target: simplify backend attribute implementation
[deliverable/linux.git] / drivers / target / target_core_device.c
1 /*******************************************************************************
2 * Filename: target_core_device.c (based on iscsi_target_device.c)
3 *
4 * This file contains the TCM Virtual Device and Disk Transport
5 * agnostic related functions.
6 *
7 * (c) Copyright 2003-2013 Datera, Inc.
8 *
9 * Nicholas A. Bellinger <nab@kernel.org>
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
24 *
25 ******************************************************************************/
26
27 #include <linux/net.h>
28 #include <linux/string.h>
29 #include <linux/delay.h>
30 #include <linux/timer.h>
31 #include <linux/slab.h>
32 #include <linux/spinlock.h>
33 #include <linux/kthread.h>
34 #include <linux/in.h>
35 #include <linux/export.h>
36 #include <asm/unaligned.h>
37 #include <net/sock.h>
38 #include <net/tcp.h>
39 #include <scsi/scsi.h>
40 #include <scsi/scsi_device.h>
41
42 #include <target/target_core_base.h>
43 #include <target/target_core_backend.h>
44 #include <target/target_core_fabric.h>
45
46 #include "target_core_internal.h"
47 #include "target_core_alua.h"
48 #include "target_core_pr.h"
49 #include "target_core_ua.h"
50
51 DEFINE_MUTEX(g_device_mutex);
52 LIST_HEAD(g_device_list);
53
54 static struct se_hba *lun0_hba;
55 /* not static, needed by tpg.c */
56 struct se_device *g_lun0_dev;
57
58 sense_reason_t
59 transport_lookup_cmd_lun(struct se_cmd *se_cmd, u32 unpacked_lun)
60 {
61 struct se_lun *se_lun = NULL;
62 struct se_session *se_sess = se_cmd->se_sess;
63 struct se_node_acl *nacl = se_sess->se_node_acl;
64 struct se_device *dev;
65 struct se_dev_entry *deve;
66
67 if (unpacked_lun >= TRANSPORT_MAX_LUNS_PER_TPG)
68 return TCM_NON_EXISTENT_LUN;
69
70 rcu_read_lock();
71 deve = target_nacl_find_deve(nacl, unpacked_lun);
72 if (deve) {
73 atomic_long_inc(&deve->total_cmds);
74
75 if ((se_cmd->data_direction == DMA_TO_DEVICE) &&
76 (deve->lun_flags & TRANSPORT_LUNFLAGS_READ_ONLY)) {
77 pr_err("TARGET_CORE[%s]: Detected WRITE_PROTECTED LUN"
78 " Access for 0x%08x\n",
79 se_cmd->se_tfo->get_fabric_name(),
80 unpacked_lun);
81 rcu_read_unlock();
82 return TCM_WRITE_PROTECTED;
83 }
84
85 if (se_cmd->data_direction == DMA_TO_DEVICE)
86 atomic_long_add(se_cmd->data_length,
87 &deve->write_bytes);
88 else if (se_cmd->data_direction == DMA_FROM_DEVICE)
89 atomic_long_add(se_cmd->data_length,
90 &deve->read_bytes);
91
92 se_lun = rcu_dereference(deve->se_lun);
93 se_cmd->se_lun = rcu_dereference(deve->se_lun);
94 se_cmd->pr_res_key = deve->pr_res_key;
95 se_cmd->orig_fe_lun = unpacked_lun;
96 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD;
97
98 percpu_ref_get(&se_lun->lun_ref);
99 se_cmd->lun_ref_active = true;
100 }
101 rcu_read_unlock();
102
103 if (!se_lun) {
104 /*
105 * Use the se_portal_group->tpg_virt_lun0 to allow for
106 * REPORT_LUNS, et al to be returned when no active
107 * MappedLUN=0 exists for this Initiator Port.
108 */
109 if (unpacked_lun != 0) {
110 pr_err("TARGET_CORE[%s]: Detected NON_EXISTENT_LUN"
111 " Access for 0x%08x\n",
112 se_cmd->se_tfo->get_fabric_name(),
113 unpacked_lun);
114 return TCM_NON_EXISTENT_LUN;
115 }
116 /*
117 * Force WRITE PROTECT for virtual LUN 0
118 */
119 if ((se_cmd->data_direction != DMA_FROM_DEVICE) &&
120 (se_cmd->data_direction != DMA_NONE))
121 return TCM_WRITE_PROTECTED;
122
123 se_lun = &se_sess->se_tpg->tpg_virt_lun0;
124 se_cmd->se_lun = &se_sess->se_tpg->tpg_virt_lun0;
125 se_cmd->orig_fe_lun = 0;
126 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD;
127
128 percpu_ref_get(&se_lun->lun_ref);
129 se_cmd->lun_ref_active = true;
130 }
131
132 /* Directly associate cmd with se_dev */
133 se_cmd->se_dev = se_lun->lun_se_dev;
134
135 dev = se_lun->lun_se_dev;
136 atomic_long_inc(&dev->num_cmds);
137 if (se_cmd->data_direction == DMA_TO_DEVICE)
138 atomic_long_add(se_cmd->data_length, &dev->write_bytes);
139 else if (se_cmd->data_direction == DMA_FROM_DEVICE)
