]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - drivers/target/target_core_device.c
target: Subsume se_port + t10_alua_tg_pt_gp_member into se_lun
[mirror_ubuntu-jammy-kernel.git] / drivers / target / target_core_device.c
CommitLineData
c66ac9db
NB
1/*******************************************************************************
2 * Filename: target_core_device.c (based on iscsi_target_device.c)
3 *
e3d6f909 4 * This file contains the TCM Virtual Device and Disk Transport
c66ac9db
NB
5 * agnostic related functions.
6 *
4c76251e 7 * (c) Copyright 2003-2013 Datera, Inc.
c66ac9db
NB
8 *
9 * Nicholas A. Bellinger <nab@kernel.org>
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
24 *
25 ******************************************************************************/
26
27#include <linux/net.h>
28#include <linux/string.h>
29#include <linux/delay.h>
30#include <linux/timer.h>
31#include <linux/slab.h>
32#include <linux/spinlock.h>
c66ac9db
NB
33#include <linux/kthread.h>
34#include <linux/in.h>
c53181af 35#include <linux/export.h>
7bfea53b 36#include <asm/unaligned.h>
c66ac9db
NB
37#include <net/sock.h>
38#include <net/tcp.h>
39#include <scsi/scsi.h>
1078da16 40#include <scsi/scsi_device.h>
c66ac9db
NB
41
42#include <target/target_core_base.h>
c4795fb2
CH
43#include <target/target_core_backend.h>
44#include <target/target_core_fabric.h>
c66ac9db 45
e26d99ae 46#include "target_core_internal.h"
c66ac9db 47#include "target_core_alua.h"
c66ac9db
NB
48#include "target_core_pr.h"
49#include "target_core_ua.h"
50
d9ea32bf
NB
51DEFINE_MUTEX(g_device_mutex);
52LIST_HEAD(g_device_list);
53
e3d6f909 54static struct se_hba *lun0_hba;
e3d6f909
AG
55/* not static, needed by tpg.c */
56struct se_device *g_lun0_dev;
57
de103c93
CH
58sense_reason_t
59transport_lookup_cmd_lun(struct se_cmd *se_cmd, u32 unpacked_lun)
c66ac9db 60{
c66ac9db 61 struct se_lun *se_lun = NULL;
e3d6f909 62 struct se_session *se_sess = se_cmd->se_sess;
29a05dee 63 struct se_node_acl *nacl = se_sess->se_node_acl;
5951146d 64 struct se_device *dev;
29a05dee 65 struct se_dev_entry *deve;
c66ac9db 66
de103c93
CH
67 if (unpacked_lun >= TRANSPORT_MAX_LUNS_PER_TPG)
68 return TCM_NON_EXISTENT_LUN;
d8144955 69
29a05dee
NB
70 rcu_read_lock();
71 deve = target_nacl_find_deve(nacl, unpacked_lun);
72 if (deve) {
73 atomic_long_inc(&deve->total_cmds);
5951146d
AG
74
75 if ((se_cmd->data_direction == DMA_TO_DEVICE) &&
76 (deve->lun_flags & TRANSPORT_LUNFLAGS_READ_ONLY)) {
6708bb27 77 pr_err("TARGET_CORE[%s]: Detected WRITE_PROTECTED LUN"
5951146d
AG
78 " Access for 0x%08x\n",
79 se_cmd->se_tfo->get_fabric_name(),
80 unpacked_lun);
29a05dee 81 rcu_read_unlock();
de103c93 82 return TCM_WRITE_PROTECTED;
c66ac9db 83 }
5951146d
AG
84
85 if (se_cmd->data_direction == DMA_TO_DEVICE)
29a05dee
NB
86 atomic_long_add(se_cmd->data_length,
87 &deve->write_bytes);
5951146d 88 else if (se_cmd->data_direction == DMA_FROM_DEVICE)
29a05dee
NB
89 atomic_long_add(se_cmd->data_length,
90 &deve->read_bytes);
5951146d 91
29a05dee
NB
92 se_lun = rcu_dereference(deve->se_lun);
93 se_cmd->se_lun = rcu_dereference(deve->se_lun);
c66ac9db
NB
94 se_cmd->pr_res_key = deve->pr_res_key;
95 se_cmd->orig_fe_lun = unpacked_lun;
c66ac9db 96 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD;
5277797d
NB
97
98 percpu_ref_get(&se_lun->lun_ref);
99 se_cmd->lun_ref_active = true;
c66ac9db 100 }
29a05dee 101 rcu_read_unlock();
c66ac9db
NB
102
103 if (!se_lun) {
5951146d
AG
104 /*
105 * Use the se_portal_group->tpg_virt_lun0 to allow for
106 * REPORT_LUNS, et al to be returned when no active
107 * MappedLUN=0 exists for this Initiator Port.
