]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - drivers/target/target_core_device.c
scsi: cxlflash: Cleanup prints
[mirror_ubuntu-zesty-kernel.git] / drivers / target / target_core_device.c
CommitLineData
c66ac9db
NB
1/*******************************************************************************
2 * Filename: target_core_device.c (based on iscsi_target_device.c)
3 *
e3d6f909 4 * This file contains the TCM Virtual Device and Disk Transport
c66ac9db
NB
5 * agnostic related functions.
6 *
4c76251e 7 * (c) Copyright 2003-2013 Datera, Inc.
c66ac9db
NB
8 *
9 * Nicholas A. Bellinger <nab@kernel.org>
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
24 *
25 ******************************************************************************/
26
27#include <linux/net.h>
28#include <linux/string.h>
29#include <linux/delay.h>
30#include <linux/timer.h>
31#include <linux/slab.h>
32#include <linux/spinlock.h>
c66ac9db
NB
33#include <linux/kthread.h>
34#include <linux/in.h>
c53181af 35#include <linux/export.h>
8dcf07be 36#include <linux/t10-pi.h>
7bfea53b 37#include <asm/unaligned.h>
c66ac9db
NB
38#include <net/sock.h>
39#include <net/tcp.h>
ba929992
BVA
40#include <scsi/scsi_common.h>
41#include <scsi/scsi_proto.h>
c66ac9db
NB
42
43#include <target/target_core_base.h>
c4795fb2
CH
44#include <target/target_core_backend.h>
45#include <target/target_core_fabric.h>
c66ac9db 46
e26d99ae 47#include "target_core_internal.h"
c66ac9db 48#include "target_core_alua.h"
c66ac9db
NB
49#include "target_core_pr.h"
50#include "target_core_ua.h"
51
d9ea32bf
NB
52DEFINE_MUTEX(g_device_mutex);
53LIST_HEAD(g_device_list);
54
e3d6f909 55static struct se_hba *lun0_hba;
e3d6f909
AG
56/* not static, needed by tpg.c */
57struct se_device *g_lun0_dev;
58
de103c93 59sense_reason_t
f2d30680 60transport_lookup_cmd_lun(struct se_cmd *se_cmd, u64 unpacked_lun)
c66ac9db 61{
c66ac9db 62 struct se_lun *se_lun = NULL;
e3d6f909 63 struct se_session *se_sess = se_cmd->se_sess;
29a05dee 64 struct se_node_acl *nacl = se_sess->se_node_acl;
29a05dee 65 struct se_dev_entry *deve;
8fa3a867 66 sense_reason_t ret = TCM_NO_SENSE;
5951146d 67
29a05dee
NB
68 rcu_read_lock();
69 deve = target_nacl_find_deve(nacl, unpacked_lun);
70 if (deve) {
71 atomic_long_inc(&deve->total_cmds);
5951146d 72
5951146d 73 if (se_cmd->data_direction == DMA_TO_DEVICE)
29a05dee
NB
74 atomic_long_add(se_cmd->data_length,
75 &deve->write_bytes);
5951146d 76 else if (se_cmd->data_direction == DMA_FROM_DEVICE)
29a05dee
NB
77 atomic_long_add(se_cmd->data_length,
78 &deve->read_bytes);
5951146d 79
29a05dee 80 se_lun = rcu_dereference(deve->se_lun);
16a74480
NB
81
82 if (!percpu_ref_tryget_live(&se_lun->lun_ref)) {
83 se_lun = NULL;
84 goto out_unlock;
85 }
86
29a05dee 87 se_cmd->se_lun = rcu_dereference(deve->se_lun);
c66ac9db
NB
88 se_cmd->pr_res_key = deve->pr_res_key;
89 se_cmd->orig_fe_lun = unpacked_lun;
c66ac9db 90 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD;
5277797d 91 se_cmd->lun_ref_active = true;
8fa3a867
NB
92
93 if ((se_cmd->data_direction == DMA_TO_DEVICE) &&
03a68b44 94 deve->lun_access_ro) {
8fa3a867
NB
95 pr_err("TARGET_CORE[%s]: Detected WRITE_PROTECTED LUN"
96 " Access for 0x%08llx\n",
97 se_cmd->se_tfo->get_fabric_name(),
98 unpacked_lun);
99 rcu_read_unlock();
100 ret = TCM_WRITE_PROTECTED;
101 goto ref_dev;
102 }
c66ac9db 103 }
16a74480 104out_unlock:
29a05dee 105 rcu_read_unlock();
c66ac9db
NB
106
107 if (!se_lun) {
5951146d
AG
108 /*
109 * Use the se_portal_group->tpg_virt_lun0 to allow for
110 * REPORT_LUNS, et al to be returned when no active
111 * MappedLUN=0 exists for this Initiator Port.