140 atomic_long_add(se_cmd->data_length, &dev->read_bytes);
141
142 return 0;
143 }
144 EXPORT_SYMBOL(transport_lookup_cmd_lun);
145
146 int transport_lookup_tmr_lun(struct se_cmd *se_cmd, u32 unpacked_lun)
147 {
148 struct se_dev_entry *deve;
149 struct se_lun *se_lun = NULL;
150 struct se_session *se_sess = se_cmd->se_sess;
151 struct se_node_acl *nacl = se_sess->se_node_acl;
152 struct se_tmr_req *se_tmr = se_cmd->se_tmr_req;
153 unsigned long flags;
154
155 if (unpacked_lun >= TRANSPORT_MAX_LUNS_PER_TPG)
156 return -ENODEV;
157
158 rcu_read_lock();
159 deve = target_nacl_find_deve(nacl, unpacked_lun);
160 if (deve) {
161 se_tmr->tmr_lun = rcu_dereference(deve->se_lun);
162 se_cmd->se_lun = rcu_dereference(deve->se_lun);
163 se_lun = rcu_dereference(deve->se_lun);
164 se_cmd->pr_res_key = deve->pr_res_key;
165 se_cmd->orig_fe_lun = unpacked_lun;
166 }
167 rcu_read_unlock();
168
169 if (!se_lun) {
170 pr_debug("TARGET_CORE[%s]: Detected NON_EXISTENT_LUN"
171 " Access for 0x%08x\n",
172 se_cmd->se_tfo->get_fabric_name(),
173 unpacked_lun);
174 return -ENODEV;
175 }
176
177 /* Directly associate cmd with se_dev */
178 se_cmd->se_dev = se_lun->lun_se_dev;
179 se_tmr->tmr_dev = se_lun->lun_se_dev;
180
181 spin_lock_irqsave(&se_tmr->tmr_dev->se_tmr_lock, flags);
182 list_add_tail(&se_tmr->tmr_list, &se_tmr->tmr_dev->dev_tmr_list);
183 spin_unlock_irqrestore(&se_tmr->tmr_dev->se_tmr_lock, flags);
184
185 return 0;
186 }
187 EXPORT_SYMBOL(transport_lookup_tmr_lun);
188
189 bool target_lun_is_rdonly(struct se_cmd *cmd)
190 {
191 struct se_session *se_sess = cmd->se_sess;
192 struct se_dev_entry *deve;
193 bool ret;
194
195 if (cmd->se_lun->lun_access & TRANSPORT_LUNFLAGS_READ_ONLY)
196 return true;
197
198 rcu_read_lock();
199 deve = target_nacl_find_deve(se_sess->se_node_acl, cmd->orig_fe_lun);
200 ret = (deve && deve->lun_flags & TRANSPORT_LUNFLAGS_READ_ONLY);
201 rcu_read_unlock();
202
203 return ret;
204 }
205 EXPORT_SYMBOL(target_lun_is_rdonly);
206
207 /*
208 * This function is called from core_scsi3_emulate_pro_register_and_move()
209 * and core_scsi3_decode_spec_i_port(), and will increment &deve->pr_kref
210 * when a matching rtpi is found.
211 */
212 struct se_dev_entry *core_get_se_deve_from_rtpi(
213 struct se_node_acl *nacl,
214 u16 rtpi)
215 {
216 struct se_dev_entry *deve;
217 struct se_lun *lun;
218 struct se_portal_group *tpg = nacl->se_tpg;
219
220 rcu_read_lock();
221 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
222 lun = rcu_dereference(deve->se_lun);
223 if (!lun) {
224 pr_err("%s device entries device pointer is"
225 " NULL, but Initiator has access.\n",
226 tpg->se_tpg_tfo->get_fabric_name());
227 continue;
228 }
229 if (lun->lun_rtpi != rtpi)
230 continue;
231
232 kref_get(&deve->pr_kref);
233 rcu_read_unlock();
234
235 return deve;
236 }
237 rcu_read_unlock();
238
239 return NULL;
240 }
241
242 void core_free_device_list_for_node(
243 struct se_node_acl *nacl,
244 struct se_portal_group *tpg)
245 {
246 struct se_dev_entry *deve;
247
248 mutex_lock(&nacl->lun_entry_mutex);
249 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
250 struct se_lun *lun = rcu_dereference_check(deve->se_lun,
251 lockdep_is_held(&nacl->lun_entry_mutex));
252 core_disable_device_list_for_node(lun, deve, nacl, tpg);
253 }
254 mutex_unlock(&nacl->lun_entry_mutex);
255 }
256
257 void core_update_device_list_access(
258 u32 mapped_lun,
259 u32 lun_access,
260 struct se_node_acl *nacl)
261 {
262 struct se_dev_entry *deve;
263
264 mutex_lock(&nacl->lun_entry_mutex);
265 deve = target_nacl_find_deve(nacl, mapped_lun);
266 if (deve) {
267 if (lun_access & TRANSPORT_LUNFLAGS_READ_WRITE) {
268 deve->lun_flags &= ~TRANSPORT_LUNFLAGS_READ_ONLY;
269 deve->lun_flags |= TRANSPORT_LUNFLAGS_READ_WRITE;
270 } else {
271 deve->lun_flags &= ~TRANSPORT_LUNFLAGS_READ_WRITE;
272 deve->lun_flags |= TRANSPORT_LUNFLAGS_READ_ONLY;
273 }
274 }
275 mutex_unlock(&nacl->lun_entry_mutex);
276 }
277
278 /*
279 * Called with rcu_read_lock or nacl->device_list_lock held.
