]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
4.1-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 13 Oct 2015 18:36:32 +0000 (11:36 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 13 Oct 2015 18:36:32 +0000 (11:36 -0700)
added patches:
iser-target-put-the-reference-on-commands-waiting-for-unsol-data.patch
iser-target-remove-command-with-state-istate_remove.patch
scsi-fix-scsi_error_handler-vs.-scsi_host_dev_release-race.patch
target-attach-extended_copy-local-i-o-descriptors-to-xcopy_pt_sess.patch
target-fix-v4.1-unit_attention-se_node_acl-device_list-null-pointer.patch
target-iscsi-fix-np_ip-bracket-issue-by-removing-np_ip.patch

queue-4.1/iser-target-put-the-reference-on-commands-waiting-for-unsol-data.patch [new file with mode: 0644]
queue-4.1/iser-target-remove-command-with-state-istate_remove.patch [new file with mode: 0644]
queue-4.1/scsi-fix-scsi_error_handler-vs.-scsi_host_dev_release-race.patch [new file with mode: 0644]
queue-4.1/series
queue-4.1/target-attach-extended_copy-local-i-o-descriptors-to-xcopy_pt_sess.patch [new file with mode: 0644]
queue-4.1/target-fix-v4.1-unit_attention-se_node_acl-device_list-null-pointer.patch [new file with mode: 0644]
queue-4.1/target-iscsi-fix-np_ip-bracket-issue-by-removing-np_ip.patch [new file with mode: 0644]

diff --git a/queue-4.1/iser-target-put-the-reference-on-commands-waiting-for-unsol-data.patch b/queue-4.1/iser-target-put-the-reference-on-commands-waiting-for-unsol-data.patch
new file mode 100644 (file)
index 0000000..9e8c853
--- /dev/null
@@ -0,0 +1,87 @@
+From 3e03c4b01da3e6a5f3081eb0aa252490fe83e352 Mon Sep 17 00:00:00 2001
+From: Jenny Derzhavetz <jennyf@mellanox.com>
+Date: Sun, 6 Sep 2015 14:52:21 +0300
+Subject: iser-target: Put the reference on commands waiting for unsol data
+
+From: Jenny Derzhavetz <jennyf@mellanox.com>
+
+commit 3e03c4b01da3e6a5f3081eb0aa252490fe83e352 upstream.
+
+The iscsi target core teardown sequence calls wait_conn for
+all active commands to finish gracefully by:
+- move the queue-pair to error state
+- drain all the completions
+- wait for the core to finish handling all session commands
+
+However, when tearing down a session while there are sequenced
+commands that are still waiting for unsolicited data outs, we can
+block forever as these are missing an extra reference put.
+
+We basically need the equivalent of iscsit_free_queue_reqs_for_conn()
+which is called after wait_conn has returned. Address this by an
+explicit walk on conn_cmd_list and put the extra reference.
+
+Signed-off-by: Jenny Derzhavetz <jennyf@mellanox.com>
+Signed-off-by: Sagi Grimberg <sagig@mellanox.com>
+Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/infiniband/ulp/isert/ib_isert.c |   38 +++++++++++++++++++++++++++++++-
+ 1 file changed, 37 insertions(+), 1 deletion(-)
+
+--- a/drivers/infiniband/ulp/isert/ib_isert.c
++++ b/drivers/infiniband/ulp/isert/ib_isert.c
+@@ -3370,6 +3370,41 @@ isert_wait4flush(struct isert_conn *iser
+       wait_for_completion(&isert_conn->wait_comp_err);
+ }
++/**
++ * isert_put_unsol_pending_cmds() - Drop commands waiting for
++ *     unsolicitate dataout
++ * @conn:    iscsi connection
++ *
++ * We might still have commands that are waiting for unsolicited
++ * dataouts messages. We must put the extra reference on those
++ * before blocking on the target_wait_for_session_cmds
++ */
++static void
++isert_put_unsol_pending_cmds(struct iscsi_conn *conn)
++{
++      struct iscsi_cmd *cmd, *tmp;
++      static LIST_HEAD(drop_cmd_list);
++
++      spin_lock_bh(&conn->cmd_lock);
++      list_for_each_entry_safe(cmd, tmp, &conn->conn_cmd_list, i_conn_node) {
++              if ((cmd->cmd_flags & ICF_NON_IMMEDIATE_UNSOLICITED_DATA) &&
++                  (cmd->write_data_done < conn->sess->sess_ops->FirstBurstLength) &&
++                  (cmd->write_data_done < cmd->se_cmd.data_length))
++                      list_move_tail(&cmd->i_conn_node, &drop_cmd_list);
++      }
++      spin_unlock_bh(&conn->cmd_lock);
++
++      list_for_each_entry_safe(cmd, tmp, &drop_cmd_list, i_conn_node) {
++              list_del_init(&cmd->i_conn_node);
++              if (cmd->i_state != ISTATE_REMOVE) {