112 */
113 if (unpacked_lun != 0) {
6708bb27 114 pr_err("TARGET_CORE[%s]: Detected NON_EXISTENT_LUN"
f2d30680 115 " Access for 0x%08llx\n",
e3d6f909 116 se_cmd->se_tfo->get_fabric_name(),
c66ac9db 117 unpacked_lun);
de103c93 118 return TCM_NON_EXISTENT_LUN;
5951146d 119 }
5951146d 120
adf653f9
CH
121 se_lun = se_sess->se_tpg->tpg_virt_lun0;
122 se_cmd->se_lun = se_sess->se_tpg->tpg_virt_lun0;
5951146d 123 se_cmd->orig_fe_lun = 0;
5951146d 124 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD;
5277797d
NB
125
126 percpu_ref_get(&se_lun->lun_ref);
127 se_cmd->lun_ref_active = true;
8fa3a867
NB
128
129 /*
130 * Force WRITE PROTECT for virtual LUN 0
131 */
132 if ((se_cmd->data_direction != DMA_FROM_DEVICE) &&
133 (se_cmd->data_direction != DMA_NONE)) {
134 ret = TCM_WRITE_PROTECTED;
135 goto ref_dev;
136 }
c66ac9db 137 }
4cc987ea
NB
138 /*
139 * RCU reference protected by percpu se_lun->lun_ref taken above that
140 * must drop to zero (including initial reference) before this se_lun
141 * pointer can be kfree_rcu() by the final se_lun->lun_group put via
142 * target_core_fabric_configfs.c:target_fabric_port_release
143 */
8fa3a867 144ref_dev:
4cc987ea
NB
145 se_cmd->se_dev = rcu_dereference_raw(se_lun->lun_se_dev);
146 atomic_long_inc(&se_cmd->se_dev->num_cmds);
c66ac9db 147
c66ac9db 148 if (se_cmd->data_direction == DMA_TO_DEVICE)
4cc987ea
NB
149 atomic_long_add(se_cmd->data_length,
150 &se_cmd->se_dev->write_bytes);
c66ac9db 151 else if (se_cmd->data_direction == DMA_FROM_DEVICE)
4cc987ea
NB
152 atomic_long_add(se_cmd->data_length,
153 &se_cmd->se_dev->read_bytes);
c66ac9db 154
8fa3a867 155 return ret;
c66ac9db 156}
5951146d 157EXPORT_SYMBOL(transport_lookup_cmd_lun);
c66ac9db 158
f2d30680 159int transport_lookup_tmr_lun(struct se_cmd *se_cmd, u64 unpacked_lun)
c66ac9db 160{
c66ac9db
NB
161 struct se_dev_entry *deve;
162 struct se_lun *se_lun = NULL;
e3d6f909 163 struct se_session *se_sess = se_cmd->se_sess;
29a05dee 164 struct se_node_acl *nacl = se_sess->se_node_acl;
c66ac9db 165 struct se_tmr_req *se_tmr = se_cmd->se_tmr_req;
5e1be919 166 unsigned long flags;
c66ac9db 167
29a05dee
NB
168 rcu_read_lock();
169 deve = target_nacl_find_deve(nacl, unpacked_lun);
170 if (deve) {
171 se_tmr->tmr_lun = rcu_dereference(deve->se_lun);
172 se_cmd->se_lun = rcu_dereference(deve->se_lun);
173 se_lun = rcu_dereference(deve->se_lun);
c66ac9db
NB
174 se_cmd->pr_res_key = deve->pr_res_key;
175 se_cmd->orig_fe_lun = unpacked_lun;
c66ac9db 176 }
29a05dee 177 rcu_read_unlock();
c66ac9db
NB
178
179 if (!se_lun) {
6708bb27 180 pr_debug("TARGET_CORE[%s]: Detected NON_EXISTENT_LUN"
f2d30680 181 " Access for 0x%08llx\n",
e3d6f909 182 se_cmd->se_tfo->get_fabric_name(),
c66ac9db 183 unpacked_lun);
e3d6f909 184 return -ENODEV;
c66ac9db 185 }
4cc987ea
NB
186 /*
187 * XXX: Add percpu se_lun->lun_ref reference count for TMR
188 */
189 se_cmd->se_dev = rcu_dereference_raw(se_lun->lun_se_dev);
190 se_tmr->tmr_dev = rcu_dereference_raw(se_lun->lun_se_dev);
5951146d 191
5e1be919 192 spin_lock_irqsave(&se_tmr->tmr_dev->se_tmr_lock, flags);
5951146d 193 list_add_tail(&se_tmr->tmr_list, &se_tmr->tmr_dev->dev_tmr_list);
5e1be919 194 spin_unlock_irqrestore(&se_tmr->tmr_dev->se_tmr_lock, flags);
c66ac9db
NB
195
196 return 0;
197}
5951146d 198EXPORT_SYMBOL(transport_lookup_tmr_lun);
c66ac9db 199
29a05dee
NB
200bool target_lun_is_rdonly(struct se_cmd *cmd)
201{
202 struct se_session *se_sess = cmd->se_sess;
203 struct se_dev_entry *deve;
204 bool ret;
205
29a05dee
NB
206 rcu_read_lock();
207 deve = target_nacl_find_deve(se_sess->se_node_acl, cmd->orig_fe_lun);
03a68b44 208 ret = deve && deve->lun_access_ro;
29a05dee
NB
209 rcu_read_unlock();
210
211 return ret;
212}
213EXPORT_SYMBOL(target_lun_is_rdonly);
214
c66ac9db
NB
215/*
216 * This function is called from core_scsi3_emulate_pro_register_and_move()
29a05dee 217 * and core_scsi3_decode_spec_i_port(), and will increment &deve->pr_kref
c66ac9db
NB
218 * when a matching rtpi is found.
219 */
220struct se_dev_entry *core_get_se_deve_from_rtpi(
221 struct se_node_acl *nacl,
222 u16 rtpi)
223{
224 struct se_dev_entry *deve;
225 struct se_lun *lun;
c66ac9db 226 struct se_portal_group *tpg = nacl->se_tpg;
c66ac9db 227
29a05dee
NB
228 rcu_read_lock();
229 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
230 lun = rcu_dereference(deve->se_lun);
6708bb27
AG
231 if (!lun) {
232 pr_err("%s device entries device pointer is"
c66ac9db 233 " NULL, but Initiator has access.\n",
e3d6f909 234 tpg->se_tpg_tfo->get_fabric_name());
c66ac9db
NB
235 continue;
236 }
29a05dee 237 if (lun->lun_rtpi != rtpi)
c66ac9db
NB
238 continue;
239
29a05dee
NB
240 kref_get(&deve->pr_kref);
241 rcu_read_unlock();
c66ac9db
NB
242
243 return deve;
244 }
29a05dee 245 rcu_read_unlock();
c66ac9db
NB
246
247 return NULL;
248}
249
29a05dee 250void core_free_device_list_for_node(
c66ac9db
NB
251 struct se_node_acl *nacl,
252 struct se_portal_group *tpg)
253{
254 struct se_dev_entry *deve;
c66ac9db 255
29a05dee
NB
256 mutex_lock(&nacl->lun_entry_mutex);
257 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
258 struct se_lun *lun = rcu_dereference_check(deve->se_lun,
259 lockdep_is_held(&nacl->lun_entry_mutex));
260 core_disable_device_list_for_node(lun, deve, nacl, tpg);
c66ac9db 261 }
29a05dee 262 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db
NB
263}
264
c66ac9db 265void core_update_device_list_access(
f2d30680 266 u64 mapped_lun,
03a68b44 267 bool lun_access_ro,
c66ac9db
NB
268 struct se_node_acl *nacl)
269{
270 struct se_dev_entry *deve;
271
29a05dee
NB
272 mutex_lock(&nacl->lun_entry_mutex);
273 deve = target_nacl_find_deve(nacl, mapped_lun);
03a68b44
AG
274 if (deve)
275 deve->lun_access_ro = lun_access_ro;
29a05dee 276 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db
NB
277}
278
29a05dee
NB
279/*
280 * Called with rcu_read_lock or nacl->device_list_lock held.
