mirror of
https://github.com/SCST-project/scst.git
synced 2026-05-23 13:41:27 +00:00
iSCSI-SCST: A huge improvements in errors recovery and iSCSI RFC complaince as well as performance. Also: - Fixes and improvements for MaxOutstandingR2T>1 - Flow control tracing added. - Cleanups SCST core: - Now for scst_cmd_init_stage1_done() commands preprocessing_done() is always called before xmit_response(), even in case of abort or error. - Fixed recently introduced bug, which can lead to sending responses for aborted commands after reply on the corresponding TM command already sent. - Flow control tracing added. - Now it is possible to call functions setting commands execution status (e.g., scst_set_cmd_error_status()) several times for the same command. Only the first call will be completed, other calls - ignored. - All commands are counted and shown in proc/sysfs now. Before only active, i.e. not yet executed commands, were counted and shown there. git-svn-id: http://svn.code.sf.net/p/scst/svn/trunk@1431 d57e44dd-8a1f-0410-8b47-8ef2f437770f
466 lines
11 KiB
C
466 lines
11 KiB
C
/*
|
|
* Copyright (C) 2002 - 2003 Ardis Technolgies <roman@ardistech.com>
|
|
* Copyright (C) 2007 - 2009 Vladislav Bolkhovitin
|
|
* Copyright (C) 2007 - 2009 ID7 Ltd.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation, version 2
|
|
* of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*/
|
|
|
|
#include "iscsi.h"
|
|
|
|
#ifdef CONFIG_SCST_PROC
|
|
int print_digest_state(char *p, size_t size, unsigned long flags)
|
|
#else
|
|
static int print_digest_state(char *p, size_t size, unsigned long flags)
|
|
#endif
|
|
{
|
|
int pos;
|
|
|
|
if (DIGEST_NONE & flags)
|
|
pos = scnprintf(p, size, "%s", "none");
|
|
else if (DIGEST_CRC32C & flags)
|
|
pos = scnprintf(p, size, "%s", "crc32c");
|
|
else
|
|
pos = scnprintf(p, size, "%s", "unknown");
|
|
|
|
return pos;
|
|
}
|
|
|
|
/* target_mutex supposed to be locked */
|
|
struct iscsi_session *session_lookup(struct iscsi_target *target, u64 sid)
|
|
{
|
|
struct iscsi_session *session;
|
|
|
|
list_for_each_entry(session, &target->session_list,
|
|
session_list_entry) {
|
|
if (session->sid == sid)
|
|
return session;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* target_mgmt_mutex supposed to be locked */
|
|
static int iscsi_session_alloc(struct iscsi_target *target,
|
|
struct iscsi_kern_session_info *info, struct iscsi_session **result)
|
|
{
|
|
int err;
|
|
unsigned int i;
|
|
struct iscsi_session *session;
|
|
char *name = NULL;
|
|
|
|
session = kzalloc(sizeof(*session), GFP_KERNEL);
|
|
if (!session)
|
|
return -ENOMEM;
|
|
|
|
session->target = target;
|
|
session->sid = info->sid;
|
|
session->sess_param = target->trgt_sess_param;
|
|
session->max_queued_cmnds = target->trgt_param.queued_cmnds;
|
|
atomic_set(&session->active_cmds, 0);
|
|
|
|
session->exp_cmd_sn = info->exp_cmd_sn;
|
|
|
|
session->initiator_name = kstrdup(info->initiator_name, GFP_KERNEL);
|
|
if (!session->initiator_name) {
|
|
err = -ENOMEM;
|
|
goto err;
|
|
}
|
|
|
|
name = kmalloc(strlen(info->user_name) + strlen(info->initiator_name) +
|
|
1, GFP_KERNEL);
|
|
if (name == NULL) {
|
|
err = -ENOMEM;
|
|
goto err;
|
|
}
|
|
|
|
if (info->user_name[0] != '\0')
|
|
sprintf(name, "%s@%s", info->user_name, info->initiator_name);
|
|
else
|
|
sprintf(name, "%s", info->initiator_name);
|
|
|
|
INIT_LIST_HEAD(&session->conn_list);
|
|
INIT_LIST_HEAD(&session->pending_list);
|
|
|
|
spin_lock_init(&session->sn_lock);
|
|