++                      struct isert_cmd *isert_cmd = iscsit_priv_cmd(cmd);
++
++                      isert_info("conn %p dropping cmd %p\n", conn, cmd);
++                      isert_put_cmd(isert_cmd, true);
++              }
++      }
++}
++
+ static void isert_wait_conn(struct iscsi_conn *conn)
+ {
+       struct isert_conn *isert_conn = conn->context;
+@@ -3388,8 +3423,9 @@ static void isert_wait_conn(struct iscsi
+       isert_conn_terminate(isert_conn);
+       mutex_unlock(&isert_conn->mutex);
+-      isert_wait4cmds(conn);
+       isert_wait4flush(isert_conn);
++      isert_put_unsol_pending_cmds(conn);
++      isert_wait4cmds(conn);
+       isert_wait4logout(isert_conn);
+       queue_work(isert_release_wq, &isert_conn->release_work);
diff --git a/queue-4.1/iser-target-remove-command-with-state-istate_remove.patch b/queue-4.1/iser-target-remove-command-with-state-istate_remove.patch
new file mode 100644 (file)
index 0000000..4584ceb
--- /dev/null
@@ -0,0 +1,50 @@
+From a4c15cd957cbd728f685645de7a150df5912591a Mon Sep 17 00:00:00 2001
+From: Jenny Derzhavetz <jennyf@mellanox.com>
+Date: Sun, 6 Sep 2015 14:52:20 +0300
+Subject: iser-target: remove command with state ISTATE_REMOVE
+
+From: Jenny Derzhavetz <jennyf@mellanox.com>
+
+commit a4c15cd957cbd728f685645de7a150df5912591a upstream.
+
+As documented in iscsit_sequence_cmd:
+/*
+ * Existing callers for iscsit_sequence_cmd() will silently
+ * ignore commands with CMDSN_LOWER_THAN_EXP, so force this
+ * return for CMDSN_MAXCMDSN_OVERRUN as well..
+ */
+
+We need to silently finish a command when it's in ISTATE_REMOVE.
+This fixes an teardown hang we were seeing where a mis-behaved
+initiator (triggered by allocation error injections) sent us a
+cmdsn which was lower than expected.
+
+Signed-off-by: Jenny Derzhavetz <jennyf@mellanox.com>
+Signed-off-by: Sagi Grimberg <sagig@mellanox.com>
+Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/infiniband/ulp/isert/ib_isert.c |    9 ++++++++-
+ 1 file changed, 8 insertions(+), 1 deletion(-)
+
+--- a/drivers/infiniband/ulp/isert/ib_isert.c
++++ b/drivers/infiniband/ulp/isert/ib_isert.c
+@@ -2996,9 +2996,16 @@ isert_get_dataout(struct iscsi_conn *con
+ static int
+ isert_immediate_queue(struct iscsi_conn *conn, struct iscsi_cmd *cmd, int state)
+ {
+-      int ret;
++      struct isert_cmd *isert_cmd = iscsit_priv_cmd(cmd);
++      int ret = 0;
+       switch (state) {
++      case ISTATE_REMOVE:
++              spin_lock_bh(&conn->cmd_lock);
++              list_del_init(&cmd->i_conn_node);
++              spin_unlock_bh(&conn->cmd_lock);
++              isert_put_cmd(isert_cmd, true);
++              break;
+       case ISTATE_SEND_NOPIN_WANT_RESPONSE:
+               ret = isert_put_nopin(cmd, conn, false);
+               break;
diff --git a/queue-4.1/scsi-fix-scsi_error_handler-vs.-scsi_host_dev_release-race.patch b/queue-4.1/scsi-fix-scsi_error_handler-vs.-scsi_host_dev_release-race.patch
new file mode 100644 (file)
index 0000000..28c47b0
--- /dev/null
@@ -0,0 +1,65 @@
+From 537b604c8b3aa8b96fe35f87dd085816552e294c Mon Sep 17 00:00:00 2001
+From: Michal Hocko <mhocko@suse.com>
+Date: Thu, 27 Aug 2015 20:16:37 +0200
+Subject: scsi: fix scsi_error_handler vs. scsi_host_dev_release race
+
+From: Michal Hocko <mhocko@suse.com>
+
+commit 537b604c8b3aa8b96fe35f87dd085816552e294c upstream.
+
+b9d5c6b7ef57 ("[SCSI] cleanup setting task state in
+scsi_error_handler()") has introduced a race between scsi_error_handler
+and scsi_host_dev_release resulting in the hang when the device goes
+away because scsi_error_handler might miss a wake up:
+
+CPU0                                   CPU1
+scsi_error_handler                     scsi_host_dev_release
+                                         kthread_stop()
+  kthread_should_stop()
+    test_bit(KTHREAD_SHOULD_STOP)
+                                           set_bit(KTHREAD_SHOULD_STOP)
+                                           wake_up_process()
+                                           wait_for_completion()
+
+  set_current_state(TASK_INTERRUPTIBLE)
+  schedule()
+
+The most straightforward solution seems to be to invert the ordering of
+the set_current_state and kthread_should_stop.
