zfcp_fsf.c (dd0a11815a339d6deeea8357574f8126a8404c92) | zfcp_fsf.c (1b33ef23946adee4b7d9d6b16b7285ce61063451) |
---|---|
1/* 2 * zfcp device driver 3 * 4 * Implementation of FSF commands. 5 * 6 * Copyright IBM Corp. 2002, 2013 7 */ 8 --- 1382 unchanged lines hidden (view full) --- 1391 req->status |= ZFCP_STATUS_FSFREQ_ERROR; 1392 break; 1393 } 1394 break; 1395 case FSF_GOOD: 1396 port->handle = header->port_handle; 1397 atomic_set_mask(ZFCP_STATUS_COMMON_OPEN | 1398 ZFCP_STATUS_PORT_PHYS_OPEN, &port->status); | 1/* 2 * zfcp device driver 3 * 4 * Implementation of FSF commands. 5 * 6 * Copyright IBM Corp. 2002, 2013 7 */ 8 --- 1382 unchanged lines hidden (view full) --- 1391 req->status |= ZFCP_STATUS_FSFREQ_ERROR; 1392 break; 1393 } 1394 break; 1395 case FSF_GOOD: 1396 port->handle = header->port_handle; 1397 atomic_set_mask(ZFCP_STATUS_COMMON_OPEN | 1398 ZFCP_STATUS_PORT_PHYS_OPEN, &port->status); |
1399 atomic_clear_mask(ZFCP_STATUS_COMMON_ACCESS_DENIED | 1400 ZFCP_STATUS_COMMON_ACCESS_BOXED, | 1399 atomic_clear_mask(ZFCP_STATUS_COMMON_ACCESS_BOXED, |
1401 &port->status); 1402 /* check whether D_ID has changed during open */ 1403 /* 1404 * FIXME: This check is not airtight, as the FCP channel does 1405 * not monitor closures of target port connections caused on 1406 * the remote side. Thus, they might miss out on invalidating 1407 * locally cached WWPNs (and other N_Port parameters) of gone 1408 * target ports. So, our heroic attempt to make things safe --- 982 unchanged lines hidden --- | 1400 &port->status); 1401 /* check whether D_ID has changed during open */ 1402 /* 1403 * FIXME: This check is not airtight, as the FCP channel does 1404 * not monitor closures of target port connections caused on 1405 * the remote side. Thus, they might miss out on invalidating 1406 * locally cached WWPNs (and other N_Port parameters) of gone 1407 * target ports. So, our heroic attempt to make things safe --- 982 unchanged lines hidden --- |