011-10-11 22:55:11 +00:00
|
|
|
iscsi_iface_net_attr(iface, vlan_id, ISCSI_NET_PARAM_VLAN_ID);
|
2011-07-25 18:48:47 +00:00
|
|
|
iscsi_iface_net_attr(iface, vlan_priority, ISCSI_NET_PARAM_VLAN_PRIORITY);
|
|
|
|
iscsi_iface_net_attr(iface, vlan_enabled, ISCSI_NET_PARAM_VLAN_ENABLED);
|
2011-08-01 10:26:12 +00:00
|
|
|
iscsi_iface_net_attr(iface, mtu, ISCSI_NET_PARAM_MTU);
|
2011-08-01 10:26:18 +00:00
|
|
|
iscsi_iface_net_attr(iface, port, ISCSI_NET_PARAM_PORT);
|
2013-10-18 13:01:41 +00:00
|
|
|
iscsi_iface_net_attr(iface, ipaddress_state, ISCSI_NET_PARAM_IPADDR_STATE);
|
|
|
|
iscsi_iface_net_attr(iface, delayed_ack_en, ISCSI_NET_PARAM_DELAYED_ACK_EN);
|
|
|
|
iscsi_iface_net_attr(iface, tcp_nagle_disable,
|
|
|
|
ISCSI_NET_PARAM_TCP_NAGLE_DISABLE);
|
|
|
|
iscsi_iface_net_attr(iface, tcp_wsf_disable, ISCSI_NET_PARAM_TCP_WSF_DISABLE);
|
|
|
|
iscsi_iface_net_attr(iface, tcp_wsf, ISCSI_NET_PARAM_TCP_WSF);
|
|
|
|
iscsi_iface_net_attr(iface, tcp_timer_scale, ISCSI_NET_PARAM_TCP_TIMER_SCALE);
|
|
|
|
iscsi_iface_net_attr(iface, tcp_timestamp_en, ISCSI_NET_PARAM_TCP_TIMESTAMP_EN);
|
|
|
|
iscsi_iface_net_attr(iface, cache_id, ISCSI_NET_PARAM_CACHE_ID);
|
|
|
|
iscsi_iface_net_attr(iface, redirect_en, ISCSI_NET_PARAM_REDIRECT_EN);
|
|
|
|
|
|
|
|
/* common iscsi specific settings attributes */
|
|
|
|
iscsi_iface_attr(iface, def_taskmgmt_tmo, ISCSI_IFACE_PARAM_DEF_TASKMGMT_TMO);
|
|
|
|
iscsi_iface_attr(iface, header_digest, ISCSI_IFACE_PARAM_HDRDGST_EN);
|
|
|
|
iscsi_iface_attr(iface, data_digest, ISCSI_IFACE_PARAM_DATADGST_EN);
|
|
|
|
iscsi_iface_attr(iface, immediate_data, ISCSI_IFACE_PARAM_IMM_DATA_EN);
|
|
|
|
iscsi_iface_attr(iface, initial_r2t, ISCSI_IFACE_PARAM_INITIAL_R2T_EN);
|
|
|
|
iscsi_iface_attr(iface, data_seq_in_order,
|
|
|
|
ISCSI_IFACE_PARAM_DATASEQ_INORDER_EN);
|
|
|
|
iscsi_iface_attr(iface, data_pdu_in_order, ISCSI_IFACE_PARAM_PDU_INORDER_EN);
|
|
|
|
iscsi_iface_attr(iface, erl, ISCSI_IFACE_PARAM_ERL);
|
|
|
|
iscsi_iface_attr(iface, max_recv_dlength, ISCSI_IFACE_PARAM_MAX_RECV_DLENGTH);
|
|
|
|
iscsi_iface_attr(iface, first_burst_len, ISCSI_IFACE_PARAM_FIRST_BURST);
|
|
|
|
iscsi_iface_attr(iface, max_outstanding_r2t, ISCSI_IFACE_PARAM_MAX_R2T);
|
|
|
|
iscsi_iface_attr(iface, max_burst_len, ISCSI_IFACE_PARAM_MAX_BURST);
|
|
|
|
iscsi_iface_attr(iface, chap_auth, ISCSI_IFACE_PARAM_CHAP_AUTH_EN);
|
|
|
|
iscsi_iface_attr(iface, bidi_chap, ISCSI_IFACE_PARAM_BIDI_CHAP_EN);
|
|
|
|
iscsi_iface_attr(iface, discovery_auth_optional,
|
|
|
|
ISCSI_IFACE_PARAM_DISCOVERY_AUTH_OPTIONAL);
|
|
|
|
iscsi_iface_attr(iface, discovery_logout,
|
|
|
|
ISCSI_IFACE_PARAM_DISCOVERY_LOGOUT_EN);
|
|
|
|
iscsi_iface_attr(iface, strict_login_comp_en,
|
|
|
|
ISCSI_IFACE_PARAM_STRICT_LOGIN_COMP_EN);
|
|
|
|
iscsi_iface_attr(iface, initiator_name, ISCSI_IFACE_PARAM_INITIATOR_NAME);
|
2011-07-25 18:48:40 +00:00
|
|
|
|
2011-07-24 03:11:19 +00:00
|
|
|
static umode_t iscsi_iface_attr_is_visible(struct kobject *kobj,
|
2011-07-25 18:48:40 +00:00
|
|
|
struct attribute *attr, int i)
|
|
|
|
{
|
|
|
|
struct device *dev = container_of(kobj, struct device, kobj);
|
|
|
|
struct iscsi_iface *iface = iscsi_dev_to_iface(dev);
|
|
|
|
struct iscsi_transport *t = iface->transport;
|
2011-07-25 18:48:44 +00:00
|
|
|
int param;
|
2013-10-18 13:01:41 +00:00
|
|
|
int param_type;
|
2011-07-25 18:48:40 +00:00
|
|
|
|
|
|
|
if (attr == &dev_attr_iface_enabled.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IFACE_ENABLE;
|
2011-10-11 22:55:11 +00:00
|
|
|
else if (attr == &dev_attr_iface_vlan_id.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_VLAN_ID;
|
2011-07-25 18:48:47 +00:00
|
|
|
else if (attr == &dev_attr_iface_vlan_priority.attr)
|
|
|
|
param = ISCSI_NET_PARAM_VLAN_PRIORITY;
|
|
|
|
else if (attr == &dev_attr_iface_vlan_enabled.attr)
|
|
|
|
param = ISCSI_NET_PARAM_VLAN_ENABLED;
|
2011-08-01 10:26:12 +00:00
|
|
|
else if (attr == &dev_attr_iface_mtu.attr)
|
|
|
|
param = ISCSI_NET_PARAM_MTU;
|
2011-08-01 10:26:18 +00:00
|
|
|
else if (attr == &dev_attr_iface_port.attr)
|
|
|
|
param = ISCSI_NET_PARAM_PORT;
|
2013-10-18 13:01:41 +00:00
|
|
|
else if (attr == &dev_attr_iface_ipaddress_state.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPADDR_STATE;
|
|
|
|
else if (attr == &dev_attr_iface_delayed_ack_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_DELAYED_ACK_EN;
|
|
|
|
else if (attr == &dev_attr_iface_tcp_nagle_disable.attr)
|
|
|
|
param = ISCSI_NET_PARAM_TCP_NAGLE_DISABLE;
|
|
|
|
else if (attr == &dev_attr_iface_tcp_wsf_disable.attr)
|
|
|
|
param = ISCSI_NET_PARAM_TCP_WSF_DISABLE;
|
|
|
|
else if (attr == &dev_attr_iface_tcp_wsf.attr)
|
|
|
|
param = ISCSI_NET_PARAM_TCP_WSF;
|
|
|
|
else if (attr == &dev_attr_iface_tcp_timer_scale.attr)
|
|
|
|
param = ISCSI_NET_PARAM_TCP_TIMER_SCALE;
|
|
|
|
else if (attr == &dev_attr_iface_tcp_timestamp_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_TCP_TIMESTAMP_EN;
|
|
|
|
else if (attr == &dev_attr_iface_cache_id.attr)
|
|
|
|
param = ISCSI_NET_PARAM_CACHE_ID;
|
|
|
|
else if (attr == &dev_attr_iface_redirect_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_REDIRECT_EN;
|
|
|
|
else if (attr == &dev_attr_iface_def_taskmgmt_tmo.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_DEF_TASKMGMT_TMO;
|
|
|
|
else if (attr == &dev_attr_iface_header_digest.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_HDRDGST_EN;
|
|
|
|
else if (attr == &dev_attr_iface_data_digest.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_DATADGST_EN;
|
|
|
|
else if (attr == &dev_attr_iface_immediate_data.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_IMM_DATA_EN;
|
|
|
|
else if (attr == &dev_attr_iface_initial_r2t.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_INITIAL_R2T_EN;
|
|
|
|
else if (attr == &dev_attr_iface_data_seq_in_order.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_DATASEQ_INORDER_EN;
|
|
|
|
else if (attr == &dev_attr_iface_data_pdu_in_order.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_PDU_INORDER_EN;
|
|
|
|
else if (attr == &dev_attr_iface_erl.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_ERL;
|
|
|
|
else if (attr == &dev_attr_iface_max_recv_dlength.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_MAX_RECV_DLENGTH;
|
|
|
|
else if (attr == &dev_attr_iface_first_burst_len.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_FIRST_BURST;
|
|
|
|
else if (attr == &dev_attr_iface_max_outstanding_r2t.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_MAX_R2T;
|
|
|
|
else if (attr == &dev_attr_iface_max_burst_len.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_MAX_BURST;
|
|
|
|
else if (attr == &dev_attr_iface_chap_auth.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_CHAP_AUTH_EN;
|
|
|
|
else if (attr == &dev_attr_iface_bidi_chap.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_BIDI_CHAP_EN;
|
|
|
|
else if (attr == &dev_attr_iface_discovery_auth_optional.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_DISCOVERY_AUTH_OPTIONAL;
|
|
|
|
else if (attr == &dev_attr_iface_discovery_logout.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_DISCOVERY_LOGOUT_EN;
|
|
|
|
else if (attr == &dev_attr_iface_strict_login_comp_en.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_STRICT_LOGIN_COMP_EN;
|
|
|
|
else if (attr == &dev_attr_iface_initiator_name.attr)
|
|
|
|
param = ISCSI_IFACE_PARAM_INITIATOR_NAME;
|
2011-07-25 18:48:44 +00:00
|
|
|
else if (iface->iface_type == ISCSI_IFACE_TYPE_IPV4) {
|
2011-07-25 18:48:40 +00:00
|
|
|
if (attr == &dev_attr_ipv4_iface_ipaddress.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV4_ADDR;
|
2011-07-25 18:48:40 +00:00
|
|
|
else if (attr == &dev_attr_ipv4_iface_gateway.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV4_GW;
|
2011-07-25 18:48:40 +00:00
|
|
|
else if (attr == &dev_attr_ipv4_iface_subnet.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV4_SUBNET;
|
2011-07-25 18:48:40 +00:00
|
|
|
else if (attr == &dev_attr_ipv4_iface_bootproto.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV4_BOOTPROTO;
|
2013-10-18 13:01:41 +00:00
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv4_iface_dhcp_dns_address_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_DHCP_DNS_ADDR_EN;
|
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv4_iface_dhcp_slp_da_info_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_DHCP_SLP_DA_EN;
|
|
|
|
else if (attr == &dev_attr_ipv4_iface_tos_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_TOS_EN;
|
|
|
|
else if (attr == &dev_attr_ipv4_iface_tos.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_TOS;
|
|
|
|
else if (attr == &dev_attr_ipv4_iface_grat_arp_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_GRAT_ARP_EN;
|
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv4_iface_dhcp_alt_client_id_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_DHCP_ALT_CLIENT_ID_EN;
|
|
|
|
else if (attr == &dev_attr_ipv4_iface_dhcp_alt_client_id.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_DHCP_ALT_CLIENT_ID;
|
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv4_iface_dhcp_req_vendor_id_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_DHCP_REQ_VENDOR_ID_EN;
|
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv4_iface_dhcp_use_vendor_id_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_DHCP_USE_VENDOR_ID_EN;
|
|
|
|
else if (attr == &dev_attr_ipv4_iface_dhcp_vendor_id.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_DHCP_VENDOR_ID;
|
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv4_iface_dhcp_learn_iqn_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_DHCP_LEARN_IQN_EN;
|
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv4_iface_fragment_disable.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_FRAGMENT_DISABLE;
|
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv4_iface_incoming_forwarding_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_IN_FORWARD_EN;
|
|
|
|
else if (attr == &dev_attr_ipv4_iface_ttl.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV4_TTL;
|
2011-07-25 18:48:44 +00:00
|
|
|
else
|
|
|
|
return 0;
|
2011-07-25 18:48:40 +00:00
|
|
|
} else if (iface->iface_type == ISCSI_IFACE_TYPE_IPV6) {
|
|
|
|
if (attr == &dev_attr_ipv6_iface_ipaddress.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV6_ADDR;
|
2011-07-25 18:48:40 +00:00
|
|
|
else if (attr == &dev_attr_ipv6_iface_link_local_addr.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV6_LINKLOCAL;
|
2011-07-25 18:48:40 +00:00
|
|
|
else if (attr == &dev_attr_ipv6_iface_router_addr.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV6_ROUTER;
|
2011-07-25 18:48:40 +00:00
|
|
|
else if (attr == &dev_attr_ipv6_iface_ipaddr_autocfg.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV6_ADDR_AUTOCFG;
|
2011-10-06 08:56:58 +00:00
|
|
|
else if (attr == &dev_attr_ipv6_iface_link_local_autocfg.attr)
|
2011-07-25 18:48:44 +00:00
|
|
|
param = ISCSI_NET_PARAM_IPV6_LINKLOCAL_AUTOCFG;
|
2013-10-18 13:01:41 +00:00
|
|
|
else if (attr == &dev_attr_ipv6_iface_link_local_state.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_LINKLOCAL_STATE;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_router_state.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_ROUTER_STATE;
|
|
|
|
else if (attr ==
|
|
|
|
&dev_attr_ipv6_iface_grat_neighbor_adv_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_GRAT_NEIGHBOR_ADV_EN;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_mld_en.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_MLD_EN;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_flow_label.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_FLOW_LABEL;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_traffic_class.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_TRAFFIC_CLASS;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_hop_limit.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_HOP_LIMIT;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_nd_reachable_tmo.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_ND_REACHABLE_TMO;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_nd_rexmit_time.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_ND_REXMIT_TIME;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_nd_stale_tmo.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_ND_STALE_TMO;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_dup_addr_detect_cnt.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_DUP_ADDR_DETECT_CNT;
|
|
|
|
else if (attr == &dev_attr_ipv6_iface_router_adv_link_mtu.attr)
|
|
|
|
param = ISCSI_NET_PARAM_IPV6_RTR_ADV_LINK_MTU;
|
2011-07-25 18:48:44 +00:00
|
|
|
else
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
WARN_ONCE(1, "Invalid iface attr");
|
|
|
|
return 0;
|
2011-07-25 18:48:40 +00:00
|
|
|
}
|
|
|
|
|
2013-10-18 13:01:41 +00:00
|
|
|
switch (param) {
|
|
|
|
case ISCSI_IFACE_PARAM_DEF_TASKMGMT_TMO:
|
|
|
|
case ISCSI_IFACE_PARAM_HDRDGST_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_DATADGST_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_IMM_DATA_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_INITIAL_R2T_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_DATASEQ_INORDER_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_PDU_INORDER_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_ERL:
|
|
|
|
case ISCSI_IFACE_PARAM_MAX_RECV_DLENGTH:
|
|
|
|
case ISCSI_IFACE_PARAM_FIRST_BURST:
|
|
|
|
case ISCSI_IFACE_PARAM_MAX_R2T:
|
|
|
|
case ISCSI_IFACE_PARAM_MAX_BURST:
|
|
|
|
case ISCSI_IFACE_PARAM_CHAP_AUTH_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_BIDI_CHAP_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_DISCOVERY_AUTH_OPTIONAL:
|
|
|
|
case ISCSI_IFACE_PARAM_DISCOVERY_LOGOUT_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_STRICT_LOGIN_COMP_EN:
|
|
|
|
case ISCSI_IFACE_PARAM_INITIATOR_NAME:
|
|
|
|
param_type = ISCSI_IFACE_PARAM;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
param_type = ISCSI_NET_PARAM;
|
|
|
|
}
|
|
|
|
|
|
|
|
return t->attr_is_visible(param_type, param);
|
2011-07-25 18:48:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct attribute *iscsi_iface_attrs[] = {
|
|
|
|
&dev_attr_iface_enabled.attr,
|
2011-10-11 22:55:11 +00:00
|
|
|
&dev_attr_iface_vlan_id.attr,
|
2011-07-25 18:48:47 +00:00
|
|
|
&dev_attr_iface_vlan_priority.attr,
|
|
|
|
&dev_attr_iface_vlan_enabled.attr,
|
2011-07-25 18:48:40 +00:00
|
|
|
&dev_attr_ipv4_iface_ipaddress.attr,
|
|
|
|
&dev_attr_ipv4_iface_gateway.attr,
|
|
|
|
&dev_attr_ipv4_iface_subnet.attr,
|
|
|
|
&dev_attr_ipv4_iface_bootproto.attr,
|
|
|
|
&dev_attr_ipv6_iface_ipaddress.attr,
|
|
|
|
&dev_attr_ipv6_iface_link_local_addr.attr,
|
|
|
|
&dev_attr_ipv6_iface_router_addr.attr,
|
|
|
|
&dev_attr_ipv6_iface_ipaddr_autocfg.attr,
|
2011-10-06 08:56:58 +00:00
|
|
|
&dev_attr_ipv6_iface_link_local_autocfg.attr,
|
2011-08-01 10:26:12 +00:00
|
|
|
&dev_attr_iface_mtu.attr,
|
2011-08-01 10:26:18 +00:00
|
|
|
&dev_attr_iface_port.attr,
|
2013-10-18 13:01:41 +00:00
|
|
|
&dev_attr_iface_ipaddress_state.attr,
|
|
|
|
&dev_attr_iface_delayed_ack_en.attr,
|
|
|
|
&dev_attr_iface_tcp_nagle_disable.attr,
|
|
|
|
&dev_attr_iface_tcp_wsf_disable.attr,
|
|
|
|
&dev_attr_iface_tcp_wsf.attr,
|
|
|
|
&dev_attr_iface_tcp_timer_scale.attr,
|
|
|
|
&dev_attr_iface_tcp_timestamp_en.attr,
|
|
|
|
&dev_attr_iface_cache_id.attr,
|
|
|
|
&dev_attr_iface_redirect_en.attr,
|
|
|
|
&dev_attr_iface_def_taskmgmt_tmo.attr,
|
|
|
|
&dev_attr_iface_header_digest.attr,
|
|
|
|
&dev_attr_iface_data_digest.attr,
|
|
|
|
&dev_attr_iface_immediate_data.attr,
|
|
|
|
&dev_attr_iface_initial_r2t.attr,
|
|
|
|
&dev_attr_iface_data_seq_in_order.attr,
|
|
|
|
&dev_attr_iface_data_pdu_in_order.attr,
|
|
|
|
&dev_attr_iface_erl.attr,
|
|
|
|
&dev_attr_iface_max_recv_dlength.attr,
|
|
|
|
&dev_attr_iface_first_burst_len.attr,
|
|
|
|
&dev_attr_iface_max_outstanding_r2t.attr,
|
|
|
|
&dev_attr_iface_max_burst_len.attr,
|
|
|
|
&dev_attr_iface_chap_auth.attr,
|
|
|
|
&dev_attr_iface_bidi_chap.attr,
|
|
|
|
&dev_attr_iface_discovery_auth_optional.attr,
|
|
|
|
&dev_attr_iface_discovery_logout.attr,
|
|
|
|
&dev_attr_iface_strict_login_comp_en.attr,
|
|
|
|
&dev_attr_iface_initiator_name.attr,
|
|
|
|
&dev_attr_ipv4_iface_dhcp_dns_address_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_dhcp_slp_da_info_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_tos_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_tos.attr,
|
|
|
|
&dev_attr_ipv4_iface_grat_arp_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_dhcp_alt_client_id_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_dhcp_alt_client_id.attr,
|
|
|
|
&dev_attr_ipv4_iface_dhcp_req_vendor_id_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_dhcp_use_vendor_id_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_dhcp_vendor_id.attr,
|
|
|
|
&dev_attr_ipv4_iface_dhcp_learn_iqn_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_fragment_disable.attr,
|
|
|
|
&dev_attr_ipv4_iface_incoming_forwarding_en.attr,
|
|
|
|
&dev_attr_ipv4_iface_ttl.attr,
|
|
|
|
&dev_attr_ipv6_iface_link_local_state.attr,
|
|
|
|
&dev_attr_ipv6_iface_router_state.attr,
|
|
|
|
&dev_attr_ipv6_iface_grat_neighbor_adv_en.attr,
|
|
|
|
&dev_attr_ipv6_iface_mld_en.attr,
|
|
|
|
&dev_attr_ipv6_iface_flow_label.attr,
|
|
|
|
&dev_attr_ipv6_iface_traffic_class.attr,
|
|
|
|
&dev_attr_ipv6_iface_hop_limit.attr,
|
|
|
|
&dev_attr_ipv6_iface_nd_reachable_tmo.attr,
|
|
|
|
&dev_attr_ipv6_iface_nd_rexmit_time.attr,
|
|
|
|
&dev_attr_ipv6_iface_nd_stale_tmo.attr,
|
|
|
|
&dev_attr_ipv6_iface_dup_addr_detect_cnt.attr,
|
|
|
|
&dev_attr_ipv6_iface_router_adv_link_mtu.attr,
|
2011-07-25 18:48:40 +00:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct attribute_group iscsi_iface_group = {
|
|
|
|
.attrs = iscsi_iface_attrs,
|
|
|
|
.is_visible = iscsi_iface_attr_is_visible,
|
|
|
|
};
|
|
|
|
|
2013-10-18 13:01:41 +00:00
|
|
|
/* convert iscsi_ipaddress_state values to ascii string name */
|
|
|
|
static const struct {
|
|
|
|
enum iscsi_ipaddress_state value;
|
|
|
|
char *name;
|
|
|
|
} iscsi_ipaddress_state_names[] = {
|
|
|
|
{ISCSI_IPDDRESS_STATE_UNCONFIGURED, "Unconfigured" },
|
|
|
|
{ISCSI_IPDDRESS_STATE_ACQUIRING, "Acquiring" },
|
|
|
|
{ISCSI_IPDDRESS_STATE_TENTATIVE, "Tentative" },
|
|
|
|
{ISCSI_IPDDRESS_STATE_VALID, "Valid" },
|
|
|
|
{ISCSI_IPDDRESS_STATE_DISABLING, "Disabling" },
|
|
|
|
{ISCSI_IPDDRESS_STATE_INVALID, "Invalid" },
|
|
|
|
{ISCSI_IPDDRESS_STATE_DEPRECATED, "Deprecated" },
|
|
|
|
};
|
|
|
|
|
|
|
|
char *iscsi_get_ipaddress_state_name(enum iscsi_ipaddress_state port_state)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char *state = NULL;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(iscsi_ipaddress_state_names); i++) {
|
|
|
|
if (iscsi_ipaddress_state_names[i].value == port_state) {
|
|
|
|
state = iscsi_ipaddress_state_names[i].name;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return state;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_get_ipaddress_state_name);
|
|
|
|
|
|
|
|
/* convert iscsi_router_state values to ascii string name */
|
|
|
|
static const struct {
|
|
|
|
enum iscsi_router_state value;
|
|
|
|
char *name;
|
|
|
|
} iscsi_router_state_names[] = {
|
|
|
|
{ISCSI_ROUTER_STATE_UNKNOWN, "Unknown" },
|
|
|
|
{ISCSI_ROUTER_STATE_ADVERTISED, "Advertised" },
|
|
|
|
{ISCSI_ROUTER_STATE_MANUAL, "Manual" },
|
|
|
|
{ISCSI_ROUTER_STATE_STALE, "Stale" },
|
|
|
|
};
|
|
|
|
|
|
|
|
char *iscsi_get_router_state_name(enum iscsi_router_state router_state)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char *state = NULL;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(iscsi_router_state_names); i++) {
|
|
|
|
if (iscsi_router_state_names[i].value == router_state) {
|
|
|
|
state = iscsi_router_state_names[i].name;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return state;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_get_router_state_name);
|
|
|
|
|
2011-07-25 18:48:40 +00:00
|
|
|
struct iscsi_iface *
|
|
|
|
iscsi_create_iface(struct Scsi_Host *shost, struct iscsi_transport *transport,
|
|
|
|
uint32_t iface_type, uint32_t iface_num, int dd_size)
|
|
|
|
{
|
|
|
|
struct iscsi_iface *iface;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
iface = kzalloc(sizeof(*iface) + dd_size, GFP_KERNEL);
|
|
|
|
if (!iface)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
iface->transport = transport;
|
|
|
|
iface->iface_type = iface_type;
|
|
|
|
iface->iface_num = iface_num;
|
|
|
|
iface->dev.release = iscsi_iface_release;
|
|
|
|
iface->dev.class = &iscsi_iface_class;
|
|
|
|
/* parent reference released in iscsi_iface_release */
|
|
|
|
iface->dev.parent = get_device(&shost->shost_gendev);
|
|
|
|
if (iface_type == ISCSI_IFACE_TYPE_IPV4)
|
|
|
|
dev_set_name(&iface->dev, "ipv4-iface-%u-%u", shost->host_no,
|
|
|
|
iface_num);
|
|
|
|
else
|
|
|
|
dev_set_name(&iface->dev, "ipv6-iface-%u-%u", shost->host_no,
|
|
|
|
iface_num);
|
|
|
|
|
|
|
|
err = device_register(&iface->dev);
|
|
|
|
if (err)
|
|
|
|
goto free_iface;
|
|
|
|
|
|
|
|
err = sysfs_create_group(&iface->dev.kobj, &iscsi_iface_group);
|
|
|
|
if (err)
|
|
|
|
goto unreg_iface;
|
|
|
|
|
|
|
|
if (dd_size)
|
|
|
|
iface->dd_data = &iface[1];
|
|
|
|
return iface;
|
|
|
|
|
|
|
|
unreg_iface:
|
|
|
|
device_unregister(&iface->dev);
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
free_iface:
|
|
|
|
put_device(iface->dev.parent);
|
|
|
|
kfree(iface);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_create_iface);
|
|
|
|
|
|
|
|
void iscsi_destroy_iface(struct iscsi_iface *iface)
|
|
|
|
{
|
|
|
|
sysfs_remove_group(&iface->dev.kobj, &iscsi_iface_group);
|
|
|
|
device_unregister(&iface->dev);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_destroy_iface);
|
|
|
|
|
2013-03-22 11:41:29 +00:00
|
|
|
/*
|
|
|
|
* Interface to display flash node params to sysfs
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define ISCSI_FLASHNODE_ATTR(_prefix, _name, _mode, _show, _store) \
|
|
|
|
struct device_attribute dev_attr_##_prefix##_##_name = \
|
|
|
|
__ATTR(_name, _mode, _show, _store)
|
|
|
|
|
|
|
|
/* flash node session attrs show */
|
|
|
|
#define iscsi_flashnode_sess_attr_show(type, name, param) \
|
|
|
|
static ssize_t \
|
|
|
|
show_##type##_##name(struct device *dev, struct device_attribute *attr, \
|
|
|
|
char *buf) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess = \
|
|
|
|
iscsi_dev_to_flash_session(dev);\
|
|
|
|
struct iscsi_transport *t = fnode_sess->transport; \
|
|
|
|
return t->get_flashnode_param(fnode_sess, param, buf); \
|
|
|
|
} \
|
|
|
|
|
|
|
|
|
|
|
|
#define iscsi_flashnode_sess_attr(type, name, param) \
|
|
|
|
iscsi_flashnode_sess_attr_show(type, name, param) \
|
|
|
|
static ISCSI_FLASHNODE_ATTR(type, name, S_IRUGO, \
|
|
|
|
show_##type##_##name, NULL);
|
|
|
|
|
|
|
|
/* Flash node session attributes */
|
|
|
|
|
|
|
|
iscsi_flashnode_sess_attr(fnode, auto_snd_tgt_disable,
|
|
|
|
ISCSI_FLASHNODE_AUTO_SND_TGT_DISABLE);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, discovery_session,
|
|
|
|
ISCSI_FLASHNODE_DISCOVERY_SESS);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, portal_type, ISCSI_FLASHNODE_PORTAL_TYPE);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, entry_enable, ISCSI_FLASHNODE_ENTRY_EN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, immediate_data, ISCSI_FLASHNODE_IMM_DATA_EN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, initial_r2t, ISCSI_FLASHNODE_INITIAL_R2T_EN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, data_seq_in_order,
|
|
|
|
ISCSI_FLASHNODE_DATASEQ_INORDER);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, data_pdu_in_order,
|
|
|
|
ISCSI_FLASHNODE_PDU_INORDER);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, chap_auth, ISCSI_FLASHNODE_CHAP_AUTH_EN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, discovery_logout,
|
|
|
|
ISCSI_FLASHNODE_DISCOVERY_LOGOUT_EN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, bidi_chap, ISCSI_FLASHNODE_BIDI_CHAP_EN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, discovery_auth_optional,
|
|
|
|
ISCSI_FLASHNODE_DISCOVERY_AUTH_OPTIONAL);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, erl, ISCSI_FLASHNODE_ERL);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, first_burst_len, ISCSI_FLASHNODE_FIRST_BURST);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, def_time2wait, ISCSI_FLASHNODE_DEF_TIME2WAIT);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, def_time2retain,
|
|
|
|
ISCSI_FLASHNODE_DEF_TIME2RETAIN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, max_outstanding_r2t, ISCSI_FLASHNODE_MAX_R2T);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, isid, ISCSI_FLASHNODE_ISID);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, tsid, ISCSI_FLASHNODE_TSID);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, max_burst_len, ISCSI_FLASHNODE_MAX_BURST);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, def_taskmgmt_tmo,
|
|
|
|
ISCSI_FLASHNODE_DEF_TASKMGMT_TMO);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, targetalias, ISCSI_FLASHNODE_ALIAS);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, targetname, ISCSI_FLASHNODE_NAME);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, tpgt, ISCSI_FLASHNODE_TPGT);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, discovery_parent_idx,
|
|
|
|
ISCSI_FLASHNODE_DISCOVERY_PARENT_IDX);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, discovery_parent_type,
|
|
|
|
ISCSI_FLASHNODE_DISCOVERY_PARENT_TYPE);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, chap_in_idx, ISCSI_FLASHNODE_CHAP_IN_IDX);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, chap_out_idx, ISCSI_FLASHNODE_CHAP_OUT_IDX);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, username, ISCSI_FLASHNODE_USERNAME);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, username_in, ISCSI_FLASHNODE_USERNAME_IN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, password, ISCSI_FLASHNODE_PASSWORD);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, password_in, ISCSI_FLASHNODE_PASSWORD_IN);
|
|
|
|
iscsi_flashnode_sess_attr(fnode, is_boot_target, ISCSI_FLASHNODE_IS_BOOT_TGT);
|
|
|
|
|
|
|
|
static struct attribute *iscsi_flashnode_sess_attrs[] = {
|
|
|
|
&dev_attr_fnode_auto_snd_tgt_disable.attr,
|
|
|
|
&dev_attr_fnode_discovery_session.attr,
|
|
|
|
&dev_attr_fnode_portal_type.attr,
|
|
|
|
&dev_attr_fnode_entry_enable.attr,
|
|
|
|
&dev_attr_fnode_immediate_data.attr,
|
|
|
|
&dev_attr_fnode_initial_r2t.attr,
|
|
|
|
&dev_attr_fnode_data_seq_in_order.attr,
|
|
|
|
&dev_attr_fnode_data_pdu_in_order.attr,
|
|
|
|
&dev_attr_fnode_chap_auth.attr,
|
|
|
|
&dev_attr_fnode_discovery_logout.attr,
|
|
|
|
&dev_attr_fnode_bidi_chap.attr,
|
|
|
|
&dev_attr_fnode_discovery_auth_optional.attr,
|
|
|
|
&dev_attr_fnode_erl.attr,
|
|
|
|
&dev_attr_fnode_first_burst_len.attr,
|
|
|
|
&dev_attr_fnode_def_time2wait.attr,
|
|
|
|
&dev_attr_fnode_def_time2retain.attr,
|
|
|
|
&dev_attr_fnode_max_outstanding_r2t.attr,
|
|
|
|
&dev_attr_fnode_isid.attr,
|
|
|
|
&dev_attr_fnode_tsid.attr,
|
|
|
|
&dev_attr_fnode_max_burst_len.attr,
|
|
|
|
&dev_attr_fnode_def_taskmgmt_tmo.attr,
|
|
|
|
&dev_attr_fnode_targetalias.attr,
|
|
|
|
&dev_attr_fnode_targetname.attr,
|
|
|
|
&dev_attr_fnode_tpgt.attr,
|
|
|
|
&dev_attr_fnode_discovery_parent_idx.attr,
|
|
|
|
&dev_attr_fnode_discovery_parent_type.attr,
|
|
|
|
&dev_attr_fnode_chap_in_idx.attr,
|
|
|
|
&dev_attr_fnode_chap_out_idx.attr,
|
|
|
|
&dev_attr_fnode_username.attr,
|
|
|
|
&dev_attr_fnode_username_in.attr,
|
|
|
|
&dev_attr_fnode_password.attr,
|
|
|
|
&dev_attr_fnode_password_in.attr,
|
|
|
|
&dev_attr_fnode_is_boot_target.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static umode_t iscsi_flashnode_sess_attr_is_visible(struct kobject *kobj,
|
|
|
|
struct attribute *attr,
|
|
|
|
int i)
|
|
|
|
{
|
|
|
|
struct device *dev = container_of(kobj, struct device, kobj);
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess =
|
|
|
|
iscsi_dev_to_flash_session(dev);
|
|
|
|
struct iscsi_transport *t = fnode_sess->transport;
|
|
|
|
int param;
|
|
|
|
|
|
|
|
if (attr == &dev_attr_fnode_auto_snd_tgt_disable.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_AUTO_SND_TGT_DISABLE;
|
|
|
|
} else if (attr == &dev_attr_fnode_discovery_session.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DISCOVERY_SESS;
|
|
|
|
} else if (attr == &dev_attr_fnode_portal_type.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_PORTAL_TYPE;
|
|
|
|
} else if (attr == &dev_attr_fnode_entry_enable.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_ENTRY_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_immediate_data.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_IMM_DATA_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_initial_r2t.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_INITIAL_R2T_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_data_seq_in_order.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DATASEQ_INORDER;
|
|
|
|
} else if (attr == &dev_attr_fnode_data_pdu_in_order.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_PDU_INORDER;
|
|
|
|
} else if (attr == &dev_attr_fnode_chap_auth.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_CHAP_AUTH_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_discovery_logout.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DISCOVERY_LOGOUT_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_bidi_chap.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_BIDI_CHAP_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_discovery_auth_optional.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DISCOVERY_AUTH_OPTIONAL;
|
|
|
|
} else if (attr == &dev_attr_fnode_erl.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_ERL;
|
|
|
|
} else if (attr == &dev_attr_fnode_first_burst_len.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_FIRST_BURST;
|
|
|
|
} else if (attr == &dev_attr_fnode_def_time2wait.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DEF_TIME2WAIT;
|
|
|
|
} else if (attr == &dev_attr_fnode_def_time2retain.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DEF_TIME2RETAIN;
|
|
|
|
} else if (attr == &dev_attr_fnode_max_outstanding_r2t.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_MAX_R2T;
|
|
|
|
} else if (attr == &dev_attr_fnode_isid.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_ISID;
|
|
|
|
} else if (attr == &dev_attr_fnode_tsid.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TSID;
|
|
|
|
} else if (attr == &dev_attr_fnode_max_burst_len.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_MAX_BURST;
|
|
|
|
} else if (attr == &dev_attr_fnode_def_taskmgmt_tmo.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DEF_TASKMGMT_TMO;
|
|
|
|
} else if (attr == &dev_attr_fnode_targetalias.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_ALIAS;
|
|
|
|
} else if (attr == &dev_attr_fnode_targetname.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_NAME;
|
|
|
|
} else if (attr == &dev_attr_fnode_tpgt.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TPGT;
|
|
|
|
} else if (attr == &dev_attr_fnode_discovery_parent_idx.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DISCOVERY_PARENT_IDX;
|
|
|
|
} else if (attr == &dev_attr_fnode_discovery_parent_type.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DISCOVERY_PARENT_TYPE;
|
|
|
|
} else if (attr == &dev_attr_fnode_chap_in_idx.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_CHAP_IN_IDX;
|
|
|
|
} else if (attr == &dev_attr_fnode_chap_out_idx.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_CHAP_OUT_IDX;
|
|
|
|
} else if (attr == &dev_attr_fnode_username.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_USERNAME;
|
|
|
|
} else if (attr == &dev_attr_fnode_username_in.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_USERNAME_IN;
|
|
|
|
} else if (attr == &dev_attr_fnode_password.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_PASSWORD;