+
+The issue has been noticed during reboot test on a 3.0 based kernel but
+the current code seems to be affected in the same way.
+
+[jejb: additional comment added]
+Reported-and-debugged-by: Mike Mayer <Mike.Meyer@teradata.com>
+Signed-off-by: Michal Hocko <mhocko@suse.com>
+Reviewed-by: Dan Williams <dan.j.williams@intel.com>
+Reviewed-by: Hannes Reinecke <hare@suse.de>
+Signed-off-by: James Bottomley <JBottomley@Odin.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/scsi/scsi_error.c |   11 ++++++++++-
+ 1 file changed, 10 insertions(+), 1 deletion(-)
+
+--- a/drivers/scsi/scsi_error.c
++++ b/drivers/scsi/scsi_error.c
+@@ -2169,8 +2169,17 @@ int scsi_error_handler(void *data)
+        * We never actually get interrupted because kthread_run
+        * disables signal delivery for the created thread.
+        */
+-      while (!kthread_should_stop()) {
++      while (true) {
++              /*
++               * The sequence in kthread_stop() sets the stop flag first
++               * then wakes the process.  To avoid missed wakeups, the task
++               * should always be in a non running state before the stop
++               * flag is checked
++               */
+               set_current_state(TASK_INTERRUPTIBLE);
++              if (kthread_should_stop())
++                      break;
++
+               if ((shost->host_failed == 0 && shost->host_eh_scheduled == 0) ||
+                   shost->host_failed != atomic_read(&shost->host_busy)) {
+                       SCSI_LOG_ERROR_RECOVERY(1,
index 6aa09e85a7fd274b8abd6a67a53a4b2ce844913e..63c7a9e4b598816bad43ec86e5d67ec06fed4055 100644 (file)
@@ -8,3 +8,9 @@ arm-kvm-disable-virtual-timer-even-if-the-guest-is-not-using-it.patch
 kvm-ppc-book3s-take-the-kvm-srcu-lock-in-kvmppc_h_logical_ci_load-store.patch
 kvm-ppc-book3s-hv-pass-the-correct-trap-argument-to-kvmhv_commence_exit.patch
 time-fix-timekeeping_freqadjust-s-incorrect-use-of-abs-instead-of-abs64.patch
+target-iscsi-fix-np_ip-bracket-issue-by-removing-np_ip.patch
+scsi-fix-scsi_error_handler-vs.-scsi_host_dev_release-race.patch
+target-attach-extended_copy-local-i-o-descriptors-to-xcopy_pt_sess.patch
+iser-target-remove-command-with-state-istate_remove.patch
+iser-target-put-the-reference-on-commands-waiting-for-unsol-data.patch
+target-fix-v4.1-unit_attention-se_node_acl-device_list-null-pointer.patch
diff --git a/queue-4.1/target-attach-extended_copy-local-i-o-descriptors-to-xcopy_pt_sess.patch b/queue-4.1/target-attach-extended_copy-local-i-o-descriptors-to-xcopy_pt_sess.patch
new file mode 100644 (file)
index 0000000..c503bf5
--- /dev/null
@@ -0,0 +1,65 @@
+From 4416f89b8cfcb794d040fc3b68e5fb159b7d8d02 Mon Sep 17 00:00:00 2001
+From: Nicholas Bellinger <nab@linux-iscsi.org>
+Date: Thu, 3 Sep 2015 06:30:45 +0000
+Subject: target: Attach EXTENDED_COPY local I/O descriptors to xcopy_pt_sess
+
+From: Nicholas Bellinger <nab@linux-iscsi.org>
+
+commit 4416f89b8cfcb794d040fc3b68e5fb159b7d8d02 upstream.
+
+This patch is a >= v4.1 regression bug-fix where control CDB
+emulation logic in commit 38b57f82 now expects a se_cmd->se_sess
+pointer to exist when determining T10-PI support is to be exposed
+for initiator host ports.
+
+To address this bug, go ahead and add locally generated se_cmd
+descriptors for copy-offload block-copy to it's own stand-alone
+se_session nexus, while the parent EXTENDED_COPY se_cmd descriptor
+remains associated with it's originating se_cmd->se_sess nexus.
+
+Note a valid se_cmd->se_sess is also required for future support
+of WRITE_INSERT and READ_STRIP software emulation when submitting
+backend I/O to se_device that exposes T10-PI suport.