|
|
spin_lock_init(&session->cmnd_data_wait_hash_lock);
|
|
for (i = 0; i < ARRAY_SIZE(session->cmnd_data_wait_hash); i++)
|
|
INIT_LIST_HEAD(&session->cmnd_data_wait_hash[i]);
|
|
|
|
session->next_ttt = 1;
|
|
|
|
session->scst_sess = scst_register_session(target->scst_tgt, 0,
|
|
name, NULL, NULL);
|
|
if (session->scst_sess == NULL) {
|
|
PRINT_ERROR("%s", "scst_register_session() failed");
|
|
err = -ENOMEM;
|
|
goto err;
|
|
}
|
|
|
|
kfree(name);
|
|
|
|
scst_sess_set_tgt_priv(session->scst_sess, session);
|
|
|
|
TRACE_MGMT_DBG("Session %p created: target %p, tid %u, sid %#Lx",
|
|
session, target, target->tid, info->sid);
|
|
|
|
*result = session;
|
|
return 0;
|
|
|
|
err:
|
|
if (session) {
|
|
kfree(session->initiator_name);
|
|
kfree(session);
|
|
kfree(name);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
/* target_mutex supposed to be locked */
|
|
void sess_reinst_finished(struct iscsi_session *sess)
|
|
{
|
|
struct iscsi_conn *c;
|
|
|
|
TRACE_ENTRY();
|
|
|
|
TRACE_MGMT_DBG("Enabling reinstate successor sess %p", sess);
|
|
|
|
sBUG_ON(!sess->sess_reinstating);
|
|
|
|
list_for_each_entry(c, &sess->conn_list, conn_list_entry) {
|
|
conn_reinst_finished(c);
|
|
}
|
|
sess->sess_reinstating = 0;
|
|
|
|
TRACE_EXIT();
|
|
return;
|
|
}
|
|
|
|
/* target_mgmt_mutex supposed to be locked */
|
|
int session_add(struct iscsi_target *target,
|
|
struct iscsi_kern_session_info *info)
|
|
{
|
|
struct iscsi_session *new_sess = NULL, *sess, *old_sess;
|
|
int err = 0;
|
|
union iscsi_sid sid;
|
|
bool reinstatement = false;
|
|
|
|
TRACE_MGMT_DBG("Adding session SID %llx", info->sid);
|
|
|
|
err = iscsi_session_alloc(target, info, &new_sess);
|
|
if (err != 0)
|
|
goto out;
|
|
|
|
mutex_lock(&target->target_mutex);
|
|
|
|
sess = session_lookup(target, info->sid);
|
|
if (sess != NULL) {
|
|
PRINT_ERROR("Attempt to add session with existing SID %llx",
|
|
info->sid);
|
|
err = -EEXIST;
|
|
goto out_err_unlock;
|
|
}
|
|
|
|
sid = *(union iscsi_sid *)&info->sid;
|
|
sid.id.tsih = 0;
|
|
old_sess = NULL;
|
|
|
|
/*
|
|
* We need to find the latest session to correctly handle
|
|
* multi-reinstatements
|
|
*/
|
|
list_for_each_entry_reverse(sess, &target->session_list,
|
|
session_list_entry) {
|
|
union iscsi_sid i = *(union iscsi_sid *)&sess->sid;
|
|
i.id.tsih = 0;
|
|
if ((sid.id64 == i.id64) &&
|
|
(strcmp(info->initiator_name, sess->initiator_name) == 0)) {
|
|
if (!sess->sess_shutting_down) {
|
|
/* session reinstatement */
|
|
old_sess = sess;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
sess = NULL;
|
|
|
|
list_add_tail(&new_sess->session_list_entry, &target->session_list);
|
|
|
|
if (old_sess != NULL) {
|
|
reinstatement = true;
|
|
|
|
TRACE_MGMT_DBG("Reinstating sess %p with SID %llx (old %p, "
|
|
"SID %llx)", new_sess, new_sess->sid, old_sess,
|
|
old_sess->sid);
|
|
|
|
new_sess->sess_reinstating = 1;
|
|
old_sess->sess_reinst_successor = new_sess;
|
|
|
|
target_del_session(old_sess->target, old_sess, 0);
|
|
}
|
|
|
|
mutex_unlock(&target->target_mutex);
|
|
|
|
if (reinstatement) {
|
|
/*
|
|
* Mutex target_mgmt_mutex won't allow to add connections to
|
|
* the new session after target_mutex was dropped, so it's safe
|
|
* to replace the initial UA without it. We can't do it under
|
|
* target_mutex, because otherwise we can establish a
|
|
* circular locking dependency between target_mutex and
|
|
* scst_mutex in SCST core (iscsi_report_aen() called by
|
|
* SCST core under scst_mutex).