280 */
281 struct se_dev_entry *target_nacl_find_deve(struct se_node_acl *nacl, u32 mapped_lun)
282 {
283 struct se_dev_entry *deve;
284
285 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link)
286 if (deve->mapped_lun == mapped_lun)
287 return deve;
288
289 return NULL;
290 }
291 EXPORT_SYMBOL(target_nacl_find_deve);
292
293 void target_pr_kref_release(struct kref *kref)
294 {
295 struct se_dev_entry *deve = container_of(kref, struct se_dev_entry,
296 pr_kref);
297 complete(&deve->pr_comp);
298 }
299
300 /* core_enable_device_list_for_node():
301 *
302 *
303 */
304 int core_enable_device_list_for_node(
305 struct se_lun *lun,
306 struct se_lun_acl *lun_acl,
307 u32 mapped_lun,
308 u32 lun_access,
309 struct se_node_acl *nacl,
310 struct se_portal_group *tpg)
311 {
312 struct se_port *port = lun->lun_sep;
313 struct se_dev_entry *orig, *new;
314
315 new = kzalloc(sizeof(*new), GFP_KERNEL);
316 if (!new) {
317 pr_err("Unable to allocate se_dev_entry memory\n");
318 return -ENOMEM;
319 }
320
321 atomic_set(&new->ua_count, 0);
322 spin_lock_init(&new->ua_lock);
323 INIT_LIST_HEAD(&new->alua_port_list);
324 INIT_LIST_HEAD(&new->ua_list);
325
326 new->mapped_lun = mapped_lun;
327 kref_init(&new->pr_kref);
328 init_completion(&new->pr_comp);
329
330 if (lun_access & TRANSPORT_LUNFLAGS_READ_WRITE)
331 new->lun_flags |= TRANSPORT_LUNFLAGS_READ_WRITE;
332 else
333 new->lun_flags |= TRANSPORT_LUNFLAGS_READ_ONLY;
334
335 new->creation_time = get_jiffies_64();
336 new->attach_count++;
337
338 mutex_lock(&nacl->lun_entry_mutex);
339 orig = target_nacl_find_deve(nacl, mapped_lun);
340 if (orig && orig->se_lun) {
341 struct se_lun *orig_lun = rcu_dereference_check(orig->se_lun,
342 lockdep_is_held(&nacl->lun_entry_mutex));
343
344 if (orig_lun != lun) {
345 pr_err("Existing orig->se_lun doesn't match new lun"
346 " for dynamic -> explicit NodeACL conversion:"
347 " %s\n", nacl->initiatorname);
348 mutex_unlock(&nacl->lun_entry_mutex);
349 kfree(new);
350 return -EINVAL;
351 }
352 BUG_ON(orig->se_lun_acl != NULL);
353
354 rcu_assign_pointer(new->se_lun, lun);
355 rcu_assign_pointer(new->se_lun_acl, lun_acl);
356 hlist_del_rcu(&orig->link);
357 hlist_add_head_rcu(&new->link, &nacl->lun_entry_hlist);
358 mutex_unlock(&nacl->lun_entry_mutex);
359
360 spin_lock_bh(&port->sep_alua_lock);
361 list_del(&orig->alua_port_list);
362 list_add_tail(&new->alua_port_list, &port->sep_alua_list);
363 spin_unlock_bh(&port->sep_alua_lock);
364
365 kref_put(&orig->pr_kref, target_pr_kref_release);
366 wait_for_completion(&orig->pr_comp);
367
368 kfree_rcu(orig, rcu_head);
369 return 0;
370 }
371
372 rcu_assign_pointer(new->se_lun, lun);
373 rcu_assign_pointer(new->se_lun_acl, lun_acl);
374 hlist_add_head_rcu(&new->link, &nacl->lun_entry_hlist);
375 mutex_unlock(&nacl->lun_entry_mutex);
376
377 spin_lock_bh(&port->sep_alua_lock);
378 list_add_tail(&new->alua_port_list, &port->sep_alua_list);
379 spin_unlock_bh(&port->sep_alua_lock);
380
381 return 0;
382 }
383
384 /*
385 * Called with se_node_acl->lun_entry_mutex held.
386 */
387 void core_disable_device_list_for_node(
388 struct se_lun *lun,
389 struct se_dev_entry *orig,
390 struct se_node_acl *nacl,
391 struct se_portal_group *tpg)
392 {
393 struct se_port *port = lun->lun_sep;
394 /*
395 * If the MappedLUN entry is being disabled, the entry in
396 * port->sep_alua_list must be removed now before clearing the
397 * struct se_dev_entry pointers below as logic in
398 * core_alua_do_transition_tg_pt() depends on these being present.
399 *
400 * deve->se_lun_acl will be NULL for demo-mode created LUNs
401 * that have not been explicitly converted to MappedLUNs ->
402 * struct se_lun_acl, but we remove deve->alua_port_list from
403 * port->sep_alua_list. This also means that active UAs and
404 * NodeACL context specific PR metadata for demo-mode
405 * MappedLUN *deve will be released below..
406 */
407 spin_lock_bh(&port->sep_alua_lock);
408 list_del(&orig->alua_port_list);
409 spin_unlock_bh(&port->sep_alua_lock);
410 /*
411 * Disable struct se_dev_entry LUN ACL mapping
412 */
413 core_scsi3_ua_release_all(orig);
414
415 hlist_del_rcu(&orig->link);
416 clear_bit(DEF_PR_REG_ACTIVE, &orig->deve_flags);
417 rcu_assign_pointer(orig->se_lun, NULL);
418 rcu_assign_pointer(orig->se_lun_acl, NULL);
419 orig->lun_flags = 0;
420 orig->creation_time = 0;
421 orig->attach_count--;
422 /*
423 * Before firing off RCU callback, wait for any in process SPEC_I_PT=1
424 * or REGISTER_AND_MOVE PR operation to complete.
