1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /******************************************************************************* 3 * Filename: target_core_device.c (based on iscsi_target_device.c) 4 * 5 * This file contains the TCM Virtual Device and Disk Transport 6 * agnostic related functions. 7 * 8 * (c) Copyright 2003-2013 Datera, Inc. 9 * 10 * Nicholas A. Bellinger <nab@kernel.org> 11 * 12 ******************************************************************************/ 13 14 #include <linux/net.h> 15 #include <linux/string.h> 16 #include <linux/delay.h> 17 #include <linux/timer.h> 18 #include <linux/slab.h> 19 #include <linux/spinlock.h> 20 #include <linux/kthread.h> 21 #include <linux/in.h> 22 #include <linux/export.h> 23 #include <linux/t10-pi.h> 24 #include <asm/unaligned.h> 25 #include <net/sock.h> 26 #include <net/tcp.h> 27 #include <scsi/scsi_common.h> 28 #include <scsi/scsi_proto.h> 29 30 #include <target/target_core_base.h> 31 #include <target/target_core_backend.h> 32 #include <target/target_core_fabric.h> 33 34 #include "target_core_internal.h" 35 #include "target_core_alua.h" 36 #include "target_core_pr.h" 37 #include "target_core_ua.h" 38 39 static DEFINE_MUTEX(device_mutex); 40 static LIST_HEAD(device_list); 41 static DEFINE_IDR(devices_idr); 42 43 static struct se_hba *lun0_hba; 44 /* not static, needed by tpg.c */ 45 struct se_device *g_lun0_dev; 46 47 sense_reason_t 48 transport_lookup_cmd_lun(struct se_cmd *se_cmd, u64 unpacked_lun) 49 { 50 struct se_lun *se_lun = NULL; 51 struct se_session *se_sess = se_cmd->se_sess; 52 struct se_node_acl *nacl = se_sess->se_node_acl; 53 struct se_dev_entry *deve; 54 sense_reason_t ret = TCM_NO_SENSE; 55 56 rcu_read_lock(); 57 deve = target_nacl_find_deve(nacl, unpacked_lun); 58 if (deve) { 59 atomic_long_inc(&deve->total_cmds); 60 61 if (se_cmd->data_direction == DMA_TO_DEVICE) 62 atomic_long_add(se_cmd->data_length, 63 &deve->write_bytes); 64 else if (se_cmd->data_direction == DMA_FROM_DEVICE) 65 atomic_long_add(se_cmd->data_length, 66 &deve->read_bytes); 67 68 se_lun = rcu_dereference(deve->se_lun); 69 70 if (!percpu_ref_tryget_live(&se_lun->lun_ref)) { 71 se_lun = NULL; 72 goto out_unlock; 73 } 74 75 se_cmd->se_lun = se_lun; 76 se_cmd->pr_res_key = deve->pr_res_key; 77 se_cmd->orig_fe_lun = unpacked_lun; 78 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD; 79 se_cmd->lun_ref_active = true; 80 81 if ((se_cmd->data_direction == DMA_TO_DEVICE) && 82 deve->lun_access_ro) { 83 pr_err("TARGET_CORE[%s]: Detected WRITE_PROTECTED LUN" 84 " Access for 0x%08llx\n", 85 se_cmd->se_tfo->fabric_name, 86 unpacked_lun); 87 rcu_read_unlock(); 88 ret = TCM_WRITE_PROTECTED; 89 goto ref_dev; 90 } 91 } 92 out_unlock: 93 rcu_read_unlock(); 94 95 if (!se_lun) { 96 /* 97 * Use the se_portal_group->tpg_virt_lun0 to allow for 98 * REPORT_LUNS, et al to be returned when no active 99 * MappedLUN=0 exists for this Initiator Port. 100 */ 101 if (unpacked_lun != 0) { 102 pr_err("TARGET_CORE[%s]: Detected NON_EXISTENT_LUN" 103 " Access for 0x%08llx\n", 104 se_cmd->se_tfo->fabric_name, 105 unpacked_lun); 106 return TCM_NON_EXISTENT_LUN; 107 } 108 109 se_lun = se_sess->se_tpg->tpg_virt_lun0; 110 se_cmd->se_lun = se_sess->se_tpg->tpg_virt_lun0; 111 se_cmd->orig_fe_lun = 0; 112 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD; 113 114 percpu_ref_get(&se_lun->lun_ref); 115 se_cmd->lun_ref_active = true; 116 117 /* 118 * Force WRITE PROTECT for virtual LUN 0 119 */ 120 if ((se_cmd->data_direction != DMA_FROM_DEVICE) && 121 (se_cmd->data_direction != DMA_NONE)) { 122 ret = TCM_WRITE_PROTECTED; 123 goto ref_dev; 124 } 125 } 126 /* 127 * RCU reference protected by percpu se_lun->lun_ref taken above that 128 * must drop to zero (including initial reference) before this se_lun 129 * pointer can be kfree_rcu() by the final se_lun->lun_group put via 130 * target_core_fabric_configfs.c:target_fabric_port_release 131 */ 132 ref_dev: 133 se_cmd->se_dev = rcu_dereference_raw(se_lun->lun_se_dev); 134 atomic_long_inc(&se_cmd->se_dev->num_cmds); 135 136 if (se_cmd->data_direction == DMA_TO_DEVICE) 137 atomic_long_add(se_cmd->data_length, 138 &se_cmd->se_dev->write_bytes); 139 else if (se_cmd->data_direction == DMA_FROM_DEVICE) 140 atomic_long_add(se_cmd->data_length, 141 &se_cmd->se_dev->read_bytes); 