|
|
*/
|
|
scst_set_initial_UA(new_sess->scst_sess,
|
|
SCST_LOAD_SENSE(scst_sense_nexus_loss_UA));
|
|
}
|
|
|
|
out:
|
|
return err;
|
|
|
|
out_err_unlock:
|
|
mutex_unlock(&target->target_mutex);
|
|
|
|
scst_unregister_session(new_sess->scst_sess, 1, NULL);
|
|
new_sess->scst_sess = NULL;
|
|
|
|
mutex_lock(&target->target_mutex);
|
|
session_free(new_sess, false);
|
|
mutex_unlock(&target->target_mutex);
|
|
goto out;
|
|
}
|
|
|
|
static void __session_free(struct iscsi_session *session)
|
|
{
|
|
kfree(session->initiator_name);
|
|
kfree(session);
|
|
}
|
|
|
|
static void iscsi_unreg_sess_done(struct scst_session *scst_sess)
|
|
{
|
|
struct iscsi_session *session;
|
|
|
|
TRACE_ENTRY();
|
|
|
|
session = (struct iscsi_session *)scst_sess_get_tgt_priv(scst_sess);
|
|
|
|
session->scst_sess = NULL;
|
|
__session_free(session);
|
|
|
|
TRACE_EXIT();
|
|
return;
|
|
}
|
|
|
|
/* target_mutex supposed to be locked */
|
|
int session_free(struct iscsi_session *session, bool del)
|
|
{
|
|
unsigned int i;
|
|
|
|
TRACE_MGMT_DBG("Freeing session %p (SID %llx)",
|
|
session, session->sid);
|
|
|
|
sBUG_ON(!list_empty(&session->conn_list));
|
|
if (unlikely(atomic_read(&session->active_cmds) != 0)) {
|
|
PRINT_CRIT_ERROR("active_cmds not 0 (%d)!!",
|
|
atomic_read(&session->active_cmds));
|
|
sBUG();
|
|
}
|
|
|
|
for (i = 0; i < ARRAY_SIZE(session->cmnd_data_wait_hash); i++)
|
|
sBUG_ON(!list_empty(&session->cmnd_data_wait_hash[i]));
|
|
|
|
if (session->sess_reinst_successor != NULL)
|
|
sess_reinst_finished(session->sess_reinst_successor);
|
|
|
|
if (session->sess_reinstating) {
|
|
struct iscsi_session *s;
|
|
TRACE_MGMT_DBG("Freeing being reinstated sess %p", session);
|
|
list_for_each_entry(s, &session->target->session_list,
|
|
session_list_entry) {
|
|
if (s->sess_reinst_successor == session) {
|
|
s->sess_reinst_successor = NULL;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (del)
|
|
list_del(&session->session_list_entry);
|
|
|
|
if (session->scst_sess != NULL) {
|
|
/*
|
|
* We must NOT call scst_unregister_session() in the waiting
|
|
* mode, since we are under target_mutex. Otherwise we can
|
|
* establish a circular locking dependency between target_mutex
|
|
* and scst_mutex in SCST core (iscsi_report_aen() called by
|
|
* SCST core under scst_mutex).
|
|
*/
|
|
scst_unregister_session(session->scst_sess, 0,
|
|
iscsi_unreg_sess_done);
|
|
} else
|
|
__session_free(session);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* target_mutex supposed to be locked */
|
|
int session_del(struct iscsi_target *target, u64 sid)
|
|
{
|
|
struct iscsi_session *session;
|
|
|
|
session = session_lookup(target, sid);
|
|
if (!session)
|
|
return -ENOENT;
|
|
|
|
if (!list_empty(&session->conn_list)) {
|
|
PRINT_ERROR("%llu still have connections",
|
|
(long long unsigned int)session->sid);
|
|
return -EBUSY;
|
|
}
|
|
|
|
return session_free(session, true);
|
|
}
|
|
|
|
#ifdef CONFIG_SCST_PROC
|
|
|
|
/* target_mutex supposed to be locked */
|
|
static void iscsi_session_info_show(struct seq_file *seq,
|
|
struct iscsi_target *target)
|
|
{
|
|
struct iscsi_session *session;
|
|
|
|
list_for_each_entry(session, &target->session_list,
|
|
session_list_entry) {
|
|
seq_printf(seq, "\tsid:%llx initiator:%s (reinstating %s)\n",
|
|
(long long unsigned int)session->sid,
|
|