425 */
426 kref_put(&orig->pr_kref, target_pr_kref_release);
427 wait_for_completion(&orig->pr_comp);
428
429 kfree_rcu(orig, rcu_head);
430
431 core_scsi3_free_pr_reg_from_nacl(lun->lun_se_dev, nacl);
432 }
433
434 /* core_clear_lun_from_tpg():
435 *
436 *
437 */
438 void core_clear_lun_from_tpg(struct se_lun *lun, struct se_portal_group *tpg)
439 {
440 struct se_node_acl *nacl;
441 struct se_dev_entry *deve;
442
443 mutex_lock(&tpg->acl_node_mutex);
444 list_for_each_entry(nacl, &tpg->acl_node_list, acl_list) {
445
446 mutex_lock(&nacl->lun_entry_mutex);
447 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
448 struct se_lun *tmp_lun = rcu_dereference_check(deve->se_lun,
449 lockdep_is_held(&nacl->lun_entry_mutex));
450
451 if (lun != tmp_lun)
452 continue;
453
454 core_disable_device_list_for_node(lun, deve, nacl, tpg);
455 }
456 mutex_unlock(&nacl->lun_entry_mutex);
457 }
458 mutex_unlock(&tpg->acl_node_mutex);
459 }
460
461 static struct se_port *core_alloc_port(struct se_device *dev)
462 {
463 struct se_port *port, *port_tmp;
464
465 port = kzalloc(sizeof(struct se_port), GFP_KERNEL);
466 if (!port) {
467 pr_err("Unable to allocate struct se_port\n");
468 return ERR_PTR(-ENOMEM);
469 }
470 INIT_LIST_HEAD(&port->sep_alua_list);
471 INIT_LIST_HEAD(&port->sep_list);
472 atomic_set(&port->sep_tg_pt_secondary_offline, 0);
473 spin_lock_init(&port->sep_alua_lock);
474 mutex_init(&port->sep_tg_pt_md_mutex);
475
476 spin_lock(&dev->se_port_lock);
477 if (dev->dev_port_count == 0x0000ffff) {
478 pr_warn("Reached dev->dev_port_count =="
479 " 0x0000ffff\n");
480 spin_unlock(&dev->se_port_lock);
481 return ERR_PTR(-ENOSPC);
482 }
483 again:
484 /*
485 * Allocate the next RELATIVE TARGET PORT IDENTIFIER for this struct se_device
486 * Here is the table from spc4r17 section 7.7.3.8.
487 *
488 * Table 473 -- RELATIVE TARGET PORT IDENTIFIER field
489 *
490 * Code Description
491 * 0h Reserved
492 * 1h Relative port 1, historically known as port A
493 * 2h Relative port 2, historically known as port B
494 * 3h to FFFFh Relative port 3 through 65 535
495 */
496 port->sep_rtpi = dev->dev_rpti_counter++;
497 if (!port->sep_rtpi)
498 goto again;
499
500 list_for_each_entry(port_tmp, &dev->dev_sep_list, sep_list) {
501 /*
502 * Make sure RELATIVE TARGET PORT IDENTIFIER is unique
503 * for 16-bit wrap..
504 */
505 if (port->sep_rtpi == port_tmp->sep_rtpi)
506 goto again;
507 }
508 spin_unlock(&dev->se_port_lock);
509
510 return port;
511 }
512
513 static void core_export_port(
514 struct se_device *dev,
515 struct se_portal_group *tpg,
516 struct se_port *port,
517 struct se_lun *lun)
518 {
519 struct t10_alua_tg_pt_gp_member *tg_pt_gp_mem = NULL;
520
521 spin_lock(&dev->se_port_lock);
522 spin_lock(&lun->lun_sep_lock);
523 port->sep_tpg = tpg;
524 port->sep_lun = lun;
525 lun->lun_sep = port;
526 spin_unlock(&lun->lun_sep_lock);
527
528 list_add_tail(&port->sep_list, &dev->dev_sep_list);
529 spin_unlock(&dev->se_port_lock);
530
531 if (!(dev->transport->transport_flags & TRANSPORT_FLAG_PASSTHROUGH) &&
532 !(dev->se_hba->hba_flags & HBA_FLAGS_INTERNAL_USE)) {
533 tg_pt_gp_mem = core_alua_allocate_tg_pt_gp_mem(port);
534 if (IS_ERR(tg_pt_gp_mem) || !tg_pt_gp_mem) {
535 pr_err("Unable to allocate t10_alua_tg_pt"
536 "_gp_member_t\n");
537 return;
538 }
539 spin_lock(&tg_pt_gp_mem->tg_pt_gp_mem_lock);
540 __core_alua_attach_tg_pt_gp_mem(tg_pt_gp_mem,
541 dev->t10_alua.default_tg_pt_gp);
542 spin_unlock(&tg_pt_gp_mem->tg_pt_gp_mem_lock);
543 pr_debug("%s/%s: Adding to default ALUA Target Port"
544 " Group: alua/default_tg_pt_gp\n",
545 dev->transport->name, tpg->se_tpg_tfo->get_fabric_name());
546 }
547
548 dev->dev_port_count++;
549 port->sep_index = port->sep_rtpi; /* RELATIVE TARGET PORT IDENTIFIER */
550 }
551
552 /*
553 * Called with struct se_device->se_port_lock spinlock held.