|
|
|
|
} else if (attr == &dev_attr_fnode_password_in.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_PASSWORD_IN;
|
|
|
|
} else if (attr == &dev_attr_fnode_is_boot_target.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_IS_BOOT_TGT;
|
|
|
|
} else {
|
|
|
|
WARN_ONCE(1, "Invalid flashnode session attr");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return t->attr_is_visible(ISCSI_FLASHNODE_PARAM, param);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct attribute_group iscsi_flashnode_sess_attr_group = {
|
|
|
|
.attrs = iscsi_flashnode_sess_attrs,
|
|
|
|
.is_visible = iscsi_flashnode_sess_attr_is_visible,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct attribute_group *iscsi_flashnode_sess_attr_groups[] = {
|
|
|
|
&iscsi_flashnode_sess_attr_group,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void iscsi_flashnode_sess_release(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess =
|
|
|
|
iscsi_dev_to_flash_session(dev);
|
|
|
|
|
|
|
|
kfree(fnode_sess->targetname);
|
|
|
|
kfree(fnode_sess->targetalias);
|
|
|
|
kfree(fnode_sess->portal_type);
|
|
|
|
kfree(fnode_sess);
|
|
|
|
}
|
|
|
|
|
2017-08-19 08:22:24 +00:00
|
|
|
static const struct device_type iscsi_flashnode_sess_dev_type = {
|
2013-03-22 11:41:29 +00:00
|
|
|
.name = "iscsi_flashnode_sess_dev_type",
|
|
|
|
.groups = iscsi_flashnode_sess_attr_groups,
|
|
|
|
.release = iscsi_flashnode_sess_release,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* flash node connection attrs show */
|
|
|
|
#define iscsi_flashnode_conn_attr_show(type, name, param) \
|
|
|
|
static ssize_t \
|
|
|
|
show_##type##_##name(struct device *dev, struct device_attribute *attr, \
|
|
|
|
char *buf) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_bus_flash_conn *fnode_conn = iscsi_dev_to_flash_conn(dev);\
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess = \
|
|
|
|
iscsi_flash_conn_to_flash_session(fnode_conn);\
|
|
|
|
struct iscsi_transport *t = fnode_conn->transport; \
|
|
|
|
return t->get_flashnode_param(fnode_sess, param, buf); \
|
|
|
|
} \
|
|
|
|
|
|
|
|
|
|
|
|
#define iscsi_flashnode_conn_attr(type, name, param) \
|
|
|
|
iscsi_flashnode_conn_attr_show(type, name, param) \
|
|
|
|
static ISCSI_FLASHNODE_ATTR(type, name, S_IRUGO, \
|
|
|
|
show_##type##_##name, NULL);
|
|
|
|
|
|
|
|
/* Flash node connection attributes */
|
|
|
|
|
|
|
|
iscsi_flashnode_conn_attr(fnode, is_fw_assigned_ipv6,
|
|
|
|
ISCSI_FLASHNODE_IS_FW_ASSIGNED_IPV6);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, header_digest, ISCSI_FLASHNODE_HDR_DGST_EN);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, data_digest, ISCSI_FLASHNODE_DATA_DGST_EN);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, snack_req, ISCSI_FLASHNODE_SNACK_REQ_EN);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, tcp_timestamp_stat,
|
|
|
|
ISCSI_FLASHNODE_TCP_TIMESTAMP_STAT);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, tcp_nagle_disable,
|
|
|
|
ISCSI_FLASHNODE_TCP_NAGLE_DISABLE);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, tcp_wsf_disable,
|
|
|
|
ISCSI_FLASHNODE_TCP_WSF_DISABLE);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, tcp_timer_scale,
|
|
|
|
ISCSI_FLASHNODE_TCP_TIMER_SCALE);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, tcp_timestamp_enable,
|
|
|
|
ISCSI_FLASHNODE_TCP_TIMESTAMP_EN);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, fragment_disable,
|
|
|
|
ISCSI_FLASHNODE_IP_FRAG_DISABLE);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, keepalive_tmo, ISCSI_FLASHNODE_KEEPALIVE_TMO);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, port, ISCSI_FLASHNODE_PORT);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, ipaddress, ISCSI_FLASHNODE_IPADDR);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, max_recv_dlength,
|
|
|
|
ISCSI_FLASHNODE_MAX_RECV_DLENGTH);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, max_xmit_dlength,
|
|
|
|
ISCSI_FLASHNODE_MAX_XMIT_DLENGTH);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, local_port, ISCSI_FLASHNODE_LOCAL_PORT);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, ipv4_tos, ISCSI_FLASHNODE_IPV4_TOS);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, ipv6_traffic_class, ISCSI_FLASHNODE_IPV6_TC);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, ipv6_flow_label,
|
|
|
|
ISCSI_FLASHNODE_IPV6_FLOW_LABEL);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, redirect_ipaddr,
|
|
|
|
ISCSI_FLASHNODE_REDIRECT_IPADDR);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, max_segment_size,
|
|
|
|
ISCSI_FLASHNODE_MAX_SEGMENT_SIZE);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, link_local_ipv6,
|
|
|
|
ISCSI_FLASHNODE_LINK_LOCAL_IPV6);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, tcp_xmit_wsf, ISCSI_FLASHNODE_TCP_XMIT_WSF);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, tcp_recv_wsf, ISCSI_FLASHNODE_TCP_RECV_WSF);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, statsn, ISCSI_FLASHNODE_STATSN);
|
|
|
|
iscsi_flashnode_conn_attr(fnode, exp_statsn, ISCSI_FLASHNODE_EXP_STATSN);
|
|
|
|
|
|
|
|
static struct attribute *iscsi_flashnode_conn_attrs[] = {
|
|
|
|
&dev_attr_fnode_is_fw_assigned_ipv6.attr,
|
|
|
|
&dev_attr_fnode_header_digest.attr,
|
|
|
|
&dev_attr_fnode_data_digest.attr,
|
|
|
|
&dev_attr_fnode_snack_req.attr,
|
|
|
|
&dev_attr_fnode_tcp_timestamp_stat.attr,
|
|
|
|
&dev_attr_fnode_tcp_nagle_disable.attr,
|
|
|
|
&dev_attr_fnode_tcp_wsf_disable.attr,
|
|
|
|
&dev_attr_fnode_tcp_timer_scale.attr,
|
|
|
|
&dev_attr_fnode_tcp_timestamp_enable.attr,
|
|
|
|
&dev_attr_fnode_fragment_disable.attr,
|
|
|
|
&dev_attr_fnode_max_recv_dlength.attr,
|
|
|
|
&dev_attr_fnode_max_xmit_dlength.attr,
|
|
|
|
&dev_attr_fnode_keepalive_tmo.attr,
|
|
|
|
&dev_attr_fnode_port.attr,
|
|
|
|
&dev_attr_fnode_ipaddress.attr,
|
|
|
|
&dev_attr_fnode_redirect_ipaddr.attr,
|
|
|
|
&dev_attr_fnode_max_segment_size.attr,
|
|
|
|
&dev_attr_fnode_local_port.attr,
|
|
|
|
&dev_attr_fnode_ipv4_tos.attr,
|
|
|
|
&dev_attr_fnode_ipv6_traffic_class.attr,
|
|
|
|
&dev_attr_fnode_ipv6_flow_label.attr,
|
|
|
|
&dev_attr_fnode_link_local_ipv6.attr,
|
|
|
|
&dev_attr_fnode_tcp_xmit_wsf.attr,
|
|
|
|
&dev_attr_fnode_tcp_recv_wsf.attr,
|
|
|
|
&dev_attr_fnode_statsn.attr,
|
|
|
|
&dev_attr_fnode_exp_statsn.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static umode_t iscsi_flashnode_conn_attr_is_visible(struct kobject *kobj,
|
|
|
|
struct attribute *attr,
|
|
|
|
int i)
|
|
|
|
{
|
|
|
|
struct device *dev = container_of(kobj, struct device, kobj);
|
|
|
|
struct iscsi_bus_flash_conn *fnode_conn = iscsi_dev_to_flash_conn(dev);
|
|
|
|
struct iscsi_transport *t = fnode_conn->transport;
|
|
|
|
int param;
|
|
|
|
|
|
|
|
if (attr == &dev_attr_fnode_is_fw_assigned_ipv6.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_IS_FW_ASSIGNED_IPV6;
|
|
|
|
} else if (attr == &dev_attr_fnode_header_digest.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_HDR_DGST_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_data_digest.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_DATA_DGST_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_snack_req.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_SNACK_REQ_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_tcp_timestamp_stat.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TCP_TIMESTAMP_STAT;
|
|
|
|
} else if (attr == &dev_attr_fnode_tcp_nagle_disable.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TCP_NAGLE_DISABLE;
|
|
|
|
} else if (attr == &dev_attr_fnode_tcp_wsf_disable.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TCP_WSF_DISABLE;
|
|
|
|
} else if (attr == &dev_attr_fnode_tcp_timer_scale.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TCP_TIMER_SCALE;
|
|
|
|
} else if (attr == &dev_attr_fnode_tcp_timestamp_enable.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TCP_TIMESTAMP_EN;
|
|
|
|
} else if (attr == &dev_attr_fnode_fragment_disable.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_IP_FRAG_DISABLE;
|
|
|
|
} else if (attr == &dev_attr_fnode_max_recv_dlength.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_MAX_RECV_DLENGTH;
|
|
|
|
} else if (attr == &dev_attr_fnode_max_xmit_dlength.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_MAX_XMIT_DLENGTH;
|
|
|
|
} else if (attr == &dev_attr_fnode_keepalive_tmo.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_KEEPALIVE_TMO;
|
|
|
|
} else if (attr == &dev_attr_fnode_port.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_PORT;
|
|
|
|
} else if (attr == &dev_attr_fnode_ipaddress.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_IPADDR;
|
|
|
|
} else if (attr == &dev_attr_fnode_redirect_ipaddr.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_REDIRECT_IPADDR;
|
|
|
|
} else if (attr == &dev_attr_fnode_max_segment_size.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_MAX_SEGMENT_SIZE;
|
|
|
|
} else if (attr == &dev_attr_fnode_local_port.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_LOCAL_PORT;
|
|
|
|
} else if (attr == &dev_attr_fnode_ipv4_tos.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_IPV4_TOS;
|
|
|
|
} else if (attr == &dev_attr_fnode_ipv6_traffic_class.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_IPV6_TC;
|
|
|
|
} else if (attr == &dev_attr_fnode_ipv6_flow_label.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_IPV6_FLOW_LABEL;
|
|
|
|
} else if (attr == &dev_attr_fnode_link_local_ipv6.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_LINK_LOCAL_IPV6;
|
|
|
|
} else if (attr == &dev_attr_fnode_tcp_xmit_wsf.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TCP_XMIT_WSF;
|
|
|
|
} else if (attr == &dev_attr_fnode_tcp_recv_wsf.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_TCP_RECV_WSF;
|
|
|
|
} else if (attr == &dev_attr_fnode_statsn.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_STATSN;
|
|
|
|
} else if (attr == &dev_attr_fnode_exp_statsn.attr) {
|
|
|
|
param = ISCSI_FLASHNODE_EXP_STATSN;
|
|
|
|
} else {
|
|
|
|
WARN_ONCE(1, "Invalid flashnode connection attr");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return t->attr_is_visible(ISCSI_FLASHNODE_PARAM, param);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct attribute_group iscsi_flashnode_conn_attr_group = {
|
|
|
|
.attrs = iscsi_flashnode_conn_attrs,
|
|
|
|
.is_visible = iscsi_flashnode_conn_attr_is_visible,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct attribute_group *iscsi_flashnode_conn_attr_groups[] = {
|
|
|
|
&iscsi_flashnode_conn_attr_group,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void iscsi_flashnode_conn_release(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iscsi_bus_flash_conn *fnode_conn = iscsi_dev_to_flash_conn(dev);
|
|
|
|
|
|
|
|
kfree(fnode_conn->ipaddress);
|
|
|
|
kfree(fnode_conn->redirect_ipaddr);
|
|
|
|
kfree(fnode_conn->link_local_ipv6_addr);
|
|
|
|
kfree(fnode_conn);
|
|
|
|
}
|
|
|
|
|
2017-08-19 08:22:24 +00:00
|
|
|
static const struct device_type iscsi_flashnode_conn_dev_type = {
|
2013-03-22 11:41:29 +00:00
|
|
|
.name = "iscsi_flashnode_conn_dev_type",
|
|
|
|
.groups = iscsi_flashnode_conn_attr_groups,
|
|
|
|
.release = iscsi_flashnode_conn_release,
|
|
|
|
};
|
|
|
|
|
2016-03-30 18:28:11 +00:00
|
|
|
static struct bus_type iscsi_flashnode_bus;
|
2013-03-22 11:41:29 +00:00
|
|
|
|
|
|
|
int iscsi_flashnode_bus_match(struct device *dev,
|
|
|
|
struct device_driver *drv)
|
|
|
|
{
|
|
|
|
if (dev->bus == &iscsi_flashnode_bus)
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_flashnode_bus_match);
|
|
|
|
|
2016-03-30 18:28:11 +00:00
|
|
|
static struct bus_type iscsi_flashnode_bus = {
|
2013-03-22 11:41:29 +00:00
|
|
|
.name = "iscsi_flashnode",
|
|
|
|
.match = &iscsi_flashnode_bus_match,
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_create_flashnode_sess - Add flashnode session entry in sysfs
|
|
|
|
* @shost: pointer to host data
|
|
|
|
* @index: index of flashnode to add in sysfs
|
|
|
|
* @transport: pointer to transport data
|
|
|
|
* @dd_size: total size to allocate
|
|
|
|
*
|
|
|
|
* Adds a sysfs entry for the flashnode session attributes
|
|
|
|
*
|
|
|
|
* Returns:
|
2014-02-18 13:54:36 +00:00
|
|
|
* pointer to allocated flashnode sess on success
|
2013-03-22 11:41:29 +00:00
|
|
|
* %NULL on failure
|
|
|
|
*/
|
|
|
|
struct iscsi_bus_flash_session *
|
|
|
|
iscsi_create_flashnode_sess(struct Scsi_Host *shost, int index,
|
|
|
|
struct iscsi_transport *transport,
|
|
|
|
int dd_size)
|
|
|
|
{
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
fnode_sess = kzalloc(sizeof(*fnode_sess) + dd_size, GFP_KERNEL);
|
|
|
|
if (!fnode_sess)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
fnode_sess->transport = transport;
|
|
|
|
fnode_sess->target_id = index;
|
|
|
|
fnode_sess->dev.type = &iscsi_flashnode_sess_dev_type;
|
|
|
|
fnode_sess->dev.bus = &iscsi_flashnode_bus;
|
|
|
|
fnode_sess->dev.parent = &shost->shost_gendev;
|
|
|
|
dev_set_name(&fnode_sess->dev, "flashnode_sess-%u:%u",
|
|
|
|
shost->host_no, index);
|
|
|
|
|
|
|
|
err = device_register(&fnode_sess->dev);
|
|
|
|
if (err)
|
|
|
|
goto free_fnode_sess;
|
|
|
|
|
|
|
|
if (dd_size)
|
|
|
|
fnode_sess->dd_data = &fnode_sess[1];
|
|
|
|
|
|
|
|
return fnode_sess;
|
|
|
|
|
|
|
|
free_fnode_sess:
|
|
|
|
kfree(fnode_sess);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_create_flashnode_sess);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_create_flashnode_conn - Add flashnode conn entry in sysfs
|
|
|
|
* @shost: pointer to host data
|
|
|
|
* @fnode_sess: pointer to the parent flashnode session entry
|
|
|
|
* @transport: pointer to transport data
|
|
|
|
* @dd_size: total size to allocate
|
|
|
|
*
|
|
|
|
* Adds a sysfs entry for the flashnode connection attributes
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* pointer to allocated flashnode conn on success
|
|
|
|
* %NULL on failure
|
|
|
|
*/
|
|
|
|
struct iscsi_bus_flash_conn *
|
|
|
|
iscsi_create_flashnode_conn(struct Scsi_Host *shost,
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess,
|
|
|
|
struct iscsi_transport *transport,
|
|
|
|
int dd_size)
|
|
|
|
{
|
|
|
|
struct iscsi_bus_flash_conn *fnode_conn;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
fnode_conn = kzalloc(sizeof(*fnode_conn) + dd_size, GFP_KERNEL);
|
|
|
|
if (!fnode_conn)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
fnode_conn->transport = transport;
|
|
|
|
fnode_conn->dev.type = &iscsi_flashnode_conn_dev_type;
|
|
|
|
fnode_conn->dev.bus = &iscsi_flashnode_bus;
|
|
|
|
fnode_conn->dev.parent = &fnode_sess->dev;
|
|
|
|
dev_set_name(&fnode_conn->dev, "flashnode_conn-%u:%u:0",
|
|
|
|
shost->host_no, fnode_sess->target_id);
|
|
|
|
|
|
|
|
err = device_register(&fnode_conn->dev);
|
|
|
|
if (err)
|
|
|
|
goto free_fnode_conn;
|
|
|
|
|
|
|
|
if (dd_size)
|
|
|
|
fnode_conn->dd_data = &fnode_conn[1];
|
|
|
|
|
|
|
|
return fnode_conn;
|
|
|
|
|
|
|
|
free_fnode_conn:
|
|
|
|
kfree(fnode_conn);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_create_flashnode_conn);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_is_flashnode_conn_dev - verify passed device is to be flashnode conn
|
|
|
|
* @dev: device to verify
|
|
|
|
* @data: pointer to data containing value to use for verification
|
|
|
|
*
|
|
|
|
* Verifies if the passed device is flashnode conn device
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* 1 on success
|
|
|
|
* 0 on failure
|
|
|
|
*/
|
2016-03-30 18:27:47 +00:00
|
|
|
static int iscsi_is_flashnode_conn_dev(struct device *dev, void *data)
|
2013-03-22 11:41:29 +00:00
|
|
|
{
|
|
|
|
return dev->bus == &iscsi_flashnode_bus;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_destroy_flashnode_conn(struct iscsi_bus_flash_conn *fnode_conn)
|
|
|
|
{
|
|
|
|
device_unregister(&fnode_conn->dev);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int flashnode_match_index(struct device *dev, void *data)
|
|
|
|
{
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess = NULL;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (!iscsi_flashnode_bus_match(dev, NULL))
|
|
|
|
goto exit_match_index;
|
|
|
|
|
|
|
|
fnode_sess = iscsi_dev_to_flash_session(dev);
|
|
|
|
ret = (fnode_sess->target_id == *((int *)data)) ? 1 : 0;
|
|
|
|
|
|
|
|
exit_match_index:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_get_flashnode_by_index -finds flashnode session entry by index
|
|
|
|
* @shost: pointer to host data
|
2013-05-06 17:06:56 +00:00
|
|
|
* @idx: index to match
|
2013-03-22 11:41:29 +00:00
|
|
|
*
|
|
|
|
* Finds the flashnode session object for the passed index
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* pointer to found flashnode session object on success
|
|
|
|
* %NULL on failure
|
|
|
|
*/
|
|
|
|
static struct iscsi_bus_flash_session *
|
2013-05-06 17:06:56 +00:00
|
|
|
iscsi_get_flashnode_by_index(struct Scsi_Host *shost, uint32_t idx)
|
2013-03-22 11:41:29 +00:00
|
|
|
{
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess = NULL;
|
|
|
|
struct device *dev;
|
|
|
|
|
2013-05-06 17:06:56 +00:00
|
|
|
dev = device_find_child(&shost->shost_gendev, &idx,
|
|
|
|
flashnode_match_index);
|
2013-03-22 11:41:29 +00:00
|
|
|
if (dev)
|
|
|
|
fnode_sess = iscsi_dev_to_flash_session(dev);
|
|
|
|
|
|
|
|
return fnode_sess;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_find_flashnode_sess - finds flashnode session entry
|
|
|
|
* @shost: pointer to host data
|
|
|
|
* @data: pointer to data containing value to use for comparison
|
|
|
|
* @fn: function pointer that does actual comparison
|
|
|
|
*
|
|
|
|
* Finds the flashnode session object comparing the data passed using logic
|
|
|
|
* defined in passed function pointer
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* pointer to found flashnode session device object on success
|
|
|
|
* %NULL on failure
|
|
|
|
*/
|
|
|
|
struct device *
|
|
|
|
iscsi_find_flashnode_sess(struct Scsi_Host *shost, void *data,
|
|
|
|
int (*fn)(struct device *dev, void *data))
|
|
|
|
{
|
2013-05-06 17:06:56 +00:00
|
|
|
return device_find_child(&shost->shost_gendev, data, fn);
|
2013-03-22 11:41:29 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_find_flashnode_sess);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_find_flashnode_conn - finds flashnode connection entry
|
|
|
|
* @fnode_sess: pointer to parent flashnode session entry
|
|
|
|
*
|
|
|
|
* Finds the flashnode connection object comparing the data passed using logic
|
|
|
|
* defined in passed function pointer
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* pointer to found flashnode connection device object on success
|
|
|
|
* %NULL on failure
|
|
|
|
*/
|
|
|
|
struct device *
|
2013-05-06 17:06:56 +00:00
|
|
|
iscsi_find_flashnode_conn(struct iscsi_bus_flash_session *fnode_sess)
|
2013-03-22 11:41:29 +00:00
|
|
|
{
|
2013-05-06 17:06:56 +00:00
|
|
|
return device_find_child(&fnode_sess->dev, NULL,
|
|
|
|
iscsi_is_flashnode_conn_dev);
|
2013-03-22 11:41:29 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_find_flashnode_conn);
|
|
|
|
|
|
|
|
static int iscsi_iter_destroy_flashnode_conn_fn(struct device *dev, void *data)
|
|
|
|
{
|
|
|
|
if (!iscsi_is_flashnode_conn_dev(dev, NULL))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return iscsi_destroy_flashnode_conn(iscsi_dev_to_flash_conn(dev));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2014-02-18 13:54:36 +00:00
|
|
|
* iscsi_destroy_flashnode_sess - destroy flashnode session entry
|
2013-03-22 11:41:29 +00:00
|
|
|
* @fnode_sess: pointer to flashnode session entry to be destroyed
|
|
|
|
*
|
|
|
|
* Deletes the flashnode session entry and all children flashnode connection
|
|
|
|
* entries from sysfs
|
|
|
|
*/
|
|
|
|
void iscsi_destroy_flashnode_sess(struct iscsi_bus_flash_session *fnode_sess)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = device_for_each_child(&fnode_sess->dev, NULL,
|
|
|
|
iscsi_iter_destroy_flashnode_conn_fn);
|
|
|
|
if (err)
|
|
|
|
pr_err("Could not delete all connections for %s. Error %d.\n",
|
|
|
|
fnode_sess->dev.kobj.name, err);
|
|
|
|
|
|
|
|
device_unregister(&fnode_sess->dev);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_destroy_flashnode_sess);
|
|
|
|
|
|
|
|
static int iscsi_iter_destroy_flashnode_fn(struct device *dev, void *data)
|
|
|
|
{
|
|
|
|
if (!iscsi_flashnode_bus_match(dev, NULL))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
iscsi_destroy_flashnode_sess(iscsi_dev_to_flash_session(dev));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2014-02-18 13:54:36 +00:00
|
|
|
* iscsi_destroy_all_flashnode - destroy all flashnode session entries
|
2013-03-22 11:41:29 +00:00
|
|
|
* @shost: pointer to host data
|
|
|
|
*
|
|
|
|
* Destroys all the flashnode session entries and all corresponding children
|
|
|
|
* flashnode connection entries from sysfs
|
|
|
|
*/
|
|
|
|
void iscsi_destroy_all_flashnode(struct Scsi_Host *shost)
|
|
|
|
{
|
|
|
|
device_for_each_child(&shost->shost_gendev, NULL,
|
|
|
|
iscsi_iter_destroy_flashnode_fn);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_destroy_all_flashnode);
|
|
|
|
|
2011-07-25 18:48:50 +00:00
|
|
|
/*
|
|
|
|
* BSG support
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* iscsi_bsg_host_dispatch - Dispatch command to LLD.
|
|
|
|
* @job: bsg job to be processed
|
|
|
|
*/
|
|
|
|
static int iscsi_bsg_host_dispatch(struct bsg_job *job)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost = iscsi_job_to_shost(job);
|
|
|
|
struct iscsi_bsg_request *req = job->request;
|
|
|
|
struct iscsi_bsg_reply *reply = job->reply;
|
|
|
|
struct iscsi_internal *i = to_iscsi_internal(shost->transportt);
|
|
|
|
int cmdlen = sizeof(uint32_t); /* start with length of msgcode */
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* check if we have the msgcode value at least */
|
|
|
|
if (job->request_len < sizeof(uint32_t)) {
|
|
|
|
ret = -ENOMSG;
|
|
|
|
goto fail_host_msg;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Validate the host command */
|
|
|
|
switch (req->msgcode) {
|
|
|
|
case ISCSI_BSG_HST_VENDOR:
|
|
|
|
cmdlen += sizeof(struct iscsi_bsg_host_vendor);
|
|
|
|
if ((shost->hostt->vendor_id == 0L) ||
|
|
|
|
(req->rqst_data.h_vendor.vendor_id !=
|
|
|
|
shost->hostt->vendor_id)) {
|
|
|
|
ret = -ESRCH;
|
|
|
|
goto fail_host_msg;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -EBADR;
|
|
|
|
goto fail_host_msg;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check if we really have all the request data needed */
|
|
|
|
if (job->request_len < cmdlen) {
|
|
|
|
ret = -ENOMSG;
|
|
|
|
goto fail_host_msg;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = i->iscsi_transport->bsg_request(job);
|
|
|
|
if (!ret)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
fail_host_msg:
|
|
|
|
/* return the errno failure code as the only status */
|
|
|
|
BUG_ON(job->reply_len < sizeof(uint32_t));
|
|
|
|
reply->reply_payload_rcv_len = 0;
|
|
|
|
reply->result = ret;
|
|
|
|
job->reply_len = sizeof(uint32_t);
|
|
|
|
bsg_job_done(job, ret, 0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_bsg_host_add - Create and add the bsg hooks to receive requests
|
|
|
|
* @shost: shost for iscsi_host
|
2011-11-02 13:17:17 +00:00
|
|
|
* @ihost: iscsi_cls_host adding the structures to
|
2011-07-25 18:48:50 +00:00
|
|
|
*/
|
|
|
|
static int
|
|
|
|
iscsi_bsg_host_add(struct Scsi_Host *shost, struct iscsi_cls_host *ihost)
|
|
|
|
{
|
|
|
|
struct device *dev = &shost->shost_gendev;
|
|
|
|
struct iscsi_internal *i = to_iscsi_internal(shost->transportt);
|
|
|
|
struct request_queue *q;
|
|
|
|
char bsg_name[20];
|
|
|
|
|
|
|
|
if (!i->iscsi_transport->bsg_request)
|
|
|
|
return -ENOTSUPP;
|
|
|
|
|
|
|
|
snprintf(bsg_name, sizeof(bsg_name), "iscsi_host%d", shost->host_no);
|
2018-10-26 17:26:25 +00:00
|
|
|
q = bsg_setup_queue(dev, bsg_name, iscsi_bsg_host_dispatch, NULL, 0);
|
2017-01-03 12:25:02 +00:00
|
|
|
if (IS_ERR(q)) {
|
2011-07-25 18:48:50 +00:00
|
|
|
shost_printk(KERN_ERR, shost, "bsg interface failed to "
|
|
|
|
"initialize - no request queue\n");
|
2017-01-03 12:25:02 +00:00
|
|
|
return PTR_ERR(q);
|
2011-07-25 18:48:50 +00:00
|
|
|
}
|
2017-01-03 12:25:02 +00:00
|
|
|
__scsi_init_queue(shost, q);
|
2011-07-25 18:48:50 +00:00
|
|
|
|
|
|
|
ihost->bsg_q = q;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-04-07 02:13:39 +00:00
|
|
|
static int iscsi_setup_host(struct transport_container *tc, struct device *dev,
|
2008-02-21 23:13:36 +00:00
|
|
|
struct device *cdev)
|
2006-04-07 02:13:39 +00:00
|
|
|
{
|
|
|
|
struct Scsi_Host *shost = dev_to_shost(dev);
|
2008-05-21 20:53:58 +00:00
|
|
|
struct iscsi_cls_host *ihost = shost->shost_data;
|
2006-04-07 02:13:39 +00:00
|
|
|
|
|
|
|
memset(ihost, 0, sizeof(*ihost));
|
2008-01-31 19:36:48 +00:00
|
|
|
atomic_set(&ihost->nr_scans, 0);
|
2008-05-21 20:54:12 +00:00
|
|
|
mutex_init(&ihost->mutex);
|
2011-07-25 18:48:50 +00:00
|
|
|
|
|
|
|
iscsi_bsg_host_add(shost, ihost);
|
|
|
|
/* ignore any bsg add error - we just can't do sgio */
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_remove_host(struct transport_container *tc,
|
|
|
|
struct device *dev, struct device *cdev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost = dev_to_shost(dev);
|
|
|
|
struct iscsi_cls_host *ihost = shost->shost_data;
|
|
|
|
|
2018-10-26 17:27:02 +00:00
|
|
|
bsg_remove_queue(ihost->bsg_q);
|
2006-04-07 02:13:39 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static DECLARE_TRANSPORT_CLASS(iscsi_host_class,
|
|
|
|
"iscsi_host",
|
|
|
|
iscsi_setup_host,
|
2011-07-25 18:48:50 +00:00
|
|
|
iscsi_remove_host,
|
2006-04-07 02:13:39 +00:00
|
|
|
NULL);
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
static DECLARE_TRANSPORT_CLASS(iscsi_session_class,
|
|
|
|
"iscsi_session",
|
2005-04-16 22:20:36 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL);
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
static DECLARE_TRANSPORT_CLASS(iscsi_connection_class,
|
|
|
|
"iscsi_connection",
|
2005-04-16 22:20:36 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
|
|
|
static struct sock *nls;
|
2006-01-11 12:16:10 +00:00
|
|
|
static DEFINE_MUTEX(rx_queue_mutex);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
/*
|
|
|
|
* conn_mutex protects the {start,bind,stop,destroy}_conn from racing
|
|
|
|
* against the kernel stop_connection recovery mechanism
|
|
|
|
*/
|
|
|
|
static DEFINE_MUTEX(conn_mutex);
|
|
|
|
|
2006-02-02 03:06:49 +00:00
|
|
|
static LIST_HEAD(sesslist);
|
|
|
|
static DEFINE_SPINLOCK(sesslock);
|
2006-01-14 00:05:50 +00:00
|
|
|
static LIST_HEAD(connlist);
|
2020-01-25 06:19:25 +00:00
|
|
|
static LIST_HEAD(connlist_err);
|
2006-01-14 00:05:50 +00:00
|
|
|
static DEFINE_SPINLOCK(connlock);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-04-07 02:13:33 +00:00
|
|
|
static uint32_t iscsi_conn_get_sid(struct iscsi_cls_conn *conn)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_session *sess = iscsi_dev_to_session(conn->dev.parent);
|
|
|
|
return sess->sid;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns the matching session to a given sid
|
|
|
|
*/
|
|
|
|
static struct iscsi_cls_session *iscsi_session_lookup(uint32_t sid)
|
2006-02-02 03:06:49 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
struct iscsi_cls_session *sess;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&sesslock, flags);
|
|
|
|
list_for_each_entry(sess, &sesslist, sess_list) {
|
2006-04-07 02:13:33 +00:00
|
|
|
if (sess->sid == sid) {
|
2006-02-02 03:06:49 +00:00
|
|
|
spin_unlock_irqrestore(&sesslock, flags);
|
|
|
|
return sess;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&sesslock, flags);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2006-04-07 02:13:33 +00:00
|
|
|
/*
|
|
|
|
* Returns the matching connection to a given sid / cid tuple
|
|
|
|
*/
|
|
|
|
static struct iscsi_cls_conn *iscsi_conn_lookup(uint32_t sid, uint32_t cid)
|
2006-02-02 03:06:49 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
struct iscsi_cls_conn *conn;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&connlock, flags);
|
|
|
|
list_for_each_entry(conn, &connlist, conn_list) {
|
2006-04-07 02:13:33 +00:00
|
|
|
if ((conn->cid == cid) && (iscsi_conn_get_sid(conn) == sid)) {
|
2006-02-02 03:06:49 +00:00
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
/*
|
|
|
|
* The following functions can be used by LLDs that allocate
|
|
|
|
* their own scsi_hosts or by software iscsi LLDs
|
|
|
|
*/
|
2008-01-31 19:36:43 +00:00
|
|
|
static struct {
|
|
|
|
int value;
|
|
|
|
char *name;
|
|
|
|
} iscsi_session_state_names[] = {
|
|
|
|
{ ISCSI_SESSION_LOGGED_IN, "LOGGED_IN" },
|
|
|
|
{ ISCSI_SESSION_FAILED, "FAILED" },
|
|
|
|
{ ISCSI_SESSION_FREE, "FREE" },
|
|
|
|
};
|
|
|
|
|
2008-02-13 21:30:17 +00:00
|
|
|
static const char *iscsi_session_state_name(int state)
|
2008-01-31 19:36:43 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char *name = NULL;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(iscsi_session_state_names); i++) {
|
|
|
|
if (iscsi_session_state_names[i].value == state) {
|
|
|
|
name = iscsi_session_state_names[i].name;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return name;
|
|
|
|
}
|
|
|
|
|
|
|
|
int iscsi_session_chkready(struct iscsi_cls_session *session)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
switch (session->state) {
|
|
|
|
case ISCSI_SESSION_LOGGED_IN:
|
|
|
|
err = 0;
|
|
|
|
break;
|
|
|
|
case ISCSI_SESSION_FAILED:
|
2009-04-29 18:12:39 +00:00
|
|
|
err = DID_IMM_RETRY << 16;
|
2008-01-31 19:36:43 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_SESSION_FREE:
|
2008-08-19 23:45:26 +00:00
|
|
|
err = DID_TRANSPORT_FAILFAST << 16;
|
2008-01-31 19:36:43 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
err = DID_NO_CONNECT << 16;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_session_chkready);
|
|
|
|
|
2011-07-25 18:48:52 +00:00
|
|
|
int iscsi_is_session_online(struct iscsi_cls_session *session)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
if (session->state == ISCSI_SESSION_LOGGED_IN)
|
|
|
|
ret = 1;
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_is_session_online);
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
static void iscsi_session_release(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session = iscsi_dev_to_session(dev);
|
|
|
|
struct Scsi_Host *shost;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
shost = iscsi_session_to_shost(session);
|
|
|
|
scsi_host_put(shost);
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completing session release\n");
|
2006-01-14 00:05:50 +00:00
|
|
|
kfree(session);
|
|
|
|
}
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2012-02-27 11:08:51 +00:00
|
|
|
int iscsi_is_session_dev(const struct device *dev)
|
2006-01-14 00:05:50 +00:00
|
|
|
{
|
|
|
|
return dev->release == iscsi_session_release;
|
|
|
|
}
|
2012-02-27 11:08:51 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_is_session_dev);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2008-05-21 20:54:00 +00:00
|
|
|
static int iscsi_iter_session_fn(struct device *dev, void *data)
|
|
|
|
{
|
|
|
|
void (* fn) (struct iscsi_cls_session *) = data;
|
|
|
|
|
|
|
|
if (!iscsi_is_session_dev(dev))
|
|
|
|
return 0;
|
|
|
|
fn(iscsi_dev_to_session(dev));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void iscsi_host_for_each_session(struct Scsi_Host *shost,
|
|
|
|
void (*fn)(struct iscsi_cls_session *))
|
|
|
|
{
|
|
|
|
device_for_each_child(&shost->shost_gendev, fn,
|
|
|
|
iscsi_iter_session_fn);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_host_for_each_session);
|
|
|
|
|
2008-01-31 19:36:48 +00:00
|
|
|
/**
|
|
|
|
* iscsi_scan_finished - helper to report when running scans are done
|
|
|
|
* @shost: scsi host
|
|
|
|
* @time: scan run time
|
|
|
|
*
|
|
|
|
* This function can be used by drives like qla4xxx to report to the scsi
|
|
|
|
* layer when the scans it kicked off at module load time are done.