108 */
109 if (unpacked_lun != 0) {
6708bb27 110 pr_err("TARGET_CORE[%s]: Detected NON_EXISTENT_LUN"
c66ac9db 111 " Access for 0x%08x\n",
e3d6f909 112 se_cmd->se_tfo->get_fabric_name(),
c66ac9db 113 unpacked_lun);
de103c93 114 return TCM_NON_EXISTENT_LUN;
5951146d
AG
115 }
116 /*
117 * Force WRITE PROTECT for virtual LUN 0
118 */
119 if ((se_cmd->data_direction != DMA_FROM_DEVICE) &&
de103c93
CH
120 (se_cmd->data_direction != DMA_NONE))
121 return TCM_WRITE_PROTECTED;
5951146d 122
adf653f9
CH
123 se_lun = se_sess->se_tpg->tpg_virt_lun0;
124 se_cmd->se_lun = se_sess->se_tpg->tpg_virt_lun0;
5951146d 125 se_cmd->orig_fe_lun = 0;
5951146d 126 se_cmd->se_cmd_flags |= SCF_SE_LUN_CMD;
5277797d
NB
127
128 percpu_ref_get(&se_lun->lun_ref);
129 se_cmd->lun_ref_active = true;
c66ac9db 130 }
c66ac9db 131
5951146d
AG
132 /* Directly associate cmd with se_dev */
133 se_cmd->se_dev = se_lun->lun_se_dev;
134
5951146d 135 dev = se_lun->lun_se_dev;
ee480683 136 atomic_long_inc(&dev->num_cmds);
c66ac9db 137 if (se_cmd->data_direction == DMA_TO_DEVICE)
ee480683 138 atomic_long_add(se_cmd->data_length, &dev->write_bytes);
c66ac9db 139 else if (se_cmd->data_direction == DMA_FROM_DEVICE)
ee480683 140 atomic_long_add(se_cmd->data_length, &dev->read_bytes);
c66ac9db 141
c66ac9db
NB
142 return 0;
143}
5951146d 144EXPORT_SYMBOL(transport_lookup_cmd_lun);
c66ac9db 145
5951146d 146int transport_lookup_tmr_lun(struct se_cmd *se_cmd, u32 unpacked_lun)
c66ac9db 147{
c66ac9db
NB
148 struct se_dev_entry *deve;
149 struct se_lun *se_lun = NULL;
e3d6f909 150 struct se_session *se_sess = se_cmd->se_sess;
29a05dee 151 struct se_node_acl *nacl = se_sess->se_node_acl;
c66ac9db 152 struct se_tmr_req *se_tmr = se_cmd->se_tmr_req;
5e1be919 153 unsigned long flags;
c66ac9db 154
de103c93 155 if (unpacked_lun >= TRANSPORT_MAX_LUNS_PER_TPG)
e3d6f909 156 return -ENODEV;
d8144955 157
29a05dee
NB
158 rcu_read_lock();
159 deve = target_nacl_find_deve(nacl, unpacked_lun);
160 if (deve) {
161 se_tmr->tmr_lun = rcu_dereference(deve->se_lun);
162 se_cmd->se_lun = rcu_dereference(deve->se_lun);
163 se_lun = rcu_dereference(deve->se_lun);
c66ac9db
NB
164 se_cmd->pr_res_key = deve->pr_res_key;
165 se_cmd->orig_fe_lun = unpacked_lun;
c66ac9db 166 }
29a05dee 167 rcu_read_unlock();
c66ac9db
NB
168
169 if (!se_lun) {
6708bb27 170 pr_debug("TARGET_CORE[%s]: Detected NON_EXISTENT_LUN"
c66ac9db 171 " Access for 0x%08x\n",
e3d6f909 172 se_cmd->se_tfo->get_fabric_name(),
c66ac9db 173 unpacked_lun);
e3d6f909 174 return -ENODEV;
c66ac9db 175 }
c66ac9db 176
5951146d
AG
177 /* Directly associate cmd with se_dev */
178 se_cmd->se_dev = se_lun->lun_se_dev;
179 se_tmr->tmr_dev = se_lun->lun_se_dev;
180
5e1be919 181 spin_lock_irqsave(&se_tmr->tmr_dev->se_tmr_lock, flags);
5951146d 182 list_add_tail(&se_tmr->tmr_list, &se_tmr->tmr_dev->dev_tmr_list);
5e1be919 183 spin_unlock_irqrestore(&se_tmr->tmr_dev->se_tmr_lock, flags);
c66ac9db
NB
184
185 return 0;
186}
5951146d 187EXPORT_SYMBOL(transport_lookup_tmr_lun);
c66ac9db 188
29a05dee
NB
189bool target_lun_is_rdonly(struct se_cmd *cmd)
190{
191 struct se_session *se_sess = cmd->se_sess;
192 struct se_dev_entry *deve;
193 bool ret;
194
195 if (cmd->se_lun->lun_access & TRANSPORT_LUNFLAGS_READ_ONLY)
196 return true;
197
198 rcu_read_lock();
199 deve = target_nacl_find_deve(se_sess->se_node_acl, cmd->orig_fe_lun);
200 ret = (deve && deve->lun_flags & TRANSPORT_LUNFLAGS_READ_ONLY);
201 rcu_read_unlock();
202
203 return ret;
204}
205EXPORT_SYMBOL(target_lun_is_rdonly);
206
c66ac9db
NB
207/*
208 * This function is called from core_scsi3_emulate_pro_register_and_move()
29a05dee 209 * and core_scsi3_decode_spec_i_port(), and will increment &deve->pr_kref
c66ac9db
NB
210 * when a matching rtpi is found.
211 */
212struct se_dev_entry *core_get_se_deve_from_rtpi(
213 struct se_node_acl *nacl,
214 u16 rtpi)
215{
216 struct se_dev_entry *deve;
217 struct se_lun *lun;
c66ac9db 218 struct se_portal_group *tpg = nacl->se_tpg;
c66ac9db 219
29a05dee
NB
220 rcu_read_lock();
221 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
222 lun = rcu_dereference(deve->se_lun);
6708bb27
AG
223 if (!lun) {
224 pr_err("%s device entries device pointer is"
c66ac9db 225 " NULL, but Initiator has access.\n",
e3d6f909 226 tpg->se_tpg_tfo->get_fabric_name());
c66ac9db
NB
227 continue;
228 }
29a05dee 229 if (lun->lun_rtpi != rtpi)
c66ac9db
NB
230 continue;
231
29a05dee
NB
232 kref_get(&deve->pr_kref);
233 rcu_read_unlock();
c66ac9db
NB
234
235 return deve;
236 }
29a05dee 237 rcu_read_unlock();
c66ac9db
NB
238
239 return NULL;
240}
241
29a05dee 242void core_free_device_list_for_node(
c66ac9db
NB
243 struct se_node_acl *nacl,
244 struct se_portal_group *tpg)
245{
246 struct se_dev_entry *deve;
c66ac9db 247
29a05dee
NB
248 mutex_lock(&nacl->lun_entry_mutex);
249 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
250 struct se_lun *lun = rcu_dereference_check(deve->se_lun,
251 lockdep_is_held(&nacl->lun_entry_mutex));
252 core_disable_device_list_for_node(lun, deve, nacl, tpg);
c66ac9db 253 }
29a05dee 254 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db
NB
255}
256
c66ac9db
NB
257void core_update_device_list_access(
258 u32 mapped_lun,
259 u32 lun_access,
260 struct se_node_acl *nacl)
261{
262 struct se_dev_entry *deve;
263
29a05dee
NB
264 mutex_lock(&nacl->lun_entry_mutex);
265 deve = target_nacl_find_deve(nacl, mapped_lun);
266 if (deve) {
267 if (lun_access & TRANSPORT_LUNFLAGS_READ_WRITE) {
268 deve->lun_flags &= ~TRANSPORT_LUNFLAGS_READ_ONLY;
269 deve->lun_flags |= TRANSPORT_LUNFLAGS_READ_WRITE;
270 } else {
271 deve->lun_flags &= ~TRANSPORT_LUNFLAGS_READ_WRITE;
272 deve->lun_flags |= TRANSPORT_LUNFLAGS_READ_ONLY;
273 }
c66ac9db 274 }
29a05dee
NB
275 mutex_unlock(&nacl->lun_entry_mutex);
276}
277
278/*
279 * Called with rcu_read_lock or nacl->device_list_lock held.