554 */
555 static void core_release_port(struct se_device *dev, struct se_port *port)
556 __releases(&dev->se_port_lock) __acquires(&dev->se_port_lock)
557 {
558 /*
559 * Wait for any port reference for PR ALL_TG_PT=1 operation
560 * to complete in __core_scsi3_alloc_registration()
561 */
562 spin_unlock(&dev->se_port_lock);
563 if (atomic_read(&port->sep_tg_pt_ref_cnt))
564 cpu_relax();
565 spin_lock(&dev->se_port_lock);
566
567 core_alua_free_tg_pt_gp_mem(port);
568
569 list_del(&port->sep_list);
570 dev->dev_port_count--;
571 kfree(port);
572 }
573
574 int core_dev_export(
575 struct se_device *dev,
576 struct se_portal_group *tpg,
577 struct se_lun *lun)
578 {
579 struct se_hba *hba = dev->se_hba;
580 struct se_port *port;
581
582 port = core_alloc_port(dev);
583 if (IS_ERR(port))
584 return PTR_ERR(port);
585
586 lun->lun_index = dev->dev_index;
587 lun->lun_se_dev = dev;
588 lun->lun_rtpi = port->sep_rtpi;
589
590 spin_lock(&hba->device_lock);
591 dev->export_count++;
592 spin_unlock(&hba->device_lock);
593
594 core_export_port(dev, tpg, port, lun);
595 return 0;
596 }
597
598 void core_dev_unexport(
599 struct se_device *dev,
600 struct se_portal_group *tpg,
601 struct se_lun *lun)
602 {
603 struct se_hba *hba = dev->se_hba;
604 struct se_port *port = lun->lun_sep;
605
606 spin_lock(&lun->lun_sep_lock);
607 if (lun->lun_se_dev == NULL) {
608 spin_unlock(&lun->lun_sep_lock);
609 return;
610 }
611 spin_unlock(&lun->lun_sep_lock);
612
613 spin_lock(&dev->se_port_lock);
614 core_release_port(dev, port);
615 spin_unlock(&dev->se_port_lock);
616
617 spin_lock(&hba->device_lock);
618 dev->export_count--;
619 spin_unlock(&hba->device_lock);
620
621 lun->lun_sep = NULL;
622 lun->lun_se_dev = NULL;
623 }
624
625 static void se_release_vpd_for_dev(struct se_device *dev)
626 {
627 struct t10_vpd *vpd, *vpd_tmp;
628
629 spin_lock(&dev->t10_wwn.t10_vpd_lock);
630 list_for_each_entry_safe(vpd, vpd_tmp,
631 &dev->t10_wwn.t10_vpd_list, vpd_list) {
632 list_del(&vpd->vpd_list);
633 kfree(vpd);
634 }
635 spin_unlock(&dev->t10_wwn.t10_vpd_lock);
636 }
637
638 static u32 se_dev_align_max_sectors(u32 max_sectors, u32 block_size)
639 {
640 u32 aligned_max_sectors;
641 u32 alignment;
642 /*
643 * Limit max_sectors to a PAGE_SIZE aligned value for modern
644 * transport_allocate_data_tasks() operation.
645 */
646 alignment = max(1ul, PAGE_SIZE / block_size);
647 aligned_max_sectors = rounddown(max_sectors, alignment);
648
649 if (max_sectors != aligned_max_sectors)
650 pr_info("Rounding down aligned max_sectors from %u to %u\n",
651 max_sectors, aligned_max_sectors);
652
653 return aligned_max_sectors;
654 }
655
656 bool se_dev_check_wce(struct se_device *dev)
657 {
658 bool wce = false;
659
660 if (dev->transport->get_write_cache)
661 wce = dev->transport->get_write_cache(dev);
662 else if (dev->dev_attrib.emulate_write_cache > 0)
663 wce = true;
664
665 return wce;
666 }
667
668 int core_dev_add_lun(
669 struct se_portal_group *tpg,
670 struct se_device *dev,
671 struct se_lun *lun)
672 {
673 int rc;
674
675 rc = core_tpg_add_lun(tpg, lun,
676 TRANSPORT_LUNFLAGS_READ_WRITE, dev);
677 if (rc < 0)
678 return rc;
679
680 pr_debug("%s_TPG[%u]_LUN[%u] - Activated %s Logical Unit from"
681 " CORE HBA: %u\n", tpg->se_tpg_tfo->get_fabric_name(),
682 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
683 tpg->se_tpg_tfo->get_fabric_name(), dev->se_hba->hba_id);
684 /*
685 * Update LUN maps for dynamically added initiators when
686 * generate_node_acl is enabled.
687 */
688 if (tpg->se_tpg_tfo->tpg_check_demo_mode(tpg)) {
689 struct se_node_acl *acl;
690
691 mutex_lock(&tpg->acl_node_mutex);
692 list_for_each_entry(acl, &tpg->acl_node_list, acl_list) {
693 if (acl->dynamic_node_acl &&
694 (!tpg->se_tpg_tfo->tpg_check_demo_mode_login_only ||
695 !tpg->se_tpg_tfo->tpg_check_demo_mode_login_only(tpg))) {
696 core_tpg_add_node_to_devs(acl, tpg, lun);
697 }
698 }
699 mutex_unlock(&tpg->acl_node_mutex);
700 }
701
702 return 0;
703 }
704
705 /* core_dev_del_lun():
706 *
707 *
708 */
709 void core_dev_del_lun(
710 struct se_portal_group *tpg,
711 struct se_lun *lun)
712 {
713 pr_debug("%s_TPG[%u]_LUN[%u] - Deactivating %s Logical Unit from"
714 " device object\n", tpg->se_tpg_tfo->get_fabric_name(),
715 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
716 tpg->se_tpg_tfo->get_fabric_name());
717
718 core_tpg_remove_lun(tpg, lun);
719 }
720
721 struct se_lun_acl *core_dev_init_initiator_node_lun_acl(
722 struct se_portal_group *tpg,
723 struct se_node_acl *nacl,
724 u32 mapped_lun,
725 int *ret)
726 {
727 struct se_lun_acl *lacl;
728
729 if (strlen(nacl->initiatorname) >= TRANSPORT_IQN_LEN) {
730 pr_err("%s InitiatorName exceeds maximum size.\n",
731 tpg->se_tpg_tfo->get_fabric_name());
732 *ret = -EOVERFLOW;
733 return NULL;
734 }
735 lacl = kzalloc(sizeof(struct se_lun_acl), GFP_KERNEL);
736 if (!lacl) {
737 pr_err("Unable to allocate memory for struct se_lun_acl.\n");
738 *ret = -ENOMEM;
739 return NULL;
740 }
741
742 lacl->mapped_lun = mapped_lun;
743 lacl->se_lun_nacl = nacl;
744 snprintf(lacl->initiatorname, TRANSPORT_IQN_LEN, "%s",
745 nacl->initiatorname);
746
747 return lacl;
748 }
749
750 int core_dev_add_initiator_node_lun_acl(
751 struct se_portal_group *tpg,
752 struct se_lun_acl *lacl,
753 struct se_lun *lun,
754 u32 lun_access)
755 {
756 struct se_node_acl *nacl = lacl->se_lun_nacl;
757
758 if (!nacl)
759 return -EINVAL;
760
761 if ((lun->lun_access & TRANSPORT_LUNFLAGS_READ_ONLY) &&
762 (lun_access & TRANSPORT_LUNFLAGS_READ_WRITE))
763 lun_access = TRANSPORT_LUNFLAGS_READ_ONLY;
764
765 lacl->se_lun = lun;
766
767 if (core_enable_device_list_for_node(lun, lacl, lacl->mapped_lun,
768 lun_access, nacl, tpg) < 0)
769 return -EINVAL;
770
771 pr_debug("%s_TPG[%hu]_LUN[%u->%u] - Added %s ACL for "
772 " InitiatorNode: %s\n", tpg->se_tpg_tfo->get_fabric_name(),
773 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun, lacl->mapped_lun,
774 (lun_access & TRANSPORT_LUNFLAGS_READ_WRITE) ? "RW" : "RO",
775 lacl->initiatorname);
776 /*
777 * Check to see if there are any existing persistent reservation APTPL
778 * pre-registrations that need to be enabled for this LUN ACL..