142 143 return ret; 144 } 145 EXPORT_SYMBOL(transport_lookup_cmd_lun); 146 147 int transport_lookup_tmr_lun(struct se_cmd *se_cmd, u64 unpacked_lun) 148 { 149 struct se_dev_entry *deve; 150 struct se_lun *se_lun = NULL; 151 struct se_session *se_sess = se_cmd->se_sess; 152 struct se_node_acl *nacl = se_sess->se_node_acl; 153 struct se_tmr_req *se_tmr = se_cmd->se_tmr_req; 154 unsigned long flags; 155 156 rcu_read_lock(); 157 deve = target_nacl_find_deve(nacl, unpacked_lun); 158 if (deve) { 159 se_lun = rcu_dereference(deve->se_lun); 160 161 if (!percpu_ref_tryget_live(&se_lun->lun_ref)) { 162 se_lun = NULL; 163 goto out_unlock; 164 } 165 166 se_cmd->se_lun = se_lun; 167 se_cmd->pr_res_key = deve->pr_res_key; 168 se_cmd->orig_fe_lun = unpacked_lun; 169 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD; 170 se_cmd->lun_ref_active = true; 171 } 172 out_unlock: 173 rcu_read_unlock(); 174 175 if (!se_lun) { 176 pr_debug("TARGET_CORE[%s]: Detected NON_EXISTENT_LUN" 177 " Access for 0x%08llx\n", 178 se_cmd->se_tfo->fabric_name, 179 unpacked_lun); 180 return -ENODEV; 181 } 182 se_cmd->se_dev = rcu_dereference_raw(se_lun->lun_se_dev); 183 se_tmr->tmr_dev = rcu_dereference_raw(se_lun->lun_se_dev); 184 185 spin_lock_irqsave(&se_tmr->tmr_dev->se_tmr_lock, flags); 186 list_add_tail(&se_tmr->tmr_list, &se_tmr->tmr_dev->dev_tmr_list); 187 spin_unlock_irqrestore(&se_tmr->tmr_dev->se_tmr_lock, flags); 188 189 return 0; 190 } 191 EXPORT_SYMBOL(transport_lookup_tmr_lun); 192 193 bool target_lun_is_rdonly(struct se_cmd *cmd) 194 { 195 struct se_session *se_sess = cmd->se_sess; 196 struct se_dev_entry *deve; 197 bool ret; 198 199 rcu_read_lock(); 200 deve = target_nacl_find_deve(se_sess->se_node_acl, cmd->orig_fe_lun); 201 ret = deve && deve->lun_access_ro; 202 rcu_read_unlock(); 203 204 return ret; 205 } 206 EXPORT_SYMBOL(target_lun_is_rdonly); 207 208 /* 209 * This function is called from core_scsi3_emulate_pro_register_and_move() 210 * and core_scsi3_decode_spec_i_port(), and will increment &deve->pr_kref 211 * when a matching rtpi is found. 212 */ 213 struct se_dev_entry *core_get_se_deve_from_rtpi( 214 struct se_node_acl *nacl, 215 u16 rtpi) 216 { 217 struct se_dev_entry *deve; 218 struct se_lun *lun; 219 struct se_portal_group *tpg = nacl->se_tpg; 220 221 rcu_read_lock(); 222 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) { 223 lun = rcu_dereference(deve->se_lun); 224 if (!lun) { 225 pr_err("%s device entries device pointer is" 226 " NULL, but Initiator has access.\n", 227 tpg->se_tpg_tfo->fabric_name); 228 continue; 229 } 230 if (lun->lun_rtpi != rtpi) 231 continue; 232 233 kref_get(&deve->pr_kref); 234 rcu_read_unlock(); 235 236 return deve; 237 } 238 rcu_read_unlock(); 239 240 return NULL; 241 } 242 243 void core_free_device_list_for_node( 244 struct se_node_acl *nacl, 245 struct se_portal_group *tpg) 246 { 247 struct se_dev_entry *deve; 248 249 mutex_lock(&nacl->lun_entry_mutex); 250 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) { 251 struct se_lun *lun = rcu_dereference_check(deve->se_lun, 252 lockdep_is_held(&nacl->lun_entry_mutex)); 253 core_disable_device_list_for_node(lun, deve, nacl, tpg); 254 } 255 mutex_unlock(&nacl->lun_entry_mutex); 256 } 257 258 void core_update_device_list_access( 259 u64 mapped_lun, 260 bool lun_access_ro, 261 struct se_node_acl *nacl) 262 { 263 struct se_dev_entry *deve; 264 265 mutex_lock(&nacl->lun_entry_mutex); 266 deve = target_nacl_find_deve(nacl, mapped_lun); 267 if (deve) 268 deve->lun_access_ro = lun_access_ro; 269 mutex_unlock(&nacl->lun_entry_mutex); 270 } 271 272 /* 273 * Called with rcu_read_lock or nacl->device_list_lock held. 274 */ 275 struct se_dev_entry *target_nacl_find_deve(struct se_node_acl *nacl, u64 mapped_lun) 276 { 277 struct se_dev_entry *deve; 278 279 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) 280 if (deve->mapped_lun == mapped_lun) 281 return deve; 282 283 return NULL; 284 } 285 EXPORT_SYMBOL(target_nacl_find_deve); 286 287 void target_pr_kref_release(struct kref *kref) 288 { 289 struct se_dev_entry *deve = container_of(kref, struct se_dev_entry, 290 pr_kref); 291 complete(&deve->pr_comp); 292 } 293 294 static void 295 target_luns_data_has_changed(struct se_node_acl *nacl, struct se_dev_entry *new, 296 bool skip_new) 297 { 298 struct