c66ac9db 281 */
f2d30680 282struct se_dev_entry *target_nacl_find_deve(struct se_node_acl *nacl, u64 mapped_lun)
29a05dee
NB
283{
284 struct se_dev_entry *deve;
285
286 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link)
287 if (deve->mapped_lun == mapped_lun)
288 return deve;
289
290 return NULL;
291}
292EXPORT_SYMBOL(target_nacl_find_deve);
293
294void target_pr_kref_release(struct kref *kref)
295{
296 struct se_dev_entry *deve = container_of(kref, struct se_dev_entry,
297 pr_kref);
298 complete(&deve->pr_comp);
c66ac9db
NB
299}
300
7c0d0d51
HR
301static void
302target_luns_data_has_changed(struct se_node_acl *nacl, struct se_dev_entry *new,
303 bool skip_new)
304{
305 struct se_dev_entry *tmp;
306
307 rcu_read_lock();
308 hlist_for_each_entry_rcu(tmp, &nacl->lun_entry_hlist, link) {
309 if (skip_new && tmp == new)
310 continue;
311 core_scsi3_ua_allocate(tmp, 0x3F,
312 ASCQ_3FH_REPORTED_LUNS_DATA_HAS_CHANGED);
313 }
314 rcu_read_unlock();
315}
316
e80ac6c4 317int core_enable_device_list_for_node(
c66ac9db
NB
318 struct se_lun *lun,
319 struct se_lun_acl *lun_acl,
f2d30680 320 u64 mapped_lun,
03a68b44 321 bool lun_access_ro,
c66ac9db 322 struct se_node_acl *nacl,
e80ac6c4 323 struct se_portal_group *tpg)
c66ac9db 324{
29a05dee 325 struct se_dev_entry *orig, *new;
c66ac9db 326
29a05dee
NB
327 new = kzalloc(sizeof(*new), GFP_KERNEL);
328 if (!new) {
329 pr_err("Unable to allocate se_dev_entry memory\n");
330 return -ENOMEM;
331 }
e80ac6c4 332
29a05dee
NB
333 atomic_set(&new->ua_count, 0);
334 spin_lock_init(&new->ua_lock);
29a05dee 335 INIT_LIST_HEAD(&new->ua_list);
adf653f9 336 INIT_LIST_HEAD(&new->lun_link);
e80ac6c4 337
29a05dee
NB
338 new->mapped_lun = mapped_lun;
339 kref_init(&new->pr_kref);
340 init_completion(&new->pr_comp);
341
03a68b44 342 new->lun_access_ro = lun_access_ro;
29a05dee
NB
343 new->creation_time = get_jiffies_64();
344 new->attach_count++;
345
346 mutex_lock(&nacl->lun_entry_mutex);
347 orig = target_nacl_find_deve(nacl, mapped_lun);
348 if (orig && orig->se_lun) {
349 struct se_lun *orig_lun = rcu_dereference_check(orig->se_lun,
350 lockdep_is_held(&nacl->lun_entry_mutex));
351
352 if (orig_lun != lun) {
353 pr_err("Existing orig->se_lun doesn't match new lun"
354 " for dynamic -> explicit NodeACL conversion:"
355 " %s\n", nacl->initiatorname);
356 mutex_unlock(&nacl->lun_entry_mutex);
357 kfree(new);
e80ac6c4 358 return -EINVAL;
c66ac9db 359 }
391e2a6d
NB
360 if (orig->se_lun_acl != NULL) {
361 pr_warn_ratelimited("Detected existing explicit"
362 " se_lun_acl->se_lun_group reference for %s"
363 " mapped_lun: %llu, failing\n",
364 nacl->initiatorname, mapped_lun);
365 mutex_unlock(&nacl->lun_entry_mutex);
366 kfree(new);
367 return -EINVAL;
368 }
c66ac9db 369
29a05dee
NB
370 rcu_assign_pointer(new->se_lun, lun);
371 rcu_assign_pointer(new->se_lun_acl, lun_acl);
372 hlist_del_rcu(&orig->link);
373 hlist_add_head_rcu(&new->link, &nacl->lun_entry_hlist);
374 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db 375
1adff1b3 376 spin_lock(&lun->lun_deve_lock);
adf653f9
CH
377 list_del(&orig->lun_link);
378 list_add_tail(&new->lun_link, &lun->lun_deve_list);
1adff1b3 379 spin_unlock(&lun->lun_deve_lock);
c66ac9db 380
29a05dee
NB
381 kref_put(&orig->pr_kref, target_pr_kref_release);
382 wait_for_completion(&orig->pr_comp);
c66ac9db 383
7c0d0d51 384 target_luns_data_has_changed(nacl, new, true);
29a05dee
NB
385 kfree_rcu(orig, rcu_head);
386 return 0;
c66ac9db 387 }
e80ac6c4 388
29a05dee
NB
389 rcu_assign_pointer(new->se_lun, lun);
390 rcu_assign_pointer(new->se_lun_acl, lun_acl);
391 hlist_add_head_rcu(&new->link, &nacl->lun_entry_hlist);
392 mutex_unlock(&nacl->lun_entry_mutex);
e80ac6c4 393
1adff1b3 394 spin_lock(&lun->lun_deve_lock);
adf653f9 395 list_add_tail(&new->lun_link, &lun->lun_deve_list);
1adff1b3 396 spin_unlock(&lun->lun_deve_lock);
e80ac6c4 397
7c0d0d51 398 target_luns_data_has_changed(nacl, new, true);
e80ac6c4
AG
399 return 0;
400}
401
29a05dee
NB
402/*
403 * Called with se_node_acl->lun_entry_mutex held.
e80ac6c4 404 */
29a05dee 405void core_disable_device_list_for_node(
e80ac6c4 406 struct se_lun *lun,
29a05dee 407 struct se_dev_entry *orig,
e80ac6c4
AG
408 struct se_node_acl *nacl,
409 struct se_portal_group *tpg)
410{
4cc987ea
NB
411 /*
412 * rcu_dereference_raw protected by se_lun->lun_group symlink
413 * reference to se_device->dev_group.
414 */
415 struct se_device *dev = rcu_dereference_raw(lun->lun_se_dev);
e80ac6c4
AG
416 /*
417 * If the MappedLUN entry is being disabled, the entry in
adf653f9 418 * lun->lun_deve_list must be removed now before clearing the
e80ac6c4
AG
419 * struct se_dev_entry pointers below as logic in
420 * core_alua_do_transition_tg_pt() depends on these being present.
