xref: /openbmc/linux/drivers/target/tcm_fc/tfc_sess.c (revision 20e2fc42)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (c) 2010 Cisco Systems, Inc.
4  */
5 
6 /* XXX TBD some includes may be extraneous */
7 
8 #include <linux/module.h>
9 #include <linux/moduleparam.h>
10 #include <linux/utsname.h>
11 #include <linux/init.h>
12 #include <linux/slab.h>
13 #include <linux/kthread.h>
14 #include <linux/types.h>
15 #include <linux/string.h>
16 #include <linux/configfs.h>
17 #include <linux/ctype.h>
18 #include <linux/hash.h>
19 #include <linux/rcupdate.h>
20 #include <linux/rculist.h>
21 #include <linux/kref.h>
22 #include <asm/unaligned.h>
23 #include <scsi/libfc.h>
24 
25 #include <target/target_core_base.h>
26 #include <target/target_core_fabric.h>
27 
28 #include "tcm_fc.h"
29 
30 #define TFC_SESS_DBG(lport, fmt, args...) \
31 	pr_debug("host%u: rport %6.6x: " fmt,	   \
32 		 (lport)->host->host_no,	   \
33 		 (lport)->port_id, ##args )
34 
35 static void ft_sess_delete_all(struct ft_tport *);
36 
37 /*
38  * Lookup or allocate target local port.
39  * Caller holds ft_lport_lock.
40  */
41 static struct ft_tport *ft_tport_get(struct fc_lport *lport)
42 {
43 	struct ft_tpg *tpg;
44 	struct ft_tport *tport;
45 	int i;
46 
47 	tport = rcu_dereference_protected(lport->prov[FC_TYPE_FCP],
48 					  lockdep_is_held(&ft_lport_lock));
49 	if (tport && tport->tpg)
50 		return tport;
51 
52 	tpg = ft_lport_find_tpg(lport);
53 	if (!tpg)
54 		return NULL;
55 
56 	if (tport) {
57 		tport->tpg = tpg;
58 		tpg->tport = tport;
59 		return tport;
60 	}
61 
62 	tport = kzalloc(sizeof(*tport), GFP_KERNEL);
63 	if (!tport)
64 		return NULL;
65 
66 	tport->lport = lport;
67 	tport->tpg = tpg;
68 	tpg->tport = tport;
69 	for (i = 0; i < FT_SESS_HASH_SIZE; i++)
70 		INIT_HLIST_HEAD(&tport->hash[i]);
71 
72 	rcu_assign_pointer(lport->prov[FC_TYPE_FCP], tport);
73 	return tport;
74 }
75 
76 /*
77  * Delete a target local port.
78  * Caller holds ft_lport_lock.
79  */
80 static void ft_tport_delete(struct ft_tport *tport)
81 {
82 	struct fc_lport *lport;
83 	struct ft_tpg *tpg;
84 
85 	ft_sess_delete_all(tport);
86 	lport = tport->lport;
87 	lport->service_params &= ~FCP_SPPF_TARG_FCN;
88 	BUG_ON(tport != lport->prov[FC_TYPE_FCP]);
89 	RCU_INIT_POINTER(lport->prov[FC_TYPE_FCP], NULL);
90 
91 	tpg = tport->tpg;
92 	if (tpg) {
93 		tpg->tport = NULL;
94 		tport->tpg = NULL;
95 	}
96 	kfree_rcu(tport, rcu);
97 }
98 
99 /*
100  * Add local port.
101  * Called thru fc_lport_iterate().
102  */
103 void ft_lport_add(struct fc_lport *lport, void *arg)
104 {
105 	mutex_lock(&ft_lport_lock);
106 	ft_tport_get(lport);
107 	lport->service_params |= FCP_SPPF_TARG_FCN;
108 	mutex_unlock(&ft_lport_lock);
109 }
110 
111 /*
112  * Delete local port.
113  * Called thru fc_lport_iterate().
114  */
115 void ft_lport_del(struct fc_lport *lport, void *arg)
116 {
117 	struct ft_tport *tport;
118 
119 	mutex_lock(&ft_lport_lock);
120 	tport = lport->prov[FC_TYPE_FCP];
121 	if (tport)
122 		ft_tport_delete(tport);
123 	mutex_unlock(&ft_lport_lock);
124 }
125 
126 /*
127  * Notification of local port change from libfc.
128  * Create or delete local port and associated tport.