779 */
780 core_scsi3_check_aptpl_registration(lun->lun_se_dev, tpg, lun, nacl,
781 lacl->mapped_lun);
782 return 0;
783 }
784
785 int core_dev_del_initiator_node_lun_acl(
786 struct se_portal_group *tpg,
787 struct se_lun *lun,
788 struct se_lun_acl *lacl)
789 {
790 struct se_node_acl *nacl;
791 struct se_dev_entry *deve;
792
793 nacl = lacl->se_lun_nacl;
794 if (!nacl)
795 return -EINVAL;
796
797 mutex_lock(&nacl->lun_entry_mutex);
798 deve = target_nacl_find_deve(nacl, lacl->mapped_lun);
799 if (deve)
800 core_disable_device_list_for_node(lun, deve, nacl, tpg);
801 mutex_unlock(&nacl->lun_entry_mutex);
802
803 pr_debug("%s_TPG[%hu]_LUN[%u] - Removed ACL for"
804 " InitiatorNode: %s Mapped LUN: %u\n",
805 tpg->se_tpg_tfo->get_fabric_name(),
806 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
807 lacl->initiatorname, lacl->mapped_lun);
808
809 return 0;
810 }
811
812 void core_dev_free_initiator_node_lun_acl(
813 struct se_portal_group *tpg,
814 struct se_lun_acl *lacl)
815 {
816 pr_debug("%s_TPG[%hu] - Freeing ACL for %s InitiatorNode: %s"
817 " Mapped LUN: %u\n", tpg->se_tpg_tfo->get_fabric_name(),
818 tpg->se_tpg_tfo->tpg_get_tag(tpg),
819 tpg->se_tpg_tfo->get_fabric_name(),
820 lacl->initiatorname, lacl->mapped_lun);
821
822 kfree(lacl);
823 }
824
825 static void scsi_dump_inquiry(struct se_device *dev)
826 {
827 struct t10_wwn *wwn = &dev->t10_wwn;
828 char buf[17];
829 int i, device_type;
830 /*
831 * Print Linux/SCSI style INQUIRY formatting to the kernel ring buffer
832 */
833 for (i = 0; i < 8; i++)
834 if (wwn->vendor[i] >= 0x20)
835 buf[i] = wwn->vendor[i];
836 else
837 buf[i] = ' ';
838 buf[i] = '\0';
839 pr_debug(" Vendor: %s\n", buf);
840
841 for (i = 0; i < 16; i++)
842 if (wwn->model[i] >= 0x20)
843 buf[i] = wwn->model[i];
844 else
845 buf[i] = ' ';
846 buf[i] = '\0';
847 pr_debug(" Model: %s\n", buf);
848
849 for (i = 0; i < 4; i++)
850 if (wwn->revision[i] >= 0x20)
851 buf[i] = wwn->revision[i];
852 else
853 buf[i] = ' ';
854 buf[i] = '\0';
855 pr_debug(" Revision: %s\n", buf);
856
857 device_type = dev->transport->get_device_type(dev);
858 pr_debug(" Type: %s ", scsi_device_type(device_type));
859 }
860
861 struct se_device *target_alloc_device(struct se_hba *hba, const char *name)
862 {
863 struct se_device *dev;
864 struct se_lun *xcopy_lun;
865
866 dev = hba->backend->ops->alloc_device(hba, name);
867 if (!dev)
868 return NULL;
869
870 dev->dev_link_magic = SE_DEV_LINK_MAGIC;
871 dev->se_hba = hba;
872 dev->transport = hba->backend->ops;
873 dev->prot_length = sizeof(struct se_dif_v1_tuple);
874
875 INIT_LIST_HEAD(&dev->dev_list);
876 INIT_LIST_HEAD(&dev->dev_sep_list);
877 INIT_LIST_HEAD(&dev->dev_tmr_list);
878 INIT_LIST_HEAD(&dev->delayed_cmd_list);
879 INIT_LIST_HEAD(&dev->state_list);
880 INIT_LIST_HEAD(&dev->qf_cmd_list);
881 INIT_LIST_HEAD(&dev->g_dev_node);
882 spin_lock_init(&dev->execute_task_lock);
883 spin_lock_init(&dev->delayed_cmd_lock);
884 spin_lock_init(&dev->dev_reservation_lock);
885 spin_lock_init(&dev->se_port_lock);
886 spin_lock_init(&dev->se_tmr_lock);
887 spin_lock_init(&dev->qf_cmd_lock);
888 sema_init(&dev->caw_sem, 1);
889 atomic_set(&dev->dev_ordered_id, 0);
890 INIT_LIST_HEAD(&dev->t10_wwn.t10_vpd_list);
891 spin_lock_init(&dev->t10_wwn.t10_vpd_lock);
892 INIT_LIST_HEAD(&dev->t10_pr.registration_list);
893 INIT_LIST_HEAD(&dev->t10_pr.aptpl_reg_list);
894 spin_lock_init(&dev->t10_pr.registration_lock);
895 spin_lock_init(&dev->t10_pr.aptpl_reg_lock);