|
|
|
|
*/
|
|
|
|
int iscsi_scan_finished(struct Scsi_Host *shost, unsigned long time)
|
|
|
|
{
|
2008-05-21 20:53:58 +00:00
|
|
|
struct iscsi_cls_host *ihost = shost->shost_data;
|
2008-01-31 19:36:48 +00:00
|
|
|
/*
|
|
|
|
* qla4xxx will have kicked off some session unblocks before calling
|
|
|
|
* scsi_scan_host, so just wait for them to complete.
|
|
|
|
*/
|
|
|
|
return !atomic_read(&ihost->nr_scans);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_scan_finished);
|
|
|
|
|
2008-05-21 20:54:12 +00:00
|
|
|
struct iscsi_scan_data {
|
|
|
|
unsigned int channel;
|
|
|
|
unsigned int id;
|
2014-06-25 13:27:36 +00:00
|
|
|
u64 lun;
|
2016-03-17 07:39:45 +00:00
|
|
|
enum scsi_scan_mode rescan;
|
2008-05-21 20:54:12 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static int iscsi_user_scan_session(struct device *dev, void *data)
|
2006-04-07 02:13:39 +00:00
|
|
|
{
|
2008-05-21 20:54:12 +00:00
|
|
|
struct iscsi_scan_data *scan_data = data;
|
2006-04-07 02:13:39 +00:00
|
|
|
struct iscsi_cls_session *session;
|
2008-05-21 20:54:12 +00:00
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_cls_host *ihost;
|
|
|
|
unsigned long flags;
|
|
|
|
unsigned int id;
|
|
|
|
|
|
|
|
if (!iscsi_is_session_dev(dev))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
session = iscsi_dev_to_session(dev);
|
2009-08-20 20:11:01 +00:00
|
|
|
|
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Scanning session\n");
|
|
|
|
|
2008-05-21 20:54:12 +00:00
|
|
|
shost = iscsi_session_to_shost(session);
|
|
|
|
ihost = shost->shost_data;
|
2006-04-07 02:13:39 +00:00
|
|
|
|
|
|
|
mutex_lock(&ihost->mutex);
|
2008-05-21 20:54:12 +00:00
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
if (session->state != ISCSI_SESSION_LOGGED_IN) {
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
2009-08-20 20:11:01 +00:00
|
|
|
goto user_scan_exit;
|
2006-04-07 02:13:39 +00:00
|
|
|
}
|
2008-05-21 20:54:12 +00:00
|
|
|
id = session->target_id;
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
2006-04-07 02:13:39 +00:00
|
|
|
|
2008-05-21 20:54:12 +00:00
|
|
|
if (id != ISCSI_MAX_TARGET) {
|
|
|
|
if ((scan_data->channel == SCAN_WILD_CARD ||
|
|
|
|
scan_data->channel == 0) &&
|
|
|
|
(scan_data->id == SCAN_WILD_CARD ||
|
|
|
|
scan_data->id == id))
|
|
|
|
scsi_scan_target(&session->dev, 0, id,
|
2016-03-17 07:39:45 +00:00
|
|
|
scan_data->lun, scan_data->rescan);
|
2008-05-21 20:54:12 +00:00
|
|
|
}
|
2009-08-20 20:11:01 +00:00
|
|
|
|
|
|
|
user_scan_exit:
|
2008-05-21 20:54:12 +00:00
|
|
|
mutex_unlock(&ihost->mutex);
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completed session scan\n");
|
2006-04-07 02:13:39 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-05-21 20:54:12 +00:00
|
|
|
static int iscsi_user_scan(struct Scsi_Host *shost, uint channel,
|
2014-06-25 13:27:36 +00:00
|
|
|
uint id, u64 lun)
|
2008-05-21 20:54:12 +00:00
|
|
|
{
|
|
|
|
struct iscsi_scan_data scan_data;
|
|
|
|
|
|
|
|
scan_data.channel = channel;
|
|
|
|
scan_data.id = id;
|
|
|
|
scan_data.lun = lun;
|
2016-03-17 07:39:45 +00:00
|
|
|
scan_data.rescan = SCSI_SCAN_MANUAL;
|
2008-05-21 20:54:12 +00:00
|
|
|
|
|
|
|
return device_for_each_child(&shost->shost_gendev, &scan_data,
|
|
|
|
iscsi_user_scan_session);
|
|
|
|
}
|
|
|
|
|
2008-01-31 19:36:46 +00:00
|
|
|
static void iscsi_scan_session(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session =
|
|
|
|
container_of(work, struct iscsi_cls_session, scan_work);
|
2008-01-31 19:36:48 +00:00
|
|
|
struct Scsi_Host *shost = iscsi_session_to_shost(session);
|
2008-05-21 20:53:58 +00:00
|
|
|
struct iscsi_cls_host *ihost = shost->shost_data;
|
2008-05-21 20:54:12 +00:00
|
|
|
struct iscsi_scan_data scan_data;
|
2008-01-31 19:36:46 +00:00
|
|
|
|
2008-05-21 20:54:12 +00:00
|
|
|
scan_data.channel = 0;
|
|
|
|
scan_data.id = SCAN_WILD_CARD;
|
|
|
|
scan_data.lun = SCAN_WILD_CARD;
|
2016-03-17 07:39:45 +00:00
|
|
|
scan_data.rescan = SCSI_SCAN_RESCAN;
|
2008-01-31 19:36:46 +00:00
|
|
|
|
2008-05-21 20:54:12 +00:00
|
|
|
iscsi_user_scan_session(&session->dev, &scan_data);
|
2008-01-31 19:36:48 +00:00
|
|
|
atomic_dec(&ihost->nr_scans);
|
2008-01-31 19:36:46 +00:00
|
|
|
}
|
|
|
|
|
2010-07-22 11:29:49 +00:00
|
|
|
/**
|
|
|
|
* iscsi_block_scsi_eh - block scsi eh until session state has transistioned
|
2010-08-14 20:05:41 +00:00
|
|
|
* @cmd: scsi cmd passed to scsi eh handler
|
2010-07-22 11:29:49 +00:00
|
|
|
*
|
|
|
|
* If the session is down this function will wait for the recovery
|
|
|
|
* timer to fire or for the session to be logged back in. If the
|
|
|
|
* recovery timer fires then FAST_IO_FAIL is returned. The caller
|
|
|
|
* should pass this error value to the scsi eh.
|
|
|
|
*/
|
|
|
|
int iscsi_block_scsi_eh(struct scsi_cmnd *cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session =
|
|
|
|
starget_to_session(scsi_target(cmd->device));
|
|
|
|
unsigned long flags;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
while (session->state != ISCSI_SESSION_LOGGED_IN) {
|
|
|
|
if (session->state == ISCSI_SESSION_FREE) {
|
|
|
|
ret = FAST_IO_FAIL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
|
|
|
msleep(1000);
|
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_block_scsi_eh);
|
|
|
|
|
2006-11-22 14:57:56 +00:00
|
|
|
static void session_recovery_timedout(struct work_struct *work)
|
2006-04-07 02:13:39 +00:00
|
|
|
{
|
2006-11-22 14:57:56 +00:00
|
|
|
struct iscsi_cls_session *session =
|
|
|
|
container_of(work, struct iscsi_cls_session,
|
|
|
|
recovery_work.work);
|
2008-01-31 19:36:43 +00:00
|
|
|
unsigned long flags;
|
2006-04-07 02:13:39 +00:00
|
|
|
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_session_printk(KERN_INFO, session,
|
|
|
|
"session recovery timed out after %d secs\n",
|
|
|
|
session->recovery_tmo);
|
2006-04-07 02:13:39 +00:00
|
|
|
|
2008-01-31 19:36:43 +00:00
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
switch (session->state) {
|
|
|
|
case ISCSI_SESSION_FAILED:
|
|
|
|
session->state = ISCSI_SESSION_FREE;
|
|
|
|
break;
|
|
|
|
case ISCSI_SESSION_LOGGED_IN:
|
|
|
|
case ISCSI_SESSION_FREE:
|
|
|
|
/* we raced with the unblock's flush */
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
|
|
|
|
2006-04-07 02:13:39 +00:00
|
|
|
if (session->transport->session_recovery_timedout)
|
|
|
|
session->transport->session_recovery_timedout(session);
|
|
|
|
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Unblocking SCSI target\n");
|
2012-05-18 04:56:57 +00:00
|
|
|
scsi_target_unblock(&session->dev, SDEV_TRANSPORT_OFFLINE);
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completed unblocking SCSI target\n");
|
2006-04-07 02:13:39 +00:00
|
|
|
}
|
|
|
|
|
2008-03-04 19:26:55 +00:00
|
|
|
static void __iscsi_unblock_session(struct work_struct *work)
|
2008-01-31 19:36:43 +00:00
|
|
|
{
|
2008-03-04 19:26:55 +00:00
|
|
|
struct iscsi_cls_session *session =
|
|
|
|
container_of(work, struct iscsi_cls_session,
|
|
|
|
unblock_work);
|
2008-01-31 19:36:46 +00:00
|
|
|
struct Scsi_Host *shost = iscsi_session_to_shost(session);
|
2008-05-21 20:53:58 +00:00
|
|
|
struct iscsi_cls_host *ihost = shost->shost_data;
|
2008-01-31 19:36:43 +00:00
|
|
|
unsigned long flags;
|
|
|
|
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Unblocking session\n");
|
2008-03-04 19:26:55 +00:00
|
|
|
/*
|
|
|
|
* The recovery and unblock work get run from the same workqueue,
|
|
|
|
* so try to cancel it if it was going to run after this unblock.
|
|
|
|
*/
|
|
|
|
cancel_delayed_work(&session->recovery_work);
|
2008-01-31 19:36:43 +00:00
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
session->state = ISCSI_SESSION_LOGGED_IN;
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
2008-03-04 19:26:55 +00:00
|
|
|
/* start IO */
|
2012-05-18 04:56:57 +00:00
|
|
|
scsi_target_unblock(&session->dev, SDEV_RUNNING);
|
2008-01-31 19:36:48 +00:00
|
|
|
/*
|
|
|
|
* Only do kernel scanning if the driver is properly hooked into
|
|
|
|
* the async scanning code (drivers like iscsi_tcp do login and
|
|
|
|
* scanning from userspace).
|
|
|
|
*/
|
|
|
|
if (shost->hostt->scan_finished) {
|
2009-03-05 20:46:02 +00:00
|
|
|
if (scsi_queue_work(shost, &session->scan_work))
|
2008-01-31 19:36:48 +00:00
|
|
|
atomic_inc(&ihost->nr_scans);
|
|
|
|
}
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completed unblocking session\n");
|
2008-01-31 19:36:43 +00:00
|
|
|
}
|
2008-03-04 19:26:55 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_unblock_session - set a session as logged in and start IO.
|
|
|
|
* @session: iscsi session
|
|
|
|
*
|
|
|
|
* Mark a session as ready to accept IO.
|
|
|
|
*/
|
|
|
|
void iscsi_unblock_session(struct iscsi_cls_session *session)
|
|
|
|
{
|
|
|
|
queue_work(iscsi_eh_timer_workq, &session->unblock_work);
|
|
|
|
/*
|
2020-07-01 19:47:47 +00:00
|
|
|
* Blocking the session can be done from any context so we only
|
|
|
|
* queue the block work. Make sure the unblock work has completed
|
|
|
|
* because it flushes/cancels the other works and updates the state.
|
2008-03-04 19:26:55 +00:00
|
|
|
*/
|
2020-07-01 19:47:47 +00:00
|
|
|
flush_work(&session->unblock_work);
|
2008-03-04 19:26:55 +00:00
|
|
|
}
|
2006-04-07 02:13:39 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_unblock_session);
|
|
|
|
|
2008-03-04 19:26:55 +00:00
|
|
|
static void __iscsi_block_session(struct work_struct *work)
|
2006-04-07 02:13:39 +00:00
|
|
|
{
|
2008-03-04 19:26:55 +00:00
|
|
|
struct iscsi_cls_session *session =
|
|
|
|
container_of(work, struct iscsi_cls_session,
|
|
|
|
block_work);
|
2008-01-31 19:36:43 +00:00
|
|
|
unsigned long flags;
|
|
|
|
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Blocking session\n");
|
2008-01-31 19:36:43 +00:00
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
session->state = ISCSI_SESSION_FAILED;
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
2006-04-07 02:13:39 +00:00
|
|
|
scsi_target_block(&session->dev);
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completed SCSI target blocking\n");
|
2009-11-11 22:34:34 +00:00
|
|
|
if (session->recovery_tmo >= 0)
|
|
|
|
queue_delayed_work(iscsi_eh_timer_workq,
|
|
|
|
&session->recovery_work,
|
|
|
|
session->recovery_tmo * HZ);
|
2006-04-07 02:13:39 +00:00
|
|
|
}
|
2008-03-04 19:26:55 +00:00
|
|
|
|
|
|
|
void iscsi_block_session(struct iscsi_cls_session *session)
|
|
|
|
{
|
|
|
|
queue_work(iscsi_eh_timer_workq, &session->block_work);
|
|
|
|
}
|
2006-04-07 02:13:39 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_block_session);
|
|
|
|
|
2007-12-13 18:43:29 +00:00
|
|
|
static void __iscsi_unbind_session(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session =
|
|
|
|
container_of(work, struct iscsi_cls_session,
|
|
|
|
unbind_work);
|
|
|
|
struct Scsi_Host *shost = iscsi_session_to_shost(session);
|
2008-05-21 20:53:58 +00:00
|
|
|
struct iscsi_cls_host *ihost = shost->shost_data;
|
2008-05-21 20:54:12 +00:00
|
|
|
unsigned long flags;
|
2011-10-06 08:56:57 +00:00
|
|
|
unsigned int target_id;
|
2007-12-13 18:43:29 +00:00
|
|
|
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Unbinding session\n");
|
|
|
|
|
2007-12-13 18:43:29 +00:00
|
|
|
/* Prevent new scans and make sure scanning is not in progress */
|
|
|
|
mutex_lock(&ihost->mutex);
|
2008-05-21 20:54:12 +00:00
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
if (session->target_id == ISCSI_MAX_TARGET) {
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
2007-12-13 18:43:29 +00:00
|
|
|
mutex_unlock(&ihost->mutex);
|
scsi: iscsi: Report unbind session event when the target has been removed
If the daemon is restarted or crashes while logging out of a session, the
unbind session event sent by the kernel is not processed and is lost. When
the daemon starts again, the session can't be unbound because the daemon is
waiting for the event message. However, the kernel has already logged out
and the event will not be resent.
When iscsid restart is complete, logout session reports error:
Logging out of session [sid: 6, target: iqn.xxxxx, portal: xx.xx.xx.xx,3260]
iscsiadm: Could not logout of [sid: 6, target: iscsiadm -m node iqn.xxxxx, portal: xx.xx.xx.xx,3260].
iscsiadm: initiator reported error (9 - internal error)
iscsiadm: Could not logout of all requested sessions
Make sure the unbind event is emitted.
[mkp: commit desc and applied by hand since patch was mangled]
Link: https://lore.kernel.org/r/4eab1771-2cb3-8e79-b31c-923652340e99@huawei.com
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Wu Bo <wubo40@huawei.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-03-24 07:58:50 +00:00
|
|
|
goto unbind_session_exit;
|
2007-12-13 18:43:29 +00:00
|
|
|
}
|
2011-10-06 08:56:57 +00:00
|
|
|
|
|
|
|
target_id = session->target_id;
|
2008-05-21 20:54:12 +00:00
|
|
|
session->target_id = ISCSI_MAX_TARGET;
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
2007-12-13 18:43:29 +00:00
|
|
|
mutex_unlock(&ihost->mutex);
|
|
|
|
|
2020-07-01 19:47:46 +00:00
|
|
|
scsi_remove_target(&session->dev);
|
|
|
|
|
2011-10-06 08:56:57 +00:00
|
|
|
if (session->ida_used)
|
|
|
|
ida_simple_remove(&iscsi_sess_ida, target_id);
|
|
|
|
|
scsi: iscsi: Report unbind session event when the target has been removed
If the daemon is restarted or crashes while logging out of a session, the
unbind session event sent by the kernel is not processed and is lost. When
the daemon starts again, the session can't be unbound because the daemon is
waiting for the event message. However, the kernel has already logged out
and the event will not be resent.
When iscsid restart is complete, logout session reports error:
Logging out of session [sid: 6, target: iqn.xxxxx, portal: xx.xx.xx.xx,3260]
iscsiadm: Could not logout of [sid: 6, target: iscsiadm -m node iqn.xxxxx, portal: xx.xx.xx.xx,3260].
iscsiadm: initiator reported error (9 - internal error)
iscsiadm: Could not logout of all requested sessions
Make sure the unbind event is emitted.
[mkp: commit desc and applied by hand since patch was mangled]
Link: https://lore.kernel.org/r/4eab1771-2cb3-8e79-b31c-923652340e99@huawei.com
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Wu Bo <wubo40@huawei.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-03-24 07:58:50 +00:00
|
|
|
unbind_session_exit:
|
2007-12-13 18:43:29 +00:00
|
|
|
iscsi_session_event(session, ISCSI_KEVENT_UNBIND_SESSION);
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completed target removal\n");
|
2007-12-13 18:43:29 +00:00
|
|
|
}
|
|
|
|
|
2020-02-27 19:59:45 +00:00
|
|
|
static void __iscsi_destroy_session(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session =
|
|
|
|
container_of(work, struct iscsi_cls_session, destroy_work);
|
|
|
|
|
|
|
|
session->transport->destroy_session(session);
|
|
|
|
}
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
struct iscsi_cls_session *
|
2008-05-21 20:54:01 +00:00
|
|
|
iscsi_alloc_session(struct Scsi_Host *shost, struct iscsi_transport *transport,
|
|
|
|
int dd_size)
|
2006-01-14 00:05:50 +00:00
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session;
|
|
|
|
|
2008-05-21 20:54:01 +00:00
|
|
|
session = kzalloc(sizeof(*session) + dd_size,
|
2006-04-07 02:13:33 +00:00
|
|
|
GFP_KERNEL);
|
2006-01-14 00:05:50 +00:00
|
|
|
if (!session)
|
2006-06-28 17:00:27 +00:00
|
|
|
return NULL;
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
session->transport = transport;
|
2011-12-05 22:44:01 +00:00
|
|
|
session->creator = -1;
|
2006-04-07 02:13:39 +00:00
|
|
|
session->recovery_tmo = 120;
|
2015-06-16 23:07:13 +00:00
|
|
|
session->recovery_tmo_sysfs_override = false;
|
2008-01-31 19:36:43 +00:00
|
|
|
session->state = ISCSI_SESSION_FREE;
|
2006-11-22 14:57:56 +00:00
|
|
|
INIT_DELAYED_WORK(&session->recovery_work, session_recovery_timedout);
|
2006-04-07 02:13:39 +00:00
|
|
|
INIT_LIST_HEAD(&session->sess_list);
|
2008-03-04 19:26:55 +00:00
|
|
|
INIT_WORK(&session->unblock_work, __iscsi_unblock_session);
|
|
|
|
INIT_WORK(&session->block_work, __iscsi_block_session);
|
2007-12-13 18:43:29 +00:00
|
|
|
INIT_WORK(&session->unbind_work, __iscsi_unbind_session);
|
2008-01-31 19:36:46 +00:00
|
|
|
INIT_WORK(&session->scan_work, iscsi_scan_session);
|
2020-02-27 19:59:45 +00:00
|
|
|
INIT_WORK(&session->destroy_work, __iscsi_destroy_session);
|
2008-01-31 19:36:43 +00:00
|
|
|
spin_lock_init(&session->lock);
|
2006-01-14 00:05:50 +00:00
|
|
|
|
2006-06-28 17:00:31 +00:00
|
|
|
/* this is released in the dev's release function */
|
|
|
|
scsi_host_get(shost);
|
2006-06-28 17:00:30 +00:00
|
|
|
session->dev.parent = &shost->shost_gendev;
|
|
|
|
session->dev.release = iscsi_session_release;
|
|
|
|
device_initialize(&session->dev);
|
2008-05-21 20:54:01 +00:00
|
|
|
if (dd_size)
|
2006-04-07 02:13:33 +00:00
|
|
|
session->dd_data = &session[1];
|
2009-08-20 20:11:01 +00:00
|
|
|
|
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completed session allocation\n");
|
2006-06-28 17:00:30 +00:00
|
|
|
return session;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_alloc_session);
|
|
|
|
|
2006-06-28 17:00:31 +00:00
|
|
|
int iscsi_add_session(struct iscsi_cls_session *session, unsigned int target_id)
|
2006-06-28 17:00:30 +00:00
|
|
|
{
|
2007-12-13 18:43:29 +00:00
|
|
|
unsigned long flags;
|
2011-10-06 08:56:57 +00:00
|
|
|
int id = 0;
|
2006-06-28 17:00:30 +00:00
|
|
|
int err;
|
2006-04-07 02:13:33 +00:00
|
|
|
|
2007-02-28 23:32:18 +00:00
|
|
|
session->sid = atomic_add_return(1, &iscsi_session_nr);
|
2008-05-21 20:54:12 +00:00
|
|
|
|
2011-10-06 08:56:57 +00:00
|
|
|
if (target_id == ISCSI_MAX_TARGET) {
|
|
|
|
id = ida_simple_get(&iscsi_sess_ida, 0, 0, GFP_KERNEL);
|
2008-05-21 20:54:12 +00:00
|
|
|
|
2011-10-06 08:56:57 +00:00
|
|
|
if (id < 0) {
|
2008-05-21 20:54:12 +00:00
|
|
|
iscsi_cls_session_printk(KERN_ERR, session,
|
2011-10-06 08:56:57 +00:00
|
|
|
"Failure in Target ID Allocation\n");
|
|
|
|
return id;
|
2008-05-21 20:54:12 +00:00
|
|
|
}
|
2011-10-06 08:56:57 +00:00
|
|
|
session->target_id = (unsigned int)id;
|
|
|
|
session->ida_used = true;
|
|
|
|
} else
|
|
|
|
session->target_id = target_id;
|
2006-04-07 02:13:39 +00:00
|
|
|
|
2008-12-03 21:41:36 +00:00
|
|
|
dev_set_name(&session->dev, "session%u", session->sid);
|
2006-06-28 17:00:30 +00:00
|
|
|
err = device_add(&session->dev);
|
2006-01-14 00:05:50 +00:00
|
|
|
if (err) {
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_session_printk(KERN_ERR, session,
|
|
|
|
"could not register session's dev\n");
|
2011-10-06 08:56:57 +00:00
|
|
|
goto release_ida;
|
2006-01-14 00:05:50 +00:00
|
|
|
}
|
scsi: iscsi: Fail session and connection on transport registration failure
If the transport cannot be registered, the session/connection creation
needs to be failed early to let the initiator know. Otherwise, the system
will have an outstanding connection that cannot be used nor removed by
open-iscsi. The result is similar to the error below, triggered by
injecting a failure in the transport's registration path.
openiscsi reports success:
root@debian-vm:~# iscsiadm -m node -T iqn:lun1 -p 127.0.0.1 -l
Logging in to [iface: default, target: iqn:lun1, portal: 127.0.0.1,3260]
Login to [iface: default, target: iqn:lun1, portal:127.0.0.1,3260] successful.
But cannot remove the session afterwards, since the kernel is in an
inconsistent state.
root@debian-vm:~# iscsiadm -m node -T iqn:lun1 -p 127.0.0.1 -u
iscsiadm: No matching sessions found
Link: https://lore.kernel.org/r/20200106185817.640331-4-krisman@collabora.com
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-01-06 18:58:17 +00:00
|
|
|
err = transport_register_device(&session->dev);
|
|
|
|
if (err) {
|
|
|
|
iscsi_cls_session_printk(KERN_ERR, session,
|
|
|
|
"could not register transport's dev\n");
|
|
|
|
goto release_dev;
|
|
|
|
}
|
2006-01-14 00:05:50 +00:00
|
|
|
|
2007-12-13 18:43:29 +00:00
|
|
|
spin_lock_irqsave(&sesslock, flags);
|
|
|
|
list_add(&session->sess_list, &sesslist);
|
|
|
|
spin_unlock_irqrestore(&sesslock, flags);
|
|
|
|
|
|
|
|
iscsi_session_event(session, ISCSI_KEVENT_CREATE_SESSION);
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completed session adding\n");
|
2006-06-28 17:00:30 +00:00
|
|
|
return 0;
|
2006-04-07 02:13:39 +00:00
|
|
|
|
scsi: iscsi: Fail session and connection on transport registration failure
If the transport cannot be registered, the session/connection creation
needs to be failed early to let the initiator know. Otherwise, the system
will have an outstanding connection that cannot be used nor removed by
open-iscsi. The result is similar to the error below, triggered by
injecting a failure in the transport's registration path.
openiscsi reports success:
root@debian-vm:~# iscsiadm -m node -T iqn:lun1 -p 127.0.0.1 -l
Logging in to [iface: default, target: iqn:lun1, portal: 127.0.0.1,3260]
Login to [iface: default, target: iqn:lun1, portal:127.0.0.1,3260] successful.