421 *
422 * deve->se_lun_acl will be NULL for demo-mode created LUNs
423 * that have not been explicitly converted to MappedLUNs ->
adf653f9
CH
424 * struct se_lun_acl, but we remove deve->lun_link from
425 * lun->lun_deve_list. This also means that active UAs and
e80ac6c4
AG
426 * NodeACL context specific PR metadata for demo-mode
427 * MappedLUN *deve will be released below..
428 */
1adff1b3 429 spin_lock(&lun->lun_deve_lock);
adf653f9 430 list_del(&orig->lun_link);
1adff1b3 431 spin_unlock(&lun->lun_deve_lock);
c66ac9db 432 /*
29a05dee 433 * Disable struct se_dev_entry LUN ACL mapping
c66ac9db 434 */
29a05dee
NB
435 core_scsi3_ua_release_all(orig);
436
437 hlist_del_rcu(&orig->link);
80bfdfa9 438 clear_bit(DEF_PR_REG_ACTIVE, &orig->deve_flags);
03a68b44 439 orig->lun_access_ro = false;
29a05dee
NB
440 orig->creation_time = 0;
441 orig->attach_count--;
c66ac9db 442 /*
29a05dee
NB
443 * Before firing off RCU callback, wait for any in process SPEC_I_PT=1
444 * or REGISTER_AND_MOVE PR operation to complete.
c66ac9db 445 */
29a05dee
NB
446 kref_put(&orig->pr_kref, target_pr_kref_release);
447 wait_for_completion(&orig->pr_comp);
448
3ccd6e83
NB
449 rcu_assign_pointer(orig->se_lun, NULL);
450 rcu_assign_pointer(orig->se_lun_acl, NULL);
451
29a05dee 452 kfree_rcu(orig, rcu_head);
c66ac9db 453
4cc987ea 454 core_scsi3_free_pr_reg_from_nacl(dev, nacl);
7c0d0d51 455 target_luns_data_has_changed(nacl, NULL, false);
c66ac9db
NB
456}
457
458/* core_clear_lun_from_tpg():
459 *
460 *
461 */
462void core_clear_lun_from_tpg(struct se_lun *lun, struct se_portal_group *tpg)
463{
464 struct se_node_acl *nacl;
465 struct se_dev_entry *deve;
c66ac9db 466
403edd78 467 mutex_lock(&tpg->acl_node_mutex);
c66ac9db 468 list_for_each_entry(nacl, &tpg->acl_node_list, acl_list) {
c66ac9db 469
29a05dee
NB
470 mutex_lock(&nacl->lun_entry_mutex);
471 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
472 struct se_lun *tmp_lun = rcu_dereference_check(deve->se_lun,
473 lockdep_is_held(&nacl->lun_entry_mutex));
c66ac9db 474
29a05dee
NB
475 if (lun != tmp_lun)
476 continue;
c66ac9db 477
29a05dee 478 core_disable_device_list_for_node(lun, deve, nacl, tpg);
c66ac9db 479 }
29a05dee 480 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db 481 }
403edd78 482 mutex_unlock(&tpg->acl_node_mutex);
c66ac9db
NB
483}
484
adf653f9 485int core_alloc_rtpi(struct se_lun *lun, struct se_device *dev)
c66ac9db 486{
adf653f9 487 struct se_lun *tmp;
c66ac9db
NB
488
489 spin_lock(&dev->se_port_lock);
adf653f9 490 if (dev->export_count == 0x0000ffff) {
6708bb27 491 pr_warn("Reached dev->dev_port_count =="
c66ac9db
NB
492 " 0x0000ffff\n");
493 spin_unlock(&dev->se_port_lock);
adf653f9 494 return -ENOSPC;
c66ac9db
NB
495 }
496again:
497 /*
35d1efe8 498 * Allocate the next RELATIVE TARGET PORT IDENTIFIER for this struct se_device
c66ac9db
NB
499 * Here is the table from spc4r17 section 7.7.3.8.
500 *
501 * Table 473 -- RELATIVE TARGET PORT IDENTIFIER field
502 *
503 * Code Description
504 * 0h Reserved
505 * 1h Relative port 1, historically known as port A
506 * 2h Relative port 2, historically known as port B
507 * 3h to FFFFh Relative port 3 through 65 535
508 */
adf653f9
CH
509 lun->lun_rtpi = dev->dev_rpti_counter++;
510 if (!lun->lun_rtpi)
c66ac9db
NB
511 goto again;
512
adf653f9 513 list_for_each_entry(tmp, &dev->dev_sep_list, lun_dev_link) {
c66ac9db 514 /*
35d1efe8 515 * Make sure RELATIVE TARGET PORT IDENTIFIER is unique
c66ac9db
NB
516 * for 16-bit wrap..
517 */
adf653f9 518 if (lun->lun_rtpi == tmp->lun_rtpi)
c66ac9db
NB
519 goto again;
520 }
521 spin_unlock(&dev->se_port_lock);
522
c66ac9db
NB
523 return 0;
524}
525
0fd97ccf 526static void se_release_vpd_for_dev(struct se_device *dev)
c66ac9db
NB
527{
528 struct t10_vpd *vpd, *vpd_tmp;
529
0fd97ccf 530 spin_lock(&dev->t10_wwn.t10_vpd_lock);
c66ac9db 531 list_for_each_entry_safe(vpd, vpd_tmp,
0fd97ccf 532 &dev->t10_wwn.t10_vpd_list, vpd_list) {
c66ac9db
NB
533 list_del(&vpd->vpd_list);
534 kfree(vpd);
535 }
0fd97ccf 536 spin_unlock(&dev->t10_wwn.t10_vpd_lock);
c66ac9db
NB
537}
538
c8045372 539static u32 se_dev_align_max_sectors(u32 max_sectors, u32 block_size)
525a48a2 540{
3e03989b
RD
541 u32 aligned_max_sectors;
542 u32 alignment;
525a48a2
NB
543 /*
544 * Limit max_sectors to a PAGE_SIZE aligned value for modern
545 * transport_allocate_data_tasks() operation.