+
+Reported-by: Alex Gorbachev <ag@iss-integration.com>
+Tested-by: Alex Gorbachev <ag@iss-integration.com>
+Cc: "Martin K. Petersen" <martin.petersen@oracle.com>
+Cc: Hannes Reinecke <hare@suse.de>
+Cc: Christoph Hellwig <hch@lst.de>
+Cc: Doug Gilbert <dgilbert@interlog.com>
+Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/target/target_core_xcopy.c |    6 ++++--
+ 1 file changed, 4 insertions(+), 2 deletions(-)
+
+--- a/drivers/target/target_core_xcopy.c
++++ b/drivers/target/target_core_xcopy.c
+@@ -465,6 +465,8 @@ int target_xcopy_setup_pt(void)
+       memset(&xcopy_pt_sess, 0, sizeof(struct se_session));
+       INIT_LIST_HEAD(&xcopy_pt_sess.sess_list);
+       INIT_LIST_HEAD(&xcopy_pt_sess.sess_acl_list);
++      INIT_LIST_HEAD(&xcopy_pt_sess.sess_cmd_list);
++      spin_lock_init(&xcopy_pt_sess.sess_cmd_lock);
+       xcopy_pt_nacl.se_tpg = &xcopy_pt_tpg;
+       xcopy_pt_nacl.nacl_sess = &xcopy_pt_sess;
+@@ -666,7 +668,7 @@ static int target_xcopy_read_source(
+       pr_debug("XCOPY: Built READ_16: LBA: %llu Sectors: %u Length: %u\n",
+               (unsigned long long)src_lba, src_sectors, length);
+-      transport_init_se_cmd(se_cmd, &xcopy_pt_tfo, NULL, length,
++      transport_init_se_cmd(se_cmd, &xcopy_pt_tfo, &xcopy_pt_sess, length,
+                             DMA_FROM_DEVICE, 0, &xpt_cmd->sense_buffer[0]);
+       xop->src_pt_cmd = xpt_cmd;
+@@ -726,7 +728,7 @@ static int target_xcopy_write_destinatio
+       pr_debug("XCOPY: Built WRITE_16: LBA: %llu Sectors: %u Length: %u\n",
+               (unsigned long long)dst_lba, dst_sectors, length);
+-      transport_init_se_cmd(se_cmd, &xcopy_pt_tfo, NULL, length,
++      transport_init_se_cmd(se_cmd, &xcopy_pt_tfo, &xcopy_pt_sess, length,
+                             DMA_TO_DEVICE, 0, &xpt_cmd->sense_buffer[0]);
+       xop->dst_pt_cmd = xpt_cmd;
diff --git a/queue-4.1/target-fix-v4.1-unit_attention-se_node_acl-device_list-null-pointer.patch b/queue-4.1/target-fix-v4.1-unit_attention-se_node_acl-device_list-null-pointer.patch
new file mode 100644 (file)
index 0000000..a44024e
--- /dev/null
@@ -0,0 +1,108 @@
+From nab@linux-iscsi.org  Tue Oct 13 11:33:46 2015
+From: "Nicholas A. Bellinger" <nab@linux-iscsi.org>
+Date: Wed, 23 Sep 2015 07:49:26 +0000
+Subject: target: Fix v4.1 UNIT_ATTENTION se_node_acl->device_list[] NULL pointer
+To: target-devel <target-devel@vger.kernel.org>
+Cc: stable <stable@vger.kernel.org>, Greg-KH <gregkh@linuxfoundation.org>, Nicholas Bellinger <nab@linux-iscsi.org>, Alex Gorbachev <ag@iss-integration.com>
+Message-ID: <1442994566-32287-1-git-send-email-nab@linux-iscsi.org>
+
+From: Nicholas Bellinger <nab@linux-iscsi.org>
+
+This patch fixes a v4.1 only regression bug as reported by Martin
+where UNIT_ATTENTION checking for pre v4.2-rc1 RCU conversion code
+legacy se_node_acl->device_list[] was hitting a NULL pointer
+dereference in:
+
+[ 1858.639654] CPU: 2 PID: 1293 Comm: kworker/2:1 Tainted: G          I 4.1.6-fixxcopy+ #1
+[ 1858.639699] Hardware name: Dell Inc. PowerEdge R410/0N83VF, BIOS 1.11.0 07/20/2012
+[ 1858.639747] Workqueue: xcopy_wq target_xcopy_do_work [target_core_mod]
+[ 1858.639782] task: ffff880036f0cbe0 ti: ffff880317940000 task.ti: ffff880317940000
+[ 1858.639822] RIP: 0010:[<ffffffffa01d3774>]  [<ffffffffa01d3774>] target_scsi3_ua_check+0x24/0x60 [target_core_mod]
+[ 1858.639884] RSP: 0018:ffff880317943ce0  EFLAGS: 00010282
+[ 1858.639913] RAX: 0000000000000000 RBX: ffff880317943dc0 RCX: 0000000000000000
+[ 1858.639950] RDX: 0000000000000000 RSI: ffff880317943dd0 RDI: ffff88030eaee408
+[ 1858.639987] RBP: ffff88030eaee408 R08: 0000000000000001 R09: 0000000000000001
+[ 1858.640025] R10: 0000000000000000 R11: 00000000000706e0 R12: ffff880315e0a000
+[ 1858.640062] R13: ffff88030eaee408 R14: 0000000000000001 R15: ffff88030eaee408