se_dev_entry *tmp; 299 300 rcu_read_lock(); 301 hlist_for_each_entry_rcu(tmp, &nacl->lun_entry_hlist, link) { 302 if (skip_new && tmp == new) 303 continue; 304 core_scsi3_ua_allocate(tmp, 0x3F, 305 ASCQ_3FH_REPORTED_LUNS_DATA_HAS_CHANGED); 306 } 307 rcu_read_unlock(); 308 } 309 310 int core_enable_device_list_for_node( 311 struct se_lun *lun, 312 struct se_lun_acl *lun_acl, 313 u64 mapped_lun, 314 bool lun_access_ro, 315 struct se_node_acl *nacl, 316 struct se_portal_group *tpg) 317 { 318 struct se_dev_entry *orig, *new; 319 320 new = kzalloc(sizeof(*new), GFP_KERNEL); 321 if (!new) { 322 pr_err("Unable to allocate se_dev_entry memory\n"); 323 return -ENOMEM; 324 } 325 326 spin_lock_init(&new->ua_lock); 327 INIT_LIST_HEAD(&new->ua_list); 328 INIT_LIST_HEAD(&new->lun_link); 329 330 new->mapped_lun = mapped_lun; 331 kref_init(&new->pr_kref); 332 init_completion(&new->pr_comp); 333 334 new->lun_access_ro = lun_access_ro; 335 new->creation_time = get_jiffies_64(); 336 new->attach_count++; 337 338 mutex_lock(&nacl->lun_entry_mutex); 339 orig = target_nacl_find_deve(nacl, mapped_lun); 340 if (orig && orig->se_lun) { 341 struct se_lun *orig_lun = rcu_dereference_check(orig->se_lun, 342 lockdep_is_held(&nacl->lun_entry_mutex)); 343 344 if (orig_lun != lun) { 345 pr_err("Existing orig->se_lun doesn't match new lun" 346 " for dynamic -> explicit NodeACL conversion:" 347 " %s\n", nacl->initiatorname); 348 mutex_unlock(&nacl->lun_entry_mutex); 349 kfree(new); 350 return -EINVAL; 351 } 352 if (orig->se_lun_acl != NULL) { 353 pr_warn_ratelimited("Detected existing explicit" 354 " se_lun_acl->se_lun_group reference for %s" 355 " mapped_lun: %llu, failing\n", 356 nacl->initiatorname, mapped_lun); 357 mutex_unlock(&nacl->lun_entry_mutex); 358 kfree(new); 359 return -EINVAL; 360 } 361 362 rcu_assign_pointer(new->se_lun, lun); 363 rcu_assign_pointer(new->se_lun_acl, lun_acl); 364 hlist_del_rcu(&orig->link); 365 hlist_add_head_rcu(&new->link, &nacl->lun_entry_hlist); 366 mutex_unlock(&nacl->lun_entry_mutex); 367 368 spin_lock(&lun->lun_deve_lock); 369 list_del(&orig->lun_link); 370 list_add_tail(&new->lun_link, &lun->lun_deve_list); 371 spin_unlock(&lun->lun_deve_lock); 372 373 kref_put(&orig->pr_kref, target_pr_kref_release); 374 wait_for_completion(&orig->pr_comp); 375 376 target_luns_data_has_changed(nacl, new, true); 377 kfree_rcu(orig, rcu_head); 378 return 0; 379 } 380 381 rcu_assign_pointer(new->se_lun, lun); 382 rcu_assign_pointer(new->se_lun_acl, lun_acl); 383 hlist_add_head_rcu(&new->link, &nacl->lun_entry_hlist); 384 mutex_unlock(&nacl->lun_entry_mutex); 385 386 spin_lock(&lun->lun_deve_lock); 387 list_add_tail(&new->lun_link, &lun->lun_deve_list); 388 spin_unlock(&lun->lun_deve_lock); 389 390 target_luns_data_has_changed(nacl, new, true); 391 return 0; 392 } 393 394 void core_disable_device_list_for_node( 395 struct se_lun *lun, 396 struct se_dev_entry *orig, 397 struct se_node_acl *nacl, 398 struct se_portal_group *tpg) 399 { 400 /* 401 * rcu_dereference_raw protected by se_lun->lun_group symlink 402 * reference to se_device->dev_group. 403 */ 404 struct se_device *dev = rcu_dereference_raw(lun->lun_se_dev); 405 406 lockdep_assert_held(&nacl->lun_entry_mutex); 407 408 /* 409 * If the MappedLUN entry is being disabled, the entry in 410 * lun->lun_deve_list must be removed now before clearing the 411 * struct se_dev_entry pointers below as logic in 412 * core_alua_do_transition_tg_pt() depends on these being present. 413 * 414 * deve->se_lun_acl will be NULL for demo-mode created LUNs 415 * that have not been explicitly converted to MappedLUNs -> 416 * struct se_lun_acl, but we remove deve->lun_link from 417 * lun->lun_deve_list. This also means that active UAs and 418 * NodeACL context specific PR metadata for demo-mode 419 * MappedLUN *deve will be released below.. 420 */ 421 spin_lock(&lun->lun_deve_lock); 422 list_del(&orig->lun_link); 423 spin_unlock(&lun->lun_deve_lock); 424 /* 425 * Disable struct se_dev_entry LUN ACL mapping 426 */ 427 core_scsi3_ua_release_all(orig); 428 429 hlist_del_rcu(&orig->link); 430 clear_bit(DEF_PR_REG_ACTIVE, &orig->deve_flags); 431 orig->lun_access_ro = false; 432 orig->creation_time = 0; 433 orig->attach_count--; 434 /* 435 * Before firing off RCU callback, wait for any in process SPEC_I_PT=1 436 * or REGISTER_AND_MOVE PR operation to complete. 