But cannot remove the session afterwards, since the kernel is in an
inconsistent state.
root@debian-vm:~# iscsiadm -m node -T iqn:lun1 -p 127.0.0.1 -u
iscsiadm: No matching sessions found
Link: https://lore.kernel.org/r/20200106185817.640331-4-krisman@collabora.com
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-01-06 18:58:17 +00:00
|
|
|
release_dev:
|
|
|
|
device_del(&session->dev);
|
2011-10-06 08:56:57 +00:00
|
|
|
release_ida:
|
|
|
|
if (session->ida_used)
|
|
|
|
ida_simple_remove(&iscsi_sess_ida, session->target_id);
|
|
|
|
|
2006-06-28 17:00:30 +00:00
|
|
|
return err;
|
2006-01-14 00:05:50 +00:00
|
|
|
}
|
2006-06-28 17:00:30 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_add_session);
|
2006-01-14 00:05:50 +00:00
|
|
|
|
|
|
|
/**
|
2006-06-28 17:00:30 +00:00
|
|
|
* iscsi_create_session - create iscsi class session
|
|
|
|
* @shost: scsi host
|
|
|
|
* @transport: iscsi transport
|
2008-05-21 20:54:01 +00:00
|
|
|
* @dd_size: private driver data size
|
2007-11-03 18:30:39 +00:00
|
|
|
* @target_id: which target
|
2006-01-14 00:05:50 +00:00
|
|
|
*
|
2006-06-28 17:00:30 +00:00
|
|
|
* This can be called from a LLD or iscsi_transport.
|
2007-11-03 18:30:39 +00:00
|
|
|
*/
|
2006-06-28 17:00:30 +00:00
|
|
|
struct iscsi_cls_session *
|
2008-05-21 20:54:01 +00:00
|
|
|
iscsi_create_session(struct Scsi_Host *shost, struct iscsi_transport *transport,
|
|
|
|
int dd_size, unsigned int target_id)
|
2006-06-28 17:00:30 +00:00
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session;
|
|
|
|
|
2008-05-21 20:54:01 +00:00
|
|
|
session = iscsi_alloc_session(shost, transport, dd_size);
|
2006-06-28 17:00:30 +00:00
|
|
|
if (!session)
|
|
|
|
return NULL;
|
|
|
|
|
2006-06-28 17:00:31 +00:00
|
|
|
if (iscsi_add_session(session, target_id)) {
|
2006-06-28 17:00:30 +00:00
|
|
|
iscsi_free_session(session);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return session;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_create_session);
|
|
|
|
|
2007-12-13 18:43:29 +00:00
|
|
|
static void iscsi_conn_release(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_conn *conn = iscsi_dev_to_conn(dev);
|
|
|
|
struct device *parent = conn->dev.parent;
|
|
|
|
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_CONN(conn, "Releasing conn\n");
|
2007-12-13 18:43:29 +00:00
|
|
|
kfree(conn);
|
|
|
|
put_device(parent);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_is_conn_dev(const struct device *dev)
|
|
|
|
{
|
|
|
|
return dev->release == iscsi_conn_release;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_iter_destroy_conn_fn(struct device *dev, void *data)
|
|
|
|
{
|
|
|
|
if (!iscsi_is_conn_dev(dev))
|
|
|
|
return 0;
|
|
|
|
return iscsi_destroy_conn(iscsi_dev_to_conn(dev));
|
|
|
|
}
|
|
|
|
|
2006-06-28 17:00:30 +00:00
|
|
|
void iscsi_remove_session(struct iscsi_cls_session *session)
|
2006-01-14 00:05:50 +00:00
|
|
|
{
|
2007-12-13 18:43:29 +00:00
|
|
|
unsigned long flags;
|
|
|
|
int err;
|
|
|
|
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Removing session\n");
|
|
|
|
|
2007-12-13 18:43:29 +00:00
|
|
|
spin_lock_irqsave(&sesslock, flags);
|
2020-07-01 19:47:48 +00:00
|
|
|
if (!list_empty(&session->sess_list))
|
|
|
|
list_del(&session->sess_list);
|
2007-12-13 18:43:29 +00:00
|
|
|
spin_unlock_irqrestore(&sesslock, flags);
|
2006-04-07 02:13:39 +00:00
|
|
|
|
2020-07-01 19:47:47 +00:00
|
|
|
flush_work(&session->block_work);
|
|
|
|
flush_work(&session->unblock_work);
|
|
|
|
cancel_delayed_work_sync(&session->recovery_work);
|
2007-12-13 18:43:29 +00:00
|
|
|
/*
|
|
|
|
* If we are blocked let commands flow again. The lld or iscsi
|
|
|
|
* layer should set up the queuecommand to fail commands.
|
2008-03-04 19:26:55 +00:00
|
|
|
* We assume that LLD will not be calling block/unblock while
|
|
|
|
* removing the session.
|
2007-12-13 18:43:29 +00:00
|
|
|
*/
|
2008-01-31 19:36:43 +00:00
|
|
|
spin_lock_irqsave(&session->lock, flags);
|
|
|
|
session->state = ISCSI_SESSION_FREE;
|
|
|
|
spin_unlock_irqrestore(&session->lock, flags);
|
2008-01-31 19:36:46 +00:00
|
|
|
|
2012-05-18 04:56:57 +00:00
|
|
|
scsi_target_unblock(&session->dev, SDEV_TRANSPORT_OFFLINE);
|
2008-03-04 19:26:55 +00:00
|
|
|
/* flush running scans then delete devices */
|
2017-03-24 08:41:43 +00:00
|
|
|
flush_work(&session->scan_work);
|
2019-01-28 14:24:42 +00:00
|
|
|
/* flush running unbind operations */
|
|
|
|
flush_work(&session->unbind_work);
|
2008-03-04 19:26:55 +00:00
|
|
|
__iscsi_unbind_session(&session->unbind_work);
|
2006-04-07 02:13:39 +00:00
|
|
|
|
2007-12-13 18:43:29 +00:00
|
|
|
/* hw iscsi may not have removed all connections from session */
|
|
|
|
err = device_for_each_child(&session->dev, NULL,
|
|
|
|
iscsi_iter_destroy_conn_fn);
|
|
|
|
if (err)
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_session_printk(KERN_ERR, session,
|
|
|
|
"Could not delete all connections "
|
|
|
|
"for session. Error %d.\n", err);
|
2006-06-28 17:00:30 +00:00
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
transport_unregister_device(&session->dev);
|
2009-08-20 20:11:01 +00:00
|
|
|
|
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completing session removal\n");
|
2006-06-28 17:00:30 +00:00
|
|
|
device_del(&session->dev);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_remove_session);
|
|
|
|
|
|
|
|
void iscsi_free_session(struct iscsi_cls_session *session)
|
|
|
|
{
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Freeing session\n");
|
2007-12-13 18:43:29 +00:00
|
|
|
iscsi_session_event(session, ISCSI_KEVENT_DESTROY_SESSION);
|
2006-06-28 17:00:30 +00:00
|
|
|
put_device(&session->dev);
|
2006-01-14 00:05:50 +00:00
|
|
|
}
|
2006-06-28 17:00:30 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_free_session);
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
/**
|
|
|
|
* iscsi_create_conn - create iscsi class connection
|
|
|
|
* @session: iscsi cls session
|
2008-05-21 20:54:01 +00:00
|
|
|
* @dd_size: private driver data size
|
2006-01-14 00:05:50 +00:00
|
|
|
* @cid: connection id
|
|
|
|
*
|
|
|
|
* This can be called from a LLD or iscsi_transport. The connection
|
|
|
|
* is child of the session so cid must be unique for all connections
|
|
|
|
* on the session.
|
2006-04-07 02:13:33 +00:00
|
|
|
*
|
|
|
|
* Since we do not support MCS, cid will normally be zero. In some cases
|
|
|
|
* for software iscsi we could be trying to preallocate a connection struct
|
|
|
|
* in which case there could be two connection structs and cid would be
|
|
|
|
* non-zero.
|
2007-11-03 18:30:39 +00:00
|
|
|
*/
|
2006-01-14 00:05:50 +00:00
|
|
|
struct iscsi_cls_conn *
|
2008-05-21 20:54:01 +00:00
|
|
|
iscsi_create_conn(struct iscsi_cls_session *session, int dd_size, uint32_t cid)
|
2006-01-14 00:05:50 +00:00
|
|
|
{
|
|
|
|
struct iscsi_transport *transport = session->transport;
|
|
|
|
struct iscsi_cls_conn *conn;
|
2007-12-13 18:43:29 +00:00
|
|
|
unsigned long flags;
|
2006-01-14 00:05:50 +00:00
|
|
|
int err;
|
|
|
|
|
2008-05-21 20:54:01 +00:00
|
|
|
conn = kzalloc(sizeof(*conn) + dd_size, GFP_KERNEL);
|
2006-01-14 00:05:50 +00:00
|
|
|
if (!conn)
|
|
|
|
return NULL;
|
2008-05-21 20:54:01 +00:00
|
|
|
if (dd_size)
|
2006-01-14 00:05:50 +00:00
|
|
|
conn->dd_data = &conn[1];
|
|
|
|
|
2011-02-16 21:04:33 +00:00
|
|
|
mutex_init(&conn->ep_mutex);
|
2006-01-14 00:05:50 +00:00
|
|
|
INIT_LIST_HEAD(&conn->conn_list);
|
2020-01-25 06:19:25 +00:00
|
|
|
INIT_LIST_HEAD(&conn->conn_list_err);
|
2006-01-14 00:05:50 +00:00
|
|
|
conn->transport = transport;
|
2006-04-07 02:13:33 +00:00
|
|
|
conn->cid = cid;
|
2020-03-17 23:34:22 +00:00
|
|
|
conn->state = ISCSI_CONN_DOWN;
|
2006-01-14 00:05:50 +00:00
|
|
|
|
|
|
|
/* this is released in the dev's release function */
|
|
|
|
if (!get_device(&session->dev))
|
2006-10-16 22:09:38 +00:00
|
|
|
goto free_conn;
|
2006-04-07 02:13:33 +00:00
|
|
|
|
2008-12-03 21:41:36 +00:00
|
|
|
dev_set_name(&conn->dev, "connection%d:%u", session->sid, cid);
|
2006-01-14 00:05:50 +00:00
|
|
|
conn->dev.parent = &session->dev;
|
|
|
|
conn->dev.release = iscsi_conn_release;
|
|
|
|
err = device_register(&conn->dev);
|
|
|
|
if (err) {
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_session_printk(KERN_ERR, session, "could not "
|
|
|
|
"register connection's dev\n");
|
2006-01-14 00:05:50 +00:00
|
|
|
goto release_parent_ref;
|
|
|
|
}
|
scsi: iscsi: Fail session and connection on transport registration failure
If the transport cannot be registered, the session/connection creation
needs to be failed early to let the initiator know. Otherwise, the system
will have an outstanding connection that cannot be used nor removed by
open-iscsi. The result is similar to the error below, triggered by
injecting a failure in the transport's registration path.
openiscsi reports success:
root@debian-vm:~# iscsiadm -m node -T iqn:lun1 -p 127.0.0.1 -l
Logging in to [iface: default, target: iqn:lun1, portal: 127.0.0.1,3260]
Login to [iface: default, target: iqn:lun1, portal:127.0.0.1,3260] successful.
But cannot remove the session afterwards, since the kernel is in an
inconsistent state.
root@debian-vm:~# iscsiadm -m node -T iqn:lun1 -p 127.0.0.1 -u
iscsiadm: No matching sessions found
Link: https://lore.kernel.org/r/20200106185817.640331-4-krisman@collabora.com
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-01-06 18:58:17 +00:00
|
|
|
err = transport_register_device(&conn->dev);
|
|
|
|
if (err) {
|
|
|
|
iscsi_cls_session_printk(KERN_ERR, session, "could not "
|
|
|
|
"register transport's dev\n");
|
|
|
|
goto release_conn_ref;
|
|
|
|
}
|
2007-12-13 18:43:29 +00:00
|
|
|
|
|
|
|
spin_lock_irqsave(&connlock, flags);
|
|
|
|
list_add(&conn->conn_list, &connlist);
|
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
2009-08-20 20:11:01 +00:00
|
|
|
|
|
|
|
ISCSI_DBG_TRANS_CONN(conn, "Completed conn creation\n");
|
2006-01-14 00:05:50 +00:00
|
|
|
return conn;
|
|
|
|
|
scsi: iscsi: Fail session and connection on transport registration failure
If the transport cannot be registered, the session/connection creation
needs to be failed early to let the initiator know. Otherwise, the system
will have an outstanding connection that cannot be used nor removed by
open-iscsi. The result is similar to the error below, triggered by
injecting a failure in the transport's registration path.
openiscsi reports success:
root@debian-vm:~# iscsiadm -m node -T iqn:lun1 -p 127.0.0.1 -l
Logging in to [iface: default, target: iqn:lun1, portal: 127.0.0.1,3260]
Login to [iface: default, target: iqn:lun1, portal:127.0.0.1,3260] successful.
But cannot remove the session afterwards, since the kernel is in an
inconsistent state.
root@debian-vm:~# iscsiadm -m node -T iqn:lun1 -p 127.0.0.1 -u
iscsiadm: No matching sessions found
Link: https://lore.kernel.org/r/20200106185817.640331-4-krisman@collabora.com
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-01-06 18:58:17 +00:00
|
|
|
release_conn_ref:
|
2020-11-20 07:48:52 +00:00
|
|
|
device_unregister(&conn->dev);
|
|
|
|
put_device(&session->dev);
|
|
|
|
return NULL;
|
2006-01-14 00:05:50 +00:00
|
|
|
release_parent_ref:
|
|
|
|
put_device(&session->dev);
|
|
|
|
free_conn:
|
|
|
|
kfree(conn);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_create_conn);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iscsi_destroy_conn - destroy iscsi class connection
|
2007-11-03 18:30:39 +00:00
|
|
|
* @conn: iscsi cls session
|
2006-01-14 00:05:50 +00:00
|
|
|
*
|
2007-12-13 18:43:29 +00:00
|
|
|
* This can be called from a LLD or iscsi_transport.
|
2007-11-03 18:30:39 +00:00
|
|
|
*/
|
2006-01-14 00:05:50 +00:00
|
|
|
int iscsi_destroy_conn(struct iscsi_cls_conn *conn)
|
|
|
|
{
|
2007-12-13 18:43:29 +00:00
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&connlock, flags);
|
|
|
|
list_del(&conn->conn_list);
|
2020-01-25 06:19:25 +00:00
|
|
|
list_del(&conn->conn_list_err);
|
2007-12-13 18:43:29 +00:00
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
transport_unregister_device(&conn->dev);
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_CONN(conn, "Completing conn destruction\n");
|
2006-01-14 00:05:50 +00:00
|
|
|
device_unregister(&conn->dev);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_destroy_conn);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* iscsi interface functions
|
|
|
|
*/
|
2005-08-05 02:33:07 +00:00
|
|
|
static struct iscsi_internal *
|
|
|
|
iscsi_if_transport_lookup(struct iscsi_transport *tt)
|
|
|
|
{
|
|
|
|
struct iscsi_internal *priv;
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&iscsi_transport_lock, flags);
|
|
|
|
list_for_each_entry(priv, &iscsi_transports, list) {
|
|
|
|
if (tt == priv->iscsi_transport) {
|
|
|
|
spin_unlock_irqrestore(&iscsi_transport_lock, flags);
|
|
|
|
return priv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&iscsi_transport_lock, flags);
|
|
|
|
return NULL;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2006-06-28 17:00:32 +00:00
|
|
|
static int
|
2009-06-09 01:14:41 +00:00
|
|
|
iscsi_multicast_skb(struct sk_buff *skb, uint32_t group, gfp_t gfp)
|
2006-06-28 17:00:32 +00:00
|
|
|
{
|
2009-06-09 01:14:41 +00:00
|
|
|
return nlmsg_multicast(nls, skb, 0, group, gfp);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2018-04-09 22:15:28 +00:00
|
|
|
static int
|
|
|
|
iscsi_unicast_skb(struct sk_buff *skb, u32 portid)
|
|
|
|
{
|
|
|
|
return nlmsg_unicast(nls, skb, portid);
|
|
|
|
}
|
|
|
|
|
2006-02-02 03:06:49 +00:00
|
|
|
int iscsi_recv_pdu(struct iscsi_cls_conn *conn, struct iscsi_hdr *hdr,
|
2005-08-05 02:33:07 +00:00
|
|
|
char *data, uint32_t data_size)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2005-08-05 02:33:07 +00:00
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct iscsi_uevent *ev;
|
|
|
|
char *pdu;
|
2006-05-19 01:31:39 +00:00
|
|
|
struct iscsi_internal *priv;
|
2013-03-27 06:53:15 +00:00
|
|
|
int len = nlmsg_total_size(sizeof(*ev) + sizeof(struct iscsi_hdr) +
|
|
|
|
data_size);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-05-19 01:31:39 +00:00
|
|
|
priv = iscsi_if_transport_lookup(conn->transport);
|
|
|
|
if (!priv)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2006-10-16 22:09:38 +00:00
|
|
|
skb = alloc_skb(len, GFP_ATOMIC);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (!skb) {
|
2008-09-24 16:46:10 +00:00
|
|
|
iscsi_conn_error_event(conn, ISCSI_ERR_CONN_FAILED);
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_conn_printk(KERN_ERR, conn, "can not deliver "
|
|
|
|
"control PDU: OOM\n");
|
2005-08-05 02:33:07 +00:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
nlh = __nlmsg_put(skb, 0, 0, 0, (len - sizeof(*nlh)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
ev = nlmsg_data(nlh);
|
2005-08-05 02:33:07 +00:00
|
|
|
memset(ev, 0, sizeof(*ev));
|
|
|
|
ev->transport_handle = iscsi_handle(conn->transport);
|
|
|
|
ev->type = ISCSI_KEVENT_RECV_PDU;
|
2006-04-07 02:13:33 +00:00
|
|
|
ev->r.recv_req.cid = conn->cid;
|
|
|
|
ev->r.recv_req.sid = iscsi_conn_get_sid(conn);
|
2005-08-05 02:33:07 +00:00
|
|
|
pdu = (char*)ev + sizeof(*ev);
|
|
|
|
memcpy(pdu, hdr, sizeof(struct iscsi_hdr));
|
|
|
|
memcpy(pdu + sizeof(struct iscsi_hdr), data, data_size);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
return iscsi_multicast_skb(skb, ISCSI_NL_GRP_ISCSID, GFP_ATOMIC);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2005-08-05 02:33:07 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_recv_pdu);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
int iscsi_offload_mesg(struct Scsi_Host *shost,
|
|
|
|
struct iscsi_transport *transport, uint32_t type,
|
|
|
|
char *data, uint16_t data_size)
|
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct iscsi_uevent *ev;
|
2013-03-27 06:53:15 +00:00
|
|
|
int len = nlmsg_total_size(sizeof(*ev) + data_size);
|
2009-06-09 01:14:41 +00:00
|
|
|
|
2009-07-29 08:49:52 +00:00
|
|
|
skb = alloc_skb(len, GFP_ATOMIC);
|
2009-06-09 01:14:41 +00:00
|
|
|
if (!skb) {
|
|
|
|
printk(KERN_ERR "can not deliver iscsi offload message:OOM\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
nlh = __nlmsg_put(skb, 0, 0, 0, (len - sizeof(*nlh)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
ev = nlmsg_data(nlh);
|
2009-06-09 01:14:41 +00:00
|
|
|
memset(ev, 0, sizeof(*ev));
|
|
|
|
ev->type = type;
|
|
|
|
ev->transport_handle = iscsi_handle(transport);
|
|
|
|
switch (type) {
|
|
|
|
case ISCSI_KEVENT_PATH_REQ:
|
|
|
|
ev->r.req_path.host_no = shost->host_no;
|
|
|
|
break;
|
|
|
|
case ISCSI_KEVENT_IF_DOWN:
|
|
|
|
ev->r.notify_if_down.host_no = shost->host_no;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy((char *)ev + sizeof(*ev), data, data_size);
|
|
|
|
|
2009-07-29 08:49:52 +00:00
|
|
|
return iscsi_multicast_skb(skb, ISCSI_NL_GRP_UIP, GFP_ATOMIC);
|
2009-06-09 01:14:41 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_offload_mesg);
|
|
|
|
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
/*
|
|
|
|
* This can be called without the rx_queue_mutex, if invoked by the kernel
|
|
|
|
* stop work. But, in that case, it is guaranteed not to race with
|
|
|
|
* iscsi_destroy by conn_mutex.
|
|
|
|
*/
|
|
|
|
static void iscsi_if_stop_conn(struct iscsi_cls_conn *conn, int flag)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* It is important that this path doesn't rely on
|
|
|
|
* rx_queue_mutex, otherwise, a thread doing allocation on a
|
|
|
|
* start_session/start_connection could sleep waiting on a
|
|
|
|
* writeback to a failed iscsi device, that cannot be recovered
|
|
|
|
* because the lock is held. If we don't hold it here, the
|
|
|
|
* kernel stop_conn_work_fn has a chance to stop the broken
|
|
|
|
* session and resolve the allocation.
|
|
|
|
*
|
|
|
|
* Still, the user invoked .stop_conn() needs to be serialized
|
|
|
|
* with stop_conn_work_fn by a private mutex. Not pretty, but
|
|
|
|
* it works.
|
|
|
|
*/
|
|
|
|
mutex_lock(&conn_mutex);
|
2021-04-06 17:17:46 +00:00
|
|
|
switch (flag) {
|
|
|
|
case STOP_CONN_RECOVER:
|
|
|
|
conn->state = ISCSI_CONN_FAILED;
|
|
|
|
break;
|
|
|
|
case STOP_CONN_TERM:
|
|
|
|
conn->state = ISCSI_CONN_DOWN;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
iscsi_cls_conn_printk(KERN_ERR, conn,
|
|
|
|
"invalid stop flag %d\n", flag);
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
conn->transport->stop_conn(conn, flag);
|
2021-04-06 17:17:46 +00:00
|
|
|
unlock:
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
mutex_unlock(&conn_mutex);
|
|
|
|
}
|
|
|
|
|
2020-01-25 06:19:25 +00:00
|
|
|
static void stop_conn_work_fn(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_conn *conn, *tmp;
|
|
|
|
unsigned long flags;
|
|
|
|
LIST_HEAD(recovery_list);
|
|
|
|
|
|
|
|
spin_lock_irqsave(&connlock, flags);
|
|
|
|
if (list_empty(&connlist_err)) {
|
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
list_splice_init(&connlist_err, &recovery_list);
|
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
|
|
|
|
list_for_each_entry_safe(conn, tmp, &recovery_list, conn_list_err) {
|
|
|
|
uint32_t sid = iscsi_conn_get_sid(conn);
|
|
|
|
struct iscsi_cls_session *session;
|
|
|
|
|
|
|
|
session = iscsi_session_lookup(sid);
|
|
|
|
if (session) {
|
|
|
|
if (system_state != SYSTEM_RUNNING) {
|
|
|
|
session->recovery_tmo = 0;
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
iscsi_if_stop_conn(conn, STOP_CONN_TERM);
|
2020-01-25 06:19:25 +00:00
|
|
|
} else {
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
iscsi_if_stop_conn(conn, STOP_CONN_RECOVER);
|
2020-01-25 06:19:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
list_del_init(&conn->conn_list_err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-09-24 16:46:10 +00:00
|
|
|
void iscsi_conn_error_event(struct iscsi_cls_conn *conn, enum iscsi_err error)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2005-08-05 02:33:07 +00:00
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct iscsi_uevent *ev;
|
2006-05-19 01:31:39 +00:00
|
|
|
struct iscsi_internal *priv;
|
2013-03-27 06:53:15 +00:00
|
|
|
int len = nlmsg_total_size(sizeof(*ev));
|
2020-01-25 06:19:25 +00:00
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&connlock, flags);
|
|
|
|
list_add(&conn->conn_list_err, &connlist_err);
|
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
queue_work(system_unbound_wq, &stop_conn_work);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-05-19 01:31:39 +00:00
|
|
|
priv = iscsi_if_transport_lookup(conn->transport);
|
|
|
|
if (!priv)
|
|
|
|
return;
|
|
|
|
|
2006-10-16 22:09:38 +00:00
|
|
|
skb = alloc_skb(len, GFP_ATOMIC);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (!skb) {
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_conn_printk(KERN_ERR, conn, "gracefully ignored "
|
|
|
|
"conn error (%d)\n", error);
|
2005-08-05 02:33:07 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
nlh = __nlmsg_put(skb, 0, 0, 0, (len - sizeof(*nlh)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
ev = nlmsg_data(nlh);
|
2005-08-05 02:33:07 +00:00
|
|
|
ev->transport_handle = iscsi_handle(conn->transport);
|
|
|
|
ev->type = ISCSI_KEVENT_CONN_ERROR;
|
|
|
|
ev->r.connerror.error = error;
|
2006-04-07 02:13:33 +00:00
|
|
|
ev->r.connerror.cid = conn->cid;
|
|
|
|
ev->r.connerror.sid = iscsi_conn_get_sid(conn);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
iscsi_multicast_skb(skb, ISCSI_NL_GRP_ISCSID, GFP_ATOMIC);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_conn_printk(KERN_INFO, conn, "detected conn error (%d)\n",
|
|
|
|
error);
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
2008-09-24 16:46:10 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_conn_error_event);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2011-07-25 18:48:52 +00:00
|
|
|
void iscsi_conn_login_event(struct iscsi_cls_conn *conn,
|
|
|
|
enum iscsi_conn_state state)
|
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct iscsi_uevent *ev;
|
|
|
|
struct iscsi_internal *priv;
|
2013-03-27 06:53:15 +00:00
|
|
|
int len = nlmsg_total_size(sizeof(*ev));
|
2011-07-25 18:48:52 +00:00
|
|
|
|
|
|
|
priv = iscsi_if_transport_lookup(conn->transport);
|
|
|
|
if (!priv)
|
|
|
|
return;
|
|
|
|
|
|
|
|
skb = alloc_skb(len, GFP_ATOMIC);
|
|
|
|
if (!skb) {
|
|
|
|
iscsi_cls_conn_printk(KERN_ERR, conn, "gracefully ignored "
|
|
|
|
"conn login (%d)\n", state);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nlh = __nlmsg_put(skb, 0, 0, 0, (len - sizeof(*nlh)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
ev = nlmsg_data(nlh);
|
2011-07-25 18:48:52 +00:00
|
|
|
ev->transport_handle = iscsi_handle(conn->transport);
|
|
|
|
ev->type = ISCSI_KEVENT_CONN_LOGIN_STATE;
|
|
|
|
ev->r.conn_login.state = state;
|
|
|
|
ev->r.conn_login.cid = conn->cid;
|
|
|
|
ev->r.conn_login.sid = iscsi_conn_get_sid(conn);
|
|
|
|
iscsi_multicast_skb(skb, ISCSI_NL_GRP_ISCSID, GFP_ATOMIC);
|
|
|
|
|
|
|
|
iscsi_cls_conn_printk(KERN_INFO, conn, "detected conn login (%d)\n",
|
|
|
|
state);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_conn_login_event);
|
|
|
|
|
2012-02-13 13:00:46 +00:00
|
|
|
void iscsi_post_host_event(uint32_t host_no, struct iscsi_transport *transport,
|
|
|
|
enum iscsi_host_event_code code, uint32_t data_size,
|
|
|
|
uint8_t *data)
|
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct iscsi_uevent *ev;
|
2013-03-27 06:53:15 +00:00
|
|
|
int len = nlmsg_total_size(sizeof(*ev) + data_size);
|
2012-02-13 13:00:46 +00:00
|
|
|
|
2012-03-06 22:09:01 +00:00
|
|
|
skb = alloc_skb(len, GFP_NOIO);
|
2012-02-13 13:00:46 +00:00
|
|
|
if (!skb) {
|
|
|
|
printk(KERN_ERR "gracefully ignored host event (%d):%d OOM\n",
|
|
|
|
host_no, code);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nlh = __nlmsg_put(skb, 0, 0, 0, (len - sizeof(*nlh)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
ev = nlmsg_data(nlh);
|
2012-02-13 13:00:46 +00:00
|
|
|
ev->transport_handle = iscsi_handle(transport);
|
|
|
|
ev->type = ISCSI_KEVENT_HOST_EVENT;
|
|
|
|
ev->r.host_event.host_no = host_no;
|
|
|
|
ev->r.host_event.code = code;
|
|
|
|
ev->r.host_event.data_size = data_size;
|
|
|
|
|
|
|
|
if (data_size)
|
|
|
|
memcpy((char *)ev + sizeof(*ev), data, data_size);
|
|
|
|
|
2012-03-06 22:09:01 +00:00
|
|
|
iscsi_multicast_skb(skb, ISCSI_NL_GRP_ISCSID, GFP_NOIO);
|
2012-02-13 13:00:46 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_post_host_event);
|
|
|
|
|
2012-02-13 13:00:48 +00:00
|
|
|
void iscsi_ping_comp_event(uint32_t host_no, struct iscsi_transport *transport,
|
|
|
|
uint32_t status, uint32_t pid, uint32_t data_size,
|
|
|
|
uint8_t *data)
|
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct iscsi_uevent *ev;
|
2013-03-27 06:53:15 +00:00
|
|
|
int len = nlmsg_total_size(sizeof(*ev) + data_size);
|
2012-02-13 13:00:48 +00:00
|
|
|
|
2012-03-06 22:09:01 +00:00
|
|
|
skb = alloc_skb(len, GFP_NOIO);
|
2012-02-13 13:00:48 +00:00
|
|
|
if (!skb) {
|
|
|
|
printk(KERN_ERR "gracefully ignored ping comp: OOM\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nlh = __nlmsg_put(skb, 0, 0, 0, (len - sizeof(*nlh)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
ev = nlmsg_data(nlh);
|
2012-02-13 13:00:48 +00:00
|
|
|
ev->transport_handle = iscsi_handle(transport);
|
|
|
|
ev->type = ISCSI_KEVENT_PING_COMP;
|
|
|
|
ev->r.ping_comp.host_no = host_no;
|
|
|
|
ev->r.ping_comp.status = status;
|
|
|
|
ev->r.ping_comp.pid = pid;
|
|
|
|
ev->r.ping_comp.data_size = data_size;
|
|
|
|
memcpy((char *)ev + sizeof(*ev), data, data_size);
|
|
|
|
|
2012-03-06 22:09:01 +00:00
|
|
|
iscsi_multicast_skb(skb, ISCSI_NL_GRP_ISCSID, GFP_NOIO);
|
2012-02-13 13:00:48 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_ping_comp_event);
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
static int
|
2018-04-09 22:15:28 +00:00
|
|
|
iscsi_if_send_reply(u32 portid, int type, void *payload, int size)
|
2005-08-05 02:33:07 +00:00
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct nlmsghdr *nlh;
|
2013-03-27 06:53:15 +00:00
|
|
|
int len = nlmsg_total_size(size);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-10-16 22:09:38 +00:00
|
|
|
skb = alloc_skb(len, GFP_ATOMIC);
|
2007-05-30 17:57:07 +00:00
|
|
|
if (!skb) {
|
|
|
|
printk(KERN_ERR "Could not allocate skb to send reply.\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2018-04-09 22:15:28 +00:00
|
|
|
nlh = __nlmsg_put(skb, 0, 0, type, (len - sizeof(*nlh)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
memcpy(nlmsg_data(nlh), payload, size);
|
2018-04-09 22:15:28 +00:00
|
|
|
return iscsi_unicast_skb(skb, portid);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
static int
|
2006-02-02 03:06:56 +00:00
|
|
|
iscsi_if_get_stats(struct iscsi_transport *transport, struct nlmsghdr *nlh)
|
2006-01-14 00:05:50 +00:00
|
|
|
{
|
2013-03-27 06:53:15 +00:00
|
|
|
struct iscsi_uevent *ev = nlmsg_data(nlh);
|
2006-01-14 00:05:50 +00:00
|
|
|
struct iscsi_stats *stats;
|
|
|
|
struct sk_buff *skbstat;
|
|
|
|
struct iscsi_cls_conn *conn;
|
|
|
|
struct nlmsghdr *nlhstat;
|
|
|
|
struct iscsi_uevent *evstat;
|
2006-05-19 01:31:39 +00:00
|
|
|
struct iscsi_internal *priv;
|
2013-03-27 06:53:15 +00:00
|
|
|
int len = nlmsg_total_size(sizeof(*ev) +
|
|
|
|
sizeof(struct iscsi_stats) +
|
|
|
|
sizeof(struct iscsi_stats_custom) *
|
|
|
|
ISCSI_STATS_CUSTOM_MAX);
|
2006-01-14 00:05:50 +00:00
|
|
|
int err = 0;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-05-19 01:31:39 +00:00
|
|
|
priv = iscsi_if_transport_lookup(transport);
|
|
|
|
if (!priv)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2006-04-07 02:13:33 +00:00
|
|
|
conn = iscsi_conn_lookup(ev->u.get_stats.sid, ev->u.get_stats.cid);
|
2006-01-14 00:05:50 +00:00
|
|
|
if (!conn)
|
|
|
|
return -EEXIST;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
do {
|
|
|
|
int actual_size;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-10-16 22:09:38 +00:00
|
|
|
skbstat = alloc_skb(len, GFP_ATOMIC);
|
2006-01-14 00:05:50 +00:00
|
|
|
if (!skbstat) {
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_conn_printk(KERN_ERR, conn, "can not "
|
|
|
|
"deliver stats: OOM\n");
|
2006-01-14 00:05:50 +00:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
nlhstat = __nlmsg_put(skbstat, 0, 0, 0,
|
2006-01-14 00:05:50 +00:00
|
|
|
(len - sizeof(*nlhstat)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
evstat = nlmsg_data(nlhstat);
|
2006-01-14 00:05:50 +00:00
|
|
|
memset(evstat, 0, sizeof(*evstat));
|
|
|
|
evstat->transport_handle = iscsi_handle(conn->transport);
|
|
|
|
evstat->type = nlh->nlmsg_type;
|
2006-04-07 02:13:33 +00:00
|
|
|
evstat->u.get_stats.cid =
|
|
|
|
ev->u.get_stats.cid;
|
|
|
|
evstat->u.get_stats.sid =
|
|
|
|
ev->u.get_stats.sid;
|
2006-01-14 00:05:50 +00:00
|
|
|
stats = (struct iscsi_stats *)
|
|
|
|
((char*)evstat + sizeof(*evstat));
|
|
|
|
memset(stats, 0, sizeof(*stats));
|
|
|
|
|
2006-02-02 03:06:49 +00:00
|
|
|
transport->get_stats(conn, stats);
|
2013-03-27 06:53:15 +00:00
|
|
|
actual_size = nlmsg_total_size(sizeof(struct iscsi_uevent) +
|
|
|
|
sizeof(struct iscsi_stats) +
|
|
|
|
sizeof(struct iscsi_stats_custom) *
|
|
|
|
stats->custom_length);
|
2006-01-14 00:05:50 +00:00
|
|
|
actual_size -= sizeof(*nlhstat);
|
2013-03-27 06:53:15 +00:00
|
|
|
actual_size = nlmsg_msg_size(actual_size);
|
2006-02-02 03:06:56 +00:00
|
|
|
skb_trim(skbstat, NLMSG_ALIGN(actual_size));
|
2006-01-14 00:05:50 +00:00
|
|
|
nlhstat->nlmsg_len = actual_size;
|
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
err = iscsi_multicast_skb(skbstat, ISCSI_NL_GRP_ISCSID,
|
|
|
|
GFP_ATOMIC);
|
2006-01-14 00:05:50 +00:00
|
|
|
} while (err < 0 && err != -ECONNREFUSED);
|
|
|
|
|
|
|
|
return err;
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
|
|
|
|
2006-06-28 17:00:32 +00:00
|
|
|
/**
|
2007-12-13 18:43:29 +00:00
|
|
|
* iscsi_session_event - send session destr. completion event
|
|
|
|
* @session: iscsi class session
|
|
|
|
* @event: type of event
|
2007-11-03 18:30:39 +00:00
|
|
|
*/
|
2007-12-13 18:43:29 +00:00
|
|
|
int iscsi_session_event(struct iscsi_cls_session *session,
|
|
|
|
enum iscsi_uevent_e event)
|
2006-06-28 17:00:32 +00:00
|
|
|
{
|
|
|
|
struct iscsi_internal *priv;
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_uevent *ev;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct nlmsghdr *nlh;
|
2013-03-27 06:53:15 +00:00
|
|
|
int rc, len = nlmsg_total_size(sizeof(*ev));
|
2006-06-28 17:00:32 +00:00
|
|
|
|
2007-12-13 18:43:29 +00:00
|
|
|
priv = iscsi_if_transport_lookup(session->transport);
|
2006-06-28 17:00:32 +00:00
|
|
|
if (!priv)
|
|
|
|
return -EINVAL;
|
|
|
|
shost = iscsi_session_to_shost(session);
|
|
|
|
|
2006-10-16 22:09:38 +00:00
|
|
|
skb = alloc_skb(len, GFP_KERNEL);
|
2006-06-28 17:00:32 +00:00
|
|
|
if (!skb) {
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_session_printk(KERN_ERR, session,
|
|
|
|
"Cannot notify userspace of session "
|
|
|
|
"event %u\n", event);
|
2006-06-28 17:00:32 +00:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
nlh = __nlmsg_put(skb, 0, 0, 0, (len - sizeof(*nlh)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
ev = nlmsg_data(nlh);
|
2007-12-13 18:43:29 +00:00
|
|
|
ev->transport_handle = iscsi_handle(session->transport);
|
2006-06-28 17:00:32 +00:00
|
|
|
|
2007-12-13 18:43:29 +00:00
|
|
|
ev->type = event;
|
|
|
|
switch (event) {
|
|
|
|
case ISCSI_KEVENT_DESTROY_SESSION:
|
|
|
|
ev->r.d_session.host_no = shost->host_no;
|
|
|
|
ev->r.d_session.sid = session->sid;
|
|
|
|
break;
|
|
|
|
case ISCSI_KEVENT_CREATE_SESSION:
|
|
|
|
ev->r.c_session_ret.host_no = shost->host_no;
|
|
|
|
ev->r.c_session_ret.sid = session->sid;
|
|
|
|
break;
|
|
|
|
case ISCSI_KEVENT_UNBIND_SESSION:
|
|
|
|
ev->r.unbind_session.host_no = shost->host_no;
|
|
|
|
ev->r.unbind_session.sid = session->sid;
|
|
|
|
break;
|
|
|
|
default:
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_session_printk(KERN_ERR, session, "Invalid event "
|
|
|
|
"%u.\n", event);
|
2007-12-13 18:43:29 +00:00
|
|
|
kfree_skb(skb);
|
2006-06-28 17:00:32 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* this will occur if the daemon is not up, so we just warn
|
|
|
|
* the user and when the daemon is restarted it will handle it
|
|
|
|
*/
|
2009-06-09 01:14:41 +00:00
|
|
|
rc = iscsi_multicast_skb(skb, ISCSI_NL_GRP_ISCSID, GFP_KERNEL);
|
netlink: change return-value logic of netlink_broadcast()
Currently, netlink_broadcast() reports errors to the caller if no
messages at all were delivered:
1) If, at least, one message has been delivered correctly, returns 0.