280 */
281struct se_dev_entry *target_nacl_find_deve(struct se_node_acl *nacl, u32 mapped_lun)
282{
283 struct se_dev_entry *deve;
284
285 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link)
286 if (deve->mapped_lun == mapped_lun)
287 return deve;
288
289 return NULL;
290}
291EXPORT_SYMBOL(target_nacl_find_deve);
292
293void target_pr_kref_release(struct kref *kref)
294{
295 struct se_dev_entry *deve = container_of(kref, struct se_dev_entry,
296 pr_kref);
297 complete(&deve->pr_comp);
c66ac9db
NB
298}
299
e80ac6c4 300/* core_enable_device_list_for_node():
c66ac9db
NB
301 *
302 *
303 */
e80ac6c4 304int core_enable_device_list_for_node(
c66ac9db
NB
305 struct se_lun *lun,
306 struct se_lun_acl *lun_acl,
307 u32 mapped_lun,
308 u32 lun_access,
309 struct se_node_acl *nacl,
e80ac6c4 310 struct se_portal_group *tpg)
c66ac9db 311{
29a05dee
NB
312 struct se_dev_entry *orig, *new;
313
314 new = kzalloc(sizeof(*new), GFP_KERNEL);
315 if (!new) {
316 pr_err("Unable to allocate se_dev_entry memory\n");
317 return -ENOMEM;
318 }
319
320 atomic_set(&new->ua_count, 0);
321 spin_lock_init(&new->ua_lock);
29a05dee 322 INIT_LIST_HEAD(&new->ua_list);
adf653f9 323 INIT_LIST_HEAD(&new->lun_link);
29a05dee
NB
324
325 new->mapped_lun = mapped_lun;
326 kref_init(&new->pr_kref);
327 init_completion(&new->pr_comp);
328
329 if (lun_access & TRANSPORT_LUNFLAGS_READ_WRITE)
330 new->lun_flags |= TRANSPORT_LUNFLAGS_READ_WRITE;
331 else
332 new->lun_flags |= TRANSPORT_LUNFLAGS_READ_ONLY;
333
334 new->creation_time = get_jiffies_64();
335 new->attach_count++;
336
337 mutex_lock(&nacl->lun_entry_mutex);
338 orig = target_nacl_find_deve(nacl, mapped_lun);
339 if (orig && orig->se_lun) {
340 struct se_lun *orig_lun = rcu_dereference_check(orig->se_lun,
341 lockdep_is_held(&nacl->lun_entry_mutex));
342
343 if (orig_lun != lun) {
344 pr_err("Existing orig->se_lun doesn't match new lun"
345 " for dynamic -> explicit NodeACL conversion:"
346 " %s\n", nacl->initiatorname);
347 mutex_unlock(&nacl->lun_entry_mutex);
348 kfree(new);
e80ac6c4 349 return -EINVAL;
c66ac9db 350 }
29a05dee 351 BUG_ON(orig->se_lun_acl != NULL);
c66ac9db 352
29a05dee
NB
353 rcu_assign_pointer(new->se_lun, lun);
354 rcu_assign_pointer(new->se_lun_acl, lun_acl);
355 hlist_del_rcu(&orig->link);
356 hlist_add_head_rcu(&new->link, &nacl->lun_entry_hlist);
357 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db 358
adf653f9
CH
359 spin_lock_bh(&lun->lun_deve_lock);
360 list_del(&orig->lun_link);
361 list_add_tail(&new->lun_link, &lun->lun_deve_list);
362 spin_unlock_bh(&lun->lun_deve_lock);
c66ac9db 363
29a05dee
NB
364 kref_put(&orig->pr_kref, target_pr_kref_release);
365 wait_for_completion(&orig->pr_comp);
c66ac9db 366
29a05dee
NB
367 kfree_rcu(orig, rcu_head);
368 return 0;
c66ac9db 369 }
e80ac6c4 370
29a05dee
NB
371 rcu_assign_pointer(new->se_lun, lun);
372 rcu_assign_pointer(new->se_lun_acl, lun_acl);
373 hlist_add_head_rcu(&new->link, &nacl->lun_entry_hlist);
374 mutex_unlock(&nacl->lun_entry_mutex);
e80ac6c4 375
adf653f9
CH
376 spin_lock_bh(&lun->lun_deve_lock);
377 list_add_tail(&new->lun_link, &lun->lun_deve_list);
378 spin_unlock_bh(&lun->lun_deve_lock);
e80ac6c4
AG
379
380 return 0;
381}
382
29a05dee
NB
383/*
384 * Called with se_node_acl->lun_entry_mutex held.
e80ac6c4 385 */
29a05dee 386void core_disable_device_list_for_node(
e80ac6c4 387 struct se_lun *lun,
29a05dee 388 struct se_dev_entry *orig,
e80ac6c4
AG
389 struct se_node_acl *nacl,
390 struct se_portal_group *tpg)
391{
e80ac6c4
AG
392 /*
393 * If the MappedLUN entry is being disabled, the entry in
adf653f9 394 * lun->lun_deve_list must be removed now before clearing the
e80ac6c4
AG
395 * struct se_dev_entry pointers below as logic in
396 * core_alua_do_transition_tg_pt() depends on these being present.