437 */ 438 kref_put(&orig->pr_kref, target_pr_kref_release); 439 wait_for_completion(&orig->pr_comp); 440 441 rcu_assign_pointer(orig->se_lun, NULL); 442 rcu_assign_pointer(orig->se_lun_acl, NULL); 443 444 kfree_rcu(orig, rcu_head); 445 446 core_scsi3_free_pr_reg_from_nacl(dev, nacl); 447 target_luns_data_has_changed(nacl, NULL, false); 448 } 449 450 /* core_clear_lun_from_tpg(): 451 * 452 * 453 */ 454 void core_clear_lun_from_tpg(struct se_lun *lun, struct se_portal_group *tpg) 455 { 456 struct se_node_acl *nacl; 457 struct se_dev_entry *deve; 458 459 mutex_lock(&tpg->acl_node_mutex); 460 list_for_each_entry(nacl, &tpg->acl_node_list, acl_list) { 461 462 mutex_lock(&nacl->lun_entry_mutex); 463 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) { 464 struct se_lun *tmp_lun = rcu_dereference_check(deve->se_lun, 465 lockdep_is_held(&nacl->lun_entry_mutex)); 466 467 if (lun != tmp_lun) 468 continue; 469 470 core_disable_device_list_for_node(lun, deve, nacl, tpg); 471 } 472 mutex_unlock(&nacl->lun_entry_mutex); 473 } 474 mutex_unlock(&tpg->acl_node_mutex); 475 } 476 477 int core_alloc_rtpi(struct se_lun *lun, struct se_device *dev) 478 { 479 struct se_lun *tmp; 480 481 spin_lock(&dev->se_port_lock); 482 if (dev->export_count == 0x0000ffff) { 483 pr_warn("Reached dev->dev_port_count ==" 484 " 0x0000ffff\n"); 485 spin_unlock(&dev->se_port_lock); 486 return -ENOSPC; 487 } 488 again: 489 /* 490 * Allocate the next RELATIVE TARGET PORT IDENTIFIER for this struct se_device 491 * Here is the table from spc4r17 section 7.7.3.8. 492 * 493 * Table 473 -- RELATIVE TARGET PORT IDENTIFIER field 494 * 495 * Code Description 496 * 0h Reserved 497 * 1h Relative port 1, historically known as port A 498 * 2h Relative port 2, historically known as port B 499 * 3h to FFFFh Relative port 3 through 65 535 500 */ 501 lun->lun_rtpi = dev->dev_rpti_counter++; 502 if (!lun->lun_rtpi) 503 goto again; 504 505 list_for_each_entry(tmp, &dev->dev_sep_list, lun_dev_link) { 506 /* 507 * Make sure RELATIVE TARGET PORT IDENTIFIER is unique 508 * for 16-bit wrap.. 509 */ 510 if (lun->lun_rtpi == tmp->lun_rtpi) 511 goto again; 512 } 513 spin_unlock(&dev->se_port_lock); 514 515 return 0; 516 } 517 518 static void se_release_vpd_for_dev(struct se_device *dev) 519 { 520 struct t10_vpd *vpd, *vpd_tmp; 521 522 spin_lock(&dev->t10_wwn.t10_vpd_lock); 523 list_for_each_entry_safe(vpd, vpd_tmp, 524 &dev->t10_wwn.t10_vpd_list, vpd_list) { 525 list_del(&vpd->vpd_list); 526 kfree(vpd); 527 } 528 spin_unlock(&dev->t10_wwn.t10_vpd_lock); 529 } 530 531 static u32 se_dev_align_max_sectors(u32 max_sectors, u32 block_size) 532 { 533 u32 aligned_max_sectors; 534 u32 alignment; 535 /* 536 * Limit max_sectors to a PAGE_SIZE aligned value for modern 537 * transport_allocate_data_tasks() operation. 538 */ 539 alignment = max(1ul, PAGE_SIZE / block_size); 540 aligned_max_sectors = rounddown(max_sectors, alignment); 541 542 if (max_sectors != aligned_max_sectors) 543 pr_info("Rounding down aligned max_sectors from %u to %u\n", 544 max_sectors, aligned_max_sectors); 545 546 return aligned_max_sectors; 547 } 548 549 int core_dev_add_lun( 550 struct se_portal_group *tpg, 551 struct se_device *dev, 552 struct se_lun *lun) 553 { 554 int rc; 555 556 rc = core_tpg_add_lun(tpg, lun, false, dev); 557 if (rc < 0) 558 return rc; 559 560 pr_debug("%s_TPG[%u]_LUN[%llu] - Activated %s Logical Unit from" 561 " CORE HBA: %u\n", tpg->se_tpg_tfo->fabric_name, 562 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun, 563 tpg->se_tpg_tfo->fabric_name, dev->se_hba->hba_id); 564 /* 565 * Update LUN maps for dynamically added initiators when 566 * generate_node_acl is enabled. 