2) Otherwise, if no messages at all were delivered due to skb_clone()
failure, return -ENOBUFS.
3) Otherwise, if there are no listeners, return -ESRCH.
With this patch, the caller knows if the delivery of any of the
messages to the listeners have failed:
1) If it fails to deliver any message (for whatever reason), return
-ENOBUFS.
2) Otherwise, if all messages were delivered OK, returns 0.
3) Otherwise, if no listeners, return -ESRCH.
In the current ctnetlink code and in Netfilter in general, we can add
reliable logging and connection tracking event delivery by dropping the
packets whose events were not successfully delivered over Netlink. Of
course, this option would be settable via /proc as this approach reduces
performance (in terms of filtered connections per seconds by a stateful
firewall) but providing reliable logging and event delivery (for
conntrackd) in return.
This patch also changes some clients of netlink_broadcast() that
may report ENOBUFS errors via printk. This error handling is not
of any help. Instead, the userspace daemons that are listening to
those netlink messages should resync themselves with the kernel-side
if they hit ENOBUFS.
BTW, netlink_broadcast() clients include those that call
cn_netlink_send(), nlmsg_multicast() and genlmsg_multicast() since they
internally call netlink_broadcast() and return its error value.
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-02-06 07:56:36 +00:00
|
|
|
if (rc == -ESRCH)
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_session_printk(KERN_ERR, session,
|
|
|
|
"Cannot notify userspace of session "
|
|
|
|
"event %u. Check iscsi daemon\n",
|
|
|
|
event);
|
2009-08-20 20:11:01 +00:00
|
|
|
|
|
|
|
ISCSI_DBG_TRANS_SESSION(session, "Completed handling event %d rc %d\n",
|
|
|
|
event, rc);
|
2006-06-28 17:00:32 +00:00
|
|
|
return rc;
|
|
|
|
}
|
2007-12-13 18:43:29 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_session_event);
|
2006-06-28 17:00:32 +00:00
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
static int
|
2008-05-21 20:54:13 +00:00
|
|
|
iscsi_if_create_session(struct iscsi_internal *priv, struct iscsi_endpoint *ep,
|
2011-12-05 22:44:01 +00:00
|
|
|
struct iscsi_uevent *ev, pid_t pid,
|
|
|
|
uint32_t initial_cmdsn, uint16_t cmds_max,
|
|
|
|
uint16_t queue_depth)
|
2005-08-05 02:33:07 +00:00
|
|
|
{
|
|
|
|
struct iscsi_transport *transport = priv->iscsi_transport;
|
2006-02-02 03:06:49 +00:00
|
|
|
struct iscsi_cls_session *session;
|
2009-03-05 20:46:06 +00:00
|
|
|
struct Scsi_Host *shost;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2008-05-21 20:54:13 +00:00
|
|
|
session = transport->create_session(ep, cmds_max, queue_depth,
|
2009-03-05 20:46:06 +00:00
|
|
|
initial_cmdsn);
|
2006-02-02 03:06:49 +00:00
|
|
|
if (!session)
|
2006-01-14 00:05:50 +00:00
|
|
|
return -ENOMEM;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2011-12-05 22:44:01 +00:00
|
|
|
session->creator = pid;
|
2009-03-05 20:46:06 +00:00
|
|
|
shost = iscsi_session_to_shost(session);
|
|
|
|
ev->r.c_session_ret.host_no = shost->host_no;
|
2006-04-07 02:13:33 +00:00
|
|
|
ev->r.c_session_ret.sid = session->sid;
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_SESSION(session,
|
|
|
|
"Completed creating transport session\n");
|
2005-08-05 02:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2006-02-02 03:06:49 +00:00
|
|
|
iscsi_if_create_conn(struct iscsi_transport *transport, struct iscsi_uevent *ev)
|
2005-08-05 02:33:07 +00:00
|
|
|
{
|
2006-01-14 00:05:50 +00:00
|
|
|
struct iscsi_cls_conn *conn;
|
2006-02-02 03:06:49 +00:00
|
|
|
struct iscsi_cls_session *session;
|
2006-01-14 00:05:50 +00:00
|
|
|
|
2006-04-07 02:13:33 +00:00
|
|
|
session = iscsi_session_lookup(ev->u.c_conn.sid);
|
|
|
|
if (!session) {
|
2008-01-31 19:36:52 +00:00
|
|
|
printk(KERN_ERR "iscsi: invalid session %d.\n",
|
2006-04-07 02:13:33 +00:00
|
|
|
ev->u.c_conn.sid);
|
2006-01-14 00:05:50 +00:00
|
|
|
return -EINVAL;
|
2006-04-07 02:13:33 +00:00
|
|
|
}
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-02-02 03:06:49 +00:00
|
|
|
conn = transport->create_conn(session, ev->u.c_conn.cid);
|
2006-04-07 02:13:33 +00:00
|
|
|
if (!conn) {
|
2008-01-31 19:36:52 +00:00
|
|
|
iscsi_cls_session_printk(KERN_ERR, session,
|
|
|
|
"couldn't create a new connection.");
|
2006-02-02 03:06:49 +00:00
|
|
|
return -ENOMEM;
|
2006-04-07 02:13:33 +00:00
|
|
|
}
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-04-07 02:13:33 +00:00
|
|
|
ev->r.c_conn_ret.sid = session->sid;
|
|
|
|
ev->r.c_conn_ret.cid = conn->cid;
|
2009-08-20 20:11:01 +00:00
|
|
|
|
|
|
|
ISCSI_DBG_TRANS_CONN(conn, "Completed creating transport conn\n");
|
2005-08-05 02:33:07 +00:00
|
|
|
return 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
static int
|
|
|
|
iscsi_if_destroy_conn(struct iscsi_transport *transport, struct iscsi_uevent *ev)
|
|
|
|
{
|
2006-01-14 00:05:50 +00:00
|
|
|
struct iscsi_cls_conn *conn;
|
2020-01-25 06:19:25 +00:00
|
|
|
unsigned long flags;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-04-07 02:13:33 +00:00
|
|
|
conn = iscsi_conn_lookup(ev->u.d_conn.sid, ev->u.d_conn.cid);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (!conn)
|
2006-01-14 00:05:50 +00:00
|
|
|
return -EINVAL;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2020-01-25 06:19:25 +00:00
|
|
|
spin_lock_irqsave(&connlock, flags);
|
|
|
|
if (!list_empty(&conn->conn_list_err)) {
|
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
return -EAGAIN;
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
|
2009-08-20 20:11:01 +00:00
|
|
|
ISCSI_DBG_TRANS_CONN(conn, "Destroying transport conn\n");
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
|
|
|
|
mutex_lock(&conn_mutex);
|
2006-01-14 00:05:50 +00:00
|
|
|
if (transport->destroy_conn)
|
|
|
|
transport->destroy_conn(conn);
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
mutex_unlock(&conn_mutex);
|
2009-08-20 20:11:01 +00:00
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
return 0;
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
|
|
|
|
2006-04-07 02:13:36 +00:00
|
|
|
static int
|
|
|
|
iscsi_set_param(struct iscsi_transport *transport, struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
char *data = (char*)ev + sizeof(*ev);
|
|
|
|
struct iscsi_cls_conn *conn;
|
|
|
|
struct iscsi_cls_session *session;
|
2006-06-28 17:00:23 +00:00
|
|
|
int err = 0, value = 0;
|
2006-04-07 02:13:36 +00:00
|
|
|
|
2021-02-24 02:00:17 +00:00
|
|
|
if (ev->u.set_param.len > PAGE_SIZE)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2006-04-07 02:13:36 +00:00
|
|
|
session = iscsi_session_lookup(ev->u.set_param.sid);
|
|
|
|
conn = iscsi_conn_lookup(ev->u.set_param.sid, ev->u.set_param.cid);
|
|
|
|
if (!conn || !session)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
switch (ev->u.set_param.param) {
|
2006-04-07 02:13:39 +00:00
|
|
|
case ISCSI_PARAM_SESS_RECOVERY_TMO:
|
2006-06-28 17:00:23 +00:00
|
|
|
sscanf(data, "%d", &value);
|
2015-06-16 23:07:13 +00:00
|
|
|
if (!session->recovery_tmo_sysfs_override)
|
|
|
|
session->recovery_tmo = value;
|
2006-04-07 02:13:39 +00:00
|
|
|
break;
|
2006-04-07 02:13:36 +00:00
|
|
|
default:
|
2006-06-28 17:00:23 +00:00
|
|
|
err = transport->set_param(conn, ev->u.set_param.param,
|
|
|
|
data, ev->u.set_param.len);
|
2021-03-25 09:32:48 +00:00
|
|
|
if ((conn->state == ISCSI_CONN_BOUND) ||
|
|
|
|
(conn->state == ISCSI_CONN_UP)) {
|
|
|
|
err = transport->set_param(conn, ev->u.set_param.param,
|
|
|
|
data, ev->u.set_param.len);
|
|
|
|
} else {
|
|
|
|
return -ENOTCONN;
|
|
|
|
}
|
2006-04-07 02:13:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2009-05-13 22:57:38 +00:00
|
|
|
static int iscsi_if_ep_connect(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev, int msg_type)
|
|
|
|
{
|
|
|
|
struct iscsi_endpoint *ep;
|
|
|
|
struct sockaddr *dst_addr;
|
|
|
|
struct Scsi_Host *shost = NULL;
|
|
|
|
int non_blocking, err = 0;
|
|
|
|
|
|
|
|
if (!transport->ep_connect)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (msg_type == ISCSI_UEVENT_TRANSPORT_EP_CONNECT_THROUGH_HOST) {
|
|
|
|
shost = scsi_host_lookup(ev->u.ep_connect_through_host.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
printk(KERN_ERR "ep connect failed. Could not find "
|
|
|
|
"host no %u\n",
|
|
|
|
ev->u.ep_connect_through_host.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
non_blocking = ev->u.ep_connect_through_host.non_blocking;
|
|
|
|
} else
|
|
|
|
non_blocking = ev->u.ep_connect.non_blocking;
|
|
|
|
|
|
|
|
dst_addr = (struct sockaddr *)((char*)ev + sizeof(*ev));
|
|
|
|
ep = transport->ep_connect(shost, dst_addr, non_blocking);
|
|
|
|
if (IS_ERR(ep)) {
|
|
|
|
err = PTR_ERR(ep);
|
|
|
|
goto release_host;
|
|
|
|
}
|
|
|
|
|
|
|
|
ev->r.ep_connect_ret.handle = ep->id;
|
|
|
|
release_host:
|
|
|
|
if (shost)
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2011-02-16 21:04:33 +00:00
|
|
|
static int iscsi_if_ep_disconnect(struct iscsi_transport *transport,
|
|
|
|
u64 ep_handle)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_conn *conn;
|
|
|
|
struct iscsi_endpoint *ep;
|
|
|
|
|
|
|
|
if (!transport->ep_disconnect)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
ep = iscsi_lookup_endpoint(ep_handle);
|
|
|
|
if (!ep)
|
|
|
|
return -EINVAL;
|
|
|
|
conn = ep->conn;
|
|
|
|
if (conn) {
|
|
|
|
mutex_lock(&conn->ep_mutex);
|
|
|
|
conn->ep = NULL;
|
|
|
|
mutex_unlock(&conn->ep_mutex);
|
2021-04-06 17:17:46 +00:00
|
|
|
conn->state = ISCSI_CONN_FAILED;
|
2011-02-16 21:04:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
transport->ep_disconnect(ep);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-05-03 00:46:36 +00:00
|
|
|
static int
|
|
|
|
iscsi_if_transport_ep(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev, int msg_type)
|
|
|
|
{
|
2008-05-21 20:54:13 +00:00
|
|
|
struct iscsi_endpoint *ep;
|
2006-05-03 00:46:36 +00:00
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
switch (msg_type) {
|
2009-05-13 22:57:38 +00:00
|
|
|
case ISCSI_UEVENT_TRANSPORT_EP_CONNECT_THROUGH_HOST:
|
2006-05-03 00:46:36 +00:00
|
|
|
case ISCSI_UEVENT_TRANSPORT_EP_CONNECT:
|
2009-05-13 22:57:38 +00:00
|
|
|
rc = iscsi_if_ep_connect(transport, ev, msg_type);
|
2006-05-03 00:46:36 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_TRANSPORT_EP_POLL:
|
|
|
|
if (!transport->ep_poll)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2008-05-21 20:54:13 +00:00
|
|
|
ep = iscsi_lookup_endpoint(ev->u.ep_poll.ep_handle);
|
|
|
|
if (!ep)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
ev->r.retcode = transport->ep_poll(ep,
|
2006-05-03 00:46:36 +00:00
|
|
|
ev->u.ep_poll.timeout_ms);
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_TRANSPORT_EP_DISCONNECT:
|
2011-02-16 21:04:33 +00:00
|
|
|
rc = iscsi_if_ep_disconnect(transport,
|
|
|
|
ev->u.ep_disconnect.ep_handle);
|
2006-05-03 00:46:36 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2006-06-28 17:00:22 +00:00
|
|
|
static int
|
|
|
|
iscsi_tgt_dscvr(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev)
|
|
|
|
{
|
2007-05-30 17:57:10 +00:00
|
|
|
struct Scsi_Host *shost;
|
2006-06-28 17:00:22 +00:00
|
|
|
struct sockaddr *dst_addr;
|
2007-05-30 17:57:10 +00:00
|
|
|
int err;
|
2006-06-28 17:00:22 +00:00
|
|
|
|
|
|
|
if (!transport->tgt_dscvr)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2007-05-30 17:57:10 +00:00
|
|
|
shost = scsi_host_lookup(ev->u.tgt_dscvr.host_no);
|
2008-08-08 00:49:30 +00:00
|
|
|
if (!shost) {
|
2007-05-30 17:57:10 +00:00
|
|
|
printk(KERN_ERR "target discovery could not find host no %u\n",
|
|
|
|
ev->u.tgt_dscvr.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-06-28 17:00:22 +00:00
|
|
|
dst_addr = (struct sockaddr *)((char*)ev + sizeof(*ev));
|
2007-05-30 17:57:10 +00:00
|
|
|
err = transport->tgt_dscvr(shost, ev->u.tgt_dscvr.type,
|
|
|
|
ev->u.tgt_dscvr.enable, dst_addr);
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
2006-06-28 17:00:22 +00:00
|
|
|
}
|
|
|
|
|
2007-05-30 17:57:11 +00:00
|
|
|
static int
|
|
|
|
iscsi_set_host_param(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
char *data = (char*)ev + sizeof(*ev);
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!transport->set_host_param)
|
|
|
|
return -ENOSYS;
|
|
|
|
|
2021-02-24 02:00:17 +00:00
|
|
|
if (ev->u.set_host_param.len > PAGE_SIZE)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2007-05-30 17:57:11 +00:00
|
|
|
shost = scsi_host_lookup(ev->u.set_host_param.host_no);
|
2008-08-08 00:49:30 +00:00
|
|
|
if (!shost) {
|
2007-05-30 17:57:11 +00:00
|
|
|
printk(KERN_ERR "set_host_param could not find host no %u\n",
|
|
|
|
ev->u.set_host_param.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = transport->set_host_param(shost, ev->u.set_host_param.param,
|
|
|
|
data, ev->u.set_host_param.len);
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
static int
|
2009-06-09 01:14:41 +00:00
|
|
|
iscsi_set_path(struct iscsi_transport *transport, struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_path *params;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!transport->set_path)
|
|
|
|
return -ENOSYS;
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.set_path.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
printk(KERN_ERR "set path could not find host no %u\n",
|
|
|
|
ev->u.set_path.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
params = (struct iscsi_path *)((char *)ev + sizeof(*ev));
|
|
|
|
err = transport->set_path(shost, params);
|
|
|
|
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2019-12-26 20:31:48 +00:00
|
|
|
static int iscsi_session_has_conns(int sid)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_conn *conn;
|
|
|
|
unsigned long flags;
|
|
|
|
int found = 0;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&connlock, flags);
|
|
|
|
list_for_each_entry(conn, &connlist, conn_list) {
|
|
|
|
if (iscsi_conn_get_sid(conn) == sid) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&connlock, flags);
|
|
|
|
|
|
|
|
return found;
|
|
|
|
}
|
|
|
|
|
2011-07-25 18:48:37 +00:00
|
|
|
static int
|
|
|
|
iscsi_set_iface_params(struct iscsi_transport *transport,
|
2011-10-06 08:56:59 +00:00
|
|
|
struct iscsi_uevent *ev, uint32_t len)
|
2011-07-25 18:48:37 +00:00
|
|
|
{
|
|
|
|
char *data = (char *)ev + sizeof(*ev);
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!transport->set_iface_param)
|
|
|
|
return -ENOSYS;
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.set_iface_params.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
printk(KERN_ERR "set_iface_params could not find host no %u\n",
|
|
|
|
ev->u.set_iface_params.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
2011-10-06 08:56:59 +00:00
|
|
|
err = transport->set_iface_param(shost, data, len);
|
2011-07-25 18:48:37 +00:00
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2012-02-13 13:00:48 +00:00
|
|
|
static int
|
|
|
|
iscsi_send_ping(struct iscsi_transport *transport, struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct sockaddr *dst_addr;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!transport->send_ping)
|
|
|
|
return -ENOSYS;
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.iscsi_ping.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
printk(KERN_ERR "iscsi_ping could not find host no %u\n",
|
|
|
|
ev->u.iscsi_ping.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
dst_addr = (struct sockaddr *)((char *)ev + sizeof(*ev));
|
|
|
|
err = transport->send_ping(shost, ev->u.iscsi_ping.iface_num,
|
|
|
|
ev->u.iscsi_ping.iface_type,
|
|
|
|
ev->u.iscsi_ping.payload_size,
|
|
|
|
ev->u.iscsi_ping.pid,
|
|
|
|
dst_addr);
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2012-02-27 11:08:51 +00:00
|
|
|
static int
|
|
|
|
iscsi_get_chap(struct iscsi_transport *transport, struct nlmsghdr *nlh)
|
|
|
|
{
|
2013-03-27 06:53:15 +00:00
|
|
|
struct iscsi_uevent *ev = nlmsg_data(nlh);
|
2012-02-27 11:08:51 +00:00
|
|
|
struct Scsi_Host *shost = NULL;
|
|
|
|
struct iscsi_chap_rec *chap_rec;
|
|
|
|
struct iscsi_internal *priv;
|
|
|
|
struct sk_buff *skbchap;
|
|
|
|
struct nlmsghdr *nlhchap;
|
|
|
|
struct iscsi_uevent *evchap;
|
|
|
|
uint32_t chap_buf_size;
|
|
|
|
int len, err = 0;
|
|
|
|
char *buf;
|
|
|
|
|
|
|
|
if (!transport->get_chap)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
priv = iscsi_if_transport_lookup(transport);
|
|
|
|
if (!priv)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
chap_buf_size = (ev->u.get_chap.num_entries * sizeof(*chap_rec));
|
2013-03-27 06:53:15 +00:00
|
|
|
len = nlmsg_total_size(sizeof(*ev) + chap_buf_size);
|
2012-02-27 11:08:51 +00:00
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.get_chap.host_no);
|
|
|
|
if (!shost) {
|
2015-05-07 14:21:27 +00:00
|
|
|
printk(KERN_ERR "%s: failed. Could not find host no %u\n",
|
2012-02-27 11:08:51 +00:00
|
|
|
__func__, ev->u.get_chap.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
do {
|
|
|
|
int actual_size;
|
|
|
|
|
|
|
|
skbchap = alloc_skb(len, GFP_KERNEL);
|
|
|
|
if (!skbchap) {
|
|
|
|
printk(KERN_ERR "can not deliver chap: OOM\n");
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto exit_get_chap;
|
|
|
|
}
|
|
|
|
|
|
|
|
nlhchap = __nlmsg_put(skbchap, 0, 0, 0,
|
|
|
|
(len - sizeof(*nlhchap)), 0);
|
2013-03-27 06:53:15 +00:00
|
|
|
evchap = nlmsg_data(nlhchap);
|
2012-02-27 11:08:51 +00:00
|
|
|
memset(evchap, 0, sizeof(*evchap));
|
|
|
|
evchap->transport_handle = iscsi_handle(transport);
|
|
|
|
evchap->type = nlh->nlmsg_type;
|
|
|
|
evchap->u.get_chap.host_no = ev->u.get_chap.host_no;
|
|
|
|
evchap->u.get_chap.chap_tbl_idx = ev->u.get_chap.chap_tbl_idx;
|
|
|
|
evchap->u.get_chap.num_entries = ev->u.get_chap.num_entries;
|
2014-07-01 16:24:37 +00:00
|
|
|
buf = (char *)evchap + sizeof(*evchap);
|
2012-02-27 11:08:51 +00:00
|
|
|
memset(buf, 0, chap_buf_size);
|
|
|
|
|
|
|
|
err = transport->get_chap(shost, ev->u.get_chap.chap_tbl_idx,
|
|
|
|
&evchap->u.get_chap.num_entries, buf);
|
|
|
|
|
2013-03-27 06:53:15 +00:00
|
|
|
actual_size = nlmsg_total_size(sizeof(*ev) + chap_buf_size);
|
2012-02-27 11:08:51 +00:00
|
|
|
skb_trim(skbchap, NLMSG_ALIGN(actual_size));
|
|
|
|
nlhchap->nlmsg_len = actual_size;
|
|
|
|
|
|
|
|
err = iscsi_multicast_skb(skbchap, ISCSI_NL_GRP_ISCSID,
|
|
|
|
GFP_KERNEL);
|
|
|
|
} while (err < 0 && err != -ECONNREFUSED);
|
|
|
|
|
|
|
|
exit_get_chap:
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2013-09-17 11:54:48 +00:00
|
|
|
static int iscsi_set_chap(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev, uint32_t len)
|
|
|
|
{
|
|
|
|
char *data = (char *)ev + sizeof(*ev);
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!transport->set_chap)
|
|
|
|
return -ENOSYS;
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.set_path.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
pr_err("%s could not find host no %u\n",
|
|
|
|
__func__, ev->u.set_path.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = transport->set_chap(shost, data, len);
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2012-02-27 11:08:51 +00:00
|
|
|
static int iscsi_delete_chap(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!transport->delete_chap)
|
|
|
|
return -ENOSYS;
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.delete_chap.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
printk(KERN_ERR "%s could not find host no %u\n",
|
|
|
|
__func__, ev->u.delete_chap.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = transport->delete_chap(shost, ev->u.delete_chap.chap_tbl_idx);
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2013-03-22 11:41:29 +00:00
|
|
|
static const struct {
|
|
|
|
enum iscsi_discovery_parent_type value;
|
|
|
|
char *name;
|
|
|
|
} iscsi_discovery_parent_names[] = {
|
|
|
|
{ISCSI_DISC_PARENT_UNKNOWN, "Unknown" },
|
|
|
|
{ISCSI_DISC_PARENT_SENDTGT, "Sendtarget" },
|
|
|
|
{ISCSI_DISC_PARENT_ISNS, "isns" },
|
|
|
|
};
|
|
|
|
|
|
|
|
char *iscsi_get_discovery_parent_name(int parent_type)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char *state = "Unknown!";
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(iscsi_discovery_parent_names); i++) {
|
|
|
|
if (iscsi_discovery_parent_names[i].value & parent_type) {
|
|
|
|
state = iscsi_discovery_parent_names[i].name;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return state;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_get_discovery_parent_name);
|
|
|
|
|
|
|
|
static int iscsi_set_flashnode_param(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev, uint32_t len)
|
|
|
|
{
|
|
|
|
char *data = (char *)ev + sizeof(*ev);
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess;
|
|
|
|
struct iscsi_bus_flash_conn *fnode_conn;
|
|
|
|
struct device *dev;
|
2013-05-06 17:06:56 +00:00
|
|
|
uint32_t idx;
|
2013-03-22 11:41:29 +00:00
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!transport->set_flashnode_param) {
|
|
|
|
err = -ENOSYS;
|
|
|
|
goto exit_set_fnode;
|
|
|
|
}
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.set_flashnode.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
pr_err("%s could not find host no %u\n",
|
|
|
|
__func__, ev->u.set_flashnode.host_no);
|
|
|
|
err = -ENODEV;
|
2020-06-15 08:12:26 +00:00
|
|
|
goto exit_set_fnode;
|
2013-03-22 11:41:29 +00:00
|
|
|
}
|
|
|
|
|
2013-05-06 17:06:56 +00:00
|
|
|
idx = ev->u.set_flashnode.flashnode_idx;
|
|
|
|
fnode_sess = iscsi_get_flashnode_by_index(shost, idx);
|
2013-03-22 11:41:29 +00:00
|
|
|
if (!fnode_sess) {
|
|
|
|
pr_err("%s could not find flashnode %u for host no %u\n",
|
2013-05-06 17:06:56 +00:00
|
|
|
__func__, idx, ev->u.set_flashnode.host_no);
|
2013-03-22 11:41:29 +00:00
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
2013-05-06 17:06:56 +00:00
|
|
|
dev = iscsi_find_flashnode_conn(fnode_sess);
|
2013-03-22 11:41:29 +00:00
|
|
|
if (!dev) {
|
|
|
|
err = -ENODEV;
|
2013-05-06 17:06:56 +00:00
|
|
|
goto put_sess;
|
2013-03-22 11:41:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fnode_conn = iscsi_dev_to_flash_conn(dev);
|
|
|
|
err = transport->set_flashnode_param(fnode_sess, fnode_conn, data, len);
|
2013-05-06 17:06:56 +00:00
|
|
|
put_device(dev);
|
|
|
|
|
|
|
|
put_sess:
|
|
|
|
put_device(&fnode_sess->dev);
|
2013-03-22 11:41:29 +00:00
|
|
|
|
|
|
|
put_host:
|
|
|
|
scsi_host_put(shost);
|
|
|
|
|
|
|
|
exit_set_fnode:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_new_flashnode(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev, uint32_t len)
|
|
|
|
{
|
|
|
|
char *data = (char *)ev + sizeof(*ev);
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
int index;
|
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!transport->new_flashnode) {
|
|
|
|
err = -ENOSYS;
|
|
|
|
goto exit_new_fnode;
|
|
|
|
}
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.new_flashnode.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
pr_err("%s could not find host no %u\n",
|
|
|
|
__func__, ev->u.new_flashnode.host_no);
|
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
|
|
|
index = transport->new_flashnode(shost, data, len);
|
|
|
|
|
|
|
|
if (index >= 0)
|
|
|
|
ev->r.new_flashnode_ret.flashnode_idx = index;
|
|
|
|
else
|
|
|
|
err = -EIO;
|
|
|
|
|
|
|
|
put_host:
|
|
|
|
scsi_host_put(shost);
|
|
|
|
|
|
|
|
exit_new_fnode:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_del_flashnode(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess;
|
2013-05-06 17:06:56 +00:00
|
|
|
uint32_t idx;
|
2013-03-22 11:41:29 +00:00
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!transport->del_flashnode) {
|
|
|
|
err = -ENOSYS;
|
|
|
|
goto exit_del_fnode;
|
|
|
|
}
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.del_flashnode.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
pr_err("%s could not find host no %u\n",
|
|
|
|
__func__, ev->u.del_flashnode.host_no);
|
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
2013-05-06 17:06:56 +00:00
|
|
|
idx = ev->u.del_flashnode.flashnode_idx;
|
|
|
|
fnode_sess = iscsi_get_flashnode_by_index(shost, idx);
|
2013-03-22 11:41:29 +00:00
|
|
|
if (!fnode_sess) {
|
|
|
|
pr_err("%s could not find flashnode %u for host no %u\n",
|
2013-05-06 17:06:56 +00:00
|
|
|
__func__, idx, ev->u.del_flashnode.host_no);
|
2013-03-22 11:41:29 +00:00
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = transport->del_flashnode(fnode_sess);
|
2013-05-06 17:06:56 +00:00
|
|
|
put_device(&fnode_sess->dev);
|
2013-03-22 11:41:29 +00:00
|
|
|
|
|
|
|
put_host:
|
|
|
|
scsi_host_put(shost);
|
|
|
|
|
|
|
|
exit_del_fnode:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_login_flashnode(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess;
|
|
|
|
struct iscsi_bus_flash_conn *fnode_conn;
|
|
|
|
struct device *dev;
|
2013-05-06 17:06:56 +00:00
|
|
|
uint32_t idx;
|
2013-03-22 11:41:29 +00:00
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!transport->login_flashnode) {
|
|
|
|
err = -ENOSYS;
|
|
|
|
goto exit_login_fnode;
|
|
|
|
}
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.login_flashnode.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
pr_err("%s could not find host no %u\n",
|
|
|
|
__func__, ev->u.login_flashnode.host_no);
|
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
2013-05-06 17:06:56 +00:00
|
|
|
idx = ev->u.login_flashnode.flashnode_idx;
|
|
|
|
fnode_sess = iscsi_get_flashnode_by_index(shost, idx);
|
2013-03-22 11:41:29 +00:00
|
|
|
if (!fnode_sess) {
|
|
|
|
pr_err("%s could not find flashnode %u for host no %u\n",
|
2013-05-06 17:06:56 +00:00
|
|
|
__func__, idx, ev->u.login_flashnode.host_no);
|
2013-03-22 11:41:29 +00:00
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
2013-05-06 17:06:56 +00:00
|
|
|
dev = iscsi_find_flashnode_conn(fnode_sess);
|
2013-03-22 11:41:29 +00:00
|
|
|
if (!dev) {
|
|
|
|
err = -ENODEV;
|
2013-05-06 17:06:56 +00:00
|
|
|
goto put_sess;
|
2013-03-22 11:41:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fnode_conn = iscsi_dev_to_flash_conn(dev);
|
|
|
|
err = transport->login_flashnode(fnode_sess, fnode_conn);
|
2013-05-06 17:06:56 +00:00
|
|
|
put_device(dev);
|
|
|
|
|
|
|
|
put_sess:
|
|
|
|
put_device(&fnode_sess->dev);