896 INIT_LIST_HEAD(&dev->t10_alua.tg_pt_gps_list);
897 spin_lock_init(&dev->t10_alua.tg_pt_gps_lock);
898 INIT_LIST_HEAD(&dev->t10_alua.lba_map_list);
899 spin_lock_init(&dev->t10_alua.lba_map_lock);
900
901 dev->t10_wwn.t10_dev = dev;
902 dev->t10_alua.t10_dev = dev;
903
904 dev->dev_attrib.da_dev = dev;
905 dev->dev_attrib.emulate_model_alias = DA_EMULATE_MODEL_ALIAS;
906 dev->dev_attrib.emulate_dpo = 1;
907 dev->dev_attrib.emulate_fua_write = 1;
908 dev->dev_attrib.emulate_fua_read = 1;
909 dev->dev_attrib.emulate_write_cache = DA_EMULATE_WRITE_CACHE;
910 dev->dev_attrib.emulate_ua_intlck_ctrl = DA_EMULATE_UA_INTLLCK_CTRL;
911 dev->dev_attrib.emulate_tas = DA_EMULATE_TAS;
912 dev->dev_attrib.emulate_tpu = DA_EMULATE_TPU;
913 dev->dev_attrib.emulate_tpws = DA_EMULATE_TPWS;
914 dev->dev_attrib.emulate_caw = DA_EMULATE_CAW;
915 dev->dev_attrib.emulate_3pc = DA_EMULATE_3PC;
916 dev->dev_attrib.pi_prot_type = TARGET_DIF_TYPE0_PROT;
917 dev->dev_attrib.enforce_pr_isids = DA_ENFORCE_PR_ISIDS;
918 dev->dev_attrib.force_pr_aptpl = DA_FORCE_PR_APTPL;
919 dev->dev_attrib.is_nonrot = DA_IS_NONROT;
920 dev->dev_attrib.emulate_rest_reord = DA_EMULATE_REST_REORD;
921 dev->dev_attrib.max_unmap_lba_count = DA_MAX_UNMAP_LBA_COUNT;
922 dev->dev_attrib.max_unmap_block_desc_count =
923 DA_MAX_UNMAP_BLOCK_DESC_COUNT;
924 dev->dev_attrib.unmap_granularity = DA_UNMAP_GRANULARITY_DEFAULT;
925 dev->dev_attrib.unmap_granularity_alignment =
926 DA_UNMAP_GRANULARITY_ALIGNMENT_DEFAULT;
927 dev->dev_attrib.max_write_same_len = DA_MAX_WRITE_SAME_LEN;
928
929 xcopy_lun = &dev->xcopy_lun;
930 xcopy_lun->lun_se_dev = dev;
931 init_completion(&xcopy_lun->lun_shutdown_comp);
932 spin_lock_init(&xcopy_lun->lun_sep_lock);
933 init_completion(&xcopy_lun->lun_ref_comp);
934
935 return dev;
936 }
937
938 int target_configure_device(struct se_device *dev)
939 {
940 struct se_hba *hba = dev->se_hba;
941 int ret;
942
943 if (dev->dev_flags & DF_CONFIGURED) {
944 pr_err("se_dev->se_dev_ptr already set for storage"
945 " object\n");
946 return -EEXIST;
947 }
948
949 ret = dev->transport->configure_device(dev);
950 if (ret)
951 goto out;
952 /*
953 * XXX: there is not much point to have two different values here..
954 */
955 dev->dev_attrib.block_size = dev->dev_attrib.hw_block_size;
956 dev->dev_attrib.queue_depth = dev->dev_attrib.hw_queue_depth;
957
958 /*
959 * Align max_hw_sectors down to PAGE_SIZE I/O transfers
960 */
961 dev->dev_attrib.hw_max_sectors =
962 se_dev_align_max_sectors(dev->dev_attrib.hw_max_sectors,
963 dev->dev_attrib.hw_block_size);
964 dev->dev_attrib.optimal_sectors = dev->dev_attrib.hw_max_sectors;
965
966 dev->dev_index = scsi_get_new_index(SCSI_DEVICE_INDEX);
967 dev->creation_time = get_jiffies_64();
968
969 ret = core_setup_alua(dev);
970 if (ret)
971 goto out;
972
973 /*
974 * Startup the struct se_device processing thread
975 */
976 dev->tmr_wq = alloc_workqueue("tmr-%s", WQ_MEM_RECLAIM | WQ_UNBOUND, 1,
977 dev->transport->name);
978 if (!dev->tmr_wq) {
979 pr_err("Unable to create tmr workqueue for %s\n",
980 dev->transport->name);
981 ret = -ENOMEM;
982 goto out_free_alua;
983 }
984
985 /*
986 * Setup work_queue for QUEUE_FULL
987 */
988 INIT_WORK(&dev->qf_work_queue, target_qf_do_work);
989
990 /*
991 * Preload the initial INQUIRY const values if we are doing
992 * anything virtual (IBLOCK, FILEIO, RAMDISK), but not for TCM/pSCSI
993 * passthrough because this is being provided by the backend LLD.