session->initiator_name,
|
|
session->sess_reinstating ? "yes" : "no");
|
|
conn_info_show(seq, session);
|
|
}
|
|
return;
|
|
}
|
|
|
|
static int iscsi_session_seq_open(struct inode *inode, struct file *file)
|
|
{
|
|
int res;
|
|
res = seq_open(file, &iscsi_seq_op);
|
|
if (!res)
|
|
((struct seq_file *)file->private_data)->private =
|
|
iscsi_session_info_show;
|
|
return res;
|
|
}
|
|
|
|
const struct file_operations session_seq_fops = {
|
|
.owner = THIS_MODULE,
|
|
.open = iscsi_session_seq_open,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = seq_release,
|
|
};
|
|
|
|
#else /* CONFIG_SCST_PROC */
|
|
|
|
static ssize_t iscsi_sess_sid_show(struct kobject *kobj,
|
|
struct kobj_attribute *attr, char *buf)
|
|
{
|
|
int pos;
|
|
struct scst_session *scst_sess;
|
|
struct iscsi_session *sess;
|
|
|
|
TRACE_ENTRY();
|
|
|
|
scst_sess = container_of(kobj, struct scst_session, sess_kobj);
|
|
sess = (struct iscsi_session *)scst_sess_get_tgt_priv(scst_sess);
|
|
|
|
pos = sprintf(buf, "%llx\n", sess->sid);
|
|
|
|
TRACE_EXIT_RES(pos);
|
|
return pos;
|
|
}
|
|
|
|
static struct kobj_attribute iscsi_sess_sid_attr =
|
|
__ATTR(sid, S_IRUGO, iscsi_sess_sid_show, NULL);
|
|
|
|
static ssize_t iscsi_sess_reinstating_show(struct kobject *kobj,
|
|
struct kobj_attribute *attr, char *buf)
|
|
{
|
|
int pos;
|
|
struct scst_session *scst_sess;
|
|
struct iscsi_session *sess;
|
|
|
|
TRACE_ENTRY();
|
|
|
|
scst_sess = container_of(kobj, struct scst_session, sess_kobj);
|
|
sess = (struct iscsi_session *)scst_sess_get_tgt_priv(scst_sess);
|
|
|
|
pos = sprintf(buf, "%d\n", sess->sess_reinstating ? 1 : 0);
|
|
|
|
TRACE_EXIT_RES(pos);
|
|
return pos;
|
|
}
|
|
|
|
static struct kobj_attribute iscsi_sess_reinstating_attr =
|
|
__ATTR(reinstating, S_IRUGO, iscsi_sess_reinstating_show, NULL);
|
|
|
|
static ssize_t iscsi_sess_hdigest_show(struct kobject *kobj,
|
|
struct kobj_attribute *attr, char *buf)
|
|
{
|
|
int pos;
|
|
struct scst_session *scst_sess;
|
|
struct iscsi_session *sess;
|
|
|
|
TRACE_ENTRY();
|
|
|
|
scst_sess = container_of(kobj, struct scst_session, sess_kobj);
|
|
sess = (struct iscsi_session *)scst_sess_get_tgt_priv(scst_sess);
|
|
|
|
pos = print_digest_state(buf, SCST_SYSFS_BLOCK_SIZE,
|
|
sess->sess_param.header_digest);
|
|
|
|
TRACE_EXIT_RES(pos);
|
|
return pos;
|
|
}
|
|
|
|
static struct kobj_attribute iscsi_sess_hdigest_attr =
|
|
__ATTR(hdigest, S_IRUGO, iscsi_sess_hdigest_show, NULL);
|
|
|
|
static ssize_t iscsi_sess_ddigest_show(struct kobject *kobj,
|
|
struct kobj_attribute *attr, char *buf)
|
|
{
|
|
int pos;
|
|
struct scst_session *scst_sess;
|
|
struct iscsi_session *sess;
|
|
|
|
TRACE_ENTRY();
|
|
|
|
scst_sess = container_of(kobj, struct scst_session, sess_kobj);
|
|
sess = (struct iscsi_session *)scst_sess_get_tgt_priv(scst_sess);
|
|
|
|
pos = print_digest_state(buf, SCST_SYSFS_BLOCK_SIZE,
|
|
sess->sess_param.data_digest);
|
|
|
|
TRACE_EXIT_RES(pos);
|
|
return pos;
|
|
}
|
|
|
|
static struct kobj_attribute iscsi_sess_ddigest_attr =
|
|
__ATTR(ddigest, S_IRUGO, iscsi_sess_ddigest_show, NULL);
|
|
|
|
const struct attribute *iscsi_sess_attrs[] = {
|
|
&iscsi_sess_sid_attr.attr,
|
|
&iscsi_sess_reinstating_attr.attr,
|
|
&iscsi_sess_hdigest_attr.attr,
|
|
&iscsi_sess_ddigest_attr.attr,
|
|
NULL,
|
|
};
|
|
|
|
#endif /* CONFIG_SCST_PROC */
|