|
2013-03-22 11:41:29 +00:00
|
|
|
|
|
|
|
put_host:
|
|
|
|
scsi_host_put(shost);
|
|
|
|
|
|
|
|
exit_login_fnode:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_logout_flashnode(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_bus_flash_session *fnode_sess;
|
|
|
|
struct iscsi_bus_flash_conn *fnode_conn;
|
|
|
|
struct device *dev;
|
2013-05-06 17:06:56 +00:00
|
|
|
uint32_t idx;
|
2013-03-22 11:41:29 +00:00
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!transport->logout_flashnode) {
|
|
|
|
err = -ENOSYS;
|
|
|
|
goto exit_logout_fnode;
|
|
|
|
}
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.logout_flashnode.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
pr_err("%s could not find host no %u\n",
|
|
|
|
__func__, ev->u.logout_flashnode.host_no);
|
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
2013-05-06 17:06:56 +00:00
|
|
|
idx = ev->u.logout_flashnode.flashnode_idx;
|
|
|
|
fnode_sess = iscsi_get_flashnode_by_index(shost, idx);
|
2013-03-22 11:41:29 +00:00
|
|
|
if (!fnode_sess) {
|
|
|
|
pr_err("%s could not find flashnode %u for host no %u\n",
|
2013-05-06 17:06:56 +00:00
|
|
|
__func__, idx, ev->u.logout_flashnode.host_no);
|
2013-03-22 11:41:29 +00:00
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
2013-05-06 17:06:56 +00:00
|
|
|
dev = iscsi_find_flashnode_conn(fnode_sess);
|
2013-03-22 11:41:29 +00:00
|
|
|
if (!dev) {
|
|
|
|
err = -ENODEV;
|
2013-05-06 17:06:56 +00:00
|
|
|
goto put_sess;
|
2013-03-22 11:41:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fnode_conn = iscsi_dev_to_flash_conn(dev);
|
|
|
|
|
|
|
|
err = transport->logout_flashnode(fnode_sess, fnode_conn);
|
2013-05-06 17:06:56 +00:00
|
|
|
put_device(dev);
|
|
|
|
|
|
|
|
put_sess:
|
|
|
|
put_device(&fnode_sess->dev);
|
2013-03-22 11:41:29 +00:00
|
|
|
|
|
|
|
put_host:
|
|
|
|
scsi_host_put(shost);
|
|
|
|
|
|
|
|
exit_logout_fnode:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_logout_flashnode_sid(struct iscsi_transport *transport,
|
|
|
|
struct iscsi_uevent *ev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_cls_session *session;
|
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!transport->logout_flashnode_sid) {
|
|
|
|
err = -ENOSYS;
|
|
|
|
goto exit_logout_sid;
|
|
|
|
}
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.logout_flashnode_sid.host_no);
|
|
|
|
if (!shost) {
|
|
|
|
pr_err("%s could not find host no %u\n",
|
|
|
|
__func__, ev->u.logout_flashnode.host_no);
|
|
|
|
err = -ENODEV;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
|
|
|
session = iscsi_session_lookup(ev->u.logout_flashnode_sid.sid);
|
|
|
|
if (!session) {
|
|
|
|
pr_err("%s could not find session id %u\n",
|
|
|
|
__func__, ev->u.logout_flashnode_sid.sid);
|
|
|
|
err = -EINVAL;
|
|
|
|
goto put_host;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = transport->logout_flashnode_sid(session);
|
|
|
|
|
|
|
|
put_host:
|
|
|
|
scsi_host_put(shost);
|
|
|
|
|
|
|
|
exit_logout_sid:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2013-11-22 10:28:18 +00:00
|
|
|
static int
|
|
|
|
iscsi_get_host_stats(struct iscsi_transport *transport, struct nlmsghdr *nlh)
|
|
|
|
{
|
|
|
|
struct iscsi_uevent *ev = nlmsg_data(nlh);
|
|
|
|
struct Scsi_Host *shost = NULL;
|
|
|
|
struct iscsi_internal *priv;
|
|
|
|
struct sk_buff *skbhost_stats;
|
|
|
|
struct nlmsghdr *nlhhost_stats;
|
|
|
|
struct iscsi_uevent *evhost_stats;
|
|
|
|
int host_stats_size = 0;
|
|
|
|
int len, err = 0;
|
|
|
|
char *buf;
|
|
|
|
|
|
|
|
if (!transport->get_host_stats)
|
2014-07-12 20:51:50 +00:00
|
|
|
return -ENOSYS;
|
2013-11-22 10:28:18 +00:00
|
|
|
|
|
|
|
priv = iscsi_if_transport_lookup(transport);
|
|
|
|
if (!priv)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
host_stats_size = sizeof(struct iscsi_offload_host_stats);
|
|
|
|
len = nlmsg_total_size(sizeof(*ev) + host_stats_size);
|
|
|
|
|
|
|
|
shost = scsi_host_lookup(ev->u.get_host_stats.host_no);
|
|
|
|
if (!shost) {
|
2017-10-29 06:09:46 +00:00
|
|
|
pr_err("%s: failed. Could not find host no %u\n",
|
2013-11-22 10:28:18 +00:00
|
|
|
__func__, ev->u.get_host_stats.host_no);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
do {
|
|
|
|
int actual_size;
|
|
|
|
|
|
|
|
skbhost_stats = alloc_skb(len, GFP_KERNEL);
|
|
|
|
if (!skbhost_stats) {
|
|
|
|
pr_err("cannot deliver host stats: OOM\n");
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto exit_host_stats;
|
|
|
|
}
|
|
|
|
|
|
|
|
nlhhost_stats = __nlmsg_put(skbhost_stats, 0, 0, 0,
|
|
|
|
(len - sizeof(*nlhhost_stats)), 0);
|
|
|
|
evhost_stats = nlmsg_data(nlhhost_stats);
|
|
|
|
memset(evhost_stats, 0, sizeof(*evhost_stats));
|
|
|
|
evhost_stats->transport_handle = iscsi_handle(transport);
|
|
|
|
evhost_stats->type = nlh->nlmsg_type;
|
|
|
|
evhost_stats->u.get_host_stats.host_no =
|
|
|
|
ev->u.get_host_stats.host_no;
|
2014-07-01 16:24:37 +00:00
|
|
|
buf = (char *)evhost_stats + sizeof(*evhost_stats);
|
2013-11-22 10:28:18 +00:00
|
|
|
memset(buf, 0, host_stats_size);
|
|
|
|
|
|
|
|
err = transport->get_host_stats(shost, buf, host_stats_size);
|
2014-07-12 20:51:48 +00:00
|
|
|
if (err) {
|
2014-08-03 23:37:52 +00:00
|
|
|
kfree_skb(skbhost_stats);
|
2014-07-12 20:51:48 +00:00
|
|
|
goto exit_host_stats;
|
|
|
|
}
|
2013-11-22 10:28:18 +00:00
|
|
|
|
|
|
|
actual_size = nlmsg_total_size(sizeof(*ev) + host_stats_size);
|
|
|
|
skb_trim(skbhost_stats, NLMSG_ALIGN(actual_size));
|
|
|
|
nlhhost_stats->nlmsg_len = actual_size;
|
|
|
|
|
|
|
|
err = iscsi_multicast_skb(skbhost_stats, ISCSI_NL_GRP_ISCSID,
|
|
|
|
GFP_KERNEL);
|
|
|
|
} while (err < 0 && err != -ECONNREFUSED);
|
|
|
|
|
|
|
|
exit_host_stats:
|
|
|
|
scsi_host_put(shost);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
static int
|
|
|
|
iscsi_if_recv_msg(struct sk_buff *skb, struct nlmsghdr *nlh, uint32_t *group)
|
2005-08-05 02:33:07 +00:00
|
|
|
{
|
|
|
|
int err = 0;
|
2018-04-09 22:15:28 +00:00
|
|
|
u32 portid;
|
2021-02-24 05:39:01 +00:00
|
|
|
u32 pdu_len;
|
2013-03-27 06:53:15 +00:00
|
|
|
struct iscsi_uevent *ev = nlmsg_data(nlh);
|
2005-08-05 02:33:07 +00:00
|
|
|
struct iscsi_transport *transport = NULL;
|
|
|
|
struct iscsi_internal *priv;
|
2006-02-02 03:06:49 +00:00
|
|
|
struct iscsi_cls_session *session;
|
|
|
|
struct iscsi_cls_conn *conn;
|
2008-05-21 20:54:13 +00:00
|
|
|
struct iscsi_endpoint *ep = NULL;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2021-02-23 21:06:24 +00:00
|
|
|
if (!netlink_capable(skb, CAP_SYS_ADMIN))
|
|
|
|
return -EPERM;
|
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
if (nlh->nlmsg_type == ISCSI_UEVENT_PATH_UPDATE)
|
|
|
|
*group = ISCSI_NL_GRP_UIP;
|
|
|
|
else
|
|
|
|
*group = ISCSI_NL_GRP_ISCSID;
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
priv = iscsi_if_transport_lookup(iscsi_ptr(ev->transport_handle));
|
|
|
|
if (!priv)
|
|
|
|
return -EINVAL;
|
|
|
|
transport = priv->iscsi_transport;
|
|
|
|
|
2006-02-02 03:06:49 +00:00
|
|
|
if (!try_module_get(transport->owner))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2018-04-09 22:15:28 +00:00
|
|
|
portid = NETLINK_CB(skb).portid;
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
switch (nlh->nlmsg_type) {
|
|
|
|
case ISCSI_UEVENT_CREATE_SESSION:
|
2008-05-21 20:54:13 +00:00
|
|
|
err = iscsi_if_create_session(priv, ep, ev,
|
2018-04-09 22:15:28 +00:00
|
|
|
portid,
|
2008-05-21 20:53:56 +00:00
|
|
|
ev->u.c_session.initial_cmdsn,
|
|
|
|
ev->u.c_session.cmds_max,
|
|
|
|
ev->u.c_session.queue_depth);
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_CREATE_BOUND_SESSION:
|
2008-05-21 20:54:13 +00:00
|
|
|
ep = iscsi_lookup_endpoint(ev->u.c_bound_session.ep_handle);
|
2008-06-16 15:11:32 +00:00
|
|
|
if (!ep) {
|
|
|
|
err = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
2008-05-21 20:54:13 +00:00
|
|
|
|
|
|
|
err = iscsi_if_create_session(priv, ep, ev,
|
2018-04-09 22:15:28 +00:00
|
|
|
portid,
|
2008-05-21 20:53:56 +00:00
|
|
|
ev->u.c_bound_session.initial_cmdsn,
|
|
|
|
ev->u.c_bound_session.cmds_max,
|
|
|
|
ev->u.c_bound_session.queue_depth);
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_DESTROY_SESSION:
|
2006-04-07 02:13:33 +00:00
|
|
|
session = iscsi_session_lookup(ev->u.d_session.sid);
|
2019-12-26 20:31:48 +00:00
|
|
|
if (!session)
|
2007-12-13 18:43:29 +00:00
|
|
|
err = -EINVAL;
|
2019-12-26 20:31:48 +00:00
|
|
|
else if (iscsi_session_has_conns(ev->u.d_session.sid))
|
|
|
|
err = -EBUSY;
|
|
|
|
else
|
|
|
|
transport->destroy_session(session);
|
2007-12-13 18:43:29 +00:00
|
|
|
break;
|
2020-02-27 19:59:45 +00:00
|
|
|
case ISCSI_UEVENT_DESTROY_SESSION_ASYNC:
|
|
|
|
session = iscsi_session_lookup(ev->u.d_session.sid);
|
|
|
|
if (!session)
|
|
|
|
err = -EINVAL;
|
|
|
|
else if (iscsi_session_has_conns(ev->u.d_session.sid))
|
|
|
|
err = -EBUSY;
|
|
|
|
else {
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
/* Prevent this session from being found again */
|
|
|
|
spin_lock_irqsave(&sesslock, flags);
|
2020-07-01 19:47:48 +00:00
|
|
|
list_del_init(&session->sess_list);
|
2020-02-27 19:59:45 +00:00
|
|
|
spin_unlock_irqrestore(&sesslock, flags);
|
|
|
|
|
|
|
|
queue_work(iscsi_destroy_workq, &session->destroy_work);
|
|
|
|
}
|
|
|
|
break;
|
2007-12-13 18:43:29 +00:00
|
|
|
case ISCSI_UEVENT_UNBIND_SESSION:
|
|
|
|
session = iscsi_session_lookup(ev->u.d_session.sid);
|
|
|
|
if (session)
|
2009-03-05 20:46:02 +00:00
|
|
|
scsi_queue_work(iscsi_session_to_shost(session),
|
|
|
|
&session->unbind_work);
|
2007-12-13 18:43:29 +00:00
|
|
|
else
|
2006-02-02 03:06:49 +00:00
|
|
|
err = -EINVAL;
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_CREATE_CONN:
|
|
|
|
err = iscsi_if_create_conn(transport, ev);
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_DESTROY_CONN:
|
|
|
|
err = iscsi_if_destroy_conn(transport, ev);
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_BIND_CONN:
|
2006-04-07 02:13:33 +00:00
|
|
|
session = iscsi_session_lookup(ev->u.b_conn.sid);
|
|
|
|
conn = iscsi_conn_lookup(ev->u.b_conn.sid, ev->u.b_conn.cid);
|
2006-02-02 03:06:49 +00:00
|
|
|
|
2011-02-16 21:04:33 +00:00
|
|
|
if (conn && conn->ep)
|
|
|
|
iscsi_if_ep_disconnect(transport, conn->ep->id);
|
|
|
|
|
|
|
|
if (!session || !conn) {
|
2006-02-02 03:06:49 +00:00
|
|
|
err = -EINVAL;
|
2011-02-16 21:04:33 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
mutex_lock(&conn_mutex);
|
2011-02-16 21:04:33 +00:00
|
|
|
ev->r.retcode = transport->bind_conn(session, conn,
|
|
|
|
ev->u.b_conn.transport_eph,
|
|
|
|
ev->u.b_conn.is_leading);
|
2021-03-25 09:32:48 +00:00
|
|
|
if (!ev->r.retcode)
|
|
|
|
conn->state = ISCSI_CONN_BOUND;
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
mutex_unlock(&conn_mutex);
|
|
|
|
|
2011-02-16 21:04:33 +00:00
|
|
|
if (ev->r.retcode || !transport->ep_connect)
|
|
|
|
break;
|
|
|
|
|
|
|
|
ep = iscsi_lookup_endpoint(ev->u.b_conn.transport_eph);
|
|
|
|
if (ep) {
|
|
|
|
ep->conn = conn;
|
|
|
|
|
|
|
|
mutex_lock(&conn->ep_mutex);
|
|
|
|
conn->ep = ep;
|
|
|
|
mutex_unlock(&conn->ep_mutex);
|
|
|
|
} else
|
|
|
|
iscsi_cls_conn_printk(KERN_ERR, conn,
|
|
|
|
"Could not set ep conn "
|
|
|
|
"binding\n");
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_SET_PARAM:
|
2006-04-07 02:13:36 +00:00
|
|
|
err = iscsi_set_param(transport, ev);
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_START_CONN:
|
2006-04-07 02:13:33 +00:00
|
|
|
conn = iscsi_conn_lookup(ev->u.start_conn.sid, ev->u.start_conn.cid);
|
2020-03-17 23:34:22 +00:00
|
|
|
if (conn) {
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
mutex_lock(&conn_mutex);
|
2006-02-02 03:06:49 +00:00
|
|
|
ev->r.retcode = transport->start_conn(conn);
|
2020-03-17 23:34:22 +00:00
|
|
|
if (!ev->r.retcode)
|
|
|
|
conn->state = ISCSI_CONN_UP;
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
mutex_unlock(&conn_mutex);
|
2020-03-17 23:34:22 +00:00
|
|
|
}
|
2006-02-02 03:06:49 +00:00
|
|
|
else
|
|
|
|
err = -EINVAL;
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_STOP_CONN:
|
2006-04-07 02:13:33 +00:00
|
|
|
conn = iscsi_conn_lookup(ev->u.stop_conn.sid, ev->u.stop_conn.cid);
|
2006-02-02 03:06:49 +00:00
|
|
|
if (conn)
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
iscsi_if_stop_conn(conn, ev->u.stop_conn.flag);
|
2006-02-02 03:06:49 +00:00
|
|
|
else
|
|
|
|
err = -EINVAL;
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_SEND_PDU:
|
2021-02-24 05:39:01 +00:00
|
|
|
pdu_len = nlh->nlmsg_len - sizeof(*nlh) - sizeof(*ev);
|
|
|
|
|
|
|
|
if ((ev->u.send_pdu.hdr_size > pdu_len) ||
|
|
|
|
(ev->u.send_pdu.data_size > (pdu_len - ev->u.send_pdu.hdr_size))) {
|
|
|
|
err = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-04-07 02:13:33 +00:00
|
|
|
conn = iscsi_conn_lookup(ev->u.send_pdu.sid, ev->u.send_pdu.cid);
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
if (conn) {
|
|
|
|
mutex_lock(&conn_mutex);
|
2006-02-02 03:06:49 +00:00
|
|
|
ev->r.retcode = transport->send_pdu(conn,
|
|
|
|
(struct iscsi_hdr*)((char*)ev + sizeof(*ev)),
|
|
|
|
(char*)ev + sizeof(*ev) + ev->u.send_pdu.hdr_size,
|
|
|
|
ev->u.send_pdu.data_size);
|
scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim
iSCSI suffers from a deadlock in case a management command submitted via
the netlink socket sleeps on an allocation while holding the rx_queue_mutex
if that allocation causes a memory reclaim that writebacks to a failed
iSCSI device. The recovery procedure can never make progress to recover
the failed disk or abort outstanding IO operations to complete the reclaim
(since rx_queue_mutex is locked), thus locking the system.
Nevertheless, just marking all allocations under rx_queue_mutex as GFP_NOIO
(or locking the userspace process with something like PF_MEMALLOC_NOIO) is
not enough, since the iSCSI command code relies on other subsystems that
try to grab locked mutexes, whose threads are GFP_IO, leading to the same
deadlock. One instance where this situation can be observed is in the
backtraces below, stitched from multiple bugs reports, involving the kobj
uevent sent when a session is created.
The root of the problem is not the fact that iSCSI does GFP_IO allocations,
that is acceptable. The actual problem is that rx_queue_mutex has a very
large granularity, covering every unrelated netlink command execution at
the same time as the error recovery path.
The proposed fix leverages the recently added mechanism to stop failed
connections from the kernel, by enabling it to execute even though a
management command from the netlink socket is being run (rx_queue_mutex is
held), provided that the command is known to be safe. It splits the
rx_queue_mutex in two mutexes, one protecting from concurrent command
execution from the netlink socket, and one protecting stop_conn from racing
with other connection management operations that might conflict with it.
It is not very pretty, but it is the simplest way to resolve the deadlock.
I considered making it a lock per connection, but some external mutex would
still be needed to deal with iscsi_if_destroy_conn.
The patch was tested by forcing a memory shrinker (unrelated, but used
bufio/dm-verity) to reclaim iSCSI pages every time
ISCSI_UEVENT_CREATE_SESSION happens, which is reasonable to simulate
reclaims that might happen with GFP_KERNEL on that path. Then, a faulty
hung target causes a connection to fail during intensive IO, at the same
time a new session is added by iscsid.
The following stacktraces are stiches from several bug reports, showing a
case where the deadlock can happen.
iSCSI-write
holding: rx_queue_mutex
waiting: uevent_sock_mutex
kobject_uevent_env+0x1bd/0x419
kobject_uevent+0xb/0xd
device_add+0x48a/0x678
scsi_add_host_with_dma+0xc5/0x22d
iscsi_host_add+0x53/0x55
iscsi_sw_tcp_session_create+0xa6/0x129
iscsi_if_rx+0x100/0x1247
netlink_unicast+0x213/0x4f0
netlink_sendmsg+0x230/0x3c0
iscsi_fail iscsi_conn_failure
waiting: rx_queue_mutex
schedule_preempt_disabled+0x325/0x734
__mutex_lock_slowpath+0x18b/0x230
mutex_lock+0x22/0x40
iscsi_conn_failure+0x42/0x149
worker_thread+0x24a/0xbc0
EventManager_
holding: uevent_sock_mutex
waiting: dm_bufio_client->lock
dm_bufio_lock+0xe/0x10
shrink+0x34/0xf7
shrink_slab+0x177/0x5d0
do_try_to_free_pages+0x129/0x470
try_to_free_mem_cgroup_pages+0x14f/0x210
memcg_kmem_newpage_charge+0xa6d/0x13b0
__alloc_pages_nodemask+0x4a3/0x1a70
fallback_alloc+0x1b2/0x36c
__kmalloc_node_track_caller+0xb9/0x10d0
__alloc_skb+0x83/0x2f0
kobject_uevent_env+0x26b/0x419
dm_kobject_uevent+0x70/0x79
dev_suspend+0x1a9/0x1e7
ctl_ioctl+0x3e9/0x411
dm_ctl_ioctl+0x13/0x17
do_vfs_ioctl+0xb3/0x460
SyS_ioctl+0x5e/0x90
MemcgReclaimerD"
holding: dm_bufio_client->lock
waiting: stuck io to finish (needs iscsi_fail thread to progress)
schedule at ffffffffbd603618
io_schedule at ffffffffbd603ba4
do_io_schedule at ffffffffbdaf0d94
__wait_on_bit at ffffffffbd6008a6
out_of_line_wait_on_bit at ffffffffbd600960
wait_on_bit.constprop.10 at ffffffffbdaf0f17
__make_buffer_clean at ffffffffbdaf18ba
__cleanup_old_buffer at ffffffffbdaf192f
shrink at ffffffffbdaf19fd
do_shrink_slab at ffffffffbd6ec000
shrink_slab at ffffffffbd6ec24a
do_try_to_free_pages at ffffffffbd6eda09
try_to_free_mem_cgroup_pages at ffffffffbd6ede7e
mem_cgroup_resize_limit at ffffffffbd7024c0
mem_cgroup_write at ffffffffbd703149
cgroup_file_write at ffffffffbd6d9c6e
sys_write at ffffffffbd6662ea
system_call_fastpath at ffffffffbdbc34a2
Link: https://lore.kernel.org/r/20200520022959.1912856-1-krisman@collabora.com
Reported-by: Khazhismel Kumykov <khazhy@google.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2020-05-20 02:29:59 +00:00
|
|
|
mutex_unlock(&conn_mutex);
|
|
|
|
}
|
2006-02-02 03:06:49 +00:00
|
|
|
else
|
|
|
|
err = -EINVAL;
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_GET_STATS:
|
2006-02-02 03:06:56 +00:00
|
|
|
err = iscsi_if_get_stats(transport, nlh);
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
2006-05-03 00:46:36 +00:00
|
|
|
case ISCSI_UEVENT_TRANSPORT_EP_CONNECT:
|
|
|
|
case ISCSI_UEVENT_TRANSPORT_EP_POLL:
|
|
|
|
case ISCSI_UEVENT_TRANSPORT_EP_DISCONNECT:
|
2009-05-13 22:57:38 +00:00
|
|
|
case ISCSI_UEVENT_TRANSPORT_EP_CONNECT_THROUGH_HOST:
|
2006-05-03 00:46:36 +00:00
|
|
|
err = iscsi_if_transport_ep(transport, ev, nlh->nlmsg_type);
|
|
|
|
break;
|
2006-06-28 17:00:22 +00:00
|
|
|
case ISCSI_UEVENT_TGT_DSCVR:
|
|
|
|
err = iscsi_tgt_dscvr(transport, ev);
|
|
|
|
break;
|
2007-05-30 17:57:11 +00:00
|
|
|
case ISCSI_UEVENT_SET_HOST_PARAM:
|
|
|
|
err = iscsi_set_host_param(transport, ev);
|
|
|
|
break;
|
2009-06-09 01:14:41 +00:00
|
|
|
case ISCSI_UEVENT_PATH_UPDATE:
|
|
|
|
err = iscsi_set_path(transport, ev);
|
|
|
|
break;
|
2011-07-25 18:48:37 +00:00
|
|
|
case ISCSI_UEVENT_SET_IFACE_PARAMS:
|
2011-10-06 08:56:59 +00:00
|
|
|
err = iscsi_set_iface_params(transport, ev,
|
|
|
|
nlmsg_attrlen(nlh, sizeof(*ev)));
|
2011-07-25 18:48:37 +00:00
|
|
|
break;
|
2012-02-13 13:00:48 +00:00
|
|
|
case ISCSI_UEVENT_PING:
|
|
|
|
err = iscsi_send_ping(transport, ev);
|
|
|
|
break;
|
2012-02-27 11:08:51 +00:00
|
|
|
case ISCSI_UEVENT_GET_CHAP:
|
|
|
|
err = iscsi_get_chap(transport, nlh);
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_DELETE_CHAP:
|
|
|
|
err = iscsi_delete_chap(transport, ev);
|
|
|
|
break;
|
2013-03-22 11:41:29 +00:00
|
|
|
case ISCSI_UEVENT_SET_FLASHNODE_PARAMS:
|
|
|
|
err = iscsi_set_flashnode_param(transport, ev,
|
|
|
|
nlmsg_attrlen(nlh,
|
|
|
|
sizeof(*ev)));
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_NEW_FLASHNODE:
|
|
|
|
err = iscsi_new_flashnode(transport, ev,
|
|
|
|
nlmsg_attrlen(nlh, sizeof(*ev)));
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_DEL_FLASHNODE:
|
|
|
|
err = iscsi_del_flashnode(transport, ev);
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_LOGIN_FLASHNODE:
|
|
|
|
err = iscsi_login_flashnode(transport, ev);
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_LOGOUT_FLASHNODE:
|
|
|
|
err = iscsi_logout_flashnode(transport, ev);
|
|
|
|
break;
|
|
|
|
case ISCSI_UEVENT_LOGOUT_FLASHNODE_SID:
|
|
|
|
err = iscsi_logout_flashnode_sid(transport, ev);
|
|
|
|
break;
|
2013-09-17 11:54:48 +00:00
|
|
|
case ISCSI_UEVENT_SET_CHAP:
|
|
|
|
err = iscsi_set_chap(transport, ev,
|
|
|
|
nlmsg_attrlen(nlh, sizeof(*ev)));
|
|
|
|
break;
|
2013-11-22 10:28:18 +00:00
|
|
|
case ISCSI_UEVENT_GET_HOST_STATS:
|
|
|
|
err = iscsi_get_host_stats(transport, nlh);
|
|
|
|
break;
|
2005-08-05 02:33:07 +00:00
|
|
|
default:
|
2007-05-30 17:57:11 +00:00
|
|
|
err = -ENOSYS;
|
2005-08-05 02:33:07 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-02-02 03:06:49 +00:00
|
|
|
module_put(transport->owner);
|
2005-08-05 02:33:07 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-04-07 02:13:33 +00:00
|
|
|
/*
|
2007-10-11 04:15:29 +00:00
|
|
|
* Get message from skb. Each message is processed by iscsi_if_recv_msg.
|
|
|
|
* Malformed skbs with wrong lengths or invalid creds are not processed.
|
2006-04-07 02:13:33 +00:00
|
|
|
*/
|
2005-08-05 02:33:07 +00:00
|
|
|
static void
|
2007-10-11 04:15:29 +00:00
|
|
|
iscsi_if_rx(struct sk_buff *skb)
|
2005-08-05 02:33:07 +00:00
|
|
|
{
|
2018-04-09 22:15:28 +00:00
|
|
|
u32 portid = NETLINK_CB(skb).portid;
|
|
|
|
|
2006-01-11 12:16:10 +00:00
|
|
|
mutex_lock(&rx_queue_mutex);
|
2013-03-27 06:53:15 +00:00
|
|
|
while (skb->len >= NLMSG_HDRLEN) {
|
2007-10-11 04:15:29 +00:00
|
|
|
int err;
|
|
|
|
uint32_t rlen;
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct iscsi_uevent *ev;
|
2009-06-09 01:14:41 +00:00
|
|
|
uint32_t group;
|
scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func
In iscsi_if_rx func, after receiving one request through
iscsi_if_recv_msg func, iscsi_if_send_reply will be called to try to
reply to the request in a do-while loop. If the iscsi_if_send_reply
function keeps returning -EAGAIN, a deadlock will occur.
For example, a client only send msg without calling recvmsg func, then
it will result in the watchdog soft lockup. The details are given as
follows:
sock_fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_ISCSI);
retval = bind(sock_fd, (struct sock addr*) & src_addr, sizeof(src_addr);
while (1) {
state_msg = sendmsg(sock_fd, &msg, 0);
//Note: recvmsg(sock_fd, &msg, 0) is not processed here.
}
close(sock_fd);
watchdog: BUG: soft lockup - CPU#7 stuck for 22s! [netlink_test:253305] Sample time: 4000897528 ns(HZ: 250) Sample stat:
curr: user: 675503481560, nice: 321724050, sys: 448689506750, idle: 4654054240530, iowait: 40885550700, irq: 14161174020, softirq: 8104324140, st: 0
deta: user: 0, nice: 0, sys: 3998210100, idle: 0, iowait: 0, irq: 1547170, softirq: 242870, st: 0 Sample softirq:
TIMER: 992
SCHED: 8
Sample irqstat:
irq 2: delta 1003, curr: 3103802, arch_timer
CPU: 7 PID: 253305 Comm: netlink_test Kdump: loaded Tainted: G OE
Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
pstate: 40400005 (nZcv daif +PAN -UAO)
pc : __alloc_skb+0x104/0x1b0
lr : __alloc_skb+0x9c/0x1b0
sp : ffff000033603a30
x29: ffff000033603a30 x28: 00000000000002dd
x27: ffff800b34ced810 x26: ffff800ba7569f00
x25: 00000000ffffffff x24: 0000000000000000
x23: ffff800f7c43f600 x22: 0000000000480020
x21: ffff0000091d9000 x20: ffff800b34eff200
x19: ffff800ba7569f00 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000
x15: 0000000000000000 x14: 0001000101000100
x13: 0000000101010000 x12: 0101000001010100
x11: 0001010101010001 x10: 00000000000002dd
x9 : ffff000033603d58 x8 : ffff800b34eff400
x7 : ffff800ba7569200 x6 : ffff800b34eff400
x5 : 0000000000000000 x4 : 00000000ffffffff
x3 : 0000000000000000 x2 : 0000000000000001
x1 : ffff800b34eff2c0 x0 : 0000000000000300 Call trace:
__alloc_skb+0x104/0x1b0
iscsi_if_rx+0x144/0x12bc [scsi_transport_iscsi]
netlink_unicast+0x1e0/0x258
netlink_sendmsg+0x310/0x378
sock_sendmsg+0x4c/0x70
sock_write_iter+0x90/0xf0
__vfs_write+0x11c/0x190
vfs_write+0xac/0x1c0
ksys_write+0x6c/0xd8
__arm64_sys_write+0x24/0x30
el0_svc_common+0x78/0x130
el0_svc_handler+0x38/0x78
el0_svc+0x8/0xc
Link: https://lore.kernel.org/r/EDBAAA0BBBA2AC4E9C8B6B81DEEE1D6915E3D4D2@dggeml505-mbx.china.huawei.com
Signed-off-by: Bo Wu <wubo40@huawei.com>
Reviewed-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2019-11-20 13:26:17 +00:00
|
|
|
int retries = ISCSI_SEND_MAX_ALLOWED;
|
2007-10-11 04:15:29 +00:00
|
|
|
|
|
|
|
nlh = nlmsg_hdr(skb);
|
2017-08-27 12:25:26 +00:00
|
|
|
if (nlh->nlmsg_len < sizeof(*nlh) + sizeof(*ev) ||
|
2007-10-11 04:15:29 +00:00
|
|
|
skb->len < nlh->nlmsg_len) {
|
|
|
|
break;
|
2006-02-02 03:07:01 +00:00
|
|
|
}
|
|
|
|
|
2013-03-27 06:53:15 +00:00
|
|
|
ev = nlmsg_data(nlh);
|
2007-10-11 04:15:29 +00:00
|
|
|
rlen = NLMSG_ALIGN(nlh->nlmsg_len);
|
|
|
|
if (rlen > skb->len)
|
|
|
|
rlen = skb->len;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2009-06-09 01:14:41 +00:00
|
|
|
err = iscsi_if_recv_msg(skb, nlh, &group);
|
2007-10-11 04:15:29 +00:00
|
|
|
if (err) {
|
|
|
|
ev->type = ISCSI_KEVENT_IF_ERROR;
|
|
|
|
ev->iferror = err;
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
2007-10-11 04:15:29 +00:00
|
|
|
do {
|
|
|
|
/*
|
|
|
|
* special case for GET_STATS:
|
|
|
|
* on success - sending reply and stats from
|
|
|
|
* inside of if_recv_msg(),
|
|
|
|
* on error - fall through.
|
|
|
|
*/
|
|
|
|
if (ev->type == ISCSI_UEVENT_GET_STATS && !err)
|
|
|
|
break;
|
2012-02-27 11:08:51 +00:00
|
|
|
if (ev->type == ISCSI_UEVENT_GET_CHAP && !err)
|
|
|
|
break;
|
2018-04-09 22:15:28 +00:00
|
|
|
err = iscsi_if_send_reply(portid, nlh->nlmsg_type,
|
|
|
|
ev, sizeof(*ev));
|
scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func
In iscsi_if_rx func, after receiving one request through
iscsi_if_recv_msg func, iscsi_if_send_reply will be called to try to
reply to the request in a do-while loop. If the iscsi_if_send_reply
function keeps returning -EAGAIN, a deadlock will occur.
For example, a client only send msg without calling recvmsg func, then
it will result in the watchdog soft lockup. The details are given as
follows:
sock_fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_ISCSI);
retval = bind(sock_fd, (struct sock addr*) & src_addr, sizeof(src_addr);
while (1) {
state_msg = sendmsg(sock_fd, &msg, 0);
//Note: recvmsg(sock_fd, &msg, 0) is not processed here.