129  */
130 int ft_lport_notify(struct notifier_block *nb, unsigned long event, void *arg)
131 {
132 	struct fc_lport *lport = arg;
133 
134 	switch (event) {
135 	case FC_LPORT_EV_ADD:
136 		ft_lport_add(lport, NULL);
137 		break;
138 	case FC_LPORT_EV_DEL:
139 		ft_lport_del(lport, NULL);
140 		break;
141 	}
142 	return NOTIFY_DONE;
143 }
144 
145 /*
146  * Hash function for FC_IDs.
147  */
148 static u32 ft_sess_hash(u32 port_id)
149 {
150 	return hash_32(port_id, FT_SESS_HASH_BITS);
151 }
152 
153 /*
154  * Find session in local port.
155  * Sessions and hash lists are RCU-protected.
156  * A reference is taken which must be eventually freed.
157  */
158 static struct ft_sess *ft_sess_get(struct fc_lport *lport, u32 port_id)
159 {
160 	struct ft_tport *tport;
161 	struct hlist_head *head;
162 	struct ft_sess *sess;
163 	char *reason = "no session created";
164 
165 	rcu_read_lock();
166 	tport = rcu_dereference(lport->prov[FC_TYPE_FCP]);
167 	if (!tport) {
168 		reason = "not an FCP port";
169 		goto out;
170 	}
171 
172 	head = &tport->hash[ft_sess_hash(port_id)];
173 	hlist_for_each_entry_rcu(sess, head, hash) {
174 		if (sess->port_id == port_id) {
175 			kref_get(&sess->kref);
176 			rcu_read_unlock();
177 			TFC_SESS_DBG(lport, "port_id %x found %p\n",
178 				     port_id, sess);
179 			return sess;
180 		}
181 	}
182 out:
183 	rcu_read_unlock();
184 	TFC_SESS_DBG(lport, "port_id %x not found, %s\n",
185 		     port_id, reason);
186 	return NULL;
187 }
188 
189 static int ft_sess_alloc_cb(struct se_portal_group *se_tpg,
190 			    struct se_session *se_sess, void *p)
191 {
192 	struct ft_sess *sess = p;
193 	struct ft_tport *tport = sess->tport;
194 	struct hlist_head *head = &tport->hash[ft_sess_hash(sess->port_id)];
195 
196 	TFC_SESS_DBG(tport->lport, "port_id %x sess %p\n", sess->port_id, sess);
197 	hlist_add_head_rcu(&sess->hash, head);
198 	tport->sess_count++;
199 
200 	return 0;
201 }
202 
203 /*
204  * Allocate session and enter it in the hash for the local port.
205  * Caller holds ft_lport_lock.
206  */
207 static struct ft_sess *ft_sess_create(struct ft_tport *tport, u32 port_id,
208 				      struct fc_rport_priv *rdata)
209 {
210 	struct se_portal_group *se_tpg = &tport->tpg->se_tpg;
211 	struct ft_sess *sess;
212 	struct hlist_head *head;
213 	unsigned char initiatorname[TRANSPORT_IQN_LEN];
214 
215 	ft_format_wwn(&initiatorname[0], TRANSPORT_IQN_LEN, rdata->ids.port_name);
216 
217 	head = &tport->hash[ft_sess_hash(port_id)];
218 	hlist_for_each_entry_rcu(sess, head, hash)
219 		if (sess->port_id == port_id)
220 			return sess;
221 
222 	sess = kzalloc(sizeof(*sess), GFP_KERNEL);
223 	if (!sess)
224 		return ERR_PTR(-ENOMEM);
225 
226 	kref_init(&sess->kref); /* ref for table entry */
227 	sess->tport = tport;
228 	sess->port_id = port_id;
229 
230 	sess->se_sess = target_setup_session(se_tpg, TCM_FC_DEFAULT_TAGS,
231 					     sizeof(struct ft_cmd),
232 					     TARGET_PROT_NORMAL, &initiatorname[0],
233 					     sess, ft_sess_alloc_cb);
234 	if (IS_ERR(sess->se_sess)) {
235 		int rc = PTR_ERR(sess->se_sess);
236 		kfree(sess);
237 		sess = ERR_PTR(rc);
238 	}
239 	return sess;
240 }
241 
242 /*
243  * Unhash the session.
244  * Caller holds ft_lport_lock.
245  */
246 static void ft_sess_unhash(struct ft_sess *sess)
247 {
248 	struct ft_tport *tport = sess->tport;
249 
250 	hlist_del_rcu(&sess->hash);
251 	BUG_ON(!tport->sess_count);
252 	tport->sess_count--;
253 	sess->port_id = -1;
254 	sess->params = 0;
255 }
256 
257 /*
258  * Delete session from hash.
259  * Caller holds ft_lport_lock.