397 *
398 * deve->se_lun_acl will be NULL for demo-mode created LUNs
399 * that have not been explicitly converted to MappedLUNs ->
adf653f9
CH
400 * struct se_lun_acl, but we remove deve->lun_link from
401 * lun->lun_deve_list. This also means that active UAs and
e80ac6c4
AG
402 * NodeACL context specific PR metadata for demo-mode
403 * MappedLUN *deve will be released below..
404 */
adf653f9
CH
405 spin_lock_bh(&lun->lun_deve_lock);
406 list_del(&orig->lun_link);
407 spin_unlock_bh(&lun->lun_deve_lock);
c66ac9db 408 /*
29a05dee 409 * Disable struct se_dev_entry LUN ACL mapping
c66ac9db 410 */
29a05dee
NB
411 core_scsi3_ua_release_all(orig);
412
413 hlist_del_rcu(&orig->link);
80bfdfa9 414 clear_bit(DEF_PR_REG_ACTIVE, &orig->deve_flags);
29a05dee
NB
415 rcu_assign_pointer(orig->se_lun, NULL);
416 rcu_assign_pointer(orig->se_lun_acl, NULL);
417 orig->lun_flags = 0;
418 orig->creation_time = 0;
419 orig->attach_count--;
c66ac9db 420 /*
29a05dee
NB
421 * Before firing off RCU callback, wait for any in process SPEC_I_PT=1
422 * or REGISTER_AND_MOVE PR operation to complete.
c66ac9db 423 */
29a05dee
NB
424 kref_put(&orig->pr_kref, target_pr_kref_release);
425 wait_for_completion(&orig->pr_comp);
426
427 kfree_rcu(orig, rcu_head);
c66ac9db
NB
428
429 core_scsi3_free_pr_reg_from_nacl(lun->lun_se_dev, nacl);
c66ac9db
NB
430}
431
432/* core_clear_lun_from_tpg():
433 *
434 *
435 */
436void core_clear_lun_from_tpg(struct se_lun *lun, struct se_portal_group *tpg)
437{
438 struct se_node_acl *nacl;
439 struct se_dev_entry *deve;
c66ac9db 440
403edd78 441 mutex_lock(&tpg->acl_node_mutex);
c66ac9db 442 list_for_each_entry(nacl, &tpg->acl_node_list, acl_list) {
c66ac9db 443
29a05dee
NB
444 mutex_lock(&nacl->lun_entry_mutex);
445 hlist_for_each_entry_rcu(deve, &nacl->lun_entry_hlist, link) {
446 struct se_lun *tmp_lun = rcu_dereference_check(deve->se_lun,
447 lockdep_is_held(&nacl->lun_entry_mutex));
c66ac9db 448
29a05dee
NB
449 if (lun != tmp_lun)
450 continue;
c66ac9db 451
29a05dee 452 core_disable_device_list_for_node(lun, deve, nacl, tpg);
c66ac9db 453 }
29a05dee 454 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db 455 }
403edd78 456 mutex_unlock(&tpg->acl_node_mutex);
c66ac9db
NB
457}
458
adf653f9 459int core_alloc_rtpi(struct se_lun *lun, struct se_device *dev)
c66ac9db 460{
adf653f9 461 struct se_lun *tmp;
c66ac9db
NB
462
463 spin_lock(&dev->se_port_lock);
adf653f9 464 if (dev->export_count == 0x0000ffff) {
6708bb27 465 pr_warn("Reached dev->dev_port_count =="
c66ac9db
NB
466 " 0x0000ffff\n");
467 spin_unlock(&dev->se_port_lock);
adf653f9 468 return -ENOSPC;
c66ac9db
NB
469 }
470again:
471 /*
35d1efe8 472 * Allocate the next RELATIVE TARGET PORT IDENTIFIER for this struct se_device
c66ac9db
NB
473 * Here is the table from spc4r17 section 7.7.3.8.
474 *
475 * Table 473 -- RELATIVE TARGET PORT IDENTIFIER field
476 *
477 * Code Description
478 * 0h Reserved
479 * 1h Relative port 1, historically known as port A
480 * 2h Relative port 2, historically known as port B
481 * 3h to FFFFh Relative port 3 through 65 535
482 */
adf653f9
CH
483 lun->lun_rtpi = dev->dev_rpti_counter++;
484 if (!lun->lun_rtpi)
c66ac9db
NB
485 goto again;
486
adf653f9 487 list_for_each_entry(tmp, &dev->dev_sep_list, lun_dev_link) {
c66ac9db 488 /*
35d1efe8 489 * Make sure RELATIVE TARGET PORT IDENTIFIER is unique
c66ac9db
NB
490 * for 16-bit wrap..
491 */
adf653f9 492 if (lun->lun_rtpi == tmp->lun_rtpi)
c66ac9db
NB
493 goto again;
494 }
495 spin_unlock(&dev->se_port_lock);
496
c66ac9db
NB
497 return 0;
498}
499
0fd97ccf 500static void se_release_vpd_for_dev(struct se_device *dev)
c66ac9db
NB
501{
502 struct t10_vpd *vpd, *vpd_tmp;
503
0fd97ccf 504 spin_lock(&dev->t10_wwn.t10_vpd_lock);
c66ac9db 505 list_for_each_entry_safe(vpd, vpd_tmp,
0fd97ccf 506 &dev->t10_wwn.t10_vpd_list, vpd_list) {
c66ac9db
NB
507 list_del(&vpd->vpd_list);
508 kfree(vpd);
509 }
0fd97ccf 510 spin_unlock(&dev->t10_wwn.t10_vpd_lock);
c66ac9db
NB
511}
512
c8045372 513static u32 se_dev_align_max_sectors(u32 max_sectors, u32 block_size)
525a48a2 514{
3e03989b
RD
515 u32 aligned_max_sectors;
516 u32 alignment;
525a48a2
NB
517 /*
518 * Limit max_sectors to a PAGE_SIZE aligned value for modern
519 * transport_allocate_data_tasks() operation.