+[ 1858.640100] FS:  0000000000000000(0000) GS:ffff880322e80000(0000) knlGS:0000000000000000
+[ 1858.640143] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
+[ 1858.640173] CR2: 0000000000000000 CR3: 000000000180d000 CR4: 00000000000006e0
+[ 1858.640210] Stack:
+[ 1858.640223]  ffffffffa01cadfa ffff88030eaee400 ffff880318e7c340 ffff880315e0a000
+[ 1858.640267]  ffffffffa01d8c25 ffff8800cae809e0 0000000000000400 0000000000000400
+[ 1858.640310]  ffff880318e7c3d0 0000000006b75800 0000000000080000 ffff88030eaee400
+[ 1858.640354] Call Trace:
+[ 1858.640379]  [<ffffffffa01cadfa>] ? target_setup_cmd_from_cdb+0x13a/0x2c0 [target_core_mod]
+[ 1858.640429]  [<ffffffffa01d8c25>] ? target_xcopy_setup_pt_cmd+0x85/0x320 [target_core_mod]
+[ 1858.640479]  [<ffffffffa01d9424>] ? target_xcopy_do_work+0x264/0x700 [target_core_mod]
+[ 1858.640526]  [<ffffffff810ac3a0>] ? pick_next_task_fair+0x720/0x8f0
+[ 1858.640562]  [<ffffffff8108b3fb>] ? process_one_work+0x14b/0x430
+[ 1858.640595]  [<ffffffff8108bf5b>] ? worker_thread+0x6b/0x560
+[ 1858.640627]  [<ffffffff8108bef0>] ? rescuer_thread+0x390/0x390
+[ 1858.640661]  [<ffffffff810913b3>] ? kthread+0xd3/0xf0
+[ 1858.640689]  [<ffffffff810912e0>] ? kthread_create_on_node+0x180/0x180
+
+Also, check for the same se_node_acl->device_list[] during EXTENDED_COPY
+operation as a non-holding persistent reservation port.
+
+Reported-by: Martin Svec <martin,svec@zoner.cz>
+Tested-by: Martin Svec <martin,svec@zoner.cz>
+Cc: Martin Svec <martin,svec@zoner.cz>
+Cc: Alex Gorbachev <ag@iss-integration.com>
+Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/target/target_core_pr.c |    3 +++
+ drivers/target/target_core_ua.c |    8 ++++----
+ 2 files changed, 7 insertions(+), 4 deletions(-)
+
+--- a/drivers/target/target_core_pr.c
++++ b/drivers/target/target_core_pr.c
+@@ -328,6 +328,9 @@ static int core_scsi3_pr_seq_non_holder(
+       int legacy = 0; /* Act like a legacy device and return
+                        * RESERVATION CONFLICT on some CDBs */
++      if (!se_sess->se_node_acl->device_list)
++              return;
++
+       se_deve = se_sess->se_node_acl->device_list[cmd->orig_fe_lun];
+       /*
+        * Determine if the registration should be ignored due to
+--- a/drivers/target/target_core_ua.c
++++ b/drivers/target/target_core_ua.c
+@@ -48,7 +48,7 @@ target_scsi3_ua_check(struct se_cmd *cmd
+               return 0;
+       nacl = sess->se_node_acl;
+-      if (!nacl)
++      if (!nacl || !nacl->device_list)
+               return 0;
+       deve = nacl->device_list[cmd->orig_fe_lun];
+@@ -90,7 +90,7 @@ int core_scsi3_ua_allocate(
+       /*
+        * PASSTHROUGH OPS
+        */
+-      if (!nacl)
++      if (!nacl || !nacl->device_list)
+               return -EINVAL;
+       ua = kmem_cache_zalloc(se_ua_cache, GFP_ATOMIC);
+@@ -208,7 +208,7 @@ void core_scsi3_ua_for_check_condition(
+               return;
+       nacl = sess->se_node_acl;
+-      if (!nacl)
++      if (!nacl || !nacl->device_list)
+               return;
+       spin_lock_irq(&nacl->device_list_lock);
+@@ -276,7 +276,7 @@ int core_scsi3_ua_clear_for_request_sens
+               return -EINVAL;
+       nacl = sess->se_node_acl;
+-      if (!nacl)
++      if (!nacl || !nacl->device_list)
+               return -EINVAL;
+       spin_lock_irq(&nacl->device_list_lock);
diff --git a/queue-4.1/target-iscsi-fix-np_ip-bracket-issue-by-removing-np_ip.patch b/queue-4.1/target-iscsi-fix-np_ip-bracket-issue-by-removing-np_ip.patch
new file mode 100644 (file)
index 0000000..5c9decd
--- /dev/null
@@ -0,0 +1,276 @@
+From 76c28f1fcfeb42b47f798fe498351ee1d60086ae Mon Sep 17 00:00:00 2001
+From: Andy Grover <agrover@redhat.com>
+Date: Mon, 24 Aug 2015 10:26:03 -0700
+Subject: target/iscsi: Fix np_ip bracket issue by removing np_ip
+
+From: Andy Grover <agrover@redhat.com>
+
+commit 76c28f1fcfeb42b47f798fe498351ee1d60086ae upstream.