260  */
261 static struct ft_sess *ft_sess_delete(struct ft_tport *tport, u32 port_id)
262 {
263 	struct hlist_head *head;
264 	struct ft_sess *sess;
265 
266 	head = &tport->hash[ft_sess_hash(port_id)];
267 	hlist_for_each_entry_rcu(sess, head, hash) {
268 		if (sess->port_id == port_id) {
269 			ft_sess_unhash(sess);
270 			return sess;
271 		}
272 	}
273 	return NULL;
274 }
275 
276 static void ft_close_sess(struct ft_sess *sess)
277 {
278 	target_sess_cmd_list_set_waiting(sess->se_sess);
279 	target_wait_for_sess_cmds(sess->se_sess);
280 	ft_sess_put(sess);
281 }
282 
283 /*
284  * Delete all sessions from tport.
285  * Caller holds ft_lport_lock.
286  */
287 static void ft_sess_delete_all(struct ft_tport *tport)
288 {
289 	struct hlist_head *head;
290 	struct ft_sess *sess;
291 
292 	for (head = tport->hash;
293 	     head < &tport->hash[FT_SESS_HASH_SIZE]; head++) {
294 		hlist_for_each_entry_rcu(sess, head, hash) {
295 			ft_sess_unhash(sess);
296 			ft_close_sess(sess);	/* release from table */
297 		}
298 	}
299 }
300 
301 /*
302  * TCM ops for sessions.
303  */
304 
305 /*
306  * Remove session and send PRLO.
307  * This is called when the ACL is being deleted or queue depth is changing.
308  */
309 void ft_sess_close(struct se_session *se_sess)
310 {
311 	struct ft_sess *sess = se_sess->fabric_sess_ptr;
312 	u32 port_id;
313 
314 	mutex_lock(&ft_lport_lock);
315 	port_id = sess->port_id;
316 	if (port_id == -1) {
317 		mutex_unlock(&ft_lport_lock);
318 		return;
319 	}
320 	TFC_SESS_DBG(sess->tport->lport, "port_id %x close session\n", port_id);
321 	ft_sess_unhash(sess);
322 	mutex_unlock(&ft_lport_lock);
323 	ft_close_sess(sess);
324 	/* XXX Send LOGO or PRLO */
325 	synchronize_rcu();		/* let transport deregister happen */
326 }
327 
328 u32 ft_sess_get_index(struct se_session *se_sess)
329 {
330 	struct ft_sess *sess = se_sess->fabric_sess_ptr;
331 
332 	return sess->port_id;	/* XXX TBD probably not what is needed */
333 }
334 
335 u32 ft_sess_get_port_name(struct se_session *se_sess,
336 			  unsigned char *buf, u32 len)
337 {
338 	struct ft_sess *sess = se_sess->fabric_sess_ptr;
339 
340 	return ft_format_wwn(buf, len, sess->port_name);
341 }
342 
343 /*
344  * libfc ops involving sessions.
345  */
346 
347 static int ft_prli_locked(struct fc_rport_priv *rdata, u32 spp_len,
348 			  const struct fc_els_spp *rspp, struct fc_els_spp *spp)
349 {
350 	struct ft_tport *tport;
351 	struct ft_sess *sess;
352 	u32 fcp_parm;
353 
354 	tport = ft_tport_get(rdata->local_port);
355 	if (!tport)
356 		goto not_target;	/* not a target for this local port */
357 
358 	if (!rspp)
359 		goto fill;
360 
361 	if (rspp->spp_flags & (FC_SPP_OPA_VAL | FC_SPP_RPA_VAL))
362 		return FC_SPP_RESP_NO_PA;
363 
364 	/*
365 	 * If both target and initiator bits are off, the SPP is invalid.
366 	 */
367 	fcp_parm = ntohl(rspp->spp_params);
368 	if (!(fcp_parm & (FCP_SPPF_INIT_FCN | FCP_SPPF_TARG_FCN)))
369 		return FC_SPP_RESP_INVL;
370 
371 	/*
372 	 * Create session (image pair) only if requested by
373 	 * EST_IMG_PAIR flag and if the requestor is an initiator.