520 */
3e03989b
RD
521 alignment = max(1ul, PAGE_SIZE / block_size);
522 aligned_max_sectors = rounddown(max_sectors, alignment);
523
524 if (max_sectors != aligned_max_sectors)
525 pr_info("Rounding down aligned max_sectors from %u to %u\n",
526 max_sectors, aligned_max_sectors);
525a48a2 527
3e03989b 528 return aligned_max_sectors;
525a48a2
NB
529}
530
9bc6548f
CVB
531bool se_dev_check_wce(struct se_device *dev)
532{
533 bool wce = false;
534
535 if (dev->transport->get_write_cache)
536 wce = dev->transport->get_write_cache(dev);
537 else if (dev->dev_attrib.emulate_write_cache > 0)
538 wce = true;
539
540 return wce;
541}
542
6bb82612 543int core_dev_add_lun(
c66ac9db 544 struct se_portal_group *tpg,
c66ac9db 545 struct se_device *dev,
6bb82612 546 struct se_lun *lun)
c66ac9db 547{
8d9efe53 548 int rc;
c66ac9db 549
d344f8a1 550 rc = core_tpg_add_lun(tpg, lun,
58d92618 551 TRANSPORT_LUNFLAGS_READ_WRITE, dev);
8d9efe53 552 if (rc < 0)
6bb82612 553 return rc;
c66ac9db 554
6708bb27 555 pr_debug("%s_TPG[%u]_LUN[%u] - Activated %s Logical Unit from"
e3d6f909 556 " CORE HBA: %u\n", tpg->se_tpg_tfo->get_fabric_name(),
2af7973a 557 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
2dca673b 558 tpg->se_tpg_tfo->get_fabric_name(), dev->se_hba->hba_id);
c66ac9db
NB
559 /*
560 * Update LUN maps for dynamically added initiators when
561 * generate_node_acl is enabled.
562 */
e3d6f909 563 if (tpg->se_tpg_tfo->tpg_check_demo_mode(tpg)) {
c66ac9db 564 struct se_node_acl *acl;
403edd78
NB
565
566 mutex_lock(&tpg->acl_node_mutex);
c66ac9db 567 list_for_each_entry(acl, &tpg->acl_node_list, acl_list) {
052605c6
NB
568 if (acl->dynamic_node_acl &&
569 (!tpg->se_tpg_tfo->tpg_check_demo_mode_login_only ||
570 !tpg->se_tpg_tfo->tpg_check_demo_mode_login_only(tpg))) {
df9766ca 571 core_tpg_add_node_to_devs(acl, tpg, lun);
c66ac9db
NB
572 }
573 }
403edd78 574 mutex_unlock(&tpg->acl_node_mutex);
c66ac9db
NB
575 }
576
6bb82612 577 return 0;
c66ac9db
NB
578}
579
580/* core_dev_del_lun():
581 *
582 *
583 */
cd9d7cba 584void core_dev_del_lun(
c66ac9db 585 struct se_portal_group *tpg,
cd9d7cba 586 struct se_lun *lun)
c66ac9db 587{
cd9d7cba 588 pr_debug("%s_TPG[%u]_LUN[%u] - Deactivating %s Logical Unit from"
e3d6f909 589 " device object\n", tpg->se_tpg_tfo->get_fabric_name(),
cd9d7cba 590 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
e3d6f909 591 tpg->se_tpg_tfo->get_fabric_name());
c66ac9db 592
cd9d7cba 593 core_tpg_remove_lun(tpg, lun);
c66ac9db
NB
594}
595
c66ac9db
NB
596struct se_lun_acl *core_dev_init_initiator_node_lun_acl(
597 struct se_portal_group *tpg,
fcf29481 598 struct se_node_acl *nacl,
c66ac9db 599 u32 mapped_lun,
c66ac9db
NB
600 int *ret)
601{
602 struct se_lun_acl *lacl;
c66ac9db 603
fcf29481 604 if (strlen(nacl->initiatorname) >= TRANSPORT_IQN_LEN) {
6708bb27 605 pr_err("%s InitiatorName exceeds maximum size.\n",
e3d6f909 606 tpg->se_tpg_tfo->get_fabric_name());
c66ac9db
NB
607 *ret = -EOVERFLOW;
608 return NULL;
609 }
c66ac9db 610 lacl = kzalloc(sizeof(struct se_lun_acl), GFP_KERNEL);
6708bb27
AG
611 if (!lacl) {
612 pr_err("Unable to allocate memory for struct se_lun_acl.\n");
c66ac9db
NB
613 *ret = -ENOMEM;
614 return NULL;
615 }
616
c66ac9db
NB
617 lacl->mapped_lun = mapped_lun;
618 lacl->se_lun_nacl = nacl;
fcf29481
NB
619 snprintf(lacl->initiatorname, TRANSPORT_IQN_LEN, "%s",
620 nacl->initiatorname);
c66ac9db
NB
621
622 return lacl;
623}
624
625int core_dev_add_initiator_node_lun_acl(
626 struct se_portal_group *tpg,
627 struct se_lun_acl *lacl,
6bb82612 628 struct se_lun *lun,
c66ac9db
NB
629 u32 lun_access)
630{
6bb82612 631 struct se_node_acl *nacl = lacl->se_lun_nacl;
c66ac9db 632
6708bb27 633 if (!nacl)
c66ac9db
NB
634 return -EINVAL;
635
636 if ((lun->lun_access & TRANSPORT_LUNFLAGS_READ_ONLY) &&
637 (lun_access & TRANSPORT_LUNFLAGS_READ_WRITE))
638 lun_access = TRANSPORT_LUNFLAGS_READ_ONLY;
639
640 lacl->se_lun = lun;
641
e80ac6c4
AG
642 if (core_enable_device_list_for_node(lun, lacl, lacl->mapped_lun,
643 lun_access, nacl, tpg) < 0)
c66ac9db
NB
644 return -EINVAL;
645
6708bb27 646 pr_debug("%s_TPG[%hu]_LUN[%u->%u] - Added %s ACL for "
e3d6f909 647 " InitiatorNode: %s\n", tpg->se_tpg_tfo->get_fabric_name(),
6bb82612 648 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun, lacl->mapped_lun,
c66ac9db
NB
649 (lun_access & TRANSPORT_LUNFLAGS_READ_WRITE) ? "RW" : "RO",
650 lacl->initiatorname);
651 /*
652 * Check to see if there are any existing persistent reservation APTPL
653 * pre-registrations that need to be enabled for this LUN ACL..