546 */
3e03989b
RD
547 alignment = max(1ul, PAGE_SIZE / block_size);
548 aligned_max_sectors = rounddown(max_sectors, alignment);
549
550 if (max_sectors != aligned_max_sectors)
551 pr_info("Rounding down aligned max_sectors from %u to %u\n",
552 max_sectors, aligned_max_sectors);
525a48a2 553
3e03989b 554 return aligned_max_sectors;
525a48a2
NB
555}
556
6bb82612 557int core_dev_add_lun(
c66ac9db 558 struct se_portal_group *tpg,
c66ac9db 559 struct se_device *dev,
6bb82612 560 struct se_lun *lun)
c66ac9db 561{
8d9efe53 562 int rc;
c66ac9db 563
03a68b44 564 rc = core_tpg_add_lun(tpg, lun, false, dev);
8d9efe53 565 if (rc < 0)
6bb82612 566 return rc;
c66ac9db 567
f2d30680 568 pr_debug("%s_TPG[%u]_LUN[%llu] - Activated %s Logical Unit from"
e3d6f909 569 " CORE HBA: %u\n", tpg->se_tpg_tfo->get_fabric_name(),
2af7973a 570 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
2dca673b 571 tpg->se_tpg_tfo->get_fabric_name(), dev->se_hba->hba_id);
c66ac9db
NB
572 /*
573 * Update LUN maps for dynamically added initiators when
574 * generate_node_acl is enabled.
575 */
e3d6f909 576 if (tpg->se_tpg_tfo->tpg_check_demo_mode(tpg)) {
c66ac9db 577 struct se_node_acl *acl;
403edd78
NB
578
579 mutex_lock(&tpg->acl_node_mutex);
c66ac9db 580 list_for_each_entry(acl, &tpg->acl_node_list, acl_list) {
052605c6
NB
581 if (acl->dynamic_node_acl &&
582 (!tpg->se_tpg_tfo->tpg_check_demo_mode_login_only ||
583 !tpg->se_tpg_tfo->tpg_check_demo_mode_login_only(tpg))) {
df9766ca 584 core_tpg_add_node_to_devs(acl, tpg, lun);
c66ac9db
NB
585 }
586 }
403edd78 587 mutex_unlock(&tpg->acl_node_mutex);
c66ac9db
NB
588 }
589
6bb82612 590 return 0;
c66ac9db
NB
591}
592
593/* core_dev_del_lun():
594 *
595 *
596 */
cd9d7cba 597void core_dev_del_lun(
c66ac9db 598 struct se_portal_group *tpg,
cd9d7cba 599 struct se_lun *lun)
c66ac9db 600{
f2d30680 601 pr_debug("%s_TPG[%u]_LUN[%llu] - Deactivating %s Logical Unit from"
e3d6f909 602 " device object\n", tpg->se_tpg_tfo->get_fabric_name(),
cd9d7cba 603 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
e3d6f909 604 tpg->se_tpg_tfo->get_fabric_name());
c66ac9db 605
cd9d7cba 606 core_tpg_remove_lun(tpg, lun);
c66ac9db
NB
607}
608
c66ac9db
NB
609struct se_lun_acl *core_dev_init_initiator_node_lun_acl(
610 struct se_portal_group *tpg,
fcf29481 611 struct se_node_acl *nacl,
f2d30680 612 u64 mapped_lun,
c66ac9db
NB
613 int *ret)
614{
615 struct se_lun_acl *lacl;
c66ac9db 616
fcf29481 617 if (strlen(nacl->initiatorname) >= TRANSPORT_IQN_LEN) {
6708bb27 618 pr_err("%s InitiatorName exceeds maximum size.\n",
e3d6f909 619 tpg->se_tpg_tfo->get_fabric_name());
c66ac9db
NB
620 *ret = -EOVERFLOW;
621 return NULL;
622 }
c66ac9db 623 lacl = kzalloc(sizeof(struct se_lun_acl), GFP_KERNEL);
6708bb27
AG
624 if (!lacl) {
625 pr_err("Unable to allocate memory for struct se_lun_acl.\n");
c66ac9db
NB
626 *ret = -ENOMEM;
627 return NULL;
628 }
629
c66ac9db
NB
630 lacl->mapped_lun = mapped_lun;
631 lacl->se_lun_nacl = nacl;
c66ac9db
NB
632
633 return lacl;
634}
635
636int core_dev_add_initiator_node_lun_acl(
637 struct se_portal_group *tpg,
638 struct se_lun_acl *lacl,
6bb82612 639 struct se_lun *lun,
03a68b44 640 bool lun_access_ro)
c66ac9db 641{
6bb82612 642 struct se_node_acl *nacl = lacl->se_lun_nacl;
4cc987ea
NB
643 /*
644 * rcu_dereference_raw protected by se_lun->lun_group symlink
645 * reference to se_device->dev_group.
646 */
647 struct se_device *dev = rcu_dereference_raw(lun->lun_se_dev);
c66ac9db 648
6708bb27 649 if (!nacl)
c66ac9db
NB
650 return -EINVAL;
651
03a68b44
AG
652 if (lun->lun_access_ro)
653 lun_access_ro = true;
c66ac9db
NB
654
655 lacl->se_lun = lun;
656
e80ac6c4 657 if (core_enable_device_list_for_node(lun, lacl, lacl->mapped_lun,
03a68b44 658 lun_access_ro, nacl, tpg) < 0)
c66ac9db
NB
659 return -EINVAL;
660
f2d30680 661 pr_debug("%s_TPG[%hu]_LUN[%llu->%llu] - Added %s ACL for "
e3d6f909 662 " InitiatorNode: %s\n", tpg->se_tpg_tfo->get_fabric_name(),
6bb82612 663 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun, lacl->mapped_lun,
03a68b44 664 lun_access_ro ? "RO" : "RW",
b6a54b8d 665 nacl->initiatorname);
c66ac9db
NB
666 /*
667 * Check to see if there are any existing persistent reservation APTPL
668 * pre-registrations that need to be enabled for this LUN ACL..