+
+Revert commit 1997e6259, which causes double brackets on ipv6
+inaddr_any addresses.
+
+Since we have np_sockaddr, if we need a textual representation we can
+use "%pISc".
+
+Change iscsit_add_network_portal() and iscsit_add_np() signatures to remove
+*ip_str parameter.
+
+Fix and extend some comments earlier in the function.
+
+Tested to work for :: and ::1 via iscsiadm, previously :: failed, see
+https://bugzilla.redhat.com/show_bug.cgi?id=1249107 .
+
+Signed-off-by: Andy Grover <agrover@redhat.com>
+Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/target/iscsi/iscsi_target.c          |   33 +++++++++++++--------------
+ drivers/target/iscsi/iscsi_target.h          |    2 -
+ drivers/target/iscsi/iscsi_target_configfs.c |   14 +++++------
+ drivers/target/iscsi/iscsi_target_login.c    |    8 +++---
+ drivers/target/iscsi/iscsi_target_tpg.c      |   15 +++++-------
+ drivers/target/iscsi/iscsi_target_tpg.h      |    2 -
+ include/target/iscsi/iscsi_target_core.h     |    1 
+ 7 files changed, 36 insertions(+), 39 deletions(-)
+
+--- a/drivers/target/iscsi/iscsi_target.c
++++ b/drivers/target/iscsi/iscsi_target.c
+@@ -341,7 +341,6 @@ static struct iscsi_np *iscsit_get_np(
+ struct iscsi_np *iscsit_add_np(
+       struct __kernel_sockaddr_storage *sockaddr,
+-      char *ip_str,
+       int network_transport)
+ {
+       struct sockaddr_in *sock_in;
+@@ -370,11 +369,9 @@ struct iscsi_np *iscsit_add_np(
+       np->np_flags |= NPF_IP_NETWORK;
+       if (sockaddr->ss_family == AF_INET6) {
+               sock_in6 = (struct sockaddr_in6 *)sockaddr;
+-              snprintf(np->np_ip, IPV6_ADDRESS_SPACE, "%s", ip_str);
+               np->np_port = ntohs(sock_in6->sin6_port);
+       } else {
+               sock_in = (struct sockaddr_in *)sockaddr;
+-              sprintf(np->np_ip, "%s", ip_str);
+               np->np_port = ntohs(sock_in->sin_port);
+       }
+@@ -411,8 +408,8 @@ struct iscsi_np *iscsit_add_np(
+       list_add_tail(&np->np_list, &g_np_list);
+       mutex_unlock(&np_lock);
+-      pr_debug("CORE[0] - Added Network Portal: %s:%hu on %s\n",
+-              np->np_ip, np->np_port, np->np_transport->name);
++      pr_debug("CORE[0] - Added Network Portal: %pISc:%hu on %s\n",
++              &np->np_sockaddr, np->np_port, np->np_transport->name);
+       return np;
+ }
+@@ -481,8 +478,8 @@ int iscsit_del_np(struct iscsi_np *np)
+       list_del(&np->np_list);
+       mutex_unlock(&np_lock);
+-      pr_debug("CORE[0] - Removed Network Portal: %s:%hu on %s\n",
+-              np->np_ip, np->np_port, np->np_transport->name);
++      pr_debug("CORE[0] - Removed Network Portal: %pISc:%hu on %s\n",
++              &np->np_sockaddr, np->np_port, np->np_transport->name);
+       iscsit_put_transport(np->np_transport);
+       kfree(np);
+@@ -3467,7 +3464,6 @@ iscsit_build_sendtargets_response(struct
+                                               tpg_np_list) {
+                               struct iscsi_np *np = tpg_np->tpg_np;
+                               bool inaddr_any = iscsit_check_inaddr_any(np);
+-                              char *fmt_str;
+                               if (np->np_network_transport != network_transport)
+                                       continue;
+@@ -3495,15 +3491,18 @@ iscsit_build_sendtargets_response(struct
+                                       }
+                               }
+-                              if (np->np_sockaddr.ss_family == AF_INET6)
+-                                      fmt_str = "TargetAddress=[%s]:%hu,%hu";
+-                              else
+-                                      fmt_str = "TargetAddress=%s:%hu,%hu";
+-
+-                              len = sprintf(buf, fmt_str,
+-                                      inaddr_any ? conn->local_ip : np->np_ip,
+-                                      np->np_port,
+-                                      tpg->tpgt);
++                              if (inaddr_any) {
++                                      len = sprintf(buf, "TargetAddress="
++                                                    "%s:%hu,%hu",
++                                                    conn->local_ip,
++                                                    np->np_port,