654 */
e2480563
NB
655 core_scsi3_check_aptpl_registration(lun->lun_se_dev, tpg, lun, nacl,
656 lacl->mapped_lun);
c66ac9db
NB
657 return 0;
658}
659
c66ac9db 660int core_dev_del_initiator_node_lun_acl(
c66ac9db
NB
661 struct se_lun *lun,
662 struct se_lun_acl *lacl)
663{
adf653f9 664 struct se_portal_group *tpg = lun->lun_tpg;
c66ac9db 665 struct se_node_acl *nacl;
29a05dee 666 struct se_dev_entry *deve;
c66ac9db
NB
667
668 nacl = lacl->se_lun_nacl;
6708bb27 669 if (!nacl)
c66ac9db
NB
670 return -EINVAL;
671
29a05dee
NB
672 mutex_lock(&nacl->lun_entry_mutex);
673 deve = target_nacl_find_deve(nacl, lacl->mapped_lun);
674 if (deve)
675 core_disable_device_list_for_node(lun, deve, nacl, tpg);
676 mutex_unlock(&nacl->lun_entry_mutex);
c66ac9db 677
6708bb27 678 pr_debug("%s_TPG[%hu]_LUN[%u] - Removed ACL for"
c66ac9db 679 " InitiatorNode: %s Mapped LUN: %u\n",
e3d6f909
AG
680 tpg->se_tpg_tfo->get_fabric_name(),
681 tpg->se_tpg_tfo->tpg_get_tag(tpg), lun->unpacked_lun,
c66ac9db
NB
682 lacl->initiatorname, lacl->mapped_lun);
683
684 return 0;
685}
686
687void core_dev_free_initiator_node_lun_acl(
688 struct se_portal_group *tpg,
689 struct se_lun_acl *lacl)
690{
6708bb27 691 pr_debug("%s_TPG[%hu] - Freeing ACL for %s InitiatorNode: %s"
e3d6f909
AG
692 " Mapped LUN: %u\n", tpg->se_tpg_tfo->get_fabric_name(),
693 tpg->se_tpg_tfo->tpg_get_tag(tpg),
694 tpg->se_tpg_tfo->get_fabric_name(),
c66ac9db
NB
695 lacl->initiatorname, lacl->mapped_lun);
696
697 kfree(lacl);
698}
699
0fd97ccf
CH
700static void scsi_dump_inquiry(struct se_device *dev)
701{
702 struct t10_wwn *wwn = &dev->t10_wwn;
703 char buf[17];
704 int i, device_type;
705 /*
706 * Print Linux/SCSI style INQUIRY formatting to the kernel ring buffer
707 */
708 for (i = 0; i < 8; i++)
709 if (wwn->vendor[i] >= 0x20)
710 buf[i] = wwn->vendor[i];
711 else
712 buf[i] = ' ';
713 buf[i] = '\0';
714 pr_debug(" Vendor: %s\n", buf);
715
716 for (i = 0; i < 16; i++)
717 if (wwn->model[i] >= 0x20)
718 buf[i] = wwn->model[i];
719 else
720 buf[i] = ' ';
721 buf[i] = '\0';
722 pr_debug(" Model: %s\n", buf);
723
724 for (i = 0; i < 4; i++)
725 if (wwn->revision[i] >= 0x20)
726 buf[i] = wwn->revision[i];
727 else
728 buf[i] = ' ';
729 buf[i] = '\0';
730 pr_debug(" Revision: %s\n", buf);
731
732 device_type = dev->transport->get_device_type(dev);
733 pr_debug(" Type: %s ", scsi_device_type(device_type));
0fd97ccf
CH
734}
735
736struct se_device *target_alloc_device(struct se_hba *hba, const char *name)
737{
738 struct se_device *dev;
4863e525 739 struct se_lun *xcopy_lun;
0fd97ccf 740
0a06d430 741 dev = hba->backend->ops->alloc_device(hba, name);
0fd97ccf
CH
742 if (!dev)
743 return NULL;
744
0ff87549 745 dev->dev_link_magic = SE_DEV_LINK_MAGIC;
0fd97ccf 746 dev->se_hba = hba;
0a06d430 747 dev->transport = hba->backend->ops;
2ed22c9c 748 dev->prot_length = sizeof(struct se_dif_v1_tuple);
0fd97ccf
CH
749
750 INIT_LIST_HEAD(&dev->dev_list);
751 INIT_LIST_HEAD(&dev->dev_sep_list);
752 INIT_LIST_HEAD(&dev->dev_tmr_list);
753 INIT_LIST_HEAD(&dev->delayed_cmd_list);
754 INIT_LIST_HEAD(&dev->state_list);
755 INIT_LIST_HEAD(&dev->qf_cmd_list);
d9ea32bf 756 INIT_LIST_HEAD(&dev->g_dev_node);
0fd97ccf
CH
757 spin_lock_init(&dev->execute_task_lock);
758 spin_lock_init(&dev->delayed_cmd_lock);
759 spin_lock_init(&dev->dev_reservation_lock);
760 spin_lock_init(&dev->se_port_lock);
761 spin_lock_init(&dev->se_tmr_lock);
762 spin_lock_init(&dev->qf_cmd_lock);
68ff9b9b 763 sema_init(&dev->caw_sem, 1);
0fd97ccf
CH
764 atomic_set(&dev->dev_ordered_id, 0);
765 INIT_LIST_HEAD(&dev->t10_wwn.t10_vpd_list);
766 spin_lock_init(&dev->t10_wwn.t10_vpd_lock);
767 INIT_LIST_HEAD(&dev->t10_pr.registration_list);
768 INIT_LIST_HEAD(&dev->t10_pr.aptpl_reg_list);
769 spin_lock_init(&dev->t10_pr.registration_lock);
770 spin_lock_init(&dev->t10_pr.aptpl_reg_lock);