567 */ 568 if (tpg->se_tpg_tfo->tpg_check_demo_mode(tpg)) { 569 struct se_node_acl *acl; 570 571 mutex_lock(&tpg->acl_node_mutex); 572 list_for_each_entry(acl, &tpg->acl_node_list, acl_list) { 573 if (acl->dynamic_node_acl && 574 (!tpg->se_tpg_tfo->tpg_check_demo_mode_login_only || 575 !tpg->se_tpg_tfo->tpg_check_demo_mode_login_only(tpg))) { 576 core_tpg_add_node_to_devs(acl, tpg, lun); 577 } 578 } 579 mutex_unlock(&tpg->acl_node_mutex); 580 } 581 582 return 0; 583 } 584 585 /* core_dev_del_lun(): 586 * 587 * 588 */ 589 void core_dev_del_lun( 590 struct se_portal_group *tpg, 591 struct se_lun *lun) 592 { 593 pr_debug("%s_TPG[%u]_LUN[%llu] - Deactivating %s Logical Unit from" 594 " device object\n", tpg->se_tpg_tfo->fabric_name, 595 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun, 596 tpg->se_tpg_tfo->fabric_name); 597 598 core_tpg_remove_lun(tpg, lun); 599 } 600 601 struct se_lun_acl *core_dev_init_initiator_node_lun_acl( 602 struct se_portal_group *tpg, 603 struct se_node_acl *nacl, 604 u64 mapped_lun, 605 int *ret) 606 { 607 struct se_lun_acl *lacl; 608 609 if (strlen(nacl->initiatorname) >= TRANSPORT_IQN_LEN) { 610 pr_err("%s InitiatorName exceeds maximum size.\n", 611 tpg->se_tpg_tfo->fabric_name); 612 *ret = -EOVERFLOW; 613 return NULL; 614 } 615 lacl = kzalloc(sizeof(struct se_lun_acl), GFP_KERNEL); 616 if (!lacl) { 617 pr_err("Unable to allocate memory for struct se_lun_acl.\n"); 618 *ret = -ENOMEM; 619 return NULL; 620 } 621 622 lacl->mapped_lun = mapped_lun; 623 lacl->se_lun_nacl = nacl; 624 625 return lacl; 626 } 627 628 int core_dev_add_initiator_node_lun_acl( 629 struct se_portal_group *tpg, 630 struct se_lun_acl *lacl, 631 struct se_lun *lun, 632 bool lun_access_ro) 633 { 634 struct se_node_acl *nacl = lacl->se_lun_nacl; 635 /* 636 * rcu_dereference_raw protected by se_lun->lun_group symlink 637 * reference to se_device->dev_group. 638 */ 639 struct se_device *dev = rcu_dereference_raw(lun->lun_se_dev); 640 641 if (!nacl) 642 return -EINVAL; 643 644 if (lun->lun_access_ro) 645 lun_access_ro = true; 646 647 lacl->se_lun = lun; 648 649 if (core_enable_device_list_for_node(lun, lacl, lacl->mapped_lun, 650 lun_access_ro, nacl, tpg) < 0) 651 return -EINVAL; 652 653 pr_debug("%s_TPG[%hu]_LUN[%llu->%llu] - Added %s ACL for " 654 " InitiatorNode: %s\n", tpg->se_tpg_tfo->fabric_name, 655 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun, lacl->mapped_lun, 656 lun_access_ro ? "RO" : "RW", 657 nacl->initiatorname); 658 /* 659 * Check to see if there are any existing persistent reservation APTPL 660 * pre-registrations that need to be enabled for this LUN ACL.. 661 */ 662 core_scsi3_check_aptpl_registration(dev, tpg, lun, nacl, 663 lacl->mapped_lun); 664 return 0; 665 } 666 667 int core_dev_del_initiator_node_lun_acl( 668 struct se_lun *lun, 669 struct se_lun_acl *lacl) 670 { 671 struct se_portal_group *tpg = lun->lun_tpg; 672 struct se_node_acl *nacl; 673 struct se_dev_entry *deve; 674 675 nacl = lacl->se_lun_nacl; 676 if (!nacl) 677 return -EINVAL; 678 679 mutex_lock(&nacl->lun_entry_mutex); 680 deve = target_nacl_find_deve(nacl, lacl->mapped_lun); 681 if (deve) 682 core_disable_device_list_for_node(lun, deve, nacl, tpg); 683 mutex_unlock(&nacl->lun_entry_mutex); 684 685 pr_debug("%s_TPG[%hu]_LUN[%llu] - Removed ACL for" 686 " InitiatorNode: %s Mapped LUN: %llu\n", 687 tpg->se_tpg_tfo->fabric_name, 688 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun, 689 nacl->initiatorname, lacl->mapped_lun); 690 691 return 0; 692 } 693 694 void core_dev_free_initiator_node_lun_acl( 695 struct se_portal_group *tpg, 696 struct se_lun_acl *lacl) 697 { 698 pr_debug("%s_TPG[%hu] - Freeing ACL for %s InitiatorNode: %s" 699 " Mapped LUN: %llu\n", tpg->se_tpg_tfo->fabric_name, 700 tpg->se_tpg_tfo->tpg_get_tag(tpg), 701 tpg->se_tpg_tfo->fabric_name, 702 lacl->se_lun_nacl->initiatorname, lacl->mapped_lun); 703 704 kfree(lacl); 705 } 706 707 static void scsi_dump_inquiry(struct se_device *dev) 708 { 709 struct t10_wwn *wwn = &dev->t10_wwn; 710 int device_type = dev->transport->get_device_type(dev); 711 712 /* 713 * Print Linux/SCSI style INQUIRY formatting to the kernel ring buffer 714 */ 715 pr_debug(" Vendor: %-" __stringify(INQUIRY_VENDOR_LEN) "s\n", 716 wwn->vendor); 717 pr_debug(" Model: %-" __stringify(INQUIRY_MODEL_LEN) "s\n", 718 wwn->model); 719 pr_debug(" Revision: %-" __stringify(INQUIRY_REVISION_LEN) "s\n", 720 wwn->revision); 721 pr_debug(" Type: %s ", scsi_device_type(device_type)); 722 } 723 724 struct se_device *target_alloc_device(struct se_hba *hba, const char *name) 725 { 726 struct se_device *dev; 727 struct se_lun *xcopy_lun; 728 729 dev = hba->backend->ops->alloc_device(hba, name); 730 if (!dev) 731 return NULL; 732 733 dev->se_hba = hba; 734 dev->transport = hba->backend->ops; 735 dev->transport_flags = dev->transport->transport_flags_default; 736 dev->prot_length = sizeof(struct