}
close(sock_fd);
watchdog: BUG: soft lockup - CPU#7 stuck for 22s! [netlink_test:253305] Sample time: 4000897528 ns(HZ: 250) Sample stat:
curr: user: 675503481560, nice: 321724050, sys: 448689506750, idle: 4654054240530, iowait: 40885550700, irq: 14161174020, softirq: 8104324140, st: 0
deta: user: 0, nice: 0, sys: 3998210100, idle: 0, iowait: 0, irq: 1547170, softirq: 242870, st: 0 Sample softirq:
TIMER: 992
SCHED: 8
Sample irqstat:
irq 2: delta 1003, curr: 3103802, arch_timer
CPU: 7 PID: 253305 Comm: netlink_test Kdump: loaded Tainted: G OE
Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
pstate: 40400005 (nZcv daif +PAN -UAO)
pc : __alloc_skb+0x104/0x1b0
lr : __alloc_skb+0x9c/0x1b0
sp : ffff000033603a30
x29: ffff000033603a30 x28: 00000000000002dd
x27: ffff800b34ced810 x26: ffff800ba7569f00
x25: 00000000ffffffff x24: 0000000000000000
x23: ffff800f7c43f600 x22: 0000000000480020
x21: ffff0000091d9000 x20: ffff800b34eff200
x19: ffff800ba7569f00 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000
x15: 0000000000000000 x14: 0001000101000100
x13: 0000000101010000 x12: 0101000001010100
x11: 0001010101010001 x10: 00000000000002dd
x9 : ffff000033603d58 x8 : ffff800b34eff400
x7 : ffff800ba7569200 x6 : ffff800b34eff400
x5 : 0000000000000000 x4 : 00000000ffffffff
x3 : 0000000000000000 x2 : 0000000000000001
x1 : ffff800b34eff2c0 x0 : 0000000000000300 Call trace:
__alloc_skb+0x104/0x1b0
iscsi_if_rx+0x144/0x12bc [scsi_transport_iscsi]
netlink_unicast+0x1e0/0x258
netlink_sendmsg+0x310/0x378
sock_sendmsg+0x4c/0x70
sock_write_iter+0x90/0xf0
__vfs_write+0x11c/0x190
vfs_write+0xac/0x1c0
ksys_write+0x6c/0xd8
__arm64_sys_write+0x24/0x30
el0_svc_common+0x78/0x130
el0_svc_handler+0x38/0x78
el0_svc+0x8/0xc
Link: https://lore.kernel.org/r/EDBAAA0BBBA2AC4E9C8B6B81DEEE1D6915E3D4D2@dggeml505-mbx.china.huawei.com
Signed-off-by: Bo Wu <wubo40@huawei.com>
Reviewed-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Reviewed-by: Lee Duncan <lduncan@suse.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
2019-11-20 13:26:17 +00:00
|
|
|
if (err == -EAGAIN && --retries < 0) {
|
|
|
|
printk(KERN_WARNING "Send reply failed, error %d\n", err);
|
|
|
|
break;
|
|
|
|
}
|
2012-01-26 03:16:16 +00:00
|
|
|
} while (err < 0 && err != -ECONNREFUSED && err != -ESRCH);
|
2007-10-11 04:15:29 +00:00
|
|
|
skb_pull(skb, rlen);
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
2006-01-11 12:16:10 +00:00
|
|
|
mutex_unlock(&rx_queue_mutex);
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2006-04-07 02:13:36 +00:00
|
|
|
#define ISCSI_CLASS_ATTR(_prefix,_name,_mode,_show,_store) \
|
2008-02-21 23:13:36 +00:00
|
|
|
struct device_attribute dev_attr_##_prefix##_##_name = \
|
2006-04-07 02:13:36 +00:00
|
|
|
__ATTR(_name,_mode,_show,_store)
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
2005-08-05 02:33:07 +00:00
|
|
|
* iSCSI connection attrs
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
2006-06-28 17:00:23 +00:00
|
|
|
#define iscsi_conn_attr_show(param) \
|
2005-08-05 02:33:07 +00:00
|
|
|
static ssize_t \
|
2008-02-21 23:13:36 +00:00
|
|
|
show_conn_param_##param(struct device *dev, \
|
|
|
|
struct device_attribute *attr, char *buf) \
|
2005-08-05 02:33:07 +00:00
|
|
|
{ \
|
2008-02-21 23:13:36 +00:00
|
|
|
struct iscsi_cls_conn *conn = iscsi_dev_to_conn(dev->parent); \
|
2006-01-14 00:05:50 +00:00
|
|
|
struct iscsi_transport *t = conn->transport; \
|
2006-06-28 17:00:23 +00:00
|
|
|
return t->get_conn_param(conn, param, buf); \
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
|
|
|
|
2006-06-28 17:00:23 +00:00
|
|
|
#define iscsi_conn_attr(field, param) \
|
|
|
|
iscsi_conn_attr_show(param) \
|
|
|
|
static ISCSI_CLASS_ATTR(conn, field, S_IRUGO, show_conn_param_##param, \
|
2006-04-07 02:13:36 +00:00
|
|
|
NULL);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-06-28 17:00:23 +00:00
|
|
|
iscsi_conn_attr(max_recv_dlength, ISCSI_PARAM_MAX_RECV_DLENGTH);
|
|
|
|
iscsi_conn_attr(max_xmit_dlength, ISCSI_PARAM_MAX_XMIT_DLENGTH);
|
|
|
|
iscsi_conn_attr(header_digest, ISCSI_PARAM_HDRDGST_EN);
|
|
|
|
iscsi_conn_attr(data_digest, ISCSI_PARAM_DATADGST_EN);
|
|
|
|
iscsi_conn_attr(ifmarker, ISCSI_PARAM_IFMARKER_EN);
|
|
|
|
iscsi_conn_attr(ofmarker, ISCSI_PARAM_OFMARKER_EN);
|
|
|
|
iscsi_conn_attr(persistent_port, ISCSI_PARAM_PERSISTENT_PORT);
|
|
|
|
iscsi_conn_attr(exp_statsn, ISCSI_PARAM_EXP_STATSN);
|
|
|
|
iscsi_conn_attr(persistent_address, ISCSI_PARAM_PERSISTENT_ADDRESS);
|
2007-12-13 18:43:30 +00:00
|
|
|
iscsi_conn_attr(ping_tmo, ISCSI_PARAM_PING_TMO);
|
|
|
|
iscsi_conn_attr(recv_tmo, ISCSI_PARAM_RECV_TMO);
|
2013-07-01 09:54:11 +00:00
|
|
|
iscsi_conn_attr(local_port, ISCSI_PARAM_LOCAL_PORT);
|
|
|
|
iscsi_conn_attr(statsn, ISCSI_PARAM_STATSN);
|
|
|
|
iscsi_conn_attr(keepalive_tmo, ISCSI_PARAM_KEEPALIVE_TMO);
|
|
|
|
iscsi_conn_attr(max_segment_size, ISCSI_PARAM_MAX_SEGMENT_SIZE);
|
|
|
|
iscsi_conn_attr(tcp_timestamp_stat, ISCSI_PARAM_TCP_TIMESTAMP_STAT);
|
|
|
|
iscsi_conn_attr(tcp_wsf_disable, ISCSI_PARAM_TCP_WSF_DISABLE);
|
|
|
|
iscsi_conn_attr(tcp_nagle_disable, ISCSI_PARAM_TCP_NAGLE_DISABLE);
|
|
|
|
iscsi_conn_attr(tcp_timer_scale, ISCSI_PARAM_TCP_TIMER_SCALE);
|
|
|
|
iscsi_conn_attr(tcp_timestamp_enable, ISCSI_PARAM_TCP_TIMESTAMP_EN);
|
|
|
|
iscsi_conn_attr(fragment_disable, ISCSI_PARAM_IP_FRAGMENT_DISABLE);
|
|
|
|
iscsi_conn_attr(ipv4_tos, ISCSI_PARAM_IPV4_TOS);
|
|
|
|
iscsi_conn_attr(ipv6_traffic_class, ISCSI_PARAM_IPV6_TC);
|
|
|
|
iscsi_conn_attr(ipv6_flow_label, ISCSI_PARAM_IPV6_FLOW_LABEL);
|
|
|
|
iscsi_conn_attr(is_fw_assigned_ipv6, ISCSI_PARAM_IS_FW_ASSIGNED_IPV6);
|
|
|
|
iscsi_conn_attr(tcp_xmit_wsf, ISCSI_PARAM_TCP_XMIT_WSF);
|
|
|
|
iscsi_conn_attr(tcp_recv_wsf, ISCSI_PARAM_TCP_RECV_WSF);
|
2013-11-22 10:28:20 +00:00
|
|
|
iscsi_conn_attr(local_ipaddr, ISCSI_PARAM_LOCAL_IPADDR);
|
2013-07-01 09:54:11 +00:00
|
|
|
|
2020-03-17 23:34:22 +00:00
|
|
|
static const char *const connection_state_names[] = {
|
|
|
|
[ISCSI_CONN_UP] = "up",
|
|
|
|
[ISCSI_CONN_DOWN] = "down",
|
2021-03-25 09:32:48 +00:00
|
|
|
[ISCSI_CONN_FAILED] = "failed",
|
|
|
|
[ISCSI_CONN_BOUND] = "bound"
|
2020-03-17 23:34:22 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static ssize_t show_conn_state(struct device *dev,
|
|
|
|
struct device_attribute *attr, char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_conn *conn = iscsi_dev_to_conn(dev->parent);
|
|
|
|
const char *state = "unknown";
|
|
|
|
|
|
|
|
if (conn->state >= 0 &&
|
|
|
|
conn->state < ARRAY_SIZE(connection_state_names))
|
|
|
|
state = connection_state_names[conn->state];
|
|
|
|
|
2021-02-24 02:00:17 +00:00
|
|
|
return sysfs_emit(buf, "%s\n", state);
|
2020-03-17 23:34:22 +00:00
|
|
|
}
|
|
|
|
static ISCSI_CLASS_ATTR(conn, state, S_IRUGO, show_conn_state,
|
|
|
|
NULL);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2011-02-16 21:04:37 +00:00
|
|
|
#define iscsi_conn_ep_attr_show(param) \
|
|
|
|
static ssize_t show_conn_ep_param_##param(struct device *dev, \
|
|
|
|
struct device_attribute *attr,\
|
|
|
|
char *buf) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_cls_conn *conn = iscsi_dev_to_conn(dev->parent); \
|
|
|
|
struct iscsi_transport *t = conn->transport; \
|
|
|
|
struct iscsi_endpoint *ep; \
|
|
|
|
ssize_t rc; \
|
|
|
|
\
|
|
|
|
/* \
|
|
|
|
* Need to make sure ep_disconnect does not free the LLD's \
|
|
|
|
* interconnect resources while we are trying to read them. \
|
|
|
|
*/ \
|
|
|
|
mutex_lock(&conn->ep_mutex); \
|
|
|
|
ep = conn->ep; \
|
|
|
|
if (!ep && t->ep_connect) { \
|
|
|
|
mutex_unlock(&conn->ep_mutex); \
|
|
|
|
return -ENOTCONN; \
|
|
|
|
} \
|
|
|
|
\
|
|
|
|
if (ep) \
|
|
|
|
rc = t->get_ep_param(ep, param, buf); \
|
|
|
|
else \
|
|
|
|
rc = t->get_conn_param(conn, param, buf); \
|
|
|
|
mutex_unlock(&conn->ep_mutex); \
|
|
|
|
return rc; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define iscsi_conn_ep_attr(field, param) \
|
|
|
|
iscsi_conn_ep_attr_show(param) \
|
|
|
|
static ISCSI_CLASS_ATTR(conn, field, S_IRUGO, \
|
|
|
|
show_conn_ep_param_##param, NULL);
|
|
|
|
|
|
|
|
iscsi_conn_ep_attr(address, ISCSI_PARAM_CONN_ADDRESS);
|
|
|
|
iscsi_conn_ep_attr(port, ISCSI_PARAM_CONN_PORT);
|
|
|
|
|
2011-07-25 18:48:42 +00:00
|
|
|
static struct attribute *iscsi_conn_attrs[] = {
|
|
|
|
&dev_attr_conn_max_recv_dlength.attr,
|
|
|
|
&dev_attr_conn_max_xmit_dlength.attr,
|
|
|
|
&dev_attr_conn_header_digest.attr,
|
|
|
|
&dev_attr_conn_data_digest.attr,
|
|
|
|
&dev_attr_conn_ifmarker.attr,
|
|
|
|
&dev_attr_conn_ofmarker.attr,
|
|
|
|
&dev_attr_conn_address.attr,
|
|
|
|
&dev_attr_conn_port.attr,
|
|
|
|
&dev_attr_conn_exp_statsn.attr,
|
|
|
|
&dev_attr_conn_persistent_address.attr,
|
|
|
|
&dev_attr_conn_persistent_port.attr,
|
|
|
|
&dev_attr_conn_ping_tmo.attr,
|
|
|
|
&dev_attr_conn_recv_tmo.attr,
|
2013-07-01 09:54:11 +00:00
|
|
|
&dev_attr_conn_local_port.attr,
|
|
|
|
&dev_attr_conn_statsn.attr,
|
|
|
|
&dev_attr_conn_keepalive_tmo.attr,
|
|
|
|
&dev_attr_conn_max_segment_size.attr,
|
|
|
|
&dev_attr_conn_tcp_timestamp_stat.attr,
|
|
|
|
&dev_attr_conn_tcp_wsf_disable.attr,
|
|
|
|
&dev_attr_conn_tcp_nagle_disable.attr,
|
|
|
|
&dev_attr_conn_tcp_timer_scale.attr,
|
|
|
|
&dev_attr_conn_tcp_timestamp_enable.attr,
|
|
|
|
&dev_attr_conn_fragment_disable.attr,
|
|
|
|
&dev_attr_conn_ipv4_tos.attr,
|
|
|
|
&dev_attr_conn_ipv6_traffic_class.attr,
|
|
|
|
&dev_attr_conn_ipv6_flow_label.attr,
|
|
|
|
&dev_attr_conn_is_fw_assigned_ipv6.attr,
|
|
|
|
&dev_attr_conn_tcp_xmit_wsf.attr,
|
|
|
|
&dev_attr_conn_tcp_recv_wsf.attr,
|
2013-11-22 10:28:20 +00:00
|
|
|
&dev_attr_conn_local_ipaddr.attr,
|
2020-03-17 23:34:22 +00:00
|
|
|
&dev_attr_conn_state.attr,
|
2011-07-25 18:48:42 +00:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
2011-07-24 03:11:19 +00:00
|
|
|
static umode_t iscsi_conn_attr_is_visible(struct kobject *kobj,
|
2011-07-25 18:48:42 +00:00
|
|
|
struct attribute *attr, int i)
|
|
|
|
{
|
|
|
|
struct device *cdev = container_of(kobj, struct device, kobj);
|
|
|
|
struct iscsi_cls_conn *conn = transport_class_to_conn(cdev);
|
|
|
|
struct iscsi_transport *t = conn->transport;
|
|
|
|
int param;
|
|
|
|
|
|
|
|
if (attr == &dev_attr_conn_max_recv_dlength.attr)
|
|
|
|
param = ISCSI_PARAM_MAX_RECV_DLENGTH;
|
|
|
|
else if (attr == &dev_attr_conn_max_xmit_dlength.attr)
|
|
|
|
param = ISCSI_PARAM_MAX_XMIT_DLENGTH;
|
|
|
|
else if (attr == &dev_attr_conn_header_digest.attr)
|
|
|
|
param = ISCSI_PARAM_HDRDGST_EN;
|
|
|
|
else if (attr == &dev_attr_conn_data_digest.attr)
|
|
|
|
param = ISCSI_PARAM_DATADGST_EN;
|
|
|
|
else if (attr == &dev_attr_conn_ifmarker.attr)
|
|
|
|
param = ISCSI_PARAM_IFMARKER_EN;
|
|
|
|
else if (attr == &dev_attr_conn_ofmarker.attr)
|
|
|
|
param = ISCSI_PARAM_OFMARKER_EN;
|
|
|
|
else if (attr == &dev_attr_conn_address.attr)
|
|
|
|
param = ISCSI_PARAM_CONN_ADDRESS;
|
|
|
|
else if (attr == &dev_attr_conn_port.attr)
|
|
|
|
param = ISCSI_PARAM_CONN_PORT;
|
|
|
|
else if (attr == &dev_attr_conn_exp_statsn.attr)
|
|
|
|
param = ISCSI_PARAM_EXP_STATSN;
|
|
|
|
else if (attr == &dev_attr_conn_persistent_address.attr)
|
|
|
|
param = ISCSI_PARAM_PERSISTENT_ADDRESS;
|
|
|
|
else if (attr == &dev_attr_conn_persistent_port.attr)
|
|
|
|
param = ISCSI_PARAM_PERSISTENT_PORT;
|
|
|
|
else if (attr == &dev_attr_conn_ping_tmo.attr)
|
|
|
|
param = ISCSI_PARAM_PING_TMO;
|
|
|
|
else if (attr == &dev_attr_conn_recv_tmo.attr)
|
|
|
|
param = ISCSI_PARAM_RECV_TMO;
|
2013-07-01 09:54:11 +00:00
|
|
|
else if (attr == &dev_attr_conn_local_port.attr)
|
|
|
|
param = ISCSI_PARAM_LOCAL_PORT;
|
|
|
|
else if (attr == &dev_attr_conn_statsn.attr)
|
|
|
|
param = ISCSI_PARAM_STATSN;
|
|
|
|
else if (attr == &dev_attr_conn_keepalive_tmo.attr)
|
|
|
|
param = ISCSI_PARAM_KEEPALIVE_TMO;
|
|
|
|
else if (attr == &dev_attr_conn_max_segment_size.attr)
|
|
|
|
param = ISCSI_PARAM_MAX_SEGMENT_SIZE;
|
|
|
|
else if (attr == &dev_attr_conn_tcp_timestamp_stat.attr)
|
|
|
|
param = ISCSI_PARAM_TCP_TIMESTAMP_STAT;
|
|
|
|
else if (attr == &dev_attr_conn_tcp_wsf_disable.attr)
|
|
|
|
param = ISCSI_PARAM_TCP_WSF_DISABLE;
|
|
|
|
else if (attr == &dev_attr_conn_tcp_nagle_disable.attr)
|
|
|
|
param = ISCSI_PARAM_TCP_NAGLE_DISABLE;
|
|
|
|
else if (attr == &dev_attr_conn_tcp_timer_scale.attr)
|
|
|
|
param = ISCSI_PARAM_TCP_TIMER_SCALE;
|
|
|
|
else if (attr == &dev_attr_conn_tcp_timestamp_enable.attr)
|
|
|
|
param = ISCSI_PARAM_TCP_TIMESTAMP_EN;
|
|
|
|
else if (attr == &dev_attr_conn_fragment_disable.attr)
|
|
|
|
param = ISCSI_PARAM_IP_FRAGMENT_DISABLE;
|
|
|
|
else if (attr == &dev_attr_conn_ipv4_tos.attr)
|
|
|
|
param = ISCSI_PARAM_IPV4_TOS;
|
|
|
|
else if (attr == &dev_attr_conn_ipv6_traffic_class.attr)
|
|
|
|
param = ISCSI_PARAM_IPV6_TC;
|
|
|
|
else if (attr == &dev_attr_conn_ipv6_flow_label.attr)
|
|
|
|
param = ISCSI_PARAM_IPV6_FLOW_LABEL;
|
|
|
|
else if (attr == &dev_attr_conn_is_fw_assigned_ipv6.attr)
|
|
|
|
param = ISCSI_PARAM_IS_FW_ASSIGNED_IPV6;
|
|
|
|
else if (attr == &dev_attr_conn_tcp_xmit_wsf.attr)
|
|
|
|
param = ISCSI_PARAM_TCP_XMIT_WSF;
|
|
|
|
else if (attr == &dev_attr_conn_tcp_recv_wsf.attr)
|
|
|
|
param = ISCSI_PARAM_TCP_RECV_WSF;
|
2013-11-22 10:28:20 +00:00
|
|
|
else if (attr == &dev_attr_conn_local_ipaddr.attr)
|
|
|
|
param = ISCSI_PARAM_LOCAL_IPADDR;
|
2020-03-17 23:34:22 +00:00
|
|
|
else if (attr == &dev_attr_conn_state.attr)
|
|
|
|
return S_IRUGO;
|
2011-07-25 18:48:42 +00:00
|
|
|
else {
|
|
|
|
WARN_ONCE(1, "Invalid conn attr");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return t->attr_is_visible(ISCSI_PARAM, param);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct attribute_group iscsi_conn_group = {
|
|
|
|
.attrs = iscsi_conn_attrs,
|
|
|
|
.is_visible = iscsi_conn_attr_is_visible,
|
|
|
|
};
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
2005-08-05 02:33:07 +00:00
|
|
|
* iSCSI session attrs
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
2007-05-30 17:57:16 +00:00
|
|
|
#define iscsi_session_attr_show(param, perm) \
|
2006-04-07 02:13:36 +00:00
|
|
|
static ssize_t \
|
2008-02-21 23:13:36 +00:00
|
|
|
show_session_param_##param(struct device *dev, \
|
|
|
|
struct device_attribute *attr, char *buf) \
|
2006-04-07 02:13:36 +00:00
|
|
|
{ \
|
2008-02-21 23:13:36 +00:00
|
|
|
struct iscsi_cls_session *session = \
|
|
|
|
iscsi_dev_to_session(dev->parent); \
|
2006-04-07 02:13:36 +00:00
|
|
|
struct iscsi_transport *t = session->transport; \
|
2007-05-30 17:57:16 +00:00
|
|
|
\
|
|
|
|
if (perm && !capable(CAP_SYS_ADMIN)) \
|
|
|
|
return -EACCES; \
|
2006-06-28 17:00:23 +00:00
|
|
|
return t->get_session_param(session, param, buf); \
|
2006-04-07 02:13:36 +00:00
|
|
|
}
|
|
|
|
|
2007-05-30 17:57:16 +00:00
|
|
|
#define iscsi_session_attr(field, param, perm) \
|
|
|
|
iscsi_session_attr_show(param, perm) \
|
2006-06-28 17:00:23 +00:00
|
|
|
static ISCSI_CLASS_ATTR(sess, field, S_IRUGO, show_session_param_##param, \
|
2006-04-07 02:13:36 +00:00
|
|
|
NULL);
|
2007-05-30 17:57:16 +00:00
|
|
|
iscsi_session_attr(targetname, ISCSI_PARAM_TARGET_NAME, 0);
|
|
|
|
iscsi_session_attr(initial_r2t, ISCSI_PARAM_INITIAL_R2T_EN, 0);
|
|
|
|
iscsi_session_attr(max_outstanding_r2t, ISCSI_PARAM_MAX_R2T, 0);
|
|
|
|
iscsi_session_attr(immediate_data, ISCSI_PARAM_IMM_DATA_EN, 0);
|
|
|
|
iscsi_session_attr(first_burst_len, ISCSI_PARAM_FIRST_BURST, 0);
|
|
|
|
iscsi_session_attr(max_burst_len, ISCSI_PARAM_MAX_BURST, 0);
|
|
|
|
iscsi_session_attr(data_pdu_in_order, ISCSI_PARAM_PDU_INORDER_EN, 0);
|
|
|
|
iscsi_session_attr(data_seq_in_order, ISCSI_PARAM_DATASEQ_INORDER_EN, 0);
|
|
|
|
iscsi_session_attr(erl, ISCSI_PARAM_ERL, 0);
|
|
|
|
iscsi_session_attr(tpgt, ISCSI_PARAM_TPGT, 0);
|
|
|
|
iscsi_session_attr(username, ISCSI_PARAM_USERNAME, 1);
|
|
|
|
iscsi_session_attr(username_in, ISCSI_PARAM_USERNAME_IN, 1);
|
|
|
|
iscsi_session_attr(password, ISCSI_PARAM_PASSWORD, 1);
|
|
|
|
iscsi_session_attr(password_in, ISCSI_PARAM_PASSWORD_IN, 1);
|
2012-02-27 11:08:53 +00:00
|
|
|
iscsi_session_attr(chap_out_idx, ISCSI_PARAM_CHAP_OUT_IDX, 1);
|
|
|
|
iscsi_session_attr(chap_in_idx, ISCSI_PARAM_CHAP_IN_IDX, 1);
|
2007-12-13 18:43:38 +00:00
|
|
|
iscsi_session_attr(fast_abort, ISCSI_PARAM_FAST_ABORT, 0);
|
|
|
|
iscsi_session_attr(abort_tmo, ISCSI_PARAM_ABORT_TMO, 0);
|
|
|
|
iscsi_session_attr(lu_reset_tmo, ISCSI_PARAM_LU_RESET_TMO, 0);
|
2009-11-11 22:34:33 +00:00
|
|
|
iscsi_session_attr(tgt_reset_tmo, ISCSI_PARAM_TGT_RESET_TMO, 0);
|
2008-05-21 20:54:16 +00:00
|
|
|
iscsi_session_attr(ifacename, ISCSI_PARAM_IFACE_NAME, 0);
|
2010-07-10 09:21:30 +00:00
|
|
|
iscsi_session_attr(initiatorname, ISCSI_PARAM_INITIATOR_NAME, 0);
|
|
|
|
iscsi_session_attr(targetalias, ISCSI_PARAM_TARGET_ALIAS, 0);
|
2013-06-20 17:21:26 +00:00
|
|
|
iscsi_session_attr(boot_root, ISCSI_PARAM_BOOT_ROOT, 0);
|
|
|
|
iscsi_session_attr(boot_nic, ISCSI_PARAM_BOOT_NIC, 0);
|
|
|
|
iscsi_session_attr(boot_target, ISCSI_PARAM_BOOT_TARGET, 0);
|
2013-07-01 09:54:11 +00:00
|
|
|
iscsi_session_attr(auto_snd_tgt_disable, ISCSI_PARAM_AUTO_SND_TGT_DISABLE, 0);
|
|
|
|
iscsi_session_attr(discovery_session, ISCSI_PARAM_DISCOVERY_SESS, 0);
|
|
|
|
iscsi_session_attr(portal_type, ISCSI_PARAM_PORTAL_TYPE, 0);
|
|
|
|
iscsi_session_attr(chap_auth, ISCSI_PARAM_CHAP_AUTH_EN, 0);
|
|
|
|
iscsi_session_attr(discovery_logout, ISCSI_PARAM_DISCOVERY_LOGOUT_EN, 0);
|
|
|
|
iscsi_session_attr(bidi_chap, ISCSI_PARAM_BIDI_CHAP_EN, 0);
|
|
|
|
iscsi_session_attr(discovery_auth_optional,
|
|
|
|
ISCSI_PARAM_DISCOVERY_AUTH_OPTIONAL, 0);
|
|
|
|
iscsi_session_attr(def_time2wait, ISCSI_PARAM_DEF_TIME2WAIT, 0);
|
|
|
|
iscsi_session_attr(def_time2retain, ISCSI_PARAM_DEF_TIME2RETAIN, 0);
|
|
|
|
iscsi_session_attr(isid, ISCSI_PARAM_ISID, 0);
|
|
|
|
iscsi_session_attr(tsid, ISCSI_PARAM_TSID, 0);
|
|
|
|
iscsi_session_attr(def_taskmgmt_tmo, ISCSI_PARAM_DEF_TASKMGMT_TMO, 0);
|
|
|
|
iscsi_session_attr(discovery_parent_idx, ISCSI_PARAM_DISCOVERY_PARENT_IDX, 0);
|
|
|
|
iscsi_session_attr(discovery_parent_type, ISCSI_PARAM_DISCOVERY_PARENT_TYPE, 0);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-01-31 19:36:43 +00:00
|
|
|
static ssize_t
|
2008-02-21 23:13:36 +00:00
|
|
|
show_priv_session_state(struct device *dev, struct device_attribute *attr,
|
|
|
|
char *buf)
|
2008-01-31 19:36:43 +00:00
|
|
|
{
|
2008-02-21 23:13:36 +00:00
|
|
|
struct iscsi_cls_session *session = iscsi_dev_to_session(dev->parent);
|
2021-02-24 02:00:17 +00:00
|
|
|
return sysfs_emit(buf, "%s\n", iscsi_session_state_name(session->state));
|
2008-01-31 19:36:43 +00:00
|
|
|
}
|
|
|
|
static ISCSI_CLASS_ATTR(priv_sess, state, S_IRUGO, show_priv_session_state,
|
|
|
|
NULL);
|
2011-12-05 22:44:01 +00:00
|
|
|
static ssize_t
|
|
|
|
show_priv_session_creator(struct device *dev, struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session = iscsi_dev_to_session(dev->parent);
|
2021-02-24 02:00:17 +00:00
|
|
|
return sysfs_emit(buf, "%d\n", session->creator);
|
2011-12-05 22:44:01 +00:00
|
|
|
}
|
|
|
|
static ISCSI_CLASS_ATTR(priv_sess, creator, S_IRUGO, show_priv_session_creator,
|
|
|
|
NULL);
|
2012-11-23 11:58:41 +00:00
|
|
|
static ssize_t
|
|
|
|
show_priv_session_target_id(struct device *dev, struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
struct iscsi_cls_session *session = iscsi_dev_to_session(dev->parent);
|
2021-02-24 02:00:17 +00:00
|
|
|
return sysfs_emit(buf, "%d\n", session->target_id);
|
2012-11-23 11:58:41 +00:00
|
|
|
}
|
|
|
|
static ISCSI_CLASS_ATTR(priv_sess, target_id, S_IRUGO,
|
|
|
|
show_priv_session_target_id, NULL);
|
2008-01-31 19:36:43 +00:00
|
|
|
|
2006-04-07 02:13:36 +00:00
|
|
|
#define iscsi_priv_session_attr_show(field, format) \
|
|
|
|
static ssize_t \
|
2008-02-21 23:13:36 +00:00
|
|
|
show_priv_session_##field(struct device *dev, \
|
|
|
|
struct device_attribute *attr, char *buf) \
|
2006-04-07 02:13:36 +00:00
|
|
|
{ \
|
2008-02-21 23:13:36 +00:00
|
|
|
struct iscsi_cls_session *session = \
|
|
|
|
iscsi_dev_to_session(dev->parent); \
|
2010-07-22 11:27:43 +00:00
|
|
|
if (session->field == -1) \
|
2021-02-24 02:00:17 +00:00
|
|
|
return sysfs_emit(buf, "off\n"); \
|
|
|
|
return sysfs_emit(buf, format"\n", session->field); \
|
2006-04-07 02:13:36 +00:00
|
|
|
}
|
|
|
|
|
2010-07-22 11:27:43 +00:00
|
|
|
#define iscsi_priv_session_attr_store(field) \
|
|
|
|
static ssize_t \
|
|
|
|
store_priv_session_##field(struct device *dev, \
|
|
|
|
struct device_attribute *attr, \
|
|
|
|
const char *buf, size_t count) \
|
|
|
|
{ \
|
|
|
|
int val; \
|
|
|
|
char *cp; \
|
|
|
|
struct iscsi_cls_session *session = \
|
|
|
|
iscsi_dev_to_session(dev->parent); \
|
|
|
|
if ((session->state == ISCSI_SESSION_FREE) || \
|
|
|
|
(session->state == ISCSI_SESSION_FAILED)) \
|
|
|
|
return -EBUSY; \
|
2015-06-16 23:07:13 +00:00
|
|
|
if (strncmp(buf, "off", 3) == 0) { \
|
2010-07-22 11:27:43 +00:00
|
|
|
session->field = -1; \
|
2015-06-16 23:07:13 +00:00
|
|
|
session->field##_sysfs_override = true; \
|
|
|
|
} else { \
|
2010-07-22 11:27:43 +00:00
|
|
|
val = simple_strtoul(buf, &cp, 0); \
|
|
|
|
if (*cp != '\0' && *cp != '\n') \
|
|
|
|
return -EINVAL; \
|
|
|
|
session->field = val; \
|
2015-06-16 23:07:13 +00:00
|
|
|
session->field##_sysfs_override = true; \
|
2010-07-22 11:27:43 +00:00
|
|
|
} \
|
|
|
|
return count; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define iscsi_priv_session_rw_attr(field, format) \
|
2006-04-07 02:13:36 +00:00
|
|
|
iscsi_priv_session_attr_show(field, format) \
|
2010-07-22 11:27:43 +00:00
|
|
|
iscsi_priv_session_attr_store(field) \
|
2011-02-04 12:24:14 +00:00
|
|
|
static ISCSI_CLASS_ATTR(priv_sess, field, S_IRUGO | S_IWUSR, \
|
2010-07-22 11:27:43 +00:00
|
|
|
show_priv_session_##field, \
|
|
|
|
store_priv_session_##field)
|
2015-06-16 23:07:13 +00:00
|
|
|
|
2010-07-22 11:27:43 +00:00
|
|
|
iscsi_priv_session_rw_attr(recovery_tmo, "%d");
|
2006-04-07 02:13:36 +00:00
|
|
|
|
2011-07-25 18:48:43 +00:00
|
|
|
static struct attribute *iscsi_session_attrs[] = {
|
|
|
|
&dev_attr_sess_initial_r2t.attr,
|
|
|
|
&dev_attr_sess_max_outstanding_r2t.attr,
|
|
|
|
&dev_attr_sess_immediate_data.attr,
|
|
|
|
&dev_attr_sess_first_burst_len.attr,
|
|
|
|
&dev_attr_sess_max_burst_len.attr,
|
|
|
|
&dev_attr_sess_data_pdu_in_order.attr,
|
|
|
|
&dev_attr_sess_data_seq_in_order.attr,
|
|
|
|
&dev_attr_sess_erl.attr,
|
|
|
|
&dev_attr_sess_targetname.attr,
|
|
|
|
&dev_attr_sess_tpgt.attr,
|
|
|
|
&dev_attr_sess_password.attr,
|
|
|
|
&dev_attr_sess_password_in.attr,
|
|
|
|
&dev_attr_sess_username.attr,
|
|
|
|
&dev_attr_sess_username_in.attr,
|
|
|
|
&dev_attr_sess_fast_abort.attr,
|
|
|
|
&dev_attr_sess_abort_tmo.attr,
|
|
|
|
&dev_attr_sess_lu_reset_tmo.attr,
|
|
|
|
&dev_attr_sess_tgt_reset_tmo.attr,
|
|
|
|
&dev_attr_sess_ifacename.attr,
|
|
|
|
&dev_attr_sess_initiatorname.attr,
|
|
|
|
&dev_attr_sess_targetalias.attr,
|
2013-06-20 17:21:26 +00:00
|
|
|
&dev_attr_sess_boot_root.attr,
|
|
|
|
&dev_attr_sess_boot_nic.attr,
|
|
|
|
&dev_attr_sess_boot_target.attr,
|
2011-07-25 18:48:43 +00:00
|
|
|
&dev_attr_priv_sess_recovery_tmo.attr,
|
|
|
|
&dev_attr_priv_sess_state.attr,
|
2011-12-05 22:44:01 +00:00
|
|
|
&dev_attr_priv_sess_creator.attr,
|
2012-02-27 11:08:53 +00:00
|
|
|
&dev_attr_sess_chap_out_idx.attr,
|
|
|
|
&dev_attr_sess_chap_in_idx.attr,
|
2012-11-23 11:58:41 +00:00
|
|
|
&dev_attr_priv_sess_target_id.attr,
|
2013-07-01 09:54:11 +00:00
|
|
|
&dev_attr_sess_auto_snd_tgt_disable.attr,
|
|
|
|
&dev_attr_sess_discovery_session.attr,
|
|
|
|
&dev_attr_sess_portal_type.attr,
|
|
|
|
&dev_attr_sess_chap_auth.attr,
|
|
|
|
&dev_attr_sess_discovery_logout.attr,
|
|
|
|
&dev_attr_sess_bidi_chap.attr,
|
|
|
|
&dev_attr_sess_discovery_auth_optional.attr,
|
|
|
|
&dev_attr_sess_def_time2wait.attr,
|
|
|
|
&dev_attr_sess_def_time2retain.attr,
|
|
|
|
&dev_attr_sess_isid.attr,
|
|
|
|
&dev_attr_sess_tsid.attr,
|
|
|
|
&dev_attr_sess_def_taskmgmt_tmo.attr,
|
|
|
|
&dev_attr_sess_discovery_parent_idx.attr,
|
|
|
|
&dev_attr_sess_discovery_parent_type.attr,
|
2011-07-25 18:48:43 +00:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
2011-07-24 03:11:19 +00:00
|
|
|
static umode_t iscsi_session_attr_is_visible(struct kobject *kobj,
|
2011-07-25 18:48:43 +00:00
|
|
|
struct attribute *attr, int i)
|
|
|
|
{
|
|
|
|
struct device *cdev = container_of(kobj, struct device, kobj);
|
|
|
|
struct iscsi_cls_session *session = transport_class_to_session(cdev);
|
|
|
|
struct iscsi_transport *t = session->transport;
|
|
|
|
int param;
|
|
|
|
|
|
|
|
if (attr == &dev_attr_sess_initial_r2t.attr)
|
|
|
|
param = ISCSI_PARAM_INITIAL_R2T_EN;
|
|
|
|
else if (attr == &dev_attr_sess_max_outstanding_r2t.attr)
|
|
|
|
param = ISCSI_PARAM_MAX_R2T;
|
|
|
|
else if (attr == &dev_attr_sess_immediate_data.attr)
|
|
|
|
param = ISCSI_PARAM_IMM_DATA_EN;
|
|
|
|
else if (attr == &dev_attr_sess_first_burst_len.attr)