669 */
4cc987ea 670 core_scsi3_check_aptpl_registration(dev, tpg, lun, nacl,
e2480563 671 lacl->mapped_lun);
c66ac9db
NB
672 return 0;
673}
674
c66ac9db 675int core_dev_del_initiator_node_lun_acl(
c66ac9db
NB
676 struct se_lun *lun,
677 struct se_lun_acl *lacl)
678{
adf653f9 679 struct se_portal_group *tpg = lun->lun_tpg;
c66ac9db 680 struct se_node_acl *nacl;
29a05dee 681 struct se_dev_entry *deve;
c66ac9db
NB
682
683 nacl = lacl->se_lun_nacl;
6708bb27 684 if (!nacl)
c66ac9db
NB
685 return -EINVAL;
686
29a05dee
NB
687 mutex_lock(&nacl->lun_entry_mutex);
688 deve = target_nacl_find_deve(nacl, lacl->mapped_lun);
689 if (deve)
690 core_disable_device_list_for_node(lun, deve, nacl, tpg);
691 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db 692
f2d30680
HR
693 pr_debug("%s_TPG[%hu]_LUN[%llu] - Removed ACL for"
694 " InitiatorNode: %s Mapped LUN: %llu\n",
e3d6f909
AG
695 tpg->se_tpg_tfo->get_fabric_name(),
696 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
b6a54b8d 697 nacl->initiatorname, lacl->mapped_lun);
c66ac9db
NB
698
699 return 0;
700}
701
702void core_dev_free_initiator_node_lun_acl(
703 struct se_portal_group *tpg,
704 struct se_lun_acl *lacl)
705{
6708bb27 706 pr_debug("%s_TPG[%hu] - Freeing ACL for %s InitiatorNode: %s"
f2d30680 707 " Mapped LUN: %llu\n", tpg->se_tpg_tfo->get_fabric_name(),
e3d6f909
AG
708 tpg->se_tpg_tfo->tpg_get_tag(tpg),
709 tpg->se_tpg_tfo->get_fabric_name(),
b6a54b8d 710 lacl->se_lun_nacl->initiatorname, lacl->mapped_lun);
c66ac9db
NB
711
712 kfree(lacl);
713}
714
0fd97ccf
CH
715static void scsi_dump_inquiry(struct se_device *dev)
716{
717 struct t10_wwn *wwn = &dev->t10_wwn;
718 char buf[17];
719 int i, device_type;
720 /*
721 * Print Linux/SCSI style INQUIRY formatting to the kernel ring buffer
722 */
723 for (i = 0; i < 8; i++)
724 if (wwn->vendor[i] >= 0x20)
725 buf[i] = wwn->vendor[i];
726 else
727 buf[i] = ' ';
728 buf[i] = '\0';
729 pr_debug(" Vendor: %s\n", buf);
730
731 for (i = 0; i < 16; i++)
732 if (wwn->model[i] >= 0x20)
733 buf[i] = wwn->model[i];
734 else
735 buf[i] = ' ';
736 buf[i] = '\0';
737 pr_debug(" Model: %s\n", buf);
738
739 for (i = 0; i < 4; i++)
740 if (wwn->revision[i] >= 0x20)
741 buf[i] = wwn->revision[i];
742 else
743 buf[i] = ' ';
744 buf[i] = '\0';
745 pr_debug(" Revision: %s\n", buf);
746
747 device_type = dev->transport->get_device_type(dev);
748 pr_debug(" Type: %s ", scsi_device_type(device_type));
0fd97ccf
CH
749}
750
751struct se_device *target_alloc_device(struct se_hba *hba, const char *name)
752{
753 struct se_device *dev;
4863e525 754 struct se_lun *xcopy_lun;
0fd97ccf 755
0a06d430 756 dev = hba->backend->ops->alloc_device(hba, name);
0fd97ccf
CH
757 if (!dev)
758 return NULL;
759
0ff87549 760 dev->dev_link_magic = SE_DEV_LINK_MAGIC;
0fd97ccf 761 dev->se_hba = hba;
0a06d430 762 dev->transport = hba->backend->ops;
fe052a18 763 dev->prot_length = sizeof(struct t10_pi_tuple);
4cc987ea 764 dev->hba_index = hba->hba_index;
0fd97ccf
CH
765
766 INIT_LIST_HEAD(&dev->dev_list);
767 INIT_LIST_HEAD(&dev->dev_sep_list);
768 INIT_LIST_HEAD(&dev->dev_tmr_list);
769 INIT_LIST_HEAD(&dev->delayed_cmd_list);
770 INIT_LIST_HEAD(&dev->state_list);
771 INIT_LIST_HEAD(&dev->qf_cmd_list);
d9ea32bf 772 INIT_LIST_HEAD(&dev->g_dev_node);
0fd97ccf
CH
773 spin_lock_init(&dev->execute_task_lock);
774 spin_lock_init(&dev->delayed_cmd_lock);
775 spin_lock_init(&dev->dev_reservation_lock);
776 spin_lock_init(&dev->se_port_lock);
777 spin_lock_init(&dev->se_tmr_lock);
778 spin_lock_init(&dev->qf_cmd_lock);
68ff9b9b 779 sema_init(&dev->caw_sem, 1);
0fd97ccf
CH
780 INIT_LIST_HEAD(&dev->t10_wwn.t10_vpd_list);
781 spin_lock_init(&dev->t10_wwn.t10_vpd_lock);
782 INIT_LIST_HEAD(&dev->t10_pr.registration_list);
783 INIT_LIST_HEAD(&dev->t10_pr.aptpl_reg_list);
784 spin_lock_init(&dev->t10_pr.registration_lock);
785 spin_lock_init(&dev->t10_pr.aptpl_reg_lock);
786 INIT_LIST_HEAD(&dev->t10_alua.tg_pt_gps_list);
787 spin_lock_init(&dev->t10_alua.tg_pt_gps_lock);
c66094bf
HR
788 INIT_LIST_HEAD(&dev->t10_alua.lba_map_list);
789 spin_lock_init(&dev->t10_alua.lba_map_lock);
0fd97ccf 790
0fd97ccf
CH
791 dev->t10_wwn.t10_dev = dev;
792 dev->t10_alua.t10_dev = dev;
793
794 dev->dev_attrib.da_dev = dev;
adfa9570 795 dev->dev_attrib.emulate_model_alias = DA_EMULATE_MODEL_ALIAS;
814e5b45
CH
796 dev->dev_attrib.emulate_dpo = 1;
797 dev->dev_attrib.emulate_fua_write = 1;
798 dev->dev_attrib.emulate_fua_read = 1;
0fd97ccf
CH
799 dev->dev_attrib.emulate_write_cache = DA_EMULATE_WRITE_CACHE;
800 dev->dev_attrib.emulate_ua_intlck_ctrl = DA_EMULATE_UA_INTLLCK_CTRL;
801 dev->dev_attrib.emulate_tas = DA_EMULATE_TAS;