994 */
995 if (!(dev->transport->transport_flags & TRANSPORT_FLAG_PASSTHROUGH)) {
996 strncpy(&dev->t10_wwn.vendor[0], "LIO-ORG", 8);
997 strncpy(&dev->t10_wwn.model[0],
998 dev->transport->inquiry_prod, 16);
999 strncpy(&dev->t10_wwn.revision[0],
1000 dev->transport->inquiry_rev, 4);
1001 }
1002
1003 scsi_dump_inquiry(dev);
1004
1005 spin_lock(&hba->device_lock);
1006 hba->dev_count++;
1007 spin_unlock(&hba->device_lock);
1008
1009 mutex_lock(&g_device_mutex);
1010 list_add_tail(&dev->g_dev_node, &g_device_list);
1011 mutex_unlock(&g_device_mutex);
1012
1013 dev->dev_flags |= DF_CONFIGURED;
1014
1015 return 0;
1016
1017 out_free_alua:
1018 core_alua_free_lu_gp_mem(dev);
1019 out:
1020 se_release_vpd_for_dev(dev);
1021 return ret;
1022 }
1023
1024 void target_free_device(struct se_device *dev)
1025 {
1026 struct se_hba *hba = dev->se_hba;
1027
1028 WARN_ON(!list_empty(&dev->dev_sep_list));
1029
1030 if (dev->dev_flags & DF_CONFIGURED) {
1031 destroy_workqueue(dev->tmr_wq);
1032
1033 mutex_lock(&g_device_mutex);
1034 list_del(&dev->g_dev_node);
1035 mutex_unlock(&g_device_mutex);
1036
1037 spin_lock(&hba->device_lock);
1038 hba->dev_count--;
1039 spin_unlock(&hba->device_lock);
1040 }
1041
1042 core_alua_free_lu_gp_mem(dev);
1043 core_alua_set_lba_map(dev, NULL, 0, 0);
1044 core_scsi3_free_all_registrations(dev);
1045 se_release_vpd_for_dev(dev);
1046
1047 if (dev->transport->free_prot)
1048 dev->transport->free_prot(dev);
1049
1050 dev->transport->free_device(dev);
1051 }
1052
1053 int core_dev_setup_virtual_lun0(void)
1054 {
1055 struct se_hba *hba;
1056 struct se_device *dev;
1057 char buf[] = "rd_pages=8,rd_nullio=1";
1058 int ret;
1059
1060 hba = core_alloc_hba("rd_mcp", 0, HBA_FLAGS_INTERNAL_USE);
1061 if (IS_ERR(hba))
1062 return PTR_ERR(hba);
1063
1064 dev = target_alloc_device(hba, "virt_lun0");
1065 if (!dev) {
1066 ret = -ENOMEM;
1067 goto out_free_hba;
1068 }
1069
1070 hba->backend->ops->set_configfs_dev_params(dev, buf, sizeof(buf));
1071
1072 ret = target_configure_device(dev);
1073 if (ret)
1074 goto out_free_se_dev;
1075
1076 lun0_hba = hba;
1077 g_lun0_dev = dev;
1078 return 0;
1079
1080 out_free_se_dev:
1081 target_free_device(dev);
1082 out_free_hba:
1083 core_delete_hba(hba);
1084 return ret;
1085 }
1086
1087
1088 void core_dev_release_virtual_lun0(void)
1089 {
1090 struct se_hba *hba = lun0_hba;
1091
1092 if (!hba)
1093 return;
1094
1095 if (g_lun0_dev)
1096 target_free_device(g_lun0_dev);
1097 core_delete_hba(hba);
1098 }
1099
1100 /*
1101 * Common CDB parsing for kernel and user passthrough.
1102 */
1103 sense_reason_t
1104 passthrough_parse_cdb(struct se_cmd *cmd,
1105 sense_reason_t (*exec_cmd)(struct se_cmd *cmd))
1106 {
1107 unsigned char *cdb = cmd->t_task_cdb;
1108
1109 /*
1110 * Clear a lun set in the cdb if the initiator talking to use spoke
1111 * and old standards version, as we can't assume the underlying device
1112 * won't choke up on it.
1113 */
1114 switch (cdb[0]) {
1115 case READ_10: /* SBC - RDProtect */
1116 case READ_12: /* SBC - RDProtect */
1117 case READ_16: /* SBC - RDProtect */
1118 case SEND_DIAGNOSTIC: /* SPC - SELF-TEST Code */
1119 case VERIFY: /* SBC - VRProtect */
1120 case VERIFY_16: /* SBC - VRProtect */
1121 case WRITE_VERIFY: /* SBC - VRProtect */
1122 case WRITE_VERIFY_12: /* SBC - VRProtect */
1123 case MAINTENANCE_IN: /* SPC - Parameter Data Format for SA RTPG */
1124 break;
1125 default:
1126 cdb[1] &= 0x1f; /* clear logical unit number */
1127 break;
1128 }
1129
1130 /*
1131 * For REPORT LUNS we always need to emulate the response, for everything
1132 * else, pass it up.
1133 */
1134 if (cdb[0] == REPORT_LUNS) {
1135 cmd->execute_cmd = spc_emulate_report_luns;
1136 return TCM_NO_SENSE;
1137 }
1138
1139 /* Set DATA_CDB flag for ops that should have it */
1140 switch (cdb[0]) {
1141 case READ_6:
1142 case READ_10:
1143 case READ_12:
1144 case READ_16:
1145 case WRITE_6:
1146 case WRITE_10:
1147 case WRITE_12:
1148 case WRITE_16:
1149 case WRITE_VERIFY:
1150 case WRITE_VERIFY_12:
1151 case 0x8e: /* WRITE_VERIFY_16 */
1152 case COMPARE_AND_WRITE:
1153 case XDWRITEREAD_10:
1154 cmd->se_cmd_flags |= SCF_SCSI_DATA_CDB;
1155 break;
1156 case VARIABLE_LENGTH_CMD:
1157 switch (get_unaligned_be16(&cdb[8])) {
1158 case READ_32:
1159 case WRITE_32:
1160 case 0x0c: /* WRITE_VERIFY_32 */
1161 case XDWRITEREAD_32:
1162 cmd->se_cmd_flags |= SCF_SCSI_DATA_CDB;
1163 break;
1164 }
1165 }
1166
1167 cmd->execute_cmd = exec_cmd;
1168
1169 return TCM_NO_SENSE;
1170 }
1171 EXPORT_SYMBOL(passthrough_parse_cdb);
This page took 0.078251 seconds and 5 git commands to generate.