++                                                    tpg->tpgt);
++                              } else {
++                                      len = sprintf(buf, "TargetAddress="
++                                                    "%pISpc,%hu",
++                                                    &np->np_sockaddr,
++                                                    tpg->tpgt);
++                              }
+                               len += 1;
+                               if ((len + payload_len) > buffer_len) {
+--- a/drivers/target/iscsi/iscsi_target.h
++++ b/drivers/target/iscsi/iscsi_target.h
+@@ -13,7 +13,7 @@ extern int iscsit_deaccess_np(struct isc
+ extern bool iscsit_check_np_match(struct __kernel_sockaddr_storage *,
+                               struct iscsi_np *, int);
+ extern struct iscsi_np *iscsit_add_np(struct __kernel_sockaddr_storage *,
+-                              char *, int);
++                              int);
+ extern int iscsit_reset_np_thread(struct iscsi_np *, struct iscsi_tpg_np *,
+                               struct iscsi_portal_group *, bool);
+ extern int iscsit_del_np(struct iscsi_np *);
+--- a/drivers/target/iscsi/iscsi_target_configfs.c
++++ b/drivers/target/iscsi/iscsi_target_configfs.c
+@@ -100,7 +100,7 @@ static ssize_t lio_target_np_store_sctp(
+                * Use existing np->np_sockaddr for SCTP network portal reference
+                */
+               tpg_np_sctp = iscsit_tpg_add_network_portal(tpg, &np->np_sockaddr,
+-                                      np->np_ip, tpg_np, ISCSI_SCTP_TCP);
++                                      tpg_np, ISCSI_SCTP_TCP);
+               if (!tpg_np_sctp || IS_ERR(tpg_np_sctp))
+                       goto out;
+       } else {
+@@ -178,7 +178,7 @@ static ssize_t lio_target_np_store_iser(
+               }
+               tpg_np_iser = iscsit_tpg_add_network_portal(tpg, &np->np_sockaddr,
+-                              np->np_ip, tpg_np, ISCSI_INFINIBAND);
++                              tpg_np, ISCSI_INFINIBAND);
+               if (IS_ERR(tpg_np_iser)) {
+                       rc = PTR_ERR(tpg_np_iser);
+                       goto out;
+@@ -249,8 +249,8 @@ static struct se_tpg_np *lio_target_call
+                       return ERR_PTR(-EINVAL);
+               }
+               str++; /* Skip over leading "[" */
+-              *str2 = '\0'; /* Terminate the IPv6 address */
+-              str2++; /* Skip over the "]" */
++              *str2 = '\0'; /* Terminate the unbracketed IPv6 address */
++              str2++; /* Skip over the \0 */
+               port_str = strstr(str2, ":");
+               if (!port_str) {
+                       pr_err("Unable to locate \":port\""
+@@ -317,7 +317,7 @@ static struct se_tpg_np *lio_target_call
+        * sys/kernel/config/iscsi/$IQN/$TPG/np/$IP:$PORT/
+        *
+        */
+-      tpg_np = iscsit_tpg_add_network_portal(tpg, &sockaddr, str, NULL,
++      tpg_np = iscsit_tpg_add_network_portal(tpg, &sockaddr, NULL,
+                               ISCSI_TCP);
+       if (IS_ERR(tpg_np)) {
+               iscsit_put_tpg(tpg);
+@@ -345,8 +345,8 @@ static void lio_target_call_delnpfromtpg
+       se_tpg = &tpg->tpg_se_tpg;
+       pr_debug("LIO_Target_ConfigFS: DEREGISTER -> %s TPGT: %hu"
+-              " PORTAL: %s:%hu\n", config_item_name(&se_tpg->se_tpg_wwn->wwn_group.cg_item),
+-              tpg->tpgt, tpg_np->tpg_np->np_ip, tpg_np->tpg_np->np_port);
++              " PORTAL: %pISc:%hu\n", config_item_name(&se_tpg->se_tpg_wwn->wwn_group.cg_item),
++              tpg->tpgt, &tpg_np->tpg_np->np_sockaddr, tpg_np->tpg_np->np_port);
+       ret = iscsit_tpg_del_network_portal(tpg, tpg_np);
+       if (ret < 0)
+--- a/drivers/target/iscsi/iscsi_target_login.c
++++ b/drivers/target/iscsi/iscsi_target_login.c
+@@ -879,8 +879,8 @@ static void iscsi_handle_login_thread_ti
+       struct iscsi_np *np = (struct iscsi_np *) data;
+       spin_lock_bh(&np->np_thread_lock);
+-      pr_err("iSCSI Login timeout on Network Portal %s:%hu\n",
+-                      np->np_ip, np->np_port);
++      pr_err("iSCSI Login timeout on Network Portal %pISc:%hu\n",
++                      &np->np_sockaddr, np->np_port);
+       if (np->np_login_timer_flags & ISCSI_TF_STOP) {