802 dev->dev_attrib.emulate_tpu = DA_EMULATE_TPU;
803 dev->dev_attrib.emulate_tpws = DA_EMULATE_TPWS;
0123a9ec 804 dev->dev_attrib.emulate_caw = DA_EMULATE_CAW;
d397a445 805 dev->dev_attrib.emulate_3pc = DA_EMULATE_3PC;
2ed22c9c 806 dev->dev_attrib.pi_prot_type = TARGET_DIF_TYPE0_PROT;
0fd97ccf 807 dev->dev_attrib.enforce_pr_isids = DA_ENFORCE_PR_ISIDS;
92404e60 808 dev->dev_attrib.force_pr_aptpl = DA_FORCE_PR_APTPL;
0fd97ccf
CH
809 dev->dev_attrib.is_nonrot = DA_IS_NONROT;
810 dev->dev_attrib.emulate_rest_reord = DA_EMULATE_REST_REORD;
811 dev->dev_attrib.max_unmap_lba_count = DA_MAX_UNMAP_LBA_COUNT;
812 dev->dev_attrib.max_unmap_block_desc_count =
813 DA_MAX_UNMAP_BLOCK_DESC_COUNT;
814 dev->dev_attrib.unmap_granularity = DA_UNMAP_GRANULARITY_DEFAULT;
815 dev->dev_attrib.unmap_granularity_alignment =
816 DA_UNMAP_GRANULARITY_ALIGNMENT_DEFAULT;
e6f41633
JP
817 dev->dev_attrib.unmap_zeroes_data =
818 DA_UNMAP_ZEROES_DATA_DEFAULT;
773cbaf7 819 dev->dev_attrib.max_write_same_len = DA_MAX_WRITE_SAME_LEN;
0fd97ccf 820
4863e525 821 xcopy_lun = &dev->xcopy_lun;
4cc987ea 822 rcu_assign_pointer(xcopy_lun->lun_se_dev, dev);
4863e525 823 init_completion(&xcopy_lun->lun_ref_comp);
16a74480 824 init_completion(&xcopy_lun->lun_shutdown_comp);
adf653f9
CH
825 INIT_LIST_HEAD(&xcopy_lun->lun_deve_list);
826 INIT_LIST_HEAD(&xcopy_lun->lun_dev_link);
827 mutex_init(&xcopy_lun->lun_tg_pt_md_mutex);
828 xcopy_lun->lun_tpg = &xcopy_pt_tpg;
4863e525 829
0fd97ccf
CH
830 return dev;
831}
832
8a9ebe71
MC
833/*
834 * Check if the underlying struct block_device request_queue supports
835 * the QUEUE_FLAG_DISCARD bit for UNMAP/WRITE_SAME in SCSI + TRIM
836 * in ATA and we need to set TPE=1
837 */
838bool target_configure_unmap_from_queue(struct se_dev_attrib *attrib,
ea263c7f 839 struct request_queue *q)
8a9ebe71 840{
ea263c7f
MC
841 int block_size = queue_logical_block_size(q);
842
8a9ebe71
MC
843 if (!blk_queue_discard(q))
844 return false;
845
ea263c7f
MC
846 attrib->max_unmap_lba_count =
847 q->limits.max_discard_sectors >> (ilog2(block_size) - 9);
8a9ebe71
MC
848 /*
849 * Currently hardcoded to 1 in Linux/SCSI code..
850 */
851 attrib->max_unmap_block_desc_count = 1;
852 attrib->unmap_granularity = q->limits.discard_granularity / block_size;
853 attrib->unmap_granularity_alignment = q->limits.discard_alignment /
854 block_size;
855 attrib->unmap_zeroes_data = q->limits.discard_zeroes_data;
856 return true;
857}
858EXPORT_SYMBOL(target_configure_unmap_from_queue);
859
860/*
861 * Convert from blocksize advertised to the initiator to the 512 byte
862 * units unconditionally used by the Linux block layer.
863 */
864sector_t target_to_linux_sector(struct se_device *dev, sector_t lb)
865{
866 switch (dev->dev_attrib.block_size) {
867 case 4096:
868 return lb << 3;
869 case 2048:
870 return lb << 2;
871 case 1024:
872 return lb << 1;
873 default:
874 return lb;
875 }
876}
877EXPORT_SYMBOL(target_to_linux_sector);
878
0fd97ccf
CH
879int target_configure_device(struct se_device *dev)
880{
881 struct se_hba *hba = dev->se_hba;
882 int ret;
883
884 if (dev->dev_flags & DF_CONFIGURED) {
885 pr_err("se_dev->se_dev_ptr already set for storage"
886 " object\n");
887 return -EEXIST;
888 }
889
890 ret = dev->transport->configure_device(dev);
891 if (ret)
892 goto out;
0fd97ccf
CH
893 /*
894 * XXX: there is not much point to have two different values here..
895 */
896 dev->dev_attrib.block_size = dev->dev_attrib.hw_block_size;
897 dev->dev_attrib.queue_depth = dev->dev_attrib.hw_queue_depth;
898
899 /*
900 * Align max_hw_sectors down to PAGE_SIZE I/O transfers
901 */
902 dev->dev_attrib.hw_max_sectors =
903 se_dev_align_max_sectors(dev->dev_attrib.hw_max_sectors,
904 dev->dev_attrib.hw_block_size);
046ba642 905 dev->dev_attrib.optimal_sectors = dev->dev_attrib.hw_max_sectors;
0fd97ccf
CH
906
907 dev->dev_index = scsi_get_new_index(SCSI_DEVICE_INDEX);
908 dev->creation_time = get_jiffies_64();
909
0fd97ccf
CH
910 ret = core_setup_alua(dev);
911 if (ret)
912 goto out;
913
914 /*
915 * Startup the struct se_device processing thread
916 */
917 dev->tmr_wq = alloc_workqueue("tmr-%s", WQ_MEM_RECLAIM | WQ_UNBOUND, 1,
918 dev->transport->name);
919 if (!dev->tmr_wq) {
920 pr_err("Unable to create tmr workqueue for %s\n",
921 dev->transport->name);
922 ret = -ENOMEM;
923 goto out_free_alua;
924 }
925
926 /*
927 * Setup work_queue for QUEUE_FULL
928 */
929 INIT_WORK(&dev->qf_work_queue, target_qf_do_work);
930
931 /*
932 * Preload the initial INQUIRY const values if we are doing
933 * anything virtual (IBLOCK, FILEIO, RAMDISK), but not for TCM/pSCSI
934 * passthrough because this is being provided by the backend LLD.