t10_pi_tuple); 737 dev->hba_index = hba->hba_index; 738 739 INIT_LIST_HEAD(&dev->dev_sep_list); 740 INIT_LIST_HEAD(&dev->dev_tmr_list); 741 INIT_LIST_HEAD(&dev->delayed_cmd_list); 742 INIT_LIST_HEAD(&dev->state_list); 743 INIT_LIST_HEAD(&dev->qf_cmd_list); 744 spin_lock_init(&dev->execute_task_lock); 745 spin_lock_init(&dev->delayed_cmd_lock); 746 spin_lock_init(&dev->dev_reservation_lock); 747 spin_lock_init(&dev->se_port_lock); 748 spin_lock_init(&dev->se_tmr_lock); 749 spin_lock_init(&dev->qf_cmd_lock); 750 sema_init(&dev->caw_sem, 1); 751 INIT_LIST_HEAD(&dev->t10_wwn.t10_vpd_list); 752 spin_lock_init(&dev->t10_wwn.t10_vpd_lock); 753 INIT_LIST_HEAD(&dev->t10_pr.registration_list); 754 INIT_LIST_HEAD(&dev->t10_pr.aptpl_reg_list); 755 spin_lock_init(&dev->t10_pr.registration_lock); 756 spin_lock_init(&dev->t10_pr.aptpl_reg_lock); 757 INIT_LIST_HEAD(&dev->t10_alua.tg_pt_gps_list); 758 spin_lock_init(&dev->t10_alua.tg_pt_gps_lock); 759 INIT_LIST_HEAD(&dev->t10_alua.lba_map_list); 760 spin_lock_init(&dev->t10_alua.lba_map_lock); 761 762 dev->t10_wwn.t10_dev = dev; 763 dev->t10_alua.t10_dev = dev; 764 765 dev->dev_attrib.da_dev = dev; 766 dev->dev_attrib.emulate_model_alias = DA_EMULATE_MODEL_ALIAS; 767 dev->dev_attrib.emulate_dpo = 1; 768 dev->dev_attrib.emulate_fua_write = 1; 769 dev->dev_attrib.emulate_fua_read = 1; 770 dev->dev_attrib.emulate_write_cache = DA_EMULATE_WRITE_CACHE; 771 dev->dev_attrib.emulate_ua_intlck_ctrl = TARGET_UA_INTLCK_CTRL_CLEAR; 772 dev->dev_attrib.emulate_tas = DA_EMULATE_TAS; 773 dev->dev_attrib.emulate_tpu = DA_EMULATE_TPU; 774 dev->dev_attrib.emulate_tpws = DA_EMULATE_TPWS; 775 dev->dev_attrib.emulate_caw = DA_EMULATE_CAW; 776 dev->dev_attrib.emulate_3pc = DA_EMULATE_3PC; 777 dev->dev_attrib.emulate_pr = DA_EMULATE_PR; 778 dev->dev_attrib.pi_prot_type = TARGET_DIF_TYPE0_PROT; 779 dev->dev_attrib.enforce_pr_isids = DA_ENFORCE_PR_ISIDS; 780 dev->dev_attrib.force_pr_aptpl = DA_FORCE_PR_APTPL; 781 dev->dev_attrib.is_nonrot = DA_IS_NONROT; 782 dev->dev_attrib.emulate_rest_reord = DA_EMULATE_REST_REORD; 783 dev->dev_attrib.max_unmap_lba_count = DA_MAX_UNMAP_LBA_COUNT; 784 dev->dev_attrib.max_unmap_block_desc_count = 785 DA_MAX_UNMAP_BLOCK_DESC_COUNT; 786 dev->dev_attrib.unmap_granularity = DA_UNMAP_GRANULARITY_DEFAULT; 787 dev->dev_attrib.unmap_granularity_alignment = 788 DA_UNMAP_GRANULARITY_ALIGNMENT_DEFAULT; 789 dev->dev_attrib.unmap_zeroes_data = 790 DA_UNMAP_ZEROES_DATA_DEFAULT; 791 dev->dev_attrib.max_write_same_len = DA_MAX_WRITE_SAME_LEN; 792 793 xcopy_lun = &dev->xcopy_lun; 794 rcu_assign_pointer(xcopy_lun->lun_se_dev, dev); 795 init_completion(&xcopy_lun->lun_shutdown_comp); 796 INIT_LIST_HEAD(&xcopy_lun->lun_deve_list); 797 INIT_LIST_HEAD(&xcopy_lun->lun_dev_link); 798 mutex_init(&xcopy_lun->lun_tg_pt_md_mutex); 799 xcopy_lun->lun_tpg = &xcopy_pt_tpg; 800 801 /* Preload the default INQUIRY const values */ 802 strlcpy(dev->t10_wwn.vendor, "LIO-ORG", sizeof(dev->t10_wwn.vendor)); 803 strlcpy(dev->t10_wwn.model, dev->transport->inquiry_prod, 804 sizeof(dev->t10_wwn.model)); 805 strlcpy(dev->t10_wwn.revision, dev->transport->inquiry_rev, 806 sizeof(dev->t10_wwn.revision)); 807 808 return dev; 809 } 810 811 /* 812 * Check if the underlying struct block_device request_queue supports 813 * the QUEUE_FLAG_DISCARD bit for UNMAP/WRITE_SAME in SCSI + TRIM 814 * in ATA and we need to set TPE=1 815 */ 816 bool target_configure_unmap_from_queue(struct se_dev_attrib *attrib, 817 struct request_queue *q) 818 { 819 int block_size = queue_logical_block_size(q); 820 821 if (!blk_queue_discard(q)) 822 return false; 823 824 attrib->max_unmap_lba_count = 825 q->limits.max_discard_sectors >> (ilog2(block_size) - 9); 826 /* 827 * Currently hardcoded to 1 in Linux/SCSI code.. 828 */ 829 attrib->max_unmap_block_desc_count = 1; 830 attrib->unmap_granularity = q->limits.discard_granularity / block_size; 831 attrib->unmap_granularity_alignment = q->limits.discard_alignment / 832 block_size; 833 attrib->unmap_zeroes_data = !!(q->limits.max_write_zeroes_sectors); 834 return true; 835 } 836 EXPORT_SYMBOL(target_configure_unmap_from_queue); 837 838 /* 839 * Convert from blocksize advertised to the initiator to the 512 byte 840 * units unconditionally used by the Linux block layer. 