#ifndef ISCSI_TARGET_STAT_H #define ISCSI_TARGET_STAT_H #include #include #include /* * For struct iscsi_tiqn->tiqn_wwn default groups */ extern struct config_item_type iscsi_stat_instance_cit; extern struct config_item_type iscsi_stat_sess_err_cit; extern struct config_item_type iscsi_stat_tgt_attr_cit; extern struct config_item_type iscsi_stat_login_cit; extern struct config_item_type iscsi_stat_logout_cit; /* * For struct iscsi_session->se_sess default groups */ extern struct config_item_type iscsi_stat_sess_cit; /* iSCSI session error types */ #define ISCSI_SESS_ERR_UNKNOWN 0 #define ISCSI_SESS_ERR_DIGEST 1 #define ISCSI_SESS_ERR_CXN_TIMEOUT 2 #define ISCSI_SESS_ERR_PDU_FORMAT 3 /* iSCSI session error stats */ struct iscsi_sess_err_stats { spinlock_t lock; u32 digest_errors; u32 cxn_timeout_errors; u32 pdu_format_errors; u32 last_sess_failure_type; char last_sess_fail_rem_name[224]; } ____cacheline_aligned; /* iSCSI login failure types (sub oids) */ #define ISCSI_LOGIN_FAIL_OTHER 2 #define ISCSI_LOGIN_FAIL_REDIRECT 3 #define ISCSI_LOGIN_FAIL_AUTHORIZE 4 #define ISCSI_LOGIN_FAIL_AUTHENTICATE 5 #define ISCSI_LOGIN_FAIL_NEGOTIATE 6 /* iSCSI login stats */ struct iscsi_login_stats { spinlock_t lock; u32 accepts; u32 other_fails; u32 redirects; u32 authorize_fails; u32 authenticate_fails; u32 negotiate_fails; /* used for notifications */ u64 last_fail_time; /* time stamp (jiffies) */ u32 last_fail_type; int last_intr_fail_ip_family; struct sockaddr_storage last_intr_fail_sockaddr; char last_intr_fail_name[224]; } ____cacheline_aligned; /* iSCSI logout stats */ struct iscsi_logout_stats { spinlock_t lock; u32 normal_logouts; u32 abnormal_logouts; } ____cacheline_aligned; #endif /*** ISCSI_TARGET_STAT_H ***/ b35b345523ac99b14ce9a1f4a98f21ebdb'>treecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2017-02-06bpf: enable verifier to add 0 to packet ptrWilliam Tu1-0/+23
The patch fixes the case when adding a zero value to the packet pointer. The zero value could come from src_reg equals type BPF_K or CONST_IMM. The patch fixes both, otherwise the verifer reports the following error: [...] R0=imm0,min_value=0,max_value=0 R1=pkt(id=0,off=0,r=4) R2=pkt_end R3=fp-12 R4=imm4,min_value=4,max_value=4 R5=pkt(id=0,off=4,r=4) 269: (bf) r2 = r0 // r2 becomes imm0 270: (77) r2 >>= 3 271: (bf) r4 = r1 // r4 becomes pkt ptr 272: (0f) r4 += r2 // r4 += 0 addition of negative constant to packet pointer is not allowed Signed-off-by: William Tu <u9012063@gmail.com> Signed-off-by: Mihai Budiu <mbudiu@vmware.com> Cc: Daniel Borkmann <daniel@iogearbox.net> Cc: Alexei Starovoitov <ast@kernel.org> Acked-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
2017-02-06bpf: test for AND edge casesJosef Bacik1-0/+55
These two tests are based on the work done for f23cc643f9ba. The first test is just a basic one to make sure we don't allow AND'ing negative values, even if it would result in a valid index for the array. The second is a cleaned up version of the original testcase provided by Jann Horn that resulted in the commit. Acked-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Daniel Borkmann <daniel@iogearbox.net> Signed-off-by: Josef Bacik <jbacik@fb.com> Signed-off-by: David S. Miller <davem@davemloft.net>