935 */
a3541703 936 if (!(dev->transport->transport_flags & TRANSPORT_FLAG_PASSTHROUGH)) {
0fd97ccf
CH
937 strncpy(&dev->t10_wwn.vendor[0], "LIO-ORG", 8);
938 strncpy(&dev->t10_wwn.model[0],
939 dev->transport->inquiry_prod, 16);
940 strncpy(&dev->t10_wwn.revision[0],
941 dev->transport->inquiry_rev, 4);
942 }
943
944 scsi_dump_inquiry(dev);
945
946 spin_lock(&hba->device_lock);
947 hba->dev_count++;
948 spin_unlock(&hba->device_lock);
d9ea32bf
NB
949
950 mutex_lock(&g_device_mutex);
951 list_add_tail(&dev->g_dev_node, &g_device_list);
952 mutex_unlock(&g_device_mutex);
953
5f7da044
NB
954 dev->dev_flags |= DF_CONFIGURED;
955
0fd97ccf
CH
956 return 0;
957
958out_free_alua:
959 core_alua_free_lu_gp_mem(dev);
960out:
961 se_release_vpd_for_dev(dev);
962 return ret;
963}
964
965void target_free_device(struct se_device *dev)
966{
967 struct se_hba *hba = dev->se_hba;
968
969 WARN_ON(!list_empty(&dev->dev_sep_list));
970
971 if (dev->dev_flags & DF_CONFIGURED) {
972 destroy_workqueue(dev->tmr_wq);
973
d9ea32bf
NB
974 mutex_lock(&g_device_mutex);
975 list_del(&dev->g_dev_node);
976 mutex_unlock(&g_device_mutex);
977
0fd97ccf
CH
978 spin_lock(&hba->device_lock);
979 hba->dev_count--;
980 spin_unlock(&hba->device_lock);
981 }
982
983 core_alua_free_lu_gp_mem(dev);
229d4f11 984 core_alua_set_lba_map(dev, NULL, 0, 0);
0fd97ccf
CH
985 core_scsi3_free_all_registrations(dev);
986 se_release_vpd_for_dev(dev);
987
2ed22c9c
NB
988 if (dev->transport->free_prot)
989 dev->transport->free_prot(dev);
990
0fd97ccf
CH
991 dev->transport->free_device(dev);
992}
993
c66ac9db
NB
994int core_dev_setup_virtual_lun0(void)
995{
996 struct se_hba *hba;
997 struct se_device *dev;
db5d1c3c 998 char buf[] = "rd_pages=8,rd_nullio=1";
c66ac9db
NB
999 int ret;
1000
6708bb27 1001 hba = core_alloc_hba("rd_mcp", 0, HBA_FLAGS_INTERNAL_USE);
c66ac9db
NB
1002 if (IS_ERR(hba))
1003 return PTR_ERR(hba);
1004
0fd97ccf
CH
1005 dev = target_alloc_device(hba, "virt_lun0");
1006 if (!dev) {
c66ac9db 1007 ret = -ENOMEM;
0fd97ccf 1008 goto out_free_hba;
c66ac9db 1009 }
c66ac9db 1010
0a06d430 1011 hba->backend->ops->set_configfs_dev_params(dev, buf, sizeof(buf));
c66ac9db 1012
0fd97ccf
CH
1013 ret = target_configure_device(dev);
1014 if (ret)
1015 goto out_free_se_dev;
c66ac9db 1016
0fd97ccf
CH
1017 lun0_hba = hba;
1018 g_lun0_dev = dev;
c66ac9db 1019 return 0;
0fd97ccf
CH
1020
1021out_free_se_dev:
1022 target_free_device(dev);
1023out_free_hba:
1024 core_delete_hba(hba);
c66ac9db
NB
1025 return ret;
1026}
1027
1028
1029void core_dev_release_virtual_lun0(void)
1030{
e3d6f909 1031 struct se_hba *hba = lun0_hba;
c66ac9db 1032
6708bb27 1033 if (!hba)
c66ac9db
NB
1034 return;
1035
e3d6f909 1036 if (g_lun0_dev)
0fd97ccf 1037 target_free_device(g_lun0_dev);
c66ac9db
NB
1038 core_delete_hba(hba);
1039}
7bfea53b
AG
1040
1041/*
1042 * Common CDB parsing for kernel and user passthrough.
1043 */
1044sense_reason_t
1045passthrough_parse_cdb(struct se_cmd *cmd,
1046 sense_reason_t (*exec_cmd)(struct se_cmd *cmd))
1047{
1048 unsigned char *cdb = cmd->t_task_cdb;
1049
1050 /*
1051 * Clear a lun set in the cdb if the initiator talking to use spoke
1052 * and old standards version, as we can't assume the underlying device
1053 * won't choke up on it.
1054 */
1055 switch (cdb[0]) {
1056 case READ_10: /* SBC - RDProtect */
1057 case READ_12: /* SBC - RDProtect */
1058 case READ_16: /* SBC - RDProtect */
1059 case SEND_DIAGNOSTIC: /* SPC - SELF-TEST Code */
1060 case VERIFY: /* SBC - VRProtect */
1061 case VERIFY_16: /* SBC - VRProtect */
1062 case WRITE_VERIFY: /* SBC - VRProtect */
1063 case WRITE_VERIFY_12: /* SBC - VRProtect */
1064 case MAINTENANCE_IN: /* SPC - Parameter Data Format for SA RTPG */
1065 break;
1066 default:
1067 cdb[1] &= 0x1f; /* clear logical unit number */
1068 break;
1069 }
1070
1071 /*
1072 * For REPORT LUNS we always need to emulate the response, for everything
1073 * else, pass it up.
1074 */
1075 if (cdb[0] == REPORT_LUNS) {
1076 cmd->execute_cmd = spc_emulate_report_luns;
1077 return TCM_NO_SENSE;
1078 }
1079
1080 /* Set DATA_CDB flag for ops that should have it */
1081 switch (cdb[0]) {
1082 case READ_6:
1083 case READ_10:
1084 case READ_12:
1085 case READ_16:
1086 case WRITE_6:
1087 case WRITE_10:
1088 case WRITE_12:
1089 case WRITE_16:
1090 case WRITE_VERIFY:
1091 case WRITE_VERIFY_12:
1092 case 0x8e: /* WRITE_VERIFY_16 */
1093 case COMPARE_AND_WRITE:
1094 case XDWRITEREAD_10:
1095 cmd->se_cmd_flags |= SCF_SCSI_DATA_CDB;
1096 break;
1097 case VARIABLE_LENGTH_CMD:
1098 switch (get_unaligned_be16(&cdb[8])) {
1099 case READ_32:
1100 case WRITE_32:
1101 case 0x0c: /* WRITE_VERIFY_32 */
1102 case XDWRITEREAD_32:
1103 cmd->se_cmd_flags |= SCF_SCSI_DATA_CDB;
1104 break;
1105 }
1106 }
1107
1108 cmd->execute_cmd = exec_cmd;
1109
1110 return TCM_NO_SENSE;
1111}
1112EXPORT_SYMBOL(passthrough_parse_cdb);