841 */ 842 sector_t target_to_linux_sector(struct se_device *dev, sector_t lb) 843 { 844 switch (dev->dev_attrib.block_size) { 845 case 4096: 846 return lb << 3; 847 case 2048: 848 return lb << 2; 849 case 1024: 850 return lb << 1; 851 default: 852 return lb; 853 } 854 } 855 EXPORT_SYMBOL(target_to_linux_sector); 856 857 struct devices_idr_iter { 858 struct config_item *prev_item; 859 int (*fn)(struct se_device *dev, void *data); 860 void *data; 861 }; 862 863 static int target_devices_idr_iter(int id, void *p, void *data) 864 __must_hold(&device_mutex) 865 { 866 struct devices_idr_iter *iter = data; 867 struct se_device *dev = p; 868 int ret; 869 870 config_item_put(iter->prev_item); 871 iter->prev_item = NULL; 872 873 /* 874 * We add the device early to the idr, so it can be used 875 * by backend modules during configuration. We do not want 876 * to allow other callers to access partially setup devices, 877 * so we skip them here. 878 */ 879 if (!target_dev_configured(dev)) 880 return 0; 881 882 iter->prev_item = config_item_get_unless_zero(&dev->dev_group.cg_item); 883 if (!iter->prev_item) 884 return 0; 885 mutex_unlock(&device_mutex); 886 887 ret = iter->fn(dev, iter->data); 888 889 mutex_lock(&device_mutex); 890 return ret; 891 } 892 893 /** 894 * target_for_each_device - iterate over configured devices 895 * @fn: iterator function 896 * @data: pointer to data that will be passed to fn 897 * 898 * fn must return 0 to continue looping over devices. non-zero will break 899 * from the loop and return that value to the caller. 900 */ 901 int target_for_each_device(int (*fn)(struct se_device *dev, void *data), 902 void *data) 903 { 904 struct devices_idr_iter iter = { .fn = fn, .data = data }; 905 int ret; 906 907 mutex_lock(&device_mutex); 908 ret = idr_for_each(&devices_idr, target_devices_idr_iter, &iter); 909 mutex_unlock(&device_mutex); 910 config_item_put(iter.prev_item); 911 return ret; 912 } 913 914 int target_configure_device(struct se_device *dev) 915 { 916 struct se_hba *hba = dev->se_hba; 917 int ret, id; 918 919 if (target_dev_configured(dev)) { 920 pr_err("se_dev->se_dev_ptr already set for storage" 921 " object\n"); 922 return -EEXIST; 923 } 924 925 /* 926 * Add early so modules like tcmu can use during its 927 * configuration. 928 */ 929 mutex_lock(&device_mutex); 930 /* 931 * Use cyclic to try and avoid collisions with devices 932 * that were recently removed. 933 */ 934 id = idr_alloc_cyclic(&devices_idr, dev, 0, INT_MAX, GFP_KERNEL); 935 mutex_unlock(&device_mutex); 936 if (id < 0) { 937 ret = -ENOMEM; 938 goto out; 939 } 940 dev->dev_index = id; 941 942 ret = dev->transport->configure_device(dev); 943 if (ret) 944 goto out_free_index; 945 /* 946 * XXX: there is not much point to have two different values here.. 947 */ 948 dev->dev_attrib.block_size = dev->dev_attrib.hw_block_size; 949 dev->dev_attrib.queue_depth = dev->dev_attrib.hw_queue_depth; 950 951 /* 952 * Align max_hw_sectors down to PAGE_SIZE I/O transfers 953 */ 954 dev->dev_attrib.hw_max_sectors = 955 se_dev_align_max_sectors(dev->dev_attrib.hw_max_sectors, 956 dev->dev_attrib.hw_block_size); 957 dev->dev_attrib.optimal_sectors = dev->dev_attrib.hw_max_sectors; 958 959 dev->creation_time = get_jiffies_64(); 960 961 ret = core_setup_alua(dev); 962 if (ret) 963 goto out_destroy_device; 964 965 /* 966 * Setup work_queue for QUEUE_FULL 967 */ 968 INIT_WORK(&dev->qf_work_queue, target_qf_do_work); 969 970 scsi_dump_inquiry(dev); 971 972 spin_lock(&hba->device_lock); 973 hba->dev_count++; 974 spin_unlock(&hba->device_lock); 975 976 dev->dev_flags |= DF_CONFIGURED; 977 978 return 0; 979 980 out_destroy_device: 981 dev->transport->destroy_device(dev); 982 out_free_index: 983 mutex_lock(&device_mutex); 984 idr_remove(&devices_idr, dev->dev_index); 985 mutex_unlock(&device_mutex); 986 out: 987 se_release_vpd_for_dev(dev); 988 return ret; 989 } 990 991 void target_free_device(struct se_device *dev) 992 { 993 struct se_hba *hba = dev->se_hba; 994 995 WARN_ON(!list_empty(&dev->dev_sep_list)); 996 997 if (target_dev_configured(dev)) { 998 dev->transport->destroy_device(dev); 999 1000 mutex_lock(&device_mutex); 1001 idr_remove(&devices_idr, dev->dev_index); 1002 mutex_unlock(&device_mutex); 1003 1004 spin_lock(&hba->device_lock); 1005 hba->dev_count--; 1006 spin_unlock(&hba->device_lock); 1007 } 