zfcp_fsf.c (dd0a11815a339d6deeea8357574f8126a8404c92) zfcp_fsf.c (1b33ef23946adee4b7d9d6b16b7285ce61063451)
1/*
2 * zfcp device driver
3 *
4 * Implementation of FSF commands.
5 *
6 * Copyright IBM Corp. 2002, 2013
7 */
8

--- 1382 unchanged lines hidden (view full) ---

1391 req->status |= ZFCP_STATUS_FSFREQ_ERROR;
1392 break;
1393 }
1394 break;
1395 case FSF_GOOD:
1396 port->handle = header->port_handle;
1397 atomic_set_mask(ZFCP_STATUS_COMMON_OPEN |
1398 ZFCP_STATUS_PORT_PHYS_OPEN, &port->status);
1/*
2 * zfcp device driver
3 *
4 * Implementation of FSF commands.
5 *
6 * Copyright IBM Corp. 2002, 2013
7 */
8

--- 1382 unchanged lines hidden (view full) ---

1391 req->status |= ZFCP_STATUS_FSFREQ_ERROR;
1392 break;
1393 }
1394 break;
1395 case FSF_GOOD:
1396 port->handle = header->port_handle;
1397 atomic_set_mask(ZFCP_STATUS_COMMON_OPEN |
1398 ZFCP_STATUS_PORT_PHYS_OPEN, &port->status);
1399 atomic_clear_mask(ZFCP_STATUS_COMMON_ACCESS_DENIED |
1400 ZFCP_STATUS_COMMON_ACCESS_BOXED,
1399 atomic_clear_mask(ZFCP_STATUS_COMMON_ACCESS_BOXED,
1401 &port->status);
1402 /* check whether D_ID has changed during open */
1403 /*
1404 * FIXME: This check is not airtight, as the FCP channel does
1405 * not monitor closures of target port connections caused on
1406 * the remote side. Thus, they might miss out on invalidating
1407 * locally cached WWPNs (and other N_Port parameters) of gone
1408 * target ports. So, our heroic attempt to make things safe

--- 982 unchanged lines hidden ---
1400 &port->status);
1401 /* check whether D_ID has changed during open */
1402 /*
1403 * FIXME: This check is not airtight, as the FCP channel does
1404 * not monitor closures of target port connections caused on
1405 * the remote side. Thus, they might miss out on invalidating
1406 * locally cached WWPNs (and other N_Port parameters) of gone
1407 * target ports. So, our heroic attempt to make things safe

--- 982 unchanged lines hidden ---