771 INIT_LIST_HEAD(&dev->t10_alua.tg_pt_gps_list);
772 spin_lock_init(&dev->t10_alua.tg_pt_gps_lock);
c66094bf
HR
773 INIT_LIST_HEAD(&dev->t10_alua.lba_map_list);
774 spin_lock_init(&dev->t10_alua.lba_map_lock);
0fd97ccf 775
0fd97ccf
CH
776 dev->t10_wwn.t10_dev = dev;
777 dev->t10_alua.t10_dev = dev;
778
779 dev->dev_attrib.da_dev = dev;
adfa9570 780 dev->dev_attrib.emulate_model_alias = DA_EMULATE_MODEL_ALIAS;
814e5b45
CH
781 dev->dev_attrib.emulate_dpo = 1;
782 dev->dev_attrib.emulate_fua_write = 1;
783 dev->dev_attrib.emulate_fua_read = 1;
0fd97ccf
CH
784 dev->dev_attrib.emulate_write_cache = DA_EMULATE_WRITE_CACHE;
785 dev->dev_attrib.emulate_ua_intlck_ctrl = DA_EMULATE_UA_INTLLCK_CTRL;
786 dev->dev_attrib.emulate_tas = DA_EMULATE_TAS;
787 dev->dev_attrib.emulate_tpu = DA_EMULATE_TPU;
788 dev->dev_attrib.emulate_tpws = DA_EMULATE_TPWS;
0123a9ec 789 dev->dev_attrib.emulate_caw = DA_EMULATE_CAW;
d397a445 790 dev->dev_attrib.emulate_3pc = DA_EMULATE_3PC;
2ed22c9c 791 dev->dev_attrib.pi_prot_type = TARGET_DIF_TYPE0_PROT;
0fd97ccf 792 dev->dev_attrib.enforce_pr_isids = DA_ENFORCE_PR_ISIDS;
92404e60 793 dev->dev_attrib.force_pr_aptpl = DA_FORCE_PR_APTPL;
0fd97ccf
CH
794 dev->dev_attrib.is_nonrot = DA_IS_NONROT;
795 dev->dev_attrib.emulate_rest_reord = DA_EMULATE_REST_REORD;
796 dev->dev_attrib.max_unmap_lba_count = DA_MAX_UNMAP_LBA_COUNT;
797 dev->dev_attrib.max_unmap_block_desc_count =
798 DA_MAX_UNMAP_BLOCK_DESC_COUNT;
799 dev->dev_attrib.unmap_granularity = DA_UNMAP_GRANULARITY_DEFAULT;
800 dev->dev_attrib.unmap_granularity_alignment =
801 DA_UNMAP_GRANULARITY_ALIGNMENT_DEFAULT;
773cbaf7 802 dev->dev_attrib.max_write_same_len = DA_MAX_WRITE_SAME_LEN;
0fd97ccf 803
4863e525
NB
804 xcopy_lun = &dev->xcopy_lun;
805 xcopy_lun->lun_se_dev = dev;
4863e525
NB
806 spin_lock_init(&xcopy_lun->lun_sep_lock);
807 init_completion(&xcopy_lun->lun_ref_comp);
adf653f9
CH
808 INIT_LIST_HEAD(&xcopy_lun->lun_deve_list);
809 INIT_LIST_HEAD(&xcopy_lun->lun_dev_link);
810 mutex_init(&xcopy_lun->lun_tg_pt_md_mutex);
811 xcopy_lun->lun_tpg = &xcopy_pt_tpg;
4863e525 812
0fd97ccf
CH
813 return dev;
814}
815
816int target_configure_device(struct se_device *dev)
817{
818 struct se_hba *hba = dev->se_hba;
819 int ret;
820
821 if (dev->dev_flags & DF_CONFIGURED) {
822 pr_err("se_dev->se_dev_ptr already set for storage"
823 " object\n");
824 return -EEXIST;
825 }
826
827 ret = dev->transport->configure_device(dev);
828 if (ret)
829 goto out;
0fd97ccf
CH
830 /*
831 * XXX: there is not much point to have two different values here..
832 */
833 dev->dev_attrib.block_size = dev->dev_attrib.hw_block_size;
834 dev->dev_attrib.queue_depth = dev->dev_attrib.hw_queue_depth;
835
836 /*
837 * Align max_hw_sectors down to PAGE_SIZE I/O transfers
838 */
839 dev->dev_attrib.hw_max_sectors =
840 se_dev_align_max_sectors(dev->dev_attrib.hw_max_sectors,
841 dev->dev_attrib.hw_block_size);
046ba642 842 dev->dev_attrib.optimal_sectors = dev->dev_attrib.hw_max_sectors;
0fd97ccf
CH
843
844 dev->dev_index = scsi_get_new_index(SCSI_DEVICE_INDEX);
845 dev->creation_time = get_jiffies_64();
846
0fd97ccf
CH
847 ret = core_setup_alua(dev);
848 if (ret)
849 goto out;
850
851 /*
852 * Startup the struct se_device processing thread
853 */
854 dev->tmr_wq = alloc_workqueue("tmr-%s", WQ_MEM_RECLAIM | WQ_UNBOUND, 1,
855 dev->transport->name);
856 if (!dev->tmr_wq) {
857 pr_err("Unable to create tmr workqueue for %s\n",
858 dev->transport->name);
859 ret = -ENOMEM;
860 goto out_free_alua;
861 }
862
863 /*
864 * Setup work_queue for QUEUE_FULL
865 */
866 INIT_WORK(&dev->qf_work_queue, target_qf_do_work);
867
868 /*
869 * Preload the initial INQUIRY const values if we are doing
870 * anything virtual (IBLOCK, FILEIO, RAMDISK), but not for TCM/pSCSI
871 * passthrough because this is being provided by the backend LLD.