1008 1009 core_alua_free_lu_gp_mem(dev); 1010 core_alua_set_lba_map(dev, NULL, 0, 0); 1011 core_scsi3_free_all_registrations(dev); 1012 se_release_vpd_for_dev(dev); 1013 1014 if (dev->transport->free_prot) 1015 dev->transport->free_prot(dev); 1016 1017 dev->transport->free_device(dev); 1018 } 1019 1020 int core_dev_setup_virtual_lun0(void) 1021 { 1022 struct se_hba *hba; 1023 struct se_device *dev; 1024 char buf[] = "rd_pages=8,rd_nullio=1"; 1025 int ret; 1026 1027 hba = core_alloc_hba("rd_mcp", 0, HBA_FLAGS_INTERNAL_USE); 1028 if (IS_ERR(hba)) 1029 return PTR_ERR(hba); 1030 1031 dev = target_alloc_device(hba, "virt_lun0"); 1032 if (!dev) { 1033 ret = -ENOMEM; 1034 goto out_free_hba; 1035 } 1036 1037 hba->backend->ops->set_configfs_dev_params(dev, buf, sizeof(buf)); 1038 1039 ret = target_configure_device(dev); 1040 if (ret) 1041 goto out_free_se_dev; 1042 1043 lun0_hba = hba; 1044 g_lun0_dev = dev; 1045 return 0; 1046 1047 out_free_se_dev: 1048 target_free_device(dev); 1049 out_free_hba: 1050 core_delete_hba(hba); 1051 return ret; 1052 } 1053 1054 1055 void core_dev_release_virtual_lun0(void) 1056 { 1057 struct se_hba *hba = lun0_hba; 1058 1059 if (!hba) 1060 return; 1061 1062 if (g_lun0_dev) 1063 target_free_device(g_lun0_dev); 1064 core_delete_hba(hba); 1065 } 1066 1067 /* 1068 * Common CDB parsing for kernel and user passthrough. 1069 */ 1070 sense_reason_t 1071 passthrough_parse_cdb(struct se_cmd *cmd, 1072 sense_reason_t (*exec_cmd)(struct se_cmd *cmd)) 1073 { 1074 unsigned char *cdb = cmd->t_task_cdb; 1075 struct se_device *dev = cmd->se_dev; 1076 unsigned int size; 1077 1078 /* 1079 * For REPORT LUNS we always need to emulate the response, for everything 1080 * else, pass it up. 1081 */ 1082 if (cdb[0] == REPORT_LUNS) { 1083 cmd->execute_cmd = spc_emulate_report_luns; 1084 return TCM_NO_SENSE; 1085 } 1086 1087 /* 1088 * With emulate_pr disabled, all reservation requests should fail, 1089 * regardless of whether or not TRANSPORT_FLAG_PASSTHROUGH_PGR is set. 1090 */ 1091 if (!dev->dev_attrib.emulate_pr && 1092 ((cdb[0] == PERSISTENT_RESERVE_IN) || 1093 (cdb[0] == PERSISTENT_RESERVE_OUT) || 1094 (cdb[0] == RELEASE || cdb[0] == RELEASE_10) || 1095 (cdb[0] == RESERVE || cdb[0] == RESERVE_10))) { 1096 return TCM_UNSUPPORTED_SCSI_OPCODE; 1097 } 1098 1099 /* 1100 * For PERSISTENT RESERVE IN/OUT, RELEASE, and RESERVE we need to 1101 * emulate the response, since tcmu does not have the information 1102 * required to process these commands. 1103 */ 1104 if (!(dev->transport_flags & 1105 TRANSPORT_FLAG_PASSTHROUGH_PGR)) { 1106 if (cdb[0] == PERSISTENT_RESERVE_IN) { 1107 cmd->execute_cmd = target_scsi3_emulate_pr_in; 1108 size = get_unaligned_be16(&cdb[7]); 1109 return target_cmd_size_check(cmd, size); 1110 } 1111 if (cdb[0] == PERSISTENT_RESERVE_OUT) { 1112 cmd->execute_cmd = target_scsi3_emulate_pr_out; 1113 size = get_unaligned_be32(&cdb[5]); 1114 return target_cmd_size_check(cmd, size); 1115 } 1116 1117 if (cdb[0] == RELEASE || cdb[0] == RELEASE_10) { 1118 cmd->execute_cmd = target_scsi2_reservation_release; 1119 if (cdb[0] == RELEASE_10) 1120 size = get_unaligned_be16(&cdb[7]); 1121 else 1122 size = cmd->data_length; 1123 return target_cmd_size_check(cmd, size); 1124 } 1125 if (cdb[0] == RESERVE || cdb[0] == RESERVE_10) { 1126 cmd->execute_cmd = target_scsi2_reservation_reserve; 1127 if (cdb[0] == RESERVE_10) 1128 size = get_unaligned_be16(&cdb[7]); 1129 else 1130 size = cmd->data_length; 1131 return target_cmd_size_check(cmd, size); 1132 } 1133 } 1134 1135 /* Set DATA_CDB flag for ops that should have it */ 1136 switch (cdb[0]) { 1137 case READ_6: 1138 case READ_10: 1139 case READ_12: 1140 case READ_16: 1141 case WRITE_6: 1142 case WRITE_10: 1143 case WRITE_12: 1144 case WRITE_16: 1145 case WRITE_VERIFY: 1146 case WRITE_VERIFY_12: 1147 case WRITE_VERIFY_16: 1148 case COMPARE_AND_WRITE: 1149 case XDWRITEREAD_10: 1150 cmd->se_cmd_flags |= SCF_SCSI_DATA_CDB; 1151 break; 1152 case VARIABLE_LENGTH_CMD: 1153 switch (get_unaligned_be16(&cdb[8])) { 1154 case READ_32: 1155 case WRITE_32: 1156 case WRITE_VERIFY_32: 1157 case XDWRITEREAD_32: 1158 cmd->se_cmd_flags |= SCF_SCSI_DATA_CDB; 1159 break; 1160 } 1161 } 1162 1163 cmd->execute_cmd = exec_cmd; 1164 1165 return TCM_NO_SENSE; 1166 } 1167 EXPORT_SYMBOL(passthrough_parse_cdb); 1168