374 	 */
375 	if (rspp->spp_flags & FC_SPP_EST_IMG_PAIR) {
376 		spp->spp_flags |= FC_SPP_EST_IMG_PAIR;
377 		if (!(fcp_parm & FCP_SPPF_INIT_FCN))
378 			return FC_SPP_RESP_CONF;
379 		sess = ft_sess_create(tport, rdata->ids.port_id, rdata);
380 		if (IS_ERR(sess)) {
381 			if (PTR_ERR(sess) == -EACCES) {
382 				spp->spp_flags &= ~FC_SPP_EST_IMG_PAIR;
383 				return FC_SPP_RESP_CONF;
384 			} else
385 				return FC_SPP_RESP_RES;
386 		}
387 		if (!sess->params)
388 			rdata->prli_count++;
389 		sess->params = fcp_parm;
390 		sess->port_name = rdata->ids.port_name;
391 		sess->max_frame = rdata->maxframe_size;
392 
393 		/* XXX TBD - clearing actions.  unit attn, see 4.10 */
394 	}
395 
396 	/*
397 	 * OR in our service parameters with other provider (initiator), if any.
398 	 */
399 fill:
400 	fcp_parm = ntohl(spp->spp_params);
401 	fcp_parm &= ~FCP_SPPF_RETRY;
402 	spp->spp_params = htonl(fcp_parm | FCP_SPPF_TARG_FCN);
403 	return FC_SPP_RESP_ACK;
404 
405 not_target:
406 	fcp_parm = ntohl(spp->spp_params);
407 	fcp_parm &= ~FCP_SPPF_TARG_FCN;
408 	spp->spp_params = htonl(fcp_parm);
409 	return 0;
410 }
411 
412 /**
413  * tcm_fcp_prli() - Handle incoming or outgoing PRLI for the FCP target
414  * @rdata: remote port private
415  * @spp_len: service parameter page length
416  * @rspp: received service parameter page (NULL for outgoing PRLI)
417  * @spp: response service parameter page
418  *
419  * Returns spp response code.
420  */
421 static int ft_prli(struct fc_rport_priv *rdata, u32 spp_len,
422 		   const struct fc_els_spp *rspp, struct fc_els_spp *spp)
423 {
424 	int ret;
425 
426 	mutex_lock(&ft_lport_lock);
427 	ret = ft_prli_locked(rdata, spp_len, rspp, spp);
428 	mutex_unlock(&ft_lport_lock);
429 	TFC_SESS_DBG(rdata->local_port, "port_id %x flags %x ret %x\n",
430 		     rdata->ids.port_id, rspp ? rspp->spp_flags : 0, ret);
431 	return ret;
432 }
433 
434 static void ft_sess_free(struct kref *kref)
435 {
436 	struct ft_sess *sess = container_of(kref, struct ft_sess, kref);
437 
438 	target_remove_session(sess->se_sess);
439 	kfree_rcu(sess, rcu);
440 }
441 
442 void ft_sess_put(struct ft_sess *sess)
443 {
444 	int sess_held = kref_read(&sess->kref);
445 
446 	BUG_ON(!sess_held);
447 	kref_put(&sess->kref, ft_sess_free);
448 }
449 
450 static void ft_prlo(struct fc_rport_priv *rdata)
451 {
452 	struct ft_sess *sess;
453 	struct ft_tport *tport;
454 
455 	mutex_lock(&ft_lport_lock);
456 	tport = rcu_dereference_protected(rdata->local_port->prov[FC_TYPE_FCP],
457 					  lockdep_is_held(&ft_lport_lock));
458 
459 	if (!tport) {
460 		mutex_unlock(&ft_lport_lock);
461 		return;
462 	}
463 	sess = ft_sess_delete(tport, rdata->ids.port_id);
464 	if (!sess) {
465 		mutex_unlock(&ft_lport_lock);
466 		return;
467 	}
468 	mutex_unlock(&ft_lport_lock);
469 	ft_close_sess(sess);		/* release from table */
470 	rdata->prli_count--;
471 	/* XXX TBD - clearing actions.  unit attn, see 4.10 */
472 }
473 
474 /*
475  * Handle incoming FCP request.
476  * Caller has verified that the frame is type FCP.
477  */
478 static void ft_recv(struct fc_lport *lport, struct fc_frame *fp)
479 {
480 	struct ft_sess *sess;
481 	u32 sid = fc_frame_sid(fp);
482 
483 	TFC_SESS_DBG(lport, "recv sid %x\n", sid);
484 
485 	sess = ft_sess_get(lport, sid);
486 	if (!sess) {
487 		TFC_SESS_DBG(lport, "sid %x sess lookup failed\n", sid);
488 		/* TBD XXX - if FCP_CMND, send PRLO */
489 		fc_frame_free(fp);
490 		return;
491 	}
492 	ft_recv_req(sess, fp);	/* must do ft_sess_put() */
493 }
494 
495 /*
496  * Provider ops for libfc.
497  */
498 struct fc4_prov ft_prov = {
499 	.prli = ft_prli,
500 	.prlo = ft_prlo,
501 	.recv = ft_recv,
502 	.module = THIS_MODULE,
503 };
504