+               spin_unlock_bh(&np->np_thread_lock);
+@@ -1358,8 +1358,8 @@ static int __iscsi_target_login_thread(s
+       spin_lock_bh(&np->np_thread_lock);
+       if (np->np_thread_state != ISCSI_NP_THREAD_ACTIVE) {
+               spin_unlock_bh(&np->np_thread_lock);
+-              pr_err("iSCSI Network Portal on %s:%hu currently not"
+-                      " active.\n", np->np_ip, np->np_port);
++              pr_err("iSCSI Network Portal on %pISc:%hu currently not"
++                      " active.\n", &np->np_sockaddr, np->np_port);
+               iscsit_tx_login_rsp(conn, ISCSI_STATUS_CLS_TARGET_ERR,
+                               ISCSI_LOGIN_STATUS_SVC_UNAVAILABLE);
+               goto new_sess_out;
+--- a/drivers/target/iscsi/iscsi_target_tpg.c
++++ b/drivers/target/iscsi/iscsi_target_tpg.c
+@@ -460,7 +460,6 @@ static bool iscsit_tpg_check_network_por
+ struct iscsi_tpg_np *iscsit_tpg_add_network_portal(
+       struct iscsi_portal_group *tpg,
+       struct __kernel_sockaddr_storage *sockaddr,
+-      char *ip_str,
+       struct iscsi_tpg_np *tpg_np_parent,
+       int network_transport)
+ {
+@@ -470,8 +469,8 @@ struct iscsi_tpg_np *iscsit_tpg_add_netw
+       if (!tpg_np_parent) {
+               if (iscsit_tpg_check_network_portal(tpg->tpg_tiqn, sockaddr,
+                               network_transport)) {
+-                      pr_err("Network Portal: %s already exists on a"
+-                              " different TPG on %s\n", ip_str,
++                      pr_err("Network Portal: %pISc already exists on a"
++                              " different TPG on %s\n", sockaddr,
+                               tpg->tpg_tiqn->tiqn);
+                       return ERR_PTR(-EEXIST);
+               }
+@@ -484,7 +483,7 @@ struct iscsi_tpg_np *iscsit_tpg_add_netw
+               return ERR_PTR(-ENOMEM);
+       }
+-      np = iscsit_add_np(sockaddr, ip_str, network_transport);
++      np = iscsit_add_np(sockaddr, network_transport);
+       if (IS_ERR(np)) {
+               kfree(tpg_np);
+               return ERR_CAST(np);
+@@ -514,8 +513,8 @@ struct iscsi_tpg_np *iscsit_tpg_add_netw
+               spin_unlock(&tpg_np_parent->tpg_np_parent_lock);
+       }
+-      pr_debug("CORE[%s] - Added Network Portal: %s:%hu,%hu on %s\n",
+-              tpg->tpg_tiqn->tiqn, np->np_ip, np->np_port, tpg->tpgt,
++      pr_debug("CORE[%s] - Added Network Portal: %pISc:%hu,%hu on %s\n",
++              tpg->tpg_tiqn->tiqn, &np->np_sockaddr, np->np_port, tpg->tpgt,
+               np->np_transport->name);
+       return tpg_np;
+@@ -528,8 +527,8 @@ static int iscsit_tpg_release_np(
+ {
+       iscsit_clear_tpg_np_login_thread(tpg_np, tpg, true);
+-      pr_debug("CORE[%s] - Removed Network Portal: %s:%hu,%hu on %s\n",
+-              tpg->tpg_tiqn->tiqn, np->np_ip, np->np_port, tpg->tpgt,
++      pr_debug("CORE[%s] - Removed Network Portal: %pISc:%hu,%hu on %s\n",
++              tpg->tpg_tiqn->tiqn, &np->np_sockaddr, np->np_port, tpg->tpgt,
+               np->np_transport->name);
+       tpg_np->tpg_np = NULL;
+--- a/drivers/target/iscsi/iscsi_target_tpg.h
++++ b/drivers/target/iscsi/iscsi_target_tpg.h
+@@ -22,7 +22,7 @@ extern struct iscsi_node_attrib *iscsit_
+ extern void iscsit_tpg_del_external_nps(struct iscsi_tpg_np *);
+ extern struct iscsi_tpg_np *iscsit_tpg_locate_child_np(struct iscsi_tpg_np *, int);
+ extern struct iscsi_tpg_np *iscsit_tpg_add_network_portal(struct iscsi_portal_group *,
+-                      struct __kernel_sockaddr_storage *, char *, struct iscsi_tpg_np *,
++                      struct __kernel_sockaddr_storage *, struct iscsi_tpg_np *,
+                       int);
+ extern int iscsit_tpg_del_network_portal(struct iscsi_portal_group *,
+                       struct iscsi_tpg_np *);
+--- a/include/target/iscsi/iscsi_target_core.h
++++ b/include/target/iscsi/iscsi_target_core.h
+@@ -787,7 +787,6 @@ struct iscsi_np {
+       enum iscsi_timer_flags_table np_login_timer_flags;
+       u32                     np_exports;
+       enum np_flags_table     np_flags;
+-      unsigned char           np_ip[IPV6_ADDRESS_SPACE];
+       u16                     np_port;
+       spinlock_t              np_thread_lock;
+       struct completion       np_restart_comp;