872 */
a3541703 873 if (!(dev->transport->transport_flags & TRANSPORT_FLAG_PASSTHROUGH)) {
0fd97ccf
CH
874 strncpy(&dev->t10_wwn.vendor[0], "LIO-ORG", 8);
875 strncpy(&dev->t10_wwn.model[0],
876 dev->transport->inquiry_prod, 16);
877 strncpy(&dev->t10_wwn.revision[0],
878 dev->transport->inquiry_rev, 4);
879 }
880
881 scsi_dump_inquiry(dev);
882
883 spin_lock(&hba->device_lock);
884 hba->dev_count++;
885 spin_unlock(&hba->device_lock);
d9ea32bf
NB
886
887 mutex_lock(&g_device_mutex);
888 list_add_tail(&dev->g_dev_node, &g_device_list);
889 mutex_unlock(&g_device_mutex);
890
5f7da044
NB
891 dev->dev_flags |= DF_CONFIGURED;
892
0fd97ccf
CH
893 return 0;
894
895out_free_alua:
896 core_alua_free_lu_gp_mem(dev);
897out:
898 se_release_vpd_for_dev(dev);
899 return ret;
900}
901
902void target_free_device(struct se_device *dev)
903{
904 struct se_hba *hba = dev->se_hba;
905
906 WARN_ON(!list_empty(&dev->dev_sep_list));
907
908 if (dev->dev_flags & DF_CONFIGURED) {
909 destroy_workqueue(dev->tmr_wq);
910
d9ea32bf
NB
911 mutex_lock(&g_device_mutex);
912 list_del(&dev->g_dev_node);
913 mutex_unlock(&g_device_mutex);
914
0fd97ccf
CH
915 spin_lock(&hba->device_lock);
916 hba->dev_count--;
917 spin_unlock(&hba->device_lock);
918 }
919
920 core_alua_free_lu_gp_mem(dev);
229d4f11 921 core_alua_set_lba_map(dev, NULL, 0, 0);
0fd97ccf
CH
922 core_scsi3_free_all_registrations(dev);
923 se_release_vpd_for_dev(dev);
924
2ed22c9c
NB
925 if (dev->transport->free_prot)
926 dev->transport->free_prot(dev);
927
0fd97ccf
CH
928 dev->transport->free_device(dev);
929}
930
c66ac9db
NB
931int core_dev_setup_virtual_lun0(void)
932{
933 struct se_hba *hba;
934 struct se_device *dev;
db5d1c3c 935 char buf[] = "rd_pages=8,rd_nullio=1";
c66ac9db
NB
936 int ret;
937
6708bb27 938 hba = core_alloc_hba("rd_mcp", 0, HBA_FLAGS_INTERNAL_USE);
c66ac9db
NB
939 if (IS_ERR(hba))
940 return PTR_ERR(hba);
941
0fd97ccf
CH
942 dev = target_alloc_device(hba, "virt_lun0");
943 if (!dev) {
c66ac9db 944 ret = -ENOMEM;
0fd97ccf 945 goto out_free_hba;
c66ac9db 946 }
c66ac9db 947
0a06d430 948 hba->backend->ops->set_configfs_dev_params(dev, buf, sizeof(buf));
c66ac9db 949
0fd97ccf
CH
950 ret = target_configure_device(dev);
951 if (ret)
952 goto out_free_se_dev;
c66ac9db 953
0fd97ccf
CH
954 lun0_hba = hba;
955 g_lun0_dev = dev;
c66ac9db 956 return 0;
0fd97ccf
CH
957
958out_free_se_dev:
959 target_free_device(dev);
960out_free_hba:
961 core_delete_hba(hba);
c66ac9db
NB
962 return ret;
963}
964
965
966void core_dev_release_virtual_lun0(void)
967{
e3d6f909 968 struct se_hba *hba = lun0_hba;
c66ac9db 969
6708bb27 970 if (!hba)
c66ac9db
NB
971 return;
972
e3d6f909 973 if (g_lun0_dev)
0fd97ccf 974 target_free_device(g_lun0_dev);
c66ac9db
NB
975 core_delete_hba(hba);
976}
7bfea53b
AG
977
978/*
979 * Common CDB parsing for kernel and user passthrough.
980 */
981sense_reason_t
982passthrough_parse_cdb(struct se_cmd *cmd,
983 sense_reason_t (*exec_cmd)(struct se_cmd *cmd))
984{
985 unsigned char *cdb = cmd->t_task_cdb;
986
987 /*
988 * Clear a lun set in the cdb if the initiator talking to use spoke
989 * and old standards version, as we can't assume the underlying device
990 * won't choke up on it.
991 */
992 switch (cdb[0]) {
993 case READ_10: /* SBC - RDProtect */
994 case READ_12: /* SBC - RDProtect */
995 case READ_16: /* SBC - RDProtect */
996 case SEND_DIAGNOSTIC: /* SPC - SELF-TEST Code */
997 case VERIFY: /* SBC - VRProtect */
998 case VERIFY_16: /* SBC - VRProtect */
999 case WRITE_VERIFY: /* SBC - VRProtect */
1000 case WRITE_VERIFY_12: /* SBC - VRProtect */
1001 case MAINTENANCE_IN: /* SPC - Parameter Data Format for SA RTPG */
1002 break;
1003 default:
1004 cdb[1] &= 0x1f; /* clear logical unit number */
1005 break;
1006 }
1007
1008 /*
1009 * For REPORT LUNS we always need to emulate the response, for everything
1010 * else, pass it up.
1011 */
1012 if (cdb[0] == REPORT_LUNS) {
1013 cmd->execute_cmd = spc_emulate_report_luns;
1014 return TCM_NO_SENSE;
1015 }
1016
1017 /* Set DATA_CDB flag for ops that should have it */
1018 switch (cdb[0]) {
1019 case READ_6:
1020 case READ_10:
1021 case READ_12:
1022 case READ_16:
1023 case WRITE_6:
1024 case WRITE_10:
1025 case WRITE_12:
1026 case WRITE_16:
1027 case WRITE_VERIFY:
1028 case WRITE_VERIFY_12:
1029 case 0x8e: /* WRITE_VERIFY_16 */
1030 case COMPARE_AND_WRITE:
1031 case XDWRITEREAD_10:
1032 cmd->se_cmd_flags |= SCF_SCSI_DATA_CDB;
1033 break;
1034 case VARIABLE_LENGTH_CMD:
1035 switch (get_unaligned_be16(&cdb[8])) {
1036 case READ_32:
1037 case WRITE_32:
1038 case 0x0c: /* WRITE_VERIFY_32 */
1039 case XDWRITEREAD_32:
1040 cmd->se_cmd_flags |= SCF_SCSI_DATA_CDB;
1041 break;
1042 }
1043 }
1044
1045 cmd->execute_cmd = exec_cmd;
1046
1047 return TCM_NO_SENSE;
1048}
1049EXPORT_SYMBOL(passthrough_parse_cdb);