|
|
|
|
param = ISCSI_PARAM_FIRST_BURST;
|
|
|
|
else if (attr == &dev_attr_sess_max_burst_len.attr)
|
|
|
|
param = ISCSI_PARAM_MAX_BURST;
|
|
|
|
else if (attr == &dev_attr_sess_data_pdu_in_order.attr)
|
|
|
|
param = ISCSI_PARAM_PDU_INORDER_EN;
|
|
|
|
else if (attr == &dev_attr_sess_data_seq_in_order.attr)
|
|
|
|
param = ISCSI_PARAM_DATASEQ_INORDER_EN;
|
|
|
|
else if (attr == &dev_attr_sess_erl.attr)
|
|
|
|
param = ISCSI_PARAM_ERL;
|
|
|
|
else if (attr == &dev_attr_sess_targetname.attr)
|
|
|
|
param = ISCSI_PARAM_TARGET_NAME;
|
|
|
|
else if (attr == &dev_attr_sess_tpgt.attr)
|
|
|
|
param = ISCSI_PARAM_TPGT;
|
2012-02-27 11:08:53 +00:00
|
|
|
else if (attr == &dev_attr_sess_chap_in_idx.attr)
|
|
|
|
param = ISCSI_PARAM_CHAP_IN_IDX;
|
|
|
|
else if (attr == &dev_attr_sess_chap_out_idx.attr)
|
|
|
|
param = ISCSI_PARAM_CHAP_OUT_IDX;
|
2011-07-25 18:48:43 +00:00
|
|
|
else if (attr == &dev_attr_sess_password.attr)
|
|
|
|
param = ISCSI_PARAM_USERNAME;
|
|
|
|
else if (attr == &dev_attr_sess_password_in.attr)
|
|
|
|
param = ISCSI_PARAM_USERNAME_IN;
|
|
|
|
else if (attr == &dev_attr_sess_username.attr)
|
|
|
|
param = ISCSI_PARAM_PASSWORD;
|
|
|
|
else if (attr == &dev_attr_sess_username_in.attr)
|
|
|
|
param = ISCSI_PARAM_PASSWORD_IN;
|
|
|
|
else if (attr == &dev_attr_sess_fast_abort.attr)
|
|
|
|
param = ISCSI_PARAM_FAST_ABORT;
|
|
|
|
else if (attr == &dev_attr_sess_abort_tmo.attr)
|
|
|
|
param = ISCSI_PARAM_ABORT_TMO;
|
|
|
|
else if (attr == &dev_attr_sess_lu_reset_tmo.attr)
|
|
|
|
param = ISCSI_PARAM_LU_RESET_TMO;
|
|
|
|
else if (attr == &dev_attr_sess_tgt_reset_tmo.attr)
|
|
|
|
param = ISCSI_PARAM_TGT_RESET_TMO;
|
|
|
|
else if (attr == &dev_attr_sess_ifacename.attr)
|
|
|
|
param = ISCSI_PARAM_IFACE_NAME;
|
|
|
|
else if (attr == &dev_attr_sess_initiatorname.attr)
|
|
|
|
param = ISCSI_PARAM_INITIATOR_NAME;
|
|
|
|
else if (attr == &dev_attr_sess_targetalias.attr)
|
|
|
|
param = ISCSI_PARAM_TARGET_ALIAS;
|
2013-06-20 17:21:26 +00:00
|
|
|
else if (attr == &dev_attr_sess_boot_root.attr)
|
|
|
|
param = ISCSI_PARAM_BOOT_ROOT;
|
|
|
|
else if (attr == &dev_attr_sess_boot_nic.attr)
|
|
|
|
param = ISCSI_PARAM_BOOT_NIC;
|
|
|
|
else if (attr == &dev_attr_sess_boot_target.attr)
|
|
|
|
param = ISCSI_PARAM_BOOT_TARGET;
|
2013-07-01 09:54:11 +00:00
|
|
|
else if (attr == &dev_attr_sess_auto_snd_tgt_disable.attr)
|
|
|
|
param = ISCSI_PARAM_AUTO_SND_TGT_DISABLE;
|
|
|
|
else if (attr == &dev_attr_sess_discovery_session.attr)
|
|
|
|
param = ISCSI_PARAM_DISCOVERY_SESS;
|
|
|
|
else if (attr == &dev_attr_sess_portal_type.attr)
|
|
|
|
param = ISCSI_PARAM_PORTAL_TYPE;
|
|
|
|
else if (attr == &dev_attr_sess_chap_auth.attr)
|
|
|
|
param = ISCSI_PARAM_CHAP_AUTH_EN;
|
|
|
|
else if (attr == &dev_attr_sess_discovery_logout.attr)
|
|
|
|
param = ISCSI_PARAM_DISCOVERY_LOGOUT_EN;
|
|
|
|
else if (attr == &dev_attr_sess_bidi_chap.attr)
|
|
|
|
param = ISCSI_PARAM_BIDI_CHAP_EN;
|
|
|
|
else if (attr == &dev_attr_sess_discovery_auth_optional.attr)
|
|
|
|
param = ISCSI_PARAM_DISCOVERY_AUTH_OPTIONAL;
|
|
|
|
else if (attr == &dev_attr_sess_def_time2wait.attr)
|
|
|
|
param = ISCSI_PARAM_DEF_TIME2WAIT;
|
|
|
|
else if (attr == &dev_attr_sess_def_time2retain.attr)
|
|
|
|
param = ISCSI_PARAM_DEF_TIME2RETAIN;
|
|
|
|
else if (attr == &dev_attr_sess_isid.attr)
|
|
|
|
param = ISCSI_PARAM_ISID;
|
|
|
|
else if (attr == &dev_attr_sess_tsid.attr)
|
|
|
|
param = ISCSI_PARAM_TSID;
|
|
|
|
else if (attr == &dev_attr_sess_def_taskmgmt_tmo.attr)
|
|
|
|
param = ISCSI_PARAM_DEF_TASKMGMT_TMO;
|
|
|
|
else if (attr == &dev_attr_sess_discovery_parent_idx.attr)
|
|
|
|
param = ISCSI_PARAM_DISCOVERY_PARENT_IDX;
|
|
|
|
else if (attr == &dev_attr_sess_discovery_parent_type.attr)
|
|
|
|
param = ISCSI_PARAM_DISCOVERY_PARENT_TYPE;
|
2011-07-25 18:48:43 +00:00
|
|
|
else if (attr == &dev_attr_priv_sess_recovery_tmo.attr)
|
|
|
|
return S_IRUGO | S_IWUSR;
|
|
|
|
else if (attr == &dev_attr_priv_sess_state.attr)
|
|
|
|
return S_IRUGO;
|
2011-12-05 22:44:01 +00:00
|
|
|
else if (attr == &dev_attr_priv_sess_creator.attr)
|
|
|
|
return S_IRUGO;
|
2012-11-23 11:58:41 +00:00
|
|
|
else if (attr == &dev_attr_priv_sess_target_id.attr)
|
|
|
|
return S_IRUGO;
|
2011-07-25 18:48:43 +00:00
|
|
|
else {
|
|
|
|
WARN_ONCE(1, "Invalid session attr");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return t->attr_is_visible(ISCSI_PARAM, param);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct attribute_group iscsi_session_group = {
|
|
|
|
.attrs = iscsi_session_attrs,
|
|
|
|
.is_visible = iscsi_session_attr_is_visible,
|
|
|
|
};
|
|
|
|
|
2007-05-30 17:57:08 +00:00
|
|
|
/*
|
|
|
|
* iSCSI host attrs
|
|
|
|
*/
|
|
|
|
#define iscsi_host_attr_show(param) \
|
|
|
|
static ssize_t \
|
2008-02-21 23:13:36 +00:00
|
|
|
show_host_param_##param(struct device *dev, \
|
|
|
|
struct device_attribute *attr, char *buf) \
|
2007-05-30 17:57:08 +00:00
|
|
|
{ \
|
2008-02-21 23:13:36 +00:00
|
|
|
struct Scsi_Host *shost = transport_class_to_shost(dev); \
|
2007-05-30 17:57:08 +00:00
|
|
|
struct iscsi_internal *priv = to_iscsi_internal(shost->transportt); \
|
|
|
|
return priv->iscsi_transport->get_host_param(shost, param, buf); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define iscsi_host_attr(field, param) \
|
|
|
|
iscsi_host_attr_show(param) \
|
|
|
|
static ISCSI_CLASS_ATTR(host, field, S_IRUGO, show_host_param_##param, \
|
|
|
|
NULL);
|
|
|
|
|
[SCSI] iscsi class, iscsi_tcp, iser, qla4xxx: add netdevname sysfs attr
iSCSI must support software iscsi (iscsi_tcp, iser), hardware iscsi (qla4xxx),
and partial offload (broadcom). To be able to allow each stack or driver
or port (virtual or physical) to be able to log into the same target portal
we use the initiator tuple [[HWADDRESS | NETDEVNAME], INITIATOR_NAME] and
the target tuple [TARGETNAME, CONN_ADDRESS, CONN_PORT] to id a session.
This patch adds the netdev name, which is used by software iscsi when
it binds a session to a netdevice using the SO_BINDTODEVICE sock opt.
It cannot use HWADDRESS because if someone did vlans then the same netdevice
will have the same mac and the initiator,target id will not be unique.
Signed-off-by: Mike Christie <michaelc@cs.wisc.edu>
Cc: Roland Dreier <rdreier@cisco.com>
Cc: David C Somayajulu <david.somayajulu@qlogic.com>
Signed-off-by: James Bottomley <James.Bottomley@SteelEye.com>
2007-05-30 17:57:25 +00:00
|
|
|
iscsi_host_attr(netdev, ISCSI_HOST_PARAM_NETDEV_NAME);
|
2007-05-30 17:57:08 +00:00
|
|
|
iscsi_host_attr(hwaddress, ISCSI_HOST_PARAM_HWADDRESS);
|
[SCSI] iscsi class, iscsi_tcp, iser, qla4xxx: add netdevname sysfs attr
iSCSI must support software iscsi (iscsi_tcp, iser), hardware iscsi (qla4xxx),
and partial offload (broadcom). To be able to allow each stack or driver
or port (virtual or physical) to be able to log into the same target portal
we use the initiator tuple [[HWADDRESS | NETDEVNAME], INITIATOR_NAME] and
the target tuple [TARGETNAME, CONN_ADDRESS, CONN_PORT] to id a session.
This patch adds the netdev name, which is used by software iscsi when
it binds a session to a netdevice using the SO_BINDTODEVICE sock opt.
It cannot use HWADDRESS because if someone did vlans then the same netdevice
will have the same mac and the initiator,target id will not be unique.
Signed-off-by: Mike Christie <michaelc@cs.wisc.edu>
Cc: Roland Dreier <rdreier@cisco.com>
Cc: David C Somayajulu <david.somayajulu@qlogic.com>
Signed-off-by: James Bottomley <James.Bottomley@SteelEye.com>
2007-05-30 17:57:25 +00:00
|
|
|
iscsi_host_attr(ipaddress, ISCSI_HOST_PARAM_IPADDRESS);
|
2007-05-30 17:57:13 +00:00
|
|
|
iscsi_host_attr(initiatorname, ISCSI_HOST_PARAM_INITIATOR_NAME);
|
2012-01-19 11:06:55 +00:00
|
|
|
iscsi_host_attr(port_state, ISCSI_HOST_PARAM_PORT_STATE);
|
|
|
|
iscsi_host_attr(port_speed, ISCSI_HOST_PARAM_PORT_SPEED);
|
2007-05-30 17:57:08 +00:00
|
|
|
|
2011-07-25 18:48:45 +00:00
|
|
|
static struct attribute *iscsi_host_attrs[] = {
|
|
|
|
&dev_attr_host_netdev.attr,
|
|
|
|
&dev_attr_host_hwaddress.attr,
|
|
|
|
&dev_attr_host_ipaddress.attr,
|
|
|
|
&dev_attr_host_initiatorname.attr,
|
2012-01-19 11:06:55 +00:00
|
|
|
&dev_attr_host_port_state.attr,
|
|
|
|
&dev_attr_host_port_speed.attr,
|
2011-07-25 18:48:45 +00:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
2011-07-24 03:11:19 +00:00
|
|
|
static umode_t iscsi_host_attr_is_visible(struct kobject *kobj,
|
2011-07-25 18:48:45 +00:00
|
|
|
struct attribute *attr, int i)
|
|
|
|
{
|
|
|
|
struct device *cdev = container_of(kobj, struct device, kobj);
|
|
|
|
struct Scsi_Host *shost = transport_class_to_shost(cdev);
|
|
|
|
struct iscsi_internal *priv = to_iscsi_internal(shost->transportt);
|
|
|
|
int param;
|
|
|
|
|
|
|
|
if (attr == &dev_attr_host_netdev.attr)
|
|
|
|
param = ISCSI_HOST_PARAM_NETDEV_NAME;
|
|
|
|
else if (attr == &dev_attr_host_hwaddress.attr)
|
|
|
|
param = ISCSI_HOST_PARAM_HWADDRESS;
|
|
|
|
else if (attr == &dev_attr_host_ipaddress.attr)
|
|
|
|
param = ISCSI_HOST_PARAM_IPADDRESS;
|
|
|
|
else if (attr == &dev_attr_host_initiatorname.attr)
|
|
|
|
param = ISCSI_HOST_PARAM_INITIATOR_NAME;
|
2012-01-19 11:06:55 +00:00
|
|
|
else if (attr == &dev_attr_host_port_state.attr)
|
|
|
|
param = ISCSI_HOST_PARAM_PORT_STATE;
|
|
|
|
else if (attr == &dev_attr_host_port_speed.attr)
|
|
|
|
param = ISCSI_HOST_PARAM_PORT_SPEED;
|
2011-07-25 18:48:45 +00:00
|
|
|
else {
|
|
|
|
WARN_ONCE(1, "Invalid host attr");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return priv->iscsi_transport->attr_is_visible(ISCSI_HOST_PARAM, param);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct attribute_group iscsi_host_group = {
|
|
|
|
.attrs = iscsi_host_attrs,
|
|
|
|
.is_visible = iscsi_host_attr_is_visible,
|
|
|
|
};
|
2007-05-30 17:57:08 +00:00
|
|
|
|
2012-01-19 11:06:55 +00:00
|
|
|
/* convert iscsi_port_speed values to ascii string name */
|
|
|
|
static const struct {
|
|
|
|
enum iscsi_port_speed value;
|
|
|
|
char *name;
|
|
|
|
} iscsi_port_speed_names[] = {
|
|
|
|
{ISCSI_PORT_SPEED_UNKNOWN, "Unknown" },
|
|
|
|
{ISCSI_PORT_SPEED_10MBPS, "10 Mbps" },
|
|
|
|
{ISCSI_PORT_SPEED_100MBPS, "100 Mbps" },
|
|
|
|
{ISCSI_PORT_SPEED_1GBPS, "1 Gbps" },
|
|
|
|
{ISCSI_PORT_SPEED_10GBPS, "10 Gbps" },
|
2016-01-20 08:40:57 +00:00
|
|
|
{ISCSI_PORT_SPEED_25GBPS, "25 Gbps" },
|
|
|
|
{ISCSI_PORT_SPEED_40GBPS, "40 Gbps" },
|
2012-01-19 11:06:55 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
char *iscsi_get_port_speed_name(struct Scsi_Host *shost)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char *speed = "Unknown!";
|
|
|
|
struct iscsi_cls_host *ihost = shost->shost_data;
|
|
|
|
uint32_t port_speed = ihost->port_speed;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(iscsi_port_speed_names); i++) {
|
|
|
|
if (iscsi_port_speed_names[i].value & port_speed) {
|
|
|
|
speed = iscsi_port_speed_names[i].name;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return speed;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_get_port_speed_name);
|
|
|
|
|
|
|
|
/* convert iscsi_port_state values to ascii string name */
|
|
|
|
static const struct {
|
|
|
|
enum iscsi_port_state value;
|
|
|
|
char *name;
|
|
|
|
} iscsi_port_state_names[] = {
|
|
|
|
{ISCSI_PORT_STATE_DOWN, "LINK DOWN" },
|
|
|
|
{ISCSI_PORT_STATE_UP, "LINK UP" },
|
|
|
|
};
|
|
|
|
|
|
|
|
char *iscsi_get_port_state_name(struct Scsi_Host *shost)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char *state = "Unknown!";
|
|
|
|
struct iscsi_cls_host *ihost = shost->shost_data;
|
|
|
|
uint32_t port_state = ihost->port_state;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(iscsi_port_state_names); i++) {
|
|
|
|
if (iscsi_port_state_names[i].value & port_state) {
|
|
|
|
state = iscsi_port_state_names[i].name;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return state;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_get_port_state_name);
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
static int iscsi_session_match(struct attribute_container *cont,
|
|
|
|
struct device *dev)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2006-01-14 00:05:50 +00:00
|
|
|
struct iscsi_cls_session *session;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct Scsi_Host *shost;
|
2005-08-05 02:33:07 +00:00
|
|
|
struct iscsi_internal *priv;
|
|
|
|
|
|
|
|
if (!iscsi_is_session_dev(dev))
|
|
|
|
return 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
session = iscsi_dev_to_session(dev);
|
|
|
|
shost = iscsi_session_to_shost(session);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (!shost->transportt)
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
priv = to_iscsi_internal(shost->transportt);
|
|
|
|
if (priv->session_cont.ac.class != &iscsi_session_class.class)
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
return &priv->session_cont.ac == cont;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
static int iscsi_conn_match(struct attribute_container *cont,
|
|
|
|
struct device *dev)
|
|
|
|
{
|
2006-01-14 00:05:50 +00:00
|
|
|
struct iscsi_cls_session *session;
|
|
|
|
struct iscsi_cls_conn *conn;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct Scsi_Host *shost;
|
2005-08-05 02:33:07 +00:00
|
|
|
struct iscsi_internal *priv;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
if (!iscsi_is_conn_dev(dev))
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
conn = iscsi_dev_to_conn(dev);
|
|
|
|
session = iscsi_dev_to_session(conn->dev.parent);
|
|
|
|
shost = iscsi_session_to_shost(session);
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
if (!shost->transportt)
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
priv = to_iscsi_internal(shost->transportt);
|
|
|
|
if (priv->conn_cont.ac.class != &iscsi_connection_class.class)
|
|
|
|
return 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
return &priv->conn_cont.ac == cont;
|
|
|
|
}
|
|
|
|
|
2006-04-07 02:13:39 +00:00
|
|
|
static int iscsi_host_match(struct attribute_container *cont,
|
|
|
|
struct device *dev)
|
|
|
|
{
|
|
|
|
struct Scsi_Host *shost;
|
|
|
|
struct iscsi_internal *priv;
|
|
|
|
|
|
|
|
if (!scsi_is_host_device(dev))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
shost = dev_to_shost(dev);
|
|
|
|
if (!shost->transportt ||
|
|
|
|
shost->transportt->host_attrs.ac.class != &iscsi_host_class.class)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
priv = to_iscsi_internal(shost->transportt);
|
|
|
|
return &priv->t.host_attrs.ac == cont;
|
|
|
|
}
|
|
|
|
|
2006-01-14 00:05:50 +00:00
|
|
|
struct scsi_transport_template *
|
|
|
|
iscsi_register_transport(struct iscsi_transport *tt)
|
2005-08-05 02:33:07 +00:00
|
|
|
{
|
|
|
|
struct iscsi_internal *priv;
|
|
|
|
unsigned long flags;
|
2011-07-25 18:48:45 +00:00
|
|
|
int err;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
|
|
|
BUG_ON(!tt);
|
|
|
|
|
|
|
|
priv = iscsi_if_transport_lookup(tt);
|
|
|
|
if (priv)
|
2006-01-14 00:05:50 +00:00
|
|
|
return NULL;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-01-16 15:31:18 +00:00
|
|
|
priv = kzalloc(sizeof(*priv), GFP_KERNEL);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (!priv)
|
2006-01-14 00:05:50 +00:00
|
|
|
return NULL;
|
2005-08-05 02:33:07 +00:00
|
|
|
INIT_LIST_HEAD(&priv->list);
|
|
|
|
priv->iscsi_transport = tt;
|
2006-04-07 02:13:39 +00:00
|
|
|
priv->t.user_scan = iscsi_user_scan;
|
2009-03-05 20:46:02 +00:00
|
|
|
priv->t.create_work_queue = 1;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2008-02-21 23:13:36 +00:00
|
|
|
priv->dev.class = &iscsi_transport_class;
|
2008-12-03 21:41:36 +00:00
|
|
|
dev_set_name(&priv->dev, "%s", tt->name);
|
2008-02-21 23:13:36 +00:00
|
|
|
err = device_register(&priv->dev);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (err)
|
|
|
|
goto free_priv;
|
|
|
|
|
2008-02-21 23:13:36 +00:00
|
|
|
err = sysfs_create_group(&priv->dev.kobj, &iscsi_transport_group);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (err)
|
2008-02-21 23:13:36 +00:00
|
|
|
goto unregister_dev;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2006-04-07 02:13:39 +00:00
|
|
|
/* host parameters */
|
|
|
|
priv->t.host_attrs.ac.class = &iscsi_host_class.class;
|
|
|
|
priv->t.host_attrs.ac.match = iscsi_host_match;
|
2011-07-25 18:48:45 +00:00
|
|
|
priv->t.host_attrs.ac.grp = &iscsi_host_group;
|
2008-05-21 20:53:58 +00:00
|
|
|
priv->t.host_size = sizeof(struct iscsi_cls_host);
|
2006-04-07 02:13:39 +00:00
|
|
|
transport_container_register(&priv->t.host_attrs);
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
/* connection parameters */
|
|
|
|
priv->conn_cont.ac.class = &iscsi_connection_class.class;
|
|
|
|
priv->conn_cont.ac.match = iscsi_conn_match;
|
2011-07-25 18:48:42 +00:00
|
|
|
priv->conn_cont.ac.grp = &iscsi_conn_group;
|
2005-08-05 02:33:07 +00:00
|
|
|
transport_container_register(&priv->conn_cont);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
/* session parameters */
|
|
|
|
priv->session_cont.ac.class = &iscsi_session_class.class;
|
|
|
|
priv->session_cont.ac.match = iscsi_session_match;
|
2011-07-25 18:48:43 +00:00
|
|
|
priv->session_cont.ac.grp = &iscsi_session_group;
|
2005-08-05 02:33:07 +00:00
|
|
|
transport_container_register(&priv->session_cont);
|
|
|
|
|
|
|
|
spin_lock_irqsave(&iscsi_transport_lock, flags);
|
|
|
|
list_add(&priv->list, &iscsi_transports);
|
|
|
|
spin_unlock_irqrestore(&iscsi_transport_lock, flags);
|
|
|
|
|
|
|
|
printk(KERN_NOTICE "iscsi: registered transport (%s)\n", tt->name);
|
2006-01-14 00:05:50 +00:00
|
|
|
return &priv->t;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-02-21 23:13:36 +00:00
|
|
|
unregister_dev:
|
|
|
|
device_unregister(&priv->dev);
|
2008-05-21 20:54:13 +00:00
|
|
|
return NULL;
|
2005-08-05 02:33:07 +00:00
|
|
|
free_priv:
|
|
|
|
kfree(priv);
|
2006-01-14 00:05:50 +00:00
|
|
|
return NULL;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2005-08-05 02:33:07 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iscsi_register_transport);
|
|
|
|
|
|
|
|
int iscsi_unregister_transport(struct iscsi_transport *tt)
|
|
|
|
{
|
|
|
|
struct iscsi_internal *priv;
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
BUG_ON(!tt);
|
|
|
|
|
2006-01-11 12:16:10 +00:00
|
|
|
mutex_lock(&rx_queue_mutex);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
|
|
|
priv = iscsi_if_transport_lookup(tt);
|
|
|
|
BUG_ON (!priv);
|
|
|
|
|
|
|
|
spin_lock_irqsave(&iscsi_transport_lock, flags);
|
|
|
|
list_del(&priv->list);
|
|
|
|
spin_unlock_irqrestore(&iscsi_transport_lock, flags);
|
|
|
|
|
|
|
|
transport_container_unregister(&priv->conn_cont);
|
|
|
|
transport_container_unregister(&priv->session_cont);
|
2006-04-07 02:13:39 +00:00
|
|
|
transport_container_unregister(&priv->t.host_attrs);
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2008-02-21 23:13:36 +00:00
|
|
|
sysfs_remove_group(&priv->dev.kobj, &iscsi_transport_group);
|
|
|
|
device_unregister(&priv->dev);
|
2006-01-11 12:16:10 +00:00
|
|
|
mutex_unlock(&rx_queue_mutex);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_unregister_transport);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2018-11-21 17:04:43 +00:00
|
|
|
void iscsi_dbg_trace(void (*trace)(struct device *dev, struct va_format *),
|
|
|
|
struct device *dev, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
struct va_format vaf;
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
va_start(args, fmt);
|
|
|
|
vaf.fmt = fmt;
|
|
|
|
vaf.va = &args;
|
|
|
|
trace(dev, &vaf);
|
|
|
|
va_end(args);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(iscsi_dbg_trace);
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static __init int iscsi_transport_init(void)
|
|
|
|
{
|
2005-08-05 02:33:07 +00:00
|
|
|
int err;
|
2012-06-29 06:15:21 +00:00
|
|
|
struct netlink_kernel_cfg cfg = {
|
|
|
|
.groups = 1,
|
|
|
|
.input = iscsi_if_rx,
|
|
|
|
};
|
2006-12-17 18:10:26 +00:00
|
|
|
printk(KERN_INFO "Loading iSCSI transport class v%s.\n",
|
2006-07-24 20:47:54 +00:00
|
|
|
ISCSI_TRANSPORT_VERSION);
|
|
|
|
|
2007-02-28 23:32:18 +00:00
|
|
|
atomic_set(&iscsi_session_nr, 0);
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
err = class_register(&iscsi_transport_class);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (err)
|
|
|
|
return err;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2008-05-21 20:54:13 +00:00
|
|
|
err = class_register(&iscsi_endpoint_class);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (err)
|
|
|
|
goto unregister_transport_class;
|
|
|
|
|
2011-07-25 18:48:40 +00:00
|
|
|
err = class_register(&iscsi_iface_class);
|
2008-05-21 20:54:13 +00:00
|
|
|
if (err)
|
|
|
|
goto unregister_endpoint_class;
|
|
|
|
|
2011-07-25 18:48:40 +00:00
|
|
|
err = transport_class_register(&iscsi_host_class);
|
|
|
|
if (err)
|
|
|
|
goto unregister_iface_class;
|
|
|
|
|
2006-04-07 02:13:39 +00:00
|
|
|
err = transport_class_register(&iscsi_connection_class);
|
|
|
|
if (err)
|
|
|
|
goto unregister_host_class;
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
err = transport_class_register(&iscsi_session_class);
|
|
|
|
if (err)
|
|
|
|
goto unregister_conn_class;
|
|
|
|
|
2013-03-22 11:41:29 +00:00
|
|
|
err = bus_register(&iscsi_flashnode_bus);
|
|
|
|
if (err)
|
|
|
|
goto unregister_session_class;
|
|
|
|
|
2012-09-08 02:53:54 +00:00
|
|
|
nls = netlink_kernel_create(&init_net, NETLINK_ISCSI, &cfg);
|
2005-08-05 02:33:07 +00:00
|
|
|
if (!nls) {
|
|
|
|
err = -ENOBUFS;
|
2013-03-22 11:41:29 +00:00
|
|
|
goto unregister_flashnode_bus;
|
2005-08-05 02:33:07 +00:00
|
|
|
}
|
|
|
|
|
2020-05-05 01:19:08 +00:00
|
|
|
iscsi_eh_timer_workq = alloc_workqueue("%s",
|
|
|
|
WQ_SYSFS | __WQ_LEGACY | WQ_MEM_RECLAIM | WQ_UNBOUND,
|
2020-07-01 03:07:44 +00:00
|
|
|
1, "iscsi_eh");
|
2013-04-19 01:23:28 +00:00
|
|
|
if (!iscsi_eh_timer_workq) {
|
|
|
|
err = -ENOMEM;
|
2007-12-13 18:43:27 +00:00
|
|
|
goto release_nls;
|
2013-04-19 01:23:28 +00:00
|
|
|
}
|
2007-12-13 18:43:27 +00:00
|
|
|
|
2020-07-03 05:16:03 +00:00
|
|
|
iscsi_destroy_workq = alloc_workqueue("%s",
|
|
|
|
WQ_SYSFS | __WQ_LEGACY | WQ_MEM_RECLAIM | WQ_UNBOUND,
|
|
|
|
1, "iscsi_destroy");
|
2020-02-27 19:59:45 +00:00
|
|
|
if (!iscsi_destroy_workq) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto destroy_wq;
|
|
|
|
}
|
|
|
|
|
2006-10-16 22:09:38 +00:00
|
|
|
return 0;
|
2005-08-05 02:33:07 +00:00
|
|
|
|
2020-02-27 19:59:45 +00:00
|
|
|
destroy_wq:
|
|
|
|
destroy_workqueue(iscsi_eh_timer_workq);
|
2007-12-13 18:43:27 +00:00
|
|
|
release_nls:
|
2008-01-28 22:41:19 +00:00
|
|
|
netlink_kernel_release(nls);
|
2013-03-22 11:41:29 +00:00
|
|
|
unregister_flashnode_bus:
|
|
|
|
bus_unregister(&iscsi_flashnode_bus);
|
2005-08-05 02:33:07 +00:00
|
|
|
unregister_session_class:
|
|
|
|
transport_class_unregister(&iscsi_session_class);
|
|
|
|
unregister_conn_class:
|
|
|
|
transport_class_unregister(&iscsi_connection_class);
|
2006-04-07 02:13:39 +00:00
|
|
|
unregister_host_class:
|
|
|
|
transport_class_unregister(&iscsi_host_class);
|
2011-07-25 18:48:40 +00:00
|
|
|
unregister_iface_class:
|
|
|
|
class_unregister(&iscsi_iface_class);
|
2008-05-21 20:54:13 +00:00
|
|
|
unregister_endpoint_class:
|
|
|
|
class_unregister(&iscsi_endpoint_class);
|
2005-08-05 02:33:07 +00:00
|
|
|
unregister_transport_class:
|
|
|
|
class_unregister(&iscsi_transport_class);
|
|
|
|
return err;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit iscsi_transport_exit(void)
|
|
|
|
{
|
2020-02-27 19:59:45 +00:00
|
|
|
destroy_workqueue(iscsi_destroy_workq);
|
2007-12-13 18:43:27 +00:00
|
|
|
destroy_workqueue(iscsi_eh_timer_workq);
|
2008-01-28 22:41:19 +00:00
|
|
|
netlink_kernel_release(nls);
|
2013-03-22 11:41:29 +00:00
|
|
|
bus_unregister(&iscsi_flashnode_bus);
|
2005-08-05 02:33:07 +00:00
|
|
|
transport_class_unregister(&iscsi_connection_class);
|
|
|
|
transport_class_unregister(&iscsi_session_class);
|
2006-04-07 02:13:39 +00:00
|
|
|
transport_class_unregister(&iscsi_host_class);
|
2008-05-21 20:54:13 +00:00
|
|
|
class_unregister(&iscsi_endpoint_class);
|
2011-07-25 18:48:40 +00:00
|
|
|
class_unregister(&iscsi_iface_class);
|
2005-08-05 02:33:07 +00:00
|
|
|
class_unregister(&iscsi_transport_class);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
module_init(iscsi_transport_init);
|
|
|
|
module_exit(iscsi_transport_exit);
|
|
|
|
|
2005-08-05 02:33:07 +00:00
|
|
|
MODULE_AUTHOR("Mike Christie <michaelc@cs.wisc.edu>, "
|
|
|
|
"Dmitry Yusupov <dmitry_yus@yahoo.com>, "
|
|
|
|
"Alex Aizman <itn780@yahoo.com>");
|
|
|
|
MODULE_DESCRIPTION("iSCSI Transport Interface");
|
2005-04-16 22:20:36 +00:00
|
|
|
MODULE_LICENSE("GPL");
|
2006-07-24 20:47:54 +00:00
|
|
|
MODULE_VERSION(ISCSI_TRANSPORT_VERSION);
|
2010-12-09 17:37:56 +00:00
|
|
|
MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_ISCSI);
|